Concurrency Control in Mobile Environments: Issues & Challenges
Concurrency Control in Mobile Environments: Issues & Challenges
Concurrency Control in Mobile Environments: Issues & Challenges
4, November 2011
ABSTRACT
The use of data services from handheld devices has increased exponentially resulting in several challenges. Transactions requiring the same shared data item may simultaneously perform a write operation leading to inconsistency of data items. The generic characteristics of mobile environments like variable bandwidth, disconnections, mobility etc makes transaction management more difficult thereby the traditional Isolation property may not be guaranteed. This paper analyzes and compares various concurrency control strategies in mobile environments proposed in literature. The design requirement for preserving isolation property in mobile environments is also presented.
KEYWORDS
Concurrency Control, Pessimistic Strategy, Optimistic Strategy, Mobile Host, Fixed Host, ACID.
1. INTRODUCTION
Transactions are key to structuring distributed applications. Concurrency control is one of the important building blocks of transaction management. The requirement of concurrency control arose to ensure correctness when shared data item is updated by multiple transactions at the same time. The traditional two phase locking protocol is not suitable in mobile database environment due to frequent mobility and disconnections. Further to manage the data correctly, the support of ACID (Atomicity, Consistency, Isolation & Durability) properties of transaction should be revisited with respect to the characteristics of mobile database environment. Atomicity is guaranteed by the commit protocols, Consistency is assured by DBMS or application programs if it can ensure certain specified constraints, Isolation is guaranteed by concurrency control manager and Durability is ensured by logging. Transaction management is characterized by the environment in which transaction gets executed. In the first group the transaction are completely or partially executed at mobile host. In this group the focus is on support of ACID properties. In the second group, transactions initiated at mobile
DOI: 10.5121/ijdms.2011.3411 147
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011
hosts are executed at fixed host. In this group ACID properties are not compromised and the focus is on support of executing transactions successfully in presence of mobility and disconnections [1]. The remaining part of this paper is organized as follows: Section -2 describes the architecture of mobile database system, execution modes in mobile environments and the need of mobile middleware and its architecture. Section -3 presents the concurrent access anomalies and the lists the challenges in achieving Isolation property in mobile environments. Section-4 presents the pessimistic strategies for concurrency control in mobile environments and along with issues and challenges. Section -5 describes the optimistic strategies in mobile environments followed by issues and challenges and Section -6 concludes the paper.
Figure 1. Reference architecture of Mobile Database System The Mobile database system consists of two major components and two major connectors. The two components are Mobile Host and Fixed Host respectively and the two connectors are Wireless and Wired Networks. Terminals, desktops, servers are the Fixed Host which are interconnected by means of a fixed network. Large databases can run on servers that guarantee efficient processing and reliable storage of database [1]. Mobile Hosts (MH) like Palmtops, Laptops, PDAs or Cellular phones is not always connected to the fixed network [1]. They may be disconnected for different reasons. Mobile host may differ with respect to the computing power and storage space; however MH can perform database transactions. The disconnections may be soft or hard. Hence disconnections are handled as normal situations and not as failures.
148
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011
Advances in wireless technology and ubiquitous computing have created a new domain called mobile computing, where the users access the data irrespective of their physical location and movement behavior. The wireless technology provides users to logically retain the network connection even when there is a handoff i.e. when the mobile host is moving from one location to another. The geographical area covered by a base station is called a cell. Every time the mobile host communicates with the base station of the cell it belongs to. The process of entering new cell is said to be a handoff or handover.
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011
different platforms and operating systems and the applications need to be accessed from any of the devices. Mobile middleware communicates with the fixed host on behalf of the mobile hosts. The mobile middleware also helps in providing location transparency thereby reducing the overhead of hard coding the applications on mobile devices.
Figure 2. Mobile Middleware Architecture The mobile middleware helps in managing transactions, providing middleware security and support for cross platform implementation. The Cross platform middleware helps in supporting wide range of mobile applications. It also provides Device flexibility & Application flexibility. The transaction management in mobile environments can be implemented on the mobile middleware. The data synchronization strategies can be realized by mobile middleware.
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011
database environment, the global commit operation may increase the uplink bandwidth as the mobile host has to initiate the transactions again and again.
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011
End
However DHP-2PL uses transaction restart mechanism to resolve lock conflicts between noncommitting transactions. Further Global restarts takes more time than the local restart operations.
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011
Pessimistic Strategy
Transaction Type
Transaction throughput Depends on priority of inheritance Decreases when there are frequent request for increase in timer value
Transaction restarts More local/global restarts Transaction restarts if the execution is not completed in threshold limit The intra and inter transaction parallelism may lead to high restarts due to disconnection s May reduce but execution time increases
DHP-2L
Flat
TCOT
Nested
Nested
Flat
May decrease when the disconnection time is higher May reduce if transaction requires more data items and sever is heavily loaded
Flat
May reduce but time taken for lookup of data items and counting them will be high
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011
In this protocol multiple users are allowed to read the same shared data item simultaneously. When the transaction commits, the data items read by other users have to be invalidated. To implement this caching techniques are presented in literature which uses broadcasting i.e. whenever a commit is done locally, an invalidation report is broadcasted to all clients to invalidate the data items.
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011
receive commit information correctly, it couldnt determine whether the local transactions must be committed or not. These broadcast errors can be reduced using reliable transmission protocol like a typical re-transmission and acknowledgement technique. Two types of broadcasts are used in this strategy viz. Notification broadcast for delivering the validation results of the transactions and Certification broadcast for broadcasting the invalidation information. In addition a confirmation protocol is used by mobile clients to receive the reliable results over a broadcast channel. The throughput of this strategy is less as it has to go through one additional level in making a final commit decision. This also increases the number of certification broadcast when many mobile hosts are requesting for the same shared data item as a result the uplink bandwidth increases.
155
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011
The qualitative analysis of the optimistic strategies for guaranteeing concurrency control in mobile environments is presented in table 3. Table 3. Qualitative analysis of Optimistic Strategies for Concurrency Control Optimistic Strategy CCM Trans Type Data Validity Conflict resolution Through broadcasting of new values Through broadcasting done by mobile hosts (peers) Uplink Bandwidth
Nested
Till the timer expires (can be utmost for limited no of concurrent request) Till the time of writing the write set onto fixed host
Low, but less transaction throughput High, if the transaction fails in third phase, it has to be requested again. Increases exponentially when access to shared data items increases because of the additional confirmation protocol Since data items are read only on demand uplink bandwidth is sufficiently low High as the transaction has to be started again once it receives invalidation report
SODA
Nested
CCUD
Flat
Flat
Through broadcasting of invalidation reports Conflicting transactions are terminated before reaching the validation phase
Flat
6. CONCLUSION
Concurrency control forms a basic building block for transaction management in any database environments. However as disconnections are treated as normal situations in mobile environments, there is a need for relaxation of ACID properties in mobile environments. In this paper several concurrency control strategies to achieve the Isolation is discussed. In pessimistic strategy the transaction may be blocked due to locking. However the time based strategies made an attempt to resolve the starvation issues in presence of disconnections and mobility. To overcome the problem of blocking, optimistic strategies are presented in literature. However there is a need for good conflict resolution strategies which satisfies Serializability property.
156
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011
7. REFERENCES
[1] Patrical Serran-Alvarado et.Al, A Survey of Mobile Transactions, Distributed & Parallel Databases, Kluwer Publishers, 16, pp.193-230, 2004 K.P. Eswarn, J. Gray, R.A. Lorie, and I.L. Triger, The notions of consistency and predicate locks in a database system, Communications of the ACM (CACM), vol. 19, no. 11, 1976. Kam-Yiu Lam, Tei-Wei Kuo et.Al, Concurrency Control in Mobile Distributed Real-Time Database Systems, Elseiver Sciences, Information Systems Vol. 25, No.4, pp. 261-286, 2000. R.J. Abbott and H. Garcia-Molina. Scheduling real-time transactions: a performance evaluation. ACM Transactions on Database Systems, Vol. 17, No. 3, pp. 513-560, 1992. Nitin Prabhu, Vijay Kumar et. Al, Concurrency Control in Mobile Database System, Proceedings of 18th IEEE International Conference on Advanced Information Networking and Application (AINA),pp. 83-86, 2004. Zhaowen Xing, Le Gruenweld, K.K Phang, SODA: An Algorithm to Guarantee Correctness of Concurrent Transaction Execution in Mobile P2P Databases, 19th IEEE International Conference on Database and Expert Systems Applications pp.337-341, 2008. Zakil Koo, Songchum Moon, Effects of broadcast errors on concurrency control in wireless broadcasting environments, pp. 13-21, 2002. Victor C.S., Kwok wa Lam and Son, S.H., Concurrency Control Using Time-stamp Ordering in Broadcast Environments, the Computer Journal,Vol.45, No.4 PP.410-422, 2002 Victor C.S.Lee, Kwok Wa Lam, Tei-wei Kuo,Efficient Validation of Mobile Transactions in Wireless Environments, The Journal of Systems and Software 69(2004), 183-193.
