SlideShare a Scribd company logo
1 of 73
Download to read offline
JOURNAL OF CLOUD COMPUTING: ADVANCES,
SYSTEMS AND APPLICATIONS
FAULT TOLERANT
SOFTWARE SYSTEMS
USING SOFTWARE
CONFIGURATIONS FOR
CLOUD COMPUTING
1
EVERY SOFTWARE NEEDS TO BE CUSTOMIZED
2
EVERY SOFTWARE NEEDS TO BE CUSTOMIZED
▸ Customization of a software system varies with user
requirements or target platform
3
EVERY SOFTWARE NEEDS TO BE CUSTOMIZED
▸ Customization of a software system varies with user
requirements or target platform
▸ Programmers employ preprocessor directives, command-
line arguments, setup files, configuration files to customize
a software system.
4
EVERY SOFTWARE NEEDS TO BE CUSTOMIZED
▸ Customization of a software system varies with user
requirements or target platform
▸ Programmers employ preprocessor directives, command-
line arguments, setup files, configuration files to customize
a software system.
▸ Any customizable option that can be selected during the
compile or load time is called a feature of a program.
5
What's a Software Configuration?
6
A SOFTWARE CONFIGURATION
CONSISTS OF NON-FUNCTIONAL
PROPERTIES CUSTOMIZED TO A
SPECIFIC SET OF FEATURES.
What's a Software Configuration?
7
A SOFTWARE SYSTEM THAT
CONSISTS OF HUNDREDS OR
THOUSANDS OF CONFIGURATIONS
IS PRONE TO FAILURE.
8
A SOFTWARE SYSTEM THAT
CONSISTS OF HUNDREDS OR
THOUSANDS OF CONFIGURATIONS
IS PRONE TO FAILURE.
9
CONFIGURATION CLASSIFICATION
10
CONFIGURATION CLASSIFICATION
▸ Configurations that perform important, common or default
operations are called critical configurations. During the
execution of software system many non-critical
configurations interact with critical configurations. Critical
configurations are specialized versions of non-critical
configurations
11
CONFIGURATION CLASSIFICATION
▸ Configurations that perform important, common or default
operations are called critical configurations. During the
execution of software system many non-critical
configurations interact with critical configurations. Critical
configurations are specialized versions of non-critical
configurations
12
CONFIGURATION CLASSIFICATION
▸ Configurations that perform important, common or default
operations are called critical configurations. During the
execution of software system many non-critical
configurations interact with critical configurations. Critical
configurations are specialized versions of non-critical
configurations
13
CONFIGURATION CLASSIFICATION
▸ Configurations that perform important, common or default
operations are called critical configurations. During the
execution of software system many non-critical
configurations interact with critical configurations. Critical
configurations are specialized versions of non-critical
configurations
14
CONFIGURATION CLASSIFICATION
▸ Configurations that perform important, common or default
operations are called critical configurations. During the
execution of software system many non-critical
configurations interact with critical configurations. Critical
configurations are specialized versions of non-critical
configurations
15
Frequently used or Critical configurations
CONFIGURATION CLASSIFICATION
▸ Configurations that perform important, common or default
operations are called critical configurations. During the
execution of software system many non-critical
configurations interact with critical configurations. Critical
configurations are specialized versions of non-critical
configurations
16
Frequently used or Critical configurations
vs
CONFIGURATION CLASSIFICATION
▸ Configurations that perform important, common or default
operations are called critical configurations. During the
execution of software system many non-critical
configurations interact with critical configurations. Critical
configurations are specialized versions of non-critical
configurations
17
Frequently used or Critical configurations
vs
Less frequently used or non-critical configurations
A CONFIGURATION IS SAID TO
BE FAILED CONFIGURATION IF
IT EITHER PRODUCE ERRORS
DURING ITS EXECUTION OR
FAIL TO SUCCESSFULLY
COMPLETE ITS TASK.
18
A CONFIGURATION IS SAID TO
BE FAILED CONFIGURATION IF
IT EITHER PRODUCE ERRORS
DURING ITS EXECUTION OR
FAIL TO SUCCESSFULLY
COMPLETE ITS TASK.
19
Configurations Interaction
20
PASSING
PARAMETER,
RETURN VALUES
OR ETC AMONG
CONFIGURATIONS
Configurations Interaction
21
PASSING
PARAMETER,
RETURN VALUES
OR ETC AMONG
CONFIGURATIONS
Configurations Interaction
22
PROPOSED ARCHITECTURE
23
PROPOSED ARCHITECTURE
24
A SOFTWARE SYSTEM CAN BE MODELED AS A WEIGHTED DIRECTED GRAPH
PROPOSED ARCHITECTURE
25
HOW TO CLASSIFY?
CLASSIFICATION OF CONFIGURATIONS
26
CLASSIFICATION OF CONFIGURATIONS
27
CLASSIFICATION OF CONFIGURATIONS
28
Where Fjk represent the number of times
configuration Cj invoked Ck and N is the number
of configurations present in a software system.
CLASSIFICATION OF CONFIGURATIONS
29
Where Fjk represent the number of times
configuration Cj invoked Ck and N is the number
of configurations present in a software system.
1) Frequency of interactions between configurations(IFrFT)
2) Characteristics such as structure (critical or non-critical) and frequency of interactions (ChIFrFT )
FREQUENCY OF INTERACTIONS BETWEEN CONFIGURATIONS
30
FREQUENCY OF INTERACTIONS BETWEEN CONFIGURATIONS
31
In this approach all configurations are treated
as equal by setting their individual interaction
value to zero at the beginning of execution of
a software system.
FREQUENCY OF INTERACTIONS BETWEEN CONFIGURATIONS
32
Configurations that are involved in most
of the interactions during execution of
software system are considered as critical
configurations.
In this approach all configurations are treated
as equal by setting their individual interaction
value to zero at the beginning of execution of
a software system.
FREQUENCY OF INTERACTIONS BETWEEN CONFIGURATIONS
33
