A Review of Checkpointing Fault Tolerance Techniques in Distributed Mobile Systems
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
Fault Tolerance Techniques enable systems to perform tasks in the presence of faults. A checkpoint is a local state of a process saved on stable storage. In a distributed system, since the processes in the system do not share memory, a global state of the system is defined as a set of local states, one from each process. In case of a fault in distributed systems, checkpointing enables the execution of a program to be resumed from a previous consistent global state rather than resuming the execution from the beginning. In this way, the amount of useful processing lost because of the fault is significantly reduced. Checkpointing is an effective fault tolerant technique in distributed system as it avoids the domino effect and require minimum storage requirement. Most of the earlier coordinated checkpoint algorithms block their computation during checkpointing and forces minimum-process or nonblocking even though many of them may not be necessary or n-blocking minimum-process but takes useless checkpoints or reduced useless checkpoint but has higher synchronization message overhead or has high checkpoint request ropagation time. In this paper, we discuss various issues related to the checkpointing for istributed systems and mobile computing environments. We also present a survey of some checkpointing algorithms for distributed systems.
Authors and Affiliations
Rachit Garg , Praveen Kumar
AN IMPROVED LOW COMPLEX SPATIALLY SCALABLE ACC-DCT BASED VIDEO COMPRESSION METHOD
In this paper, we propose a low complex Scalable ACC-DCT based video compression approach which tends to hard exploit the pertinent temporal redundancy in the video frames to improve compression efficiency with less proc...
Drag and Drop: Influences on the Design of Reusable Software Components
The fundamental unit of large scale software construction is he component. A component is the fundamental user interface object in Java. Everything you see on the display in a java pplication is a component. The abilit...
Object Oriented Shadow Detection and an Enhanced Method for Shadow Removal
Remote sensing technology derives information about the earth resources from satellite imagery. In urban areas, mainly the elevated objects are the reason for the appearance of shadows. Shadows are created as the light s...
Secure Image Transmission Through Unreliable Channels
The research in the literature on the design of image security by using Arithmetic Coding and Advanced Encryption Standard. Arithmetic Coding offers extremely high coding efficiency and it provides little or no security...
Stream Ciphers Encript Transformation
In this paper the initiative has been taken to review the flaws which have lead to the decline of stream ciphers in public domain. This review of the flaws in the existing stream cipher systems had lead to the developmen...