Skip to main content

Testing Fault-Tolerant Protocols by Heuristic Fault Injection

  • Conference paper
Fault-Tolerant Computing Systems

Part of the book series: Informatik-Fachberichte ((INFORMATIK,volume 283))

Abstract

A fault-tolerant protocol is defined by the exchange of messages providing correct results to those units which are free of operation faults. We propose a hierarchical test strategy with heuristic fault case generation at the message layer to test whether a fault-tolerant protocol is able to tolerate the pre-defined faults. Messages sent by faulty units are replaced by heuristically generated fault cases which intend to cover all program paths of the faultless protocol units subsequently. Since this well-aimed fault case generation induces complex problems, we use special characteristics of fault-tolerant protocols to reduce the complexity. In this paper we outline our hierarchical test strategy and explain the heuristic fault case generation in detail. The test strategy is being implemented on a network of Macintosh computers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. Arlat, et al.: Fault injection for dependability validation: a methodology and some applications, IEEE Trans. Soft. Eng., SE-16, No. 2, 1990, pp. 166–182.

    Article  Google Scholar 

  2. J. H. Barton, E. W. Czeck, Z. Z. Segaü, D. P. Siewiorek: Fault injection experiments using FIAT, IEEE Trans. Computers, C-39, No. 4, April 1990, pp. 575–582.

    Article  Google Scholar 

  3. F. Belli: Eine interaktive Methode zur Bestimmung und Sicherung der Zuverlässigkeit von sicherheitsrelevanten Software- Produkten durch Tests, Test und Verifikation von Software bei digitalen Systemen der Luft- und Raumfahrt, DGLR-Bericht 83–02, 1983, pp. 77–100.

    Google Scholar 

  4. Y. Chen amp; K. EchtJe: Testing fault-tolerant protocols by a fault injection loop, 2th European Workshop on Dependable Computing, Florence, February 1990.

    Google Scholar 

  5. Y. Chen amp; K. Echtte: On Deterministic and Random Fault Injection for Fault-Tolerant Protocol Testing, Interner Bericht, Nr. 4/91, Fakultät fur Informatik, Universität Karlsruhe, März 1991.

    Google Scholar 

  6. K. EchtJe amp; Y. Chen: Evaluation of Deterministic Fault Injection for Fault-Tolerant Protocol Testing, 21th Annual International Symposium on Fault-Tolerant Computing, Montreal, June 1991.

    Google Scholar 

  7. K. Echtle: Fehlermodellierung bei Simulation und Verifikation von Fehlertoleranz-Algorithmen für verteilte Systeme; Informatik-Fachberichte, Vol. 83, Springer, Berlin, 1984, pp. 73–88.

    Google Scholar 

  8. K. Echtle: Fault-masking with reduced redundant communication, 16th Annual International Symposium on Fault-Tolerant Computing, June 1986, pp. 178–183.

    Google Scholar 

  9. K. Echtle: Fault masking and sequence agreement by a voting protocol with low message number; 6th symp. on reliability in distributed software and database systems, 1987, pp. 149–160.

    Google Scholar 

  10. K. Echtle: Distance agreement protocols; 19th Annual International Symposium on Fault-Tolerant Computing, June 1989, pp. 191–198.

    Google Scholar 

  11. W. Görke, Fehlertolerante Rechensysteme, Handbuch der Informatik Bd. 2. 1, Oidenbourg, München 1989.

    Google Scholar 

  12. W. E. Howden: Methodology for the generation of program test data, IEEE Trans. Computers, C-24, No.5, may 1975, pp. 554–559.

    Google Scholar 

  13. J. Karlsson, U. Gunneflo, J. Torin: The effects of heavy-ion induced single event upsets in the MC6809E microprocessor; Informatik-Fachberichte, Vol. 214, Springer, Berlin, 1989, pp. 296–307.

    Google Scholar 

  14. R. E. Prather, J. P. Myers, Jr.: The path prefix software testing strategy, IEEE, Trans. Soft. Eng., SE-13, No. 7, 1987, pp. 761–766.

    Google Scholar 

  15. F. Saglietti, W. Ehrenberger: Back-to-back Teststrategien zur Validation fehlertolerierender Software-Systeme; Informatik-Fachberichte, Vol. 167, Springer, Berlin, 1988, pp. 271–280.

    Google Scholar 

  16. S. Venkatesan: Reliable protocols for distributed termination detection, IEEE Trans. Reliability, Vol. 38, No. 1, April 1990, pp. 103–110.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1991 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, Y., Echtle, K., Görke, W. (1991). Testing Fault-Tolerant Protocols by Heuristic Fault Injection. In: Cin, M.D., Hohl, W. (eds) Fault-Tolerant Computing Systems. Informatik-Fachberichte, vol 283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-76930-6_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-76930-6_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-54545-3

  • Online ISBN: 978-3-642-76930-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics