slugSoft-checkpoint based Checkpointing Algorithm for Mobile Distributed Systems
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 5
Abstract
There are number of issues needs to handle in mobile computing systems like mobility, lack of stable storage on mobile nodes, disconnections, limited battery power and high failure rate of mobile nodes which causes loss of computation. Checkpointing is an attractive approach to introduce fault tolerance in mobile distributed systems transparently. A checkpoint is a local state of a process saved on the stable storage. H owever, a mobile consumer device is not considered to have sufficiently large and stable storage to store its checkpoint data. Therefore, a remote checkpoint technique is preferred in which the checkpoint data of a mobile device is kept in a remote checkpo int server instead of the mobile device. “Soft checkpoint” is neither a tentative checkpoint nor a permanent checkpoint, which can be saved anywhere, e.g., the main memory or local disk of MHs. Before failure these soft checkpointsare converted to hard checkpoints and are sent to MSSs stable storage. In this way, taking a soft - checkpoint avoids the overhead of transferring large amounts of data to the stable storage atMSSs over the wireless network and minimizes power consumption.
Authors and Affiliations
Pradeep Kumar Sharma, Parveen Kumar, Surender Jangra
A Novel Current Control Technique For A Three-Phase Statcom
This paper proposes an advanced control strategy to enhance performance of shunt active power filter (APF). The proposed control scheme requires only two current sensors at the supply side and does not need a harmonic d...
Analysis of Low Leakage Architecture of SRAM 8x1 Using Leakage Power Reduction Technique in Different Technology
as the size of ic’s is becoming small, day by day the demand of high density vlsi circuits has been increasing .the supply voltage reduction is necessary to reduce the active power. By lowering the supply voltage it is...
Authentication and behavior monitoring in an online vote Polling system using middleware Security
An online vote polling system conduct by government of our country should not believe any third party software and utility program which are running in operating system of server. In server machine, a large scale softwa...
Secure Cloud Storage Using Decentralized Access Control with Unspecified Authentication
The Secure Cloud Storage Using Decentralized Access Control with Unspecified Authentication for secures the data. The cloud verifies the authenticity of the series without knowing the user’s identity before storing data...
Design and Development of Simulation Model for Plant Layout
The objective of this work is to research the attainable enhancements within the blanking plant layout that manufactures automotive elements. For this the systematic layout coming up with theory (SLP) is employed. durin...