SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 877
Novel Perspectives in Construction of Recovery Oriented Computing
Manas Kumar Yogi1
Annemneedi Lakshmanarao2
1,2
Assistant Professor
1,2
Department of Computer Science and Engineering
1,2
Pragati Engineering College Surampalem, Andhra Pradesh, India
Abstract— In this paper we present novel views in
implementation of a recovery oriented computing system.
We discuss the various factors considered while ROC
system design and move on to present the existing
technologies in this field. Based on this we propose a ROC
system design which enhances the robustness of such a
system. Finally we state the future directions which the
researchers are currently working in this area.
Key words: Recovery, Fault, RAID, NAS, Restartability
I. INTRODUCTION
A. Factors Influencing ROC System Design:
1) Availability:
System must provide 100% service and high quality
a) Flexibility:
System must provides flexibility
b) Accessibility:
Accessibility of System must be considered.
c) Transparency:
System must provide transparency
2) Maintainbility:
Reducing complexity while upgrading software, hardware
3) Scalabilty:
Improvement &in extension of the ROC system.
II. CURRENT TECHNOLOGIES
A. Raid/Nas
RAID (Redundant Array of Inexpensive Disks, now
commonly redundant array of independent disks) is a data
storage virtualization technology that combines multiple
physical disk drive components into a single logical unit for
the purposes of data redundancy, performance
improvement.RAID is very basic model for Recovery
Systems.RAID comprises of several levels which supports
different types of backup storage. RAID 0 consists of
striping, without mirroring or parity. RAID 1 consists of
data mirroring, without parity or striping. RAID 2 consists
of bit-level striping with dedicated Hamming-code parity.
RAID 3 consists of byte-level striping with dedicated
parity.RAID 4 consists of block-level striping with
dedicated parity. RAID 5 consists of block-level striping
with distributed parity. RAID 6 consists of block-level
striping with double distributed parity.RAID can also be
nested like RAID 0+1 or RAID 1+0. Software based RAID
implementations also provided by some operating systems.
Network-attached storage (NAS) is a file-level
computer data storage server connected to a computer
network providing data access to a heterogeneous group of
clients. NAS is specialized for serving files either by its
hardware, software, or configuration. NAS is designed as an
easy and self-contained solution for sharing files over the
network. A NAS unit is a computer connected to a network
that provides only file-based data storage services to other
devices on the network.
B. .Recursive Restartability:
In this approach we assume faults in software functionality
like memory leaks, deadlocks hinder the normal
functionality of the software. This means restarting the
system is only available way of restoring the system
functionality. But the restart should be methodical. It should
be announced before restart as unannounced restarts are
expensive. The main cost of recursive restarts are cost
incurred while saving and restoring the system state. The
possibility of data loss always exist whenever there is
restart.This is the reason why we advocate a strong fault
containment while designing recursive restart systems. The
main issue lies while designing is the restart dependencies
of each component in a RR system.
Fig. 1: Architecture of ROC
III. PROPOSED SYSTEM
A. Independent Subsystem Design:
We propose a independent system design which can
strengthen recovery procedure. When we design the system
in form of sub components then backup defense increases
thereby enhancing the reliability of the system.The cohesion
of the ROC can be defined by one of components which are
capable of autonomic existence.
B. Tolerance Of Unannounced Restarts:
We can model the system to allow maximum of RR per day
depending on the computing nature. If its critical project
then more than 1 RR should not be tolerated. This tolerance
level is important for leveraging the performance of the
system. We introduce a measure of counts of RR at each
user level .If this count is restricted to a reasonable value
then recovery cost will be reduced and time to stabilize the
environment of the computing system will also be less.
C. Enhanced Recursive Restart Methodology:
As shown in the below figure users are maintained at 3
levels in this methodology. The users have the facility of
recursively restarting a system at level i.e. the lowest level
Novel Perspectives in Construction of Recovery Oriented Computing
(IJSRD/Vol. 3/Issue 10/2015/194)
All rights reserved by www.ijsrd.com 878
only one time but at level 2 this is possible for maximum of
3 times. Most users operate at this level so 3 times is the
optimal count for this level. Level 3 operates at highest level
ie, at administrator level so 5 times restart is allowed to
tolerate different types of system failures. But practically the
admin restores the system with at most two restarts.
Maximum users are designed to give access at level-2
max: maximum number of restarts allowed
IV. FUTURE DIRECTIONS:
IV.FUTURE DIRECTIONS:
1) Reducing the percentage of failure of operators by using
new design principles of Recovery Oriented System.
2) Support for live recovering experiments in Operating
System.
3) Creation of metrics to measure the cost of downtime &
ownership.
4) Development of robust Virtual Machines for
implementing/facilitating Recovery Oriented System
methodology successfully.
V. CONCLUSION
Recovery oriented system are a aim towards building self
diagnostic systems and self tolerant systems when failure
occurs in the system. In this paper we have presented
measures towards building such a smarter system which can
recover by means of efficient strategies. As computing
needs of human beings are increasing day by day the need
for implementing ROC systems is not only a need but a
achievement by the researchers working in this direction.
We earnestly hope this paper acts a catalyst for design
efficient ROC systems in future.
REFERENCES
[1] A. Brown, G. Kar, and A. Keller. An Active Approach
to Characterizing Dynamic Dependencies for
Problem.Determination in a Distributed Environment.
To appear in Proceedings of the Seventh IFIP/IEEE
International Symposium on Integrated Network
Management (IM VII), Seattle, WA, May 2001.
[2] G. Candea and A. Fox. Recursive Restartability:
Turning the Reboot Sledgehammer into a Scalpel.
Submission to the 8th Workshop on Hot Topics in
Operating Systems (HotOS-VIII).
[3] J. M. Christensen and J. M. Howard. Field Experience
in Maintenance. Human Detection and Diagnosis of
SystemFailures: Proceedings of the NATO Symposium
on Human Detection and Diagnosis of System Failures,
J.Rasmussen and W. Rouse (Eds.). New York: Plenum
Press, 1981, 111–133.
[4] S. Fisher. E-business redefines infrastructure needs.
InfoWorld, 7 January 2000. Available from
www.inforworld.com.
[5] D. R. Kuhn. Sources of Failure in the Public Switched
Telephone Network. IEEE Computer 30(4), April 1997.
[6] J. Menn. Prevention of Online Crashes is No Easy Fix.
Los Angeles Times, 2 December 1999, C-1.
[7] B. Murphy and T. Gent. Measuring System and
Software Reliability using an Automated Data
Collection Process.Quality and Reliability Engineering
International, 11:341–353, 1995.
[8] C. Perrow. Normal Accidents: Living with High-Risk
Technologies. Princeton, NJ: Princeton Press, 1999.
[9] R. H. Pope. Human Performance: What Improvement
from Human Reliability Assessment. Reliability Data
Collection and Use in Risk and Availability
Assessment: Proceedings of the 5th EureData
Conference, H.-J.Wingender (Ed.). Berlin: Springer-
Verlag, April 1986, 455–465.

