Implementation of High Availability Message ISO 8583 using F5 Active-Passive Failover Method

Implementation of High Availability Message ISO 8583 using F5 Active-Passive Failover Method

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-4
Year of Publication : 2023
Author : Bahrul Ilham, Yanto Setiawan
DOI : 10.14445/22315381/IJETT-V71I4P223

How to Cite?

Bahrul Ilham, Yanto Setiawan, "Implementation of High Availability Message ISO 8583 using F5 Active-Passive Failover Method, " International Journal of Engineering Trends and Technology, vol. 71, no. 4, pp. 264-273, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I4P223

Abstract
In this research, the system was designed to solve problems related to High Availability on FDS (Fraud Detection System) servers that cannot be loaded balanced using the Round Robin method, resulting in changes to ISO 8583 messages. As a result, a method that can be used as High availability to maintain the Availability of the FDS Server without changing the message received is required. High availability will be achieved through the Active Passive Failover method, which will transfer data flows in the event of an operational failure on the FDS server. The transfer is based on CPU Load parameters and ISO 8583 messages, which are checked at each stage. The waterfall method was used in this research. The waterfall is a straightforward classic model with a linear system flow, with the output of each stage serving as the input for the next. The primary goals of this research are to ensure that data in ISO 8583 format can be streamed without changing messages, to measure the effectiveness of the Active Passive Failover method in performing High availability using ISO 8583 message parameters and CPU Load, and to increase the level of Availability and reliability of the FDS Server. This research's error rate decreased by 0.83%, and the SLA (Service Level Agreement) increased from 99.13% to 99.96%.

Keywords
High availability, Active, Passive failover, Message iso 8583.

References
[1] Tahereh Pourhabibi et al., “Fraud Detection: A Systematic Literature Review of Graph-based Anomaly Detection Approaches,” Decision Support Systems, vol. 133, p. 113303, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Manjeevan Seera et al., “An Intelligent Payment Card Fraud Detection System,” Annals of Operations Research, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Xiaoqian Zhu et al., “Intelligent Financial Fraud Detection Practices in Post-pandemic Era,” Innovations, vol. 2, no. 4, p. 100176, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Wang Jia, and Gao Yinchun, “Design and Implementation of Network Course-choosing Based on the F5 Load Balancing Technology,” IEEE 9th Joint International Information Technology and Artificial Intelligence Conference, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Minal Moharir et al., “A Study and Comparison of Various Types of Load Balancers,” International Conference on Recent Advances and Innovations in Engineering, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Erfan Zamanian et al., “Rethinking Database High Availability with RDMA Networks,” Proceedings of the VLDB Endow., vol. 12, no. 11, pp. 1637–1650, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Dadan Irwan, Heru Sukoco, and Sri Wahjuni, “Service High Availability Pada Native Server dan Virtual Server Menggunakan Proxmox VE,” Jurnal Kajian Ilmiah, vol. 20, no. 2, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Bholanath Mukhopadhyay, Rajesh Bose, and Sandip Roy, “A Novel Approach to Load Balancing and Cloud Computing Security using SSL in IaaS Environment,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 2, 2020.
[CrossRef] [Google Scholar
[9] Alejandro Martin et al., “A Proposal for a High Availability Architecture for VoIP Telephone Systems Based on Open Source Software,” International Journal of Advanced Computer Science and Applications, vol. 9, no. 9, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Andrew Fiade, Muhammad Aldi Agustian, and Siti Ummi Masruroh, “Analysis of Failover Link System Performance in OSPF, EIGRP, RIPV2 Routing Protocol with BGP,” 2019 7th International Conference on Cyber and IT Service Management, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Arief Husaini, Umar Ali Ahmad, and R. Rogers Dwiputra Setiady, “Implementasi High Availability Dengan Metode Failover Pada Amazon Web Service Implementation High Availability With Failover Method on Amazon Web Service,” e-Proceeding of Engineering, vol. 8, no. 6, pp. 12007–12013, 2021.
[Google Scholar]
[12] Mezui Eya’a Guy Lysmos, and Mostafa Hanoune, “Hybrid Data Compression System in Smart E-Health Gateway For Medical Monitoring Applications,” SSRG International Journal of Computer Science and Engineering, vol. 7, no. 1, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Diamun Fikri Solissa, and Maman Abdurohman, “Hadoop high availability with Linux HA,” 2018 6th International Conference on Information and Communication Technology, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Milos Ljubojević, Aleksandar Bajić, and Danijel Mijić, “Implementation of High-Availability Server Cluster by using Fencing Concept,” 2019 18th International Symposium INFOTEH-JAHORINA, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Yasmina Bouizem et al., “Active-Standby for High-Availability in FaaS,” Proceedings of the 2020 6th International Workshop on Serverless Computing, pp. 31–36, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Harkirat Kaur Aroral, “Waterfall Process Operations in the Fast-paced World : Project Management Exploratory Analysis,” International Journal of Applied Business and Management Studies, vol. 6, no. 1, pp. 91–99, 2021.
[Google Scholar] [Publisher Link]
[17] Mahesh M. Baradkar, and Bandu B. Meshram, “A Survey on Cloud Security: Infrastructure as a Service,” SSRG International Journal of Computer Science and Engineering, vol. 6, no. 6, pp. 17-21, 2019.
[CrossRef] [Publisher Link]
[18] Haneya Naeem Qureshi et al., “Service Level Agreements for 5G and Beyond : Overview , Challenges and Enablers of 5G-Healthcare Systems,” IEEE Access, vol. 9, pp. 1044-1061, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Doni Andriansyah, “Performance Dan Stress Testing Dalam Mengoptimasi Website,” Computer Based Information System Journal, vol. 7, no. 1, , pp. 23–28, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Dharmendra Prasad Mahato, and Ravi Shankar Singh, “Load Balanced Scheduling and Reliability Modeling of Grid Transaction Processing System Using Coloured Petri Nets,” ISA Transactions, vol. 84, pp. 225-236, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Bagus Jati Kuncoro, Ikhwan Ruslianto, and Syamsul Bahri, “Implementation of Health Checks Monitoring on Load Balancer on Android-Based Web Server Side,” Coding : Journal of Computers and Applications, vol. 7, no. 1, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Klaus-Tycho Foerster et al., “On the Feasibility of Perfect Resilience with Local Fast Failover ,” Symposium on Algorithmic Principles of Computer Systems, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[23] R.S. Ranjitha et al., “Multi-Account Embedded ATM Card with Face Recognition Security System,” International Journal of Engineering Research and Technology, vol. 8, no. 11, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Nanang Kuntoro, and Siti Madinah Ladjamuddin, “Rancangan Aplikasi Simulasi Host-to-Host Transaksi ATM Bersama dengan ISO 8583,” Incomtech, vol. 8, no. 1, pp. 16–22, 2019.
 [Google Scholar
[25] Ashutosh Sharma, and Rajiv Kumar, “Risk-energy Aware Service Level Agreement Assessment for Computing Quickest Path in Computer Networks,” International Journal of Reliability and Safety, vol. 13, no. 1-2, pp. 96–124, 2019.
[CrossRef] [Google Scholar] [Publisher Link]