DOI QR코드

DOI QR Code

이동 기기에 적합한 소프트웨어 에이전트 기반의 효율적 체크포인팅 기법

An Efficient Checkpointing Method for Mobile Hosts via the Software Agent

  • 발행 : 2008.04.30

초록

이동 통신 시스템의 발전과 함께 여러 대의 이동 기기에서 동작하는 분산 응용의 필요성이 점차 커지고 있다. 모바일 기기의 고장이나 통신망 단절이 기존 고정 통신망에 비해 자주 발생하는 환경을 고려할 때 모바일 응용을 위한 복구 기법이 매우 중요하며, 중단된 응용의 재시작을위해 체크포인팅이 널리 사용되고 있다. 본 논문에서도 이런 분산 응용의 복구를 위한 효율적 체크포인팅 기법을 제안한다. 제안된 기법에서는 MSS(Mobile Support Station)에서 동작하는 체크포인팅 에이전트라는 소프트웨어 에이전트를 사용한다. 이 에이전트는 R-distance(rollback-distance) 개념을 지원하며, 이를 통해 복귀되는 지역 체크포인트의 최대 개수를 한정할 수 있다. 제안된 방식은 기존의 문제점이었던 도미노 현상이나 체크포인트 유지에 필요한 추가 비용을 크게 줄이면서도 매우 유연한 방식의 체크포인트 생성을 지원할 수 있다.

With the advance in mobile communication systems, the need for distributed applications running on multiple mobile devices also grows gradually. As such applications are subject to H/W failures of the mobile device or communication disruptions, compared to the traditional applications in fixed networks, it is crucial to develop any recovery mechanism suitable for them. For this, checkpointing is widely used to restart interrupted applications. In this paper, we devise an efficient checkpointing method that adopts the software agent executed at the mobile support station. The agent, called the checkpointing agent, is aimed at supporting the concept of rollback-distance (R-distance) that bounds the maximum number of roll-backed local checkpoints. By means of the R-distance, our method can prevent undesirable domino effects and heavy checkpoint overhead, while providing high flexibility in checkpoint creation.

키워드

참고문헌

  1. T. Imielinski and B. R. Badrinath, Mobile Wireless Computing: Challenges in Data Management, Communications of the ACM, pp.19-28, Vol.37, No.10, October, 1994
  2. Yi-Bing Lin, Failure Restoration of Mobility Databases for Personal Communication Networks, Wireless Networks, Vol.1, No.3, 1995
  3. Sashidhar Gadiraju and Vijay Kumar, Recovery in the Mobile Wireless Environment Using Mobile Agents, IEEE Trans. on Mobile Computing, Vol.3, No.2, April, 2004
  4. Ricardo Baratto, Shaya Potter, Gong Su, and Jason Nieh, MobiDesk: Mobile Virtual Desktop Computing, In Proc. of the 10th International Conference on Mobile Computing and Networking, pp.1-15, 2004
  5. Dhiraj K. Pradhan, P. Krishna, and Nitin H. Vaidya, Recovery in Mobile Wireless Environment: Design and Trade-off Analysis, In Proc. of the 26th International Symposium on Fault-Tolerant Computing, pp.16-25, 1996
  6. Arup Acharya and B. R. Badrinath, Checkpointing Distributed Applications on Mobile Computers, In Proc. of the 3rd International Conference on Parallel and Distributed Information Systems, pp.73-80, 1994
  7. Y. M. Wang, Consistent Gobal Chckpoints That Contain a Given Set of Local Checkpoints, IEEE Trans. on Computers, Vol.46, No.4, pp.456-468, 1997 https://doi.org/10.1109/12.588059
  8. Tongchit Tantikul and D. Manivannan, Communication-Induced Checkpointing and Asynchronous Recovery Protocol for Mobile Computing Systems, In Proc. of the 6th International Conference on Parallel and Distributed Computing Applications and Technologies, pp.70-74, 2005 https://doi.org/10.1109/PDCAT.2005.5
  9. Taesoon Park and Heon Y. Yeom, An Asynchronous Recovery Scheme based on Optimistic Message Logging for Mobile Computing Systems, In Proc. of the 20th International Conference on Distributed Computing Systems, pp.436-443, 2000
  10. R. E. Strong and S. Yemini, Optimitic Recovery in Distributed Systems, ACM Trans. on Computer Systems, Vol.3, No.3, August, 1985 https://doi.org/10.1145/3959.3962
  11. D. Manivannan and Mukesh Singhal, Quasi- Synchronous Checkpointing: Models, Characterization, and Classification, IEEE Trans. on Parallel and Distributed Systems, Vol.10, No.7, July, 1999 https://doi.org/10.1109/71.780865
  12. Cheng-Min Lin and Chyi-Ren Dow, Efficient Checkpoint-based Failure Recovery Techniques in Mobile Computing Systems, Journal of Information Science and Engineering, pp.549-573, Vol 17, No.4, 2001
  13. Lorenzo Alvisi, E. N. Elnozahy, Sriram Rao, Syed Amir Husain and Asanka De Mel, An Analysis of Communication Induced Checkpointing, In Proc. of the Symposium on Fault-Tolerant Computing Symp., pp.242-249, 1999
  14. Franco Zambonelli, On the Effectiveness of Distributed Checkpoint Algorithms for Domino-Free Recovery, In Proc. of High Performance Distributed Computing, pp.124-131, 1998
  15. Mootaz Elnozahy, et. al., A Survey of Rollback-Recovery Protocols in Message-Passing Systems, Technical Report: CMU-CS-99-148, June, 1999
  16. Yi-Min Wang and W. Kent Fuchs, Lazy Checkpointing Coordination for Bounding Rollback Propagation, In Proc. of the International Symposium on Reliable Distributed Systems, pp.78-85, 1993
  17. Lapmport, Time, clocks, and the Ordering of Events in a Distributed System, Communication of ACM, Von. 21, No.7, pp.558-565, 1978 https://doi.org/10.1145/359545.359563