Effective Prototyping for Software Makers 🔍
Arnowitz J., Berger N., Arent M. Elsevier, Morgan Kaufmann, 2006
英语 [en] · PDF · 4.7MB · 2006 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
There are many steps in the development of successful software projects, but one major key is prototyping: rapid, effective methods for testing and refining designs. Effective prototyping can be remarkably simple, yet provide powerful results without delaying the project. Indeed, effective prototyping is often the key to faster development. Up to now, there has been no single source for how it is done. But here, in this comprehensive book, Jonathan Arnowitz, Michael Arent, and Nevin Berger explain all in this essential guide to software prototyping.
备用文件名
lgrsnf/dvd36/Arnowitz J., Berger N., Arent M. - Effective Prototyping for Software Makers(2006)(624).pdf
备用文件名
nexusstc/Effective Prototyping for Software Makers/f61a0b0856ea964ff6cd5aa214db4382.pdf
备用文件名
zlib/Computers/Hardware/Arnowitz J., Berger N., Arent M./Effective Prototyping for Software Makers_486420.pdf
备选标题
Fault-Tolerant Systems
备选作者
Koren D.Sc. Electrical Engineering Israel Institute of Technology Haifa, Israel, Krishna Ph.D. University of Michigan, C. Mani
备选作者
Israel Koren D.Sc. Electrical Engineering Israel Institute of Technology Haifa; C. Mani Krishna Ph.D. University of Michigan
备用出版商
Academic Press, Incorporated
备用出版商
Morgan Kaufmann Publishers
备用出版商
Brooks/Cole
备用版本
United States, United States of America
备用版本
Elsevier Ltd., Amsterdam, 2007
备用版本
San Francisco, Calif, 2007
备用版本
March 1, 2007
备用版本
1, US, 2007
元数据中的注释
mexmat -- 36
元数据中的注释
lg54038
元数据中的注释
{"isbns":["0120885255","9780120885251"],"last_page":399}
备用描述
Title Page......Page 4
Copyright Page......Page 5
Table of Contents......Page 6
Foreword......Page 12
Preface......Page 14
Acknowledgements......Page 18
About the Authors......Page 20
1 Preliminaries......Page 22
1.1 Fault Classification......Page 23
1.2 Types of Redundancy......Page 24
1.3 Basic Measures of Fault Tolerance......Page 25
1.3.1 Traditional Measures......Page 26
1.3.2 Network Measures......Page 27
1.4 Outline of This Book......Page 28
1.5 Further Reading......Page 30
References......Page 31
2.1 The Rate of Hardware Failures......Page 32
2.2 Failure Rate, Reliability, and Mean Time to Failure......Page 34
2.3 Canonical and Resilient Structures......Page 36
2.3.1 Series and Parallel Systems......Page 37
2.3.2 Non-Series/Parallel Systems......Page 38
2.3.3 M-of-N Systems......Page 41
2.3.5 Variations on N-Modular Redundancy......Page 44
2.3.6 Duplex Systems......Page 48
2.4.1 Poisson Processes......Page 51
2.4.2 Markov Models......Page 54
2.5 Fault-Tolerance Processor-Level Techniques......Page 57
2.5.1 Watchdog Processor......Page 58
2.5.2 Simultaneous Multithreading for Fault Tolerance......Page 60
2.6 Byzantine Failures......Page 62
2.6.1 Byzantine Agreement with Message Authentication......Page 67
2.8 Exercises......Page 69
References......Page 74
3 Information Redundancy......Page 76
3.1 Coding......Page 77
3.1.1 Parity Codes......Page 78
3.1.2 Checksum......Page 85
3.1.3 M-of-N Codes......Page 86
3.1.4 Berger Code......Page 87
3.1.5 Cyclic Codes......Page 88
3.1.6 Arithmetic Codes......Page 95
3.2.1 RAID Level 1......Page 100
3.2.2 RAID Level 2......Page 102
3.2.3 RAID Level 3......Page 103
3.2.4 RAID Level 4......Page 104
3.2.6 Modeling Correlated Failures......Page 105
3.3 Data Replication......Page 109
3.3.1 Voting: Non-Hierarchical Organization......Page 110
3.3.2 Voting: Hierarchical Organization......Page 116
3.3.3 Primary-Backup Approach......Page 117
3.4 Algorithm-Based Fault Tolerance......Page 120
3.5 Further Reading......Page 122
3.6 Exercises......Page 123
References......Page 127
4 Fault-Tolerant Networks......Page 130
4.1.1 Graph-Theoretical Measures......Page 131
4.1.2 Computer Networks Measures......Page 132
4.2.1 Multistage and Extra-Stage Networks......Page 133
4.2.2 Crossbar Networks......Page 140
4.2.3 Rectangular Mesh and Interstitial Mesh......Page 142
4.2.4 Hypercube Network......Page 145
4.2.5 Cube-Connected Cycles Networks......Page 149
4.2.6 Loop Networks......Page 151
4.2.7 Ad Hoc Point-to-Point Networks......Page 153
4.3 Fault-Tolerant Routing......Page 156
4.3.1 Hypercube Fault-Tolerant Routing......Page 157
4.3.2 Origin-Based Routing in the Mesh......Page 159
4.4 Further Reading......Page 162
4.5 Exercises......Page 163
References......Page 166
5 Software Fault Tolerance......Page 168
5.1 Acceptance Tests......Page 169
5.2.1 Wrappers......Page 170
5.2.2 Software Rejuvenation......Page 173
5.2.3 Data Diversity......Page 176
5.2.4 Software Implemented Hardware Fault Tolerance (SIHFT)......Page 178
5.3 N-Version Programming......Page 181
5.3.1 Consistent Comparison Problem......Page 182
5.3.2 Version Independence......Page 183
5.4.2 Success Probability Calculation......Page 190
5.4.3 Distributed Recovery Blocks......Page 192
5.6 Exception-Handling......Page 194
5.6.1 Requirements from Exception-Handlers......Page 195
5.6.2 Basics of Exceptions and Exception-Handling......Page 196
5.6.3 Language Support......Page 198
5.7.1 Jelinski-Moranda Model......Page 199
5.7.2 Littlewood-Verrall Model......Page 200
5.7.3 Musa-Okumoto Model......Page 201
5.8.1 Primary-Backup Approach......Page 203
5.8.2 The Circus Approach......Page 204
5.9 Further Reading......Page 205
5.10 Exercises......Page 207
References......Page 209
6 Checkpointing......Page 214
6.1 What Is Checkpointing?......Page 216
6.2 Checkpoint Level......Page 218
6.3 Optimal Checkpointing — An Analytical Model......Page 219
6.3.1 Time Between Checkpoints — A First-Order Approximation......Page 221
6.3.2 Optimal Checkpoint Placement......Page 222
6.3.3 Time Between Checkpoints — A More Accurate Model......Page 223
6.3.4 Reducing Overhead......Page 225
6.3.5 Reducing Latency......Page 226
6.4 Cache-Aided Rollback Error Recovery (CARER)......Page 227
6.5 Checkpointing in Distributed Systems......Page 228
6.5.1 The Domino Effect and Livelock......Page 230
6.5.2 A Coordinated Checkpointing Algorithm......Page 231
6.5.3 Time-Based Synchronization......Page 232
6.5.4 Diskless Checkpointing......Page 233
6.5.5 Message Logging......Page 234
6.6 Checkpointing in Shared-Memory Systems......Page 238
6.6.1 Bus-Based Coherence Protocol......Page 239
6.6.2 Directory-Based Protocol......Page 240
6.7 Checkpointing in Real-Time Systems......Page 241
6.9 Further Reading......Page 244
6.10 Exercises......Page 245
References......Page 247
7.1.1 Architecture......Page 250
7.1.3 Software......Page 254
7.1.4 Modifications to the NonStop Architecture......Page 256
7.2 Stratus Systems......Page 257
7.3 Cassini Command and Data Subsystem......Page 259
7.4 IBM G5......Page 262
7.5 IBM Sysplex......Page 263
7.6 Itanium......Page 265
7.7 Further Reading......Page 267
References......Page 268
8.1 Manufacturing Defects and Circuit Faults......Page 270
8.2 Probability of Failure and Critical Area......Page 272
8.3 Basic Yield Models......Page 274
8.3.1 The Poisson and Compound Poisson Yield Models......Page 275
8.3.2 Variations on the Simple Yield Models......Page 277
8.4 Yield Enhancement Through Redundancy......Page 279
8.4.1 Yield Projection for Chips with Redundancy......Page 280
8.4.2 Memory Arrays with Redundancy......Page 284
8.4.3 Logic Integrated Circuits with Redundancy......Page 291
8.4.4 Modifying the Floorplan......Page 293
8.5 Further Reading......Page 297
8.6 Exercises......Page 298
References......Page 302
9 Fault Detection in Cryptographic Systems......Page 306
9.1.1 Symmetric Key Ciphers......Page 307
9.1.2 Public Key Ciphers......Page 316
9.2 Security Attacks Through Fault Injection......Page 317
9.2.1 Fault Attacks on Symmetric Key Ciphers......Page 318
9.2.2 Fault Attacks on Public (Asymmetric) Key Ciphers......Page 319
