network security
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science technology
Active In SP
**

Posts: 740
Joined: Jan 2010
#1
28-01-2010, 11:49 PM


please read
ieeexplore.ieeexpl/preabsprintf.jsp?arnumber=4479488
ieeexplore.ieeexpl/preabsprintf.jsp?arnumber=4479488

Algorithm Description:
Logging can be classified as pessimistic, optimistic, or causal. It is based on the fact that the execution of a process can be modeled as a sequence of state intervals. The execution during a state interval is deterministic. However, each state interval is initiated by a nondeterministic event now, assume that the system can capture and log sufficient information about the nondeterministic events that initiated the state interval. This is called the piecewise deterministic (PWD) assumption. Then, a crashed process can be recovered by 1) restoring it to the initial state and 2) replaying the logged events to it in the same order they appeared in the execution before the crash. To avoid a rollback to the initial state of a process and to limit the amount of nondeterministic events that need to be replayed, each process periodically saves its local state. Log based mechanisms in which the only nondeterministic events in a system are the reception of messages is usually referred to as message logging.


Existing System:
Communication Induced Check-pointing protocols usually make the assumption that any process can be check-pointed at any time. An alternative approach which releases the constraint of always check-pointable processes, without delaying any do not message reception nor did altering message ordering enforce by the communication layer or by the application. This protocol has been implemented within Pro-Active, an open source Java middleware for asynchronous and distributed objects implementing the ASP (Asynchronous Sequential Processes) model.

Proposed System:
This paper presents two fault-tolerance mechanisms called Theft-Induced Check pointing and Systematic Event Logging. These are transparent protocols capable of overcoming problems associated with both benign faults, i.e., crash faults, and node or subnet volatility. Specifically, the protocols base the state of the execution on a dataflow graph, allowing for efficient recovery in dynamic heterogeneous systems as well as multithreaded applications.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
jmanogna
Active In SP
**

Posts: 1
Joined: Feb 2010
#2
08-02-2010, 11:32 PM

network security
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  abstract seminar on security features of atm Guest 1 48 31-10-2016, 11:47 AM
Last Post: jaseela123
  ppt for antivirus and content security cluster solution Guest 1 54 29-10-2016, 04:22 PM
Last Post: jaseela123
  mini project on microcontroller based security access system Guest 1 45 29-10-2016, 04:08 PM
Last Post: Dhanabhagya
  ppt on optical data security Guest 2 91 29-10-2016, 03:29 PM
Last Post: Dhanabhagya
  lineman security system project pdf Guest 1 58 29-10-2016, 03:17 PM
Last Post: jaseela123
  network theory by a v bakshi u a bakshi pdf download Guest 1 60 11-10-2016, 11:59 AM
Last Post: amrutha735
  seminar report on artificial neural network pdf Guest 1 73 11-10-2016, 10:27 AM
Last Post: amrutha735
  advantages and disadvantages of halo network Guest 1 78 08-10-2016, 03:09 PM
Last Post: Dhanabhagya
  abstract of the seminar topic smart e mail security Guest 1 93 09-07-2016, 11:41 AM
Last Post: Dhanabhagya
  ppt on optical data security Guest 1 70 05-05-2016, 09:38 AM
Last Post: mkaasees