Databases Reference
In-Depth Information
Rent of lockers, which allows the mobile user to have services such as
confidential access protected with a secret key to a locker.
·
The GSN could also be situated in a computer that is in charge of monitor-
ing the access to a private corporate network. That is, the GSN is part of the
intranet of the company, and the offered services can be customized accord-
ing to the needs and characteristics of the particular company and its mobile
workers. For example, the GSN could offer the following services:
Access to data repositories, to allow the users to perform queries and
updates in any DB server of their organization;
·
Access to FHs, for providing access to information stored in FHs and
allowing a user to get and store files in any host of the fixed network
where that user has the right access privileges;
·
Access to the World Wide Web, to obtain Web pages, cache them in
the GSN, and send them to the mobile users;
·
E-mail, to allow mobile users to get and send e-mail to any e-mail
server;
·
A blackboard, which stores general-interest messages that the users
can obtain in several ways.
·
10.9
Summary
This chapter briefly reviewed the main issues concerning data management
in mobile computing. It illustrated the possibilities that this new paradigm
offers and the widely accepted architecture, followed by the technologies that
are being considered. It also introduced the main features that have a great
influence on the performance of the mobile systems, focusing on the data
management aspects. In summary, we can conclude that mobile computing
opens new expectations for data applications. However, because mobile com-
puting is not yet mature and many problems must be solved, it is expected
that new proposals will appear in the future.
References
[1]
Kistler, J. J., and M. Satyanarayanan, Disconnected Operation in the Coda File
System, ACM Trans. on Computer Systems, Vol. 10, 1992, pp. 213–225.
Search WWH ::




Custom Search