Hertong Song Department of Computer Science Louisiana Tech University Cluster Reliability Modeling Using UML.

Slides:



Advertisements
Similar presentations
Exact Inference. Inference Basic task for inference: – Compute a posterior distribution for some query variables given some observed evidence – Sum out.
Advertisements

Semantics Static semantics Dynamic semantics attribute grammars
An Array-Based Algorithm for Simultaneous Multidimensional Aggregates By Yihong Zhao, Prasad M. Desphande and Jeffrey F. Naughton Presented by Kia Hall.
O(N 1.5 ) divide-and-conquer technique for Minimum Spanning Tree problem Step 1: Divide the graph into  N sub-graph by clustering. Step 2: Solve each.
Lecture 8: Asynchronous Network Algorithms
TOPIC : Reduced Ordered Binary Decision Diagrams UNIT 1: Modeling Digital Circuits Module 1 : Functional Modeling.
1 Fault-Tolerant Computing Systems #6 Network Reliability Pattara Leelaprute Computer Engineering Department Kasetsart University
Copyright 2004 Koren & Krishna ECE655/DataRepl.1 Fall 2006 UNIVERSITY OF MASSACHUSETTS Dept. of Electrical & Computer Engineering Fault Tolerant Computing.
Huffman code and ID3 Prof. Sin-Min Lee Department of Computer Science.
Binary Trees CSC 220. Your Observations (so far data structures) Array –Unordered Add, delete, search –Ordered Linked List –??
Alternative Approach to Systems Analysis Structured analysis
Exact Inference in Bayes Nets
Junction Trees And Belief Propagation. Junction Trees: Motivation What if we want to compute all marginals, not just one? Doing variable elimination for.
Traditional Approach to Design
GRAMMAR & PARSING (Syntactic Analysis) NLP- WEEK 4.
Chapter 12: Expert Systems Design Examples
Mining for High Complexity Regions Using Entropy and Box Counting Dimension Quad-Trees Rosanne Vetro, Wei Ding, Dan A. Simovici Computer Science Department.
Model-Driven Dependability Analysis of Web Services Apostolos Zarras Computer Science Department University of Ioannina, Greece
Reliable System Design 2011 by: Amir M. Rahmani
SASH Spatial Approximation Sample Hierarchy
CS 201 Compiler Construction
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
Design of Fault Tolerant Data Flow in Ptolemy II Mark McKelvin EE290 N, Fall 2004 Final Project.
Choosing an Order for Joins (16.6) Neha Saxena (214) Instructor: T.Y.Lin.
Chapter 3 : Software Process and Other Models Juthawut Chantharamalee Curriculum of Computer Science Faculty of Science and Technology, Suan Dusit University.
West Virginia University A Bayesian Approach to Reliability Predication of Component Based Systems H. Singh, V. Cortellessa, B. Cukic, E. Gunel, V. Bharadwaj.
Chapter 61 Chapter 6 Index Structures for Files. Chapter 62 Indexes Indexes are additional auxiliary access structures with typically provide either faster.
Copyright GoldSim Technology Group LLC, 2005 Slide 1 Introduction to the GoldSim Reliability Module GoldSim Technology Group Issaquah, Washington USA.
Computer vision: models, learning and inference
CISC 235: Topic 6 Game Trees.
程建群 博士(Dr. Jason Cheng) 年03月
Eliciting integration scenarios Proposal for Meeting
© Jalal Kawash 2010 Trees & Information Coding: 3 Peeking into Computer Science.
Object Management Group (OMG) Specifies open standards for every aspect of distributed computing Multiplatform Model Driven Architecture (MDA)
FAULT TREE ANALYSIS (FTA). QUANTITATIVE RISK ANALYSIS Some of the commonly used quantitative risk assessment methods are; 1.Fault tree analysis (FTA)
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
© Jalal Kawash 2010 Trees & Information Coding Peeking into Computer Science.
A language to describe software texture in abstract design models and implementation.
1 Devon M. Simmonds University of North Carolina, Wilmington CSC450 Software Engineering WorkFlow Modeling with Activity Diagrams.
Chapter 5 Models and UML Notation for The Object-Oriented Approach.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 20 Slide 1 Critical systems development 3.
Documentation Dr. Andrew Wallace PhD BEng(hons) EurIng
Eliciting Integration Scenarios As discussed during Meeting
Unified Modelling Language (UML) Software Engineering Lab. Sharif University of Technology.
Spring 2003 ECE569 Lecture 05.1 ECE 569 Database System Engineering Spring 2003 Yanyong Zhang
1 Fault-Tolerant Computing Systems #1 Introduction Pattara Leelaprute Computer Engineering Department Kasetsart University
Computer Science 340 Software Design & Testing Software Architecture.
Exact Inference in Bayes Nets. Notation U: set of nodes in a graph X i : random variable associated with node i π i : parents of node i Joint probability:
Spring 2004 ECE569 Lecture 05.1 ECE 569 Database System Engineering Spring 2004 Yanyong Zhang
MapReduce and the New Software Stack. Outline  Algorithm Using MapReduce  Matrix-Vector Multiplication  Matrix-Vector Multiplication by MapReduce 
1 Storing and Maintaining Semistructured Data Efficiently in an Object- Relational Database Mo Yuanying and Ling Tok Wang.
SENG521 (Fall SENG 521 Software Reliability & Testing Fault Tolerant Software Systems: Techniques (Part 4a) Department of Electrical.
Process of Diagnosing a Dynamic System Lab Seminar June 19th, 2007 Seung Ki Shin.
Network Management Lecture 13. MACHINE LEARNING TECHNIQUES 2 Dr. Atiq Ahmed Université de Balouchistan.
Introduction to Software Testing (2nd edition) Chapter 5 Criteria-Based Test Design Paul Ammann & Jeff Offutt
Week#3 Software Quality Engineering.
Adding Dynamic Nodes to Reliability Graph with General Gates using Discrete-Time Method Lab Seminar Mar. 12th, 2007 Seung Ki, Shin.
Data mining in web applications
Topic 2: binary Trees COMP2003J: Data Structures and Algorithms 2
Fault Trees.
Tools Of Structured Analysis
Data Structures and Design in Java © Rick Mercer
Indexing ? Why ? Need to locate the actual records on disk without having to read the entire table into memory.
CS522 Advanced database Systems
Data Compression If you’ve ever sent a large file to a friend, you may have compressed it into a zip archive like the one on this slide before doing so.
CSCI 5822 Probabilistic Models of Human and Machine Learning
Databases and Structured Files: What is a database?
Propagation Algorithm in Bayesian Networks
Statistics for the Social Sciences
Communication Driven Remapping of Processing Element (PE) in Fault-tolerant NoC-based MPSoCs Chia-Ling Chen, Yen-Hao Chen and TingTing Hwang Department.
Presentation transcript:

Hertong Song Department of Computer Science Louisiana Tech University Cluster Reliability Modeling Using UML

2 Reliability Modeling Reliability Modeling Techniques:  Reliability block diagram  Fault trees  Markov chins  Others.

3 System Engineers System engineers, software architects and product managers normally using UML to describe the behaviors of computing systems.

4 A Mapping Tool A tool attempts to map from UML to statistical reliability models Using UML to describe system’s behavior Process the UML output and generate the reliability models Calculate the results

5 Frame Work

6 Gentleware’s Poseidon

7 Output file from UML Once the model is saved, the Poseidon for UML tool generates a zip formatted file named zargo. Inside the zargo there is a XMI file that contains the description for the UML model.

8 Parsing the XML file The failure/repair rates for each node and the relationships between nodes are embedded in this XMI file. These information will then be extracted by parsing the XMI file

9 Markov Chain Model Many intricate system dependencies cannot be adequately represented by none state space modeling methods such as Fault Trees Continuous Markov chains model can be used to handle these kinds of system dependencies

10 Assumptions We assume the nodes are independent to each other, meaning that one node failure does not cause other nodes failure. Once the system is in failure state, the system will not cause more failure.

11 Table 1. UML Tags UML TagsRepresents NameName of the component. Used for grouping failure rateThe failure rate of the component repair rateThe repair rate of the component MinThe minimum components required to keep the system functioning MultiplicityThe number of duplicates of the component

12 An Example for Tag Using

13 Markov Chain Example

14 Algorithm for Constructing MC partition components into distinguished groups. Each tuple represents a group. The number of a tuple represents the number of components in the corresponding group.

15 Algorithm (Continuous) For example, the notation means there are groups; there are identical components in group 1, identical components in group 2 and so on.

16 Algorithm (Continuous) The resulting Markov chain will be in a tree-like structure. The top level (root) of the tree is the initial state of the Markov chain At each level below the root, there are possibilities (braches), for each components in each group may fail

17 Algorithm (Continuous) The tree will propagate with children for each node, until it reaches a leave; which is the minimum number of components required for a certain group to keep the system functioning.

18 Algorithm (Continuous) Once the tree is constructed, each duplicated state will be removed by linking its parent state to the same state in the left part of the tree, with the same failure rate of the removed state.