High Availability of Clouds: Failover Strategies for Cloud Computing Using Integrated Checkpointing Algorithms

Author(s):  
Dilbag Singh ◽  
Jaswinder Singh ◽  
Amit Chhabra
Author(s):  
Linda Apriliana ◽  
Ucuk Darusala Darusalam ◽  
Novi Dian Nathasia

Layanan dan data teknologi Cloud Computing tersimpan pada server, hal ini menjadikan faktor pentingnya server sebagai pendukung ketersediaan layanan. Semakin banyak pengguna yang mengakses layanan tersebut akan mengakibatkan beban kinerja mesin server menjadi lebih berat dan kurang optimal, karena layanan harus bekerja menyediakan data terus-menerus yang dapat diakses kapanpun oleh penggunanya melalui jaringan terkoneksi. Perangkat keras server memiliki masa performa kinerja. Hal serupa dengan perangkat lunak yang dapat mengalami crash. Dengan fungsi server yang memberikan layanan kepada client, server dituntut untuk memiliki tingkat availability yang tinggi. Hal tersebut memungkinkan mesin server mengalami down. Server juga harus dimatikan untuk keperluan pemeliharaan. Penelitian bertujuan ini membangun Clustering Server yang dapat bekerja bersama yang seolah merupakan sistem tunggal diatas lingkungan virtual. Hal ini merupakan solusi untuk mengatasi permasalahan tersebut. Pada penelitian ini penulis menggunakan server virtualisasi proxmox, FreeNAS sebagai server NAS dan DRBD untuk pendukung ketersediaan layanan tinggi dalam lingkup HA, sinkronisasi data dalam High Availability (HA) yang dapat melakukan mirroring sistem kemesin lain. Dengan diterapkannya metode HA dan sinkronasi DRBD serta penggunaan NFS (Network File System) pada sistem cluster didapatkan hasil rata-rata waktu migrasi sebesar 9.7(s) pada node1 menuju node2, 3.7(s) node2 menuju node3, dan 3(s) pada node3 menuju node1. Didaptkan juga waktu downtime yang lebih sedikit yaitu sebesar 0.58 ms pada node1, 0.02 ms pada node2, dan 0.02 ms pada node3.


2012 ◽  
Vol 3 (2) ◽  
pp. 51-59 ◽  
Author(s):  
Nawsher Khan ◽  
A. Noraziah ◽  
Elrasheed I. Ismail ◽  
Mustafa Mat Deris ◽  
Tutut Herawan

Cloud computing is fundamentally altering the expectations for how and when computing, storage, and networking resources should be allocated, managed, consumed, and allow users to utilize services globally. Due to the powerful computing and storage, high availability and security, easy accessibility and adaptability, reliable scalability and interoperability, cost and time effective cloud computing is the top, needed for current fast growing business world. A client, organization or a trade that adopting emerging cloud environment can choose a well suitable infrastructure, platform, software, and a network resource, for any business, where each one has some exclusive features and advantages. The authors first develop a comprehensive classification for describing cloud computing architecture. This classification help in survey of several existing cloud computing services developed by various projects globally such as Amazon, Google, Microsoft, Sun and Force.com and by using this survey’s results the authors identified similarities and differences of the architecture approaches of cloud computing.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
C. Saravanakumar ◽  
M. Geetha ◽  
S. Manoj Kumar ◽  
S. Manikandan ◽  
C. Arun ◽  
...  

Cloud computing models use virtual machine (VM) clusters for protecting resources from failure with backup capability. Cloud user tasks are scheduled by selecting suitable resources for executing the task in the VM cluster. Existing VM clustering processes suffer from issues like preconfiguration, downtime, complex backup process, and disaster management. VM infrastructure provides the high availability resources with dynamic and on-demand configuration. The proposed methodology supports VM clustering process to place and allocate VM based on the requesting task size with bandwidth level to enhance the efficiency and availability. The proposed clustering process is classified as preclustering and postclustering based on the migration. Task and bandwidth classification process classifies tasks with adequate bandwidth for execution in a VM cluster. The mapping of bandwidth to VM is done based on the availability of the VM in the cluster. The VM clustering process uses different performance parameters like lifetime of VM, utilization of VM, bucket size, and task execution time. The main objective of the proposed VM clustering is that it maps the task with suitable VM with bandwidth for achieving high availability and reliability. It reduces task execution and allocated time when compared to existing algorithms.


Author(s):  
Gopal Singh Kushwah ◽  
Virender Ranga

Cloud computing has now become a part of many businesses. It provides on-demand resources to its users based on pay-as-you-use policy, across the globe. The high availability feature of this technology is affected by distributed denial of service (DDoS) attack, which is a major security issue. In this attack, cloud or network resources are exhausted, resulting in a denial of service for legitimate users. In this chapter, a classification of various types of DDoS attacks has been presented, and techniques for defending these attacks in cloud computing have been discussed. A discussion on challenges and open issues in this area is also given. Finally, a conceptual model based on extreme learning machine has been proposed to defend these attacks.


2014 ◽  
Vol 519-520 ◽  
pp. 1325-1328
Author(s):  
De Wen Wang ◽  
Xiao Meng Liu

For the lack of computing, storage, information integration and other aspects in traditional electric power computing platform, it is necessary to introduce cloud computing to it and to build a cloud computing platform based on open source Hadoop to meet the requirements of smart grid. As the single point of failure of Hadoop cannot guarantee the high availability that electric power system requires, this paper gives a solution that based on hot standby mechanism and automatically failover controlled by Zookeeper, analyses availability and disaster recovery times to ensure the electric power system provides fast and accurate service.


Author(s):  
Rosangela Melo ◽  
Vicente Sobrinho ◽  
Ivanildo Filho ◽  
Fábio Feliciano ◽  
Paulo Maciel

Cloud computing offer IT services to the users worldwide based on pay-as-you-go model. Furthermore, architectures and services that are provided by cloud computing system must have high availability, scalability, security and furthermore be fault tolerant. Plan these environments is not an easy task, it is necessary to ensure that undesirable situations or errors do not occur or can be minimized. The use of Sensitivity Analysis combined with the use of modeling hierarchy and the study of models for representing redundancy mechanisms arise in order to investigate the possible changes that these systems suffer and identify their shortcomings and propose improvements solutions for the planning of these systems. The use of redundancy techniques has been used to improve availability. In this work the redundancy mechanisms is a solution to improve the performance of environments in cloud computing.


Sign in / Sign up

Export Citation Format

Share Document