Interaction Faults Caused by Third-Party External Systems - A Case Study and Challenges

Interaction faults caused by a flawed external system designed by a third party are a major issue faced by interconnected systems. In this paper, we define a scenario where this type of problem occurs, and describe some fault cases observed in real systems. We also discuss the most important challenges faced in this scenario, focusing on error detection. The problem is divided in several sub-problems, some of which can be addressed by traditional or simple techniques, and some of which are complex problems by themselves. The purpose of this paper is not to present ad hoc solutions to specific sub-problems, but to introduce a new scenario and give general approaches to address each sub-problem. That includes a detailed insight on important concepts, such as implicit redundancies. With this, we lay down the foundations for a wide range of future work.

[1]  Cláudia Antunes,et al.  Temporal Data Mining: an overview , 2001 .

[2]  Guido M. Schuster,et al.  Real-time voice over packet-switched networks , 1998, IEEE Netw..

[3]  E. Mark Gold,et al.  Language Identification in the Limit , 1967, Inf. Control..

[4]  Kensuke Akiyama,et al.  Fabrication of iron silicides photonic crystals , 2006 .

[5]  Jean Arlat,et al.  Analysis of the effects of real and injected software faults: Linux as a case study , 2002, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings..

[6]  Mark Weiser,et al.  The world is not a desktop , 1994, INTR.

[7]  P. Cosman,et al.  MAP DECODING OF ARITHMETIC CODES WITH A FORBIDDEN SYMBOL , 2002 .

[8]  Daniel P. Siewiorek,et al.  Reliable Computer Systems: Design and Evaluation, Third Edition , 1998 .

[9]  Richard Lai,et al.  A survey of communication protocol testing , 2002, J. Syst. Softw..

[10]  Henrique Madeira,et al.  Emulation of Software Faults: A Field Data Study and a Practical Approach , 2006, IEEE Transactions on Software Engineering.

[11]  John Case,et al.  A Polynomial Time Learner for a Subclass of Regular Patterns , 2004, Electron. Colloquium Comput. Complex..

[12]  Robert S. Swarz,et al.  Reliable Computer Systems: Design and Evaluation , 1992 .

[13]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[14]  A. Akhmetova Discovery of Frequent Episodes in Event Sequences , 2006 .

[15]  Mário J. Silva,et al.  Spelling Correction for Search Engine Queries , 2004, EsTAL.

[16]  Takashi Nanya,et al.  Tolerating Interaction Faults Originated From External Systems , 2006 .

[17]  Li Gong A note on redundancy in encrypted messages , 1990, CCRV.

[18]  Michael Sipser,et al.  Introduction to the Theory of Computation , 1996, SIGA.

[19]  Andrew K. C. Wong,et al.  Synthesis and Recognition of Sequences , 1991, IEEE Trans. Pattern Anal. Mach. Intell..