Más contenido relacionado

La actualidad más candente

Distributed system
Distributed systemDistributed system
Distributed systemchirag patil
 
Basic features of distributed system
Basic features of distributed systemBasic features of distributed system
Basic features of distributed systemsatish raj
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating SystemAjithaG9
 
Distributed operating system(os)
Distributed operating system(os)Distributed operating system(os)
Distributed operating system(os)Dinesh Modak
 
CSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating SystemCSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating Systemghayour abbas
 
IRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Secure File Sharing and Retrieval using Fog NodesIRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Secure File Sharing and Retrieval using Fog NodesIRJET Journal
 
Distributed Operating Systems
Distributed Operating SystemsDistributed Operating Systems
Distributed Operating SystemsUmmiya Mohammedi
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating SystemSanthiNivas
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating systemudaya khanal
 
Locus Distributed Operating System
Locus Distributed Operating SystemLocus Distributed Operating System
Locus Distributed Operating SystemTamer Rezk
 
Distributed system unit II according to syllabus of RGPV, Bhopal
Distributed system unit II according to syllabus of  RGPV, BhopalDistributed system unit II according to syllabus of  RGPV, Bhopal
Distributed system unit II according to syllabus of RGPV, BhopalNANDINI SHARMA
 

La actualidad más candente (20)

Dn32717720
Dn32717720Dn32717720
Dn32717720
 
Distributed system
Distributed systemDistributed system
Distributed system
 
Basic features of distributed system
Basic features of distributed systemBasic features of distributed system
Basic features of distributed system
 
Distributed File Systems
Distributed File SystemsDistributed File Systems
Distributed File Systems
 
035
035035
035
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
Aos distibutted system
Aos distibutted systemAos distibutted system
Aos distibutted system
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
 
Fault tolerance on cloud computing
Fault tolerance on cloud computingFault tolerance on cloud computing
Fault tolerance on cloud computing
 
Distributed operating system(os)
Distributed operating system(os)Distributed operating system(os)
Distributed operating system(os)
 
CSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating SystemCSI-503 - 11.Distributed Operating System
CSI-503 - 11.Distributed Operating System
 
IRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Secure File Sharing and Retrieval using Fog NodesIRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Secure File Sharing and Retrieval using Fog Nodes
 
Distributed Operating Systems
Distributed Operating SystemsDistributed Operating Systems
Distributed Operating Systems
 
Distributed Operating System
Distributed Operating SystemDistributed Operating System
Distributed Operating System
 
Scheduling
SchedulingScheduling
Scheduling
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Locus Distributed Operating System
Locus Distributed Operating SystemLocus Distributed Operating System
Locus Distributed Operating System
 
Cluster computing
Cluster computingCluster computing
Cluster computing
 
Distributed system unit II according to syllabus of RGPV, Bhopal
Distributed system unit II according to syllabus of  RGPV, BhopalDistributed system unit II according to syllabus of  RGPV, Bhopal
Distributed system unit II according to syllabus of RGPV, Bhopal
 

Destacado

Licencias creative commons
Licencias creative commonsLicencias creative commons
Licencias creative commonsJulio Reyes
 
La rappresentazione dei numeri
La rappresentazione dei numeriLa rappresentazione dei numeri
La rappresentazione dei numerimichela
 
Mensaje a los jóvenes del paraguay – setiembre de 1982
Mensaje a los jóvenes del paraguay – setiembre de 1982Mensaje a los jóvenes del paraguay – setiembre de 1982
Mensaje a los jóvenes del paraguay – setiembre de 1982Episcopalpy
 
Mohammad ali cv 2016
Mohammad ali  cv 2016Mohammad ali  cv 2016
Mohammad ali cv 2016Mohammed Hawa
 
Competition report
Competition reportCompetition report
Competition reportsumit2111
 
Educación para la sustentabilidad
Educación para la sustentabilidad Educación para la sustentabilidad
Educación para la sustentabilidad Bianka Luna
 

Destacado (12)

Twitter
TwitterTwitter
Twitter
 
Licencias creative commons
Licencias creative commonsLicencias creative commons
Licencias creative commons
 
Stop CO2 Ltd
Stop CO2 LtdStop CO2 Ltd
Stop CO2 Ltd
 
coverletter
coverlettercoverletter
coverletter
 
La rappresentazione dei numeri
La rappresentazione dei numeriLa rappresentazione dei numeri
La rappresentazione dei numeri
 
Mensaje a los jóvenes del paraguay – setiembre de 1982
Mensaje a los jóvenes del paraguay – setiembre de 1982Mensaje a los jóvenes del paraguay – setiembre de 1982
Mensaje a los jóvenes del paraguay – setiembre de 1982
 
ASQ Letter
ASQ  LetterASQ  Letter
ASQ Letter
 
Mohammad ali cv 2016
Mohammad ali  cv 2016Mohammad ali  cv 2016
Mohammad ali cv 2016
 
Competition report
Competition reportCompetition report
Competition report
 
CPM
CPMCPM
CPM
 
Resultados Epanet Mollepampa
Resultados Epanet MollepampaResultados Epanet Mollepampa
Resultados Epanet Mollepampa
 
