Regional Failure Events in Communication Networks

Regional Failure Events in Communication Networks

Author: Balázs Vass

Publisher: Springer Nature

Published: 2022-08-31

Total Pages: 130

ISBN-13: 303114256X

DOWNLOAD EBOOK

This book presents a comprehensive study covering the design and application of models and algorithms for assessing the joint device failures of telecommunication backbone networks caused by large-scale regional disasters. At first, failure models are developed to make use of the best data available; in turn, a set of fast algorithms for determining the resulting failure lists are described; further, a theoretical analysis of the complexity of the algorithms and the properties of the failure lists is presented, and relevant practical case studies are investigated. Merging concepts and tools from complexity theory, combinatorial and computational geometry, and probability theory, a comprehensive set of models is developed for translating the disaster hazard in informative yet concise data structures. The information available on the network topology and the disaster hazard is then used to calculate the possible (probabilistic) network failures. The resulting sets of resources that are expected to break down simultaneously are modeled as a collection of Shared Risk Link Groups (SRLGs), or Probabilistic SRLGs. Overall, this book presents improved theoretical methods that can help predicting disaster-caused network malfunctions, identifying vulnerable regions, and assessing precisely the availability of internet services, among other applications.


Guide to Disaster-Resilient Communication Networks

Guide to Disaster-Resilient Communication Networks

Author: Jacek Rak

Publisher: Springer Nature

Published: 2020-07-22

Total Pages: 813

ISBN-13: 3030446859

DOWNLOAD EBOOK

This authoritative volume presents a comprehensive guide to the evaluation and design of networked systems with improved disaster resilience. The text offers enlightening perspectives on issues relating to all major failure scenarios, including natural disasters, disruptions caused by adverse weather conditions, massive technology-related failures, and malicious human activities. Topics and features: describes methods and models for the analysis and evaluation of disaster-resilient communication networks; examines techniques for the design and enhancement of disaster-resilient systems; provides a range of schemes and algorithms for resilient systems; reviews various advanced topics relating to resilient communication systems; presents insights from an international selection of more than 100 expert researchers working across the academic, industrial, and governmental sectors. This practically-focused monograph, providing invaluable support on topics of resilient networking equipment and software, is an essential reference for network professionals including network and networked systems operators, networking equipment vendors, providers of essential services, and regulators. The work can also serve as a supplementary textbook for graduate and PhD courses on networked systems resilience.


Autonomic Computing and Networking

Autonomic Computing and Networking

Author: Mieso Denko

Publisher: Springer Science & Business Media

Published: 2009-06-12

Total Pages: 462

ISBN-13: 038789828X

DOWNLOAD EBOOK

Autonomic Computing and Networking presents introductory and advanced topics on autonomic computing and networking with emphasis on architectures, protocols, services, privacy & security, simulation and implementation testbeds. Autonomic computing and networking are new computing and networking paradigms that allow the creation of self-managing and self-controlling computing and networking environment using techniques such as distributed algorithms and context-awareness to dynamically control networking functions without human interventions. Autonomic networking is characterized by recovery from failures and malfunctions, agility to changing networking environment, self-optimization and self-awareness. The self-control and management features can help to overcome the growing complexity and heterogeneity of exiting communication networks and systems. The realization of fully autonomic heterogeneous networking introduces several research challenges in all aspects of computing and networking and related fields.


Technical Asset Management for Railway Transport

Technical Asset Management for Railway Transport

Author: Igor Borisovich Shubinsky

Publisher: Springer Nature

Published: 2022-01-03

Total Pages: 228

ISBN-13: 3030900290

DOWNLOAD EBOOK

This book introduces readers to the key provisions of the URRAN-based technical asset management system - a methodology for managing resources and risks by analyzing and ensuring the required levels of reliability and safety in Russia’s railway transport facilities. It describes the architecture of the URRAN information system’s unified corporate platform (UCP URRAN) and its subsystems for infrastructure facilities and rolling stock complexes. It also highlights the UCP URRAN’s prospects for development, especially in the application of artificial intelligence to predict dangerous events in railway transport operation. The book is chiefly intended for specialists engaged in practical work on the technical maintenance of railway transport facilities. It can also be used as a reference guide for students and researchers at railway universities or professionals who are dealing with problems in technical asset management in other industries.


Estimation of Rare Event Probabilities in Complex Aerospace and Other Systems

Estimation of Rare Event Probabilities in Complex Aerospace and Other Systems

Author: Jerome Morio

Publisher: Woodhead Publishing

Published: 2015-11-16

Total Pages: 217

ISBN-13: 0081001118

DOWNLOAD EBOOK

Rare event probability (10-4 and less) estimation has become a large area of research in the reliability engineering and system safety domains. A significant number of methods have been proposed to reduce the computation burden for the estimation of rare events from advanced sampling approaches to extreme value theory. However, it is often difficult in practice to determine which algorithm is the most adapted to a given problem.Estimation of Rare Event Probabilities in Complex Aerospace and Other Systems: A Practical Approach provides a broad up-to-date view of the current available techniques to estimate rare event probabilities described with a unified notation, a mathematical pseudocode to ease their potential implementation and finally a large spectrum of simulation results on academic and realistic use cases. Provides a broad overview of the practical approach of rare event methods. Includes algorithms that are applied to aerospace benchmark test cases Offers insight into practical tuning issues


