SECURE AND EFFICIENT ROLLBACK RECOVERY IN GRID ENVIRONMENT?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 3)Publication Date: 2014-03-30
Authors : A. Wisy Shantha S. Subashini;
Page : 947-953
Keywords : ;
Abstract
Large applications executing on Grid or cluster architectures consisting of hundreds or thousands of computational nodes create problems with respect to reliability. The source of the problems is node failures and the need for dynamic configuration over extensive runtime. This paper presents two fault-tolerance mechanisms called Theft-Induced Check pointing and Systematic Event Logging. These are transparent protocols capable of overcoming problems associated with both benign faults, i.e., crash faults, and node or subnet volatility. Specifically, the protocols base the state of the execution on a dataflow graph, allowing for efficient recovery in dynamic heterogeneous systems as well as multithreaded applications. By allowing recovery even under different numbers of processors, the approaches are especially suitable for applications with a need for adaptive or reactionary configuration control. The low-cost protocols offer the capability of controlling or bounding the overhead. A formal cost model is presented, followed by an experimental evaluation. It is shown that the overhead of the protocol is very small, and the maximum work lost by a crashed process is small and bounded. One possible solution to address heterogeneity is to use platform independent abstractions such as the Java Virtual Machine. However, this does not solve the problem in general. There is a large base of existing applications that have been developed in other languages. Reengineering may not be feasible due to performance or cost reasons. Environments like Microsoft .Net address portability but only few scientific applications on Grids or clusters exist.
Other Latest Articles
- Software Quality Assessment in Object Based Architecture?
- Implementation of Multibiometric System Using Iris and Thumb Recognition
- RELIABLE AND SECURE AUDITING IN CLOUD DATA STORAGE
- THE DOORWAY OF SECURE DATA SHARING SCHEME FOR CONFEDERACY CLOUDS
- Energy Saving in Wireless Sensor Network using Attribute Based Dynamic Routing?
Last modified: 2014-03-30 02:58:29