Abstract

Presents an overview of the Chameleon architecture for supporting a wide range of criticality requirements in a heterogeneous network environment. Chameleon employs ARMORs (Adaptive, Reconfigurable and Mobile Objects for Reliability) to synthesize different fault-Tolerant configurations and to maintain run-Time adaptation to changes in the fault tolerance requirements of an application. ARMORs have a flexible architecture that allows their composition to be reconfigured at run-Time, i.e.The ARMORs may dynamically adapt to changing application requirements. In this paper, we focus on the detailed description of the ARMOR architecture, including ARMOR class hierarchy, basic building blocks, ARMOR composition and use of ARMOR factories. We describe how ARMORs can be reconfigured and reengineered, and demonstrate how the architecture serves our objective of providing an adaptive software infrastructure. Our experience with an early Chameleon implementation demonstrates that the proposed ARMOR architecture provides for a highly flexible and reconfigurable software infrastructure.

Original languageEnglish (US)
Title of host publicationProceedings - 3rd IEEE International High-Assurance Systems Engineering Symposium, HASE 1998
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages42-49
Number of pages8
ISBN (Electronic)0818692219, 9780818692215
DOIs
StatePublished - 1998
Event3rd IEEE International High-Assurance Systems Engineering Symposium, HASE 1998 - Washington, United States
Duration: Nov 13 1998Nov 14 1998

Publication series

NameProceedings - 3rd IEEE International High-Assurance Systems Engineering Symposium, HASE 1998
Volume1998-November

Other

Other3rd IEEE International High-Assurance Systems Engineering Symposium, HASE 1998
Country/TerritoryUnited States
CityWashington
Period11/13/9811/14/98

ASJC Scopus subject areas

  • Software
  • Control and Systems Engineering
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'A flexible software architecture for high availability computing'. Together they form a unique fingerprint.

Cite this