Skip to:Content
|
Bottom
Cover image for Dependable computing systems : paradigms, performance issues, and applications
Title:
Dependable computing systems : paradigms, performance issues, and applications
Series:
Wiley series on parallel and distributed computing
Publication Information:
Hoboken, NJ : John-Wiley and Sons, 2005
ISBN:
9780471674221

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010099379 QA76.9.F38 D46 2005 Open Access Book Book
Searching...

On Order

Summary

Summary

A team of recognized experts leads the way to dependable computing systems

With computers and networks pervading every aspect of daily life, there is an ever-growing demand for dependability. In this unique resource, researchers and organizations will find the tools needed to identify and engage state-of-the-art approaches used for the specification, design, and assessment of dependable computer systems.

The first part of the book addresses models and paradigms of dependable computing, and the second part deals with enabling technologies and applications. Tough issues in creating dependable computing systems are also tackled, including:
* Verification techniques
* Model-based evaluation
* Adjudication and data fusion
* Robust communications primitives
* Fault tolerance
* Middleware
* Grid security
* Dependability in IBM mainframes
* Embedded software
* Real-time systems

Each chapter of this contributed work has been authored by a recognized expert. This is an excellent textbook for graduate and advanced undergraduate students in electrical engineering, computer engineering, and computer science, as well as a must-have reference that will help engineers, programmers, and technologists develop systems that are secure and reliable.


Author Notes

HASSAN B. DIAB, PhD, is Professor of Electrical and Computer Engineering, Faculty of Engineering and Architecture, American University of Beirut (AUB). He is currently Dean of the School of Engineering at AUB and Acting President of Dhofar University, Sultanate of Oman. He is the Associate Editor of Simulation: Transactions of the Society for Modeling and Simulation International and a founding member of the Arab Computer Society.

ALBERT Y. ZOMAYA, PhD, is the CISCO Systems Chair Professor of Internetworking, School of Information Technologies, The University of Sydney, and Deputy Director for Information Technology of the Sydney University Biological Informatics and Technology Centre. Dr. Zomaya has been the chair of the IEEE Technical Committee on Parallel Processing and has been awarded the IEEE Computer Society's Meritorious Service Award.


Reviews 1

Choice Review

Computer science defines dependability as the ability to deliver a trusted service and to avoid more frequent and severe failures than are acceptable. Attributes of dependability are availability, reliability, safety, confidentiality, integrity, and maintainability. Threats include faults, errors, and failures. Means to attain dependability include fault prevention, fault tolerance, fault removal, and fault forecasting. The growing reliance on computing systems makes research in and applications of dependability increasingly important. Editors Zomaya (Univ. of Sydney; editor in chief, "Wiley Book Series on Parallel and Distributed Computing," of which the book under review is part) and Diab (American Univ. in Beirut) have produced a solid collection of research papers on the specification, design, and assessment of dependable computer systems. A balance is struck between theoretical papers on fundamentals and practical papers on solutions using case studies, discussions of pros and cons, and lessons learned. Topics encompass verification techniques, tolerating arbitrary failures, robust wireless sensor networks, safety critical systems, dependability evaluation, voting, telemedicine, tracking errors, network resilience, safeguarding critical infrastructures, adaptive metaheuristics for routing, and reconfigurable computing. A foundation work in the field is Dependability: Basic Concepts and Terminology in English, French, German, Italian, and Japanese, ed. by J. C. Laprie (1992). ^BSumming Up: Recommended. Graduate students through professionals. M. Mounts Dartmouth College


Table of Contents

Masahiro Fujita and Satoshi Komatsu and Hiroshi SaitoAssia Doudou and Benoit Garbinato and Rachid GuerraouiAndrea Bondavalli and Silvano Chiaradonna and Felicita di GiandomenicoBehrooz ParhamiAmol Bakshi and Viktor K. PrasannaArun K. SomaniFelix C. Gartner and Stefan PleischLorenzo StriginiAli E. Abdallah and Jonathan P. Bowen and Nimal NissankeDenis Gracanin and Mohamed Eltoweissy and Stephan Olariu and Ashraf WadaaKishor S. Trivedi and Archana Sathaye and Srinivasan RamaniJoao Gabriel Silva and Henrique MadeiraStephan Olariu and Kurt Maly and Edwin C. Foudriat and Sameh M. Yamany and Thomas LuckenbachLisa SpainhowerMartin Hiller and Arshad Jhumka and Neeraj SuriMohamed YounisBjarne E. Helvik and Otto WittnerDavid Gamez and Simin Nadjm-Tehrani and John Bigham and Claudio Balducelli and Kalle Burbeck and Tobias ChysslerGeyong Min and Mohamed Ould-Khaoua and Demetres D. Kouvatsos and Irfan U. AwanAlbert Y. Zomaya and Tysun Chan and Miro KraetzlHassan B. DiabMohamed Younis and I-Hong Yeh and Nicholas Kyriakopoulos and Nikitas Alexandridis and Tarek El-Ghazawi
Prefacep. xxiii
Contributorsp. xxxv
Acknowledgmentsp. xxxix
Part I Models and Paradigmsp. 1
1 Formal Verification Techniques for Digital Systemsp. 3
1.1 Introductionp. 3
1.2 Basic Techniques for Formal Verificationp. 4
1.3 Verification Techniques for Combinational Circuit Equivalencep. 7
1.4 Verification Techniques for Sequential Circuitsp. 14
1.5 Summaryp. 24
Referencesp. 24
2 Tolerating Arbitrary Failures With State Machine Replicationp. 27
2.1 Introductionp. 27
2.2 System Modelp. 31
2.3 Total Order Broadcastp. 32
2.4 Weak Interactive Consistencyp. 36
2.5 Muteness Failure Detectorp. 44
2.6 Concluding Remarksp. 52
Referencesp. 55
3 Model-Based Evaluation as a Support to the Design of Dependable Systemsp. 57
3.1 Introductionp. 57
3.2 The Role of Model-Based Evaluation in the Development of Dependable Systemsp. 58
3.3 Dependability Modeling Methodologies and Toolsp. 61
3.4 Analytical Modeling to Support Design Decisionsp. 68
3.5 Analytical Modeling to Support Fault Removal During Operational Lifep. 76
3.6 Summaryp. 82
Referencesp. 82
4 Voting: A Paradigm for Adjudication and Data Fusion in Dependable Systemsp. 87
4.1 Introductionp. 87
4.2 Voting in Dependable Systemsp. 88
4.3 Voting Schemes and Problemsp. 94
4.4 Voting for Data Fusionp. 98
4.5 Implementation Issuesp. 102
4.6 Unifying Conceptsp. 107
4.7 Conclusionp. 110
Referencesp. 111
5 Robust Communication Primitives for Wireless Sensor Networksp. 115
5.1 Introductionp. 115
5.2 Defining Realistic Modelsp. 117
5.3 Our System Modelp. 119
5.4 Permutation Routing in a Single-hop Topology: State-of-the-Artp. 121
5.5 An Energy-Efficient Protocol Using a Low-Power Control Channelp. 125
5.6 Our Routing Protocol for a Faulty Networkp. 132
5.7 Our Generalized Protocol for a Multichannel Networkp. 135
5.8 Concluding Remarksp. 140
Referencesp. 140
6 System-Level Diagnosis and Implications in Current Contextp. 143
6.1 Issues in Large and Complex Computing Systemsp. 143
6.2 System-Level Diagnosisp. 145
6.3 Classification of Diagnosable Systemsp. 148
6.4 Diagnosability Algorithmsp. 157
6.5 Diagnosis Algorithmsp. 160
6.6 Application of System-Level Diagnosis Algorithmp. 165
6.7 Summary and Conclusionsp. 166
Referencesp. 167
7 Predicate Detection in Asynchronous Systems With Crash Failuresp. 171
7.1 Introductionp. 171
7.2 Predicate Detection in Fault-Free Environmentsp. 173
7.3 Failures and Failure Detectionp. 177
7.4 Predicate Detection in Faulty Environmentsp. 183
7.5 Solving Predicate Detection in Faulty Environmentsp. 194
7.6 Conclusionp. 209
Referencesp. 211
8 Fault Tolerance Against Design Faultsp. 213
8.1 Introductionp. 213
8.2 Examples and Principlesp. 215
8.3 Potential and Actual Benefitsp. 225
8.4 Design Solutionsp. 230
8.5 Summaryp. 236
Referencesp. 238
9 Formal Methods for Safety Critical Systemsp. 243
9.1 Introductionp. 243
9.2 Specification of Safetyp. 245
9.3 Historical Backgroundp. 247
9.4 Safetyp. 248
9.5 Application Areasp. 253
9.6 Specification Frameworkp. 256
9.7 System State and Behaviorp. 262
9.8 Discussionp. 265
9.9 Conclusionp. 268
Referencesp. 269
Part II Enabling Technologies and Applicationsp. 273
10 Dependability Support in Wireless Sensor Networksp. 275
10.1 Motivation and Backgroundp. 276
10.2 Service Centric Modelp. 279
10.3 Conclusionp. 283
Referencesp. 283
11 Availability Modeling in Practicep. 285
11.1 Introductionp. 285
11.2 Modeling Approachesp. 286
11.3 Composite Availability and Performance Modelp. 292
11.4 Digital Equipment Corporation Case Studyp. 297
11.5 Conclusionp. 315
Referencesp. 315
12 Experimental Dependability Evaluationp. 319
12.1 Field Measurementp. 321
12.2 Fault Injectionp. 323
12.3 Robustness Testingp. 337
12.4 Recent Developments: Dependability Benchmarkingp. 340
12.5 Conclusionp. 342
Referencesp. 343
13 A Dependable Architecture for Telemedicine in Support of Disaster Reliefp. 349
13.1 Introductionp. 349
13.2 Telemedicine-State of the Artp. 350
13.3 The WIRM System Architecturep. 352
13.4 A Novel 3D Data Compression Techniquep. 356
13.5 Interactive Remote Visualizationp. 358
13.6 An Overview of H3M-Our Wireless Architecturep. 359
13.7 Concluding Remarksp. 366
Referencesp. 366
14 An Overview of IBM Mainframe Dependable Computing: From System/360 to Seriesp. 369
14.1 Introductionp. 369
14.2 Error Detection and Fault Isolationp. 375
14.3 Instruction Level Retryp. 380
14.4 Online Repairp. 386
14.5 Summaryp. 391
Referencesp. 392
15 Tracking the Propagation of Data Errors in Softwarep. 395
15.1 Introductionp. 395
15.2 Target System Modelp. 396
15.3 Overview of the Tool Suitep. 397
15.4 Setup: Experiment Design and Target Instrumentationp. 401
15.5 Injection: Running Experimentsp. 407
15.6 Analysis: Obtaining Error Propagation Characteristicsp. 408
15.7 Example Results Generated by Propanep. 409
15.8 Propane's Attributes and Main Characteristicsp. 414
15.9 Summaryp. 415
Referencesp. 416
16 Integrated Reliable Real-Time Systemsp. 419
16.1 Backgroundp. 421
16.2 Integration Issuesp. 425
16.3 Few Forward Stepsp. 429
16.4 An Example Aerospace Applicationp. 432
16.5 Conclusionp. 442
Referencesp. 443
17 Network Resilience by Emergent Behavior from Simple Autonomous Agentsp. 449
17.1 Introductionp. 449
17.2 Network Resiliencep. 450
17.3 Handling Routing and Resources in Networks by Emergencep. 457
17.4 Cross-Entropy Based Path Findingp. 460
17.5 Finding "Best-Effort" Primary/Backup Pathsp. 468
17.6 Discussionp. 473
17.7 Concluding Remarksp. 475
Referencesp. 475
18 Safeguarding Critical Infrastructuresp. 479
18.1 Introductionp. 479
18.2 Attacks, Failures, and Accidentsp. 480
18.3 Solutionsp. 483
18.4 The Safeguard Architecturep. 486
18.5 Future Workp. 497
18.6 Conclusionp. 497
Referencesp. 498
19 Impact of Traffic Self-Similarity on the Performance of Routing Algorithms in Multicomputer Systemsp. 501
19.1 Introductionp. 502
19.2 The k-ary n-Cube and Dimension-Ordered Routingp. 504
19.3 Modeling of Traffic Self-Similarityp. 506
19.4 The Analytical Modelp. 507
19.5 Impact of Self-Similar Traffic on Routing Performancep. 518
19.6 Conclusionsp. 519
Referencesp. 520
Appendix 19.1 Notationp. 523
20 Some Observations on Adaptive Meta-Heuristics for Routing in Datagram Networksp. 525
20.1 Introductionp. 525
20.2 The Routing Problemp. 526
20.3 Genetic Algorithms and Routingp. 532
20.4 Genetic Routing Protocol Designp. 536
20.5 Genetic Routing Protocol Implementationp. 547
20.6 Results and Analysisp. 552
20.7 Conclusionsp. 560
Referencesp. 561
21 Reconfigurable Computing for Cryptographyp. 563
21.1 Introductionp. 564
21.2 Reconfigurable Computingp. 565
21.3 AES Cryptographyp. 576
21.4 Case Study: The Twofish Cipher on a Dynamic RC Systemp. 579
21.5 Future of RCp. 589
21.6 Conclusionp. 590
Referencesp. 591
22 Dependability of Reconfigurable Computingp. 597
22.1 FPGA Preliminariesp. 598
22.2 FPGA Fault Taxonomyp. 603
22.3 Handling FPGA Failuresp. 608
22.4 Conclusion and Open Issuesp. 621
Referencesp. 622
Indexp. 627
Go to:Top of Page