program execution time, reliability, and queueing analysis in mobile environments
DESCRIPTION
Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments. Chen Xinyu 2003-12-08 Term Presentation. Handoff: a mechanism for a Mobile Host to seamlessly change a connection from one Access Bridge to another. Access Bridge. Mobile Host. Static Host. Wired Link. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/1.jpg)
Program Execution Time, Program Execution Time, Reliability, and Queueing Analysis Reliability, and Queueing Analysis
in Mobile Environmentsin Mobile Environments
Chen XinyuChen Xinyu
2003-12-082003-12-08
Term PresentationTerm Presentation
![Page 2: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/2.jpg)
2
Wireless CORBA ArchitectureWireless CORBA Architecture
Cell
Access Bridge
Mobile Host
Static Host
Radio Link
Wired Link
Wired Network
Handoff: a mechanism for a Mobile Host to seamlessly
change a connection from one Access Bridge to another
Home Location Agent
![Page 3: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/3.jpg)
3
OutlineOutline
• Analysis of Program Execution Time Based Analysis of Program Execution Time Based on Various Checkpointing Strategieson Various Checkpointing Strategies
• Expected-Reliability AnalysisExpected-Reliability Analysis
• Analysis of Message Sojourn Time in Analysis of Message Sojourn Time in Access BridgeAccess Bridge
• Conclusions and Future WorkConclusions and Future Work
![Page 4: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/4.jpg)
4
Program Execution TimeProgram Execution Time
• MotivationMotivation• Previous workPrevious work
• program execution time with and without program execution time with and without checkpointing in the presence of failures on Static checkpointing in the presence of failures on Static Hosts with given time requirement without failuresHosts with given time requirement without failures
• Mobile EnvironmentsMobile Environments• Underlying message-passing mechanismUnderlying message-passing mechanism
• Interactions with other hostsInteractions with other hosts• Network communicationsNetwork communications• Discrete message exchangeDiscrete message exchange
• HandoffHandoff
![Page 5: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/5.jpg)
5
The Program’s Termination ConditionThe Program’s Termination Condition
• A program on a Mobile Host is A program on a Mobile Host is successfully terminated if it continuously successfully terminated if it continuously receives receives nn computational computational messagesmessages
![Page 6: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/6.jpg)
6
ObjectiveObjective
• To derive the cumulative distribution function To derive the cumulative distribution function of the program execution time on a Mobile of the program execution time on a Mobile Host and its expectation with message number Host and its expectation with message number nn in the advent of failures, handoffs, and in the advent of failures, handoffs, and checkpointingscheckpointings• Deterministic checkpointing strategyDeterministic checkpointing strategy
• Random checkpointing strategyRandom checkpointing strategy
![Page 7: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/7.jpg)
7
Deterministic Checkpointing StrategyDeterministic Checkpointing Strategy
• Deterministic: Deterministic: • Take a checkpoint when receiving Take a checkpoint when receiving a a
messages, messages, aa is a constant is a constant
• The program execution is broken into The program execution is broken into intervalsintervals
• The The iithth, i=1,2,…,m-1, i=1,2,…,m-1, interval contains , interval contains aa messages and a checkpointmessages and a checkpoint
• The message number in the The message number in the mmthth interval interval is given by is given by
![Page 8: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/8.jpg)
8
Assumptions and State TransitionAssumptions and State Transition
• State 0 : normalState 0 : normal
• State 1 : handoffState 1 : handoff
• State 2 : State 2 : Composite checkpointingComposite checkpointing
• State 3 : State 3 : Composite recoveryComposite recovery
• Generally distributed Generally distributed random variablesrandom variables• CC: checkpointing time: checkpointing time• HH: handoff time: handoff time• RR: repair time: repair time• UU: rollback time: rollback time
0
1
3
2
/a
![Page 9: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/9.jpg)
9
Composite StatesComposite States
• State 2 – Composite checkpointingState 2 – Composite checkpointing• State 4 – checkpointing, State 5 – handoffState 4 – checkpointing, State 5 – handoff
6 7 8
3 7 8
2 4 5
5
• State 3 – Composite recoveryState 3 – Composite recovery• State 6 – repair, State 7 – rollback, State 8 – handoffState 6 – repair, State 7 – rollback, State 8 – handoff
6
![Page 10: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/10.jpg)
10
Conditional Execution TimeConditional Execution Time
• The execution time for the The execution time for the iithth interval,interval, i=1,2,…,m-1 i=1,2,…,m-1
• The execution time for the The execution time for the mmthth intervalinterval
![Page 11: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/11.jpg)
11
NotationNotation
• Laplace-Stieltjes Transform of the Laplace-Stieltjes Transform of the cumulative distribution function of a cumulative distribution function of a random variable random variable ZZ
![Page 12: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/12.jpg)
12
Expected Program Execution TimeExpected Program Execution Time
• Deterministic checkpointingDeterministic checkpointing
• Without checkpointing (Without checkpointing (a >= na >= n))
![Page 13: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/13.jpg)
13
Extended Deterministic CheckpointingExtended Deterministic Checkpointing
• Given a sequence Given a sequence aa11, a, a22, …, a, …, am-1m-1, then , then
aam m = n - a= n - a1 1 - a- a22 - … - a - … - am-1m-1
• m-1m-1 checkpoints checkpoints
• Expected program execution timeExpected program execution time
![Page 14: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/14.jpg)
14
Random Checkpointing StrategyRandom Checkpointing Strategy
• Random:Random:• Take a checkpoint when receiving Take a checkpoint when receiving I I
messages, messages, II is a random variable is a random variable
• Geometric distributionGeometric distribution• P(I=i) = p(1-p)P(I=i) = p(1-p)i-1i-1, i = 1,2, i = 1,2,…,…
![Page 15: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/15.jpg)
15
State TransitionState Transition
0
1
3
2
p
/a
![Page 16: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/16.jpg)
16
Conditional Execution TimeConditional Execution Time
![Page 17: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/17.jpg)
17
Expected Program Execution TimeExpected Program Execution Time
• Random CheckpointingRandom Checkpointing
• p = 0p = 0 indicates without checkpointing indicates without checkpointing
![Page 18: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/18.jpg)
18
Without FailuresWithout Failures
• Without CheckpointingWithout Checkpointing
• Deterministic CheckpointingDeterministic Checkpointing
• Random CheckpointingRandom Checkpointing
If 1/a = p, then p(n-1) >= m-1,
which indicates that on average the random checkpointing
takes more checkpoints than the deterministic checkpointing.
![Page 19: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/19.jpg)
19
Average EffectivenessAverage Effectiveness
• Ratio between the expected execution Ratio between the expected execution time without and with failures, handoffs time without and with failures, handoffs and checkpointsand checkpoints
![Page 20: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/20.jpg)
20
Comparisons and Discussions (1)Comparisons and Discussions (1)
• Message numberMessage number
![Page 21: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/21.jpg)
21
Comparisons and Discussions (2)Comparisons and Discussions (2)
• Failure rateFailure rate
![Page 22: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/22.jpg)
22
Comparisons and Discussions (3)Comparisons and Discussions (3)
• Checkpoint creation timeCheckpoint creation time
![Page 23: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/23.jpg)
23
Comparisons and Discussions (4)Comparisons and Discussions (4)
• Optimal checkpointing frequency (aOptimal checkpointing frequency (a-1-1, p), p)
![Page 24: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/24.jpg)
24
Comparisons and Discussions (5)Comparisons and Discussions (5)
• Message arrival rate and handoff rateMessage arrival rate and handoff rate
![Page 25: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/25.jpg)
25
Expected-Reliability AnalysisExpected-Reliability Analysis
• MotivationMotivation• Previous workPrevious work
• Two-terminal reliability: the probability of Two-terminal reliability: the probability of successful communication between the source successful communication between the source node and the target nodenode and the target node
• Mobile EnvironmentsMobile Environments• Handoff causes the change of Handoff causes the change of numbernumber and and typetype
of engaged communication components of engaged communication components
![Page 26: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/26.jpg)
26
Expected-ReliabilityExpected-Reliability
• Two-terminal expected-reliability at time Two-terminal expected-reliability at time tt
• QQss(t)(t)• the probability of the system in state the probability of the system in state ss at time at time tt
• RRss(t)(t)• the reliability of the system in state the reliability of the system in state ss at time at time tt
• Mean Time to FailureMean Time to Failure
![Page 27: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/27.jpg)
27
Four Communication SchemesFour Communication Schemes
• Static Host to Static Host (SS)Static Host to Static Host (SS)• Traditional communication schemeTraditional communication scheme
• Mobile Host to Static Host (MS)Mobile Host to Static Host (MS)• 2 system states2 system states
• Static Host to Mobile Host (SM)Static Host to Mobile Host (SM)• 4 system states4 system states
• Mobile Host to Mobile Host (MM)Mobile Host to Mobile Host (MM)• 8 system states8 system states
![Page 28: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/28.jpg)
28
MS SchemeMS Scheme
![Page 29: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/29.jpg)
29
SM SchemeSM Scheme
![Page 30: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/30.jpg)
30
MM SchemeMM Scheme
![Page 31: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/31.jpg)
31
MM Scheme (Cont’d)MM Scheme (Cont’d)
![Page 32: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/32.jpg)
32
MM Scheme (Cont’d)MM Scheme (Cont’d)