Unconventional Programming Paradigms

Unconventional Programming Paradigms

Author: Jean-Pierre Banâtre

Publisher: Springer

Published: 2005-08-25

Total Pages: 370

ISBN-13: 3540314822

DOWNLOAD EBOOK

Nowadays, developers have to face the proliferation of hardware and software environments, the increasing demands of the users, the growing number of p- grams and the sharing of information, competences and services thanks to the generalization ofdatabasesandcommunication networks. Aprogramisnomore a monolithic entity conceived, produced and ?nalized before being used. A p- gram is now seen as an open and adaptive frame, which, for example, can - namically incorporate services not foreseen by the initial designer. These new needs call for new control structures and program interactions. Unconventionalapproachestoprogramminghavelongbeendevelopedinv- iousnichesandconstituteareservoirofalternativewaystofacetheprogramming languages crisis. New models of programming (e. g. , bio-inspired computing, - ti?cialchemistry,amorphouscomputing,. . . )arealsocurrentlyexperiencinga renewed period of growth as they face speci?c needs and new application - mains. These approaches provide new abstractions and notations or develop new ways of interacting with programs. They are implemented by embedding new sophisticated data structures in a classical programming model (API), by extending an existing language with new constructs (to handle concurrency, - ceptions, open environments, . . . ), by conceiving new software life cycles and program executions (aspect weaving, run-time compilation) or by relying on an entire new paradigm to specify a computation. They are inspired by theoretical considerations (e. g. , topological, algebraic or logical foundations), driven by the domain at hand (domain-speci?c languages like PostScript, musical notation, animation, signal processing, etc. ) or by metaphors taken from various areas (quantum computing, computing with molecules, information processing in - ological tissues, problem solving from nature, ethological and social modeling).


Distributed Model Predictive Control with Event-Based Communication

Distributed Model Predictive Control with Event-Based Communication

Author: Groß, Dominic

Publisher: kassel university press GmbH

Published: 2015-02-25

Total Pages: 176

ISBN-13: 386219910X

DOWNLOAD EBOOK

In this thesis, several algorithms for distributed model predictive control over digital communication networks with parallel computation are developed and analyzed. Distributed control aims at efficiently controlling large scale dynamical systems which consist of interconnected dynamical systems by means of communicating local controllers. Such distributed control problems arise in applications such as chemical processes, formation control, and control of power grids. In distributed model predictive control the underlying idea is to solve a large scale model predictive control problem in a distributed fashion in order to achieve faster computation and better robustness against local failures. Distributed model predictive control often heavily relies on frequent communication between the local model predictive controllers. However, a digital communication network may induce uncertainties such as a communication delays, especially if the load on the communication network is high. One topic of this thesis is to develop a distributed model predictive control algorithm for subsystems interconnected by constraints and common control goals which is robust with respect to time-varying communication delays.


Human Detection and Diagnosis of System Failures

Human Detection and Diagnosis of System Failures

Author: Jens Rasmussen

Publisher: Springer Science & Business Media

Published: 2013-03-13

Total Pages: 704

ISBN-13: 1461592305

DOWNLOAD EBOOK

This book includes all of the papers presented at the NATO Symposium on Human Detection and Diagnosis of System Failures held at Roskilde, Denmark on August 4-8, 1980. The Symposium was sponsored by the Scientific Affairs Division of NATO and the Rise National Laboratory of Denmark. The goal of the Symposium was to continue the tradition initiated by the NATO Symposium on Monitoring Behavior and Supervisory Control held in Berchtesgaden, F .R. Germany in 1976 and the NATO Symposium on Theory and Measurement of Mental Workload held in Mati, Greece in 1977. To this end, a group of 85 psychologists and engineers coming from industry, government, and academia convened to discuss, and to generate a "state-of-the-art" consensus of the problems and solutions associated with the human IS ability to cope with the increasing scale of consequences of failures within complex technical systems. The Introduction of this volume reviews their findings. The Symposium was organized to include brief formal presentations of papers sent to participants about two months in advance of the meeting, and considerable discussion both during plenary sessions and within more specialized workshops. Summaries of the discussions and workshop reports appear in this volume.


Real-Time Systems

Real-Time Systems

Author: Hermann Kopetz

Publisher: Springer Science & Business Media

Published: 2006-04-18

Total Pages: 347

ISBN-13: 0306470551

DOWNLOAD EBOOK

7. 6 Performance Comparison: ET versus TT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 7. 7 The Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Points to Remember . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168 Bibliographic Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Review Questions and Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Chapter 8: The Time-Triggered Protocols. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 8. 1 Introduction to Time-Triggered Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 8. 2 Overview of the TTP/C Protocol Layers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175 8. 3 TheBasic CNI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178 Internal Operation of TTP/C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 8. 4 8. 5 TTP/A for Field Bus Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Points to Remember. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 Bibliographic Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Review Questions and Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Chapter 9: Input/Output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 9. 1 The Dual Role of Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194 9. 2 Agreement Protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196 9. 3 Sampling and Polling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 9. 4 Interrupts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 9. 5 Sensors and Actuators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 9. 6 Physical Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Points to Remember. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Bibliographic Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Review Questions and Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Chapter 10: Real-Time Operating Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211 10. 1 Task Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212 10. 2 Interprocess Communication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216 10. 3 Time Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 10. 4 Error Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219 10. 5 A Case Study: ERCOS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Points to Remember. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Bibliographic Notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 Review Questions and Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224 Chapter 11: Real-Time Scheduling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 11. 1 The Scheduling Problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 11. 2 The Adversary Argument. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 11. 3 Dynamic Scheduling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231 x TABLE OF CONTENTS 11. 4 Static Scheduling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Points to Remember. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240 Bibliographic Notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Review Questions and Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 Chapter 12: Validation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 12. 1 Building aConvincing Safety Case. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246 12. 2 Formal Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 12. 3 Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .