1 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Baoshan Gu, Sapna E. George and Sheng- Tzong Cheng.

Slides:



Advertisements
Similar presentations
A feedback–based scheme for improving TCP performance in Ad Hoc Wireless Networks Group : Manish Mehta Aditya Barve.
Advertisements

Recovery Techniques in Mobile Databases Prepared by Ammar Hamamra.
Mobile Database Recovery
Many useful applications, especially in queueing systems, inventory management, and reliability analysis. A connection between discrete time Markov chains.
Pastry Peter Druschel, Rice University Antony Rowstron, Microsoft Research UK Some slides are borrowed from the original presentation by the authors.
Smart Routers for Cross-Layer Integrated Mobility and Service Management in Mobile IPv6 Systems Authors: Ding-Chau Wang. Weiping He. Ing-Ray Chen Presented.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Expected-Reliability Analysis for Wireless CORBA with Imperfect Components Chen Xinyu
A Server-less Architecture for Building Scalable, Reliable, and Cost-Effective Video-on-demand Systems Jack Lee Yiu-bun, Raymond Leung Wai Tak Department.
Location and Handoff Management Lecture 10. Location and Handoff Management The current point of attachment or location of a subscriber (mobile unit)
Queueing Analysis for Access Points with Failures and Handoffs of Mobile Stations in Wireless Networks Chen Xinyu and Michael R. Lyu The Chinese Univ.
CS-550 (M.Soneru): Recovery [SaS] 1 Recovery. CS-550 (M.Soneru): Recovery [SaS] 2 Recovery Computer system recovery: –Restore the system to a normal operational.
Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu
A Distributed Proxy Server for Wireless Mobile Web Service Kisup Kim, Hyukjoon Lee, and Kwangsue Chung Information Network 2001, 15 th Conference.
Basic queueing system components Arrival patterns What is common to these arrival patterns? What is different? How can we describe/specify an arrival.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
HOST MOBILITY SUPPORT BAOCHUN BAI. Outline Characteristics of Mobile Network Basic Concepts Host Mobility Support Approaches Hypotheses Simulation Conclusions.
Dept. of Computer Science & Engineering, CUHK Fault Tolerance and Performance Analysis in Wireless CORBA Chen Xinyu Supervisor: Markers: Prof.
3-1 Introduction Experiment Random Random experiment.
SRDS’03 Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Xinyu Chen and Michael R. Lyu The Chinese Univ. of Hong Kong Hong.
A Survey of Rollback-Recovery Protocols in Message-Passing Systems M. Elnozahy, L. Alvisi, Y. Wang, D. Johnson Carnegie Mellon University Presented by:
CIS 725 Wireless networks. Low bandwidth High error rates.
Authors: Ing-Ray Chen Weiping He Baoshan Gu Presenters: Yao Zheng.
The Poisson Process. A stochastic process { N ( t ), t ≥ 0} is said to be a counting process if N ( t ) represents the total number of “events” that occur.
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Improving QoS Support in Mobile Ad Hoc Networks Agenda Motivations Proposed Framework Packet-level FEC Multipath Routing Simulation Results Conclusions.
A Survey of Rollback-Recovery Protocols in Message-Passing Systems.
On QoS Guarantees with Reward Optimization for Servicing Multiple Priority Class in Wireless Networks YaoChing Peng Eunyoung Chang.
1 A Dynamical Redirection Approach to Enhancing Mobile IP with Fault Tolerance in Cellular Systems Jenn-Wei Lin, Jichiang Tsai, and Chin-Yu Huang IEEE.
Utilizing Call Admission Control for Pricing Optimization of Multiple Service Classes in Wireless Cellular Networks Authors : Okan Yilmaz, Ing-Ray Chen.
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Queueing Theory What is a queue? Examples of queues: Grocery store checkout Fast food (McDonalds – vs- Wendy’s) Hospital Emergency rooms Machines waiting.
Foundations of Communication on Multiple-Access Channel Dariusz Kowalski.
ISADS'03 Message Logging and Recovery in Wireless CORBA Using Access Bridge Michael R. Lyu The Chinese Univ. of Hong Kong
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
7-1 Introduction to Queueing Theory l Components of a queueing system n probability density function (pdf) of interarrival times n pdf of service times.
Fault Tolerance in CORBA and Wireless CORBA Chen Xinyu 18/9/2002.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
1 Recovery in the Mobile Wireless Environment Using Mobile Agents S. Gadiraju, V. Kumar Presented by Yamin Yu.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Sapna E. George, Ing-Ray Chen Presented By Yinan Li, Shuo Miao April 14, 2009.
Ding-Chau Wang, Weiping He, Ing-Ray Chen Virginia Tech Presented by Weisheng Zhong and Xuchao Zhang CS 5214 (Fall 2015)
1/22 Optimization of Google Cloud Task Processing with Checkpoint-Restart Mechanism Speaker: Sheng Di Coauthors: Yves Robert, Frédéric Vivien, Derrick.
4.3 More Discrete Probability Distributions NOTES Coach Bridges.
Design and Analysis of Optimal Multi-Level Hierarchical Mobile IPv6 Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
J.-H. Cho, I.-R. Chen, M. Eltoweissy ACM/Springer Wireless Networks, 2007 Presented by: Mwaffaq Otoom CS5214 – Spring © 2007 On optimal batch re-keying.
ACN: Transport Protocols in Mobile Environments 1 Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments Ramon Caceres.
THE POISSON DISTRIBUTION
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Authors: Ing-Ray Chen and Ding-Chau Wang Presented by Chaitanya,Geetanjali and Bavani Modeling and Analysis of Regional Registration Based Mobile Service.
Movement-Based Check-pointing and Logging for Recovery in Mobile Computing Systems Sapna E. George, Ing-Ray Chen, Ying Jin Dept. of Computer Science Virginia.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Presented by Rukmini and Diksha Chauhan Virginia Tech 2 nd May, 2007 Movement-Based Checkpointing and Logging for Recovery in Mobile Computing Systems.
Ing-Ray Chen, Member, IEEE, Hamid Al-Hamadi Haili Dong Secure and Reliable Multisource Multipath Routing in Clustered Wireless Sensor Networks 1.
Authors: Jiang Xie, Ian F. Akyildiz
Ad-hoc Networks.
Chapter 25: Advanced Data Types and New Applications
Operating System Reliability
Operating System Reliability
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
EECS 498 Introduction to Distributed Systems Fall 2017
Operating System Reliability
Operating System Reliability
Operating System Reliability
Operating System Reliability
Operating System Reliability
Presentation transcript:

1 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Baoshan Gu, Sapna E. George and Sheng- Tzong Cheng Present by Heng Zhang & Ying Jin

2 Agenda Introduction System Model Analysis of Failure Recovery Probability Numerical Results Failure Recoverability vs. Cost Tradeoff Analysis Conclusion and Future Research

3 Introduction Failure in mobile host Checkpoint strategies Logging strategies Mobility handoff strategies on the Failure Recoverability Mobile Host in a client-server applications can easily fail due to: Low battery power Memory exhaustion Lack of resource (e.g. bandwidth)

4 Introduction (cont’) Checkpoint Application takes a snapshot of its state to save the values of state variables in a persistent storage. So when a failure occurs, MH can roll back to the sate saved at the checkpoint. Checkpoint protocols Coordinated – multiple MH: consistent global checkpoint Uncoordinated –one MH: MH can independently checkpoint its local state

5 Introduction (cont’) Write-event MH receives a message or a user input which modifies the state of the application. No-logging A new checkpoint is created whenever a write- event happens. High checkpoint cost. Logging Create checkpoints periodically Logs write-events which occur in between two consecutive checkpoints. Decrease checkpoint cost More failure recovery time

6 Introduction (cont’) Mobility Handoff strategies on the Failure Recoverability Eager: Always keep the logging and checkpoint information in the base station MH currently resides. Fast failure recovery Lazy: Do not move the checkpoint and logging as the MH moves. A forwarding pointer is established from the current base station to the last base station.

7 System Model (1) Consider a MH, in a client-server distributed application in a mobile wireless environment Periodically checkpoint The write events between 2 consecutive checkpoints recorded by creating log entries Assume the checkpoint and log information will be kept at the base stations Two mobility hand off strategies are considered Eager strategy lazy strategy

8 System Model (2) Eager Strategy When the MH fails, the persistent information (the last checkpoint and message logs afterward) can be found at the current base station. Lazy Strategy When MH moves from cell n to cell 1, a linked list is formed with the length of n-1. If the MH fails, there will be n cell involved in failure recovery and the persistent information will be scattered in the base stations on the forwarding chain.

9 Analysis of Failure Recovery Probability Notations

10 Analysis of Failure Recovery Probability When checkpoint operation is performed, all log entries before the checkpoint will be purged and No. of the log entries N(t) will be reset to 0. The MH will only re-execute those log entries accumulated past the last checkpoint. Eager Mobility Handoff Strategy:

11 TRTR Cdf of the Recovery Time: Analysis of Failure Recovery Probability – Eager Strategy

12 Let t’=t - MTc Analysis of Failure Recovery Probability – Eager Strategy

13 Consider the Special Case: Logs arrive—Poisson process with arrival rate λ MH failure time—Exponentially distributed with failure rate δ Analysis of Failure Recovery Probability – Eager Strategy

14 Analysis of Failure Recovery Probability – Eager Strategy

15 Lazy Mobility Handoff Strategy Suppose that before the failure occur, the No. of cells visited by a MH is k since the last checkpoint. The recovery process: Transferring the last checkpoint and log entries distributed among the k base stations to the current base station via the wired network Transfer the last checkpoint with log entries from the current base station to the MH (via the wireless network) The re-execution of the log entries Analysis of Failure Recovery Probability

16 Cdf of the Recovery Time: Random variable representing the number of base station crossed by the MH past the last checkpoint given that the failure time is t Analysis of Failure Recovery Probability – Lazy Strategy

17 Let t’=t - MTc TRTR r – transmission ratio between wired and wireless communication. Analysis of Failure Recovery Probability – Lazy Strategy

18 Consider the Special Case: Logs arrive— Poisson process with arrival rate λ MH failure time—Exponentially distributed with failure rate δ Residence time–-Exponentially distributed with rate σ Analysis of Failure Recovery Probability – Lazy Strategy

19 Analysis of Failure Recovery Probability – Lazy Strategy

20 Numerical Results Effects of various parameters on failure recoverability Eager handoff + logging Lazy handoff + logging Log arrival rate λ MH failure rate δ Checkpoint interval TcTc Transmission ratio between wired and wireless communication r MH mobility rate σ

21 Numerical Results (cont’) Checkpoint interval1000s Log arrival rate0.1 Mobility rate0.01 Failure rate Transmission ratio0.1 Failure recovery probability under the eager strategy is always better than that under the lazy strategy. Given enough recovery time (T > 0.3) in this case, the failure recoverability offered by the less costly lazy strategy is just as good as the more costly eager strategy. Failure recovery probability for different recovery time

22 Numerical Results (cont’) Checkpoint interval1000s Recovery time0.24s Mobility rate Failure rate Transmission ratio0.1 The system recovery probability decreases dramatically as the log arrival rate increases. Recovery probability difference between the two handoff strategies is small when the log arrival rate is low. The effect of mobility rate on the recovery probability is marginal. Effect of log arrival rate and mobility rate

23 Numerical Results (cont’) Log arrival rate0.1 Recovery time0.24s Mobility rate0.01 Failure rate Transmission ratio0.1 The system recovery probability decreases dramatically as the checkpoint interval increases. The difference in recovery probability at a particular recovery time between the Eager and Lazy strategy becomes more significant as the checkpoint interval increases. Effect of the checkpoint interval

24 Numerical Results (cont’) Log arrival rate0.1 Recovery time0.24s Mobility rate0.01 Checkpoint interval1000s Transmission ratio0.1 The higher the failure rate the higher the recovery probability. As the failure rate increases the difference between the Eager and Lazy mobility handoff strategies becomes less significant. Effect of failure rate

25 Failure Recoverability vs. Cost Tradeoff Analysis Tradeoff: Eager strategy spends less time for a failure recovery, but much more time for maintaining checkpoint and logs than Lazy strategy. Objective: identify a condition under which the recovery probability gained by Eager is most effective considering the cost invested for maintenance.

26 Failure Recoverability vs. Cost Tradeoff Analysis Failure Recoverability versus Cost Ratio: the slope of the recovery probability gained versus the cost invested. Cost invested by Eager Number of checkpoints before failure: Number of moves crossing boundary during a checkpoint period: Number of log entries between two consecutive moves:

27 Failure Recoverability vs. Cost Tradeoff Analysis Cost invested by Lazy C p : communication cost for setting up the link. There exists a best checkpoint interval under which the Eager strategy is most cost-effective over the Lazy strategy. The best cost-effective checkpoint interval for the eager strategy increases as the recovery time increases.

28 Conclusion and Future Research Conclusion Closed-form expressions for the failure recovery time distribution for both Eager and Lazy handoff strategies. Extensive numerical analysis on the effect of model parameters like log arrival rate, mobility rate, failure rate, checkpoint interval. Analysis the tradeoff involved between cost requested to maintain the checkpoints and logs and the recovery cost. Future research Using more sophisticated probabilistic model (SPN) Analysis more other checkpoint strategies

29 Thank you