PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI.

Slides:



Advertisements
Similar presentations
An Overview of ABFT in cloud computing
Advertisements

Principles of Engineering System Design Dr T Asokan
Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Fault-Tolerant Systems Design Part 1.
Chapter 19: Network Management Business Data Communications, 5e.
OSI Model OSI MODEL.
System integrity The term system integrity has the following meanings: That condition of a system where in its specified operational and technical parameters.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Chapter 19: Network Management Business Data Communications, 4e.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
A Study of Mobile IP Kunal Ganguly Wichita State University CS843 – Distributed Computing.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Applied Cryptography for Network Security
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Fault Tolerance in ZigBee Wireless Sensor Networks
Chapter 2 TCP/ IP PROTOCOL STACK. TCP/IP Protocol Suite Describes a set of general design guidelines and implementations of specific networking protocols.
Achieving Qualities 1 Võ Đình Hiếu. Contents Architecture tactics Availability tactics Security tactics Modifiability tactics 2.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Fault Tolerance in the Nonstop Cyclone System By Scott Chan Robert Jardine Presented by Phuc Nguyen.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
 Communication Tasks  Protocols  Protocol Architecture  Characteristics of a Protocol.
Distributed Systems: Concepts and Design Chapter 1 Pages
Security Patterns in Wireless Sensor Networks By Y. Serge Joseph October 8 th, 2009 Part I.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Fault-Tolerant Systems Design Part 1.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
 Apache Airavata Architecture Overview Shameera Rathnayaka Graduate Assistant Science Gateways Group Indiana University 07/27/2015.
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
CprE 458/558: Real-Time Systems
Problem Wensheng Zhang, Dr. Guohong Cao, and Dr. Tom La Porta Example: Battlefield Surveillance Challenges Small Sensing Range Limitations in sensor nodes.
Lecture 24 Wireless Network Security
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
IEEE j Relay-Based Wireless Access Networks VASKEN GENC, SEAN MURPHY, YANG YU, AND JOHN MURPHY, UNIVERSITY COLLEGE DUBLIN SCHOOL OF COMPUTER SCIENCE.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Name Of The College & Dept
Relying on Safe Distance to Achieve Strong Partitionable Group Membership in Ad Hoc Networks Authors: Q. Huang, C. Julien, G. Roman Presented By: Jeff.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Coupling and Cohesion Schach, S, R. Object-Oriented and Classical Software Engineering. McGraw-Hill, 2002.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Powerpoint Templates Data Communication Muhammad Waseem Iqbal Lecture # 07 Spring-2016.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
OSI Model OSI MODEL. Communication Architecture Strategy for connecting host computers and other communicating equipment. Defines necessary elements for.
OSI Model OSI MODEL.
Chapter 1 Characterization of Distributed Systems
Chapter 19: Network Management
Lecturer, Department of Computer Application
DEPARTMENT OF COMPUTER SCIENCE
OSI Model OSI MODEL.
Lecture 36.
Lecture 36.
Presentation transcript:

PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

 INTRODUCTION WHAT IS FAULT TOLERANCE WHY FAULT TOLERANCE  TYPES OF CONCERN OF FAULT TOLERANCE  MODELS  MAJOR AREAS OF FAULT TOLERANCE  IMPLEMENTATION OBJECT ORIENTED APPROACH FOR IMPLEMENTING ALGORITHM BASED FAULT TOLERANCE  CONCLUSION  REFERENCES  QUESTIONS

WHAT IS FAULT TOLERANCE Monitored and tolerated in order to provide a good performance for the users throughout the network. WHY FAULT TOLERANCE Reliability Survivability Performance

o Our goal is to maximize the network reliability at its design life. o As dependence on mobile terminals increases, users will demand the same system functionality, in terms of reliable service. o Reliability techniques comprise of the following phases. Fault confinement Fault detection Fault latency

Fault detection techniques Fault detection techniques Offline Detection Online Detection online detection techniques include parity checking, duplication and triplication. Stages: Diagnosis Reconfiguration Recovery Two most widely used recovery techniques are fault masking and retry.

Survivability is used to describe the available performance of a network after a failure. Strategies to improve network survivability can be classified into three categories: -> Prevention, -> Network design and capacity allocation, ->Traffic management and restoration. The ideal survivability goal is to make a network failure imperceptible to the user by providing service continuity and minimizing network congestion.

Survivability issues in wireless networks must take into account these unique characteristics: user mobility, power conservation in mobile terminals, security (encryption and authentication), the poor quality of radio links (in comparison to wired equivalents), channel capacity that is limited by a regulated frequency spectrum.

Survivability framework consists of three layers with survivability strategies possible at each layer. The three layers are termed  Access Layer Radio sub layer Link Layer  Transport Layer  Intelligent Layer Each of the three layers are characterized by network functions, network components, and communication links

Various issues and factors are considered for good performance of the network. In order to achieve over all good performance of the network fault tolerant techniques are implemented at various levels. For example, Recovery Recovery is a process where the type of the faults is identified and new clusters are allocated to the sensors. When the gateway is identified as failure all sensors in its clusters are recovered. The status message is parsed to extract the identity of sensors that cannot communicate with the gateway due to range faults in the gateways. Clustering is based on the distance between the sensors and gateways. During clustering each gateway creates a range set based on the communication range of the sensors and the gateways.

Fault models Fault detection and diagnosis Resiliency mechanisms MODELS: STUCK AT Value stuck at zero or one BRIDGING Physically connected with wired AND / wired OR depending on logic family.

PHYSICAL LAYER HARWARE COMPONENTS SYSTEM SOFTWARE MIDDLEWARE APPLICATION

OBJECT ORIENTED APPROACH FOR IMPLEMENTING ALGORITHM BASED FAULT TOLERANCE. The techniques which protect the integrity data items during storage, transmission and operations are referred to as algorithm based fault tolerance Algorithm-based fault tolerance techniques provide additional fault- tolerant layers that catch and handle faults which could not be corrected by the operating system and hardware. Object-based fault tolerance allows programmers to implement fault tolerance in their applications without having to master all the details of the discipline.

The fault tolerance is implemented as a firewall between the actual data object instance and the application, therefore isolating, detecting and correcting data errors before they propagate to other data objects. Layering of fault tolerance around data structures by implementing Weighted Checksum Codes (WCC) which encapsulates the standard matrix library Error-detecting and error-correcting codes, similar to Weighted Checksum codes, have been standard in data transmission and storage for many years which should be able to protect the information not only when it is being stored or transferred, but also when it is being modified. Weighted Checksum Codes is chosen because it provides an efficient implementation of fault-tolerant matrix objects.

Information hiding is a formal mechanism for restricting access to the internal data structures of the class and for protecting the internal state of the class object. An application creates matrix objects and manipulates the objects through the fault tolerance layer. The fault tolerance layer performs only error-detection and error-correction tasks and sends messages to the standard matrix object to perform the actual matrix operations. fault tolerance is transparent to the application.

Setting of an individual element of a matrix to a new value by the user. Every time an element is set to a new value, it must also update the corresponding checksums. Otherwise it would result in inconsistent checksums which would indicate the need to change the matrix item back to its previous value. Simply passing through the scalar-matrix operation message does not yield correct results.

Besides standard operators to access the matrix elements, methods are also implemented to update the checksums after each modification of a matrix element. The proper way of implementing scalar matrix addition or subtraction is to transform the scalar-matrix operation message into a matrix-matrix addition message. It is necessary to create a new check summed matrix of the scalar and send a matrix addition or subtraction message to the matrices

Study of fault tolerance in each layer and different type of implementations done to each layer and different algorithms proposed in order to over come faults in the network. One of the common implementation is object based approach for implementing algorithm based fault tolerance. Algorithm-based fault tolerance techniques can achieve high performance, tolerate physical failures in the system, and still produce correct results. object-based fault tolerance scheme that allows fault tolerance layers to be transparently added to data objects. C++ abstraction techniques are used to add algorithm-based fault tolerance to data objects without modification to the original object class or the application.

Fault tolerance in wireless sensor networks Farinaz Koushanfar1, Miodrag Potkonjak, Alberto Sangiovanni- Vincentelli1 Fault tolerance techniques for wirelss ad-hoc sensor networks Farinaz Koushanfar, Miodrag Potkonjak, Alberto Snagiovanni- Vincentelli Designing efficient fault tolerant systems in wireless networks, Guohong Cao Designing fault tolerant wireless access networks, C. Charnsprinyo, D. Tippe Fault Tolerant Deployment and Topology Control in Wireless Networks doi.ieeecomputersociety.org/ /HICSS

Additional factors that include for fault tolerant wireless network is a) Software b) Hardware c) Survivability d) Performance e) Heterogeneity of the network

At the application level, we expect that fault resiliency mechanisms required for common applications such as sensor fusion, data filtering and data aggregation will be of primary importance. It is important to observe that for each of these applications there will be a significant variety of approaches that will be used.

Q.What are the different types of algorithms? Distributed clustering algorithm Topology controlling algorithm Algorithm for improving the dependability

Duplication methods have 2 modules running on two different systems in a network then these two does the same computation and the results are produced and are compared, if the two messages do not agree on result, an error message is generated and mostly this method is usually used to detect a fault.

Traditionally, fault detection techniques are classified into offline and online detections. Most often for offline detection, special diagnostic program are employed either during idle periods of time or using multiplexing with a regular mode of operation. In an offline detection technique data is collected over a period of time and simulation program is run during the system idle time and the fault is detected.