recoverability preservation recoverability preservation a
play

Recoverability Preservation: Recoverability Preservation: A Measure - PowerPoint PPT Presentation

Recoverability Preservation: Recoverability Preservation: A Measure of Last Resort A Measure of Last Resort Ali Mili, Frederick Sheldon, Fatma Mili, Jules Desharnais Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires,


  1. Recoverability Preservation: Recoverability Preservation: A Measure of Last Resort A Measure of Last Resort Ali Mili, Frederick Sheldon, Fatma Mili, Jules Desharnais Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  2. Reflections on Software/ Reflections on Software/ Program Fault Tolerance Program Fault Tolerance Commonly used techniques of fault tolerance:  Trigger Happy. Fire off as soon as the current state is found to be incorrect.  Heavy Artillery. Geared (unnecessarily) towards producing a correct state.  Inefficient. Involve heavy overhead in terms of space (duplicating states) and time (check- pointing etc).  Panic Stricken. Resort to Emergency Measures too soon, on unnecessarily strong conditions. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  3. Reflections on Software/ Reflections on Software/ Program Fault Tolerance Program Fault Tolerance We advocate a more measured approach:  Triggered only when the state is unmaskable . No false alarms.  Aims only to produce a maskable state . Minimizes computation, and required data.  Uses only forward error recovery . No time/ space overhead.  Uses the Panic Button as a Last Resort. Only when the state is unrecoverable. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  4. Recoverability Preservation Recoverability Preservation We know how to characterize maskable, unmaskable states, recovery routines. We need to characterize Recoverable States. Modeling device: We make recoverability not a property of the state but a property of the function that produces it. We call this property: Recoverability Preservation. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  5. Recoverability Preservation: Recoverability Preservation: Illustration Illustration A Program/ System structured as the product of two components/ functions P; L:F. (P: Past; F: Future; L: Label). Expected functions:  P(x) = x mod 6.  F(x) = x mod 9 + 12. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  6. Illustration, II Illustration, II  If Past Function is incorrect, and computes P1 = (x mod 6 + 18) then states produced by P1 are not correct but they are maskable (the excess 18 will be canceled by taking mod 9 in function F).  No intervention is required. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  7. Illustration, III Illustration, III  If Past Function is incorrect, and computes P2 = (x mod 12) then states produced by P2 are not maskable, but they are recoverable .  Recovery routine: apply (mod 6) to the current state. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  8. Illustration, IV Illustration, IV  If Past Function is incorrect, and computes P3 = (x mod 3) then states produced by P3 are not recoverable, but they are partially recoverable.  Probabilistic Recovery Routine: return x (or x+3), with 0.5 probability of success. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  9. Illustration, V Illustration, V  If Past Function is incorrect, and computes P4 = (x mod 7) then states produced by P4 are not recoverable.  No recovery is possible, for knowing (x mod 7) does not inform us on (x mod 6). Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  10. Intuitive Analysis Intuitive Analysis  Q preserves recoverability for P if µ(Q) ⊆ µ(P), where µ(R)=RR^ (level sets of R).  Interestingly: condition involves how Q partitions its domain but does not involve what value Q assigns to each partition.  If Q assigns the wrong image to a partition, that can be corrected by the recovery routine  But if Q partitions its domain wrongly (re: mod 7 rather than mod 6) nothing can be done. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  11. Degrees of Recoverability Degrees of Recoverability Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  12. P ˆ P for Original P Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  13. 2 ˆ P P 2 , where P 2 preserves recoverability preserves recoverability Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  14. 3 ˆ P P 3 , where P 3 preserves partial recoverability preserves partial recoverability Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  15. 4 ˆ P P 4 , where P 4 does not preserve recoverability does not preserve recoverability Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  16. Characterizing Recoverability Characterizing Recoverability Preservation Preservation  Characterization by µ(Q) ⊆ µ(P) is intuitive, but incomplete.  For completeness: we must involve the specification R that the system (P; F) must refine.  Because R is potentially non-deterministic, we get an extra dimension of redundancy (unexplored in the illustrative example). Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  17. Sufficient Conditions Sufficient Conditions  A past function Π preserves maskability (i.e. produces maskable states) if it refines κ (R,F), where κ is the left quotient operator.  A past function Π preserves recoverability (i.e. produces recoverable states) if it satisfies the following conditions ( ) KL KL � � L � L � K ˆ L � � Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  18. R by F Left quotient of R by F Left quotient of s’ F K( R ,F) s’. F s R s. R Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  19. Specifying the Recovery Specifying the Recovery Routine Routine  If past function Π preserves recoverability with respect to future function F and specification R then r = Γ ( Π , κ (R,F)) is a specification of the recovery routine, where Γ is the right quotient and κ is the left quotient operator.  Any routine that refines r will map recoverable states into maskable states. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  20. Γ ( Π , K (R,F)) Π K (R,F) s Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  21. Hierarchy of Correctness Levels Hierarchy of Correctness Levels Unrecoverable states → Recovery insufficient Partially recoverable states → Probabilistic recovery Totally recoverable states → Total recovery necessary & sufficient r Maskable states Π (S 0 ) pr Recovery unnecessary Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  22. Linking to Intuitive Discussion Linking to Intuitive Discussion  If R is regular (R=RR^R) and the following conditions hold RF^L ⊆ Π L ∧ ΠΠ ^ ⊆ RR^ then Π preserves recoverability.  Generalizes the condition discussed upon inspecting the sample example. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  23. Application: Lean fault Tolerance Application: Lean fault Tolerance If not maskable(s) then recovery- measures(s); recovery-measures(s): If recoverable(s) then deterministic- recovery(s) else If partially-recoverable(s) then probabilistic-recovery(s) else failure(s); Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  24. Recoverability Preservation, Recoverability Preservation, a Substitute for Correctness a Substitute for Correctness  Prove recoverability preservation.  Takes steps to recover.  Substitutes/ complements correctness proofs.  Using safety condition for R. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  25. Flight Control Loop Flight Control Loop Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  26. Characterizing Fault Modes Characterizing Fault Modes  Fault Tolerant Flight Control System: A system that can recover from some types of faults, including loss of sensors, loss of flight surfaces, loss of control of actuators.  When these faults arise, the system must alter its control law and make up for fault. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

  27. Characterizing Fault Modes Characterizing Fault Modes  Question: Which sensor-aircraft-actuator faults can be handled by fault tolerant FCS?  Those for which the aggregate sensor- aircraft-actuator preserves recoverability.  A highly speculative answer, we acknowledge; perhaps difficult to model. Proceedings Int'l Conf. Principles of Software Engineering, Buenos Aires, Argentina, Nov. 22-27, 2004.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend