On Fault Tolerance of Resources in Grid Environment
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
Abstract—Grid computing, most simply stated, is distributed computing taken to the next evolutionary level. The goal is to create the illusion of a simple yet large and powerful self managing virtual computer out of a large collection of connected heterogeneous systems sharing various combinations of resources. However, in the grid computing environment there are certain aspects which reduce efficiency of the system, job scheduling of the resources and fault tolerance are the key aspect to improve the efficiency and exploit the capabilities of emergent computational systems. Because of dynamic and distributed nature of grid, the traditional methodologies of scheduling are inefficient for the effective utilization of the resource available. The fault tolerance strategy proposed will improve the performance of the overall computational grid environment. In this paper we propose an efficient job scheduling, replication and check pointing to improve the efficiency of the grid environment. The simulation results illustrate that the proposed strategy effectively schedules the grid jobs and reduce the execution time.
Authors and Affiliations
Minakshi Memoria , Mukesh Yadav,
A performance evaluation of various security assessments in WiMAX
One of the technologies that can lay the foundation for the next generation (fourth generation [4G]) of mobile broadband networks is popularly known as WiMAX. WiMAX stands for worldwide interoperability for microwave...
A KNOWLEDGE BASED APPROACH FOR AUTOMATIC DATABASE NORMALIZATION
Normalization is a process of analyzing the given relational schemas based on the functional dependencies and using primary key to achieve minimum data redundancy. Normalization is one of the key issues to be carried out...
A New Fragile Approach for Optimization in Invisible Image Watermarking by Using Symmetric Key Algorithms
In the information technology and communication, the most important factor has been the security of information and one of the methods is watermarking. The Watermarking aims to validate the host and the undeniabl...
Robustness of RC4 against Differential attack
Cryptanalysis of ciphers is a technique used to find flaws in the cryptographic algorithm and try to overcome these flaws to give much better security. There are many cryptographic algorithms such as DES, AES, RS...
A Novel Low power and Area efficient Carry Look Ahead Adder Using GDI Technique
A full adder is one of the essential component in digital circuit design, many improvements have been made to reduce the architecture of a full adder. The proposed method aims on Gate diffusion input (GDI) whic...