Educación para la sustentabilidad
Educación para la sustentabilidad Educación para la sustentabilidad
Educación para la sustentabilidad
 

Similar a Novel Perspectives in Construction of Recovery Oriented Computing

An Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud ComputingAn Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud Computingijtsrd
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...IAEME Publication
 
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...CSCJournals
 
An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...Alexander Decker
 
CS8603_Notes_003-1_edubuzz360.pdf
CS8603_Notes_003-1_edubuzz360.pdfCS8603_Notes_003-1_edubuzz360.pdf
CS8603_Notes_003-1_edubuzz360.pdfKishaKiddo
 
System Structure for Dependable Software Systems
System Structure for Dependable Software SystemsSystem Structure for Dependable Software Systems
System Structure for Dependable Software SystemsVincenzo De Florio
 
IRJET-Framework for Dynamic Resource Allocation and Efficient Scheduling Stra...
IRJET-Framework for Dynamic Resource Allocation and Efficient Scheduling Stra...IRJET-Framework for Dynamic Resource Allocation and Efficient Scheduling Stra...
IRJET-Framework for Dynamic Resource Allocation and Efficient Scheduling Stra...IRJET Journal
 
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...ijdpsjournal
 
High Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing NetworksHigh Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing NetworksMário Almeida
 
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical SystemsA DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systemsijseajournal
 
02. Fault Tolerance Pattern 위한 mindset
02. Fault Tolerance Pattern 위한 mindset02. Fault Tolerance Pattern 위한 mindset
02. Fault Tolerance Pattern 위한 mindseteva
 

Similar a Novel Perspectives in Construction of Recovery Oriented Computing (20)

An Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud ComputingAn Investigation of Fault Tolerance Techniques in Cloud Computing
An Investigation of Fault Tolerance Techniques in Cloud Computing
 
A01260104
A01260104A01260104
A01260104
 
Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...Entity resolution for hierarchical data using attributes value comparison ove...
Entity resolution for hierarchical data using attributes value comparison ove...
 
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Net...
 
An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...
 
I0935053
I0935053I0935053
I0935053
 
CS8603_Notes_003-1_edubuzz360.pdf
CS8603_Notes_003-1_edubuzz360.pdfCS8603_Notes_003-1_edubuzz360.pdf
CS8603_Notes_003-1_edubuzz360.pdf
 
Report_Internships
Report_InternshipsReport_Internships
Report_Internships
 
Ie3514301434
Ie3514301434Ie3514301434
Ie3514301434
 
System Structure for Dependable Software Systems
System Structure for Dependable Software SystemsSystem Structure for Dependable Software Systems
System Structure for Dependable Software Systems
 
IRJET-Framework for Dynamic Resource Allocation and Efficient Scheduling Stra...
IRJET-Framework for Dynamic Resource Allocation and Efficient Scheduling Stra...IRJET-Framework for Dynamic Resource Allocation and Efficient Scheduling Stra...
IRJET-Framework for Dynamic Resource Allocation and Efficient Scheduling Stra...
 
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
 
Mis
MisMis
Mis
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
As34269277
As34269277As34269277
As34269277
 
G216063
G216063G216063
G216063
 
High Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing NetworksHigh Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing Networks
 
Ems
EmsEms
Ems
 
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical SystemsA DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
A DDS-Based Scalable and Reconfigurable Framework for Cyber-Physical Systems
 
02. Fault Tolerance Pattern 위한 mindset
02. Fault Tolerance Pattern 위한 mindset02. Fault Tolerance Pattern 위한 mindset
02. Fault Tolerance Pattern 위한 mindset
 

Más de IJSRD

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper PublicationIJSRD
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksIJSRD
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningIJSRD
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISIJSRD
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsIJSRD
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 

Más de IJSRD (20)

#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication#IJSRD #Research Paper Publication
#IJSRD #Research Paper Publication
 
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...
 
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...
 
