presented by: vijeta challa parnitha kothapally hima bindu salvaji

25
PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Post on 19-Dec-2015

222 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

PRESENTED BY:

VIJETA CHALLAPARNITHA KOTHAPALLY

HIMA BINDU SALVAJI

Page 2: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

INTRODUCTION WHAT IS FAULT TOLERANCE WHY FAULT TOLERANCE

TYPES OF CONCERN OF FAULT TOLERANCE

MODELS

MAJOR AREAS OF FAULT TOLERANCE

IMPLEMENTATION•OBJECT ORIENTED APPROACH FOR IMPLEMENTING ALGORITHM BASED FAULT TOLERANCE

CONCLUSION

REFERENCES

QUESTIONS

Page 3: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

WHAT IS FAULT TOLERANCE•Monitored and tolerated in order to provide a good performance for the users throughout the network.

•WHY FAULT TOLERANCEReliability SurvivabilityPerformance

Page 4: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

oOur goal is to maximize the network reliability at its design life.

oAs dependence on mobile terminals increases, users will demand the same system functionality, in terms of reliable service.

oReliability techniques comprise of the following phases.• Fault confinement• Fault detection • Fault latency

Page 5: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Fault detection techniquesFault detection techniques Offline Detection Online Detection

online detection techniques include parity checking, duplication and triplication.

Stages: Diagnosis Reconfiguration Recovery Two most widely used recovery techniques are fault masking and retry.

Page 6: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

• Survivability is used to describe the available performance of a network after a failure. •Strategies to improve network survivability can be classified into three categories:

-> Prevention,

-> Network design and capacity allocation,

->Traffic management and restoration.

•The ideal survivability goal is to make a network failure imperceptible to the user by providing service continuity and minimizing network congestion.

Page 7: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Survivability issues in wireless networks must take into account these unique characteristics:

user mobility, power conservation in mobile terminals, security (encryption and authentication), the poor quality of radio links (in comparison to wired

equivalents), channel capacity that is limited by a regulated frequency

spectrum.

Page 8: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Survivability framework consists of three layers with survivability strategies possible at each layer.

The three layers are termedAccess Layer

Radio sub layer

Link LayerTransport LayerIntelligent Layer

Each of the three layers are characterized by network functions, network components, and communication links

Page 9: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

•Various issues and factors are considered for good performance of the network. In order to achieve over all good performance of the network fault tolerant techniques are implemented at various levels.

For example, Recovery

•Recovery is a process where the type of the faults is identified and new clusters are allocated to the sensors. •When the gateway is identified as failure all sensors in its clusters are recovered. •The status message is parsed to extract the identity of sensors that cannot communicate with the gateway due to range faults in the gateways.•Clustering is based on the distance between the sensors and gateways. •During clustering each gateway creates a range set based on the communication range of the sensors and the gateways.

Page 10: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

•Fault models•Fault detection and diagnosis•Resiliency mechanisms

•MODELS:•STUCK AT

•Value stuck at zero or one

•BRIDGING•Physically connected with wired AND / wired OR depending on logic family.

Page 11: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

•PHYSICAL LAYER

•HARWARE COMPONENTS

•SYSTEM SOFTWARE

•MIDDLEWARE

•APPLICATION

Page 12: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

OBJECT ORIENTED APPROACH FOR IMPLEMENTING ALGORITHM BASED FAULT TOLERANCE.

The techniques which protect the integrity data items during storage, transmission and operations are referred to as algorithm based fault tolerance

Algorithm-based fault tolerance techniques provide additional fault-tolerant layers that catch and handle faults which could not be corrected by the operating system and

hardware.

Object-based fault tolerance allows programmers to implement fault tolerance in their applications without

having to master all the details of the discipline.

Page 13: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

The fault tolerance is implemented as a firewall between the actual data object instance and the application, therefore isolating, detecting and correcting data errors before they propagate to other data objects.

Layering of fault tolerance around data structures by implementing Weighted Checksum Codes (WCC) which encapsulates the standard matrix library

Error-detecting and error-correcting codes, similar to Weighted Checksum codes, have been standard in data transmission and storage for many years which should be able to protect the information not only when it is being stored or transferred, but also when it is being modified.

Weighted Checksum Codes is chosen because it provides an efficient implementation of fault-tolerant matrix objects.

Page 14: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Information hiding is a formal mechanism for restricting access to the internal data structures of the class and for protecting the internal state of the class object.

An application creates matrix objects and manipulates the objects through the fault tolerance layer.

The fault tolerance layer performs only error-detection and error-correction tasks and sends messages to the standard matrix object to perform the actual matrix operations.

fault tolerance is transparent to the application.

Page 15: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Setting of an individual element of a matrix to a new value by the user . Every time an element is set to a new value, it must also update the corresponding checksums. Otherwise it would result in inconsistent checksums which would indicate the need to change the matrix item back to its previous value.

Simply passing through the scalar-matrix operation message does not yield correct results.

Page 16: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Besides standard operators to access the matrix elements, methods are also implemented to update the checksums after each modification of a matrix element.

The proper way of implementing scalar matrix addition or subtraction is to transform the scalar-matrix operation message into a matrix-matrix addition message. It is necessary to create a new check summed matrix of the scalar and send a matrix addition or subtraction message to the matrices

Page 17: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Study of fault tolerance in each layer and different type of implementations done to each layer and different algorithms proposed in order to over come faults in the network.

One of the common implementation is object based approach for implementing algorithm based fault tolerance.

Algorithm-based fault tolerance techniques can achieve high performance, tolerate physical failures in the system, and still produce correct results.

object-based fault tolerance scheme that allows fault tolerance layers to be transparently added to data objects. C++ abstraction techniques are used to add algorithm-based fault tolerance to data objects without modification to the original object class or the application.

Page 18: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Fault tolerance in wireless sensor networks Farinaz Koushanfar1, Miodrag Potkonjak, Alberto Sangiovanni- Vincentelli1

Fault tolerance techniques for wirelss ad-hoc sensor networks Farinaz Koushanfar, Miodrag Potkonjak, Alberto Snagiovanni- Vincentelli

Designing efficient fault tolerant systems in wireless networks, Guohong Cao

Designing fault tolerant wireless access networks, C. Charnsprinyo, D. Tippe

Fault Tolerant Deployment and Topology Control in Wireless Networks

www.sigmobile.org/mobihoc/2003/papers/

doi.ieeecomputersociety.org/10.1109/HICSS.2003.1174863

Page 19: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI
Page 20: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Additional factors that include for fault tolerant wireless network isa) Softwareb) Hardwarec) Survivabilityd) Performance e) Heterogeneity of the network

Page 21: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

At the application level, we expect that fault resiliency mechanisms required for common applications such as sensor fusion, data filtering and data aggregation will be of primary importance. It is important to observe that for each of these applications there will be a significant variety of approaches that will be used.

Page 22: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Q.What are the different types of algorithms?

Distributed clustering algorithmTopology controlling algorithmAlgorithm for improving the dependability

Page 23: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Duplication methods have 2 modules running on two different systems in a network then these two does the same computation and the results are produced and are compared, if the two messages do not agree on result, an error message is generated and mostly this method is usually used to detect a fault .

Page 24: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI

Traditionally, fault detection techniques are classified into offline and online detections.

Most often for offline detection, special diagnostic program are employed either during idle periods of time or using multiplexing with a regular mode of operation.

In an offline detection technique data is collected over a period of time and simulation program is run during the system idle time and the fault is detected.

Page 25: PRESENTED BY: VIJETA CHALLA PARNITHA KOTHAPALLY HIMA BINDU SALVAJI