Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.

Slides:



Advertisements
Similar presentations
Recovery Techniques in Mobile Databases Prepared by Ammar Hamamra.
Advertisements

MSS S i Half Reply Other MSSs ACCEPT OR REJECT MH H i NEWTKT REQUESTACK ACKs ART Start ART End AWT Start AWT End.
1 Fault-Tolerance Techniques for Mobile Agent Systems Prepared by: Wong Tsz Yeung Date: 11/5/2001.
Cell Design to Maximize Capacity in CDMA Networks Robert Akl, D.Sc.
Expected-Reliability Analysis for Wireless CORBA with Imperfect Components Chen Xinyu
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
CS 795 – Spring  “Software Systems are increasingly Situated in dynamic, mission critical settings ◦ Operational profile is dynamic, and depends.
Jan 13, 2006Lahore University of Management Sciences1 Protection Routing in an MPLS Network using Bandwidth Sharing with Primary Paths Zartash Afzal Uzmi.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Channel Allocation for the GPRS Design and Performance Study Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science and Information Engineering.
Authors: Lyu, M.R., Xinyu Chen, and Tsz Yeung Wong From : Intelligent Systems, IEEE [see also IEEE Intelligent Systems and Their Applications vol.19,Issue.
Queueing Analysis for Access Points with Failures and Handoffs of Mobile Stations in Wireless Networks Chen Xinyu and Michael R. Lyu The Chinese Univ.
Terminal Bridge Extension Over Distributed Architecture MSc. Sami Saalasti.
Copyright 2004 Koren & Krishna ECE655/Ckpt Part.11.1 Fall 2006 UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Fault Tolerant Computing.
CS-550 (M.Soneru): Recovery [SaS] 1 Recovery. CS-550 (M.Soneru): Recovery [SaS] 2 Recovery Computer system recovery: –Restore the system to a normal operational.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Distributed Token Circulation in Mobile Ad Hoc Networks Navneet Malpani, Intel Corp. Nitin Vaidya, Univ. Illinois Urbana-Champaign Jennifer Welch, Texas.
Present by Chen, Ting-Wei Adaptive Task Checkpointing and Replication: Toward Efficient Fault-Tolerant Grids Maria Chtepen, Filip H.A. Claeys, Bart Dhoedt,
The Chinese Univ. of Hong Kong Node Scheduling Schemes for Coverage Preservation and Fault Tolerance in Wireless Sensor Networks Chen Xinyu Group Meeting.
HOST MOBILITY SUPPORT BAOCHUN BAI. Outline Characteristics of Mobile Network Basic Concepts Host Mobility Support Approaches Hypotheses Simulation Conclusions.
Dept. of Computer Science & Engineering, CUHK Fault Tolerance and Performance Analysis in Wireless CORBA Chen Xinyu Supervisor: Markers: Prof.
16: Distributed Systems1 DISTRIBUTED SYSTEM STRUCTURES NETWORK OPERATING SYSTEMS The users are aware of the physical structure of the network. Each site.
SRDS’03 Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Xinyu Chen and Michael R. Lyu The Chinese Univ. of Hong Kong Hong.
A Survey of Rollback-Recovery Protocols in Message-Passing Systems M. Elnozahy, L. Alvisi, Y. Wang, D. Johnson Carnegie Mellon University Presented by:
Slide 1 Comparison of Inter-Area Rekeying Algorithms for Secure Mobile Group Communication C. Zhang*, B. DeCleene +, J. Kurose*, D. Towsley* * Dept. Computer.
Dept. of Computer Science & Engineering The Chinese Univ. of Hong Kong On Fault Tolerance, Performance, and Reliability for Wireless and Sensor Networks.
1 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Baoshan Gu, Sapna E. George and Sheng- Tzong Cheng.
Wireless CORBA Richard Verhoeven. Content Quick Introduction to CORBA Wireless & Mobile Wireless CORBA Test Case Conclusions.
1 A Mutual Exclusion Algorithm for Ad Hoc Mobile networks Presentation by Sanjeev Verma For COEN th Nov, 2003 J. E. Walter, J. L. Welch and N. Vaidya.
Fault-Tolerant Design for Mobile IPv6 Networks Jenn-Wei Lin and Ming-Feng Yang Graduate Institute of Applied Science and Engineering Fu Jen Catholic University.
Wireless Access and Terminal Mobility in CORBA Dimple Kaul, Arundhati Kogekar, Stoyan Paunov.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
1 A Dynamical Redirection Approach to Enhancing Mobile IP with Fault Tolerance in Cellular Systems Jenn-Wei Lin, Jichiang Tsai, and Chin-Yu Huang IEEE.
EEC 688/788 Secure and Dependable Computing Lecture 7 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
12. Recovery Study Meeting M1 Yuuki Horita 2004/5/14.
ISADS'03 Message Logging and Recovery in Wireless CORBA Using Access Bridge Michael R. Lyu The Chinese Univ. of Hong Kong
1 Detecting and Reducing Partition Nodes in Limited-routing-hop Overlay Networks Zhenhua Li and Guihai Chen State Key Laboratory for Novel Software Technology.
Universität Stuttgart Institute of Parallel and Distributed Systems (IPVS) Universitätsstraße 38 D Stuttgart Contact-Based Mobility Metrics for Delay-
Fault Tolerance in CORBA and Wireless CORBA Chen Xinyu 18/9/2002.
1 Recovery in the Mobile Wireless Environment Using Mobile Agents S. Gadiraju, V. Kumar Presented by Yamin Yu.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Sapna E. George, Ing-Ray Chen Presented By Yinan Li, Shuo Miao April 14, 2009.
1/22 Optimization of Google Cloud Task Processing with Checkpoint-Restart Mechanism Speaker: Sheng Di Coauthors: Yves Robert, Frédéric Vivien, Derrick.
Design and Analysis of Optimal Multi-Level Hierarchical Mobile IPv6 Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
An Efficient Quorum-based Fault- Tolerant Approach for Mobility Agents in Wireless Mobile Networks Yeong-Sheng Chen Chien-Hsun Chen Hua-Yin Fang Department.
Authors: Ing-Ray Chen and Ding-Chau Wang Presented by Chaitanya,Geetanjali and Bavani Modeling and Analysis of Regional Registration Based Mobile Service.
Movement-Based Check-pointing and Logging for Recovery in Mobile Computing Systems Sapna E. George, Ing-Ray Chen, Ying Jin Dept. of Computer Science Virginia.
Reliability of Wireless sensors with code attestation for intrusion detection Ing-Ray Chen, Yating Wang, Ding-Chau Wang Information Processing Letters.
1 Self-Certified Group Key-Generation for Ad Hoc Clusters in Wireless Sensor Networks Ortal Arazi, Hairong Qi Dept. Electrical & Computer Engineering The.
Presented by Rukmini and Diksha Chauhan Virginia Tech 2 nd May, 2007 Movement-Based Checkpointing and Logging for Recovery in Mobile Computing Systems.
USHA: A Practical Vertical Handoff Solution Ling-Jyh Chen, Tony Sun, Mario Gerla Computer Science Department, UCLA.
I owa S tate U niversity Laboratory for Advanced Networks (LAN) Coverage and Connectivity Control of Wireless Sensor Networks under Mobility Qiang QiuAhmed.
CSE Wireless and Adhoc networks Instructor: Ayman Alharbi Computer Engineering Dept. (Head of dept. ) Why ?
On Detecting Termination in Cognitive Radio Networks Shantanu Sharma 1 and Awadhesh Kumar Singh 2 1 Ben-Gurion University of the Negev, Israel 2 National.
1 Fault Tolerance and Recovery Mostly taken from
Lecture 14 Mobile IP. Mobile IP (or MIP) is an Internet Engineering Task Force (IETF) standard communications protocol that is designed to allow mobile.
Authors: Jiang Xie, Ian F. Akyildiz
Ying Zhang&Krishnendu Chakrabarty Presenter Kasım Sert
How They Interact? Understanding Cyber and Physical Interactions against Fault Propagation in Smart Grid Zhuo Lu, University Of South Florida Mingkui Wei,
Fault Tolerance Distributed Web-based Systems
MR2RP: The Multi-Rate and Multi-Range Routing Protocol for IEEE 802
Wireless CORBA Richard Verhoeven.
Brahim Ayari, Abdelmajid Khelil, Neeraj Suri and Eugen Bleim
Secure Proactive Recovery – a Hardware Based Mission Assurance Scheme
ECE 753: FAULT-TOLERANT COMPUTING
Brahim Ayari, Abdelmajid Khelil and Neeraj Suri
Presentation transcript:

Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu

u Introduction u Mobile Environment – Wireless CORBA u Performance and Effectiveness Analysis of Checkpointing u Conclusions and Future Work Outline

Introduction u Mobile Computing u Permanent failures Physical damage u Transient failures Mobile hosts Wireless links Environmental conditions

Checkpointing and Rollback Recovery u Checkpoint the saved program’s states during failure-free execution u Repair brings the failed device back to normal operation u Rollback reloads the program’s states saved at the most recent checkpoint u Recovery the reprocessing of the program, starting from the most recent checkpoint, applying the logged messages and until the point just before the failure

Wireless CORBA Architecture Visited Domain Home Domain Terminal Domain Access Bridge Static Host Terminal Bridge GIOP Tunnel ab 1 ab 2 mh 1 GTP Messages

Wireless CORBA Architecture Visited Domain ab 1 ab 2 Access Bridge Static Host Home Domain Home Location Agent Terminal Domain Terminal Bridge GIOP Tunnel mh 1 Terminal Domain Terminal Bridge GIOP Tunnel GIOP Tunnel mh 1 Terminal Domain Terminal Bridge GIOP Tunnel mh 1 Terminal Domain Terminal Bridge Access Bridge

u Introduction u Mobile Environment – Wireless CORBA u Performance and Effectiveness Analysis of Checkpointing u Conclusions and Future Work Outline

Program’s Termination Condition u A program is successfully terminated if it receives N computational messages continuously

Assumptions u Failure occurrence, message arrival and handoff event  homogeneous Poisson process with parameter,  and  respectively u Failures do not occur when the program is in the repair or rollback process u A failure is detected as soon as it occurs

Execution without Checkpointing RY0Y0 X0X0 R F1F1 H1H1 Z0Z0 0 t FjFj HkHk m j (1)m j (N)m 1 (n 1 )m 0 (N) X(N) RepairHandoff HH

Conditional Execution Time without checkpointing

LST without checkpointing

LST and Expectation of Program Execution Time

Bounded Situations u Without handoff u Without handoff and failure

Execution with Equi-number Checkpointing CiCi R+C Y i (0) X i (0) R+C F i (1) H i (1) Z i (0) 0 t F i (j) H i (k) m ij (1)m ij (a)m i1 (n i1 )m i0 (a) X i (N,a) Repair + RollbackHandoff C i-1 Checkpointing HHCC

Conditional Execution Time & LST with Checkpointing

LST and Expectation of Program Execution Time

Average Effectiveness u Effective interval: a program produces useful work towards its completion u Wasted interval: Repair and rollback Handoff Checkpoint creation Wasted Computation u Average Effectiveness: how much of the time an MH is in effective interval during an execution

Optimal Checkpointing Interval

Beneficial Condition

Equi-number Checkpointing u Equi-number checkpointing with respect to message number Message number in each checkpointing interval is not changed u Equi-number checkpointing with respect to checkpoint number Checkpoint number is not changed

Equi-number Checkpointing with respect to Checkpoint Number

Equi-number Checkpointing with respect to Message Number

Comparison Between Checkpointing and Without Checkpointing

Average Effectiveness vs. Message Arrival Rate and Handoff Rate

Conclusions u Introduce an equi-number checkpoiting strategy u Derive LST and expectation of program execution time u Derive average effectiveness u Derive optimal checkpointing interval u Identify the beneficial condition

Future Work u Analytical model Message queuing effect during repair and recovery General event distributions u Fault tolerance in ad hoc network Without infrastructure support Self-organizing and adaptive

Thank You