Ensuring that a system meets its prescribed specification is a growing challenge that confronts software developers and system engineers. Meeting this challenge is particularly important for distributed systems with s...
详细信息
ISBN:
(纸本)3540600426
Ensuring that a system meets its prescribed specification is a growing challenge that confronts software developers and system engineers. Meeting this challenge is particularly important for distributed systems with strict dependability and timeliness constraints. This paper presents a technique, called script-driven probing and fault injection, for the evaluation and validation of dependable protocols. The proposed approach can be used to demonstrate three aspects of a target protocol: i) detection of design or implementation errors, ii) identification of violations of protocol specifications, and iii) insight into design decisions made by the implementers. To demonstrate the capabilities of this technique, the paper briefly describes a probing and fault injection tool called the PFI tool, and several experiments on two protocols: the Transmission Control Protocol (TCP) [4, 24] and the Group Membership Protocol (GMP) [19]. The tool can be used to delay, drop, reorder, duplicate, and modify messages. It can also introduce new messages into the system to probe participants. In the case of TCP, we used the PFI tool to duplicate the experiments reported in [7] on several TCP implementations without access to the vendors' TCP source code in a very short time. We also ran several new experiments that are difficult to perform using past approaches based on packet monitoring and filtering. In the case of GMP, we used the tool to test the fault-tolerance capabilities of an implementation under various failure models including daemon/link crash, send/receive omissions, and timing failures. Furthermore, by selective reordering of messages and spontaneous transmission of new messages, we were able to guide a distributed computation into hard to reach global states without instrumenting the protocol implementation.
This paper presents pp-mess-sim, an object-oriented discrete-event simulation environment for evaluating multicomputer networks. The simulator provides a toolboz of various network topologies, communication workloads,...
详细信息
Scheduling messages on the controller area network (CAN) corresponds to assigning identifiers (IDs) to messages according to their priorities. If fixed priority scheduling such as deadline monotonic (DM) is used to ca...
详细信息
The new generation of real-time systems are characterized by multiple, conflicting non-functional desiderata on goals. Furthermore, the systems exhibit very large size and complexity-in both application structures and...
The new generation of real-time systems are characterized by multiple, conflicting non-functional desiderata on goals. Furthermore, the systems exhibit very large size and complexity-in both application structures and underlying software and hardware platforms. We argue that current high-level real-time languages do not meet the challenge of these complex real-time systems and introduce a new language-CRL-that we claim does. Relevant real-time features of CRL are discussed and a summary is provided vis-ri-vis future features that would address non-functional goals other than timeliness. A current implementation status and how CRL fits into a rather ambitious environment for the construction of complex real-time systems (under construction in our real-timecomputing Lab at NJIT) are briefly presented.
Achieving fault-tolerance using a primary-backup approach involves overhead of recovery such as activating the backup and propagating execution states, which may affect the timeliness properties of real-time systems. ...
详细信息
Achieving fault-tolerance using a primary-backup approach involves overhead of recovery such as activating the backup and propagating execution states, which may affect the timeliness properties of real-time systems. We propose a semi-passive architecture for fault-tolerance and show that speculative execution can enhance overall performance and hence shorten the recovery time in the presence of failure. The compiler is used to detect speculative execution, to insert check-points and to construct the updated messages. Simulation results are reported to show the contribution of speculative execution under the proposed architecture.
This paper discusses the need for and the use of a software architecture as an important means in the development of complex systems. We start out with a brief analysis of the term "complex" with regard to c...
详细信息
This paper discusses the need for and the use of a software architecture as an important means in the development of complex systems. We start out with a brief analysis of the term "complex" with regard to computerized systems. On this basis, we introduce software architectures as a means to cope with the software design aspect of system complexity. We then identify the architectural concepts that are necessary to capture a comprehensive, high level system design and discuss their characterizing properties. Finally, we propose a "construction-oriented" technique for architecture specification which is based on a generic set of architectural elements and is supported by a tool, d-ASPECT (domain Architecture Specification Tool), currently under development at NJIT.
To guarantee the delivery of real-time messages before their deadline, a real-time connection or channel must be established before the transmission of any real-time messages. During this channel-establishment phase, ...
详细信息
To guarantee the delivery of real-time messages before their deadline, a real-time connection or channel must be established before the transmission of any real-time messages. During this channel-establishment phase, one must first select a route between the source and destination of this channel and then reserve sufficient resources along this route so that the worst-case end-to-end delay over the selected route may not exceed the user-specified delay bound. We propose a table-driven distributed route-selection scheme that is guaranteed to find a "qualified" route, if any, that meets the performance requirement of the requested channel without compromising any of the existing guarantees. The proposed scheme uses the Bellman-Ford shortest path algorithm to build real-time delay tables, and hence, can solve the route-selection problem by a simple table look-up. Several examples are presented to demonstrate the effectiveness of the proposed distributed route-selection scheme.
It is difficult to define and evaluate a meaningful performance metric when many packets are generated and exchanged concurrently in mesh-connected multicomputers equipped with wormhole switching and virtual channels....
详细信息
It is difficult to define and evaluate a meaningful performance metric when many packets are generated and exchanged concurrently in mesh-connected multicomputers equipped with wormhole switching and virtual channels. Thus, an approximate metric/cost function must be chosen so that when, task modules are mapped by optimizing this function, the actual performance of the mapping is also optimized. Several low-complexity cost functions are evaluated using the simulated annealing optimization process. The mappings found by optimizing these cost functions are then fed into a flit-level simulator to evaluate their actual performance. One particular cost function is found to be very effective.
Multicast is a fundamental issue in distributed computing and networking, especially for applications such as audio and video transmission. The minimal cost route selection problem for multicasting is an NP-complete p...
详细信息
Multicast is a fundamental issue in distributed computing and networking, especially for applications such as audio and video transmission. The minimal cost route selection problem for multicasting is an NP-complete problem even for regular network topologies such as meshes and hypercubes. We therefore present a simple heuristic algorithm for multicast route selection in arbitrarily-connected point-to-point communication networks. Several other heuristics have been presented for finding the minimal multicast route, but most of them are global in the sense that the source uses global cost information to construct a multicast tree. Our algorithm does not require the use of global cost information; it uses cost information only from neighboring nodes as it proceeds which makes it more practical from an implementation paint of view. The performance of the algorithm is analyzed through empirical comparisons and is shown to perform as well against algorithms which use global information.
暂无评论