Foreword |
|
xi | |
Preface |
|
xiii | |
Acknowledgements |
|
xvii | |
About the Authors |
|
xix | |
|
|
1 | (10) |
|
|
2 | (1) |
|
|
3 | (1) |
|
Basic Measures of Fault Tolerance |
|
|
4 | (3) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (2) |
|
|
9 | (2) |
|
|
10 | (1) |
|
|
11 | (44) |
|
The Rate of Hardware Failures |
|
|
11 | (2) |
|
Failure Rate, Reliability, and Mean Time to Failure |
|
|
13 | (2) |
|
Canonical and Resilient Structures |
|
|
15 | (15) |
|
Series and Parallel Systems |
|
|
16 | (1) |
|
Non-Series/Parallel Systems |
|
|
17 | (3) |
|
|
20 | (3) |
|
|
23 | (1) |
|
Variations on N-Modular Redundancy |
|
|
23 | (4) |
|
|
27 | (3) |
|
Other Reliability Evaluation Techniques |
|
|
30 | (6) |
|
|
30 | (3) |
|
|
33 | (3) |
|
Fault-Tolerance Processor-Level Techniques |
|
|
36 | (5) |
|
|
37 | (2) |
|
Simultaneous Multithreading for Fault Tolerance |
|
|
39 | (2) |
|
|
41 | (7) |
|
Byzantine Agreement with Message Authentication |
|
|
46 | (2) |
|
|
48 | (1) |
|
|
48 | (7) |
|
|
53 | (2) |
|
|
55 | (54) |
|
|
56 | (23) |
|
|
57 | (7) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (7) |
|
|
74 | (5) |
|
|
79 | (9) |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
Modeling Correlated Failures |
|
|
84 | (4) |
|
|
88 | (11) |
|
Voting: Non-Hierarchical Organization |
|
|
89 | (6) |
|
Voting: Hierarchical Organization |
|
|
95 | (1) |
|
|
96 | (3) |
|
Algorithm-Based Fault Tolerance |
|
|
99 | (2) |
|
|
101 | (1) |
|
|
102 | (7) |
|
|
106 | (3) |
|
|
109 | (38) |
|
|
110 | (2) |
|
Graph-Theoretical Measures |
|
|
110 | (1) |
|
Computer Networks Measures |
|
|
111 | (1) |
|
Common Network Topologies and Their Resilience |
|
|
112 | (23) |
|
Multistage and Extra-Stage Networks |
|
|
112 | (7) |
|
|
119 | (2) |
|
Rectangular Mesh and Interstitial Mesh |
|
|
121 | (3) |
|
|
124 | (4) |
|
Cube-Connected Cycles Networks |
|
|
128 | (2) |
|
|
130 | (2) |
|
Ad hoc Point-to-Point Networks |
|
|
132 | (3) |
|
|
135 | (6) |
|
Hypercube Fault-Tolerant Routing |
|
|
136 | (2) |
|
Origin-Based Routing in the Mesh |
|
|
138 | (3) |
|
|
141 | (1) |
|
|
142 | (5) |
|
|
145 | (2) |
|
|
147 | (46) |
|
|
148 | (1) |
|
Single-Version Fault Tolerance |
|
|
149 | (11) |
|
|
149 | (3) |
|
|
152 | (3) |
|
|
155 | (2) |
|
Software Implemented Hardware Fault Tolerance (SIHFT) |
|
|
157 | (3) |
|
|
160 | (9) |
|
Consistent Comparison Problem |
|
|
161 | (1) |
|
|
162 | (7) |
|
|
169 | (4) |
|
|
169 | (1) |
|
Success Probability Calculation |
|
|
169 | (2) |
|
Distributed Recovery Blocks |
|
|
171 | (2) |
|
Preconditions, Postconditions, and Assertions |
|
|
173 | (1) |
|
|
173 | (5) |
|
Requirements from Exception-Handlers |
|
|
174 | (1) |
|
Basics of Exceptions and Exception-Handling |
|
|
175 | (2) |
|
|
177 | (1) |
|
Software Reliability Models |
|
|
178 | (4) |
|
|
178 | (1) |
|
Littlewood--Verrall Model |
|
|
179 | (1) |
|
|
180 | (2) |
|
Model Selection and Parameter Estimation |
|
|
182 | (1) |
|
Fault-Tolerant Remote Procedure Calls |
|
|
182 | (2) |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (2) |
|
|
186 | (7) |
|
|
188 | (5) |
|
|
193 | (36) |
|
|
195 | (2) |
|
Why is Checkpointing Nontrivial? |
|
|
197 | (1) |
|
|
197 | (1) |
|
Optimal Checkpointing---An Analytical Model |
|
|
198 | (8) |
|
Time Between Checkpoints---A First-Order Approximation |
|
|
200 | (1) |
|
Optimal Checkpoint Placement |
|
|
201 | (1) |
|
Time Between Checkpoints---A More Accurate Model |
|
|
202 | (2) |
|
|
204 | (1) |
|
|
205 | (1) |
|
Cache-Aided Rollback Error Recovery (CARER) |
|
|
206 | (1) |
|
Checkpointing in Distributed Systems |
|
|
207 | (10) |
|
The Domino Effect and Livelock |
|
|
209 | (1) |
|
A Coordinated Checkpointing Algorithm |
|
|
210 | (1) |
|
Time-Based Synchronization |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
213 | (4) |
|
Checkpointing in Shared-Memory Systems |
|
|
217 | (3) |
|
Bus-Based Coherence Protocol |
|
|
218 | (1) |
|
|
219 | (1) |
|
Checkpointing in Real-Time Systems |
|
|
220 | (3) |
|
Other Uses of Checkpointing |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (5) |
|
|
226 | (3) |
|
|
229 | (20) |
|
|
229 | (7) |
|
|
229 | (4) |
|
Maintenance and Repair Aids |
|
|
233 | (1) |
|
|
233 | (2) |
|
Modifications to the NonStop Architecture |
|
|
235 | (1) |
|
|
236 | (2) |
|
Cassini Command and Data Subsystem |
|
|
238 | (3) |
|
|
241 | (1) |
|
|
242 | (2) |
|
|
244 | (2) |
|
|
246 | (3) |
|
|
247 | (2) |
|
Defect Tolerance in VLSI Circuits |
|
|
249 | (36) |
|
Manufacturing Defects and Circuit Faults |
|
|
249 | (2) |
|
Probability of Failure and Critical Area |
|
|
251 | (2) |
|
|
253 | (5) |
|
The Poisson and Compound Poisson Yield Models |
|
|
254 | (2) |
|
Variations on the Simple Yield Models |
|
|
256 | (2) |
|
Yield Enhancement Through Redundancy |
|
|
258 | (18) |
|
Yield Projection for Chips with Redundancy |
|
|
259 | (4) |
|
Memory Arrays with Redundancy |
|
|
263 | (7) |
|
Logic Integrated Circuits with Redundancy |
|
|
270 | (2) |
|
|
272 | (4) |
|
|
276 | (1) |
|
|
277 | (8) |
|
|
281 | (4) |
|
Fault Detection in Cryptographic Systems |
|
|
285 | (26) |
|
|
286 | (10) |
|
|
286 | (9) |
|
|
295 | (1) |
|
Security Attacks Through Fault Injection |
|
|
296 | (3) |
|
Fault Attacks on Symmetric Key Ciphers |
|
|
297 | (1) |
|
Fault Attacks on Public (Asymmetric) Key Ciphers |
|
|
298 | (1) |
|
|
299 | (8) |
|
Spatial and Temporal Duplication |
|
|
300 | (1) |
|
|
300 | (4) |
|
Are These Countermeasures Sufficient? |
|
|
304 | (3) |
|
|
307 | (1) |
|
|
307 | (1) |
|
|
307 | (4) |
|
|
308 | (3) |
|
|
311 | (54) |
|
Writing a Simulation Program |
|
|
311 | (4) |
|
|
315 | (13) |
|
Point Versus Interval Estimation |
|
|
315 | (1) |
|
|
316 | (2) |
|
Method of Maximum Likelihood |
|
|
318 | (4) |
|
The Bayesian Approach to Parameter Estimation |
|
|
322 | (2) |
|
|
324 | (4) |
|
Variance Reduction Methods |
|
|
328 | (13) |
|
|
328 | (2) |
|
|
330 | (1) |
|
|
331 | (2) |
|
|
333 | (8) |
|
|
341 | (14) |
|
Uniformly Distributed Random Number Generators |
|
|
342 | (3) |
|
Testing Uniform Random Number Generators |
|
|
345 | (4) |
|
Generating Other Distributions |
|
|
349 | (6) |
|
|
355 | (3) |
|
Types of Fault Injection Techniques |
|
|
356 | (2) |
|
Fault Injection Application and Tools |
|
|
358 | (1) |
|
|
358 | (1) |
|
|
359 | (6) |
|
|
363 | (2) |
Subject Index |
|
365 | |