|
|
|
|
LEADER |
04519nam a2200673 a 4500 |
001 |
3357 |
005 |
20081107151942.0 |
006 |
m e d |
007 |
cr bn |||m|||a |
008 |
081006s2008 cau fsb 000 0 eng d |
020 |
# |
# |
|a 159829203X (electronic bk.)
|
020 |
# |
# |
|a 9781598292039 (electronic bk.)
|
020 |
# |
# |
|z 1598292021 (pbk.)
|
020 |
# |
# |
|z 9781598292022 (pbk.)
|
024 |
7 |
# |
|a 10.2200/S00132ED1V01Y200807MPC005
|2 doi
|
035 |
# |
# |
|a 228154516(OCLC)
|
035 |
# |
# |
|a (CaBNvSL)gtp00531493
|
040 |
# |
# |
|a CaBNvSL
|c CaBNvSL
|d CaBNvSL
|
050 |
# |
4 |
|a QA76.59
|b .T47 2008
|
082 |
0 |
4 |
|a 004.165
|2 22
|
100 |
1 |
# |
|a Terry, Douglas B.
|q (Douglas Brian)
|
245 |
1 |
0 |
|a Replicated data management for mobile computing
|c Douglas B. Terry.
|h [electronic resource] /
|
260 |
# |
# |
|a San Rafael, Calif. (1537 Fourth Street, San Rafael, CA 94901 USA) :
|b Morgan & Claypool Publishers,
|c c2008.
|
300 |
# |
# |
|a 1 electronic document (xi, 93 p.) :
|b digital file.
|
490 |
1 |
# |
|a Synthesis lectures on mobile and pervasive computing ;
|v #5
|
500 |
# |
# |
|a Part of: Synthesis digital library of engineering and computer science.
|
500 |
# |
# |
|a Series from website.
|
500 |
# |
# |
|a Title from PDF t.p. (viewed on Oct. 10, 2008).
|
504 |
# |
# |
|a Includes bibliographical references (p. 83-91).
|
505 |
0 |
# |
|a Introduction -- System models -- Data consistency -- Replicated data protocols -- Partial replication -- Conflict management -- Case studies -- Conclusions -- Bibliography.
|
506 |
# |
# |
|a Abstract freely available; full-text restricted to subscribers or individual document purchasers.
|
510 |
0 |
# |
|a Compendex
|
510 |
0 |
# |
|a Google book search
|
510 |
0 |
# |
|a Google scholar
|
510 |
0 |
# |
|a INSPEC
|
520 |
0 |
# |
|a Managing data in a mobile computing environment invariably involves caching or replication. In many cases, a mobile device has access only to data that is stored locally, and much of that data arrives via replication from other devices, PCs, and services. Given portable devices with limited resources, weak or intermittent connectivity, and security vulnerabilities, data replication serves to increase availability, reduce communication costs, foster sharing, and enhance survivability of critical information. Mobile systems have employed a variety of distributed architectures from client-server caching to peer-to-peer replication. Such systems generally provide weak consistency models in which read and update operations can be performed at any replica without coordination with other devices. The design of a replication protocol then centers on issues of how to record, propagate, order, and filter updates. Some protocols utilize operation logs, whereas others replicate state. Systems might provide best-effort delivery, using gossip protocols or multicast, or guarantee eventual consistency for arbitrary communication patterns, using recently developed pairwise, knowledge-driven protocols. Additionally, systems must detect and resolve the conflicts that arise from concurrent updates using techniques ranging from version vectors to read-write dependency checks. This lecture explores the choices faced in designing a replication protocol, with particular emphasis on meeting the needs of mobile applications. It presents the inherent trade-offs and implicit assumptions in alternative designs. The discussion is grounded by including case studies of research and commercial systems including Coda, Ficus, Bayou, Sybase's iAnywhere, and Microsoft's Sync Framework.
|
530 |
# |
# |
|a Available also in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
538 |
# |
# |
|a System requirements: PDF reader.
|
650 |
# |
0 |
|a Cache memory.
|
650 |
# |
0 |
|a Data transmission systems.
|
650 |
# |
0 |
|a Database management.
|
650 |
# |
0 |
|a Mobile computing.
|
650 |
# |
0 |
|a Ubiquitous computing.
|
690 |
# |
# |
|a Mobile data management.
|
690 |
# |
# |
|a Replication.
|
690 |
# |
# |
|a Caching.
|
690 |
# |
# |
|a Mobility.
|
690 |
# |
# |
|a Ubiquitous computing.
|
690 |
# |
# |
|a Disconnected operation.
|
690 |
# |
# |
|a Intermittent connectivity.
|
690 |
# |
# |
|a Data consistency.
|
690 |
# |
# |
|a Conflict detection.
|
690 |
# |
# |
|a Update propagation.
|
690 |
# |
# |
|a Epidemic algorithms.
|
710 |
2 |
# |
|a Morgan & Claypool Publishers.
|
730 |
0 |
# |
|a Synthesis digital library of engineering and computer science.
|
830 |
# |
0 |
|a Synthesis lectures in mobile and pervasive computing ;
|v #5.
|
856 |
4 |
2 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.2200/S00132ED1V01Y200807MPC005
|3 Abstract with links to full text
|