A User -Perceived Availability Evaluation of a Web-based Travel Agency
|
|
- Edith Lester
- 5 years ago
- Views:
Transcription
1 A User -Perceived Availability Evaluation of a Web-based Travel Agency Mohamed Kaâniche, Karama Kanoun, Magnos Martinello Partially supported by the European Community, DSoS - Project IST DSN-2003, IPDS, June 2003, San Francisco, CA, USA
2 Context and motivations Assess the impact of failures on the quality of service provided to the users User 2 Supplier 1 Supplier 2 External Suppliers Support e-business system designers in making objective architectural decisions User 1 Internet Supplier n Hierarchical modeling framework e-business service provider Case study: Travel agency e-business key players 2
3 Context and motivations Assess the impact of failures on the quality of service provided to the users Support e-business system designers in making objective architectural decisions User 1 Flight Flight Flight reservation reservation system system system AF, KLM, BA, User 2 External Suppliers Hotel Hotel Hotel reservation reservation system system system Sheraton, Sofitel Car Hotel Hotel reservation reservation system system Hertz, Visa Internet Hierarchical modeling framework Case study: Travel agency Web-based Travel Agency 3
4 Hierarchical modeling framework User User operational profile level User 1 User 2 User k A(user 1 ) A(user N ) Availability modeling at the user level Function level Service level Resource level functions invoked by the users F1 F2 Fn Internal & external services implementing functions and their interactions e-business provider Si 1 External suppliers Si 2 Si m Se 1 Se 2 Architecture on which the services are implemented e-business provider Ri 1 Se p External suppliers Ri 2 Ri k Re 1 Re 2 E-business system description Re p A(F 1 ) A(Si 1 ) A(Ri 1 ) A(F n ) Availability modeling at the function level A(Si k ) Availability modeling at the service level A(Ri m ) Availability modeling at the resource level A(Se 1 ) A(Se p ) A(Re p ) A(Re 1 ) E-business availability modeling 4
5 Function and User levels Home p 12 p 32 p 27 p 47 p 24 Start Exit Book p 54 Search p 57 p 56 p 45 p 34 p 44 p 23 p 37 p 67 Pay p 13 Browse User 1 User 2 User k User level p 33 F1 F2 Fn Function level p ij Probability of invoking Fj after Fi Functions invoked from Start to Exit User scenario Service level internal external Si 1 Si 2 Si m Se 1 Se 2 Se p Resource level internal external Ri 1 5 Ri 2 Ri k Re 1 Re 2 Re p
6 User execution scenarios User scenario 1: Start-Home-Exit 2: Start-Browse-Exit 3: Start-{Home; Browse}*-Exit 4: Start-Home-Search-Exit 5: Start-Browse-Search-Exit 6: Start-{Home; Browse}*-Search-Exit 7: Start-Home- {Search-Book}*-Exit 8: Start-Browse- {Search-Book}*-Exit 9: Start-{Home; Browse}*- {Search-Book}*-Exit 10: Start-Home- {Search-Book}*-Pay-Exit 11: Start-Browse- {Search-Book}*- Pay-Exit 12: Start-{Home - Browse}*- {Search-Book}*- Pay-Exit Class A (%) Class B (%)
7 User execution scenarios User scenario Class A (%) Class B (%) 1: Start-Home-Exit : Start-Browse-Exit SC : Start-{Home; Browse}*-Exit : Start-Home-Search-Exit : Start-Browse-Search-Exit SC : Start-{Home; Browse}*-Search-Exit : Start-Home- {Search-Book}*-Exit : Start-Browse- {Search-Book}*-Exit } } } SC : Start-{Home; Browse}*- {Search-Book}*-Exit } 10: Start-Home- {Search-Book}*-Pay-Exit 11: Start-Browse- {Search-Book}*- Pay-Exit SC4 12: Start-{Home - Browse}*- {Search-Book}*- Pay-Exit % 20.3% 7
8 Service and function levels Internal services External services Web Application Database Flight Hotel Car Payment Home Browse Search Book Pay Browse End WS q 5,6 End User 1 User 2 User k User level q 1 2 2,3 q 4,5 4 7 Begin Function level F1 F2 Fn Service level WS AS DS AS WS Si 2 Si m Se 1 Se 2 End q 1,2 q 2,4 q 4,7 q 7,8 q 8,9 q 9,10 Si 1 internal Ri 1 internal external 8 Se p Resource level external Ri 2 Ri k Re 1 Re 2 Re p
9 Service and Resource levels External service: modeled as a black box Internal services: detailed analysis of e-business provider architecture solutions o Organization of services on the hardware support Dedicated hosts for each server Multiple servers on the same host o Fault tolerance strategies Non-redundant servers Replicated servers o Maintenance policies Dedicated Shared repair resources Immediate Delayed maintenance o Fault assumptions permanent, transient Si 1 User 1 F1 internes User 2 F2 User k User level Function level Fn Service level externes Si 2 Si m Se 1 Se 2 Se p Ri 1 Resource level internes externes 9 Ri 2 Ri k Re 1 Re 2 Re p
