Skip to main content

Architecting and Validating Dependable Systems: Experiences and Visions

  • Chapter
Architecting Dependable Systems VII

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6420))

Abstract

The world of computer systems today is composed of very different kind of critical architectures: from embedded safety-critical sensors and safety equipment (e.g., train on-board equipment), to large, highly dependable multi-computers (e.g. plant control systems), to smart resilient components for ubiquitous networks (e.g., biometrics monitoring applications). The common trend for all of them is to become open and part of an integrated cyber world; still, each of them brings specific challenges that need to be addressed for their design and validation, possibly leading to the different architectural and validation solutions. This paper discusses the experiences gained by the authors on architecting and validating dependable systems, considering the activities they carried out during recently ended European FP6 projects, which concerned traditional embedded systems (in the railway domain – SAFEDMI project), large-scale critical infrastructures (in the electric domain – CRUTIAL project), and distributed mobile systems (in the automotive domain – HIDENETS project). The vision on upcoming and future challenges and trends is finally provided considering pervasive/ubiquitous systems in the context of the just started FP7 ALARP project and considering Future Internet scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Satyanarayanan, M.: Pervasive computing: vision and challenges. IEEE Personal Communications 8(4), 10–17 (2001)

    Article  Google Scholar 

  2. SAFEDMI – Safe Driver Machine Interface for ERTMS Automatic Train Control, FP6-IST-031413 project, http://www.safedmi.org

  3. CRUTIAL - CRitical UTility InfrastructurAL Resilience, FP6-IST-2004-27513, http://crutial.erse-web.it/

  4. HIDENETS - HIghly DEpendable ip-basedNETworks and Services – FP6-IST-2004-26979, http://www.hidenets.aau.dk/

  5. ALARP - A railway automatic track warning system based on distributed personal mobile terminals – FP7-IST-2010-234088

    Google Scholar 

  6. Stuckmann, P., Zimmermann, R.: European research on future Internet design. IEEE Wireless Communications 16(5), 14–22 (2009)

    Article  Google Scholar 

  7. ERTMS – Driver Machine Interface Part 1-6, CLC/TS 50459 (2005)

    Google Scholar 

  8. EN 50126 – Railway applications - The specification and demonstration of Reliability, Availability, Maintainability and Safety (RAMS) - Part 1: Basic requirements and generic process (2006)

    Google Scholar 

  9. SAFEDMI Consortium, D5.3 – Consolidated results and guidelines, EU FP6 IST project SAFEDMI, deliverable D5.3 (August 2008)

    Google Scholar 

  10. Ceccarelli, A., Majzik, I., Iovino, D., Caneschi, F., Pinter, G., Bondavalli, A.: A resilient sil 2 driver machine interface for train control systems. In: IEEE Third International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2008) (June 2008)

    Google Scholar 

  11. Gronbaek, J., Madsen, T.K., Schwefel, H.P.: Safe Wireless Communication Solution for Driver Machine Interface for Train Control Systems. In: Third International Conference on Systems (icons 2008), pp. 208–213 (2008)

    Google Scholar 

  12. EN 50129 Railways applications – Communications, signalling and processing systems – Safety related electronic systems for signalling (2000)

    Google Scholar 

  13. EN 50128 Railways applications – Communications, signalling and processing systems – Software for railways control and protection system (2001)

    Google Scholar 

  14. Serafini, M., Bondavalli, A., Suri, N.: Online diagnosis and recovery: On the choice and impact of tuning parameters. IEEE Trans. on Dependable and Secure Computing 4(4), 295–312 (2007)

    Article  Google Scholar 

  15. Bondavalli, A., Ceccarelli, A., Gronbaek, J., Iovino, D., Karna, L., Klapka, S., Madsen, T.K., Magyar, M., Majzik, I., Salzo, A.: Design and evaluation of a safe driver machine interface. IJPE 4(2), 153–166 (2009)

    Google Scholar 

  16. Sanders, W.H., Meyer, J.F.: Stochastic activity networks: Formal definitions and concepts. In: Brinksma, E., Hermanns, H., Katoen, J.-P. (eds.) EEF School 2000 and FMPA 2000. LNCS, vol. 2090, pp. 315–343. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  17. Ceccarelli, A., Bondavalli, A., Iovino, D.: Trustworthy evaluation of a safe driver machine interface through software-implemented fault injection. In: IEEE 15th Pacific Rim International Symposium on Dependable Computing, pp. 234–241 (2009)

    Google Scholar 

  18. NS-2 - The Network Simulator (2005), http://www.isi.edu/nsnam/ns/

  19. Garrone, F., et al.: CRUTIAL Deliverable D2.2 Analysis of new control applications (2006), http://crutial.erse-web.it

  20. Kalam, A.A., Bondavalli, A., Daidone, A.: The CRUTIAL Architecture for Critical Information Infrastructures. In: Lemos, R., Giandomenico, F., Gacek, C., Muccini, H., Vieira, M. (eds.) Architecting Dependable Systems V. LNCS, vol. 5135, pp. 1–27. Springer, Heidelberg (2008)

    Google Scholar 

  21. Verissimo, P., Neves, N.F., Cachin, C., Poritz, J., Powell, D., Deswarte, Y., Stroud, R., Welch, I.: Intrusion-tolerant middleware: The road to automatic security. IEEE Security & Privacy 4(4), 54–62 (2006)

    Article  Google Scholar 

  22. Sousa, P., Neves, N.F., Verissimo, P.: How resilient are distributed f fault/intrusion tolerant systems? In: Proceedings of the IEEE International Conference on Dependable Systems and Networks (June 2005)

    Google Scholar 

  23. Bondavalli, A., Chiaradonna, S., Cotroneo, D., Romano, L.: Effective fault treatment for improving the dependability of COTS- and legacy-based applications. IEEE Transactions on Dependable and Secure Computing 1(4), 223–237 (2004)

    Article  Google Scholar 

  24. El Kalam, A.A., Elbaida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization-based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 277–288 (June 2003)

    Google Scholar 

  25. Laprie, J.-C., Kanoun, K., Kaniche, M.: Modelling interdependencies between the electricity and information infrastructures. In: Saglietti, F., Oster, N. (eds.) SAFECOMP 2007. LNCS, vol. 4680, pp. 54–67. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  26. Donatelli, S.: Dependent automata for the modelling of dependencies. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 367–374. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  27. Chiola, G., Dutheillet, C., Franceschinis, G., Haddad, S.: Stochastic Well-formed Coloured nets for symmetric modelling applications. IEEE Transactions on Computers 42(11), 1343–1360 (1993)

    Article  Google Scholar 

  28. Beccuti, M., Franceschinis, G., Donatelli, S., Chiaradonna, S., Di Giandomenico, F., Lollini, P., Dondossola, G., Garrone, F.: Quantification of Dependencies in Electrical and Information Infrastructures: the CRUTIAL approach. In: Proc. of the Fourth International CRIS Conference on Critical Infrastructures (CRIS 2009), Linköping, Sweden, April 28-30, pp. 1–8 (2009)

    Google Scholar 

  29. Radimirsch, M., et al.: Use-case scenarios and preliminary reference model. EU FP6 IST project HIDENETS, deliverable D1.1 (September 2006), http://www.hidenets.aau.dk/Public+Deliverables

  30. Basile, C., Killijian, M.O., Powell, D.: A Survey of dependability issues in mobile Wireless networks. LAAS-CNRS research report 02637 (October 2002)

    Google Scholar 

  31. Jones, C., Randell, B.: Dependable pervasive systems. University of Newcastle research report CS-TR-839 (2004)

    Google Scholar 

  32. Könning, B., et al.: Final evaluation, consolidated results and guidelines. EU FP6 IST project HIDENETS, deliverable D1.3 (January 2009)

    Google Scholar 

  33. Veríssimo, P.: Travelling through wormholes: Meeting the grand challenge of distributed systems. In: Proc. Int. Workshop on Future Directions in Distributed Computing, Bertinoro, Italy, pp. 144–151 (June 2002)

    Google Scholar 

  34. Verissimo, P., Rodriguez, L.: Distributed Systems for System Architects. Kluwer Academic Publisher, Dordrecht (2001)

    MATH  Google Scholar 

  35. Bondavalli, A., Ceccarelli, A., Falai, L.: Assuring Resilient Time Synchronization. In: IEEE Symposium on Reliable Distributed Systems (SRDS 2008), October 6-8, pp. 3–12 (2008)

    Google Scholar 

  36. Lollini, P., Bondavalli, A., et al.: Evaluation methodologies, techniques and tools (final version). EU FP6 IST project HIDENETS, deliverable D4.1.2 (December 2007)

    Google Scholar 

  37. Gábor, H., Waeselynck, H., et al.: Refined design and testing framework, methodology and application results. EU FP6 IST project HIDENETS, deliverable D5.3 (December 2008)

    Google Scholar 

  38. Reitenspieß, M., et al.: Experimental proof-of-concept set-up HIDENETS. EU FP6 IST project HIDENETS, deliverable D6.3 (June 2008)

    Google Scholar 

  39. Kovacs, M., Lollini, P., Majzik, I., Bondavalli, A.: An integrated framework for the dependability evaluation of distributed mobile applications. In: Proc. of the RISE/EFTS Joint International Workshop on Software Engineering for REsilieNt systEms (SERENE 2008), Newcastle upon Tyne, UK, November 17-19, pp. 29–38 (2008)

    Google Scholar 

  40. Bondavalli, A., Lollini, P., Montecchi, L.: QoS Perceived by Users of Ubiquitous UMTS: Compositional Models and Thorough Analysis. Journal of Software, Special Issue: Selected Papers of The 6th IFIP Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (SEUS 2008) 4(7), 675–685 (2009)

    Google Scholar 

  41. Office of Rail Regulation, Annual Report on Railway Safety (2005), http://www.rail-reg.gov.uk/upload/pdf/296.pdf

  42. Israr, T., Woodside, M., Franks, G.: Interaction Tree Algorithms to Extract Effective Architecture and Layered Performance Models from Traces. Journal of Systems and Software 80(4), 474–492 (2007)

    Article  Google Scholar 

  43. Arlat, J., Costes, A., Crouzet, Y., Laprie, J.-C., Powell, D.: Fault Injection and Dependability Evaluation of Fault-Tolerant Systems. IEEE Transactions on Computers 42(8), 913–923 (1993)

    Article  Google Scholar 

  44. Arlat, J., Aguera, M., Amat, L., Crouzet, Y., Fabre, J.-C., Laprie, J.-C., Martins, E., Powell, D.: Fault Injection for Dependability Validation - A Methodology and Some Applications. IEEE Transactions on Software Engineering 16(2), 166–182 (1990)

    Article  Google Scholar 

  45. Coccoli, A., Urbán, P., Bondavalli, A.: Performance Analysis of a Consensus Algorithm Combining Stochastic Activity Networks and Measurements. In: Proc. Int. Conf. on Dependable Systems and Networks (DSN-2002), pp. 551–560. IEEE CS Press, Los Alamitos (2002)

    Chapter  Google Scholar 

  46. DBench - Dependability Benchmarking (Project IST-2000-25425) (2001), http://www.laas.fr/DBench/

  47. Madeira, H., Costa, J., Vieira, M.: The OLAP and Data Warehousing Approaches for Analysis and Sharing of Results from Dependability Evaluation Experiments. In: Proc. Int. Conf. on Dependable Systems and Networks, DSN 2003 (2003)

    Google Scholar 

  48. Buckley, J.: From rfid to the internet of things. – Pervasive networked systems – Final Report, Conference organized by DG Information Society and Media, Networks and Communication Technologies Directorate, Brussels (March 6-7, 2006), ftp://ftp.cordis.europa.eu/pub/ist/docs/ka4/au_conf670306_buckley_en.pdf

  49. Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. Computer 36(1), 41–50 (2003)

    Article  MathSciNet  Google Scholar 

  50. Bondavalli, A., Lollini, P., et al.: Final Research Roadmap. EU FP7 AMBER Coordination Action, deliverable D3.2 (December 2009)

    Google Scholar 

  51. PRIN, Programmi di ricerca scientifica di rilevante interesse nazionale – Progetto di ricerca DOTS-LCCI: Dependable Off-The-Shelf based middleware systems for Large-scale Complex Critical Infrastructures. Anno (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Bondavalli, A., Ceccarelli, A., Lollini, P. (2010). Architecting and Validating Dependable Systems: Experiences and Visions. In: Casimiro, A., de Lemos, R., Gacek, C. (eds) Architecting Dependable Systems VII. Lecture Notes in Computer Science, vol 6420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17245-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17245-8_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17244-1

  • Online ISBN: 978-3-642-17245-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics