CLUSTRER STATE COORDINATION REDUCERS BASED ON RSDP

Authors

DOI:

https://doi.org/10.17721/ISTS.2025.9.5-10

Keywords:

distributed computing, device coordination, state synchronization, cluster management, service availability, security incidents, Replica State Discovery Protocol (RSDP), RSDP cluster state reducers

Abstract

Background. Contemporary distributed systems tend to leverage complex network topologies and intercommunication technologies for performing complex computational tasks. It is quite common for such systems to rely on centralized coordination where one or a group of designated servers serve as a management plane for the entire network. While this approach may simplify the consensus process, it introduces additional requirements for infrastructure engineering and maintenance. Nodes serving as a control plane require additional hardware resources as well as human effort and competence to manage external services capable of providing basic coordination primitives. Most cases requiring consensus could be reduced to simplistic procedures like gathering knowledge about network participants and dividing deterministically state slices between them. Therefore, implementing a complex coordination solution that requires an additional maintenance method could be inefficient. The Replica State Discovery Protocol stands as a lightweight coordination solution presenting a simple interface for achieving consensus between nodes within a cluster.
Methods. Within the ambit of this research, a set of cluster state reducers is described, providing basic coordination capabilities, including the formation of a network participants list and task division between them. Using mathematical modeling, we describe the procedures necessary for performing the said coordination tasks. Implementation and testing of reducers is done with the Node.js platform capable of running JavaScript code on the server side. A theoretical analysis and description of the proposed methods for distributed coordination are provided within this work to facilitate their integration into modern systems.
Results. As a result of this research, we propose three new cluster state reducers serving as methods of basic coordination capabilities as an exemplary application of RSDP. The first reducer is responsible for gathering the directory of participating nodes within a cluster and maintaining their statuses based on the received data. The second reducer performs a timeframe division within a cluster between the nodes to coordinate their execution in a mutually exclusive environment. Lastly, the rate limit reducer describes a logic to perform consensus regarding a single value that should be shared throughout the system as well as promptly updated if needed.
Conclusions. While engineering a complex distributed system requiring consensus among its subsystems or a set of homogenous components, it's important to avoid complexities related to the management of additional infrastructure while still providing a required level of consistency and availability. Having said that, the Replica State Discovery Protocol provides essential lightweight capabilities to resolve the said problem through the means of its flexible state reducers system. RSDP is built with a layered architecture in mind, capable of adjusting to the particular needs of the network as shown in this paper. By leveraging existing communication infrastructure and avoiding redundant management layers, RSDP allows for significantly reducing the computational complexity of coordination as well as costs associated with hardware needed for running a dedicated control plane. State reducers described within this article provide basic capabilities required for the most common coordination tasks, including the construction of a participants directory, task splitting and assignments, as well as consensus regarding the configuration parameters.

Downloads

Download data is not yet available.

References

Ali, A. H. (2019). A Survey on Vertical and Horizontal Scaling Platforms for Big Data Analytics. International Journal of Integrated Engineering, 11(6), 138–150. https://publisher.uthm.edu.my/ojs/index.php/ijie/article/view/2892

Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defense mechanisms: Classification and state-of-the-art. Computer Networks, 44(5), 643–666. https://doi.org/10.1016/j.comnet.2003.10.003

El Malki, A., Zdun, U., & Pautasso, C. (2022). Impact of API rate limit on reliability of microservices-based architectures. In B. Smith, & J. Doe (Eds.), Proceedings of the 2022 IEEE International Conference on Service-Oriented System Engineering (SOSE) (pp. 19–28). IEEE Press. https://doi.org/10.1109/SOSE55356.2022.00009

Firmani, D., Leotta, F., & Mecella, M. (2019). On computing throttling rate limits in web APIs through statistical inference. In J. Zhang & H. Zhao (Eds.), Proceedings of the 2019 IEEE International Conference on Web Services (ICWS) (pp. 418–425). IEEE Press. https://doi.org/10.1109/ICWS.2019.00075

Hu, J., & Liu, K. (2020). Raft consensus mechanism and the applications. Journal of Physics: Conference Series, 1544(1), 012079. https://doi.org/10.1088/1742-6596/1544/1/012079

Junqueira, F., & Reed, B. (2013). ZooKeeper: Distributed process coordination. O'Reilly Media, Inc. https://www.oreilly.com/library/view/zookeeper/9781449361297/

Kotov, M. S., Toliupa, S. V., & Nakonechnyi, V. S. (2024). Method of building local area network simulation based on AMQP and its support protocols suite. Telecommunication and Information Technologies, 3, 102–119 [in Ukrainian]. [Котов, М. C., Толюпа С. В., Наконечний В. С. (2024). Метод побудови симуляції локальної мережі на основі amqp та набір протоколів підтримки. Телекомунікації та інформаційні технології, 3, 102–119]. https://doi.org/10.31673/2412-4338.2024.039989

Millnert, V., & Eker, J. (2020). HoloScale: Horizontal and vertical scaling of cloud resources. In A. Editor, & B. Editor (Eds.), Proceedings of the 2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC) (pp. 196–205). IEEE Press. https://doi.org/10.1109/UCC48980.2020.00038

Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. SIGCOMM Computer Communication Review, 34(2), 39–53. https://doi.org/10.1145/997150.997156

Nalawala, H. S., Shah, J., Agrawal, S., & Oza, P. (2022). A comprehensive study of “etcd”– An open-source distributed key-value store with relevant distributed databases. In Emerging Technologies for Computing, Communication and Smart Cities. Lecture Notes in Electrical Engineering, 875. Springer, Singapore. https://doi.org/10.1007/978-981-19-0284-0_35

Ni, L., Ye, Q., Yang, J., Zhang, S., & Xian, M. (2024). Research of Raft algorithm improvement in blockchain. In X. Editor, & Y. Editor (Eds.), Proceedings of the 2024 IEEE 16th International Conference on Advanced Infocomm Technology (ICAIT) (pp. 290–294). IEEE Press. https://doi.org/10.1109/ICAIT62580.2024.10808140

Serbout, S., El Malki, A., Pautasso, C., & Zdun, U. (2023). API rate limit adoption: A pattern collection. In J. Noble, & K. Beck (Eds.), Proceedings of the 28th European Conference on Pattern Languages of Programs (EuroPLoP '23) (Article 5, pp. 1–20). Association for Computing Machinery. https://doi.org/10.1145/3628034.3628039

Srivastava, A., Gupta, B. B., Tyagi, A., Sharma, A., & Mishra, A. (2011). A recent survey on DDoS attacks and defense mechanisms. In Advances in parallel distributed computing. PDCTA 2011. Communications in computer and information science, 203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24037-9_57

Toliupa, S., Kotov, M., Buchyk, S., Boiko, J., & Shtanenko, S. (2024). Stateful cluster leader failover models and methods based on Replica State Discovery Protocol. Proceedings of the IT&I Workshops 2024, 120–140. https://ceur-ws.org/Vol-3933/Paper_10.pdf

Van Renesse, R., & Altinbuken, D. (2015). Paxos made moderately complex. ACM Computing Surveys, 47(3), Article 42, 1–36. https://doi.org/10.1145/2673577

Yaga, D., Mell, P., Roby, N., & Scarfone, K. (2019). Blockchain technology overview. National Institute of Standards and Technology Internal Report. https://doi.org/10.48550/arXiv.1906.11078

Zhang, B., Zhang, T., & Yu, Z. (2017). DDoS detection and prevention based on artificial intelligence techniques. In M. Chen, & L. Wang (Eds.), Proceedings of the 2017 3rd IEEE International Conference on Computer and Communications (ICCC) (pp. 1276–1280). IEEE Press. https://doi.org/10.1109/CompComm.2017.8322748

Published

2025-08-29

Issue

Section

Cybersecurity and information protection

How to Cite

CLUSTRER STATE COORDINATION REDUCERS BASED ON RSDP. (2025). Information Systems and Technologies Security, 1(9), 5-10. https://doi.org/10.17721/ISTS.2025.9.5-10

Most read articles by the same author(s)