Please use this identifier to cite or link to this item:
http://localhost:8081/xmlui/handle/123456789/6559
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bichhawat, Abhishek | - |
dc.date.accessioned | 2014-11-03T08:45:47Z | - |
dc.date.available | 2014-11-03T08:45:47Z | - |
dc.date.issued | 2011 | - |
dc.identifier | M.Tech | en_US |
dc.identifier.uri | http://hdl.handle.net/123456789/6559 | - |
dc.guide | Joshi, R. C. | - |
dc.guide | Varadharajan, Vijay | - |
dc.description.abstract | Grid Computing has been projecting itself as an important computing paradigm in the recent years. It has offered a great substitute for the mighty supercomputers with minimal cost and resources. The main focus of grid computing is to provide ample computational power of the order of what is provided by the supercomputers. For this, it has been using the unused computational power of the processors all over the world. More recently, mobile devices have also been looked up to as resource provider for the grid. With the inevitably growing numbers and development of mobile devices, the grid has got a huge supplement of resources, which could be utilized in many areas. As no system is free from errors and faults, even the mobile devices tend to fail in certain situations. In fact, the resource constraints on mobile devices prove to be a major source of failures on the mobile devices. It is important that these faults be tackled in an efficient manner to provide maximum of the work done by the mobile device to the grid. Apart from these errors and failures, the systems over the interne are always prone to security risks from the neighbourhood. It is the responsibility of the grid to provide it's users a secure environment for utilizing the services and offering their resources for carrying out jobs submitted to it. The first part of this dissertation explores the technique of task migration to be used as a fault tolerance technique in the mobile grid environment. This technique, when combined with existing techniques, could provide the necessary fault-resilient environment for the tasks to be carried out. The second part of the thesis looks into usage of virtualization for implementing security features and to identify the possible attacks on the system. | en_US |
dc.language.iso | en | en_US |
dc.subject | ELECTRONICS AND COMPUTER ENGINEERING | en_US |
dc.subject | TACKLING FAULTS | en_US |
dc.subject | MOBILE DEVICES | en_US |
dc.subject | GRID COMPUTING ENVIRONMENT | en_US |
dc.title | TACKLING FAULTS ON MOBILE DEVICES AND SECURITY ISSUES IN GRID COMPUTING ENVIRONMENT | en_US |
dc.type | M.Tech Dessertation | en_US |
dc.accession.number | G20681 | en_US |
Appears in Collections: | MASTERS' THESES (E & C) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ECED G20681.pdf | 2.53 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.