Information Technology Reference
In-Depth Information
7.2. Ordered Access List .................................
59
7.3.SectionConclusion .................................
67
8. Conflict Resolution and Generation of Access Patterns Beyond Heuristics ......
67
8.1.ParallelObjectScan.................................
70
8.2.SerialEmptyScan..................................
73
9.ConclusionandFutureResearchDirections ......................
78
Acknowledgements....................................
80
References.........................................
80
1.
Introduction
A mobile computing environment involves accessing information through a wire-
less network connection. The mobile unit may be stationary, in motion, and/or in-
termittently connected to a fixed (wired) network. The increasing development and
spread of computer networks, and the extensive need for information sharing have
created a considerable demand for cooperation among pre-existing, distributed, het-
erogeneous, and autonomous information sources. In addition, users have become
more demanding in that they desire and sometimes even require access to informa-
tion “anytime, anywhere.” The growing diversity in the range of information that
is accessible to a user at any given time and the rapidly expanding technology that
makes available a wide breadth of devices, with different physical characteristics,
have changed the traditional notion of timely and reliable access to global informa-
tion in a distributed system. Growth and success of such an environment depends on
two fundamental issues—efficient management of information systems and avail-
ability of reliable communications infrastructure.
Remote access to data is a rapidly expanding and it has become increasingly im-
portant aspect of computing. Remote access to data refers to both mobile nodes and
fixed nodes accessing heterogeneous and autonomous data sources in an infrastruc-
ture that is identified by the following parameters:
Low bandwidth;
Frequent disconnection;
High error rates;
Limited processing resources; and
Limited power sources.
Nevertheless, regardless of the access devices and connection medium, users re-
quire anytime, anywhere, fast, transparent, intelligent, secure, and cost efficient ac-
cess to information repositories that are classified as:
Search WWH ::




Custom Search