skip to main content
article
Free Access

Mobile wireless computing: challenges in data management

Published:01 October 1994Publication History
First page image

References

  1. 1 Acharya. A. and Badrinath, B.R. D- livering multicast messages in networks with mobile hosts. In Proceedings of the 13th ICDCS. (May 1993) pp.292-299.Google ScholarGoogle Scholar
  2. 2 Alonso, R. and Korth, H. Database system issues in nomadic computing. In Proceedings of ACM SIGMOD (May 1993), pp. 388-392. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Awerbuch, B. and Peleg. D. "Concurrent online tracking of mobile users." Proc. ACM SIG-COMM Symposium on Communication, Architectures and Protocols, October 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Badrinath, B.R. and Imielinskim, I Reokucatuib mobility," In the Proceedings of the Second Workshop on the Management of Replicated Data, November 1992.Google ScholarGoogle Scholar
  5. 5 Barbara, D. and Imielinski, T, "Sleepers and Workahotics: Caching in mobile distributed envoronments," Proc- ACM SIGMOD, May 1994 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6 Bender, M. et al., UNIX for nomads Making Unix support mobile computing, In Proc. of Usenix symposium on Mobile and location-independent computing, August 1993Google ScholarGoogle Scholar
  7. 7 Blaze. M. Transparent Mistrust OS Support for cryptography-in-thelarge." In Proc. of the Fourth Work- Shop on Workstation operating systems, October 1993, pp. 98-102.Google ScholarGoogle Scholar
  8. 8 Bolot, J.C. and Afifi, H. Caching in the X.500 directory system." In Proc. of the 13th ICDCS, May 1993, pp. 112-119Google ScholarGoogle Scholar
  9. 9 Bowen, kT.E. et. al. The DATACYCLE Architecture. Commun. ACM 35,12 (Dec. 1992), 71-81 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10 Carey, M.J. Haas, L.M. and Livny, M. Tapes hold data, too; Challenges of ruples on tertiary store. In Proceedings of the 1993 ACM SIGMOD. (May 1993), pp.413-417. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11 Fishman, N. and Mazer, M. Experience in deploying an active badge system," In IEEE GLOBE-COM 92 Workshop on networking of personal communications applicationgs. December 1992Google ScholarGoogle Scholar
  12. 12 Clifford. D., Lucassen. J. and Berlin, S. The azpplication of digital broadacast communication to large scale information systems IEEE J. on selected areas in communications, Vol. 3, Noi3 May 1985, pp. 457-467/.Google ScholarGoogle Scholar
  13. 13 Goodman, D.J. Trends in cellular and cordless communications. IEEE Commun. Mag. (June 1991).Google ScholarGoogle Scholar
  14. 14 Imielinski, T. and Badrinath, B.R. Querying in Highly mobile distributed environments." In the Proceeings of the 18th VLDB, August 1992, pp.41-52 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15 Imielinski. T., Vishwanathan, S. and Badrinath, B.R. "Power efficient filtering of data on air," Proc. of the EDBT. Cambridge, England, March 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16 Ioannidis, j. and maguire, G.Q. The design and impelementation of a mobile internetworking architecture. In proceeding of the USENIX Winter 1993 technical conference (January 1993).Google ScholarGoogle Scholar
  17. 17 Kistler, j. and Satyanarayanan, M. Disconnected operation in the CODA file system. ACM Trans. Comput. Syst. 10, 1 (Feb. 1992), 3-25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18 Lee, W. Mobile cellular Telecommunication systems.Mcgraw-Hill, New york 1989 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19 Meier-Hellstern, K.S., Alonso, E. and Oniel, D. The Use of ss7 and kGSM to support high density personal communication. In Proceedings of the Third Winlab workshop on third generation wireless information networks. (Apr. 1992). pp.49-57.Google ScholarGoogle Scholar
  20. 20 NG. L.J., Donaldson, RW and Malayan, A.D. Distributed architectures and databases for intelligent personal communication networks, In Proceedings of the ICWC (June 1992)Google ScholarGoogle Scholar
  21. 21 Notes and Vendor independent messaging. Lotus Corporation, Cambridge, Mass.Google ScholarGoogle Scholar
  22. 22 Sheng, S., Chandrasekaran, A. and Broderson, R.W. A protable multimedia terminal for personal communications. IEEE Commun. Mag. (Dec. 1992). 64-75.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23 Terry, D.B., Goldberg, D., Nichols, D.A. and Oki, B.M. Continuous queries over append-only databases. In Proceedings of the ACM SIGMOD (June 1992), pp. 32`-330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24 Wolison, O. and Jajodia, S. Distribuuted algorithms ofr dynamic replicated of data. In Proceedings of the 11th ACM PODS. (June 1992) pp. 149- 163. Google ScholarGoogle Scholar
  25. 25 Weiser, M. The computer for the twenty-firm, century. Sci. Amer., 263,3 (Sept. 1993)-104.Google ScholarGoogle Scholar

Index Terms

  1. Mobile wireless computing: challenges in data management

      Recommendations

      Reviews

      Andrew S. Tanenbaum

      The rapidly growing world of wireless communication and computing offers many new opportunities and challenges. In the future, people will be able to walk around with laptop, palmtop, and wristwatch computers that send, receive, and store information. Before this scenario becomes a reality, a few problems have to be solved. This paper gives a broad introduction to the problems and a few hints at where the solutions may lie. Current wireless systems can be roughly categorized into four groups, each with its own problems. Cellular telephones are primarily analog. Wireless (infrared) LANs have a short range. Wide-area data systems have too low a bandwidth. Satellite paging systems can only receive information. None of these will do for future interactive digital communication. New systems are needed. The authors point out four major challenges facing the designers of wireless systems. First is mobility management. In short, how does the system locate its wandering users__?__ Second is bandwidth management. In the world of wireless computing, 19.2 kbps is about all one can expect for the moment. Living with this bandwidth requires a heavy use of caching of potentially useful information when the wireless computer is plugged into the network, so most things the user will need will already be there when the user takes off. Third is energy management. It will no doubt come as a great shock to most computer scientists that battery lifetime is a major obstacle, and that researchers project only a 20 percent improvement in the next decade. This fact has serious implications for system design. For example, when wireless computers get their information by querying fixed servers, they must transmit, which uses a lot of energy. Alternatively, it may be better for the servers to frequently broadcast commonly requested in<__?__Pub Caret>formation, because listening takes less energy than transmitting. Of course, the scarcity of bandwidth argues the other way. The last word is not in yet. Finally, security and privacy are major issues, but most solutions are heavy consumers of scarce resources. All in all, this paper is an excellent introduction to the new world of wireless computing. It should interest a wide range of people in the computer industry.

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 37, Issue 10
        Oct. 1994
        85 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/194313
        Issue’s Table of Contents

        Copyright © 1994 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 October 1994

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader