A low overhead checkpointing protocol for mobile computing systems

被引:0
|
作者
Lin, CY [1 ]
Wang, SC [1 ]
Kuo, SY [1 ]
Chen, IY [1 ]
机构
[1] Natl Taiwan Univ, Dept Elect Engn, Taipei 10764, Taiwan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Checkpointing protocols for distributed computing systems can also be applied to mobile computing systems, but the unique characteristics of. the mobile environment need to be taken into account. In this paper, an improved time-based checkpointing protocol is proposed, which is suitable for mobile computing systems based on Mobile IP. The main improvement over a traditional time-based protocol is that our protocol reduces the number of checkpoints per checkpointing process to nearly minimum, so that fewer checkpoints need to be transmitted through the bandwidth-limited wireless links. The proposed protocol also performs very well in the aspects of minimizing the number and the size of messages transmitted in the wireless network. Therefore, the protocol brings very little overhead to a mobile host which has limited resource. Additionally, by integrating the improved timer synchronization technique, our protocol can also be applied to wide area networks.
引用
收藏
页码:37 / 44
页数:8
相关论文
共 50 条
  • [41] A New Distiributed Checkpointing Scheme for the Mobile Computing Environment
    Lim, Sungchae
    2009 IEEE-RIVF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES: RESEARCH, INNOVATION AND VISION FOR THE FUTURE, 2009, : 253 - 256
  • [42] Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems
    Awasthi, Lalit K.
    Misra, Manoj
    Joshi, R. C.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 12 (04) : 356 - 380
  • [43] Minimum process communication induced checkpointing for mobile computing
    Malhotra, Neha
    Bala, Manju
    Garg, Rachit
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (03): : 735 - 743
  • [44] A New Efficient Checkpointing Algorithm for Distributed Mobile Computing
    Mansouri, Houssem
    Badache, Nadjib
    Aliouat, Makhlouf
    Pathan, Al-Sakib Khan
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2015, 17 (02): : 43 - 54
  • [45] Safety of checkpointing and rollback-recovery protocol for mobile systems with RYW session guarantee
    Brzezinski, Jerzy
    Kobusinska, Anna
    Kobusinski, Jacek
    ICEIS 2006: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: SOFTWARE AGENTS AND INTERNET COMPUTING, 2006, : 118 - +
  • [46] Non-intrusive minimum process synchronous checkpointing protocol for mobile distributed systems
    Kumar, P
    Kumar, L
    Chauhan, RK
    Gupta, VK
    2005 IEEE INTERNATIONAL CONFERENCE ON PERSONAL WIRELESS COMMUNICATIONS, 2005, : 491 - 495
  • [47] A causal message logging protocol for mobile nodes in mobile computing systems
    Ahn, JH
    Min, SG
    Hwang, CS
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (04): : 663 - 686
  • [48] A Checkpointing and Recovery Algorithm Based on Location Distance, Handoff and Stationary Checkpoints for Mobile Computing Systems
    Basu, Sourav
    Palchaudhuri, Sayantan
    Podder, Sheuly
    Chakrabarty, Meghla
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 58 - 62
  • [49] Realizing Best Checkpointing Control in Computing Systems
    Sigdel, Purushottam
    Yuan, Xu
    Tzeng, Nian-Feng
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (02) : 315 - 329
  • [50] Secure Checkpointing using Public Key Cryptography in Mobile Computing
    Biswas, Suparna
    Neogy, Sarmistha
    2011 IEEE 5TH INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (ANTS), 2011,