Securing Tandem Systems Previous Screen Jeffrey L

Total Page:16

File Type:pdf, Size:1020Kb

Securing Tandem Systems Previous Screen Jeffrey L 84-10-15 Securing Tandem Systems Previous screen Jeffrey L. Ott Payoff Tandem computers are the systems of choice for online transaction processing in institutions worldwide. This article provides detailed guidance for securing Tandem systems, focusing on Tandem's NonStop Guardian security and the Tandem-developed security application, Safeguard. Introduction Tandem computers are employed extensively in heavy volume, OnLine Transaction Processing environments. Tandem systems can be found in 24 of the top 25 US banks; 32 of the top 50 European banks; 250 brokerage and security firms; 60 major insurance companies; and in 40of the world s busiest stock and commodities exchanges. Tandem computers run 75% of all automated teller machine transactions, 66% of all worldwide credit card transactions, and 50% of all public E-mail systems. Despite this large presence in computing environments worldwide, Tandem computers are as yet enigmatic to information security practitioners and information systems auditors. This is primarily because Tandem systems are designed with fault tolerance, low maintenance, and low overhead in mind. In many large financial institutions, only two employees provide Tandem system administration and management (i.e., perform operating system upgrades, capacity planning and tuning, and other related maintenance tasks). Compare this with the number of people generally required to support a large mainframe and it is obvious why the Tandem system is often forgotten until something specific is required of it. Tandem Computers, Inc., which developed its first fault tolerant computer in 1976, is also partially responsible for the lack of security awareness on its systems. Safeguard, the Tandem's security application, is the only security application used with the system. It was not until the company's recent D30 release of the NonStop Kernel—Tandem s operating system—and Safeguard, that Tandem pursued certification of its security environment with the National Computer Security Center (NCSC). Although Tandem's security environment does not provide the controls and granularity of more established and refined security packages, such as CA-ACF2 and RACF, it is possible to secure a Tandem system. This article addresses the various components of Tandem security, focusing on basic NonStop Guardian security, Safeguard security, and the interaction between the two. In addition, the chapter provides suggestions for minimizing risk and improving administration in a Tandem system. Tandem Architecture Basics Organizations choose Tandem computers for their OnLine Transaction Processing because of Tandem s proven fault tolerance, which is achieved through an integrated hardware and software design. All of the critical system components are mirrored, or duplicated. Tandem computers provide redundant power supplies, buses, I/O channels and disk drives—all for establishing a backup path in case the primary path is unavailable. The NonStop Kernel and fault tolerant software are written to recognize and use these alternate routing and backup paths. Tandem developed the Mackie Diagram as an aid for visualizing the layout of a system. Exhibit 1 illustrates a Mackie Diagram of a rudimentary Tandem system. Tandem systems are typically composed of two to 16 Central Processing Unit. As illustrated in Exhibit 1, CPUs numbering begins with Central Processing Unit 0 and follows from there. Each CPUs operates independently of, and cooperatively with, the other CPUs in the system. Previous screen This enables a multiple-CPU Tandem system to survive and continue processing should one or more of the CPUs fail. A high-speed interprocessor bus (IPB) connects each CPUs to the system. The bus handles the communications between each CPUs in the system, but does not handle communications between separate Tandem systems. There are two channels on the IPB—the X-channel and the Y-channel—and each has its own controller. If one of these buses were to fail or otherwise become unavailable, the remaining channel would ensure the continued processing of the system. I/O channels extend from each CPUs and are connected to dual-ported controller devices. The dual-ported controllers are accessible from one of two CPUs. Tandem disk drives are mirrored in that for every logical disk, there are two physical disk drives on the system, the primary and the mirror. A drive is generally referred to by its logical name and no distinction is made between the primary and the mirrored drive. A drive does not need to be mirrored; in fact, some organizations place nonessential data, such as test systems and data, on “broken mirrored” drives. However, should the drive fail, all data on that drive is at risk of being lost. Disk drives are also dual-ported, enabling data to be routed to that drive through one of two controllers. As illustrated in Exhibit 1, data destined for the volume $SYSTEM disk can take any one of four possible routes to reach the drive. Mackie Diagram of a Basic NonStop System Importantly, controllers do not necessarily need to be connected to two adjacent CPUs, as the controllers for the $SYSTEM disk drives are in Exhibit 1. Instead, to achieve maximum performance and load balancing, controllers can be connected between any two CPUs, as illustrated in the ASYNC controller connections. Tandem Naming Conventions The following sections outline the naming conventions for Tandem systems. Diskfile Naming. The Tandem file-naming convention is analogous to the DOS PC naming convention. Tandem volumes are analogous to PC drives; Tandem subvolumes are analogous to PC directories; and Tandem diskfiles are analogous to PC files. The Tandem system can have many volumes. On each volume, there are multiple subvolumes and, in each subvolume, there can be many diskfiles. A subvolume, however, cannot contain another subvolume. Volume names are preceded by a $ and are followed by a drive name of up to eight alphanumeric characters (e.g., $SYSTEM, $DATA01, or $AUDIT). Subvolume names are preceded by their respective volume name and can also be up to eight alphanumeric characters in length (e.g., $SYSTEM.SYSTEM,$DATA01.PRODDATA, $AUDIT.SAFE). Diskfile names also contain up to eight alphanumeric characters. A fully qualified filename will include the system name of the system that it resides on. The system name is placed before the volume designation and is preceded by a \. The system name is optional and is only required when referencing files outside of the current system. Examples of a fully qualified filename are: \NY.$SYSTEM.SYSTEM.USERID, \TEST.$DATA01.PRODDATA.USERS, and \AK1.$AUDIT.SAFE.A0000001. A properly constructed diskfile name will reference in this manner: \system.$volume.subvolume.filename. User Naming. Previous screen The Tandem naming convention for users is based on user groups and the users within the group. Names are viewed either by the numeric representation of <groupnumber>,<usernumber> or by the alphanumeric representation of <groupname>,<username>. The system tracks users by their numeric representations. There can be up to 256 user groups and up to 256 users in each group. Group or user numbering runs from 0 to 255. The naming of the groups and the users within the groups is arbitrary. Typically, users with similar job functions are placed in the same group, such as operations personnel, development personnel, or systems personnel. Once a group has been established, any new users that are added to the group must use the group name. Therefore, all users added to the group ACCT, or group number 140, must use the group name ACCT. The individual names within the group must be unique and must correspond to individual user numbers. Process Naming. All executing processes on a Tandem system are identified by the CPUs number in which they are running and by the process number that they began as in that CPUs. This is referred to as the PIN. The PIN is identified in the following format: <cpu number>,<process number>, or 0,15. Of and by themselves, PINs are not very descriptive; therefore, processes can also be started as named processes. Named processes are identified in the following format: $<process name>, or $ZSMP. Processes can also have subprocesses, which are identified as $<process name>.#<subprocess name>, or $S.#LPT. Device Naming. Devices are named in the SYStem GENeration configuration file. They are identified as $<device name>, or $TAPE. Devices can also have associated subdevices, which are named as $<device name>.#<subdevice name>, or $TAPE.#A01. Understanding Nonstop Guardian Security Tandem takes a three-tiered approach to security in its NonStop Guardian application: authentication, authorization, and auditing. Each of these tiers is discussed in the following sections. Authentication Authentication is the process in which users' requests for access are evaluated by the system. Tandem's screening process is based on a user hierarchy that groups users by job function and by the operations that the specific groups are authorized to perform. User Hierarchy. The Tandem user structure is hierarchical in design. The user ID 255,255is always placed at the top of the structure of any Tandem system. On most systems, this ID is called SUPER.SUPER. It is possible to change the name, but it is not possible to change the unique user ID of 255,255. Generically, this ID is referred to as the Super ID, and it is the ultimate ID on any Tandem system. Because it can perform any action on any object on the system, the Super ID is highly sensitive and its password must be protected. Group Managers form the next tier of the hierarchy. Group Managers have a subset of Previous screen the capabilities of the Super ID. Their range of influence is limited to the objects owned by users in their own groups. Within each group are the group members. Group members have the capability to perform many activities on the system, most of which are limited to objects owned by themselves.
Recommended publications
  • Multiple Instruction Issue in the Nonstop Cyclone System
    ~TANDEM Multiple Instruction Issue in the NonStop Cyclone System Robert W. Horst Richard L. Harris Robert L. Jardine Technical Report 90.6 June 1990 Part Number: 48007 Multiple Instruction Issue in the NonStop Cyclone Processorl Robert W. Horst Richard L. Harris Robert L. Jardine Tandem Computers Incorporated 19333 Vallco Parkway Cupertino, CA 95014 Abstract This paper describes the architecture for issuing multiple instructions per clock in the NonStop Cyclone Processor. Pairs of instructions are fetched and decoded by a dual two-stage prefetch pipeline and passed to a dual six-stage pipeline for execution. Dynamic branch prediction is used to reduce branch penalties. A unique microcode routine for each pair is stored in the large duplexed control store. The microcode controls parallel data paths optimized for executing the most frequent instruction pairs. Other features of the architecture include cache support for unaligned double­ precision accesses, a virtually-addressed main memory, and a novel precise exception mechanism. lA previous version of this paper was published in the conference proceedings of The 17th Annual International Symposium on Computer Architecture, May 28-31, 1990, Seattle, Washington. Dynabus+ Dynabus X Dvnabus Y IIIIII I 20 MBIS Parallel I I II 100 MbiVS III I Serial Fibers CPU CPU CPU CPU 0 3 14 15 MEMORY ••• MEMORY • •• MEMORY MEMORY ~IIIO PROC110 IIPROC1,0 PROC1,0 ROC PROC110 IIPROC1,0 PROC110 F11IOROC o 1 o 1 o 1 o 1 I DISKCTRL ~ DISKCTRL I I Q~ / \. I DISKCTRL I TAPECTRL : : DISKCTRL : I 0 1 2 3 /\ o 1 2 3 0 1 2 3 0 1 2 3 Section 0 Section 3 Figure 1.
    [Show full text]
  • Fault Tolerance in Tandem Computer Systems
    1'TANDEM Fault Tolerance in Tandem Computer Systems Joel Bartlett * Wendy Bartlett Richard Carr Dave Garcia Jim Gray Robert Horst Robert Jardine Dan Lenoski DixMcGuire • Preselll address: Digital Equipmelll CorporQlioll Western Regional Laboralory. Palo Alto. California Technical Report 90.5 May 1990 Part Number: 40666 ~ TANDEM COMPUTERS Fault Tolerance in Tandem Computer Systems Joel Bartlett* Wendy Bartlett Richard Carr Dave Garcia Jim Gray Robert Horst Robert Jardine Dan Lenoski Dix McGuire * Present address: Digital Equipment Corporation Western Regional Laboratory, Palo Alto, California Technical Report 90.5 May 1990 Part Nurnber: 40666 Fault Tolerance in Tandem Computer Systems! Wendy Bartlett, Richard Carr, Dave Garcia, Jim Gray, Robert Horst, Robert Jardine, Dan Lenoski, Dix McGuire Tandem Computers Incorporated Cupertino, California Joel Bartlett Digital Equipment Corporation, Western Regional Laboratory Palo Alto, California Tandem Technical Report 90.5, Tandem Part Number 40666 March 1990 ABSTRACT Tandem produces high-availability, general-purpose computers that provide fault tolerance through fail­ fast hardware modules and fault-tolerant software2. This chapter presents a historical perspective of the Tandem systems' evolution and provides a synopsis of the company's current approach to implementing these systems. The article does not cover products announced since January 1990. At the hardware level, a Tandem system is a loosely-coupled multiprocessor with fail-fast modules connected with dual paths. A system can include a range of processors, interconnected through a hierarchical fault-tolerant local network. A system can also include a variety of peripherals, attached with dual-ported controllers. A novel disk subsystem allows a choice between low cost-per-byte and low cost-per-access.
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • HP Nonstop Systems Deployments
    HP NonStop systems – as you haven’t seen them before HP NonStop systems as you haven’t seen them before Deployed in support of mission-critical applications in manufacturing and distribution, telecommunications, retail and wholesale banking, transportation and entertainment Richard Buckle Founder and CEO Pyalla Technologies, LLC Pyalla Technologies, LLC Page 1 HP NonStop systems – as you haven’t seen them before About the Author Richard Buckle is the founder and CEO of Pyalla Technologies, LLC. He has enjoyed a long association with the IT industry as a user, vendor, and more recently, as an industry commentator. Richard has over 25 years of research experience with HP’s NonStop platform, including eight years working at Tandem Computers, followed by just as many years at InSession Inc. and ACI Worldwide, as well as four years at Golden Gate, now a part of Oracle. Well known to the user communities of HP and IBM, Richard served as a Director of ITUG (2000-2006), as its Chairman (2004-2005), and as the Director of Marketing of the IBM user group, SHARE, (2007-2008). Richard provides industry commentary and opinions through his community blog as well as through his industry association and vendor blogs, web publications and eNewsletters. You can follow him at www.itug- connection.blogspot.com and at ATMmarketplace.com as well read his editorial, Musings on NonStop, published monthly in Tandemworld.net Pyalla Technologies, LLC Page 2 HP NonStop systems – as you haven’t seen them before Introduction The strength of NonStop systems has always been its support of real time, mission critical, transaction processing, starting out with an application built on a fault tolerant system continues to be the simplest way to assure its availability.
    [Show full text]
  • Atalla HSM & HPE Nonstop
    Data Security Overview GTUG – May 2018 Darren Burkey, Senior PreSales Consultant Atalla [email protected] The New Combined Company: built on stability, acquisition and innovation Network Management/ COBOL Data Protector 40 30 2 Years Years “Better Together” Portfolio Has Breadth and Depth Information Linux & DevOps IT Operations Cloud Security Governance Open Source Service Management, Cloud Service Digital Safe, Data Protector, Operations Bridge, Automation, Control Point, Data Center Hybrid Cloud Structured Data Manager, Automation, Management Storage Optimizer Network Management Mainframe Solutions, IT Operations Enterprise Linux, Management, OpenStack Private Cloud, Cobol Development, Host Connectivity, Identity-based Software-defined Software Delivery Collaboration Workload Migration Access Governance Storage and Testing and Security Big Data Analytics IDOL Data security portfolio: Voltage & Atalla Data privacy & security compliance Secure analytics, privacy and Hybrid cloud data protection & & risk reduction pseudonymization collaboration Voltage SecureData Enterprise, Big Data, Cloud, Mobile and Payments Data Security Tokenization, Encryption, Masking Voltage SecureMail Voltage SecureMail Cloud Easy, scalable email encryption Enterprise email encryption SaaS Atalla HSM Enterprise Secure Key Manager Payments crypto appliances & key storage KMIP Key Management for Storage, 3rd party apps 4 ® Atalla Product Overview History of Atalla • Established in 1972 • Mission: Protect financial transactions • Atalla introduced first
    [Show full text]
  • A Nonstop* Kernel Joel F. Bartlett Tandem Computers Inc. Cupertino
    A NonStop* Kernel Joel F. Bartlett Tandem Computers Inc. Cupertino, Ca. Abstract significantly expanded over its lifetime. The Tandem system is intended to fit these The Tandem NonStop System is a fault- requirements. tolerant [1], expandable, and distributed computer system designed expressly for i. Hardware Organization online transaction processing. This paper describes the key primitives of the kernel A network consists of up to 255 nodes. of the operating system. The first section Each node is composed of multiple processor describes the basic hardware building and I/O controller modules interconnected blocks and introduces their software by redundant buses [2,3] as shown in PMS analogs: processes and messages. Using [3] notation in Figure i. A node consists these primitives, a mechanism that allows of two to sixteen processors, where each fault-tolerant resource access, the processor (Pcentral) has its own power process-pair, is described. The paper supply, memory, backup battery, and I/O concludes with some observations on this channel (Sio). All processors are type of system structure and on actual use interconnected by redundant interprocessor of the system. buses (Sipb). Each I/O controller (Kdisc, Ksync, etc.) is connected to two I/O channels and is powered from two different Introduction power supplies using a diode ORing scheme. Fault-tolerant computing systems have been Finally, dual-ported I/O devices such as built over the last two decades in a number discs (Tdisc) may be connected to a second of places to satisfy a variety of goals. I/O controller. The contents of a disc may These results and differing approachs have be "mirrored" on a second volume, but this been summarized in [1,3,11].
    [Show full text]
  • Why Do Computers Stop and What Can Be Done About It?
    "1,TANDEMCOMPUTERS Why Do Computers Stop and What Can Be Done About It? Jim Gray Technical Report 85.7 June 1985 PN87614 Why Do Computers Stop and What Can Be Done About It? Jim Gray June 1985 Tandem Technical report 85.7 Tandem TR 85.7 Why Do Computers Stop and What Can Be Done About It? Jim Gray June, 1985 Revised November, 1985 ABSTRACT An analysis of the failure statistics of a commercially available fault-tolerant system shows that administration and software are the major contributors to failure. Various approachs to software fault- tolerance are then discussed notably process-pairs, transactions and reliable storage. It is pointed out that faults in production software are often soft (transient) and that a transaction mechanism combined with persistent process-pairs provides fault-tolerant execution -- the key to software fault-tolerance. DISCLAIMER This paper is not an "official" Tandem statement on fault-tolerance. Rather, it expresses the author's research on the topic. An early version of this paper appeared in the proceedings of the German Association for Computing Machinery Conference on Office Automation, Erlangen, Oct. 2-4, 1985. TABLE OF CONTENTS Introduct ion 1 Hardware Availability by Modular Redundancy....•.•.....•..•..•• 3 Analysis of Failures of a Fault-tolerant System•.••......•••.•. 7 Implications of the Analysis of MTBF ...•••.•.•••••...•........ 12 Fault-tolerant Execution 15 Software Modularity Through Processes and Messages 16 Fault Containment Through Fail-Stop Software Modules 16 Software Faults Are Soft, the Bohrbug-Heisenbug Hypothesis.17 Process-pairs For Fault-tolerant Execution 20 Transactions for Data Integrity..•......................... 24 Transactions for Simple Fault-tolerant Execution 25 Fault-tolerant Communication .......•..•.....•.•.•.•.•.•......
    [Show full text]
  • Tandem Computers Unplugged: a People's History
    Tandem Computers Unplugged: A People’s History company’s leadership in general and the charisma oF Jimmy Treybig, the company’s key Founder, in specific? Again a resounding yes, but not entirely as Jimmy hasn’t been the only charismatic leader in Silicon Valley - a number come to mind. Was it because oF the company’s offbeat corporate culture such as no private parking places, an on campus swimming pool and oF course the inFamous beer busts. Well yes, but!!! How can it be that over 16 years since From an insiders point of view it was its merger with Compaq and nearly a all oF these things wrapped in a decade since it’s reabsorption back cocoon of an integrated corporate into Hewlett Packard a vibrant and value system that permeated all active online Tandem Computers corners oF the company, world wide alumni community still exists on and deeply touched the souls and Yahoo!Groups and Linked In? How can minds oF all employees through the it be that in many countries in the good and bad times. world groups oF Tandem Alumni still get together in local pubs or other Tandem Computers Unplugged – A types oF venues at least yearly? How People’s History is an attempt to can it be that many Former employees capture not just the history of an maintain their collection oF T-shirts, important foundational contributor to double-handled cups, pens, and what is today’s Silicon Valley, but to trophies almost like shrines oF some share the experience through the eyes kind? How can it be that so many and hearts oF the employees and employees when asked to look back through this process bring to light on their working liFe almost to a some oF the important ‘lessons person claim that working at Tandem learned’ about how to manage and was one oF the best places they have motivate talent.
    [Show full text]
  • Dennis Adams Associates Tandem Concepts
    Dennis Adams a s s o c i a t e s Tandem Concepts: An Introduction for UNIX techies Introduction This document was prepared from some investigation work on the Tandem Non-Stop system. Background to Tandem Tandem was founded as a company to develop fault-tolerant systems in 1976 by ex-Hewlett Packard engineers, and the first Tandem NonStop system was based on HP3000 CPUs with a custom bus called Dynabus to provide fault-tolerance of the I/O and CPU. The Operating System was called Guardian, which implemented message passing on a common stack to ensure resilience. The key architecture of Tandem is the (RPC-like) message-passing mechanism. The kernel automatically re-routes a message from a failing component to a functioning one. This same approach is used both within a system and between systems. In 1983, the FOX fibre-optic interconnect was launched which enabled up to 14 individual nodes to participate in a closely coupled network and share workloads between them. In 1986, FOX II enabled the network to be up to 4 Km distance, as well as introducing NonStop VLX, which increased the Dynabus speed from 13 to 40 MB/s. The same year, NonStop SQL was introduced. 1991 saw the first of several changes of architecture, with the introduction of the MIPS CPU, later replaced by the MIPS R4400 in the NonStop Himalaya K-Series in 1993. Tandem computers introduced the S-Series in 1997. This replaced Dynabus and FOX with a new ServerNet interconnect. ServerNet is a true peer-to-peer network (instead of the ring protocol of the earlier networks) and is the basis of the InfiniBand interconnect architect.
    [Show full text]
  • Strategic Interactions in Dram and Risc Technology: a Network Approach
    Strategic interactions in dram and risc technology: A network approach Geert Duysters & Wim Vanhaverbeke 93.023 September 1993 MERIT, P.O. Box 616, 6200 MD Maastricht (Netherlands) - telephone (31)43-883875- fax: (31)43-216518 1 STRATEGIC INTERACTIONS IN DRA AND RISC TECHNOLOGY: A NETWORK APPROACH Geert Duysters and WiI Vanhaverbeke1 INTRODUCTION Cooperative agreements have been ignored in business literature for a veiy long time. Only recently, the use of cooperative agreements as part of corporate strategies gained substantial interest. This increase in attention is above all due to the fact that in the last decade the number of cooperative agreements by firms has rocketed. In fact cooperative agreements have outnumbered the fully owned foreign subsidiaries (Contractor and Lorange, 1988). In this paper we will use the term cooperation to denote cooperative agreements between partners which are not connected through (majority) ownership. A cooperative agreement can be seen as an agreement which is positioned between two extremes, arm's length transactions on the one hand and the merger of the two firs on the other hand. Cooperation among companies is usually analyzed in strategic management literature on the dyadic level or on the level of the partcipating firs. Only recently, interest by economists has grown to study cooperative efforts of firs within an inter-organisational network framework (see e.g. Hagedoom and Schakenraad. 1990, 1992, 1993). In high- tech industries where almost all incumbents are linked to each other by means of a network of cooperative agreements, an analysis on the level of the individual players or allances is not appropriate to understand the strategic value of cooperative strategies.
    [Show full text]
  • Software Fault Tolerance in Computer Operating Systems
    Chapter 11 in Software Fault Tolerance, Michael Lyu, Ed., Wiley, 1995. NASA-CR-1 97999 (NASA-CR-197999) SOFTWARE FAULT N95-24993 TOLERANCE IN COMPUTER OPERATING SYSTEMS (Illinois Univ.) 30 p G3/61 0045355 11 Software Fault Tolerance in Computer Operating Systems RAVISHANKAR K. IYER and INHWAN LEE University of Illinois at Urbana-Champaign ABSTRACT This chapter provides, data and analysis of the dependability and fault tolerance for three operating systems: the Tandem/GUARDIAN fault-tolerant system, the VAX/VMS distributed system, and the IBM/MVS system. Based on measurements from these systems, basic software error characteristics are investigated. Fault tolerance in operating systems resulting from the use of process pairs and recovery routines is evaluated. Two levels of models are developed to analyze error and recovery processes inside an operating system and interactions among multiple instances of an operating system running in a distributed environment. The measurements show that the use of process pairs in Tandem systems, which was originally intended for tolerating hardware faults, allows the system to tolerate about 70% - of defects in system software that result in processor failures. The loose coupling between processors which results in the backup execution (the processor state and the sequence of events occurring) being different from the original execution is a major reason for the measured software fault tolerance. The IBM/MVS system fault tolerance almost doubles when recovery routines are provided, in comparison to the case in which no recovery routines are available. However, even when recovery routines are provided, there is almost a 50% chance of system failure when critical system jobs are involved.
    [Show full text]
  • 1 Fault Tolerance & Reliability CDA 5140 Chapter 3 – RAID & Sample
    Fault Tolerance & Reliability CDA 5140 Chapter 3 – RAID & Sample Commercial FT Systems - basic concept in these, as with codes, is redundancy to allow system to continue operation even if some components fail - hot standby refers to components that can fail, being associated with components that run in parallel (i.e. powered up) and can take over upon a failure - cold standby refers to having just one component powered up and others available but powered down (standby) that can be powered up upon detection of failure - once one standby takes over upon failure, either repair the failed unit or replace it, before the new operating component can fail - various techniques for improving system/component reliability: o improve manufacturing or design process to decrease component failure rate o parallel redundancy – sometimes synchronization, if multiple parallel components, can be difficult o cold standby can require complex switching o stage of repairing or replacing components is important RAID - increase of performance for processors & main memory has received considerable attention, unlike secondary storage - secondary storage is primarily a mechanical process & hence performance can only be pushed so far without using multiple parallel components - RAID, redundant arrays of independent disks, provides arrays of disks that can operate independently and in parallel, and is an industry standard so can be used on different platforms and operating systems - if data is on separate disks, then I/O requests can be done in parallel 1 - levels
    [Show full text]