Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 A paper by Yi-Bing Lin IEEE Transactions on Mobile Computing Vol. 4, No. 2, March/April ’05 Presented by Derek Pennington Per-User Checkpointing For.

Similar presentations


Presentation on theme: "1 A paper by Yi-Bing Lin IEEE Transactions on Mobile Computing Vol. 4, No. 2, March/April ’05 Presented by Derek Pennington Per-User Checkpointing For."— Presentation transcript:

1 1 A paper by Yi-Bing Lin IEEE Transactions on Mobile Computing Vol. 4, No. 2, March/April ’05 Presented by Derek Pennington Per-User Checkpointing For Mobility Database Failure Restoration

2 2 In GPRS & UMTS networks, the Home Location Register (HLR) maintains the central database of user information. For a given user, an HLR record might contain information such as… Mobile Station (MS) Information –telephone number –International Mobile Subscriber Identity Service Information –subscription info –service restrictions –supplementary services Location Information –address of Serving GPRS Support Node (SGSN)

3 3 But what happens in the event of an HLR failure? Luckily, we periodically backup all of this user data (each backup is called a “checkpoint”). However, the paper’s author argues that the established backup practices have room for improvement.

4 4 Various approaches to checkpointing: All-record checkpoint –backup all users at once (eg: midnight) –costly (bottleneck effect) Per-user checkpoint –each user has its own timing mechanism for backups The paper’s author discusses the existing per-user checkpointing algorithm (henceforth referred to as “Algorithm 1”), and then proposes a new, improved one (“Algorithm 2”)

5 5 Introduction 2)Algorithm 1 vs. Algorithm 2 3)Modeling the Algorithms (the math part) 4)Performance Evaluation of Algorithms 1 & 2 5)Conclusions / Comments Order of Presentation Coverage

6 6 checkpoints happen at random intervals ( t c ) a checkpoint may occur whether or not any user registrations have taken place In the event of an HLR failure, if the user updated the HLR database, but that update didn’t get backed up, the record becomes obsolete When the user’s record is obsolete, the user will lose calls until he performs a registration with the HLR. Algorithm 1

7 7 checkpoint timers are scheduled for random intervals ( t c ) However, checkpoints will only take place when BOTH of the following are true: t p timer expires a registration has taken place Like Algorithm 1, user will lose calls if his record(s) is/are obsolete Algorithm 2 a checkpoint occurs whenever we return to State 0

8 8 For each scenario, will the user’s record(s) be valid after the HLR recovers from its failure? # 4 3 2 1 Scenario NO YESNO YES Algorithm 2Algorithm 1 CP timer fires = registration = failure = LEGEND RECAP

9 9 Introduction Algorithm 1 vs. Algorithm 2 3)Modeling the Algorithms (the math part) 4)Performance Evaluation of Algorithms 1 & 2 5)Conclusions / Comments Order of Presentation Coverage

10 10 Two metrics are used to measure checkpoint algorithm performance: E[t c ] : the expected checkpoint interval –the larger the interval, the less frequent checkpoints will occur –essentially, checkpoint cost is proportional to checkpoint frequency  : the probability that the user’s HLR record is obsolete after an HLR failure/recovery –the smaller “  ” is, the better the checkpoint algorithm’s performance

11 11 Setting the checkpoint timer t p : typical approaches have a fixed t p However, this can lead to congestion with large numbers of users Thus, in Algorithms 1 & 2, t p is a random variable with exponential distribution Density function: …and, in Algorithm 1, since t c = t p from checkpoint to checkpoint, the expected checkpoint interval is: checkpoints per unit time time between checkpoints

12 12 t m –  m  m t p –  p  p = “residual time” of t m = “reverse residual time” of t m = residual time of t p = reverse residual time of t p Finding  for Algorithm 1:

13 13 Consider random variable t : probability density function: f(t) probability distribution function: expected value: E[t] Laplace transform: Let  be the residual time of t: probability density function: probability distribution function: Laplace transform: Finding  for Algorithm 1 (cont’d):

14 14 Also, the density function is the same: In Algorithm 1, we say the backup record is obsolete if, at the moment of HLR failure, the time since the last checkpoint is greater than the time since the last registration In other words: Finding  for Algorithm 1 (cont’d): integrals of the two density functions from r*(s) defined earlier

15 15 One difference between Algorithm 2 and Algorithm 1 is that the checkpoint timer will be reset based on how the previous checkpoint took place –If the previous checkpoint happened due to a timeout event, then the next checkpoint interval is: –If the previous checkpoint happened due to a registration event, then the next checkpoint interval is: –Thus, in our state machine example, we actually have two “State 0”s… Finding E[t] and  for Algorithm 2:

16 16 Checkpoint occurring due to timeout event Checkpoint occurring due to registration Probability that a timeout will occur after a timeout-caused checkpoint Probability that a timeout will occur after a registration-caused checkpoint Probability that a registration will occur after a timeout-caused checkpoint Probability that a registration will occur after a registration-caused checkpoint

17 17 The random variable t c is now essentially a combination of the probability that the last checkpoint happened due to a timeout and the probability that the last checkpoint happened due to a registration: …where: (  x is the probability of being in State “ x ”) and

18 18 remember that comes from Therefore, we can say: timeout-caused checkpoint registration-caused checkpoint

19 19 Based on the figure, we can deduce some limiting probabilities: …which means we know more about p 1 and p 2 : and

20 20 From… …the density function for t c is: …where: …thus:

21 21 The relationships between t p, t m, and allow us to reinterpret f c (t c ) into two different pieces: –f c1 (t c ) : the situation where t p > t m –f c2 (t c ) : the situation where t p < t m We can reexpress f c (t c ) as: …where:

22 22 Expected checkpoint interval for Algorithm 2: What are A 1 and A 2 ?...... integral of the density function plug-in p 1 and p 2

23 23

24 24 So we can also express the expected checkpoint interval for Algorithm 2 as: plug-in A 1 and A 2

25 25 To find the probability of getting an obsolete record, there is no close-form expression when arbitrary f m (t m ) is used The paper uses a mix-Erlang density function –proven as a good approximation to other functions as well as measured data –…and, as a comparison, the regular Erlang density function: Now we need to find  II …

26 26 Continuing, we have the Erlang distribution function: …and the Laplace transform expressed as: Now we need to find  II (cont’d)

27 27 The reverse residual time  m of t m has: –density function: –distribution function: –Laplace transform: And, since E[t m ]=n/ , we can say the following: Now we need to find  II (cont’d)

28 28 For Algorithm 2, consider the two scenarios: –A registration happens before the timeout Checkpoint happens at the time of the timeout –A registration does NOT happen before the timeout In this case, we wait until the next registration to checkpoint To derive  II, we only need to consider the first case… …where: Now we need to find  II (cont’d)

29 29 Then, the density function for the reverse residual time corresponding to g(i, ,t) is: If we say that  c is the reverse residual time of t c, then the density function for  c is: Now we need to find  II (cont’d)

30 30 Finally, we can derive  II : …where……… (next slide) Now we need to find  II (cont’d)

31 31 Now we need to find  II (cont’d) …where:

32 32 Introduction Algorithm 1 vs. Algorithm 2 Modeling the Algorithms (the math part) 4)Performance Evaluation of Algorithms 1 & 2 5)Conclusions / Comments Order of Presentation Coverage

33 33 Algorithm 2: Checkpoint Freq. vs. Registration Freq. as registration frequency increases, so does checkpoint frequency this is what we’d expect Algorithm 2’s Checkpoint Cost Improvement over Algorithm 1 According to the graph, as registrations increase, Algorithm 2 further improves over Algorithm 1. ??? This is not what I would expect –p. 189: “If registration activities are very frequent, then Alg. 2 behaves exactly the same as Alg. 1”

34 34 Algorithm 2: Probability of Obsolete Records After HLR Failure X axis is  1 /  2, where  1 represents intervals with few registrations and  2 represents intervals with many registrations Thus, as we move right, registrations become less frequent Less registrations means less chance of obsolete records, thus, this cost decreases as we move right Algorithm 2’s Obsolete Record Cost Improvement over Algorithm 1 Shows that Alg. 2 has a 20-55% improvement over Alg. 1 This makes sense, because Alg. 2 will checkpoint when a registration occurs if the checkpoint timer has expired… whereas Alg. 1 will have obsolete records in those situations.

35 35 Introduction Algorithm 1 vs. Algorithm 2 Modeling the Algorithms (the math part) Performance Evaluation of Algorithms 1 & 2 5)Conclusions / Comments Order of Presentation Coverage

36 36 Per the analytical results, Algorithm 2 improves upon Algorithm 1 in the following ways: –50+% savings in checkpoint cost ( E[t c ] ) –20-55% improvement in terms of reducing occurrences of obsolete records (  ) Note that this paper does NOT discuss SGSN / VLR failure and/or recovery –all SGSN-based mobile user records are temporary and not backed-up –other papers discuss SGSN failure restoration (see paper’s references) Conclusion

37 37 This paper was heavy on the math, light on the explanations from step to step –Granted, maybe IEEE gave the author a requirement to fit within 6 pages of their magazine? 2x or 3x as long would make it much easier to follow. Derek’s recommended prerequisites: –know the difference between probability density functions and probability distribution functions –know what a Laplace transform is –refresh your memory on integrals and derivations If, in fact, simulations were performed, include the details! He apparently omitted them on purpose. Maybe they’re included in his dissertation, thesis, etc…? Comments

38 38 Thanks! Any questions?


Download ppt "1 A paper by Yi-Bing Lin IEEE Transactions on Mobile Computing Vol. 4, No. 2, March/April ’05 Presented by Derek Pennington Per-User Checkpointing For."

Similar presentations


Ads by Google