Key technologies for embedded mobile databases

xiaoxiao2021-03-06  40

Due to the resource limit of the mobile device, the embedded mobile database is generally integrated with the application system, as the front end of the application system, and the data set it managed may be a subset or subset of the data set in the backend server. Copy. The embedded mobile database system must improve the technology in the following key issues: Backup recovery: The backup and recovery of the embedded database is different from the large DBMS management database, and cannot be made in a separate service or similar form, but according to some kind. Simplified mode is done. Copy and synchronization: The embedded database generally uses some data replication mode (upload, download or mixing), mapping with the server database to meet the needs of any data in any location and any time. Due to the presence of data replication, there may be a variety of necessary synchronous control processes, even some or all of the front-end, and even all of the application front ends, and even some or all of the application. Transaction: Transaction processing in the embedded database system can be simplified at the front end, but in the entire application system, it may be necessary to transaction control over the feature of the mobile computing environment. Security: Many embedded devices in many applications are critical devices of data management or processing in the system. Therefore, the database system on the embedded device is stricter. At the same time, many embedded devices have higher mobility, portability, and non-fixed working environments, and also bring potentially unsafe factors to embedded mobile databases. At the same time, some data has a high privacy, so sufficient security guarantees are required in the threat of preventing collision, magnetic field interference, loss, theft, etc. The system quickly starts: The system reliability and availability of embedded / mobile devices is generally relatively low relative to the fixed host, so the probability of the system failure may be greatly improved. Therefore, on such a computing environment or computing platform, it is necessary to ensure that the system can perform the fast start of the system through the hardware without achieving software error correction.

转载请注明原文地址:https://www.9cbs.com/read-71812.html

New Post(0)