Describe the purpose of the checkpoint mechanism, Operating System

Describe the purpose of the checkpoint mechanism. How habitually must checkpoints be performed? Explain how the frequency of checkpoints affects:

  • System performance while no failure occurs
  • The time it acquires to recover from a system crash
  • The time it acquires to recover from a disk crash

Answer: A checkpoint log record point outs that a log record and its modified data has been written to stable storage and that the transaction need not to be redone in case of a system crash. Clearly the more often checkpoints are performed the less likely it is that redundant updates will have to be performed during the recovery process.

  • System performance when no failure take places-If no failures takes place the system must incur the cost of performing checkpoints that are essentially unnecessary. In these circumstances performing checkpoints less often will lead to better system performance.
  • The time acquires to recover from a system crash-the existence of a checkpoint record means that an operation will not have to be redone during system recovery. In these circumstances the more often checkpoints were performed the faster the recovery time is from a system crash.
  • The time it acquires to recover from a disk crash-the survival of a checkpoint record means that an operation will not have to be redone during system recovery. In this situation the more frequently checkpoints were performed the faster the recovery time is from a disk crash.

 

Posted Date: 7/27/2013 2:54:47 AM | Location : United States







Related Discussions:- Describe the purpose of the checkpoint mechanism, Assignment Help, Ask Question on Describe the purpose of the checkpoint mechanism, Get Answer, Expert's Help, Describe the purpose of the checkpoint mechanism Discussions

Write discussion on Describe the purpose of the checkpoint mechanism
Your posts are moderated
Related Questions
Difference between cache and associate memory

Determine what the expansion of nested macro calls follows  The expansion of nested macro calls follows the Last in First out (LIFO) rule.

Dynamic scheduling : The number of thread in a program may be changed during the course of operation. Dynamic priority scheduling is a kind of scheduling algorithm in which the pr

Question: a) What special measures must be taken to ensure the reliability, availability, and security of electronic commerce and digital business process? b) What are the c

Write a short note on peer-to-peer computing. Peer-to-peer (P2P) system model is a kind of distributed OS. In this model, clients and servers aren't distinguished from one anot

Many-to-Many Model The many-to-many model- many user-level threads to many kernel-level threads avoids several of the limitations of the one-to-one model, although extending mu

A friend has promised to log in at a particular time. However, he needs to be contacted as soon as he logs in. The shell script checks after every minute whether he has logged in o

Q. Explain some of the ways an application can use memory via the Win32 API. Answer: (1) Virtual memory offers several functions that allow an application to reserve and rele

Mention the various features that characteristics the deadlock condition .  The four circumstances that give rise to deadlock condition are: 1) Mutual exclusion : As a minim

What are the common strategies to select a free hole from a set of available holes? The most common methods are a. First fit b. Best fit c. Worst fit