Hybrid checkpoint protocol for cell-dependent infrastructured networks

Summary form only given. For supporting mission-critical applications in a mobile network system, hybrid checkpointing has been proposed. In a recent mobile network, wireless LAN protocols such as IEEE 802.11 and HIPERLAN are getting popular and communication with mobile computers is realized by using Mobile IP in the Internet. We propose a novel hybrid checkpoint protocol. Here, message logging for mobile computers is achieved based on broadcast property of wireless LAN protocols. In addition, by extending Mobile IP, network overload in recovery is avoided. For both checkpointing and recovery in the proposed protocol, all required information is piggied back to messages. That is, no additional message is required.

[1]  Sean W. Smith,et al.  Minimizing timestamp size for completely asynchronous optimistic recovery with minimal rollback , 1995, Proceedings 15th Symposium on Reliable Distributed Systems.

[2]  Heon Young Yeom,et al.  An asynchronous recovery scheme based on optimistic message logging for mobile computing systems , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[3]  Makoto Takizawa,et al.  Checkpoint-recovery protocol for reliable mobile systems , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[4]  Harrick M. Vin,et al.  The cost of recovery in message logging protocols , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[5]  Franco Zambonelli,et al.  An efficient logging algorithm for incremental replay of message-passing applications , 1999, Proceedings 13th International Parallel Processing Symposium and 10th Symposium on Parallel and Distributed Processing. IPPS/SPDP 1999.

[6]  W. Kent Fuchs,et al.  An adaptive checkpointing protocol to bound recovery time with message logging , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.

[7]  Mukesh Singhal,et al.  Low-cost checkpointing with mutable checkpoints in mobile computing systems , 1998, Proceedings. 18th International Conference on Distributed Computing Systems (Cat. No.98CB36183).

[8]  Dhiraj K. Pradhan,et al.  Recovery in Mobile Wireless Environment: Design and Trade-off Analysis , 1996 .

[9]  Nuno Neves,et al.  Adaptive recovery for mobile environments , 1997, CACM.

[10]  Heon Young Yeom,et al.  An efficient algorithm for causal message logging , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[11]  W. Kent Fuchs,et al.  Message logging optimization for wireless networks , 2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems.

[12]  Taesoon Park,et al.  Communication pattern based checkpointing coordination for fault-tolerant distributed computing systems , 1998, Proceedings Twelfth International Conference on Information Networking (ICOIN-12).

[13]  Mukesh Singhal,et al.  On the impossibility of min-process non-blocking checkpointing and an efficient checkpointing algorithm for mobile computing systems , 1998, Proceedings. 1998 International Conference on Parallel Processing (Cat. No.98EX205).

[14]  Michael B. Dillencourt,et al.  An efficient checkpointing algorithm for distributed systems implementing reliable communication channels , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.

[15]  Gilles Muller,et al.  Performance of Consistent Checkpointing in a Modular Operating System: Results of the FTM Experiment , 1994, EDCC.

[16]  Mukesh Singhal,et al.  Mutable checkpoints: a new checkpointing approach for mobile computing systems , 1999, PODC '99.

[17]  Mukesh Singhal,et al.  Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems , 1996, IEEE Trans. Parallel Distributed Syst..

[18]  Leslie Lamport,et al.  Distributed snapshots: determining global states of distributed systems , 1985, TOCS.

[19]  Charles E. Perkins,et al.  IP Mobility Support , 1996, RFC.

[20]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[21]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[22]  Lorenzo Alvisi,et al.  Reasons for a pessimistic or optimistic message logging protocol in MPI uncoordinated failure, recovery , 2009, 2009 IEEE International Conference on Cluster Computing and Workshops.