METHODS TO IMPROVE THE FAULT-TOLERANCE OF INTERNET SERVICES

V. Yaskevych, O. Klochko
{"title":"METHODS TO IMPROVE THE FAULT-TOLERANCE OF INTERNET SERVICES","authors":"V. Yaskevych, O. Klochko","doi":"10.28925/2663-4023.2019.3.104111","DOIUrl":null,"url":null,"abstract":". The article deals with the problem of ensuring the fault-tolerance of Internet services. It is becoming increasingly important due to the growth of the quantitative parameters of the functioning of information systems (users, servers, volumes of information in databases) and the level of complexity. Due to the heavy load on the servers on which the applications are deployed, there is a failure of hardware or software. The urgency of finding additional ways to ensure the fault tolerance, reliability and uninterrupted functioning of computer systems operating in real time, due to the increasing requirements for the security of running processes or objects, access to which is limited. Despite the use of existing methods for ensuring fault tolerance in cloud infrastructures, there is a problem of inconsistency between the actual availability of systems and the levels of \"fault tolerance\" (Fault Tolerance) and \"High Availability\" (High Availability) for critical and business critical web applications. Also, less attention is paid to methods of improving fault tolerance for highly loaded systems. Therefore, the search for new opportunities for scaling and load balancing when building cloud systems is of particular importance. To conduct a comparative analysis of load balancing algorithms, functional characteristics were proposed, according to which it is possible to make an informed choice of algorithms that most closely correspond to specific practical circumstances and the requirements of users and providers. The basic principles for implementing a resiliency strategy now include redundancy, diagnostics, reconfiguration, and recovery. As an additional indicator of failover control, it is proposed to apply the completeness of the booking of elements and components of the system, the completeness and reliability of the control, the probability of reserve recovery. The first two strategies assume that a system that correctly performs its functioning algorithm is safe. The safe behavior strategy for failures is used specifically for safe systems and consists in the transition of the system to a protective irreversible state in the event of a failure.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity: Education, Science, Technique","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28925/2663-4023.2019.3.104111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

. The article deals with the problem of ensuring the fault-tolerance of Internet services. It is becoming increasingly important due to the growth of the quantitative parameters of the functioning of information systems (users, servers, volumes of information in databases) and the level of complexity. Due to the heavy load on the servers on which the applications are deployed, there is a failure of hardware or software. The urgency of finding additional ways to ensure the fault tolerance, reliability and uninterrupted functioning of computer systems operating in real time, due to the increasing requirements for the security of running processes or objects, access to which is limited. Despite the use of existing methods for ensuring fault tolerance in cloud infrastructures, there is a problem of inconsistency between the actual availability of systems and the levels of "fault tolerance" (Fault Tolerance) and "High Availability" (High Availability) for critical and business critical web applications. Also, less attention is paid to methods of improving fault tolerance for highly loaded systems. Therefore, the search for new opportunities for scaling and load balancing when building cloud systems is of particular importance. To conduct a comparative analysis of load balancing algorithms, functional characteristics were proposed, according to which it is possible to make an informed choice of algorithms that most closely correspond to specific practical circumstances and the requirements of users and providers. The basic principles for implementing a resiliency strategy now include redundancy, diagnostics, reconfiguration, and recovery. As an additional indicator of failover control, it is proposed to apply the completeness of the booking of elements and components of the system, the completeness and reliability of the control, the probability of reserve recovery. The first two strategies assume that a system that correctly performs its functioning algorithm is safe. The safe behavior strategy for failures is used specifically for safe systems and consists in the transition of the system to a protective irreversible state in the event of a failure.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
提高Internet服务容错性的方法
. 本文研究了保证Internet服务容错的问题。由于信息系统(用户、服务器、数据库中的信息量)的功能的数量参数的增长和复杂性的程度,它正变得越来越重要。由于部署应用程序的服务器负载过重,可能会出现硬件或软件故障。由于对运行过程或对象的安全性要求越来越高,因此迫切需要寻找其他方法来确保实时运行的计算机系统的容错性、可靠性和不间断功能。尽管使用了现有的方法来确保云基础设施中的容错,但对于关键和业务关键型web应用程序,系统的实际可用性与“容错”(fault tolerance)和“高可用性”(High availability)级别之间存在不一致的问题。此外,对提高高负载系统容错能力的方法关注较少。因此,在构建云系统时寻找扩展和负载平衡的新机会尤为重要。为了对负载均衡算法进行比较分析,提出了功能特征,根据这些特征,可以明智地选择最符合具体实际情况以及用户和提供商需求的算法。现在实现弹性策略的基本原则包括冗余、诊断、重新配置和恢复。作为故障切换控制的附加指标,提出了应用系统各要素和部件的预订完备性、控制的完备性和可靠性、备用恢复概率等指标来进行故障切换控制。前两种策略假设正确执行其功能算法的系统是安全的。故障的安全行为策略是专门用于安全系统的,它包括在发生故障时系统向保护不可逆状态的过渡。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS SELECTION OF AGGREGATION OPERATORS FOR A MULTI-CRITERIA EVALUTION OF SUTABILITY OF TERRITORIES GETTING AND PROCESSING GEOPRODITIONAL DATA WITH MATLAB MAPPING TOOLBOX
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1