Exercises for Course 4.10 Dependability and Security Evaluation of Computer-based Systems

ثبت نشده
چکیده

Exercise 1 Let us consider a system composed of n different components denoted 1, 2 ……n, with m identical replicas of each component. Two redundancy strategies are studied:-GR, in which redundancy is applied globally at the system level: the architecture is composed of m identical copies of the system that are organized according to a parallel structure.-LR, in which redundancy is applied locally at the level of each component. Let us denote by r i (t) the reliability function of component i. The components are assumed to fail according to independent stochastic processes. 1) Derive the system reliability functions R GR (t) and R LR (t) corresponding to the two considered redundancy strategies, as a function of r i (t). 2) Consider the case m = n = 2 and r i (t) = r(t) Compare R GR (t) and R LR (t). Exercise 2 Let us study the two following architectures I and II. 1) Build a Fault Tree describing the failure scenarios associated to each architecture. 2) The reliability functions r(t) associated to the components are assumed to be identical and exponentially distributed with a constant failure rate λ. For each architecture, derive the system failure rate and mean time to failure (MTTF).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling and Evaluation of Stochastic Discrete-Event Systems with RayLang Formalism

In recent years, formal methods have been used as an important tool for performance evaluation and verification of a wide range of systems. In the view points of engineers and practitioners, however, there are still some major difficulties in using formal methods. In this paper, we introduce a new formal modeling language to fill the gaps between object-oriented programming languages (OOPLs) us...

متن کامل

Modeling and Evaluation of Stochastic Discrete-Event Systems with RayLang Formalism

In recent years, formal methods have been used as an important tool for performance evaluation and verification of a wide range of systems. In the view points of engineers and practitioners, however, there are still some major difficulties in using formal methods. In this paper, we introduce a new formal modeling language to fill the gaps between object-oriented programming languages (OOPLs) us...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

TEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach

Increasing awareness of the vulnerabilities of computer systems has led to the introduction of several programs in computer security. Many of these programs are meant to attract graduate students. Southern Oregon University has recently started a new undergraduate track in computer security and information assurance (CSIA). The curriculum is first of its kind in Oregon to be available at the un...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009