SOBM - Server Occupancy Based Migration by Optimizing Link and Storage Capacity in Check Points
Keywords:Checkpoint, Data Migration, Data loss, Load, Link Capacity, Receiving Rate.
Checkpoint (CP) routing requires a procedure for heavy load and dynamic routing packets over a cluster network, by monitoring network load.Â High traffic CP network does intense transactions by multiple applications and shares the information among the nodes in the network and delivers the same to the server. The Proposed work assigns time slots and each slot checks the path to send or migrate the data to manage the load and data accumulation between servers and if there arises any data loss it recovers from the previous node buffers.Â Data rate and delay is checked by each link and adjust the data flow to various servers. Based on time, network state, incoming packet rates, server load, link-based migration is applied. It increases network packets receiving rates, and minimizes the delay in checkpoints.
 Neely MJ & Urgaonkar R, â€œOptimal backpressure routing for wireless networks with multi-receiver diversityâ€, Ad Hoc Networks, Vol.7, No.5, (2009), pp.862-881.
 Venkataraman R, Moeller S, Krishnamachari B & Rao TR, â€œTrust based backpressure routing in wireless sensor networksâ€, International Journal of Sensor Networks, Vol.17, No.1, (2015), pp.27-39.
 Bui XL, Athanasopoulou E, Ji T, Srikant R & Stolyar A, â€œBackpressure-based packet-by-packet adaptive routing in communication networksâ€, NJ, USA, (2012).
 Chayal D, â€œAssessment of Security in Mobile Ad-Hoc Networks (MANET)â€, Journal of Global Research in Computer Science, Vol.2, No.6, (2011), pp.137-139.
 Tuli R & Kumar P, â€œMinimum process coordinated Check pointing scheme for ad hoc Networksâ€, International Journal on AdHoc Networking Systems (IJANS) Vol.1, No.2, (2011), pp.51-63.
 Biswas S, Neogy S & Dey P, â€œMobility based check pointing and trust based recovery in MANETâ€, International Journal of Wireless & Mobile Networks, Vol.4, No.4, (2012), pp.53-69.
 Karamjeet S & Chakshu G, â€œUsing MD5 AND RSA Algorithm Improve Security in MANETs Systemsâ€, International Journal of Advances in Science and Technology (IJAST), Vol.2, No.2, (2014).
 Patial S & Thakur J, â€œCheck pointing and Rollback Recovery Algorithms for Fault Tolerance in MANETs: A Reviewâ€, International Journal of Advanced Networking and Applications, Vol.6, No.3, (2014), pp.2308-2313.
 Alshareef HN & Grigoras D, â€œRobust cloud management of MANET checkpoint sessionsâ€, Concurrency and Computation: Practice and Experience, Vol.29, No.2, (2017), pp.66-73.
 Narayana MV, Narsimha G & Sarma SSVN, â€œSHA-ZHLS: Security Enhancement in MANETs using SHA Algorithmâ€, International Journal of Advanced Research in Computer and Communication Engineering, Vol.5, No.2, (2016), pp.59-65.
 G Ainabekova, Z Bayanbayeva, B Joldasbekova, A Zhaksylykov (2018). The author in esthetic activity and the functional text (on the basis of V. Mikhaylovâ€™s narrative (â€œThe chronicle of the great juteâ€). OpciÃ³n, AÃ±o 33. 63-80.Z Yesembayeva (2018). Determination of the pedagogical conditions for forming the readiness of future primary school teachers, OpciÃ³n, AÃ±o 33. 475-499