Abstract
In the application of component-based distributed computing systems, many software systems allow the existence of large numbers of potentially faulty components. Faults are inevitable in this large-scale, complex, distributed components setting, which may include a lot of untrustworthy parts. How to provide a highly reliable component-based distributed system is a challenging problem. Redundancy and replication are generally utilized to realize the goal of fault tolerance. In this paper, we propose a technique of Critical Fault Iterative (CFI) redundancy, by which the efficiency can be guaranteed to make use of resources (e.g., computation, storage), and to create fault-tolerance applications. The function invocation relationships and invocation frequencies are employed to rank the importance of functions and identify the most vulnerable functions. A formal theoretical analysis and an experimental analysis are presented. Compared with the existing methods, the reliability of a component-based distributed system can be greatly improved by tolerating a small part of significant functions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Anderson, D.P., Fedak, G.: The computational and storage potential of volunteer computing. In: Sixth IEEE International Symposium on CCGRID 2006, vol. 1, pp. 73–80. IEEE (2006)
Chen, L., Avizienis, A.: N-version programming: A fault-tolerance approach to reliability of software operation. In: Proc. 8th IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-8), pp. 3–9 (1978)
Batagelj, V., Mrvar, A.: Pajek: Program for analysis and visualization of large networks, Ljubljana, Slovenia (2006)
Brin, S., Page, L.: The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems 30(1), 107–117 (1998)
Borthakur, D.: The hadoop distributed file system: Architecture and design (2007)
Boinc, A.D.P.: A system for public-resource computing and storage. In: Proceedings of the Fifth IEEE/ACM International Workshop on Grid Computing, pp. 4–10. IEEE (2004)
Christensen, C., Aina, T., Stainforth, D.: The challenge of volunteer computing with lengthy climate model simulations. In: First International Conference on e-Science and Grid Computing, vol. 8, p. 15. IEEE (2005)
Oliner, A.J., Aiken, A.: Online detection of multi-component interactions in production systems. In: 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp. 49–60. IEEE (2011)
Banabic, R., Candea, G., Guerraoui, R.: Automated vulnerability discovery in distributed systems. In: 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp. 188–193. IEEE (2011)
Brun, Y., Edwards, G., Bang, J.Y., et al.: Smart redundancy for distributed computation. In: 2011 31st International Conference on Distributed Computing Systems (ICDCS), pp. 665–676. IEEE (2011)
Bondavalli, A., Chiaradonna, S., Di Giandomenico, F., et al.: An adaptive approach to achieving hardware and software fault tolerance in a distributed computing environment. Journal of Systems Architecture 47(9), 763–781 (2002)
Zheng, Z., Zhou, T., Lyu, M., et al.: Component ranking for fault-tolerant cloud applications (2012)
Litvak, N., van der Hofstad, R.: Degree-degree correlations in random graphs with heavy-tailed degrees. arXiv preprint arXiv:1202.3071 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Wang, H., Wang, Y., Zhou, L., Jiang, K. (2014). Understanding Iterative Redundancy for Vulnerability-Driven Fault Tolerance Strategy. In: Zu, Q., Vargas-Vera, M., Hu, B. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2013. Lecture Notes in Computer Science, vol 8351. Springer, Cham. https://doi.org/10.1007/978-3-319-09265-2_68
Download citation
DOI: https://doi.org/10.1007/978-3-319-09265-2_68
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09264-5
Online ISBN: 978-3-319-09265-2
eBook Packages: Computer ScienceComputer Science (R0)