460 likes | 551 Views
Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments. Chen Xinyu 2003-12-08 Term Presentation. Handoff: a mechanism for a Mobile Host to seamlessly change a connection from one Access Bridge to another. Access Bridge. Mobile Host. Static Host. Wired Link.
E N D
Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments Chen Xinyu 2003-12-08 Term Presentation
Handoff: a mechanism for a Mobile Host to seamlessly change a connection from one Access Bridge to another Access Bridge Mobile Host Static Host Wired Link Radio Link Cell Home Location Agent Wireless CORBA Architecture Wired Network
Outline • Analysis of Program Execution Time Based on Various Checkpointing Strategies • Expected-Reliability Analysis • Analysis of Message Sojourn Time in Access Bridge • Conclusions and Future Work
Program Execution Time • Motivation • Previous work • program execution time with and without checkpointing in the presence of failures on Static Hosts with given time requirement without failures • Mobile Environments • Underlying message-passing mechanism • Interactions with other hosts • Network communications • Discrete message exchange • Handoff
The Program’s Termination Condition • A program on a Mobile Host is successfully terminated if it continuously receives ncomputational messages
Objective • To derive the cumulative distribution function of the program execution time on a Mobile Host and its expectation with message number n in the advent of failures, handoffs, and checkpointings • Deterministic checkpointing strategy • Random checkpointing strategy
Deterministic Checkpointing Strategy • Deterministic: • Take a checkpoint when receiving a messages, a is a constant • The program execution is broken into intervals • The ith, i=1,2,…,m-1, interval contains a messages and a checkpoint • The message number in the mth interval is given by
/a Assumptions and State Transition • State 0 : normal • State 1 : handoff • State 2 : Composite checkpointing • State 3 : Composite recovery • Generally distributed random variables • C: checkpointing time • H: handoff time • R: repair time • U: rollback time 2 0 1 3
Composite States • State 2 – Composite checkpointing • State 4 – checkpointing, State 5 – handoff 2 4 5 5 • State 3 – Composite recovery • State 6 – repair, State 7 – rollback, State 8 – handoff 3 7 7 6 6 8 8
Conditional Execution Time • The execution time for the ithinterval, i=1,2,…,m-1 • The execution time for the mthinterval
Notation • Laplace-Stieltjes Transform of the cumulative distribution function of a random variable Z
Expected Program Execution Time • Deterministic checkpointing • Without checkpointing (a >= n)
Extended Deterministic Checkpointing • Given a sequence a1, a2, …, am-1, then am = n - a1 - a2 - … - am-1 • m-1 checkpoints • Expected program execution time
Random Checkpointing Strategy • Random: • Take a checkpoint when receiving I messages, I is a random variable • Geometric distribution • P(I=i) = p(1-p)i-1, i = 1,2,…
/a p State Transition 2 0 1 3
Expected Program Execution Time • Random Checkpointing • p = 0 indicates without checkpointing
Without Failures • Without Checkpointing If 1/a = p, then p(n-1) >= m-1, which indicates that on average the random checkpointing takes more checkpoints than the deterministic checkpointing. • Deterministic Checkpointing • Random Checkpointing
Average Effectiveness • Ratio between the expected execution time without and with failures, handoffs and checkpoints
Comparisons and Discussions (1) • Message number
Comparisons and Discussions (2) • Failure rate
Comparisons and Discussions (3) • Checkpoint creation time
Comparisons and Discussions (4) • Optimal checkpointing frequency (a-1, p)
Comparisons and Discussions (5) • Message arrival rate and handoff rate
Expected-Reliability Analysis • Motivation • Previous work • Two-terminal reliability: the probability of successful communication between the source node and the target node • Mobile Environments • Handoff causes the change of number and type of engaged communication components
Expected-Reliability • Two-terminal expected-reliability at time t • Qs(t) • the probability of the system in state s at time t • Rs(t) • the reliability of the system in state s at time t • Mean Time to Failure
Four Communication Schemes • Static Host to Static Host (SS) • Traditional communication scheme • Mobile Host to Static Host (MS) • 2 system states • Static Host to Mobile Host (SM) • 4 system states • Mobile Host to Mobile Host (MM) • 8 system states
Message Sojourn Time in Access Bridge • Motivation • Previous work • Task sojourn time in the presence of server breakdowns • Mobile Environments • Due to failures and handoffs of Mobile Hosts, the messages in Access Bridge cannot be dispatched
Objective • To derive the expected message sojourn time in an Access Bridge with different dispatch strategies in the presence of failures and handoffs of Mobile Hosts
n q0 Message Dispatch Model (1) • Basic dispatch model
q1 q2 qn /n /n /n Message Dispatch Model (2) • Static processor-sharing dispatch model
q1 q2 qn /K /K /K K Message Dispatch Model (3) • Dynamic processor-sharing dispatch model
q1 q2 qn Message Dispatch Model (4) • Round-robin dispatch model
n q0 Message Dispatch Model (5) • Feedback dispatch model
Analytical Results and Comparisons (1) • Number of mobile hosts
Analytical Results and Comparisons (2) • Failure rate
Analytical Results and Comparisons (3) • Message arrival rate
Analytical Results and Comparisons (4) • Expected message dispatch requirement
Conclusions • Derive the cumulative distribution function of the program execution time with various checkpointing strategies and its expectation • Observe that random checkpointing is more stable against the variation of parameters than deterministic checkpointing • Define expected-reliability to embody the mobility characteristic introduced by handoff • Analyze the message sojourn time in Access Bridge with fives dispatch models
Future Work • Relax some assumptions to derive more general program execution time • Failures may not be detected instantly • Further the expected-reliability analysis to include links failures. The reliability with multiple terminals will be considered • Provide fault tolerance mechanism for other mobile environments, such as ad-hoc mobile networks and sensor networks