SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 222 
FUSION METHOD USED TO TOLERATE THE FAULTS OCCURRED IN DISRTIBUTED SYSTEM Archana Thange1, Amina.N2, Amruta Nimbalkar3 1ME (IT), DKGOI’S COE, swami chincholi, Maharashtra, India 2ME (COMPUTER), DKGOI’S COE, swami chincholi, Maharashtra, India 3ME (COMPUTER), DKGOI’S COE, swami chincholi, Maharashtra, India Abstract In a large distributed system there are more chances to occur faults, the only solution to prevalent this is to use the technique of replication. By using this technique some additional back-ups are needed. For example, if we have ‘N’ distinct data structures ‘K’ no of crash faults occurs each data structure by the use of back-ups, the replication technique needed ‘K+1’ replicates of each data structures. Here we present a solution of fusion method that combines the corrective codes and some selective replications to tolerate ‘K’ crash faults using ‘K’ additional fused back -ups. We show that our solution will give us O (n) savings in space instead of using replication. The theoretical and practical research results that the fused back ups are more space efficient as compared to replication because they causes minimal overhead for normal operation. Our solution requires only 120 back up structures instead of 300 back up structures which are used in replication method. This also results the power saving. In this paper we present a concept of using the combination of replication and fusion based technique. Keywords: - Replication, fusion, primaries, back-ups, fault tolerance 
--------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Fault tolerance is an ability of a system to perform its functions correctly even in the presence of internal faults. The aim by using fault tolerance is to increase the dependability of a system. The approach to increase the dependability is fault prevention. This achieves by inspecting the system to eliminate the circumstances by which the fault arises [1]. Error- The reason or cause of failure is known as error. It represents an invalid state that is not specified in system behavior. Fault- The real or root cause of a failure is known as a fault. Failure- It is the symptom of a fault. Multiple failures are occurred due to a single error. Faults can be classified into two. 
1) Transient 
2) Permanent 
Transient fault will be disappeared without any intervention. But a permanent fault will remain in the system if it is removed from an external agent. Faults can be mainly classified into two types’ crash fault and byzantine fault [6]. Crash fault is a type of fault in which the system either stops its complete work or it never returns to a valid state [5]. Byzantine fault is a type of fault of an arbitrary nature. 
1.1 Basic Theory 
We know that a distributed system have a structure of independent servers which are interacting with the clients by the use of messages. The data structures like linked lists, queues, hash tables are used to maintain large instance of data structures for the servers to efficiently store and manipulate the data [4]. These servers may become faulty by the data structures may crash, which leaves the total loss in its state leads to an arbitrary state, also which send some wrong messages to clients or other data structures. Normally we are using a technique known as replication. Suppose N given data structures are there and K no of crash faults occurs, the replication maintains K+1 replicas of each data structure resulting total of NK backups. For some large values of N, this is too costly in terms of space as well as power to maintain this back up process. Coding theory is the space efficient alternative to used as in replication process. The data are transmitted across a channel in an encoded form by using some redundant bits that will correct the errors by the channels contain noisy. In a given set of data structures we maintain a set of fused back- ups that will tolerate ‘K’ crash faults among the given data structures. In replication process, the data structures replicated are identical to the data structures but in fusion there I no identical copy of given data structure are used. E can distinguish it as primaries and backups. 
So, in our proposed system the data structures which are needed to tolerate the faults are known as primaries. And the back-ups contains only ’K’ additional data structures. In replication it requires K+1 additional copies of the primary. The primary data’s are in a coded form to save the space in
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 223 
fused backups and to enable efficient updates by using 
replicate indexed structure of each primary. 
2. OBJECTIVE 
The main objective to introduce the fused backups to 
tolerate the faults occurred in distributed system.by using 
these fused backups which developer a system that reduces 
the fault recovery time. The maximum load can be 
distributed on any backups introducing this proposed 
system. Another motive to develop this proposed system is 
with space efficient and to reduce the updating time. 
2.1 Scope 
The main aim of the system developing is to reduce the 
overhead of replication. To tolerate ‘K’ crash faults among 
‘n’ distinct data structures the technique of replication 
requires ‘K+1’ replicas of each data structure, which results 
‘NK’ additional backups[8]. While using a fused data 
structure approach we use a fusion technique that uses a 
combination of erasure codes and some selective replication 
to tolerate ‘K’ crash faults using ‘K’ additional fused 
backups [3]. 
The fusion solution referred to use a combination of erasure 
codes and selective replicas to tolerate ‘K’ crash faults using 
‘K’ additional fused backups [2]. The fusion solution saves 
O (n) space over replication. 
3. IMPLEMENTATION 
3.1 Architecture of Proposed System 
Fig 1: architecture of system 
The modules in the system contains 
1. Formation of system 
2. Primary data addition 
3. Generation of fussed data 
4. Insertion of data 
5. Deletion of data 
Descriptions 
3.1.1 Formation of system 
The ‘N’ given data structures are referred to a primaries 
X1… Xn. 
The backup data structures are generated are referred as 
fussed backups or fussed data structures. 
3.1.2 Primary Data Addition 
Fig 2: Primary data addition 
It is the module which is used to add the primary data to the 
server. It contains some key and value pairs. The figure 
shows the format of primary data addition. 
3.1.3 Generation of Fussed Data 
Fig 3: Fussed Data Generation 
The fussed data is generated with respect to the primary 
data. The backup data structures are generated based on the 
process of fussing primary data known as fussed backups or 
fussed data structures. The operator who combines the 
primary data is called fusion operator.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 224 
3.1.4 Insertion of Data 
Fig 4: Insertion of Data In this module if a client insert or update a data in the primary a s ell as fussed data when he sends an insert to a primary X1, if the key is not already present, the primary X1 which creates a new node containing this value, insert it into the primary linked list and inserts a pointer to this node at the end of auxiliary list. The primary send key and the ne key value is added and the old value which is associated with the key to all that fussed backups. A data stack is used to maintain each fussed data backup that contains primary elements in coded form. If the key value is not present on receiving the insert from X1 the backup data structure update the code value of the fussed node following the one contains the topmost element of X1. 3.1.5 Deletion of Data We can delete a key at the primaries and from the backups. The key value which contains the X1 from the primary which obtain its value which we want to send to the backups 
Fig 5: Deletion of Data The primary can also send the value of the element which are pointed by the tail node of the auxiliary list along with the value and the key ‘K’. The topmost element of X2 is shifted to the backup stack. After the sending operation the final node value of the auxiliary list is shifted by the primary to the position of the auxiliary node pointing to the deleted element. 
4. CONCLUSIONS 
The method of fusion technique for fault tolerance that saves as O (n) savings in space while comparing to the replication method without any overhead during its normal operation. 
The proposed system will provide us the space optimality, efficient updates and updating of optimality and order of independence. We can use this system to reduce the data structures required to recover the faults, to increase the efficiency of fault tolerance in data structures. It can be used in all the data structures as a cost effective fault tolerance method. REFERENCES [1]. Bharath Balasubramanian and Vijay K. Garg, Fellow, IEEE,"Fault Tolerance in Distributed Systems Using Fused Data Structures", IEEE transactions on parallel and distributed systems, vol. 24, no. 4, April 2013 [2]. B. Balasubramanian and V.K. Garg, "Fused Data Structure Library (Implemented in Java 1.6)," Parallel and Distributed SystemsLaboratory,http://maple.ece.utexas.edu, 2010. [3]. J. Blomer, M. Kalfane, M. Karpinski, R. Karp, M. Luby, and D. Zuckerman, "An XOR-Based Erasure-Resilient Coding Scheme," Technical Report TR-95-048, Int'l Computer Science Inst., Aug. 1995. [4]. V.K. Garg and V. Ogale, "Fusible Data Structures for Fault Tolerance," Proc. 27th Int'l Conf. Distributed Computing Systems (ICDCS '07), June 2007. [5]. V. Ogale, B. Balasubramanian, and V.K. Garg, "A Fusion-Based Approach for Tolerating Faults in Finite State Machines," Proc. IEEE Int'l Symp. Parallel and Distributed Processing (IPDPS '09), pp. 1-11, 2009. [6]. V.K. Garg, "Implementing Fault-Tolerant Services Using State Machines: Beyond Replication," Proc. 24th Int'l Conf. Distributed Computing (DISC), pp. 450-464, 2010. 
BIOGRAPHIES 
Archana Thange is a student of M. E. (I.T) second year. She has completed her B.E. in Information Technology. She has worked as an assistant Professor at H.S.B.P.V.T’s COE kashti. 
M. E. (Computer) second year. She has completed her B.Tech. In Computer Science. She has worked as an assistant Professor at H.S.B.P.V.T’s COE kashti. 
M. E. (Computer) second year. She has completed her BE in Information Technology.

More Related Content

What's hot

An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...eSAT Publishing House
 
Optimum capacity allocation of distributed generation
Optimum capacity allocation of distributed generationOptimum capacity allocation of distributed generation
Optimum capacity allocation of distributed generationeSAT Publishing House
 
Design of file system architecture with cluster
Design of file system architecture with clusterDesign of file system architecture with cluster
Design of file system architecture with clustereSAT Publishing House
 
Comparative study of fuzzy logic and ann for short term load forecasting
Comparative study of fuzzy logic and ann for short term load forecastingComparative study of fuzzy logic and ann for short term load forecasting
Comparative study of fuzzy logic and ann for short term load forecastingeSAT Publishing House
 
Data Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological DataData Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological DataIRJET Journal
 
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...cscpconf
 
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...ijcsa
 
Target Response Electrical usage Profile Clustering using Big Data
Target Response Electrical usage Profile Clustering using Big DataTarget Response Electrical usage Profile Clustering using Big Data
Target Response Electrical usage Profile Clustering using Big DataIRJET Journal
 
Genetic related clustering for reducing energy consumption in wireless sensor...
Genetic related clustering for reducing energy consumption in wireless sensor...Genetic related clustering for reducing energy consumption in wireless sensor...
Genetic related clustering for reducing energy consumption in wireless sensor...eSAT Journals
 
An optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart gridAn optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart grideSAT Journals
 
Survey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in CloudSurvey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in CloudAM Publications
 
1.meena tushir finalpaper-1-12
1.meena tushir finalpaper-1-121.meena tushir finalpaper-1-12
1.meena tushir finalpaper-1-12Alexander Decker
 
Optimal Siting of Distributed Generators in a Distribution Network using Arti...
Optimal Siting of Distributed Generators in a Distribution Network using Arti...Optimal Siting of Distributed Generators in a Distribution Network using Arti...
Optimal Siting of Distributed Generators in a Distribution Network using Arti...IJECEIAES
 
Cloud partitioning with load balancing a new load balancing technique for pub...
Cloud partitioning with load balancing a new load balancing technique for pub...Cloud partitioning with load balancing a new load balancing technique for pub...
Cloud partitioning with load balancing a new load balancing technique for pub...IAEME Publication
 
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...IDES Editor
 
Dynamically Partitioning Big Data Using Virtual Machine Mapping
Dynamically Partitioning Big Data Using Virtual Machine MappingDynamically Partitioning Big Data Using Virtual Machine Mapping
Dynamically Partitioning Big Data Using Virtual Machine MappingAM Publications
 
Column store decision tree classification of unseen attribute set
Column store decision tree classification of unseen attribute setColumn store decision tree classification of unseen attribute set
Column store decision tree classification of unseen attribute setijma
 

What's hot (19)

An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...An enhanced adaptive scoring job scheduling algorithm with replication strate...
An enhanced adaptive scoring job scheduling algorithm with replication strate...
 
Optimum capacity allocation of distributed generation
Optimum capacity allocation of distributed generationOptimum capacity allocation of distributed generation
Optimum capacity allocation of distributed generation
 
Design of file system architecture with cluster
Design of file system architecture with clusterDesign of file system architecture with cluster
Design of file system architecture with cluster
 
Comparative study of fuzzy logic and ann for short term load forecasting
Comparative study of fuzzy logic and ann for short term load forecastingComparative study of fuzzy logic and ann for short term load forecasting
Comparative study of fuzzy logic and ann for short term load forecasting
 
Data Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological DataData Analysis and Prediction System for Meteorological Data
Data Analysis and Prediction System for Meteorological Data
 
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...
TOWARDS REDUCTION OF DATA FLOW IN A DISTRIBUTED NETWORK USING PRINCIPAL COMPO...
 
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...
 
Target Response Electrical usage Profile Clustering using Big Data
Target Response Electrical usage Profile Clustering using Big DataTarget Response Electrical usage Profile Clustering using Big Data
Target Response Electrical usage Profile Clustering using Big Data
 
Genetic related clustering for reducing energy consumption in wireless sensor...
Genetic related clustering for reducing energy consumption in wireless sensor...Genetic related clustering for reducing energy consumption in wireless sensor...
Genetic related clustering for reducing energy consumption in wireless sensor...
 
An optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart gridAn optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart grid
 
Survey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in CloudSurvey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in Cloud
 
1.meena tushir finalpaper-1-12
1.meena tushir finalpaper-1-121.meena tushir finalpaper-1-12
1.meena tushir finalpaper-1-12
 
50120130406041 2
50120130406041 250120130406041 2
50120130406041 2
 
Optimal Siting of Distributed Generators in a Distribution Network using Arti...
Optimal Siting of Distributed Generators in a Distribution Network using Arti...Optimal Siting of Distributed Generators in a Distribution Network using Arti...
Optimal Siting of Distributed Generators in a Distribution Network using Arti...
 
Cloud partitioning with load balancing a new load balancing technique for pub...
Cloud partitioning with load balancing a new load balancing technique for pub...Cloud partitioning with load balancing a new load balancing technique for pub...
Cloud partitioning with load balancing a new load balancing technique for pub...
 
Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...Cluster Computing Environment for On - line Static Security Assessment of lar...
Cluster Computing Environment for On - line Static Security Assessment of lar...
 
Dynamically Partitioning Big Data Using Virtual Machine Mapping
Dynamically Partitioning Big Data Using Virtual Machine MappingDynamically Partitioning Big Data Using Virtual Machine Mapping
Dynamically Partitioning Big Data Using Virtual Machine Mapping
 
Column store decision tree classification of unseen attribute set
Column store decision tree classification of unseen attribute setColumn store decision tree classification of unseen attribute set
Column store decision tree classification of unseen attribute set
 
Project Report (Summer 2016)
Project Report (Summer 2016)Project Report (Summer 2016)
Project Report (Summer 2016)
 

Viewers also liked

Mechanical properties of hybrid fiber reinforced
Mechanical properties of hybrid fiber reinforcedMechanical properties of hybrid fiber reinforced
Mechanical properties of hybrid fiber reinforcedeSAT Publishing House
 
Radiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhdRadiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhdeSAT Publishing House
 
An algorithm for solving integer linear programming
An algorithm for solving integer linear programmingAn algorithm for solving integer linear programming
An algorithm for solving integer linear programmingeSAT Publishing House
 
A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...eSAT Publishing House
 
Biosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutionsBiosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutionseSAT Publishing House
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolutioneSAT Publishing House
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...eSAT Publishing House
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programmingeSAT Publishing House
 
Redesign and thermal analysis of transfer mold tool
Redesign and thermal analysis of transfer mold toolRedesign and thermal analysis of transfer mold tool
Redesign and thermal analysis of transfer mold tooleSAT Publishing House
 
Analysis of methane diffusion flames
Analysis of methane diffusion flamesAnalysis of methane diffusion flames
Analysis of methane diffusion flameseSAT Publishing House
 
Study on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approachStudy on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approacheSAT Publishing House
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...eSAT Publishing House
 
No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...eSAT Publishing House
 
Scour investigation around single and two piers
Scour investigation around single and two piersScour investigation around single and two piers
Scour investigation around single and two pierseSAT Publishing House
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureeSAT Publishing House
 
Testing of memory using franklin method
Testing of memory using franklin methodTesting of memory using franklin method
Testing of memory using franklin methodeSAT Publishing House
 
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...eSAT Publishing House
 
Emerging trends in supply chain management
Emerging trends in supply chain managementEmerging trends in supply chain management
Emerging trends in supply chain managementeSAT Publishing House
 
Intelligent pollution monitoring using wireless
Intelligent pollution monitoring using wirelessIntelligent pollution monitoring using wireless
Intelligent pollution monitoring using wirelesseSAT Publishing House
 
Optimization of friction stir welding process
Optimization of friction stir welding processOptimization of friction stir welding process
Optimization of friction stir welding processeSAT Publishing House
 

Viewers also liked (20)

Mechanical properties of hybrid fiber reinforced
Mechanical properties of hybrid fiber reinforcedMechanical properties of hybrid fiber reinforced
Mechanical properties of hybrid fiber reinforced
 
Radiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhdRadiation effects on heat and mass transfer of a mhd
Radiation effects on heat and mass transfer of a mhd
 
An algorithm for solving integer linear programming
An algorithm for solving integer linear programmingAn algorithm for solving integer linear programming
An algorithm for solving integer linear programming
 
A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...A review on managed aquifer recharge by check dams a case study near chennai,...
A review on managed aquifer recharge by check dams a case study near chennai,...
 
Biosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutionsBiosorption of hg (ii) from aqueous solutions
Biosorption of hg (ii) from aqueous solutions
 
An assessment of cloud computing evolution
An assessment of cloud computing evolutionAn assessment of cloud computing evolution
An assessment of cloud computing evolution
 
A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...A novel hybrid communication technique involving power line communication and...
A novel hybrid communication technique involving power line communication and...
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programming
 
Redesign and thermal analysis of transfer mold tool
Redesign and thermal analysis of transfer mold toolRedesign and thermal analysis of transfer mold tool
Redesign and thermal analysis of transfer mold tool
 
Analysis of methane diffusion flames
Analysis of methane diffusion flamesAnalysis of methane diffusion flames
Analysis of methane diffusion flames
 
Study on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approachStudy on soundness of reinforced concrete structures by ndt approach
Study on soundness of reinforced concrete structures by ndt approach
 
Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...Securing the cloud computing systems with matrix vector and multi-key using l...
Securing the cloud computing systems with matrix vector and multi-key using l...
 
No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...No sql databases new millennium database for big data, big users, cloud compu...
No sql databases new millennium database for big data, big users, cloud compu...
 
Scour investigation around single and two piers
Scour investigation around single and two piersScour investigation around single and two piers
Scour investigation around single and two piers
 
I slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architectureI slip algorithm for low latency on hybrid noc architecture
I slip algorithm for low latency on hybrid noc architecture
 
Testing of memory using franklin method
Testing of memory using franklin methodTesting of memory using franklin method
Testing of memory using franklin method
 
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
Dehulling characteristics of oat (ol 9 variety) as affected by grain moisture...
 
Emerging trends in supply chain management
Emerging trends in supply chain managementEmerging trends in supply chain management
Emerging trends in supply chain management
 
Intelligent pollution monitoring using wireless
Intelligent pollution monitoring using wirelessIntelligent pollution monitoring using wireless
Intelligent pollution monitoring using wireless
 
Optimization of friction stir welding process
Optimization of friction stir welding processOptimization of friction stir welding process
Optimization of friction stir welding process
 

Similar to Fusion method used to tolerate the faults occurred in disrtibuted system

Enhancing the performance of cluster based text summarization using support v...
Enhancing the performance of cluster based text summarization using support v...Enhancing the performance of cluster based text summarization using support v...
Enhancing the performance of cluster based text summarization using support v...eSAT Journals
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...eSAT Journals
 
Hybrid Task Scheduling Approach using Gravitational and ACO Search Algorithm
Hybrid Task Scheduling Approach using Gravitational and ACO Search AlgorithmHybrid Task Scheduling Approach using Gravitational and ACO Search Algorithm
Hybrid Task Scheduling Approach using Gravitational and ACO Search AlgorithmIRJET Journal
 
Novel Perspectives in Construction of Recovery Oriented Computing
Novel Perspectives in Construction of Recovery Oriented ComputingNovel Perspectives in Construction of Recovery Oriented Computing
Novel Perspectives in Construction of Recovery Oriented ComputingIJSRD
 
Efficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent EnvironmentEfficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent EnvironmentEditor IJCATR
 
IRJET- Semantics based Document Clustering
IRJET- Semantics based Document ClusteringIRJET- Semantics based Document Clustering
IRJET- Semantics based Document ClusteringIRJET Journal
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyeSAT Publishing House
 
The Overview of Discovery and Reconciliation of LTE Network
The Overview of Discovery and Reconciliation of LTE NetworkThe Overview of Discovery and Reconciliation of LTE Network
The Overview of Discovery and Reconciliation of LTE NetworkIRJET Journal
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...eSAT Journals
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET Journal
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...IJECEIAES
 
IRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Secure File Sharing and Retrieval using Fog NodesIRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Secure File Sharing and Retrieval using Fog NodesIRJET Journal
 
Cost effective failover clustering
Cost effective failover clusteringCost effective failover clustering
Cost effective failover clusteringeSAT Journals
 
ABC - LOAD BALANCING TECHNIQUE - IN CLOUD COMPUTING
ABC - LOAD BALANCING TECHNIQUE - IN CLOUD COMPUTINGABC - LOAD BALANCING TECHNIQUE - IN CLOUD COMPUTING
ABC - LOAD BALANCING TECHNIQUE - IN CLOUD COMPUTINGAM Publications
 
Image transmission in wireless sensor networks
Image transmission in wireless sensor networksImage transmission in wireless sensor networks
Image transmission in wireless sensor networkseSAT Publishing House
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageIJMER
 

Similar to Fusion method used to tolerate the faults occurred in disrtibuted system (20)

Enhancing the performance of cluster based text summarization using support v...
Enhancing the performance of cluster based text summarization using support v...Enhancing the performance of cluster based text summarization using support v...
Enhancing the performance of cluster based text summarization using support v...
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...
 
Hybrid Task Scheduling Approach using Gravitational and ACO Search Algorithm
Hybrid Task Scheduling Approach using Gravitational and ACO Search AlgorithmHybrid Task Scheduling Approach using Gravitational and ACO Search Algorithm
Hybrid Task Scheduling Approach using Gravitational and ACO Search Algorithm
 
Novel Perspectives in Construction of Recovery Oriented Computing
Novel Perspectives in Construction of Recovery Oriented ComputingNovel Perspectives in Construction of Recovery Oriented Computing
Novel Perspectives in Construction of Recovery Oriented Computing
 
Efficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent EnvironmentEfficient & Lock-Free Modified Skip List in Concurrent Environment
Efficient & Lock-Free Modified Skip List in Concurrent Environment
 
IRJET- Semantics based Document Clustering
IRJET- Semantics based Document ClusteringIRJET- Semantics based Document Clustering
IRJET- Semantics based Document Clustering
 
Anomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a surveyAnomaly detection in the services provided by multi cloud architectures a survey
Anomaly detection in the services provided by multi cloud architectures a survey
 
The Overview of Discovery and Reconciliation of LTE Network
The Overview of Discovery and Reconciliation of LTE NetworkThe Overview of Discovery and Reconciliation of LTE Network
The Overview of Discovery and Reconciliation of LTE Network
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
9 ijcse-01223
9 ijcse-012239 ijcse-01223
9 ijcse-01223
 
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
Comparative Study of Neural Networks Algorithms for Cloud Computing CPU Sched...
 
IRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Secure File Sharing and Retrieval using Fog NodesIRJET- Secure File Sharing and Retrieval using Fog Nodes
IRJET- Secure File Sharing and Retrieval using Fog Nodes
 
Cost effective failover clustering
Cost effective failover clusteringCost effective failover clustering
Cost effective failover clustering
 
Cost effective failover clustering
Cost effective failover clusteringCost effective failover clustering
Cost effective failover clustering
 
ABC - LOAD BALANCING TECHNIQUE - IN CLOUD COMPUTING
ABC - LOAD BALANCING TECHNIQUE - IN CLOUD COMPUTINGABC - LOAD BALANCING TECHNIQUE - IN CLOUD COMPUTING
ABC - LOAD BALANCING TECHNIQUE - IN CLOUD COMPUTING
 
Availability in Cloud Computing
Availability in Cloud ComputingAvailability in Cloud Computing
Availability in Cloud Computing
 
Image transmission in wireless sensor networks
Image transmission in wireless sensor networksImage transmission in wireless sensor networks
Image transmission in wireless sensor networks
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 

Recently uploaded (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 

Fusion method used to tolerate the faults occurred in disrtibuted system

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 222 FUSION METHOD USED TO TOLERATE THE FAULTS OCCURRED IN DISRTIBUTED SYSTEM Archana Thange1, Amina.N2, Amruta Nimbalkar3 1ME (IT), DKGOI’S COE, swami chincholi, Maharashtra, India 2ME (COMPUTER), DKGOI’S COE, swami chincholi, Maharashtra, India 3ME (COMPUTER), DKGOI’S COE, swami chincholi, Maharashtra, India Abstract In a large distributed system there are more chances to occur faults, the only solution to prevalent this is to use the technique of replication. By using this technique some additional back-ups are needed. For example, if we have ‘N’ distinct data structures ‘K’ no of crash faults occurs each data structure by the use of back-ups, the replication technique needed ‘K+1’ replicates of each data structures. Here we present a solution of fusion method that combines the corrective codes and some selective replications to tolerate ‘K’ crash faults using ‘K’ additional fused back -ups. We show that our solution will give us O (n) savings in space instead of using replication. The theoretical and practical research results that the fused back ups are more space efficient as compared to replication because they causes minimal overhead for normal operation. Our solution requires only 120 back up structures instead of 300 back up structures which are used in replication method. This also results the power saving. In this paper we present a concept of using the combination of replication and fusion based technique. Keywords: - Replication, fusion, primaries, back-ups, fault tolerance --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Fault tolerance is an ability of a system to perform its functions correctly even in the presence of internal faults. The aim by using fault tolerance is to increase the dependability of a system. The approach to increase the dependability is fault prevention. This achieves by inspecting the system to eliminate the circumstances by which the fault arises [1]. Error- The reason or cause of failure is known as error. It represents an invalid state that is not specified in system behavior. Fault- The real or root cause of a failure is known as a fault. Failure- It is the symptom of a fault. Multiple failures are occurred due to a single error. Faults can be classified into two. 1) Transient 2) Permanent Transient fault will be disappeared without any intervention. But a permanent fault will remain in the system if it is removed from an external agent. Faults can be mainly classified into two types’ crash fault and byzantine fault [6]. Crash fault is a type of fault in which the system either stops its complete work or it never returns to a valid state [5]. Byzantine fault is a type of fault of an arbitrary nature. 1.1 Basic Theory We know that a distributed system have a structure of independent servers which are interacting with the clients by the use of messages. The data structures like linked lists, queues, hash tables are used to maintain large instance of data structures for the servers to efficiently store and manipulate the data [4]. These servers may become faulty by the data structures may crash, which leaves the total loss in its state leads to an arbitrary state, also which send some wrong messages to clients or other data structures. Normally we are using a technique known as replication. Suppose N given data structures are there and K no of crash faults occurs, the replication maintains K+1 replicas of each data structure resulting total of NK backups. For some large values of N, this is too costly in terms of space as well as power to maintain this back up process. Coding theory is the space efficient alternative to used as in replication process. The data are transmitted across a channel in an encoded form by using some redundant bits that will correct the errors by the channels contain noisy. In a given set of data structures we maintain a set of fused back- ups that will tolerate ‘K’ crash faults among the given data structures. In replication process, the data structures replicated are identical to the data structures but in fusion there I no identical copy of given data structure are used. E can distinguish it as primaries and backups. So, in our proposed system the data structures which are needed to tolerate the faults are known as primaries. And the back-ups contains only ’K’ additional data structures. In replication it requires K+1 additional copies of the primary. The primary data’s are in a coded form to save the space in
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 223 fused backups and to enable efficient updates by using replicate indexed structure of each primary. 2. OBJECTIVE The main objective to introduce the fused backups to tolerate the faults occurred in distributed system.by using these fused backups which developer a system that reduces the fault recovery time. The maximum load can be distributed on any backups introducing this proposed system. Another motive to develop this proposed system is with space efficient and to reduce the updating time. 2.1 Scope The main aim of the system developing is to reduce the overhead of replication. To tolerate ‘K’ crash faults among ‘n’ distinct data structures the technique of replication requires ‘K+1’ replicas of each data structure, which results ‘NK’ additional backups[8]. While using a fused data structure approach we use a fusion technique that uses a combination of erasure codes and some selective replication to tolerate ‘K’ crash faults using ‘K’ additional fused backups [3]. The fusion solution referred to use a combination of erasure codes and selective replicas to tolerate ‘K’ crash faults using ‘K’ additional fused backups [2]. The fusion solution saves O (n) space over replication. 3. IMPLEMENTATION 3.1 Architecture of Proposed System Fig 1: architecture of system The modules in the system contains 1. Formation of system 2. Primary data addition 3. Generation of fussed data 4. Insertion of data 5. Deletion of data Descriptions 3.1.1 Formation of system The ‘N’ given data structures are referred to a primaries X1… Xn. The backup data structures are generated are referred as fussed backups or fussed data structures. 3.1.2 Primary Data Addition Fig 2: Primary data addition It is the module which is used to add the primary data to the server. It contains some key and value pairs. The figure shows the format of primary data addition. 3.1.3 Generation of Fussed Data Fig 3: Fussed Data Generation The fussed data is generated with respect to the primary data. The backup data structures are generated based on the process of fussing primary data known as fussed backups or fussed data structures. The operator who combines the primary data is called fusion operator.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 09 | Sep-2014, Available @ http://www.ijret.org 224 3.1.4 Insertion of Data Fig 4: Insertion of Data In this module if a client insert or update a data in the primary a s ell as fussed data when he sends an insert to a primary X1, if the key is not already present, the primary X1 which creates a new node containing this value, insert it into the primary linked list and inserts a pointer to this node at the end of auxiliary list. The primary send key and the ne key value is added and the old value which is associated with the key to all that fussed backups. A data stack is used to maintain each fussed data backup that contains primary elements in coded form. If the key value is not present on receiving the insert from X1 the backup data structure update the code value of the fussed node following the one contains the topmost element of X1. 3.1.5 Deletion of Data We can delete a key at the primaries and from the backups. The key value which contains the X1 from the primary which obtain its value which we want to send to the backups Fig 5: Deletion of Data The primary can also send the value of the element which are pointed by the tail node of the auxiliary list along with the value and the key ‘K’. The topmost element of X2 is shifted to the backup stack. After the sending operation the final node value of the auxiliary list is shifted by the primary to the position of the auxiliary node pointing to the deleted element. 4. CONCLUSIONS The method of fusion technique for fault tolerance that saves as O (n) savings in space while comparing to the replication method without any overhead during its normal operation. The proposed system will provide us the space optimality, efficient updates and updating of optimality and order of independence. We can use this system to reduce the data structures required to recover the faults, to increase the efficiency of fault tolerance in data structures. It can be used in all the data structures as a cost effective fault tolerance method. REFERENCES [1]. Bharath Balasubramanian and Vijay K. Garg, Fellow, IEEE,"Fault Tolerance in Distributed Systems Using Fused Data Structures", IEEE transactions on parallel and distributed systems, vol. 24, no. 4, April 2013 [2]. B. Balasubramanian and V.K. Garg, "Fused Data Structure Library (Implemented in Java 1.6)," Parallel and Distributed SystemsLaboratory,http://maple.ece.utexas.edu, 2010. [3]. J. Blomer, M. Kalfane, M. Karpinski, R. Karp, M. Luby, and D. Zuckerman, "An XOR-Based Erasure-Resilient Coding Scheme," Technical Report TR-95-048, Int'l Computer Science Inst., Aug. 1995. [4]. V.K. Garg and V. Ogale, "Fusible Data Structures for Fault Tolerance," Proc. 27th Int'l Conf. Distributed Computing Systems (ICDCS '07), June 2007. [5]. V. Ogale, B. Balasubramanian, and V.K. Garg, "A Fusion-Based Approach for Tolerating Faults in Finite State Machines," Proc. IEEE Int'l Symp. Parallel and Distributed Processing (IPDPS '09), pp. 1-11, 2009. [6]. V.K. Garg, "Implementing Fault-Tolerant Services Using State Machines: Beyond Replication," Proc. 24th Int'l Conf. Distributed Computing (DISC), pp. 450-464, 2010. BIOGRAPHIES Archana Thange is a student of M. E. (I.T) second year. She has completed her B.E. in Information Technology. She has worked as an assistant Professor at H.S.B.P.V.T’s COE kashti. M. E. (Computer) second year. She has completed her B.Tech. In Computer Science. She has worked as an assistant Professor at H.S.B.P.V.T’s COE kashti. M. E. (Computer) second year. She has completed her BE in Information Technology.