Skip to main content

Checkpoint-Recovery for Mobile Intelligent Networks

  • Conference paper
  • First Online:
Engineering of Intelligent Systems (IEA/AIE 2001)

Abstract

For supporting recent intelligent applications, high performance and intelligent networks is required to be developed. Here, fault- tolerance is one of the most important properties. In addition, a mobile computer network is an infrastructure for an intelligent network. This paper discusses a hybrid checkpoint protocol. In order to apply the protocol, mobile-to-mobile communication in wireless LAN protocols such as IEEE 802.11 and HIPERLAN has to be supported. This paper proposes a novel logging protocol which requires no additional messages.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Acharya, A. and Badrinath, B. R., “Checkpointing Distributed Applications on Mobile computers, ” The 3rd International Conference on Parallel and Distributed Information Systems, pp. 73–80 (1994).

    Google Scholar 

  2. Chandy, K. M. and Lamport L., “Distributed Snapshots: Determining Global States of Distributed Systems, ” ACM Trans. on Computer Systems, Vol. 3, No. 1, pp. 63–75 (1985).

    Article  Google Scholar 

  3. Elozahy, E. N., Johnson, D. B. and Wang, Y. M., “A Survey of Rollback-Recovery Protocols in Message-Passing Systems, ” Technical Note of Carnegie Mellon University, CMU-CS-96-181 (1996).

    Google Scholar 

  4. “Radio Equipment and Systems(RES); HIPERLAN, ” ETSI Functional Specifications (1995).

    Google Scholar 

  5. “Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications, ” Standard IEEE802.11 (1997).

    Google Scholar 

  6. Koo R. and Toueg, S., “Checkpointing and Rollback-Recovery for Distributed Systems, ” IEEE Trans. on Software Engineering, Vol. SE-13, No. 1, pp. 23–31 (1987).

    Article  Google Scholar 

  7. Muller, G., Hue, M. and Peyrouz, N., “Performance of consistent checkpointing in a modular operating system: Result of the FTM experiment, ” Lecture Notes in Computer Science: Dependable Computing-EDCCC-1, pp. 357–365 (1994).

    Google Scholar 

  8. Neves, N. and Fuchs, W. K., “Adaptive Recovery for Mobile Environments, ” Communications of the ACM, Vol. 40, No. 1, pp. 69–74 (1997).

    Article  Google Scholar 

  9. Pradhan, D. K., Krishna, P. P. and Vaidya, N. H., “Recovery in Mobile Wireless Environment: Design and Trade-off Analysis, ” The 26th International Symposium on Fault-Tolerant Computing, pp. 16–25 (1996).

    Google Scholar 

  10. Prakash, R. and Singhal, M., “Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems, ” IEEE Trans. on Parallel and Distributed Systems, Vol. 7, No. 10, pp. 1035–1048 (1996).

    Article  Google Scholar 

  11. Smith, S. W., Johnson, D. B. and Tygar, J. D., “Completely asynchronous optimistic recovery with minimal rollbacks, ” The 25th International Symposium on Fault-Tolerant Computing, pp. 361–370 (1995).

    Google Scholar 

  12. Smith, S. W. and Johnson, D. B., “Minimizing timestamp size for completely asynchronous optimistic recovery with minimal rollback, ” The 15th IEEE Symposium on Reliable Distributed Systems, pp. 66–75 (1996).

    Google Scholar 

  13. Tsuruoka, K., Kaneko, A. and Nishihara, Y., “Dynamic recovery schemes for distributed processes, ” The 2nd IEEE Symposium on Reliability in Distributed Software and Database Systems, pp. 86–95 (1995).

    Google Scholar 

  14. Wang, Y. M., “The maximum and minimum consistent global checkpoints and their applications, ” The 14th IEEE Symposium on Reliable Distributed Systems, pp.86–95 (1995).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Morita, Y., Higaki, H. (2001). Checkpoint-Recovery for Mobile Intelligent Networks. In: Monostori, L., Váncza, J., Ali, M. (eds) Engineering of Intelligent Systems. IEA/AIE 2001. Lecture Notes in Computer Science(), vol 2070. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45517-5_50

Download citation

  • DOI: https://doi.org/10.1007/3-540-45517-5_50

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42219-8

  • Online ISBN: 978-3-540-45517-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics