501 |
Quality criteria and an analysis framework for self-healing systemsNeti, Sangeeta 23 February 2010 (has links)
Autonomic computing has become more prevalent and, hence, its evaluation is becoming more important. In this thesis, we address the issue of evaluating the software architecture of self-healing applications with respect to the changes and adaptation over long periods of time. To facilitate this evaluation, we developed an analysis and reasoning framework for the architecture of self-healing systems. The reasoning framework is based on attribute-based architectural styles (ABASs) and is tailored to selected quality attributes. When an autonomic system evolves, the proposed reasoning framework can be used to re-analyze the system and verify certain quality attributes. The explicitly available relationship between architecture and quality attributes not only helps in documenting the current architecture design, but also allows developers to reuse the architectural analysis during long-term evolution when the original system designers are long gone. Hence, the proposed framework can facilitate both design and maintenance of self-healing systems.
In order to develop the analysis and reasoning framework, we identified key quality attributes for self-healing systems. We have also defined new autonomic-specific quality attributes for the self-healing systems, which includes support for detecting anomalous system behaviour, support for failure diagnosis, support for simulation of expected behaviour, support for differencing between expected and actual behaviour, and support for testing of correct behaviour. Further, we customized the ISO 9126 quality model to the quality requirements of self-healing systems, considering both traditional attributes as well as newly defined autonomic-specific attributes.
|
502 |
Trust framework for autonomic computing systemsAgrawal, Priyanka 02 March 2010 (has links)
Present-day IT environments are complex, heterogeneous tangles of hardware, middleware and software from multiple venders that are becoming increasingly difficult to integrate, install, configure, tune and maintain. In order to combat this increasing level of complexity, automating many of the functions associated with computing today seems to be a reasonable solution. IBM, inspired by the autonomic nervous system of the human body which regulates without any conscious intervention, chose to call this paradigm Autonomic Computing-computing using adaptive and self-managing systems with minimal human intervention. Autonomic computing poses several research challenges. In an endeavor to hide complexity, autonomic systems give up, to a certain extent, accountability to the user. Consequently, autonomic systems exhibit fewer cause and effect relationships and therefore engender trust and adoption issues. In other words, the system itself takes over control whereby it may or may not operate as per user expectations during its operation. Our goal is to develop a framework of trust that will be useful for developers of autonomic computing applications or self-managed systems dealing with trust issues. Our approach gathers key trust topics, issues, nomenclature, taxonomies, and user task models from the literature which are then distilled and pruned to form our own trust framework which is intended to aid developers in the design of self-managed systems. We then use IBM`s Tivoli provisioning system, which is one of the most successful autonomic systems, to consolidate our framework. Finally, we evaluate our framework by trying to identify the strengths and weaknesses with respect to trust of self-managed systems by performing a case study on a non-deployed autonomic e-Commerce prototype.
|
503 |
Extended architectural enhancements for minimizing message delivery latency on cache-less architectures (e.g., Cell BE)Kroeker, Anthony 12 January 2012 (has links)
This thesis proposes to reduce the latency of MPI receive operations on cacheless architectures, by removing the delay of copying messages when they are first received. This is achieved by copying the messages directly into buffers in the lowest level of the memory hierarchy (e.g., scratchpad memory). The previously proposed solution introduced an Indirection Cache which would map between the receive variables and the buffered message payload locations. This proved somewhat beneficial, but the lookup penalty of the Indirection Cache limited its effectiveness. Therefore this thesis proposes that a most recently used buffer (i.e., an Indirection Buffer) be placed in front of the Indirection Cache to eliminate this penalty and speed up access. The tests conducted demonstrated that this method was indeed effective and improved over the original method by at least an order of magnitude. Finally, examination of implementation feasibility showed that this could be implemented with a small Cache, and that even with access times 6x slower than initially assumed, the approach with the Indirection Buffer would still be effective. / Graduate
|
504 |
Program structures and computer architectures for parallel processingMontagne, Euripides. January 1985 (has links)
No description available.
|
505 |
Microarchitecture and FPGA Implementation of the Multi-level Computing ArchitectureCapalija, Davor 30 July 2008 (has links)
We design the microarchitecture of the Multi-Level Computing Architecture (MLCA),
focusing on its Control Processor (CP). The design of the microarchitecture of the CP
faces us with both opportunities and challenges that stem from the coarse granularity of
the tasks and the large number of inputs and outputs for each task instruction. Thus,
we explore changes to standard superscalar microarchitectural techniques. We design
the entire CP microarchitecture and implement it on an FPGA using SystemVerilog.
We synthesize and evaluate the MLCA system based on a 4-processor shared-memory
multiprocessor. The performance of realistic applications shows scalable speedups that
are comparable to that of simulation. We believe that our implementation achieves low
complexity in terms of FPGA resource usage and operating frequency. In addition, we
argue that our design methodology allows the scalability of the CP as the entire system
grows.
|
506 |
Microarchitecture and FPGA Implementation of the Multi-level Computing ArchitectureCapalija, Davor 30 July 2008 (has links)
We design the microarchitecture of the Multi-Level Computing Architecture (MLCA),
focusing on its Control Processor (CP). The design of the microarchitecture of the CP
faces us with both opportunities and challenges that stem from the coarse granularity of
the tasks and the large number of inputs and outputs for each task instruction. Thus,
we explore changes to standard superscalar microarchitectural techniques. We design
the entire CP microarchitecture and implement it on an FPGA using SystemVerilog.
We synthesize and evaluate the MLCA system based on a 4-processor shared-memory
multiprocessor. The performance of realistic applications shows scalable speedups that
are comparable to that of simulation. We believe that our implementation achieves low
complexity in terms of FPGA resource usage and operating frequency. In addition, we
argue that our design methodology allows the scalability of the CP as the entire system
grows.
|
507 |
Semantics-oriented low power architectureBallapuram, Chinnakrishnan S. 01 April 2008 (has links)
Innovations in the microarchitecture and prominent advances in the semiconductor process technology enable sophisticated and powerful microprocessors. However, they also lead to increased power consumption. The main contribution of the thesis is the demonstration of Semantics-Oriented Low Power Architecture techniques that use the semantics of memory references and variables used in an application program to reduce the power consumption in the memory sub-system of a microprocessor. The Semantic-Aware Multilateral Partitioning (SAM) technique reduces the cache and TLB power consumption by decoupling the data TLB lookups and the data cache accesses, based on the semantic regions defined by the programming languages and the software convention, into discrete reference sub-streams, namely, stack, global static, and heap. To reduce the power consumed by the snoops in Chip Multiprocessor, we propose a hardware technique called Selective Snoop Probe (SSP) and a compiler-based hardware supported technique called Essential Snoop Probe (ESP) that use the properties of the program variables. By selectively sending the snoop probes, the SSP and ESP techniques relax the conservative nature of the cache coherency protocol and its implementation to reduce power and improve performance.
|
508 |
Architectural support for autonomic protection against stealth by rootkit exploitsVasisht, Vikas R. 19 November 2008 (has links)
Operating system security has become a growing concern these days. As the complexity of software layers increases, the vulnerabilities that can be exploited by adversaries increases. Rootkits are gaining much attention these days in cyber-security. Rootkits are installed by an adversary after he/she gains elevated access to the computer system. Rootkits are used to maintain a consistent undetectable presence in the computer system and help as a toolkit to hide all the malware activities from the system administrator and anti-malware tools. Current defense mechanism
used to prevent such activities is to strengthen the OS kernel and fix the known vulnerabilities. Software tools are developed at the OS or virtual machine monitor (VMM) levels to monitor the
integrity of the kernel and try to catch any
suspicious activity after infection.
Recognizing the failure of software techniques and attempting to solve the endless war between the anti-rootkit and rootkit camps, in this thesis, we
propose an autonomic architecture called SHARK, or Secure Hardware support Against RootKits. This new hardware architecture provides system-level
security against the stealth activities of rootkits without trusting the entire software stack. It enhances the relationship of the OS and hardware and rules out the possibility of any hidden activity even when the OS is completely compromised. SHARK proposes a novel
hardware manager that provides secure association with every software context making use of hardware resources. It helps system administrators to
obtain feedback directly from the hardware to reveal all running processes. This direct feedback makes it impossible for rootkits to conceal running software contexts from the system administrator.
We emulated the proposed architecture SHARK
by using Bochs hardware simulator and a modified Linux kernel version 2.6.16.33 for the proposed architectural extension. In our emulated environment, we installed several real rootkits to compromise the kernel and concealed malware processes. SHARK is shown to be very effective in defending against a variety of rootkits employing different software schemes. Also, we performed performance analysis using SIMICS simulations and the results show a negligible overhead, making the proposed solution very practical.
|
509 |
Multigigabit multimedia processor for 60GHz WPAN: a hardware software codesign implementationDudebout, Nicolas 19 November 2008 (has links)
The emergence of a multitude of bandwidth hungry multimedia applications has ex-
acerbated the need for multi-gigabit wireless solutions and made it out of the reach of
conventional WLAN technology (802.11a, b and g).
This thesis presents a system on chip which demonstrates the potential of 60GHz
transceivers. This system is based on an FPGA board on which a GNU/Linux kernel
has been run. This document will give some insight on the design process as well as on the
finished product. Both the hardware and the software parts of the design are presented.
This document is organized as follow. Chapter I presents an overview of the problem to
be solved and some insight on the motivation to work at 60GHz. Chapter II gives a high level
view of the multimedia processor that has been designed and implemented. Chapters III
and IV respectively give more detail on the hardware parts and on the software components
of the pro ject. Finally, Chapter V draws the conclusion of this work and presents the future
of the work that has been started to enhance this multimedia processor.
|
510 |
Microarchitectural techniques to reduce energy consumption in the memory hierarchyGhosh, Mrinmoy 03 April 2009 (has links)
This thesis states that dynamic profiling of the memory reference stream can improve energy
and performance in the memory hierarchy. The research presented in this theses provides
multiple instances of using lightweight hardware structures to profile the memory
reference stream. The objective of this research is to develop microarchitectural techniques
to reduce energy consumption at different levels of the memory hierarchy. Several simple
and implementable techniques were developed as a part of this research. One of the
techniques identifies and eliminates redundant refresh operations in DRAM and reduces
DRAM refresh power. Another, reduces leakage energy in L2 and higher level caches for
multiprocessor systems. The emphasis of this research has been to develop several techniques
of obtaining energy savings in caches using a simple hardware structure called the
counting Bloom filter (CBF). CBFs have been used to predict L2 cache misses and obtain
energy savings by not accessing the L2 cache on a predicted miss. A simple extension of
this technique allows CBFs to do way-estimation of set associative caches to reduce energy
in cache lookups. Another technique using CBFs track addresses in a Virtual Cache and
reduce false synonym lookups. Finally this thesis presents a technique to reduce dynamic
power consumption in level one caches using significance compression. The significant
energy and performance improvements demonstrated by the techniques presented in this
thesis suggest that this work will be of great value for designing memory hierarchies of
future computing platforms.
|
Page generated in 0.0767 seconds