Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Baoshan Gu, Sapna E. George and Sheng- Tzong Cheng.

Similar presentations


Presentation on theme: "1 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Baoshan Gu, Sapna E. George and Sheng- Tzong Cheng."— Presentation transcript:

1 1 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Baoshan Gu, Sapna E. George and Sheng- Tzong Cheng Present by Heng Zhang & Ying Jin

2 2 Agenda Introduction System Model Analysis of Failure Recovery Probability Numerical Results Failure Recoverability vs. Cost Tradeoff Analysis Conclusion and Future Research

3 3 Introduction Failure in mobile host Checkpoint strategies Logging strategies Mobility handoff strategies on the Failure Recoverability Mobile Host in a client-server applications can easily fail due to: Low battery power Memory exhaustion Lack of resource (e.g. bandwidth)

4 4 Introduction (cont’) Checkpoint Application takes a snapshot of its state to save the values of state variables in a persistent storage. So when a failure occurs, MH can roll back to the sate saved at the checkpoint. Checkpoint protocols Coordinated – multiple MH: consistent global checkpoint Uncoordinated –one MH: MH can independently checkpoint its local state

5 5 Introduction (cont’) Write-event MH receives a message or a user input which modifies the state of the application. No-logging A new checkpoint is created whenever a write- event happens. High checkpoint cost. Logging Create checkpoints periodically Logs write-events which occur in between two consecutive checkpoints. Decrease checkpoint cost More failure recovery time

6 6 Introduction (cont’) Mobility Handoff strategies on the Failure Recoverability Eager: Always keep the logging and checkpoint information in the base station MH currently resides. Fast failure recovery Lazy: Do not move the checkpoint and logging as the MH moves. A forwarding pointer is established from the current base station to the last base station.

7 7 System Model (1) Consider a MH, in a client-server distributed application in a mobile wireless environment Periodically checkpoint The write events between 2 consecutive checkpoints recorded by creating log entries Assume the checkpoint and log information will be kept at the base stations Two mobility hand off strategies are considered Eager strategy lazy strategy

8 8 System Model (2) Eager Strategy When the MH fails, the persistent information (the last checkpoint and message logs afterward) can be found at the current base station. Lazy Strategy When MH moves from cell n to cell 1, a linked list is formed with the length of n-1. If the MH fails, there will be n cell involved in failure recovery and the persistent information will be scattered in the base stations on the forwarding chain.

9 9 Analysis of Failure Recovery Probability Notations

10 10 Analysis of Failure Recovery Probability When checkpoint operation is performed, all log entries before the checkpoint will be purged and No. of the log entries N(t) will be reset to 0. The MH will only re-execute those log entries accumulated past the last checkpoint. Eager Mobility Handoff Strategy:

11 11 TRTR Cdf of the Recovery Time: Analysis of Failure Recovery Probability – Eager Strategy

12 12 Let t’=t - MTc Analysis of Failure Recovery Probability – Eager Strategy

13 13 Consider the Special Case: Logs arrive—Poisson process with arrival rate λ MH failure time—Exponentially distributed with failure rate δ Analysis of Failure Recovery Probability – Eager Strategy

14 14 Analysis of Failure Recovery Probability – Eager Strategy

15 15 Lazy Mobility Handoff Strategy Suppose that before the failure occur, the No. of cells visited by a MH is k since the last checkpoint. The recovery process: Transferring the last checkpoint and log entries distributed among the k base stations to the current base station via the wired network Transfer the last checkpoint with log entries from the current base station to the MH (via the wireless network) The re-execution of the log entries Analysis of Failure Recovery Probability

16 16 Cdf of the Recovery Time: Random variable representing the number of base station crossed by the MH past the last checkpoint given that the failure time is t Analysis of Failure Recovery Probability – Lazy Strategy

17 17 Let t’=t - MTc TRTR r – transmission ratio between wired and wireless communication. Analysis of Failure Recovery Probability – Lazy Strategy

18 18 Consider the Special Case: Logs arrive— Poisson process with arrival rate λ MH failure time—Exponentially distributed with failure rate δ Residence time–-Exponentially distributed with rate σ Analysis of Failure Recovery Probability – Lazy Strategy

19 19 Analysis of Failure Recovery Probability – Lazy Strategy

20 20 Numerical Results Effects of various parameters on failure recoverability Eager handoff + logging Lazy handoff + logging Log arrival rate λ MH failure rate δ Checkpoint interval TcTc Transmission ratio between wired and wireless communication r MH mobility rate σ

21 21 Numerical Results (cont’) Checkpoint interval1000s Log arrival rate0.1 Mobility rate0.01 Failure rate0.0001 Transmission ratio0.1 Failure recovery probability under the eager strategy is always better than that under the lazy strategy. Given enough recovery time (T > 0.3) in this case, the failure recoverability offered by the less costly lazy strategy is just as good as the more costly eager strategy. Failure recovery probability for different recovery time

22 22 Numerical Results (cont’) Checkpoint interval1000s Recovery time0.24s Mobility rate0.01 0.001 Failure rate0.0001 Transmission ratio0.1 The system recovery probability decreases dramatically as the log arrival rate increases. Recovery probability difference between the two handoff strategies is small when the log arrival rate is low. The effect of mobility rate on the recovery probability is marginal. Effect of log arrival rate and mobility rate

23 23 Numerical Results (cont’) Log arrival rate0.1 Recovery time0.24s Mobility rate0.01 Failure rate0.0001 Transmission ratio0.1 The system recovery probability decreases dramatically as the checkpoint interval increases. The difference in recovery probability at a particular recovery time between the Eager and Lazy strategy becomes more significant as the checkpoint interval increases. Effect of the checkpoint interval

24 24 Numerical Results (cont’) Log arrival rate0.1 Recovery time0.24s Mobility rate0.01 Checkpoint interval1000s Transmission ratio0.1 The higher the failure rate the higher the recovery probability. As the failure rate increases the difference between the Eager and Lazy mobility handoff strategies becomes less significant. Effect of failure rate

25 25 Failure Recoverability vs. Cost Tradeoff Analysis Tradeoff: Eager strategy spends less time for a failure recovery, but much more time for maintaining checkpoint and logs than Lazy strategy. Objective: identify a condition under which the recovery probability gained by Eager is most effective considering the cost invested for maintenance.

26 26 Failure Recoverability vs. Cost Tradeoff Analysis Failure Recoverability versus Cost Ratio: the slope of the recovery probability gained versus the cost invested. Cost invested by Eager Number of checkpoints before failure: Number of moves crossing boundary during a checkpoint period: Number of log entries between two consecutive moves:

27 27 Failure Recoverability vs. Cost Tradeoff Analysis Cost invested by Lazy C p : communication cost for setting up the link. There exists a best checkpoint interval under which the Eager strategy is most cost-effective over the Lazy strategy. The best cost-effective checkpoint interval for the eager strategy increases as the recovery time increases.

28 28 Conclusion and Future Research Conclusion Closed-form expressions for the failure recovery time distribution for both Eager and Lazy handoff strategies. Extensive numerical analysis on the effect of model parameters like log arrival rate, mobility rate, failure rate, checkpoint interval. Analysis the tradeoff involved between cost requested to maintain the checkpoints and logs and the recovery cost. Future research Using more sophisticated probabilistic model (SPN) Analysis more other checkpoint strategies

29 29 Thank you


Download ppt "1 On Failure Recoverability of Client-Server Applications in Mobile Wireless Environments Ing-Ray Chen, Baoshan Gu, Sapna E. George and Sheng- Tzong Cheng."

Similar presentations


Ads by Google