A low-latency checkpointing scheme for mobile computing systems

Guohui Li, Lih-Chyun Shu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Fault-tolerant mobile computing systems have different requirements and restrictions, not taken into account by conventional distributed systems. This paper presents a co-ordinated checkpointing scheme which reduces the delay involved in a global checkpointing process for mobile systems. A piggyback technique is used to track and record the checkpoint dependency information among processes during normal message transmission. During checkpointing, a concurrent checkpointing technique is designed to use the pre-recorded process dependency information to minimize process blocking time by sending checkpoint requests to dependent processes at once, hence saving the time to trace the dependency tree. Our checkpoint algorithm forces a minimum number of processes to take checkpoints. Via probability-based analysis, we show that our scheme can significantly reduce the latency associated with checkpoint request propagation, compared to traditional coordinated checkpointing approach.

Original languageEnglish
Title of host publicationProceedings of the 29th Annual International Computer Software and Applications Conference - Workshops and Fast Abstracts, COMPSAC 2005
Pages491-496
Number of pages6
DOIs
Publication statusPublished - 2005 Dec 1
Event29th Annual International Computer Software and Applications Conference, COMPSAC 2005 - Edinburgh, Scotland, United Kingdom
Duration: 2005 Jul 262005 Jul 28

Publication series

NameProceedings - International Computer Software and Applications Conference
Volume1
ISSN (Print)0730-3157

Other

Other29th Annual International Computer Software and Applications Conference, COMPSAC 2005
Country/TerritoryUnited Kingdom
CityEdinburgh, Scotland
Period05-07-2605-07-28

All Science Journal Classification (ASJC) codes

  • Software

Fingerprint

Dive into the research topics of 'A low-latency checkpointing scheme for mobile computing systems'. Together they form a unique fingerprint.

Cite this