SlideShare une entreprise Scribd logo
1  sur  17
FAULT TOLERANCE
By– Gaurav Singh Rawat
Electrical Department
Systems Engineering
Fault Tolerance
Fault-tolerant computing is the art and science of
building computing systems that
continue to operate satisfactorily in the presence of
faults. A fault-tolerant system may be
able to tolerate one or more fault-types including –
i) transient(cause by external disturbance),
intermittent(cause by marginal designed error) or
permanent hardware faults,
ii) software and hardware design errors,
iii) operator errors, or
iv) externally induced upsets or physical damage.
Fault tolerance concept taxonomy
Faults
Errors
Failures
Fault-
Tolerance
Threats
Attributes
Means
Availability
Perform ability
Graceful Degradation
Maintainability
Testability
Error Detection
System Recovery
Fault Masking
Reconfiguration
Redundancy
Basic Concept
Dependability includes:
 Availability
 Reliability
 Safety(security)
 Maintainability
Availability & Reliability
 Availability: A measurement of whether
a system is ready to be used immediately
◦ System is available at any given moment
 Reliability: A measurement of whether
a system can run continuously without
failure
◦ System continues to function for a long
period of time
Safety & Maintainability
 Safety: A measurement of how safe failures
are
◦ System fails, nothing serious happens
◦ For instance, high degree of safety is required for
systems controlling nuclear power plants
 Maintainability: A measurement of how
easy it is to repair a system
◦ A highly maintainable system may also show a
high degree of availability
◦ Failures can be detected and repaired
automatically. Self-healing systems.
What is Fault?
 A system fails when it cannot meet its promises
(specifications)
 An error is part of a system state that may lead to
a failure
 A fault is the cause of the error
 Fault-Tolerance: the system can provide services
even in the presence of faults
 Faults can be:
◦ Transient (appear once and disappear)
◦ Intermittent (appear-disappear-reappear behavior)
 A loose contact on a connector intermittent fault
◦ Permanent (appear and persist until repaired)
Failure Model
Type of Failure Description
Crash failure A server halts, but is working correctly until it halts
Omission failure
Receive omission
Send omission
A server fails to respond to incoming requests
A server fails to receive incoming messages
A server fails to send messages
Timing failure A server's response lies outside the specified time
interval
Response failure
Value failure
State transition
failure
The server's response is incorrect
The value of the response is wrong
The server deviates from the correct flow of control
Arbitrary failure
(Byzantine failure)
A server may produce arbitrary responses at
arbitrary times
Error Detection
 Error detection is a detection of errors
caused by noise or other impairments during
transmission from the transmitter to the
receiver.
 There are many schemes of error
detection:-
1. Repetition codes.
2. Parity bits.
3. Checksums.
4. Cyclic redundancy checks.
5. Cryptography hash functions.
System Recovery
 We have talk a lot about fault tolerance
but not talk about what happen after fault
has occurred.
 A process that exhibits a failure has to be
able to recover to a correct state
 There are two type of recovery:
1. Backward Recovery.
2. Forward Recovery.
Backward Recovery
 The goal of backward recovery is to bring
the system from an erroneous state back
to a prior correct state
 The state of the system must be recorded
- checkpointed - from time to time, and
then restored when things go wrong
 Examples
◦ Reliable communication through packet
retransmission
Forward Recovery
 The goal of forward recovery is to bring a
system from an erroneous state to a
correct new state (not a previous state)
 Examples:
◦ Reliable communication via erasure(a
correction made by erasing) correction, such
as an (n, k) block erasure code.
Fault Masking
 Fault Masking is a structural redundancy
technique that completely masks faults
within a set of redundant modules.
 Redundancy is key technique for hiding
failures.
 Redundancy, however, can have an
adverse impact on the performance of a
system. For example, it can increase the
length of transmitted data or increase
the resource consumption.
Reconfiguration
 Reconfiguration is the “process of
eliminating a faulty entity from a system
and restoring the system to some
operational condition or state”.
 When we use Reconfiguration process
designer must be concerned with fault
detection, fault location, fault containment,
and fault recovery.
Redundancy
 In engineering redundancy is the
duplication of critical components or
function of a system with the intention of
increasing reliability of the system.
 Redundancy are four types:-
1. Hardware(such as DMR & TMR)
2. Software(N-version programming)
3. Time(transient fault detection such as
Alternate logic)
4. Information(error detection or
correction)
Conclusion
Fault-tolerance is achieved by applying a set of
analysis and design techniques to create systems
with dramatically improved dependability.As new
technologies are developed and new applications
arise, new fault-tolerance approaches are also
needed. Now chips contain complex, highly-
integrated functions, and hardware and software
must be crafted to meet a variety of standards to
be economically viable.Thus a great deal of
current research focuses on implementing fault
tolerance using COTS (Commercial-Off-The-
Shelf) technology.
Fault tolerance

