Design and Analysis of an Efficient Energy Algorithm in Wireless Social Sensor Networks

Because mobile ad hoc networks have characteristics such as lack of center nodes, multi-hop routing and changeable topology, the existing checkpoint technologies for normal mobile networks cannot be applied well to mobile ad hoc networks. Considering the multi-frequency hierarchy structure of ad hoc networks, this paper proposes a hybrid checkpointing strategy which combines the techniques of synchronous checkpointing with asynchronous checkpointing, namely the checkpoints of mobile terminals in the same cluster remain synchronous, and the checkpoints in different clusters remain asynchronous. This strategy could not only avoid cascading rollback among the processes in the same cluster, but also avoid too many message transmissions among the processes in different clusters. What is more, it can reduce the communication delay. In order to assure the consistency of the global states, this paper discusses the correctness criteria of hybrid checkpointing, which includes the criteria of checkpoint taking, rollback recovery and indelibility. Based on the designed Intra-Cluster Checkpoint Dependence Graph and Inter-Cluster Checkpoint Dependence Graph, the elimination rules for different kinds of checkpoints are discussed, and the algorithms for the same cluster checkpoints, different cluster checkpoints, and rollback recovery are also given. Experimental results demonstrate the proposed hybrid checkpointing strategy is a preferable trade-off method, which not only synthetically takes all kinds of resource constraints of Ad hoc networks into account, but also outperforms the existing schemes in terms of the dependence to cluster heads, the recovery time compared to the pure synchronous, and the pure asynchronous checkpoint advantage.

[1]  Leslie Lamport,et al.  Distributed snapshots: determining global states of distributed systems , 1985, TOCS.

[2]  Qin Sen,et al.  Scale-free topology structure in ad hoc networks , 2008, 2008 11th IEEE International Conference on Communication Technology.

[3]  Xiang Li,et al.  An Efficient Checkpointing and Rollback Recovery Scheme for Cluster-Based Multi-channel Ad Hoc Wireless Networks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[4]  Mukesh Singhal,et al.  Mutable checkpoints: a new checkpointing approach for mobile computing systems , 1999, PODC '99.

[5]  Kusum Saluja,et al.  A Non-blocking Checkpointing Algorithm for Non-Deterministic Mobile Ad hoc Networks , 2011 .

[6]  Achour Mostéfaoui,et al.  Communication-Induced Determination of Consistent Snapshots , 1999, IEEE Trans. Parallel Distributed Syst..

[7]  Shuqiang Huang,et al.  A Channel Assignment Scheme for Location Service in Multi-Channel Mobile Ad Hoc Networks , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.

[8]  W. Kent Fuchs,et al.  Lazy checkpoint coordination for bounding rollback propagation , 1992, Proceedings of 1993 IEEE 12th Symposium on Reliable Distributed Systems.

[9]  Hao Wang,et al.  A measure system of zero moment point using wearable inertial sensors , 2016, China Communications.

[10]  Naixue Xiong,et al.  Adaptive unequal protection for wireless video transmission over IEEE 802.11e networks , 2013, Multimedia Tools and Applications.

[11]  Naixue Xiong,et al.  A novel self-tuning feedback controller for active queue management supporting TCP flows , 2010, Inf. Sci..

[12]  Naixue Xiong,et al.  A Distributed Efficient Flow Control Scheme for Multirate Multicast Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[13]  Yuval Tamir,et al.  ERROR RECOVERY IN MULTICOMPUTERS USING GLOBAL CHECKPOINTS , 1984 .

[14]  Weifa Liang,et al.  Minimum-energy all-to-all multicasting in wireless ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[15]  Jiannong Cao,et al.  Checkpointing and rollback of wide-area distributed applications using mobile agents , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[16]  Zhili Zhou,et al.  Fast and accurate near-duplicate image elimination for visual sensor networks , 2017, Int. J. Distributed Sens. Networks.

[17]  Taesoon Park,et al.  Checkpointing and rollback-recovery in distributed systems , 1989 .

[18]  Feihong Gu,et al.  Compressive sensing of piezoelectric sensor response signal for phased array structural health monitoring , 2017, Int. J. Sens. Networks.

[19]  Naixue Xiong,et al.  Green cloud computing schemes based on networks: a survey , 2012, IET Commun..

[20]  Naixue Xiong,et al.  Connectivity and coverage maintenance in wireless sensor networks , 2010, The Journal of Supercomputing.

[21]  Achour Mostéfaoui,et al.  A communication-induced checkpointing protocol that ensures rollback-dependency trackability , 1997, Proceedings of IEEE 27th International Symposium on Fault Tolerant Computing.

[22]  Xingming Sun,et al.  Efficient algorithm for k-barrier coverage based on integer linear programming , 2016, China Communications.

[23]  Miki Yamamoto,et al.  A study on performance improvement of ad hoc multicast by directional antenna , 2009, 2009 15th Asia-Pacific Conference on Communications.

[24]  Nuno Neves,et al.  Adaptive checkpointinng with storage management for mobile environments , 1999 .

[25]  Bin Li,et al.  DSR-Based Cross-Layer QoS Design in Ad Hoc Networks , 2010, 2010 International Conference on Communications and Intelligence Information Security.

[26]  Nadia Boukhatem,et al.  End-to-end routing through a hybrid ad hoc architecture for V2V and V2I communications , 2010, 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).

[27]  Naixue Xiong,et al.  Distributed k-connected fault-tolerant topology control algorithms with PSO in future autonomic sensor systems , 2012, Int. J. Sens. Networks.

[28]  Naixue Xiong,et al.  Using Multi-Modal Semantic Association Rules to fuse keywords and visual features automatically for Web image retrieval , 2011, Inf. Fusion.

[29]  Wei Zhou,et al.  DistressNet: a wireless ad hoc and sensor network architecture for situation management in disaster response , 2010, IEEE Communications Magazine.

[30]  Willy Zwaenepoel,et al.  The performance of consistent checkpointing , 1992, [1992] Proceedings 11th Symposium on Reliable Distributed Systems.

[31]  L. Ganesan,et al.  Security in multicast mobile ad-hoc networks , 2009, 2009 First International Conference on Advanced Computing.

[32]  Sarmistha Neogy,et al.  Checkpointing Using Mobile Agents for Mobile Computing System , 2009 .

[33]  Naixue Xiong,et al.  Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.

[34]  Zhongxun Zhu,et al.  Utility Maximization Resource Allocation in Wireless Networks: Methods and Algorithms , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[35]  Robert E. Strom,et al.  Optimistic recovery in distributed systems , 1985, TOCS.

[36]  Bharat K. Bhargava,et al.  Independent checkpointing and concurrent rollback for recovery in distributed systems-an optimistic approach , 1988, Proceedings [1988] Seventh Symposium on Reliable Distributed Systems.

[37]  Ing-Ray Chen,et al.  Movement-based checkpointing and logging for failure recovery of database applications in mobile environments , 2008, Distributed and Parallel Databases.

[38]  Parveen Kumar,et al.  Asynchronous Checkpointing and Optimistic Message Logging for Mobile Ad Hoc Networks , 2011 .

[39]  Trilok Chand Aseri,et al.  A Review of Current Multicast Routing Protocol of Mobile Ad Hoc Network , 2010, 2010 Second International Conference on Computer Modeling and Simulation.

[40]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..