SlideShare une entreprise Scribd logo
1  sur  27
An Approach to the Analysis of
 Performance, Reliability and Risk
 in Computer Systems




     Victoria López, Matilde Santos, Toribio
     Rodríguez
Index
 Introduction
 The meaning      of Reliable System
 EMSI (a free     available software tool)
  First configuration
  Monitoring
  Performance Analysis
  System Reliability
  Decision Making (Performance-Reliability)
  Operational Analysis
  Warranty Analysis
  Comparative Analysis
 Where    we are and where we go
  www.tecnologiaUCM.es
  www.victorialopez.es



                                               Victoria Lopez et al.   2
Introduction
 Evaluation of Computer Systems
 Performance
    ◦ Comparing alternatives, Determining the impact of a feature or unit, System tuning,
      Identify relative performance, debugging performance, etc.
   Reliability
    ◦   Formal Engineering: formal specification, formal verification, etc.
    ◦   Comparing by graphs: Reliability, Risk, Fail mass, etc.
    ◦   Analytics: Time to fail, Waiting time, Markov Chains, etc
    ◦   Warranties
   Uncertainty Studies
    ◦   Uncertainty statistics
    ◦   Uncertain programming
    ◦   Uncertain risk and reliability
    ◦   Fuzziness
   Some applications
    ◦ ReliaSoft, Weibull, Sandra, etc.
    ◦ From the Academic to the Industry: EMSI




                                                         Victoria Lopez et al.              3
The meaning of a Reliable
System
Reliability: “the ability of a system or component to perform its
  required functions under stated conditions for a specified period of
  time” (Wikipedia)

Reliability engineering for complex systems requires a different,
  more elaborated systems approach than reliability for non-complex
  systems / items. Reliability engineering is closely related to system
  safety engineering in the sense that they both use common sorts
  of methods for their analysis and might require input from each
  other. Reliability analysis has important links with function analysis,
  requirements specification, systems design, hardware design,
  software design, manufacturing, testing, maintenance, transport,
  storage, spare parts, operations research, human factors, technical
  documentation, training and more.

Most industries do not have specialized reliability engineers and
  the engineering task often becomes part of the tasks of a design
  engineer, logistics engineer, systems engineer or quality engineer.
  Reliability engineers should have broad skills and knowledge.




                                          Victoria Lopez et al.          4
The meaning of a Reliable
System
Classical distributions of Time to fail and their classification by AD method.




Figures by eMath Proyect Founded by MECD government of Spain



                                                                 Victoria Lopez et al.   5
EMSI 2.0
First Configuration of a System




                        Victoria Lopez et al.   6
EMSI 2.0
First Configuration of a System




                        Victoria Lopez et al.   7
EMSI 2.0
Monitoring and design

   System Activity Reporter Module
   Based on SAR
     Analytics and desing of new monitors
      with specific goals
      ◦ LA triplets load average processing
      ◦ Time to fail modeling by Stochastics
        Process
      ◦ Etc.


                           Victoria Lopez et al.   8
EMSI 2.0
Monitoring and design




                        Victoria Lopez et al.   9
EMSI 2.0
Performance Evaluation
   Time and load analysis by classical
    laws      (Amdahl     law,    statistics
    distributions, etc. )
   Measure of speed and execution time
   Optimization
   Measure of isolate and global speed
   Reporting




                          Victoria Lopez et al.   10
EMSI 2.0
Performance Evaluation




                   Victoria Lopez et al.   11
EMSI 2.0
Performance Evaluation




                   Victoria Lopez et al.   12
EMSI 2.0
System Reliability
   Module “System’s Reliability”
   T = time to fail
    R(t)=P (T > t) = 1 - FT(t),
   The user chooses a suitable distribution for
    each device or the whole system
   4 structures*
    ◦   K paralel: (Rsist(t)=1-(1-Rdev(t))k
    ◦   K serial: (Rsist(t)=(Rdev(t))k
    ◦   K out of N: (Rsist(t)=1-(1-Rdev(t))k
    ◦   Other compositions, etc.
   EMSI provides playoffs by percentages and
    graphs                    Victoria Lopez et al.   13
EMSI 2.0
System Reliability




                     Victoria Lopez et al.   14
EMSI 2.0
Fuzzy Multi-criteria Decision Making
        Module “Component Substitution
         (Fuzzy)”

        Reliability                Performance

        Expert decisions, Aid system

        MCDM (Multiple Criteria Decision Making).
     ◦    First approach: Risk and Confidence Analysis for Fuzzy Multicriteria Decision
          Making. WANG, Wei; FENTON, Norman. Knowledge-Based Systems, vol. 19.
          (2006).
     ◦    New approach: Fuzzy Multi-Criteria Group Decision Making Algorithm (D. Ruan et
          al.), Journal of Universal Computer Science, vol. 15, no. 1 (2010).




                                                    Victoria Lopez et al.                  15
EMSI 2.0
Fuzzy Multi-criteria Decision Making




                       Victoria Lopez et al.   16
EMSI 2.0
Fuzzy Multi-criteria Decision Making




                       Victoria Lopez et al.   17
EMSI 2.0
Operational Analysis
   Module “Network Analysis”
   Network analysis of transactional, interactive
    and batch systems
   Transport nets
    ◦ Flow capacity, etc.
   Stochastic Processes and Markov Chains
    ◦ Remaining Lifetime, Stopping times, Counting of
      events, etc.
   Performance results and reports



                                 Victoria Lopez et al.   18
EMSI 2.0
Operational Analysis




                       Victoria Lopez et al.   19
EMSI 2.0
Operational Analysis




                       Victoria Lopez et al.   20
EMSI 2.0
Warranty Analysis

     Module “Warranty Analysis ”
     Main goal: calculation of warranty period for
      any item: component or device.
     Uncertainty techniques for solving this
      evaluation (Hurwitz, and other related)




                                 Victoria Lopez et al.   21
EMSI 2.0
Warranty Analysis




                    Victoria Lopez et al.   22
EMSI 2.0
Warranty Analysis




                    Victoria Lopez et al.   23
EMSI 2.0
Comparative Analysis
   Module „Comparative Analysis’
   Avalaible for comparing two similar devices or
    two (or more) systems
  Based on execution time of a test set of
    procedures
   Measuring and comparing data (by monitoring)
      ◦ Two ways: classical statistics techniques and
        uncertainty techniques




                                     Victoria Lopez et al.   24
EMSI 2.0
Comparative Analysis




                       Victoria Lopez et al.   25
EMSI 2.0
Where we are and where we go
  ◦   Testing in labs of UCM
         On mobile technologies and mobile devices
                 www.tecnologiaUCM.es
  ◦ At present, academic use only
  ◦ Author tools for making e-learning tutorials (by TTS
    Knowledge Force)
  ◦ Professional use after some debugs and development of
    some additional functionalities:
       Module “Formal Requirements” for checking all specifications
        of the system are running well.
       Design of specific monitors to control the stability of the load.
       Development of network structures at Reliability module
       Evaluation of the binomial Reliability-Performance by FMCDM
       Increase the functionality of Operational Analysis by adding
        some studies about the performance of the tasks into the
        network and the network itself
                                            Victoria Lopez et al.           26
 Thank   you!




                 27

Contenu connexe

Similaire à Presentacion emsi iske 2011

Software Requirements and Design Process in the Aerospace Industry
Software Requirements and Design Process in the Aerospace IndustrySoftware Requirements and Design Process in the Aerospace Industry
Software Requirements and Design Process in the Aerospace IndustryLeif Bloomquist
 
verification of autonomous robotic system
verification of autonomous robotic systemverification of autonomous robotic system
verification of autonomous robotic systemASJAYASURYA
 
An Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and EucalyptusAn Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and EucalyptusAhmed Zerouali
 
Project Report on Intrusion Detection System
Project Report on Intrusion Detection SystemProject Report on Intrusion Detection System
Project Report on Intrusion Detection SystemVishal Polley
 
Requirements vs design vs runtime
Requirements vs design vs runtimeRequirements vs design vs runtime
Requirements vs design vs runtimebdemchak
 
Challenges of Cloud Monitoring
Challenges of Cloud MonitoringChallenges of Cloud Monitoring
Challenges of Cloud MonitoringWilliam Pourmajidi
 
Requirement Engineering for Dependable Systems
Requirement Engineering for Dependable SystemsRequirement Engineering for Dependable Systems
Requirement Engineering for Dependable SystemsKamalika Guha Roy
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENEWorkshop
 
SERENE 2014 School: Gabor karsai serene2014_school
SERENE 2014 School: Gabor karsai serene2014_schoolSERENE 2014 School: Gabor karsai serene2014_school
SERENE 2014 School: Gabor karsai serene2014_schoolHenry Muccini
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3Lisa Niles
 
First Principles Vulnerability Assessment
First Principles Vulnerability AssessmentFirst Principles Vulnerability Assessment
First Principles Vulnerability AssessmentManuel Brugnoli
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIJERA Editor
 
Giddings
GiddingsGiddings
Giddingsanesah
 
Тестирование спецификаций
Тестирование спецификацийТестирование спецификаций
Тестирование спецификацийSQALab
 

Similaire à Presentacion emsi iske 2011 (20)

Paper4
Paper4Paper4
Paper4
 
Software Requirements and Design Process in the Aerospace Industry
Software Requirements and Design Process in the Aerospace IndustrySoftware Requirements and Design Process in the Aerospace Industry
Software Requirements and Design Process in the Aerospace Industry
 
verification of autonomous robotic system
verification of autonomous robotic systemverification of autonomous robotic system
verification of autonomous robotic system
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
An Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and EucalyptusAn Empirical Comparison of the Development History of CloudStack and Eucalyptus
An Empirical Comparison of the Development History of CloudStack and Eucalyptus
 
Project Report on Intrusion Detection System
Project Report on Intrusion Detection SystemProject Report on Intrusion Detection System
Project Report on Intrusion Detection System
 
Requirements vs design vs runtime
Requirements vs design vs runtimeRequirements vs design vs runtime
Requirements vs design vs runtime
 
Challenges of Cloud Monitoring
Challenges of Cloud MonitoringChallenges of Cloud Monitoring
Challenges of Cloud Monitoring
 
Requirement Engineering for Dependable Systems
Requirement Engineering for Dependable SystemsRequirement Engineering for Dependable Systems
Requirement Engineering for Dependable Systems
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
SERENE 2014 School: Resilience in Cyber-Physical Systems: Challenges and Oppo...
 
SERENE 2014 School: Gabor karsai serene2014_school
SERENE 2014 School: Gabor karsai serene2014_schoolSERENE 2014 School: Gabor karsai serene2014_school
SERENE 2014 School: Gabor karsai serene2014_school
 
Srs
SrsSrs
Srs
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
First Principles Vulnerability Assessment
First Principles Vulnerability AssessmentFirst Principles Vulnerability Assessment
First Principles Vulnerability Assessment
 
Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
Giddings
GiddingsGiddings
Giddings
 
control system.pdf
control system.pdfcontrol system.pdf
control system.pdf
 
Design For Testability
Design For TestabilityDesign For Testability
Design For Testability
 
Тестирование спецификаций
Тестирование спецификацийТестирование спецификаций
Тестирование спецификаций
 

Plus de Victoria López

Alan turing uva-presentationdec-2019
Alan turing uva-presentationdec-2019Alan turing uva-presentationdec-2019
Alan turing uva-presentationdec-2019Victoria López
 
Seminar UvA 2018- socialbigdata
Seminar UvA  2018- socialbigdataSeminar UvA  2018- socialbigdata
Seminar UvA 2018- socialbigdataVictoria López
 
BIG DATA EN CIENCIAS DE LA SALUD Y CIENCIAS SOCIALES
BIG DATA EN CIENCIAS DE LA SALUD Y CIENCIAS SOCIALESBIG DATA EN CIENCIAS DE LA SALUD Y CIENCIAS SOCIALES
BIG DATA EN CIENCIAS DE LA SALUD Y CIENCIAS SOCIALESVictoria López
 
ICCES'2016 BIG DATA IN HEALTHCARE AND SOCIAL SCIENCES
ICCES'2016  BIG DATA IN HEALTHCARE AND SOCIAL SCIENCESICCES'2016  BIG DATA IN HEALTHCARE AND SOCIAL SCIENCES
ICCES'2016 BIG DATA IN HEALTHCARE AND SOCIAL SCIENCESVictoria López
 
Presentación Gupo G-TeC en Social Big Data
Presentación Gupo G-TeC en Social Big DataPresentación Gupo G-TeC en Social Big Data
Presentación Gupo G-TeC en Social Big DataVictoria López
 
Big data systems and analytics
Big data systems and analyticsBig data systems and analytics
Big data systems and analyticsVictoria López
 
Big Data. Complejidad,algoritmos y su procesamiento
Big Data. Complejidad,algoritmos y su procesamientoBig Data. Complejidad,algoritmos y su procesamiento
Big Data. Complejidad,algoritmos y su procesamientoVictoria López
 
APLICACIÓN DE TÉCNICAS DE OPTIMIZACIÓN Y BIG DATA AL PROBLEMA DE BÚSQUEDA...
APLICACIÓN DE TÉCNICAS DE OPTIMIZACIÓN Y BIG DATA AL PROBLEMA DE BÚSQUEDA...APLICACIÓN DE TÉCNICAS DE OPTIMIZACIÓN Y BIG DATA AL PROBLEMA DE BÚSQUEDA...
APLICACIÓN DE TÉCNICAS DE OPTIMIZACIÓN Y BIG DATA AL PROBLEMA DE BÚSQUEDA...Victoria López
 
G te c sesion1a-bioinformatica y big data
G te c sesion1a-bioinformatica y big dataG te c sesion1a-bioinformatica y big data
G te c sesion1a-bioinformatica y big dataVictoria López
 
G te c sesion1b-casos de uso
G te c sesion1b-casos de usoG te c sesion1b-casos de uso
G te c sesion1b-casos de usoVictoria López
 
G te c sesion2a-data collection
G te c sesion2a-data collectionG te c sesion2a-data collection
G te c sesion2a-data collectionVictoria López
 
G tec sesion2b-host-cloud y cloudcomputing
G tec sesion2b-host-cloud y cloudcomputingG tec sesion2b-host-cloud y cloudcomputing
G tec sesion2b-host-cloud y cloudcomputingVictoria López
 
G te c sesion3a-bases de datos modernas
G te c sesion3a-bases de datos modernasG te c sesion3a-bases de datos modernas
G te c sesion3a-bases de datos modernasVictoria López
 
G te c sesion3b- mapreduce
G te c sesion3b- mapreduceG te c sesion3b- mapreduce
G te c sesion3b- mapreduceVictoria López
 
G te c sesion4a-bigdatasystemsanalytics
G te c sesion4a-bigdatasystemsanalyticsG te c sesion4a-bigdatasystemsanalytics
G te c sesion4a-bigdatasystemsanalyticsVictoria López
 
G te c sesion4b-complejidad y tpa
G te c sesion4b-complejidad y tpaG te c sesion4b-complejidad y tpa
G te c sesion4b-complejidad y tpaVictoria López
 
Open Data para Smartcity-Facultad de Estudios Estadísticos
Open Data para Smartcity-Facultad de Estudios EstadísticosOpen Data para Smartcity-Facultad de Estudios Estadísticos
Open Data para Smartcity-Facultad de Estudios EstadísticosVictoria López
 
Deep Learning + R by Gabriel Valverde
Deep Learning + R by Gabriel ValverdeDeep Learning + R by Gabriel Valverde
Deep Learning + R by Gabriel ValverdeVictoria López
 
Fortune Time Institute: Big Data - Challenges for Smartcity
Fortune Time Institute: Big Data - Challenges for SmartcityFortune Time Institute: Big Data - Challenges for Smartcity
Fortune Time Institute: Big Data - Challenges for SmartcityVictoria López
 

Plus de Victoria López (20)

Alan turing uva-presentationdec-2019
Alan turing uva-presentationdec-2019Alan turing uva-presentationdec-2019
Alan turing uva-presentationdec-2019
 
Seminar UvA 2018- socialbigdata
Seminar UvA  2018- socialbigdataSeminar UvA  2018- socialbigdata
Seminar UvA 2018- socialbigdata
 
Jornada leiden short
Jornada leiden shortJornada leiden short
Jornada leiden short
 
BIG DATA EN CIENCIAS DE LA SALUD Y CIENCIAS SOCIALES
BIG DATA EN CIENCIAS DE LA SALUD Y CIENCIAS SOCIALESBIG DATA EN CIENCIAS DE LA SALUD Y CIENCIAS SOCIALES
BIG DATA EN CIENCIAS DE LA SALUD Y CIENCIAS SOCIALES
 
ICCES'2016 BIG DATA IN HEALTHCARE AND SOCIAL SCIENCES
ICCES'2016  BIG DATA IN HEALTHCARE AND SOCIAL SCIENCESICCES'2016  BIG DATA IN HEALTHCARE AND SOCIAL SCIENCES
ICCES'2016 BIG DATA IN HEALTHCARE AND SOCIAL SCIENCES
 
Presentación Gupo G-TeC en Social Big Data
Presentación Gupo G-TeC en Social Big DataPresentación Gupo G-TeC en Social Big Data
Presentación Gupo G-TeC en Social Big Data
 
Big data systems and analytics
Big data systems and analyticsBig data systems and analytics
Big data systems and analytics
 
Big Data. Complejidad,algoritmos y su procesamiento
Big Data. Complejidad,algoritmos y su procesamientoBig Data. Complejidad,algoritmos y su procesamiento
Big Data. Complejidad,algoritmos y su procesamiento
 
APLICACIÓN DE TÉCNICAS DE OPTIMIZACIÓN Y BIG DATA AL PROBLEMA DE BÚSQUEDA...
APLICACIÓN DE TÉCNICAS DE OPTIMIZACIÓN Y BIG DATA AL PROBLEMA DE BÚSQUEDA...APLICACIÓN DE TÉCNICAS DE OPTIMIZACIÓN Y BIG DATA AL PROBLEMA DE BÚSQUEDA...
APLICACIÓN DE TÉCNICAS DE OPTIMIZACIÓN Y BIG DATA AL PROBLEMA DE BÚSQUEDA...
 
G te c sesion1a-bioinformatica y big data
G te c sesion1a-bioinformatica y big dataG te c sesion1a-bioinformatica y big data
G te c sesion1a-bioinformatica y big data
 
G te c sesion1b-casos de uso
G te c sesion1b-casos de usoG te c sesion1b-casos de uso
G te c sesion1b-casos de uso
 
G te c sesion2a-data collection
G te c sesion2a-data collectionG te c sesion2a-data collection
G te c sesion2a-data collection
 
G tec sesion2b-host-cloud y cloudcomputing
G tec sesion2b-host-cloud y cloudcomputingG tec sesion2b-host-cloud y cloudcomputing
G tec sesion2b-host-cloud y cloudcomputing
 
G te c sesion3a-bases de datos modernas
G te c sesion3a-bases de datos modernasG te c sesion3a-bases de datos modernas
G te c sesion3a-bases de datos modernas
 
G te c sesion3b- mapreduce
G te c sesion3b- mapreduceG te c sesion3b- mapreduce
G te c sesion3b- mapreduce
 
G te c sesion4a-bigdatasystemsanalytics
G te c sesion4a-bigdatasystemsanalyticsG te c sesion4a-bigdatasystemsanalytics
G te c sesion4a-bigdatasystemsanalytics
 
G te c sesion4b-complejidad y tpa
G te c sesion4b-complejidad y tpaG te c sesion4b-complejidad y tpa
G te c sesion4b-complejidad y tpa
 
Open Data para Smartcity-Facultad de Estudios Estadísticos
Open Data para Smartcity-Facultad de Estudios EstadísticosOpen Data para Smartcity-Facultad de Estudios Estadísticos
Open Data para Smartcity-Facultad de Estudios Estadísticos
 
Deep Learning + R by Gabriel Valverde
Deep Learning + R by Gabriel ValverdeDeep Learning + R by Gabriel Valverde
Deep Learning + R by Gabriel Valverde
 
Fortune Time Institute: Big Data - Challenges for Smartcity
Fortune Time Institute: Big Data - Challenges for SmartcityFortune Time Institute: Big Data - Challenges for Smartcity
Fortune Time Institute: Big Data - Challenges for Smartcity
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Presentacion emsi iske 2011

  • 1. An Approach to the Analysis of Performance, Reliability and Risk in Computer Systems Victoria López, Matilde Santos, Toribio Rodríguez
  • 2. Index  Introduction  The meaning of Reliable System  EMSI (a free available software tool) First configuration Monitoring Performance Analysis System Reliability Decision Making (Performance-Reliability) Operational Analysis Warranty Analysis Comparative Analysis  Where we are and where we go www.tecnologiaUCM.es www.victorialopez.es Victoria Lopez et al. 2
  • 3. Introduction  Evaluation of Computer Systems  Performance ◦ Comparing alternatives, Determining the impact of a feature or unit, System tuning, Identify relative performance, debugging performance, etc.  Reliability ◦ Formal Engineering: formal specification, formal verification, etc. ◦ Comparing by graphs: Reliability, Risk, Fail mass, etc. ◦ Analytics: Time to fail, Waiting time, Markov Chains, etc ◦ Warranties  Uncertainty Studies ◦ Uncertainty statistics ◦ Uncertain programming ◦ Uncertain risk and reliability ◦ Fuzziness  Some applications ◦ ReliaSoft, Weibull, Sandra, etc. ◦ From the Academic to the Industry: EMSI Victoria Lopez et al. 3
  • 4. The meaning of a Reliable System Reliability: “the ability of a system or component to perform its required functions under stated conditions for a specified period of time” (Wikipedia) Reliability engineering for complex systems requires a different, more elaborated systems approach than reliability for non-complex systems / items. Reliability engineering is closely related to system safety engineering in the sense that they both use common sorts of methods for their analysis and might require input from each other. Reliability analysis has important links with function analysis, requirements specification, systems design, hardware design, software design, manufacturing, testing, maintenance, transport, storage, spare parts, operations research, human factors, technical documentation, training and more. Most industries do not have specialized reliability engineers and the engineering task often becomes part of the tasks of a design engineer, logistics engineer, systems engineer or quality engineer. Reliability engineers should have broad skills and knowledge. Victoria Lopez et al. 4
  • 5. The meaning of a Reliable System Classical distributions of Time to fail and their classification by AD method. Figures by eMath Proyect Founded by MECD government of Spain Victoria Lopez et al. 5
  • 6. EMSI 2.0 First Configuration of a System Victoria Lopez et al. 6
  • 7. EMSI 2.0 First Configuration of a System Victoria Lopez et al. 7
  • 8. EMSI 2.0 Monitoring and design  System Activity Reporter Module  Based on SAR  Analytics and desing of new monitors with specific goals ◦ LA triplets load average processing ◦ Time to fail modeling by Stochastics Process ◦ Etc. Victoria Lopez et al. 8
  • 9. EMSI 2.0 Monitoring and design Victoria Lopez et al. 9
  • 10. EMSI 2.0 Performance Evaluation  Time and load analysis by classical laws (Amdahl law, statistics distributions, etc. )  Measure of speed and execution time  Optimization  Measure of isolate and global speed  Reporting Victoria Lopez et al. 10
  • 11. EMSI 2.0 Performance Evaluation Victoria Lopez et al. 11
  • 12. EMSI 2.0 Performance Evaluation Victoria Lopez et al. 12
  • 13. EMSI 2.0 System Reliability  Module “System’s Reliability”  T = time to fail R(t)=P (T > t) = 1 - FT(t),  The user chooses a suitable distribution for each device or the whole system  4 structures* ◦ K paralel: (Rsist(t)=1-(1-Rdev(t))k ◦ K serial: (Rsist(t)=(Rdev(t))k ◦ K out of N: (Rsist(t)=1-(1-Rdev(t))k ◦ Other compositions, etc.  EMSI provides playoffs by percentages and graphs Victoria Lopez et al. 13
  • 14. EMSI 2.0 System Reliability Victoria Lopez et al. 14
  • 15. EMSI 2.0 Fuzzy Multi-criteria Decision Making  Module “Component Substitution (Fuzzy)”  Reliability Performance  Expert decisions, Aid system  MCDM (Multiple Criteria Decision Making). ◦ First approach: Risk and Confidence Analysis for Fuzzy Multicriteria Decision Making. WANG, Wei; FENTON, Norman. Knowledge-Based Systems, vol. 19. (2006). ◦ New approach: Fuzzy Multi-Criteria Group Decision Making Algorithm (D. Ruan et al.), Journal of Universal Computer Science, vol. 15, no. 1 (2010). Victoria Lopez et al. 15
  • 16. EMSI 2.0 Fuzzy Multi-criteria Decision Making Victoria Lopez et al. 16
  • 17. EMSI 2.0 Fuzzy Multi-criteria Decision Making Victoria Lopez et al. 17
  • 18. EMSI 2.0 Operational Analysis  Module “Network Analysis”  Network analysis of transactional, interactive and batch systems  Transport nets ◦ Flow capacity, etc.  Stochastic Processes and Markov Chains ◦ Remaining Lifetime, Stopping times, Counting of events, etc.  Performance results and reports Victoria Lopez et al. 18
  • 19. EMSI 2.0 Operational Analysis Victoria Lopez et al. 19
  • 20. EMSI 2.0 Operational Analysis Victoria Lopez et al. 20
  • 21. EMSI 2.0 Warranty Analysis  Module “Warranty Analysis ”  Main goal: calculation of warranty period for any item: component or device.  Uncertainty techniques for solving this evaluation (Hurwitz, and other related) Victoria Lopez et al. 21
  • 22. EMSI 2.0 Warranty Analysis Victoria Lopez et al. 22
  • 23. EMSI 2.0 Warranty Analysis Victoria Lopez et al. 23
  • 24. EMSI 2.0 Comparative Analysis  Module „Comparative Analysis’  Avalaible for comparing two similar devices or two (or more) systems Based on execution time of a test set of procedures  Measuring and comparing data (by monitoring) ◦ Two ways: classical statistics techniques and uncertainty techniques Victoria Lopez et al. 24
  • 25. EMSI 2.0 Comparative Analysis Victoria Lopez et al. 25
  • 26. EMSI 2.0 Where we are and where we go ◦ Testing in labs of UCM  On mobile technologies and mobile devices  www.tecnologiaUCM.es ◦ At present, academic use only ◦ Author tools for making e-learning tutorials (by TTS Knowledge Force) ◦ Professional use after some debugs and development of some additional functionalities:  Module “Formal Requirements” for checking all specifications of the system are running well.  Design of specific monitors to control the stability of the load.  Development of network structures at Reliability module  Evaluation of the binomial Reliability-Performance by FMCDM  Increase the functionality of Operational Analysis by adding some studies about the performance of the tasks into the network and the network itself Victoria Lopez et al. 26
  • 27.  Thank you! 27