1 / 36

SECURITY AND DEPENDABILITY OF COMPUTER SYSTEMS

SECURITY AND DEPENDABILITY OF COMPUTER SYSTEMS. PART A HOMEWORK 1. STUDENTS. Luca Genovese Gabriele Piantadosi Silvestro Poccia Luca Trevisani. Security and Dependability of Computer Systems (A) - Homework 1. EXERCISE 1.

polly
Download Presentation

SECURITY AND DEPENDABILITY OF COMPUTER SYSTEMS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SECURITY AND DEPENDABILITY OF COMPUTER SYSTEMS PART A HOMEWORK 1

  2. STUDENTS Luca Genovese Gabriele Piantadosi Silvestro Poccia Luca Trevisani Security and Dependability of Computer Systems (A) - Homework 1

  3. EXERCISE 1 Security and Dependability of Computer Systems (A) - Homework1

  4. The system shown in the figure below is a processing system for a helicopter. The system has dual-redundant processors and dual-redundant interface units. Two buses are used in the system, and each bus is also dual-redundant. The interesting part of the system is the navigation equipment. The aircraft can be completely navigated using the Inertial Navigation System (INS). If the INS fails, the aircraft can be navigated using the combination of the Doppler and the altitude heading and reference system (AHRS). The system contains three AHRS units, of which only one is needed. This is an example of functional redundancy where the data from the AHRS and the Doppler can be used to replace the INS, if the INS fails. Because of the other sensors and instrumentation, both buses are required for the system to function properly regardless of which navigation mode isbeingemployed. Security and Dependability of Computer Systems (A) - Homework1

  5. POINT #1 Draw the Reliability BlockDiagram of the system Security and Dependability of Computer Systems (A) - Homework1

  6. SOLUTION The replicated elements of the system are shown in the following schema by adding a suffix to the name of the component. The processors, the buses and the interface units are named as PROC1/PROC2, BUSA1/BUSA2, BUSB1/BUSB2 and TERM1/TERM2. The first part of the system is composed of the series of the four parallels of the various components, because it is necessary that at least one copy of the processor, of the Bus B and of the terminals must be working. The second part is the navigation group composed of the INS , that can be replaced by the combination of DOPP and one of the copies of the AHRS. Security and Dependability of Computer Systems (A) - Homework1

  7. POINT #2 Calculate the reliability for one-hour flight using the MTTF figures given in the table below. Assume that the exponential failure law applies and that the fault coverage is perfect. Security and Dependability of Computer Systems (A) - Homework1

  8. SOLUTION(1/2) Using the reliability formulas for series and parallels: we calculate the reliability formula of the system as: We know that the failure distribution law is: with Security and Dependability of Computer Systems (A) - Homework1

  9. SOLUTION(2/2) Using the MTTF values from the previoustablewecalculated with MATLAB the value of the reliability of the entiresystem. Security and Dependability of Computer Systems (A) - Homework1

  10. POINT #3 Repeat #2, but this time, incorporate a coverage factor for the fault detection and reconfiguration of the processing units. Using the same failure data, determine the approximate fault coverage value that is required to obtain a reliability (at the end of one hour) of 0.99999. Security and Dependability of Computer Systems (A) - Homework1

  11. SOLUTION(1/2) The coverage factor takes into account the possibility that the detection of the failure in not perfect or that the reconfiguration process in not correct. The general formula is: Where c is the probability that, when a failure occurs, it is correctly detected. and are the replies we are studying the reliability with a coverage factor not equal to 1. In our case for the processor we have: We want to be 0.99999 so we substitute Security and Dependability of Computer Systems (A) - Homework1

  12. SOLUTION(2/2) We calculated the new values using MATLAB and obtained the following result: Security and Dependability of Computer Systems (A) - Homework1

  13. EXERCISE 2 Security and Dependability of Computer Systems (A) - Homework1

  14. The architecture of a network of computers in a banking system is shown below. The architecture is called a skip-ring network and is designed to allow processors to communicate even after node failures have occurred. For example, if node 1 fails, node 6 can bypass the failed node by routing data over the alternative link connecting node 6 and 2. Assuming the links are perfect and the nodes each have a reliability of , derive an expression for the reliability of the network. If obeys the exponential failure law and the failure rate of each node is 0.002 failures per hour, determine the reliability of the system at the end of a ten-hour period. Security and Dependability of Computer Systems (A) - Homework1

  15. SOLUTION(1/8) We know that: The probability that a node works in (0, T) is The probability that a node doesn’t work in (0, T) is For a particular configuration of the system in which the nodes don’t work, the probability of such configuration is where k is the number of the nodes of the system. Security and Dependability of Computer Systems (A) - Homework1

  16. SOLUTION(2/8) From the specifications of the system we know that is impossible that two adjacent nodes fail. So the possible cases in which the system works are the following: No nodes fail; Only one node fails; Two non-adjacent nodes fail; Three non-adjacent nodes fail. Security and Dependability of Computer Systems (A) - Homework1

  17. SOLUTION(3/8) Case 1: No nodes fail The configuration is There is only one possible configurations of this type so the reliability is: Security and Dependability of Computer Systems (A) - Homework1

