Proof. Let us consider operations w and r, issued by
client C
i
, which requires RYW session guarantee. Let
read operation follows a write one in the client’s issue
order and let read be performed by server S
j
.
It has been proven that VsSG protocol pre-
serves RYW session guarantee, when none of
servers fails, i.e. for any client C
i
requir-
ing RYW and for any server S
j
the relation
∀C
i
∀S
j
w
C
i
r|
S
j
⇒ w
S
j
r
holds. According to
Lemma 1, every write operation performed by server
S
j
is saved in the checkpoint or in the log. After
the server failure, all operations from the checkpoint
are recovered. Further, all operations performed be-
fore the failure occurred, but after the checkpoint was
taken, are also recovered (according to Lemma 2).
According to Lemma 3, all recovered operations are
applied before new ones.
Hence, for any client C
i
and any server S
j
,RYW
session guarantee is preserved by the rollback- recov-
ery and checkpointing rVsRYW algorithm.
5 CONCLUSIONS
The growing attention paid to mobile systems, re-
sults in their increased reliability requirements. Most
of rollback-recovery protocols which take into con-
sideration characteristics of mobile environment, pay
special attention to increasing efficiency of the proto-
col. The efficiency is usually increased through min-
imization of the amount of messages exchanged be-
tween mobile hosts during taking a checkpoint. On
the other hand, the protocol efficiency can also be in-
creased by data replication. However, in this approach
the problem of replica consistency during the recov-
ery process is faced and should be solved. Accord-
ing to our knowledge, although several studies have
examined the issues of checkpointing, logging and
rollback-recovery in mobile environment, none of the
existing solutions integrates these issues with the con-
sistency protocols. Especially client-centric consis-
tency models, regarding consistency from the client’s
point of view, have not been considered in the context
of rollback-recovery.
Therefore, this paper addresses a problem of inte-
grating the consistency management of mobile sys-
tems with the recovery mechanisms. We introduce
rVsRYW rollback-recovery protocol for distributed
mobile systems, which provides Read Your Writes
session guarantee. The proposed recovery protocol
is integrated with the underlying VsSG consistency
protocol. Additionally, the proof of safety property of
rVsRYW protocol is included.
The rVsRYW protocol, takes into account the se-
mantics of operations during the rollback-recovery
procedure. This results in checkpointing only results
of write operations. As a result, rVsRYW protocol
offers the ability to overcome the servers’ failures
and ensures RYW session guarantee, in the optimized
way.
REFERENCES
Alvasi, L. and Marzullo, K. (1998). Message logging: pes-
simistic, optimistic, causal and optimal. IEEE Trans.
Softw. Eng, 24(2):149–159.
Bernstein, P. A., Hadzilacos, V., and Goodman, N. (1987).
Concurrency Control and Recovery in Database Sys-
tems. Addison Wesley.
Duchamp, D., Feiner, S., and Jr, G. M. (1991). Software
technology for wireless mobile computing. IEEE Net-
work Magazine, pages 2–18.
Elmootazbellah, N., Elnozahy, Lorenzo, A., Wang, Y.-
M., and Johnson, D. (2002). A survey of rollback-
recovery protocols in message-passing systems. ACM
Computing Surveys, 34(3):375–408.
Elnozahy, E. and Zwaenepoel, W. (1992). Manetho: Trans-
parent rollback-recovery with low overhead, limited
rollback, and fast output commit. IEEE Transactions
on Computer, 41(5):526–531.
Guerraoui, R. and Rodrigues, L. (2004). Introduction to
distributed algorithms. Springer-Verlag.
Kobusi
´
nska, A., Libuda, M., Sobaniec, C., and Wawrzy-
niak, D. (2005). Version vector protocols implement-
ing session guarantees. Proc. of Int. Symp. on Cluster
Computing and the Grid (CCGrid 2005).
Pradhan, D., P.Krishna, and Vaidya, N. (1996). Recovery in
mobile environments: Design and trade-off analysis.
Proc. of the 26th International Symposium on Fault-
Tolerant Computing, pages 16–25.
Sergent, N., Dfago, X., and Schiper, A. (1999). Failure
detectors: Implementation issues and impact on con-
sensus performance. Technical Report SSC/1999/019,
cole Polytechnique Fdrale de Lausanne, Switzerland.
Sobaniec, C. (2005). Consistency Protocols of Session
Guarantees in Distributed Mobile Systems. PhD the-
sis, Institute of Computing Science, Poznan Univer-
sity of Technology.
Szychowiak, M. (2003). Replication of checkpoints in DSM
systems with read-write objects. PhD thesis, Institute
of Computing Science, Poznan University of Technol-
ogy.
Tanaka, K., Higaki, H., and Takizawa, M. (1998). Object-
based checkpoints in distributed systems. Journal of
computer system science and Engineering, 13(3):125–
131.
Terry, D. B., Demers, A. J., Petersen, K., Spreitzer, M.,
Theimer, M., and Welch, B. W. (1994). Session guar-
antees for weakly consistent replicated data. Proc. of
the Third Int. Conf. on Parallel and Distributed Infor-
mation Systems (PDIS 94), pages 140–149.
SAFETY OF CHECKPOINTING AND ROLLBACK-RECOVERY PROTOCOL FOR MOBILE SYSTEMS WITH RYW
SESSION GUARANTEE
123