Advertisement

Distributed and Parallel Databases

, Volume 23, Issue 3, pp 189–205 | Cite as

Movement-based checkpointing and logging for failure recovery of database applications in mobile environments

  • Sapna E. George
  • Ing-Ray Chen
Article

Abstract

In this paper, we present an efficient failure recovery scheme for mobile database applications based on movement-based checkpointing and logging. Current approaches take checkpoints periodically without regard to the mobility behavior of mobile users. Our movement-based checkpointing scheme takes a checkpoint only after a threshold of mobility handoffs has been exceeded. The optimal threshold is governed by the failure rate, log arrival rate, and the mobility rate of the mobile host. This allows the tuning of the checkpointing rate on a per-user basis. We identify the optimal movement threshold which will minimize the recovery cost per failure as a function of the mobile node’s mobility rate, failure rate and log arrival rate. We derive the mobile database application recoverability, i.e., the probability that the recovery can be done by a specified recovery time deadline. Numeric data are presented to demonstrate the feasibility of our approach with its applicability given.

Keywords

Mobile database application Mobile data management Failure recovery Checkpoint Logging Recoverability Mobility handoff 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Acharya, A., Badrinath, B.R.: Checkpointing distributed applications on mobile computers. In: 3rd Int’l Con. on Parallel and Distributed Information Systems, pp. 73–80. October 1994 Google Scholar
  2. 2.
    Chen, I.R., Gu, B., George, S., Cheng, S.T.: On failure recoverability of client-server applications in mobile wireless environments. IEEE Trans. Reliab. 54(1), 115–122 (2005) CrossRefGoogle Scholar
  3. 3.
    Elnozahy, E.N., Alvisi, L., Wang, Y.M., Johnson, D.B.: A survey of rollback-recovery protocols in message passing systems. Technical Report, School of Computer Science, Carnegie Mellon University (1996). CMU-CS-96-181 Google Scholar
  4. 4.
    Fang, Y., Chlamtac, I., Lin, Y.-B.: Modeling PCS networks under general call holding time and cell residence time distributions. IEEE/ACM Trans. Netw. 5(6), 893–906 (1998) CrossRefGoogle Scholar
  5. 5.
    Gadiraju, S., Kumar, V.: Recovery in the mobile wireless environment using mobile agents. IEEE Trans. Mobile Comput. 3(2), 180–191 (2004) CrossRefGoogle Scholar
  6. 6.
    Higaki, H., Takizawa, M.: Checkpoint-recovery protocol for reliable mobile systems. In: 17th IEEE Symposium on Reliable Distributed Systems, pp. 93–99. October 1998 Google Scholar
  7. 7.
    Neves, N., Fuchs, W.K.: Adaptive recovery for mobile environments. Commun. ACM 40(1), 68–74 (1997) CrossRefGoogle Scholar
  8. 8.
    Park, T., Yeom, H.Y.: Application controlled checkpointing coordination for fault-tolerant distributed computing systems. Parallel Comput. 26(4), 467–482 (2000) MATHCrossRefGoogle Scholar
  9. 9.
    Park, T., Woo, N., Yeom, H.Y.: An efficient optimistic message logging scheme for recoverable mobile computing systems. IEEE Trans. Mobile Comput. 1(4), 265–277 (2002) CrossRefGoogle Scholar
  10. 10.
    Park, T., Woo, N., Yeom, H.Y.: An efficient recovery scheme for fault-tolerant mobile computing systems. Futur. Gener. Comput. Syst. 19(1), 37–53 (2003) MATHCrossRefGoogle Scholar
  11. 11.
    Pradhan, D.K., Krishna, P., Vaidya, N.H.: Recoverable mobile environment: design and tradeoff analysis. In: Annual Symposium on Fault Tolerant Computing, pp. 16–25 (1996) Google Scholar
  12. 12.
    Wang, J., Zeng, Q.A., Agrawal, D.P.: Performance analysis of a preemptive and priority reservation handoff scheme for integrated service-based wireless mobile networks. IEEE Trans. Mobile Comput. 2(1), 65–75 (2003) CrossRefGoogle Scholar
  13. 13.
    Yao, B., Ssu, K.F., Fuchs, W.K.: Message logging in mobile computing. In: 29th Annual International Symposium on Fault-Tolerant Computing, pp. 294–301 (1999) Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  1. 1.Department of Computer ScienceVirginia Polytechnic and State UniversityFalls ChurchUSA

Personalised recommendations