SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. II (Jan – Feb. 2015), PP 40-45
www.iosrjournals.org
DOI: 10.9790/0661-17124045 www.iosrjournals.org 40 | Page
Recovery of Data in Cluster Computing By Using Fault Tolerant
Mechanisms
Balne Sridevi
Assistant Professor, Bajaj Institute Of Technology & Sciences,
Department Of Computer Science and Engineering, Warangal, AP, INDIA
Abstract: Many applications executing on cluster architectures consisting of several number of computers
create several problems with reliability. The problems are system crashes, code failures and network problems
etc. This paper using Fault tolerant mechanisms to recover the data in cluster computing. The two Rollback
Recovery protocols[5] are Theft Induced check pointing protocol (TIC) and systematic event logging protocol
TIC protocol is used to recover the information during crash, the information is send to client (receiver) by
using SEL protocol. It is proven that the complexity of protocol is very small and the information lost by crashed
process is recovered here.
Section 1: describes the main objectives of TIC&SEL protocols
Section 2: describes the background for grid or cluster computing
Section 3: describes the definition of checkpoints & different types of checkpoints
Section 4: gives the details about work stealing or task stealing of different tasks
Section 5: describes an algorithm, which is mainly used for retrieving information from database server and
creates backup of db
Section 6: gives the experimental results
Section 7: gives concluded the different techniques
Keywords: Cluster computing, rollback, recovery, message logging. Event logging, check pointing, local
technique, Forced technique, Global technique.
I. Introduction
Large Applications executing on cluster architectures several computational nodes, inter connection
networks, mass storage with reliability. This paper presents two fault tolerant techniques to overcome the
problems with reliability. The two fault tolerant techniques are TIC [10] and SEL [10] protocols we
implemented KAAPI (Kernel Adaptive Asynchronous Parallel Interface) by taking „n‟ number of clients. This
KAAPI [1] environment gives the general relationship between the processors and processes. Each process has
its own stack (or) queue. The main objective of TIC protocol is to store the information in periodic time
intervals and that information will send to receiver by using SEL protocol. Thus two protocols are introduced in
sections 4.1
II. Background
Several Fault tolerant techniques are introduced to overcome the problem of reliability, node failure
and the need for dynamic configuration over extensive runtime. The recovery means that it depends on
redundancy we have several redundancy principles i.e. information, time and spatial. The information
redundancy depends on stable storage method ,the other two redundancies are not suitable for cluster (or) Grid
[20] computing.
III. Different Approaches
Based on stable storage we have two approaches
1. Logging based approaches.
2. Check pointing based approaches.
1. Logging based approaches:
In this approach, there is a difficulty with message logging [6] due to time and spatial redundancy.
2. Check pointing based approaches:
In this approach, the state of computations from first check point to last check point (or) last storage is saved.
3.1 Definition of Check point:
A check point is used to save the state of computation from starting point to ending point. It is based on
saved states are based on time intervals.
Recovery of Data in Cluster computing by using Fault Tolerant Mechanisms
DOI: 10.9790/0661-17124045 www.iosrjournals.org 41 | Page
Check pointing [15] can be categorized into two ways:
1. Co-coordinated check pointing.
2. Un Co-coordinated check pointing.
1. Co-coordinated check
Pointing:
It is used to construct the consistent global state (or) storage.
2. Un Co-coordinated check
Pointing:
It is used to save the state independently and achieves the consistent global storage in the recovery stage.
3.2 Creation of Checkpoints:
Checkpoints can be created in two ways:
1. At specific time intervals (or) check pointing periods.
2. Work stealing (or) task stealing.
If we consider the check pointing periods, these are called local checkpoints.
If we consider the checkpoints w.r. to work stealing (or) task stealing are called forced checkpoints.
The TIC protocol with respect to forced and local checkpoints shown in fig 1. The creation of checkpoints can
be initiated by.1) Work stealing, 2) at specific check pointing periods. We will first describe the protocol [8]
with respect to work stealing, since it is the cause of only communication b/w processes.
IV. Work Stealing
It is the only mechanism for distributing the workload constituting and primary mechanism for load
distributes is based on scheduling algorithm called work stealing.
The principle is simple i.e., when a process becomes idle it tries to steal work from another processes
called victim. The initiating process is called thief [2].
The checkpoints resulting from work stealing are called forced checkpoints. The TIC protocol w.r. to forced
checkpoints is defined in figure 1.
4.1 Local Check pointing:
By applying this techniques, we can recover the crashed messages from starting point to last storage
(or) stable storage[16].For this purpose we need two protocols.1) Theft Induced check pointing, 2) Systematic
Event legging.
4.1.1 Theft Induced Check pointing & Systematic Event logging (TIC and SEL):
It is responsible for getting (or) retrieving information from crashed [14] processes (or) crashed systems.
The SEL is helpful for retrieving data (or) information using periodic time intervals.
1. In figure [1] consider two processes P0 & P1.
2. A process P1 is created on stable resource [4].
3. If it gets a process P0 that has a task to be stolen called theft task Tth, stealing a task form process P0.
Before executing Tth, the process P1 checkpoints its state as C1P1
0
.
4. Event A1 is the Execution of task Tth, which sends a theft request to P0.
5. Event B1 is the response of Tth by P0.
6. Between events B1 and C1, it recognizes a task Ts and identifies it as stolen by P1.
7. Between events B1 and C1 victim P0 is in difficult section w.r. to operations (theft operations).
Recovery of Data in Cluster computing by using Fault Tolerant Mechanisms
DOI: 10.9790/0661-17124045 www.iosrjournals.org 42 | Page
8. Between events C1 and D1, it requests and forces a checkpoint to reflect the theft. At this timeP0 becomes a
victim.
9. Event D1 gets sending Ts to P1.
10. Event E1 is the response of stolen task [7] Ts from P0 thief P1 initiatives entries for two tasks Ts1 and Ts2
in its linear structure steak shown in fig. 2.
Entries for two tasks Ts1 and Ts2.
Figure- 2
Where the task Tr is changed with giving the experimental results of execution of Ts1 and Ts2 to P0
and becomes ready when Ts is completed.
11. When P1 is completed, the execution of Ts1 and Ts2 to P0 in event F1.
12. Event G1 is the response of P0.
V. Algorithm
Step 1: What is the Recovery [5]?
Retrieve the information (or) data from database server.
It is based on redundancies i.e., time, spatial (or) information.
Step 2: Data base Recovery?
Here the database is recovered by using the following approaches.
1) Log base Recovery [3].
2) First phase commit protocol [13].
3) Second phase commit protocol [13].
4) Third phase commit protocol. [13]
Step 3: If there is any problem with network or system crashes how can we recover (or) retrieve the data from
the crashed nodes?
Step 4: To overcome this problem, we have two fault tolerant mechanisms.
1) Theft Induced check pointing protocol (TIC).
2) Systematic Event logging Protocol (SEL)
5.1. TIC:
The TIC is responsible for getting information from the crashed (or) process system. The main
objective of TIC is to allow rollback of only crashed process. A process can be rolled back to its last checkpoint.
Under TIC protocol, the faulty processes can be rolled back, TIC maintains global consistent [9] state of
execution.
Recovery of Data in Cluster computing by using Fault Tolerant Mechanisms
DOI: 10.9790/0661-17124045 www.iosrjournals.org 43 | Page
5.2. SEL:
This protocol is helpful for retrieving information using periodic time intervals and send to client with
the help of SEL. SEL was derived from log-based method. The motivation for SEL is to reduce the amount of
computation. In SEL, only the events relevant for the construction of data flow graph [8] are logged.
VI. Experimental Results
6.1. Applications and Platform description:
The basic performance and complexity of TIC and SEL protocols were practically determined for QAP
[19] i.e., “Quadratic Assignment Problem”, which was initialized and parallelized in an environment called
KAAPI that is “Kernel for Adaptive, Asynchronous parallel Interface”. KAAPI environment consists of
processes shown in fig.4.This environment contains different processors; it can be implemented as a C++
library. A processor contains one (or) more processes.
KAAPI processor model
6.2. Life Cycle of a task in KAAPI execution model:
At task Initialization (or) task creation, the task enters into a state created, this time the task is pushed
onto stack. When all input data of particular task is available, the task enters into a state called ready state. A
ready task is on the top of stack that is it can be executed from stack and deleted. A task which is in ready state
can be stolen, the particular task enters into stolen state on present process becomes as victim [11] when the task
completed and particular state is to be deleted. If a task is to be stolen, the nearly created task (or) process
utilizes the same model in the above figure.
6.3. Fault- Free executions:
6.3.1 Satin approach:
The complexity of protocols in fault free executions and executions containing faults
6.3.1.1: Execution times of Protocols in fault free executions:
It shows the execution times of applications for various protocols in the absence of faults. Two
observations can be made here.
1) The application scales with number of processes for all protocols.
2) There is a very little difference between execution times of protocols for the same no. of processors. Here
the complexity is the total amount of data associated with the protocol is sent to stable storage. This
Recovery of Data in Cluster computing by using Fault Tolerant Mechanisms
DOI: 10.9790/0661-17124045 www.iosrjournals.org 44 | Page
complexity is affected by total size and number of messages. Here in this approach, TIC complexity is very
small. It is shown in fig.5.
6.3.2. Execution times with faults:
First we measure the cost incurred by computation last due to faults and complexity of protocols. Here for each
protocol.
We observed here, if the number of faults increased, the execution time grows (or) increased linearly.
There is a complexity (or) difficulty with Rollback but do not contain the complexity of check pointing (or)
logging of events.
Execution times of Protocol
QAP
0
500
1000
1500
2000
30 60 90 120
Processors
Time
Tp with TIC
Tp with SEL
Figure- 5
6.4. Local, Global and Forced Checkpoints:
After a crash. It checks the failure data in database.
Ex: Serialization [3] (keep the conversational state) It maintains same state of execution.
All the files are stored using Queue (or) stack. For example server socket will opening the new
connectives. How can we invoke the thread? By using data send start ( ) it invokes run () functions. TIC
protocol is responsible for getting information from the crashed process (or) system.
SEL protocol is helpful for retrieving information using periodic time intervals. By applying forced
techniques, we will display the last message the experimental result is shown in fig.6.TIC and SEL are the fault
tolerant mechanisms. The main objective of TIC is to allow logging events [18] for tasks are their additions and
deletions.
After crash, by applying local technique, the messages from first point to last storage are displayed like
By applying forced technique we will get the result like
Recovery of Data in Cluster computing by using Fault Tolerant Mechanisms
DOI: 10.9790/0661-17124045 www.iosrjournals.org 45 | Page
If processor 2 is crashed here then the information of processor 2 is lost. To recover this information
we need local and faced check points.
By applying local technique, we will get the information from file 1 to file 3.If you want to display file
[1] information by applying global technique. To display the information about last file we can apply forced
technique. Here I described a new technique called Global technique. By applying this we can get any message
in the middle. By applying this technique, we can display desired message.
VII. Conclusion
If there is „n‟ number of processors, suppose if a processor [1] wants to send information to processor
[2], processor [3] etc., similarly if a processor [2] sends information to P1, P3, and P4……. Pn.If P2 is suddenly
crashed here, the information is lost on P2. We have different protocols and techniques to recover the messages
from starting point to ending point. By applying local techniques, we can display the message from first to last
stable storage. By applying forced techniques [12], we can display the last message. By applying Global
techniques, we can display our own desired messages.
References
[1]. Ivan Stojnenvic, “Hand book of wireless Networks and Mobile computing”.
[2]. Elsevier, “Computer Architecture”.
[3]. Arun K.Pujari, “Data Mining techniques”.
[4]. D.K. Pradhan, “Fault tolerant computer system design”.
[5]. R. Baldoni, “A communicative Individual check pointing protect that ensures Rollback- Dependency tractability”.
[6]. L. Alvisi and K. Mazullo, “Message logging: pessimistic, optimistic, casual and optimal”.
[7]. V. Strumpen, “Potable and fault- tolerant S/w systems”.
[8]. D.curen,” A survey of simulation in sensor networks”University Of Binghamaton project report for subject CS580.
[9]. L.Alvisi, “A survey of Rollback- Recovery Protocols in message- passing systems”.
[10]. A Krings, S.Jafar, “Theft Induced check pointing for reconfigurable Data flow applications”.
[11]. Narner P.E. and Knight J.C. security monitoring, Visualization and System survivability IEEE/SEI.
[12]. Blattner M.M. and Glinert E.P. multimodal Integration.
[13]. Kaye, J. Making scents: Aromatic output for HCI.
[14]. Axelsson S. Visualization for Intrusion detection.
[15]. G. Stellner, “Co-check check pointing and process Migration for MPI.
[16]. IEEE 802.15.4a Standard. Wireless MAC and PHY Specifications for Low – Rate Wireless Personal Area Networks.IEEE:
Piscataway, NJ, USA, 2006.
[17]. R. Strom and S. Yemeni, “Optimistic Recovery in Distributed systems”.
[18]. J.Slic, B. Robic and T. Ungerer, “Asynchrony is parallel computing from dataflow to multithreading” progress in computer search.
[19]. F.Bande, D.Coromel, C. Delb and L.Henrio, “A hybrid message logging CIC protocol for constrained checkpointability.
[20]. A large scale Nation- wide infrastructure for Grid Research Gird- 5000.

More Related Content

What's hot

Operating Systems - Process Synchronization and Deadlocks
Operating Systems - Process Synchronization and DeadlocksOperating Systems - Process Synchronization and Deadlocks
Operating Systems - Process Synchronization and DeadlocksMukesh Chinta
 
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...vtunotesbysree
 
Kcd226 Sistem Operasi Lecture04
Kcd226 Sistem Operasi Lecture04Kcd226 Sistem Operasi Lecture04
Kcd226 Sistem Operasi Lecture04Cahyo Darujati
 
Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot Ashutosh Jaiswal
 
Concepts of Real time Systems (RTS)
Concepts of Real time Systems (RTS)Concepts of Real time Systems (RTS)
Concepts of Real time Systems (RTS)EngKarrarSMuttair
 
Software rejuvenation based fault tolerance
Software rejuvenation based fault toleranceSoftware rejuvenation based fault tolerance
Software rejuvenation based fault tolerancewww.pixelsolutionbd.com
 
SCHEDULING DIFFERENT CUSTOMER ACTIVITIES WITH SENSING DEVICE
SCHEDULING DIFFERENT CUSTOMER ACTIVITIES WITH SENSING DEVICESCHEDULING DIFFERENT CUSTOMER ACTIVITIES WITH SENSING DEVICE
SCHEDULING DIFFERENT CUSTOMER ACTIVITIES WITH SENSING DEVICEijait
 
Process synchronization(deepa)
Process synchronization(deepa)Process synchronization(deepa)
Process synchronization(deepa)Nagarajan
 
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...Eswar Publications
 
Operating Systems - "Chapter 5 Process Synchronization"
Operating Systems - "Chapter 5 Process Synchronization"Operating Systems - "Chapter 5 Process Synchronization"
Operating Systems - "Chapter 5 Process Synchronization"Ra'Fat Al-Msie'deen
 

What's hot (20)

H04553942
H04553942H04553942
H04553942
 
Operating Systems - Process Synchronization and Deadlocks
Operating Systems - Process Synchronization and DeadlocksOperating Systems - Process Synchronization and Deadlocks
Operating Systems - Process Synchronization and Deadlocks
 
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
 
Real time-embedded-system-lec-02
Real time-embedded-system-lec-02Real time-embedded-system-lec-02
Real time-embedded-system-lec-02
 
SYNCHRONIZATION
SYNCHRONIZATIONSYNCHRONIZATION
SYNCHRONIZATION
 
Kcd226 Sistem Operasi Lecture04
Kcd226 Sistem Operasi Lecture04Kcd226 Sistem Operasi Lecture04
Kcd226 Sistem Operasi Lecture04
 
Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot Flexible Symmetric Global Snapshot
Flexible Symmetric Global Snapshot
 
OS_Ch7
OS_Ch7OS_Ch7
OS_Ch7
 
6 Synchronisation
6 Synchronisation6 Synchronisation
6 Synchronisation
 
Operating system critical section
Operating system   critical sectionOperating system   critical section
Operating system critical section
 
Chapter 02
Chapter 02Chapter 02
Chapter 02
 
Lec3 final
Lec3 finalLec3 final
Lec3 final
 
Real time-embedded-system-lec-05
Real time-embedded-system-lec-05Real time-embedded-system-lec-05
Real time-embedded-system-lec-05
 
Concepts of Real time Systems (RTS)
Concepts of Real time Systems (RTS)Concepts of Real time Systems (RTS)
Concepts of Real time Systems (RTS)
 
Software rejuvenation based fault tolerance
Software rejuvenation based fault toleranceSoftware rejuvenation based fault tolerance
Software rejuvenation based fault tolerance
 
SCHEDULING DIFFERENT CUSTOMER ACTIVITIES WITH SENSING DEVICE
SCHEDULING DIFFERENT CUSTOMER ACTIVITIES WITH SENSING DEVICESCHEDULING DIFFERENT CUSTOMER ACTIVITIES WITH SENSING DEVICE
SCHEDULING DIFFERENT CUSTOMER ACTIVITIES WITH SENSING DEVICE
 
Process synchronization(deepa)
Process synchronization(deepa)Process synchronization(deepa)
Process synchronization(deepa)
 
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
A Survey of Various Fault Tolerance Checkpointing Algorithms in Distributed S...
 
Operating Systems - "Chapter 5 Process Synchronization"
Operating Systems - "Chapter 5 Process Synchronization"Operating Systems - "Chapter 5 Process Synchronization"
Operating Systems - "Chapter 5 Process Synchronization"
 
Real time-embedded-system-lec-07
Real time-embedded-system-lec-07Real time-embedded-system-lec-07
Real time-embedded-system-lec-07
 

Viewers also liked

Mathematical Programming Approach to Improve Website Structure for Effective ...
Mathematical Programming Approach to Improve Website Structure for Effective ...Mathematical Programming Approach to Improve Website Structure for Effective ...
Mathematical Programming Approach to Improve Website Structure for Effective ...IOSR Journals
 
Spectrophotometric Determination of Drugs Using Iodine As Analytical Reagent
Spectrophotometric Determination of Drugs Using Iodine As Analytical ReagentSpectrophotometric Determination of Drugs Using Iodine As Analytical Reagent
Spectrophotometric Determination of Drugs Using Iodine As Analytical ReagentIOSR Journals
 
Value creation in relationship exchange explication by Ethical Approach: an a...
Value creation in relationship exchange explication by Ethical Approach: an a...Value creation in relationship exchange explication by Ethical Approach: an a...
Value creation in relationship exchange explication by Ethical Approach: an a...IOSR Journals
 
Synthesis and Biological Evaluation of Novel3, 5-Disubstituted 4h-1, 2, 4-Tri...
Synthesis and Biological Evaluation of Novel3, 5-Disubstituted 4h-1, 2, 4-Tri...Synthesis and Biological Evaluation of Novel3, 5-Disubstituted 4h-1, 2, 4-Tri...
Synthesis and Biological Evaluation of Novel3, 5-Disubstituted 4h-1, 2, 4-Tri...IOSR Journals
 
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...IOSR Journals
 
Single Phase Formation of CuInS2 Nanoparticles: Structural, Morphological, Th...
Single Phase Formation of CuInS2 Nanoparticles: Structural, Morphological, Th...Single Phase Formation of CuInS2 Nanoparticles: Structural, Morphological, Th...
Single Phase Formation of CuInS2 Nanoparticles: Structural, Morphological, Th...IOSR Journals
 
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...IOSR Journals
 
Performance of Concrete at Elevated Temperatures: Utilizing A Blended Ordinar...
Performance of Concrete at Elevated Temperatures: Utilizing A Blended Ordinar...Performance of Concrete at Elevated Temperatures: Utilizing A Blended Ordinar...
Performance of Concrete at Elevated Temperatures: Utilizing A Blended Ordinar...IOSR Journals
 
A Spurious-Power Suppression technique for a Low-Power Multiplier
A Spurious-Power Suppression technique for a Low-Power MultiplierA Spurious-Power Suppression technique for a Low-Power Multiplier
A Spurious-Power Suppression technique for a Low-Power MultiplierIOSR Journals
 
Visual Representations in High School Edublogs
Visual Representations in High School EdublogsVisual Representations in High School Edublogs
Visual Representations in High School EdublogsIOSR Journals
 
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...IOSR Journals
 

Viewers also liked (20)

Mathematical Programming Approach to Improve Website Structure for Effective ...
Mathematical Programming Approach to Improve Website Structure for Effective ...Mathematical Programming Approach to Improve Website Structure for Effective ...
Mathematical Programming Approach to Improve Website Structure for Effective ...
 
Spectrophotometric Determination of Drugs Using Iodine As Analytical Reagent
Spectrophotometric Determination of Drugs Using Iodine As Analytical ReagentSpectrophotometric Determination of Drugs Using Iodine As Analytical Reagent
Spectrophotometric Determination of Drugs Using Iodine As Analytical Reagent
 
Value creation in relationship exchange explication by Ethical Approach: an a...
Value creation in relationship exchange explication by Ethical Approach: an a...Value creation in relationship exchange explication by Ethical Approach: an a...
Value creation in relationship exchange explication by Ethical Approach: an a...
 
Synthesis and Biological Evaluation of Novel3, 5-Disubstituted 4h-1, 2, 4-Tri...
Synthesis and Biological Evaluation of Novel3, 5-Disubstituted 4h-1, 2, 4-Tri...Synthesis and Biological Evaluation of Novel3, 5-Disubstituted 4h-1, 2, 4-Tri...
Synthesis and Biological Evaluation of Novel3, 5-Disubstituted 4h-1, 2, 4-Tri...
 
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
Digital Image Compression using Hybrid Transform with Kekre Transform and Oth...
 
Single Phase Formation of CuInS2 Nanoparticles: Structural, Morphological, Th...
Single Phase Formation of CuInS2 Nanoparticles: Structural, Morphological, Th...Single Phase Formation of CuInS2 Nanoparticles: Structural, Morphological, Th...
Single Phase Formation of CuInS2 Nanoparticles: Structural, Morphological, Th...
 
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...
Assessment of Spatial Exposure to RF Radiation due to GSM 900 and GSM1800 – A...
 
Performance of Concrete at Elevated Temperatures: Utilizing A Blended Ordinar...
Performance of Concrete at Elevated Temperatures: Utilizing A Blended Ordinar...Performance of Concrete at Elevated Temperatures: Utilizing A Blended Ordinar...
Performance of Concrete at Elevated Temperatures: Utilizing A Blended Ordinar...
 
A Spurious-Power Suppression technique for a Low-Power Multiplier
A Spurious-Power Suppression technique for a Low-Power MultiplierA Spurious-Power Suppression technique for a Low-Power Multiplier
A Spurious-Power Suppression technique for a Low-Power Multiplier
 
L017548287
L017548287L017548287
L017548287
 
I010435659
I010435659I010435659
I010435659
 
P01761113118
P01761113118P01761113118
P01761113118
 
F01233345
F01233345F01233345
F01233345
 
E017212836
E017212836E017212836
E017212836
 
F017624449
F017624449F017624449
F017624449
 
G017614754
G017614754G017614754
G017614754
 
N061102111
N061102111N061102111
N061102111
 
Visual Representations in High School Edublogs
Visual Representations in High School EdublogsVisual Representations in High School Edublogs
Visual Representations in High School Edublogs
 
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
Comparative Analysis, Security Aspects & Optimization of Workload in Gfs Base...
 
O017128591
O017128591O017128591
O017128591
 

Similar to Recovery of Data in Cluster Computing By Using Fault Tolerant Mechanisms

Implementation of the trinity of the control system based on OPC
Implementation of the trinity of the control system based on OPCImplementation of the trinity of the control system based on OPC
Implementation of the trinity of the control system based on OPCIJRES Journal
 
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...ijics
 
Integrating fault tolerant scheme with feedback control scheduling algorithm ...
Integrating fault tolerant scheme with feedback control scheduling algorithm ...Integrating fault tolerant scheme with feedback control scheduling algorithm ...
Integrating fault tolerant scheme with feedback control scheduling algorithm ...ijics
 
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERSVTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERSvtunotesbysree
 
5th KuVS Meeting
5th KuVS Meeting5th KuVS Meeting
5th KuVS Meetingsteccami
 
operating system question bank
operating system question bankoperating system question bank
operating system question bankrajatdeep kaur
 
RTOS Material hfffffffffffffffffffffffffffffffffffff
RTOS Material hfffffffffffffffffffffffffffffffffffffRTOS Material hfffffffffffffffffffffffffffffffffffff
RTOS Material hfffffffffffffffffffffffffffffffffffffadugnanegero
 
A survey of paradigms for building and
A survey of paradigms for building andA survey of paradigms for building and
A survey of paradigms for building andcseij
 
Document 14 (6).pdf
Document 14 (6).pdfDocument 14 (6).pdf
Document 14 (6).pdfRajMantry
 
Components in real time systems
Components in real time systemsComponents in real time systems
Components in real time systemsSaransh Garg
 
Techniques for Efficient RTL Clock and Memory Gating Takedown of Next Generat...
Techniques for Efficient RTL Clock and Memory Gating Takedown of Next Generat...Techniques for Efficient RTL Clock and Memory Gating Takedown of Next Generat...
Techniques for Efficient RTL Clock and Memory Gating Takedown of Next Generat...Arun Joseph
 
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...cscpconf
 
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...David Sweigert
 
Operating systems question bank
Operating systems question bankOperating systems question bank
Operating systems question bankanuradha raheja
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middlewaresanjoysanyal
 
Operating system Q/A
Operating system Q/AOperating system Q/A
Operating system Q/AAbdul Munam
 

Similar to Recovery of Data in Cluster Computing By Using Fault Tolerant Mechanisms (20)

Implementation of the trinity of the control system based on OPC
Implementation of the trinity of the control system based on OPCImplementation of the trinity of the control system based on OPC
Implementation of the trinity of the control system based on OPC
 
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...
 
Integrating fault tolerant scheme with feedback control scheduling algorithm ...
Integrating fault tolerant scheme with feedback control scheduling algorithm ...Integrating fault tolerant scheme with feedback control scheduling algorithm ...
Integrating fault tolerant scheme with feedback control scheduling algorithm ...
 
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERSVTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
VTU 5TH SEM CSE OPERATING SYSTEMS SOLVED PAPERS
 
5th KuVS Meeting
5th KuVS Meeting5th KuVS Meeting
5th KuVS Meeting
 
CH05.pdf
CH05.pdfCH05.pdf
CH05.pdf
 
Minimize Staleness and Stretch in Streaming Data Warehouses
Minimize Staleness and Stretch in Streaming Data WarehousesMinimize Staleness and Stretch in Streaming Data Warehouses
Minimize Staleness and Stretch in Streaming Data Warehouses
 
operating system question bank
operating system question bankoperating system question bank
operating system question bank
 
RTOS Material hfffffffffffffffffffffffffffffffffffff
RTOS Material hfffffffffffffffffffffffffffffffffffffRTOS Material hfffffffffffffffffffffffffffffffffffff
RTOS Material hfffffffffffffffffffffffffffffffffffff
 
A survey of paradigms for building and
A survey of paradigms for building andA survey of paradigms for building and
A survey of paradigms for building and
 
Document 14 (6).pdf
Document 14 (6).pdfDocument 14 (6).pdf
Document 14 (6).pdf
 
PID2143641
PID2143641PID2143641
PID2143641
 
Components in real time systems
Components in real time systemsComponents in real time systems
Components in real time systems
 
Techniques for Efficient RTL Clock and Memory Gating Takedown of Next Generat...
Techniques for Efficient RTL Clock and Memory Gating Takedown of Next Generat...Techniques for Efficient RTL Clock and Memory Gating Takedown of Next Generat...
Techniques for Efficient RTL Clock and Memory Gating Takedown of Next Generat...
 
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
PREDICTIVE DETECTION OF KNOWN SECURITY CRITICALITIES IN CYBER PHYSICAL SYSTEM...
 
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
Intrusion Detection and Discovery via Log Correlation to support HIPAA Securi...
 
UNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docxUNIT II - CPU SCHEDULING.docx
UNIT II - CPU SCHEDULING.docx
 
Operating systems question bank
Operating systems question bankOperating systems question bank
Operating systems question bank
 
Topic2 Understanding Middleware
Topic2 Understanding MiddlewareTopic2 Understanding Middleware
Topic2 Understanding Middleware
 
Operating system Q/A
Operating system Q/AOperating system Q/A
Operating system Q/A
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 

Recovery of Data in Cluster Computing By Using Fault Tolerant Mechanisms

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. II (Jan – Feb. 2015), PP 40-45 www.iosrjournals.org DOI: 10.9790/0661-17124045 www.iosrjournals.org 40 | Page Recovery of Data in Cluster Computing By Using Fault Tolerant Mechanisms Balne Sridevi Assistant Professor, Bajaj Institute Of Technology & Sciences, Department Of Computer Science and Engineering, Warangal, AP, INDIA Abstract: Many applications executing on cluster architectures consisting of several number of computers create several problems with reliability. The problems are system crashes, code failures and network problems etc. This paper using Fault tolerant mechanisms to recover the data in cluster computing. The two Rollback Recovery protocols[5] are Theft Induced check pointing protocol (TIC) and systematic event logging protocol TIC protocol is used to recover the information during crash, the information is send to client (receiver) by using SEL protocol. It is proven that the complexity of protocol is very small and the information lost by crashed process is recovered here. Section 1: describes the main objectives of TIC&SEL protocols Section 2: describes the background for grid or cluster computing Section 3: describes the definition of checkpoints & different types of checkpoints Section 4: gives the details about work stealing or task stealing of different tasks Section 5: describes an algorithm, which is mainly used for retrieving information from database server and creates backup of db Section 6: gives the experimental results Section 7: gives concluded the different techniques Keywords: Cluster computing, rollback, recovery, message logging. Event logging, check pointing, local technique, Forced technique, Global technique. I. Introduction Large Applications executing on cluster architectures several computational nodes, inter connection networks, mass storage with reliability. This paper presents two fault tolerant techniques to overcome the problems with reliability. The two fault tolerant techniques are TIC [10] and SEL [10] protocols we implemented KAAPI (Kernel Adaptive Asynchronous Parallel Interface) by taking „n‟ number of clients. This KAAPI [1] environment gives the general relationship between the processors and processes. Each process has its own stack (or) queue. The main objective of TIC protocol is to store the information in periodic time intervals and that information will send to receiver by using SEL protocol. Thus two protocols are introduced in sections 4.1 II. Background Several Fault tolerant techniques are introduced to overcome the problem of reliability, node failure and the need for dynamic configuration over extensive runtime. The recovery means that it depends on redundancy we have several redundancy principles i.e. information, time and spatial. The information redundancy depends on stable storage method ,the other two redundancies are not suitable for cluster (or) Grid [20] computing. III. Different Approaches Based on stable storage we have two approaches 1. Logging based approaches. 2. Check pointing based approaches. 1. Logging based approaches: In this approach, there is a difficulty with message logging [6] due to time and spatial redundancy. 2. Check pointing based approaches: In this approach, the state of computations from first check point to last check point (or) last storage is saved. 3.1 Definition of Check point: A check point is used to save the state of computation from starting point to ending point. It is based on saved states are based on time intervals.
  • 2. Recovery of Data in Cluster computing by using Fault Tolerant Mechanisms DOI: 10.9790/0661-17124045 www.iosrjournals.org 41 | Page Check pointing [15] can be categorized into two ways: 1. Co-coordinated check pointing. 2. Un Co-coordinated check pointing. 1. Co-coordinated check Pointing: It is used to construct the consistent global state (or) storage. 2. Un Co-coordinated check Pointing: It is used to save the state independently and achieves the consistent global storage in the recovery stage. 3.2 Creation of Checkpoints: Checkpoints can be created in two ways: 1. At specific time intervals (or) check pointing periods. 2. Work stealing (or) task stealing. If we consider the check pointing periods, these are called local checkpoints. If we consider the checkpoints w.r. to work stealing (or) task stealing are called forced checkpoints. The TIC protocol with respect to forced and local checkpoints shown in fig 1. The creation of checkpoints can be initiated by.1) Work stealing, 2) at specific check pointing periods. We will first describe the protocol [8] with respect to work stealing, since it is the cause of only communication b/w processes. IV. Work Stealing It is the only mechanism for distributing the workload constituting and primary mechanism for load distributes is based on scheduling algorithm called work stealing. The principle is simple i.e., when a process becomes idle it tries to steal work from another processes called victim. The initiating process is called thief [2]. The checkpoints resulting from work stealing are called forced checkpoints. The TIC protocol w.r. to forced checkpoints is defined in figure 1. 4.1 Local Check pointing: By applying this techniques, we can recover the crashed messages from starting point to last storage (or) stable storage[16].For this purpose we need two protocols.1) Theft Induced check pointing, 2) Systematic Event legging. 4.1.1 Theft Induced Check pointing & Systematic Event logging (TIC and SEL): It is responsible for getting (or) retrieving information from crashed [14] processes (or) crashed systems. The SEL is helpful for retrieving data (or) information using periodic time intervals. 1. In figure [1] consider two processes P0 & P1. 2. A process P1 is created on stable resource [4]. 3. If it gets a process P0 that has a task to be stolen called theft task Tth, stealing a task form process P0. Before executing Tth, the process P1 checkpoints its state as C1P1 0 . 4. Event A1 is the Execution of task Tth, which sends a theft request to P0. 5. Event B1 is the response of Tth by P0. 6. Between events B1 and C1, it recognizes a task Ts and identifies it as stolen by P1. 7. Between events B1 and C1 victim P0 is in difficult section w.r. to operations (theft operations).
  • 3. Recovery of Data in Cluster computing by using Fault Tolerant Mechanisms DOI: 10.9790/0661-17124045 www.iosrjournals.org 42 | Page 8. Between events C1 and D1, it requests and forces a checkpoint to reflect the theft. At this timeP0 becomes a victim. 9. Event D1 gets sending Ts to P1. 10. Event E1 is the response of stolen task [7] Ts from P0 thief P1 initiatives entries for two tasks Ts1 and Ts2 in its linear structure steak shown in fig. 2. Entries for two tasks Ts1 and Ts2. Figure- 2 Where the task Tr is changed with giving the experimental results of execution of Ts1 and Ts2 to P0 and becomes ready when Ts is completed. 11. When P1 is completed, the execution of Ts1 and Ts2 to P0 in event F1. 12. Event G1 is the response of P0. V. Algorithm Step 1: What is the Recovery [5]? Retrieve the information (or) data from database server. It is based on redundancies i.e., time, spatial (or) information. Step 2: Data base Recovery? Here the database is recovered by using the following approaches. 1) Log base Recovery [3]. 2) First phase commit protocol [13]. 3) Second phase commit protocol [13]. 4) Third phase commit protocol. [13] Step 3: If there is any problem with network or system crashes how can we recover (or) retrieve the data from the crashed nodes? Step 4: To overcome this problem, we have two fault tolerant mechanisms. 1) Theft Induced check pointing protocol (TIC). 2) Systematic Event logging Protocol (SEL) 5.1. TIC: The TIC is responsible for getting information from the crashed (or) process system. The main objective of TIC is to allow rollback of only crashed process. A process can be rolled back to its last checkpoint. Under TIC protocol, the faulty processes can be rolled back, TIC maintains global consistent [9] state of execution.
  • 4. Recovery of Data in Cluster computing by using Fault Tolerant Mechanisms DOI: 10.9790/0661-17124045 www.iosrjournals.org 43 | Page 5.2. SEL: This protocol is helpful for retrieving information using periodic time intervals and send to client with the help of SEL. SEL was derived from log-based method. The motivation for SEL is to reduce the amount of computation. In SEL, only the events relevant for the construction of data flow graph [8] are logged. VI. Experimental Results 6.1. Applications and Platform description: The basic performance and complexity of TIC and SEL protocols were practically determined for QAP [19] i.e., “Quadratic Assignment Problem”, which was initialized and parallelized in an environment called KAAPI that is “Kernel for Adaptive, Asynchronous parallel Interface”. KAAPI environment consists of processes shown in fig.4.This environment contains different processors; it can be implemented as a C++ library. A processor contains one (or) more processes. KAAPI processor model 6.2. Life Cycle of a task in KAAPI execution model: At task Initialization (or) task creation, the task enters into a state created, this time the task is pushed onto stack. When all input data of particular task is available, the task enters into a state called ready state. A ready task is on the top of stack that is it can be executed from stack and deleted. A task which is in ready state can be stolen, the particular task enters into stolen state on present process becomes as victim [11] when the task completed and particular state is to be deleted. If a task is to be stolen, the nearly created task (or) process utilizes the same model in the above figure. 6.3. Fault- Free executions: 6.3.1 Satin approach: The complexity of protocols in fault free executions and executions containing faults 6.3.1.1: Execution times of Protocols in fault free executions: It shows the execution times of applications for various protocols in the absence of faults. Two observations can be made here. 1) The application scales with number of processes for all protocols. 2) There is a very little difference between execution times of protocols for the same no. of processors. Here the complexity is the total amount of data associated with the protocol is sent to stable storage. This
  • 5. Recovery of Data in Cluster computing by using Fault Tolerant Mechanisms DOI: 10.9790/0661-17124045 www.iosrjournals.org 44 | Page complexity is affected by total size and number of messages. Here in this approach, TIC complexity is very small. It is shown in fig.5. 6.3.2. Execution times with faults: First we measure the cost incurred by computation last due to faults and complexity of protocols. Here for each protocol. We observed here, if the number of faults increased, the execution time grows (or) increased linearly. There is a complexity (or) difficulty with Rollback but do not contain the complexity of check pointing (or) logging of events. Execution times of Protocol QAP 0 500 1000 1500 2000 30 60 90 120 Processors Time Tp with TIC Tp with SEL Figure- 5 6.4. Local, Global and Forced Checkpoints: After a crash. It checks the failure data in database. Ex: Serialization [3] (keep the conversational state) It maintains same state of execution. All the files are stored using Queue (or) stack. For example server socket will opening the new connectives. How can we invoke the thread? By using data send start ( ) it invokes run () functions. TIC protocol is responsible for getting information from the crashed process (or) system. SEL protocol is helpful for retrieving information using periodic time intervals. By applying forced techniques, we will display the last message the experimental result is shown in fig.6.TIC and SEL are the fault tolerant mechanisms. The main objective of TIC is to allow logging events [18] for tasks are their additions and deletions. After crash, by applying local technique, the messages from first point to last storage are displayed like By applying forced technique we will get the result like
  • 6. Recovery of Data in Cluster computing by using Fault Tolerant Mechanisms DOI: 10.9790/0661-17124045 www.iosrjournals.org 45 | Page If processor 2 is crashed here then the information of processor 2 is lost. To recover this information we need local and faced check points. By applying local technique, we will get the information from file 1 to file 3.If you want to display file [1] information by applying global technique. To display the information about last file we can apply forced technique. Here I described a new technique called Global technique. By applying this we can get any message in the middle. By applying this technique, we can display desired message. VII. Conclusion If there is „n‟ number of processors, suppose if a processor [1] wants to send information to processor [2], processor [3] etc., similarly if a processor [2] sends information to P1, P3, and P4……. Pn.If P2 is suddenly crashed here, the information is lost on P2. We have different protocols and techniques to recover the messages from starting point to ending point. By applying local techniques, we can display the message from first to last stable storage. By applying forced techniques [12], we can display the last message. By applying Global techniques, we can display our own desired messages. References [1]. Ivan Stojnenvic, “Hand book of wireless Networks and Mobile computing”. [2]. Elsevier, “Computer Architecture”. [3]. Arun K.Pujari, “Data Mining techniques”. [4]. D.K. Pradhan, “Fault tolerant computer system design”. [5]. R. Baldoni, “A communicative Individual check pointing protect that ensures Rollback- Dependency tractability”. [6]. L. Alvisi and K. Mazullo, “Message logging: pessimistic, optimistic, casual and optimal”. [7]. V. Strumpen, “Potable and fault- tolerant S/w systems”. [8]. D.curen,” A survey of simulation in sensor networks”University Of Binghamaton project report for subject CS580. [9]. L.Alvisi, “A survey of Rollback- Recovery Protocols in message- passing systems”. [10]. A Krings, S.Jafar, “Theft Induced check pointing for reconfigurable Data flow applications”. [11]. Narner P.E. and Knight J.C. security monitoring, Visualization and System survivability IEEE/SEI. [12]. Blattner M.M. and Glinert E.P. multimodal Integration. [13]. Kaye, J. Making scents: Aromatic output for HCI. [14]. Axelsson S. Visualization for Intrusion detection. [15]. G. Stellner, “Co-check check pointing and process Migration for MPI. [16]. IEEE 802.15.4a Standard. Wireless MAC and PHY Specifications for Low – Rate Wireless Personal Area Networks.IEEE: Piscataway, NJ, USA, 2006. [17]. R. Strom and S. Yemeni, “Optimistic Recovery in Distributed systems”. [18]. J.Slic, B. Robic and T. Ungerer, “Asynchrony is parallel computing from dataflow to multithreading” progress in computer search. [19]. F.Bande, D.Coromel, C. Delb and L.Henrio, “A hybrid message logging CIC protocol for constrained checkpointability. [20]. A large scale Nation- wide infrastructure for Grid Research Gird- 5000.