Development Of An Enhanced Checkpointing Technique In Grid Computing Using Programmer Level Controls
This research work on “Development Of An Enhanced Checkpointing Technique In Grid Computing Using Programmer Level Controls” is available in PDF/DOC. Click the below button to request or download the complete material
1.0 INTRODUCTION
This chapter introduces the Development Of An Enhanced Checkpointing Technique In Grid Computing Using Programmer Level Controls and its relevance, states the research problems, research questions, and objectives, provides a background of the study, and should also include the research hypothesis.
Certification
Dedication
Acknowledgment
Abstract
Table of Contents
List of Figures
List of Tables
List of Abbreviations
Definition of Terms
CHAPTER ONE
INTRODUCTION
1.1 Background of the Study
1.2 Motivation
1.3 Research Problem
1.4 Research Aim and Objectives
1.5 Research Methodology
1.6 Limitations/Challenges
CHAPTER TWO
LITERATURE REVIEW
2.1 Introduction
2.2 Fault Tolerance
2.2.1 Fault Detection
2.2.2 Fault Rectification
2.2.3 Checkpointing
2.2.4 Full Checkpoint or Incremental Checkpoint
2.2.5 Uncoordinated or Coordinated Checkpointing
2.3 Checkpointing Levels
2.3.1 System Level (SLC)
2.3.2 Kernel (Operating System) Level (SLC-K)
2.3.3 Hardware Level (SLC-H)
2.3.4 Application-Level (ALC)
2.3.5 Programmer Level (ALC-P)
2.3.6 User Level (ALC-U)
2.3.7 Library Checkpointing
2.3.8 Pre-Compiler Checkpointing
2.3.9 Mixed Level Checkpointing (MLC)
2.4 SLC versus ALC Checkpointing: Problems and Solutions
2.5 Programmer Effort (Transparency)
2.6 Portability
2.7 Checkpoint Size
2.8 Flexibility
2.9 Efficiency
2.10 Restart Ability
2.11 Forced Checkpointing Generation
2.12 Correctness
2.13 Comparison between ALC and SLC
2.14 Related Work
2.15 Gap in the literature
CHAPTER THREE
MODIFIED ARCHECTURE OF FAULT TOLERANCE IN GRID COMPUTING
3.1 Introduction
3.2 Architecture of the Proposed Checkpointing Technique
3.3 Checkpointing Control Implementation
3.4 Job Rollback Recovery System Analysis
3.5 System Model
3.6 Application Model
3.7 Performance Evaluation Criteria
CHAPTER FOUR
RESULT ANALYSIS
4.1 Introduction
4.2 Results and Discussion
CHAPETER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 Summary
5.2 Conclusion
5.3 Recommendations