Backup and Recovery Scheme for Distributed e-learning System

Similar documents
EECS 426. Multimedia Streaming with Caching on Pure P2P-based Distributed e-learning System using Mobile Agent Technologies

Logic-Based Mobile Agent Framework with a Concept of Field

COMBINATION OF XML-RPC AND MOBILE AGENT TECHNOLOGIES

Early Measurements of a Cluster-based Architecture for P2P Systems

Application of a Visual Computer Simulator into Collaborative Learning

FUtella Analysis and Implementation of a Content- Based Peer-to-Peer Network

Building a low-latency, proximity-aware DHT-based P2P network

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

Thwarting Traceback Attack on Freenet

Peer-to-Peer Systems. Chapter General Characteristics

A PROPOSAL OF USER AUTHENTICATION AND A CONTENT DISTRIBUTION MECHANISM USING P2P CONNECTION OVER A MOBILE AD HOC NETWORK

Effect of Links on DHT Routing Algorithms 1

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

Outline A Hierarchical P2P Architecture and an Efficient Flooding Algorithm

Peer-to-Peer Streaming

Preliminary Research on Distributed Cluster Monitoring of G/S Model

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

A Scalable Content- Addressable Network

Symantec Endpoint Protection Installation Guide

A Two-dimensional Structured Overlay Based on Flexible Routing Tables

Survey of the State of P2P File Sharing Applications

Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks

Visible Volume Buffer for Efficient Hair Expression and Shadow Generation

IEICE TRANS. COMMUN., VOL.Exx??, NO.xx MARCH

Telematics Chapter 9: Peer-to-Peer Networks

Development and Evaluation of QoS Measurement System for Internet Applications by Client Observation

Hardware Realization of Panoramic Camera with Direction of Speaker Estimation and a Panoramic Image Generation Function

Distributed Hash Table

DISTRIBUTED COMPUTER SYSTEMS ARCHITECTURES

P2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems

Data deduplication for Similar Files

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission

e-class User Manual v11 (Sep. 2017)

A New Adaptive, Semantically Clustered Peer-to-Peer Network Architecture

P2P Computing. Nobuo Kawaguchi. Graduate School of Engineering Nagoya University. In this lecture series. Wireless Location Technologies

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems

Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices

VANS: Visual Ad hoc Network Simulator

P2P Contents Distribution System with Routing and Trust Management

A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS

Peer to Peer Computing

SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data

Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH

Time-related replication for p2p storage system

On UML2.0 s Abandonment of the Actors- Call-Use-Cases Conjecture

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

SoftEther VPN Server supports the clustering function. This section explains the clustering function.

RESEARCH DEVELOPMENT ON MEASUREMENT FOR COUNTING PEOPLE IN CROWDED SPACE

A Web Page Segmentation Method by using Headlines to Web Contents as Separators and its Evaluations

Mill: Scalable Area Management for P2P Network based on Geographical Location

744 Motooka Nishi-ku Fukuoka , Japan Phone/Fax:

REDUCTION OF PACKET LOSS BY OPTIMIZING THE ANTENNA SYSTEM AND LAYER 3 CODING

Master s Thesis. A Construction Method of an Overlay Network for Scalable P2P Video Conferencing Systems

Peer-peer and Application-level Networking. CS 218 Fall 2003

WEB-BASED COMPUTER VISUAL SIMULATOR An Education Tool with Java Technologies

A Mental Cutting Test on Female Students Using a Stereographic System

Reduction of Packet Loss by Optimizing the Antenna System and Layer 3 Coding

A Scalable Content- Addressable Network

ZigBee Routing Algorithm Based on Energy Optimization

Efficient Resource Management for the P2P Web Caching

Assignment 5. Georgia Koloniari

Communication Method for Remote Device Control using the Internet and its Evaluation

IN recent years, the amount of traffic has rapidly increased

Routing Protocols in MANET: Comparative Study

Topology Evolution in P2P Distributed Networks

A Framework for Peer-To-Peer Lookup Services based on k-ary search

Examplify Student Guide

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs

2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes

Required Identification. Hardware and Software Prerequisites. Access to GCSS-Army Web-Based Training (WBT) depends on thes factors:

IN recent years, car navigation systems are widely used as

A transport-layer approach for achieving predictable throughput for Internet applications

Robot localization method based on visual features and their geometric relationship

Measurement of Pedestrian Groups Using Subtraction Stereo

Integrated Laboratory Network Management System

Assigning Vocation-Related Information to Person Clusters for Web People Search Results

A new MAC protocol for reducing effect of needless transmission deferment induced by missed RTS/CTS handshake

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

ITT Technical Institute. NT1230T Client-Server Networking I Onsite Course SYLLABUS

SYLLABUS. Departmental Syllabus CIST0145. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION

A Finite State Mobile Agent Computation Model

Peer-to-Peer Internet Applications: A Review

Data Structure Optimization of AS_PATH in BGP

Look-ahead Type Detour Path Management Methods Yu Miyoshi, Tatsuyuki Kimura, and Yoshihiro Otsuka

Learning C language Programming with executable flowchart language

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

A Tutorial on Agent Based Software Engineering

A P2P File Sharing Technique by Indexed-Priority Metric

Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet

Simulations of Chord and Freenet Peer-to-Peer Networking Protocols Mid-Term Report

A Site-Exit Router Selection Method Using Routing Header in IPv6 Site Multihoming

Anomaly Detection System for Video Data Using Machine Learning

Atlanta Urban Debate League E-Debate Teaching Project

Effect of Cleaning Level on Topology Optimization of Permanent Magnet Synchronous Generator

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

Security Technologies for Dynamic Collaboration

Introduction on Peer to Peer systems

Transcription:

Notice for the use of this material The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). This material is published on this web site with the agreement of the author (s) and the IPSJ. Please be complied with Copyright Law of Japan and the Code of Ethics of the IPSJ if any users wish to reproduce, make derivative work, distribute or make available to the public any part or whole thereof. All Rights Reserved, Copyright (C) Information Processing Society of Japan. Comments are welcome. Mail to address editj@ipsj.or.jp, please. 1 Technical Note Backup and Recovery Scheme for Distributed e-learning System Kazunari MEGURO, 1 Shinichi MOTOMURA, 2 Toshihiko SASAMA, 3 Takao KAWAMURA 3 and Kazunori SUGAHARA 3 In this paper, we present a backup technique for Peer to Peer applications, such as a distributed asynchronous Web-Based Training system that we have previously proposed. In order to improve the scalability and robustness of this system, all contents and functions are realized on mobile agents. These agents are distributed to computers, and using a Peer to Peer network that modified Content-Addressable Network they can obtain. In the proposed system, although entire services do not become impossible even if some computers break down, the problem that contents disappear occurs with an agent s disappearance. As a solution for this problem, backups of agents are distributed to computers. If failures of computers are detected, other computers will continue service using backups of the agents belonging to the computer. The developed algorithms are examined by experiments. 1. Introduction Nowadays, e-learning systems, especially asynchronous Web-Based Training systems (hereafter we abbreviate as WBT) are very popular. A WBT allows a learner to complete the WBT in his own time and schedule, without live interaction with an instructor. Although a large number of studies have been made on asynchronous WBT 1)2) 3), all of them are based on the client/server model. In the client/server model, a server machine offers all functions and manages all data. The client/server model has advantages of easy construction and maintenance, however, the client/server systems generally lack scalability and robustness. There is a Peer to Peer (hereafter we abbreviate as P2P) model to supplement the disadvantages of the client/server model. There is a feature in the system based on the P2P model that each computer works as a client and a server. The feature can distribute the load to a Moreover, the function of the entire system doesn t stop even if some nodes break down. We have proposed and implemented a distributed e-learning system based on P2P architecture 4)5). The proposed e-learning system has two distinguishing features. Firstly, it is based on P2P architecture to improve the scalability and robustness of the system. In the 1 The Graduate School of Engineering, Tottori University 2 Information Media Center, Tottori University 3 Faculty of Engineering, Tottori University proposed e-learning system, every user s computer plays the role of a client and of a server. That is to say, while a user uses the system, his/her computer (hereafter we refer to such a computer as a node) is a part of the system. When a node joins in the system, the part of contents is given from a joined node, and has the responsibility of sending appropriate contents to requesting nodes. In addition to the above advantages of using P2P architecture, we can construct the proposed e-learning system at low cost because the system needs no server computers. Secondly, each exercise in the system is not only data but also an agent which has functions, such as scoring user s answers, giving the correct answers, and showing some related information without human instruction. In the proposed system, exercises and functions are distributed among all nodes. Therefore, if a node failure occurs, another node of the system will continue service. However, when a node failure occurs, the exercises in the node are lost and cannot be studied by anyone afterwards. In this paper, as a solution for this problem, we propose an e-learning system where backups of agents are distributed to nodes. In this system, if a node failure occurs, another node will continue service using the backup of the agent belong to the failure This paper is organized in 5 sections. The proposed e-learning system is described in Section 2. We describe the design overviews of the proposed system in Section 3 and the experimental result in Section 4. Finally, some con-

2 cluding remarks are made in Section 5. 2. Proposed e-learning System 2.1 Overview All exercises in the proposed system are classified into categories, such as Math/Statistic, English/Grammar, etc. A user can obtain exercises one after another through specified categories of the required exercises. While a user uses the proposed e-learning system, his/her node is to be a part of the system. That is to say, when a node joins in the system, the part of categories and exercises is given from a joined node and and has the responsibility of sending appropriate exercises to requesting nodes. The important point to note is that the categories a node has are independent of the categories in which a node s user is interested, as shown in Figure 1. Figure 1 illustrates that user A s request is forwarded first to the neighbor node, and the request is forwarded to the node which has the requested category. posed system are originally concentrated. Consequently, when a new node joins in the system, not only location information of a category but the category itself must be handed to the new That being the case, the P2P network of the proposed system can be constructed as a CAN 9). Our P2P network is constructed with 2- dimensional coordinate space [0,1] [0,1] to store categories, as shown in Figure 2. The figure shows the situation that node C has just joined in the system as the third Before node C joins, node A and node B shared the whole coordinate space half and half. At that time, node A managed Math/Geometry, Math/Statistics, and History/Rome categories and node B managed English/Grammar, English/Reader and History/Japan categories, respectively. When node C joins in the system, we assume that node C already knows the IP addresses of some nodes in the system and node C sends a join request to some node in the list. Then node C is mapped on a certain coordinate space according to a random number and takes on corresponding categories from another For example, in the case of Figure 2, node C takes on the History/Japan category from node B, then exercises in that category move to node C. After joining, node C gets a list of IP addresses of neighbor nodes in the coordinate space, such as node A and node B. Therefore, neighbor nodes can communicate with each other. Fig. 1 Migration of exercise agent. 2.2 P2P Network When the proposed system bootstraps, one initial node has all categories in the system. When another node joins the system, it receives a certain number of categories from the initial The categories are distributed among all nodes in the system accordingly as a node joins in the system or leaves from the system. We would like to emphasize that in existing P2P-based file sharing systems, such as Napster 6), Gnutella 7), and Freenet 8), each shared file is owned by a particular Accordingly, files are originally distributed among all nodes. On the other hand, the categories in the pro- Fig. 2 P2P network of proposed e-learning system. 2.3 Components of System In order for the proposed system to be considered as a distributed WBT system, it is not enough that only exercises are distributed

3 among all nodes. Functions to provide the above services must also be distributed among all nodes. We adopt mobile agent technology to achieve this goal. There are following agents and user interface programs on each These agents have implemented in the mobile agent framework that we have developed 10). Node Agent: Each node has one node agent. It manages the zone information of a Content-Addressable Network (hereafter we abbreviate as CAN) and forwards messages to the Category Agents in the Exercise Agent: Each Exercise Agent has questions and functions to score user s answers, give the correct answers, and show some related information about the exercise. Category Agent: Each Category Agent stands for a unit of a particular subject. It manages Exercise Agents in itself and sends them to the requesting Interface Agent:There is one interface agent for each user interface, such as a student interface and an exercise manager interface on each It plays the role of interfaces between the interface program and other agents, and between agents and applications. User Agent:Each user has its own User Agent. A User Agent manages its user s information that includes login name, password, IP address of the user s computer, online/offline status, and log of studying or a list of created exercises. Student Interface: One student interface is on each node to which a user logs in as a student. It is a user interface program for studying. 3. Our Recovery Approach In the proposed system, the Distributed Hash Table (hereafter we abbreviate as DHT) that does the mapping on the orthogonalization space uses two dimensions, and the area of DHT is given to a node which joins in the system. As a result, the node composes a P2P network, where the contents are managed. However, when a node failure occurs, the exercises in the node cannot be studied by anyone and the reference by the DHT doesn t work correctly because of the disappearance of the contents and the lack of the DHT. In order to solve this problem, the method of backup by a node and the method of backup by a category are designed. 3.1 Backup by Node 3.1.1 Management of Backup In the method of backup by a node, one of the neighbor nodes of each node takes its own backup. If node n takes a backup of node m, node n is called a backup node for node m, while node m is called an original node for node n. The backup is managed by the following procedures. Making of Backup When a node joins in the network, the backup is made. ( 1 ) The number of contents that all neighbor nodes manage is investigated. ( 2 ) A neighbor node that has the minimum number of agents is selected for a backup node to balance the load of the system ( 3 ) The joined node commissions the management of backup to the neighbor Update of Backup When the area that a node manages changes, the backup is updated. ( 1 ) The backup node is requested to delete an old backup. ( 2 ) The backup of the node where the area was changed is made again. Delete of Backup When the node leaves the network, the deletion of the backup is requested. 3.1.2 Update of Network Information When a node failure occurs, network information is used to restore an original To use this method, the network information should be kept in the latest state. By the update request of the routing table that an original node sent, when there is a change in routing table, the routing table of the network information in the backup is updated. 3.1.3 Recovery from Node Failure A node failure can be detected, because an original node and a backup node both observe it. That is, both of the nodes receive the update request of the routing table from the other node periodically, if the update request isn t performed during the fixed time, it is judged whether or not a node failure occurs. If a backup node detects the failure of its original node, the following steps are performed. ( 1 ) The backup node generates a temporary node from the backup of the original

4 ( 2 ) The temporary node executes the leaving procedure. Consequently, the managed zone of the original node is formally handed over to one of the neighbor nodes. If an original node detects the failure of its backup node in the contrast, it simply makes a new backup of itself. Naturally, it is impossible for a failure that occurs in both an original node and its backup node at the same time to be recovered. Our system can be recovered from the other types of failures. 3.2 Backup by Category 3.2.1 Management of Backup In the method of backup by a category, an original and a backup of each category are prepared, and they are mapped on the DHT. However, if the original and the backup categories are managed in the same node, it is impossible to recover when the node failure occurs. Accordingly, each pair of the original and the backup categories are mapped symmetric to a point [0.5, 0.5] on the DHT, as shown in Figure 3. Fig. 3 Each pair of categories is pointed symmetric to point [0.5, 0.5]. 3.2.2 Recovery from Node Failure The recovery method by a category is the same as the method by excluding following points. The node responsible for recovering categories is one of the neighbor nodes of a failure Every category which included the pair of the lost category must be doubled on a temporary With this method, as well as the method by a node, it is possible to recover from failures unless the failures occur in both an original node and its backup node at the same time. 4. Experiment This section presents experimental results for comparing the performance of the distributed backup method, and also the performance of the failure recovery according to the distributed backup method. Table 1 shows the machine specification. Table 1 CPU Memory Network OS Machine specification. Intel Pentium4 3.0GHz 1GB 1000Base-T TurboLinux 10 Desktop 4.1 Performance Comparison of Participant We investigate how the total number of bytes of the transferred agents changes in the joining of agents, with or without the backup scheme. Table 2 shows experimental conditions. The experiment is done according to the following procedures. An initial node is started. A second node is joined in the system. At this time, the traffic generated among all nodes is measured from the start of a request for joining to the end of the joining process. Until the 30th node joins, the measurement is performed as above. The method of backup by a node, the method of backup by a category and the method without backup, processing from the above 1 to 3 is done by each method, and the ratio of traffic is calculated based on the result of the measurement. Figure 4 shows the ratio of the total number of transferred agents with and without the backup scheme. The horizon expresses the average of the ratio of traffic when it uses the method with and without backup, and the solid line expresses the average by the backup method by a node, and the dotted expresses the average by the backup method by a category. Consequently, in comparison with the method without backup, the traffic by the backup method by a node is 2.4 times, and the traffic by the backup method by a category is 1.8 times. 4.2 Performance Comparison of Recovery We investigate how the total number of bytes

5 Table 2 Experimental conditions. Number of node 30 Number of category 50 Number of exercise 150 Table 3 Required time and ratio of traffic. By Node By Category Required Time 143 sec 131 sec Ratio of Traffic 3.3 times 3.2 times Ratio between normal and backup 6 5 4 3 2 1 0 Fig. 4 0 5 10 15 20 25 30 Number of nodes backup(by node)/normal backup(by category)/normal average(by node) average(by category) Ratio of total amount of transferred agents. of transferred agents changes in failure recovery, with or without the backup scheme. Experimental conditions are similar to section 4.1 except that the number of join nodes in the system becomes 7. The experiment is done according to the following procedures. An initial node is started. Nodes join in the system to the seventh. A failure is caused at the second The required time and the ratio of the traffic is measured from the start of a recovery to the end of it. In the backup method by a node and the backup method by a category, the process from the above 1 to 4 is done by each method. The traffic in a normal state is measured. The ratio of the traffic is calculated based on the result of the measurement. Table 3 shows the experimental result. The required time and the ratio of traffic is almost the same in each backup method. When the failure node is restored, the backup method by a node performs all processing, the backup method by a category is processed with more than two nodes. As a result of the experiment, the influence of the backup method by a category will be small in comparison with the backup method by a 5. Conclusion We have developed two backup and recovery methods for our distributed e-learning system to prevent agent s disappearance. Each agent s backup is distributed to nodes which don t manage the original agent. Moreover, other nodes manage the backup of the routing table of each As a result of this, contents that nodes manage don t disappear even though the node shuts down suddenly. As a result of the experiments, the backup method by a category takes a somewhat shorter time for making backup and recovering compared with the backup method by a Moreover, when a content is restored, the backup method by a category is processed with more than two nodes, and the load given to the system is distributed. Therefore, the backup method by a category is adopted in our e- Learning system. References 1) Nishita, T. and et al,: Development of a Web Based Training system and Courseware for Advanced Computer Graphics Courses Enhanced by Interactive Java Applets, Proceedings of International Conference on Geometry and Graphics, Vol. 2, pp. 123-128 (2002). 2) Homma, H. and Aoki, Y.: Creation of WBT Server on Digital Signal Processing, Proceedings of 4th International Conference on Information Technology Based Higher Education and Training, (2003). Marrakech, Morocco. 3) Helic, D., Krottmaier, H., Maurer, H. and Scerbakov, N.: Enabling Project-Based Learning in WBT Systems, International Journal on E-Learning, Vol. 4, No. 4, pp. 445-461 (2005). Norfolk, VA. 4) Kawamura, T. and Sugahara, K.: A Mobile Agent-Based P2P e-learning System, IPSJ Journal, Vol. 46, No. 1, pp. 222-225 (2005). 5) Motomura, S., Nakatani, R., Kawamura, T. and Sugahara, K.: Distributed e-learning System Using P2P Technology, Proceedings of the 2nd International Conference on Web Information Systems and Technologies, pp.250-255 (2006). Setubal, Portugal. 6) Napster, http://www.napster.com (1999). 7) Gnutella, http://welcome.to/gnutella/ (2000). 8) Clarke, I., Sandberg, O,. Wiley, B. and Hong, T. W.: Freenet: A Distributed Anonymous Information Storage and Retrieval System, http://freenetproject.org/papers/freenet.pdf (2000). 9) Ratnasamy, S., Francis, P., Handley, M., Karp, R. and Schenker, S.: A scalable content-

6 addressable network, Proceedings of the 2001 conference on applications, technologies, architectures, and protocols for computer communications, ACM Press, pp. 161-172 (2001). 10) Motomura, S., Kawamura, T. and Sugahara, K.: Logic-Based Mobile Agent Framework with a Concept of Field, IPSJ Journal, Vol. 47, No. 4, pp. 1230-1238 (2006). (Received May 25, 2009) (Accepted August 7, 2009) Toshihiko Sasama was born in 1972. He received his Ph.D. degree from Osaka University, Japan, in 2001. He is now an assistant professor in the Department of Information and Knowledge Engineering of Tottori University. His current research interests include mobile ad-hoc networks. Dr. Sasama is a member of IPSJ and IEICE. Kazunari Meguro was born in 1977. He received his B.Eng. and M.Eng. degrees from Hiroshima city University, Japan, in 2002 and 2004, respectively. He is currently a Ph.D. student in Tottori University. His research interests include multi-agent systems and distributed systems. Takao Kawamura was born in 1965. He obtained his B.Eng., M.Eng. and Ph.D. degrees in Computer Engineering from Kobe University, Japan, in 1988, 1990 and 2002, respectively. Since 1994 he had been in Tottori University as a research associate and has been in the same University as a professor in the Faculty of Engineering since 2008. His current research interests include mobile-agent systems and distributed systems. Dr. Kawamura is a member of IPSJ and IEICE. Shinichi Motomura was born in 1973. He received his B.Eng. and M.Eng. degrees in Computer Engineering from Toyohashi University of Technology, Japan, in 1995, 1997, respectively. From 2004 to 2008, he joined Tottori University as a research associate. In 2008, he received the D.Eng. degree from Tottori University, Japan. Since 2008 he had been in Tottori University as an associate professor in the Information Media Center. His research interests include multi-agent systems and distributed systems. Kazunori Sugahara received the B.Eng. degree from Yamanashi University, Japan, in 1979 and M.Eng. degree from Tokyo Institute of Technology, Japan, in 1981. In 1989, he received the D.Eng. degree from Kobe University, Japan. From 1981 to 1994, he was on the staff of the Department of Electronic Engineering, Kobe City College of Technology. In 1994, he joined Tottori University as an associate professor of the Department of Electrical and Electronic Engineering and he is a professor of the department of Information and Knowledge Engineering. His current interest lies in the fields of computer architectures and hardware realizations of image processing algorithms. Prof. Sugahara is a member of IEEE, IPSJ and IEICE.