A DFA-based Approach for Software Fault Tolerance
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [1]
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    In this paper, the checkpointing & rollback mechanism is studied deeply, and a new approach for SFT (software fault tolerance) is presented, which is based on the DFA (data flow analysis). The authors introduce the SFT technology at first, and point out that the peculiarity of data is the ultimate reason and also the final result of the software faults in control systems, so it is very necessary to adopt a powerful measure for data fault tolerance. Then, they discuss the applications of the DFA technique in the SFT in details, and give two theorems, one is for the minimal sufficient rollback point and another is for the checkpoint data set. Besides, they give the sufficient condition for the validation of the definition of a rollback block. They also use the telecommunication system as an example to illustrate the usage of this method. It is shown that only two checkpoints are needed to be maintained dynamically in their solution. The method presented in this paper can be used widely by extending simply.

    Reference
    1  Siewiorek D P, Swarz R S. The theory and practice of reliable system design. Bedford: Digital Press, 1982 2  Lyn M R. Software fault tolerance. New York: Wiley & Sons Ltd., 1995 3  Johnson B W. Design and analysis of fault tolerance digital systems. Menlo Park, California: Addison-Wesley Publishing Company, 1989 4  Avizienis A, Chen L. On the implementation of N-version programming for software fault tolerance during execution. In: Proceedings of the International Conference on Computer Software and Applications. New York: IEEE Press, 1977. 149~155 5  Avizienis A, Kelly J P. Fault tolerance by design diversity: concepts and experiments. IEEE Computer, 1984,17(8):67~80 6  Huang Y, Jalote P, Kintala C M R. Two techniques for transient software error recovery. Hardware and Software Architectures for Fault Tolerance: Experience and Perspective, Lecture Notes in Computer Science, Springer Verlag, 1994. 159~170 7  Chandy K M, Ramamoorthy C V. Rollback and recovery strategies for computer programs. IEEE Transactions on Computer, 1972,C-21(2):137~146 8  陈火旺,钱家骅,孙永强.编译原理.北京:国防工业出版社,1984.253~256 (Chen Huo-wang, Qian Jia-hua, Sun Yong-qiang. Compiling Principles. Beijing: National Defense Publishing House, 1984. 253~256)
    Related
    Cited by
Get Citation

刘云龙,陈俊亮.基于数据流分析的软件容错策略.软件学报,1998,9(7):537-541

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:April 07,1997
  • Revised:June 19,1997
You are the first2045352Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063