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10] Minsoo Lee, Sumi Helal, HiCoMo: High Commit Mobile Transactions, Distributed and Parallel Databases, 11, 73-92, 2002, Kluwer Academic Publishers [11] J. Kisler, and M. Satyanarayanan, Disconnected Operation in the Coda File System, ACM Transactions on Computer Systems, 10(1), 1992 [12] Khalil M. Ahmed, Mohammed A Ismail, Navava M. El. Makky, Khaled M. Nagi, A New Transaction Management Scheme for MobileComputing Environments, 2003. [13] H. T. Kung and J. T. Robinson, "On Optimistic Methods for Concurrency Control", ACM TODS, Vol.6, No. 2, June 1981. [14] Ho Chin Choi, Byeong-Soo Jeong, A Timestamp-Based Optimistic Concurrency Control for Handling Mobile Transactions, Springer Verlag, LNCS 3981, PP. 796-805, 2006. [15] T. Hrder. Observations on optimistic concurrency control schemes. Information Systems, 9(2):111120, 1984. [16] K. Eswaran, J. Gray, R. Lorie, I. Traiger, The Notion of Consistency and Predicate locks in a database system, Communication of the ACM, 19 (11): 624-633, 1976. 157
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011 [17] Bernstein, P.A, Hadzilacos, V. and Goodman, N, "Concurrency Control and Recovery in Database System", Addison-Wesley 1987 [18] Barbara D. and T. Imielinski. "Sleepers and Workaholics: Strategies in Mobile Environments", Proc. ACM pp. 1-12, May 1994. [19] Anand Yendluri, Wen-Chi Hou, and Chih-Fang Wang, Improving Concurrency Control in Mobile Databases,Springer Verlag LNCS 2973, PP. 642-655, 2004. [20] Vijay Kumar, Nitin Prabhu, Maggie Dunham, Ayse Yasemin Seydim, TCOT - A Timeout based Mobile Transaction Commitment Protocol, IIS 9979453, 2004. [21] P. Krishna Reddy, Masaru Kitsuregawa, Speculative Lock Management to Increase Concurrency in Mobile Environments, MDA99, LNCS 1748, pp, 82-96, 1996. [22] Mohammed Khaja Nizamuddin, Dr. Syed Abdul Sattar, An Improved, Prioritized ConcurrencyControl Scheme with Performance Gain in Mobile Environments, pp. 34-40, Vol.1, No.1, ARPN Journal of Systems & Software, 2011. [23] Mohammed Khaja Nizamuddin, Dr. Syed Abdul Sattar, Data Count Driven Concurrency Control Scheme With Performance Gain in Mobile Environments, pp. 106-112, JETCIS, Vol,2. No. 2, 2011.
Authors Dr. Salman Abdul Moiz is a Research Scientist at Centre for Development of Advanced Computing Bangalore. He received his B.Sc (Electronics) from Osmania University, MCA from Osmania University, M.Tech (cse) from Osmania University, M.Phil (CS) from Madurai Kamaraj University and Ph.D (CSE) from Osmania University. His research interest includes Mobile databases, Domain specific component design & Disaster recovery.
Supriya N. Pal holds a Master's degree in Computer Science from the University of Mumbai. She is a Technical Lead in applied research projects of Software Engineering division in C-DAC, Electronics City, Bangalore. Her research interests include SW Re-engineering, SOA, Messaging middleware, and Mobile Computing and its applications
Jitendra Kumar is working as Senior Staff Scientist at Centre for Development of Advanced Computing, Bangalore. He holds Bachelors degree in Computer Science & Engineering from Magadh University & PGDIM IGNOU, Delhi. His area of interests includes Mobile computing & Applications, SOA, Web Security, Messaging middleware, Enterprise Application Development and Distributed Computing.
158
International Journal of Database Management Systems ( IJDMS ) Vol.3, No.4, November 2011 Palani Lavanya is working as Staff Scientist at Centre for Development of Advanced Computing, Bangalore. She received B.E (CSE) from Madras University. Her research interests are in the areas of Mobile Computing, Network Security & Embedded Networking.
Deepak Chandra Joshi is working as Staff Scientist at Centre for Development of Advanced Computing, Bangalore. He received B.Sc from Kurukshetra University & MCA from IGNOU. His research & development interest includes Mobile computing Applications, Web technologies, Open source software and SOA applications.
G. Venkataswamy is working as Staff Scientist at Centre for Development of Advanced Computing, Bangalore. He received his MCA from Osmania University. His research interest includes Mobile computing, Web engineering, Distributed Computing, Computer Networks, Databases and SOA.
159