Describe the purpose of the checkpoint mechanism, Operating System

Describe the purpose of the checkpoint mechanism. How habitually must checkpoints be performed? Explain how the frequency of checkpoints affects:

  • System performance while no failure occurs
  • The time it acquires to recover from a system crash
  • The time it acquires to recover from a disk crash

Answer: A checkpoint log record point outs that a log record and its modified data has been written to stable storage and that the transaction need not to be redone in case of a system crash. Clearly the more often checkpoints are performed the less likely it is that redundant updates will have to be performed during the recovery process.

  • System performance when no failure take places-If no failures takes place the system must incur the cost of performing checkpoints that are essentially unnecessary. In these circumstances performing checkpoints less often will lead to better system performance.
  • The time acquires to recover from a system crash-the existence of a checkpoint record means that an operation will not have to be redone during system recovery. In these circumstances the more often checkpoints were performed the faster the recovery time is from a system crash.
  • The time it acquires to recover from a disk crash-the survival of a checkpoint record means that an operation will not have to be redone during system recovery. In this situation the more frequently checkpoints were performed the faster the recovery time is from a disk crash.

 

Posted Date: 7/27/2013 2:54:47 AM | Location : United States







Related Discussions:- Describe the purpose of the checkpoint mechanism, Assignment Help, Ask Question on Describe the purpose of the checkpoint mechanism, Get Answer, Expert's Help, Describe the purpose of the checkpoint mechanism Discussions

Write discussion on Describe the purpose of the checkpoint mechanism
Your posts are moderated
Related Questions
Define throughput? Throughput in CPU scheduling is the number of processes that are completed per unit time. For long processes, this rate might be one process per hour; for sh

List the Coffman's conditions that lead to a deadlock. Mutual Exclusion : Only one process might be use a critical resource at a time. Hold & Wait: A process may be alloc

Broken data into small packets allow time division multiplexing. In TDM every packet leaves the sender and is switched on the shared interaction channel through a multiplexer. At t

How free-space is managed using bit vector implementation? The free-space list is implemented as a bit map or bit vector. Each block is shown by 1 bit. If the block is free, th


What are the three main activities of an operating system in regard to memory management? Keep track of which parts of memory are now being used and by whom. Decide which pr

I need help implementing malloc

Define Properties to Ensure Good Search Performance A hashing function h should possess the subsequent properties to make sure good search performance: a. The hashing functi

Problem: a) Define the term ‘process' and what are the different constituents of a process. b) In the three-state process model, what does each of the three states signify?

What is a two state process model?   At any time a process is being implementing by a processor or not. Therefore a process may be in Running or not running state. When an Ope