MBT Seminar
MBT Seminar
MBT Seminar
Vijay Kumar Computer Sc. Telecommunications University of Missouri-Kansas City 5100 Rockhill Road Kansas City, MO 64110, USA kumar@cstp.umkc.edu
Fully Connected Information Space Personal Communication System (PCS) Mobile Database Systems (MDS) Transaction Management Data Caching Query Processing Data Classification Conclusion
Distributed system with mobile connectivity Full database system capability Complete spatial mobility
PSTN: Public Switched Network. MSC: Mobile Switching Center. Also called MTSO (Mobile Telephone Switching Office). BS: Base Station. MS: Mobile Station. Also called MU (Mobile Unit) or Mobile Host (MH). HLR: Home Location Register. VLR: Visitor Location Register. EIR: Equipment Identify Register. AC: Access Chanel.
for such services are tremendous, since every person, every organization, etc., could be equipped. Several PCS systems have been developed to meet rapid growth prompted by market demand. Most of them are connected to Public Switched Telephone Network (PSTN) to integrate with the wired service.
Two of the most popular PCS systems are:
Advanced Mobile Phone Service (AMPS) Global System for Mobile Communication (GSM) EIA/TIA IS-136 Digital Cellular System EIA/TIA IS-95 Digital Cellular System
reuse scheme. A total of 50 MHz in the 824-849 MHz and 869894 MHz bands is allocated for AMPS.This spectrum is divided into 832 full-duplex channels using 1664 discrete frequencies, that is, 832 downlinks and 832 uplinks. In AMPS, the typical frequency reuse plan employs either a 12-group frequency
call setup procedure, CT2 moves a call path from one radio
channel to another after three seconds of handshake failure. CT2 also supports data transmission rates of up to 2.4 Kbps through the speech code and up to 4.8 Kbps with an increased rate. CT2 does not support handoff and in a public
denote global acceptance of DECT. DECT supports high user density with a picocell design. There are 12 voice channels per frequency carrier. Sleep mode is employed to converse handset power. DECT also supports seamless handoff. DECT is typically implemented as a wireless-PBX (Private Brach Exchange) connected to PSTN. DECT can interwork with GSM to allow user mobility.
partitioned into 77 channels, each with 300 KHz bandwidth. The band 1906.1-1918.1 MHz (40 channels) is designed for public systems, and the band 1895-1906.1 MHz (37 channels) is used for home/office applications.
MSC (MTSO)
1850-1910, 1930-1990
Cordless CT1+: 885-887, 930-932 Phones CT2: 864-868 DECT: 1880-1900 PACS 1850-1910,1930-1990; PACS-UB: 1910-1930
1477-1513.
PHS 1895-1918; JCT: 254-380
NMT: Nordic Mobile Telephone PDC: Pacific Digital Cellular PACS: Personal Access Communications System PHS: Personal Handyphone System PACS-UB: PACS Unlicensed Band JCT: Japanese Cordless Telephone (Taken from Mobile Communications by Jochen Schiller)
geographical region, each service provider divides their area into smaller segments called cells. Each of this cell has a Base
BS
BS
MSC
PSTN
2 7 1 6 5 4 3 D7 6 5
A A
2 3 1 4
A A A
D 3N R
D = distance between cells using the same frequency R = cell radius N = reuse pattern (the cluster size, which is 7). Thus, for a 7-cell group with cell radius R = 3 miles, the frequency reuse distance D is 13.74 miles.
Old BS
New BS Old BS
New BS
MSC
MSC
Old BS
New BS
Old BS
New BS
To keep the conversation going, the Handoff procedure should be completed while the MS (the bus) is in the overlap region.
Cell overlap region
Old BS
New BS
In this strategy, the MS continuously monitors the radio signal strength and quality of the surrounding BSs. When predefined criteria are met, then the MS checks for the best candidate BS for an available traffic channel and requests the handoff to occur. MACHO is used in DECT and PACS.
Intra-system handoff or Inter-BS handoff The new and the old BSs are connected to the same MSC.
MSC
Old BS
New BS
The MU (MS) momentarily suspends conversation and initiates the handoff procedure by signaling on an idle (currently
free) channel in the new BS. Then it resumes the conversation on the old BS.
MSC
Old BS
New BS
Upon receipt of the signal, the MSC transfers the encryption information to the selected idle channel of the new BS and sets up the new conversation path to the MS through that channel. The switch bridges the new path with the old path and informs the MS to transfer from the old channel to the new channel.
MSC
Old BS
New BS
After the MS has been transferred to the new BS, it signals the network and resumes conversation using the new channel.
MSC
Old BS
New BS
Upon the receipt of the handoff completion signal, the network removes the bridge from the path and releases resources associated with the old channel.
MSC
Old BS
New BS
Intersystem handoff or Inter-MSC handoff The new and the old BSs are connected to different MSCs.
MSC A
Trunk
MSC B
MSC A
Trunk
MSC B
Hard handoff The MS connects with only one BS at a time, and there is usually some interruption in the conversation during the link transition.
