Recovery Protocol for Mobile Checkpointing

نویسندگان

  • Hiroaki Higaki
  • Makoto Takizawa
چکیده

Information systems consist of multiple mobile stations and xed stations communicating with each other. Mission critical applications are required to be executed fault-tolerantly in these systems. However, mobile stations support neither enough volume of storage and processing power nor enough capacity of battery to do reliable communication for a long period. Moreover, wireless communication channels are less reliable. Hence, the communication channels with the mobile stations are often disconnected. Therefore, it is di cult for multiple mobile stations to take checkpoints synchronously since the communication channels with the mobile stations may be disconnected even during taking the checkpoints. We have proposed hybrid checkpointing where checkpoints are taken asynchronously by the mobile stations and synchronously by the xed stations. In addition, the mobile stations record messages for getting local states consistent with the checkpoints taken by the xed stations. In this paper, we propose the method how the mobile stations record the messages, gather the messages stored in the stable storages distributed in multiple mobile stations, and recompute the messages in the consistent order.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Checkpoint-based Failure Recovery Techniques in Mobile Computing Systems

Conventional distributed and domino effect-free failure recovery techniques are inappropriate for mobile computing systems because each mobile host is forced to take a new checkpoint (based on coordinated checkpointing). Otherwise, multiple local checkpoints may need to be stored in stable storage (based on communication-induced checkpointing). Hence, this investigation presents a novel domino ...

متن کامل

An Enhanced MSS-based checkpointing Scheme for Mobile Computing Environment

Mobile computing systems are made up of different components among which Mobile Support Stations (MSSs) play a key role. This paper proposes an efficient MSS-based non-blocking coordinated checkpointing scheme for mobile computing environment. In the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the MSSs and as a result the workload of Mobile ...

متن کامل

Log Based Recovery with Low Overhead for Large Mobile Computing Systems

The article proposes a recovery protocol for applications in large mobile computing environment by combining movement based checkpointing with message logging. Since checkpointing is expensive, the focus of the scheme is to add only a low overhead to the normal application execution by reducing the number of checkpoints taken by a mobile host. For accomplishing this, the mobile system is divide...

متن کامل

An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging

Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures. These solutions are often not applicable due to the lack of accurate data on the probability distribution of failures. Most current checkpoint libraries require application users to deene a xed time interval for check...

متن کامل

On Mobile Checkpointing using Index and Time Together

Checkpointing is one of the commonly used techniques to provide fault-tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are constrained by low bandwidth, mobility, lack of stable storage, frequent disconnections and limited battery life. Hence, checkpointing protocols having lesser number of synchronizat...

متن کامل

Minimum Process Coordinated Checkpointing Scheme for Ad Hoc Networks

The wireless mobile ad hoc network (MANET) architecture is one consisting of a set of mobile hosts capable of communicating with each other without the assistance of base stations. This has made possible creating a mobile distributed computing environment and has also brought several new challenges in distributed protocol design. In this paper, we study a very fundamental problem, the fault tol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998