A Study on Check Pointing Protocols for Mobile Distributed Systems
Komati Sathish
Komati Sathish, Research Scholar, Department of Computer Science and Engineering, Sri Satya Sai University of Technology & Medical Sciences, Sehore, Bhopal (M.P). India.
Manuscript received on 15 February 2017 | Revised Manuscript received on 22 February 2017 | Manuscript Published on 28 February 2017 | PP: 131-134 | Volume-6 Issue-3, February 2017 | Retrieval Number: C4856026317/17©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: A large number of distributed checkpointing protocols have appeared in the literature.a distributed checkpointing protocol could be the best in a specific environment, but not in another environment.Distributed snapshots are an important building block for distributed systems and are useful for constructing checkpointing protocols among other users. Communication-Induced Checkpointing protocols are classified into two categories in the literature: Index-based and Model-based.Recently, more attention has been paid to providing checkpointing protocols for mobile systems. check point is defined as a designated place in a program at which normal processing is interrupted specifically to preserve the status information necessary to allow resumption of processing at a later time. This paper surveys the protocols which have been appeared in the literature for checkpointing in mobile distributed systems.
Keywords: Checkpoint/Restart, Checkpointing Protocols, Distributed Systems, Rollback Recovery, Fault Tolerant Computing.
Scope of the Article: Could Computing