
10 Chakraborty et. al.
8 Future Directions and Conclusion
In this paper we show the effectiveness of pruning operation in an ICDB environment.
Without any pruning operation, the log file size increases in an unbounded manner with
time: a phenomenon that severely affects the update retrieval time. We present two
pruning algorithms considering clients with both uniform and widely varying MCIs. In
case of uniform MCIs, we show that the complete pruning algorithm curbs the linear
growth of the log file, and keeps this size within a bound. For varying MCIs among
clients, we show the effectiveness of the partial pruning algorithm in reducing the av-
erage update retrieval time for the clients. In this paper we consider only one log file.
However, in case of multiple update log files (i.e., one for each datagroup), these al-
gorithms can obviously be applied independently to each of the log files. There are a
few issues that need further investigation. First, a cost benefit analysis is necessary to
ascertain the period after which the update log files relevant to some lazy clients may be
deleted. Second, in the case of partial pruning, merging spawned files to further reduce
the latency needs to be studied.
References
1. Yee, W.G., Donahoo, M.J., Omiecinski, E., Navathe, S.: Scaling replica maintenance in
intermittently synchronous mobile databases. Proceedingsof CIKM (2001) 450–457
2. Chakraborty, L., Singh, A., Naik, S.: Managing update log files in mobile, wireless en-
vironments. Technical Report 03-05, Department of Electrical & Computer Engineering,
University of Waterloo (2003)
3. Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Dis-
tributed Database Systems. Addison Wesley, Reading, Massachusetts (1987)
4. Breitbart, Y., Korth, H.F.: Replication and consistency: Being lazy helps sometimes. Pro-
ceedings of ACM SIGMOD (1997)
5. Gray, J., Holland, P., O’Neil, P., Shasha, D.: The dangers of replication and a solution.
Proceedings of ACM SIGMOD (1996) 173–182
6. Liu, P., Amman, P., Jajodia, S.: Incorporating transaction semantics to reduce reprocess-
ing overhead in replicated mobile data applications. Proceedings of the 19th International
Conference on Distributed Computing Systems (1999) 414–423
7. Mahajan, S., Donahoo,M., Navathe, S., Ammar, M.: Grouping techniques for update propa-
gation in termittently connected databases. Proceedings of Fourteenth International Confer-
ence on Data Engineering (1998) 45–53
8. Satyanarayanan, M., Kistler, J.J., Mummert, L.B., Ebling, M.R., Kumar, P., Liu, Q.: Ex-
perience with disconnected operation in a mobile environment. Proceedings of the 1993
USENIX Symposium on Mobile and Location-Independent Computing (1993)
9. Chakraborty, L., Singh, A., Naik, S.: Maintenance of partially replicated database in dis-
connected mobile environment. Report, Network Programming Lab, Dept. of Electrical &
Computer Engineering, University of Waterloo (2002)
10. Ross, S.M.: Introduction to Probability Models. Academic Press (1997)
11. Breslau, L., Cao, P., Phillips, G., Shenker, S.: On the implications of zipf’s law for web
caching. Proceedings of INFOCOM (1998)
12. Silberschatz, A., Korth, H., Sudarshan, S.: Database System Concepts. McGraw Hill Book
Co. (2001)
72