Assessing Asymmetric Fault-Tolerant Software

Assessing Asymmetric Fault-Tolerant Software

Assessing asymmetric fault-tolerant software Peter Popov, Lorenzo Strigini Centre for Software Reliability City University London United Kingdom [email protected], [email protected] Abstract — The most popular forms of fault tolerance against components in these systems. But this research has been design faults use "asymmetric" architectures in which a mostly limited to “symmetric” architectures: “multiple "primary" part performs the computation and a "secondary" version software” and similar schemes, in which two or part is in charge of detecting errors and performing some kind more diverse, redundant components perform equivalent of error processing and recovery. In contrast, the most studied functions and their outputs are “adjudicated” (by voting or forms of software fault tolerance are "symmetric" ones, e.g. N- some other algorithm, built into the computer system or the version programming. The latter are often controversial, the physical controlled systems) to decide which values will be former are not. We discuss how to assess the dependability output to the controlled system. Such architectures are gains achieved by these methods. Substantial difficulties have important for some highly critical applications, but also been shown to exist for symmetric schemes, but we show that expensive and relatively rare. In most systems, fault the same difficulties affect asymmetric schemes. Indeed, the latter present somewhat subtler problems. In both cases, to tolerance against design faults takes the form of predict the dependability of the fault-tolerant system it is not “asymmetric” architectures, in which a “primary” enough to know the dependability of the individual component (we will often use the term “primary” alone for components. We extend to asymmetric architectures the style brevity) performs the required computation, and other of probabilistic modeling that has been useful for describing components perform error detection, trigger error correction the dependability of "symmetric" architectures, to highlight and state recovery mechanisms, or steer the system to a safe factors that complicate the assessment. In the light of these state, and so on. These architectures are so commonplace models, we finally discuss fault injection approaches to that a list of examples could easily become endless. estimating coverage factors. We highlight the limits of what Asymmetric fault-tolerant schemes are found at all levels of can be predicted and some useful research directions towards details in designs, from run-time checks within any program clarifying and extending the range of situations in which or component thereof, to watchdog applications that monitor estimates of coverage of fault tolerance mechanisms can be the whole visible behavior of a complex system for failures, trusted. or for safety-relevant failures. Here we are interested in the probability of system failure (that is, a failure of the primary Keywords-software fault tolerance; checker coverage; fault component that the fault-tolerant mechanisms fail to tolerate injection; dependability benchmarking or mitigate as desired) in these architectures. Despite the huge variation in the details of these systems, we are I. INTRODUCTION interested at first in discussing them at a level of abstraction Fault tolerance against design flaws is widely recognized at which they are substantially similar. to be desirable, in particular in view of the increasing We consider the assessment of these systems. One can dependence on off-the-shelf software for even critical measure reliability of any system by long enough applications [1]. observation of operation or realistic testing. But for critical We address here the problem of assessing the applications, there is normally a need to predict dependability gains achieved by these forms of fault dependability before a long enough period of observation tolerance. There has been a large amount of work on using reliability models and estimation of component modelling the effectiveness of “software fault tolerance”1 reliability parameters. For symmetric systems, a major (see [2] for a review and www.csr.city.ac.uk/diversity for difficulty has been found, in that such shortcuts as assuming more recent research), to understand what advantages can in failure independence between redundant components are not theory be expected from it and how these can be pursued justified [2]. For asymmetric systems, the preferred models through the development process. These models have rely on coverage factors, which could be estimated from helped the understanding of the factors that determine the field measurements (but with some difficulties) or by fault probability of common mode failures between redundant injection. One of our concerns is that the difficulties in assessing 1 Most of the literature refers to software, although fault tolerance the dependability of symmetric systems are widely against hardware design faults is a recognised need. For instance, both recognised, but the methods for assessing asymmetric main manufacturers of large fly-by-wire airliners, Airbus and Boeing, use systems are not usually subjected to the same degree of redundant, diverse processors for flight-critical software. scrutiny. We develop here a model to help with this more quantitative statements quoted, informal judgments scrutiny, and apply it to practical scenarios with asymmetric like these, when applied to the merits of symmetric software systems. fault-tolerance, have at times been found to be misleading. We emphasize that we do not argue for or against any For instance, it seems reasonable to many that specific architecture, symmetric or asymmetric. Our focus is independently developed software channels are likely to fail on highlighting often ignored difficulties in the means for independently in operation, but this has been shown to be assessing asymmetric systems. unfounded both empirically [4] and theoretically [5]. We For the sake of simplicity, we will refer our initial will apply to asymmetric software the modeling approach discussion of asymmetric systems to a single practical first applied by Eckhardt and Lee [5] to the critique of example: checkers, i.e., error detection mechanisms (which symmetric fault tolerance, hoping to clarify possible sources are common to almost all forms of asymmetric fault of fallacies in intuitive judgments. tolerance), although the necessary reasoning will be very The questions to which designers or assessors may need similar for e.g. error recovery mechanisms. answers include, for instance: how much of a dependability The rest of the paper is organized as follows. Section 2 gain would I achieve for my system by adding a particular discusses primary-checker systems and introduces a basic checker? How effective are checkers of a certain category, model and some necessary notations. In section 3 we state for applications in general? What is the effective the practical problems we would like to address in this dependability of a specific system, which uses checkers for paper. In section 4 we present probabilistic models of fault tolerance? asymmetric fault tolerance. In section 5 we discuss the The problem of assessing the coverage of checker implications of the models for the problems stated in section software has been attacked empirically, through fault 3. In section 6 we summarize our findings, their limitations injection [6], [7] and its application to so-called and outline directions for future research. “dependability benchmarking” [8], [9]. Researchers are aware of the difficulties of selecting representative samples II. PRIMARY-CHECKER SYSTEMS of faults and of extrapolating from measurements that are inevitably based on non-perfectly representative samples A. Checkers in software engineering [8], [9], [10] , [11]. With respect to these efforts, we wish to While N-version programming has been hugely define more formally the issues of prediction, and of controversial, with both its cost-effectiveness and its sampling of faults and errors. effectiveness being questioned, the use of checkers is commonly accepted as self-evidently good practice. Many B. Model of asymmetric faut tolerant systems authors in software engineering do not even mention that We choose for analysis the simplest model of an checkers are a part of fault tolerance, and that knowledge asymmetric fault-tolerant system: a single asymmetric fault- from the fault tolerance literature applies to them, e.g., about tolerant component (FTC) made up of two components, a the importance of coverage factors2 (the probability of the primary and a checker (Figure 1). We assume that the checker flagging a failure of the primary, conditional on the operation of the primary and the checker is naturally failure occurring), and the risk that adding fault-tolerant described in a discrete time frame: the primary performs features to a system may reach a point of diminishing, or some operation, and succeeds or fails in it; the checker even negative, returns. A plausible reason for this general checks whether the primary succeeded or failed, and it in trust in checkers is a belief in simplicity. Checkers only turn may succeed or fail; how exactly its output is used is need to verify the results of the primary’s computation, not not important at this stage. The dependability measures of to replicate them. So, they are often simpler than extra interest are probabilities of failure per demand (pfd). versions of the primary would be, and thus cheaper and easier to

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us