![Page 33: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/33.jpg)
33
Message Sojourn Time in Access BridgeMessage Sojourn Time in Access Bridge
• MotivationMotivation• Previous workPrevious work
• Task sojourn time in the presence of server Task sojourn time in the presence of server breakdownsbreakdowns
• Mobile EnvironmentsMobile Environments• Due to failures and handoffs of Mobile Hosts, Due to failures and handoffs of Mobile Hosts,
the messages in Access Bridge cannot be the messages in Access Bridge cannot be dispatcheddispatched
![Page 34: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/34.jpg)
34
ObjectiveObjective
• To derive the expected message To derive the expected message sojourn time in an Access Bridge with sojourn time in an Access Bridge with different dispatch strategies in the different dispatch strategies in the presence of failures and handoffs of presence of failures and handoffs of Mobile HostsMobile Hosts
![Page 35: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/35.jpg)
35
Differences between previous work and Differences between previous work and our workour work
Previous workPrevious work Our workOur workThe task response timeThe task response time The message sojourn timeThe message sojourn time
The server is failure-proneThe server is failure-prone The Access Bridge is The Access Bridge is failure-freefailure-free
In the presence of server In the presence of server breakdowns, the task breakdowns, the task cannot progresscannot progress
In the presence of Mobile In the presence of Mobile Host breakdown and Host breakdown and handoff, other message handoff, other message may be still be dispatchedmay be still be dispatched
![Page 36: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/36.jpg)
36
Message Dispatch Model (1)Message Dispatch Model (1)
• Basic dispatch modelBasic dispatch model
n
q0
![Page 37: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/37.jpg)
37
Message Dispatch Model (2)Message Dispatch Model (2)
• Static processor-sharing dispatch modelStatic processor-sharing dispatch model
/n
q1
/n
q2
/n
qn
![Page 38: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/38.jpg)
38
Message Dispatch Model (3)Message Dispatch Model (3)
• Dynamic processor-sharing dispatch modelDynamic processor-sharing dispatch model
q1 q2 qn
/K /K /K K
![Page 39: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/39.jpg)
39
Message Dispatch Model (4)Message Dispatch Model (4)
• Round-robin dispatch modelRound-robin dispatch model
q1 q2 qn
![Page 40: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/40.jpg)
40
Message Dispatch Model (5)Message Dispatch Model (5)
• Feedback dispatch modelFeedback dispatch model
n
q0
![Page 41: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/41.jpg)
41
Analytical Results and Comparisons (1)Analytical Results and Comparisons (1)
• Number of mobile hostsNumber of mobile hosts
![Page 42: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/42.jpg)
42
Analytical Results and Comparisons (2)Analytical Results and Comparisons (2)
• Failure rateFailure rate
![Page 43: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/43.jpg)
43
Analytical Results and Comparisons (3)Analytical Results and Comparisons (3)
• Message arrival rateMessage arrival rate
![Page 44: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/44.jpg)
44
Analytical Results and Comparisons (4)Analytical Results and Comparisons (4)
• Expected message dispatch requirementExpected message dispatch requirement
![Page 45: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/45.jpg)
45
ConclusionsConclusions
• Derive the cumulative distribution function of Derive the cumulative distribution function of the program execution time with various the program execution time with various checkpointing strategies and its expectationcheckpointing strategies and its expectation• Observe that random checkpointing is more stable Observe that random checkpointing is more stable
against the variation of parameters than against the variation of parameters than deterministic checkpointingdeterministic checkpointing
• Define expected-reliability to embody the Define expected-reliability to embody the mobility characteristic introduced by handoffmobility characteristic introduced by handoff
• Analyze the message sojourn time in Access Analyze the message sojourn time in Access Bridge with fives dispatch models Bridge with fives dispatch models
![Page 46: Program Execution Time, Reliability, and Queueing Analysis in Mobile Environments](https://reader036.vdocuments.net/reader036/viewer/2022062519/56815228550346895dc06e48/html5/thumbnails/46.jpg)
46
Future WorkFuture Work
• Relax some assumptions to derive more Relax some assumptions to derive more general program execution timegeneral program execution time• Failures may not be detected instantlyFailures may not be detected instantly
• Further the expected-reliability analysis to Further the expected-reliability analysis to include links failures. The reliability with include links failures. The reliability with multiple terminals will be consideredmultiple terminals will be considered
• Provide fault tolerance mechanism for other Provide fault tolerance mechanism for other mobile environments, such as ad-hoc mobile mobile environments, such as ad-hoc mobile networks and sensor networksnetworks and sensor networks