SOBM - Server Occupancy Based Migration by Optimizing Link and Storage Capacity in Check Points


  • Sreeleja N. Unnithan
  • S Bhavani





Checkpoint, Data Migration, Data loss, Load, Link Capacity, Receiving Rate.


Checkpoint (CP) routing requires a procedure for heavy load and dynamic routing packets over a cluster network, by monitoring network load.  High traffic CP network does intense transactions by multiple applications and shares the information among the nodes in the network and delivers the same to the server. The Proposed work assigns time slots and each slot checks the path to send or migrate the data to manage the load and data accumulation between servers and if there arises any data loss it recovers from the previous node buffers.  Data rate and delay is checked by each link and adjust the data flow to various servers. Based on time, network state, incoming packet rates, server load, link-based migration is applied. It increases network packets receiving rates, and minimizes the delay in checkpoints.




[1] Neely MJ & Urgaonkar R, “Optimal backpressure routing for wireless networks with multi-receiver diversityâ€, Ad Hoc Networks, Vol.7, No.5, (2009), pp.862-881.

[2] Venkataraman R, Moeller S, Krishnamachari B & Rao TR, “Trust based backpressure routing in wireless sensor networksâ€, International Journal of Sensor Networks, Vol.17, No.1, (2015), pp.27-39.

[3] Bui XL, Athanasopoulou E, Ji T, Srikant R & Stolyar A, “Backpressure-based packet-by-packet adaptive routing in communication networksâ€, NJ, USA, (2012).

[4] Chayal D, “Assessment of Security in Mobile Ad-Hoc Networks (MANET)â€, Journal of Global Research in Computer Science, Vol.2, No.6, (2011), pp.137-139.

[5] Tuli R & Kumar P, “Minimum process coordinated Check pointing scheme for ad hoc Networksâ€, International Journal on AdHoc Networking Systems (IJANS) Vol.1, No.2, (2011), pp.51-63.

[6] Biswas S, Neogy S & Dey P, “Mobility based check pointing and trust based recovery in MANETâ€, International Journal of Wireless & Mobile Networks, Vol.4, No.4, (2012), pp.53-69.

[7] Karamjeet S & Chakshu G, “Using MD5 AND RSA Algorithm Improve Security in MANETs Systemsâ€, International Journal of Advances in Science and Technology (IJAST), Vol.2, No.2, (2014).

[8] Patial S & Thakur J, “Check pointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs: A Reviewâ€, International Journal of Advanced Networking and Applications, Vol.6, No.3, (2014), pp.2308-2313.

[9] Alshareef HN & Grigoras D, “Robust cloud management of MANET checkpoint sessionsâ€, Concurrency and Computation: Practice and Experience, Vol.29, No.2, (2017), pp.66-73.

[10] Narayana MV, Narsimha G & Sarma SSVN, “SHA-ZHLS: Security Enhancement in MANETs using SHA Algorithmâ€, International Journal of Advanced Research in Computer and Communication Engineering, Vol.5, No.2, (2016), pp.59-65.

[11] G Ainabekova, Z Bayanbayeva, B Joldasbekova, A Zhaksylykov (2018). The author in esthetic activity and the functional text (on the basis of V. Mikhaylov’s narrative (“The chronicle of the great juteâ€). Opción, Año 33. 63-80.

Z Yesembayeva (2018). Determination of the pedagogical conditions for forming the readiness of future primary school teachers, Opción, Año 33. 475-499

View Full Article: