Filters








573 Hits in 4.3 sec

Rollback recovery with low overhead for fault tolerance in mobile ad hoc networks

Parmeet Kaur Jaggi, Awadhesh Kumar Singh
2015 Journal of King Saud University: Computer and Information Sciences  
The paper presents a novel rollback recovery protocol for handling the failures of mobile nodes in a MANET using checkpointing and sender based message logging.  ...  The technique of checkpointing based rollback recovery has been used effectively for fault tolerance in static and cellular mobile systems; yet, the implementation of existing protocols for MANETs is not  ...  This BN, in addition, serves as the host's Checkpoint and log Storage Node (CSN) to save the checkpoint and message log of the MH.  ... 
doi:10.1016/j.jksuci.2014.03.022 fatcat:kzkrgzxpxbgtblay3lknmfm35e

SQL statement logging for making SQLite truly lite

Jong-Hyeok Park, Gihwan Oh, Sang-Won Lee
2017 Proceedings of the VLDB Endowment  
and perfect fit for SQLite-based mobile applications.  ...  SQL Statement Logging for Making SQLite Truly Lite. PVLDB, 11(4): xxxxyyyy, 2017.  ...  We would like to thank the anonymous PVLDB reviewers for valuable comments which helped to improve the paper.  ... 
doi:10.1145/3186728.3164146 fatcat:axr6myrlsrdldpvyw673ku2ami

Resilience of Stateful IoT Applications in a Dynamic Fog Environment

Umar Ozeer, Xavier Etchevers, Loïc Letondeur, François-Gaël Ottogalli, Gwen Salaün, Jean-Marc Vincent
2018 Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services - MobiQuitous '18  
However, these end devices have low stability and are prone to failures. There is consequently a need for failure management protocols for IoT applications in the Fog.  ...  Data stored during the state saving process are used for recovery, taking into account consistency with respect to the physical world.  ...  After a successful checkpoint, all previous checkpoints, message logs and function call records of the entity are purged.  ... 
doi:10.1145/3286978.3287007 dblp:conf/mobiquitous/OzeerELOSV18 fatcat:afbqlsqsrbbsbpgiqynzm3evna

Live Migration of Virtual Machine and Container based Mobile Core Network Components: A Comprehensive Study

Shunmugapriya Ramanathan, Koteswararao Kondepu, Miguel Razo, Marco Tacca, Luca Valcarenghi, Andrea Fumagalli
2021 IEEE Access  
With the increasing demand for openness, flexibility, and monetization the Network Function Virtualization (NFV) of mobile network functions has become the embracing factor for most mobile network operators  ...  Virtualization platforms of interest include both Virtual Machines (VMs) and Containers, with the latter option offering more lightweight characteristics.  ...  If the repair mode is enabled for a socket, • during the checkpoint process at the source node, the SCTP socket is closed at the source node without initiating the SCTP_SHUTDOWN or ABORT message; • during  ... 
doi:10.1109/access.2021.3099370 fatcat:p6ohh4nhhbfjlceicg3esqs77y

Lazy garbage collection of recovery state for fault-tolerant distributed shared memory

F. Sultan, T.D. Nguyen, L. Iftode
2002 IEEE Transactions on Parallel and Distributed Systems  
We devise two algorithms for garbage collection of checkpoints and logs, checkpoint garbage collection (CGC), and lazy log trimming (LLT).  ...  Evaluation results for real applications show that it effectively bounds the number of past checkpoints to be retained and the size of the logs in stable storage.  ...  The authors also thank Murali Rangarajan for insights into protocol and application behavior, and for all the help with the experimental part.  ... 
doi:10.1109/tpds.2002.1019857 fatcat:l6azt7ve7vftlfdoi3q76uppke

Lazy garbage collection of recovery state for fault-tolerant distributed shared memory

F. Sultan, T.D. Nguyen, L. Iftode
2002 IEEE Transactions on Parallel and Distributed Systems  
We devise two algorithms for garbage collection of checkpoints and logs, checkpoint garbage collection (CGC), and lazy log trimming (LLT).  ...  Evaluation results for real applications show that it effectively bounds the number of past checkpoints to be retained and the size of the logs in stable storage.  ...  The authors also thank Murali Rangarajan for insights into protocol and application behavior, and for all the help with the experimental part.  ... 
doi:10.1109/tpds.2002.1041885 fatcat:vewca4pfwjd57lfg3ciwhktno4

On the design of perturbation-resilient atomic commit protocols for mobile transactions

Brahim Ayari, Abdelmajid Khelil, Neeraj Suri
2011 ACM Transactions on Computer Systems  
This is challenging as mobile environments are typically characterized by frequent perturbations such as network disconnections and node failures.  ...  On the other hand frequent node and link failures complicate the design of atomic commit protocols by increasing both the transaction abort rate and resource blocking time.  ...  The combination of both (often used in databases) uses both checkpoint and recovery logs and proceeds as follows: (a) take a checkpoint and delete old log and start new log, (b) log all significant messages  ... 
doi:10.1145/2003690.2003691 fatcat:frap5kgxzvaivm5ndhso6evjbm

Virtual Sender-based Message Logging for Large-scale Ubiquitous Sensor Network Systems

Jinho Ahn
2014 International Journal of Multimedia and Ubiquitous Engineering  
memory of its sender as storage for logging.  ...  This paper presents a scalable virtual senderbased message logging algorithm to solve this problem by enabling the broker elected in a group of nodes as virtual sender to localize both of the logging and  ...  In the remainder of this paper, the messages applications generate are called application messages and the messages used for the message logging and recovery procedures, control messages.  ... 
doi:10.14257/ijmue.2014.9.5.04 fatcat:wcrdxlffrndlhf33edmsrjgjzy

