Title :
Using perturbation tracking to compensate for intrusion in message-passing systems
Author :
Gannon, J.A. ; Williams, K.J. ; Andersland, M.S. ; Lummp, J.E., Jr. ; Gasavant, T.L.
Author_Institution :
Dept. of Electr. & Comput. Eng., Iowa Univ., Iowa City, IA, USA
Abstract :
Execution monitoring plays a central role in most software development tools for parallel and distributed computer systems. However, such monitoring may induce delays that corrupt event timing. If this corruption can be quantified, it may be possible to determine the intrusion-free behavior. In this paper, we describe an algorithm that, given a safe timed Petri net model of the monitored software, can determine the uncorrupted timestamp values, i.e. those that would have been observed had the delays not been present. Monitoring conditions sufficient to ensure correct operation of the algorithm, and examples illustrating the algorithm´s applicability to message-passing systems are also presented. This work is part of a larger effort aimed at identifying cost-effective software alternatives to custom hardware monitoring
Keywords :
Petri nets; delays; message passing; perturbation techniques; software tools; system monitoring; delays; distributed computer systems; event timing corruption; execution monitoring; intrusion-free behavior; message-passing systems; monitored software; parallel computer systems; perturbation tracking; safe timed Petri net model; software development tools; uncorrupted timestamp values; Computerized monitoring; Concurrent computing; Condition monitoring; Delay; Distributed computing; Hardware; Programming; Software algorithms; Software safety; Timing;
Conference_Titel :
Distributed Computing Systems, 1994., Proceedings of the 14th International Conference on
Conference_Location :
Pozman
Print_ISBN :
0-8186-5840-1
DOI :
10.1109/ICDCS.1994.302445