SlideShare une entreprise Scribd logo
1  sur  47
Software Fault Tolerance  Presented By,  Ankit Singh  (asingh@stud.fh-frankfurt.de) M.Sc High Integrity System University of Applied Sciences, Frankfurt am Main
1.  Why we need Fault Tolerant Software? 2.  Single Version Software Tolerance Techniques 3.  Multi Version Software Tolerance Techniques 4  Software Fault Injection for Fault Tolerance Assessment! 5.  Examples of Fault Tolerant Systems
Why we need Fault Tolerant Software?
Why we need Fault Tolerant Software? A computer System typically consists of ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why we need Fault Tolerant Software?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why we need Fault Tolerant Software?
Why we need Fault Tolerant Software? “ PROGRAMS are really not much more than the PROGRAMMER’S BEST GUESS about what a system should do”
Quick look on software development process!!! Why we need Fault Tolerant Software? ,[object Object],[object Object],[object Object],[object Object]
Why we need Fault Tolerant Software? Quick look on software development process!!! ,[object Object]
Why we need Fault Tolerant Software? Quick look on software development process!!! This process model is appropriate for projects where the  requirements  are  incompletely specified  or when the developers are unsure whether a proposed design solution is adequate.
Software Design Faults ,[object Object],[object Object],[object Object],[object Object],[object Object],Why we need Fault Tolerant Software?
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why we need Fault Tolerant Software? Software Design Faults
End of Part 1:  Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],Why we need Fault Tolerant Software?
Single Version Software Tolerance Techniques
Single Version Software Tolerance Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Single Version Software Tolerance Techniques
Checkpoint and Restart Single Version Software Tolerance Techniques There exist two kinds of restart recovery:  Static :  A static restart is based on returning the module to a predetermined state. Dynamic:  Dynamic restart uses dynamically created checkpoints that are snapshots of the state at various points during the execution. Advantage:  they are based on states created during operation, and can thus be used to allow forward progress of execution without having to discard all the work done up to the time of error detection.
Process Pairs Single Version Software Tolerance Techniques ,[object Object],[object Object],[object Object],[object Object]
Data diversity Single Version Software Tolerance Techniques
Check Pointing: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Single Version Software Tolerance Techniques
End of Part 2:  Conclusion ,[object Object],[object Object],[object Object],[object Object],Single Version Software Tolerance Techniques
Multi Version Software Tolerance Techniques
Brief Overview ,[object Object],[object Object],[object Object],Multi Version Software Tolerance Techniques
Recovery Blocks Multi Version Software Tolerance Techniques Checkpoints  are created  before a version executes . Checkpoints are needed to recover the state after a  version fails  to provide a  valid operational starting point  for the next version if an error is detected.
N-Version Programming Multi Version Software Tolerance Techniques
N Self-Checking Programming Multi Version Software Tolerance Techniques This use of  separate acceptance tests  for each version is the main difference of this N Self-Checking model  from the  Recovery Blocks  approach. Similar to Recovery Blocks, execution of the versions and their tests can be done sequentially or in parallel but the output is taken from the  highest-ranking version  that passes its acceptance test.
Multi Version Software Tolerance Techniques This model has the  advantage  of using an  application independent decision  algorithm to select a correct output. This variation of self-checking programming has the  theoretical vulnerability  of encountering situations where multiple pairs pass their comparisons each with different outputs.
Consensus Recovery Blocks Multi Version Software Tolerance Techniques The  Consensus Recovery Blocks  approach combines  N-Version Programming and Recovery Blocks  to improve the reliability over that achievable by using just one of the approaches. The acceptance tests in the Recovery Blocks  suffer  from  lack of guidelines  for their development and a general proneness to design faults due to the inherent difficulty in creating effective tests.
End of Part 3:  Conclusion ,[object Object],[object Object],[object Object],[object Object],Multi Version Software Tolerance Techniques
Software Fault Injection  for  Fault Tolerance Assessment! Multi Version Software Tolerance Techniques
Software Fault Injection for Fault Tolerance Assessment! ,[object Object],[object Object],[object Object],Fault Tolerance in Operating System
Software Fault Injection for Fault Tolerance Assessment! ,[object Object],[object Object],[object Object],[object Object],Fault Tolerance in Operating System
Software Fault Injection for Fault Tolerance Assessment! ,[object Object],[object Object],[object Object],[object Object],Fault Tolerance in Operating System
Software Fault Injection for Fault Tolerance Assessment! ,[object Object],[object Object],[object Object],[object Object],Introduction to Software Fault Injection
Software Fault Injection for Fault Tolerance Assessment! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Software Fault Injection for Fault Tolerance Assessment! ,[object Object],[object Object],End of Part 4:  Conclusion
 
Examples of Fault Tolerant Systems
Examples of Airbus A3XX & Boeing 777 ,[object Object],[object Object],Examples of Fault Tolerant Systems
Boeing 777 ,[object Object],Examples of Fault Tolerant Systems
Boeing 777 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Examples of Fault Tolerant Systems
Examples of Fault Tolerant Systems
[object Object],[object Object],[object Object],[object Object],[object Object],Examples of Fault Tolerant Systems AIRBUS A320/A330/A340 Flight Control Computer
Examples of Fault Tolerant Systems AIRBUS A320/A330/A340 Flight Control Computer The  primary module  sends its commands to the actuators, with  the secondary module  remaining in  standby.  When the  primary module fails , it is  taken offline  and the  secondary module takes over  the command function. In addition, a second pair of modules (Primary 2 and Secondary 2 in Figure 21) is also available and sending commands to redundant actuators.
Example of Fault Tolerant Systems , was the last thing I want to discuss with you!  Happy Christmas & New Year   In  Advance !! Thank You! Examples of Fault Tolerant Systems
Erlang : The Functional Language ,[object Object],[object Object],[object Object],[object Object],[object Object],I would like to show one small video on Erlang Language. Please bear with me. I am pretty sure you guys going to like this.  
References: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

SDLC and Software Process Models
SDLC and Software Process ModelsSDLC and Software Process Models
SDLC and Software Process ModelsNana Sarpong
 
From Text Tо Visual BPMN Process Models
From Text Tо Visual BPMN Process ModelsFrom Text Tо Visual BPMN Process Models
From Text Tо Visual BPMN Process ModelsAna Ivanchikj
 
Software Quality Assurance in software engineering
Software Quality Assurance in software engineeringSoftware Quality Assurance in software engineering
Software Quality Assurance in software engineeringMuhammadTalha436
 
Progress control
Progress controlProgress control
Progress controlashamarsha
 
Software quality assurance lecture 1
Software quality assurance lecture 1Software quality assurance lecture 1
Software quality assurance lecture 1Abdul Basit
 
Ch 6 development plan and quality plan
Ch 6 development plan and quality planCh 6 development plan and quality plan
Ch 6 development plan and quality planKittitouch Suteeca
 
Quality of software
Quality of softwareQuality of software
Quality of softwarePalak Pandoh
 
Software Project Management( lecture 1)
Software Project Management( lecture 1)Software Project Management( lecture 1)
Software Project Management( lecture 1)Syed Muhammad Hammad
 
formal verification
formal verificationformal verification
formal verificationToseef Aslam
 
Capability Maturity Model (CMM) in Software Engineering
Capability Maturity Model (CMM) in Software EngineeringCapability Maturity Model (CMM) in Software Engineering
Capability Maturity Model (CMM) in Software EngineeringFaizanAhmad340414
 
Comparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And ActivitiesComparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And ActivitiesLemia Algmri
 
Planning the development process
Planning the development processPlanning the development process
Planning the development processSiva Priya
 
Software Fault, Error, and Failure
Software Fault, Error, and FailureSoftware Fault, Error, and Failure
Software Fault, Error, and Failurenethisip13
 

Tendances (20)

Unit II.ppt
Unit II.pptUnit II.ppt
Unit II.ppt
 
Ch 5 contract review
Ch 5 contract reviewCh 5 contract review
Ch 5 contract review
 
SDLC and Software Process Models
SDLC and Software Process ModelsSDLC and Software Process Models
SDLC and Software Process Models
 
From Text Tо Visual BPMN Process Models
From Text Tо Visual BPMN Process ModelsFrom Text Tо Visual BPMN Process Models
From Text Tо Visual BPMN Process Models
 
Software Quality Assurance in software engineering
Software Quality Assurance in software engineeringSoftware Quality Assurance in software engineering
Software Quality Assurance in software engineering
 
Progress control
Progress controlProgress control
Progress control
 
Software quality assurance lecture 1
Software quality assurance lecture 1Software quality assurance lecture 1
Software quality assurance lecture 1
 
Ch 6 development plan and quality plan
Ch 6 development plan and quality planCh 6 development plan and quality plan
Ch 6 development plan and quality plan
 
Ch 2 what is software quality
Ch 2 what is software qualityCh 2 what is software quality
Ch 2 what is software quality
 
Quality of software
Quality of softwareQuality of software
Quality of software
 
Software Project Management( lecture 1)
Software Project Management( lecture 1)Software Project Management( lecture 1)
Software Project Management( lecture 1)
 
formal verification
formal verificationformal verification
formal verification
 
COCOMO (Software Engineering)
COCOMO (Software Engineering)COCOMO (Software Engineering)
COCOMO (Software Engineering)
 
Capability Maturity Model (CMM) in Software Engineering
Capability Maturity Model (CMM) in Software EngineeringCapability Maturity Model (CMM) in Software Engineering
Capability Maturity Model (CMM) in Software Engineering
 
Comparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And ActivitiesComparing Software Quality Assurance Techniques And Activities
Comparing Software Quality Assurance Techniques And Activities
 
Ch25 configuration management
Ch25 configuration managementCh25 configuration management
Ch25 configuration management
 
Spm unit 1
Spm unit 1Spm unit 1
Spm unit 1
 
Planning the development process
Planning the development processPlanning the development process
Planning the development process
 
Software Verification & Validation
Software Verification & ValidationSoftware Verification & Validation
Software Verification & Validation
 
Software Fault, Error, and Failure
Software Fault, Error, and FailureSoftware Fault, Error, and Failure
Software Fault, Error, and Failure
 

En vedette

Fault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating systemFault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating systemanujos25
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance Systemprakashjjaya
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Ankit Singh
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systemssumitjain2013
 
N-version programming
N-version programmingN-version programming
N-version programmingshabnam0102
 
TINYOS Oscilloscope Application
TINYOS Oscilloscope ApplicationTINYOS Oscilloscope Application
TINYOS Oscilloscope ApplicationAnkit Singh
 
Design Alternative for Parallel Systems
Design Alternative for Parallel SystemsDesign Alternative for Parallel Systems
Design Alternative for Parallel SystemsAnkit Singh
 
Dane presentation
Dane presentationDane presentation
Dane presentationAnkit Singh
 
Simple Railroad Command Protocol
Simple Railroad Command ProtocolSimple Railroad Command Protocol
Simple Railroad Command ProtocolAnkit Singh
 
Mote Mote Radio Communication
Mote Mote Radio CommunicationMote Mote Radio Communication
Mote Mote Radio CommunicationAnkit Singh
 
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionRestricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionAnkit Singh
 
MicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project PresentationMicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project PresentationAnkit Singh
 
DO-178B/ED-12B Presentation
DO-178B/ED-12B PresentationDO-178B/ED-12B Presentation
DO-178B/ED-12B PresentationAnkit Singh
 
The Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETThe Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETAnkit Singh
 
Anti Collision Railways System
Anti Collision Railways SystemAnti Collision Railways System
Anti Collision Railways SystemAnkit Singh
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingAnkit Singh
 
Indian German Unity
Indian German UnityIndian German Unity
Indian German UnityAnkit Singh
 

En vedette (20)

Fault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating systemFault tolerance techniques for real time operating system
Fault tolerance techniques for real time operating system
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance System
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
 
Fault tolerance in distributed systems
Fault tolerance in distributed systemsFault tolerance in distributed systems
Fault tolerance in distributed systems
 
N-version programming
N-version programmingN-version programming
N-version programming
 
TINYOS Oscilloscope Application
TINYOS Oscilloscope ApplicationTINYOS Oscilloscope Application
TINYOS Oscilloscope Application
 
Design Alternative for Parallel Systems
Design Alternative for Parallel SystemsDesign Alternative for Parallel Systems
Design Alternative for Parallel Systems
 
Dane presentation
Dane presentationDane presentation
Dane presentation
 
Simple Railroad Command Protocol
Simple Railroad Command ProtocolSimple Railroad Command Protocol
Simple Railroad Command Protocol
 
Mote Mote Radio Communication
Mote Mote Radio CommunicationMote Mote Radio Communication
Mote Mote Radio Communication
 
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour DetectionRestricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
Restricted Usage of Anonymous Credentials in VANET for Misbehaviour Detection
 
MicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project PresentationMicazXpl Intelligent Sensors Network Project Presentation
MicazXpl Intelligent Sensors Network Project Presentation
 
DO-178B/ED-12B Presentation
DO-178B/ED-12B PresentationDO-178B/ED-12B Presentation
DO-178B/ED-12B Presentation
 
The Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANETThe Security and Privacy Requirements in VANET
The Security and Privacy Requirements in VANET
 
Anti Collision Railways System
Anti Collision Railways SystemAnti Collision Railways System
Anti Collision Railways System
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Indian German Unity
Indian German UnityIndian German Unity
Indian German Unity
 

Similaire à Software Fault Tolerance Techniques Presented By Ankit Singh

How to Make the Most of Regression and Unit Testing.pdf
How to Make the Most of Regression and Unit Testing.pdfHow to Make the Most of Regression and Unit Testing.pdf
How to Make the Most of Regression and Unit Testing.pdfAbhay Kumar
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareengPINKU29
 
Agile A to Z Chapter 4 Feedback Loop Part 2 DevOps
Agile A to Z Chapter 4 Feedback Loop Part 2 DevOpsAgile A to Z Chapter 4 Feedback Loop Part 2 DevOps
Agile A to Z Chapter 4 Feedback Loop Part 2 DevOpsAgile ME
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineeringMark Turner CRP
 
Different Software Testing Types and CMM Standard
Different Software Testing Types and CMM StandardDifferent Software Testing Types and CMM Standard
Different Software Testing Types and CMM StandardDhrumil Panchal
 
11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil BarotHarshil Barot
 
Software techniques
Software techniquesSoftware techniques
Software techniqueshome
 
Agile a to z chapter 4 feedback loop
Agile a to z chapter 4 feedback loopAgile a to z chapter 4 feedback loop
Agile a to z chapter 4 feedback loopWajih Aslam
 
What is Software Testing
 What is Software Testing What is Software Testing
What is Software TestingAnjuAteam
 
Why Software Testing is Crucial in Software Development_.pdf
Why Software Testing is Crucial in Software Development_.pdfWhy Software Testing is Crucial in Software Development_.pdf
Why Software Testing is Crucial in Software Development_.pdfXDuce Corporation
 
Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2Techpartnerz
 
Sqa unit1
Sqa unit1Sqa unit1
Sqa unit1kannaki
 
Software Testing
Software TestingSoftware Testing
Software TestingSengu Msc
 
Top 7 reasons why software testing is crucial in SDLC
Top 7 reasons why software testing is crucial in SDLCTop 7 reasons why software testing is crucial in SDLC
Top 7 reasons why software testing is crucial in SDLCSLAJobs Chennai
 
Infographic All Things You Should Know About Regression Testing
Infographic All Things You Should Know About Regression TestingInfographic All Things You Should Know About Regression Testing
Infographic All Things You Should Know About Regression TestingKiwiQA
 
HP Software Testing project (Advanced)
HP Software Testing project (Advanced)HP Software Testing project (Advanced)
HP Software Testing project (Advanced)Lokesh Singrol
 

Similaire à Software Fault Tolerance Techniques Presented By Ankit Singh (20)

How to Make the Most of Regression and Unit Testing.pdf
How to Make the Most of Regression and Unit Testing.pdfHow to Make the Most of Regression and Unit Testing.pdf
How to Make the Most of Regression and Unit Testing.pdf
 
Intro softwareeng
Intro softwareengIntro softwareeng
Intro softwareeng
 
Agile A to Z Chapter 4 Feedback Loop Part 2 DevOps
Agile A to Z Chapter 4 Feedback Loop Part 2 DevOpsAgile A to Z Chapter 4 Feedback Loop Part 2 DevOps
Agile A to Z Chapter 4 Feedback Loop Part 2 DevOps
 
Software reliability engineering
Software reliability engineeringSoftware reliability engineering
Software reliability engineering
 
Testing concepts
Testing conceptsTesting concepts
Testing concepts
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Different Software Testing Types and CMM Standard
Different Software Testing Types and CMM StandardDifferent Software Testing Types and CMM Standard
Different Software Testing Types and CMM Standard
 
11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot11 steps of testing process - By Harshil Barot
11 steps of testing process - By Harshil Barot
 
Software techniques
Software techniquesSoftware techniques
Software techniques
 
Agile a to z chapter 4 feedback loop
Agile a to z chapter 4 feedback loopAgile a to z chapter 4 feedback loop
Agile a to z chapter 4 feedback loop
 
Ch20
Ch20Ch20
Ch20
 
What is Software Testing
 What is Software Testing What is Software Testing
What is Software Testing
 
Why Software Testing is Crucial in Software Development_.pdf
Why Software Testing is Crucial in Software Development_.pdfWhy Software Testing is Crucial in Software Development_.pdf
Why Software Testing is Crucial in Software Development_.pdf
 
Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2Learn software testing with tech partnerz 2
Learn software testing with tech partnerz 2
 
Sqa unit1
Sqa unit1Sqa unit1
Sqa unit1
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Top 7 reasons why software testing is crucial in SDLC
Top 7 reasons why software testing is crucial in SDLCTop 7 reasons why software testing is crucial in SDLC
Top 7 reasons why software testing is crucial in SDLC
 
Infographic All Things You Should Know About Regression Testing
Infographic All Things You Should Know About Regression TestingInfographic All Things You Should Know About Regression Testing
Infographic All Things You Should Know About Regression Testing
 
Testing
Testing Testing
Testing
 
HP Software Testing project (Advanced)
HP Software Testing project (Advanced)HP Software Testing project (Advanced)
HP Software Testing project (Advanced)
 

Plus de Ankit Singh

IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...Ankit Singh
 
Parallex - The Supercomputer
Parallex - The SupercomputerParallex - The Supercomputer
Parallex - The SupercomputerAnkit Singh
 
Cooperative Linux
Cooperative LinuxCooperative Linux
Cooperative LinuxAnkit Singh
 
Master Teset Specification SRCP
Master Teset Specification SRCPMaster Teset Specification SRCP
Master Teset Specification SRCPAnkit Singh
 
Micazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project reportMicazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project reportAnkit Singh
 
Toilet etiquettes
Toilet etiquettesToilet etiquettes
Toilet etiquettesAnkit Singh
 
TinyOS installation Guide And Manual
TinyOS installation Guide And ManualTinyOS installation Guide And Manual
TinyOS installation Guide And ManualAnkit Singh
 

Plus de Ankit Singh (7)

IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
IoT in Mining for Sensing, Monitoring and Prediction of Underground Mines Roo...
 
Parallex - The Supercomputer
Parallex - The SupercomputerParallex - The Supercomputer
Parallex - The Supercomputer
 
Cooperative Linux
Cooperative LinuxCooperative Linux
Cooperative Linux
 
Master Teset Specification SRCP
Master Teset Specification SRCPMaster Teset Specification SRCP
Master Teset Specification SRCP
 
Micazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project reportMicazxpl - Intelligent Sensors Network project report
Micazxpl - Intelligent Sensors Network project report
 
Toilet etiquettes
Toilet etiquettesToilet etiquettes
Toilet etiquettes
 
TinyOS installation Guide And Manual
TinyOS installation Guide And ManualTinyOS installation Guide And Manual
TinyOS installation Guide And Manual
 

Dernier

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Software Fault Tolerance Techniques Presented By Ankit Singh

  • 1. Software Fault Tolerance Presented By, Ankit Singh (asingh@stud.fh-frankfurt.de) M.Sc High Integrity System University of Applied Sciences, Frankfurt am Main
  • 2. 1. Why we need Fault Tolerant Software? 2. Single Version Software Tolerance Techniques 3. Multi Version Software Tolerance Techniques 4 Software Fault Injection for Fault Tolerance Assessment! 5. Examples of Fault Tolerant Systems
  • 3. Why we need Fault Tolerant Software?
  • 4.
  • 5.
  • 6.
  • 7. Why we need Fault Tolerant Software? “ PROGRAMS are really not much more than the PROGRAMMER’S BEST GUESS about what a system should do”
  • 8.
  • 9.
  • 10. Why we need Fault Tolerant Software? Quick look on software development process!!! This process model is appropriate for projects where the requirements are incompletely specified or when the developers are unsure whether a proposed design solution is adequate.
  • 11.
  • 12.
  • 13.
  • 14. Single Version Software Tolerance Techniques
  • 15.
  • 16.
  • 17. Checkpoint and Restart Single Version Software Tolerance Techniques There exist two kinds of restart recovery: Static : A static restart is based on returning the module to a predetermined state. Dynamic: Dynamic restart uses dynamically created checkpoints that are snapshots of the state at various points during the execution. Advantage: they are based on states created during operation, and can thus be used to allow forward progress of execution without having to discard all the work done up to the time of error detection.
  • 18.
  • 19. Data diversity Single Version Software Tolerance Techniques
  • 20.
  • 21.
  • 22. Multi Version Software Tolerance Techniques
  • 23.
  • 24. Recovery Blocks Multi Version Software Tolerance Techniques Checkpoints are created before a version executes . Checkpoints are needed to recover the state after a version fails to provide a valid operational starting point for the next version if an error is detected.
  • 25. N-Version Programming Multi Version Software Tolerance Techniques
  • 26. N Self-Checking Programming Multi Version Software Tolerance Techniques This use of separate acceptance tests for each version is the main difference of this N Self-Checking model from the Recovery Blocks approach. Similar to Recovery Blocks, execution of the versions and their tests can be done sequentially or in parallel but the output is taken from the highest-ranking version that passes its acceptance test.
  • 27. Multi Version Software Tolerance Techniques This model has the advantage of using an application independent decision algorithm to select a correct output. This variation of self-checking programming has the theoretical vulnerability of encountering situations where multiple pairs pass their comparisons each with different outputs.
  • 28. Consensus Recovery Blocks Multi Version Software Tolerance Techniques The Consensus Recovery Blocks approach combines N-Version Programming and Recovery Blocks to improve the reliability over that achievable by using just one of the approaches. The acceptance tests in the Recovery Blocks suffer from lack of guidelines for their development and a general proneness to design faults due to the inherent difficulty in creating effective tests.
  • 29.
  • 30. Software Fault Injection for Fault Tolerance Assessment! Multi Version Software Tolerance Techniques
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.  
  • 38. Examples of Fault Tolerant Systems
  • 39.
  • 40.
  • 41.
  • 42. Examples of Fault Tolerant Systems
  • 43.
  • 44. Examples of Fault Tolerant Systems AIRBUS A320/A330/A340 Flight Control Computer The primary module sends its commands to the actuators, with the secondary module remaining in standby. When the primary module fails , it is taken offline and the secondary module takes over the command function. In addition, a second pair of modules (Primary 2 and Secondary 2 in Figure 21) is also available and sending commands to redundant actuators.
  • 45. Example of Fault Tolerant Systems , was the last thing I want to discuss with you!  Happy Christmas & New Year In Advance !! Thank You! Examples of Fault Tolerant Systems
  • 46.
  • 47.

Notes de l'éditeur

  1. We are going to talk about 5 things today.