Proceedings of 3rd International Conference on Parallel and Distributed Information Systems
DOI: 10.1109/pdis.1994.331730
|View full text |Cite
|
Sign up to set email alerts
|

Checkpointing distributed applications on mobile computers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
107
0
1

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 131 publications
(110 citation statements)
references
References 19 publications
0
107
0
1
Order By: Relevance
“…For example, in mobile computing systems, due to vulnerability of Mobile Hosts (MHs) to catastrophic failures, e.g., loss, theft, or physical damage, the disk storage on an MH cannot be considered stable storage. A reasonable solution [1] is to utilize the stable storages at Mobile Support Stations (MSSs) to store checkpoints of MHs. Thus, to take a checkpoint, an MH has to transfer a large amount of data to its local MSS over the wireless network.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, in mobile computing systems, due to vulnerability of Mobile Hosts (MHs) to catastrophic failures, e.g., loss, theft, or physical damage, the disk storage on an MH cannot be considered stable storage. A reasonable solution [1] is to utilize the stable storages at Mobile Support Stations (MSSs) to store checkpoints of MHs. Thus, to take a checkpoint, an MH has to transfer a large amount of data to its local MSS over the wireless network.…”
Section: Discussionmentioning
confidence: 99%
“…5, we make two observations: OBSERVATION 1. It is not necessary to take checkpoint C 1,2 even though m4 exists, since P 0 does not transitively z-depend on P 1 during the zeroth checkpoint interval of P 0 .…”
Section: Enhanced Schemementioning
confidence: 99%
“…These protocols have either to exchange messages during the creation of an application checkpoint (Chandy and Lamport, 1985) (Plank, 1993), or during recovery to collect stored information (Johnson and Zwaenepoel, 1990). Protocols previously proposed for mobile computing have relied on the foreign agent for storing the checkpoint (Acharya and Badrinath, 1994) (Pradhan et al, 1996). Previous protocols also have not adapted their behavior to the characteristics of the current network connection.…”
Section: Introductionmentioning
confidence: 99%
“…Distributed mobile computing environments have been addressed in hardware entities by many papers in the literature [1,15]. In mobile distributed computing, much of the action takes place in the middleware level.…”
Section: Mobile Architecturementioning
confidence: 99%
“…Rearranging the above equation yields Equation (1). After engaging the moment generating property of the Laplace transform [6], E(R …”
Section: Execution Time and Average Effectiveness Without Checkpointingmentioning
confidence: 99%