Soft handoff The two BSs are briefly simultaneously connected to the MU while crossing the cell boundary. As soon as the mobile's link with the new BS is acceptable, the initial BS disengages from the MU.
MU temporarily suspends the voice conversation by sending a link suspend message to the old BS.
MU sends a handoff request message through an idle time slot of the new BS to the network. The new BS sends a handoff ack message and marks the slot busy. The MU returns the old assigned channel by sending a link resume message to the old BS.
2.
3.
4.
MU continues voice communication while the network prepares for the handoff. Upon receipt of a handoff request message, the new BS sends a handoff ack message and reconfigures itself to effect the handoff. The MSC inserts a bridge into the conversation path and bridges the new BS. Finally, the network informs the MU to execute the handoff via both the new and old BSs by sending the handoff execute message.
6.
7.
8.
MU releases the old channel by sending an access release message to the old BS. it sends the network a handoff complete message through the new channel, and resumes the voice communication. The network removes the bridge from the path and frees up the resources associated with the old channel.
10. Once the MU has made the transfer to the new BS,
MU sends a pilot strength measurement message to the old BS, indicating the new BS to be added. The old BS sends a handoff request message to the MSC. If the MSC accepts the handoff request, it sends a handoff request message to the new BS.
2.
3.
The BS sends a null traffic message to the MU to prepare the establishment of the communication link.
The new BS sends a join request message to the MSC. The MSC bridges the connection for the two BSs, so that the handoff can be processed without breaking the connection. The new BS sends a handoff ack message to the old BS via the MSC. The old BS instructs the MU to add a link to the new BS by exchanging the handoff command and handoff complete messages.
5.
The old BS and the MSC conclude this procedure by exchanging the required handoff information. The quality of the new link is guaranteed by the exchange of the pilot measurement request and the pilot strength measurement message pair between the MU and the new BS.
Roaming can be provided only if some administrative and technical constraints are met.
Billing. Subscription agreement. Call transfer charges. User profile and database sharing. Any other policy constraints.
Bandwidth mismatch. For example, European 900MHz band may not be available in other parts of the world. This may preclude some mobile equipment for roaming.
Service providers must be able to communicate with each other. Needs some standard.
Mobile station constraints.
Integration of a new service provider into the network. A roaming subscriber must be able to detect this new provider. Service providers must be able to communicate with each other. Needs some standard. Quick MU response to a service providers availability. Limited battery life.
Deregistration. A MU decides to acquire control channel service on a different type of network (public, private, or
residential).
periodically register with the network. Forced registration: A network may, under certain circumstances, force all MUs to register.
VLR: Visitor Location Register A VLR stores user profile and the current location who is a visitor to a different cell that its home cell.
MU1 MU1
MU1 moves to cell 2. The MSC of cell 2 launches a registration query to its VLR 2.
VLR2 sends a registration message containing MUs identity (MIN), which can be translated to HLR address.
2.
3.
4.
VLR of cell 2 is searched for MU1s profile. If it is not found, then HLR is searched. Once the location of MU1 is found, then the information is sent to the base station of cell 1. Cell 1 establishes the communication.
4.
Dest HLS
4 9 8 6
Source ls
2 10
Source-mss
1
Src
Dest
HLS
10 9 4 6
New-mss
1
MU
Data management
Transaction management Recovery
DBS DBS
Insurance companies Emergencies services (Police, medical, etc.) Traffic control Taxi dispatch E-commerce Etc.
Limited wireless bandwidth Wireless communication speed Limited energy source (battery power) Less secured Vulnerable to physical activities
Can physically move around without affecting data availability Can reach to the place data is stored Can process special types of data efficiently Not subjected to connection restrictions
Data Management
Transaction Management
Query processing
Transaction processing Concurrency control
Database recovery
Possible schemes
Semantic data caching: The cache contents is decided by the results of earlier transactions or by semantic data set. Data Broadcast on wireless channels
Semantic caching
Client maintains a semantic description of the data in its cache instead of maintaining a list of pages or tuples. The server processes simple predicates on the database and the results are cached at the client.
A broadcast (file on the air) is similar to a disk file but located on the air.
LDD must be processed under the location constraints. Thus, the tax data of Pune can be processed correctly only under Punes finance rule. Needs location binding or location mapping function.
County 1 data
County 2 data
County n data
Subdivision 1 data
Subdivision data
Subdivision m data
Situation: Person traveling in the car desires to know his progress and continuously asks the same question. However, every time the answer is different but correct. Requirements: Continuous monitoring of the longitude and latitude of the origin of the query. GPS can do this.
Too rigid for MDS. Flexibility can be introduced using workflow concept. Thus, a part of the transaction can be executed and committed independent to its other parts.
Execution scenario: User issues transactions from his/her MU and the final results comes back to the same MU. The user transaction may not be completely executed at the MU so it is fragmented and distributed among database servers for execution. This creates a Distributed mobile execution.
Ti is a triple <F, L, FLM>; where F = {e1, e2, , en} is a set of execution fragments, L = {l1, l2, , ln} is a set of locations, and FLM = {flm1, flm2, , flmn} is a set of fragment location mapping where j, flmi (ei) = li
Clustering: A mobile transaction is decomposed into a set of weak and strict transactions. The decomposition is done based on the consistency requirement. The read and write operations are also classified as weak and strict.
Semantics Based: The model assumes a mobile transaction to be a long lived task and splits large and complex objects into smaller manageable fragments. These fragments are put together again by the merge operation at the server. If the fragments can be recombined in any order then the objects are termed reorderable objects.
T2(e4, e5)
MU1
MU3
Database update problem arises when mobile units are also allowed to modify the database. To maintain global consistency an efficient database update scheme is necessary.
In MDS a transaction may be fragmented and may run at more than one nodes (MU and DBSs). An efficient commit protocol is necessary. 2-phase commit (2PC) or 3-phase commit (3PC) is no good because of their generous messaging requirement. A scheme which uses very few messages, especially wireless, is desirable.
Concept: MU and DBSs guarantee to complete the execution of their fragments of a mobile transaction within their predefined timeouts. Thus, during processing no communication is required. At the end of timeout, each node commit their fragment independently.
Requirements
Coordinator: Coordinates transaction commit Home MU: Mobile Transaction (MT) originates here Commit set: Nodes that process MT (MU + DBSs) Timeout: Time period for executing a fragment
MT arrives at Home MU. MU extract its fragment, estimates timeout, and send rest of MT to the coordinator. Coordinator further fragments the MT and distributes them to members of commit set. MU processes and commits its fragment and sends the updates to the coordinator for DBS. DBSs process their fragments and inform the coordinator. Coordinators commits or aborts MT.
Some of the processing nodes are mobile Less resilient to physical use/abuse Limited wireless channels Limited power supply Disconnected processing capability
Independent recovery capability reduces communication overhead. Thus, MUs can recover without any help from DBS Efficient logging and checkpointing facility conserve battery power Log duplication facility improves reliability of recovery scheme
Possible approaches
Log carrier. A Mobile unit may need to carry its log with it for independent recovery
Log processing for database recovery Transaction commit or abort
Mapping of business activity on the network. The network may be mobile of ad-hoc in which case the scope of business activities significantly increases.
To make business activity free from spatial constraints. This allows tremendous flexibility to customers as well as to vendors.
Important gain: Making information available at the right time, at the right location, and in a right format.
Security
Reliability Efficient Customer trust Quality of service
Mobility and web provides ample scope for improving the quality of service. An integration of mobility, web, data warehousing and workflow offers tremendous growth potential and a very controlled way of managing business activities.
Acharya, S., Alonso, R., Franklin, M., and Zdonik, S. Broadcast Disks: Data management for Asymmetric Communication Environments. Proc. ACM SIGMOD Conf., San Jose, May, 1995. Alonso, R., and Korth, H. Database Systems Issues in Nomadic Computing. Proc. ACM SIGMOD International Conf. on management of Data, May 1993.
2.
Barbara, D., and Imielinski, T. Sleepers and Workaholics: Caching Strategies in Mobile Environments. Proc. ACM SIGMOD Conf., Minneapolis, May, 1994. Chrysanthis, P. K., Transaction Processing in Mobile Computing Environment, in IEEE Workshop on Advances in Parallel and Distributed Systems, October 1993.
4.
Dhawan, C. 1997.
Mobile Computing.
McGraw-Hill,
6.
Dunham, M. H., Helal, A., and Balakrishnan, S., A Mobile Transaction Model That Captures Both the Data and Movement Behavior, ACM/Baltzer Journal on Special Topics in Mobile Networks and Applications, 1997. Forman, H. George and Zahorjan, J. Challenges of Mobile Computing, Computers, Vol. 27, No. 4, April 1994. The IEEE
7.
Pitoura, E. and Bhargava, B., Maintaining Consistency of Data in Mobile Distributed Environments. Proceedings of 15th International Conference on Distributed Computing Systems., 1995. Pitoura, E. and Bhargava, B., Building Information Systems for Mobile Environments, Proc. 3rd. Int. conf. on Information and Knowledge Management, Washington, DC, No. 1994.
9.
Vijay Kumar, Timeout-based Mobile Transaction Commit Protocol, 2000 ADBISDASFAA Symposium on Advances in Databases and Information Systems, Prague, Sep. 5-8, 2000. Shaul Dar, Michael Franklin, Bjorn T. Johnsson, Divesh Srivastava, and Michael Tan, Semantic Data Caching and Replacement, Proc. Of the 22nd VLDB Conference, Mumbai, India, 1996.
11.
E. Pitoura and G. Samaras, Data Management for Mobile Computing, Kluwer Academic Publishers, 1998. E. Turban, at. el., Electronic Commerce: A Managerial Perspective, Prentice Hall, 2000. L. Loeb, Secure Electronic Transactions, Artech House, 1998.
13.
14.