  18. SOLUTION(4/8) Case 2: Only one node fails The configuration is There are six possible configurations of this type so the reliability is: Security and Dependability of Computer Systems (A) - Homework1

  19. SOLUTION(5/8) Case 3: Two non-adjacent nodes fail The configuration is To discover the number of the possible configurations we have to consider which nodes can fail when a specific node fails. If node 1 fails, nodes 3,4,5 can fail; If node 2 fails, nodes 4,5,6 can fail; If node 3 fails, nodes 5,6,1 can fail; If node 4 fails, nodes 6,1,2 can fail; If node 5 fails, nodes 1,2,3 can fail; If node 6 fails, nodes 2,3,4 can fail. Counting the possible combinations for each case and excluding the redundant ones we have that there are nine possible configurations so: Security and Dependability of Computer Systems (A) - Homework1

  20. SOLUTION(6/8) Case 3: Three non-adjacent nodes fail The configuration is There are two possible configurations of this type so the reliability is: Security and Dependability of Computer Systems (A) - Homework1

  21. SOLUTION(7/8) Adding all the reliability equations obtained we have that: Security and Dependability of Computer Systems (A) - Homework1

  22. SOLUTION(8/8) We know that obeys to the exponential law so . P and we have: Security and Dependability of Computer Systems (A) - Homework1

  23. EXERCISE 3 Security and Dependability of Computer Systems (A) - Homework1

  24. Suppose that a simplex (no redundancy) computer system has a failure rate of and a fault detection coverage factor of C. The fault detection capability is the result of self-diagnostics that are run continuously. If the self-diagnostic detects a fault, the time required to repair the system is 24 hours because the faulty board is identified, obtained overnight, and easily replaced. If, however the self-diagnostic do not detect the fault, the time required to repair the system is 72 hours because a repair person must visit the site, determine the problem, and perform the repair. The disadvantage, however, is that the inclusion of self-diagnostics results in the failure rate becoming . In other words, the failure rate is increased by a factor of because of a self-diagnostics. Determine the value of , for a coverage factor of 0.95, at which including the self-diagnostics begins to degrade the availability of the system. Security and Dependability of Computer Systems (A) - Homework1

  25. SOLUTION(1/2) Let’s compare the availability of the system with and without the self-diagnostics procedure considering a generic . where is the mean time to repair (72h) the system by a human. where is the mean time to repair whit the self-diagnostic procedure. Security and Dependability of Computer Systems (A) - Homework1

  26. SOLUTION (2/2) Now we have to calculate the value of : Security and Dependability of Computer Systems (A) - Homework1

  27. EXERCISE 4 Security and Dependability of Computer Systems (A) - Homework1

  28. We want to compare two different schemes of increasing reliability of a system using redundancy. Suppose that the system needs s identical components in series for proper operation. Further suppose that we are given components. Out of the two schemes shown in the figure below, which one will provide a higher reliability? Given that the reliability of an individual component is r, derive the expression for the reliabilities of two configurations. For and , compare the two expressions. Security and Dependability of Computer Systems (A) - Homework1

  29. SOLUTION (1/3) In the first configuration (A) we have m parallels of s components placed in series. Instead in the second configuration (B) we have s series of m components placed in parallel. The reliability formula for the series is: And the formula for the parallel is Security and Dependability of Computer Systems (A) - Homework1

  30. SOLUTION (2/3) We obtain the following expression: Placing m = 3 and s = 2 we obtain: Security and Dependability of Computer Systems (A) - Homework1

  31. SOLUTION (3/3) As we can see from the graph the reliability of the B configuration is greater than the reliability of the A one. Security and Dependability of Computer Systems (A) - Homework1

  32. EXERCISE 5 Security and Dependability of Computer Systems (A) - Homework1

  33. An application requires that at least two processors from a multiprocessor system be available with more than 95% probability. The cost of a processor with 60% reliability is $1000, and each 10% increase in reliability will cost $800. Determine the number of processors (n) and the reliability (p) of each processor (assume that all processors have the same reliability) that minimize the total system cost. Security and Dependability of Computer Systems (A) - Homework1

  34. SOLUTION (1/3) Let’s start from the expression of m out of n processor are working: And change it to the case in which at least two processors are working Security and Dependability of Computer Systems (A) - Homework1

  35. SOLUTION (2/3) In our case the probability p is the reliability, that is the probability that no faults occur in (0,t). Instead n is the number of processors chosen for the particular configuration. In the following table we reported the various combinations of processors associated with the cost and the reliability. We assumed the same reliability for each combination of processors. We stopped once obtained a reliability of at least 0,95. After we have calculated the reliabilities we have compared the cost of the various configurations and we have chosen the lowest cost. Security and Dependability of Computer Systems (A) - Homework1

  36. SOLUTION (3/3) As we can see (highlighted in green) the configuration that reaches a reliability of at least 95% with the minimum cost is the one with 6 processors each with an incremental reliability of 60% Security and Dependability of Computer Systems (A) - Homework1

More Related