A communication-induced checkpointing and asynchronous recovery protocol for mobile computing systems

Tongchit Tantikul, D. Manivannan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

Mobile computing systems have many constraints such as low battery power, low bandwidth, high mobility and lack of stable storage which are not presented in static distributed systems. In this paper, we propose an efficient communication-induced checkpointing protocol for mobile computing systems. We also propose an asynchronous recovery protocol based on the checkpointing protocol. Mobile support stations control major parts of the checkpointing and recovery such as storing and tracing the checkpoints, requesting rollback and logging messages, so that mobile hosts do not incur much overhead. The recovery algorithm has no domino effect and a failed process needs to roll back to its latest checkpoint and request only a subset of the processes to rollback to a consistent checkpoint. Our recovery protocol uses selective message logging at the mobile support station to handle the messages lost due to roll-back.

Original languageEnglish
Title of host publicationProceedings - Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005
Pages70-74
Number of pages5
DOIs
StatePublished - 2005
Event6th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005 - Dalian, China
Duration: Dec 5 2005Dec 8 2005

Publication series

NameParallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings
Volume2005

Conference

Conference6th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005
Country/TerritoryChina
CityDalian
Period12/5/0512/8/05

Keywords

  • Distributed checkpointing
  • Failure recovery
  • Fault-tolerance
  • Mobile computing system

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Hardware and Architecture
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'A communication-induced checkpointing and asynchronous recovery protocol for mobile computing systems'. Together they form a unique fingerprint.

Cite this