MobiStreams: A Reliable Distributed Stream Processing System for Mobile Devices

Huayong Wang, Li-Shiuan Peh
2014 2014 IEEE 28th International Parallel and Distributed Processing Symposium  
MobiStreams tackles these challenges through two new techniques: 1) tokentriggered checkpointing, and 2) broadcast-based checkpointing.  ...  Yet, existing applications rely predominantly on a client-server computing paradigm, using phones only as thin clients, sending sensed information via the cellular network to servers for processing.  ...  The controller is lightweight -it is used only for control purposes and is not involved in any data transmission between phones.  ... 
doi:10.1109/ipdps.2014.17 dblp:conf/ipps/WangP14 fatcat:64pcnhccijftpbqlm5cukw4fcm

Software-Defined Edge Cloud Framework for Resilient Multitenant Applications

Kaikai Liu, Nagthej Manangi Ravindrarao, Abhishek Gurudutt, Tejeshwar Kamaal, Chinmayi Divakara, Praveen Prabhakaran
2019 Wireless Communications and Mobile Computing  
Specifically, we propose building a software platform to manage the distributed edge nodes along with support services to deploy and launch isolated and multitenant user applications through a lightweight  ...  The cluster of geo-distributed and wireless edge nodes not only power multitenant IoT applications that are closer to the data source and the user, but also enable developers to remotely deploy and orchestrate  ...  Acknowledgments The work presented in this paper is funded by Cisco Systems and National Science Foundation under Grant No. CNS 1637371.  ... 
doi:10.1155/2019/3947286 fatcat:sig3a3f4w5aztajo4mkamyqqgq

Group monitoring in mobile wireless sensor networks

Marco Cattani, Stefan Guna, Gian Pietro Picco
2011 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS)  
At one extreme, group membership information is proactively and collectively maintained by each node in the group.  ...  We compare our solutions through simulation of synthetic scenarios and real-world mobility traces of humans.  ...  ACKNOWLEDGMENTS The work described in this paper was partially supported by the Autonomous Province of Trento under the call for proposals "Major Projects 2006" (project ACUBE) and by the EU Cooperating  ... 
doi:10.1109/dcoss.2011.5982168 dblp:conf/dcoss/CattaniGP11 fatcat:7k7kpccpyzd73looufdvlcg4du

Census: Fast, scalable and robust data aggregation in MANETs [article]

Vinod Kulathumani, Anish Arora, Kenneth Parker, Mukundan Sridharan, Masahiro Nakagawa
2015 arXiv   pre-print
The protocol is structure-free so as to avoid high messaging overhead for maintaining structure in the presence of node mobility.  ...  Census thus achieves a cover time of O(N/k) and message overhead of O(Nlog(N)/k) where N is the number of nodes and k the number of tokens in the network.  ...  The curve for local-bias token messages and the gradient setup messages grow as log(N ), indicating a N log(N ) messaging overhead.  ... 
arXiv:1409.7368v2 fatcat:gnsg5veh5ffd5kmtidt3uzyse4

The Architecture of the XtreemOS Grid Checkpointing Service [chapter]

John Mehnert-Spahn, Thomas Ropars, Michael Schoettner, Christine Morin
2009 Lecture Notes in Computer Science  
The latter may spawn millions of grid nodes using different system-specific checkpointers saving and restoring application and kernel data structures on a grid node.  ...  XtreemOS uses an integrated grid checkpointing service (XtreemGCP) for implementing migration and fault tolerance.  ...  Future work includes implementation of adaptive checkpointing mechanisms, uncoordinated checkpointing strategies, and integration of the announced kernel checkpointer for the Linux mainstream.  ... 
doi:10.1007/978-3-642-03869-3_42 fatcat:n3ciu7huwrhzjok43mudcxvjky

Decentralized QoS-Aware Checkpointing Arrangement in Mobile Grid Computing

Paul J Darby, Nian-Feng Tzeng
2010 IEEE Transactions on Mobile Computing  
With ReD, an MH (mobile host) simply sends its checkpointed data to one selected neighboring MH, and also serves as a stable point of storage for checkpointed data received from a single approved neighboring  ...  This paper deals with decentralized, QoS-aware middleware for checkpointing arrangement in Mobile Grid (MoG) computing systems.  ...  Also, a method for reliable message logging has been suggested [27] , where each MH client communicates with the BS through a proxy for checkpointed data storage, masking crashes.  ... 
doi:10.1109/tmc.2010.80 fatcat:qffzqh4msrcpjmsj4schffojti

PTIMEHighly scalable OLTP DBMS for Managing Update-Intensive Stream Workload [chapter]

S CHA, C SONG
2004 Proceedings 2004 VLDB Conference  
Its storage engine layer incorporates our previous innovations for exploiting engine-level microparallelism such as differential logging and optimistic latch-free index traversal concurrency control protocol  ...  Over the past thirty years since the system R and Ingres projects started to lay the foundation for today's RDBMS implementations, the underlying hardware and software platforms have changed dramatically  ...  They also thank other members of P*TIME development team for their contribution.  ... 
doi:10.1016/b978-012088469-8/50090-5 fatcat:cmwor2oco5gbvmxd6pojnmyojm
« Previous Showing results 1 — 15 out of 573 results