Skip to main content

A Proxy Based Efficient Checkpointing Scheme for Fault Recovery in Mobile Grid System

  • Conference paper
High Performance Computing - HiPC 2006 (HiPC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4297))

Included in the following conference series:

Abstract

Mobile Grid is an emerging and prospering field of distributed computing where mobile devices are enjoying the benefits of Grid. Challenges faced by mobile Grid are unpredictable network quality, lower trust, limited resources (battery power, network bandwidth, storage, processing power, etc) and extended periods of disconnections which may result in lost of the work done by these devices. We, therefore, need a proper fault tolerance scheme for these mobile hosts. A major issue is the appropriate handling of failures with minimal processing and storage overhead on mobile hosts. To meet these goals, we propose a proxy-based coordinated checkpointing scheme for our mobile to Grid middleware, Mobile Access to Grid Infrastructure (MAGi). In this scheme mobile hosts seamlessly store checkpoints on their respective proxies running on the middleware. Together with the central coordinator component, these proxies act as a centralized checkpointing store. This approach makes it efficient to rollback to the latest consistent global snapshot, without direct involvement of the mobile hosts, which results in less processing and storage overhead on mobile device as compared to existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cao, G., Singhal, M.: On the Impossibility of Min-Process Non-Blocking Checkpointing and An Efficient Checkpointing Algorithm for Mobile Computing Systems. In: Proc. of Int’l Conf. on Parallel Processing, pp. 37–44 (August 1998)

    Google Scholar 

  2. Foster, C.K., Tuecke, S.: The Anatomy of the Grid. International Journal of Supercomputing Applications 15(3), 200–222 (2001)

    Article  Google Scholar 

  3. Forman, G., Zahorjan, J.: The Challenges of Mobile Computing. IEEE Computer 27(4) (April 1994)

    Google Scholar 

  4. Park, S.-M., Ko, Y.-B., Kim, J.-H.: Disconnected Operation Service in Mobile Grid Computing. In: Orlowska, M.E., Weerawarana, S., Papazoglou, M.P., Yang, J. (eds.) ICSOC 2003. LNCS, vol. 2910, pp. 499–513. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Cao, G., Singhal, M.: Checkpointing with mutable checkpoints. Theoretical Computer Science 290(2) (January 2003)

    Google Scholar 

  6. Sajjad, A., et al.: MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing, In: NODe/GSEM 2005, pp 311-322 (2005)

    Google Scholar 

  7. Tamir, Y., Sequin, C.H.: Error Recovery in Multicomputers using global checkpoints. In: Proc. 13th Intl. conf. Parallel Processing (August 1984)

    Google Scholar 

  8. Koo, R., Toueg, S.: Checkpointing and rollback-recovery for Distributed Systems. IEEE Transactions on Software Engineering 13(1), 23–31 (1987)

    Article  MATH  Google Scholar 

  9. Cao, G., Singhal, M.: Mutable Checkpoints: A New Checkpointing Approach for Mobile Computing Systems. IEEE Transactions on Parallel and Distributed Systems 12(2), 157–172 (2001)

    Article  Google Scholar 

  10. Barigazzi, G., Strigini, L.: Application-transparent setting of recovery points. In: Proc. of the 13th Intl. Symposium on Fault-Tolerant Computing Systems, pp. 48–55 (1983)

    Google Scholar 

  11. Chandy, K.M., Lamport, L.: Distributed Snapshots: Determining Global States of Distributed Systems. ACM Transactions on Computer Systems, 63–75 (1985)

    Google Scholar 

  12. Elnozahy, E.N., Johnson, D.B., Zwaenepoel, W.: The Performance of Consistent Checkpointing. In: Proc of the 11th Symposium on Reliable Distributed Systems, October 1992, pp. 39–47 (1992)

    Google Scholar 

  13. Silva, L.M., Silva, J.G.: Global Checkpointing for Distributed Programs. In: Proc. of IEEE Symposium on Reliable Distributed Systems, October 1992, pp. 155–162 (1992)

    Google Scholar 

  14. Dijkstra, E.W.: Self-stabilizing Systems in Spite of Distributed Control. Communications of the ACM 17, 643–644 (1974)

    Article  MATH  Google Scholar 

  15. Acharya, B.R.B.: Checkpointing Distributed Applications on Mobile Computing. In: Proc. of the 3rd International Conference on Parallel and Distributed Information Systems, September 1994, pp. 73–80 (1994)

    Google Scholar 

  16. Cao, G., Singhal, M.: On Coordinated Checkpointing in Distributed Systems. IEEE Transactions on Parallel and Distributed Systems 9(12), 213–225 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rao, I., Imran, N., Lee, P., Huh, EN., Chung, T. (2006). A Proxy Based Efficient Checkpointing Scheme for Fault Recovery in Mobile Grid System. In: Robert, Y., Parashar, M., Badrinath, R., Prasanna, V.K. (eds) High Performance Computing - HiPC 2006. HiPC 2006. Lecture Notes in Computer Science, vol 4297. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11945918_44

Download citation

  • DOI: https://doi.org/10.1007/11945918_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68039-0

  • Online ISBN: 978-3-540-68040-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics