MESSAGE INDUCED SOFT CHEKPOINTING FOR RECOVERY IN MOBILE ENVIRONMENTS
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 5
Abstract
Checkpointing is one of the commonly used techniques to provide fault tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are constrained by low bandwidth, mobility, lack of stable storage, frequent disconnections and limited battery life. Hence checkpointing protocols which have fewer checkpoints are preferred in mobileenvironment. Since MHs are prone to failure, so they have to transfer a large amount of checkpoint data and control information to its local MSS which increases bandwidth overhead. In this paper we propose a new soft checkpointing scheme for mobile computing systems. These soft checkpoints are saved locally in the host. Locally stored checkpoints do not consume network bandwidth and can be created in less time. Before disconnecting from the MSS, these soft checkpoints are converted to hard checkpoints and are sent to MSSs stable storage. In this way, taking a soft checkpoint avoids overhead transferring large amount of data to the stable storage MSSs.
Authors and Affiliations
Ruchi Tuli , Parveen Kumar
Comparative Analysis of CBRP, DSR, AODV Routing Protocol in MANET
An ad-hoc network is self-organizing and adaptive. Networks are formed on-the-fly, devices can leave and join the network during its lifetime, devices can be mobile within the network, the network as a whole may be mobil...
FEATURE SELECTION METHODS AND ALGORITHMS
Feature selection is an important topic in data mining, especially for high dimensional datasets. Feature selection (also known as subset selection) is a process commonly used in machine learning, wherein subsets of the...
Evaluating Qualitative Measures for Effective Website Design
The primary goal of this paper is to investigate and evaluate qualitative measures for improving the website design of various universities in India. The website of each university is scanned using W3C guidelines. The pa...
Image Segmentation using Extended Edge Operator for Mammographic Images
Detection of edges in an image is a very important step owards understanding image features. Since edges often occur at mage locations representing object boundaries, edge etection is extensively used in image segmenta...
Protection of Public Network Communication by using Internet Protocol Security
This paper deals with the issue of the protection of public etwork c description of custom cipher algorithm mplementation method is given. Paper also contains xperiment description with results. In the existing...