GRID COMPUTING AND CHECKPOINT APPROACH
Journal Title: International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com - Year 2011, Vol 11, Issue 1
Abstract
Grid computing is a means of allocating the computational power of a large number of computers to complex difficult computation or problem. Grid computing is a distributed computing paradigm that differs from traditional distributed computing in that it is aimed toward large scale systems that even span organizational boundaries. In this paper we investigate the different techniques of fault tolerance which are used in many real time distributed systems. The main focus is on types of fault occurring in the system, fault detection techniques and the recovery techniques used. A fault can occur due to link failure, resource failure or by any other reason is to be tolerated for working the system smoothly and accurately. These faults can be detected and recovered by many techniques used accordingly. An appropriate fault detector can avoid loss due to system crash and reliable fault tolerance technique can save from system failure. This paper provides how these methods are applied to detect and tolerate faults from various Real Time Distributed Systems. The advantages of utilizing the check pointing functionality are obvious; however so far the Grid community has not developed a widely accepted standard that would allow the Grid environment to consciously utilize low level check pointing packages. Therefore, such a standard named Grid Check pointing Architecture is being designed.
Authors and Affiliations
Pankaj Gupta
GRID COMPUTING AND FAULT TOLERANCE APPROACH
Grid computing is a means of allocating the computational power of a large number of computers to complex difficult computation or problem. Grid computing is a distributed computing paradigm that differs from traditiona...
How Automated Testing Tools Are Showing Its Impact In The Field Of Software Testing
As, we know that Software testing is a very vast field in Software development life cycle. In this paper, we describe that how automated testing tools are very much convenient and easy to use which also makes testing fas...
“SAFE & SECURE DATA COMMUNICATION IN MOBILE ADHOC NETWORK - BY USING IPSEC PROTOCOL”
Ad-hoc networks are a new paradigm in wireless communication due to its high significance in various sensitive and emergency operations. An Ad-hoc Network is a multi hop wireless network. Typically network nodes are inte...
An Implementation of Advanced Traffic Control Techniques in MANET
Mobile Ad hoc Networks (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. A mobile adhoc network (MANET) is a self-configuring network of mobil...
Biometrics Identity Authentication in Secure Electronic Transactions
There are so many ways by which a person can be identified, but authentication of a person by biometric methods is assumed to be more secure. There are many reasons behind this e.g. in this world each person is having di...