Browse > Article
http://dx.doi.org/10.3745/KIPSTA.2008.15-A.2.111

An Efficient Checkpointing Method for Mobile Hosts via the Software Agent  

Lim, Sung-Chae (동덕여자대학교 컴퓨터)
Abstract
With the advance in mobile communication systems, the need for distributed applications running on multiple mobile devices also grows gradually. As such applications are subject to H/W failures of the mobile device or communication disruptions, compared to the traditional applications in fixed networks, it is crucial to develop any recovery mechanism suitable for them. For this, checkpointing is widely used to restart interrupted applications. In this paper, we devise an efficient checkpointing method that adopts the software agent executed at the mobile support station. The agent, called the checkpointing agent, is aimed at supporting the concept of rollback-distance (R-distance) that bounds the maximum number of roll-backed local checkpoints. By means of the R-distance, our method can prevent undesirable domino effects and heavy checkpoint overhead, while providing high flexibility in checkpoint creation.
Keywords
Mobile Communication; Distributed Checkpoints; Recovery;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dhiraj K. Pradhan, P. Krishna, and Nitin H. Vaidya, Recovery in Mobile Wireless Environment: Design and Trade-off Analysis, In Proc. of the 26th International Symposium on Fault-Tolerant Computing, pp.16-25, 1996
2 D. Manivannan and Mukesh Singhal, Quasi- Synchronous Checkpointing: Models, Characterization, and Classification, IEEE Trans. on Parallel and Distributed Systems, Vol.10, No.7, July, 1999   DOI   ScienceOn
3 Mootaz Elnozahy, et. al., A Survey of Rollback-Recovery Protocols in Message-Passing Systems, Technical Report: CMU-CS-99-148, June, 1999
4 Cheng-Min Lin and Chyi-Ren Dow, Efficient Checkpoint-based Failure Recovery Techniques in Mobile Computing Systems, Journal of Information Science and Engineering, pp.549-573, Vol 17, No.4, 2001
5 Lorenzo Alvisi, E. N. Elnozahy, Sriram Rao, Syed Amir Husain and Asanka De Mel, An Analysis of Communication Induced Checkpointing, In Proc. of the Symposium on Fault-Tolerant Computing Symp., pp.242-249, 1999
6 Franco Zambonelli, On the Effectiveness of Distributed Checkpoint Algorithms for Domino-Free Recovery, In Proc. of High Performance Distributed Computing, pp.124-131, 1998
7 Yi-Min Wang and W. Kent Fuchs, Lazy Checkpointing Coordination for Bounding Rollback Propagation, In Proc. of the International Symposium on Reliable Distributed Systems, pp.78-85, 1993
8 Lapmport, Time, clocks, and the Ordering of Events in a Distributed System, Communication of ACM, Von. 21, No.7, pp.558-565, 1978   DOI   ScienceOn
9 Arup Acharya and B. R. Badrinath, Checkpointing Distributed Applications on Mobile Computers, In Proc. of the 3rd International Conference on Parallel and Distributed Information Systems, pp.73-80, 1994
10 Ricardo Baratto, Shaya Potter, Gong Su, and Jason Nieh, MobiDesk: Mobile Virtual Desktop Computing, In Proc. of the 10th International Conference on Mobile Computing and Networking, pp.1-15, 2004
11 Y. M. Wang, Consistent Gobal Chckpoints That Contain a Given Set of Local Checkpoints, IEEE Trans. on Computers, Vol.46, No.4, pp.456-468, 1997   DOI   ScienceOn
12 Tongchit Tantikul and D. Manivannan, Communication-Induced Checkpointing and Asynchronous Recovery Protocol for Mobile Computing Systems, In Proc. of the 6th International Conference on Parallel and Distributed Computing Applications and Technologies, pp.70-74, 2005   DOI
13 Taesoon Park and Heon Y. Yeom, An Asynchronous Recovery Scheme based on Optimistic Message Logging for Mobile Computing Systems, In Proc. of the 20th International Conference on Distributed Computing Systems, pp.436-443, 2000
14 T. Imielinski and B. R. Badrinath, Mobile Wireless Computing: Challenges in Data Management, Communications of the ACM, pp.19-28, Vol.37, No.10, October, 1994
15 R. E. Strong and S. Yemini, Optimitic Recovery in Distributed Systems, ACM Trans. on Computer Systems, Vol.3, No.3, August, 1985   DOI   ScienceOn
16 Yi-Bing Lin, Failure Restoration of Mobility Databases for Personal Communication Networks, Wireless Networks, Vol.1, No.3, 1995
17 Sashidhar Gadiraju and Vijay Kumar, Recovery in the Mobile Wireless Environment Using Mobile Agents, IEEE Trans. on Mobile Computing, Vol.3, No.2, April, 2004