Abstract Model of Fault Tolerance Algorithm in Cloud Computing Communication Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 9
Abstract
We discussed in this paper the modeling behavior of the cloud computing communication network through which processors exchange their messages. The goal is to develop an abstract description of a communication network that effectively enforces a TDMA-style access to the communication medium by avoiding that a “babbling idiot” can interfere with another processor’s message broadcast. This ensures that a non-faulty processor will receive the message that was sent by the sender of a given slot. To prevent a faulty processor from speaking outside its designated slots an independent component is necessary that controls the access to the communication medium. In TTP/C, this component is called the guardian. There are two common implementations of a guardian: in a bus topology, every processor is equipped with its own local guardian, whereas in a star topology there is one central guardian per channel.
Authors and Affiliations
Pardeep Kumar , Shiv Kumar Gupta
A Survey : Code Optimization using Refactoring
This position paper identifies emerging trends in refactoring research particulary Refactoring, and enumerates a list of open questions, from practical as well as a theoretical point of view. We suggest these directions...
Deep Webpage Classification and Extraction (DWCE)
As the Deep web (or Hidden web) information is hidden behind the search query forms, this information can only be accessed by interacting with these forms. Therefore, development of automated system that interacts with t...
Intelligent and Effective Heart Disease Prediction System using Weighted Associative Classifiers
The healthcare environment is still ‘information rich’ But ‘knowledge poor’. There is a wealth of data available within the health care systems. However, there is a lack of effective analysis tools to discover hidden rel...
Secure Transmission of Compound Information Using Image Steganography
The security of information handled in real time transmission reception like internet is of paramount consideration, as this information may be confidential. And also, the parameter in concern nowa- days is size as it ma...
Hamiltonian cycle and TSP: A backtracking approach
Backtracking is one of the strategies to reduce the complexity of a problem. Backtracking mainly useful when there is a no solution by going forward in that direction so we required backtracking from it to reduce the com...