A Mobile Transaction System for Open Networks

نویسنده

  • R. B. Patel
چکیده

The evolution of mobile computing devices and wireless network has created a new mobile computing environment. Users equipped with portable devices can access, retrieve and process information while in mobility. Mobile devices like laptops; mobile phones have become more powerful data processing elements. Traditional transaction model has moved forwarding to mobile transaction system. Autonomous decentralized systems represent examples of environments for which the use of mobile codes is quite convenient. For example, designing highly scalable distributed systems in a massive, heterogeneous and multi organizational distributed environment seems to benefit much from mobile codes, given their ability to decentralize processing; to adapt to the autonomy of systems; to flexibly allow the management of installed code; and their support to the interaction with human users. This paper presents a hierarchical transaction model for the execution of distributed transactions with mobile code on open networks. The developed transaction model is built upon the concept for fault tolerance of mobile code based executions. The presented transaction model is an open nested transaction model. This model supports those parts of a distributed transaction which is executed asynchronously in relation to other parts of the same global transaction. Furthermore, the model is able to recover the execution of a transaction when a sub-transaction of this transaction becomes unavailable for a long period of time and the results of a comparison of developed model, with some existing ones, are also reported. We have also suggested and implemented an efficient naming and locating mechanism for tracing/finding the status of a transaction whenever fault(s) arises in the transaction processing system/network or processing of a sub-transaction

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

Designing the Attitude toward Advertising Model through Mobile Social Networks

The aim of this research is to help advance a better understanding of digital advertising innovation adoption, consumer acceptance of customized advertising, and the influence of customized advertising on product purchase intent via a mobile social network. To this end, two types of questionnaires, including an open questionnaire filled up by 16 experts and university professors was designed to...

متن کامل

Caprera: An Activity Framework for Transaction Processing on Wide-Area Networks

Caprera is an open framework for designing client/server applications that operate over a wide-area network. The activity model of Caprera used to extend transaction processing and transaction-oriented application in an open environment including mobile and remote clients connected by wireless, phone lines, or Internet is described here. Since Caprera enables off-line users on mobile platforms ...

متن کامل

Dagstuhl Seminar Scalable Data Management in Evolving Networks

We introduce different mobile network applications and show to which degree the concept of database transactions is required within the applications. We show properties of transaction processing and explain which properties are important for each of the mobile applications. Furthermore, we discuss open questions regarding transaction processing in mobile networks and identify open problems for ...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009