Recovery of mobile internet transactions: algorithm, implementation and analysis

The increasing popularity of mobile devices and the support of web portals towards performing transactions from these mobile devices has enabled business on the move. However, internet access from mobile devices is expensive and is subject to high rate of disconnections. For a user executing a transaction with a web portal from a mobile device, the disconnection will require him to redo all the steps in the transaction on subsequent reconnection. This paper proposes a recovery scheme to restore the most recent and valid response from the previous session, so that the effort towards rework is minimized. The user, upon reconnection, can continue from the restored response without restarting from the beginning of the transaction. We demonstrate the practicality of the scheme by implementing it in a WAP system. Our results clearly indicate the performance advantages that can be gained from this recovery approach. We also establish the correctness of the scheme using a reasoning framework.

[1]  Soo Mee Foo,et al.  The Wireless Markup Language (WML) , 2002 .

[2]  Krithi Ramamritham,et al.  Guaranteeing recoverability in electronic commerce , 2001, Proceedings Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2001.

[3]  Roy T. Fielding,et al.  Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.

[4]  Stuart D. Milner,et al.  Performance and scalability of mobile wireless base-station-oriented networks , 2003, MOCO.

[5]  Matjaz B. Juric,et al.  Business process execution language for web services , 2004 .

[6]  Julian Jang,et al.  Transactions in Loosely Coupled Distributed Systems , 2003, ADC.

[7]  Shamkant B. Navathe,et al.  Mobile User Recovery in the Context of Internet Transactions , 2003, IEEE Trans. Mob. Comput..

[8]  Ulrich Berger,et al.  Computational Logic , 2001, NATO ASI Series.

[9]  Moses Garuba,et al.  A ubiquitous stable storage for mobile computing devices , 2001, SAC.

[10]  Heon Young Yeom,et al.  An efficient recovery scheme for mobile computing environments , 2001, Proceedings. Eighth International Conference on Parallel and Distributed Systems. ICPADS 2001.

[11]  Roger S. Barga,et al.  Measuring and optimizing a system for persistent database sessions , 2001, Proceedings 17th International Conference on Data Engineering.

[12]  W. Kent Fuchs,et al.  Proxy-based recovery for applications on wireless hand-held devices , 2000, Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000.

[13]  Julian Jang,et al.  Towards a Framework for Capturing Transactional Requirements of Real Workflows , 2002 .

[14]  W. Kou Wireless Application Protocol , 2006 .

[15]  Robert S. Boyer,et al.  Computational Logic , 1990, ESPRIT Basic Research Series.

[16]  Dhiraj K. Pradhan,et al.  Recoverable mobile environment: design and trade-off analysis , 1996, Proceedings of Annual Symposium on Fault Tolerant Computing.

[17]  Krithi Ramamritham,et al.  Support for Recovery in Mobile Systems , 2002, IEEE Trans. Computers.

[18]  Julian Jang,et al.  Expressiveness of Workflow Description Languages , 2003, ICWS.

[19]  Christopher G. Lasater,et al.  Design Patterns , 2008, Wiley Encyclopedia of Computer Science and Engineering.

[20]  Julian Jang,et al.  Compensation is Not Enough , 2003 .

[21]  Walter H. Kohler,et al.  A Survey of Techniques for Synchronization and Recovery in Decentralized Computer Systems , 1981, CSUR.

[22]  R. K. Ghosh,et al.  Recovery of mobile transactions , 2000, Proceedings 11th International Workshop on Database and Expert Systems Applications.

[23]  W. Kent Fuchs,et al.  Recovery proxy for wireless applications , 2001, Proceedings 12th International Symposium on Software Reliability Engineering.

[24]  Adam Dunkels,et al.  Connecting Wireless Sensornets with TCP/IP Networks , 2004, WWIC.

[25]  Julian Jang,et al.  Just what could possibly go wrong in B2B integration? , 2003, Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003.

[26]  Jan Mendling,et al.  Business Process Execution Language for Web Services , 2006, EMISA Forum.

[27]  W. Kent Fuchs,et al.  Message logging optimization for wireless networks , 2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems.

[28]  Bart Preneel,et al.  The Wireless Application Protocol , 2005, Int. J. Netw. Secur..

[29]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .