Checkpointing and Roll back Recovery Protocols in Wireless Ad hoc Networks: A Review


Jawahar Thakur
Dr Arvind Kalia
Dr. Lalit Kumar Awasthi


The main focus in a single process checkpointing protocol is on finding optimal checkpoint interval to minimize the loss due to any fault, but in a distributed environment the main focus is on finding out and saving a global consistent state of the system. The challenge in finding a global consistent state is that interprocess communication creates dependencies that must be factored, otherwise the global checkpoint becomes useless. Mobile ad hoc networks throw up a plethora of challenges in tracking interprocess dependences including how to reliably save checkpoints in face of transience and node failures, where to save the checkpoints and how to reconstruct the stable global state from the nodes which are available after the fault. To add high availability and reliability to mobile networks, checkpoint based rollback recovery techniques are widely applicable. Checkpointing methods for traditional distributed systems cannot be applied directly to the mobile networks. This paper provides an overview of the available checkpointing strategies for mobile networks, comparing them on the various parameters. We conclude that no single strategy is optimal in all fault scenarios and that the perfect strategy may still be in the works.


How to Cite
Jawahar Thakur, Dr Arvind Kalia, & Dr. Lalit Kumar Awasthi. (2015). Checkpointing and Roll back Recovery Protocols in Wireless Ad hoc Networks: A Review. International Journal of Next-Generation Computing, 6(2), 140–152.


  1. Acharya, A. and Badrinath, B. R. 1994. checkpointing distributed applications on mobile computers. In IEEE international conference on parallel and distributed information systems. pp.73{80.
  2. Awasthi, L. and Kumar, P. 2007a. Asynchronous checkpointing protocols for mobile distributed systems: Probablistic approach. International Journal of Information and Computer Security Vol.4, No.3, pp.298{314.
  3. Awasthi, L. K. and Kumar, P. 2007b. A synchronous checkpointing protocol for mobile distributed systems: Probabilistic approach. International Journal of Information and Computer Security.
  4. Awasthi, L. K., Misra, M., and Joshi, R. C. 2010. A weighted checkpointing protocol for mobile distributed systems. International Journal of Ad-hoc and Ubiquitous Computing Vol.5, pp.137{147.
  5. Biswas, S., Neogy, S., and Dey, P. 2012. Mobility based checkpointing and trust based recovery in manet. IJWMN Vol.4, No.4, pp.53{69.
  6. Cao, G. and Singhal, M. 2001. Mutable chekpoints: A new checkpointing approach for mobile computing systems. IEEE Transation on parallel and distributed systems Vol.12, No.2, pp.157{172.
  7. Elnozahy, K. N., Alvasi, L., Wang, Y. M., and Johnson, D. B. 2002. A survey of rollback recovery protocols in message passing systems. ACM computing surveys Vol.34, No.3, pp.375{408.
  8. Jaggi, P. K. and Singh, A. K. 2010. Log-based recovery with low overheads for large mobile computing system. JISE.
  9. Jaggi, P. K. and Singh, A. K. 2011. Staggered checkpointing and recovery in cluster based mobile ad hoc network. Advances in Parallel Distributed Computing Communications in Computer and Information Science Vol.203, pp: 122{134.
  10. Jiang, Q., Luo, Y., and Manivannam, D. 2008. An optimistic checkpointing and message logging approach for consistent global checkpoint collection in distributed system. Journal of Parallel Distributed Computing, Elsevier Vol.68, pp.1575{1589.
  11. Kumar, P. and Khunteta, A. 2010. A minimum process coordinated checkpointing protocol for mobile distributed system. International Journal of Computer Science (IJCSI) Vol.7, No.4.
  12. Lim, S. 2011. A tunable checkpointing algorithm for the distributed mobile environment. International Journal of Computer Science Issue (IJCSI) Vol.8, No.3.
  13. Men, C., Xu, Z., and Li, X. 2008. An ecient checkpointing and rollback recovery scheme for cluster-based multi-channel ad hoc wireless networks. In ISPA, IEEE International Symposium on Parallel and Distributed Processing with Applications. pp: 371{378.
  14. Men, C., Xu, Z., and Wang, D. 2007. An ecient hando strategy for mobile computing checkpoint system. EUC, LNCS Vol.4808, pp.410{421.
  15. Morita, Y. and Higaki, H. 2001. Hybrid checkpointing protocol for supporting mobile to mobile communication information networking. In 15th International conference. pp.529{536.
  16. Park, T., Woo, N., and Yeom, H. Y. 2003. An ecient recovery scheme for fault tolerant mobile computing system. future Generation Computer System Vol.19, pp.39{53.
  17. Prakash, R. and Singhal, M. 1996a. Low cost checkpointing and failure recovery in mobile computing systems. In IEEE trans. On parallel and distributed system. pp.1035{1048.
  18. Prakash, R. and Singhal, M. 1996b. Low cost checkpointing and future recovery in mobile computing system. IEEE Transaction on Parallel and Distributed System Vol.7, pp.1{38.
  19. Quaglia, F., Ciciani, B., and Baldoni, R. 2006. Checkpointing protocols in distributed systems with mobile host: A performance analysis. In Workshop on Fault Tolerant Parallel and Distributed Systems. pp. 743{755.
  20. Randill, B. 1975. System structure for software fault tolerance. IEEE Trans on software Engineering Vol.1, pp.220{232.
  21. Saluja, K. and Kumar, P. 2011. Transitive dependencies tracking in minimum-process checkpointing protocol for mobile ad ho networks. International Journal of Computer Science and Communication Technologies Vol.4, pp.700{704.
  22. Sharma, R. and Awasthi, L. K. 2013. A log-based recovery protocol for mobile distributed computing systems. Journal of Bioinformatics and Intelligent Control Vol.1, pp.1{10.
  23. Tuli, R. and Kumar, P. 2011a. Asynchronous checkpointing and optimistic message logging for mobile ad ho
  24. networks. International Journal of Advanced Computer Science and Applications Vol.2, No.10, pp.70{76.
  25. Tuli, R. and Kumar, P. 2011b. Message induced soft checkpointing for recovery in mobile environments. Inter- national Journal on Computer Science and Engineering (IJCSE) Vol.3, pp. 1798{1803.