SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
ISSN: 2278 – 1323
                                                         Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology
                                                                                                                  Volume 1, Issue 5, July 2012


                       A Failure Recovery
            Scheme in Mobile Computing System Based on
                 Checkpointing and Handoff Count
                                                              Anurag Sachan , Prachi Maheshwari

        Abstract— In Mobile hosts failure probability is high. An efficient checkpointing technique and a failure recovery scheme together can make a mobile
        computing system fault-tolerant. For efficient recovery, information of a mobile host should be kept in an organized manner. Efficiency of a recovery
        scheme can be measured in terms of time and cost. Mobile hosts move randomly and handoff occurs. Information of a single mobile host gets scattered
        over a number of mobile support stations that can be at closer or further distance. Recovery time and cost primarily depend on number of mobile support
        stations from which information to be collected as well as distance among them. Larger the distance, longer the time for communication through message
        passing. Number of mobile support stations from which information to be recovered and distance among them can be delimited by keeping a handoff
        threshold value in each mobile host. Recovery scheme proposed here applies both the measures. Our work optimizes both failure-free and
        failurerecovery operation costs.
        Index Terms— coordinated checkpointing, communication induced checkpointing, domino effect, minimal checkpoint, non-blocking checkponting,
        optimistic logging, message passing systems

                                                  ——————————  ——————————

 1 INTRODUCTION

D      ISTRIBUTED systems today are ubiquitous and enable
       many applications, including client-server systems, transac-
       tion processing, World Wide Web, and scientific comping,
                                                                                     cur to each process, and messages exchanged among the process.

                                                                                        Message-passing systems complicate rollback-recovery be-
 among many others. The vast computing potential of these sys-                       cause messages induce inter-process dependencies during failure-
 tems is often affected by their chances of failures.                                free operation. Upon a failure of one or more processes in a sys-
     Therefore, many techniques have been developed to add relia-                    tem, these dependencies may force some of the processes that did
 bility and high availability to distributed systems. These tech-                    not fail to roll back, creating what is commonly called rollback
 niques include transactions, group communication, and rollback                      propagation. Under some scenarios, rollback propagation may
 recovery, and have different tradeoffs and focuses. For example,                    extend back to the initial state of the computation, losing all the
 transactions focus on data-oriented applications, while group                       work performed before a failure. This situation is known as the
 communication offers an abstraction of an ideal communication                       domino effect.
 system that simplifies the development of reliable applications.
 This survey covers transparent rollback-recovery, which focuses                        The domino effect may occur if each process takes its check-
 on long running applications such as scientific computing and                       points independently—an approach known as independent or
 telecommunication application.                                                      uncoordinated checkpointing. It is obviously desirable to avoid
     Rollback-recovery treats a distributed system as a collection                   the domino effect and therefore several techniques have been
 of application processes that communicate through a network.                        developed to prevent it. One such technique is to perform coordi-
 The processes have access to a stable storage device that is unaf-                  nated checkpointing in which processes coordinate their check-
 fected of all possible failures. Processes achieve fault tolerance                  points in order to save a system-wide consistent state [Chandy
 by using this device to save recovery information periodically                      and Lamport 1985].
 during failure-free execution. Upon a failure, a failed process
 uses the saved information to restart the computation from an                          The entire process of reconfiguring com m unication, at the
 intermediate state, thereby reducing the amount of lost computa-                    MH , w ireless netw ork and backbone w ired netw ork, is know n
 tion. The recovery information includes, at a minimum, the states                   as hand off. The objective of hand off is to m aintain end -to-end
 of the participating processes, called checkpoints. Other recovery                  connectivity in the d ynam ically reconfigured netw ork topolo-
                                                                                     gy. During a hand off, the route of d ata through the w ired ne t-
                    ————————————————                                                 w ork to the MH m ust be upd ated to pass through this new BS.
 Anurag sachan is currently pursuing masters degree program in computer             In ad d ition any state in the old BS associated w ith the MH
  science and engineering engineering in Mahamaya Techinal University, In-
  dia, PH-919990385346. E-mail: anuragsachan2@gmail.com
                                                                                     m ust som ehow be tran sferred to the new BS and the rad io
 Prachi Maheshwari is currently working as asst. prof. in computer science          com m unication m ay also need to be reconfigured .
  and     engineering in Mahamaya Technical University, India, PH-
  919654207157. E-mail: prashi0110@gmail.com                                         2   PREVIOUS WORK

 protocols may require additional information, such as logs of                       A. checkpoint-based rollback recovery
 the interactions with input and output devices, events that oc-                         Upon a failure, checkpoint-based rollback recovery restores
                                                                                                                                                                  111
                                                           All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology
                                                                                                         Volume 1, Issue 5, July 2012

the system state to the most recent consistent set of checkpoints,     d. Communication-induced Checkpointing
that is the recovery line It does not rely on the PWD assumption,          Communication induced checkpointing (CIC) protocols avoid
and so does not need to detect, log, or replay nondeterministic        the domino effect without requiring all checkpoints to be coordi-
events. Checkpoint-based protocols are therefore less restrictive      nated. In these protocols, processes take two kinds of check-
and simpler to implement than log-based rollback-recovery. But         points, local and forced. Local checkpoints can be taken indepen-
checkpoint-based rollback-recovery does not guarantee that pre-        dently, while forced checkpoint must be taken to guarantee the
failure execution can be deterministically regenerated after a         eventual progress of the recovery line. In particular, CIC proto-
rollback.                                                              cols take forced checkpoints to prevent the creation of useless
                                                                       checkpoints, that is checkpoints that will never be part of a con-
a. Uncoordinated Checkpointing                                         sistent global state. Useless checkpoints are not desirable because
   Uncoordinated checkpointing allows each process the maxi-           they do not contribute to the recovery of the system from failures,
mum autonomy in deciding when to take checkpoints. The main            but they consume resources and cause performance overhead.
advantage of this autonomy is that each process may take a
checkpoint when it is most convenient. For example, a process
                                                                       B. LOG-BASED ROLLBACK-RECOVERY
may reduce the overhead by taking checkpoints when the amount
of state information to be saved is small [Wang 1993]. But there          As opposed to checkpoint-based rollback recovery, log-based
are several disadvantages. First, there is the possibility of the      rollback-recovery makes explicit use of the fact that a process
domino effect, which may cause the loss of a large amount of           execution can be modeled as a sequence of deterministic state
useful work, possibly all the way back to the beginning of the         intervals, each starting with the execution of a nondeterministic
computation. Second, a process may take a useless checkpoint           event [Strom and Yemini 1985].
that will never be part of a global consistent state.
                                                                          Log-based rollback-recovery assumes that all nondeterministic
b. Coordinated Checkpointing                                           events can be identified and their corresponding determinants can
   Checkpointing requires processes to broadcast their check-          be logged to stable storage. During failure-free operation, each
points in order to form a consistent global state. Coordinated         process logs the determinants of all the nondeterministic events
checkpointing simplifies recovery and is not susceptible to the        that it observes onto stable storage. Additionally, each process
domino effect, since every process always restarts from its most       also takes checkpoints to reduce the extent of rollback during
recent checkpoint. Also, coordinated checkpointing requires each       recovery. After a failure occurs, the failed processes recover by
process to maintain only one permanent checkpoint on stable            using the checkpoints and logged determinants to replay the cor-
storage, reducing storage overhead and eliminating the need for        responding nondeterministic events precisely as they occurred
garbage collection. Its main disadvantage, however, is the large       during the pre-failure execution.
latency involved in committing output. A straightforward ap-
proach to coordinated checkpointing is to block communications          a. Pessimistic Logging
while the checkpointing protocol executes.                                 Pessimistic logging protocols are designed under the assump-
                                                                       tion that a failure can occur after any nondeterministic event in
c. Minimal Checkpoint Coordination                                     the computation. This assumption is ―pessimistic‖ since in reality,
    Coordinated checkpointing requires all processes to partici-       failures are rare. In their most straightforward form, pessimistic
pate in every checkpoint. This requirement generates valid con-        protocols log to stable storage, the determinant of each nonde-
cerns about its scalability. It is desirable to reduce the number of   terministic event before the event is allowed to affect the compu-
processes involved in a coordinated checkpointing session. This        tation.
can be done since the processes that need to take new check-               In a pessimistic logging system, the observable state of each
points are only those that have communicated with the check-           process is always recoverable. This property has four advantages:
point initiator either directly or indirectly since the last check-    1. Processes can send messages to the outside world without run-
point [Koo and Toueg 1987].                                            ning a special protocol.
    The following two-phase protocol achieves minimal check-           2. Processes restart from their most recent checkpoint upon a
point coordination [Koo and Toueg 1987]. During the first phase,       failure, therefore limiting the extent of execution that has to be
the checkpoint initiator identifies all processes with which it has    replayed.
communicated since the last checkpoint and sends them a re-            3. Recovery is simplified because the effects of a failure are con-
quest. Upon receiving the request, each process in turn identifies     fined only to the processes that fail.
all processes it has communicated with since the last checkpoints      4. Garbage collection is simple.
and sends them a request, and so on, until no more processes can
be identified. During the second phase, all processes identified in    b. Optimistic Logging
the first phase take a checkpoint. The result is a consistent check-      In optimistic logging protocols, processes log determinants
point that involves only the participating processes. In this proto-   asynchronously to stable storage [Strom and Yemini 1985]. These
col, after a process takes a checkpoint, it cannot send any mes-       protocols make the optimistic assumption that logging will com-
sage until the second phase terminates successfully, although          plete before a failure occurs. Determinants are kept in a volatile
receiving a message after the checkpoint has been taken is al-         log, which is periodically flushed to stable storage. Thus, opti-
lowed.                                                                 mistic logging does not require the application to block waiting

                                                                                                                                      112
                                                 All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology
                                                                                                         Volume 1, Issue 5, July 2012

for the determinants to be actually written to stable storage, and     becomes available for reallocation. This feature avoids having
therefore incurs little overhead during failure-free execution.        checkpoints scattered throughout the network while the mobile
However, this advantage comes at the expense of more compli-           host moves around. The mobile host also does not have to main-
cated recovery and garbage collection, and slower output commit,       tain extra links to locate previous checkpoints.
than in pessimistic logging.
                                                                       3 PROBLEM FORMULATION
c. Causal Logging
   Causal logging has the failure-free performance advantages of
optimistic logging while retaining most of the advantages of pes-         MHs move randomly causing handoff. Hence checkpoints of a
simistic logging [Alvisi 1996; Elnozahy 1993]. Like optimistic         single MH are scattered in different MSSs. If an MH fails, recov-
logging, it avoids synchronous access to stable storage except         ery information are to be collected from different MSSs. If di
during output commit. Like pessimistic logging, it allows each         tance between MSSrecovery and the MSSstart is large then re-
process to commit output independently and never creates or-           covery time will be more. In region based recovery scheme, re-
phans, thereby isolating each process from the effects of failures     gion manager is the centralized control. Hence it may get over-
that occur in other processes. Furthermore, causal logging limits      loaded. Moreover if it fails, recovery is not possible.
the rollback of any failed process to the most recent checkpoint
on stable storage. This reduces the storage overhead and the
                                                                       4 ALGORITHM AND IMPLEMENTATION
amount of work at risk. These advantages come at the expense of
a more complex recovery protocol.
                                                                       ALGORITHM:
C. ADAPTIVE CHECKPOINTING                                              In first step connection is initiated and MH stores the id of
   Our approach uses time & leasing to coordinate checkpoint           current MSS.
creation adaptively and indirectly. It says that time can be used to   A link is created in the current MSS structure
implement coordinated checkpointing efficient. Our storage man-        CurrentMSSid field of MH is updated to contain the current
ager uses the leasing mechanism. A 3-level storage hierarchy is        MSSid.
used to save checkpoints.                                              Take a checkpoint of present state of the MH.

a. Checkpoint Creation                                                 HANDOFF PART
    When the application begins, the protocol sets the checkpoint      New connection is setup as soon as MH get attached to it.
timers in all processes with a value equal to the chcckpoint inter-    A link is created in the MSS structure which contains the MH
val. Whenever a timer expires, a. process takes a checkpoint and       after it attaches to it.
resets the timer. The protocol uses a simple re-synchronization        CurrentMSSid field of MH is updated to contain the present
mechanism to roughly synchronize the checkpoint intervals of the       MSSid.
processes, even if drift rates of clocks are different.                Hcount = Hcount + 1

b. Hierarchical Storage Management                                     Here decision is taken on the basis of predefined conditions
   The protocol uses a 3-level storage hierarchy to save check-        on parameters. On success checkpoint is initiated.
points Checkpoints stored in level #1 called soft checkpoints          if(Hcount > Handoff Threshold or Distance Threshold
(SC), they are saved in the mobile host. Level #2 is the stable        between MSS > Threshold value)&&(RSS>RSS_threshold)
storage available in the base stations, level #3 corresponds to the    Take a checkpoint of present state of the MH.
home host. Level #2 and level #3 are both referred to as hard          Hcount = 0 .
checkpoints (HC). Soft checkpoints are less reliable than hard         Update the Number of the MH.
checkpoints because they will be lost if the mobile host fails         Update the checkpoint_location with the current MSS_id.
permanently. Hard checkpoints can survive mobile-host perma-
nent failures but have higher overheads since they must be trans-      If RSS condition is not met, RSS is incremented to avoid the
mitted through the wireless channels.                                  condition of starvation of a MH due to present weak strength of
                                                                       received signal.
c. Hand-Off Procedures
   Before moving to another cell, the process notifies the storage     A coordinated approach is followed to make system more
manager at the current base station. The manager then forwards         Lossless.
the hard checkpoints of the process to the home host. After the        Check the dependency list of the MH.
checkpoint is saved safely by the home host, the checkpoint on         Send checkpoint requests to all MHs that are in the dependency
the base station is removed. f the new cell provides storage ser-      list.
vice, and the process got a lease, then the hard checkpoints can       After that take a checkpoint of the present state of MH.
alternatively sent to the new base station. This hand-off procedure
simplifies garbage collection on base stations. When the mobile        If any MH doesn’t reply in accordance with sender, it means
host leaves the current cell, the space occupied by its checkpoints    that may be executing some process. The sender waits for a

                                                                                                                                    113
                                                 All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                              Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology
                                                                                                       Volume 1, Issue 5, July 2012

defined limit.                                                      RH O=ones(1,N OP)*rad iu s;
if(difference of current time and previous checkpoint time >        [X,Y] = pol2cart(TH ETA,RH O);
Threshold value)                                                    X=X+center(1);
Take checkpoint.                                                    Y=Y+center(2);
                                                                    H =plot(X,Y,style);
A log file is created for making to support recovery.               % axis squ are;
Open the current MSS's log file.
Sequence_number = Sequence_number + 1.                              Failure Free Operation Cost
Save data, MH_id and number of the MH in the log file.              Fu nction            oper_cost           =            fail-
                                                                    u re_free_operation_cost(hT,Cm g_ch,Cm g_ch_transfer,Cper
For saving space, the unnecessary information is cleared time       _ch)
by time.
if(coordinated checkpoint is been taken) Clear dependency list.     oper_cost = (hT * Cm g_ch) + (hT * Cm g_ch_transfer) +
Save the end checkpoint timestamp in local buffer.                  Cper_ch;
Update the Tstamp to reflect the current time.
                                                                    Recovery Cost
MH RECOVERY PART                                                    fu nction         recov_cost          =                Recov-
First of all a request is done.                                     ery_Cost(hT,Cm g_ch_transfer,Cper_ch_transfer)
Get the MSS_id from the checkpoint_location field of MH where
the latest checkpoint was taken.                                    recov_cost = hT * Cm g_ch_transfer + Cper_ch_transfer;
Send the Seq_number and the checkpoint_location values to the
current MSS.                                                        Handoff Procedure and Checkpoints in Network
Request current MSS to send these values to the check-              clc
point_location MSS.                                                 clear all
                                                                    close all
With the help of checkpoint_location MSS log file is accessed.      warning off
Select the log entry corresponding to the MH_id and Seq_number
provided.                                                           net_width = 10;
Retrieve the data from this log file entry.                         net_height = 80;
Send the data to the MH via the current MSS get its last stable     check = 1;
state back.                                                         tot_nodes = 20;
                                                                    traves_MS = 10;
IMPLEMENTATION CODE ON MATLAB                                       hT = 4;

Best Distance Calculating Function
                                                                    % Form Network area....
fu nction best_nod e_inx = best_d ist(p nt1,nod es)                 node_count = 1;
                                                                    all_x = [];
for i = 1:length(nod es)                                            all_y = [];
  x1 = nod es(i).x;                                                 for j = 0:9:net_height
  y1 = nod es(i).y;                                                     if check==1
  pnt2 = [x1 y1];                                                           start = 0;
  d ist_val(i,1) = nod e_d istance(p nt1,pnt2);                             check = 0;
end                                                                     else
                                                                            start = 5;
[sval sinx] = sort(d ist_val);                                              check = 1;
                                                                        end
best_nod e_inx = sinx(1);                                               for i = start:10.3:net_height
                                                                            circle([j,i],6,7,'-');
Mobile Host Representation By Circle                                        hold on
fu nction H =circle(center,rad ius,N OP,style)                              drawnow
                                                                            plot(j,i,j,i,'.','color','green');
if (nargin <3),                                                             nodes(node_count).x = j;
 error('Please see help for IN PUT DATA.');                                 nodes(node_count).y = i;
elseif (nargin==3)                                                          nodes(node_count).id = node_count;
   style='b-';                                                              node_count = node_count+1;
end ;                                                                       all_x = [all_x;i];
TH ETA=linspace(0,2*pi,N OP);                                               all_y = [all_y;j];
                                                                                                                               114
                                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                 Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology
                                                                                          Volume 1, Issue 5, July 2012

    end                                                           s_min_y = s_min_y-1;
end                                                         end
axis square;

min_x = min(all_x);                                       h1                                     =
max_x = max(all_x);                                   plot(s_min_x,s_min_y,s_min_x,s_min_y,'*','c
                                                      olor','red');
min_y = min(all_y);                                       pnt1 = [s_min_x s_min_y] ;
max_y = max(all_y);                                       best_node_inx = best_dist(pnt1,nodes);
                                                          best_x = nodes(best_node_inx).x;
                                                          best_y = nodes(best_node_inx).y;
% Making Random nodes....                                 best_pnt = [best_x best_y];
for i = 1:tot_nodes                                       hold on
    x = round(min_x+(max_x-min_x)*rand);                  drawnow
    y = round(min_y+(max_y-min_y)*rand);
    pnt1 = [x y] ;                                    %     checkpoint calculation....
    best_node_inx = best_dist(pnt1,nodes);                best_node_id = nodes(best_node_inx).id;
    best_x = nodes(best_node_inx).x;                      if isempty(station_count)
    best_y = nodes(best_node_inx).y;                          station_count = station_count+1;
    best_pnt = [best_x best_y];                               station_data     =     [station_data
                                                      best_node_id];
      plot(x,y,x,y,'*','color','red');                        traverse_node    =    [traverse_node
      all_x = [pnt1(1) best_pnt(1)];                  best_node_id];
      all_y = [pnt1(2) best_pnt(2)];                          nodes(best_node_inx).data   =   sta-
      plot(all_x,all_y);                              tion_data;
      hold on                                                 station_count                       =
      drawnow                                         length(traverse_node);
end                                                           sel_nodes        =        [sel_nodes
                                                      best_node_id];
                                                              display(['Mobile Node Travel on '
                                                      num2str(traverse_node(station_count)) ' Mo-
% Making Moving Nodes...                              bile Station....']);
s_min_x = min_x+0.5;                                      elseif                               tra-
s_min_y = min_y+0.5;                                  verse_node(station_count)~=best_node_id
con_x = 1;                                                    station_count = station_count+1;
check = 1;                                                    station_data     =     [station_data
totms = 0;                                            best_node_id];
traverse_node = [];                                           traverse_node    =    [traverse_node
                                                      best_node_id];
station_count = [];                                           nodes(best_node_inx).data   =   sta-
station_data = [];                                    tion_data;
sel_nodes = [];                                               sel_nodes        =        [sel_nodes
last_check_pnt = 1;                                   best_node_id];
while(totms~=traves_MS)                                       display(['Mobile Node Travel on '
                                                      num2str(traverse_node(station_count)) ' Mo-
      if s_min_x<=max_x&&check == 1                   bile Station....']);
          check = 1;                                  %         permanent check point saving...
      else                                                    if rem(station_count,hT)==0
          check = 0;                                              nodes(best_node_inx).data       =
          if s_min_x<=min_x && check == 0             station_data;
              check = 1;                                          last_check_pnt = best_node_inx;
          end                                                     display('Saving Data on Check
      end                                             point...');
      if check ==1                                    %             remove temp datas...
          s_min_x = s_min_x+1;                                    for k = 1:length(sel_nodes)-1
          s_min_y = s_min_y+1;                                        nodes(sel_nodes(k)).data    =
      else                                            '';
          s_min_x = s_min_x-1;                                    end

                                                                                                                  115
                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                 Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology
                                                                                          Volume 1, Issue 5, July 2012

            sel_nodes      =         [sel_nodes           recov_cost(i,1)         =         Recov-
best_node_id];                                        ery_Cost(hT,Cmg_ch_transfer,Cper_ch_transfe
        end                                           r);
    end                                                   recov_cost_old(i,1)         =        re-
    totms = station_count;                            cov_cost(i,1)+(i-1);
                                                      end
      all_x = [pnt1(1) best_pnt(1)];
      all_y = [pnt1(2) best_pnt(2)];                  4   SIMULATION AND PERFORMANCE
      h2 = plot(all_x,all_y);
      pause(0.1);
                                                          ANALYSIS
      delete(h1);                                         Sim ulation of nod es is perform ed having hand off
      delete(h2);                                     count(ht), total MSSs traversed (n) and speed (v) of the Mobile
end                                                   H ost.Then on the sim ulation part, m ain hand off and check-
                                                      point proced u re cod e is em bed d ed w hich can be view ed on
                                                      the sim ulation w ind ow.
display(['Data       Faild        on      '              The sim ulation is possible for varying values of taken p a-
num2str(traverse_node(station_count)) ' Mo-           ram eters.The results are plotted w here the d ifference betw een
bile Station ...']);                                  region based and prop osed approach can be observed .As for
                                                      exam ple, w e can take som e values of these p aram eter like ht, v
                                                      and n. Let ht=3 and n=16 and v=4 then accord ing to p roposed
% data revover from last check point...
                                                      approach after every 3 MSS traversal the MS saves a check-
                                                      point at that MSS.
chk_data = nodes(last_check_pnt).data;                   Total cost = ht*m igration checkpoint transfer cost + perm a-
chk_x = nodes(last_check_pnt).x;                      nent checkpoint transfer cost of (i-1) interval
chk_y = nodes(last_check_pnt).y;                                    = k1+k2
all_x = [pnt1(1) chk_x];                              Which w ill be a contant value.
all_y = [pnt1(2) chk_y];                                 But in case of region based approachs
plot(s_min_x,s_min_y,s_min_x,s_min_y,'*','c           Total cost = no. of MSS traversed *m igration checkpoint tran s-
olor','red');                                         fer cost+ perm anent checkpoint transfer cost
for i = 1:10                                          Which w ill be linearly increasing fu nction of no.of MSSs.
    h = plot(all_x,all_y,'color','red');
    pause(0.1);
    delete(h);
    pause(0.1);                                       6 CONCLUSION
end                                                      Proposed recovery technique focuses on faster and efficient
plot(all_x,all_y);                                    recovery inform ation d ispersed over a nu m ber of MSSs d ue to
h = waitbar(0,['Data Recover From Mobile              rand om m ovem ent of MH s. Ou r w ork lim its the num ber of
Station       -      Check      Point      '          MSSs from w hich recovery inform ation of a failed im age to be
num2str(last_check_pnt) ' ...']) ;                    collected . Ou r w ork also red uces num ber of com m unication
for i = 1:100                                         m essages, a significant overhead red uction in m obile com p u -
    pause(0.01);                                      ting sy tem s. Recovery cost w ith failure is optim ized . Failure
    waitbar(i/100);                                   free operation cost is also optim ized because the recovery
end                                                   schem e d escribed here w orks parallel table norm al execution
close(h);
                                                      of m obile hosts w ithout causing any blocking or d ela y effect.


                                                      7 FUTURE SCOPE AND APPLICATION IN
% Result for graphs...                                  HANDOFF BASED SCHEME
                                                          In next-generation wireless systems, it is important for Radio
Cmg_ch = 1;                                           Resource Management (RRM) functionality to ensure that the
Cmg_ch_transfer = 1;                                  system is not overloaded and guaranteeing the needed require-
Cper_ch = hT;                                         ments. If the system is not properly planned, it leads to low ca-
Cper_ch_transfer = 1;                                 pacity than required and the QOS degraded. The system became
oper_cost              =               fail-          overloaded and unstable. Therefore, we need an algorithm which
ure_free_operation_cost(hT,Cmg_ch,Cmg_ch_tr           not only adapts itself according to the Received Signal Strength
ansfer,Cper_ch);                                      (RSS) but also on the load status of target station. In addition, the
                                                      current works do not consid er the load status of neighbou ring
for i = 1:traves_MS
                                                                                                                       116
                                  All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                                       Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology
                                                                                                                Volume 1, Issue 5, July 2012

cell. This algorithm can be enhanced to d ifferently set the
hand off threshold also based on traffic of cells.



  References
  1.    A book by Jochen Schiller, Mobile Communication
  2.    R.Koo, S.Toueg ‖Checkpointing and Rollback-Recovery for Distributed
        Systems‖, IEEE Transactions on software Engineering, 1987
  3.    Ravi Prakash and Mukesh Singhal “Maximal Global Snapshot with Con-
        current Initiators‖ IEEE Transactions,pp. 344-351, 1994
  4.    Ravi Prakash, Michel Raynal, Mukesh Singhal ―An Efficient Casual Or-
        dering Algorithm for Mobile Computing ― IEEE Proceedings of the 16th
        ICDCS, pp. 744-751, 1996
  5.    Ravi Prakash and Mukesh Singhal‖ Low Cost Checkpointing and Fail-
        ure Recovery in Mobile Computing Systems‖ IEEE Transactions on Pa-
        rallel and Distributed Systems Vol. 7, NO. 10, October 1996
  6.    Ravi Prakash and Mukesh Singhal ‖Modeling and Analysis of Channel
        Transferability in Mobile Computing Environments‖, IEEE Transactions,
        pp. 198-205,1996
  7.    Guohong Cao, Mukesh Singhal, ―Low-Cost Checkpointing with Mutable
        Checkpoints in Mobile Computing Systems‖, 18th International Confe-
        rence on Distributed Computing Systems, 1998
  8.    Guohong Cao and Mukesh Singhal ―Efficient Distributed channel Allo-
        cation for Mobile Cellular Networks‖ IEEE Transactions, pp. 50-56, 1998
  9.    C. Guohong and M. Singhal, ―On Coordinated Checkpointing in Distri-
        buted Systems‖, IEEE Transactions on Parallel and Distributed Systems
        ,Volume 9 , Issue 12,pp. 1213 – 1225, ISSN:1045-9219, December 1998
  10.   T.Park, N.Woo, and H.Y.Yeon ―A Region- based recovery Information
        Management Scheme for the Fault Tolerant Mobile Computing Systems ‖
        Symp. on Fault Tolerant Computing Systems, pp. 294-301, Jun. 1999
  11.   E .N Elnozahy, L. Alvisi., W. David and J. David ―A Survey of Roll-
        back-Recovery Protocols in Message-Passing Systems‖, Computing Sur-
        veys (CSUR), v.34 n.3, p.375-408, September 2002
  12.   Bidyut Gupta, Shahram Rahimi, and Ziping Liu ― A New High Perfor-
        mance Checkpointing Approach for Mobile Computing Systems‖
        IJCSNS International Journal of Computer Science and Network Securi-
        ty, VOL.6 No.5B, May 2006
  13.   Sapna E. George,Ing-Ray Chen,Ying Jin, ―Movement-Based Checkpoint-
        ing and Logging for Recovery in Mobile Computing Systems‖, 2006
  14.   S Biswas Saha, S Neogy "A Low Overhead Checkpointing Scheme for
        Mobile ComputingSystems," 15th International Conference on Advanced
        Computing and Communications, 2007
  15.   Rachit Garg and Praveen Kumar ―A Review of Fault Tolerant Check-
        pointing Protocols for Mobile Computing Systems‖ International Journal
        of Computer Applications(0975-8887),Volume 3 – No.2, June 2010




Analysis Graphs
                                                                                                                                        117
                                                         All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology
                                                         Volume 1, Issue 5, July 2012




                                                                                 118
 All Rights Reserved © 2012 IJARCET

Mais conteúdo relacionado

Mais procurados

Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...IJECEIAES
 
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET Journal
 
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...Mina Khidhir
 
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...srinivasanece7
 
An Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud ComputingAn Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud Computingijtsrd
 
Norman Patch and Remediation
Norman Patch and  RemediationNorman Patch and  Remediation
Norman Patch and RemediationKavlieBorge
 
OS Memory Management
OS Memory ManagementOS Memory Management
OS Memory Managementanand hd
 
Ieeepro techno solutions 2013 ieee embedded project decision making in coll...
Ieeepro techno solutions   2013 ieee embedded project decision making in coll...Ieeepro techno solutions   2013 ieee embedded project decision making in coll...
Ieeepro techno solutions 2013 ieee embedded project decision making in coll...srinivasanece7
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013Ian Sommerville
 
DESIGN APPROACH FOR FAULT TOLERANCE IN FPGA ARCHITECTURE
DESIGN APPROACH FOR FAULT TOLERANCE IN FPGA ARCHITECTUREDESIGN APPROACH FOR FAULT TOLERANCE IN FPGA ARCHITECTURE
DESIGN APPROACH FOR FAULT TOLERANCE IN FPGA ARCHITECTUREVLSICS Design
 
Fuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems managementFuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems managementDamir Delija
 
CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013Ian Sommerville
 
Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...journalBEEI
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...idescitation
 
CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013Ian Sommerville
 

Mais procurados (16)

Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...
 
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
 
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
 
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
 
An Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud ComputingAn Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud Computing
 
Norman Patch and Remediation
Norman Patch and  RemediationNorman Patch and  Remediation
Norman Patch and Remediation
 
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...
 
OS Memory Management
OS Memory ManagementOS Memory Management
OS Memory Management
 
Ieeepro techno solutions 2013 ieee embedded project decision making in coll...
Ieeepro techno solutions   2013 ieee embedded project decision making in coll...Ieeepro techno solutions   2013 ieee embedded project decision making in coll...
Ieeepro techno solutions 2013 ieee embedded project decision making in coll...
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013
 
DESIGN APPROACH FOR FAULT TOLERANCE IN FPGA ARCHITECTURE
DESIGN APPROACH FOR FAULT TOLERANCE IN FPGA ARCHITECTUREDESIGN APPROACH FOR FAULT TOLERANCE IN FPGA ARCHITECTURE
DESIGN APPROACH FOR FAULT TOLERANCE IN FPGA ARCHITECTURE
 
Fuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems managementFuzzy logic in computer networks and systems management
Fuzzy logic in computer networks and systems management
 
CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013
 
Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...Controller selection in software defined networks using best-worst multi-crit...
Controller selection in software defined networks using best-worst multi-crit...
 
On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...On-line Power System Static Security Assessment in a Distributed Computing Fr...
On-line Power System Static Security Assessment in a Distributed Computing Fr...
 
CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013
 

Destaque

Destaque (10)

388 394
388 394388 394
388 394
 
La Madera
La MaderaLa Madera
La Madera
 
386 390
386 390386 390
386 390
 
Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340Ijarcet vol-2-issue-7-2337-2340
Ijarcet vol-2-issue-7-2337-2340
 
Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890Ijarcet vol-2-issue-3-884-890
Ijarcet vol-2-issue-3-884-890
 
Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383
 
Ijarcet vol-2-issue-4-1389-1392
Ijarcet vol-2-issue-4-1389-1392Ijarcet vol-2-issue-4-1389-1392
Ijarcet vol-2-issue-4-1389-1392
 
79 81
79 8179 81
79 81
 
252 256
252 256252 256
252 256
 
Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 

Semelhante a 111 118

Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...Eswar Publications
 
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...Eswar Publications
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
 
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...Eswar Publications
 
An efficient recovery mechanism
An efficient recovery mechanismAn efficient recovery mechanism
An efficient recovery mechanismijcsa
 
A comparative analysis of minimum process coordinated
A comparative analysis of minimum process coordinatedA comparative analysis of minimum process coordinated
A comparative analysis of minimum process coordinatediaemedu
 
A comparative analysis of minimum process coordinated
A comparative analysis of minimum process coordinatedA comparative analysis of minimum process coordinated
A comparative analysis of minimum process coordinatediaemedu
 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingIRJET Journal
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical methodeSAT Journals
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical methodeSAT Publishing House
 
An Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors RisksAn Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors Riskssipij
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideAngela Hays
 
Integration of real time software modules for reconfigurable sens
Integration of real time software modules for reconfigurable sensIntegration of real time software modules for reconfigurable sens
Integration of real time software modules for reconfigurable sensPham Ngoc Long
 
Advanced Automated Approach for Interconnected Power System Congestion Forecast
Advanced Automated Approach for Interconnected Power System Congestion ForecastAdvanced Automated Approach for Interconnected Power System Congestion Forecast
Advanced Automated Approach for Interconnected Power System Congestion ForecastPower System Operation
 
Survey on replication techniques for distributed system
Survey on replication techniques for distributed systemSurvey on replication techniques for distributed system
Survey on replication techniques for distributed systemIJECEIAES
 
A checkpointing mechanism for virtual clusters using memory- bound time-multi...
A checkpointing mechanism for virtual clusters using memory- bound time-multi...A checkpointing mechanism for virtual clusters using memory- bound time-multi...
A checkpointing mechanism for virtual clusters using memory- bound time-multi...IJECEIAES
 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemDynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemRadita Apriana
 
Swarm robotics for intelligent warehousing
Swarm robotics for intelligent warehousingSwarm robotics for intelligent warehousing
Swarm robotics for intelligent warehousingeSAT Journals
 
Swarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing anSwarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing aneSAT Publishing House
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
 

Semelhante a 111 118 (20)

Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...
Checkpointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs:...
 
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
Review of Some Checkpointing Schemes for Distributed and Mobile Computing Env...
 
An efficient recovery mechanism
An efficient recovery mechanismAn efficient recovery mechanism
An efficient recovery mechanism
 
A comparative analysis of minimum process coordinated
A comparative analysis of minimum process coordinatedA comparative analysis of minimum process coordinated
A comparative analysis of minimum process coordinated
 
A comparative analysis of minimum process coordinated
A comparative analysis of minimum process coordinatedA comparative analysis of minimum process coordinated
A comparative analysis of minimum process coordinated
 
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud ComputingA Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
A Survey on Task Scheduling and Load Balanced Algorithms in Cloud Computing
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
 
An Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors RisksAn Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors Risks
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
Integration of real time software modules for reconfigurable sens
Integration of real time software modules for reconfigurable sensIntegration of real time software modules for reconfigurable sens
Integration of real time software modules for reconfigurable sens
 
Advanced Automated Approach for Interconnected Power System Congestion Forecast
Advanced Automated Approach for Interconnected Power System Congestion ForecastAdvanced Automated Approach for Interconnected Power System Congestion Forecast
Advanced Automated Approach for Interconnected Power System Congestion Forecast
 
Survey on replication techniques for distributed system
Survey on replication techniques for distributed systemSurvey on replication techniques for distributed system
Survey on replication techniques for distributed system
 
A checkpointing mechanism for virtual clusters using memory- bound time-multi...
A checkpointing mechanism for virtual clusters using memory- bound time-multi...A checkpointing mechanism for virtual clusters using memory- bound time-multi...
A checkpointing mechanism for virtual clusters using memory- bound time-multi...
 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemDynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
 
Swarm robotics for intelligent warehousing
Swarm robotics for intelligent warehousingSwarm robotics for intelligent warehousing
Swarm robotics for intelligent warehousing
 
Swarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing anSwarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing an
 
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
 

Mais de Editor IJARCET

Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

Mais de Editor IJARCET (20)

Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Último

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

111 118

  • 1. ISSN: 2278 – 1323 Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology Volume 1, Issue 5, July 2012 A Failure Recovery Scheme in Mobile Computing System Based on Checkpointing and Handoff Count Anurag Sachan , Prachi Maheshwari Abstract— In Mobile hosts failure probability is high. An efficient checkpointing technique and a failure recovery scheme together can make a mobile computing system fault-tolerant. For efficient recovery, information of a mobile host should be kept in an organized manner. Efficiency of a recovery scheme can be measured in terms of time and cost. Mobile hosts move randomly and handoff occurs. Information of a single mobile host gets scattered over a number of mobile support stations that can be at closer or further distance. Recovery time and cost primarily depend on number of mobile support stations from which information to be collected as well as distance among them. Larger the distance, longer the time for communication through message passing. Number of mobile support stations from which information to be recovered and distance among them can be delimited by keeping a handoff threshold value in each mobile host. Recovery scheme proposed here applies both the measures. Our work optimizes both failure-free and failurerecovery operation costs. Index Terms— coordinated checkpointing, communication induced checkpointing, domino effect, minimal checkpoint, non-blocking checkponting, optimistic logging, message passing systems ——————————  —————————— 1 INTRODUCTION D ISTRIBUTED systems today are ubiquitous and enable many applications, including client-server systems, transac- tion processing, World Wide Web, and scientific comping, cur to each process, and messages exchanged among the process. Message-passing systems complicate rollback-recovery be- among many others. The vast computing potential of these sys- cause messages induce inter-process dependencies during failure- tems is often affected by their chances of failures. free operation. Upon a failure of one or more processes in a sys- Therefore, many techniques have been developed to add relia- tem, these dependencies may force some of the processes that did bility and high availability to distributed systems. These tech- not fail to roll back, creating what is commonly called rollback niques include transactions, group communication, and rollback propagation. Under some scenarios, rollback propagation may recovery, and have different tradeoffs and focuses. For example, extend back to the initial state of the computation, losing all the transactions focus on data-oriented applications, while group work performed before a failure. This situation is known as the communication offers an abstraction of an ideal communication domino effect. system that simplifies the development of reliable applications. This survey covers transparent rollback-recovery, which focuses The domino effect may occur if each process takes its check- on long running applications such as scientific computing and points independently—an approach known as independent or telecommunication application. uncoordinated checkpointing. It is obviously desirable to avoid Rollback-recovery treats a distributed system as a collection the domino effect and therefore several techniques have been of application processes that communicate through a network. developed to prevent it. One such technique is to perform coordi- The processes have access to a stable storage device that is unaf- nated checkpointing in which processes coordinate their check- fected of all possible failures. Processes achieve fault tolerance points in order to save a system-wide consistent state [Chandy by using this device to save recovery information periodically and Lamport 1985]. during failure-free execution. Upon a failure, a failed process uses the saved information to restart the computation from an The entire process of reconfiguring com m unication, at the intermediate state, thereby reducing the amount of lost computa- MH , w ireless netw ork and backbone w ired netw ork, is know n tion. The recovery information includes, at a minimum, the states as hand off. The objective of hand off is to m aintain end -to-end of the participating processes, called checkpoints. Other recovery connectivity in the d ynam ically reconfigured netw ork topolo- gy. During a hand off, the route of d ata through the w ired ne t- ———————————————— w ork to the MH m ust be upd ated to pass through this new BS.  Anurag sachan is currently pursuing masters degree program in computer In ad d ition any state in the old BS associated w ith the MH science and engineering engineering in Mahamaya Techinal University, In- dia, PH-919990385346. E-mail: anuragsachan2@gmail.com m ust som ehow be tran sferred to the new BS and the rad io  Prachi Maheshwari is currently working as asst. prof. in computer science com m unication m ay also need to be reconfigured . and engineering in Mahamaya Technical University, India, PH- 919654207157. E-mail: prashi0110@gmail.com 2 PREVIOUS WORK protocols may require additional information, such as logs of A. checkpoint-based rollback recovery the interactions with input and output devices, events that oc- Upon a failure, checkpoint-based rollback recovery restores 111 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology Volume 1, Issue 5, July 2012 the system state to the most recent consistent set of checkpoints, d. Communication-induced Checkpointing that is the recovery line It does not rely on the PWD assumption, Communication induced checkpointing (CIC) protocols avoid and so does not need to detect, log, or replay nondeterministic the domino effect without requiring all checkpoints to be coordi- events. Checkpoint-based protocols are therefore less restrictive nated. In these protocols, processes take two kinds of check- and simpler to implement than log-based rollback-recovery. But points, local and forced. Local checkpoints can be taken indepen- checkpoint-based rollback-recovery does not guarantee that pre- dently, while forced checkpoint must be taken to guarantee the failure execution can be deterministically regenerated after a eventual progress of the recovery line. In particular, CIC proto- rollback. cols take forced checkpoints to prevent the creation of useless checkpoints, that is checkpoints that will never be part of a con- a. Uncoordinated Checkpointing sistent global state. Useless checkpoints are not desirable because Uncoordinated checkpointing allows each process the maxi- they do not contribute to the recovery of the system from failures, mum autonomy in deciding when to take checkpoints. The main but they consume resources and cause performance overhead. advantage of this autonomy is that each process may take a checkpoint when it is most convenient. For example, a process B. LOG-BASED ROLLBACK-RECOVERY may reduce the overhead by taking checkpoints when the amount of state information to be saved is small [Wang 1993]. But there As opposed to checkpoint-based rollback recovery, log-based are several disadvantages. First, there is the possibility of the rollback-recovery makes explicit use of the fact that a process domino effect, which may cause the loss of a large amount of execution can be modeled as a sequence of deterministic state useful work, possibly all the way back to the beginning of the intervals, each starting with the execution of a nondeterministic computation. Second, a process may take a useless checkpoint event [Strom and Yemini 1985]. that will never be part of a global consistent state. Log-based rollback-recovery assumes that all nondeterministic b. Coordinated Checkpointing events can be identified and their corresponding determinants can Checkpointing requires processes to broadcast their check- be logged to stable storage. During failure-free operation, each points in order to form a consistent global state. Coordinated process logs the determinants of all the nondeterministic events checkpointing simplifies recovery and is not susceptible to the that it observes onto stable storage. Additionally, each process domino effect, since every process always restarts from its most also takes checkpoints to reduce the extent of rollback during recent checkpoint. Also, coordinated checkpointing requires each recovery. After a failure occurs, the failed processes recover by process to maintain only one permanent checkpoint on stable using the checkpoints and logged determinants to replay the cor- storage, reducing storage overhead and eliminating the need for responding nondeterministic events precisely as they occurred garbage collection. Its main disadvantage, however, is the large during the pre-failure execution. latency involved in committing output. A straightforward ap- proach to coordinated checkpointing is to block communications a. Pessimistic Logging while the checkpointing protocol executes. Pessimistic logging protocols are designed under the assump- tion that a failure can occur after any nondeterministic event in c. Minimal Checkpoint Coordination the computation. This assumption is ―pessimistic‖ since in reality, Coordinated checkpointing requires all processes to partici- failures are rare. In their most straightforward form, pessimistic pate in every checkpoint. This requirement generates valid con- protocols log