The document describes the Shepherd approach for providing fault tolerance in distributed process execution in the OSIRIS system. Shepherd uses node monitors called shepherds to supervise worker nodes executing process activities. Shepherds implement a migration algorithm to handle failures and load balance work. They are organized in a ring and pool structure for robust routing and state sharing. A separate binding ring facilitates late binding of processes to services based on load.
Amplitude and phase comparators
Over current relays
Directional relays
Distance relays
Differential relay.
Static Relays: Comparison with electromagnetic relay
Classification and their description
Over current relays
Directional relay
Distance relays
Differential relay
Unit I: Introduction to Protection System:
Introduction to protection system and its elements, functions of protective relaying, protective zones, primary and backup protection, desirable qualities of protective relaying, basic terminology.
Relays:
Electromagnetic, attracted and induction type relays, thermal relay, gas actuated relay, design considerations of electromagnetic relay.
Unit-II: Relay Application and Characteristics:
Amplitude and phase comparators, over current relays, directional relays, distance relays, differential relay.
Static Relays: Comparison with electromagnetic relay, classification and their description, over current relays, directional relay, distance relays, differential relay.
Unit-III Protection of Transmission Line:
Over current protection, distance protection, pilot wire protection, carrier current protection, protection of bus, auto re-closing,
Unit-IV: Circuit Breaking:
Properties of arc, arc extinction theories, re-striking voltage transient, current chopping, resistance switching, capacitive current interruption, short line interruption, circuit breaker ratings.
Testing Of Circuit Breaker: Classification, testing station and equipments, testing procedure, direct and indirect testing.
Unit-V Apparatus Protection:
Protection of Transformer, generator and motor.
Circuit Breaker: Operating modes, selection of circuit breakers, constructional features and operation of Bulk Oil, Minimum Oil, Air Blast, SF6, Vacuum and d. c. circuit breakers.
FAULT TREE ANALYSIS (FTA) SEMINAR PRESENTATIONOrange Slides
Fault tree analysis is a method to analyze the failure of a particular product or system through boolean logic technique. It is widely used by the Safety engineers and Reliability engineers.
Creating Ever-changing QoS-constrained Dataflows in Tactical Networks: An Exp...Roberto Rigolin F. Lopes
This paper describes an exploratory study on how to generate sequences of QoS-constrained messages to challenge the underlying store-and-forward mechanisms in tactical networks. The messages come from Command and Control (C2) systems deployed at the tactical edge and the goal is to create reproducible flow of messages with a certain degree of entropy (randomness). Given a mission/operation, we assume that the user-facing services from C2 systems are related to each other and reuse a stochastic model to generate the sequence of messages; here called QoS-constrained dataflows. We studied the system behavior dealing with three different sequences of messages (A1, A2 and A3) to illustrate the computation of metrics using cross-layer contextual information and to highlight the importance of testing tactical systems with different loads. We also compute metrics to characterize the dataflows such as time in the queue, minimum datarate, number of expired messages and so on. Moreover, we used three disruptions patterns in the network to study the sequence of messages being divided in groups so to illustrate and support general conclusions about dataflow characterization. We claim that our methodology can get closer and closer to the performance bounds of store-and-forward mechanisms in tactical networks and can be reproduced by other researchers for quantitative comparisons.
Amplitude and phase comparators
Over current relays
Directional relays
Distance relays
Differential relay.
Static Relays: Comparison with electromagnetic relay
Classification and their description
Over current relays
Directional relay
Distance relays
Differential relay
Unit I: Introduction to Protection System:
Introduction to protection system and its elements, functions of protective relaying, protective zones, primary and backup protection, desirable qualities of protective relaying, basic terminology.
Relays:
Electromagnetic, attracted and induction type relays, thermal relay, gas actuated relay, design considerations of electromagnetic relay.
Unit-II: Relay Application and Characteristics:
Amplitude and phase comparators, over current relays, directional relays, distance relays, differential relay.
Static Relays: Comparison with electromagnetic relay, classification and their description, over current relays, directional relay, distance relays, differential relay.
Unit-III Protection of Transmission Line:
Over current protection, distance protection, pilot wire protection, carrier current protection, protection of bus, auto re-closing,
Unit-IV: Circuit Breaking:
Properties of arc, arc extinction theories, re-striking voltage transient, current chopping, resistance switching, capacitive current interruption, short line interruption, circuit breaker ratings.
Testing Of Circuit Breaker: Classification, testing station and equipments, testing procedure, direct and indirect testing.
Unit-V Apparatus Protection:
Protection of Transformer, generator and motor.
Circuit Breaker: Operating modes, selection of circuit breakers, constructional features and operation of Bulk Oil, Minimum Oil, Air Blast, SF6, Vacuum and d. c. circuit breakers.
FAULT TREE ANALYSIS (FTA) SEMINAR PRESENTATIONOrange Slides
Fault tree analysis is a method to analyze the failure of a particular product or system through boolean logic technique. It is widely used by the Safety engineers and Reliability engineers.
Creating Ever-changing QoS-constrained Dataflows in Tactical Networks: An Exp...Roberto Rigolin F. Lopes
This paper describes an exploratory study on how to generate sequences of QoS-constrained messages to challenge the underlying store-and-forward mechanisms in tactical networks. The messages come from Command and Control (C2) systems deployed at the tactical edge and the goal is to create reproducible flow of messages with a certain degree of entropy (randomness). Given a mission/operation, we assume that the user-facing services from C2 systems are related to each other and reuse a stochastic model to generate the sequence of messages; here called QoS-constrained dataflows. We studied the system behavior dealing with three different sequences of messages (A1, A2 and A3) to illustrate the computation of metrics using cross-layer contextual information and to highlight the importance of testing tactical systems with different loads. We also compute metrics to characterize the dataflows such as time in the queue, minimum datarate, number of expired messages and so on. Moreover, we used three disruptions patterns in the network to study the sequence of messages being divided in groups so to illustrate and support general conclusions about dataflow characterization. We claim that our methodology can get closer and closer to the performance bounds of store-and-forward mechanisms in tactical networks and can be reproduced by other researchers for quantitative comparisons.
Introduction to KSQL: Streaming SQL for Apache Kafka®confluent
Join Tom Green, Solution Engineer at Confluent for this Lunch and Learn talk covering KSQL. Confluent KSQL is the streaming SQL engine that enables real-time data processing against Apache Kafka®. It provides an easy-to-use, yet powerful interactive SQL interface for stream processing on Kafka, without the need to write code in a programming language such as Java or Python. KSQL is scalable, elastic, fault-tolerant, and it supports a wide range of streaming operations, including data filtering, transformations, aggregations, joins, windowing, and sessionization.
By attending one of these sessions, you will learn:
-How to query streams, using SQL, without writing code.
-How KSQL provides automated scalability and out-of-the-box high availability for streaming queries
-How KSQL can be used to join streams of data from different sources
-The differences between Streams and Tables in Apache Kafka
A Day in the Life of a Cloud Network Engineer at Netflix - NET303 - re:Invent...Amazon Web Services
Netflix is big and dynamic. At Netflix, IP addresses mean nothing in the cloud. This is a big challenge with Amazon VPC Flow Logs. VPC Flow Log entries only present network-level information (L3 and L4), which is virtually meaningless. Our goal is to map each IP address back to an application, at scale, to derive true network-level insight within Amazon VPC. In this session, the Cloud Network Engineering team discusses the temporal nature of IP address utilization in AWS and the problem with looking at OSI Layer 3 and Layer 4 information in the cloud.
Delta Lake OSS: Create reliable and performant Data Lake by Quentin AmbardParis Data Engineers !
Delta Lake is an open source framework living on top of parquet in your data lake to provide Reliability and performances. It has been open-sourced by Databricks this year and is gaining traction to become the defacto delta lake format.
We’ll see all the goods Delta Lake can do to your data with ACID transactions, DDL operations, Schema enforcement, batch and stream support etc !
Concepts and Patterns for Streaming Services with KafkaQAware GmbH
Cloud Native Night March 2020, Mainz: Talk by Perry Krol (@perkrol, Confluent)
=== Please download slides if blurred! ===
Abstract: Proven approaches such as service-oriented and event-driven architectures are joined by newer techniques such as microservices, reactive architectures, DevOps, and stream processing. Many of these patterns are successful by themselves, but they provide a more holistic and compelling approach when applied together. In this session Confluent will provide insights how service-based architectures and stream processing tools such as Apache Kafka® can help you build business-critical systems. You will learn why streaming beats request-response based architectures in complex, contemporary use cases, and explain why replayable logs such as Kafka provide a backbone for both service communication and shared datasets.
Based on these principles, we will explore how event collaboration and event sourcing patterns increase safety and recoverability with functional, event-driven approaches, apply patterns including Event Sourcing and CQRS, and how to build multi-team systems with microservices and SOA using patterns such as “inside out databases” and “event streams as a source of truth”.
Presentation slides of "Gaihre, Anil, et al. "Xbfs: exploring runtime optimizations for breadth-first search on gpus." Proceedings of the 28th International Symposium on High-Performance Parallel and Distributed Computing. 2019."
AWS security monitoring and compliance validation from Adobe.Splunk
You cant protect what you cant see. How Adobe uses Splunk to automate data collection for security monitoring as well as to validate compliance for large numbers of AWS accounts.
Delta Lake: Open Source Reliability w/ Apache SparkGeorge Chow
As presented: Sajith Appukuttan, Solution Architect, Databricks
Sept 12, 2019 at Vancouver Spark Meetup
Abstract: Delta Lake is an open-source storage layer that brings reliability to data lakes. Delta Lake offers ACID transactions, scalable metadata handling, and unifies streaming and batch data processing. It runs on top of your existing data lake and is fully compatible with Apache Spark APIs.
Introduction to KSQL: Streaming SQL for Apache Kafka®confluent
Join Tom Green, Solution Engineer at Confluent for this Lunch and Learn talk covering KSQL. Confluent KSQL is the streaming SQL engine that enables real-time data processing against Apache Kafka®. It provides an easy-to-use, yet powerful interactive SQL interface for stream processing on Kafka, without the need to write code in a programming language such as Java or Python. KSQL is scalable, elastic, fault-tolerant, and it supports a wide range of streaming operations, including data filtering, transformations, aggregations, joins, windowing, and sessionization.
By attending one of these sessions, you will learn:
-How to query streams, using SQL, without writing code.
-How KSQL provides automated scalability and out-of-the-box high availability for streaming queries
-How KSQL can be used to join streams of data from different sources
-The differences between Streams and Tables in Apache Kafka
A Day in the Life of a Cloud Network Engineer at Netflix - NET303 - re:Invent...Amazon Web Services
Netflix is big and dynamic. At Netflix, IP addresses mean nothing in the cloud. This is a big challenge with Amazon VPC Flow Logs. VPC Flow Log entries only present network-level information (L3 and L4), which is virtually meaningless. Our goal is to map each IP address back to an application, at scale, to derive true network-level insight within Amazon VPC. In this session, the Cloud Network Engineering team discusses the temporal nature of IP address utilization in AWS and the problem with looking at OSI Layer 3 and Layer 4 information in the cloud.
Delta Lake OSS: Create reliable and performant Data Lake by Quentin AmbardParis Data Engineers !
Delta Lake is an open source framework living on top of parquet in your data lake to provide Reliability and performances. It has been open-sourced by Databricks this year and is gaining traction to become the defacto delta lake format.
We’ll see all the goods Delta Lake can do to your data with ACID transactions, DDL operations, Schema enforcement, batch and stream support etc !
Concepts and Patterns for Streaming Services with KafkaQAware GmbH
Cloud Native Night March 2020, Mainz: Talk by Perry Krol (@perkrol, Confluent)
=== Please download slides if blurred! ===
Abstract: Proven approaches such as service-oriented and event-driven architectures are joined by newer techniques such as microservices, reactive architectures, DevOps, and stream processing. Many of these patterns are successful by themselves, but they provide a more holistic and compelling approach when applied together. In this session Confluent will provide insights how service-based architectures and stream processing tools such as Apache Kafka® can help you build business-critical systems. You will learn why streaming beats request-response based architectures in complex, contemporary use cases, and explain why replayable logs such as Kafka provide a backbone for both service communication and shared datasets.
Based on these principles, we will explore how event collaboration and event sourcing patterns increase safety and recoverability with functional, event-driven approaches, apply patterns including Event Sourcing and CQRS, and how to build multi-team systems with microservices and SOA using patterns such as “inside out databases” and “event streams as a source of truth”.
Presentation slides of "Gaihre, Anil, et al. "Xbfs: exploring runtime optimizations for breadth-first search on gpus." Proceedings of the 28th International Symposium on High-Performance Parallel and Distributed Computing. 2019."
AWS security monitoring and compliance validation from Adobe.Splunk
You cant protect what you cant see. How Adobe uses Splunk to automate data collection for security monitoring as well as to validate compliance for large numbers of AWS accounts.
Delta Lake: Open Source Reliability w/ Apache SparkGeorge Chow
As presented: Sajith Appukuttan, Solution Architect, Databricks
Sept 12, 2019 at Vancouver Spark Meetup
Abstract: Delta Lake is an open-source storage layer that brings reliability to data lakes. Delta Lake offers ACID transactions, scalable metadata handling, and unifies streaming and batch data processing. It runs on top of your existing data lake and is fully compatible with Apache Spark APIs.
Similar to Shepherd: Node Monitors for Fault-Tolerant Distributed Process Execution in OSIRIS (20)
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Shepherd: Node Monitors for Fault-Tolerant Distributed Process Execution in OSIRIS
1. Shepherd: Node Monitors for Fault-Tolerant
Distributed Process Execution in OSIRIS
Nenad Stojnić
Databases & Information Systems Group
2. Outline
Self-organizing properties in OSIRIS and
current limitations
The Shepherd approach to fault-tolerance
Novel migration algorithm
Shepherd ring: herds, shepherd pools, routing
Binding ring: Service lookup, late binding, load
balancing
Summary
3. OSIRIS Open Service Infrastructure for Reliable and
Integrated process Support
Decentralized P2P execution of processes
Web Service Invocation
Fault-tolerant, Self-* properties
Late-binding & Load-balancing
Safe continuation-passing (2PC)
Pub/Sub Meta-data repositories
16. OSIRIS failure handling
Failure case Handling
Successor failure Late-binding
Migration failure 2PC abort
Predecessor failure No handling necessary
Temporary node failure Recovery from local
stable storage
Current node failure Process execution
stops/hangs
State is lost
No notification
17. Outline
Self-organizing properties in OSIRIS and
current limitations
The Shepherd approach to fault-tolerance
Novel migration algorithm
Shepherd ring: herds, shepherd pools, routing
Binding ring: Service lookup, late binding, load
balancing
Summary
18. Our solution: Shepherd
Shared Memory Layer
BA
OSIRIS Layer
Shepherd Layer
DC
3
E
D
1
B
A
2
D
B
4
D
A
5
2
EC
6
DC
7
Monitor
Read/Write
26. Shepherd Migration Algorithm
(K1
,B)
Wa c k
A
S1
B
S2
C
S3
<K0
,W0
> <K1
,W1
> <K2
,W2
>
K0
K1
,B
K1
K2
,C
K2
K2
<K3
,W3
>
11
33 55
44
66
77
(K2
,C)
Wa c k
(K3
,...)
Wa c k
22K0 K1 K1
K2
27. Shepherd failure cases
Failure of worker nodes
Failure of shepherds
Failures in the shared memory
28. Failure of worker nodes
Replacement node
from the herd
Same service type
Fail-safe services
BUT undo side
effects on Shared
Memory
Wa c k
S1
A''
S2
<K0
,W0
> <K1
,W1
>
K0
33 55
A'
K0
...
AX
29. Failure of shepherds
Shepherds organized
in pools, state shared
WN speaks to the pool
Transactional writes →
consistency guaranteed
New leader learns
current state from the
pool A
S1X S2
Wa c k
...
30. Failures in shared memory
Chord-based
Replicated
transactional storage
Successful writes
persistent
failed read/write can
be always retried
A
S1
<K0
,W0
> <K1
,W1
>
X
31. Shepherd ring
Used for:
Worker node to shepherd assignment
Routing of messages from WN to shepherds
Pools construction
Based on Chord structured overlay
Indentifier circle of Shepherd node IDs and Worker
node Ids (Consistent hashing)
Efficient routing: Log(NSh
)
35. Shepherd pools
Symmetric replication strategy:
Node ID congruence-modulo equivalence classes
Responsible for x “knows” entire class of x
Pool = all responsibles for a class
Transactional guarantees
Paxos consensus
39. Late binding
Locate a shepherd providing service type T
Shepherd provides type T if it monitors instances of
type T
Binding ring
Physical nodes & service types (resources)
Distributed “multimap” data structure
Service type → List of shepherds
present on-going work aimed at improv-
ing OSIRIS&apos; fault tolerance capabilities
processes can be imagined as programs
that coordinate the invocation of distributed web services
Late binding of service in-
stances, in conjunction with load balancing strategies
Offer alreadz self * properties
Transactional garantees. the system is completely
resilient to temporary node failures.
Also, thanks to late binding, permanent failures of nodes participating to the execution of a process instance, but not involved in a computation at the moment of failure, do not affect the execution.
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
Replacement node found (late binding)
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
the node migrates the control for process execution to one or more successor nodes by delivering an
activation token containing flow-control information and the whiteboard
Hardware, network or service failures
If the node becomes temporarily disconnected from the network, the system is still able to recover.
node will keep retrying to pass on the results until it succeeds
Works very well in controlled environnments
present on-going work aimed at improv-
ing OSIRIS&apos; fault tolerance capabilities
WN assigned to Shepherds (herds)
Shepherds organized in pools
Leader
Shepherds in the pool share state
Persistence of process state
Triggering of process activity
Leader of a pool communicates to a WN an activation key Ki
Using Ki, WN gets the porcess state form SML
WN writes the next process activity with a new key Ki+1 to SML
WN sends the new activation key Ki+1 to the assigned pool of Shepherds
Leader of the pool forwards the activation key to another pool of shepherds
Another step that deltes entires from the shm
Unique activation key provides indenpendance of process activities
Temporarily failed WNs that have been replaced are terminated
The side-effects created by B that are not
stored on the shared memory cannot be undone
DHT-like structured overlay
Paxos commit protocol
consistent information about the state of the activity it is supervising. Distributed transaction
DHT fault detection mechanism to elect an
appropriate shepherd replacement replica
Beernet DHT implementation
with respect to the migration algorithm, only a passive role
Routing mechanism
Failure-detection mechanism
their state relative to the execution of the migration algorithm
We use it to are assigned nodes to the herd of a shepherd
several shepherds coordinate to form a pool
how leader election within a pool proceeds
Communication between a worker node and a pool of shepherds
Shepherds are phisical nodes and Wns the reource to be stored
Worker node ids in the circle lying inbetween 2 shepherd ids become the herd of the adjacent shepherd
take into consideration
other factors to improve porcess execution
as explained above is sufficient to guarantee the correctness of the routing and enable
Late-binding.
Aggregate load
present on-going work aimed at improv-
ing OSIRIS&apos; fault tolerance capabilities