ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE



Similar documents
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Architecture of distributed network processors: specifics of application in information security systems

How To Understand The Concept Of A Distributed System

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

Chapter 18. Network Management Basics

SAN Conceptual and Design Basics

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

A Study of Network Security Systems

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Network Security Administrator

Network Design. Yiannos Mylonas

Application Performance Analysis and Troubleshooting

Higher Computing Networking 1

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

FRCC NETWORK SERVICES REQUEST FOR PROPOSAL

M.Sc. IT Semester III VIRTUALIZATION QUESTION BANK Unit 1 1. What is virtualization? Explain the five stage virtualization process. 2.

The Role of Carrier Ethernet in Business Applications

Using High Availability Technologies Lesson 12

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE. CTS 2655 and CNT 2102 with grade of C or higher in both courses

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

OPNET Network Simulator

Performance Evaluation of Wired and Wireless Local Area Networks

Troubleshooting an Enterprise Network

A Comparative Study of cloud and mcloud Computing

Network Attached Storage. Jinfeng Yang Oct/19/2015

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Overview of Computer Networks

Sensor network infrastructure for intelligent building monitoring and management system

White Paper. Requirements of Network Virtualization

Introduction to Network Management

Networking Systems (10102)

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

Computer Networking Networks

Master of Science in Computer Science

Address Resolution Protocol (ARP)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

A Survey on Load Balancing and Scheduling in Cloud Computing

Brocade Solution for EMC VSPEX Server Virtualization

1.1. Abstract VPN Overview

Building a Highly Available and Scalable Web Farm

Module 15: Network Structures

Design of Remote data acquisition system based on Internet of Things

Chapter 1 Reading Organizer

Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Overview of Routing between Virtual LANs

Network Virtualization for Large-Scale Data Centers

Huawei One Net Campus Network Solution

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April ISSN

Customer Specific Wireless Network Solutions Based on Standard IEEE

Chapter 3. Enterprise Campus Network Design

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

IP SAN Best Practices

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

The ABCs of Spanning Tree Protocol

Network Management and Monitoring Software

Introduction Chapter 1. Uses of Computer Networks

Applying Mesh Networking to Wireless Lighting Control

QoS issues in Voice over IP

Top-Down Network Design

Chapter 16: Distributed Operating Systems

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Digital Advisory Services Professional Service Description Network Assessment

ADVANCED NETWORK CONFIGURATION GUIDE

Analyzing 6LoWPAN/ZigBeeIP networks with the Perytons Protocol Analyzer May, 2012

PLCs and SCADA Systems

Switch Fabric Implementation Using Shared Memory

StreamStorage: High-throughput and Scalable Storage Technology for Streaming Data

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

Token-ring local area network management

Dynamically Reconfigurable Network Nodes in Cloud Computing Systems

Chapter 14: Distributed Operating Systems

Layer 3 Network + Dedicated Internet Connectivity

Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture

Grid Computing Vs. Cloud Computing

INFOCOMM & DIGITAL MEDIA (IT NETWORK AND SYSTEM ADMINISTRATION)

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

INTELLIGENT DISTRIBUTION NETWORK ANALYSIS AND INFORMATION ARCHITECTURE DESIGN

Chapter 5. Data Communication And Internet Technology

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Optimizing Data Center Networks for Cloud Computing

MANAGING NETWORK COMPONENTS USING SNMP

Cisco Change Management: Best Practices White Paper

Introduction: Why do we need computer networks?

Network Management System (NMS) FAQ

Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

Transcription:

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer Science and Engineering, Saveetha University, Chennai, India 2 Department of Computer Science and Engineering, Anna University, Chennai, India 3 Department of Information Science and Technology, Anna University, Chennai, India ABSTRACT This work proposes enhanced hybrid frame work for reliability analysis for Safety Critical Network Infrastructure. The proposed frame work enables design and development of web service for the safety critical systems to identify the failures in the network infrastructure. The enhanced hybrid frame work of reliability analysis for multilayer in Safety Critical Network Infrastructure results in accuracy of identifying the failure of the, failure modes of the that makes the system more reliable and reduces the error rate in the network infrastructure. The Safety Critical Network Infrastructure requires a monitoring mechanism that can be used for public sector enables to detect failures as early as possible in the layers of the network. In order to work as a service provider for the critical s to the user a web service was designed and these failure results are used as database for efficient utilization of the data. Keywords: SCNI, RBD, reliability analysis, CWAN, Web services.. INTRODUCTION The phenomenal growth of the internet and mobile communication is playing an important role in the fields of air traffic control systems, telephone switching, real time military systems, medicine, remote monitoring and disaster management. Due to the extraordinary growth of the information-oriented society, today's world has become more dependent on information sharing through interconnected networks and find wider applications in space exploration, meteorological department, nuclear power station, educational institutions and business process management. In line with these developments, the size and complexity of computing systems have grown manifold from single processor based systems to multiple processor based one. Developments in communication bandwidth and processing capacity has further enabled the development of distributed and cloud computing. Today s computing environment is heavily dependent on networks for load balancing (web servers), resource sharing (storage arrays), data redundancy (database replication), security (cryptography), high capacity and availability (distributed and cloud computing). The tasks carried out by these systems vary from small scale programs to very large scale resource sharing networks that cater to the needs of local and global demands. Since all such systems remain interconnected, a heavy dependability on computer network necessitates fail-proof systems to ensure connectivity, availability, maintenance of bandwidth and performance. Each and every of the network should comply with certain standards to ensure that these systems shall perform to the expected level at all the times and still remain fault tolerant. 2. PREVIOUS WORK Several reliability models were developed to predict the failure. A reliability prediction model predicts the rate at which a given is expected to fail. These predictions help in the () selection of a suitable for the desired purpose, (2) assess the stress level that each can withstand, (3) development of possible alternative designs that are most suitable for the given purpose. The most critical problems concerning network reliability, modeling and analysis are summarized by Jereb (999) as following and described briefly in the following paragraphs:. Connectivity measures. 2. Maxflow (capacity) measures. 3. Multicommodity flow measures. 4. Performability measures. 2.(a) Connectivity measures In 970s and early 980s, reliability was considered as the connectivity of the graph representing the network. In this case, a subset of graph nodes, called K, is defined. The most general measure of reliability is the K-terminal probabilistic connectivity, which is the probability that certain connections exist in the graph among the nodes in K (Hwang et al., 98; Locks, 985). However, connectivity is not able to properly reflect the degradation of the performance of the network. This is mainly due to the fact that a software or hardware malfunction may degrade the performance of the network while still remaining connected. During disconnection, the network shall remain dead and there shall be no way to measure the performance issue such as effective bandwidth and delay arising from rerouting. 2.(b) Maxflow (capacity) measures Later on, as the demand for communication bandwidth has grown the need to communicate given information within a short-time gained momentum. Under such a situation Lee (980) defined network reliability as the probability of successfully transmitting the required amount of information from the source to the destination. Here performance indices were utilized by keeping the 2098

maximum capacity of the network as the normalization factor (Hwang et al., 98; Locks, 985; Rai and Soh, 99). 2.(c) Multicommodity flow measures The main difference between maxflow and multicommodity flow measures is that in the later, the reliability is measured by performance indices to the former but with the realized simultaneous transmission capacity among its endpoints as the normalization factor. This approach enabled inclusion of considerations on the impact of actual routing schemes compared to the maxflow measure approach. Detailed discussions are available in Barezzani et al. (992) where usual definition of availability of a network is extended to network availability. 2.(d) Performability measures Earlier definitions of reliability were mainly focused on the quality of the network s and the service provided. Depending on the topology and various s of the network, the reliability was affected. However, another point that should be given due consideration is that the demand for network services is not constant and this variable demand may degrade the performance of the network. For example, in a heavily crowded network, the traffic routing can significantly influence the performance of the network. Thus, performability of a network is given importance in the study of reliability of network by Sanso et al. (99). 2.2. Reliability assessment Over a period of time several techniques were developed for the assessment of reliability. The most widely used techniques in computing systems are reliability block diagrams, network diagrams, fault tree analysis, failure mode effect analysis, Monte Carlo simulation, and Markov model (MinXie et al., 2004). In a networked environment, knowledge of the reliability of all s is utilized for making prediction of the reliability of the entire network. 2.2.. Reliability block diagram A reliability block diagram is one of the conventional and most widely utilized tool for system reliability analysis (Bastani et al., 992; MinXie et al., 2004). A major advantage of using the reliability block diagram approach is the ease of reliability expression and evaluation. A reliability block diagram shows the system reliability structure. It is made up of individual blocks and each block corresponds to a system module or function. Those blocks are connected with each other through certain basic relationships such as, series and parallels. The series relationship between two blocks is depicted by Figure-a and parallels by Figure- b. (a) Series blocks (b) Parallel blocks Figure-. (a)(b) Relationship between two blocks - continued. Suppose that the reliability of a block for module i is known or estimated, and it is denoted by R i. Assuming that the blocks are independent from a reliability point of view, the reliability of a system with two serially connected blocks is R S = R R 2 And that of a system with two parallel blocks is R p i 2 ( R i ) 2.2.2. Network diagram Network diagrams are commonly used in representing communication networks consisting of individual links. The computation of network reliability is the primary application of network diagrams purpose of a network is to execute programs by connecting different sites that contain processing elements and resources. 3. RESEARCH METHOD Combining powerful computation facilities (Safety Critical Systems) with high-speed digital communications (Network infrastructure) can lead to systems that are thousands of times more complex than would normally be considered in a hardware system, such as the electronic funds transfer system within the financial network or the supervisory and control mechanisms within the electric power grid. Such systems are referred to as Critical Infrastructure (CI). 3.. Safety critical network infrastructure A Safety Critical Network Infrastructure (SCNI) in Figure-2 is considered as a layered hierarchal network structure that provides high performance and only some layers are susceptible for congestion. It also provides an efficient management strategy to organize the network and provides several troubleshooting options. In addition to this, it also provides a policy frame work that specifies the filter rules to manage the network, and scalability options by dividing the network into several key functional units. 2099

Table-(a). s in core layer. s of core layer Internal Quantity level RF Line Local DNS Global DNS Figure-2. Safety critical network infrastructure. 3... Parts count analysis From the below Tables (a), (b), (c) list the major s and their quantity level are identified from the report. In the router, the hardware s of the network infrastructure s are redundantly present. So the frequency of failures is minimal. In case of router the bus error crash leads to network failure. In other s of the network there is deviation from the normal mode of operation without total failure. Its results are equally harmful that effects on the system operation. Table-(b). s in access layer. s of access layer Internal Distribution switches Quantity level Hubs Table-(c). s in distribution layer. s of distribution Internal Quantity level Router Layer Firewall Switches 3 3..2. Failure mode effect analysis The factors that are considered for this approach are () fault identification, (2) potential effects of fault, (3) estimated or projected compensation, (4) identify, implement and document the recommended actions. The analysis process in the FMEA approach has the following columns the Risk Priority Numbers (RPN) methodology for analyzing the risks associated with potential problems identified during the FMEA (R and D staffs, 200). The RPN is the critical indicator for determining proper corrective action on the failure modes. 200

Table-2. FMEA - DNS hardware s. Hardware Hardware Effects of networking elements networking networking element Hardware networking O D S RPN Non device problems failure mode Critical critical DNS failure Trouble in resolving the s 3 2 0 60 DNS - of other computers Failure Memory allocation No free space to allocate the 4 5 20 - Performance failed query Degradation Gradual Isolation of network Power failure, network cable 2 2 2 8 - Failure of DNS segment problem The failure Configuration Network segment use the same Operating at 3 3 3 27 - Reduced problem DNS server performance Generic routine Configured DNS server was Operating at 5 3 2 30 - Reduced problem unreachable performance Figure-3. DNS hardware problems Vs RPN. From Table-2 it is inferred that DNS failure happens when there is trouble in resolving the s of other computers. The other networking problems are memory allocation failure, isolation of network segment, configuration problem, and generic routine problem. The failure modes for DNS elements are no free space in allocating the requested query; network cable problem due to power fluctuation, network segment uses the same DNS server, configuration problem if the server status is not in reach. In Figure-3, the graphical representation illustrates that DNS failure where the chance of network down is higher. In case of genetic routine problems the criticality is moderate. The memory allocation failure and isolation of network segment, the state of criticality is at negligible level. 4. CONCLUSIONS Effective communication across various services is essential as accessibility is an important consideration. The information about the failure probabilities from the SCNI model are to be properly utilized by the public sector. Creation of the web service for CWAN satisfies the above factor. The theory behind service oriented architecture are publish, find, bind are implemented using the web service for CWAN. The monitoring service is a web service which calls upon the services of core layer, distribution layer and access layer of their service methods. Using these three services the fault identification and correction mechanism of the three layers can be invoked remotely. The interoperability feature is performed by the web service for CWAN by separating the mechanism of access from the implementation. The client can access any one of the service (Core service, Distributed service, Access service) in CWAN by accessing only its service but the client is hidden from how the implementation process for the development of the web service. REFERENCES Barezzani. M, Pupolin. P, Zorzi. M, A New Definition of Transmission Network Availability with Applications, European Trans. On Telecommunications, Vol.3, No.4, July/August 992, pp. 349-357. Buttyan. L, Application Of Wireless Sensor Networks In Critical Infrastructure Protection: Challenges And Design Options, IEEE Wireless Communications, 200. Hyper Text Transfer Protocol Activity at Wide Web Consortium. http://www.w3.org/protocols/activity.html Jereb. L, Network Reliability: Models, Measures, and analysis, 6 th IFIP ATM 98, U.K, 998, pp. T02/-0. John C.Knight, Safety Critical Systems: Challenges and directions, ICSE proceeding of the 24 th International Conference on Software Engineering, 2002. 20

Lee. S, Reliability Evaluation of flow network, IEEE trans. Reliability, vol. R-3, 980, pp. 24-26. Min Xie, Yuan-Shun Dai and Kim-Leng Poh. Computing System Reliability: Models and Analysis. Kluwer Academic/ Prenum Publishers, 2004. Papadopoulos Y, Parker D, Grante C, Automating the Failure Mode and Effect analysis of safety critical systems, High Assurance systems Engineering, 2004. R and D staffs, Examining Risk Priority Numbers in FMEA, Reliability EDGE, Volume 4, Issue, 200. Sanso.B, Soumis.F, Gendreau.M, On the Evaluation of Telecommunications Network Reliability Using Routing Models, IEEE Trans. On Communications, Vol. COM -39, 99, pp. 494-50. W3C, Web Services Architecture Working Group - Web Services Architecture, http: //www. w3. org/tr/2 004/NOTE-ws-arch-200402/ Workshop on object-oriented Web Services OOPSLA Tampa, Florida, USA. Xie, M., Software Reliability Modelling, World Scientific Publishing Co., Singapore, 99 Zio.E, Reliability Engineering: Old problems and new challenges, Reliability Engineering and System Safety, vol. 94, pp. 25-4, 2009. 202