wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Operating system

profile
Nikita Mitna
Jul 04, 2024
0 Likes
0 Discussions
31 Reads

Fault-tolerance in operating System
Fault-tolerance is the process of working of a system in a proper way in spite of the occurrence of the failures in the system. Even after performing the so many testing processes there is possibility of failure in system. Practically a system can’t be made entirely error free. hence, systems are designed in such a way that in case of error availability and failure, system does the work properly and given correct result.

Any system has two major components – Hardware and Software. Fault may occur in either of it. So there are separate techniques for fault-tolerance in both hardware and software.

Hardware Fault-tolerance Techniques:
Making a hardware fault-tolerance is simple as compared to software. Fault-tolerance techniques make the hardware work proper and give correct result even some fault occurs in the hardware part of the system. There are basically two techniques used for hardware fault-tolerance:

BIST –
BIST stands for Build in Self Test. System carries out the test of itself after a certain period of time again and again, that is BIST technique for hardware fault-tolerance. When system detects a fault, it switches out the faulty component and switches in the redundant of it. System basically reconfigure itself in case of fault occurrence.
TMR –
TMR is Triple Modular Redundancy. Three redundant copies of critical components are generated and all these three copies are run concurrently. Voting of result of all redundant copies are done and majority result is selected. It can tolerate the occurrence of a single fault at a time.

Software Fault-tolerance Techniques:
Software fault-tolerance techniques are used to make the software reliable in the condition of fault occurrence and failure. There are three techniques used in software fault-tolerance. First two techniques are common and are basically an adaptation of hardware fault-tolerance techniques.

N-version Programming –
In N-version programming, N versions of software are developed by N individuals or groups of developers. N-version programming is just like TMR in hardware fault-tolerance technique. In N-version programming, all the redundant copies are run concurrently and result obtained is different from each processing. The idea of n-version programming is basically to get the all errors during development only.

Recovery Blocks –
Recovery blocks technique is also like the n-version programming but in recovery blocks technique, redundant copies are generated using different algorithms only. In recovery block, all the redundant copies are not run concurrently and these copies are run one by one. Recovery block technique can only be used where the task deadlines are more than task computation time.

Check-pointing and Rollback Recovery –
This technique is different from above two techniques of software fault-tolerance. In this technique, system is tested each time when we perform some computation. This techniques is basically useful when there is processor failure or data corruption.

 

Nikita Mitna 

53003230109

Div A


Comments ()


Sign in

Read Next

Hypothesis Testing in Data Science

Blog banner

Developments in Modern Operating Systems

Blog banner

Game via listing method

Blog banner

Race condition

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Bulk E-mail software

Blog banner

HR Automation : Need of the hour

Blog banner

How to kiss

Blog banner

I/O buffer and its techniques

Blog banner

TAILS OS

Blog banner

Security issues

Blog banner

Threads

Blog banner

Types of OS

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

memory cache

Blog banner

GraphX:- A graph processing tool

Blog banner

INTRODUCTION TO C#

Blog banner

E-mail security

Blog banner

Deadlock

Blog banner

Deadlock

Blog banner

VIRTUAL MACHINE

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Disk scheduling

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Save Girl Child

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

10 Reasons to date your best friend

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Importance of Website

Blog banner

IOT- Internet Of Things

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Ola

Blog banner

The launch of UniMap by HERE

Blog banner

R Programming

Blog banner

Data Security must be your Priority!

Blog banner

Optimization of operating system design

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Top 10 Logos and their meanings

Blog banner

Evolution of Operating system

Blog banner

Interrupts in operating system.

Blog banner