Adaptive recovery for mobile environments
Communications of the ACM
Modeling PCS networks under general call holding time and cell residence time distributions
IEEE/ACM Transactions on Networking (TON)
Checkpointing distributed applications on mobile computers
PDIS '94 Proceedings of the third international conference on on Parallel and distributed information systems
An Efficient Optimistic Message Logging Scheme for Recoverable Mobile Computing Systems
IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing
Recoverable mobile environment: design and trade-off analysis
FTCS '96 Proceedings of the The Twenty-Sixth Annual International Symposium on Fault-Tolerant Computing (FTCS '96)
Message Logging in Mobile Computing
FTCS '99 Proceedings of the Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing
Checkpoint-Recovery Protocol for Reliable Mobile Systems
SRDS '98 Proceedings of the The 17th IEEE Symposium on Reliable Distributed Systems
Recovery in the Mobile Wireless Environment Using Mobile Agents
IEEE Transactions on Mobile Computing
Linear wireless sensor networks: Classification and applications
Journal of Network and Computer Applications
Hi-index | 0.01 |
In this paper, we present an efficient failure recovery scheme for mobile database applications based on movement-based checkpointing and logging. Current approaches take checkpoints periodically without regard to the mobility behavior of mobile users. Our movement-based checkpointing scheme takes a checkpoint only after a threshold of mobility handoffs has been exceeded. The optimal threshold is governed by the failure rate, log arrival rate, and the mobility rate of the mobile host. This allows the tuning of the checkpointing rate on a per-user basis. We identify the optimal movement threshold which will minimize the recovery cost per failure as a function of the mobile node's mobility rate, failure rate and log arrival rate. We derive the mobile database application recoverability, i.e., the probability that the recovery can be done by a specified recovery time deadline. Numeric data are presented to demonstrate the feasibility of our approach with its applicability given.