Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/6559
Title: TACKLING FAULTS ON MOBILE DEVICES AND SECURITY ISSUES IN GRID COMPUTING ENVIRONMENT
Authors: Bichhawat, Abhishek
Keywords: ELECTRONICS AND COMPUTER ENGINEERING
TACKLING FAULTS
MOBILE DEVICES
GRID COMPUTING ENVIRONMENT
Issue Date: 2011
Abstract: Grid Computing has been projecting itself as an important computing paradigm in the recent years. It has offered a great substitute for the mighty supercomputers with minimal cost and resources. The main focus of grid computing is to provide ample computational power of the order of what is provided by the supercomputers. For this, it has been using the unused computational power of the processors all over the world. More recently, mobile devices have also been looked up to as resource provider for the grid. With the inevitably growing numbers and development of mobile devices, the grid has got a huge supplement of resources, which could be utilized in many areas. As no system is free from errors and faults, even the mobile devices tend to fail in certain situations. In fact, the resource constraints on mobile devices prove to be a major source of failures on the mobile devices. It is important that these faults be tackled in an efficient manner to provide maximum of the work done by the mobile device to the grid. Apart from these errors and failures, the systems over the interne are always prone to security risks from the neighbourhood. It is the responsibility of the grid to provide it's users a secure environment for utilizing the services and offering their resources for carrying out jobs submitted to it. The first part of this dissertation explores the technique of task migration to be used as a fault tolerance technique in the mobile grid environment. This technique, when combined with existing techniques, could provide the necessary fault-resilient environment for the tasks to be carried out. The second part of the thesis looks into usage of virtualization for implementing security features and to identify the possible attacks on the system.
URI: http://hdl.handle.net/123456789/6559
Other Identifiers: M.Tech
Appears in Collections:MASTERS' DISSERTATIONS (E & C)

Files in This Item:
File Description SizeFormat 
ECED G20681.pdf2.53 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.