The Design and Performance of a Checkpointing Scheme for Mobile Ad Hoc Networks

被引:0
|
作者
Tuli, Ruchi [1 ]
Kumar, Parveen [2 ]
机构
[1] Singhania Univ, Pacheri Ban, Rajasthan, India
[2] Meerut Inst Engn & Technol, Meerut, Uttar Pradesh, India
关键词
Ad hoc routing; checkpointing; fault tolerance; mobile computing; clusterheads; clustering routing protocol; RECOVERY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The mobile ad hoc network architecture consists of a set of mobile hosts that can communicate with each other without the assistance of a base station. This has brought a revolution in mobile computing environment as well as several challenges. Fault-tolerance is an important design issue in building a reliable mobile computing system. This paper considers checkpointing recovery services for a mobile computing system based on the mobile ad-hoc network environment. In this paper we propose a new minimum process checkpointing scheme in ad hoc networks for the Cluster Based Routing Protocol (CBRP) which belongs to a class of Hierarchical Reactive routing protocols. The protocol proposed by us is non-blocking coordinated checkpointing algorithm suitable for ad hoc environments. It produces a consistent set of checkpoints; the algorithm makes sure that only minimum number of nodes in the cluster are required to take checkpoints; it uses very few control messages. Performance analysis shows that our algorithm outperforms the existing related works and is a novel idea in the field.
引用
收藏
页码:204 / +
页数:3
相关论文
共 50 条
  • [21] A secure data transmission scheme for mobile ad hoc networks
    Zheng, Qunwei
    Hong, Xiaoyan
    Liu, Jun
    Tang, Lei
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1006 - 1010
  • [22] An enhancement scheme for TCP over mobile ad hoc networks
    Choi, JH
    Yoo, SH
    Yoo, C
    57TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VTC 2003-SPRING, VOLS 1-4, PROCEEDINGS, 2003, : 1522 - 1526
  • [23] Cluster based security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 391 - +
  • [24] A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks
    Tameem Eissa
    Shukor Abd Razak
    Mohd Asri Ngadi
    Arabian Journal for Science and Engineering, 2012, 37 : 2179 - 2192
  • [25] An Adaptive Scheme for Neighbor Discovery in Mobile Ad Hoc Networks
    沈耀
    蔡云泽
    许晓鸣
    Journal of Shanghai Jiaotong University(Science), 2007, (05) : 602 - 609
  • [26] A global authentication scheme for Mobile Ad-hoc networks
    Caballero-Gil, P.
    Caballero-Gil, C.
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 105 - +
  • [27] An Energy Efficient Clustering Scheme for Mobile Ad Hoc Networks
    Ni, Minming
    Zhong, Zhangdui
    Wu, Hao
    Zhao, Dongmei
    2010 IEEE 71ST VEHICULAR TECHNOLOGY CONFERENCE, 2010,
  • [28] Efficient authentication scheme for routing in mobile ad hoc networks
    Xu, SD
    Mu, Y
    Susilo, W
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 854 - 863
  • [29] A composite key management scheme for mobile ad hoc networks
    Fu, Yingfang
    He, Jingsha
    Li, Guorui
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 575 - 584
  • [30] ANARCH: A name resolution scheme for mobile ad hoc networks
    Aoki, M
    Saito, M
    Aida, H
    Tokuda, H
    AINA 2003: 17TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2003, : 723 - 730