A Flexible Approach to Improving System Reliability with Virtual Lockstep
#1

There is an increasing need for fault tolerance capabilities in logic devices brought about by the scaling of transistors to ever smaller geometries. This paper presents a hypervisor-based replication approach that can be applied to commodity hardware to allow for virtually lockstepped execution. It offers many of the benefits of hardware-based lockstep while being cheaper and easier to implement and more flexible in the configurations supported. A novel form of processor state fingerprinting is also presented, which can significantly reduce the fault detection latency. This further improves reliability by triggering rollback recovery before errors are recorded to a checkpoint. The mechanisms are validated using a full prototype and the benchmarks considered indicate an average performance overhead of approximately 14 percent with the possibility for significant optimization. Finally, a unique method of using virtual lockstep for fault injection testing is presented and used to show that significant detection latency reduction is achievable by comparing only a small amount of data across replicas.



projects9.com
send your request to : projects[at]projects9.com
call us @ : 8008855666
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: improve system reliability virtual lockstep, improving electrical system reliability with infrared thermography pdf, multisession cd, distribution system reliability, a flexible approach to improving system reliability with virtual lockstep, improving reliability and performance of transmission line using facts technology ppt, a flexible approach to multisession trust negotiations,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,084 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Reconfigurable Virtual Keyboard seminar class 5 2,070 30-11-2015, 02:30 PM
Last Post: seminar report asees
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,968 26-05-2015, 03:04 PM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,712 27-01-2015, 12:09 AM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,262 19-09-2014, 12:52 AM
Last Post: [email protected]
Tongue Bug Tracking for Improving Software Quality and Reliability projectsofme 5 3,648 28-01-2013, 06:45 PM
Last Post: Guest
  PREVENTION OF SQL INJECTION AND DATA THEFTS USING DIVIDE AND CONQUER APPROACH seminar presentation 3 4,180 24-10-2012, 01:09 PM
Last Post: seminar details
  VIRTUAL CLASSROOM SYSTEM mechanical engineering crazy 4 4,875 12-10-2012, 10:37 AM
Last Post: seminar details
  Virtual Classroom System seminar topics 11 13,730 17-07-2012, 12:09 PM
Last Post: slimsaint
  VEBEK: Virtual Energy-Based Encryption And Keying For Wireless Sensor Networks project topics 5 4,969 09-06-2012, 05:34 PM
Last Post: computer girl

Forum Jump: