A Two Tier Approach To Building Dependable Middleware Services

نویسنده

  • P. D. Ezhilchelvan
چکیده

1. Introduction We consider the problem of building middleware that facilitates service replication over a wide area network (e.g., the Internet) where service replicas are typically placed in different, geographically wide-apart locations. Several group communication protocols have been proposed in the literature, some have even been implemented ([C98, DM96, Moser96, VKM96]). However, many of the implemented services assume that processes fail in a benign manner: either by crashing or by occasionally failing to produce a response. Field and experimental data collected indicates that the benign fault assumption is not robust enough for critical applications: there is a non-negligible risk that faults can cause memory corruption which, before being detected or resulting in a system crash, can cause a process to produce erroneous outputs. Software faults are known to cause data corruption [CC98, SC91]. A paper analyzing software defect reports collected between 1986 and 1989 for the IBM MVS operating system showed that 15% to 25% of faults (referred to as 'overlay faults' in the paper) caused corruption of data [SC91]. Secondly, the impact of these faults was much more serious than the remaining faults. Thirdly, only 39% of the overlay faults were detected as addressing violations. A fault injection experiment to determine 'how fail stop are faulty programs', indicated that 7% of failures led to corruption of data [CC98]. Hardware faults can also lead to memory corruption. The design proposal submitted to US FAA [CDD96] assumed hardware failure modes to be benign, only with a caveat that 'an extensive error detecting/correcting mechanisms be embodied in the chosen hardware components (such as processors, memory, and networking components'. Enforcing this caveat severely restricts the use of wide ranging 'commercial off-the-shelf' (COTS) components available for building cost-effective commercial systems. If COTS processors are used then, even with extensive error detection facilities, it is very hard to eradicate faults that can cause corruption (see [Stott01]] for a comparison between error detection mechanisms and replication in COTS processors). In addition to the possibility of COTS components developing faults of less benign types, there is also a risk that faults can be introduced by adversaries who exploit the inherent security flaws. This cannot be ruled out in the context of service provisioning over a wide area network. It appears therefore that middleware systems, at least in certain application contexts, are expected to cope with Byzantine faults and skilled abuse of inherent security flaws. We attempt to …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building Middleware for Real-Time Dependable Distributed Services

We consider a real-time, distributed service to be dependable if it continues to have timely, predictable behavior even in the presence of partial failures. Services with this property are desirable in a host of real-time scenarios, including factory floor automation, medical monitoring equipment, and combat systems. Most distributed services built with contemporary fault-tolerance toolkits are...

متن کامل

WSMB: a middleware for enhanced Web services interoperability

Service-Oriented Architecture (SOA) using Web services is considered as the state-of-the-art approach to support interoperability between distributed systems and therefore facilitates complex interactions between heterogeneous and autonomous systems both within the enterprise and for cross-organizational collaboration. Message-based interactions are seen as the core building block in this new d...

متن کامل

Dependable Grid Services: A Case Study with OGSA-DAI

Grid middleware usually makes use of several software modules that due to their complexity and development approach may have some latent bugs and leaks. These bugs can cause visible performance failures and undesired service crashes. To cope with this sort of transient failures we present a proactive software rejuvenation approach that exploits the use of virtualization middleware. To prove the...

متن کامل

Enhancing Availability of Cooperative Applications Through Interoperable Middleware

Cooperative information systems are characterized by distribution, high heterogeneity and scale. Therefore they require interoperable, dependable services on top of which the development of cooperative application can take place. This paper studies, in the context of the Unitary Network of the Italian Public Administration, the problem of increasing the availability of the services exported by ...

متن کامل

Dependable Service Engineering: A Fault-tolerance based Approach

This paper is concerned with the engineering of dependable web services. We have developed an approach based on deploying existing web services within a middleware framework so that they are fault tolerant. Our approach is independent of the services themselves and may be configured to support a range of different fault tolerance mechanisms. Central to the approach are what we call fault tolera...

متن کامل

Two-tier Supplier Base Efficiency Evaluation Via Network DEA: A Game Theory Approach

In today's competitive markets, firms try to reduce their supply cost by selecting efficient suppliers using different techniques. Several methods can be applied to evaluate the efficiency of supplier base. This paper develops generalized network data envelopment analysis models to examine the efficiency of two-tier supplier bases under cooperative and non-cooperative strategies where each tier...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002