DOI QR코드

DOI QR Code

An Efficient Checkpoint Protocol in Wireless Sensor Network for Reliability

무선 센서 네트워크에서 신뢰성 향상을 위한 효율적인 체크포인트 프로토콜

  • 정동원 (아주대학교 정보통신전문대학원) ;
  • 최창열 (아주대학교 정보통신전문대학원) ;
  • 김성수 (아주대학교 정보통신전문대학원)
  • Published : 2006.10.30

Abstract

The reliability concept of wireless sensor network is essential to get exactly actual data from the ubiquitous environment. A rollback technique for the self-healing helps to increase it. However, a fault can occur in wireless sensor network when to use a previous rollback technique because it is designed just for the local system. So, checkpoint protocols are suggested in order to use a rollback technique in the network without the fault. However, there is trade-off among performance overhead, power consumption, and memory overhead for each of protocols. Hence, we suggest a novel global checkpoint protocol, so called address log based protocol(ALBP), based on an asynchronous protocol. It is a platform based protocol to reduce power consumption, performance overhead, and memory overhead which are the most of consideration in wireless sensor network.

유비쿼터스 환경에서 정확한 데이터를 얻기 위해, 무선 센서 네트워크의 신뢰성은 필수적이다. 이것을 위해, 롤백 기술을 통한 자가 치유는 신뢰성 향상에 도움을 준다. 하지만, 로컬 시스템만을 고려한 기존 롤백 기술은 무선 센서 네트워크에서 자칫 전체 시스템 차원의 결함을 발생시킨다. 따라서, 롤백 기술을 무선 네트워크 차원으로 지원하기 위해 체크포인트 프로토콜이 제시되었다. 하지만, 무선 센서 네트워크가 가지고 있는 특유의 제한 조건 때문에 각각의 프로토콜들은 메모리, 성능, 그리고 전력 소모 효율에 있어서 상충관계가 존재한다. 따라서, 본 논문에서는 주소 기록 기반 프로토콜(address log based protocol, ALBP)이라 불리는 새로운 프로토콜을 제시한다. 이 기법은 비동기 방식을 지원하는 플랫폼 기반의 프로토콜로, 무선 센서 네트워크에서 중요한 고려사항인 전력 소모량, 메모리 사용량, 그리고 마감시간을 맞추기 위한 빠른 응답시간을 만족시킬 수 있다.

Keywords

References

  1. M. Burrows, et al., 'Compressed Differences: An Algorithm for Fast Incremental Checkpoint,' Proceedings of Architectural Support for Programming Languages and Operating Systems, pp. 2-9, Oct. 1992
  2. M. Prvulovic, Z. Zhang, and J. Torrellas, 'ReVive: Cost-Effective Architectural Support for Rollback Recovery in Shared-Memory Multiprocessors,' Proceedings of Computer Architecture, pp. 111-122, May 2002 https://doi.org/10.1109/ISCA.2002.1003567
  3. A. Bouteiller, et al., 'Coordinated Checkpoint versus Message Log for Fault Tolerant MPI,' Proceedings of IEEE International Conference on Cluster Computing, pp. 242-250, Dec. 2003 https://doi.org/10.1109/CLUSTR.2003.1253321
  4. M. Elnozahy and L. Alvisi, 'A Survey of Rollback-recovery Protocols in Message-passing System,' ACM Computing Surveys, Vol. 34, pp. 375-409, Sep. 2002 https://doi.org/10.1145/568522.568525
  5. C. Intanagonwiwat, R. Govindan, and D. Estrin, 'Directed diffusion: a scalable and robust communication paradigm for sensor networks,' Proceedings of Mobile Computing, pp.56-67, Aug., 2000
  6. E. Elnozahy and W. Zwaenepoel, 'Manetho: Transparent Rollback-recovery with Low Overhead, Limited Rollback and Fast Output,' IEEE Transactions on Computers, Vol.41, No.5, pp.526-531, May, 1992 https://doi.org/10.1109/12.142678
  7. L. Alvisi and K. Marzullo, 'MessageLogging: Pessimistic, Optimistic, Causal, and Optimal,' IEEE Transactions on Software Engineering, Vol. 24, No.2, pp.149-159, Feb., 1998 https://doi.org/10.1109/32.666828
  8. T. Juang and S. Venkatesan, 'Crash Recovery with Little Overhead,' Proceedings of IEEE International Conference on Distributed Computing Systems, pp.454-461, May, 1991 https://doi.org/10.1109/ICDCS.1991.148709
  9. J. Cao, Y. Li, and M. Guo, 'Process Migration MPI Applications based on Coordinated Checkpoint,' Proceedings of International Conference on Parallel Distributed Systems, pp.306-312, July, 2005 https://doi.org/10.1109/ICPADS.2005.241
  10. J. Tasi, 'An Efficient Index-based Checkpointing Protocol with Constant-size Control Information on Messages,' IEEE Transactions on Dependable and Secure Computing, Vol. 2, No.4, pp.287-296, Oct., 2005 https://doi.org/10.1109/TDSC.2005.42
  11. J. Helary, et al., 'Communication-based Prevention of Useless Checkpoints in Distributed Computations,' Journal of Distributed Computing, Vol.13, No.1, pp.29-43, Jan., 2000 https://doi.org/10.1007/s004460050003
  12. A. Krohn, et al., 'TOMAC - Real-time Message Ordering in Wireless Sensor Networks Using The MAC Layer,' Proceedings of International Conference on Networked Sensing Systems, pp.377-381, June, 2005
  13. L. Alvisi, et al., 'An Analysis of Communication Induced Checkpointing,' Proceedings of IEEE International Conference on Fault-Tolerant Computing, pp.242-249, June, 1999 https://doi.org/10.1109/FTCS.1999.781058
  14. D. Johnson and W. Zwaenepoel, 'Sender-based Message Logging,' Proceedings of International Symposium on Fault-Tolerant Computing, pp.14-19, July, 1987
  15. A. Bohra, et al., 'Remote Repair of Operating System State using Backdoors,' Proceedings of IEEE International Conference on Autonomic Computing, pp.256-263, May, 2004 https://doi.org/10.1109/ICAC.2004.1301371
  16. F. Sultan, et al., 'Nonintrusive Remote Healing Using Backdoors,' Proceedings of Algorithms and Architectures for Self-Managing Systems, pp.69-74. June, 2003
  17. C. Rao, L. Alvisi, and H. Yin, 'The Cost of Recovery in Message Logging Protocols,' Proceedings of IEEE Symposium on Reliable Distributed Systems, pp.10-18, Oct., 1998
  18. Y. Wang and H. Wu, 'DFT-MSN: The Delay Fault Tolerant Mobile Sensor Network for Pervasive Information Gathering,' Proceedings of IEEE International Conference on Computer Communications, pp.25-38, Apr., 2006 https://doi.org/10.1109/INFOCOM.2006.272
  19. E. Shih, et al., 'Physical Layer Driven Protocol and Algorithm Design for Energy-Efficient Wireless Sensor Network,' Proceedings of Mobile Computing and Networking, pp.272-287, July, 2001 https://doi.org/10.1145/381677.381703