Fault Tolerance David Powell LAAS-CNRS, Toulouse.

Slides:



Advertisements
Similar presentations
DG INFSO- Grid Research & Infrastructures: W. Boch, M. Campolargo 1 Delivery of Industrial-strength Grid Middleware: establishing an effective European.
Advertisements

Information Society Technologies programme 1 IST Programme - 8th Call Area IV.2 : Computing Communications and Networks Area.
Distributed Systems Major Design Issues Presented by: Christopher Hector CS8320 – Advanced Operating Systems Spring 2007 – Section 2.6 Presentation Dr.
FP7 ICT Work Programme A short overview Michele Missikoff LEKS, IASI-CNR (Thanks to K. Rouhana, DG INFSO, C2)
Reliability on Web Services Presented by Pat Chan 17/10/2005.
CS 795 – Spring  “Software Systems are increasingly Situated in dynamic, mission critical settings ◦ Operational profile is dynamic, and depends.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
ICT 1 “Putting Context in Context: The Role and Design of Context Management in a Mobility and Adaptation Enabling Middleware” Marius Mikalsen Research.
Improving Software Quality with Generic Autonomics Support Richard Anthony The University of Greenwich.
Metrics for Evaluating ICEBERG ICEBERG Retreat Breakout Session Jan 11, 2000 Coordinators: Chen-Nee Chuah & Jimmy Shih.
Software Engineering and Middleware: a Roadmap by Wolfgang Emmerich Ebru Dincel Sahitya Gupta.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
System Integration Management (SIM)
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
Mobile Computing: Wireless Mesh and Sensor Networks Thomas Kunz Professor and Director Technology Innovation Management Program Carleton University.
Project supported by YESS 2009 Young Engineering Scientist Symposium « Identity Management » Cryptography for the Security of Embedded Systems Ambient.
MAFTIA concepts Yves Deswarte & David Powell LAAS-CNRS, France SRI International.
For further information: Infrastructure and Information Science Infrastructure: –Civil Infrastructure Engineering –Transportation.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Critical Emerging Network-Centric Applications Tele-control/tele-presence Defense Tele-medicine Remote plane/vehicle/robot control Distance learning Real-time.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Distributed Real-Time Systems for the Intelligent Power Grid Prof. Vincenzo Liberatore.
FMEA-technique of Web Services Analysis and Dependability Ensuring Anatoliy Gorbenko Vyacheslav Kharchenko Olga Tarasyuk National Aerospace University.
Data/Analysis Challenges in the Electronic Business Environment Dr. Howard Frank Dean Robert H. Smith School of Business University of Maryland College.
University of California, San Diego Computer Science and Engineering Concurrent Systems Architecture Group Agile Objects: Component-based Inherent Survivability.
Brussels, 1 June 2005 WP Strategic Objective Embedded Systems Tom Bo Clausen.
IMPROUVEMENT OF COMPUTER NETWORKS SECURITY BY USING FAULT TOLERANT CLUSTERS Prof. S ERB AUREL Ph. D. Prof. PATRICIU VICTOR-VALERIU Ph. D. Military Technical.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
High Performance Embedded Computing © 2007 Elsevier Lecture 5: Embedded Systems Issues Embedded Computing Systems Mikko Lipasti, adapted from M. Schulte.
Copyright © Praxis Critical Systems Limited 2002 The Way Ahead Session Praxis Critical Systems Tom Anderson – The Commission’s View Discussion The Next.
© Synergetics Portfolio Security Aspecten.
EAACK—A Secure Intrusion-Detection System for MANETs
Composing Adaptive Software Authors Philip K. McKinley, Seyed Masoud Sadjadi, Eric P. Kasten, Betty H.C. Cheng Presented by Ana Rodriguez June 21, 2006.
Dependability in FP 6 Brian Randell Pisa Workshop, November 2002.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Initiatives for FP6 A few thoughts on IP-level research: Dependability-related Research the University of Lisboa Paulo E. Veríssimo
© ABB Group October 24, 2015 | Slide 1 Dynamic Software Updates for Real-Time Systems Michael Wahler, Stefan Richter, Manuel Oriol Michael Wahler, ABB.
Networks Of Mobile Arbitrary Devices (NOMADs) Miroslaw Malek Humboldt-University Berlin, Germany
Deeply Embedded Large Scale Networks Specify and Control Emerging Behavior.
NetPro-ITI Building a Simple Network. What Is a Network?
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Networked Embedded and Control Systems WP ICT Call 2 Objective ICT ICT National Contact Points Mercè Griera i Fisa Brussels, 23 May 2007.
MAFTIA Expression of Interest for DEFINE and DESIRE presented by Robert Stroud, University of Newcastle upon Tyne.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Networking: Applications and Services Antonia Ghiselli, INFN Stu Loken, LBNL Chairs.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
Survey on the Characterization and Classification of Wireless Sensor Network Application [1] CS 2310 Software Engineering Xiaoyu Liang.
Gaia An Infrastructure for Active Spaces Prof. Klara Nahrstedt Prof. David Kriegman Prof. Dennis Mickunas
Challenges of Mobile ad-hoc Grids and their Applications in e-Healthcare Zhuoqun Li, Lingfen Sun and Emmanuel C. Ifeachor School of Computing, Communications.
Euro-Par, HASTE: An Adaptive Middleware for Supporting Time-Critical Event Handling in Distributed Environments ICAC 2008 Conference June 2 nd,
HCNA-Storage (Huawei Certified Network Storage Associate) Training HCNA-Storage certification is positioned in SAN storage technology, configuration and.
CLOUD ENABLED WIRELESS BODY AREA NETWORKS FOR PERVASIVE HEALTHCARE Presents: Roi Peretz Golan Haham
Embedded Systems - the Neural Backbone of Society ARTEMIS Industry Association ARTEMIS, from successful R&D to cutting-edge Innovation Rolf Ernst, TU Braunschweig.
ARTEMIS SRA 2016 Trust, Security, Robustness, and Dependability Dr. Daniel Watzenig ARTEMIS Spring Event, Vienna April 13, 2016.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Reaching for k Nines Miroslaw Malek Humboldt University Berlin, Germany
In the name of God.
Chapter 1 Characterization of Distributed Systems
Presented by Edith Ngai MPhil Term 3 Presentation
Summary of Sessions 2 and 3
Data and Applications Security
AGENT OS.
Data and Applications Security
Data and Applications Security
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Data and Applications Security
Presentation transcript:

Fault Tolerance David Powell LAAS-CNRS, Toulouse

2 Introduction Strengths of EU: –strong industrial base for specific FT systems used in safety-critical applications (transport, energy) –solid academic base for FT concepts and algorithms In the context of an IP — applied research: –cheaper, faster or safer ways to tolerate “traditional” faults –application of fault-tolerance in new contexts, e.g., ubiquitous computing, autonomous systems… –holistic view of fault-tolerance covering the widest possible spectrum of faults

3 Fault Classes

4 Failures due to non-malicious faults transaction processing, electronic switching commercial aircraft, telephone networks [Avizienis, Laprie & Randell 2001] design human interaction physical external physical internal

5 Companies affected per year Source : enquiry carried out on ~400 French companies [CLUSIF, 2001] other = loss of essential services, physical accidents, theft, natural catastrophes

6 Applicable FT research and technology reconfiguration and adaptation device physics & soft-error-tolerant SOCs open source RT kernels digital watermarking FT middleware; reflective systems consensus protocols & group communication dynamic data & process replication and diversity intrusion-tolerant intrusion-detection systems intrusion-tolerant trusted third parties privacy-preserving authorization schemes protocols for QoS assurance physical design human interaction malicious logic intrusions robust HCI

7 Industrial FT needs Case study areas: –e-Business e.g., scalable, highly-available, secure networked clusters –Healthcare e.g., mobile support for medical staff in emergency situations –Aerospace (defence) e.g., dependable architectures and real-time kernels –Critical infrastructure protection e.g., networked energy production Other areas of need: –transportation, space, telecoms…

8 Conclusion Considerable FT expertise in EU covering wide spectrum of faults, both non-malicious and malicious Capitalize by developing generic FT components, esp. intrusion management, middleware and protocols for FT Set of case studies to demonstrate genericity and achievable benefits Need V&V and evaluation tools to demonstrate effectiveness of FT, esp. cost effectiveness