SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 50 -53
www.iosrjournals.org

     An Database Query Service In Large Scale Reliable Storage
             System For Automatic Reconfiguration
                       K.Vinothini 1, Ms. B. Amutha2, B.Renganathan3
                               1
                                M.E. (Cse), SrinivasanEngg College, Perambalur.
                                 2
                                   Ap/ Cse, SrinivasanEngg College, Perambalur.
                               3
                                M.E. (Cse), SrinivasanEngg College, Perambalur

Abstract: Large scale reliable storage system with dynamic membership access is currently facing lot of
problems like human configuration errors and it is strong enough only for the static set of replica...An
membership service and dBQS carried out the dynamic membership access and dBQS is a novel distributed
hash table differ from the usual DHT by providing byzantine fault tolerant and strong semantics. We develop
two heuristic algorithm and automatic reconfiguration technique to maintain and carried out those membership
services. Experimental result shows that the membership service works well and the membership service is able
to manage large system and the cost to maintain the service is low.
Index terms- DHT, dBQS,Byzantine fault tolerant

                                             I.        Introduction
         Now a days, Byzantine fault tolerant system assumes only static set of replicas and it is having
limitations in handling the reconfiguration. Generally network security is to prevent and monitor unauthorized
access,misuse and modification of data. Here, we use membership service under network security concept to
maintain and carried out the storage system service. The system is classified into two parts as membership
service (MS) and dBQS. One is to monitor the membership changes and the other is to automatically
reconfigure the system respectively.
         Automatic reconfiguration is mainly done in MS to avoid human configuration errors and dBQS(data
base query services) is differ from usual DHT by providing strong semantics and it is an byzantine fault tolerant
by extending the existing byzantine quorum protocol.MS is itself an byzantine fault tolerant and it produces
configuration periodically rather than changes an membership.
         The MS may need to move to new group of servers in case of reconfiguration for this we allow the
system to operate correctly, even there is an failure bound in the original group of Ms relicas.an Byzantine-fault-
tolerant group is designed for this reconfiguration and our results shows that the MS is able to manage the
storage system of replicas with low cost.

                                                  II.Related Work
          A group membership protocol enables processes in a distributed system to agree on a group of
processes that are currently operational. Membership protocols are a core component of many distributed system
and have proved to be fundamental for maintaining availability and consistency in distributed applications. We
present am membership protocol for asynchronous distributed system that tolerates the malicious corruption of
group members. Our protocols ensure that correct members control and consistency observe changes to the
group membership, provided that in each instance of the group membership, fewer than one-third of the
members are corrupted or fail benignly.
          The protocol semantics shows that Uniqueness is common to much membership protocol and also
stronger than ordering semantics of various protocols.
 Uniqueness is that if pi and pj are correct and vixandvjx are defined, then vix=vjx.
          The protocol has many potential applications in secure systems and, in particular, is a central
component of a toolkit for constructing secure and fault-tolerant distributed services that we have implemented.
The Membership protocol implementation for an atomic broadcast a set of techniques that make such a tool kit
practical.
          Membership protocol is suitable for used in distributed system in which some process may be
corrupted by a malicious intruder. This protocol achieves is an asynchronous system, provided that in each
instance of the group membership, fewer than one-third of the group members are corrupted or fail. Although
the protocol can be used to remove them from the group once detected.
          The main drawbacks of the protocols are their relatively large round complexity for group merge
operations. This approach is that the resulting protocols are not optimal in their performance, i.e., the compiler
adds a certain overhead of additional messages which do not seem necessary.
                                            www.iosrjournals.org                                         50 | Page
An Database Query Service In Large Scale Reliable Storage System For Automatic Reconfiguration

         The service Rambo, which stands for “Reconfigurable Atomic Memory” for Basic Objects The rest of
the paper, presents our algorithm and its analysis. The algorithm carries out three major activities, all
concurrently: reading and writing objects, introducing new configurations, and removing (“garbage-collecting”)
obsolete configurations. The algorithm is composed of a main algorithm, which handles reading, writing, and
garbage-collection, and a global reconfiguration service, Recon, which provides the main algorithm with a
consistent sequence of configurations. Reconfiguration is loosely coupled to the main algorithm, in particular,
several configurations may be known to the algorithm at one time and read and write operations can use them
all.
                                              III.     Techniques
3.1 STORAGE
          Byzantine Quorum Protocol, It’s used to handle changes in replica set, and it provides strong
semantics. That is, to enable them to be reconfigurable while continuing to provide atomic semantics across
changes in the replica set. It includes protocols for read and writes operations and processing of messages during
replica changes. Each object is stored at n=3f+1 nodes and quorums consist of any subset containing 2f+1 node.
           A description of the client-side read and writes protocols for 2 functions are shown below,
Write (data)
     Send messages to the replicas in the group that stores and wait for valid responses, all for server. Then send
messages to all replicas and wait for valid response.
     The write operation for a public-key object will normally has two phases. In the read phase, a quorum of
2f+1replicas iscontacted to obtain a set of version numbers for the object.
Read (data)
          Send messages to the replicas in the group that stores and wait for valid responses, all for server, send
messages to all replicas and wait for valid response. Then return data to the user.
          To perform a read operation, the client requests the object from all replicas in the read phase. Normally,
there will be 2f+1 valid reply that provide the same version number; in this case the result is the correct response
and the operation completes. However, if the read occurs concurrently with a write, the version numbers may
not agree.
          As shown in fig 1.1 the user get back the data from server for that write-back operation is used In this
case, there is a write-back phase in which the client picks the response with the highest version number, writes it
to all replicas, and waits for a reply from a quorum.

3.2 PBFT
           Practical Byzantine Fault Tolerance (PBFT), it describes a new replication algorithm that tolerates
Byzantine faults and practical (asynchronous environment, better performance). The algorithm provides safety if
all non-faulty replicas agree on the sequence numbers of requests that commit locally. It provides replicas must
change view if they are unable to execute a request.
           Replicas probe independently, and a replica proposes an eviction for a server node that has missed
propose probe responses.




                                         Fig 1.1 System Architecture
                                             www.iosrjournals.org                                         51 | Page
An Database Query Service In Large Scale Reliable Storage System For Automatic Reconfiguration

         It does this by sending eviction messages toothier MS replicas, and then, waiting for signed statements
from at least fMS+1 MS replicas (including itself) that agree to evict that node. Other MS replicas accept the
eviction (and sign a statement saying so).
         If their last nevictpings for that node have failed, where nevict<npropose.
         Because the initiation of the eviction waited a bit longer than necessary, most eviction proposals will
succeed if the node is really down.

                                                   IV.Experimental Result
          We implemented the membership service and dBQS. Our experiments show that our approach is
practical and could be used in a real deployment: the MS can manage a very large number of servers and
reconfigurations have little impact on the performance of the replicated service.




          Throughout our experiments, we tried to determine how system components interfere with each other.
For this experiment, the replica doing the pings was associated with an instance of dBQS (since we intend to run
committees on system nodes). We repeated the experiment under three different degrees of activity of the dBQS
server: when it is not serving any data (which will be the case when the MS does the pings and runs on special
nodes that don’t also handle the application), when it is handling 30 queries/second, and when clients saturate
the server with constant requests, which leads to the maximal number of about 300 queries/second. Each query
requested a download of a 512 byte block. little impact on the performance of the replicated service.

                                            V. Conclusion And Future Work
         A dynamically changing system membership in a large scale reliable storage system is maintained and
carried by a special service. For that we provide a membership service that track the system periodically and
notify the changes by using storage and PBFT algorithm. By which the system will reconfigured automatically.
In future research, the more committees are needed for the data will be needed in the system size increases. The
Membership service can accept the committee dynamically is based on system size and to add extension of our
system. The design of a mechanism to determine which machines to place file replicas on the other file to use
membership service.

                                                            References
[1]     Birman. K and T. Joseph, “Exploiting Virtual Synchrony in Distributed Systems,” Proc. 11th ACM Symp. Operating Systems
        Principles, pp. 123-138, Nov. 2007.
[2]     Clement. A, M. Marchetti, E. Wong, L. Alvisi, and M. Dahlin,“Making Byzantine Fault Tolerant Systems Tolerate ByzantineFaults,”
        Proc. Sixth USENIX Symp. Networked Systems Design and Implementation (NSDI ’09), Apr. 2009.
[3]     Cowling. J, D.R.K. Ports, B. Liskov, R.A. Popa, and A. Gaikwad, “Census: Location-Aware Membership Management for Large-
        Scale Distributed Systems,” Proc. Ann. Technical Conf. (USENIX ’09), June 2009
[4]     Chen.K., “Authentication in a Reconfigurable Byzantine Fault Tolerant System,” master’s thesis, Massachusetts Inst. of Technology,
        July 2004.
[5]     Castro.M and B. Liskov, “Practical Byzantine Fault Tolerance,” Proc. Third Symp.Operating Systems Design and Implementation
        (OSDI ’99), Feb. 1999.
[6]     Dabek.F., M.F. Kaashoek, D. Karger, R. Morris, and I. Stoica,“Wide-Area Cooperative Storage with CFS,” Proc. 18th ACM Symp.
        Operating Systems Principles (SOSP ’01), Oct. 2001.
[7]     Douceur.J., “The Sybil Attack,” Proc. First Int’l Workshop Peer-to-Peer Systems (IPTPS ’02), 2002.
[8]     DeCandia.G, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels,
        “Dynamo: Amazon’s Highly Available Key-Value Store,” Proc. 21st ACM Symp. Operating Systems Principles, pp. 205-220,2007.
[9]     Lynch. N. and A.A. Shvartsman, “Rambo: A Reconfigurable Atomic Memory Service,” Proc. 16th Int’l Symp. Distributed
        Computing (DISC ’02), 2002.
[10]    Rodrigo Rodrigues, Barbara Liskov, Member, IEEE, Kathryn Chen, Moses Liskov, and David Schultz “Automatic Reconfiguration for
        Large-Scale Reliable Storage Systems”-IEEE transaction on dependable and secure computing.
[11]    Reiter.M., “A Secure Group Membership Protocol,” IEEE Trans. Software Eng., vol. 22, no. 1, pp. 31-42, Jan. 1996.



                                                    www.iosrjournals.org                                                   52 | Page
An Database Query Service In Large Scale Reliable Storage System For Automatic Reconfiguration

                                      AUTHORS PROFILE

                 Ms.K.vinothinigot B.Tech degree in information technology and now she is doing her
                 M.E (computer science and engineering) in srinivasan engineering
                 college,perambalur,TN,India



                   Ms.B.Amuthais working as Assistant Proffessor/CSE
                   insrinivasan engineering college,perambalur,TN,India




                     Mr.B.Renganathangot B.Tech degree in information technology
                     and now he is doing his M.E (computer science and engineering) in
                     srinivasan engineering college,perambalur,TN,India




                                    www.iosrjournals.org                                     53 | Page

Weitere ähnliche Inhalte

Was ist angesagt?

Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...
Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...
Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...May Sit Hman
 
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGE
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGEADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGE
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGEijdpsjournal
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Pvrtechnologies Nellore
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...IJSRD
 
An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...Alexander Decker
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksIDES Editor
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systemsSHATHAN
 
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...Jaipal Dhobale
 
Z02417321735
Z02417321735Z02417321735
Z02417321735IJMER
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasashiva782
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEAPPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEIJNSA Journal
 
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...IDES Editor
 

Was ist angesagt? (20)

Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...
Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...
Distributed Dynamic Replication Management Mechanism Based on Accessing Frequ...
 
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGE
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGEADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGE
ADVANCED DIFFUSION APPROACH TO DYNAMIC LOAD-BALANCING FOR CLOUD STORAGE
 
Clock synchronization
Clock synchronizationClock synchronization
Clock synchronization
 
Fa25939942
Fa25939942Fa25939942
Fa25939942
 
ICICCE0298
ICICCE0298ICICCE0298
ICICCE0298
 
Jcomss 8358 final
Jcomss 8358 finalJcomss 8358 final
Jcomss 8358 final
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...Drops division and replication of data in cloud for optimal performance and s...
Drops division and replication of data in cloud for optimal performance and s...
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
 
An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...An asynchronous replication model to improve data available into a heterogene...
An asynchronous replication model to improve data available into a heterogene...
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh Networks
 
Communications is distributed systems
Communications is distributed systemsCommunications is distributed systems
Communications is distributed systems
 
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
WIRELESS - HOST TO HOST NETWORK PERFORMANCE EVALUATION BASED ON BITRATE AND N...
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
1.intro. to distributed system
1.intro. to distributed system1.intro. to distributed system
1.intro. to distributed system
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasa
 
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINEAPPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
APPLICATION-LAYER DDOS DETECTION BASED ON A ONE-CLASS SUPPORT VECTOR MACHINE
 
17 51-1-pb
17 51-1-pb17 51-1-pb
17 51-1-pb
 
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
 

Andere mochten auch

Capacitive voltage and current induction phenomena in GIS substation
Capacitive voltage and current induction phenomena in GIS substationCapacitive voltage and current induction phenomena in GIS substation
Capacitive voltage and current induction phenomena in GIS substationIOSR Journals
 
лицей пушкина
лицей пушкиналицей пушкина
лицей пушкинаNatalya Dyrda
 
Иркутск - середина Земли
Иркутск - середина ЗемлиИркутск - середина Земли
Иркутск - середина ЗемлиNatalya Dyrda
 
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...Image Processing for Automated Flaw Detection and CMYK model for Color Image ...
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...IOSR Journals
 
A.chuyende tnsua lan
A.chuyende tnsua lanA.chuyende tnsua lan
A.chuyende tnsua lanphihoanhbmt
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
 
Rp presentation
Rp presentationRp presentation
Rp presentationKhalid Ak
 
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...IOSR Journals
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnIOSR Journals
 
Comparison Study of Lossless Data Compression Algorithms for Text Data
Comparison Study of Lossless Data Compression Algorithms for Text DataComparison Study of Lossless Data Compression Algorithms for Text Data
Comparison Study of Lossless Data Compression Algorithms for Text DataIOSR Journals
 
Brochure officielle de la délégation française au New Delhi World Book Fair
Brochure officielle de la délégation française au New Delhi World Book FairBrochure officielle de la délégation française au New Delhi World Book Fair
Brochure officielle de la délégation française au New Delhi World Book FairAsfored
 
Whistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & DineWhistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & DineWhistler Animals Galore
 

Andere mochten auch (20)

Capacitive voltage and current induction phenomena in GIS substation
Capacitive voltage and current induction phenomena in GIS substationCapacitive voltage and current induction phenomena in GIS substation
Capacitive voltage and current induction phenomena in GIS substation
 
M0937681
M0937681M0937681
M0937681
 
E0962833
E0962833E0962833
E0962833
 
лицей пушкина
лицей пушкиналицей пушкина
лицей пушкина
 
Иркутск - середина Земли
Иркутск - середина ЗемлиИркутск - середина Земли
Иркутск - середина Земли
 
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...Image Processing for Automated Flaw Detection and CMYK model for Color Image ...
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...
 
E0432832
E0432832E0432832
E0432832
 
A.chuyende tnsua lan
A.chuyende tnsua lanA.chuyende tnsua lan
A.chuyende tnsua lan
 
A0940111
A0940111A0940111
A0940111
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
K0216571
K0216571K0216571
K0216571
 
Rp presentation
Rp presentationRp presentation
Rp presentation
 
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
 
Atom Experience Storyboard
Atom Experience StoryboardAtom Experience Storyboard
Atom Experience Storyboard
 
Filtering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in WsnFiltering Schemes for Injected False Data in Wsn
Filtering Schemes for Injected False Data in Wsn
 
E0362430
E0362430E0362430
E0362430
 
Comparison Study of Lossless Data Compression Algorithms for Text Data
Comparison Study of Lossless Data Compression Algorithms for Text DataComparison Study of Lossless Data Compression Algorithms for Text Data
Comparison Study of Lossless Data Compression Algorithms for Text Data
 
Brochure officielle de la délégation française au New Delhi World Book Fair
Brochure officielle de la délégation française au New Delhi World Book FairBrochure officielle de la délégation française au New Delhi World Book Fair
Brochure officielle de la délégation française au New Delhi World Book Fair
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
Whistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & DineWhistler Animal Shelter - 10th Annual K9 Wine & Dine
Whistler Animal Shelter - 10th Annual K9 Wine & Dine
 

Ähnlich wie I0935053

A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service
A Novel Approach for Efficient Resource Utilization and Trustworthy Web ServiceA Novel Approach for Efficient Resource Utilization and Trustworthy Web Service
A Novel Approach for Efficient Resource Utilization and Trustworthy Web ServiceCSCJournals
 
Real time eventual consistency
Real time eventual consistencyReal time eventual consistency
Real time eventual consistencyijfcstjournal
 
Designing distributed systems
Designing distributed systemsDesigning distributed systems
Designing distributed systemsMalisa Ncube
 
Distributed Algorithms
Distributed AlgorithmsDistributed Algorithms
Distributed Algorithms913245857
 
Data Analysis In The Cloud
Data Analysis In The CloudData Analysis In The Cloud
Data Analysis In The CloudMonica Carter
 
Cs556 section2
Cs556 section2Cs556 section2
Cs556 section2farshad33
 
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...IJERA Editor
 
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...iosrjce
 
The Concept of Load Balancing Server in Secured and Intelligent Network
The Concept of Load Balancing Server in Secured and Intelligent NetworkThe Concept of Load Balancing Server in Secured and Intelligent Network
The Concept of Load Balancing Server in Secured and Intelligent NetworkIJAEMSJORNAL
 
Talon systems - Distributed multi master replication strategy
Talon systems - Distributed multi master replication strategyTalon systems - Distributed multi master replication strategy
Talon systems - Distributed multi master replication strategySaptarshi Chatterjee
 
System Structure for Dependable Software Systems
System Structure for Dependable Software SystemsSystem Structure for Dependable Software Systems
System Structure for Dependable Software SystemsVincenzo De Florio
 
DFWUUG -- MySQL InnoDB Cluster & Group Replciation
DFWUUG -- MySQL InnoDB Cluster & Group ReplciationDFWUUG -- MySQL InnoDB Cluster & Group Replciation
DFWUUG -- MySQL InnoDB Cluster & Group ReplciationDave Stokes
 
What is active-active
What is active-activeWhat is active-active
What is active-activeSaif Ahmad
 
Distributed system
Distributed systemDistributed system
Distributed systemchirag patil
 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Damir Delija
 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Damir Delija
 

Ähnlich wie I0935053 (20)

techcodes
techcodestechcodes
techcodes
 
Os
OsOs
Os
 
A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service
A Novel Approach for Efficient Resource Utilization and Trustworthy Web ServiceA Novel Approach for Efficient Resource Utilization and Trustworthy Web Service
A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service
 
Real time eventual consistency
Real time eventual consistencyReal time eventual consistency
Real time eventual consistency
 
Designing distributed systems
Designing distributed systemsDesigning distributed systems
Designing distributed systems
 
Distributed Algorithms
Distributed AlgorithmsDistributed Algorithms
Distributed Algorithms
 
Data Analysis In The Cloud
Data Analysis In The CloudData Analysis In The Cloud
Data Analysis In The Cloud
 
Cs556 section2
Cs556 section2Cs556 section2
Cs556 section2
 
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
 
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
The Grouping of Files in Allocation of Job Using Server Scheduling In Load Ba...
 
J017367075
J017367075J017367075
J017367075
 
The Concept of Load Balancing Server in Secured and Intelligent Network
The Concept of Load Balancing Server in Secured and Intelligent NetworkThe Concept of Load Balancing Server in Secured and Intelligent Network
The Concept of Load Balancing Server in Secured and Intelligent Network
 
Talon systems - Distributed multi master replication strategy
Talon systems - Distributed multi master replication strategyTalon systems - Distributed multi master replication strategy
Talon systems - Distributed multi master replication strategy
 
System Structure for Dependable Software Systems
System Structure for Dependable Software SystemsSystem Structure for Dependable Software Systems
System Structure for Dependable Software Systems
 
Advance DBMS
Advance DBMSAdvance DBMS
Advance DBMS
 
DFWUUG -- MySQL InnoDB Cluster & Group Replciation
DFWUUG -- MySQL InnoDB Cluster & Group ReplciationDFWUUG -- MySQL InnoDB Cluster & Group Replciation
DFWUUG -- MySQL InnoDB Cluster & Group Replciation
 
What is active-active
What is active-activeWhat is active-active
What is active-active
 
Distributed system
Distributed systemDistributed system
Distributed system
 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...
 
Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...Communication network simulation on the unix system trough use of the remote ...
Communication network simulation on the unix system trough use of the remote ...
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Kürzlich hochgeladen (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

I0935053

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 3 (Mar. - Apr. 2013), PP 50 -53 www.iosrjournals.org An Database Query Service In Large Scale Reliable Storage System For Automatic Reconfiguration K.Vinothini 1, Ms. B. Amutha2, B.Renganathan3 1 M.E. (Cse), SrinivasanEngg College, Perambalur. 2 Ap/ Cse, SrinivasanEngg College, Perambalur. 3 M.E. (Cse), SrinivasanEngg College, Perambalur Abstract: Large scale reliable storage system with dynamic membership access is currently facing lot of problems like human configuration errors and it is strong enough only for the static set of replica...An membership service and dBQS carried out the dynamic membership access and dBQS is a novel distributed hash table differ from the usual DHT by providing byzantine fault tolerant and strong semantics. We develop two heuristic algorithm and automatic reconfiguration technique to maintain and carried out those membership services. Experimental result shows that the membership service works well and the membership service is able to manage large system and the cost to maintain the service is low. Index terms- DHT, dBQS,Byzantine fault tolerant I. Introduction Now a days, Byzantine fault tolerant system assumes only static set of replicas and it is having limitations in handling the reconfiguration. Generally network security is to prevent and monitor unauthorized access,misuse and modification of data. Here, we use membership service under network security concept to maintain and carried out the storage system service. The system is classified into two parts as membership service (MS) and dBQS. One is to monitor the membership changes and the other is to automatically reconfigure the system respectively. Automatic reconfiguration is mainly done in MS to avoid human configuration errors and dBQS(data base query services) is differ from usual DHT by providing strong semantics and it is an byzantine fault tolerant by extending the existing byzantine quorum protocol.MS is itself an byzantine fault tolerant and it produces configuration periodically rather than changes an membership. The MS may need to move to new group of servers in case of reconfiguration for this we allow the system to operate correctly, even there is an failure bound in the original group of Ms relicas.an Byzantine-fault- tolerant group is designed for this reconfiguration and our results shows that the MS is able to manage the storage system of replicas with low cost. II.Related Work A group membership protocol enables processes in a distributed system to agree on a group of processes that are currently operational. Membership protocols are a core component of many distributed system and have proved to be fundamental for maintaining availability and consistency in distributed applications. We present am membership protocol for asynchronous distributed system that tolerates the malicious corruption of group members. Our protocols ensure that correct members control and consistency observe changes to the group membership, provided that in each instance of the group membership, fewer than one-third of the members are corrupted or fail benignly. The protocol semantics shows that Uniqueness is common to much membership protocol and also stronger than ordering semantics of various protocols. Uniqueness is that if pi and pj are correct and vixandvjx are defined, then vix=vjx. The protocol has many potential applications in secure systems and, in particular, is a central component of a toolkit for constructing secure and fault-tolerant distributed services that we have implemented. The Membership protocol implementation for an atomic broadcast a set of techniques that make such a tool kit practical. Membership protocol is suitable for used in distributed system in which some process may be corrupted by a malicious intruder. This protocol achieves is an asynchronous system, provided that in each instance of the group membership, fewer than one-third of the group members are corrupted or fail. Although the protocol can be used to remove them from the group once detected. The main drawbacks of the protocols are their relatively large round complexity for group merge operations. This approach is that the resulting protocols are not optimal in their performance, i.e., the compiler adds a certain overhead of additional messages which do not seem necessary. www.iosrjournals.org 50 | Page
  • 2. An Database Query Service In Large Scale Reliable Storage System For Automatic Reconfiguration The service Rambo, which stands for “Reconfigurable Atomic Memory” for Basic Objects The rest of the paper, presents our algorithm and its analysis. The algorithm carries out three major activities, all concurrently: reading and writing objects, introducing new configurations, and removing (“garbage-collecting”) obsolete configurations. The algorithm is composed of a main algorithm, which handles reading, writing, and garbage-collection, and a global reconfiguration service, Recon, which provides the main algorithm with a consistent sequence of configurations. Reconfiguration is loosely coupled to the main algorithm, in particular, several configurations may be known to the algorithm at one time and read and write operations can use them all. III. Techniques 3.1 STORAGE Byzantine Quorum Protocol, It’s used to handle changes in replica set, and it provides strong semantics. That is, to enable them to be reconfigurable while continuing to provide atomic semantics across changes in the replica set. It includes protocols for read and writes operations and processing of messages during replica changes. Each object is stored at n=3f+1 nodes and quorums consist of any subset containing 2f+1 node. A description of the client-side read and writes protocols for 2 functions are shown below, Write (data) Send messages to the replicas in the group that stores and wait for valid responses, all for server. Then send messages to all replicas and wait for valid response. The write operation for a public-key object will normally has two phases. In the read phase, a quorum of 2f+1replicas iscontacted to obtain a set of version numbers for the object. Read (data) Send messages to the replicas in the group that stores and wait for valid responses, all for server, send messages to all replicas and wait for valid response. Then return data to the user. To perform a read operation, the client requests the object from all replicas in the read phase. Normally, there will be 2f+1 valid reply that provide the same version number; in this case the result is the correct response and the operation completes. However, if the read occurs concurrently with a write, the version numbers may not agree. As shown in fig 1.1 the user get back the data from server for that write-back operation is used In this case, there is a write-back phase in which the client picks the response with the highest version number, writes it to all replicas, and waits for a reply from a quorum. 3.2 PBFT Practical Byzantine Fault Tolerance (PBFT), it describes a new replication algorithm that tolerates Byzantine faults and practical (asynchronous environment, better performance). The algorithm provides safety if all non-faulty replicas agree on the sequence numbers of requests that commit locally. It provides replicas must change view if they are unable to execute a request. Replicas probe independently, and a replica proposes an eviction for a server node that has missed propose probe responses. Fig 1.1 System Architecture www.iosrjournals.org 51 | Page
  • 3. An Database Query Service In Large Scale Reliable Storage System For Automatic Reconfiguration It does this by sending eviction messages toothier MS replicas, and then, waiting for signed statements from at least fMS+1 MS replicas (including itself) that agree to evict that node. Other MS replicas accept the eviction (and sign a statement saying so). If their last nevictpings for that node have failed, where nevict<npropose. Because the initiation of the eviction waited a bit longer than necessary, most eviction proposals will succeed if the node is really down. IV.Experimental Result We implemented the membership service and dBQS. Our experiments show that our approach is practical and could be used in a real deployment: the MS can manage a very large number of servers and reconfigurations have little impact on the performance of the replicated service. Throughout our experiments, we tried to determine how system components interfere with each other. For this experiment, the replica doing the pings was associated with an instance of dBQS (since we intend to run committees on system nodes). We repeated the experiment under three different degrees of activity of the dBQS server: when it is not serving any data (which will be the case when the MS does the pings and runs on special nodes that don’t also handle the application), when it is handling 30 queries/second, and when clients saturate the server with constant requests, which leads to the maximal number of about 300 queries/second. Each query requested a download of a 512 byte block. little impact on the performance of the replicated service. V. Conclusion And Future Work A dynamically changing system membership in a large scale reliable storage system is maintained and carried by a special service. For that we provide a membership service that track the system periodically and notify the changes by using storage and PBFT algorithm. By which the system will reconfigured automatically. In future research, the more committees are needed for the data will be needed in the system size increases. The Membership service can accept the committee dynamically is based on system size and to add extension of our system. The design of a mechanism to determine which machines to place file replicas on the other file to use membership service. References [1] Birman. K and T. Joseph, “Exploiting Virtual Synchrony in Distributed Systems,” Proc. 11th ACM Symp. Operating Systems Principles, pp. 123-138, Nov. 2007. [2] Clement. A, M. Marchetti, E. Wong, L. Alvisi, and M. Dahlin,“Making Byzantine Fault Tolerant Systems Tolerate ByzantineFaults,” Proc. Sixth USENIX Symp. Networked Systems Design and Implementation (NSDI ’09), Apr. 2009. [3] Cowling. J, D.R.K. Ports, B. Liskov, R.A. Popa, and A. Gaikwad, “Census: Location-Aware Membership Management for Large- Scale Distributed Systems,” Proc. Ann. Technical Conf. (USENIX ’09), June 2009 [4] Chen.K., “Authentication in a Reconfigurable Byzantine Fault Tolerant System,” master’s thesis, Massachusetts Inst. of Technology, July 2004. [5] Castro.M and B. Liskov, “Practical Byzantine Fault Tolerance,” Proc. Third Symp.Operating Systems Design and Implementation (OSDI ’99), Feb. 1999. [6] Dabek.F., M.F. Kaashoek, D. Karger, R. Morris, and I. Stoica,“Wide-Area Cooperative Storage with CFS,” Proc. 18th ACM Symp. Operating Systems Principles (SOSP ’01), Oct. 2001. [7] Douceur.J., “The Sybil Attack,” Proc. First Int’l Workshop Peer-to-Peer Systems (IPTPS ’02), 2002. [8] DeCandia.G, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels, “Dynamo: Amazon’s Highly Available Key-Value Store,” Proc. 21st ACM Symp. Operating Systems Principles, pp. 205-220,2007. [9] Lynch. N. and A.A. Shvartsman, “Rambo: A Reconfigurable Atomic Memory Service,” Proc. 16th Int’l Symp. Distributed Computing (DISC ’02), 2002. [10] Rodrigo Rodrigues, Barbara Liskov, Member, IEEE, Kathryn Chen, Moses Liskov, and David Schultz “Automatic Reconfiguration for Large-Scale Reliable Storage Systems”-IEEE transaction on dependable and secure computing. [11] Reiter.M., “A Secure Group Membership Protocol,” IEEE Trans. Software Eng., vol. 22, no. 1, pp. 31-42, Jan. 1996. www.iosrjournals.org 52 | Page
  • 4. An Database Query Service In Large Scale Reliable Storage System For Automatic Reconfiguration AUTHORS PROFILE Ms.K.vinothinigot B.Tech degree in information technology and now she is doing her M.E (computer science and engineering) in srinivasan engineering college,perambalur,TN,India Ms.B.Amuthais working as Assistant Proffessor/CSE insrinivasan engineering college,perambalur,TN,India Mr.B.Renganathangot B.Tech degree in information technology and now he is doing his M.E (computer science and engineering) in srinivasan engineering college,perambalur,TN,India www.iosrjournals.org 53 | Page