SlideShare a Scribd company logo
ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010




New Fault Tolerance Approach using Antecedence
        Graphs in Multi Agent Systems
                              Ramandeep Kaur1, Rama Krishna Challa1, Rajwinder Singh2
           1
               Department of Computer Science, National Institute of Technical Teachers’ Training and Research,
                                                    Chandigarh, India.
                  2
                    Department of Computer science & Engineering, CEC, Landran, (Mohali), Punjab, India.
                                                   rwsingh@yahoo.com

Abstract: Mobile agents are distributed programs which can            framework of the proposed scheme and illustrates the
move autonomously in a network, to perform tasks on behalf            procedure and algorithm of proposed scheme of
of user. They are susceptible to failures due to faults in            checkpointing and recovery. The performance analysis and
communication channels, processors or malicious programs.             results of comparison with existing schemes is given in
In order to gain solid foundation at the heart of today’s e-
society, the mobile agent technology must address the issue of
                                                                      section 3 followed by conclusion about effectiveness of
fault tolerance. Checkpointing has been widely used technique         proposed scheme in section 4.
for providing fault tolerance in mobile agent systems. But the        A. RELATED WORK
traditional message passing based checkpointing and rollback
algorithms suffer from problems of excess bandwidth                       As mobile agent systems scale up, their failure rate may
consumption and large overheads. This paper proposes use of           also be higher. Several techniques have been proposed for
antecedence graphs and message logs for maintaining fault             providing fault tolerance in mobile-agent systems [3]
tolerance information of agents. For checkpointing, dependent         which broadly fall under two basic categories i.e.
agents are marked out using antecedence graphs; and only              replication and checkpointing. Checkpointing is one of the
these agents are involved in process of taking checkpoints. In        widely used fault tolerance techniques and can be classified
case of failures, the antecedence graphs and message logs are         into synchronous, asynchronous and quasi-synchronous
regenerated for recovery and then normal operation
                                                                      algorithms [6, 10]. For recovery an agent needs to rollback
continued. The proposed scheme reports less overheads,
speedy execution and reduced recovery times as compared to            to its consistent state. Message logging for rollback
existing graph based schemes.                                         recovery require that each agent periodically saves its local
                                                                      state and logs its every message sent and received. Message
Keywords: Mobile agents, fault tolerance, antecedence graphs,         logging protocols are classified into pessimistic, optimistic
checkpointing, message logs.
                                                                      and causal [9]. Replication schemes as discussed in [4, 8,
                                                                      12] mainly rely on replicated servers or agents to mask the
                         I. INTRODUCTION                              failures. Graph based fault tolerance approach for multi
    Mobile agents are becoming a major trend in distributed           agents has been proposed in [15] where the fault tolerance
systems and applications. A mobile agent is a program that            is achieved by use of antecedence graphs combined with
represents a user in a computer network and can migrate               message logs.
autonomously from node to node, to perform some                           Majority of checkpointing schemes approaches suffer
computation on behalf of the user [1]. Its tasks, which are           from the overhead that result from forcing all the agents in
determined by the agent application, can range from online            multi-agent system to checkpoint. The blocking of agents
shopping to real-time device control to distributed                   during checkpointing increases the execution time of
scientific computing. It can bring benefits such as reduced           transaction. To overcome the problem of recovery latency
network load and overcoming of network latency.                       and blocking, we propose coordinated checkpoint
Applications can inject mobile agents into a network,                 algorithm that is able to force the most limited number of
allowing them to roam in the network, either on a                     agents carrying out process, for putting checkpoint. The
predetermined path or one that the agents themselves                  global checkpointing is done from antecedence graph [15]
determine based on dynamically gathered information.                  where dependent agents are identified and only they are
Having accomplished their goals, the agents can return to             forced to put checkpoints. The concept of antecedence
their home site to report their results to the user [2]. Most         graphs for fault tolerance in distributed systems was
of these applications require high degree of reliability and          originally introduced in Manetho [14] which utilized
consistency. Therefore, fault tolerance is a key issue in             antecedence graphs and message logs for fault tolerance in
designing mobile agent systems [5, 11]. In this paper we              distributed systems. But the overhead due to size of
consider the scenario of multi-agent system consisting of             antecedence graph with large number of agents involved
several collaborating agents and amalgamate the concept of            causes greater overheads in case of multi-agent systems if
checkpointing and antecedence graphs for fault tolerance in           used without checkpointing. Our proposed scheme
multi agent systems.                                                  combines the antecedence graph approach with parallel
    The rest of the paper is organized as follows: section            checkpointing and message logging. The proposed scheme
1.1 briefs the related research in the area of fault tolerance        significantly resolves the associated problem of overhead
for mobile agent systems. Section 2 describes the basic               besides improving execution and recovery time.

                                                                 50
©2010 ACEEE
DOI: 01.IJSIP.01.03.61
ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010




                   II. SYSTEM FRAMEWORK
                                                                         interval Ω1B provides information about what happened
    The system consists of cooperating multiple agents (on
                                                                         before Ω1B .
a single or multiple mobile hosts) which form multi agent
group and collaborate with each other to perform a single                                                                                                                        Ω1
                                                                                                                            0
computationally complex task by passing messages                                        Ω                                                                                        A

between each other as shown in Fig.1.                                     A                               A


                                                                                                                                                                                         m3
                   m1/AG                  m2/AG                                         Ω0                                                                     Ω1          m2
   mn/AG                                                                  B                               B                                                     B



        Host 1         Host 2          Host 3             Host n                                                                                               m1
         MA1            MA2             MA3                MAn
                                                                                                                                                     m                                                  m4
                                                                              Ω0                                                                     0                                   2
                                                                                                                                                                                         Ω
                                                                         C        C                                                                                                      C
                                                                                                                                                         Ω1C

                                                                                                                            Fig. 2 An example of multi-agent system with three agents
                                       
                                  BA              Stabl
                                                                         B. AG Formation for Agent A
                                                                            The formation of antecedence graph for Agent A takes
                                                                         the following steps: Message m2 is received by Agent A
   BA: Base Agent
   MA I : Mobile Agent i (1< i < n)
                                                                         from Agent B. A combines the antecedence graph received
                                                                         from B to its own graph for the formation of the event Ω1A.
                       Fig.1 Multi agent group                           The resultant graph is illustrated in Fig. 3.
    Each group has a Base Agent (BA) which coordinates                                                                                                                                       Ω0
                                                                                  Ω0                                                                                             Ω1
the participating agents of group and is assumed to execute                                                                                                                                  B
                                                                                                                                                                                                                       Ω1
                                                                               
                                                                                  Ω0A

                                                                                        A                 Ω
                                                                                                              1A




                                                                                                                                                                                     A
in fail safe mode. It also acts as recovery manager and                                                                                                                                                                B
maintains access to persistent data storage, where agent
checkpoints and recovery bookkeeping is held. Under our                                     Ω0
strategy, each mobile agent will send its current                                                         B                                                                 Ω1
antecedence graph to the agent that it is sending a message                                                                                                                  B
to. All the messages exchanged would be stored by each
agent in its volatile storage in form of message logs. The
mobile agents may perform checkpointing of the                                                                                                                                                               Ω1
antecedence graph either when the depth exceeds certain                                                                                                                                      Ω0              C
threshold of specified nodes in its antecedence graph or                                                                                                            Ω1                       C
                                                                                            Ω0
after elapsing of specific time.                                                                                                                                    C
                                                                                                          C
    In general, most of the operations of internet
applications are based on read operation, so we can safely                                                                                               Fig. 3 AG for agent A               Fig. 4 AG for agent B
assume that all the operations executed by the mobile
agents are idempotent, thus the exactly once execution
                                                                                                          Ω0A                                                                                     Ω1A
property is adhered to automatically. The three basic steps
                                                                                                                                 Ω
                                                                                                                                     1A

                                                                                                 Ω0A
                                                                                            A
                                                                                                     0B                1B                 m3
                                                                                                 Ω                 Ω        m2
                                                                                            B
                                                                                                                   m1
                                                                                                                                                m4
                                                                                                Ω0C                                       Ω1C
                                                                                            C




                                                                                                                                                     A
involved in the proposed scheme are formation of
antecedence graph at individual agents followed by parallel
checkpointing and rollback recovery in case of failure.
These are discussed in detail in the following sections.                                                                                   Ω0B
                                                                                                                                                                                         Ω1B
A. Antecedence Graph (AG) Formation For Dependency
    Information
    Considering a scenario of a multi-agent system
consisting of only three agents, agent A, agent B, and agent
C. Its inter agent communication can be depicted in form of
a graph as shown in Fig. 2. Each agent, at the start of its
                                                                                                                                                                              Ω1C                                Ω2C
execution, is at state Ω0A , Ω0B and Ω0C respectively. Each                                                                               Ω0C
message receipt forms a deterministic interval. For
example, the receipt of message m1 from B to C forms the
deterministic interval and the antecedence graph of state                                                                                                                Fig. 5 AG for agent C
                                                                    51
©2010 ACEEE
DOI: 01.IJSIP.01.03.61
ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010