Configurations that are involved in most
of the interactions during execution of
software system are considered as critical
configurations.
In this approach all configurations are treated
as equal by setting their individual interaction
value to zero at the beginning of execution of
a software system.
We propose a mathematical model to find
frequently used configurations of a software
system based on frequency of interactions.
FREQUENCY OF INTERACTIONS BETWEEN CONFIGURATIONS
34
Configurations that are involved in most
of the interactions during execution of
software system are considered as critical
configurations.
In this approach all configurations are treated
as equal by setting their individual interaction
value to zero at the beginning of execution of
a software system.
We propose a mathematical model to find
frequently used configurations of a software
system based on frequency of interactions.
CHIFRFT: FAULT TOLERANCE BASED ON CHARACTERISTICS AND INTERACTION FREQUENCIES OF CONFIGURATIONS
35
CHIFRFT: FAULT TOLERANCE BASED ON CHARACTERISTICS AND INTERACTION FREQUENCIES OF CONFIGURATIONS
36
In this approach software configurations are categorized into two sets
1) configurations which perform critical tasks (checking for uniqueness, size of index table, search
operation)
2) 2) of configurations which perform non-critical tasks (the padding of special symbol in fixed-length
records).
CHIFRFT: FAULT TOLERANCE BASED ON CHARACTERISTICS AND INTERACTION FREQUENCIES OF CONFIGURATIONS
37
In this approach software configurations are categorized into two sets
1) configurations which perform critical tasks (checking for uniqueness, size of index table, search
operation)
2) 2) of configurations which perform non-critical tasks (the padding of special symbol in fixed-length
records).
Initial interaction values of configurations that belong to the set critical configurations are assigned to
higher values compare to non-critical configurations.
CHIFRFT: FAULT TOLERANCE BASED ON CHARACTERISTICS AND INTERACTION FREQUENCIES OF CONFIGURATIONS
38
In this approach software configurations are categorized into two sets
1) configurations which perform critical tasks (checking for uniqueness, size of index table, search
operation)
2) 2) of configurations which perform non-critical tasks (the padding of special symbol in fixed-length
records).
Initial interaction values of configurations that belong to the set critical configurations are assigned to
higher values compare to non-critical configurations.
CHIFRFT: FAULT TOLERANCE BASED ON CHARACTERISTICS AND INTERACTION FREQUENCIES OF CONFIGURATIONS
39
In this approach software configurations are categorized into two sets
1) configurations which perform critical tasks (checking for uniqueness, size of index table, search
operation)
2) 2) of configurations which perform non-critical tasks (the padding of special symbol in fixed-length
records).
Initial interaction values of configurations that belong to the set critical configurations are assigned to
higher values compare to non-critical configurations.
PROPOSED ARCHITECTURE
40
👍
PROPOSED ARCHITECTURE
41
NOW, YOU HAVE NUMBERS!
PROPOSED ARCHITECTURE
42
WHICH ONE IS SUITABLE?
FAULT TOLERANCE
SCHEMES
43
FAULT TOLERANCE
SCHEMES
Proactive Scheme
44
FAULT TOLERANCE
SCHEMES
Proactive Scheme
45
Reactive Scheme
PROACTIVE SCHEME
46
Proactive schemes are costlier as they need lots of resources to support simultaneous execution of
primary job and its replicas
PROACTIVE SCHEME
47
Proactive schemes are costlier as they need lots of resources to support simultaneous execution of
primary job and its replicas
1- Preemptive migration
2- N-Version Programming
3- N-Copy Programming
4- Byzantine Fault Tolerance
PROACTIVE SCHEME
48
Proactive schemes are costlier as they need lots of resources to support simultaneous execution of
primary job and its replicas
1- Preemptive migration
2- N-Version Programming
3- N-Copy Programming
4- Byzantine Fault Tolerance
REACTIVE SCHEME
49
REACTIVE SCHEME
50
Reactive fault tolerance schemes act on the recovery process after the occurrence of failure.
REACTIVE SCHEME
51
1- Recovery Block Programming
2- Process Checkpointing
3- Process Migration
Reactive fault tolerance schemes act on the recovery process after the occurrence of failure.
PERFORMANCE EVALUATION
52
Using C++ language we have developed a software system for file structure techniques proposed by
Michael J. Folk in [54].
PERFORMANCE EVALUATION - CONT
53
54
PERFORMANCE EVALUATION - CONT
55
PERFORMANCE EVALUATION - CONT
56
PERFORMANCE EVALUATION - CONT
57
PERFORMANCE EVALUATION - CONT
58
PERFORMANCE EVALUATION - CONT
59
PERFORMANCE EVALUATION - CONT
60
PERFORMANCE EVALUATION - CONT
61
PERFORMANCE EVALUATION - CONT
62
PERFORMANCE EVALUATION - CONT
63
NOW, YOU CAN CHOOSE!
RECAP
64
RECAP
65
In this research article we have proposed fault tolerant techniques based on frequency of
interactions, characteristics of configurations. IFrFT technique based on frequency of interactions
makes use of interaction values of configurations to measure the reliability and performance of a
software system. ChIFrFT technique is based on frequency of interactions and characteristics
(critical operations such as payment transactions and control systems) makes use of structural
information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared
for various percentages of critical con- figurations, number of interaction requests. While AllFT
technique perform better than all the other techniques ChIFrFT approach has consistent
performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of
the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
RECAP
66
In this research article we have proposed fault tolerant techniques based on frequency of
interactions, characteristics of configurations. IFrFT technique based on frequency of interactions
