SlideShare a Scribd company logo
http://www.iaeme.com/IJCET/index.asp 94 editor@iaeme.com
International Journal of Computer Engineering & Technology (IJCET)
Volume 7, Issue 1, Jan-Feb 2016, pp. 94-99, Article ID: IJCET_07_01_011
Available online at
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=1
Journal Impact Factor (2016): 9.3590 (Calculated by GISI) www.jifactor.com
ISSN Print: 0976-6367 and ISSN Online: 0976–6375
© IAEME Publication
___________________________________________________________________________
DISASTER DETECTION PLANS IN
DISTRIBUTED SYSTEMS
Dhanashri D. Dhokate
Assistant Prof, Information Tech,
PVPIT, Budhgaon (Sangli)
B. S. Patil
Associate Prof. Electronics Department
PVPIT, Budhgaon (Sangli)
ABSTRACT
The business continuity plan describes the steps an organization takes
when it cannot operate normally because of natural or manmade disaster. It
may be written for a specific business process or may address for mission
critical business processes. Business continuity and disaster recovery are
critical components used to ensure that the systems essential to the operation
of organization are available when needed. This is important to control the
MTD (Mean Tolerable Downtime).
A distributed disaster detection system that is based on agents. Disaster
Recovery Plans is a crucial part of the life of an IT center in an organization;
it contains policies and procedures to be applied before, during, and after a
disaster of an IT system. However, an important part of the disaster recovery
process comes when the disaster occurs up until the disaster recovery plan is
activated. This is precious time to detect and declare a disaster especially in
critical systems.
Here, is a distributed disaster detection system that is based on agents.
Agents are to be located on different servers in a data center and the will
communicate with a central management unit. The Disaster recovery plan is
aimed to complement the work of an existing disaster recovery system, or to
run stand-alone if no disaster recovery system exists and act as a warning tool
aiding the system administrator.
Cite this Article: Dhanashri D. Dhokate and B. S. Patil. Disaster Detection
Plans In Distributed Systems. International Journal of Computer Engineering
and Technology, 7(1), 2016, pp. 94-99.
http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=1
Disaster Detection Plans In Distributed Systems
http://www.iaeme.com/IJCET/index.asp 95 editor@iaeme.com
INTRODUCTION
The common perception about disasters is that it can be caused by nature (volcanoes,
floods, earthquakes, tsunamis…etc.) or by human action (wars, malicious activities….
etc.). Disaster Recovery can be defined as “(DR) Planning and implementation of
procedures and facilities for use when essential systems are not available for a period
long enough to have a significant impact on the business”. Table 1 shows the
percentage of disaster causes. Smaller disasters occur more frequently; thus, they have
significant impact on the systems and would cause serious downtime and outages.
Therefore, one can argue that a software detection system that can prove helpful in the
95% (by summing the top 3 causes shown it Table 1) of the total disasters is wise
investment and can provide a valuable addition to any data center alongside the
traditional disaster recovery systems.
Table 1 The percentage of disaster causes.
Rank Disaster Cause Percentage
1 Hardware/Infrastructure failure 55%
2 Human error 22%
3 Software failure 18%
4 Natural disaster 5%
This is especially true given that some disaster recovery systems have no detection
and warning mechanism and are applied manually. We don’t suggest that Distributed
Disaster Detection plan given here is to replace existing DR solution but to
complement it. This system can also run without ad DR solution and thus it is a low
cost system to monitor and warn against possible failure of hardware, software or
human errors.
DISASTER DETECTION OVERVIEW
The fig 1. Shows Disaster Timeline, showing MTD, RTO and Pre-recovery times.
Figure 1 Disaster Timeline, showing MTD, RTO and Pre-recovery times
Dhanashri D. Dhokate and B. S. Patil
http://www.iaeme.com/IJCET/index.asp 96 editor@iaeme.com
The disaster can be declared by:
1. Manually: the system administrator declares it and the recovery process is initiated
2. Automatically: system detects some abnormality and the absence of some services
and declares a disaster and automatically starts the recovery process.
3. System-assisted: declaration, here the system has no privilege of declaring the
disaster; however, the detection system will alert the system administrator to take
action. Table 2 shows Disaster and declaration approaches.
Table 2 Disaster and declaration approaches
System Advantages Disadvantages
Manually -Minimizes false
negative
-cheaper
Need human attention 24/7;
therefore, can cause major
delay
Automated Fast response High rate of false-positive
System-
assisted
Combine both
advantages
Cost of resource allocation
and needs constant monitoring
One critical point as seen in Figure 1 above is the outage of some of the services
which will result in a time where some data and services are disrupted; at this point
the disaster is declared.
Both the advantages and disadvantages of each of the systems are previewed in
Table 2 above. Besides, as with any detection system; a level of certainty is always
factor in wither to declare a disaster or not; the typical four cases are shown in Table 3
below:
Table 3 Cases to decide to declare a disaster or not.
Case Description Result
False-negative The system continue working No alert
True-negative
The system declare a disaster by
mistake
Alert
False-positive
The system fails to detect or
uncertain to declare a disaster
No alert
True-positive
The system successfully detects a
disaster and declare it
Alert
One important factor in detecting a disaster is the detection rate.
DISASTER DETECTION SYSTEM
The automated detection and warning system of disasters plays an important role in
the disaster recovery. Indeed, it can improve maximum tolerable downtime (MTD) by
minimizing the pre-recovery time by giving earlier signs of disaster. Thus, Disaster
Detection plan will trigger the DR system if the detection returned a positive result.
Fig.2 shows the Disaster detection system.
Disaster Detection Plans In Distributed Systems
http://www.iaeme.com/IJCET/index.asp 97 editor@iaeme.com
Figure 2 Diaster detection system
The disaster detection system consists of:
Agents:
An agent is basically a thread running on a system (an actual server) this thread
monitors some files carefully placed in different location on the system. This thread
will monitor those files for any change of contents, then, whenever a change occur
will send a message to the local management system and alert of an “integrity” issue.
Moreover, if the thread could not reach a certain file then it will send a different
message as an alert of “availability” issue.
These threads will run in the background and should consume negligible amount
of resources. The administrator should configure and set the threshold values. The
agent will send a 3- tuple message containing:
– Agent ID
– Location of the issue
– issue “Availability” or “Integrity” or both.
Following is the algorithm of the agent and how messages are exchanged within
the system with the management center.
Algorithm: Agent
S= {Availabilty_issue,Integrity_Issue,No_Issues}
Agent (I, L, S)
If! Read (location)
Return (id, loc_id, Availability_Issue);
If (location! = data)
Return (id, loc_id, Integrity_Issue);
Data =new_data;
Dhanashri D. Dhokate and B. S. Patil
http://www.iaeme.com/IJCET/index.asp 98 editor@iaeme.com
Write (location; new_data);
Return (id, void, NO_ISSUES)
Management Centers
The management center is a thread which will be located at each system (server), they
communicate with the virtual Agents and each management center will receive 2-
tuple messages from the Agents and will compile a report message to be forwarded as
2-tuple message to the master management center as follows:
– System I.D.
– Type of issue detected.
Following is the basic algorithm for management and how the messages are
exchanged with agents and with the master management center.
Algorithm: Management
Call the agent Agent (I, L, S)
If (S! =No_Issues)
Return (I,S)
Else call the next agent
Return (NO_ISSUES)
Master Management Center
This is the head of the system, the system receives messages from all management
center and then determine wither to alert admin or administration system about a
possible disaster based on a preset threshold. Hence, the administrator can have a
sensitive system or a less sensitive system based on criticality of server. For example,
the master management system can give more weight to critical systems and less
weight to the non-essential systems.
Following is the basic algorithm for the master management center and how the
messages are exchanged with management centers; and how the Disaster Detection
plan passes messages to the system administrator.
Algorithm: Master_Management_Center.
Management (I, S);
Print_line (“Server:”, I,”has”, S)
A system administrator can have a dashboard to check on system issues and
trigger a disaster recovery. On the other hand the master management center module
given can be linked directly to existing DR system to have fully automated disaster
detection and recovery system.
Disaster Detection Plans In Distributed Systems
http://www.iaeme.com/IJCET/index.asp 99 editor@iaeme.com
CONCLUSION
The system is basically based on passing messages about the status of each system
and will help give an assessment about the system’s health. a simple software system
to give an early alert of disasters caused mostly by hardware failures, human errors
and malicious attacks.
The system is completely a software system; the cost to deploy is negligible.
However, the running cost is linked to the required configurations; in other words, if
the system sends more status messages it will consume some bandwidth and
processing resources, if the configuration is with less messages, these side-effects will
also be negligible.
Given the advantage of not having to install special hardware for disaster
recovery; on the other hand, it is obvious that the main limitation of the system is that
if all servers got down. Thus, the system will also fail; the system is effective against
security threats, limited hardware or software failures.
REFERENCES
[1] Denning, Dorothy E., An Intrusion Detection Model, Proceedings of the Seventh
IEEE Symposium on Security and Privacy, May 1986, pages 119–131Fff
[2] Alghamdi, Hanaan and Alaama, Arwa, DRP-DRP: Data Replication Protocol for
Disaster Recovery Planning, International Conference on Innovations in
Information Technology, 2008. Pp 228-232.
[3] Ceballos, Juan DiPasquale, Richard; Feldman, Robert, Business continuity and
security in datacenter interconnection, Bell Labs Technical Journal., Volume: 17
Issue: 3, 2012.
[4] http://www.latisys.com/blog-post/top-4-causes-of-it-disasters, April, 4th 2014.
Jennifer Curry, Top four disaster causes,
[5] http://dictionary.reference.com/browse/disaster-recovery, October 2015.
[6] Colburn, Robert, Sound the Alarm: A History of Disaster Detection and Warning
Technologies, The IEEE institute newsletter, September 9 2013.
[7] Flowers, April, NASA Builds GPS-Based System For Detecting Natural
Disasters http://www.redorbit.com/news/science/1113025581/nasa-gps-system-
detects-natural-disasters-121113/
[8] Y. Ren, M. Chuah, J. Yang, Y. Chen, MUTON: detecting malicious nodes in
disruption-tolerant networks, IEEE WCNC 2010, April, 2010

More Related Content

PDF
FEEDBACK ICANE FOR STROKE PATIENT
PDF
Software Application for E-Health Monitoring System
PDF
IRJET- Smart Medical Assistant using Wearable Device
PPTX
predictive maintenance
PDF
Design of Self-Learning System for Diagnosing Health Parameters using ANFIS
PDF
IRJET- Preliminary Medical Monitoring System in Ambulance for Rescue of Accid...
PDF
IRJET- Diabetes Prediction using Random Forest Classifier and Intelligent Die...
PDF
Recovery Prediction in the Framework of Cloud-Based Rehabilitation Exergame
FEEDBACK ICANE FOR STROKE PATIENT
Software Application for E-Health Monitoring System
IRJET- Smart Medical Assistant using Wearable Device
predictive maintenance
Design of Self-Learning System for Diagnosing Health Parameters using ANFIS
IRJET- Preliminary Medical Monitoring System in Ambulance for Rescue of Accid...
IRJET- Diabetes Prediction using Random Forest Classifier and Intelligent Die...
Recovery Prediction in the Framework of Cloud-Based Rehabilitation Exergame

What's hot (20)

PDF
E paper-IOT based-medical-emergency-detection-and-rescue
PDF
Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes
DOCX
IT4215-Info SecurityGroup-2-Disaster-Recovery-Plan-Final
PDF
IRJET - Review on Classi?cation and Prediction of Dengue and Malaria Dise...
PDF
IRJET- Disaster Management System using Web
PDF
Techtiles-FDR
PDF
Ijetcas14 395
PDF
A Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
PDF
WEARABLE HEALTH MONITORING SYSTEM FOR BABIES
PDF
Application of mobile cloud computing in emergency health care
PDF
The International Journal of Engineering and Science (The IJES)
PDF
IRJET - Heartbeat Monitoring and Heart Attack Detection using IoT(Interne...
PDF
Wearable System for Vital Signs Measurement
PDF
Predicting the Maintenance of Aircraft Engines using LSTM
PDF
IRJET- Predicting Heart Disease using Machine Learning Algorithm
PDF
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
PDF
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
DOCX
KEB supply failure
PDF
IRJET - IoT based E-Prognosis System
E paper-IOT based-medical-emergency-detection-and-rescue
Information Retrieval from Emotions and Eye Blinks with help of Sensor Nodes
IT4215-Info SecurityGroup-2-Disaster-Recovery-Plan-Final
IRJET - Review on Classi?cation and Prediction of Dengue and Malaria Dise...
IRJET- Disaster Management System using Web
Techtiles-FDR
Ijetcas14 395
A Real Time Intelligent Driver Fatigue Alarm System Based On Video Sequences
WEARABLE HEALTH MONITORING SYSTEM FOR BABIES
Application of mobile cloud computing in emergency health care
The International Journal of Engineering and Science (The IJES)
IRJET - Heartbeat Monitoring and Heart Attack Detection using IoT(Interne...
Wearable System for Vital Signs Measurement
Predicting the Maintenance of Aircraft Engines using LSTM
IRJET- Predicting Heart Disease using Machine Learning Algorithm
AUTOMATION IN ANESTHESIA ADMINISTRATION USING FIELD PROGRAMMABLE GATE ARRAY
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
KEB supply failure
IRJET - IoT based E-Prognosis System
Ad

Viewers also liked (19)

PPTX
book ppt
PPS
Verdades Bíblicas - Ordenanças do Novo Testamento
PPS
Verdades Bíblicas - O Viver Saudável
PPTX
Digital Marketing Face of art technologies Ltd
PPTX
Tradições da madeira Samanta 4ºB
PPS
Verdades Bíblicas - Padrões Cristãos
PPS
Verdades Bíblicas - Sinais da Segunda Vinda de Cristo
DOCX
Bab 2 math ting 2
PPTX
Digital Marketing Face of art technologies Ltd
PPS
Verdades Bíblicas - Os 04 Animais e O Chifre Pequeno de Daniel 7
PDF
Speaking lesson plan
PPT
Postmodern shifts in realities session 3 (2)
PDF
INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI...
DOCX
Ahşap Muayene Masası
PPTX
Frank o gehry
PPTX
La mujer en Grecia y Roma
PPT
9 postmodern imagination and mission
PDF
Family plan
PPTX
Meetings V1
book ppt
Verdades Bíblicas - Ordenanças do Novo Testamento
Verdades Bíblicas - O Viver Saudável
Digital Marketing Face of art technologies Ltd
Tradições da madeira Samanta 4ºB
Verdades Bíblicas - Padrões Cristãos
Verdades Bíblicas - Sinais da Segunda Vinda de Cristo
Bab 2 math ting 2
Digital Marketing Face of art technologies Ltd
Verdades Bíblicas - Os 04 Animais e O Chifre Pequeno de Daniel 7
Speaking lesson plan
Postmodern shifts in realities session 3 (2)
INSTANCE BASED MULTI CRITERIA DECISION MODEL FOR CLOUD SERVICE SELECTION USI...
Ahşap Muayene Masası
Frank o gehry
La mujer en Grecia y Roma
9 postmodern imagination and mission
Family plan
Meetings V1
Ad

Similar to DISASTER DETECTION PLANS IN DISTRIBUTED SYSTEMS (20)

PDF
A Proposed Model For IT Disaster Recovery Plan
PDF
A Proposed Model for IT Disaster Recovery Plan
PDF
Practical_Guide_for_Disaster_Avoidance
PDF
Mastering disaster a data center checklist
PPTX
PACE-IT, Security+2.8: Disaster Recovery Concepts
PPTX
Preservation Section Disaster Planning Presentation (SAA 2010)
PDF
Mobile App for Disaster Management & Information Technology in Emergency Prep...
PDF
Mastering disaster e book Telehouse
PPTX
MISO L008 Disaster Recovery Plan
PDF
What are the risks that may affect the availability of a data center
PDF
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
PDF
Disaster recovery white_paper
PPTX
Information Technology Disaster Planning
PDF
NetIQ Disaster Recovery ebook
PPTX
04. availability-concepts
PPTX
Disaster Recovery Plan for network systems.pptx
PDF
Disaster Recovery and Administration Portal
PDF
Disaster Planning: What Organizations Need to Know to Protect Their Tech
PDF
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
PPTX
Implementing dr w. hyper v clustering
A Proposed Model For IT Disaster Recovery Plan
A Proposed Model for IT Disaster Recovery Plan
Practical_Guide_for_Disaster_Avoidance
Mastering disaster a data center checklist
PACE-IT, Security+2.8: Disaster Recovery Concepts
Preservation Section Disaster Planning Presentation (SAA 2010)
Mobile App for Disaster Management & Information Technology in Emergency Prep...
Mastering disaster e book Telehouse
MISO L008 Disaster Recovery Plan
What are the risks that may affect the availability of a data center
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Disaster recovery white_paper
Information Technology Disaster Planning
NetIQ Disaster Recovery ebook
04. availability-concepts
Disaster Recovery Plan for network systems.pptx
Disaster Recovery and Administration Portal
Disaster Planning: What Organizations Need to Know to Protect Their Tech
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Implementing dr w. hyper v clustering

More from IAEME Publication (20)

PDF
IAEME_Publication_Call_for_Paper_September_2022.pdf
PDF
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
PDF
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
PDF
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
PDF
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
PDF
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
PDF
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
PDF
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
PDF
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
PDF
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
PDF
GANDHI ON NON-VIOLENT POLICE
PDF
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
PDF
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
PDF
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
PDF
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
PDF
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
PDF
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
PDF
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
PDF
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
PDF
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT

Recently uploaded (20)

PDF
Well-logging-methods_new................
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Digital Logic Computer Design lecture notes
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Welding lecture in detail for understanding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
additive manufacturing of ss316l using mig welding
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
PPT on Performance Review to get promotions
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
Well-logging-methods_new................
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Embodied AI: Ushering in the Next Era of Intelligent Systems
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
OOP with Java - Java Introduction (Basics)
Digital Logic Computer Design lecture notes
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Welding lecture in detail for understanding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
additive manufacturing of ss316l using mig welding
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT on Performance Review to get promotions
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Automation-in-Manufacturing-Chapter-Introduction.pdf

DISASTER DETECTION PLANS IN DISTRIBUTED SYSTEMS

  • 1. http://www.iaeme.com/IJCET/index.asp 94 editor@iaeme.com International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 94-99, Article ID: IJCET_07_01_011 Available online at http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=1 Journal Impact Factor (2016): 9.3590 (Calculated by GISI) www.jifactor.com ISSN Print: 0976-6367 and ISSN Online: 0976–6375 © IAEME Publication ___________________________________________________________________________ DISASTER DETECTION PLANS IN DISTRIBUTED SYSTEMS Dhanashri D. Dhokate Assistant Prof, Information Tech, PVPIT, Budhgaon (Sangli) B. S. Patil Associate Prof. Electronics Department PVPIT, Budhgaon (Sangli) ABSTRACT The business continuity plan describes the steps an organization takes when it cannot operate normally because of natural or manmade disaster. It may be written for a specific business process or may address for mission critical business processes. Business continuity and disaster recovery are critical components used to ensure that the systems essential to the operation of organization are available when needed. This is important to control the MTD (Mean Tolerable Downtime). A distributed disaster detection system that is based on agents. Disaster Recovery Plans is a crucial part of the life of an IT center in an organization; it contains policies and procedures to be applied before, during, and after a disaster of an IT system. However, an important part of the disaster recovery process comes when the disaster occurs up until the disaster recovery plan is activated. This is precious time to detect and declare a disaster especially in critical systems. Here, is a distributed disaster detection system that is based on agents. Agents are to be located on different servers in a data center and the will communicate with a central management unit. The Disaster recovery plan is aimed to complement the work of an existing disaster recovery system, or to run stand-alone if no disaster recovery system exists and act as a warning tool aiding the system administrator. Cite this Article: Dhanashri D. Dhokate and B. S. Patil. Disaster Detection Plans In Distributed Systems. International Journal of Computer Engineering and Technology, 7(1), 2016, pp. 94-99. http://www.iaeme.com/IJCET/issues.asp?JType=IJCET&VType=7&IType=1
  • 2. Disaster Detection Plans In Distributed Systems http://www.iaeme.com/IJCET/index.asp 95 editor@iaeme.com INTRODUCTION The common perception about disasters is that it can be caused by nature (volcanoes, floods, earthquakes, tsunamis…etc.) or by human action (wars, malicious activities…. etc.). Disaster Recovery can be defined as “(DR) Planning and implementation of procedures and facilities for use when essential systems are not available for a period long enough to have a significant impact on the business”. Table 1 shows the percentage of disaster causes. Smaller disasters occur more frequently; thus, they have significant impact on the systems and would cause serious downtime and outages. Therefore, one can argue that a software detection system that can prove helpful in the 95% (by summing the top 3 causes shown it Table 1) of the total disasters is wise investment and can provide a valuable addition to any data center alongside the traditional disaster recovery systems. Table 1 The percentage of disaster causes. Rank Disaster Cause Percentage 1 Hardware/Infrastructure failure 55% 2 Human error 22% 3 Software failure 18% 4 Natural disaster 5% This is especially true given that some disaster recovery systems have no detection and warning mechanism and are applied manually. We don’t suggest that Distributed Disaster Detection plan given here is to replace existing DR solution but to complement it. This system can also run without ad DR solution and thus it is a low cost system to monitor and warn against possible failure of hardware, software or human errors. DISASTER DETECTION OVERVIEW The fig 1. Shows Disaster Timeline, showing MTD, RTO and Pre-recovery times. Figure 1 Disaster Timeline, showing MTD, RTO and Pre-recovery times
  • 3. Dhanashri D. Dhokate and B. S. Patil http://www.iaeme.com/IJCET/index.asp 96 editor@iaeme.com The disaster can be declared by: 1. Manually: the system administrator declares it and the recovery process is initiated 2. Automatically: system detects some abnormality and the absence of some services and declares a disaster and automatically starts the recovery process. 3. System-assisted: declaration, here the system has no privilege of declaring the disaster; however, the detection system will alert the system administrator to take action. Table 2 shows Disaster and declaration approaches. Table 2 Disaster and declaration approaches System Advantages Disadvantages Manually -Minimizes false negative -cheaper Need human attention 24/7; therefore, can cause major delay Automated Fast response High rate of false-positive System- assisted Combine both advantages Cost of resource allocation and needs constant monitoring One critical point as seen in Figure 1 above is the outage of some of the services which will result in a time where some data and services are disrupted; at this point the disaster is declared. Both the advantages and disadvantages of each of the systems are previewed in Table 2 above. Besides, as with any detection system; a level of certainty is always factor in wither to declare a disaster or not; the typical four cases are shown in Table 3 below: Table 3 Cases to decide to declare a disaster or not. Case Description Result False-negative The system continue working No alert True-negative The system declare a disaster by mistake Alert False-positive The system fails to detect or uncertain to declare a disaster No alert True-positive The system successfully detects a disaster and declare it Alert One important factor in detecting a disaster is the detection rate. DISASTER DETECTION SYSTEM The automated detection and warning system of disasters plays an important role in the disaster recovery. Indeed, it can improve maximum tolerable downtime (MTD) by minimizing the pre-recovery time by giving earlier signs of disaster. Thus, Disaster Detection plan will trigger the DR system if the detection returned a positive result. Fig.2 shows the Disaster detection system.
  • 4. Disaster Detection Plans In Distributed Systems http://www.iaeme.com/IJCET/index.asp 97 editor@iaeme.com Figure 2 Diaster detection system The disaster detection system consists of: Agents: An agent is basically a thread running on a system (an actual server) this thread monitors some files carefully placed in different location on the system. This thread will monitor those files for any change of contents, then, whenever a change occur will send a message to the local management system and alert of an “integrity” issue. Moreover, if the thread could not reach a certain file then it will send a different message as an alert of “availability” issue. These threads will run in the background and should consume negligible amount of resources. The administrator should configure and set the threshold values. The agent will send a 3- tuple message containing: – Agent ID – Location of the issue – issue “Availability” or “Integrity” or both. Following is the algorithm of the agent and how messages are exchanged within the system with the management center. Algorithm: Agent S= {Availabilty_issue,Integrity_Issue,No_Issues} Agent (I, L, S) If! Read (location) Return (id, loc_id, Availability_Issue); If (location! = data) Return (id, loc_id, Integrity_Issue); Data =new_data;
  • 5. Dhanashri D. Dhokate and B. S. Patil http://www.iaeme.com/IJCET/index.asp 98 editor@iaeme.com Write (location; new_data); Return (id, void, NO_ISSUES) Management Centers The management center is a thread which will be located at each system (server), they communicate with the virtual Agents and each management center will receive 2- tuple messages from the Agents and will compile a report message to be forwarded as 2-tuple message to the master management center as follows: – System I.D. – Type of issue detected. Following is the basic algorithm for management and how the messages are exchanged with agents and with the master management center. Algorithm: Management Call the agent Agent (I, L, S) If (S! =No_Issues) Return (I,S) Else call the next agent Return (NO_ISSUES) Master Management Center This is the head of the system, the system receives messages from all management center and then determine wither to alert admin or administration system about a possible disaster based on a preset threshold. Hence, the administrator can have a sensitive system or a less sensitive system based on criticality of server. For example, the master management system can give more weight to critical systems and less weight to the non-essential systems. Following is the basic algorithm for the master management center and how the messages are exchanged with management centers; and how the Disaster Detection plan passes messages to the system administrator. Algorithm: Master_Management_Center. Management (I, S); Print_line (“Server:”, I,”has”, S) A system administrator can have a dashboard to check on system issues and trigger a disaster recovery. On the other hand the master management center module given can be linked directly to existing DR system to have fully automated disaster detection and recovery system.
  • 6. Disaster Detection Plans In Distributed Systems http://www.iaeme.com/IJCET/index.asp 99 editor@iaeme.com CONCLUSION The system is basically based on passing messages about the status of each system and will help give an assessment about the system’s health. a simple software system to give an early alert of disasters caused mostly by hardware failures, human errors and malicious attacks. The system is completely a software system; the cost to deploy is negligible. However, the running cost is linked to the required configurations; in other words, if the system sends more status messages it will consume some bandwidth and processing resources, if the configuration is with less messages, these side-effects will also be negligible. Given the advantage of not having to install special hardware for disaster recovery; on the other hand, it is obvious that the main limitation of the system is that if all servers got down. Thus, the system will also fail; the system is effective against security threats, limited hardware or software failures. REFERENCES [1] Denning, Dorothy E., An Intrusion Detection Model, Proceedings of the Seventh IEEE Symposium on Security and Privacy, May 1986, pages 119–131Fff [2] Alghamdi, Hanaan and Alaama, Arwa, DRP-DRP: Data Replication Protocol for Disaster Recovery Planning, International Conference on Innovations in Information Technology, 2008. Pp 228-232. [3] Ceballos, Juan DiPasquale, Richard; Feldman, Robert, Business continuity and security in datacenter interconnection, Bell Labs Technical Journal., Volume: 17 Issue: 3, 2012. [4] http://www.latisys.com/blog-post/top-4-causes-of-it-disasters, April, 4th 2014. Jennifer Curry, Top four disaster causes, [5] http://dictionary.reference.com/browse/disaster-recovery, October 2015. [6] Colburn, Robert, Sound the Alarm: A History of Disaster Detection and Warning Technologies, The IEEE institute newsletter, September 9 2013. [7] Flowers, April, NASA Builds GPS-Based System For Detecting Natural Disasters http://www.redorbit.com/news/science/1113025581/nasa-gps-system- detects-natural-disasters-121113/ [8] Y. Ren, M. Chuah, J. Yang, Y. Chen, MUTON: detecting malicious nodes in disruption-tolerant networks, IEEE WCNC 2010, April, 2010