Книга: Distributed operating systems
4.5.4. Use of Redundancy
4.5.4. Use of Redundancy
The general approach to fault tolerance is to use redundancy. Three kinds are possible: information redundancy, time redundancy, and physical redundancy. With information redundancy, extra bits are added to allow recovery from garbled bits. For example, a Hamming code can be added to transmitted data to recover from noise on the transmission line.
With time redundancy, an action is performed, and then, if need be, it is performed again. Using the atomic transactions described in Chap. 3 is an example of this approach. If a transaction aborts, it can be redone with no harm. Time redundancy is especially helpful when the faults are transient or intermittent.
With physical redundancy, extra equipment is added to make it possible for the system as a whole to tolerate the loss or malfunctioning of some components. For example, extra processors can be added to the system so that if a few of them crash, the system can still function correctly.
There are two ways to organize these extra processors: active replication and primary backup. Consider the case of a server. When active replication is used, all the processors are used all the time as servers (in parallel) in order to hide faults completely. In contrast, the primary backup scheme just uses one processor as a server, replacing it with a backup if it fails.
We will discuss these two strategies below. For both of them, the issues are:
1. The degree of replication required.
2. The average and worst-case performance in the absence of faults.
3. The average and worst-case performance when a fault occurs.
Theoretical analyses of many fault-tolerant systems can be done in these terms. For more information, see (Schneider, 1990; and Budhiraja et al., 1993).
- Conventions used in this document
- Chapter 15. Graphical User Interfaces for Iptables
- Terms used in this document
- What NAT is used for and basic terms and expressions
- Раздел uses
- User-land setup
- Compiling the user-land applications
- User specified chains
- User-land states
- System tools used for debugging
- Setting up user specified chains in the filter table
- Internet Service Providers who use assigned IP addresses