Abstract

Contact between mobile hosts and database servers presents many problems in the Mobile Database System (MDS). It is harmed by a variety of causes, including handoff, inadequate capacity, frequent transaction updates, and repeated failures, both of which contribute to serious issues with the information system’s consistency. However, error tolerance technicality allows devices to continue performing their functions in the event of a failure. The aim of this paper is to identify the optimal recovery approach from among the available state-of-the-art techniques in MDS by employing game theory. Several of the presented recovery protocols are chosen and evaluated in order to determine the most critical factors affecting the recovery mechanism, such as the number of processes, the time required to deliver messages, and the number of messages logged-in time. Then, using the suggested payout matrix, the game theory strategy is adapted to choose the optimum recovery technique for the specified environmental variables. The NS2 simulator was used to carry out the tests and apply the chosen recovery protocols. The experiments validate the proposed model’s usefulness in comparison to other methods.

Highlights

  • Through the advancement in networking capabilities, mobile communication has been one of the most vital aspects of our lives

  • The aim of this paper is to identify the optimal recovery approach from among the available state-of-the-art techniques in Mobile Database System (MDS) by employing game theory

  • Matlab software is running for game theory building to evaluate the alternative recovery protocols by entering the output values of the simulation stage in it to search for the best decision

Read more

Summary

Introduction

Through the advancement in networking capabilities, mobile communication has been one of the most vital aspects of our lives. The mobile environment has a number of shortcomings that make managing mobile data transfers difficult, such as periodic disconnections [2,3,4,5]. The primary transaction management issues stem from the versatility of the Mobile Host (MH) and the limited wireless bandwidth [6,7,8,9]. Numerous recovery modules have been created by researchers to ensure that sensitive information can be retrieved after a malfunction. They take into account the difficulties associated with wireless networking when working with the mobile database, such as electricity shortages, frequent server disconnections, and handoff issues. There are two styles of recovery approaches described in the literature in this regard: forward recovery and backward recovery; for more details, see [9,10]

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.