Abstract
In this paper we present a checkpointing and failure recovery algorithm suited to mobile computing systems. A survey of mobile systems and the algorithms that are presently available is made to gather the essential knowledge about how these systems work. This includes study and analysis of existing checkpointing & recovery algorithms to identify their relative advantages & disadvantages. The existing algorithms suffers from problems like overhead involved in taking checkpoints and time to recover from a failure in an attempt to make a trade-off between efficiency and reliability. Hence we have attempted to develop an algorithm to solve these problems as far as possible. Our proposed algorithm has three subparts - a checkpointing scheme, a failure recovery scheme and authentication scheme for a mobile host.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.