ISADS'03 Message Logging and Recovery in Wireless CORBA Using Access Bridge Michael R. Lyu The Chinese Univ. of Hong Kong 2003-04-10.

Slides:



Advertisements
Similar presentations
Remus: High Availability via Asynchronous Virtual Machine Replication
Advertisements

TU/e Service Discovery Mechanisms: two case studies / IC2002 Service Discovery Mechanisms: Two case studies Control point Device UPnP Terminal Domain Host.
Recovery Techniques in Mobile Databases Prepared by Ammar Hamamra.
Agent agent Outline of Presentation Introduction: Inter-Agent Message Passing ARP: Design and Analysis Generalization: A Generic Framework Conclusion.
1 Improving TCP Performance over Mobile Networks HALA ELAARAG Stetson University Speaker : Aron ACM Computing Surveys 2002.
Isis 2 Design Choices A few puzzles to think about when considering use of Isis 2 in your work.
Expected-Reliability Analysis for Wireless CORBA with Imperfect Components Chen Xinyu
A Computation Management Agent for Multi-Institutional Grids
ConnectionMigration 818L Network Centric Computing Spring 2002 Ishan Banerjee.
EEC 688/788 Secure and Dependable Computing Lecture 12 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
MPICH-V: Fault Tolerant MPI Rachit Chawla. Outline  Introduction  Objectives  Architecture  Performance  Conclusion.
Queueing Analysis for Access Points with Failures and Handoffs of Mobile Stations in Wireless Networks Chen Xinyu and Michael R. Lyu The Chinese Univ.
Terminal Bridge Extension Over Distributed Architecture MSc. Sami Saalasti.
CS-550 (M.Soneru): Recovery [SaS] 1 Recovery. CS-550 (M.Soneru): Recovery [SaS] 2 Recovery Computer system recovery: –Restore the system to a normal operational.
Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 12 Wenbing Zhao Department of Electrical and Computer Engineering.
FTMP: A Fault-Tolerant Multicast Protocol Louise E. Moser Department of Electrical and Computer Engineering University of California, Santa Barbara.
William Stallings Data and Computer Communications 7 th Edition (Selected slides used for lectures at Bina Nusantara University) Transport Layer.
HOST MOBILITY SUPPORT BAOCHUN BAI. Outline Characteristics of Mobile Network Basic Concepts Host Mobility Support Approaches Hypotheses Simulation Conclusions.
Dept. of Computer Science & Engineering, CUHK Fault Tolerance and Performance Analysis in Wireless CORBA Chen Xinyu Supervisor: Markers: Prof.
SRDS’03 Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Xinyu Chen and Michael R. Lyu The Chinese Univ. of Hong Kong Hong.
1 Making Services Fault Tolerant Pat Chan, Michael R. Lyu Department of Computer Science and Engineering The Chinese University of Hong Kong Miroslaw Malek.
A Progressive Fault Tolerant Mechanism in Mobile Agent Systems Michael R. Lyu and Tsz Yeung Wong July 27, 2003 SCI Conference Computer Science Department.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Dept. of Computer Science & Engineering The Chinese Univ. of Hong Kong On Fault Tolerance, Performance, and Reliability for Wireless and Sensor Networks.
CIS 725 Wireless networks. Low bandwidth High error rates.
Transport Layer Issue in Wireless Ad Hoc and Sensor Network
1 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Baoshan Gu, Sapna E. George and Sheng- Tzong Cheng.
Wireless CORBA Richard Verhoeven. Content Quick Introduction to CORBA Wireless & Mobile Wireless CORBA Test Case Conclusions.
CH2 System models.
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
Fault-Tolerant Design for Mobile IPv6 Networks Jenn-Wei Lin and Ming-Feng Yang Graduate Institute of Applied Science and Engineering Fu Jen Catholic University.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
BFTCloud: A Byzantine Fault Tolerance Framework for Voluntary-Resource Cloud Computing Yilei Zhang, Zibin Zheng, and Michael R. Lyu
A Study of Wireless Virtual Network Computing Kiran Erra.
A Fault Tolerant Protocol for Massively Parallel Machines Sayantan Chakravorty Laxmikant Kale University of Illinois, Urbana-Champaign.
Practical Byzantine Fault Tolerance
Introduction to CORBA University of Mazandran Science & Tecnology By : Esmaill Khanlarpour January
Fault Tolerance in CORBA and Wireless CORBA Chen Xinyu 18/9/2002.
1 Recovery in the Mobile Wireless Environment Using Mobile Agents S. Gadiraju, V. Kumar Presented by Yamin Yu.
Copyright © George Coulouris, Jean Dollimore, Tim Kindberg This material is made available for private study and for direct.
WS-DREAM: A Distributed Reliability Assessment Mechanism for Web Services Zibin Zheng, Michael R. Lyu Department of Computer Science & Engineering The.
1 Transport Control Protocol for Wireless Connections ElAarag and Bassiouni Vehicle Technology Conference 1999.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
MOBILE TCP.
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT By Jyothsna Natarajan Instructor: Prof. Yanqing Zhang Course: Advanced Operating Systems.
5. The Transport Layer 5.1 Role of Transport Layer It bridge the gab between applications and the network layer. Provides reliable cost-effective data.
Rollback-Recovery Protocols I Message Passing Systems Nabil S. Al Ramli.
Movement-Based Check-pointing and Logging for Recovery in Mobile Computing Systems Sapna E. George, Ing-Ray Chen, Ying Jin Dept. of Computer Science Virginia.
FTOP: A library for fault tolerance in a cluster R. Badrinath Rakesh Gupta Nisheeth Shrivastava.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Presented by Rukmini and Diksha Chauhan Virginia Tech 2 nd May, 2007 Movement-Based Checkpointing and Logging for Recovery in Mobile Computing Systems.
USHA: A Practical Vertical Handoff Solution Ling-Jyh Chen, Tony Sun, Mario Gerla Computer Science Department, UCLA.
The Google File System Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung Presenter: Chao-Han Tsai (Some slides adapted from the Google’s series lectures)
Lecture 14 Mobile IP. Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile.
A Study of Wireless Virtual Network Computing
EEC 688/788 Secure and Dependable Computing
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT -Sumanth Kandagatla Instructor: Prof. Yanqing Zhang Advanced Operating Systems (CSC 8320)
CSE 4340/5349 Mobile Systems Engineering
EECS 498 Introduction to Distributed Systems Fall 2017
7.1. CONSISTENCY AND REPLICATION INTRODUCTION
Fault Tolerance Distributed Web-based Systems
CLUSTER COMPUTING.
EEC 688/788 Secure and Dependable Computing
Wireless CORBA Richard Verhoeven.
EEC 688/788 Secure and Dependable Computing
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri and Eugen Bleim
System-Level Support CIS 640.
Brahim Ayari, Abdelmajid Khelil and Neeraj Suri
Presentation transcript:

ISADS'03 Message Logging and Recovery in Wireless CORBA Using Access Bridge Michael R. Lyu The Chinese Univ. of Hong Kong

u Introduction u Wireless CORBA u Fault Tolerance Architecture u Simulation and Evaluation u Conclusions Outline

Introduction u Mobile Computing u Permanent failures Physical damage u Transient failures Mobile hosts Wireless links Environmental conditions u Fault Tolerant CORBA Entity replication

Wireless CORBA Architecture Visited Domain Home Domain Terminal Domain Access Bridge Static Host Terminal Bridge GIOP Tunnel ab 1 ab 2 mh 1 GTP Messages

Wireless CORBA Architecture Visited Domain ab 1 ab 2 Access Bridge Static Host Home Domain Home Location Agent Terminal Domain Terminal Bridge GIOP Tunnel mh 1 Terminal Domain Terminal Bridge GIOP Tunnel mh 1 Terminal Domain Terminal Bridge Access Bridge

Device, Wireless & Mobile Issues u Device Issues Slow processor Small memory Small disk space Low power supply Physical damage Applying mobile host as stable storage  A large number of system messages or a large size of information carried in one message   Checkpoints and logs collection u Wireless Issues High bit error rate Little bandwidth Long transfer delay u Mobile Issue Handoff  Applying Access Bridge as stable storage  Uncoordinated checkpointing Pessimistic message logging

Checkpointing Strategy in MH u Uncoordinated Checkpointing takes its checkpoints independently no coordinated messages or additional control information u Trigger local timer number of received messages u Stable Storage currently associated AB

Message Logging Mechanisms in AB u All messages are transmitted through or to AB u Quasi-sender-based messages intended to MHs from other hosts (ABs or static hosts) needs the sequence number of corresponding acknowledgement u Receiver-based only sequence number of messages sent from MHs

Fault Tolerance Architecture Client Object Terminal Bridge Recovery Mechanism ORB Platform Mobile Host Recovery Mechanism Logging Mechanism Platform Access Bridge Mobile Side Fixed Side Mobile Support Station ORB Recovery Mechanism Logging Mechanism ORB Platform Static Server GIOP Tunnel Multicast Messages Object Replica Recovery Mechanis m

Message Types u CheckpointData u CheckpointDataReply u FetchCheckpoint u FetchCheckpointReply u PurgeCheckpoint

Unavailable Mobile Host u Mobile host disconnection u Mobile host crash u Access bridge crash

Message Status in Access Bridge u Received default status u Sent relayed to its target but before receiving the acknowledgement u Processed after receiving an acknowledgement

Transient Mobile Host Disconnection Access Bridge Mobile Side GTP GTP Adaptation Layer Transport Layer Fixed Side TCP IIOP Connection ID mapping u Fixed side keeps IIOP connections with remote servers for a predefined time period

Mobile Host Handoff Access Bridge 1 Access Bridge 2 Access Bridge 3 Home Location Agent Handoff Location Update

Mobile Host Handoff Home Location Agent Access Bridge 1 Access Bridge 2 Access Bridge 3 Handoff Location Update

Mobile Host Crash Home Location Agent Access Bridge 1 Access Bridge 2 Access Bridge 3

Mobile Host Recovery Home Location Agent Access Bridge 1 Access Bridge 2 Access Bridge 3 Collect last checkpoint and successive message logs Sorted by Ack. SN Reconnect Messages Replay

Log Collection Strategy u The HLA triggers the transfer of checkpoint and message logs u The collected logs are to be saved in the current AB u The timer is adaptive It will extend the time period if an MH moves frequently it will shorten the time period if the MH maintains connection with an AB for a long time u Checkpointing terminates log collection process

Access Bridge Crash u Select Previous or intended AB as stable storage replicates the execution context and message logs in an AB to its previous or intended AB for each MH u Engage handoff as a recovery mechanism creates connectivity with other ABs just as a normal handoff from the previous or intended AB creates connectivity with the previous or intended AB without additional handoff steps u The HLA removes the failed AB from the MH’s track

Garbage Collection u Initiated with log collection by HLA u Initiated by AB selects some MHs as the targets of garbage collection enforces MHs to take checkpoints

u Introduction u Wireless CORBA u Fault Tolerance Architecture u Simulation and Evaluation u Conclusions Outline

Program Execution Time

Handoff Effect

Conclusions u Describes a message logging and failure recovery protocol in wireless CORBA u Employs both quasi-sender-based and receiver-based message logging methods u Tolerates mobile host disconnection, mobile host crash, and access bridge crash u Engages handoff mechanism as a means to recover from access bridge crash

Thank You