   Similarly agent B and C construct their antecedence               agents for construction of new antecedence graphs may
graphs as shown in Fig. 4 and Fig. 5.                                continue from the temporarily saved antecedence graphs.
                                                                     Following is the brief proposed checkpointing algorithm:
C.     Parallel Checkpointing
                                                                     If in self state, MAj decides for checkpointing, then it would
     The main goal of proposed scheme is to minimize the             call following algorithm:
global checkpointing latency and to reduce the total                 Requesting Agent MAj identifies Dependent Agents (DA)
recovery time. Coordinated checkpointing is utilized for             For each Agent Antecedence graph (AG)
checkpointing as it shows better performance as compared                        Create Check Agent (CA)
to other schemes as shown by comparative studies in [6].             MAj send a CA with temp-checkpoint request and value
   The dependent agents are the active agents of the                 1/|GDj | to all DAs (where (1<j<n)
collaborating group of n number of mobile agents                                W=0
performing the operation. These dependent agents for each                                   For each agent AG
mobile agent are stored in form of nodes of antecedence              MAj receives reply to temp-check request.
graphs. In proposed scheme, the dependence information is                       for each reply compute:
accessible to the agent which requires for the checkpoint                                           W=W + 1/|GDj|,
from its antecedence graph. When the antecedence graph               if W≠1then
depth exceeds certain threshold or after elapsing of certain                    cancel checkpointing & wait for threshold event
time, mobile agent (MA) may request for checkpointing.               If W=1 then
For requesting agent MAj , (1<j<n), we set a variable                       At MAj and all DAs:
Graph Depth (GDj), which is the depth of requesting                                Save AG as checkpoint.
agent’s antecedence graph at initialization of                                     Send the final checkpointed AG to BA.
checkpointing. At threshold event, if MAj starts a                                 Discard successfully checkpointed nodes from
checkpoint request and informs all dependent agents (DA)                    AG.
of its antecedence graph. It carries out this request through                      Continue again from temporary AG.
a MA called Check Agent (CA) which is made for every                        At BA:
DA during the start of checkpoint agent and the time of                         Construct maximum length AG from received
sending checkpointing request to the DAs.                                       AGs.
   When MAj sends this request, it attaches with CA, a
                                                                                Write it to stable storage.
numeric weight of value 1/| GDj |. In parallel the requesting
agent as well as DAs make temporary AGs of the events                     Once the AGs of agents have been checkpointed, the
occurred during execution of checkpointing operation. The            agents now don’t have to piggyback the checkpointed AG,
time of this temporary logging is overlapped with actual             thus the message size is considerably reduced. This in turn
execution of the transaction and checkpointing and so it             would reduce bandwidth consumption and cause speedy
does not have any extra load for system and is therefore             executions. In case of failure the checkpointed state is used
non-blocking. Now all the dependent agents specified in              for recovery. The checkpointed state here is the maximum
the antecedence graph would receive the inquiry message              length AG stored in the stable storage of BA. The
through CA and if they agree on checkpointing, they would            recovering agent requests for maximum length AG from
send back the numeric weight indicating positive response,           BA which has been the latest saved checkpointed AG. The
to the starting agent. The received responses from                   recovering agents will now create a message log using the
dependent agents are added together and if they equal 1, it          AG constructed through above step. This message log will
means that all the relevant agents have responded. In this           contain the necessary messages that need to be replayed to
moment, the request for changing the temporary checkpoint            recover the state of each failed agent. Using the AG and
to the main one is issued. But even if one of them responds          message logs, messages required for recovery are replayed.
back negatively, the checkpointing is cancelled and all DAs          This results in achievement of global consistent state. After
are informed. The distinctiveness of our scheme is that the          recovery, the normal operation continues.
checkpoint request is distributed through all the agents in a
parallel manner. Finally if the starting agent received the           III. PERFORMANCE ANALYSIS AND COMPARATIVE STUDY
positive response from all the dependent agents, it makes                The proposed system of multiple agents performing in
the real checkpoint and informs the others respectively.             collaboration in a group has been implemented on IBM
The BA is then sent the final checkpointed antecedence               Aglets [7] over a network of systems with configuration of
graphs by starting as well as by dependent agents. At BA             1 GB RAM and 3.2 GHz processor connected be 10/100
the maximum length graph from these individual agents is             MBPS Ethernet. Aglets [13] is a java based graphical
constructed and stored in stable storage. After final                interface for developing the distributed multi-agent
checkpointing, the previous antecedence graphs are deleted           systems. The case scenario used to implement the proposed
which considerably reduces the size of the graph                     system is searching for best deals offered by suppliers in
piggybacked on the message thereby helping to maintain               terms of cost and product parameters. The mobile agents
the efficiency of algorithm in scenario where large number           are used to retrieve this information from various agent
of agents participate in performing a transaction. After             servers acting as supplier. There may be more than one
successful completion of checkpointing, the involved                 mobile agent at each server. The inter agent
                                                                52
©2010 ACEEE
DOI: 01.IJSIP.01.03.61
ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010



communication is through mobile agents using messages.               checkpointing approach increases with increase in number
The dependent agents are the active agents of the                    of dependent agents.
collaborating group of mobile agents performing the                      This results in increase in execution time. The
operation. The number of dependent agents is gradually               integration of checkpointing with antecedence graph as in
increased to study the variations in parameters.                     proposed approach can greatly reduce the time for normal
    Fig. 6 shows the comparison of checkpointing for non-            execution of operation in multi agent group. Besides the
checkpointing antecedence graph approach [15] and the                recovery too can be faster in case of failing agents. Thus
proposed scheme. The proposed approach reports much                  checkpointing can greatly enhance the performance of the
less checkpointing time as the only dependent agents are             antecedence graph approach for fault tolerance.
involved in checkpointing. Participation of only dependent
agents reduces the overhead of waiting for response from
all agents of the group. Reduction in checkpointing time is
significant advantage of our approach.




                                                                                    Fig. 7 Comparison of Execution time


             Fig. 6 Comparison of Checkpointing time                                         IV. CONCLUSIONS
    The execution of the operation being performed by the                In this paper we proposed an approach to introduce fault
collaborating group has been done once without                       tolerance in multi agent system through checkpointing
checkpointing as in [15] and secondly with checkpointing             using antecedence graph approach. The integration of
using the proposed scheme. To measure the variation in               checkpointing with antecedence graph approach
execution time, five iterations were done for different              significantly improves the performance of collaborating
number of dependent agents as shown in Fig. 7. Analysis of           group of agents. Experimental results show that
the results shows that the execution time for both                   checkpointing done through collection list of only
approaches (with and without checkpointing) remains                  dependent agents underlined by antecedence graphs results
nearly same for smaller number of dependent agents. When             in better execution time and low checkpointing time. In
the number of dependent agents increases, the proposed               future, comparison of the graph based approach with other
checkpointing approach, results in faster execution. This            approaches can be made on the suitability of approach for
can be attributed to the fact that due to checkpointing the          various applications. Besides, the proposed scheme can be
antecedence graph piggybacked on the messages                        implemented into real life applications for providing
exchanged by agents, never exceed a preset limit. On the             reliability.
other hand the size of the graph piggybacked in non




                                                                53
©2010 ACEEE
DOI: 01.IJSIP.01.03.61
ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010



                        REFERENCES                                    [8] K. Park, “A fault-tolerant mobile agent model in replicated
                                                                      secure services”, Springer, Proceedings of International
[1] Hyacinth S. Nwana, “Software Agents: An Overview”,                Conference Computational Science and Its Applications, Vol.
Knowledge Engineering Review, Vol. 11, No. 3, Cambridge               3043, 2004, pp. 500-509.
University Press, 1996, pp. 1- 40.                                    [9] E. N. (Mootaz) Elnozahy, L. Alvisi, Y. Wang and D. B.
[2] S.S. Manvi and P. Venkataram, “Applications of agent              Johnson,” A survey of rollback-recovery protocols in message-
technology in communications: a review”, Springer Computer            passing systems”, ACM Computing Surveys, Vol. 34, Nr. 3,
Communication, 2004, pp. 1493-1508.                                   2002, pp. 375-408.
[3] W. Qu, H. Shen and X. Defago, “A survey of mobile agent-          10] J. Yang, J. Cao and W. Wu, “CIC: An integrated approach to
based fault-tolerant technology“, Proceedings of Sixth IEEE           checkpointing in mobile agent systems”, Proceedings of the
International Conference on Parallel and Distributed Computing        Second IEEE International Conference on Semantics, Knowledge
Applications and Technologies, 2005, pp. 446-450.                     and Grid, 2006.
[4] S. Pleisch and A. Schiper, “FATOMAS-A Fault-Tolerant              [11] W. Qu and H. Shen, “Analysis of mobile agents’ fault-
Mobile Agent System Based on the Agent-Dependent Approach”,           tolerant behavior”, Proceedings of IEEE/WIC/ACM international
Proceedings of the IEEE International Conference on Dependable        conference on intelligent agent technology, 2004.
Systems and Networks, 2001, pp. 215-224.                              [12] K. Rothermel and M. Strasser, “A fault-tolerant protocol for
[5] M. R. Lyu, X. Chen, and T. Y. Wong, “Design and Evaluation        providing the exactly-once property of mobile agents”,
of a Fault-Tolerant Mobile-Agent System”, IEEE CS Press,              Proceedings Seventeenth IEEE Symposium on Reliable
September/October 2004, pp. 32-38.                                    Distributed Systems, 1998, pp. 100-108.
[6] H. K. Yeom, H. Y. T. Park and H. Park, “The cost of               [13] Banny B. Lange , “ Java Aglets application Programming
checkpointing, logging and recovery for the Mobile Agent               Interface(JAAPI) White Paper-Draft 2”, IBM Tokyo Research
Systems”, Proceedings of Pacific Rim International Symposium           Laboratory.
on Dependable Computing, 2002, pp. 45-48.                             [14] E. N. Elnozahy, “Manetho: Fault Tolerance in Distributed
[7] Aglet, http://aglets.sourceforge.net/                              Systems Using Rollback-Recovery and Process Replication”,
                                                                      PhD Thesis, Rice University, Houston, Texas, October 1993.




                                                                 54
©2010 ACEEE
DOI: 01.IJSIP.01.03.61

More Related Content

What's hot (20)

PDF
Survey paper
IJASCSE
 
PDF
Formal Specification and Verification of Total Order Broadcast through Destin...
ijcsit
 
PDF
Nq2422332236
IJERA Editor
 
PDF
Group2
nipom
 
PDF
An Intro to Hadoop
Matthew McCullough
 
PDF
MICE: Monitoring and modelIing the Context Evolution
FET AWARE project - Self Awareness in Autonomic Systems
 
PDF
Na2522282231
IJERA Editor
 
PDF
Digital Image Watermarking Basics
IOSR Journals
 
PDF
Limited Data Speaker Verification: Fusion of Features
IJECEIAES
 
PPT
Chapter 5 slides
lara_ays
 
PDF
05497433
shantoeee
 
PDF
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
ijmnct
 
PDF
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
IDES Editor
 
PDF
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
ijwmn
 
PDF
Speaker and Speech Recognition for Secured Smart Home Applications
Roger Gomes
 
PDF
www.ijerd.com
IJERD Editor
 
PDF
Location Update In Mobile Ad Hoc Network Using Markov Model
Editor IJMTER
 
PDF
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
ijdpsjournal
 
PDF
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
cscpconf
 
PDF
Hadoop v0.3.1
Matthew McCullough
 
Survey paper
IJASCSE
 
Formal Specification and Verification of Total Order Broadcast through Destin...
ijcsit
 
Nq2422332236
IJERA Editor
 
Group2
nipom
 
An Intro to Hadoop
Matthew McCullough
 
MICE: Monitoring and modelIing the Context Evolution
FET AWARE project - Self Awareness in Autonomic Systems
 
Na2522282231
IJERA Editor
 
Digital Image Watermarking Basics
IOSR Journals
 
Limited Data Speaker Verification: Fusion of Features
IJECEIAES
 
Chapter 5 slides
lara_ays
 
05497433
shantoeee
 
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...
ijmnct
 
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...
IDES Editor
 
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
ijwmn
 
Speaker and Speech Recognition for Secured Smart Home Applications
Roger Gomes
 
www.ijerd.com
IJERD Editor
 
Location Update In Mobile Ad Hoc Network Using Markov Model
Editor IJMTER
 
STUDY OF TASK SCHEDULING STRATEGY BASED ON TRUSTWORTHINESS
ijdpsjournal
 
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform
cscpconf
 
Hadoop v0.3.1
Matthew McCullough
 

Viewers also liked (14)

PDF
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
IDES Editor
 
PDF
HACBPS: A Hierarchical Access Control- Based Proxy Signature
IDES Editor
 
PDF
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
IDES Editor
 
PDF
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
IDES Editor
 
PDF
Text-Image Separation in Document Images Using Boundary/Perimeter Detection
IDES Editor
 
PDF
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
IDES Editor
 
PDF
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
IDES Editor
 
PDF
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
IDES Editor
 
PDF
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
IDES Editor
 
PDF
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
IDES Editor
 
PDF
Filtering Electrocardiographic Signals using filtered- X LMS algorithm
IDES Editor
 
PDF
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...
IDES Editor
 
PPTX
Voltage sag and it’s mitigation
Mayur Dhande
 
PPTX
Voltage sag
AJAL A J
 
A Novel Classification via Clustering Method for Anomaly Based Network Intrus...
IDES Editor
 
HACBPS: A Hierarchical Access Control- Based Proxy Signature
IDES Editor
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
IDES Editor
 
Land Cover Feature Extraction using Hybrid Swarm Intelligence Techniques - A ...
IDES Editor
 
Text-Image Separation in Document Images Using Boundary/Perimeter Detection
IDES Editor
 
Low-Cost Multiple Degrees-of-Freedom Optical Tracking for 3D Interaction in H...
IDES Editor
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
IDES Editor
 
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...
IDES Editor
 
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
IDES Editor
 
On Demand Bandwidth Reservation for Real- Time Traffic in Cellular IP Network...
IDES Editor
 
Filtering Electrocardiographic Signals using filtered- X LMS algorithm
IDES Editor
 
Characteristics Analysis of Voltage Sag in Distribution System using RMS Volt...
IDES Editor
 
Voltage sag and it’s mitigation
Mayur Dhande
 
Voltage sag
AJAL A J
 
Ad

Similar to New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems (20)

PDF
Distribution systems efficiency
Alexander Decker
 
PDF
347 352
Editor IJARCET
 
PDF
Project titles abstract_2012
Suresh Radhakrishnan
 
PDF
Poster chep2012 reduced_original1
Daniela Remenska
 
PDF
Modeling and Verification of Cyber Physical Systems
cpsworkshop
 
PPTX
20100522 software verification_sharygina_lecture01
Computer Science Club
 
PDF
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
 
PDF
Ieee projects 2012 for cse
SBGC
 
PDF
Ieee projects 2012 for cse
SBGC
 
PDF
Algorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
SBGC
 
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PDF
.Net project titles 2011, Real time projects in .net, Java Final year project...
Suresh Radhakrishnan
 
PDF
IEEE final year projects in chennai,MATLAB projects in chennai,Engineering P...
Suresh Radhakrishnan
 
PDF
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...
Suresh Radhakrishnan
 
PDF
Java J2EE project titles, .NET project titles with abstract,Java J2EE projec...
Suresh Radhakrishnan
 
PDF
IEEE Network security projects in chennai,IEEE 2011 titles abstract,NS2 proje...
Suresh Radhakrishnan
 
PDF
Secure computing projects,Mobile computing projects in chennai,IEEE Network s...
Suresh Radhakrishnan
 
PDF
.Net project titles 2011, Real time projects in .net, Java Final year project...
Suresh Radhakrishnan
 
PDF
Project titles abstract
Suresh Radhakrishnan
 
PDF
Mobile computing projects,Mobile comp/uting projects in java, Mobile computin...
Suresh Radhakrishnan
 
Distribution systems efficiency
Alexander Decker
 
Project titles abstract_2012
Suresh Radhakrishnan
 
Poster chep2012 reduced_original1
Daniela Remenska
 
Modeling and Verification of Cyber Physical Systems
cpsworkshop
 
20100522 software verification_sharygina_lecture01
Computer Science Club
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
 
Ieee projects 2012 for cse
SBGC
 
Ieee projects 2012 for cse
SBGC
 
Algorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
SBGC
 
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
.Net project titles 2011, Real time projects in .net, Java Final year project...
Suresh Radhakrishnan
 
IEEE final year projects in chennai,MATLAB projects in chennai,Engineering P...
Suresh Radhakrishnan
 
Mobile computing projects in chennai,Ns2 projects in chennai,.Net projects in...
Suresh Radhakrishnan
 
Java J2EE project titles, .NET project titles with abstract,Java J2EE projec...
Suresh Radhakrishnan
 
IEEE Network security projects in chennai,IEEE 2011 titles abstract,NS2 proje...
Suresh Radhakrishnan
 
Secure computing projects,Mobile computing projects in chennai,IEEE Network s...
Suresh Radhakrishnan
 
.Net project titles 2011, Real time projects in .net, Java Final year project...
Suresh Radhakrishnan
 
Project titles abstract
Suresh Radhakrishnan
 
Mobile computing projects,Mobile comp/uting projects in java, Mobile computin...
Suresh Radhakrishnan
 
Ad

More from IDES Editor (20)

PDF
Power System State Estimation - A Review
IDES Editor
 
PDF
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
PDF
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
PDF
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
PDF
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
PDF
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
PDF
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
PDF
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
PDF
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
PDF
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
PDF
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
PDF
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
PDF
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
PDF
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
PDF
Low Energy Routing for WSN’s
IDES Editor
 
PDF
Rotman Lens Performance Analysis
IDES Editor
 
PDF
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
PDF
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
PDF
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 
PDF
Mental Stress Evaluation using an Adaptive Model
IDES Editor
 
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
IDES Editor
 
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 
Mental Stress Evaluation using an Adaptive Model
IDES Editor
 

New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems

  • 1. ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010 New Fault Tolerance Approach using Antecedence Graphs in Multi Agent Systems Ramandeep Kaur1, Rama Krishna Challa1, Rajwinder Singh2 1 Department of Computer Science, National Institute of Technical Teachers’ Training and Research, Chandigarh, India. 2 Department of Computer science & Engineering, CEC, Landran, (Mohali), Punjab, India. [email protected] Abstract: Mobile agents are distributed programs which can framework of the proposed scheme and illustrates the move autonomously in a network, to perform tasks on behalf procedure and algorithm of proposed scheme of of user. They are susceptible to failures due to faults in checkpointing and recovery. The performance analysis and communication channels, processors or malicious programs. results of comparison with existing schemes is given in In order to gain solid foundation at the heart of today’s e- society, the mobile agent technology must address the issue of section 3 followed by conclusion about effectiveness of fault tolerance. Checkpointing has been widely used technique proposed scheme in section 4. for providing fault tolerance in mobile agent systems. But the A. RELATED WORK traditional message passing based checkpointing and rollback algorithms suffer from problems of excess bandwidth As mobile agent systems scale up, their failure rate may consumption and large overheads. This paper proposes use of also be higher. Several techniques have been proposed for antecedence graphs and message logs for maintaining fault providing fault tolerance in mobile-agent systems [3] tolerance information of agents. For checkpointing, dependent which broadly fall under two basic categories i.e. agents are marked out using antecedence graphs; and only replication and checkpointing. Checkpointing is one of the these agents are involved in process of taking checkpoints. In widely used fault tolerance techniques and can be classified case of failures, the antecedence graphs and message logs are into synchronous, asynchronous and quasi-synchronous regenerated for recovery and then normal operation algorithms [6, 10]. For recovery an agent needs to rollback continued. The proposed scheme reports less overheads, speedy execution and reduced recovery times as compared to to its consistent state. Message logging for rollback existing graph based schemes. recovery require that each agent periodically saves its local state and logs its every message sent and received. Message Keywords: Mobile agents, fault tolerance, antecedence graphs, logging protocols are classified into pessimistic, optimistic checkpointing, message logs. and causal [9]. Replication schemes as discussed in [4, 8, 12] mainly rely on replicated servers or agents to mask the I. INTRODUCTION failures. Graph based fault tolerance approach for multi Mobile agents are becoming a major trend in distributed agents has been proposed in [15] where the fault tolerance systems and applications. A mobile agent is a program that is achieved by use of antecedence graphs combined with represents a user in a computer network and can migrate message logs. autonomously from node to node, to perform some Majority of checkpointing schemes approaches suffer computation on behalf of the user [1]. Its tasks, which are from the overhead that result from forcing all the agents in determined by the agent application, can range from online multi-agent system to checkpoint. The blocking of agents shopping to real-time device control to distributed during checkpointing increases the execution time of scientific computing. It can bring benefits such as reduced transaction. To overcome the problem of recovery latency network load and overcoming of network latency. and blocking, we propose coordinated checkpoint Applications can inject mobile agents into a network, algorithm that is able to force the most limited number of allowing them to roam in the network, either on a agents carrying out process, for putting checkpoint. The predetermined path or one that the agents themselves global checkpointing is done from antecedence graph [15] determine based on dynamically gathered information. where dependent agents are identified and only they are Having accomplished their goals, the agents can return to forced to put checkpoints. The concept of antecedence their home site to report their results to the user [2]. Most graphs for fault tolerance in distributed systems was of these applications require high degree of reliability and originally introduced in Manetho [14] which utilized consistency. Therefore, fault tolerance is a key issue in antecedence graphs and message logs for fault tolerance in designing mobile agent systems [5, 11]. In this paper we distributed systems. But the overhead due to size of consider the scenario of multi-agent system consisting of antecedence graph with large number of agents involved several collaborating agents and amalgamate the concept of causes greater overheads in case of multi-agent systems if checkpointing and antecedence graphs for fault tolerance in used without checkpointing. Our proposed scheme multi agent systems. combines the antecedence graph approach with parallel The rest of the paper is organized as follows: section checkpointing and message logging. The proposed scheme 1.1 briefs the related research in the area of fault tolerance significantly resolves the associated problem of overhead for mobile agent systems. Section 2 describes the basic besides improving execution and recovery time. 50 ©2010 ACEEE DOI: 01.IJSIP.01.03.61
  • 2. ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010 II. SYSTEM FRAMEWORK interval Ω1B provides information about what happened The system consists of cooperating multiple agents (on before Ω1B . a single or multiple mobile hosts) which form multi agent group and collaborate with each other to perform a single Ω1 0 computationally complex task by passing messages Ω A between each other as shown in Fig.1. A A m3 m1/AG m2/AG Ω0 Ω1 m2 mn/AG B B B Host 1 Host 2 Host 3 Host n m1 MA1 MA2 MA3 MAn m m4 Ω0 0 2 Ω C C C Ω1C Fig. 2 An example of multi-agent system with three agents   BA Stabl B. AG Formation for Agent A The formation of antecedence graph for Agent A takes the following steps: Message m2 is received by Agent A BA: Base Agent MA I : Mobile Agent i (1< i < n) from Agent B. A combines the antecedence graph received from B to its own graph for the formation of the event Ω1A. Fig.1 Multi agent group The resultant graph is illustrated in Fig. 3. Each group has a Base Agent (BA) which coordinates Ω0 Ω0 Ω1 the participating agents of group and is assumed to execute B Ω1   Ω0A A Ω 1A A in fail safe mode. It also acts as recovery manager and B maintains access to persistent data storage, where agent checkpoints and recovery bookkeeping is held. Under our Ω0 strategy, each mobile agent will send its current B Ω1 antecedence graph to the agent that it is sending a message B to. All the messages exchanged would be stored by each agent in its volatile storage in form of message logs. The mobile agents may perform checkpointing of the Ω1 antecedence graph either when the depth exceeds certain Ω0 C threshold of specified nodes in its antecedence graph or Ω1 C Ω0 after elapsing of specific time. C C In general, most of the operations of internet applications are based on read operation, so we can safely Fig. 3 AG for agent A Fig. 4 AG for agent B assume that all the operations executed by the mobile agents are idempotent, thus the exactly once execution Ω0A Ω1A property is adhered to automatically. The three basic steps   Ω 1A Ω0A A 0B 1B m3 Ω Ω m2 B m1 m4 Ω0C Ω1C C A involved in the proposed scheme are formation of antecedence graph at individual agents followed by parallel checkpointing and rollback recovery in case of failure. These are discussed in detail in the following sections. Ω0B Ω1B A. Antecedence Graph (AG) Formation For Dependency Information Considering a scenario of a multi-agent system consisting of only three agents, agent A, agent B, and agent C. Its inter agent communication can be depicted in form of a graph as shown in Fig. 2. Each agent, at the start of its Ω1C Ω2C execution, is at state Ω0A , Ω0B and Ω0C respectively. Each Ω0C message receipt forms a deterministic interval. For example, the receipt of message m1 from B to C forms the deterministic interval and the antecedence graph of state Fig. 5 AG for agent C 51 ©2010 ACEEE DOI: 01.IJSIP.01.03.61
  • 3. ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010 Similarly agent B and C construct their antecedence agents for construction of new antecedence graphs may graphs as shown in Fig. 4 and Fig. 5. continue from the temporarily saved antecedence graphs. Following is the brief proposed checkpointing algorithm: C. Parallel Checkpointing If in self state, MAj decides for checkpointing, then it would The main goal of proposed scheme is to minimize the call following algorithm: global checkpointing latency and to reduce the total Requesting Agent MAj identifies Dependent Agents (DA) recovery time. Coordinated checkpointing is utilized for For each Agent Antecedence graph (AG) checkpointing as it shows better performance as compared Create Check Agent (CA) to other schemes as shown by comparative studies in [6]. MAj send a CA with temp-checkpoint request and value The dependent agents are the active agents of the 1/|GDj | to all DAs (where (1<j<n) collaborating group of n number of mobile agents W=0 performing the operation. These dependent agents for each For each agent AG mobile agent are stored in form of nodes of antecedence MAj receives reply to temp-check request. graphs. In proposed scheme, the dependence information is for each reply compute: accessible to the agent which requires for the checkpoint W=W + 1/|GDj|, from its antecedence graph. When the antecedence graph if W≠1then depth exceeds certain threshold or after elapsing of certain cancel checkpointing & wait for threshold event time, mobile agent (MA) may request for checkpointing. If W=1 then For requesting agent MAj , (1<j<n), we set a variable At MAj and all DAs: Graph Depth (GDj), which is the depth of requesting Save AG as checkpoint. agent’s antecedence graph at initialization of Send the final checkpointed AG to BA. checkpointing. At threshold event, if MAj starts a Discard successfully checkpointed nodes from checkpoint request and informs all dependent agents (DA) AG. of its antecedence graph. It carries out this request through Continue again from temporary AG. a MA called Check Agent (CA) which is made for every At BA: DA during the start of checkpoint agent and the time of Construct maximum length AG from received sending checkpointing request to the DAs. AGs. When MAj sends this request, it attaches with CA, a Write it to stable storage. numeric weight of value 1/| GDj |. In parallel the requesting agent as well as DAs make temporary AGs of the events Once the AGs of agents have been checkpointed, the occurred during execution of checkpointing operation. The agents now don’t have to piggyback the checkpointed AG, time of this temporary logging is overlapped with actual thus the message size is considerably reduced. This in turn execution of the transaction and checkpointing and so it would reduce bandwidth consumption and cause speedy does not have any extra load for system and is therefore executions. In case of failure the checkpointed state is used non-blocking. Now all the dependent agents specified in for recovery. The checkpointed state here is the maximum the antecedence graph would receive the inquiry message length AG stored in the stable storage of BA. The through CA and if they agree on checkpointing, they would recovering agent requests for maximum length AG from send back the numeric weight indicating positive response, BA which has been the latest saved checkpointed AG. The to the starting agent. The received responses from recovering agents will now create a message log using the dependent agents are added together and if they equal 1, it AG constructed through above step. This message log will means that all the relevant agents have responded. In this contain the necessary messages that need to be replayed to moment, the request for changing the temporary checkpoint recover the state of each failed agent. Using the AG and to the main one is issued. But even if one of them responds message logs, messages required for recovery are replayed. back negatively, the checkpointing is cancelled and all DAs This results in achievement of global consistent state. After are informed. The distinctiveness of our scheme is that the recovery, the normal operation continues. checkpoint request is distributed through all the agents in a parallel manner. Finally if the starting agent received the III. PERFORMANCE ANALYSIS AND COMPARATIVE STUDY positive response from all the dependent agents, it makes The proposed system of multiple agents performing in the real checkpoint and informs the others respectively. collaboration in a group has been implemented on IBM The BA is then sent the final checkpointed antecedence Aglets [7] over a network of systems with configuration of graphs by starting as well as by dependent agents. At BA 1 GB RAM and 3.2 GHz processor connected be 10/100 the maximum length graph from these individual agents is MBPS Ethernet. Aglets [13] is a java based graphical constructed and stored in stable storage. After final interface for developing the distributed multi-agent checkpointing, the previous antecedence graphs are deleted systems. The case scenario used to implement the proposed which considerably reduces the size of the graph system is searching for best deals offered by suppliers in piggybacked on the message thereby helping to maintain terms of cost and product parameters. The mobile agents the efficiency of algorithm in scenario where large number are used to retrieve this information from various agent of agents participate in performing a transaction. After servers acting as supplier. There may be more than one successful completion of checkpointing, the involved mobile agent at each server. The inter agent 52 ©2010 ACEEE DOI: 01.IJSIP.01.03.61
  • 4. ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010 communication is through mobile agents using messages. checkpointing approach increases with increase in number The dependent agents are the active agents of the of dependent agents. collaborating group of mobile agents performing the This results in increase in execution time. The operation. The number of dependent agents is gradually integration of checkpointing with antecedence graph as in increased to study the variations in parameters. proposed approach can greatly reduce the time for normal Fig. 6 shows the comparison of checkpointing for non- execution of operation in multi agent group. Besides the checkpointing antecedence graph approach [15] and the recovery too can be faster in case of failing agents. Thus proposed scheme. The proposed approach reports much checkpointing can greatly enhance the performance of the less checkpointing time as the only dependent agents are antecedence graph approach for fault tolerance. involved in checkpointing. Participation of only dependent agents reduces the overhead of waiting for response from all agents of the group. Reduction in checkpointing time is significant advantage of our approach. Fig. 7 Comparison of Execution time Fig. 6 Comparison of Checkpointing time IV. CONCLUSIONS The execution of the operation being performed by the In this paper we proposed an approach to introduce fault collaborating group has been done once without tolerance in multi agent system through checkpointing checkpointing as in [15] and secondly with checkpointing using antecedence graph approach. The integration of using the proposed scheme. To measure the variation in checkpointing with antecedence graph approach execution time, five iterations were done for different significantly improves the performance of collaborating number of dependent agents as shown in Fig. 7. Analysis of group of agents. Experimental results show that the results shows that the execution time for both checkpointing done through collection list of only approaches (with and without checkpointing) remains dependent agents underlined by antecedence graphs results nearly same for smaller number of dependent agents. When in better execution time and low checkpointing time. In the number of dependent agents increases, the proposed future, comparison of the graph based approach with other checkpointing approach, results in faster execution. This approaches can be made on the suitability of approach for can be attributed to the fact that due to checkpointing the various applications. Besides, the proposed scheme can be antecedence graph piggybacked on the messages implemented into real life applications for providing exchanged by agents, never exceed a preset limit. On the reliability. other hand the size of the graph piggybacked in non 53 ©2010 ACEEE DOI: 01.IJSIP.01.03.61
  • 5. ACEEE Int. J. on Signal & Image Processing, Vol. 01, No. 03, Dec 2010 REFERENCES [8] K. Park, “A fault-tolerant mobile agent model in replicated secure services”, Springer, Proceedings of International [1] Hyacinth S. Nwana, “Software Agents: An Overview”, Conference Computational Science and Its Applications, Vol. Knowledge Engineering Review, Vol. 11, No. 3, Cambridge 3043, 2004, pp. 500-509. University Press, 1996, pp. 1- 40. [9] E. N. (Mootaz) Elnozahy, L. Alvisi, Y. Wang and D. B. [2] S.S. Manvi and P. Venkataram, “Applications of agent Johnson,” A survey of rollback-recovery protocols in message- technology in communications: a review”, Springer Computer passing systems”, ACM Computing Surveys, Vol. 34, Nr. 3, Communication, 2004, pp. 1493-1508. 2002, pp. 375-408. [3] W. Qu, H. Shen and X. Defago, “A survey of mobile agent- 10] J. Yang, J. Cao and W. Wu, “CIC: An integrated approach to based fault-tolerant technology“, Proceedings of Sixth IEEE checkpointing in mobile agent systems”, Proceedings of the International Conference on Parallel and Distributed Computing Second IEEE International Conference on Semantics, Knowledge Applications and Technologies, 2005, pp. 446-450. and Grid, 2006. [4] S. Pleisch and A. Schiper, “FATOMAS-A Fault-Tolerant [11] W. Qu and H. Shen, “Analysis of mobile agents’ fault- Mobile Agent System Based on the Agent-Dependent Approach”, tolerant behavior”, Proceedings of IEEE/WIC/ACM international Proceedings of the IEEE International Conference on Dependable conference on intelligent agent technology, 2004. Systems and Networks, 2001, pp. 215-224. [12] K. Rothermel and M. Strasser, “A fault-tolerant protocol for [5] M. R. Lyu, X. Chen, and T. Y. Wong, “Design and Evaluation providing the exactly-once property of mobile agents”, of a Fault-Tolerant Mobile-Agent System”, IEEE CS Press, Proceedings Seventeenth IEEE Symposium on Reliable September/October 2004, pp. 32-38. Distributed Systems, 1998, pp. 100-108. [6] H. K. Yeom, H. Y. T. Park and H. Park, “The cost of [13] Banny B. Lange , “ Java Aglets application Programming checkpointing, logging and recovery for the Mobile Agent Interface(JAAPI) White Paper-Draft 2”, IBM Tokyo Research Systems”, Proceedings of Pacific Rim International Symposium Laboratory. on Dependable Computing, 2002, pp. 45-48. [14] E. N. Elnozahy, “Manetho: Fault Tolerance in Distributed [7] Aglet, http://aglets.sourceforge.net/ Systems Using Rollback-Recovery and Process Replication”, PhD Thesis, Rice University, Houston, Texas, October 1993. 54 ©2010 ACEEE DOI: 01.IJSIP.01.03.61