Continous service provisioning is a key feature of modern hardware und software server systems. These systems achieve their level of user-perceived availability through a set of formal and technical approaches, commonly summarized under the term dependability.
Dependability is defined as the trustworthiness of hardware and software systems, so that reliance can be placed on the service they provide. The main dependability attributes commonly known and accepted are availability, reliability, safety, and security.
The Dependable Systems course gives an introduction into theoretical foundations, common building blocks and example implementations for dependable IT components and systems. The focus is on reliability and availability aspects of dependable systems, such as reliability analysis, fault tolerance, fault models or failure prediction.
Introduction | 01:07:47 | |
---|---|---|
What is Dependability? | 00:17:28 | |
Dependability Examples | 00:09:17 | |
Dependable Systems Motivation | 00:23:17 | |
Dark Clouds | 00:12:38 | |
Course Topics | 00:05:07 |
Definitions and Metrics - Faults | 01:13:02 | |
---|---|---|
Dependability | 00:13:56 | |
System Integration Levels | 00:15:12 | |
Dependability Threats | 00:14:03 | |
Faults | 00:07:21 | |
Observations on Faults | 00:17:45 | |
Fault Model | 00:04:45 |
Dependability Threats | 01:28:39 | |
---|---|---|
Chain of Dependability Threats | 00:11:26 | |
Fault Model for Semiconductor Memories | 00:15:34 | |
Errors | 00:14:28 | |
Software Error Models | 00:14:13 | |
Failures | 00:13:24 | |
Swiss Cheese Model | 00:07:49 |
Means of Dependability | 01:19:40 | |
---|---|---|
Fault Prevention | 00:08:10 | |
Testing | 00:12:47 | |
Phases of Fault Tolerance | 00:17:23 | |
Fault Tolerance - Damage Confinement | 00:16:53 | |
Fault Tolerance - Fault Treatment | 00:06:20 | |
Attributes of Dependability | 00:06:01 |
Attributes of Dependability | 01:14:11 | |
---|---|---|
Attributes of Dependability | 00:15:21 | |
PDF & CDF | 00:17:46 | |
Why Exponential? | 00:11:13 | |
Variable Failure Rate in Real World | 00:13:43 | |
Steady-State Availability and MTBF | 00:16:08 |
Dependability Modeling 1/2 | 01:13:04 | |
---|---|---|
Amazon EC2 SLA | 00:08:27 | |
Dependability Modeling | 00:20:30 | |
General Rules | 00:10:34 | |
Serial Case | 00:15:04 | |
K-of-N Systems | 00:12:27 | |
Reliability Block Diagrams | 00:06:02 |
Dependability Modeling 2/2 | 01:26:08 | |
---|---|---|
Complex RBDs | 00:10:59 | |
Coherent Structures | 00:10:43 | |
Deductive Analysis | 00:12:06 | |
Cut Sets | 00:13:52 | |
Quantitative Analysis of Fault Trees | 00:18:42 | |
HECS Example | 00:05:13 |
Dependability Modeling & State-Based Dependability Modeling | 01:23:03 | |
---|---|---|
Cut Sets | 00:11:10 | |
RBD vs. FTA | 00:15:05 | |
Event Tree Analysis | 00:10:20 | |
State-Based Dependability Modeling | 00:10:52 | |
Markov Chains | 00:16:25 | |
Stochatic Petri Nets | 00:13:44 | |
Petri Net Simulation | 00:05:27 |
Reliability Prediction | 01:18:41 | |
---|---|---|
Introduction | 00:10:53 | |
MIL-HDBK 217 | 00:18:29 | |
Telcordia (Bellcore) SR-332/TR-332 | 00:10:59 | |
Software - A Different Story | 00:11:41 | |
Software Reliability Growth Models | 00:15:32 | |
Basic Execution Time Model (Musa) | 00:11:07 |
System Dependability Evaluation(1) | 01:20:58 | |
---|---|---|
Software - A Different Story | 00:17:59 | |
Halstead Metric | 00:17:32 | |
System Dependability Evaluation | 00:17:25 | |
FMEA | 00:14:49 | |
HAZOPS | 00:13:13 |
System Dependability Evaluation(2) | 01:18:42 | |
---|---|---|
Introduction | 00:09:31 | |
Software Process Evaluation and Improvement | 00:19:40 | |
Six Sigma | 00:14:55 | |
ITIL | 00:27:06 | |
CoCiT | 00:07:40 |
Architectural Patterns | 01:18:30 | |
---|---|---|
Phases of Fault Tolerance | 00:17:02 | |
Error Containment Barrier | 00:11:12 | |
Correcting Audits | 00:14:46 | |
Spatial Redundancy though Replication | 00:21:00 | |
Humans | 00:11:27 | |
Fault Observer | 00:03:03 |
Detection Patterns | 01:27:23 | |
---|---|---|
Detection Patterns | 00:19:58 | |
Realistic Threshold Examples | 00:21:28 | |
Error Recovery Patterns | 00:12:16 | |
Redundancy Configuration for Failover | 00:23:39 | |
SCSI Quorum Device | 00:10:02 |
Fault Tolerance Patterns & Hardware Dependability - Diagnosis | 01:23:14 | |
---|---|---|
Failover | 00:12:52 | |
Checkpoint | 00:10:23 | |
Error Mitigation | 00:19:23 | |
Hardware Dependability - Diagnosis | 00:16:48 | |
Coding Checks in Memory Hardware | 00:16:35 | |
Checksumming | 00:07:13 |
Hardware Dependability - Testing | 01:22:35 | |
---|---|---|
Assignment | 00:13:56 | |
Dependable Systems Design(Echtle) | 00:12:52 | |
Hardware Testing | 00:11:40 | |
Memory Testing | 00:12:19 | |
Fault Injection | 00:17:13 | |
Fault List Reduction | 00:14:35 |
Hardware Dependability - Redundancy | 01:18:21 | |
---|---|---|
Redundancy | 00:15:02 | |
System Failure Response Strategies | 00:16:12 | |
N-Modular Redundancy | 00:13:54 | |
Hardware Voting | 00:15:52 | |
Hybrid Approaches | 00:17:21 |
Memory- and Disk Redundancy | 01:25:50 | |
---|---|---|
Assignment 3 | 00:06:20 | |
Redundancy | 00:16:07 | |
The Real World of Hardware Redundancy | 00:21:06 | |
Disk Redundancy | 00:15:17 | |
RAID MTTF Calculation | 00:18:59 | |
Software RAID | 00:08:01 |
Proactive Fault Management | 01:27:48 | |
---|---|---|
Introduction | 00:10:22 | |
Variable Selection | 00:09:11 | |
Online Failure Prediction Taxonomy | 00:17:20 | |
Prediction Techniques Examples | 00:09:51 | |
Dispersion Frame Technique | 00:16:14 | |
Assessing Failure Prediction | 00:13:16 | |
Taking Action | 00:11:34 |
Software Dependability 1/3 | 01:11:50 | |
---|---|---|
Introduction | 00:08:32 | |
Software Dependability | 00:11:29 | |
Test Case Design | 00:13:13 | |
Fault-Tolerance Software | 00:21:05 | |
Another Categorization | 00:09:38 | |
Checkpointing | 00:07:53 |
Software Dependability 2/3 | 01:20:43 | |
---|---|---|
Single Version Approaches | 00:21:15 | |
High-Level Instruction Duplication | 00:18:06 | |
Control Flow error | 00:14:14 | |
CFE - Approaches | 00:08:16 | |
Multi-Version Approaches | 00:12:09 | |
Example | 00:06:43 |
Software Dependability 3/3 | 01:26:20 | |
---|---|---|
Introduction | 00:19:29 | |
N-Version Programming | 00:10:24 | |
NVP- Programming Process | 00:18:06 | |
NVP Independance Evaluation | 00:11:57 | |
Simplex Approach | 00:11:10 | |
Failover Cluster | 00:07:30 | |
VMWare HA | 00:07:44 |