Failure Detection and Revival For Peer-To-Peer Storage Using Mass
Failure Detection and Revival For Peer-To-Peer Storage Using Mass
org
(Assistant Professor, Department of Computer Science and Engineering) (P.S.R.Rengasamy College of Engineering for Women, Sivakasi, Tamil Nadu, India) 2 ( Head & Professor in Computer Science and Engineering) 2 (PGP College of Engineering and Technology,Namakkal, Tamilnadu)
1,3,4
Abstract: Sustaining a given level of data redundancy is a basic requirement of peer-to-peer (P2P) storage
systems to make certain desired data availability, additional replicas must be created when peers fail. Because the majority of failures in P2P networks are short-lived (i.e., peers return with data intact), reliably distinctive permanent and transient failures, however, is a demanding task, because peers are apathetic to probes in both cases. This paper proposes MASS (Maximum Available Server Selection), an algorithm that detects the failure and redirect the user services by the available server. Keywords:Failure detector, P2P storage, availability, Failure Recovery.
I.
Introduction
Peer-to-Peer (P2P) storage networks aim to aggregate todays resource-abundant computers to form large, decentralized storage systems. Of the abundant P2P storage systems urbanized in recent years, prototypes including Total Recall [3], Friend store [8] and commercial services like Wuala [2] and Clever Safe [1], all of them faced the long-standing problem of enforcing required data availability from participating peers. To reach availability target in unreliable networks, storage systems replicate data across multiple peers (using replication or erasure coding). Even if some replicas (or fragments) become unavailable due to their hosts failing, the object is still available by accessing other online replicas. Over longer periods, the system must produce new replicas as required to reimburse for others lost to peer failures. Since replica production consumes a large amount of bandwidth, maintaining availability incurs a vital cost on storage systems [4]. Intuitively, aggressive replication incurs high bandwidth costs that may cripple the entire system, while reducing the number of replicas generated might result in an unacceptably low level of availability. Therefore, the challenge in building P2P storage systems is to carefully navigate this cost-availability trade-off, by reducing maintenance cost as much as possible while maintaining the desired level of availability.This challenge is further complicated by the fact that peer failures can be either transient or permanent. Data are lost following a permanent failure, and the expected level of redundancy must be restored by creating new replicas. Absolutely not, an object with adequate replicas can stand transient failures without sacrificing availability, given that a peer undergoing a short-lived failure will retort the network and fetch back its stored data. Hence, an ideal system would recognize peer failures and only reproduce data following enduring ones. Undesirably, reliably distinguishing permanent and transient failures turns out to be a discouraging task, since they cannot be distinguished using probes [9].To address this problem, this paper proposes MASS, an algorithm that provides better protection against transient failures. In particular, given a replica group (i.e., all peers hosting replicas of the same object) and downtime of these peers, MASS can detect the number of remaining replicas in the group, i.e., the number of replicas residing on online peers or peers experiencing transient failures. Storage systems can use this detected number of replicas to determine whether data recovery is necessary to reach the desired replication level and redirect the user service with last session page by other online peers.
II.
Related work
Types of Failures A failure occurs when an actual running system deviates from its specified behavior. A. Muteness Failure Muteness failures are malicious failures in which a process stops sending messages but might continue to send other messages. When muteness failure occurs the service will stop executing its designed features but might still be able to generate likeness messages such failures cannot be detected by crash failure detectors. Adopting the muteness failure detecting algorithm in which proposes a protocol that forces the monitored service to send Iam-not-mute message to the muteness failure detector periodically when service is not mute but stop sending such messages when a muteness failure occurs. www.iosrjournals.org 15 | Page
www.iosrjournals.org
16 | Page
Failure Detection And Revival For Peer-To-Peer Storage Using Mass III. Proposed Methodology
Peer-To-Peer network systems, various Types of failure may occur through the execution. This paper addresses failure detection and recovery. In addition, many researchers have haggard their attentions on the Crash failure detectors, implementations and crash detection algorithms [8]. However, most previous work on the Crash failure detection is based on the crash-stop or the fail-free assumption and relies on predicting the liveness message transmission behavior and it doesnt consider Redirecting failed user service to which server having lowest user Availability to reduce the overload and estimating a suitable timeout threshold to achieve a better MASS failure detection.
In contrast, Process or service as recoverable, since many fault-tolerance techniques can be adopted to achieve such recovery. For high level applications, a more realistic crash failure model would be crashrecovery.Fig.1 shows the problem definition where Red Color Node represents the network failure. The solution implements the Sender sends some data to receiver where some nodes exist between networks of sender to receiver, where different port numbers assigned to all these intermediate nodes. When program begins a file accepted by sender to transmit to receiver MASS (Maximum Available Server Selection Policy Algorithm) monitors the transmission for failures. If any failure detected MASS reports the specific node where data lost and recovers the data from previous node. Retransmission from recovered node done by MASS this process continues until all data packets safely reach the destination. For successful delivery to destination all the intermediate nodes maintain a copy of data to ensure data Transmission reliability over network. This method is most useful in cases of frequent interaction between the client and the same server set as the status for a given server set stored in the client is in that case always maintained up-to-date.The main problem addressed in this system is maximizing the probability of successful operation with the current transmission, thereby minimize the average number of attempted servers until success.The algorithm proposed in solves the problem by exploiting the dynamically obtained information on the last server access moments and the corresponding activity status of servers in a server set. The user can work without any disturbance when one server fails doing its work the other server will replace it and perform the same task. The concept is covered by following processes User Admin Healing A. User Process User to register as a valid user by Submitting their profile to the Administrator. Once the User will be registered the user can send mail and View the Received Mail. The Send item can store the mail send by the users. B. Admin Process Admin can do the Web service configuration. The admin had the power to validate Server settings and Connection. If any problem occurs to the user, admin can resolve through availability server by using this configuration. C. Healing Process Through this process admin can interchange the servers for the users. Upon failure detection, the failover mechanism resends the SIP request to the new server selected according to an SSP. This may potentially be repeated until all servers have been attempted. The goal of the proposed algorithm is to reduce transaction control time. The MA SSP makes use of the assumption that the server whose last known up time is closest to the actual time, is most likely to be up at the actual time. MASS is a simple extension of round robin. It assigns a certain weight to each server. The weight indicates the servers processing capacity. This SSP may also be dynamic if it can evaluate individual servers capacities and their loads occasionally. Algorithm Step 1: When server gets failed that
IV.
The maximum availability (MA) SSP is projected to recover session control performance in scenarios with server and communication failures. Through this system more users can access a server at a time if the server gets busy the user will be responded by the availability server and all the process is done through a single domain. In future, this will be updated to response the users while accessing various domains.
References
[1] [2] [3] [4] [5] [6] [7] [8] [9] [10] CleversafeInc.,http://www.cleversafe.org/dispersed-storage,2011. Wuala, Peer-to-peer storage system, http://wua.la/en/home.html, 2010. R. Bhagwan, K. Tati, Y.-C. Cheng, S. Savage, and G.M. Voelker,Total Recall: System Support for Automated Availability Management, Proc. Symp. Networked Systems Design and Implementation (NSDI 04), 2004. C. Blake and R. Rodrigues, High Availability,Scalable Storage,Dynamic Peer Networks: Pick Two, Proc. Ninth Workshop Hot Topicsin Operating Systems (HotOS 03), 2003. R.Koo and S. Toueg, Checkpointing and Rollback-Recovery for Distributed Systems, IEEE Trans. Software Eng., vol. 13, no. 1, pp 23-31, Jan. 1987. D. Manivannan and M. Singhal, A Low-Overhead Recovery Technique Using Quasi Synchronous Check pointing, Proc. IEEE Intl Conf. Distributed Computing Systems, pp. 100-107, 1996. J.C. Laprie, A. Avizienis, and H. Kopetz. Dependability: Basic Concepts and Terminology. Springer-Verlag New York, Inc. Secaucus, NJ, USA, 1992. D.N. Tran, F. Chiang, and J. Li, Friendstore: Cooperative Online Backup Using Trusted Nodes, Proc. First Workshop Social. Network Systems (SocialNets 08), 2008. H. Weatherspoon, B.G. Chun, C. So, and J. Kubiatowicz, Long-Term Data Maintenance in Wide-Area Storage Systems: A Quantitative Approach, Computer, 2005. Protector: A Probabilistic Failure Detector for Cost-Effective Peer-to-Peer Storage Zhi Yang, Jing Tian, Ben Y. Zhao, Wei Chen, and Yafei Dai, Member, IEEE Transaction on parallel and distributed systems, VOL. 22, NO. 9, Sep 2011
www.iosrjournals.org
18 | Page