BYZANTINE FAULT TOLERANCE MODEL FOR SOAP FAULTS
Journal Title: Indian Journal of Computer Science and Engineering - Year 2012, Vol 3, Issue 2
Abstract
The proposed model is to configure Byzantine Fault Tolerance mechanism for every SOAP fault message that is transmitted. The reliability and availability are of major requirements of Web services since they operate in the distributed environment. One of the reliability issues is handling faults. Fault occurs in all the phases of Service Oriented Architecture i.e. during publishing, discovery, composition, binding, and execution. These faults may lead to service downtime, behaves abnormally, and may send incorrect responses. These abnormalities are classified as Byzantine faults in Web services. Even though SOAP specification provides fault handling mechanisms, the correctness of the received SOAP fault messages are not known. In this paper, a model is proposed to check the correctness of the SOAP fault message received, by incorporating the Byzantine agreement for fault tolerance. The existing fault tolerant mechanism detects server failure and routes the request to the next available server without the knowledge of the client. The proposed model ensures a transparent environment by providing fault handling information to the client. This is achieved by incorporating an active replication technique.
Authors and Affiliations
S. Murugan , V. Ramachandran
TRACING EFFICIENT PATH USING WEB PATH TRACING
In the fast improving society, people depend on online purchase of goods than spending time physically. So there are lots of resources emerged for this online buying and selling of materials. Efficient and attractive web...
IMAGE COMPRESSION USING DCTWT & N-LEVEL-HYBRID TECHNIQUE
As per the current position, the collective growing of knowledge and the arrival into the numerical age, we have to grip a huge quantity of info each period which frequently grants problems. So, the numeral info must be...
UNIVERSAL STEGANALYSIS: DEFEND AGAINST ADAPTIVE STEGANOGRAPHIC ATTACK USING MX-QUADTREE NEIGHBOR FINDING MECHANISM
In the world of information security, Trapping of Illegal secret communication plays an imperative role. Especially, defending against such type of attacks plays important role in the area of defense. Steganalysis is the...
CONTENT BASED LEAF IMAGE RETRIEVAL (CBLIR) USING SHAPE, COLOR AND TEXTURE FEATURES
This paper proposes an efficient computer-aided Plant Image Retrieval method based on plant leaf images using Shape, Color and Texture features intended mainly for medical industry, botanical gardening and cosmetic indus...
SURVEY OF PACKET DROPPING ATTACK IN MANET
Mobile Ad-hoc NETwork (MANET) is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can c...