SRDS’03 Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Xinyu Chen and Michael R. Lyu The Chinese Univ. of Hong Kong Hong.

Slides:



Advertisements
Similar presentations
Recovery Techniques in Mobile Databases Prepared by Ammar Hamamra.
Advertisements

IDMP-based Fast Handoffs and Paging in IP-based Cellular Networks IEEE 3G Wireless Conference, 2001 李威廷 11/22/2001 Telcordia.
1 An Adaptive GA for Multi Objective Flexible Manufacturing Systems A. Younes, H. Ghenniwa, S. Areibi uoguelph.ca.
1 Fault-Tolerance Techniques for Mobile Agent Systems Prepared by: Wong Tsz Yeung Date: 11/5/2001.
SELECT: Self-Learning Collision Avoidance for Wireless Networks Chun-Cheng Chen, Eunsoo, Seo, Hwangnam Kim, and Haiyun Luo Department of Computer Science,
A Seamless Handoff Approach of Mobile IP Protocol for Mobile Wireless Data Network. 資研一 黃明祥.
Expected-Reliability Analysis for Wireless CORBA with Imperfect Components Chen Xinyu
Delay-Minimized Route Design for Wireless Sensor-Actuator Networks Edith C.-H. Ngai 1, Jiangchuan Liu 2, and Michael R. Lyu 1 1 Department of Computer.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Authors: Lyu, M.R., Xinyu Chen, and Tsz Yeung Wong From : Intelligent Systems, IEEE [see also IEEE Intelligent Systems and Their Applications vol.19,Issue.
Queueing Analysis for Access Points with Failures and Handoffs of Mobile Stations in Wireless Networks Chen Xinyu and Michael R. Lyu The Chinese Univ.
Terminal Bridge Extension Over Distributed Architecture MSc. Sami Saalasti.
Copyright 2004 Koren & Krishna ECE655/Ckpt Part.11.1 Fall 2006 UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Fault Tolerant Computing.
CS-550 (M.Soneru): Recovery [SaS] 1 Recovery. CS-550 (M.Soneru): Recovery [SaS] 2 Recovery Computer system recovery: –Restore the system to a normal operational.
PROGRESS project: Internet-enabled monitoring and control of embedded systems (EES.5413)  Introduction Networked devices make their capabilities known.
Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
EWSN 04 – Berlin, Jan. 20, 2004 Silence is Golden with High Probability: Maintaining a Connected Backbone in Wireless Sensor Networks Paolo Santi* Janos.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
1 Introduction to Load Balancing: l Definition of Distributed systems. Collection of independent loosely coupled computing resources. l Load Balancing.
HOST MOBILITY SUPPORT BAOCHUN BAI. Outline Characteristics of Mobile Network Basic Concepts Host Mobility Support Approaches Hypotheses Simulation Conclusions.
Dept. of Computer Science & Engineering, CUHK Fault Tolerance and Performance Analysis in Wireless CORBA Chen Xinyu Supervisor: Markers: Prof.
A Progressive Fault Tolerant Mechanism in Mobile Agent Systems Michael R. Lyu and Tsz Yeung Wong July 27, 2003 SCI Conference Computer Science Department.
Dept. of Computer Science & Engineering The Chinese Univ. of Hong Kong On Fault Tolerance, Performance, and Reliability for Wireless and Sensor Networks.
1 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Baoshan Gu, Sapna E. George and Sheng- Tzong Cheng.
Authors: Ing-Ray Chen Weiping He Baoshan Gu Presenters: Yao Zheng.
Checkpointing and Recovery. Purpose Consider a long running application –Regularly checkpoint the application Expensive task –In case of failure, restore.
Wireless CORBA Richard Verhoeven. Content Quick Introduction to CORBA Wireless & Mobile Wireless CORBA Test Case Conclusions.
Enhanced power efficient sleep mode operation for IEEE e based WiMAX Shengqing Zhu, and Tianlei Wang IEEE Mobile WiMAX Symposium, 2007 IEEE Mobile.
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
Presented By HaeJoon Lee Yanyan Shen, Beng Chin Ooi, Bogdan Marius Tudor National University of Singapore Wei Lu Renmin University Cang Chen Zhejiang University.
