Advertisement

System Structure for Dependable Software Systems

  • Vincenzo De Florio
  • Chris Blondia
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6784)

Abstract

Truly dependable software systems should be built with structuring techniques able to decompose the software complexity without hiding important hypotheses and assumptions such as those regarding their target execution environment and the expected fault- and system models. A judicious assessment of what can be made transparent and what should be translucent is necessary. This paper discusses a practical example of a structuring technique built with these principles in mind: Reflective and refractive variables. We show that our technique offers an acceptable degree of separation of the design concerns, with limited code intrusion; at the same time, by construction, it separates but does not hide the complexity required for managing fault-tolerance. In particular, our technique offers access to collected system-wide information and the knowledge extracted from that information. This can be used to devise architectures that minimize the hazard of a mismatch between dependable software and the target execution environments.

Keywords

Memory Cell Fault Model Exception Handling Design Concern Resilience Engineering 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Intelligent content in FP7 3rd ITC Call, http://www.cordis.europa.eu/ist/kct/eventcall3-in-motion.htm
  2. 2.
    Randell, B.: System structure for software fault tolerance. IEEE Trans. Software Eng. 1, 220–232 (1975)CrossRefGoogle Scholar
  3. 3.
    De Florio, V.: Software Assumptions Failure Tolerance: Role, Strategies, and Visions. In: Casimiro, A., de Lemos, R., Gacek, C. (eds.) Architecting Dependable Systems VII. LNCS, vol. 6420, pp. 249–272. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  4. 4.
    De Florio, V., Blondia, C.: Reflective and refractive variables: A model for effective and maintainable adaptive-and-dependable software. In: Proc. of the 33rd EUROMICRO SEAA Conference, Lübeck, Germany (August 2007)Google Scholar
  5. 5.
    Mplayer — the movie player (2008), http://www.mplayerhq.hu/design7/info.html
  6. 6.
  7. 7.
    De Florio, V. et al.: \({\mathcal{R}}\!\raise2pt\hbox{$\varepsilon$}\!\hbox{$\mathcal L$}\): A fault tolerance linguistic structure for distributed applications. In: Proc. of ECBS 2002, Lund, Sweden (April 2002)Google Scholar
  8. 8.
    De Florio, V.: A Fault-Tolerance Linguistic Structure for Distributed Applications, Doctoral dissertation, Dept. of Electrical Engineering, University of Leuven, Belgium (October 2000) ISBN 90-5682-266-7Google Scholar
  9. 9.
    De Florio, V., Blondia, C.: On the requirements of new software development. International Journal of Business Intelligence and Data Mining 3(3) (2008)Google Scholar
  10. 10.
    Tirumala, A., et al.: Measuring end-to-end bandwidth with iperf using web100. In: Proc. of the Passive and Active Measurement Workshop (2003)Google Scholar
  11. 11.
    De Florio, V., et al.: Software tool combining fault masking with user-defined recovery strategies. IEE Proc. Software 145(6), 203–211 (1998)CrossRefGoogle Scholar
  12. 12.
    Bondavalli, A., et al.: Threshold-based mechanisms to discriminate transient from intermittent faults. IEEE Trans. on Computers 49(3), 230–245 (2000)CrossRefGoogle Scholar
  13. 13.
    Hollnagel, E., Woods, D.D., Leveson, N.G.: Resilience engineering: Concepts and precepts. Aldershot, UK, Ashgate (2006)Google Scholar
  14. 14.
    Leveson, N.G.: Safeware: Systems Safety and Computers. Addison, London (1995)Google Scholar
  15. 15.
    Maes, P.: Concepts and experiments in computational reflection. In: Proc. of OOPSLA 1987, Orlando, FL, pp. 147–155 (1987)Google Scholar
  16. 16.
    Kiczales, G., des Rivières, J., Bobrow, D.G.: The Art of the Metaobject Protocol. The MIT Press, Cambridge (1991)Google Scholar
  17. 17.
    DuPont, J.M.: Introspector, http://www.introspector.sourceforge.net
  18. 18.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Vincenzo De Florio
    • 1
    • 2
  • Chris Blondia
    • 1
    • 2
  1. 1.Department of Mathematics and Computer Science Performance Analysis of Telecommunication Systems groupUniversity of AntwerpAntwerpBelgium
  2. 2.Interdisciplinary Institute for Broadband Technology (IBBT)Ghent-LedebergBelgium

Personalised recommendations