Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2006.13C.5.583

An Efficient Checkpoint Protocol in Wireless Sensor Network for Reliability  

Jung, Dong-Won (아주대학교 정보통신전문대학원)
Choi, Chang-Yeol (아주대학교 정보통신전문대학원)
Kim, Sung-Soo (아주대학교 정보통신전문대학원)
Abstract
The reliability concept of wireless sensor network is essential to get exactly actual data from the ubiquitous environment. A rollback technique for the self-healing helps to increase it. However, a fault can occur in wireless sensor network when to use a previous rollback technique because it is designed just for the local system. So, checkpoint protocols are suggested in order to use a rollback technique in the network without the fault. However, there is trade-off among performance overhead, power consumption, and memory overhead for each of protocols. Hence, we suggest a novel global checkpoint protocol, so called address log based protocol(ALBP), based on an asynchronous protocol. It is a platform based protocol to reduce power consumption, performance overhead, and memory overhead which are the most of consideration in wireless sensor network.
Keywords
Wireless Sensor Network; Indirect Memory Access; Checkpoint Protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Y. Wang and H. Wu, 'DFT-MSN: The Delay Fault Tolerant Mobile Sensor Network for Pervasive Information Gathering,' Proceedings of IEEE International Conference on Computer Communications, pp.25-38, Apr., 2006   DOI
2 A. Bohra, et al., 'Remote Repair of Operating System State using Backdoors,' Proceedings of IEEE International Conference on Autonomic Computing, pp.256-263, May, 2004   DOI
3 F. Sultan, et al., 'Nonintrusive Remote Healing Using Backdoors,' Proceedings of Algorithms and Architectures for Self-Managing Systems, pp.69-74. June, 2003
4 C. Rao, L. Alvisi, and H. Yin, 'The Cost of Recovery in Message Logging Protocols,' Proceedings of IEEE Symposium on Reliable Distributed Systems, pp.10-18, Oct., 1998
5 A. Krohn, et al., 'TOMAC - Real-time Message Ordering in Wireless Sensor Networks Using The MAC Layer,' Proceedings of International Conference on Networked Sensing Systems, pp.377-381, June, 2005
6 J. Tasi, 'An Efficient Index-based Checkpointing Protocol with Constant-size Control Information on Messages,' IEEE Transactions on Dependable and Secure Computing, Vol. 2, No.4, pp.287-296, Oct., 2005   DOI   ScienceOn
7 L. Alvisi, et al., 'An Analysis of Communication Induced Checkpointing,' Proceedings of IEEE International Conference on Fault-Tolerant Computing, pp.242-249, June, 1999   DOI
8 D. Johnson and W. Zwaenepoel, 'Sender-based Message Logging,' Proceedings of International Symposium on Fault-Tolerant Computing, pp.14-19, July, 1987
9 J. Helary, et al., 'Communication-based Prevention of Useless Checkpoints in Distributed Computations,' Journal of Distributed Computing, Vol.13, No.1, pp.29-43, Jan., 2000   DOI
10 J. Cao, Y. Li, and M. Guo, 'Process Migration MPI Applications based on Coordinated Checkpoint,' Proceedings of International Conference on Parallel Distributed Systems, pp.306-312, July, 2005   DOI
11 L. Alvisi and K. Marzullo, 'MessageLogging: Pessimistic, Optimistic, Causal, and Optimal,' IEEE Transactions on Software Engineering, Vol. 24, No.2, pp.149-159, Feb., 1998   DOI   ScienceOn
12 E. Shih, et al., 'Physical Layer Driven Protocol and Algorithm Design for Energy-Efficient Wireless Sensor Network,' Proceedings of Mobile Computing and Networking, pp.272-287, July, 2001   DOI
13 T. Juang and S. Venkatesan, 'Crash Recovery with Little Overhead,' Proceedings of IEEE International Conference on Distributed Computing Systems, pp.454-461, May, 1991   DOI
14 C. Intanagonwiwat, R. Govindan, and D. Estrin, 'Directed diffusion: a scalable and robust communication paradigm for sensor networks,' Proceedings of Mobile Computing, pp.56-67, Aug., 2000
15 E. Elnozahy and W. Zwaenepoel, 'Manetho: Transparent Rollback-recovery with Low Overhead, Limited Rollback and Fast Output,' IEEE Transactions on Computers, Vol.41, No.5, pp.526-531, May, 1992   DOI   ScienceOn
16 M. Prvulovic, Z. Zhang, and J. Torrellas, 'ReVive: Cost-Effective Architectural Support for Rollback Recovery in Shared-Memory Multiprocessors,' Proceedings of Computer Architecture, pp. 111-122, May 2002   DOI
17 A. Bouteiller, et al., 'Coordinated Checkpoint versus Message Log for Fault Tolerant MPI,' Proceedings of IEEE International Conference on Cluster Computing, pp. 242-250, Dec. 2003   DOI
18 M. Elnozahy and L. Alvisi, 'A Survey of Rollback-recovery Protocols in Message-passing System,' ACM Computing Surveys, Vol. 34, pp. 375-409, Sep. 2002   DOI   ScienceOn
19 M. Burrows, et al., 'Compressed Differences: An Algorithm for Fast Incremental Checkpoint,' Proceedings of Architectural Support for Programming Languages and Operating Systems, pp. 2-9, Oct. 1992