10 Resource level: TA example E-business Provider site Disk Database server Application server Web server Flight reservation Flight component reservation system #N F component system #1 Internet Flight reservation Car component reservation system #N C component system #1 Hotel reservation component system #1 #N H Basic architecture Payment server Redundant architecture D1 D2 Database server 1 Database server 2 Application server 1 Application server 2 Web server 1 Web server 2 Web server N W 10
11 TA availability modeling User level Two operational profiles: A, B Function level Home, Browse, Search, Book, Pay Internal WS, AS, DS Internal Basic architecture Redundant architecture Perfect coverage Imperfect coverage Service level External Flight, Hotel, Car, Pay Resource level External Flight res. system: A Fi i = 1.. N F Hotel res. system: A Hi i = 1.. N H Car res. system: A Ci i = 1.. N C Payment: APS, Network: Anet 11
12 Web service: Modeling approach Composite Availability-Performance model System states resulting from hardware and software failures and recoveries System behaviour resulting from request arrival/service processes conditioned on system states A(Web service) = 1 - Prob. {WS in a down state or overloaded} 12
13 Web service: Modeling example Redundant architecture: imperfect coverage o Availability model N w cλ (N w -2) cλ 2cλ λ N w N w -1 N w µ µ µ µ µ β β β N w (1-c)λ 2 (1-c)λ y Nw -1 y Nw -2 y 2 0 o Performance model: M/M/i/K p K (i): probability a request rejected in state i due to WS buffer full A(Web service) = 1" % Nw Nw"2 ' $ p K (i) + $ # y + # & i o ( # i i=1 i=1 13
14 Evaluation results: example A(WS) α = 50/sec α = 100/sec λ = 10-2 /h 10-5 λ = 10-3 /h 10-6 λ = 10-4 /h Number of web servers (Nw) Redundant architecture: imperfect coverage 14
15 User level availability Composition o Service and Function level availabilities o Operational profile N F = N H = N C A (A users) A (B users) User perceived unavailability 173 hours/year 190 hours/year 15
16 User level availability User perceived Unavailability UA(SC2) UA(SC4) 10-3 UA(SC3) NF=NH=NC 16 hours downtime per year UA(A users) UA(SC1) SC4: Scenarios that end up with a payment UA(B users) UA(SC2) UA(SC3) UA(SC4) UA(SC1) NF=NH=NC 43 hours downtime per year 570 Million Loss of revenue 1.55 Billion Transaction rate: 100per sec Revenue per transaction:
17 Conclusion Contribution o Hierarchical modeling framework user perceived availability o Example: travel agency Illustration of the main concepts of the proposed framework Examples of dependability analysis results to support design solutions State of the art o Measurement-based evaluation o Modelling:performance oriented Extensions to handle more complex assumptions 17
SoS Dependability Assessment: Modelling and Measurement
DSoS IST-1999-11585 Dependable Systems of Systems SoS Dependability Assessment: Modelling and Measurement Report Version: Deliverable CSDA3 Report Preparation Date: October 2002 Classification: Public
More informationA User-Perceived Availability Evaluation of a Web Based Travel Agency
A User-Perceived Availability Evaluation of a Web Based Travel Agency Mohamed Kaâniche, Karama Kanoun, and Magnos Martinello * LAAS-CNRS 7 Avenue du Colonel Roche 31077 Toulouse Cedex 4 France {Mohamed.Kaaniche,
More informationA framework for modeling availability of E-business systems
A framework for modeling availability of E-business systems Mohamed Kaâniche, Karama Kanoun, Mourad Rabah To cite this version: Mohamed Kaâniche, Karama Kanoun, Mourad Rabah. A framework for modeling availability
More informationDependability Modeling Based on AADL Description (Architecture Analysis and Design Language)
Dependability Modeling Based on AADL Description (Architecture Analysis and Design Language) Ana Rugina, Karama Kanoun and Mohamed Kaâniche {rugina, kanoun, kaaniche}@laas.fr European Integrated Project
More informationVirtualization and High-Availability
Virtualization and High-Availability LAAS, 30 Novembre 2009 François Armand OpenWide, Université Paris 7 francois.armand@openwide.fr Agenda Reminder about virtualization, HA, SA Forum HA challenge introduced
More informationIncluding Failure Correlation in Availability Modelling of a Software-Defined Backbone Network
1 Including Failure Correlation in Availability Modelling of a Software-Defined Backbone Network Gianfranco Nencioni, Bjarne E. Helvik and Poul E. Heegaard Department of Information Security and Communication
More informationFault tolerance and Reliability
Fault tolerance and Reliability Reliability measures Fault tolerance in a switching system Modeling of fault tolerance and reliability Rka -k2002 Telecommunication Switching Technology 14-1 Summary of
More informationThe Wi-Fi Roaming Game
The Wi-Fi Roaming Game October 26, 2007 David R. Cheriton School of computer Science, Ontario, Canada Punch Line Users sensitivity to bandwidth (and possibly delay) affects their Internet bills. The right
More informationIntelligent Fault Diagnosis and Recovery in Power Electronic Systems
Intelligent Fault Diagnosis and Recovery in Power Electronic Systems Weiqiang Chen and Ali M. Bazzi Advanced Power Electronics and Electric Drives Lab (APEDL) ECE Department and Center for Clean Energy
More informationFault Tolerance. The Three universe model
Fault Tolerance High performance systems must be fault-tolerant: they must be able to continue operating despite the failure of a limited subset of their hardware or software. They must also allow graceful
More informationPegasystems PEGACSA72V1. Certified System Architect (CSA) 7.2 V1.
Pegasystems PEGACSA72V1 Certified System Architect (CSA) 7.2 V1 http://killexams.com/exam-detail/pegacsa72v1 QUESTION: 64 Review the following Decision Table: If the credit score is 723 and the outstanding
More informationSelf Checking Network Protocols: A Monitor Based Approach
Self Checking Network Protocols: A Monitor Based Approach Gunjan Khanna, Padma Varadharajan, Saurabh Bagchi Dependable Computing Systems Lab School of Electrical and Computer Engineering Purdue University
More informationSlides 11: Verification and Validation Models
Slides 11: Verification and Validation Models Purpose and Overview The goal of the validation process is: To produce a model that represents true behaviour closely enough for decision making purposes.
More informationRepresenting Design Tradeoffs in Safety-Critical Systems
Representing Design Tradeoffs in Safety-Critical Systems Jennifer Morris, Philip Kooman [jenmorris, koopman]@cmu.edu ECE Department, Carnegie Mellon University ICSE WADS 2005 May 17, 2005 Motivation Increased
More informationModule 4 STORAGE NETWORK BACKUP & RECOVERY
Module 4 STORAGE NETWORK BACKUP & RECOVERY BC Terminology, BC Planning Lifecycle General Conditions for Backup, Recovery Considerations Network Backup, Services Performance Bottlenecks of Network Backup,
More informationPROFILE Setting up your Profile
Concur Travel Office of Administrative Services- Accounting PROFILE Setting up your Profile Effective 4/1/2016 To Setup Your Profile you will need your Employee ID #, credit card, fax #, frequent traveler
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationCDA 5140 Software Fault-tolerance. - however, reliability of the overall system is actually a product of the hardware, software, and human reliability
CDA 5140 Software Fault-tolerance - so far have looked at reliability as hardware reliability - however, reliability of the overall system is actually a product of the hardware, software, and human reliability
More informationDatacenter replication solution with quasardb
Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION
More informationAppendix D: Storage Systems (Cont)
Appendix D: Storage Systems (Cont) Instructor: Josep Torrellas CS433 Copyright Josep Torrellas 1999, 2001, 2002, 2013 1 Reliability, Availability, Dependability Dependability: deliver service such that
More informationKT Online User guide University of Strathclyde. How to create the perfect trip using your new online booking tool
KT Online User guide University of Strathclyde How to create the perfect trip using your new online booking tool Login Go to www.keytravel.com Click Login 8 December, 2017 YOUR GUIDE TO KEY TRAVEL 2 Login
More informationMobile Payment Trials in Public Transport. Card Tech Secure Tech 2009
Mobile Payment Trials in Public Transport Card Tech Secure Tech 2009 Transit and Mobile Technology Mobile Phones offer the potential to serve in many fare system roles: An internet access device A portable
More informationReplication Solutions with Open-E Data Storage Server (DSS) April 2009
Replication Solutions with Open-E Data Storage Server (DSS) April 2009 Replication Solutions Supported by Open-E DSS Replication Mode s Synchronou Asynchronou us Source/Destination Data Transfer Volume
More informationNetwork Survivability Performance Evaluation with Applications in WDM Networks with Wavelength Conversion
Network Survivability Performance Evaluation with Applications in WDM Networks with Wavelength Conversion Manijeh Keshtgary, Fahad A. Al-Zahrani, Anura P. Jayasumana Electrical and Computer Engineering
More informationPEOPLESOFT TRAVEL AUTHORIZATION AND EXPENSE MODULE. 1) Open your Internet Browser to the BYUH.EDU website
PEOPLESOFT TRAVEL AUTHORIZATION AND EXPENSE MODULE 1) Open your Internet Browser to the BYUH.EDU website 2) Click on my/byuh on top right of website 3) Log in using your CES ID and your Password 4) Click
More informationStructuring Integrated Web Applications for Fault Tolerance
Structuring Integrated Web Applications for Fault Tolerance Alexander Romanovsky, Panos Periorellis Avelino F. Zorzo School of Computing Science University of Newcastle upon Tyne, UK {alexander.romanovsky,
More informationOn Coding Techniques for Networked Distributed Storage Systems
On Coding Techniques for Networked Distributed Storage Systems Frédérique Oggier frederique@ntu.edu.sg Nanyang Technological University, Singapore First European Training School on Network Coding, Barcelona,
More informationAR-SMT: A Microarchitectural Approach to Fault Tolerance in Microprocessors
AR-SMT: A Microarchitectural Approach to Fault Tolerance in Microprocessors Computer Sciences Department University of Wisconsin Madison http://www.cs.wisc.edu/~ericro/ericro.html ericro@cs.wisc.edu High-Performance
More informationDependable and Secure Systems Dependability Master of Science in Embedded Computing Systems
Dependable and Secure Systems Dependability Master of Science in Embedded Computing Systems Quantitative Dependability Analysis with Stochastic Activity Networks: the Möbius Tool April 2016 Andrea Domenici
More informationStep into the future. HP Storage Summit Converged storage for the next era of IT
HP Storage Summit 2013 Step into the future Converged storage for the next era of IT 1 HP Storage Summit 2013 Step into the future Converged storage for the next era of IT Karen van Warmerdam HP XP Product
More informationApplicant and Traveler s Guide
Manual: July 2015 Applicant and Traveler s Guide Contents 1. Introduction... 4 2. Online Request... 4 2.1 Booking an Air Segment Online... 4 2.2 Booking Accommodation Online... 7 2.3 Car Rental... 9 3.
More informationAdaptable UI for Web Service Composition A Model-driven Approach
Waldemar P. Ferreira Neto and Philippe Thiran (Supervisor) PReCISE Research Center, University of Namur ICSOC 2011-PhD Symposium December 5, 2011 Paphos, Cyprus Agenda! Motivation! Research Challenges!
More informationNon Intrusive Detection & Diagnosis of Failures in High Throughput Distributed Applications. DCSL Research Thrusts
Non Intrusive Detection & Diagnosis of Failures in High Throughput Distributed Applications Saurabh Bagchi Dependable Computing Systems Lab (DCSL) & The Center for Education and Research in Information
More informationSiewiorek, Daniel P.; Swarz, Robert S.: Reliable Computer Systems. third. Wellesley, MA : A. K. Peters, Ltd., 1998., X
Dependable Systems Hardware Dependability - Diagnosis Dr. Peter Tröger Sources: Siewiorek, Daniel P.; Swarz, Robert S.: Reliable Computer Systems. third. Wellesley, MA : A. K. Peters, Ltd., 1998., 156881092X
More informationTransaction-Processing Monitor. Chapter 7.1 Process-Architecture. typical for UNIX-Workstations SIG. AP1 = C-Progr. with APi =
Chapter 7 Transaction-Processing Monitor Chapter 7.1 Process-Architecture typical for UNIX-Workstations SIG 2n Processes AP1 = C-Progr. with APi = t 1 ESQL or dynamic t i SQL -kernel SQL Result TCP/IP
More informationChapter 4: Distributed Transactions (First Part) IPD, Forschungsbereich Systeme der Informationsverwaltung
Chapter 4: Distributed Transactions (First Part) IPD, Forschungsbereich e der Informationsverwaltung 1 Distributed Transactions (1) US Customers Transfer USD 500,-- from Klemens account to Jim s account.
More informationClusters Your Way. SQL Server in "The Cloud": High Availability and Disaster Recovery in Azure, AWS and Google
Clusters Your Way SQL Server in "The Cloud": High Availability and Disaster Recovery in Azure, AWS and Google Jason Aw, Strategic Business Development Copyright 2017 SIOS Technology Corp. All rights reserved.
More informationDistributed Systems
15-440 Distributed Systems 11 - Fault Tolerance, Logging and Recovery Tuesday, Oct 2 nd, 2018 Logistics Updates P1 Part A checkpoint Part A due: Saturday 10/6 (6-week drop deadline 10/8) *Please WORK hard
More informationComparison of Search Engines Non-Neutral and Neutral Behaviors
Comparison of Search Engines Non-Neutral and Neutral Behaviors P. Coucheney, P. Maillé, Bruno Tuffin INRIA Rennes - Centre Bretagne Atlantique W-PIN London June 2012 P. Coucheney, P. Maillé, B. Tuffin
More informationAnalysis of Replication Control Protocols
Analysis of Replication Control Protocols Darrell D. E. Long University of California, Santa Cruz darrell@cis.ucsc.edu June 22, 2003 Abstract In recent years many replication control protocols have been
More informationSkyscanner Ltd. A leading global travel search company, providing free search of flights, hotels and car hire around the world.
Founded in 2003 Head Office Countries with offices Edinburgh - UK Company profile Ten offices across the world: Barcelona, Beijing, Budapest, Edinburgh, Glasgow, London, Miami, Shenzhen, Singapore and
More informationECE 259 / CPS 221 Advanced Computer Architecture II (Parallel Computer Architecture) Availability. Copyright 2010 Daniel J. Sorin Duke University
Advanced Computer Architecture II (Parallel Computer Architecture) Availability Copyright 2010 Daniel J. Sorin Duke University Definition and Motivation Outline General Principles of Available System Design
More informationQueueing Networks analysis with GNU Octave. Moreno Marzolla Università di Bologna
The queueing Package Queueing Networks analysis with GNU Octave Moreno Marzolla marzolla@cs.unibo.it http://www.moreno.marzolla.name/ Università di Bologna december 4, 2012 Moreno Marzolla (Università
More informationDependable and Secure Systems Dependability
Dependable and Secure Systems Dependability Master of Science in Embedded Computing Systems Quantitative Dependability Analysis with Stochastic Activity Networks: the Möbius Tool Andrea Domenici DII, Università
More informationFunctional Safety and Safety Standards: Challenges and Comparison of Solutions AA309
June 25th, 2007 Functional Safety and Safety Standards: Challenges and Comparison of Solutions AA309 Christopher Temple Automotive Systems Technology Manager Overview Functional Safety Basics Functional
More informationAccess to the Online Booking Tool
Welcome to KDS Corporate Start-up Guide This leaflet shows you the main features of the travel module. The information in this leaflet corresponds to the tool s generic features and depends on your company
More informationECE Engineering Robust Server Software. Spring 2018
ECE590-02 Engineering Robust Server Software Spring 2018 Business Continuity: High Availability Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management
More informationFUJITSU. Service BS2000 Portfolio. ETERNUS Storage Cluster für BS2000. Barbara Stadler T.
FUJITSU Service BS2000 Portfolio ETERNUS Storage Cluster für BS2000 Barbara Stadler Barbara.Stadler@ts.fujitsu.com T. +49 89 62060 1978 0 Copyright 2018 FUJITSU FUJITSU Service BS2000 Portfolio ETERNUS
More informationSoftware testing. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1
Software testing Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles
More informationLAB 2 NetBeans BPEL Engine
LAB 2 NetBeans BPEL Engine Service Oriented Architectures Security Module 5 - Lab Unit 2 BPEL Fulvio Frati Università di Milano Outline Introduction to BPEL Building Web Service Creation of the BPEL diagram
More informationChapter 2 System Models
CSF661 Distributed Systems 分散式系統 Chapter 2 System Models 吳俊興國立高雄大學資訊工程學系 Chapter 2 System Models 2.1 Introduction 2.2 Physical models 2.3 Architectural models 2.4 Fundamental models 2.5 Summary 2 A physical
More informationThe Travel Planning Process and The Role of Intermediaries
The Travel Planning Process and The Role of Intermediaries September 2014 2014 Priceline Group 1 : Based on a True Story 2014 Priceline Group 2 Search Engine Caribbean vacation 2014 Priceline Group 3 Search
More informationA NEW MODELLING APPROACH TO ENHANCE RELIABILITY OF TRANSACTIONAL ORIENTED WEB SERVICES
A NEW MODELLING APPROACH TO ENHANCE RELIABILITY OF TRANSACTIONAL ORIENTED WEB SERVICES Adil M. Hammadi 1 ), Saqib Ali ), Fei Liu 1 ) Abstract Reliability and uptime are the key indicators of business systems
More informationIssues in Programming Language Design for Embedded RT Systems
CSE 237B Fall 2009 Issues in Programming Language Design for Embedded RT Systems Reliability and Fault Tolerance Exceptions and Exception Handling Rajesh Gupta University of California, San Diego ES Characteristics
More informationEvent log based dependability analysis of Windows NT and 2K systems
Event log based dependability analysis of Windows NT and 2K systems Cristina Simache, Mohamed Kaâniche, Ayda Saidane To cite this version: Cristina Simache, Mohamed Kaâniche, Ayda Saidane. Event log based
More informationFAULT TOLERANT SYSTEMS
FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 3 - Resilient Structures Chapter 2 HW Fault Tolerance Part.3.1 M-of-N Systems An M-of-N system consists of N identical
More informationGo to https://app2.outtask.com/registration/register_form.asp?regcode=irobot
Becoming a Traveler with irobot Becoming a traveler with irobot requires a 2-step registration process. STEP 1: Create a Concur Travel Profile This will allow you to book travel through an agent and online.
More informationCoverity Static Analysis Support for MISRA Coding Standards
Coverity Static Analysis Support for MISRA Coding Standards Fully ensure the safety, reliability, and security of software written in C and C++ Overview Software is eating the world. Industries that have
More informationSwiss IT Pro SQL Server 2005 High Availability Options Agenda: - Availability Options/Comparison - High Availability Demo 08 August :45-20:00
Swiss IT Pro Agenda: SQL Server 2005 High Availability Options - Availability Options/Comparison - High Availability Demo 08 August 2006 17:45-20:00 SQL Server 2005 High Availability Options Charley Hanania
More informationConcur Travel & Expense USER PROFILE & SETTINGS
Concur Travel & Expense USER PROFILE & SETTINGS User Profile & Settings Overview Accessing Profile Settings Profile Options User Profile and Settings Overview Eligible SF State employees are already setup
More informationA Multi-Modal Composability Framework for Cyber-Physical Systems
S5 Symposium June 12, 2012 A Multi-Modal Composability Framework for Cyber-Physical Systems Linh Thi Xuan Phan Insup Lee PRECISE Center University of Pennsylvania Avionics, Automotive Medical Devices Cyber-physical
More informationDistributed Systems 23. Fault Tolerance
Distributed Systems 23. Fault Tolerance Paul Krzyzanowski pxk@cs.rutgers.edu 4/20/2011 1 Faults Deviation from expected behavior Due to a variety of factors: Hardware failure Software bugs Operator errors
More information10. Replication. Motivation
10. Replication Page 1 10. Replication Motivation Reliable and high-performance computation on a single instance of a data object is prone to failure. Replicate data to overcome single points of failure
More informationService Recovery & Availability. Robert Dickerson June 2010
Service Recovery & Availability Robert Dickerson June 2010 Started in 1971 with $3,000, 40 clients and 1 employee. 2009: over $2B revenue, 500,000+ clients, 13,000 employees. Payroll / Tax Services / 401(k)
More informationIntroduction to Distributed Systems. INF5040/9040 Autumn 2018 Lecturer: Eli Gjørven (ifi/uio)
