SlideShare a Scribd company logo
Raf. J. of Comp. & Math’s. , Vol. 10, No. 1, 2013
Fifth Scientific Conference Information Technology 2012 Dec. 19-20
187
Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems
Dhuha B. Abdullah Amira B. Sallow
College of Computer Sciences and Mathematics
University of Mosul
Received on: 21/10/2012 Accepted on: 30/01/2013
‫ﺍ‬‫ﻟﻤﻠﺨﺹ‬
‫ﺍﻟﺤﻘﻴﻘﻲ‬ ‫ﺍﻟﻭﻗﺕ‬ ‫ﺃﻨﻅﻤﺔ‬ ‫ﻓﻲ‬‫ﺍﻟﻤﻭﺯﻋﺔ‬‫ﻜﺎﻥ‬ ‫ﻭﺍﻥ‬ ‫ﺤﺘﻰ‬ ‫ﺍﻟﻤﺤﺩﺩ‬ ‫ﻭﻗﺘﻬﺎ‬ ‫ﻓﻲ‬ ‫ﺘﻨﺠﺯ‬ ‫ﺃﻥ‬ ‫ﺍﻟﻀﺭﻭﺭﻱ‬ ‫ﻤﻥ‬ ‫ﺍﻟﻤﻬﺎﻡ‬
‫ﺒﻌﻀ‬ ‫ﻫﻨﺎﻟﻙ‬‫ﹰ‬‫ﺎ‬‫ﺍﻟﺒﺭﻤﺠﻴﺔ‬ ‫ﺃﻭ‬ ‫ﺍﻟﻤﺎﺩﻴﺔ‬ ‫ﺍﻷﺨﻁﺎﺀ‬ ‫ﻤﻥ‬.‫ﻗﺩﺭﺓ‬ ‫ﻴﻌﻨﻲ‬ ‫ﺍﻟﻤﻭﺯﻋﺔ‬ ‫ﺍﻟﺤﻘﻴﻘﻲ‬ ‫ﺍﻟﺯﻤﻥ‬ ‫ﺃﻨﻅﻤﺔ‬ ‫ﻓﻲ‬ ‫ﺒﺎﻟﺨﻁﺄ‬ ‫ﺍﻟﺘﺤﻜﻡ‬
‫ﻭﺘﺠﺎﻭﺯﻫﺎ‬ ‫ﺍﻷﺨﻁﺎﺀ‬ ‫ﻭﺍﻜﺘﺸﺎﻑ‬ ‫ﻟﻠﻤﻬﺎﻡ‬ ‫ﺍﻟﻨﻬﺎﺌﻴﺔ‬ ‫ﺍﻟﺤﺩﻭﺩ‬ ‫ﺘﺤﻘﻴﻕ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﻨﻅﺎﻡ‬.‫ﺍﻻﻋﺘﺒﺎﺭ‬ ‫ﺒﻨﻅﺭ‬ ‫ﺍﻷﺨﺫ‬ ‫ﺘﻡ‬ ‫ﺍﻟﺒﺤﺙ‬ ‫ﻫﺫﺍ‬ ‫ﻓﻲ‬
‫ﺒ‬ ‫ﺴﻤﻲ‬ ‫ﺒﺎﻟﺨﻁﺄ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﻁﻭﻴﺭ‬ ‫ﻭﺘﻡ‬ ‫ﺒﺎﻷﺨﻁﺎﺀ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﻤﺸﻜﻠﺔ‬‫ـ‬)‫ﻷﻨﻅﻤﺔ‬ ‫ﺍﻟﻤﺘﻜﺎﻤل‬ ‫ﺒﺎﻟﺨﻁﺄ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬
‫ﺍﻟﻤﻭﺯﻋﺔ‬ ‫ﺍﻟﺤﻘﻴﻘﻲ‬ ‫ﺍﻟﺯﻤﻥ‬.(‫ﻋﻤل‬‫ﺍﻟﻤﻭﺯﻋﺔ‬ ‫ﺍﻟﺤﻘﻴﻘﻲ‬ ‫ﺍﻟﺯﻤﻥ‬ ‫ﻷﻨﻅﻤﺔ‬ ‫ﺍﻟﺠﺩﻭﻟﺔ‬ ‫ﺘﻜﺎﻤل‬ ‫ﺯﻴﺎﺩﺓ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﻤﻘﺘﺭﺡ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬.
ABSTRACT
In the distributed real time systems, tasks must meet their deadline even in the
presence of hardware/software faults. Fault tolerance in distributed real time systems
refers to the ability of the system to meet the tasks deadline and to detect their failure
and recover them. In this paper, we considered the problem of fault tolerance and
developed a fault tolerance protocol called DRT-FTIP (Distributed Real Time – Fault
Tolerance Integrity Protocol).This protocol increases the integrity of the scheduling in
distributed real time systems.
1. Introduction
Real-time systems can be classified as hard real time systems in which the
consequences of missing a deadline can be catastrophic and soft real time systems
in which the consequences are relatively tolerable. In hard real time systems, it
is important that tasks complete within their deadline even in the presence of a
failure. Examples of hard real-time systems are control systems in space
stations, auto pilot systems and monitoring systems for patients with critical
conditions. In soft real-time systems, it is more important to economically detect a
fault as soon as possible rather than to mask a fault. Examples of soft real-time
systems are all kinds of airline reservation, banking, and E-commerce
applications[3].
A faulty system, due to any reason during processing some task, can cause some
damages. A task running on real time distributed system should be feasible, reliable and
scalable. The real time distributed system such as nuclear systems, robotics, air traffic
control systems, grid … etc. are highly dependable on deadline. A fault in real time
distributed system can result a system into failure if not properly detected and recovered
at time. These systems must function with high availability even under hardware and
software faults. Fault-tolerance is the important technique used to maintain
dependability in these systems. Hardware and software redundancy are well-known
effective methods. Hardware fault-tolerance achieved through applying extra hardware
like processors, communication links, resource (memory, I/O device) whereas in
Dhuha B. Abdullah & Amira B. Sallow
188
software fault tolerance tasks, messages are added into the system to deal with faults.
Fault should be detected by applying reliable fault detector followed by some recovery
technique. Many fault detection techniques are available but it is necessary to apply
appropriate fault detector. Unreliable fault detector can make mistake by erroneously
suspecting correct process or trusting crashed process[4].
1.1 Contributions
In this paper, we consider the problem of Fault tolerance in distributed real-time
systems. We design a Distributed Real Time – Fault Tolerance Integrity Protocol (DRT-
FTIP) that has the following prosperities:
1. Designed to function in dynamic network.
2. Coupled with EOE-DRTSA (End to End-Distributed Real Time Scheduling
Algorithm.
3. Control integrity and fault tolerant with proposed Distributed real-time system.
1.2 Related Work
Past works on developing fault tolerance integrity protocol by Edward Curley,
Binoy Ravindran, Jonathan Anderson, and E. Douglas Jensen who considered the
problem of recovering from failures of distributable threads in distributed real-time
systems that operate under run-time uncertainties including those on thread execution
times, thread arrivals, and node failure occurrences. They presented thread integrity
protocol called TPR[4].
Binoy Ravindran, Edward Curley, Jonathan Anderson, and E. Douglas Jensen
who considered the problem of recovering from failures of distributable threads in
distributed real-time systems. They presented a scheduling algorithm called HUA and
two thread integrity protocols called D-TPR and W-TPR [5].
2. Failure, Error, and Faults
Avizienis and others define the terms failure, error and faults as fellows [6]:
Failure: A failure system occurs when the service provided by the system deviates from
the specified service. For example, when a user cannot read his/her stored file from
computer memory, then the expected service is not provided by the system.
Error: An error is a perturbation of internal state of the system that may lead to failure.
A failure occurs when the erroneous state causes an incorrect service to be delivered, for
example, when certain portion of the computer
memory is corrupted or broken and stored files, therefore cannot be read by the user.
Fault: The cause of the error is called a fault. An active fault leads to an error;
otherwise the fault is dormant. For example, impurities in the semiconductor devices
may cause computer memory in the long run to behave unpredictably.
3. Techniques for Fault Tolerance
Fault tolerance is the ability to continue operating despite the failure of a
limited subset of their hardware or software. So, the goal of the system designer
is to ensure that the probability of system failure is acceptably small. There can be
either hardware fault or software fault, which disturbs the real time systems to meet
their deadlines. There are three types of faults: Permanent, intermittent, and transient.
A permanent fault does not die away with time, but remains until it is repaired
as the affected unit is replaced. This is an intermittent fault cycle between the fault–
Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems
189
active and fault benign states. A transient fault dies away after some time[4].There are
different types of fault which can occur in Real-Time Distributed System. These faults
can be classified depending on several factors such as:
Network fault: A Fault occurrence in a network is due to network partition, Packet
Loss, Packet corruption, destination failure, link failure, etc.
Physical faults: This Fault can occur in hardware like fault in CPUs, Fault in memory,
Fault in storage, etc. Media faults: Fault occurrence is due to media head crashes.
Processor faults: fault occurs in processor due to operating system crashes.
Process faults: The occurrence of fault is due to shortage of resource, software bugs.
Service expiry fault: The service time of a resource may expire, while application is
using it.
A fault can be categorized on the basis of computing resources and time. A
failure occurs during computation on system resources can be classified as: omission
failure, timing failure, response failure, and crash failure. Faults occur with respect to
time are shown in Figure 1 below:
Figure 1. Types of Fault in a System
Permanent: These failures occur by accidentally cutting a wire, power breakdowns and
so on. It is easy to reproduce these failures. These failures can cause major disruptions
and some part of the system may not be functioning as desired.
Intermittent: These are the failures which appear occasionally. Mostly these failures
are ignored while testing the system and only appear when the system goes into
operation. Therefore, it is hard to predict the extent of damage these failures can bring
to the system.
Transient: These failures are caused by some inherent fault in the system. However,
these failures are corrected by retrying roll back the system to previous state such as
restarting software or resending a message. These failures are very common in
computer systems [4].
4. The System Model
We consider a distributed system architecture model [1] consisting of
heterogeneous processors; a set of client nodes; and a set of server nodes. These nodes
were interconnected via a communication network. A single Global Scheduler for the
Dhuha B. Abdullah & Amira B. Sallow
190
system was responsible for computing the initial priorities for the tasks; scheduler utility
was checked based on information provided by the application programmer. As new
tasks were introduced to the system, the Global Scheduler distributes them to client
processors. A Local Scheduler in each processor was responsible for specifying the
order of threads executions on a node. Thus, scheduling decisions made by a node
scheduler are independent of that made by other node schedulers. Client Node
schedulers make scheduling decisions using thread scheduling attributes, which
typically include threads' time constraints (e.g., importance, urgency). When a new job
arrives at client node and its utility is larger than the utility of the currently executing
job, the currently job will be preempted and the new job will be scheduled for
execution.
EOE-DRTSA algorithm [1] was designed to overcome the shortcomings of
independent scheduling algorithms by taking into account global information, while
constructing schedule. In EOE-DRTSA scheduling, firstly the thread will be arrived to
the Global Scheduler server. The Global Scheduler will compute the initial Urgency and
DTUF value. We consider the DTUF (Developed TUF) function to be three
dimensional function that decouples importance and urgency of a thread, urgency is
measured on the X-axis, and importance is measured on the Y-axis. The Benefit is
denoted by DTUF and is measured on the Z-axis. After the DTUF values were
computed for the threads, the Global Scheduler will pass the threads to the target node
to be executed there and the DRT-FTIP protocol will be worked concurrently with the
EOE-DRTSA scheduling algorithm. When the thread arrived to the Local Scheduler
node, the node will schedule the thread depending on its local scheduling algorithm.
DRT-FTIP integrity protocol will monitor the scheduling work on the local scheduler.
5. Protocol Algorithm Description
We design an DRT-FTIP(Distributed Real Time – Fault Tolerance Integrity
Protocol) with EOE-DRTSA scheduling algorithm for distributed real time system.
This protocol will control the faults that occurred in this proposed system. In server
side, when a thread sent to the client the server will expect to receive (thread execute
message) from the client. This message means that the thread is executed successfully
and there is no error. The DRT-FTIP protocol has three operation phases:
Phase I:
Establish the protocol for the first time, the server will send Client_Hello
message and wait until the client responds with the message Server_Hello. After that,
the second phase will begin.
Phase II:
In this phase, there are two states of behavior:
a) Normal state behavior: This behavior will describe the successful work for the
DRT-FTIP protocol without any error. In server side, for each thread that has been
sent to the client, the server will send thread Execute_wait message and commit
wait state in the state field in the Execute_Table that belongs to the sender thread.
When the Execute_finish message arrived from the client the server changes the
state field in the Execute_Table to finished to point that the thread was executed
successfully. Figure(2) shows the normal behavior of DRT-FTIP integrity
protocol.
Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems
191
Figure 2. DRT-FTIP Integrity Protocol: Normal State Behavior
b) Anomaly state behavior: This behavior describes unusual work of
DRT-FTIP protocol. The server check the Execute_Table every Tp (time period).
If an error will be occurred in client side the client system will send exception to
the client application. Actually, exceptions were used for handling unusual errors
in programs that will be occurred during the program execution. The exception
handling mechanism was used to provide a means to detect and report exceptional
circumstances so that, an appropriate action will be taken. The mechanism
suggests incorporation of separate error handling code that performs the following
tasks:
a. Find the problem
b. Inform that an error has been occurred
c. Receive the error information
For any exceptions occurred, the client exception handling will send
error_message to the server explaining the error type. If the error was caused by a
thread, the server will try to send the thread and Thread Execute_wait message
again for three times until Execute_finish message will be arrived. If the error was
Dhuha B. Abdullah & Amira B. Sallow
192
caused by the client machine, the server may eliminate that thread from the system
or send it to another client and begins the same operations again. Figure(3) shows
the anomaly behavior for DRT-FTIP integrity protocol.
Phase III:
If there are no threads in the ready queue in server side or the server wants to
finish the protocol in a client, the server will send Client_finish messag and will recive
Server_finish message from the client.
Figure 3. DRT-FTIP Integrity Protocol: Anomaly State Behavior
6. Conclusion
In this paper, we developed a fault tolerance integrity protocol for distributed
real-Time systems. The advantage of the algorithm is that the threads considered
in this system are dynamic and aperiodic. The proposed protocol was simple and easy
to implement. The proposed protocol increases the integrity of the scheduling
algorithm used with it.
Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems
193
REFERENCES
[1] Amira Bibo, Dhuha Basheer, 2012, “EOE-DRTSA: End-to-End Distributed
Real-time System Scheduling Algorithm”, Dept. of Computer Science College
of Computer Sciences and Mathematics University of Mosul, under publishing.
[2] Arvind Kumar, Rama Shankar Yadav, Ranvijay, Anjali Jain, 2011, “Fault
Tolerance in Real Time Distributed System”, Department of Computer Science
and Engineering Motilal Nehru National Institute of Technology, Allahabad.
[3] Christy Persya, T.R.Gopalakrishnan Nair, 2008, “Fault Tolerant Real Time
Systems”, Department of Information Science and Engineering, The Oxford
College of Engineering, Bangalore, India.
[4] Edward Curley, Binoy Ravindran, Jonathan Anderson, E. Douglas Jensen, 2007,
”Recovering from Distributable Thread Failures in Distributed Real-Time Java”,
Virginia Tech Blacksburg, USA.
[5] Edward Curley, Binoy Ravindran, Jonathan Anderson, E. Douglas Jensen, 2006,
“Integrity Protocols for Recovering from Distributable Real-Time Thread
Failures with Assured Timeliness in Dynamic Systems”, Virginia Tech
Blacksburg, USA.
[6] Risat Mahmudpathan, 2010, ”Scheduling Algorithms For Fault-Tolerant Real-
Time Systems”, Department of Computer Science and Engineering, Chalmers
University of Technology, Goteborg, Sweden.

More Related Content

What's hot

CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013Ian Sommerville
 
Ch10 dependable systems
Ch10 dependable systemsCh10 dependable systems
Ch10 dependable systems
software-engineering-book
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013Ian Sommerville
 
Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...
IJECEIAES
 
Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Ian Sommerville
 
CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013Ian Sommerville
 
CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013Ian Sommerville
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013Ian Sommerville
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013Ian Sommerville
 
CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013Ian Sommerville
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReportabhishekroushan
 
CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013Ian Sommerville
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013Ian Sommerville
 
CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013Ian Sommerville
 
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Marketing Donalba
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013Ian Sommerville
 

What's hot (17)

CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013CS 5032 L4 requirements engineering 2013
CS 5032 L4 requirements engineering 2013
 
Ch10 dependable systems
Ch10 dependable systemsCh10 dependable systems
Ch10 dependable systems
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013
 
Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...Proactive cloud service assurance framework for fault remediation in cloud en...
Proactive cloud service assurance framework for fault remediation in cloud en...
 
Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)Security Engineering 2 (CS 5032 2012)
Security Engineering 2 (CS 5032 2012)
 
CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013
 
CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013
 
CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013CS5032 L11 validation and reliability testing 2013
CS5032 L11 validation and reliability testing 2013
 
DSDConference07
DSDConference07DSDConference07
DSDConference07
 
CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013CS5032 L10 security engineering 2 2013
CS5032 L10 security engineering 2 2013
 
CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport
 
CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013
 
CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013CS 5032 L1 critical socio-technical systems 2013
CS 5032 L1 critical socio-technical systems 2013
 
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
Procesamiento multinúcleo óptimo para aplicaciones críticas de seguridad
 
CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013CS5032 L9 security engineering 1 2013
CS5032 L9 security engineering 1 2013
 

Similar to Developing fault tolerance integrity protocol for distributed real time systems

Embedded system software
Embedded system softwareEmbedded system software
Embedded system software
Jamia Hamdard
 
Real Time Systems & RTOS
Real Time Systems & RTOSReal Time Systems & RTOS
Real Time Systems & RTOS
Vishwa Mohan
 
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsA Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
Rick Vogel
 
Distributed system
Distributed systemDistributed system
Distributed system
chirag patil
 
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ijgca
 
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...Neelamani Samal
 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud survey
www.pixelsolutionbd.com
 
FAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURESFAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURES
ijcsit
 
Failure Free Cloud Computing Architectures
Failure Free Cloud Computing ArchitecturesFailure Free Cloud Computing Architectures
Failure Free Cloud Computing Architectures
AIRCC Publishing Corporation
 
Operating system
Operating systemOperating system
Operating system
Neha Saxena
 
Processing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerceProcessing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerce
Chittagong University
 
A Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItA Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To It
Michele Thomas
 
publishable paper
publishable paperpublishable paper
publishable paper
chaitanya451336
 
4213ijsea06
4213ijsea064213ijsea06
4213ijsea06
ijseajournal
 
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
IJSEA
 
Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
software-engineering-book
 
Understanding Basics of OS
Understanding Basics of OSUnderstanding Basics of OS
Understanding Basics of OS
E.M.G.yadava womens college
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
Shweta Shah
 
Ch11 - Reliability Engineering
Ch11 - Reliability EngineeringCh11 - Reliability Engineering
Ch11 - Reliability Engineering
Harsh Verdhan Raj
 
dist_systems.pdf
dist_systems.pdfdist_systems.pdf
dist_systems.pdf
CherenetToma
 

Similar to Developing fault tolerance integrity protocol for distributed real time systems (20)

Embedded system software
Embedded system softwareEmbedded system software
Embedded system software
 
Real Time Systems & RTOS
Real Time Systems & RTOSReal Time Systems & RTOS
Real Time Systems & RTOS
 
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating SystemsA Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
A Study Of Real-Time Embedded Software Systems And Real-Time Operating Systems
 
Distributed system
Distributed systemDistributed system
Distributed system
 
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
 
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
A fault tolerant tokenbased atomic broadcast algorithm relying on responsive ...
 
Adaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud surveyAdaptive fault tolerance in cloud survey
Adaptive fault tolerance in cloud survey
 
FAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURESFAILURE FREE CLOUD COMPUTING ARCHITECTURES
FAILURE FREE CLOUD COMPUTING ARCHITECTURES
 
Failure Free Cloud Computing Architectures
Failure Free Cloud Computing ArchitecturesFailure Free Cloud Computing Architectures
Failure Free Cloud Computing Architectures
 
Operating system
Operating systemOperating system
Operating system
 
Processing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerceProcessing tech malicioussoftware_ecommerce
Processing tech malicioussoftware_ecommerce
 
A Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItA Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To It
 
publishable paper
publishable paperpublishable paper
publishable paper
 
4213ijsea06
4213ijsea064213ijsea06
4213ijsea06
 
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
 
Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
 
Understanding Basics of OS
Understanding Basics of OSUnderstanding Basics of OS
Understanding Basics of OS
 
Introduction to Operating Systems
Introduction to Operating SystemsIntroduction to Operating Systems
Introduction to Operating Systems
 
Ch11 - Reliability Engineering
Ch11 - Reliability EngineeringCh11 - Reliability Engineering
Ch11 - Reliability Engineering
 
dist_systems.pdf
dist_systems.pdfdist_systems.pdf
dist_systems.pdf
 

More from Dr Amira Bibo

Steganography methods using network protocols
Steganography methods using network protocolsSteganography methods using network protocols
Steganography methods using network protocols
Dr Amira Bibo
 
An investigation for steganography using different color system
An investigation for steganography using different color systemAn investigation for steganography using different color system
An investigation for steganography using different color system
Dr Amira Bibo
 
Android security
Android securityAndroid security
Android security
Dr Amira Bibo
 
Supervised classification and improved filtering method for shoreline detection.
Supervised classification and improved filtering method for shoreline detection.Supervised classification and improved filtering method for shoreline detection.
Supervised classification and improved filtering method for shoreline detection.
Dr Amira Bibo
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
Dr Amira Bibo
 
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithm
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithmEOE-DRTSA: end-to-end distributed real-time system scheduling algorithm
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithm
Dr Amira Bibo
 
Constructing sierpinski gasket using gp us arrays
Constructing sierpinski gasket using gp us arraysConstructing sierpinski gasket using gp us arrays
Constructing sierpinski gasket using gp us arrays
Dr Amira Bibo
 
Android security
Android securityAndroid security
Android security
Dr Amira Bibo
 

More from Dr Amira Bibo (8)

Steganography methods using network protocols
Steganography methods using network protocolsSteganography methods using network protocols
Steganography methods using network protocols
 
An investigation for steganography using different color system
An investigation for steganography using different color systemAn investigation for steganography using different color system
An investigation for steganography using different color system
 
Android security
Android securityAndroid security
Android security
 
Supervised classification and improved filtering method for shoreline detection.
Supervised classification and improved filtering method for shoreline detection.Supervised classification and improved filtering method for shoreline detection.
Supervised classification and improved filtering method for shoreline detection.
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithm
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithmEOE-DRTSA: end-to-end distributed real-time system scheduling algorithm
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithm
 
Constructing sierpinski gasket using gp us arrays
Constructing sierpinski gasket using gp us arraysConstructing sierpinski gasket using gp us arrays
Constructing sierpinski gasket using gp us arrays
 
Android security
Android securityAndroid security
Android security
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 

Developing fault tolerance integrity protocol for distributed real time systems

  • 1. Raf. J. of Comp. & Math’s. , Vol. 10, No. 1, 2013 Fifth Scientific Conference Information Technology 2012 Dec. 19-20 187 Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems Dhuha B. Abdullah Amira B. Sallow College of Computer Sciences and Mathematics University of Mosul Received on: 21/10/2012 Accepted on: 30/01/2013 ‫ﺍ‬‫ﻟﻤﻠﺨﺹ‬ ‫ﺍﻟﺤﻘﻴﻘﻲ‬ ‫ﺍﻟﻭﻗﺕ‬ ‫ﺃﻨﻅﻤﺔ‬ ‫ﻓﻲ‬‫ﺍﻟﻤﻭﺯﻋﺔ‬‫ﻜﺎﻥ‬ ‫ﻭﺍﻥ‬ ‫ﺤﺘﻰ‬ ‫ﺍﻟﻤﺤﺩﺩ‬ ‫ﻭﻗﺘﻬﺎ‬ ‫ﻓﻲ‬ ‫ﺘﻨﺠﺯ‬ ‫ﺃﻥ‬ ‫ﺍﻟﻀﺭﻭﺭﻱ‬ ‫ﻤﻥ‬ ‫ﺍﻟﻤﻬﺎﻡ‬ ‫ﺒﻌﻀ‬ ‫ﻫﻨﺎﻟﻙ‬‫ﹰ‬‫ﺎ‬‫ﺍﻟﺒﺭﻤﺠﻴﺔ‬ ‫ﺃﻭ‬ ‫ﺍﻟﻤﺎﺩﻴﺔ‬ ‫ﺍﻷﺨﻁﺎﺀ‬ ‫ﻤﻥ‬.‫ﻗﺩﺭﺓ‬ ‫ﻴﻌﻨﻲ‬ ‫ﺍﻟﻤﻭﺯﻋﺔ‬ ‫ﺍﻟﺤﻘﻴﻘﻲ‬ ‫ﺍﻟﺯﻤﻥ‬ ‫ﺃﻨﻅﻤﺔ‬ ‫ﻓﻲ‬ ‫ﺒﺎﻟﺨﻁﺄ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﻭﺘﺠﺎﻭﺯﻫﺎ‬ ‫ﺍﻷﺨﻁﺎﺀ‬ ‫ﻭﺍﻜﺘﺸﺎﻑ‬ ‫ﻟﻠﻤﻬﺎﻡ‬ ‫ﺍﻟﻨﻬﺎﺌﻴﺔ‬ ‫ﺍﻟﺤﺩﻭﺩ‬ ‫ﺘﺤﻘﻴﻕ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﻨﻅﺎﻡ‬.‫ﺍﻻﻋﺘﺒﺎﺭ‬ ‫ﺒﻨﻅﺭ‬ ‫ﺍﻷﺨﺫ‬ ‫ﺘﻡ‬ ‫ﺍﻟﺒﺤﺙ‬ ‫ﻫﺫﺍ‬ ‫ﻓﻲ‬ ‫ﺒ‬ ‫ﺴﻤﻲ‬ ‫ﺒﺎﻟﺨﻁﺄ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺘﻁﻭﻴﺭ‬ ‫ﻭﺘﻡ‬ ‫ﺒﺎﻷﺨﻁﺎﺀ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﻤﺸﻜﻠﺔ‬‫ـ‬)‫ﻷﻨﻅﻤﺔ‬ ‫ﺍﻟﻤﺘﻜﺎﻤل‬ ‫ﺒﺎﻟﺨﻁﺄ‬ ‫ﺍﻟﺘﺤﻜﻡ‬ ‫ﺒﺭﻭﺘﻭﻜﻭل‬ ‫ﺍﻟﻤﻭﺯﻋﺔ‬ ‫ﺍﻟﺤﻘﻴﻘﻲ‬ ‫ﺍﻟﺯﻤﻥ‬.(‫ﻋﻤل‬‫ﺍﻟﻤﻭﺯﻋﺔ‬ ‫ﺍﻟﺤﻘﻴﻘﻲ‬ ‫ﺍﻟﺯﻤﻥ‬ ‫ﻷﻨﻅﻤﺔ‬ ‫ﺍﻟﺠﺩﻭﻟﺔ‬ ‫ﺘﻜﺎﻤل‬ ‫ﺯﻴﺎﺩﺓ‬ ‫ﻋﻠﻰ‬ ‫ﺍﻟﻤﻘﺘﺭﺡ‬ ‫ﺍﻟﺒﺭﻭﺘﻭﻜﻭل‬. ABSTRACT In the distributed real time systems, tasks must meet their deadline even in the presence of hardware/software faults. Fault tolerance in distributed real time systems refers to the ability of the system to meet the tasks deadline and to detect their failure and recover them. In this paper, we considered the problem of fault tolerance and developed a fault tolerance protocol called DRT-FTIP (Distributed Real Time – Fault Tolerance Integrity Protocol).This protocol increases the integrity of the scheduling in distributed real time systems. 1. Introduction Real-time systems can be classified as hard real time systems in which the consequences of missing a deadline can be catastrophic and soft real time systems in which the consequences are relatively tolerable. In hard real time systems, it is important that tasks complete within their deadline even in the presence of a failure. Examples of hard real-time systems are control systems in space stations, auto pilot systems and monitoring systems for patients with critical conditions. In soft real-time systems, it is more important to economically detect a fault as soon as possible rather than to mask a fault. Examples of soft real-time systems are all kinds of airline reservation, banking, and E-commerce applications[3]. A faulty system, due to any reason during processing some task, can cause some damages. A task running on real time distributed system should be feasible, reliable and scalable. The real time distributed system such as nuclear systems, robotics, air traffic control systems, grid … etc. are highly dependable on deadline. A fault in real time distributed system can result a system into failure if not properly detected and recovered at time. These systems must function with high availability even under hardware and software faults. Fault-tolerance is the important technique used to maintain dependability in these systems. Hardware and software redundancy are well-known effective methods. Hardware fault-tolerance achieved through applying extra hardware like processors, communication links, resource (memory, I/O device) whereas in
  • 2. Dhuha B. Abdullah & Amira B. Sallow 188 software fault tolerance tasks, messages are added into the system to deal with faults. Fault should be detected by applying reliable fault detector followed by some recovery technique. Many fault detection techniques are available but it is necessary to apply appropriate fault detector. Unreliable fault detector can make mistake by erroneously suspecting correct process or trusting crashed process[4]. 1.1 Contributions In this paper, we consider the problem of Fault tolerance in distributed real-time systems. We design a Distributed Real Time – Fault Tolerance Integrity Protocol (DRT- FTIP) that has the following prosperities: 1. Designed to function in dynamic network. 2. Coupled with EOE-DRTSA (End to End-Distributed Real Time Scheduling Algorithm. 3. Control integrity and fault tolerant with proposed Distributed real-time system. 1.2 Related Work Past works on developing fault tolerance integrity protocol by Edward Curley, Binoy Ravindran, Jonathan Anderson, and E. Douglas Jensen who considered the problem of recovering from failures of distributable threads in distributed real-time systems that operate under run-time uncertainties including those on thread execution times, thread arrivals, and node failure occurrences. They presented thread integrity protocol called TPR[4]. Binoy Ravindran, Edward Curley, Jonathan Anderson, and E. Douglas Jensen who considered the problem of recovering from failures of distributable threads in distributed real-time systems. They presented a scheduling algorithm called HUA and two thread integrity protocols called D-TPR and W-TPR [5]. 