Fault tolerance technique based on monitoring and pattern for reliable resource management in mobile cloud computing

Jisu Park, Heonchang Yu, Eunyoung Lee

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)


Recently, with the rapid growth in the smart phone market and advancements in wireless communication environments, mobile devices are being considered as resources for the processing of fine-grained tasks. However, mobile devices have several problems such as unstable wireless connections, low communication bandwidth, and frequent location changes. As resource providers, mobile devices can join and leave the distributed computing environment in an unpredictable manner. This frequent movement interrupts the operation in progress, and the delay or failure in completing the operation may cause a system failure. Therefore, we should consider volatility, one of the dynamic characteristics of mobile devices, for reliable resource management. In this study, we define a resource availability model for reliable resource management, and we propose a monitoring system and a fault tolerance technique based on the proposed model. In our proposed monitoring system, we determine the operation availability state dynamically according to the operation availability state of predicted resource information. We define a set of patterns of operation availability states, which describe the state of mobile devices. Our proposed fault tolerance technique creates checkpoints and replications according to the patterns of operation availability states.

Original languageEnglish
Pages (from-to)997-1005
Number of pages9
JournalJournal of Internet Technology
Issue number6
Publication statusPublished - 2013


  • Dynamic monitoring
  • Fault tolerance
  • Mobile cloud
  • Pattern of OAS
  • Reliable resource management

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications


Dive into the research topics of 'Fault tolerance technique based on monitoring and pattern for reliable resource management in mobile cloud computing'. Together they form a unique fingerprint.

Cite this