Describe the purpose of the checkpoint mechanism, Operating System

Describe the purpose of the checkpoint mechanism. How habitually must checkpoints be performed? Explain how the frequency of checkpoints affects:

  • System performance while no failure occurs
  • The time it acquires to recover from a system crash
  • The time it acquires to recover from a disk crash

Answer: A checkpoint log record point outs that a log record and its modified data has been written to stable storage and that the transaction need not to be redone in case of a system crash. Clearly the more often checkpoints are performed the less likely it is that redundant updates will have to be performed during the recovery process.

  • System performance when no failure take places-If no failures takes place the system must incur the cost of performing checkpoints that are essentially unnecessary. In these circumstances performing checkpoints less often will lead to better system performance.
  • The time acquires to recover from a system crash-the existence of a checkpoint record means that an operation will not have to be redone during system recovery. In these circumstances the more often checkpoints were performed the faster the recovery time is from a system crash.
  • The time it acquires to recover from a disk crash-the survival of a checkpoint record means that an operation will not have to be redone during system recovery. In this situation the more frequently checkpoints were performed the faster the recovery time is from a disk crash.

 

Posted Date: 7/27/2013 2:54:47 AM | Location : United States







Related Discussions:- Describe the purpose of the checkpoint mechanism, Assignment Help, Ask Question on Describe the purpose of the checkpoint mechanism, Get Answer, Expert's Help, Describe the purpose of the checkpoint mechanism Discussions

Write discussion on Describe the purpose of the checkpoint mechanism
Your posts are moderated
Related Questions
Question: a) The following questions refers to Windows XP networking: i) Briefly, explain how a host joins a network using DHCP? ii) Which IP address could be assigned to a

KERNEL ACTIVITY FOR ULTS: The kernel isn't aware of thread activity but it is still managing process activity. When a thread compose a system call the whole process will be bl

When we download a movie from the Internet, we don't care about, say, packet sizes. However, even ifwe are not aware of howlow-level details of networks are implemented, our data i

What are the different files attributes? File name:-it's the name of the file. It's the name with which the user identifies. Identifiers:-it's created when a file is created

The hardware to support demand paging is as follows Page table: This table has the skill to mark an entry invalid though a valid-invalid bit or particular value of protectio

Problem: a) Explain physically what occurs when a disk is fragmented. What is the purpose of "defragmenting" a disk? b) What is the idea behind backing up data on a secondar

The following is a dump of a TCP header in hexadecimal format: 00CD0018 00000EF1 00000D5D 502200D1 01BF0010 We need to first split the above hex as such 00 CD 00 18 00 00

What is the kernel? A more common explanation is that the OS is the one program running at all times on the computer  usually known as the kernel, with all else being applicati

Define the Communications Techniques - Application interaction protocols    Communications techniques are well defined. They give developer the programmatic mechanism to transf

LRU page replacement In least lately used page replacement algorithm we will replace that page that hasn't been used for the longest period of time. This is similar as an opti