460 likes | 560 Views
This presentation explores program execution time, reliability, and queuing analysis in mobile environments. It discusses a handoff mechanism that enables a mobile host to switch connections seamlessly between access bridges. The analysis includes different checkpointing strategies and their impact on expected reliability, message sojourn time, and execution intervals. The study derives the cumulative distribution function for program execution time, considering failures, handoffs, and checkpointing. Future work and potential improvements are also highlighted, contributing significant insights into mobile communications.
E N D
Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments Chen Xinyu 2003-12-08 Term Presentation
Handoff: a mechanism for a Mobile Host to seamlessly change a connection from one Access Bridge to another Access Bridge Mobile Host Static Host Wired Link Radio Link Cell Home Location Agent Wireless CORBA Architecture Wired Network
Outline • Analysis of Program Execution Time Based on Various Checkpointing Strategies • Expected-Reliability Analysis • Analysis of Message Sojourn Time in Access Bridge • Conclusions and Future Work
Program Execution Time • Motivation • Previous work • program execution time with and without checkpointing in the presence of failures on Static Hosts with given time requirement without failures • Mobile Environments • Underlying message-passing mechanism • Interactions with other hosts • Network communications • Discrete message exchange • Handoff
The Program’s Termination Condition • A program on a Mobile Host is successfully terminated if it continuously receives ncomputational messages
Objective • To derive the cumulative distribution function of the program execution time on a Mobile Host and its expectation with message number n in the advent of failures, handoffs, and checkpointings • Deterministic checkpointing strategy • Random checkpointing strategy
Deterministic Checkpointing Strategy • Deterministic: • Take a checkpoint when receiving a messages, a is a constant • The program execution is broken into intervals • The ith, i=1,2,…,m-1, interval contains a messages and a checkpoint • The message number in the mth interval is given by
/a Assumptions and State Transition • State 0 : normal • State 1 : handoff • State 2 : Composite checkpointing • State 3 : Composite recovery • Generally distributed random variables • C: checkpointing time • H: handoff time • R: repair time • U: rollback time 2 0 1 3
Composite States • State 2 – Composite checkpointing • State 4 – checkpointing, State 5 – handoff 2 4 5 5 • State 3 – Composite recovery • State 6 – repair, State 7 – rollback, State 8 – handoff 3 7 7 6 6 8 8
Conditional Execution Time • The execution time for the ithinterval, i=1,2,…,m-1 • The execution time for the mthinterval
Notation • Laplace-Stieltjes Transform of the cumulative distribution function of a random variable Z
Expected Program Execution Time • Deterministic checkpointing • Without checkpointing (a >= n)
Extended Deterministic Checkpointing • Given a sequence a1, a2, …, am-1, then am = n - a1 - a2 - … - am-1 • m-1 checkpoints • Expected program execution time
Random Checkpointing Strategy • Random: • Take a checkpoint when receiving I messages, I is a random variable • Geometric distribution • P(I=i) = p(1-p)i-1, i = 1,2,…
/a p State Transition 2 0 1 3
Expected Program Execution Time • Random Checkpointing • p = 0 indicates without checkpointing
Without Failures • Without Checkpointing If 1/a = p, then p(n-1) >= m-1, which indicates that on average the random checkpointing takes more checkpoints than the deterministic checkpointing. • Deterministic Checkpointing • Random Checkpointing
Average Effectiveness • Ratio between the expected execution time without and with failures, handoffs and checkpoints
Comparisons and Discussions (1) • Message number
Comparisons and Discussions (2) • Failure rate
Comparisons and Discussions (3) • Checkpoint creation time
Comparisons and Discussions (4) • Optimal checkpointing frequency (a-1, p)
Comparisons and Discussions (5) • Message arrival rate and handoff rate
Expected-Reliability Analysis • Motivation • Previous work • Two-terminal reliability: the probability of successful communication between the source node and the target node • Mobile Environments • Handoff causes the change of number and type of engaged communication components
Expected-Reliability • Two-terminal expected-reliability at time t • Qs(t) • the probability of the system in state s at time t • Rs(t) • the reliability of the system in state s at time t • Mean Time to Failure
Four Communication Schemes • Static Host to Static Host (SS) • Traditional communication scheme • Mobile Host to Static Host (MS) • 2 system states • Static Host to Mobile Host (SM) • 4 system states • Mobile Host to Mobile Host (MM) • 8 system states
Message Sojourn Time in Access Bridge • Motivation • Previous work • Task sojourn time in the presence of server breakdowns • Mobile Environments • Due to failures and handoffs of Mobile Hosts, the messages in Access Bridge cannot be dispatched
Objective • To derive the expected message sojourn time in an Access Bridge with different dispatch strategies in the presence of failures and handoffs of Mobile Hosts
n q0 Message Dispatch Model (1) • Basic dispatch model
q1 q2 qn /n /n /n Message Dispatch Model (2) • Static processor-sharing dispatch model
q1 q2 qn /K /K /K K Message Dispatch Model (3) • Dynamic processor-sharing dispatch model
q1 q2 qn Message Dispatch Model (4) • Round-robin dispatch model
n q0 Message Dispatch Model (5) • Feedback dispatch model
Analytical Results and Comparisons (1) • Number of mobile hosts
Analytical Results and Comparisons (2) • Failure rate
Analytical Results and Comparisons (3) • Message arrival rate
Analytical Results and Comparisons (4) • Expected message dispatch requirement
Conclusions • Derive the cumulative distribution function of the program execution time with various checkpointing strategies and its expectation • Observe that random checkpointing is more stable against the variation of parameters than deterministic checkpointing • Define expected-reliability to embody the mobility characteristic introduced by handoff • Analyze the message sojourn time in Access Bridge with fives dispatch models
Future Work • Relax some assumptions to derive more general program execution time • Failures may not be detected instantly • Further the expected-reliability analysis to include links failures. The reliability with multiple terminals will be considered • Provide fault tolerance mechanism for other mobile environments, such as ad-hoc mobile networks and sensor networks