Contenu connexe

Tendances

Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance Systemprakashjjaya
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure callSunita Sahu
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemorySHIKHA GAUTAM
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed SystemRajan Kumar
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationMNM Jain Engineering College
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented CommunicationDilum Bandara
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication ServiceSwathy T
 
4.file service architecture
4.file service architecture4.file service architecture
4.file service architectureAbDul ThaYyal
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dosvanamali_vanu
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed SystemsPritom Saha Akash
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Kaushik Panta
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Ravindra Raju Kolahalam
 

Tendances (20)

Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance System
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
 
Stream oriented communication
Stream oriented communicationStream oriented communication
Stream oriented communication
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed System
 
Distributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communicationDistributed System-Multicast & Indirect communication
Distributed System-Multicast & Indirect communication
 
Software testing axioms
Software testing axiomsSoftware testing axioms
Software testing axioms
 
Message and Stream Oriented Communication
Message and Stream Oriented CommunicationMessage and Stream Oriented Communication
Message and Stream Oriented Communication
 
x.509-Directory Authentication Service
x.509-Directory Authentication Servicex.509-Directory Authentication Service
x.509-Directory Authentication Service
 
4.file service architecture
4.file service architecture4.file service architecture
4.file service architecture
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
System calls
System callsSystem calls
System calls
 
6.Distributed Operating Systems
6.Distributed Operating Systems6.Distributed Operating Systems
6.Distributed Operating Systems
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dos
 
Virtual machine security
Virtual machine securityVirtual machine security
Virtual machine security
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed Systems
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 

En vedette

Fault Tolerance (Distributed computing)
Fault Tolerance (Distributed computing)Fault Tolerance (Distributed computing)
Fault Tolerance (Distributed computing)Sri Prasanna
 
Fault tolerant presentation
Fault tolerant presentationFault tolerant presentation
Fault tolerant presentationskadyan1
 
Fault tolerance and computing
Fault tolerance  and computingFault tolerance  and computing
Fault tolerance and computingPalani murugan
 
Fault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating systemFault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating systemanujos25
 
Groupe Chèque déjeuner : « Des outils innovants pour accompagner la mise en œ...
Groupe Chèque déjeuner : « Des outils innovants pour accompagner la mise en œ...Groupe Chèque déjeuner : « Des outils innovants pour accompagner la mise en œ...
Groupe Chèque déjeuner : « Des outils innovants pour accompagner la mise en œ...idealconnaissances
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & qualityNur Islam
 
Fault tolearant system
Fault tolearant systemFault tolearant system
Fault tolearant systemarvinthsaran
 
Software engineering quality assurance and testing
Software engineering quality assurance and testingSoftware engineering quality assurance and testing
Software engineering quality assurance and testingBipul Roy Bpl
 
Fault avoidance and fault tolerance
Fault avoidance and fault toleranceFault avoidance and fault tolerance
Fault avoidance and fault toleranceJabez Winston
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Scheduling in distributed systems - Andrii Vozniuk
Scheduling in distributed systems - Andrii VozniukScheduling in distributed systems - Andrii Vozniuk
Scheduling in distributed systems - Andrii VozniukAndrii Vozniuk
 
Software Reliability
Software ReliabilitySoftware Reliability
Software Reliabilityranapoonam1
 
Technique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSATechnique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSAHouda Elmoutaoukil
 
I.1 Earthquakes
I.1 EarthquakesI.1 Earthquakes
I.1 Earthquakesaldelaitre
 
DISE - Software Testing and Quality Management
DISE - Software Testing and Quality ManagementDISE - Software Testing and Quality Management
DISE - Software Testing and Quality ManagementRasan Samarasinghe
 

En vedette (20)

Fault Tolerance (Distributed computing)
Fault Tolerance (Distributed computing)Fault Tolerance (Distributed computing)
Fault Tolerance (Distributed computing)
 
Fault tolerant presentation
Fault tolerant presentationFault tolerant presentation
Fault tolerant presentation
 
Fault tolerance and computing
Fault tolerance  and computingFault tolerance  and computing
Fault tolerance and computing
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Fault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating systemFault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating system
 
Groupe Chèque déjeuner : « Des outils innovants pour accompagner la mise en œ...
Groupe Chèque déjeuner : « Des outils innovants pour accompagner la mise en œ...Groupe Chèque déjeuner : « Des outils innovants pour accompagner la mise en œ...
Groupe Chèque déjeuner : « Des outils innovants pour accompagner la mise en œ...
 
Tract Rsa Avril
Tract Rsa AvrilTract Rsa Avril
Tract Rsa Avril
 
Cours3
Cours3Cours3
Cours3
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
 
Fault tolearant system
Fault tolearant systemFault tolearant system
Fault tolearant system
 
Software engineering quality assurance and testing
Software engineering quality assurance and testingSoftware engineering quality assurance and testing
Software engineering quality assurance and testing
 
Fault avoidance and fault tolerance
Fault avoidance and fault toleranceFault avoidance and fault tolerance
Fault avoidance and fault tolerance
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Scheduling in distributed systems - Andrii Vozniuk
Scheduling in distributed systems - Andrii VozniukScheduling in distributed systems - Andrii Vozniuk
Scheduling in distributed systems - Andrii Vozniuk
 
Software Reliability
Software ReliabilitySoftware Reliability
Software Reliability
 
Technique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSATechnique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSA
 
I.1 Earthquakes
I.1 EarthquakesI.1 Earthquakes
I.1 Earthquakes
 
DFD level-0 to 1
DFD level-0 to 1DFD level-0 to 1
DFD level-0 to 1
 
Resilience ppt
Resilience pptResilience ppt
Resilience ppt
 
DISE - Software Testing and Quality Management
DISE - Software Testing and Quality ManagementDISE - Software Testing and Quality Management
DISE - Software Testing and Quality Management
 

Similaire à Fault tolerance

Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance SystemEhsan Ilahi
 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveywww.pixelsolutionbd.com
 
Software archiecture lecture05
Software archiecture   lecture05Software archiecture   lecture05
Software archiecture lecture05Luktalja
 
Software Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptxSoftware Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptxVishalPadme2
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17koolkampus
 
Dependable Software Development in Software Engineering SE18
Dependable Software Development in Software Engineering SE18Dependable Software Development in Software Engineering SE18
Dependable Software Development in Software Engineering SE18koolkampus
 
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...Neelamani Samal
 
basic concepts of reliability
basic concepts of reliabilitybasic concepts of reliability
basic concepts of reliabilitydennis gookyi
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availabilityRaja Waseem Akhtar
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes arvind pandey
 
EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1PRADEEP
 
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...vtunotesbysree
 
Ch11 - Reliability Engineering
Ch11 - Reliability EngineeringCh11 - Reliability Engineering
Ch11 - Reliability EngineeringHarsh Verdhan Raj
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9Ian Sommerville
 

Similaire à Fault tolerance (20)

Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance System
 
Critical Systems
Critical SystemsCritical Systems
Critical Systems
 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud survey
 
Software archiecture lecture05
Software archiecture   lecture05Software archiecture   lecture05
Software archiecture lecture05
 
Software Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptxSoftware Reliability_CS-3059_VISHAL_PADME.pptx
Software Reliability_CS-3059_VISHAL_PADME.pptx
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17
 
Ch20
Ch20Ch20
Ch20
 
Dependable Software Development in Software Engineering SE18
Dependable Software Development in Software Engineering SE18Dependable Software Development in Software Engineering SE18
Dependable Software Development in Software Engineering SE18
 
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector ...
 
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
 
Sda 3
Sda   3Sda   3
Sda 3
 
basic concepts of reliability
basic concepts of reliabilitybasic concepts of reliability
basic concepts of reliability
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
 
Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes
 
SEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptxSEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptx
 
EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1
 
Fault tolerance techniques
Fault tolerance techniquesFault tolerance techniques
Fault tolerance techniques
 
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
VTU 5TH SEM CSE SOFTWARE ENGINEERING SOLVED PAPERS - JUN13 DEC13 JUN14 DEC14 ...
 
Ch11 - Reliability Engineering
Ch11 - Reliability EngineeringCh11 - Reliability Engineering
Ch11 - Reliability Engineering
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9
 

Plus de Gaurav Rawat

Six sense technology
Six sense technologySix sense technology
Six sense technologyGaurav Rawat
 
CCNA Based routing protocols
CCNA Based routing protocolsCCNA Based routing protocols
CCNA Based routing protocolsGaurav Rawat
 
Distance vector routing algorithm
Distance vector routing algorithmDistance vector routing algorithm
Distance vector routing algorithmGaurav Rawat
 

Plus de Gaurav Rawat (6)

Computer network
Computer networkComputer network
Computer network
 
Six sense technology
Six sense technologySix sense technology
Six sense technology
 
Ic presentation
Ic presentationIc presentation
Ic presentation
 
CCNA Based routing protocols
CCNA Based routing protocolsCCNA Based routing protocols
CCNA Based routing protocols
 
Distance vector routing algorithm
Distance vector routing algorithmDistance vector routing algorithm
Distance vector routing algorithm
 
Computer network
Computer networkComputer network
Computer network
 

Dernier

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Dernier (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Fault tolerance

  • 1. FAULT TOLERANCE By– Gaurav Singh Rawat Electrical Department Systems Engineering
  • 2. Fault Tolerance Fault-tolerant computing is the art and science of building computing systems that continue to operate satisfactorily in the presence of faults. A fault-tolerant system may be able to tolerate one or more fault-types including – i) transient(cause by external disturbance), intermittent(cause by marginal designed error) or permanent hardware faults, ii) software and hardware design errors, iii) operator errors, or iv) externally induced upsets or physical damage.
  • 3. Fault tolerance concept taxonomy Faults Errors Failures Fault- Tolerance Threats Attributes Means Availability Perform ability Graceful Degradation Maintainability Testability Error Detection System Recovery Fault Masking Reconfiguration Redundancy
  • 4. Basic Concept Dependability includes:  Availability  Reliability  Safety(security)  Maintainability
  • 5. Availability & Reliability  Availability: A measurement of whether a system is ready to be used immediately ◦ System is available at any given moment  Reliability: A measurement of whether a system can run continuously without failure ◦ System continues to function for a long period of time
  • 6. Safety & Maintainability  Safety: A measurement of how safe failures are ◦ System fails, nothing serious happens ◦ For instance, high degree of safety is required for systems controlling nuclear power plants  Maintainability: A measurement of how easy it is to repair a system ◦ A highly maintainable system may also show a high degree of availability ◦ Failures can be detected and repaired automatically. Self-healing systems.
  • 7. What is Fault?  A system fails when it cannot meet its promises (specifications)  An error is part of a system state that may lead to a failure  A fault is the cause of the error  Fault-Tolerance: the system can provide services even in the presence of faults  Faults can be: ◦ Transient (appear once and disappear) ◦ Intermittent (appear-disappear-reappear behavior)  A loose contact on a connector intermittent fault ◦ Permanent (appear and persist until repaired)
  • 8. Failure Model Type of Failure Description Crash failure A server halts, but is working correctly until it halts Omission failure Receive omission Send omission A server fails to respond to incoming requests A server fails to receive incoming messages A server fails to send messages Timing failure A server's response lies outside the specified time interval Response failure Value failure State transition failure The server's response is incorrect The value of the response is wrong The server deviates from the correct flow of control Arbitrary failure (Byzantine failure) A server may produce arbitrary responses at arbitrary times
  • 9. Error Detection  Error detection is a detection of errors caused by noise or other impairments during transmission from the transmitter to the receiver.  There are many schemes of error detection:- 1. Repetition codes. 2. Parity bits. 3. Checksums. 4. Cyclic redundancy checks. 5. Cryptography hash functions.
  • 10. System Recovery  We have talk a lot about fault tolerance but not talk about what happen after fault has occurred.  A process that exhibits a failure has to be able to recover to a correct state  There are two type of recovery: 1. Backward Recovery. 2. Forward Recovery.
  • 11. Backward Recovery  The goal of backward recovery is to bring the system from an erroneous state back to a prior correct state  The state of the system must be recorded - checkpointed - from time to time, and then restored when things go wrong  Examples ◦ Reliable communication through packet retransmission
  • 12. Forward Recovery  The goal of forward recovery is to bring a system from an erroneous state to a correct new state (not a previous state)  Examples: ◦ Reliable communication via erasure(a correction made by erasing) correction, such as an (n, k) block erasure code.
  • 13. Fault Masking  Fault Masking is a structural redundancy technique that completely masks faults within a set of redundant modules.  Redundancy is key technique for hiding failures.  Redundancy, however, can have an adverse impact on the performance of a system. For example, it can increase the length of transmitted data or increase the resource consumption.
  • 14. Reconfiguration  Reconfiguration is the “process of eliminating a faulty entity from a system and restoring the system to some operational condition or state”.  When we use Reconfiguration process designer must be concerned with fault detection, fault location, fault containment, and fault recovery.
  • 15. Redundancy  In engineering redundancy is the duplication of critical components or function of a system with the intention of increasing reliability of the system.  Redundancy are four types:- 1. Hardware(such as DMR & TMR) 2. Software(N-version programming) 3. Time(transient fault detection such as Alternate logic) 4. Information(error detection or correction)
  • 16. Conclusion Fault-tolerance is achieved by applying a set of analysis and design techniques to create systems with dramatically improved dependability.As new technologies are developed and new applications arise, new fault-tolerance approaches are also needed. Now chips contain complex, highly- integrated functions, and hardware and software must be crafted to meet a variety of standards to be economically viable.Thus a great deal of current research focuses on implementing fault tolerance using COTS (Commercial-Off-The- Shelf) technology.