首页 > 最新文献

International Journal of Computer Science & Engineering Survey最新文献

英文 中文
Energy Saving in Wireless Sensor Networks 无线传感器网络中的节能技术
Pub Date : 2012-02-29 DOI: 10.5121/IJCSES.2012.3103
Z. Rezaei
A wireless sensor network (WSN) consists of a large number of sensor nodes which are deployed over an area to perform local computations based on information gathered from the surroundings. Each node in the network is equipped with a battery, but it is almost very difficult to change or recharge batteries; therefore, the crucial question is: “how to prolong the network lifetime to such a long time?” Hence, maximizing the lifetime of the network through minimizing the energy is an important challenge in WSN; sensors cannot be easily replaced or recharged due to their ad-hoc deployment in hazardous environment. Considering that energy saving acts as one of the hottest topics in wireless sensor networks, we will survey the main techniques used for energy conservation in sensor networks. The main focus of this article is primarily on duty cycling schemes which represent the most compatible technique for energy saving and we also focus on the data-driven approaches that can be used to improve the energy efficiency. Finally, we will make a review on some communication protocols proposed for sensor networks.
无线传感器网络(WSN)由大量传感器节点组成,这些节点部署在一个区域内,根据从周围环境收集的信息进行局部计算。网络中的每个节点都配备了电池,但更换或充电电池几乎是非常困难的;因此,关键的问题是:“如何将网络的生命周期延长到这么长的时间?”因此,通过最小化能量来最大化网络的生命周期是WSN的一个重要挑战。由于传感器在危险环境中临时部署,因此不容易更换或充电。考虑到节能是无线传感器网络的热门话题之一,我们将对传感器网络中用于节能的主要技术进行综述。本文的主要重点是占空比方案,它代表了最兼容的节能技术,我们也关注可用于提高能源效率的数据驱动方法。最后,我们将对传感器网络中提出的一些通信协议进行综述。
{"title":"Energy Saving in Wireless Sensor Networks","authors":"Z. Rezaei","doi":"10.5121/IJCSES.2012.3103","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3103","url":null,"abstract":"A wireless sensor network (WSN) consists of a large number of sensor nodes which are deployed over an area to perform local computations based on information gathered from the surroundings. Each node in the network is equipped with a battery, but it is almost very difficult to change or recharge batteries; therefore, the crucial question is: “how to prolong the network lifetime to such a long time?” Hence, maximizing the lifetime of the network through minimizing the energy is an important challenge in WSN; sensors cannot be easily replaced or recharged due to their ad-hoc deployment in hazardous environment. Considering that energy saving acts as one of the hottest topics in wireless sensor networks, we will survey the main techniques used for energy conservation in sensor networks. The main focus of this article is primarily on duty cycling schemes which represent the most compatible technique for energy saving and we also focus on the data-driven approaches that can be used to improve the energy efficiency. Finally, we will make a review on some communication protocols proposed for sensor networks.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125711215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 156
A SURVEY ON DETECT - DISCOVERING AND EVALUATING TRUST USING EFFICIENT CLUSTERING TECHNIQUE FOR MANET S 基于高效聚类技术的客户端信任检测、发现与评估研究综述
Pub Date : 2012-02-29 DOI: 10.5121/IJCSES.2012.3107
K. Sudharson, N. Partheeban
Analyzing and predicting behavior of node can lead to more secure and more appropriate defense mechanism for attackers in the Mobile Adhoc Network. In this work, models for dynamic recommendation based on fuzzy clustering techniques, applicable to nodes that are currently participate in the transmission of Adhoc Network. The approach focuses on both aspects of MANET mining and behavioral mining. Applying fuzzy clustering and mining techniques, the model infers the node's preferences from transmission logs. The fuzzy clustering approach, in this study, provides the possibility of capturing the uncertainty among node's behaviors. The results shown are promising and proved that integrating fuzzy approach provide us with more interesting and useful patterns which consequently making the recommender system more functional and robust.
分析和预测节点的行为可以为移动自组网中的攻击者提供更安全、更合适的防御机制。本文研究了基于模糊聚类技术的动态推荐模型,该模型适用于当前参与Adhoc网络传输的节点。该方法侧重于MANET挖掘和行为挖掘两个方面。该模型采用模糊聚类和挖掘技术,从传输日志中推断节点的偏好。在本研究中,模糊聚类方法提供了捕获节点行为之间不确定性的可能性。结果表明,集成模糊方法为我们提供了更多有趣和有用的模式,从而使推荐系统更具功能性和鲁棒性。
{"title":"A SURVEY ON DETECT - DISCOVERING AND EVALUATING TRUST USING EFFICIENT CLUSTERING TECHNIQUE FOR MANET S","authors":"K. Sudharson, N. Partheeban","doi":"10.5121/IJCSES.2012.3107","DOIUrl":"https://doi.org/10.5121/IJCSES.2012.3107","url":null,"abstract":"Analyzing and predicting behavior of node can lead to more secure and more appropriate defense mechanism for attackers in the Mobile Adhoc Network. In this work, models for dynamic recommendation based on fuzzy clustering techniques, applicable to nodes that are currently participate in the transmission of Adhoc Network. The approach focuses on both aspects of MANET mining and behavioral mining. Applying fuzzy clustering and mining techniques, the model infers the node's preferences from transmission logs. The fuzzy clustering approach, in this study, provides the possibility of capturing the uncertainty among node's behaviors. The results shown are promising and proved that integrating fuzzy approach provide us with more interesting and useful patterns which consequently making the recommender system more functional and robust.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131186326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Architecture Framework and Secure Routing Protocols in Wireless Sensor Networks - Survey 无线传感器网络中的安全体系结构框架和安全路由协议综述
Pub Date : 2011-11-30 DOI: 10.5121/IJCSES.2011.2414
A. Azeem, K. Khan, Pramod
Wireless sensor networks emerging has increased now a days , therefore the need for effective security mechanisms is essential. Because sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. we survey the major topics in wireless sensor network security architecture framework includes the requirements in the sensor security, classify many of the current attacks, listing out their corresponding defensive measures that can be applied, and finally the classification of secure routing protocols, its design issues and their comparison.
无线传感器网络的出现日益增多,因此需要有效的安全机制。由于传感器网络可能与敏感数据交互,并在无人值机的恶劣环境中运行,因此从系统设计之初就必须解决这些安全问题。本文综述了无线传感器网络安全体系结构框架中的主要课题,包括对传感器安全的要求,对当前的许多攻击进行了分类,列出了它们对应的可以应用的防御措施,最后对安全路由协议进行了分类,对其设计问题进行了比较。
{"title":"Security Architecture Framework and Secure Routing Protocols in Wireless Sensor Networks - Survey","authors":"A. Azeem, K. Khan, Pramod","doi":"10.5121/IJCSES.2011.2414","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2414","url":null,"abstract":"Wireless sensor networks emerging has increased now a days , therefore the need for effective security mechanisms is essential. Because sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. we survey the major topics in wireless sensor network security architecture framework includes the requirements in the sensor security, classify many of the current attacks, listing out their corresponding defensive measures that can be applied, and finally the classification of secure routing protocols, its design issues and their comparison.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123268869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Review of DDOS Attack and its Countermeasures in TCP Based Networks 基于TCP网络的DDOS攻击研究进展及对策
Pub Date : 2011-11-30 DOI: 10.5121/IJCSES.2011.2413
A. Mittal, A. Shrivastava, M. Manoria
Today, Internet is the primary medium for communication which is used by number of users across the Network. At the same time, its commercial nature is causing increase vulnerability to enhance cyber crimes and there has been an enormous increase in the number of DDOS (distributed denial of service attack) attacks on the internet over the past decade. Network resources such as network bandwidth, web servers and network switches are mostly the victims of DDoS attacks. In this paper basically summarizing different techniques of DDoS and its countermeasures by different methods such as Bloom Filter, Trace Back method, Independent Component Analysis and TCP Flow Analysis.
今天,互联网是通信的主要媒介,它被许多用户在网络上使用。与此同时,其商业性质也增加了网络犯罪的脆弱性,在过去十年中,互联网上的DDOS(分布式拒绝服务攻击)攻击数量急剧增加。网络带宽、web服务器、网络交换机等网络资源是DDoS攻击的主要受害者。本文主要总结了DDoS攻击的不同技术及其应对方法,如布隆过滤器、回溯法、独立组件分析法、TCP流分析法等。
{"title":"A Review of DDOS Attack and its Countermeasures in TCP Based Networks","authors":"A. Mittal, A. Shrivastava, M. Manoria","doi":"10.5121/IJCSES.2011.2413","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2413","url":null,"abstract":"Today, Internet is the primary medium for communication which is used by number of users across the Network. At the same time, its commercial nature is causing increase vulnerability to enhance cyber crimes and there has been an enormous increase in the number of DDOS (distributed denial of service attack) attacks on the internet over the past decade. Network resources such as network bandwidth, web servers and network switches are mostly the victims of DDoS attacks. In this paper basically summarizing different techniques of DDoS and its countermeasures by different methods such as Bloom Filter, Trace Back method, Independent Component Analysis and TCP Flow Analysis.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129911557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Survey On Mac Protocols For Wireless Multimedia Networks 无线多媒体网络的Mac协议研究
Pub Date : 2011-11-30 DOI: 10.5121/IJCSES.2011.2405
S. Rao, S. V. Chalam, D. Rao
{"title":"A Survey On Mac Protocols For Wireless Multimedia Networks","authors":"S. Rao, S. V. Chalam, D. Rao","doi":"10.5121/IJCSES.2011.2405","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2405","url":null,"abstract":"","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114441998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Challenges Of Using Multicomputing In Real Time Visualapplications 在实时可视化应用中使用多计算的挑战
Pub Date : 2011-11-30 DOI: 10.5121/IJCSES.2011.2401
AlaaYaseenTaqa, LiangShing Ng, A. Joshi
Displaying visual data in a graphical distributed application is one of the main challenges and constraints that should be studied in real time applications. Many problems could be reported in using multicomputing for real time visual applications. These problems are identified throughout this survey, and are classified into two main categories. The first is computation and transfer time while the second is display speed. The real bottleneck in using grid or cloud computing in such applications is whether the communication time between nodes (inside the cloud) increases to the point of degrading overall application performance. This survey paper describes the impact of time and communication speed on applying visual systems on a grid or in cloud computing.
在图形分布式应用程序中显示可视化数据是实时应用程序中应该研究的主要挑战和限制之一。在实时可视化应用中使用多计算会出现许多问题。这些问题在整个调查中都得到了确认,并被分为两大类。首先是计算和传输时间,其次是显示速度。在这类应用程序中使用网格或云计算的真正瓶颈是(云内)节点之间的通信时间是否会增加到降低整体应用程序性能的程度。这篇调查报告描述了时间和通信速度对在网格或云计算中应用视觉系统的影响。
{"title":"The Challenges Of Using Multicomputing In Real Time Visualapplications","authors":"AlaaYaseenTaqa, LiangShing Ng, A. Joshi","doi":"10.5121/IJCSES.2011.2401","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2401","url":null,"abstract":"Displaying visual data in a graphical distributed application is one of the main challenges and constraints that should be studied in real time applications. Many problems could be reported in using multicomputing for real time visual applications. These problems are identified throughout this survey, and are classified into two main categories. The first is computation and transfer time while the second is display speed. The real bottleneck in using grid or cloud computing in such applications is whether the communication time between nodes (inside the cloud) increases to the point of degrading overall application performance. This survey paper describes the impact of time and communication speed on applying visual systems on a grid or in cloud computing.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131347656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UCLEAN : A REQUIREMENT BASED OBJECT - ORIENTED ETL FRAMEWORK 一个基于需求的面向对象的etl框架
Pub Date : 2011-11-30 DOI: 10.5121/IJCSES.2011.2404
P. Pahwa, Shweta Taneja, Garima Thakur
Data warehouse is used to provide effective results from multidimensional data analysis. The accuracy and correctness of these results depend on the quality of the data. To improve data quality, data must be properly extracted, transformed and loaded into the data warehouse. This ETL process is the key to the success of a data warehouse. In this paper we propose a conceptual ETL framework for an object oriented data warehouse design, the framework is called UCLEAN. This framework takes into account the concept of requirements of the users .The data is extracted from different UML sources and is converted into a multidimensional model. It is then cleaned and loaded in the data warehouse. We validate the effectiveness of the framework through a case study.
数据仓库用于提供多维数据分析的有效结果。这些结果的准确性和正确性取决于数据的质量。为了提高数据质量,必须正确提取、转换数据并将其加载到数据仓库中。这个ETL过程是数据仓库成功的关键。本文提出了一个面向对象数据仓库设计的概念ETL框架,该框架被称为UCLEAN。该框架考虑了用户需求的概念,从不同的UML源中提取数据,并将其转换为多维模型。然后将其清理并加载到数据仓库中。我们通过案例研究验证了该框架的有效性。
{"title":"UCLEAN : A REQUIREMENT BASED OBJECT - ORIENTED ETL FRAMEWORK","authors":"P. Pahwa, Shweta Taneja, Garima Thakur","doi":"10.5121/IJCSES.2011.2404","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2404","url":null,"abstract":"Data warehouse is used to provide effective results from multidimensional data analysis. The accuracy and correctness of these results depend on the quality of the data. To improve data quality, data must be properly extracted, transformed and loaded into the data warehouse. This ETL process is the key to the success of a data warehouse. In this paper we propose a conceptual ETL framework for an object oriented data warehouse design, the framework is called UCLEAN. This framework takes into account the concept of requirements of the users .The data is extracted from different UML sources and is converted into a multidimensional model. It is then cleaned and loaded in the data warehouse. We validate the effectiveness of the framework through a case study.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126843909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
PrefixSpan: Mining Sequential Patterns by Prefix-Projected Pattern PrefixSpan:通过前缀投影模式挖掘序列模式
Pub Date : 2011-11-30 DOI: 10.5121/IJCSES.2011.2408
Poonam Sharma, G. Balakrishna
{"title":"PrefixSpan: Mining Sequential Patterns by Prefix-Projected Pattern","authors":"Poonam Sharma, G. Balakrishna","doi":"10.5121/IJCSES.2011.2408","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2408","url":null,"abstract":"","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126595389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Survey of Adaptive Distributed Clustering Algorithms for Wireless Sensor Networks 无线传感器网络自适应分布式聚类算法研究进展
Pub Date : 2011-11-30 DOI: 10.5121/IJCSES.2011.2412
S. Prabhu, S. Sophia
Wireless Sensor Networks (WSNs), is one of the most rapidly growing scientific domain. This is because of the development of advanced sensor nodes with extremely low cost and the potential applications of such sensor nodes are ever growing. WSNs are web of sensor nodes with a set of processors and limited memory unit embedded in it. Reliable routing of packets from sensor nodes to its base station is the most important task for these networks. Routing in WSN is bit more complex than other wired or wireless networks. The conventional routing protocols cannot be used here due to its battery powered nodes. To support scalability, energy efficiency and efficient routing, nodes are often grouped in to non-overlapping clusters. This paper gives a crisp introduction on clustering process in WSNs. The survey of different distributed clustering algorithms (adaptive clustering algorithms) used in WSNs, based on some metrics such as cluster count, cluster stability, cluster head mobility, cluster head role, clustering objective and cluster head selection is done. The study concludes with comparison of few distributed clustering algorithms in WSNs based on these metrics.
无线传感器网络(WSNs)是目前发展最为迅速的科学领域之一。这是因为成本极低的先进传感器节点的发展以及这种传感器节点的潜在应用不断增长。无线传感器网络是由传感器节点组成的网络,其中嵌入了一组处理器和有限的存储单元。从传感器节点到其基站的数据包的可靠路由是这些网络最重要的任务。无线传感器网络中的路由比其他有线或无线网络要复杂一些。传统的路由协议不能在这里使用,因为它的电池供电节点。为了支持可伸缩性、能效和高效路由,节点通常被分组到不重叠的集群中。本文简要介绍了无线传感器网络的聚类过程。基于簇数、簇稳定性、簇头移动性、簇头角色、簇头目标和簇头选择等指标,综述了应用于wsn的各种分布式聚类算法(自适应聚类算法)。最后,对基于这些指标的几种分布式聚类算法进行了比较。
{"title":"A Survey of Adaptive Distributed Clustering Algorithms for Wireless Sensor Networks","authors":"S. Prabhu, S. Sophia","doi":"10.5121/IJCSES.2011.2412","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2412","url":null,"abstract":"Wireless Sensor Networks (WSNs), is one of the most rapidly growing scientific domain. This is because of the development of advanced sensor nodes with extremely low cost and the potential applications of such sensor nodes are ever growing. WSNs are web of sensor nodes with a set of processors and limited memory unit embedded in it. Reliable routing of packets from sensor nodes to its base station is the most important task for these networks. Routing in WSN is bit more complex than other wired or wireless networks. The conventional routing protocols cannot be used here due to its battery powered nodes. To support scalability, energy efficiency and efficient routing, nodes are often grouped in to non-overlapping clusters. This paper gives a crisp introduction on clustering process in WSNs. The survey of different distributed clustering algorithms (adaptive clustering algorithms) used in WSNs, based on some metrics such as cluster count, cluster stability, cluster head mobility, cluster head role, clustering objective and cluster head selection is done. The study concludes with comparison of few distributed clustering algorithms in WSNs based on these metrics.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127096917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
SURVEY ON FAULT TOLERANCE IN GRID COMPUTING 网格计算容错研究进展
Pub Date : 2011-11-30 DOI: 10.5121/IJCSES.2011.2407
P. Latchoumy, P. Sheik, A. Khader
Grid computing is defined as a hardware and software infrastructure that enables coordinated resource sharing within dynamic organizations. In grid computing, the probability of a failure is much greater than in traditional parallel computing. Therefore, the fault tolerance is an important property in order to achieve reliability, availability and QOS. In this paper, we give a survey on various fault tolerance techniques, fault management in different systems and related issues. A fault tolerance service deals with various types of resource failures, which include process failure, processor failure and network failures. This survey provides the related research results about fault tolerance in distinct functional areas of grid infrastructure and also gave the future directions about fault tolerance techniques, and it is a good reference for researcher.
网格计算被定义为一种硬件和软件基础设施,可以在动态组织中实现协调的资源共享。在网格计算中,失败的概率比传统的并行计算大得多。因此,容错是实现可靠性、可用性和QOS的重要属性。本文对各种容错技术、不同系统的故障管理及相关问题进行了综述。容错服务处理各种类型的资源故障,包括流程故障、处理器故障和网络故障。本文综述了网格基础设施不同功能区容错的相关研究成果,并提出了未来容错技术的发展方向,对研究人员具有一定的参考价值。
{"title":"SURVEY ON FAULT TOLERANCE IN GRID COMPUTING","authors":"P. Latchoumy, P. Sheik, A. Khader","doi":"10.5121/IJCSES.2011.2407","DOIUrl":"https://doi.org/10.5121/IJCSES.2011.2407","url":null,"abstract":"Grid computing is defined as a hardware and software infrastructure that enables coordinated resource sharing within dynamic organizations. In grid computing, the probability of a failure is much greater than in traditional parallel computing. Therefore, the fault tolerance is an important property in order to achieve reliability, availability and QOS. In this paper, we give a survey on various fault tolerance techniques, fault management in different systems and related issues. A fault tolerance service deals with various types of resource failures, which include process failure, processor failure and network failures. This survey provides the related research results about fault tolerance in distinct functional areas of grid infrastructure and also gave the future directions about fault tolerance techniques, and it is a good reference for researcher.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124663164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
期刊
International Journal of Computer Science & Engineering Survey
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1