SlideShare a Scribd company logo
1 of 8
NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE,THENI.
DEPARTMENT OF COMPUTER SCIENCE.
REABILITY AND FAULT TOLERANCE
BY:
B.POORANI
I-MSC(CS)
FAULT TOLERANCE:
 The fault tolerance is the property that enables a system to continue
operating properly in the event of the failure of one or more faults
within some of its component .
 If its operating quality decrease at all, the decrease is proportional to
severity of the failure , as compared to a naively designed system, in
which even a small failure can cause total breakdown.
 Fault tolerance is particularly sought after in high –availability,
mission – critical, or even life-critical systems.
 Research into the kind of tolerances needed for critical system
involves a large amount of interdisciplinary work. The more
complex the system, the more carefully all possible interaction have
to be considered and prepared for.
 Considering the importance of high-value system in transport ,
public utilities and the military, the fields of topic that touch on
research is very wide.
REPLICATION:
 Providing multiple identical instances of the same system or subsystem, directing
tasks or request to all of them in parallel, and choosing the correct results on the
basis of a quorum.
REDUNDANCY:
 Providing multiple identical instances of the same system and switching to one of
the remaining instances in case of a failure.
DIVERSITY:
 Providing multiple different implementation of the same specification and
Using them like replicated system to cope with error in a specific implementation.
BIST:
 BIST stands for built In self test. system carrier out the test of itself
after a certain period of time again and again , that is BIST
techniques for hardware fault-tolerance.
 When system detects a fault it switches out the faulty component
and switched in the redundant of it, system basically reconfigure
itself in case of fault occurrence.
TMR:
 TMR is a triple modular redundancy .three redundant copies of
critical components are generated and all these three copies are run
concurrently.
 Voting of results of all redundant copies are done and majority result
is selected . It can tolerate the occurrence of a single fault at a time.
SOFTWARE FAULT-TOLERANCE
TECHNIQUES:
 Software fault-tolerance techniques are used to make the software
reliable in the condition of fault occurrence and failure.
 There are three techniques used in the software fault-tolerance .
N-version programming
Recovery blocks
Check-pointing and rollback recovery
Thank you

More Related Content

Similar to reliability and fault tolerance.pptx

Simulation-based fault-tolerant multiprocessors system
Simulation-based fault-tolerant multiprocessors systemSimulation-based fault-tolerant multiprocessors system
Simulation-based fault-tolerant multiprocessors systemTELKOMNIKA JOURNAL
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9Ian Sommerville
 
Survey on replication techniques for distributed system
Survey on replication techniques for distributed systemSurvey on replication techniques for distributed system
Survey on replication techniques for distributed systemIJECEIAES
 
Intelligence decision making of fault detection and fault tolerances method f...
Intelligence decision making of fault detection and fault tolerances method f...Intelligence decision making of fault detection and fault tolerances method f...
Intelligence decision making of fault detection and fault tolerances method f...Siva Samy
 
A survey of online failure prediction methods
A survey of online failure prediction methodsA survey of online failure prediction methods
A survey of online failure prediction methodsunyil96
 
Bt0081 software engineering2
Bt0081 software engineering2Bt0081 software engineering2
Bt0081 software engineering2Techglyphs
 
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...ijccmsjournal
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance SystemEhsan Ilahi
 
Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareNicole Gaehle, MSIST
 
Restoration and Degeneration of the Applications
Restoration and Degeneration of the ApplicationsRestoration and Degeneration of the Applications
Restoration and Degeneration of the Applicationsiosrjce
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReportabhishekroushan
 
Fault-tolerant architectures in real-time operating systems
Fault-tolerant architectures in real-time operating systemsFault-tolerant architectures in real-time operating systems
Fault-tolerant architectures in real-time operating systemsmydheeswarandseec
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsEditor IJCATR
 

Similar to reliability and fault tolerance.pptx (20)

Hp2513711375
Hp2513711375Hp2513711375
Hp2513711375
 
Hp2513711375
Hp2513711375Hp2513711375
Hp2513711375
 
Ads7 deflorio
Ads7 deflorioAds7 deflorio
Ads7 deflorio
 
Simulation-based fault-tolerant multiprocessors system
Simulation-based fault-tolerant multiprocessors systemSimulation-based fault-tolerant multiprocessors system
Simulation-based fault-tolerant multiprocessors system
 
Ch13-Software Engineering 9
Ch13-Software Engineering 9Ch13-Software Engineering 9
Ch13-Software Engineering 9
 
Survey on replication techniques for distributed system
Survey on replication techniques for distributed systemSurvey on replication techniques for distributed system
Survey on replication techniques for distributed system
 
Intelligence decision making of fault detection and fault tolerances method f...
Intelligence decision making of fault detection and fault tolerances method f...Intelligence decision making of fault detection and fault tolerances method f...
Intelligence decision making of fault detection and fault tolerances method f...
 
A survey of online failure prediction methods
A survey of online failure prediction methodsA survey of online failure prediction methods
A survey of online failure prediction methods
 
Bt0081 software engineering2
Bt0081 software engineering2Bt0081 software engineering2
Bt0081 software engineering2
 
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
A Novel Approach to Derive the Average-Case Behavior of Distributed Embedded ...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Fault Tolerance System
Fault Tolerance SystemFault Tolerance System
Fault Tolerance System
 
Understanding Vulnerabilities in Software
Understanding Vulnerabilities in SoftwareUnderstanding Vulnerabilities in Software
Understanding Vulnerabilities in Software
 
F017264143
F017264143F017264143
F017264143
 
Restoration and Degeneration of the Applications
Restoration and Degeneration of the ApplicationsRestoration and Degeneration of the Applications
Restoration and Degeneration of the Applications
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport
 
Atifalhas
AtifalhasAtifalhas
Atifalhas
 
Fault-tolerant architectures in real-time operating systems
Fault-tolerant architectures in real-time operating systemsFault-tolerant architectures in real-time operating systems
Fault-tolerant architectures in real-time operating systems
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance Applications
 
Voting protocol
Voting protocolVoting protocol
Voting protocol
 

More from PooraniBalamurugan3

More from PooraniBalamurugan3 (10)

type of edge detector.pptx
type of edge detector.pptxtype of edge detector.pptx
type of edge detector.pptx
 
helpline number in women empowerment.pptx
helpline number in women empowerment.pptxhelpline number in women empowerment.pptx
helpline number in women empowerment.pptx
 
home automation.pptx
home automation.pptxhome automation.pptx
home automation.pptx
 
no sql ppt.pptx
no sql ppt.pptxno sql ppt.pptx
no sql ppt.pptx
 
cryptography.pptx
cryptography.pptxcryptography.pptx
cryptography.pptx
 
static method,adding method dynamically.pptx
static method,adding method dynamically.pptxstatic method,adding method dynamically.pptx
static method,adding method dynamically.pptx
 
data structure of symbol table.pptx
data structure of symbol table.pptxdata structure of symbol table.pptx
data structure of symbol table.pptx
 
traveling salesperson.pptx
traveling salesperson.pptxtraveling salesperson.pptx
traveling salesperson.pptx
 
nagavarthini ppt.pptx
nagavarthini ppt.pptxnagavarthini ppt.pptx
nagavarthini ppt.pptx
 
filters & security issues.pptx
filters & security issues.pptxfilters & security issues.pptx
filters & security issues.pptx
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 

reliability and fault tolerance.pptx

  • 1. NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE,THENI. DEPARTMENT OF COMPUTER SCIENCE. REABILITY AND FAULT TOLERANCE BY: B.POORANI I-MSC(CS)
  • 2. FAULT TOLERANCE:  The fault tolerance is the property that enables a system to continue operating properly in the event of the failure of one or more faults within some of its component .  If its operating quality decrease at all, the decrease is proportional to severity of the failure , as compared to a naively designed system, in which even a small failure can cause total breakdown.  Fault tolerance is particularly sought after in high –availability, mission – critical, or even life-critical systems.
  • 3.  Research into the kind of tolerances needed for critical system involves a large amount of interdisciplinary work. The more complex the system, the more carefully all possible interaction have to be considered and prepared for.  Considering the importance of high-value system in transport , public utilities and the military, the fields of topic that touch on research is very wide.
  • 4. REPLICATION:  Providing multiple identical instances of the same system or subsystem, directing tasks or request to all of them in parallel, and choosing the correct results on the basis of a quorum. REDUNDANCY:  Providing multiple identical instances of the same system and switching to one of the remaining instances in case of a failure. DIVERSITY:  Providing multiple different implementation of the same specification and Using them like replicated system to cope with error in a specific implementation.
  • 5. BIST:  BIST stands for built In self test. system carrier out the test of itself after a certain period of time again and again , that is BIST techniques for hardware fault-tolerance.  When system detects a fault it switches out the faulty component and switched in the redundant of it, system basically reconfigure itself in case of fault occurrence.
  • 6. TMR:  TMR is a triple modular redundancy .three redundant copies of critical components are generated and all these three copies are run concurrently.  Voting of results of all redundant copies are done and majority result is selected . It can tolerate the occurrence of a single fault at a time.
  • 7. SOFTWARE FAULT-TOLERANCE TECHNIQUES:  Software fault-tolerance techniques are used to make the software reliable in the condition of fault occurrence and failure.  There are three techniques used in the software fault-tolerance . N-version programming Recovery blocks Check-pointing and rollback recovery