DEVELOPMENT OF AN ENHANCED CHECK POINTING TECHNIQUE IN GRID COMPUTING USING PROGRAMMER LEVEL CONTROLS

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0365
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 65 Pages
  • Format: Microsoft Word
  • Views: 1.2K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853
Abstract
Grid computing is a collection of computer resources from multiple locations assembled to provide computational services, storage, data or application services. Grid computing users gain access to computing resources with little or no knowledge of where those resources are located or what the underlying technologies, hardware, operating system, and so on are. Reliability and performance are among the key challenges to deal with in grid computing environments. Accordingly, grid scheduling algorithms have been proposed to reduce the likelihood of resource failure and to reduce the overhead of recovering from resource failure. Checkpointing is one of the faulttolerance techniques when resources fail. This technique reduces the work lost due to resource faults but can introduce significant runtime overhead. This research provided an enhanced checkpointing technique that extends a recent research and aims at lowering the runtime overhead of checkpoints. The results of the simulation using GridSim showed that keeping the number of resources constant and varying the number of gridlets, improvements of up to 9%, 11%, and 11% on throughput, makespan and turnaround time, respectively, were achieved while varying the number of resources and keeping the number of gridlets constant, improvements of up to 8%, 11%, and 9% on throughput, makespan and turnaround time, respectively, were achieved. These results indicate the potential usefulness of our research contribution to applications in practical grid computing environments.





CHAPTER ONE
INTRODUCTION
1.1 Background of the Study
Grid computing uses a computer network in which each computer's resources are shared with every other computer in the system. In view of this, computing becomes pervasive and individual users (or client applications) gain access to computing resources (processors, storage, data, applications, and so on) as needed with little or no knowledge of where those resources are located or what the underlying technologies, hardware, operating system, and so on are. The main objective in grid scheduling is to finish a job or application as soon as possible(Harshadkumar and Vipul, 2014). Fault tolerance is an important property for large scale computational grid systems, where geographically distributed nodes cooperate to execute a task in order to achieve a high level of reliability and availability. A common approach to guarantee an acceptable level of fault tolerance in scientific computing is to use checkpointing. When a task fails it can be restarted from its most recently checkpointed state rather than from the beginning, which reduces the system loss and ensures reliability (Bakhta and Ghalem, 2014).
1.2 Motivation

The ability to checkpoint a running application and restart it later can provide many useful benefits like fault recovery, advanced resource sharing, dynamic load balancing and improved service availability. A fault-tolerant service is essential to satisfy QoS requirements in grid computing. However, excessive checkpointing results in performance degradation. Thus there is the need to improve the performance by reducing the number of times that checkpointing is invoked.

DEVELOPMENT OF AN ENHANCED CHECK POINTING TECHNIQUE IN GRID COMPUTING USING PROGRAMMER LEVEL CONTROLS
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU0365
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 65 Pages
  • Format: Microsoft Word
  • Views: 1.2K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU0365
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 65 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT The load balancing is the most important issues to reduce congestion in Autonomous computer networks. The inter-domain traffic control methods have been addressed by researchers. In this paper, we are proposed HTS; a BGP-based hierarchical network traffic reconfiguration method to redistribute traffic on overloaded link for IP-based... Continue Reading
    ABSTRACT The load balancing is the most important issues to reduce congestion in Autonomous computer networks. The inter-domain traffic control methods have been addressed by researchers. In this paper, we are proposed HTS; a BGP-based hierarchical network traffic reconfiguration method to redistribute traffic on overloaded link for IP-based... Continue Reading
    ABSTRACT An insurance company promises its policyholders to pay out benefits if certain events occur, for example, events such as a car accident and health conditions. When this is happens, the insurance company has a liability to pay the claims by technical provisions or claim reserving. The calculation of claim reserving must be done carefully... Continue Reading
    ABSTRACT Cloud Computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing systems can be easily threatened by various cyber-attacks, because most of Cloud Computing systems provide services to so many people who are not proven to be trustworthy.Therefore, a Cloud Computing system needs to... Continue Reading
    TABLE OF CONTENTS~ DECLARATION .11 Dedication III Acknowledgement iv Table of Contents V List of Figures ix List of Table Xi Abbreviation and Acronyms xii Abstract XIII CHAPTER ONE GENERAL INTRODUCTION 1.1 Introduction i 1.2 Background to the Study 2 1.3 Research Questions 3 1.3 Statement of the Problem 3 1,4 Main Objectives 4 1.5 Specific... Continue Reading
    ABSTRACT    In this study research, we have examined the Project Evaluation and Review Technique, PERT and the Critical Path Method CPM/Critical Path Analysis. CPA as Project Management tools, among others, and applied them to study the Electrical and Mechanical services contract of the School of Health Technology Building Project, FUTO, using... Continue Reading
    ABSTRACT In this study research, we have examined the Project Evaluation and Review Technique, PERT and the Critical Path Method CPM/Critical Path Analysis. CPA as Project Management tools, among others, and applied them to study the Electrical and Mechanical services contract of the School of Health Technology Building Project, FUTO, using... Continue Reading
    ABSTRACT The topic quality check management in a company with particular reference to Emenite Company Limited was purposefully designed to x-rayed the operational strategies and effects of quality check management system of the Emenite Manufacturing Company Limited. The study become imperative due to increase in low quality output of many... Continue Reading
    ABSTRACT The topic quality check management in a company with particular reference to Emeinte Company Limited was purposefully designed to x-rayed the operational strategies and effects of quality check management system of the Emenite Manufacturing Company Limited.The study become imperative due... Continue Reading
    ABSTRACT The topic quality check management in a company with particular reference to Emenite Company Limited was purposefully designed to x-rayed the operational strategies and effects of quality check management system of the Emenite Manufacturing Company Limited. The study become imperative due to increase in low quality output of many... Continue Reading
    Call Us
    whatsappWhatsApp Us