TY - GEN
T1 - Dependability analysis of a commercial high-speed network
AU - Stott, David T.
AU - Hsueh, M. C.
AU - Ries, Gregory L.
AU - Iyer, Ravishankar K.
N1 - Publisher Copyright:
© 1997 IEEE.
PY - 1997
Y1 - 1997
N2 - The paper presents an injection-based approach to analyze dependability of high-speed networks using the Myrinet as an example testbed. Instead of injecting faults related to network protocols, the authors injected faults into the host interface component, which performs the actual send and receive operations. The fault model used was a temporary single bit flip in an instruction executing on the host interface's custom processor, corresponding to a transient fault in the processor itself. Results show that more than 25% of the injected faults resulted in interface failures. Furthermore, they observed fault propagation from an interface to its host computer or to another interface to which it sent a message. These findings suggest that two important issues for high-speed networking in critical applications are protecting the host computer from errant or malicious interface components and implementing thorough message acceptance test mechanisms to prevent errant messages from propagating faults between interfaces.
AB - The paper presents an injection-based approach to analyze dependability of high-speed networks using the Myrinet as an example testbed. Instead of injecting faults related to network protocols, the authors injected faults into the host interface component, which performs the actual send and receive operations. The fault model used was a temporary single bit flip in an instruction executing on the host interface's custom processor, corresponding to a transient fault in the processor itself. Results show that more than 25% of the injected faults resulted in interface failures. Furthermore, they observed fault propagation from an interface to its host computer or to another interface to which it sent a message. These findings suggest that two important issues for high-speed networking in critical applications are protecting the host computer from errant or malicious interface components and implementing thorough message acceptance test mechanisms to prevent errant messages from propagating faults between interfaces.
UR - http://www.scopus.com/inward/record.url?scp=84937577739&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84937577739&partnerID=8YFLogxK
U2 - 10.1109/FTCS.1997.614097
DO - 10.1109/FTCS.1997.614097
M3 - Conference contribution
AN - SCOPUS:84937577739
T3 - Digest of Papers - 27th Annual International Symposium on Fault-Tolerant Computing, FTCS 1997
SP - 248
EP - 257
BT - Digest of Papers - 27th Annual International Symposium on Fault-Tolerant Computing, FTCS 1997
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 27th Annual International Symposium on Fault-Tolerant Computing, FTCS 1997
Y2 - 24 June 1997 through 27 June 1997
ER -