International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-8,Issue-5  ( May, 2020 )
Past issues
  1. Volume-8,Issue-4  ( Apr, 2020 )
  2. Volume-8,Issue-3  ( Mar, 2020 )
  3. Volume-8,Issue-2  ( Feb, 2020 )
  4. Volume-8,Issue-1  ( Jan, 2020 )
  5. Volume-7,Issue-12  ( Dec, 2019 )
  6. Volume-7,Issue-11  ( Nov, 2019 )
  7. Volume-7, Issue-10  ( Oct, 2019 )
  8. Volume-7, Issue-9  ( Sep, 2019 )
  9. Volume-7, Issue-8  ( Aug, 2019 )
  10. Volume-7, Issue-7  ( Jul, 2019 )

Statistics report
Aug. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 88
Paper Published : 1239
No. of Authors : 3115
  Journal Paper

Paper Title
Fault Tolerance In Grid – An Overview

Grid computing has emerged as a distributed methodology that coordinates the resources that are spread in the heterogeneous distributed environment. The resources can be categorized as computational resources and storage resources A grid is composed of a collection of heterogeneous systems such as workstations, servers, computers that allows access to computing power, data sharing, memory use, software applications, hardware peripherals, etc. Grid scheduling is a software framework with which the scheduler collects resource state information, selects appropriate resources, predicts the potential performance for each candidate schedule, and determines the best schedule for the applications to be executed on a Grid system subject to some performance goals. A scheduler is the mediate resource manager as the interface between the consumers and the underlying resources. The probability of a failure is much greater than in traditional parallel computing and the failure of resources affects job execution fatally .It is therefore necessary to investigate the application of fault tolerant techniques for Grid. Fault tolerance is an important property in Grid computing as the dependability of individual Grid resources may not be able to be guaranteed; also as resources are used outside of organizational boundaries, it becomes increasingly difficult to guarantee that a resource being used is not malicious in some way.

Author - J.M.Nandhini

| PDF |
Viewed - 19
| Published on 2014-01-18
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World