2. Failure, Error, and Faults Avizienis and others define the terms failure, error and faults as fellows [6]: Failure: A failure system occurs when the service provided by the system deviates from the specified service. For example, when a user cannot read his/her stored file from computer memory, then the expected service is not provided by the system. Error: An error is a perturbation of internal state of the system that may lead to failure. A failure occurs when the erroneous state causes an incorrect service to be delivered, for example, when certain portion of the computer memory is corrupted or broken and stored files, therefore cannot be read by the user. Fault: The cause of the error is called a fault. An active fault leads to an error; otherwise the fault is dormant. For example, impurities in the semiconductor devices may cause computer memory in the long run to behave unpredictably. 3. Techniques for Fault Tolerance Fault tolerance is the ability to continue operating despite the failure of a limited subset of their hardware or software. So, the goal of the system designer is to ensure that the probability of system failure is acceptably small. There can be either hardware fault or software fault, which disturbs the real time systems to meet their deadlines. There are three types of faults: Permanent, intermittent, and transient. A permanent fault does not die away with time, but remains until it is repaired as the affected unit is replaced. This is an intermittent fault cycle between the fault–
  • 3. Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems 189 active and fault benign states. A transient fault dies away after some time[4].There are different types of fault which can occur in Real-Time Distributed System. These faults can be classified depending on several factors such as: Network fault: A Fault occurrence in a network is due to network partition, Packet Loss, Packet corruption, destination failure, link failure, etc. Physical faults: This Fault can occur in hardware like fault in CPUs, Fault in memory, Fault in storage, etc. Media faults: Fault occurrence is due to media head crashes. Processor faults: fault occurs in processor due to operating system crashes. Process faults: The occurrence of fault is due to shortage of resource, software bugs. Service expiry fault: The service time of a resource may expire, while application is using it. A fault can be categorized on the basis of computing resources and time. A failure occurs during computation on system resources can be classified as: omission failure, timing failure, response failure, and crash failure. Faults occur with respect to time are shown in Figure 1 below: Figure 1. Types of Fault in a System Permanent: These failures occur by accidentally cutting a wire, power breakdowns and so on. It is easy to reproduce these failures. These failures can cause major disruptions and some part of the system may not be functioning as desired. Intermittent: These are the failures which appear occasionally. Mostly these failures are ignored while testing the system and only appear when the system goes into operation. Therefore, it is hard to predict the extent of damage these failures can bring to the system. Transient: These failures are caused by some inherent fault in the system. However, these failures are corrected by retrying roll back the system to previous state such as restarting software or resending a message. These failures are very common in computer systems [4]. 4. The System Model We consider a distributed system architecture model [1] consisting of heterogeneous processors; a set of client nodes; and a set of server nodes. These nodes were interconnected via a communication network. A single Global Scheduler for the
  • 4. Dhuha B. Abdullah & Amira B. Sallow 190 system was responsible for computing the initial priorities for the tasks; scheduler utility was checked based on information provided by the application programmer. As new tasks were introduced to the system, the Global Scheduler distributes them to client processors. A Local Scheduler in each processor was responsible for specifying the order of threads executions on a node. Thus, scheduling decisions made by a node scheduler are independent of that made by other node schedulers. Client Node schedulers make scheduling decisions using thread scheduling attributes, which typically include threads' time constraints (e.g., importance, urgency). When a new job arrives at client node and its utility is larger than the utility of the currently executing job, the currently job will be preempted and the new job will be scheduled for execution. EOE-DRTSA algorithm [1] was designed to overcome the shortcomings of independent scheduling algorithms by taking into account global information, while constructing schedule. In EOE-DRTSA scheduling, firstly the thread will be arrived to the Global Scheduler server. The Global Scheduler will compute the initial Urgency and DTUF value. We consider the DTUF (Developed TUF) function to be three dimensional function that decouples importance and urgency of a thread, urgency is measured on the X-axis, and importance is measured on the Y-axis. The Benefit is denoted by DTUF and is measured on the Z-axis. After the DTUF values were computed for the threads, the Global Scheduler will pass the threads to the target node to be executed there and the DRT-FTIP protocol will be worked concurrently with the EOE-DRTSA scheduling algorithm. When the thread arrived to the Local Scheduler node, the node will schedule the thread depending on its local scheduling algorithm. DRT-FTIP integrity protocol will monitor the scheduling work on the local scheduler. 