9.3 Countermeasures......Page 320
9.3.2 Error-Detecting Codes......Page 321
9.3.3 Are These Countermeasures Sufficient?......Page 325
9.5 Exercises......Page 328
References......Page 329
10.1 Writing a Simulation Program......Page 332
10.2.1 Point Versus Interval Estimation......Page 336
10.2.2 Method of Moments......Page 337
10.2.3 Method of Maximum Likelihood......Page 339
10.2.4 The Bayesian Approach to Parameter Estimation......Page 343
10.2.5 Confidence Intervals......Page 345
10.3.1 Antithetic Variables......Page 349
10.3.2 Using Control Variables......Page 351
10.3.3 Stratified Sampling......Page 352
10.3.4 Importance Sampling......Page 354
10.4 Random Number Generation......Page 362
10.4.1 Uniformly Distributed Random Number Generators......Page 363
10.4.2 Testing Uniform Random Number Generators......Page 366
10.4.3 Generating Other Distributions......Page 370
10.5 Fault Injection......Page 376
10.5.1 Types of Fault Injection Techniques......Page 377
10.6 Further Reading......Page 379
10.7 Exercises......Page 380
References......Page 384
Index......Page 386
备用描述
There are many applications in which the reliability of the overall system must be far higher than the reliability of its individual components. In such cases, designers devise mechanisms and architectures that allow the system to either completely mask the effects of a component failure or recover from it so quickly that the application is not seriously affected. This is the work of fault-tolerant designers and their work is increasingly important and complex not only because of the increasing number of “mission critical” applications, but also because the diminishing reliability of hardware means that even systems for non-critical applications will need to be designed with fault-tolerance in mind. <br><br>Reflecting the real-world challenges faced by designers of these systems, this book addresses fault tolerance design with a systems approach to both hardware and software. No other text on the market takes this approach, nor offers the comprehensive and up-to-date treatment Koren and Krishna provide. Students, designers and architects of high performance processors will value this comprehensive overview of the field.<br><br>* The first book on fault tolerance design with a systems approach<br><br>* Comprehensive coverage of both hardware and software fault tolerance, as well as information and time redundancy<br><br>* Incorporated case studies highlight six different computer systems with fault-tolerance techniques implemented in their design<br><br>* Available to lecturers is a complete ancillary package including online solutions manual for instructors and PowerPoint slides
备用描述
Fault-Tolerant Systems is the first book on fault tolerance design with a systems approach to both hardware and software. No other text on the market takes this approach, nor offers the comprehensive and up-to-date treatment that Koren and Krishna provide. This book incorporates case studies that highlight six different computer systems with fault-tolerance techniques implemented in their design. A complete ancillary package is available to lecturers, including online solutions manual for instructors and PowerPoint slides. Students, designers, and architects of high performance processors will value this comprehensive overview of the field. The first book on fault tolerance design with a systems approach Comprehensive coverage of both hardware and software fault tolerance, as well as information and time redundancy Incorporated case studies highlight six different computer systems with fault-tolerance techniques implemented in their design Available to lecturers is a complete ancillary package including online solutions manual for instructors and PowerPoint slides
开源日期
2009-07-20
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:Motrix
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。