Abstract
Several recent studies have reported that most outages in technical computerbased systems are due to software faults. Traditional methods in software engineering are fault avoidance/removal based on extensive testing/debugging, and fault tolerance based on design/data diversity. Since both of them are very expensive and unrealistic in common cases, the key challenge is how to provide highly dependable software with relatively cheaper cost. We introduce several environmental diversity techniques of software systems, and overview the typical examples involving checkpoint restart and software rejuvenation. Based on the author’s own research results during a past decade, we discuss stochastic models to derive several checkpoint restart and software rejuvenation policies analytically in terms of the optimality under cost criteria.
First, we formulate the checkpoint placement problems [1,14,16,17], which can be characterized by optimization problems to derive the checkpoint sequence. Second, we introduce the concept of software aging and rejuvenation, and summarize several stochastic models to determine the optimal software ejuvenation policies [2,3,4,5,7,8,9,10,11,12,13,14,15,18,19]. Third, we concern intrusion tolerant systems and consider some control policies to improve the system availability and its related measures [6,20,21,22]. Finally, the present research trend and the open problems in future are also discussed.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Dohi, T., Kaio, N., Osaki, S.: The optimal age-dependent checkpoint strategy for a stochastic system subject to general failure mode. Journal of Mathematical Analysis and Applications 249, 80–94 (2000)
Dohi, T., Goseva-Popstojanova, K., Trivedi, K.S.: Estimating software rejuvenation schedule in high assurance systems. The Computer Journal 44(6), 473–485 (2001)
Dohi, T., Iwamoto, K., Okamura, H., Kaio, N.: Discrete availability models to rejuvenate a telecommunication billing application. IEICE Transactions on Communications (B) E86-B(10), 2931–2939 (2003)
Dohi, T., Suzuki, H., Trivedi, K.S.: Comparing software rejuvenation policies under different dependability measures. IEICE Transactions on Information and Systems (D) E87-D(8), 2078–2085 (2004)
Dohi, T., Suzuki, H., Osaki, S.: Transient cost analysis of non-Markovian software systems with rejuvenation. International Journal of Performability Engineering 2(3), 233–243 (2006)
Dohi, T., Uemura, T.: An adaptive mode control algorithm of a scalable intrusion tolerant architecture. Journal of Computer and System Sciences (in press)
Eto, H., Dohi, T.: Determining the optimal software rejuvenation schedule via semi-Markov decision process. Journal of Computer Science 2(6), 528–534 (2006)
Iwamoto, K., Dohi, T., Kaio, N.: Estimating periodic software rejuvenation schedule in discrete operational circumstance. IEICE Transactions on Information and Systems (D) E91-D(1) (2008)
Okamura, H., Miyahara, S., Dohi, T., Osaki, S.: Performance evaluation of workload-based software rejuvenation scheme. IEICE Transactions on Information and Systems (D) E84-D(10), 1368–1375 (2001)
Okamura, H., Miyahara, S., Dohi, T.: Dependability analysis of a transactionbased multi server system with rejuvenation. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (A) E86-A (8), 2081–2090 (2003)
Okamura, H., Fujio, H., Dohi, T.: Fine-grained shock models to rejuvenate software systems. IEICE Transactions on Information and Systems (D) E86-D(10), 2165–2171 (2003)
Okamura, H., Miyahara, S., Dohi, T.: Rejuvenating communication network system with burst arrival. IEICE Transactions on Communications (B) E88-B(12), 4498–4506 (2005)
Okamura, H., Iwamoto, K., Dohi, T.: A dynamic programming algorithm for software rejuvenation scheduling under distributed computation circumstance. Journal of Computer Science 2(6), 505–512 (2006)
Okamura, H., Iwamoto, K., Dohi, T.: A DP-based optimal checkpointing algorithm for real-time appications. International Journal of Reliability, Quality and Safety Engineering 13(4), 323–340 (2006)
Okamura, H., Dohi, T.: Comprehensive evaluation of aperiodic checkpointing and rejuvenation schemes in operational software system. Journal of Systems and Software 83, 1591–1604 (2010)
Ozaki, T., Dohi, T., Okamura, H., Kaio, N.: Distribution-free checkpoint placement algorithms based on min-max principle. IEEE Transactions on Dependable and Secure Computing 3(2), 130–140 (2006)
Ozaki, T., Dohi, T., Kaio, N.: Numerical computation algorithms for sequential checkpoint placement. Performance Evaluation 66, 311–326 (2009)
Rinsaka, K., Dohi, T.: Behavioral analysis of fault-torellant software systems with rejuvenation. IEICE Transactions on Information and Systems (D) E88-D(12), 2681–2690 (2005)
Suzuki, H., Dohi, T., Okamura, H.: Cost-effective analysis of periodic software rejuvenation policies for a telecommunication billing application. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (A) E85-A (12), 2923–2932 (2002)
Uemura, T., Dohi, T.: Optimal security patch management policies maximizing system availability. Journal of Communications 5(1), 71–80 (2010)
Uemura, T., Dohi, T., Kaio, N.: Availability analysis of an intrusion tolerant distributed server system with preventive maintenance. IEEE Transactions on Reliability 59(1), 18–29 (2010)
Uemura, T., Dohi, T., Kaio, N.: Dependability analysis of a scalable intrusion tolerant architecture with two detection modes. Journal of Internet Technology 11(2), 289–298 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dohi, T. (2011). Environmental Diversity Techniques of Software Systems. In: Kim, Th., et al. Future Generation Information Technology. FGIT 2011. Lecture Notes in Computer Science, vol 7105. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27142-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-27142-7_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27141-0
Online ISBN: 978-3-642-27142-7
eBook Packages: Computer ScienceComputer Science (R0)