Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of...
-
date post
21-Dec-2015 -
Category
Documents
-
view
217 -
download
1
Transcript of Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of...
![Page 1: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/1.jpg)
Dept. of Computer Science & Engineering, CUHK
Performance and Effectiveness Analysis of Checkpointing in
Mobile Environments
Chen Xinyu
2003-01-22
![Page 2: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/2.jpg)
Introduction
Mobile Environment – Wireless CORBA
Performance and Effectiveness Analysis of Checkpointing
Conclusions and Future Work
Outline
![Page 3: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/3.jpg)
Introduction
Mobile Computing Permanent failures
Physical damage
Transient failures Mobile hosts Wireless links Environmental conditions
![Page 4: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/4.jpg)
Checkpointing and Rollback Recovery
Checkpoint the saved program’s states during failure-free
execution
Repair brings the failed device back to normal operation
Rollback reloads the program’s states saved at the most
recent checkpoint
Recovery the reprocessing of the program, starting from the
most recent checkpoint, applying the logged messages and until the point just before the failure
![Page 5: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/5.jpg)
Wireless CORBA Architecture
Visited Domain
Home Domain
Terminal Domain
Access Bridge
Access Bridge
Access Bridge
Access Bridge
Static Host
Static Host
Terminal Bridge
GIOP
Tunnel
ab1
ab2
mh1
GTP Messages
![Page 6: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/6.jpg)
Wireless CORBA Architecture
Visited Domain
ab1
ab2
Access Bridge
Access Bridge
Static Host
Static Host
Home Domain
Home Location
Agent
Terminal Domain Terminal
Bridge
GIOP
Tunnelmh1
mh1
Terminal Domain Terminal
Bridge
GIOP
Tunnel
GIOP
Tunnel
mh1
Terminal Domain Terminal
BridgeGIOP Tunnel
mh1
Terminal Domain Terminal
Bridge
Access Bridge
Access Bridge
![Page 7: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/7.jpg)
Introduction
Mobile Environment – Wireless CORBA
Performance and Effectiveness Analysis of Checkpointing
Conclusions and Future Work
Outline
![Page 8: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/8.jpg)
Program’s Termination Condition
A program is successfully terminated if it receives N computational messages continuously
![Page 9: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/9.jpg)
Assumptions
Failure occurrence, message arrival and handoff event
homogeneous Poisson process with parameter , and respectively
Failures do not occur when the program is in the repair or rollback process
A failure is detected as soon as it occurs
![Page 10: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/10.jpg)
Execution without Checkpointing
RY0
X0
R
F1
H1Z0
0 t
Fj
Hk
mj(1) mj(N)m1(n1)m0(N)
X(N)
Repair Handoff
H H
![Page 11: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/11.jpg)
Conditional Execution Time without checkpointing
![Page 12: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/12.jpg)
LST without checkpointing
![Page 13: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/13.jpg)
LST and Expectation of Program Execution Time
![Page 14: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/14.jpg)
Bounded Situations
Without handoff
Without handoff and failure
![Page 15: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/15.jpg)
Execution with Equi-number Checkpointing
Ci
R+CYi(0)
Xi(0)
R+C
Fi(1)
Hi(1)Z i(0)
0 t
Fi(j)
Hi(k)
mij(1) mij(a)mi1(ni1)mi0(a)
Xi(N,a)
Repair + Rollback Handoff
Ci-1
Checkpointing
H H CC
![Page 16: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/16.jpg)
Conditional Execution Time & LST with Checkpointing
![Page 17: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/17.jpg)
LST and Expectation of Program Execution Time
![Page 18: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/18.jpg)
Average Effectiveness
Effective interval: a program produces useful work towards its completion
Wasted interval: Repair and rollback Handoff Checkpoint creation Wasted Computation
Average Effectiveness: how much of the time an MH is in effective interval during an execution
![Page 19: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/19.jpg)
Optimal Checkpointing Interval
![Page 20: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/20.jpg)
Beneficial Condition
![Page 21: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/21.jpg)
Equi-number Checkpointing
Equi-number checkpointing with respect to message number Message number in each checkpointing interval is
not changed
Equi-number checkpointing with respect to checkpoint number Checkpoint number is not changed
![Page 22: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/22.jpg)
Equi-number Checkpointing with respect to Checkpoint Number
![Page 23: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/23.jpg)
Equi-number Checkpointing with respect to Message Number
![Page 24: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/24.jpg)
Comparison Between Checkpointing and Without Checkpointing
![Page 25: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/25.jpg)
Average Effectiveness vs. Message Arrival Rate and Handoff Rate
![Page 26: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/26.jpg)
Conclusions
Introduce an equi-number checkpoiting strategy
Derive LST and expectation of program execution time
Derive average effectiveness Derive optimal checkpointing
interval Identify the beneficial condition
![Page 27: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/27.jpg)
Future Work
Analytical model Message queuing effect during repair and
recovery General event distributions
Fault tolerance in ad hoc network Without infrastructure support Self-organizing and adaptive
![Page 28: Dept. of Computer Science & Engineering, CUHK Performance and Effectiveness Analysis of Checkpointing in Mobile Environments Chen Xinyu 2003-01-22.](https://reader035.fdocuments.in/reader035/viewer/2022062421/56649d545503460f94a312b9/html5/thumbnails/28.jpg)
Thank You