wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Operating system

profile
Nikita Mitna
Jul 04, 2024
0 Likes
0 Discussions
32 Reads

Fault-tolerance in operating System
Fault-tolerance is the process of working of a system in a proper way in spite of the occurrence of the failures in the system. Even after performing the so many testing processes there is possibility of failure in system. Practically a system can’t be made entirely error free. hence, systems are designed in such a way that in case of error availability and failure, system does the work properly and given correct result.

Any system has two major components – Hardware and Software. Fault may occur in either of it. So there are separate techniques for fault-tolerance in both hardware and software.

Hardware Fault-tolerance Techniques:
Making a hardware fault-tolerance is simple as compared to software. Fault-tolerance techniques make the hardware work proper and give correct result even some fault occurs in the hardware part of the system. There are basically two techniques used for hardware fault-tolerance:

BIST –
BIST stands for Build in Self Test. System carries out the test of itself after a certain period of time again and again, that is BIST technique for hardware fault-tolerance. When system detects a fault, it switches out the faulty component and switches in the redundant of it. System basically reconfigure itself in case of fault occurrence.
TMR –
TMR is Triple Modular Redundancy. Three redundant copies of critical components are generated and all these three copies are run concurrently. Voting of result of all redundant copies are done and majority result is selected. It can tolerate the occurrence of a single fault at a time.

Software Fault-tolerance Techniques:
Software fault-tolerance techniques are used to make the software reliable in the condition of fault occurrence and failure. There are three techniques used in software fault-tolerance. First two techniques are common and are basically an adaptation of hardware fault-tolerance techniques.

N-version Programming –
In N-version programming, N versions of software are developed by N individuals or groups of developers. N-version programming is just like TMR in hardware fault-tolerance technique. In N-version programming, all the redundant copies are run concurrently and result obtained is different from each processing. The idea of n-version programming is basically to get the all errors during development only.

Recovery Blocks –
Recovery blocks technique is also like the n-version programming but in recovery blocks technique, redundant copies are generated using different algorithms only. In recovery block, all the redundant copies are not run concurrently and these copies are run one by one. Recovery block technique can only be used where the task deadlines are more than task computation time.

Check-pointing and Rollback Recovery –
This technique is different from above two techniques of software fault-tolerance. In this technique, system is tested each time when we perform some computation. This techniques is basically useful when there is processor failure or data corruption.

 

Nikita Mitna 

53003230109

Div A


Comments ()


Sign in

Read Next

Intrusion Detection System

Blog banner

What is M-commerce and how it's work

Blog banner

Hypothesis Testing in Data Science

Blog banner

Senseless Teeths

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Microsoft Windows Overview

Blog banner

Spyware

Blog banner

SNAPCHAT

Blog banner

Service Validation and Testing during the Design Phase

Blog banner

Interrupts in operating system.

Blog banner

Risk management in IT

Blog banner

Starvation

Blog banner

The Everyday Parenting Dilemma: Safety Vs Independence

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Deadlock

Blog banner

social media issue

Blog banner

Python as a tool for data analysis

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

LiquidPlanner

Blog banner

Steps to create an Ubuntu EC2 Instance with GUI in AWS

Blog banner

Dal Bafla Recipe

Blog banner

RAID and It's Levels

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Mumbaicha Dabbawalla

Blog banner

Fitness

Blog banner

Strengthening Active Directory Security

Blog banner

PERSONAL STORIES

Blog banner

OS Assignment 3

Blog banner

OS Assignment 3 Deadlock

Blog banner

OS PROCESS DESCRIPTION AND CONTROL-SARVAGYA JALAN

Blog banner

Review on Recovering Deleted Files

Blog banner

IoT Architecture Based Security

Blog banner

Use case of K-means clustering

Blog banner

WORKFRONT SOFTWARE

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Disk Management

Blog banner

Virtual memory

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

The War With Cold On Earth

Blog banner