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEWPreclusion of High and Low Pressure In Boiler by Using LABVIEW
Preclusion of High and Low Pressure In Boiler by Using LABVIEW
 
Prevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV ProtocolPrevention and Detection of Man in the Middle Attack on AODV Protocol
Prevention and Detection of Man in the Middle Attack on AODV Protocol
 
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...
 
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild SteelEvaluation the Effect of Machining Parameters on MRR of Mild Steel
Evaluation the Effect of Machining Parameters on MRR of Mild Steel
 
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osnFilter unwanted messages from walls and blocking nonlegitimate user in osn
Filter unwanted messages from walls and blocking nonlegitimate user in osn
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Diagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural NetworksDiagnosing lungs cancer Using Neural Networks
Diagnosing lungs cancer Using Neural Networks
 
A Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion MiningA Survey on Sentiment Analysis and Opinion Mining
A Survey on Sentiment Analysis and Opinion Mining
 
A Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFISA Defect Prediction Model for Software Product based on ANFIS
A Defect Prediction Model for Software Product based on ANFIS
 
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...
 
Product Quality Analysis based on online Reviews
Product Quality Analysis based on online ReviewsProduct Quality Analysis based on online Reviews
Product Quality Analysis based on online Reviews
 
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersSolving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy Numbers
 
Study of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data MiningStudy of Clustering of Data Base in Education Sector Using Data Mining
Study of Clustering of Data Base in Education Sector Using Data Mining
 
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...
 
Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...Investigation of Effect of Process Parameters on Maximum Temperature during F...
Investigation of Effect of Process Parameters on Maximum Temperature during F...
 
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorReview Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a Rotavator
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 

Último

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 

Último (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

Novel Perspectives in Construction of Recovery Oriented Computing

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 877 Novel Perspectives in Construction of Recovery Oriented Computing Manas Kumar Yogi1 Annemneedi Lakshmanarao2 1,2 Assistant Professor 1,2 Department of Computer Science and Engineering 1,2 Pragati Engineering College Surampalem, Andhra Pradesh, India Abstract— In this paper we present novel views in implementation of a recovery oriented computing system. We discuss the various factors considered while ROC system design and move on to present the existing technologies in this field. Based on this we propose a ROC system design which enhances the robustness of such a system. Finally we state the future directions which the researchers are currently working in this area. Key words: Recovery, Fault, RAID, NAS, Restartability I. INTRODUCTION A. Factors Influencing ROC System Design: 1) Availability: System must provide 100% service and high quality a) Flexibility: System must provides flexibility b) Accessibility: Accessibility of System must be considered. c) Transparency: System must provide transparency 2) Maintainbility: Reducing complexity while upgrading software, hardware 3) Scalabilty: Improvement &in extension of the ROC system. II. CURRENT TECHNOLOGIES A. Raid/Nas RAID (Redundant Array of Inexpensive Disks, now commonly redundant array of independent disks) is a data storage virtualization technology that combines multiple physical disk drive components into a single logical unit for the purposes of data redundancy, performance improvement.RAID is very basic model for Recovery Systems.RAID comprises of several levels which supports different types of backup storage. RAID 0 consists of striping, without mirroring or parity. RAID 1 consists of data mirroring, without parity or striping. RAID 2 consists of bit-level striping with dedicated Hamming-code parity. RAID 3 consists of byte-level striping with dedicated parity.RAID 4 consists of block-level striping with dedicated parity. RAID 5 consists of block-level striping with distributed parity. RAID 6 consists of block-level striping with double distributed parity.RAID can also be nested like RAID 0+1 or RAID 1+0. Software based RAID implementations also provided by some operating systems. Network-attached storage (NAS) is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. NAS is specialized for serving files either by its hardware, software, or configuration. NAS is designed as an easy and self-contained solution for sharing files over the network. A NAS unit is a computer connected to a network that provides only file-based data storage services to other devices on the network. B. .Recursive Restartability: In this approach we assume faults in software functionality like memory leaks, deadlocks hinder the normal functionality of the software. This means restarting the system is only available way of restoring the system functionality. But the restart should be methodical. It should be announced before restart as unannounced restarts are expensive. The main cost of recursive restarts are cost incurred while saving and restoring the system state. The possibility of data loss always exist whenever there is restart.This is the reason why we advocate a strong fault containment while designing recursive restart systems. The main issue lies while designing is the restart dependencies of each component in a RR system. Fig. 1: Architecture of ROC III. PROPOSED SYSTEM A. Independent Subsystem Design: We propose a independent system design which can strengthen recovery procedure. When we design the system in form of sub components then backup defense increases thereby enhancing the reliability of the system.The cohesion of the ROC can be defined by one of components which are capable of autonomic existence. B. Tolerance Of Unannounced Restarts: We can model the system to allow maximum of RR per day depending on the computing nature. If its critical project then more than 1 RR should not be tolerated. This tolerance level is important for leveraging the performance of the system. We introduce a measure of counts of RR at each user level .If this count is restricted to a reasonable value then recovery cost will be reduced and time to stabilize the environment of the computing system will also be less. C. Enhanced Recursive Restart Methodology: As shown in the below figure users are maintained at 3 levels in this methodology. The users have the facility of recursively restarting a system at level i.e. the lowest level
  • 2. Novel Perspectives in Construction of Recovery Oriented Computing (IJSRD/Vol. 3/Issue 10/2015/194) All rights reserved by www.ijsrd.com 878 only one time but at level 2 this is possible for maximum of 3 times. Most users operate at this level so 3 times is the optimal count for this level. Level 3 operates at highest level ie, at administrator level so 5 times restart is allowed to tolerate different types of system failures. But practically the admin restores the system with at most two restarts. Maximum users are designed to give access at level-2 max: maximum number of restarts allowed IV. FUTURE DIRECTIONS: IV.FUTURE DIRECTIONS: 1) Reducing the percentage of failure of operators by using new design principles of Recovery Oriented System. 2) Support for live recovering experiments in Operating System. 3) Creation of metrics to measure the cost of downtime & ownership. 4) Development of robust Virtual Machines for implementing/facilitating Recovery Oriented System methodology successfully. V. CONCLUSION Recovery oriented system are a aim towards building self diagnostic systems and self tolerant systems when failure occurs in the system. In this paper we have presented measures towards building such a smarter system which can recover by means of efficient strategies. As computing needs of human beings are increasing day by day the need for implementing ROC systems is not only a need but a achievement by the researchers working in this direction. We earnestly hope this paper acts a catalyst for design efficient ROC systems in future. REFERENCES [1] A. Brown, G. Kar, and A. Keller. An Active Approach to Characterizing Dynamic Dependencies for Problem.Determination in a Distributed Environment. To appear in Proceedings of the Seventh IFIP/IEEE International Symposium on Integrated Network Management (IM VII), Seattle, WA, May 2001. [2] G. Candea and A. Fox. Recursive Restartability: Turning the Reboot Sledgehammer into a Scalpel. Submission to the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII). [3] J. M. Christensen and J. M. Howard. Field Experience in Maintenance. Human Detection and Diagnosis of SystemFailures: Proceedings of the NATO Symposium on Human Detection and Diagnosis of System Failures, J.Rasmussen and W. Rouse (Eds.). New York: Plenum Press, 1981, 111–133. [4] S. Fisher. E-business redefines infrastructure needs. InfoWorld, 7 January 2000. Available from www.inforworld.com. [5] D. R. Kuhn. Sources of Failure in the Public Switched Telephone Network. IEEE Computer 30(4), April 1997. [6] J. Menn. Prevention of Online Crashes is No Easy Fix. Los Angeles Times, 2 December 1999, C-1. [7] B. Murphy and T. Gent. Measuring System and Software Reliability using an Automated Data Collection Process.Quality and Reliability Engineering International, 11:341–353, 1995. [8] C. Perrow. Normal Accidents: Living with High-Risk Technologies. Princeton, NJ: Princeton Press, 1999. [9] R. H. Pope. Human Performance: What Improvement from Human Reliability Assessment. Reliability Data Collection and Use in Risk and Availability Assessment: Proceedings of the 5th EureData Conference, H.-J.Wingender (Ed.). Berlin: Springer- Verlag, April 1986, 455–465.