Continuous service provisioning is a key feature of modern hardware und software server systems. These systems achieve their level of user-perceived availability through a set of formal and technical approaches, commonly summarized under the term dependability.
Dependability is defined as the trustworthiness of hardware and software systems, so that reliance can be placed on the service they provide. The main dependability attributes commonly known and accepted are availability, reliability, safety, and security.
The Dependable Systems course gives an introduction into theoretical foundations, common building blocks and example implementations for dependable IT components and systems. The focus is on reliability and availability aspects of dependable systems, such as reliability analysis, fault tolerance, fault models or failure prediction. Amongst other things, the following topics are covered:
Definitions and Metrics | 01:19:24 | |
---|---|---|
Dependability | 00:12:39 | |
Definitions and Metrics | 00:18:00 | |
Dependability Tree (Laprie) | 00:16:23 | |
Dependability Threats | 00:09:26 | |
Faults | 00:11:56 | |
Observations on Faults | 00:11:00 |
Faults & Errors | 01:16:29 | |
---|---|---|
Wiederholung | 00:09:29 | |
Observations on Faults | 00:16:05 | |
Fault Model for Semiconductor Memories | 00:19:23 | |
Errors | 00:11:28 | |
Software Error Models | 00:13:22 | |
Error Message Occurrence | 00:06:42 |
Failures & Means for Dependability | 01:27:56 | |
---|---|---|
Reliability Growth & the Bathtub Curve | 00:12:03 | |
Wiederholung | 00:13:31 | |
Failures | 00:16:03 | |
Failure Types | 00:21:50 | |
Means for Dependability | 00:14:35 | |
Fault Tolerance | 00:09:54 |
Fault Tolerance | 01:08:09 | |
---|---|---|
Fault Tolerance | 00:15:44 | |
Phases of Fault Tolerance | 00:09:01 | |
Fault Tolerance - Error Detection | 00:15:23 | |
Fault Tolerance - Damage Confinement | 00:14:44 | |
Fault Tolerance - Fault Treatment | 00:13:17 |
Dependability Attributes | 01:21:06 | |
---|---|---|
Attributes of Dependability | 00:12:24 | |
Observations on Dependability Attributes | 00:14:30 | |
Probability of Events | 00:20:19 | |
Failure Rate | 00:07:53 | |
Variable Failure Rate in Real World | 00:17:31 | |
Steady-State Availability | 00:08:29 |
Zusammenfassung & Dependability Modeling | 01:01:02 | |
---|---|---|
PDF & CDF | 00:15:34 | |
Steady-State Availability | 00:12:50 | |
MTTR Examples | 00:07:44 | |
Dependability Modeling | 00:10:04 | |
The Failure Space-Success Space | 00:14:50 |
Dependability Modeling | 01:08:00 | |
---|---|---|
Dependability Modeling | 00:09:50 | |
General Rules | 00:23:06 | |
K-of-N Sytems | 00:16:31 | |
Reliability Block Diagrams | 00:14:25 | |
Deductive Analysis | 00:04:08 |
Fault Trees | 01:21:51 | |
---|---|---|
Deductive Analysis - Fault Trees | 00:10:46 | |
Fault Tree Analysis | 00:22:29 | |
Cut Sets | 00:21:05 | |
Method for Obtaining Cut Sets | 00:18:21 | |
Assignment 1 | 00:09:10 |
Fault Trees, Event Trees & State-Based Dependability Modeling | 01:11:20 | |
---|---|---|
Dynamic Fault Trees | 00:15:33 | |
Fault Tree Construction | 00:20:02 | |
Event Tree Analysis | 00:12:02 | |
State-Based Dependability Modeling | 00:12:28 | |
Markov Chains | 00:11:15 |
State-Based Dependability Modeling | 01:16:05 | |
---|---|---|
State-based Models | 00:13:54 | |
Markov Chains | 00:16:00 | |
Typical Petri Net Properties | 00:14:33 | |
Petri Net Simulation | 00:13:46 | |
Reliability Prediction | 00:17:52 |
Reliability Prediction | 01:26:48 | |
---|---|---|
Reliability Data | 00:18:38 | |
Application Environment Factor | 00:11:32 | |
Other Sources | 00:16:23 | |
Software Reliability Assessment | 00:11:51 | |
Jelinski-Moranda Model | 00:13:52 | |
Halstead Metric | 00:14:32 |
System Dependability Evaluation | 01:30:29 | |
---|---|---|
Qualitative Dependability Investigation | 00:22:10 | |
RCA: Why-Because Analysis | 00:11:50 | |
FMEA | 00:17:31 | |
FMEA Worksheet | 00:14:15 | |
FMEA Worksheet (2) | 00:16:34 | |
Starter Questions | 00:08:09 |
FMEA, FMECA, HAZOPS & CMMI | 01:16:16 | |
---|---|---|
FMEA Worksheet | 00:12:00 | |
Examples | 00:13:02 | |
Software FMEA | 00:16:43 | |
FMECA | 00:06:34 | |
HAZOPS | 00:08:35 | |
Software Process Evaluation and Improvement | 00:19:22 |
Six Sigma, ITIL & CoBIT | 01:26:32 | |
---|---|---|
Reliability Models for IT Infrastructures | 00:06:22 | |
Six Sigma | 00:15:27 | |
Six Sigma Metrics | 00:13:26 | |
ITIL | 00:14:40 | |
ITIL v3 - Service Strategy | 00:15:16 | |
CoBIT | 00:07:13 | |
Zur Übung | 00:14:08 |
Fault Tolerance Patterns | 01:13:55 | |
---|---|---|
Einführung | 00:11:48 | |
Phases of Fault Tolerance | 00:17:43 | |
Architectural Patterns | 00:14:07 | |
Correcting Audits | 00:20:41 | |
Examples | 00:09:36 |
Architectural Patterns & Detection Patterns | 01:24:10 | |
---|---|---|
Wiederholung | 00:08:16 | |
Humans | 00:14:05 | |
Someone in Charge | 00:10:09 | |
Detection Patterns | 00:15:13 | |
System Monitor / Heartbeat | 00:12:36 | |
Realistic Threshold | 00:09:04 | |
Voting | 00:14:47 |
Detection Patterns & Error Recovery Patterns | 00:59:10 | |
---|---|---|
Voting | 00:15:26 | |
Maintenance and Exersises | 00:14:57 | |
Error Recovery Patterns | 00:15:57 | |
Individuals Decide Timing / Data Reset | 00:12:50 |
Error Recovery Patterns | 01:28:38 | |
---|---|---|
Error Recovery Patterns | 00:09:11 | |
Remote Storage | 00:12:31 | |
Failover | 00:31:37 | |
Redundancy Configurations for Failover | 00:12:06 | |
Failover - Quorum Approaches | 00:07:22 | |
SCSI Quorum Device | 00:15:51 |
Hardware Dependability - Diagnosis | 01:22:31 | |
---|---|---|
Zur Übung | 00:17:29 | |
Marked Data | 00:06:28 | |
Hardware Dependability - Diagnosis | 00:18:05 | |
Fault Detection - Coding Checks | 00:11:45 | |
Parity Codes | 00:17:15 | |
Checksumming | 00:11:29 |
Hardware Dependability - Testing | 01:13:22 | |
---|---|---|
Wiederholung | 00:03:22 | |
Dependable Systems Design | 00:13:17 | |
Hardware Design for Testability | 00:16:54 | |
RAM Testing | 00:11:17 | |
Fault Injection / Insertion | 00:12:52 | |
Faults vs. Fault Injection | 00:06:17 | |
Existing Work | 00:09:23 |
Hardware Dependability - Redundancy | 01:12:01 | |
---|---|---|
Redundancy (Reiteration) | 00:06:05 | |
Sphere of Replication | 00:17:34 | |
Static Redundancy: Voting | 00:13:53 | |
TMR Reliability | 00:09:33 | |
Dynamic Redundancy und Back-Up Sparing | 00:12:16 | |
Hybrid Approaches | 00:10:20 | |
Triple Duplex Architecture | 00:02:20 |
Software Dependability | 01:09:30 | |
---|---|---|
The Real World of Hardware Redundancy | 00:14:50 | |
RAID | 00:17:23 | |
Raid Analysis | 00:09:40 | |
Software Dependability | 00:13:21 | |
System Stack Failure Scenarios | 00:14:16 |
Fault-tolerant Software | 01:02:07 | |
---|---|---|
Fault-tolerant Software | 00:15:17 | |
Software Structures and Actions | 00:13:11 | |
High-Level Instruction Duplication | 00:19:36 | |
Multi-Version Approaches | 00:14:03 |