to stable storage, the determinant of each nonde- cerns about its scalability. It is desirable to reduce the number of terministic event before the event is allowed to affect the compu- processes involved in a coordinated checkpointing session. This tation. can be done since the processes that need to take new check- In a pessimistic logging system, the observable state of each points are only those that have communicated with the check- process is always recoverable. This property has four advantages: point initiator either directly or indirectly since the last check- 1. Processes can send messages to the outside world without run- point [Koo and Toueg 1987]. ning a special protocol. The following two-phase protocol achieves minimal check- 2. Processes restart from their most recent checkpoint upon a point coordination [Koo and Toueg 1987]. During the first phase, failure, therefore limiting the extent of execution that has to be the checkpoint initiator identifies all processes with which it has replayed. communicated since the last checkpoint and sends them a re- 3. Recovery is simplified because the effects of a failure are con- quest. Upon receiving the request, each process in turn identifies fined only to the processes that fail. all processes it has communicated with since the last checkpoints 4. Garbage collection is simple. and sends them a request, and so on, until no more processes can be identified. During the second phase, all processes identified in b. Optimistic Logging the first phase take a checkpoint. The result is a consistent check- In optimistic logging protocols, processes log determinants point that involves only the participating processes. In this proto- asynchronously to stable storage [Strom and Yemini 1985]. These col, after a process takes a checkpoint, it cannot send any mes- protocols make the optimistic assumption that logging will com- sage until the second phase terminates successfully, although plete before a failure occurs. Determinants are kept in a volatile receiving a message after the checkpoint has been taken is al- log, which is periodically flushed to stable storage. Thus, opti- lowed. mistic logging does not require the application to block waiting 112 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology Volume 1, Issue 5, July 2012 for the determinants to be actually written to stable storage, and becomes available for reallocation. This feature avoids having therefore incurs little overhead during failure-free execution. checkpoints scattered throughout the network while the mobile However, this advantage comes at the expense of more compli- host moves around. The mobile host also does not have to main- cated recovery and garbage collection, and slower output commit, tain extra links to locate previous checkpoints. than in pessimistic logging. 3 PROBLEM FORMULATION c. Causal Logging Causal logging has the failure-free performance advantages of optimistic logging while retaining most of the advantages of pes- MHs move randomly causing handoff. Hence checkpoints of a simistic logging [Alvisi 1996; Elnozahy 1993]. Like optimistic single MH are scattered in different MSSs. If an MH fails, recov- logging, it avoids synchronous access to stable storage except ery information are to be collected from different MSSs. If di during output commit. Like pessimistic logging, it allows each tance between MSSrecovery and the MSSstart is large then re- process to commit output independently and never creates or- covery time will be more. In region based recovery scheme, re- phans, thereby isolating each process from the effects of failures gion manager is the centralized control. Hence it may get over- that occur in other processes. Furthermore, causal logging limits loaded. Moreover if it fails, recovery is not possible. the rollback of any failed process to the most recent checkpoint on stable storage. This reduces the storage overhead and the 4 ALGORITHM AND IMPLEMENTATION amount of work at risk. These advantages come at the expense of a more complex recovery protocol. ALGORITHM: C. ADAPTIVE CHECKPOINTING In first step connection is initiated and MH stores the id of Our approach uses time & leasing to coordinate checkpoint current MSS. creation adaptively and indirectly. It says that time can be used to A link is created in the current MSS structure implement coordinated checkpointing efficient. Our storage man- CurrentMSSid field of MH is updated to contain the current ager uses the leasing mechanism. A 3-level storage hierarchy is MSSid. used to save checkpoints. Take a checkpoint of present state of the MH. a. Checkpoint Creation HANDOFF PART When the application begins, the protocol sets the checkpoint New connection is setup as soon as MH get attached to it. timers in all processes with a value equal to the chcckpoint inter- A link is created in the MSS structure which contains the MH val. Whenever a timer expires, a. process takes a checkpoint and after it attaches to it. resets the timer. The protocol uses a simple re-synchronization CurrentMSSid field of MH is updated to contain the present mechanism to roughly synchronize the checkpoint intervals of the MSSid. processes, even if drift rates of clocks are different. Hcount = Hcount + 1 b. Hierarchical Storage Management Here decision is taken on the basis of predefined conditions The protocol uses a 3-level storage hierarchy to save check- on parameters. On success checkpoint is initiated. points Checkpoints stored in level #1 called soft checkpoints if(Hcount > Handoff Threshold or Distance Threshold (SC), they are saved in the mobile host. Level #2 is the stable between MSS > Threshold value)&&(RSS>RSS_threshold) storage available in the base stations, level #3 corresponds to the Take a checkpoint of present state of the MH. home host. Level #2 and level #3 are both referred to as hard Hcount = 0 . checkpoints (HC). Soft checkpoints are less reliable than hard Update the Number of the MH. checkpoints because they will be lost if the mobile host fails Update the checkpoint_location with the current MSS_id. permanently. Hard checkpoints can survive mobile-host perma- nent failures but have higher overheads since they must be trans- If RSS condition is not met, RSS is incremented to avoid the mitted through the wireless channels. condition of starvation of a MH due to present weak strength of received signal. c. Hand-Off Procedures Before moving to another cell, the process notifies the storage A coordinated approach is followed to make system more manager at the current base station. The manager then forwards Lossless. the hard checkpoints of the process to the home host. After the Check the dependency list of the MH. checkpoint is saved safely by the home host, the checkpoint on Send checkpoint requests to all MHs that are in the dependency the base station is removed. f the new cell provides storage ser- list. vice, and the process got a lease, then the hard checkpoints can After that take a checkpoint of the present state of MH. alternatively sent to the new base station. This hand-off procedure simplifies garbage collection on base stations. When the mobile If any MH doesn’t reply in accordance with sender, it means host leaves the current cell, the space occupied by its checkpoints that may be executing some process. The sender waits for a 113 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology Volume 1, Issue 5, July 2012 defined limit. RH O=ones(1,N OP)*rad iu s; if(difference of current time and previous checkpoint time > [X,Y] = pol2cart(TH ETA,RH O); Threshold value) X=X+center(1); Take checkpoint. Y=Y+center(2); H =plot(X,Y,style); A log file is created for making to support recovery. % axis squ are; Open the current MSS's log file. Sequence_number = Sequence_number + 1. Failure Free Operation Cost Save data, MH_id and number of the MH in the log file. Fu nction oper_cost = fail- u re_free_operation_cost(hT,Cm g_ch,Cm g_ch_transfer,Cper For saving space, the unnecessary information is cleared time _ch) by time. if(coordinated checkpoint is been taken) Clear dependency list. oper_cost = (hT * Cm g_ch) + (hT * Cm g_ch_transfer) + Save the end checkpoint timestamp in local buffer. Cper_ch; Update the Tstamp to reflect the current time. Recovery Cost MH RECOVERY PART fu nction recov_cost = Recov- First of all a request is done. ery_Cost(hT,Cm g_ch_transfer,Cper_ch_transfer) Get the MSS_id from the checkpoint_location field of MH where the latest checkpoint was taken. recov_cost = hT * Cm g_ch_transfer + Cper_ch_transfer; Send the Seq_number and the checkpoint_location values to the current MSS. Handoff Procedure and Checkpoints in Network Request current MSS to send these values to the check- clc point_location MSS. clear all close all With the help of checkpoint_location MSS log file is accessed. warning off Select the log entry corresponding to the MH_id and Seq_number provided. net_width = 10; Retrieve the data from this log file entry. net_height = 80; Send the data to the MH via the current MSS get its last stable check = 1; state back. tot_nodes = 20; traves_MS = 10; IMPLEMENTATION CODE ON MATLAB hT = 4; Best Distance Calculating Function % Form Network area.... fu nction best_nod e_inx = best_d ist(p nt1,nod es) node_count = 1; all_x = []; for i = 1:length(nod es) all_y = []; x1 = nod es(i).x; for j = 0:9:net_height y1 = nod es(i).y; if check==1 pnt2 = [x1 y1]; start = 0; d ist_val(i,1) = nod e_d istance(p