Simulating highly dependable applications in a distributed computing environment

被引:0
|
作者
Chen, YN [1 ]
He, ZS [1 ]
机构
[1] Arizona State Univ, Dept Comp Sci & Engn, Tempe, AZ 85287 USA
关键词
distributed system; task allocation; load balancing; firewall; queuing;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The aims of the research are to investigate techniques that support the development of highly dependable applications in a distributed system environment. Techniques we developed include redundant task allocation, load balancing, fault-tolerant computing and communication. The application we have implemented in the system is a firewall application. The firewall runs in redundant mode. Each incoming or outgoing packet is checked by two or more copies of the firewall application. Only when the majority of the firewall copies decide to accept the packet, the packet can go through the firewall. Different decisions from the different firewall copies signify a possible hardware fault or a software error in the underlying system. This paper reports a recent implementation of a simulation system, in which computing nodes, redundant copies of tasks and packet queues are implemented as independent threads, as well as experiment result we obtained based on queuing models.
引用
收藏
页码:101 / 108
页数:8
相关论文
共 50 条
  • [41] UNICORE: A grid computing environment for distributed and parallel computing
    Huber, V
    PARALLEL COMPUTING TECHNOLOGIES, 2001, 2127 : 258 - 265
  • [42] Reliability evaluation of dependable distributed computing systems based on recursive merge and BDD
    Chang, YR
    Lin, HY
    Kuo, SY
    10TH IEEE PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2004, : 197 - 206
  • [43] HiPoP: Highly distributed platform of computing
    Hantz, F
    Guyennet, H
    2005 JOINT INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS AND INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES (ICAS/ICNS), 2005, : 570 - 575
  • [44] Simulating entanglement in classical computing for cryptographic applications
    Kak, Subhash
    CRYPTOLOGIA, 2016, 40 (04) : 348 - 354
  • [45] P2PPerf: a framework for simulating and optimizing peer-to-peer-distributed computing applications
    Ernst-Desmulier, J. -B.
    Bourgeois, Julien
    Spies, Francois
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2008, 20 (06): : 693 - 712
  • [46] An authentication scheme for distributed computing environment
    Jan S.U.
    Qayum F.
    Jan, Saeed Ullah (saeedullah@uom.edu.pk), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (13): : 227 - 248
  • [47] STRUCTURAL OPTIMIZATION IN A DISTRIBUTED COMPUTING ENVIRONMENT
    AUSTIN, MA
    VOON, BK
    COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 1993, 107 (1-2) : 173 - 192
  • [48] Distributed Authentication in the Cloud Computing Environment
    Liu, Yanzhu
    Li, Zhi
    Sun, Yuxia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 810 - 818
  • [49] Naming facility in distributed computing environment
    Gao, Jianfeng
    Jisuanji Gongcheng/Computer Engineering, 1997, 23 (03): : 11 - 14
  • [50] A locking protocol for a distributed computing environment
    No, J
    Park, H
    ADVANCES IN GRID COMPUTING - EGC 2005, 2005, 3470 : 1066 - 1075