A Review of Checkpointing Strategies for Mobile Networks
- https://doi.org/10.2991/iccsee.2013.396How to use a DOI?
- checkpointing, mobile computing, ad hoc network
Checkpoints are used to store the specific states of processes in stable storage. When distributed systems fail, the systems can recover to a global consistency state from specific checkpoints rather than the beginning states of all involved processes. There are many kinds of checkpointing strategies suggested for distributed systems. However, the existing checkpointing protocols proposed for the traditional distributed systems are not suitable for mobile networks due to the unique characteristics such as low storage capacity, limited bandwidth, frequent disconnection, etc. Therefore, some researchers have proposed many new checkpointing strategies for mobile networks. This paper intends to give a summary of them.
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Anjin Xiong AU - Guoqiong Liao AU - Guoqiang Di AU - Jiali Xia PY - 2013/03 DA - 2013/03 TI - A Review of Checkpointing Strategies for Mobile Networks BT - Proceedings of the 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013) PB - Atlantis Press SP - 1579 EP - 1582 SN - 1951-6851 UR - https://doi.org/10.2991/iccsee.2013.396 DO - https://doi.org/10.2991/iccsee.2013.396 ID - Xiong2013/03 ER -