REVIEW of SOME MINIMUM-PROCESS SYNCHRONOUS CHECKPOINTING SCHEMES for MOBILE DISTRIBUTED SYSTEMS
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4
Abstract
The term Distributed Systems is used to describe a system with the following characteristics: i) it consists of several computers that do not share memory or a clock, ii) the computers ommunicate with each other by exchanging messages over a communication network, iii) each computer has its own emory and runs its own operating system. A mobile computing system is a distributed system where some of processes are running on mobile hosts (MHs), whose location in the network changes with time. The number of processes that take checkpoints is minimized to 1) avoid awakening of MHs in doze mode of eration, 2) minimize thrashing of MHs with checkpointing activity, 3) save limited battery life of MHs and low bandwidth of wireless channels. In minimum-process checkpointing otocols, some useless checkpoints are taken or blocking of processes takes place. To take a heckpoint, an MH has to transfer a large mount of checkpoint data to its local MSS over the wireless etwork. Since the wireless network has low andwidth and Hs have low computation power, all-process heckpointing will waste the scarce resources of the mobile ystem on every checkpoint. Minimum-process coordinated heckpointing is a preferred approach for mobile distributed ystems. In this paper, we discuss various existing minimum- ocess checkpointing protocols for mobile distributed ystems.
Authors and Affiliations
Preeti Gupta , Parveen Kumar , Anil Kumar Solanki
Traffic Engineering without Congestion Hot Spots in MPLS
Traffic Engineering [1] broadly relates to optimization of the performance of the operational IP network. In networking, network congestion occurs when a link or node is carrying so much data that its quality of service...
Grid Computing: A Collaborative Approach in Distributed Environment for Achieving Parallel Performance and Better Resource Utilization
From the very beginning various measures are taken or consider for better utilization of available limited resources in he computer system for operational environment, this is came n consideration because most of the...
Message Encryption Using Deceptive Text and Randomized Hashing
In this paper a new approach for message encryption using the concept called deceptive text is proposed.In this scheme we don’t need send encrypted plain text to receiver, instead, we send a meaningful deceptive text and...
Overcoming Testing Challenges in Project Life Cycle using Risk Based Validation Approach
According to James Whittake, Microsoft Testing Expert and Author, “There are a number of trends that testers are going to have to grapple with. The first is that software is getting better. The result of this is that bug...
Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform
Digital images are used everywhere and it is easy to manipulate and edit because of availability of various image processing and editing software. In a copy-move image forgery, a part of an image is copied and then paste...