nt1,pnt2); check = 0; end else start = 5; [sval sinx] = sort(d ist_val); check = 1; end best_nod e_inx = sinx(1); for i = start:10.3:net_height circle([j,i],6,7,'-'); Mobile Host Representation By Circle hold on fu nction H =circle(center,rad ius,N OP,style) drawnow plot(j,i,j,i,'.','color','green'); if (nargin <3), nodes(node_count).x = j; error('Please see help for IN PUT DATA.'); nodes(node_count).y = i; elseif (nargin==3) nodes(node_count).id = node_count; style='b-'; node_count = node_count+1; end ; all_x = [all_x;i]; TH ETA=linspace(0,2*pi,N OP); all_y = [all_y;j]; 114 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology Volume 1, Issue 5, July 2012 end s_min_y = s_min_y-1; end end axis square; min_x = min(all_x); h1 = max_x = max(all_x); plot(s_min_x,s_min_y,s_min_x,s_min_y,'*','c olor','red'); min_y = min(all_y); pnt1 = [s_min_x s_min_y] ; max_y = max(all_y); best_node_inx = best_dist(pnt1,nodes); best_x = nodes(best_node_inx).x; best_y = nodes(best_node_inx).y; % Making Random nodes.... best_pnt = [best_x best_y]; for i = 1:tot_nodes hold on x = round(min_x+(max_x-min_x)*rand); drawnow y = round(min_y+(max_y-min_y)*rand); pnt1 = [x y] ; % checkpoint calculation.... best_node_inx = best_dist(pnt1,nodes); best_node_id = nodes(best_node_inx).id; best_x = nodes(best_node_inx).x; if isempty(station_count) best_y = nodes(best_node_inx).y; station_count = station_count+1; best_pnt = [best_x best_y]; station_data = [station_data best_node_id]; plot(x,y,x,y,'*','color','red'); traverse_node = [traverse_node all_x = [pnt1(1) best_pnt(1)]; best_node_id]; all_y = [pnt1(2) best_pnt(2)]; nodes(best_node_inx).data = sta- plot(all_x,all_y); tion_data; hold on station_count = drawnow length(traverse_node); end sel_nodes = [sel_nodes best_node_id]; display(['Mobile Node Travel on ' num2str(traverse_node(station_count)) ' Mo- % Making Moving Nodes... bile Station....']); s_min_x = min_x+0.5; elseif tra- s_min_y = min_y+0.5; verse_node(station_count)~=best_node_id con_x = 1; station_count = station_count+1; check = 1; station_data = [station_data totms = 0; best_node_id]; traverse_node = []; traverse_node = [traverse_node best_node_id]; station_count = []; nodes(best_node_inx).data = sta- station_data = []; tion_data; sel_nodes = []; sel_nodes = [sel_nodes last_check_pnt = 1; best_node_id]; while(totms~=traves_MS) display(['Mobile Node Travel on ' num2str(traverse_node(station_count)) ' Mo- if s_min_x<=max_x&&check == 1 bile Station....']); check = 1; % permanent check point saving... else if rem(station_count,hT)==0 check = 0; nodes(best_node_inx).data = if s_min_x<=min_x && check == 0 station_data; check = 1; last_check_pnt = best_node_inx; end display('Saving Data on Check end point...'); if check ==1 % remove temp datas... s_min_x = s_min_x+1; for k = 1:length(sel_nodes)-1 s_min_y = s_min_y+1; nodes(sel_nodes(k)).data = else ''; s_min_x = s_min_x-1; end 115 All Rights Reserved © 2012 IJARCET
  • 6. ISSN: 2278 – 1323 Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology Volume 1, Issue 5, July 2012 sel_nodes = [sel_nodes recov_cost(i,1) = Recov- best_node_id]; ery_Cost(hT,Cmg_ch_transfer,Cper_ch_transfe end r); end recov_cost_old(i,1) = re- totms = station_count; cov_cost(i,1)+(i-1); end all_x = [pnt1(1) best_pnt(1)]; all_y = [pnt1(2) best_pnt(2)]; 4 SIMULATION AND PERFORMANCE h2 = plot(all_x,all_y); pause(0.1); ANALYSIS delete(h1); Sim ulation of nod es is perform ed having hand off delete(h2); count(ht), total MSSs traversed (n) and speed (v) of the Mobile end H ost.Then on the sim ulation part, m ain hand off and check- point proced u re cod e is em bed d ed w hich can be view ed on the sim ulation w ind ow. display(['Data Faild on ' The sim ulation is possible for varying values of taken p a- num2str(traverse_node(station_count)) ' Mo- ram eters.The results are plotted w here the d ifference betw een bile Station ...']); region based and prop osed approach can be observed .As for exam ple, w e can take som e values of these p aram eter like ht, v and n. Let ht=3 and n=16 and v=4 then accord ing to p roposed % data revover from last check point... approach after every 3 MSS traversal the MS saves a check- point at that MSS. chk_data = nodes(last_check_pnt).data; Total cost = ht*m igration checkpoint transfer cost + perm a- chk_x = nodes(last_check_pnt).x; nent checkpoint transfer cost of (i-1) interval chk_y = nodes(last_check_pnt).y; = k1+k2 all_x = [pnt1(1) chk_x]; Which w ill be a contant value. all_y = [pnt1(2) chk_y]; But in case of region based approachs plot(s_min_x,s_min_y,s_min_x,s_min_y,'*','c Total cost = no. of MSS traversed *m igration checkpoint tran s- olor','red'); fer cost+ perm anent checkpoint transfer cost for i = 1:10 Which w ill be linearly increasing fu nction of no.of MSSs. h = plot(all_x,all_y,'color','red'); pause(0.1); delete(h); pause(0.1); 6 CONCLUSION end Proposed recovery technique focuses on faster and efficient plot(all_x,all_y); recovery inform ation d ispersed over a nu m ber of MSSs d ue to h = waitbar(0,['Data Recover From Mobile rand om m ovem ent of MH s. Ou r w ork lim its the num ber of Station - Check Point ' MSSs from w hich recovery inform ation of a failed im age to be num2str(last_check_pnt) ' ...']) ; collected . Ou r w ork also red uces num ber of com m unication for i = 1:100 m essages, a significant overhead red uction in m obile com p u - pause(0.01); ting sy tem s. Recovery cost w ith failure is optim ized . Failure waitbar(i/100); free operation cost is also optim ized because the recovery end schem e d escribed here w orks parallel table norm al execution close(h); of m obile hosts w ithout causing any blocking or d ela y effect. 7 FUTURE SCOPE AND APPLICATION IN % Result for graphs... HANDOFF BASED SCHEME In next-generation wireless systems, it is important for Radio Cmg_ch = 1; Resource Management (RRM) functionality to ensure that the Cmg_ch_transfer = 1; system is not overloaded and guaranteeing the needed require- Cper_ch = hT; ments. If the system is not properly planned, it leads to low ca- Cper_ch_transfer = 1; pacity than required and the QOS degraded. The system became oper_cost = fail- overloaded and unstable. Therefore, we need an algorithm which ure_free_operation_cost(hT,Cmg_ch,Cmg_ch_tr not only adapts itself according to the Received Signal Strength ansfer,Cper_ch); (RSS) but also on the load status of target station. In addition, the current works do not consid er the load status of neighbou ring for i = 1:traves_MS 116 All Rights Reserved © 2012 IJARCET
  • 7. ISSN: 2278 – 1323 Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology Volume 1, Issue 5, July 2012 cell. This algorithm can be enhanced to d ifferently set the hand off threshold also based on traffic of cells. References 1. A book by Jochen Schiller, Mobile Communication 2. R.Koo, S.Toueg ‖Checkpointing and Rollback-Recovery for Distributed Systems‖, IEEE Transactions on software Engineering, 1987 3. Ravi Prakash and Mukesh Singhal “Maximal Global Snapshot with Con- current Initiators‖ IEEE Transactions,pp. 344-351, 1994 4. Ravi Prakash, Michel Raynal, Mukesh Singhal ―An Efficient Casual Or- dering Algorithm for Mobile Computing ― IEEE Proceedings of the 16th ICDCS, pp. 744-751, 1996 5. Ravi Prakash and Mukesh Singhal‖ Low Cost Checkpointing and Fail- ure Recovery in Mobile Computing Systems‖ IEEE Transactions on Pa- rallel and Distributed Systems Vol. 7, NO. 10, October 1996 6. Ravi Prakash and Mukesh Singhal ‖Modeling and Analysis of Channel Transferability in Mobile Computing Environments‖, IEEE Transactions, pp. 198-205,1996 7. Guohong Cao, Mukesh Singhal, ―Low-Cost Checkpointing with Mutable Checkpoints in Mobile Computing Systems‖, 18th International Confe- rence on Distributed Computing Systems, 1998 8. Guohong Cao and Mukesh Singhal ―Efficient Distributed channel Allo- cation for Mobile Cellular Networks‖ IEEE Transactions, pp. 50-56, 1998 9. C. Guohong and M. Singhal, ―On Coordinated Checkpointing in Distri- buted Systems‖, IEEE Transactions on Parallel and Distributed Systems ,Volume 9 , Issue 12,pp. 1213 – 1225, ISSN:1045-9219, December 1998 10. T.Park, N.Woo, and H.Y.Yeon ―A Region- based recovery Information Management Scheme for the Fault Tolerant Mobile Computing Systems ‖ Symp. on Fault Tolerant Computing Systems, pp. 294-301, Jun. 1999 11. E .N Elnozahy, L. Alvisi., W. David and J. David ―A Survey of Roll- back-Recovery Protocols in Message-Passing Systems‖, Computing Sur- veys (CSUR), v.34 n.3, p.375-408, September 2002 12. Bidyut Gupta, Shahram Rahimi, and Ziping Liu ― A New High Perfor- mance Checkpointing Approach for Mobile Computing Systems‖ IJCSNS International Journal of Computer Science and Network Securi- ty, VOL.6 No.5B, May 2006 13. Sapna E. George,Ing-Ray Chen,Ying Jin, ―Movement-Based Checkpoint- ing and Logging for Recovery in Mobile Computing Systems‖, 2006 14. S Biswas Saha, S Neogy "A Low Overhead Checkpointing Scheme for Mobile ComputingSystems," 15th International Conference on Advanced Computing and Communications, 2007 15. Rachit Garg and Praveen Kumar ―A Review of Fault Tolerant Check- pointing Protocols for Mobile Computing Systems‖ International Journal of Computer Applications(0975-8887),Volume 3 – No.2, June 2010 Analysis Graphs 117 All Rights Reserved © 2012 IJARCET
  • 8. ISSN: 2278 – 1323 Int ernat ional Journal of Adv anced Research in Comput er Engineering & Technology Volume 1, Issue 5, July 2012 118 All Rights Reserved © 2012 IJARCET