• Title/Summary/Keyword: Software fault tolerance

Search Result 90, Processing Time 0.02 seconds

Dependability Modeling of Software Fault Tolerance Techniques (소프트웨어 결함허용 기법들의 의존도 모델링)

  • 김용규;김성수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10a
    • /
    • pp.614-616
    • /
    • 1999
  • 신뢰도 높은 소프트웨어 개발의 필요성은 전혀 새로운 것이 아니다. 요즘 들어, 소프트웨어의 크기와 복잡도가 증가함으로 인해 소프트웨어의 결함 때문에 발생하는 시스템 고장이 전체 시스템 고장에서 많은 비중을 차지하고 있다. 고 신뢰도를 요구하는 시스템의 소프트웨어는 복구블록, 분산 복구블록, N-버전 프로그래밍, N 자기검사 프로그래밍과 같은 소프트웨어 결함허용 기법들을 사용하고 있다. 이러한 소프트웨어 결함허용 기법들에 대한 연구와 함께 소프트웨어 결함허용 기법들의 의존도 측정에 관한 연구 또한 매우 중요하다. 이에 본 논문에서는 마르코프 모델을 사용해서 소프트웨어 결함허용 기법들의 보다 자세한 신뢰도 모델링과 가용도, 안전도 등에 관한 모델링을 제시한다. 제안된 모델 분석 결과 같은 수의 대체블록이 있을 때는 분산 복구블록, 복구 블록, N 자기검사 프로그래밍, N-버전 프로그래밍 순으로 의존도가 높음을 알 수 있다. 또한 소프트웨어 결함허용 기법들의 신뢰도민감성 분석에서는 복구블록과 분산 복구블록인 경우는 적응검사의 결함발생율에, N-버전 프로그래밍인 경우는 프로그램 버전의 결함발생율에 더 민감한 영향을 받는 것을 알 수 있다.

  • PDF

A Study on Modified PBFT Study for Effective Convergence of IoT Big Data and Blockchain Technology (IoT 빅데이터와 블록체인 기술의 효과적 융합을 위한 수정된 PBFT연구)

  • Baek, Yeong-Tae;Min, Youn-A
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.193-194
    • /
    • 2020
  • 블록체인의 활용이 다양해지며 블록체인을 통한 산업, 정부의 기술적용이 확산되고 있다. 특히 사물인터넷 등 빅데이터 관리를 위한 방법으로 블록체인과의 융합도 적지 않게 거론되고 있다. 사물인터넷과 같은 빅데이터를 효과적으로 관리하기 위해서는 수집 및 저장과정과 더불어 투명하고 정확한 신뢰기반의 데이터 관리가 필요하다. 현재 블록체인의 프라이빗 블록체인 플랫폼에서 가장 많이 제시되고 활용되는 합의알고리즘은 PBFT이다. PBFT의 경우 노드 증가에 따른 연산알고리즘의 과중으로 인한 속도저하가 문제가 될 수 있다. 본 논문에서는 PBFT의 합의과정에 대한 알고리즘을 수정하여 노드 증가 시에도 복잡도를 낮출 수 있는 방법을 제안하였다. 본 논문에서는 시뮬레이션을 통하여 노드 개수를 변형하며 기존 PBFT알고리즘 대비 제안 알고리즘의 우수성을 증명한다.

  • PDF

MS Load Balancing Algorithm in Cloud Computing

  • Ankita Gupta;Ranu Lal Chouhan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.157-161
    • /
    • 2024
  • Cloud computing becomes an important technology for distributed computing and parallel computing. Cloud computing provides various facility like to share resources, software packages, information, storage and many different applications depending on user demand at any time and at any place. It provides an extensive measure for computing and storage. A service provided by it to user follows pay-as-you-go model. Although it provides many facilities still there is some problem which are resource discovery, fault tolerance, load balancing, and security. Out of these Load balancing is the main challenges. There are many techniques which used to distribute wor9kload or task equally across the servers. This paper includes cloud computing, cloud computing architecture, virtualization and MS load balancing technique which provide enhanced load balancing.

An Error Detection and Recovery System based on Multimedia Computer Supported Cooperative Work (멀티미이어 협동 작업환경에서의 오류 감지 및 복구 시스템)

  • Ko, Eung-Nam;Hwang, Dae-Joon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5
    • /
    • pp.1330-1340
    • /
    • 2000
  • Multimedia isn ow applied to various real world areas. In particular, the focus on multimedia system and CSCW(Computer Supported Cooperative Work) has increased. In spite of this current trend, however, the study of fault tolerance for CSCW has not yet fully progressed. We propose EDR_MSCW. It is a system that is suitable for detecting ad recovering software error based on multimedia computer supported cooperative work as DOORAE by using software techniques. DOORAE is a framwork for supporting development on multimedia applications for computer-based collaborative works. When an error occurs, EDR_MCSCW detects an error by using hooking methods in MS-Windows API(Application Program Interface) function. If an error is found, we present a checkpointing and recovery algorithm which has the removal function of the domino-effect for recovering multimedia and CSCW by using stack.

  • PDF

Analysis of Diagnosis Algorithm Implemented in TCU for High-Speed Tracked Vehicles (고속 무한궤도 차량용 변속제어기 진단 알고리즘 분석)

  • Jung, Gyuhong
    • Journal of Drive and Control
    • /
    • v.15 no.4
    • /
    • pp.30-38
    • /
    • 2018
  • Electronic control units (ECUs) are currently popular, and have evolved further towards the high-end application of autonomous vehicles in the automotive industry. Such digital technologies have also become widespread, in agriculture and construction equipment. Likewise, transmission control of high-speed tracked vehicles is based on the transmission control unit (TCU), performing complex gear change control functions, and diagnostic algorithms (a TCU's self-diagnostic and reporting capability of malfunction data through CAN communication). Since all functions of TCU are implemented by embedded-software, it is hardly possible to analyze specifications by reverse engineering. In this paper a real-time transmission simulator adaptable to TCU is presented, for analysis of diagnosis algorithm and standards. Signal simulation circuits are deliberately designed considering electrical characteristics of TCU inputs and various analysis tools, such as analog input auto scan function, and global output enable switch, are implemented in software. Test results from hardware-in-the-loop simulator verify tolerance time for each error, as well as cause of fault, error reset conditions.

Secure methodology of the Autocode integrity for the Helicopter Fly-By-Wire Control Law using formal verification tool (정형검증 도구를 활용한 Fly-By-Wire 헬리콥터 비행제어법칙 자동코드 무결성 확보 방안)

  • An, Seong-Jun;Cho, In-Je;Kang, Hye-Jin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.5
    • /
    • pp.398-405
    • /
    • 2014
  • Recently the embedded software has been widely applied to the safety-critical systems in aviation and defense industries, therefore, the higher level of reliability, availability and fault tolerance has become a key factor for its implementation into the systems. The integrity of the software can be verified using the static analysis tools. And recent developed static analysis tool can evaluate code integrity through the mathematical analysis method. In this paper we detect the autocode error and violation of coding rules using the formal verification tool, Polyspace(R). And the fundamental errors on the flight control law model have been detected and corrected using the formal verification results. As a result of verification process, FBW helicopter control law autocode can ensure code integrity.

