Efficient Checkpointing Mechanisms for Primary-Backup Replication on the Cloud

Efficient Checkpointing Mechanisms for Primary-Backup Replication on the Cloud

Received: 7 February 2018 Revised: 19 April 2018 Accepted: 3 May 2018 DOI: 10.1002/cpe.4707 SPECIAL ISSUE PAPER Efficient checkpointing mechanisms for primary-backup replication on the cloud Berkin Güler Öznur Özkasap Department of Computer Engineering, Koç University,Istanbul, Turkey Summary Severaldistributedservicesrangingfromkey-valuestorestocloudstoragerequirefault-tolerance Correspondence Öznur Özkasap, Department of Computer and reliability features. For enabling fast recovery and seamless transition, primary-backup repli- Engineering, Koç University,Istanbul, Turkey. cation protocols are widely used in different application settings including distributed databases, Email: [email protected] web services, and the Internet of Things. In this study, we elaborate the ways of enhancing the efficiency of the primary-backup replication protocol by introducing various checkpointing tech- niques. We develop a geographically replicated key-value store based on the RocksDB and use the PlanetLab testbed network for large-scale performance analysis. Using various metrics of inter- est including blocking time, checkpointing time, checkpoint size, failover time, and throughput and testing with practical workloads via the YCSB tool, our findings indicate that periodic-incremental checkpointing promises up to 5 times decrease in blocking time and a drastic improvement on the overall throughput compared to the traditional primary-backup replication. Furthermore, enabling Snappy compression algorithm on the periodic-incremental checkpointing leads to fur- ther reduction in blocking time and increases system throughput compared to the traditional primary-backup replication. KEYWORDS checkpointing, compressed checkpointing, incremental checkpointing, periodic checkpointing, primary-backup replication, replicated cloud key-value stores 1 INTRODUCTION As the cloud systems continue to enlarge, the underlying networks empowering them also maintain their steady growth to stay sustainable against challenges involving immense user population and the big data. This growth is observed in two aspects as the geographical scaling of the nodes and the increase in the node counts. The availability becomes more and more significant as any outages that could last milliseconds of increase in response times may result in high income losses.1 Moreover, the possibility of facing with failures in these systems is inevitable due to extensive usage of software and hardware components with the long running applications that exceed the mean time between failures of the components.2 The most important and effective approach to deal with crash failures is replication. It is widely used as a fault-tolerance mechanism, and finding optimal replication protocols is an active research area. There exist two main types of replication protocols, namely,active and passive. In the active replication, which is also known as state-machine replication, every incoming request is processed by every replica in the system resulting in multiple results to be collected. Once collected, they are reduced into a single result value using various algorithms and the client is notified accordingly. In the passive replication, which is also known as primary-backup replication, there exist a single primary replica and a group of backup replicas. Each request is executed only in the primary replica, the result is then copied to backup replicas and the client is notified. Another way of introducing recovery from failures is through the checkpointing that refers to saving the system state to a stable storage after critical executions. Afterwards, in the event of any failures during the execution, the previously saved checkpoint can be restored as a failure-free system state enabling the execution continue over. This approach also facilitates a quick rollback feature even against unforeseen failures and decreases the workload needed to revitalize a replica from zero state, since with a single rollback, the system state would be caught up with the latest failure-free state.3 In our recent work, we demonstrated applicability and benefits of various checkpointing algorithms in replication protocols.4,5 Concurrency Computat Pract Exper. 2018;30:e4707. wileyonlinelibrary.com/journal/cpe © 2018 John Wiley & Sons, Ltd. 1of15 https://doi.org/10.1002/cpe.4707 2of15 GÜLER AND ÖZKASAP In this study, we address combining checkpointing and replication mechanisms to further improve efficiency of replication in comparison to the traditional primary-backup replication in terms of lower client blocking time and higher overall system throughput. The contributions of this work areasfollows. • We propose an advanced primary-backup replication algorithm that minimizes the failover time by eliminating the recovery process in the event of rollback operation. • We develop a software framework by extending the open-source RocksDB key-value store and integrating our checkpointing definitions. The framework is used in geographically distributed setting of the PlanetLab overlay network following the proposed primary-backup replication protocol. • We conduct a thorough analysis of various checkpointing algorithms integrated with primary-backup replication. For this purpose, we con- sider full, incremental, differential, periodic-full, periodic-incremental, periodic-differential, compressed-periodic-incremental with different compression algorithms including GZIP,Snappy,and Zstd. • We apply various realistic workload scenarios through the Yahoo!Cloud Service Benchmarking (YCSB) tool and track numerous metrics includ- ing blocking time, checkpointing time, checkpoint size, system throughput, and three more metrics for compressed checkpointing techniques, namely,compression ratio, compression time, and decompression time. • Our findings indicate that the proposed primary-backup replication protocol supported by Snappy-compressed-periodic-incremental- checkpointing technique attains significant improvements in the system throughput and reduced blocking times compared with the traditional primary-backup replication protocol. 2 RELATED WORK Primary-backup replication6 is a long-established protocol defined and discussed in the literature. However, it is still an active research topic and, especially,a prominent initial point in designing current replication protocols in contemporary databases and key-value stores. The primary-backup replication protocol defines one exclusive node that is named primary,and the rest of the nodes are defined as backup replicas. When a client issues an update request, it is processed solely by the primary node and the results are disseminated to the backup nodes through update messages. As aforementioned, several modern key-value stores follow the same replication protocol in some degree, as discussed in the following. 2.1 Key-value stores and replication Cassandra7 is an open-source key-value store developed in Java programming language. The distributed architecture of the database was based on Amazon's DynamoDB,8 and the underlying data structure was based on Google's BigTable.9 Initially, it was developed by Facebook, but later on, it was passed on to Apache in 2009. It is now a widely used key-value store in the industry and its users include well-known companies such as Facebook, Twitter,Cisco, and Netflix. Figure 1A depicts how the replication in Cassandra takes place for a given update request. The diagram indicates how data is replicated once processed by its coordinator node.10 According to the CAP (Consistency,Availability,and Partition Tolerance) theorem,11 Cassandra is an AP (Avail- ability and Partition Tolerance) system meaning it prioritizes availability over consistency. Coordinator replica knows how many nodes and which nodes should receive a copy of the processed data and transfers it to them. In this point of view, the coordinator acts like a primary replica and other replicas receiving the copy resemble backup replicas. (C) (A) (B) FIGURE 1 Illustration of replication mechanisms in well-known key-value stores. A, Cassandra; B, MongoDB; C, Redis GÜLER AND ÖZKASAP 3of15 Although the MongoDB12 is classified as a document store rather than a key-value store, it can be considered as a store allowing nested key-value objects. It was initially being developed by the 10gen company in 2007 and open-sourced in 2009. Every record in MongoDB is actually a document and they are stored in the BSON format that is the Binary JSON format. BSON documents are actually objects containing the list of stored key-value pairs in that document. Well-known companies like Google, Bosch, EA, and SAP are just a few of them using MongoDB actively. As shown in Figure 1B, the replication protocol utilized in MongoDB is based on the primary-backup replication protocol with slight changes. Backup nodes are referred as secondary,and rest of the replication is very similar to primary-backup replication. Once the primary node receives an update request, it replicates the required values to the secondary replicas while controlling possible crash failures using the well-known heartbeat protocol. Due to failure cases, the primary server may go down and work like a secondary replica while one of the secondary replicas takes on the responsibility as a primary server. By default settings, MongoDB is a CP (Consistency and Partition Tolerance) system prioritizing consistency over availability as reads and writes go through only the primary server that ensures strong consistency; however, through changing a few parameters

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    15 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us