5. Protocol Algorithm Description We design an DRT-FTIP(Distributed Real Time – Fault Tolerance Integrity Protocol) with EOE-DRTSA scheduling algorithm for distributed real time system. This protocol will control the faults that occurred in this proposed system. In server side, when a thread sent to the client the server will expect to receive (thread execute message) from the client. This message means that the thread is executed successfully and there is no error. The DRT-FTIP protocol has three operation phases: Phase I: Establish the protocol for the first time, the server will send Client_Hello message and wait until the client responds with the message Server_Hello. After that, the second phase will begin. Phase II: In this phase, there are two states of behavior: a) Normal state behavior: This behavior will describe the successful work for the DRT-FTIP protocol without any error. In server side, for each thread that has been sent to the client, the server will send thread Execute_wait message and commit wait state in the state field in the Execute_Table that belongs to the sender thread. When the Execute_finish message arrived from the client the server changes the state field in the Execute_Table to finished to point that the thread was executed successfully. Figure(2) shows the normal behavior of DRT-FTIP integrity protocol.
  • 5. Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems 191 Figure 2. DRT-FTIP Integrity Protocol: Normal State Behavior b) Anomaly state behavior: This behavior describes unusual work of DRT-FTIP protocol. The server check the Execute_Table every Tp (time period). If an error will be occurred in client side the client system will send exception to the client application. Actually, exceptions were used for handling unusual errors in programs that will be occurred during the program execution. The exception handling mechanism was used to provide a means to detect and report exceptional circumstances so that, an appropriate action will be taken. The mechanism suggests incorporation of separate error handling code that performs the following tasks: a. Find the problem b. Inform that an error has been occurred c. Receive the error information For any exceptions occurred, the client exception handling will send error_message to the server explaining the error type. If the error was caused by a thread, the server will try to send the thread and Thread Execute_wait message again for three times until Execute_finish message will be arrived. If the error was
  • 6. Dhuha B. Abdullah & Amira B. Sallow 192 caused by the client machine, the server may eliminate that thread from the system or send it to another client and begins the same operations again. Figure(3) shows the anomaly behavior for DRT-FTIP integrity protocol. Phase III: If there are no threads in the ready queue in server side or the server wants to finish the protocol in a client, the server will send Client_finish messag and will recive Server_finish message from the client. Figure 3. DRT-FTIP Integrity Protocol: Anomaly State Behavior 6. Conclusion In this paper, we developed a fault tolerance integrity protocol for distributed real-Time systems. The advantage of the algorithm is that the threads considered in this system are dynamic and aperiodic. The proposed protocol was simple and easy to implement. The proposed protocol increases the integrity of the scheduling algorithm used with it.
  • 7. Developing Fault Tolerance Integrity Protocol for Distributed Real Time Systems 193 REFERENCES [1] Amira Bibo, Dhuha Basheer, 2012, “EOE-DRTSA: End-to-End Distributed Real-time System Scheduling Algorithm”, Dept. of Computer Science College of Computer Sciences and Mathematics University of Mosul, under publishing. [2] Arvind Kumar, Rama Shankar Yadav, Ranvijay, Anjali Jain, 2011, “Fault Tolerance in Real Time Distributed System”, Department of Computer Science and Engineering Motilal Nehru National Institute of Technology, Allahabad. [3] Christy Persya, T.R.Gopalakrishnan Nair, 2008, “Fault Tolerant Real Time Systems”, Department of Information Science and Engineering, The Oxford College of Engineering, Bangalore, India. [4] Edward Curley, Binoy Ravindran, Jonathan Anderson, E. Douglas Jensen, 2007, ”Recovering from Distributable Thread Failures in Distributed Real-Time Java”, Virginia Tech Blacksburg, USA. [5] Edward Curley, Binoy Ravindran, Jonathan Anderson, E. Douglas Jensen, 2006, “Integrity Protocols for Recovering from Distributable Real-Time Thread Failures with Assured Timeliness in Dynamic Systems”, Virginia Tech Blacksburg, USA. [6] Risat Mahmudpathan, 2010, ”Scheduling Algorithms For Fault-Tolerant Real- Time Systems”, Department of Computer Science and Engineering, Chalmers University of Technology, Goteborg, Sweden.