Memory exclusion: optimizing the performance of checkpointing systems
Software—Practice & Experience
FTCS '97 Proceedings of the 27th International Symposium on Fault-Tolerant Computing (FTCS '97)
How Safe is Probabilistic Checkpointing?
FTCS '98 Proceedings of the The Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing
ELF: an efficient log-structured flash file system for micro sensor nodes
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Sensor Networks for Emergency Response: Challenges and Opportunities
IEEE Pervasive Computing
A dynamic operating system for sensor nodes
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Proceedings of the 12th annual international conference on Mobile computing and networking
Multi-level software reconfiguration for sensor networks
EMSOFT '06 Proceedings of the 6th ACM & IEEE International conference on Embedded software
Memory overflow protection for embedded systems using run-time checks, reuse, and compression
ACM Transactions on Embedded Computing Systems (TECS)
PermaSense: investigating permafrost with a WSN in the Swiss Alps
Proceedings of the 4th workshop on Embedded networked sensors
Fidelity and yield in a volcano monitoring sensor network
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
BPLRU: a buffer management scheme for improving random writes in flash storage
FAST'08 Proceedings of the 6th USENIX Conference on File and Storage Technologies
Performance Trade-Offs in Using NVRAM Write Buffer for Flash Memory-Based Storage Devices
IEEE Transactions on Computers
FIND: faulty node detection for wireless sensor networks
Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems
Deploying sensor networks with guaranteed fault tolerance
IEEE/ACM Transactions on Networking (TON)
Multi-Path Routing Protocol with Unavailable Areas Identification in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Centralized and Clustered k-Coverage Protocols for Wireless Sensor Networks
IEEE Transactions on Computers
Deploying Wireless Sensor Networks with Fault Tolerance for Structural Health Monitoring
DCOSS '12 Proceedings of the 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems
Hi-index | 0.00 |
For some critical safety applications, sensor nodes embed valuable information, and they should be able to operate unattended and unfailing for several months or years. One promising solution is to adopt a checkpointing that periodically saves the state of a sensor node, thereby maintaining node reliability and network availability. Thus, this study first shows the design and implementation of a full checkpointing for WSNs. However, checkpointing is expensive. Therefore, incremental checkpointing was previously proposed to eliminate the checkpoint overhead by relying on the page protection hardware to identify dirty pages. Because sensor nodes are resource-constrained and do not equip with the page protection hardware, previous incremental checkpointings cannot be directly applied. To address this issue, this paper proposes three incremental checkpointings for WSNs. These three methods differ in the granularity of the checkpoint memory data unit and module execution overhead. In addition, we designed an incremental checkpoint file format that simultaneously supports proposed three different incremental checkpointings and accommodates them with sensor network characteristics. We implemented the full and three incremental checkpointings on SOS in the mica2 sensor motes. A performance evaluation of the three incremental checkpointings is presented. We also discuss and evaluate a method for selecting the appropriate incremental checkpointing. To the best of our knowledge, this study is the first to design and implement incremental checkpointing in MMU-less WSNs.