makes use of interaction values of configurations to measure the reliability and performance of a
software system. ChIFrFT technique is based on frequency of interactions and characteristics
(critical operations such as payment transactions and control systems) makes use of structural
information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared
for various percentages of critical con- figurations, number of interaction requests. While AllFT
technique perform better than all the other techniques ChIFrFT approach has consistent
performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of
the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
RECAP
67
In this research article we have proposed fault tolerant techniques based on frequency of
interactions, characteristics of configurations. IFrFT technique based on frequency of interactions
makes use of interaction values of configurations to measure the reliability and performance of a
software system. ChIFrFT technique is based on frequency of interactions and characteristics
(critical operations such as payment transactions and control systems) makes use of structural
information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared
for various percentages of critical con- figurations, number of interaction requests. While AllFT
technique perform better than all the other techniques ChIFrFT approach has consistent
performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of
the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
RECAP
68
In this research article we have proposed fault tolerant techniques based on frequency of
interactions, characteristics of configurations. IFrFT technique based on frequency of interactions
makes use of interaction values of configurations to measure the reliability and performance of a
software system. ChIFrFT technique is based on frequency of interactions and characteristics
(critical operations such as payment transactions and control systems) makes use of structural
information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared
for various percentages of critical con- figurations, number of interaction requests. While AllFT
technique perform better than all the other techniques ChIFrFT approach has consistent
performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of
the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
RECAP
69
In this research article we have proposed fault tolerant techniques based on frequency of
interactions, characteristics of configurations. IFrFT technique based on frequency of interactions
makes use of interaction values of configurations to measure the reliability and performance of a
software system. ChIFrFT technique is based on frequency of interactions and characteristics
(critical operations such as payment transactions and control systems) makes use of structural
information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared
for various percentages of critical con- figurations, number of interaction requests. While AllFT
technique perform better than all the other techniques ChIFrFT approach has consistent
performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of
the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
RECAP
70
In this research article we have proposed fault tolerant techniques based on frequency of
interactions, characteristics of configurations. IFrFT technique based on frequency of interactions
makes use of interaction values of configurations to measure the reliability and performance of a
software system. ChIFrFT technique is based on frequency of interactions and characteristics
(critical operations such as payment transactions and control systems) makes use of structural
information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared
for various percentages of critical con- figurations, number of interaction requests. While AllFT
technique perform better than all the other techniques ChIFrFT approach has consistent
performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of
the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
RECAP
71
In this research article we have proposed fault tolerant techniques based on frequency of
interactions, characteristics of configurations. IFrFT technique based on frequency of interactions
makes use of interaction values of configurations to measure the reliability and performance of a
software system. ChIFrFT technique is based on frequency of interactions and characteristics
(critical operations such as payment transactions and control systems) makes use of structural
information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared
for various percentages of critical con- figurations, number of interaction requests. While AllFT
technique perform better than all the other techniques ChIFrFT approach has consistent
performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of
the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
RECAP
72
In this research article we have proposed fault tolerant techniques based on frequency of
interactions, characteristics of configurations. IFrFT technique based on frequency of interactions
makes use of interaction values of configurations to measure the reliability and performance of a
software system. ChIFrFT technique is based on frequency of interactions and characteristics
(critical operations such as payment transactions and control systems) makes use of structural
information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared
for various percentages of critical con- figurations, number of interaction requests. While AllFT
technique perform better than all the other techniques ChIFrFT approach has consistent
performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of
the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
73
THANKS

More Related Content

What's hot

UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREVLSICS Design
 
Systematic Model based Testing with Coverage Analysis
Systematic Model based Testing with Coverage AnalysisSystematic Model based Testing with Coverage Analysis
Systematic Model based Testing with Coverage AnalysisIDES Editor
 
Quantstamp Report - LINKSWAP
Quantstamp Report - LINKSWAPQuantstamp Report - LINKSWAP
Quantstamp Report - LINKSWAPRoy Blackstone
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & qualityNur Islam
 
Software Fault Tolerance
Software Fault ToleranceSoftware Fault Tolerance
Software Fault ToleranceAnkit Singh
 
Dependable Systems -Reliability Prediction (9/16)
Dependable Systems -Reliability Prediction (9/16)Dependable Systems -Reliability Prediction (9/16)
Dependable Systems -Reliability Prediction (9/16)Peter Tröger
 
Software product line testing in practice
Software product line testing in practiceSoftware product line testing in practice
Software product line testing in practiceJohan Hoberg
 
Testing Practices for Continuous Delivery - Ken McCormack
Testing Practices for Continuous Delivery - Ken McCormackTesting Practices for Continuous Delivery - Ken McCormack
Testing Practices for Continuous Delivery - Ken McCormackkennymccormack
 
Sa 007 availability
Sa 007 availabilitySa 007 availability
Sa 007 availabilityFrank Gielen
 

What's hot (11)

UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER COREUVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
UVM BASED REUSABLE VERIFICATION IP FOR WISHBONE COMPLIANT SPI MASTER CORE
 
Systematic Model based Testing with Coverage Analysis
Systematic Model based Testing with Coverage AnalysisSystematic Model based Testing with Coverage Analysis
Systematic Model based Testing with Coverage Analysis
 
Quantstamp Report - LINKSWAP
Quantstamp Report - LINKSWAPQuantstamp Report - LINKSWAP
Quantstamp Report - LINKSWAP
 
Software reliability & quality
Software reliability & qualitySoftware reliability & quality
Software reliability & quality
 
Software Fault Tolerance
Software Fault ToleranceSoftware Fault Tolerance
Software Fault Tolerance
 
Dependable Systems -Reliability Prediction (9/16)
Dependable Systems -Reliability Prediction (9/16)Dependable Systems -Reliability Prediction (9/16)
Dependable Systems -Reliability Prediction (9/16)
 
Software product line testing in practice
Software product line testing in practiceSoftware product line testing in practice
Software product line testing in practice
 
Testing Practices for Continuous Delivery - Ken McCormack
Testing Practices for Continuous Delivery - Ken McCormackTesting Practices for Continuous Delivery - Ken McCormack
Testing Practices for Continuous Delivery - Ken McCormack
 
Sa 007 availability
Sa 007 availabilitySa 007 availability
Sa 007 availability
 
Environmental stress screening
Environmental stress screeningEnvironmental stress screening
Environmental stress screening
 
Software Testability
Software TestabilitySoftware Testability
Software Testability
 

Similar to Fault Tolerant Software Systems Using Software Configurations For Cloud Computing

integrity and cuncurrency in DBMS
integrity and cuncurrency in DBMSintegrity and cuncurrency in DBMS
integrity and cuncurrency in DBMSXubair Khanday
 
Real time and distributed design
Real time and distributed designReal time and distributed design
Real time and distributed designpriyapavi96
 
Ch21-Software Engineering 9
Ch21-Software Engineering 9Ch21-Software Engineering 9
Ch21-Software Engineering 9Ian Sommerville
 
CS 123 Lecture 02 2023-2024.pdf take it s
CS 123 Lecture 02 2023-2024.pdf take it sCS 123 Lecture 02 2023-2024.pdf take it s
CS 123 Lecture 02 2023-2024.pdf take it sflyinimohamed
 
Infrastructure as Code with Ansible
Infrastructure as Code with AnsibleInfrastructure as Code with Ansible
Infrastructure as Code with AnsibleDaniel Bezerra
 
Short definitions of all testing types
Short definitions of all testing typesShort definitions of all testing types
Short definitions of all testing typesGaruda Trainings
 
Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models Satya P. Joshi
 
Recommending refactoring operations in large software systems
Recommending refactoring operations in large software systemsRecommending refactoring operations in large software systems
Recommending refactoring operations in large software systemsCarlos Eduardo
 
Manual Testing Questions
Manual Testing QuestionsManual Testing Questions
Manual Testing QuestionsUser1test
 
Quality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsQuality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsGatte Ravindranath
 
Analysis and Control of Computing Systems
Analysis and Control of Computing SystemsAnalysis and Control of Computing Systems
Analysis and Control of Computing Systemsnorhavillegas
 
requirement engineering
requirement engineeringrequirement engineering
requirement engineeringanam singla
 
Caps Professional Services Diagnostic
Caps Professional Services DiagnosticCaps Professional Services Diagnostic
Caps Professional Services Diagnosticlebenworld
 

Similar to Fault Tolerant Software Systems Using Software Configurations For Cloud Computing (20)

integrity and cuncurrency in DBMS
integrity and cuncurrency in DBMSintegrity and cuncurrency in DBMS
integrity and cuncurrency in DBMS
 
Real time and distributed design
Real time and distributed designReal time and distributed design
Real time and distributed design
 
Ch21-Software Engineering 9
Ch21-Software Engineering 9Ch21-Software Engineering 9
Ch21-Software Engineering 9
 
Ch21
Ch21Ch21
Ch21
 
CS 123 Lecture 02 2023-2024.pdf take it s
CS 123 Lecture 02 2023-2024.pdf take it sCS 123 Lecture 02 2023-2024.pdf take it s
CS 123 Lecture 02 2023-2024.pdf take it s
 
3 management
3 management3 management
3 management
 
Ch21.pptx
Ch21.pptxCh21.pptx
Ch21.pptx
 
Ss debuggers
Ss debuggersSs debuggers
Ss debuggers
 
Infrastructure as Code with Ansible
Infrastructure as Code with AnsibleInfrastructure as Code with Ansible
Infrastructure as Code with Ansible
 
Short definitions of all testing types
Short definitions of all testing typesShort definitions of all testing types
Short definitions of all testing types
 
Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models
 
Recommending refactoring operations in large software systems
Recommending refactoring operations in large software systemsRecommending refactoring operations in large software systems
Recommending refactoring operations in large software systems
 
Lesson 2 scanning
Lesson 2 scanningLesson 2 scanning
Lesson 2 scanning
 
Manual Testing Questions
Manual Testing QuestionsManual Testing Questions
Manual Testing Questions
 
poster_3.0
poster_3.0poster_3.0
poster_3.0
 
Quality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design PatternsQuality Attributes In Software Architecture & Design Patterns
Quality Attributes In Software Architecture & Design Patterns
 
Analysis and Control of Computing Systems
Analysis and Control of Computing SystemsAnalysis and Control of Computing Systems
Analysis and Control of Computing Systems
 
requirement engineering
requirement engineeringrequirement engineering
requirement engineering
 
Caps Professional Services Diagnostic
Caps Professional Services DiagnosticCaps Professional Services Diagnostic
Caps Professional Services Diagnostic
 
Black & White Box testing
Black & White Box testingBlack & White Box testing
Black & White Box testing
 

More from Nima Ghaedsharafi

More from Nima Ghaedsharafi (12)

Contention Aware Lock Scheduling For Transactional Databases
Contention Aware Lock Scheduling For Transactional DatabasesContention Aware Lock Scheduling For Transactional Databases
Contention Aware Lock Scheduling For Transactional Databases
 
Basics of ATmega32
Basics of ATmega32Basics of ATmega32
Basics of ATmega32
 
Netwrok - Tanen Chapter4-2
Netwrok - Tanen Chapter4-2Netwrok - Tanen Chapter4-2
Netwrok - Tanen Chapter4-2
 
Chapter4 1
Chapter4 1Chapter4 1
Chapter4 1
 
Cs9541 4 Evolution of Games
Cs9541 4  Evolution of GamesCs9541 4  Evolution of Games
Cs9541 4 Evolution of Games
 
Cs9541 3 Game Development
Cs9541 3  Game DevelopmentCs9541 3  Game Development
Cs9541 3 Game Development
 
Cs9541 6 Gameplay Design
Cs9541 6  Gameplay DesignCs9541 6  Gameplay Design
Cs9541 6 Gameplay Design
 
Cs9541 2 About Games
Cs9541 2  About GamesCs9541 2  About Games
Cs9541 2 About Games
 
Cs9541 5 Game Generes
Cs9541 5  Game GeneresCs9541 5  Game Generes
Cs9541 5 Game Generes
 
ساز های سنتی موسیقی ایرانی
ساز های سنتی موسیقی ایرانیساز های سنتی موسیقی ایرانی
ساز های سنتی موسیقی ایرانی
 
ARM microprocessor(s)
ARM microprocessor(s)ARM microprocessor(s)
ARM microprocessor(s)
 
Game development - part1
Game development - part1Game development - part1
Game development - part1
 

Recently uploaded

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 

Fault Tolerant Software Systems Using Software Configurations For Cloud Computing

  • 1. JOURNAL OF CLOUD COMPUTING: ADVANCES, SYSTEMS AND APPLICATIONS FAULT TOLERANT SOFTWARE SYSTEMS USING SOFTWARE CONFIGURATIONS FOR CLOUD COMPUTING 1
  • 2. EVERY SOFTWARE NEEDS TO BE CUSTOMIZED 2
  • 3. EVERY SOFTWARE NEEDS TO BE CUSTOMIZED ▸ Customization of a software system varies with user requirements or target platform 3
  • 4. EVERY SOFTWARE NEEDS TO BE CUSTOMIZED ▸ Customization of a software system varies with user requirements or target platform ▸ Programmers employ preprocessor directives, command- line arguments, setup files, configuration files to customize a software system. 4
  • 5. EVERY SOFTWARE NEEDS TO BE CUSTOMIZED ▸ Customization of a software system varies with user requirements or target platform ▸ Programmers employ preprocessor directives, command- line arguments, setup files, configuration files to customize a software system. ▸ Any customizable option that can be selected during the compile or load time is called a feature of a program. 5
  • 6. What's a Software Configuration? 6
  • 7. A SOFTWARE CONFIGURATION CONSISTS OF NON-FUNCTIONAL PROPERTIES CUSTOMIZED TO A SPECIFIC SET OF FEATURES. What's a Software Configuration? 7
  • 8. A SOFTWARE SYSTEM THAT CONSISTS OF HUNDREDS OR THOUSANDS OF CONFIGURATIONS IS PRONE TO FAILURE. 8
  • 9. A SOFTWARE SYSTEM THAT CONSISTS OF HUNDREDS OR THOUSANDS OF CONFIGURATIONS IS PRONE TO FAILURE. 9
  • 11. CONFIGURATION CLASSIFICATION ▸ Configurations that perform important, common or default operations are called critical configurations. During the execution of software system many non-critical configurations interact with critical configurations. Critical configurations are specialized versions of non-critical configurations 11
  • 12. CONFIGURATION CLASSIFICATION ▸ Configurations that perform important, common or default operations are called critical configurations. During the execution of software system many non-critical configurations interact with critical configurations. Critical configurations are specialized versions of non-critical configurations 12
  • 13. CONFIGURATION CLASSIFICATION ▸ Configurations that perform important, common or default operations are called critical configurations. During the execution of software system many non-critical configurations interact with critical configurations. Critical configurations are specialized versions of non-critical configurations 13
  • 14. CONFIGURATION CLASSIFICATION ▸ Configurations that perform important, common or default operations are called critical configurations. During the execution of software system many non-critical configurations interact with critical configurations. Critical configurations are specialized versions of non-critical configurations 14
  • 15. CONFIGURATION CLASSIFICATION ▸ Configurations that perform important, common or default operations are called critical configurations. During the execution of software system many non-critical configurations interact with critical configurations. Critical configurations are specialized versions of non-critical configurations 15 Frequently used or Critical configurations
  • 16. CONFIGURATION CLASSIFICATION ▸ Configurations that perform important, common or default operations are called critical configurations. During the execution of software system many non-critical configurations interact with critical configurations. Critical configurations are specialized versions of non-critical configurations 16 Frequently used or Critical configurations vs
  • 17. CONFIGURATION CLASSIFICATION ▸ Configurations that perform important, common or default operations are called critical configurations. During the execution of software system many non-critical configurations interact with critical configurations. Critical configurations are specialized versions of non-critical configurations 17 Frequently used or Critical configurations vs Less frequently used or non-critical configurations
  • 18. A CONFIGURATION IS SAID TO BE FAILED CONFIGURATION IF IT EITHER PRODUCE ERRORS DURING ITS EXECUTION OR FAIL TO SUCCESSFULLY COMPLETE ITS TASK. 18
  • 19. A CONFIGURATION IS SAID TO BE FAILED CONFIGURATION IF IT EITHER PRODUCE ERRORS DURING ITS EXECUTION OR FAIL TO SUCCESSFULLY COMPLETE ITS TASK. 19
  • 21. PASSING PARAMETER, RETURN VALUES OR ETC AMONG CONFIGURATIONS Configurations Interaction 21
  • 22. PASSING PARAMETER, RETURN VALUES OR ETC AMONG CONFIGURATIONS Configurations Interaction 22
  • 24. PROPOSED ARCHITECTURE 24 A SOFTWARE SYSTEM CAN BE MODELED AS A WEIGHTED DIRECTED GRAPH
  • 28. CLASSIFICATION OF CONFIGURATIONS 28 Where Fjk represent the number of times configuration Cj invoked Ck and N is the number of configurations present in a software system.
  • 29. CLASSIFICATION OF CONFIGURATIONS 29 Where Fjk represent the number of times configuration Cj invoked Ck and N is the number of configurations present in a software system. 1) Frequency of interactions between configurations(IFrFT) 2) Characteristics such as structure (critical or non-critical) and frequency of interactions (ChIFrFT )
  • 30. FREQUENCY OF INTERACTIONS BETWEEN CONFIGURATIONS 30
  • 31. FREQUENCY OF INTERACTIONS BETWEEN CONFIGURATIONS 31 In this approach all configurations are treated as equal by setting their individual interaction value to zero at the beginning of execution of a software system.
