Development Of An Enhanced Checkpointing Technique In Grid Computing Using Programmer Level Controls

This research work on “Development Of An Enhanced Checkpointing Technique In Grid Computing Using Programmer Level Controls” is available in PDF/DOC. Click the below button to request or download the complete material

Chapter One

1.0 INTRODUCTION
This chapter introduces the Development Of An Enhanced Checkpointing Technique In Grid Computing Using Programmer Level Controls and its relevance, states the research problems, research questions, and objectives, provides a background of the study, and should also include the research hypothesis.

Table of Contents

Certification
Dedication
Acknowledgment
Abstract
Table of Contents
List of Figures
List of Tables
List of Abbreviations
Definition of Terms

CHAPTER ONE
INTRODUCTION
1.1 Background of the Study
1.2 Motivation
1.3 Research Problem
1.4 Research Aim and Objectives
1.5 Research Methodology
1.6 Limitations/Challenges

CHAPTER TWO
LITERATURE REVIEW
2.1 Introduction
2.2 Fault Tolerance
2.2.1 Fault Detection
2.2.2 Fault Rectification
2.2.3 Checkpointing
2.2.4 Full Checkpoint or Incremental Checkpoint
2.2.5 Uncoordinated or Coordinated Checkpointing
2.3 Checkpointing Levels
2.3.1 System Level (SLC)
2.3.2 Kernel (Operating System) Level (SLC-K)
2.3.3 Hardware Level (SLC-H)
2.3.4 Application-Level (ALC)
2.3.5 Programmer Level (ALC-P)
2.3.6 User Level (ALC-U)
2.3.7 Library Checkpointing
2.3.8 Pre-Compiler Checkpointing
2.3.9 Mixed Level Checkpointing (MLC)
2.4 SLC versus ALC Checkpointing: Problems and Solutions
2.5 Programmer Effort (Transparency)
2.6 Portability
2.7 Checkpoint Size
2.8 Flexibility
2.9 Efficiency
2.10 Restart Ability
2.11 Forced Checkpointing Generation
2.12 Correctness
2.13 Comparison between ALC and SLC
2.14 Related Work
2.15 Gap in the literature

CHAPTER THREE
MODIFIED ARCHECTURE OF FAULT TOLERANCE IN GRID COMPUTING
3.1 Introduction
3.2 Architecture of the Proposed Checkpointing Technique
3.3 Checkpointing Control Implementation
3.4 Job Rollback Recovery System Analysis
3.5 System Model
3.6 Application Model
3.7 Performance Evaluation Criteria

CHAPTER FOUR
RESULT ANALYSIS
4.1 Introduction
4.2 Results and Discussion

CHAPETER FIVE
SUMMARY, CONCLUSION AND RECOMMENDATIONS
5.1 Summary
5.2 Conclusion
5.3 Recommendations