Introduction to Distributed Systems INF5040/9040 Autumn 2018 Lecturer: Eli Gjørven (ifi/uio) August 28, 2018 Outline Definition of a distributed system Goals of a distributed system Implications of distributed
More informationCSE 550: Introduction to Computer Systems Research. Arvind Krishnamurthy
CSE 550: Introduction to Computer Systems Research Arvind Krishnamurthy Course Information Instructor: Arvind Krishnamurthy Interests: distributed systems, networks, operating systems, security Email,
More informationGlobal Prepaid Card Market with Focus on The United States ( ) April 2016
Global Prepaid Card Market with Focus on The United States (2016-2020) April 2016 Global Prepaid Card Market Report Scope of the Report The report titled Global Prepaid Card Market with Focus on The United
More informationCreate a Travel Authorization (TA)
Create a Travel Authorization (TA) Login to mybyuh Enter CES net ID and password Click on PeopleSoft Finance IMPORTANT NOTE: In order to create Travel Authorization for a non-byuh employee, students or
More informationModule 4: Stochastic Activity Networks
Module 4: Stochastic Activity Networks Module 4, Slide 1 Stochastic Petri nets Session Outline Places, tokens, input / output arcs, transitions Readers / Writers example Stochastic activity networks Input
More informationEngineering Goals. Scalability Availability. Transactional behavior Security EAI... CS530 S05
Engineering Goals Scalability Availability Transactional behavior Security EAI... Scalability How much performance can you get by adding hardware ($)? Performance perfect acceptable unacceptable Processors
More informationAnalysis of Stochastic Model on a Two-Unit Hot Standby Combined Hardware-Software System
Analysis of Stochastic Model on a Two-Unit Hot Standby Combined Hardware-Software System Rajeev Kumar Department of Mathematics, M.D. University, Rohtak-124001, INDIA Sudesh Kumari Department of Mathematics,
More informationVisa Payments Control
Visa Payments Control Getting Started Guide Effective: June 2017 2017 Visa. All Rights Reserved. Notices and Disclaimers This document is protected by copyright restricting its use, copying, distribution,
More informationMango3 Motrex User Manual
Mango3 Motrex User Manual Index 1. Scope... 1 2. Preparations... 1 3. First Step - Download new map to USB flash (on the PC)... 2 4. Second Step - Install new map (on the car)... 4 5. Third Step - Install
More informationIntegration of analytic model and simulation model for analysis on system survivability
6 Integration of analytic model and simulation model for analysis on system survivability Jang Se Lee Department of Computer Engineering, Korea Maritime and Ocean University, Busan, Korea Summary The objective
More informationFAULT TOLERANT SYSTEMS
FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 5 Processor-Level Techniques & Byzantine Failures Chapter 2 Hardware Fault Tolerance Part.5.1 Processor-Level Techniques
More informationHigh Performance Computing Course Notes High Performance Storage
High Performance Computing Course Notes 2008-2009 2009 High Performance Storage Storage devices Primary storage: register (1 CPU cycle, a few ns) Cache (10-200 cycles, 0.02-0.5us) Main memory Local main
More informationQuick Reference Card Completing an Expense Report in Concur Travel and Expense
Use this QRC when completing an expense report from an approved travel request in Concur Travel and Expense. Log In To Concur Go to the Employee Portal at www.purdue.edu/employeeportal. Choose Travel System
More informationNERC Monitoring and Situational Awareness Conference: Loss of Control Center Procedures and Testing Practices
NERC Monitoring and Situational Awareness Conference: Loss of Control Center Procedures and Testing Practices Ed Batalla Director of Technology Florida Power & Light Company September 19, 2013 Florida
More informationCS 470 Spring Fault Tolerance. Mike Lam, Professor. Content taken from the following:
CS 47 Spring 27 Mike Lam, Professor Fault Tolerance Content taken from the following: "Distributed Systems: Principles and Paradigms" by Andrew S. Tanenbaum and Maarten Van Steen (Chapter 8) Various online
More informationAssignment 5. Georgia Koloniari
Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last
More informationSangfor Application Criticality Model and Reliability Design Best Practice
Sangfor Application Criticality Model and Reliability Design Best Practice This paper compares three common classification methods and then gives guidance on how to choose criticality based on typical
More informationSoftware reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment.
SOFTWARE ENGINEERING SOFTWARE RELIABILITY Software reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment. LEARNING OBJECTIVES
More informationWHITE PAPER. Implementing Fault Resilient Protection for mysap in a Linux Environment. Introducing LifeKeeper from SteelEye Technology
Implementing Fault Resilient Protection for mysap in a Linux Environment Introducing LifeKeeper from SteelEye Technology WHITE PAPER Introduction In the past, high-availability solutions were costly to
More informationDistributed and Fault-Tolerant Execution Framework for Transaction Processing
Distributed and Fault-Tolerant Execution Framework for Transaction Processing May 30, 2011 Toshio Suganuma, Akira Koseki, Kazuaki Ishizaki, Yohei Ueda, Ken Mizuno, Daniel Silva *, Hideaki Komatsu, Toshio
More informationDeveloper Recommendation for Crowdsourced Software Development Tasks
Developer Recommendation for Crowdsourced Software Development Tasks CREST Centre University College London k.mao@cs.ucl.ac.uk March 30, 2015 San Francisco, USA OUTLINE INTRODUCTION Motivation Problem
More informationTo Cluster or Not Cluster Tom Scanlon NEC Solutions America
To Cluster or Not Cluster Tom Scanlon NEC Solutions America June 25, 2003 NEC Solutions America Agenda The PDC Case Study Availability Defined The Dilemma (to cluster or not) Cluster Application Availability
More informationOptimal Cost-Effective Design of Standby Systems Subject to Imperfect Fault-Coverage
Optimal Cost-Effective Design of Standby Systems Subject to Imperfect Fault-Coverage Giribabu G 1, Sarmistha Neogy 2, and Mita Nasipuri 3 Jadavpur University, West Bengal, India-700032 1 babugiri71@yahoo.co.in
More informationIntegration of Economic and Construction Outlooks: A Case Study. Lorenz Kleist Consultant October 6, 2009
Integration of Economic and Construction Outlooks: A Case Study Lorenz Kleist Consultant October 6, 2009 The Client The European Rental Association (ERA) ERA is a young European association ERA represents
More informationInstructions for Completing an SF-182 (Authorization, Agreement and Certification of Training)
Instructions for Completing an SF-182 (Authorization, Agreement and Certification of Training) The following instructions and screen captures are intended to assist you in completing your SF-182. They
More informationAn Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems
An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems Algirdas Avižienis Vytautas Magnus University, Kaunas, Lithuania and University of California, Los
More informationCourse Information. Course Basics. Course Format. Arvind Krishnamurthy. Instructor: Arvind Krishnamurthy. TA: Naveen Sharma
Course Information CSE 550: Introduction to Computer Systems Research Arvind Krishnamurthy Instructor: Arvind Krishnamurthy Interests: distributed systems, networks, operating systems, security Email,
More informationConcur Travel & Expense CAMPUS TRAINING GUIDE & LIVE DEMO
Concur Travel & Expense CAMPUS TRAINING GUIDE & LIVE DEMO Training Agenda This training will be approximately 1.5 hours long and will go over the basics of Concur Travel and Expense system. Additional
More informationEASY CONNECT Give your guests the at home content streaming experience.
EASY CONNECT Give your guests the at home content streaming experience. o Otrum Enterprise with guest device connectivity. o In-room communication and marketing using the guest s own language. o Revenue
More informationConcur's mobile app iphone
Introduction to... Concur's mobile app iphone Version 9.33 June 19 2016 Applies to these Concur solutions: Expense in Travel & Expense Travel Travel in Travel & Expense Invoice Request You can use Concur
More informationINTRODUCTION Background of the Problem Statement of the Problem Objectives of the Study Significance of the Study...
vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION... ii DEDICATION... iii ACKNOWLEDGEMENTS... iv ABSTRACT... v ABSTRAK... vi TABLE OF CONTENTS... vii LIST OF TABLES... xii LIST OF FIGURES... xiii LIST
More informationECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective
ECE 7650 Scalable and Secure Internet Services and Architecture ---- A Systems Perspective Part II: Data Center Software Architecture: Topic 1: Distributed File Systems GFS (The Google File System) 1 Filesystems
More informationToward (SOS) Self-stabilizing Operating System
Toward (SOS) Self-stabilizing Operating System Shlomi Dolev and Reuven Yagel, Ben-Gurion University, Israel Sep. 1st SAACS 04 Workshop, Zaragoza Outline Motivation: current operating systems do not stabilize!
More informationTAKING NETWORK TESTING TO THE NEXT LEVEL
TAKING NETWORK TESTING TO THE NEXT LEVEL WELCOME TO THE NEXT LEVEL OF NETWORK TESTING. Do you understand the performance and customer experience of your mobile network? P3 does. Our holistic approach is
More informationModelling approach and tool
Modelling approach and tool Olivier LEBOIS Business Area Manager, System Development SJWS 1 Brussels 22 January 201 Meaningful assessment cannot be limited to capacity > Since TYNDP 2011-2020, ENTSOG uses
More informationMeasurement-based Availability Analysis of Unix Systems in a Distributed Environment
Author manuscript, published in "12th International Symposium on Software Reliability Engineering (ISSRE 2001), Hong-Kong : Hong Kong (2001)" DOI : 10.1109/ISSRE.2001.989489 Measurement-based Availability
More information