A Novel Architecture for Dynamic Mobile Networks with IPv6-based Multiple Network Interfaces (IPv6 기반의 다중 네트워크 인터페이스를 갖는 새로운 동적 이동형 네트워크 아키텍쳐)

  • Kim Wan-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.25-34
    • /
    • 2006
  • In this paper DynaMoNET is suggested as a novel IPv6-based multi-homed mobile network architecture which is composed of nested mobile ad hoc networks dynamically coming together through wireless personal area networks. Each ad hoc network has a mobile router which may work as a root mobile router instead of fixed mobile routers in a DynaMoNET. A root mobile router provides the reliable Internet connectivity for the entire mobile network. This paper includes a innovative handover protocol for multi-homed mobile networks, network switchover algorithm considering multiple decision factors, root mobile router election process based on token-based algorithm fast root mobile router discovery algorithm and fault avoidance mechanism to support reliable Internet connectivity. Finally the system architecture of a mobile router is given in detail.

Multi-Attribute Data Fusion for Energy Equilibrium Routing in Wireless Sensor Networks

  • Lin, Kai;Wang, Lei;Li, Keqiu;Shu, Lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.1
    • /
    • pp.5-24
    • /
    • 2010
  • Data fusion is an attractive technology because it allows various trade-offs related to performance metrics, e.g., energy, latency, accuracy, fault-tolerance and security in wireless sensor networks (WSNs). Under a complicated environment, each sensor node must be equipped with more than one type of sensor module to monitor multi-targets, so that the complexity for the fusion process is increased due to the existence of various physical attributes. In this paper, we first investigate the process and performance of multi-attribute fusion in data gathering of WSNs, and then propose a self-adaptive threshold method to balance the different change rates of each attributive data. Furthermore, we present a method to measure the energy-conservation efficiency of multi-attribute fusion. Based on our proposed methods, we design a novel energy equilibrium routing method for WSNs, viz., multi-attribute fusion tree (MAFT). Simulation results demonstrate that MAFT achieves very good performance in terms of the network lifetime.

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster

  • Chaudhry, Junaid Ahsenali
    • Journal of Information Processing Systems
    • /
    • v.5 no.2
    • /
    • pp.69-76
    • /
    • 2009
  • Self healing systems are considered as cognation-enabled sub form of fault tolerance system. But our experiments that we report in this paper show that self healing systems can be used for performance optimization, configuration management, access control management and bunch of other functions. The exponential complexity that results from interaction between autonomic systems and users (software and human users) has hindered the deployment and user of intelligent systems for a while now. We show that if that exceptional complexity is converted into self-growing knowledge (policies in our case), can make up for initial development cost of building an intelligent system. In this paper, we report the application of AHSEN (Autonomic Healing-based Self management Engine) to in OKKAM Project infrastructure backbone cluster that mimics the web service based architecture of u-Zone gateway infrastructure. The 'blind' load division on per-request bases is not optimal for distributed and performance hungry infrastructure such as OKKAM. The approach adopted assesses the active threads on the virtual machine and does resource estimates for active processes. The availability of a certain server is represented through worker modules at load server. Our simulation results on the OKKAM infrastructure show that the self healing significantly improves the performance and clearly demarcates the logical ambiguities in contemporary designs of self healing infrastructures proposed for large scale computing infrastructures.

Performance Analysis of Fault Tolerance System on Distributed Multimedia Environment (분산 멀티미디어 환경에서 실행되는 결함 허용 시스템의 성능 분석)

  • Ko Eung-Nam
    • Journal of Digital Contents Society
    • /
    • v.3 no.2
    • /
    • pp.255-264
    • /
    • 2002
  • Multimedia is now applied to various real worlds. In particular, the focus of CSCW(Computer Supported Cooperated Work) for multimedia education system has increased. DOORAE is a framework for supporting development of applications running on distributed multimedia environment and multimedia distance education system. EDA is a system is able to detect automatically a software error based on distributed multimedia. It has been designed and implemented for construction and experiment of effective DOORAE environment. It detects an error by polling periodically the process with relation to session. Conventional method detects an error by polling periodically all the process. This papaer explains a performance analysis of an error detection system running on distributed multimedia environment using the rule-based SES and DEVS modeling and simulation techniques. In DEVS, a system has a time base, inputs, states, outputs, and functions.

  • PDF