Table 3:Yale Result Table 2:ORL Result Introduction System Architecture The Approach and Experimental Results A Face Processing System Based on Committee.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
William Easton. Introduction  Mobile Environments  Locking and Data Starvation  Mobile DB Architecture  Timing Mechanisms  Static Timer  Dynamic.
Politecnico di Torino Dipartimento di Automatica ed Informatica TORSEC Group Performance of Xen’s Secured Virtual Networks Emanuele Cesena Paolo Carlo.
The Chinese Univ. of Hong Kong Dept. of Computer Science & Engineering A Point-Distribution Index and Its Application to Sensor Grouping Problem Y. Zhou.
1 A Dynamical Redirection Approach to Enhancing Mobile IP with Fault Tolerance in Cellular Systems Jenn-Wei Lin, Jichiang Tsai, and Chin-Yu Huang IEEE.
IP Services over Bluetooth: Leading the Way to a New Mobility Markus Albrecht Matthias Frank Peter Martini Markus Schetelig Asko Vilavaara Andre Wenzel.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Optimal Selection of Power Saving Classes in IEEE e Lei Kong, Danny H.K. Tsang Department of Electronic and Computer Engineering Hong Kong University.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Checkpointing and Recovery. Purpose Consider a long running application –Regularly checkpoint the application Expensive task –In case of failure, restore.
ISADS'03 Message Logging and Recovery in Wireless CORBA Using Access Bridge Michael R. Lyu The Chinese Univ. of Hong Kong
Fault Tolerance in CORBA and Wireless CORBA Chen Xinyu 18/9/2002.
1 Service Charge and Energy- Aware Vertical Handoff in Integrated IEEE e/ Networks Youngkyu Choi and Sunghyun Choi School of Electrical Engineering.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu Yu Kang, Yangfan Zhou, Zibin Zheng, and Michael R. Lyu {ykang,yfzhou,
Sapna E. George, Ing-Ray Chen Presented By Yinan Li, Shuo Miao April 14, 2009.
January 6, Mobile Computing COE 446 Network Operation Tarek Sheltami KFUPM CCSE COE Principles of.
An Efficient Quorum-based Fault- Tolerant Approach for Mobility Agents in Wireless Mobile Networks Yeong-Sheng Chen Chien-Hsun Chen Hua-Yin Fang Department.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Authors: Ing-Ray Chen and Ding-Chau Wang Presented by Chaitanya,Geetanjali and Bavani Modeling and Analysis of Regional Registration Based Mobile Service.
Mobile IP 순천향대학교 전산학과 문종식
DMAP: integrated mobility and service management in mobile IPv6 systems Authors: Ing-Ray Chen Weiping He Baoshan Gu Presenters: Chia-Shen Lee Xiaochen.
Movement-Based Check-pointing and Logging for Recovery in Mobile Computing Systems Sapna E. George, Ing-Ray Chen, Ying Jin Dept. of Computer Science Virginia.
Presented by Rukmini and Diksha Chauhan Virginia Tech 2 nd May, 2007 Movement-Based Checkpointing and Logging for Recovery in Mobile Computing Systems.
Lecture 14 Mobile IP. Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile.
Introduction to Hypothesis Testing. Hypothesis Testing The general goal of a hypothesis test is to rule out chance (sampling error) as a plausible explanation.
Prof. Enrico Zio Availability of Systems Prof. Enrico Zio Politecnico di Milano Dipartimento di Energia.
Towards Optimal Sleep Scheduling in Sensor Networks for Rare-Event Detection Qing Cao, Tarek Abdelzaher, Tian He, John Stankovic Department of Computer.
Authors: Jiang Xie, Ian F. Akyildiz
Introduction to Load Balancing:
EEC 688/788 Secure and Dependable Computing
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
MR2RP: The Multi-Rate and Multi-Range Routing Protocol for IEEE 802
EEC 688/788 Secure and Dependable Computing
Wireless CORBA Richard Verhoeven.
EEC 688/788 Secure and Dependable Computing
Mobility Support in Wireless LAN
Presentation transcript:

SRDS’03 Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Xinyu Chen and Michael R. Lyu The Chinese Univ. of Hong Kong Hong Kong Florence, Italy

SRDS’03 CUHK Outline Introduction A mobile environment – Wireless CORBA Performance analysis with and without checkpointing Analytical results and comparisons Conclusions

SRDS’03 CUHK Introduction Checkpointing and Rollback Recovery Checkpointing  Save program ’ s states during failure-free execution Repair  bring the failed device back to normal operation Rollback  reload the program ’ s states saved at the most recent checkpoint Recovery  Reprocess the program, starting from the most recent checkpoint by applying the logged messages, until the point just before the failure

SRDS’03 CUHK Wireless CORBA Architecture Visited Domain Home Domain Terminal Domain Access Bridge Static Host Terminal Bridge GIOP Tunnel ab 1 ab 2 mh 1 GTP Messages Control message Computational message GIOP: General Inter-ORB Protocol GTP: GIOP Tunnel Protocol

SRDS’03 CUHK Wireless CORBA Architecture Visited Domain ab 1 ab 2 Access Bridge Static Host Home Domain Home Location Agent Terminal Domain Terminal Bridge GIOP Tunnel mh 1 Terminal Domain Terminal Bridge GIOP Tunnel GIOP Tunnel mh 1 Terminal Domain Terminal Bridge GIOP Tunnel mh 1 Terminal Domain Terminal Bridge Access Bridge Handoff: a mechanism for a mobile host to seamlessly change a connection from one Access Bridge to another

SRDS’03 CUHK Program’s Termination Condition GTP messages  Control message  Computational message: the number is not changed A program on a mobile host is successfully terminated if it continuously receives n computational messages Formulate the expected program execution time with message number n

SRDS’03 CUHK State Transition without Checkpointing  State 0 – normal, State 1– repair, State 2 – handoff 0 21      Generally distributed random variables  H: handoff time  R: repair time

SRDS’03 CUHK Expected Program Execution Time Expected repair time Expected program execution time without checkpointing Laplace transform for cumulative distribution function

SRDS’03 CUHK Equi-number Checkpointing Take checkpoints according to the number of received messages (a) Divide the program execution into m equal intervals (m=n/a)  Equi-number checkpointing with respect to message number  Message number in each checkpointing interval is not changed  Equi-number checkpointing with respect to checkpoint number  Checkpoint number is not changed

SRDS’03 CUHK State Transition in Equi-number Checkpointing  State 3 – Composite repair  State 4 – Composite checkpointing 0 2    3 4 /a  A generally distributed random variable  C: Checkpointing time

SRDS’03 CUHK Composite States State 3 – Composite repair  State 5 – repair, State 6 – rollback, State 7 – handoff 567     3 State 4 – Composite checkpointing  State 8 – checkpointing, State 9 – handoff 4 89   67 9

SRDS’03 CUHK Expected Program Execution Time Expected sojourn time in State 3 Expected program execution time with equi-number checkpointing = m

SRDS’03 CUHK Average Effectiveness Effective interval: a program produces useful work towards its completion Wasted interval:  Repair and rollback  Handoff  Checkpoint creation  Wasted computation Average Effectiveness: how much of the time an MH is in effective interval during an execution

SRDS’03 CUHK Optimal Checkpointing Interval Minimize the expected program execution time or maximize the average effectiveness

SRDS’03 CUHK Beneficial Condition Checkpointing improves the performance

SRDS’03 CUHK Analytical Results and Comparisons (1) Equi-number checkpointing with respect to checkpoint number

SRDS’03 CUHK Analytical Results and Comparisons (2) Checkpointing vs. without checkpointing

SRDS’03 CUHK Average effectiveness vs. message arrival rate and handoff rate Analytical Results and Comparisons (3)

SRDS’03 CUHK Conclusions Introduce equi-number checkpoiting strategies Derive expectations of program execution time with and without checkpointing Obtain average effectiveness Identify the optimal checkpointing interval Identify the beneficial condition Obtain analytical results and comparisons