Offsite 2-Way Data Replication towards Improving Data Refresh Performance

Many wide-area distributed applications use replicated data to improve the availability of data, and to improve access latency by locating copies of the data near to their use. High bandwidth of network and uninterrupted power supply are essential for a normal and smooth replication process frequently used during the refresh process. During replication a scenario is occurred of an instance failure will jeopardize the process and efforts. Instance failure occurs due to low bandwidth of network or interrupted power supply. Versions compatibility for RDBMS is also problematic during the refresh process, in Pakistan chief and reliable replication tools are expensive enough to deploy. Unfortunately there are concerned problems of continuous power supply and high rate of network bandwidth availability in south Asia especially in remote areas of Pakistan. The need for such a technique arised here that should omit the condition of online connectivity and also compatible with interrupted power supply and applicable with all versions in RDMS environment, in a distributed database system. In this paper we present a new offsite two-way data replication mechanism for distributed database system using less bandwidth of network and also reduce the network overhead without compromising consistency and data integrity. By all means to replicate data in existing infrastructure of Pakistan regarding the power supply and the existing network paradigm. In offsite replication a CDF file is created which captures the altered data (DML operations) during every transaction in any database server site. Through change data file, only changes will be forwarded from one server to another server. The offsite data replication plays an important role in the development of highly scalable, highly available, and fault-tolerant database system.

[1]  Syed Roohullah Jan,et al.  Issues In Global Software Development (Communication, Coordination and Trust) - A Critical Review , 2016 .

[2]  Darrell D. E. Long,et al.  Quorum-oriented multicast protocols for data replication , 1992, [1992] Eighth International Conference on Data Engineering.

[3]  Gustavo Alonso,et al.  Database replication techniques: a three parameter classification , 2000, Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000.

[4]  Nazia Azim,et al.  EEC : Evaluation of Energy Consumption in Wireless Sensor Networks , 2016 .

[5]  Peter L. Reiher,et al.  Roam: A Scalable Replication System for Mobility , 2004, Mob. Networks Appl..

[6]  Iftikhar Ahmad,et al.  A New Robust Video Watermarking Technique Using H.264/AAC Codec Luma Components Based On DCT , 2016 .

[7]  Muhammad Tahir,et al.  PSOFuzzySVM-TMH: identification of transmembrane helix segments using ensemble feature space by incorporated fuzzy support vector machine. , 2015, Molecular bioSystems.

[8]  Fazlullah Khan,et al.  An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .

[9]  Jinjun Chen,et al.  A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..

[10]  Kenji Nakagawa,et al.  Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[11]  Geoffrey H. Kuenning,et al.  Measuring the Quality of Service of Optimistic Replication , 1998, ECOOP Workshops.

[12]  Deepak Puthal,et al.  Effective Machine to Machine Communications in Smart Grid Networks , 2012 .

[13]  Sameerchand Pudaruth,et al.  PEOPLE FACTORS IN AGILE SOFTWARE DEVELOPMENT AND PROJECT MANAGEMENT , 2012 .

[14]  Mahadev Satyanarayanan,et al.  Disconnected Operation in the Coda File System , 1999, Mobidata.

[15]  Fazlullah Khan,et al.  Secure communication and routing architecture in wireless sensor networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).

[16]  Daniel J. Abadi,et al.  Calvin: fast distributed transactions for partitioned database systems , 2012, SIGMOD Conference.

[17]  Qun Li,et al.  Research on the Backup Mechanism of Oracle Database , 2009, 2009 International Conference on Environmental Science and Information Application Technology.

[18]  Bruce Walker,et al.  The LOCUS distributed operating system , 1983, SOSP '83.

[19]  Deepak Puthal,et al.  Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure and Energy efficient data collection technique , 2012 .

[20]  Xiangjian He,et al.  Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..

[21]  Shahzad Khan,et al.  Performance improvement in wireless sensor and actor networks based on actor repositioning , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).

[22]  Mohamed Ziauddin,et al.  Materialized Views in Oracle , 1998, VLDB.

[23]  Fahim Arif,et al.  Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[24]  Guoqiong Liao,et al.  Data Synchronization and Resynchronization for Heterogeneous Databases Replication in Middleware-based Architecture , 2012, J. Networks.

[25]  Jinjun Chen,et al.  A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.

[26]  Mian Ahmad Jan,et al.  Energy-efficient routing and secure communication in wireless sensor networks , 2016 .

[27]  Xiangjian He,et al.  PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..

[28]  Mian Ahmad Jan,et al.  A Survey of Cluster-based Hierarchical Routing Protocols , 2013 .

[29]  Shahzad,et al.  RECOMMENDER SYSTEM ON STRUCTURED DATA , 2016 .

[30]  YED,et al.  SURVEY: DEALING NON-FUNCTIONAL REQUIREMENTS AT ARCHITECTURE LEVEL , 2016 .

[31]  Xiangjian He,et al.  PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.

[32]  Jinjun Chen,et al.  DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[33]  Farman Ullah,et al.  A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.

[34]  F. Chanchary Data Migration : Connecting Databases in the Cloud , 2012 .

[35]  Michael J. Fischer,et al.  Sacrificing serializability to attain high availability of data in an unreliable network , 1982, PODS.

[36]  B. Pokharel Power Shortage, its impacts and the Hydropower Sustainability Assessment Protocol: in the context of South Asia , 2010 .

[37]  Ioan Filip,et al.  Considerations about an Oracle database multi-master replication , 2009, 2009 5th International Symposium on Applied Computational Intelligence and Informatics.

[38]  F. Khan,et al.  Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.

[39]  Xiangjian He,et al.  Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.

[40]  Xiangjian He,et al.  A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[41]  Xiangjian He,et al.  Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[42]  Muhammad Babar,et al.  Applications and Challenges Faced by Internet of Things - A Survey , 2016 .

[43]  Xiangjian He,et al.  A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[44]  Peter L. Reiher,et al.  A simulation evaluation of optimistic replicated filing in mobile environments , 1999, 1999 IEEE International Performance, Computing and Communications Conference (Cat. No.99CH36305).

[45]  Philippe Jacquet,et al.  Comparative Study of Routing Protocols for Mobile Ad-hoc NETworks , 2002 .

[46]  Gustavo Alonso,et al.  Database replication , 2010, Proc. VLDB Endow..

[47]  Hakik Paci,et al.  Adding a new site in an existing Oracle Multimaster replication without quiescing the replication , 2011, ArXiv.

[48]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[49]  Miron Livny,et al.  Conflict detection tradeoffs for replicated data , 1991, TODS.

[50]  Marvin Theimer,et al.  Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.