  • 32. FREQUENCY OF INTERACTIONS BETWEEN CONFIGURATIONS 32 Configurations that are involved in most of the interactions during execution of software system are considered as critical configurations. In this approach all configurations are treated as equal by setting their individual interaction value to zero at the beginning of execution of a software system.
  • 33. FREQUENCY OF INTERACTIONS BETWEEN CONFIGURATIONS 33 Configurations that are involved in most of the interactions during execution of software system are considered as critical configurations. In this approach all configurations are treated as equal by setting their individual interaction value to zero at the beginning of execution of a software system. We propose a mathematical model to find frequently used configurations of a software system based on frequency of interactions.
  • 34. FREQUENCY OF INTERACTIONS BETWEEN CONFIGURATIONS 34 Configurations that are involved in most of the interactions during execution of software system are considered as critical configurations. In this approach all configurations are treated as equal by setting their individual interaction value to zero at the beginning of execution of a software system. We propose a mathematical model to find frequently used configurations of a software system based on frequency of interactions.
  • 35. CHIFRFT: FAULT TOLERANCE BASED ON CHARACTERISTICS AND INTERACTION FREQUENCIES OF CONFIGURATIONS 35
  • 36. CHIFRFT: FAULT TOLERANCE BASED ON CHARACTERISTICS AND INTERACTION FREQUENCIES OF CONFIGURATIONS 36 In this approach software configurations are categorized into two sets 1) configurations which perform critical tasks (checking for uniqueness, size of index table, search operation) 2) 2) of configurations which perform non-critical tasks (the padding of special symbol in fixed-length records).
  • 37. CHIFRFT: FAULT TOLERANCE BASED ON CHARACTERISTICS AND INTERACTION FREQUENCIES OF CONFIGURATIONS 37 In this approach software configurations are categorized into two sets 1) configurations which perform critical tasks (checking for uniqueness, size of index table, search operation) 2) 2) of configurations which perform non-critical tasks (the padding of special symbol in fixed-length records). Initial interaction values of configurations that belong to the set critical configurations are assigned to higher values compare to non-critical configurations.
  • 38. CHIFRFT: FAULT TOLERANCE BASED ON CHARACTERISTICS AND INTERACTION FREQUENCIES OF CONFIGURATIONS 38 In this approach software configurations are categorized into two sets 1) configurations which perform critical tasks (checking for uniqueness, size of index table, search operation) 2) 2) of configurations which perform non-critical tasks (the padding of special symbol in fixed-length records). Initial interaction values of configurations that belong to the set critical configurations are assigned to higher values compare to non-critical configurations.
  • 39. CHIFRFT: FAULT TOLERANCE BASED ON CHARACTERISTICS AND INTERACTION FREQUENCIES OF CONFIGURATIONS 39 In this approach software configurations are categorized into two sets 1) configurations which perform critical tasks (checking for uniqueness, size of index table, search operation) 2) 2) of configurations which perform non-critical tasks (the padding of special symbol in fixed-length records). Initial interaction values of configurations that belong to the set critical configurations are assigned to higher values compare to non-critical configurations.
  • 46. PROACTIVE SCHEME 46 Proactive schemes are costlier as they need lots of resources to support simultaneous execution of primary job and its replicas
  • 47. PROACTIVE SCHEME 47 Proactive schemes are costlier as they need lots of resources to support simultaneous execution of primary job and its replicas 1- Preemptive migration 2- N-Version Programming 3- N-Copy Programming 4- Byzantine Fault Tolerance
  • 48. PROACTIVE SCHEME 48 Proactive schemes are costlier as they need lots of resources to support simultaneous execution of primary job and its replicas 1- Preemptive migration 2- N-Version Programming 3- N-Copy Programming 4- Byzantine Fault Tolerance
  • 50. REACTIVE SCHEME 50 Reactive fault tolerance schemes act on the recovery process after the occurrence of failure.
  • 51. REACTIVE SCHEME 51 1- Recovery Block Programming 2- Process Checkpointing 3- Process Migration Reactive fault tolerance schemes act on the recovery process after the occurrence of failure.
  • 52. PERFORMANCE EVALUATION 52 Using C++ language we have developed a software system for file structure techniques proposed by Michael J. Folk in [54].
  • 63. 63 NOW, YOU CAN CHOOSE!
  • 65. RECAP 65 In this research article we have proposed fault tolerant techniques based on frequency of interactions, characteristics of configurations. IFrFT technique based on frequency of interactions makes use of interaction values of configurations to measure the reliability and performance of a software system. ChIFrFT technique is based on frequency of interactions and characteristics (critical operations such as payment transactions and control systems) makes use of structural information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared for various percentages of critical con- figurations, number of interaction requests. While AllFT technique perform better than all the other techniques ChIFrFT approach has consistent performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
  • 66. RECAP 66 In this research article we have proposed fault tolerant techniques based on frequency of interactions, characteristics of configurations. IFrFT technique based on frequency of interactions makes use of interaction values of configurations to measure the reliability and performance of a software system. ChIFrFT technique is based on frequency of interactions and characteristics (critical operations such as payment transactions and control systems) makes use of structural information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared for various percentages of critical con- figurations, number of interaction requests. While AllFT technique perform better than all the other techniques ChIFrFT approach has consistent performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
  • 67. RECAP 67 In this research article we have proposed fault tolerant techniques based on frequency of interactions, characteristics of configurations. IFrFT technique based on frequency of interactions makes use of interaction values of configurations to measure the reliability and performance of a software system. ChIFrFT technique is based on frequency of interactions and characteristics (critical operations such as payment transactions and control systems) makes use of structural information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared for various percentages of critical con- figurations, number of interaction requests. While AllFT technique perform better than all the other techniques ChIFrFT approach has consistent performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
  • 68. RECAP 68 In this research article we have proposed fault tolerant techniques based on frequency of interactions, characteristics of configurations. IFrFT technique based on frequency of interactions makes use of interaction values of configurations to measure the reliability and performance of a software system. ChIFrFT technique is based on frequency of interactions and characteristics (critical operations such as payment transactions and control systems) makes use of structural information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared for various percentages of critical con- figurations, number of interaction requests. While AllFT technique perform better than all the other techniques ChIFrFT approach has consistent performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
  • 69. RECAP 69 In this research article we have proposed fault tolerant techniques based on frequency of interactions, characteristics of configurations. IFrFT technique based on frequency of interactions makes use of interaction values of configurations to measure the reliability and performance of a software system. ChIFrFT technique is based on frequency of interactions and characteristics (critical operations such as payment transactions and control systems) makes use of structural information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared for various percentages of critical con- figurations, number of interaction requests. While AllFT technique perform better than all the other techniques ChIFrFT approach has consistent performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
  • 70. RECAP 70 In this research article we have proposed fault tolerant techniques based on frequency of interactions, characteristics of configurations. IFrFT technique based on frequency of interactions makes use of interaction values of configurations to measure the reliability and performance of a software system. ChIFrFT technique is based on frequency of interactions and characteristics (critical operations such as payment transactions and control systems) makes use of structural information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared for various percentages of critical con- figurations, number of interaction requests. While AllFT technique perform better than all the other techniques ChIFrFT approach has consistent performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
  • 71. RECAP 71 In this research article we have proposed fault tolerant techniques based on frequency of interactions, characteristics of configurations. IFrFT technique based on frequency of interactions makes use of interaction values of configurations to measure the reliability and performance of a software system. ChIFrFT technique is based on frequency of interactions and characteristics (critical operations such as payment transactions and control systems) makes use of structural information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared for various percentages of critical con- figurations, number of interaction requests. While AllFT technique perform better than all the other techniques ChIFrFT approach has consistent performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.
  • 72. RECAP 72 In this research article we have proposed fault tolerant techniques based on frequency of interactions, characteristics of configurations. IFrFT technique based on frequency of interactions makes use of interaction values of configurations to measure the reliability and performance of a software system. ChIFrFT technique is based on frequency of interactions and characteristics (critical operations such as payment transactions and control systems) makes use of structural information of configurations. Performance of NoFT, AllFT, IFrFT and ChIFrFT techniques compared for various percentages of critical con- figurations, number of interaction requests. While AllFT technique perform better than all the other techniques ChIFrFT approach has consistent performance compare to IFrFT and NoFT. Performance of IFrFT and ChIFrFT techniques, in terms of the number of successful interactions, has increased by 25 and 40% respectively compare to NoFT.