Abstract Model of Fault Tolerance Algorithm in Cloud Computing Communication Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 9
Abstract
We discussed in this paper the modeling behavior of the cloud computing communication network through which processors exchange their messages. The goal is to develop an abstract description of a communication network that effectively enforces a TDMA-style access to the communication medium by avoiding that a “babbling idiot” can interfere with another processor’s message broadcast. This ensures that a non-faulty processor will receive the message that was sent by the sender of a given slot. To prevent a faulty processor from speaking outside its designated slots an independent component is necessary that controls the access to the communication medium. In TTP/C, this component is called the guardian. There are two common implementations of a guardian: in a bus topology, every processor is equipped with its own local guardian, whereas in a star topology there is one central guardian per channel.
Authors and Affiliations
Pardeep Kumar , Shiv Kumar Gupta
Architecture for efficiently streaming stored video using TCP
Abstract : TCP (Transmission Control Protocol) with its wellestablished congestion control mechanism is the prevailing transport layer protocol for non-real time data in current IP (Internet Protocol) networks. It would...
An Optimized Round Robin Scheduling Algorithm for CPU Scheduling
The main objective of this paper is to develop a new approach for round robin scheduling which help to improve the CPU efficiency in real time and time sharing operating system. There are many algorithms available for CP...
Distributed Architecture for Transactions Synchronization in Distributed Database Systems
Various concurrency control algorithms have been proposed for use in istributed database systems. But, the number of algorithms available for the distributed concurrency control, come into one of three basic classes: lo...
Poly Substitution Method for Encryption and Decryption
In this study we explore the features of Genetic Algorithm with poly substitution methods to generate ASCII values of the given text and then applying conversion, transposition with the features of Cryptography. In PS ci...
Use of Fuzzy Logic Approaches in Scheduling of FMS: A Review
Scheduling in an flexible manufacturing systems(FMS) environment is more complex and difficult than a conventional manufacturing environment. Therefore, determining an optimal schedule and controlling an FMS is considere...