Describe the purpose of the checkpoint mechanism, Operating System

Describe the purpose of the checkpoint mechanism. How habitually must checkpoints be performed? Explain how the frequency of checkpoints affects:

  • System performance while no failure occurs
  • The time it acquires to recover from a system crash
  • The time it acquires to recover from a disk crash

Answer: A checkpoint log record point outs that a log record and its modified data has been written to stable storage and that the transaction need not to be redone in case of a system crash. Clearly the more often checkpoints are performed the less likely it is that redundant updates will have to be performed during the recovery process.

  • System performance when no failure take places-If no failures takes place the system must incur the cost of performing checkpoints that are essentially unnecessary. In these circumstances performing checkpoints less often will lead to better system performance.
  • The time acquires to recover from a system crash-the existence of a checkpoint record means that an operation will not have to be redone during system recovery. In these circumstances the more often checkpoints were performed the faster the recovery time is from a system crash.
  • The time it acquires to recover from a disk crash-the survival of a checkpoint record means that an operation will not have to be redone during system recovery. In this situation the more frequently checkpoints were performed the faster the recovery time is from a disk crash.

 

Posted Date: 7/27/2013 2:54:47 AM | Location : United States







Related Discussions:- Describe the purpose of the checkpoint mechanism, Assignment Help, Ask Question on Describe the purpose of the checkpoint mechanism, Get Answer, Expert's Help, Describe the purpose of the checkpoint mechanism Discussions

Write discussion on Describe the purpose of the checkpoint mechanism
Your posts are moderated
Related Questions
How does communication takes place in a distributed system? Distributed systems depend on the networking for their functionality. A network is a communication path among two

time-stamping It is a method proposed by Lamport, used to sequencing events in a distributed machine without the use of clocks. This process is intended to order events consis

What is the sequence in which resources may be utilized? Under normal mode of operation, a process may utilize a resource in the following sequence: Request: If the requ


Q. Explain application of consumer behaviour? Consumer behaviour is described as the dynamic interaction of affect and cognition and behaviour and the environment by human bein

Write a short note on peer-to-peer computing. Peer-to-peer (P2P) system model is a kind of distributed OS. In this model, clients and servers aren't distinguished from one anot

what is process creation and how to create a process

Q. Presume that we agree that 1 kilobyte is 1,024 bytes 1 megabyte is 1,0242 bytes and 1 gigabyte is 1,0243 bytes. This progression carries on through terabytes, petabytes, and ex

Discuss the role of discovery and developmental prototypes in defining requirements for this project.Are throwaway prototypes appropriate, or should the project team quickly gather

Explain the Request/Response Interface   Many issues are involved in providing a procedural interface for client functions to interact with server components. First off, since