Unit 3 PDF
Unit 3 PDF
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 1
those of traditional business applications, such as more complex structures for stored objects;
the need for new data types for storing images, videos, or large textual items; longer-duration
transactions; and the need to define nonstandard application-specific operations.
Vast increase in the use of object-oriented programming languages for developing software
applications.
To maintain a direct correspondence between real-world and database objects
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 2
[TU Question]:- What are the advantages and disadvantages of OODBMS?
Advantages of OODBMS
Easier Design-Reflect Applications
Modularity and Reusability
Incremental refinement and abstraction
Multiple inheritance
Support for multiple version and Alternatives
Designer can specify the structure of objects and their behavior (methods).
Better interaction with object-oriented languages such as Java and C++
Definition of complex and user-defined types.
Encapsulation of operations and user-defined methods.
Disadvantages of OODBMSs
There are following disadvantages of OODBMSs:
Lack of universal data model: There is no universally agreed data model for an
OODBMS, and most models lack a theoretical foundation. This .disadvantage is seen as a
significant drawback, and is comparable to pre-relational systems.
Lack of experience: In comparison to RDBMSs the use of OODBMS is still relatively
limited. This means that we do not yet have the level of experience that we have with
traditional systems. OODBMSs are still very much geared towards the programmer, rather
than the naïve end-user. Also there is a resistance to the acceptance of the technology.
While the OODBMS is limited to a small niche market, this problem will continue to exist
Lack of standards: There is a general lack of standards of OODBMSs. We have
already mentioned that there is not universally agreed data model. Similarly, there is no
standard object-oriented query language.
Competition: Perhaps one of the most significant issues that face OODBMS vendors is
the competition posed by the RDBMS and the emerging ORDBMS products. These
products have an established user base with significant experience available. SQL is an
approved standard and the relational data model has a solid theoretical formation and
relational products have many supporting tools to help .both end-users and developers.
Query optimization compromises encapsulations: Query optimization
requires. An understanding of the underlying implementation to access the database
efficiently. However, this compromises the concept of incrassation.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 3
Locking at object level may impact performance Many OODBMSs use
locking as the basis for concurrency control protocol. However, if locking is applied at the
object level, locking of an inheritance hierarchy may be problematic, as well as impacting
performance.
Complexity: The increased functionality provided by the OODBMS (such as the illusion
of a single-level storage model, pointer sizzling, version management, and schema
evolution--makes the system more complex than that of traditional DBMSs. In complexity
leads to products that are more expensive and more difficult to use.
Lack of support for views: Currently, most OODBMSs do not provide a view
mechanism, which, as we have seen previously, provides many advantages such as data
independence, security, reduced complexity, and customization.
Lack of support for security: Currently, OODBMSs do not provide adequate
security mechanisms. The user cannot grant access rights on individual objects or classes.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 4
Length, breadth acts as states of rectangle and calculating area of rectangle act as behavior of
rectangle object.
Type Constructors
Type constructor is the collection of multiple similar basic type under a common name. It
determines how the object is constructed. The type constructors can be used to define the data
structures for an object oriented database schema. The three most basic constructors are atom,
tuple, and set. Other commonly used constructors include list, bag, and array.
The type constructors set, list, array, and bag are called collection types (or bulk types), and to
distinguish them from basic types and tuple types. Here, the state of the object will be a collection
of objects that may be unordered or ordered.
Kinds of Type constructor:
Atom: says that an object is storing atomic values.
e.g.: “Aarav“.
Set: set of values of same type with duplication allowed.
e.g.: {123,456,123}.
Bag: set with no duplicate items.
e.g.: {123,456,678}
List: ordered collection of items of the same type with infinite size.
e.g.: [123,456,678]
Array: similar to list but fixed size.
[TU Question]:- What is OID? How persistent objects are maintained in OO Database?
[TU Question]:- What is the difference between persistent and transient objects? How persistence
is handled in typical OO database systems?
OIDs is the mechanism to refer to persistent objects. An ODMS provides a unique identity to each
independent object stored in the database. This unique identity is typically implemented via a
unique, system-generated object identifier (OID). The value of an OID is not visible to the external
user, but is used internally by the system to identify each object uniquely and to create and manage
inter-object references.
The main property required of an OID is that it be immutable; that is, the OID value of a
particular object should not change. This preserves the identity of the real-world object being
4rdrepresented.
Example: In Figure below, the attributes that refer to other objects—such as Dept of EMPLOYEE
or Projects of DEPARTMENT are basically OIDs that serve as references to other objects to
represent relationships among the objects. For example, the attribute Dept of EMPLOYEE is of
type DEPARTMENT, and hence is used to refer to a specific DEPARTMENT object (the
DEPARTMENT object where the employee works). The value of such an attribute would be an
OID for a specific DEPARTMENT object.
Define type EMPLOYEE
Tuple (Fname: string;
Minit: char;
Lname: string;
Ssn: string;
Birth_date: DATE;
Address: string;
Sex: char;
Salary: float;
Supervisor: EMPLOYEE;
Dept: DEPARTMENT ;);
[TU Question]:- What is the difference between structured and unstructured complex object?
Differentiate identical versus equal objects with examples.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 8
Fig: Structure of Complex object
There are two types of complex objects in object oriented database system which are:
1. Structured complex object and
2. Unstructured complex object
1. Structured Complex object
Structured complex object is defined by repeated application of the type constructors
provided by the OODBMS. Simply structured complex objects are constructed by using
type constructors (set, atom, tuple etc.). Hence, the object structure is defined and known
to the OODBMS. The OODBMS also defines methods or operations on it.
Two types of reference semantics (ownership semantics and reference semantics) exist between
a complex object and its components at each level.
Ownership semantics applies when the sub-objects of a complex object are encapsulated
within the complex object and are hence considered part of the complex object. It is also
called is-part-of or is-component-of relationship. e.g., “Arjun” atomic value owned by
employee. Means that ‘Arjun’ is dependent on owner.
Reference semantics applies when the components of the complex object are themselves
independent objects but may be referenced from the complex object. It is also called is-
associated-with relationship. e.g., Department referenced by the employee object.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 9
their meaning. These objects are considered complex because they require large area of storage
and are not part of the standard data types provided by traditional DBMSs.
Typical examples of such objects are bitmap images and long text strings (such as documents);
they are also known as binary large objects, or BLOBs for short. Character strings are also known
as character large objects, or CLOBs for short.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 10
and other may be used to retrieve parts of the object value or to apply some calculations to the
object value.
The external users of the object are only made aware of the interface of the object, which
defines the names and arguments of each operation. The implementation of the object is hidden
from the external users; it includes the definition of the internal data structure of the object and the
implementation of the operations that access these structures.
In object oriented - OO terminology, the interface part of each operation is called the
signature, and the operation implementation is called a method. A method is invoked by sending
a message to the object to execute the corresponding method.
Not all objects are meant to be stored permanently in the database. Transient objects exist
in the executing program and disappear once the program terminates.
Persistent objects are stored in the database and persist after program terminates. The
typical mechanism for persistence involves giving an object a unique persistent name through
which it can be retrieved.
In traditional database models and systems, this concept was not applied, since it is usual
to make the structure of database objects visible to users and external programs.
Inheritance
Inheritance is deriving objects from existing objects. The derived objects inherit properties from
their parent object. Parent objects are those objects from which other objects are derived.
Inheritance is a way of reusing the existing code.
Polymorphism
Polymorphism concept allows the same operator name or symbol to be bound to two or more
different implementation of the operator, depending on the type of objects to which the operator
is applied.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 11
If a function is inherited from some common super type, then it is inherited only once. In
such a case, there is no ambiguity; the problem only arises if the functions are distinct in the two
super types. Some languages do not allow multiple inheritance.
Selective inheritance occurs when a subtype inherits only some of the functions of a super
type. Other functions are not inherited. This mechanism is not typically provide in OO database
system.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 12
Example of an object-oriented database model
An object-relational database can be said to provide a middle ground between relational databases
and object-oriented databases (object database).
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 13
in 1989 and 1992. A new standard called SQL3 added object-oriented features. A subset of SQL3
standard, now known as SQL-99 has been approved.
The following are some of the object database features that have been included in SQL:
Some type constructors have been added to specify complex objects. These include the row
type, which corresponds to the tuple (or struct) constructor. An array type for specifying
collections is also provided. Other collection type constructors, such as set, list, and bag
constructors, were not part of the original SQL/Object specifications but were later
included in the standard.
A mechanism for specifying object identity through the use of reference type is included.
Encapsulation of operations is provided through the mechanism of user defined types
(UDTs) that may include operations as part of their declaration. These are somewhat
similar to the concept of abstract data types that were developed in programming
languages. In addition, the concept of user defined routines (UDRs) allows the definition
of general methods (operations).
Inheritance mechanisms are provided using the keyword UNDER.
[TU Model Question):- Describe the steps of the algorithm for object database design by
EER-to-OO mapping.
Step 2. Add relationship properties or reference attributes for each binary relationship into the
ODL classes that participate in the relationship. These may be created in one or both directions. If
a binary relationship is represented by references in both directions, declare the references to be
relationship properties that are inverses of one another, if such a facility exists. If a binary
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 14
relationship is represented by a reference in only one direction, declare the reference to be an
attribute in the referencing class whose type is the referenced class name. Depending on the
cardinality ratio of the binary relationship, the relationship properties or reference attributes may
be single-valued or collection types. They will be single-valued for binary relationships in the 1:1
or N:1 directions; they are collection types (set-valued or list-valued) for relationships in the 1:N
or M:N direction. If relationship attributes exist, a tuple constructor can be used to create a structure
of the form < reference, relationship attributes>, which may be included instead of the reference
attribute.
Step 3. A constructor method should include program code that checks any constraints that must
hold when a new object is created. A destructor method should check any constraints that may be
violated when an object is deleted. Other methods should include any further constraint checks
that are relevant.
Step 4. An ODL class that corresponds to a subclass in the EER schema inherits (via extends) the
type and methods of its superclass in the ODL schema.
Step 5. Weak entity types can be mapped in the same way as regular entity types. An alternative
mapping is possible for weak entity types that do not participate in any relationships except their
identifying relationship; these can be mapped as though they were composite multivalued
attributes of the owner entity type, by using the set < struct <... >> or list <struct <... >>
constructors. The attributes of the weak entity are included in the struct <... > construct, which
corresponds to a tuple constructor.
Step 6. Categories (union types) in an EER schema are difficult to map to ODL. It is possible to
create a mapping similar to the EER-to-relational mapping by declaring a class to represent the
category and defining 1:1 relationships between the category and each of its super classes. Another
option is to use a union type, if it is available
Step 7. An n-ary relationship with degree n > 2 can be mapped into a separate class, with
appropriate references to each participating class. These references are based on mapping a 1:N
relationship from each class that represents a participating entity type to the class that represents
the n-ary relationship. An M:N binary relationship especially if it contains relationship attributes,
may also use this mapping option, if desired.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 15
Active database concepts
A trigger is a procedure that is automatically invoked by the DBMS in response to specified
changes to the database, and is typically specified by the DBA. A database that has a set of
associated triggers is called an active database.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 16
Suppose, we need to compute Total_sal if the new employee is immediately assigned to a
department—that is, if the value of the Dno attribute for the new employee tuple is not NULL
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 17
There are three main possibilities for condition evaluation (also known as rule
consideration)
Immediate consideration: The condition is evaluated as part of the same
transaction as the triggering event, and is evaluated immediately. This case can be
further categorized into three options:
Evaluate the condition before executing the triggering event
Evaluate the condition after executing the triggering event
Evaluate the condition instead of executing the triggering event
Deferred consideration. The condition is evaluated at the end of the transaction
that included the triggering event. In this case, there could be many triggered rules
waiting to have their conditions evaluated.
Detached consideration. The condition is evaluated as a separate transaction,
spawned from the triggering transaction.
The above valid-time table stores the history of the employees with respect to the real world. The
attributes ValidTimeStart and ValidTimeEnd actually represent a time interval which is closed
at its lower and open at its upper bound. Thus, we see that during the time period [1985 – 1990],
employee John was working in the research department, having a salary of 11000. Then he
changed to the sales department, still earning 11000. In 1993, he got a salary raise to 12000. Note
that it is now possible to store information about past states. We see that Paul was employed from
1988 until 1995. In the corresponding non-temporal table, this information was (physically)
deleted when Paul left the company.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 19
Transaction Time
However, a different interpretation can be used, where the associated time refers to the time when
the information was actually stored in the database; that is, it is the value of the system time clock
when the information is valid in the system. In this case, the associated time is called the
transaction time. A temporal database using this interpretation is called a transaction time
database.
Simply, the Transaction time is the time period during which a fact is stored in the database.
Example:
EmpID Name Department Salary TransactionTimeStart TransactionTimeEnd
10 John Research 11000 1985-10-2, 10:02:33 1990-10-2, 11:33:04
10 John Sales 11000 1990-04-11, 05:04:33 1993-05-11, 06:22:55
10 John Sales 12000 1993-7-30, 5:33:05 Now
11 Paul Research 10000 1988-5-23, 7:23:34 1995-8-30, 5:33:55
12 George Research 10500 1991-8-23, 12:44:34 Now
13 Ringo Sales 15500 1988-7-24, 11:23:55 Now
The above valid-time table stores the history of the employees with respect to the real world. The
attributes TransactionTimeStart and TransactionTimeEnd actually represent a transaction time
interval which is closed at its lower and open at its upper bound.
Bitemporal Database
In some applications, only one of the dimensions is needed and in other cases both time dimensions
are required, in which case the temporal database is called a bitemporal database. It uses both
valid time and transaction time in a single database.
Deductive databases
A deductive database system typically specify rules through a declarative language – a language
in which we specify what to achieve rather than how to achieve it. It is a database system that can
make deductions (i.e., conclude additional facts) based on rules and facts stored in the (deductive)
database. It is also related to the field of logic programming and the Prolog language.
A variation of Prolog called Datalog can also be used to define rules declaratively in
conjunction with an existing set of relations. A deductive database used two main types of
specifications: facts and rules.
Facts are specified in a manner similar to the way relations are specified, except that it is not
necessary to include the attribute names.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 20
Rules are somewhat similar to relational views. They specify virtual relations that are not actually
stored but that can be formed from the facts by applying inference mechanisms based on the rule
specifications.
The deductive database work based on logic has used Prolog as a starting point. A variation of
Prolog called Datalog is used to define rules declaratively in conjunction with an existing set of
relations, which are themselves treated as literals in the language.
The notation used in Prolog/Datalog is based on providing predicates with unique names.
A predicate has an implicit meaning, which is suggested by the predicate name, and a fixed number
of arguments. The predicate‘s type is determined by its arguments:
If the arguments are all constant values, the predicate simply states that a certain fact is true
If the predicate has variables as arguments, it is either considered as a query or as part of a
rule or constraint.
[TU Question]:- Describe multimedia database and what are the different types of
multimedia data that are available in current systems?
Multimedia Databases
Multimedia databases provide features that allow users to store and query different types of
multimedia information, which includes images, video clips, audio clips, and documents.
Simply, a Multimedia database (MMDB) is a collection of related multimedia data. The
multimedia data include one or more primary media data types such as text, images, graphic
objects (including drawings, sketches and illustrations) animation sequences, audio and video.
Multimedia databases provide features that allow users to store and query different types
of multimedia information, which includes images (such as photos or drawings), video clips (such
as movies, newsreels, or home videos), audio clips (such as songs, phone messages, or speeches),
and documents (such as books or articles). The main types of database queries that are needed
involve locating multimedia sources that contain certain objects of interest. For example, one may
want to locate all video clips in a video database that include a certain person, say Michael Jackson.
One may also want to retrieve video clips based on certain activities included in them, such as
video clips where a soccer goal is scored by a certain player or team.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 21
It is multi sensorial. It uses a lot of the user’s senses while making use of multimedia, for
example hearing, seeing and talking.
It is integrated and interactive. All the different mediums are integrated through the
digitization process. Interactivity is heightened by the possibility of easy feedback.
It is flexible. Being digital, this media can easily be changed to fit different situations and
audiences.
It can be used for a wide variety of audiences, ranging from one person to a whole group.
Disadvantages
Information overload. Because it is so easy to use, it can contain too much information at
once.
It takes time to compile. Even though it is flexible, it takes time to put the original draft
together.
It can be expensive. Multimedia makes use of a wide range of resources, which can cost
you a large amount of money.
Too much makes it unpractical. Large files like video and audio has an effect of the time it
takes for your presentation to load. Adding too much can mean that you have to use alarger
computer to store the files.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 23
[TU Question]:- Discuss some applications of active database. How do spatial databases
differ from regular database?
Spatial Database
A spatial database is a database that is enhanced to store and access spatial data or data that defines
a geometric space. The special data stored in the form of co-ordinate form. These data are often
associated with geographic locations and features, or constructed features like cities. Data on
spatial databases are stored as coordinates, points, lines, polygons and topology. Some spatial
databases handle more complex data like three-dimensional objects, topological coverage and
linear networks.
The main goal of a spatial database system is the effective and efficient handling of spatial
data types in two, three or higher dimensional spaces, and the ability to answer queries taking into
consideration the spatial data properties.
A common example of spatial data can be seen in a road map. A road map is a 2-
dimensional object that contains points, lines, and polygons that can represent cities, roads, and
political boundaries such as states or provinces. A road map is a visualization of geographic
information.
Examples of spatial data types are:
Point: characterized by a pair of (x, y) values,
Line segment: characterized by a pair of points,
Rectangle: characterized by its lower-left and upper-right corners,
Polygon: comprised by a set of points, defining its corners.
Examples of spatial datasets
Components of GIS
A working Geographic Information System seamlessly integrates five key components: hardware,
software, data, people, and methods.
Hardware: Hardware includes the computer on which a GIS operates, the monitor on which
results are displayed, and a printer for making hard copies of the results.
GIS software: It provides the functions and tools needed to store, analyze, and display geographic
information. Key software components include tools for the input and manipulation of geographic
information, a database management system (DBMS), tools that support geographic query,
analysis, and visualization, and a graphical user interface (GUI) for easy access to tools.
Data: Possibly the most important component of a GIS is the data. A GIS will integrate spatial
data with other data resources and can even use a database management system, used by most
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 25
organizations to organize and maintain their data, to manage spatial data. There are three ways to
obtain the data to be used in a GIS. Geographic data and related tabular data can be collected in-
house or produced by digitizing images from aerial photographs or published maps.
People: GIS users range from technical specialists who design and maintain the system to those
who use it to help them perform their everyday work.
Methods: A successful GIS operates according to a well-designed plan and business rules, which
are the models and operating practices unique to each organization.
GIS applications
It is possible to divide GISs into three categories:
1. Cartographic applications
2. Digital terrain modeling applications, and
3. Geographic objects applications
In cartographic and terrain modeling applications, variations in spatial attributes are captured – for
example, soil characteristics, crop density, and air quality.
In geographic object applications, objects of interest are identified from a physical domain – for
example, power plants, electoral districts, property parcels, product distribution districts, and city
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 26
landmarks; These objects are related with pertinent application data – for example, power
consumption, voting patterns, property sales volumes, product sales volume, and traffic density.
The first two categories of GIS applications require a field-based representation, whereas the third
category requires an object-based one. The cartographic approach involves special functions that
can include the overlapping of layers of maps to combine attribute data. Digital terrain modeling
requires a digital representation of parts of earth’s surface using land elevations at sample points
that are connected to yield a surface model showing the surface terrain. In object-based geographic
applications, additional spatial functions are needed to deal with data.
2. Data Analysis
GIS data undergoes various types of analysis for example, in applications such as soil erosion
studies, environmental impact studies, or hydrological runoff simulations, data may undergo
various types of geomorphometric analysis – measurements such as slope values, gradients (the
rate of change in altitude), aspect (the compass direction of the gradient), profile convexity (the
rate of change of gradient), plan convexity (the convexity of contours and other parameters).
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 27
3. Data Integration
GISs must integrate both vector and raster data from a variety of sources. Sometimes edges and
regions are inferred from a raster image to form a vector model, or conversely, raster images such
as aerial photographs are used to update vector models
4. Data Capture
The first step in developing a spatial database for cartographic modeling is to capture the two-
dimensional or three-dimensional geographical information in digital form – a process that is
sometimes impeded by source map characteristics such as resolution, type of projection, map
scales, cartographic licensing, diversity of measurement techniques, and coordinate system
differences. Spatial data can also be captured from remote sensors in satellites such as Landsat,
NORA, and Advanced Very High Resolution Radiometer as well as SPOT HRV (High Resolution
Visible Range Instrument.
Mobile Databases
Recent advances in portable and wireless technology have led to mobile computing, a new
dimension in data communication and processing. A mobile database is a database that can be
connected to by a mobile computing device over a mobile network. It is portable and physically
separate from the corporate database server. But Mobile Database is capable of communicating
with that corporate database server from remote sites allowing the sharing of corporate database.
Mobile computing devices (e.g., smartphones and PDAs) store and share data over
a mobile network, or a database which is actually stored by the mobile device. A mobile database is
a database that resides on a mobile device such as a PDA, a smart phone, or a laptop. Such devices
are often limited in resources such as memory, computing power, and battery power.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 28
Mobile computing architecture, characteristics of mobile environments, data management issues.
It can also be defined as a system with the following structural and functional properties.
Distributed system with mobile connectivity (A mode in which a client or a server can
establish communication with each other whenever needed)
Full database system capability
Complete spatial mobility
Wireless and wired communication capability
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 29
Mobile Computing Architecture
The general architecture of a mobile platform is a distributed architecture where a number of
computers, generally referred to as Fixed Hosts and Base Stations, are interconnected through a
high speed wired network. Fixed hosts are general purpose computers configured to manage
mobile units. Base stations function as a gateways to the fixed network for the Mobile Units; they
are equipped with wireless interfaces and offer network access services of which mobile units are
clients.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 30
Client/Network Relationships
Mobile units can move freely in a geographic mobility domain, an area that is circumscribed by
wireless network coverage; To manage the mobility of units, the entire geographic mobility
domain is divided into one or more smaller domains, called cells, each of which is supported by at
least one base station; The mobile discipline requires that the movement of mobile units be
unrestricted throughout the cells of a geographic mobility domain, while maintaining information
access contiguity – i.e., movement, especially intercell movement, does not negatively affect the
data retrieval process; This architecture is designed for a fixed network, emulating a traditional
client-server architecture
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 31
1. The entire database is distributed mainly among the wired components, possibly with full or
partial replication; a base station or fixed host manages its own database with a DBMS-like
functionality, with additional functionality for locating mobile units and additional query and
transaction management features to meet the requirements of mobile environments.
2. The database is distributed among wired and wireless components; Data management
responsibility is shared among base stations or fixed hosts and mobile units.
The distributed data management issues can also be applied to mobile databases with the following
additional considerations and variations:
Data distribution and replication – Data is unevenly distributed among the base stations
and mobile units.
Transactions models – Issues of fault tolerance and correctness of transactions are
aggravated.
Query processing – Awareness of where data is located is important and affects the
cost/benefit analysis of query processing; Query optimization is more complicated because
of mobility and rapid resource changes of mobile units.
Recovery and fault tolerance – The mobile database environment must deal with site,
media, transaction, and communication failure.
Mobile database design – The global name resolution problem for handling queries is
compounded because of mobility and frequent shutdown.
Location-based service – As clients move, location-dependent cache information may
become stale.
Division of labor – Certain characteristics of the mobile environment force a change in the
division of labor in query processing.
Security – Mobile data is less secure than that which is left at the fixed location.
------------------------------------------------------------------------------------------------------------------------------------------
By Bhupendra Singh Saud ADBMS 32