Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

A Selective Aperiodic Checkpointing Approach for VLR Failure Restoration in Wireless Mobile Networks

International Journal of Computer Applications
© 2010 by IJCA Journal
Number 9 - Article 3
Year of Publication: 2010
Md. Mohsin Ali
Mst. Shakila Khan Rumi
Md. Hasnat-E-Rabbi
M. M. Zakariya

Md. Mohsin Ali, Mst. Shakila Khan Rumi, Md. Hasnat-E-Rabbi and M M Zakariya. Article:A Selective Aperiodic Checkpointing Approach for VLR Failure Restoration in Wireless Mobile Networks. International Journal of Computer Applications 11(9):10–16, December 2010. Published By Foundation of Computer Science. BibTeX

	author = {Md. Mohsin Ali and Mst. Shakila Khan Rumi and Md. Hasnat-E-Rabbi and M. M. Zakariya},
	title = {Article:A Selective Aperiodic Checkpointing Approach for VLR Failure Restoration in Wireless Mobile Networks},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {11},
	number = {9},
	pages = {10--16},
	month = {December},
	note = {Published By Foundation of Computer Science}


This paper proposes a new selective aperiodic checkpointing approach for VLR (Visitor Location Register) failure restoration in wireless mobile networks. In this approach, the VLR data are backed up in the non-volatile storage whenever the location update counter for that VLR exceeds the pre-determined threshold. It restores the backed up VLR data after the failure of the VLR and sends location confirmation request messages only to the selected Registration Areas (RAs) whose information is updated between the time period of back up and failure of the VLR. This is necessary as this information is obsolete in the backed up VLR for this reason and needs to be updated in the restored VLR. However, previous work on aggressive restoration based on periodic and aperiodic checkpointing also provide solutions for VLR database failure recovery. But these solutions are not feasible as they broadcast the location confirmation request messages to the RAs whose location information is found to be obsolete during the restoration. The analytical model and experimental results also show that the proposed method outperforms other previous approaches as it selectively sends the location confirmation request messages instead of broadcasting to the RAs during VLR restoration process.


  • EIA/TIA. “Cellular Radio-telecommunications Intersystem Operations,” Tech. Rep. IS-41 Revision B, EIA/TIA, December 1991.
  • M. Mouly and M. B. Pautet, “The GSM System for Mobile Communications,” Telecom Publishing, 49 rue Louise Bruneau, Palaiseau, France, January 1992.
  • Y. B. Lin, “Database Failure Recovery for Cellular Phone Networks,” Submitted for publication.
  • Y. B. Lin, “Failure Restoration of Mobility Databases for Personal Communication Networks,” Journal of Wireless Networks, vol. 1, no. 3, pp. 365-372, September 1995.
  • T. P. Wang, C. C. Tseng, and W. K. Chou, “An Aggressive Approach to Failure Restoration of PCS Mobility Databases,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 1, no. 3, pp. 21-28, September 1997.
  • S. I. Sou and Y. B. Lin, “Broadcast Approach for UMTS Mobility Database Recovery,” IEEE Transactions on Mobile Computing, vol. 6, no. 8, pp. 865-871, August 2007.
  • R. Jain, Y. B. Lin, C. Lo, and S. A. Mohan, “Caching Strategy to Reduce Network Impacts of PCS,” IEEE Journal on Selected Areas in Communications, pp. 1434-1444, October 1994.