Efficient Checkpoint-based Failure Recovery Techniques in Mobile Computing Systems
نویسندگان
چکیده
Conventional distributed and domino effect-free failure recovery techniques are inappropriate for mobile computing systems because each mobile host is forced to take a new checkpoint (based on coordinated checkpointing). Otherwise, multiple local checkpoints may need to be stored in stable storage (based on communication-induced checkpointing). Hence, this investigation presents a novel domino effect-free failure recovery technique that combines the merits of the above two checkpointing technologies for mobile computing systems. The algorithm is a three-phase protocol that ensures a consistent checkpoint. The first phase uses a coordinated checkpointing protocol among mobile support stations. In the second phase, a communication-induced checkpointing protocol is used between each mobile support station and its mobile hosts. In the last phase, each mobile support station sends a checkpoint request to its mobile host which hasn’t received any message from the mobile support station during the second phase. Numerical results are provided which compare the proposed algorithm with both a quasi-synchronous failure recovery algorithm and a hybrid checkpoint recovery algorithm for mobile computing systems. According to the comparison, our scheme outperforms other schemes in terms of checkpoint overhead. Moreover, the proposed algorithm has several merits: domino effect-free, nonblocking, twice the checkpoint size, and scalability.
منابع مشابه
An Enhanced MSS-based checkpointing Scheme for Mobile Computing Environment
Mobile computing systems are made up of different components among which Mobile Support Stations (MSSs) play a key role. This paper proposes an efficient MSS-based non-blocking coordinated checkpointing scheme for mobile computing environment. In the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the MSSs and as a result the workload of Mobile ...
متن کاملAnalysis of Recent Checkpointing Techniques for Mobile Computing Systems
Recovery from transient failures is one of the prime issues in the context of distributed systems. These systems demand to have transparent yet efficient techniques to achieve the same. Checkpoint is defined as a designated place in a program where normal processing of a system is interrupted to preserve the status information. Checkpointing is a process of saving status information. Mobile com...
متن کاملA Survey and Performance Analysis of Checkpointing and Recovery Schemes for Mobile Computing Systems
A SURVEY AND PERFORMANCE ANALYSIS OF CHECKPOINTING AND RECOVERY SCHEMES FOR MOBILE COMPUTING SYSTEMS Ruchi Tuli1 and Parveen Kumar2 1Yanbu University College, Royal Commission for Jubail and Yanbu, Directorate General for Yanbu, P.O. Box 30436 Madinat Yanbu Al Sinaiyah Kingdom of Saudi Arabia., E-mail : [email protected] 2Merrut Institute of Engineering and Technology, Merrut (INDIA) E-mail ...
متن کاملFailure Recovery based on Quasi-Synchronous Checkpointing in Mobile Computing Systems
Mobile computing systems are expected to revolutionize the way computers are used. Mobile hosts have small memory, a relatively slow processor and low power batteries, and communicate over low bandwidth wireless communication links. In this paper, we address the problem of failure recovery in mobile computing systems. Any recovery method for mobile computing systems should take into considerati...
متن کاملImproving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner
Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 17 شماره
صفحات -
تاریخ انتشار 2001