This Article 
 Bibliographic References 
 Add to: 
Recovery in the Mobile Wireless Environment Using Mobile Agents
April 2004 (vol. 3 no. 2)
pp. 180-191

Abstract—Application recovery in Mobile Database Systems (MDS) is more complex because of an unlimited geographical mobility of mobile units. The mobility of these units makes it tricky to store application log and access it for recovery. This paper presents an application log management scheme, which uses a mobile-agent-based framework to facilitate seamless logging of application activities for recovery from transaction or system failure. We compare the performance of our scheme with lazy, pessimistic, and frequency-based schemes through simulation and show that compared to these schemes, our scheme reduces overall recovery time by efficiently managing resources and handoffs.

[1] A. Acharya and B.R. Badrinath, "Checkpointing Distributed Applications on Mobil Computers," Proc. Third Int'l Conf. Parallel and Distributed Information Systems, Sept. 1994.
[2] D. Kotz et al., "Agent TCL: Targeting the Needs of Mobile Computers," IEEE Internet Computing, vol. 1, no. 4, July-Aug. 1997, pp. 58-67.
[3] M.H. Dunham and A. Helal, Mobile Computing and Databases: Anything New? SIGMOD Record, vol. 24, no. 4, pp. 1-9, Dec. 1995.
[4] G. Eleftheriou and A. Galis, Mobile Intelligent Agents for Network Management Systems Proc. London Comm. Symp., 2000.
[5] T. Imielinski and B.R. Badrinath, Mobile Wireless Computing: Solutions and Challenges in Data Management Comm. ACM, pp. 19-27, Oct. 1994.
[6] J. Kiniry and D. Zimmerman, "A Hands-On Look at Java Mobile Agents," IEEE Internet Computing, vol. 1, no. 4, pp. 21-30, 1997.
[7] R. Koo and S. Toueg, Checkpointing and Rollback-Recovery for Distributed Systems IEEE Trans. Software Eng., vol. 13, no. 1, pp. 23-31, 1987.
[8] P. Krishna, N. Vaidya, and D. Pradhan, "Recovery in Distributed Mobile Environments," Proc. Workshop Advances in Parallel and Distributed Systems, pp. 83-88,Princeton, N.J., 1993.
[9] R. Kurupppillai, M. Dontamsetti, and F.J. Cosentino, Wireless PCS. McGraw-Hill, 1997.
[10] D.B. Lange and M. Oshima, Seven Good Reasons for Mobile Agents Comm. ACM, vol. 42, no. 3, 1999.
[11] L. Alvisi and K. Marzullo, “Message Logging: Pessimistic, Optimistic, Causal, and Optimal,” IEEE Trans. Software Eng., vol. 24, no. 2, pp. 149-159, Feb. 1998.
[12] M. Mouly and M.-B. Pautet, The GSM System for Mobile Communications. pp. 100-102, Cell&Sys Publications, 1992.
[13] C.E. Perkins, “Mobile Networking Through Mobile IP,” IEEE Internet Computing, vol. 2, no. 1, pp. 58-69, Jan.-Feb. 1998.
[14] P.A. Bernstein, Concurrency Control and Recovery in Database Systems pp. 226-236, 2003,
[15] D.K. Pradhan, P. Krishna, and N.H. Vaidya, Recovery in Mobile Environments: Design and Trade-Off Analysis Proc. 26th Int'l Symp. Fault-Tolerant Computing (FTCS-26), June 1996.
[16] F.D. Schlichting and F.D. Schneider, Failstop Processors: An Approach to Designing Fault-Tolerant Distributed Computing Systems ACM Trans. Computer Systems, vol. 1, no. 3, pp. 222-238, 1983.
[17] T. Park, N. Woo, and H.Y. Yeom, An Efficient Recovery Scheme for Mobile Computing Environments Proc. Eighth Int'l Conf. Parallel and Distributed Systems, 2001.
[18] T. Park and H.Y. Yeom, An Asynchronous Recovery Scheme Based on Optimistic Message Logging for Mobile Computing Systems Proc. 20th Int'l Conf. Distributed Computing Systems, pp. 436-443, Apr. 2000.
[19] V. Kumar and M.H. Dunham, Defining Location Data Dependency, Transaction Mobility and Commitment TR 98-cse-1, Southern Methodist Univ., Feb. 1998.
[20] V. Kumar, M.H. Dunham, N. Prabhu, and A.Y. Seydim, TCOT A Timeout Based Mobile Transaction Commitment Protocol IEEE Trans. Computers, vol. 51, no. 10, pp. 1212-1218, Oct. 2002.
[21] V.R. Narasayya, Distributed Transactions in a Mobile Computing System Proc. IEEE Workshop Mobile Computing Systems and Application, June 1994.
[22] B. Yao, K.F. Ssu, and W.K. Fuchs, “Message Logging in Mobile Computing,” Proc. IEEE Fault-Tolerant Computing Symp., pp. 294-301, June 1999.
[23] Y.-B. Lin and I. Chlamtac, Wireless and Mobile Network Architectures. Wiley Computer Publishing, 2001.
[24] Personal communication and Sprint PCS communication document, 2001.
[25] R. Barga and D. Lomet, Phoenix: Making Applications Robust (demo paper) Proc. ACM SIGMOD Conf., June 1999.
[26] D. Lomet and G. Weikum, Efficient Transparent Application Recovery In Client-Server Information Systems Proc. ACM SIGMOD, June 1998.
[27] D.B. Lomet, Application Recovery: Advances Toward an Elusive Goal Proc. Workshop High Performance Transaction Systems (HPTS '97), Sept. 1997.
[28] C.P. Martin and K. Ramamritham, Recovery Guarentees in Mobile Systems Proc. Int'l Workshop Data Eng. for Wireless and Mobile Access, pp. 1-7, Aug. 1999.
[29] G. Samaras, K. Karenos, P.K. Chrysanthis, and E. Pitoura, VISMA Extendible Mobile-Agent Based Services for the Materialization and Maintenance of Personalized and Sharable Web Views Proc. 14th Int'l Workshop Database and Expert Systems Applications (Dexa '03), pp. 974-979, 2003.
[30] S. Weissman Lanzac and P.K. Chrysanthis, Personalized Information Gatherinf for Mobile Database Clients Proc. Ann. Symp. Applied Computing, pp. 49-56, Mar. 2002.

Index Terms:
MDS, mobile agents, PCS, coordinators, log unification, recovery.
Sashidhar Gadiraju, Vijay Kumar, "Recovery in the Mobile Wireless Environment Using Mobile Agents," IEEE Transactions on Mobile Computing, vol. 3, no. 2, pp. 180-191, April 2004, doi:10.1109/TMC.2004.13
Usage of this product signifies your acceptance of the Terms of Use.