Dissertations / Theses on the topic 'Tolérance aux fautes byzantines'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Tolérance aux fautes byzantines.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Perronne, Lucas. "Vers des protocoles de tolérance aux fautes byzantines efficaces et robustes." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM075/document.
Full textOver the last decade, Cloud computing instigated an important switch of paradigm in numerous information systems. This new paradigm is mainly illustrated by the re-location of the whole IT infrastructures out of companies’ warehouses. The use of local servers has thus being replaced by remote ones, rented from dedicated providers such as Google, Amazon, Microsoft.In order to ensure the sustainability of this economic model, it appears necessary to provide several guarantees to users, related to the security, availability, or even reliability of the proposed resources. Such quality of service (QoS) factors allow providers and users to reach an agreement on the expected level of dependability. Practically, the proposed servers must episodically cope with arbitrary faults (also called byzantine faults), such as incorrect/corrupted messages, servers crashes, or even network failures. Nevertheless, the Cloud computing environment encouraged the emergence of technologies such as virtualization or state machine replication. These technologies allow cloud providers to efficiently face the occurrences of faults through the implementation of fault tolerance protocols.Byzantine Fault Tolerance (BFT) is a research area involving state machine replication concepts, and aiming at ensuring continuity and reliability of hosted services in presence of any kind of arbitrary behaviors. In order to handle such threat, numerous protocols were proposed. These protocols must be efficient in order to counterbalance the extra cost of replication, and robust in order to lower the impact of byzantine behaviors on the system performance. We first noticed that tackling both these concerns at the same time is difficult: current protocols are either designed to be efficient at the expense of their robustness, or robust at the expense of their efficiency. We tackle this specific problem in this thesis, our goal being to provide the required tools to design both efficient and robust BFT protocols.Our focus is mainly dedicated to two types of denial-of-service attacks involving requests management. The first one is caused by the partial corruption of a request transmitted by a client. The second one is caused by the intentional drop of a request upon receipt. In order to face efficiently both these byzantine behaviors, several mechanisms were integrated in robust BFT protocols. In practice, these mecanisms involve high overheads, and thus lead to the significant performance drop of robust protocols compared to efficien ones. This assessment allows us to introduce our first contribution: the definition of several generic design principles, applicable to numerous existing BFT protocols, and aiming at reducing these overheads while maintaining the same level of robustness.The second contribution introduces ER-PBFT, a new protocol implementing these design principles on PBFT, the reference in terms of byzantine fault tolerance. We demonstrate the efficiency of our new robustness policy, both in fault-free scenarios and in presence of byzantine behaviors.The third contribution highlights ER-COP, a new BFT protocol dedicated to both efficiency and robustness, implementing our design principles on COP, the BFT protocol providing for now the best performances in a fault-free environment. We evaluate the additional cost introduced by our robustness policy, and we demonstrate ER-COP's ability to handle byzantine behaviors
Aublin, Pierre-Louis. "Vers des protocoles de tolérance aux fautes Byzantines efficaces et robustes." Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM006/document.
Full textInformation systems become more and more complex and it is difficult to guarantee that they are bug-free. State Machine Replication is a technique for tolerating faults, regardless their nature, whether they are software or hardware faults. This thesis studies Fault Tolerant State Machine Replication protocols that tolerate arbitrary, also called Byzantine, faults. These protocols face two challenges: (i) they must be efficient, i.e., their performance have to be the best ones, in order to mask the cost of the replication and (ii) they must be robust, i.e., an attack should not cause an important performance degradation. In this thesis, we observe that no protocol addresses both of these challenges: current protocols are either designed to be efficient but fail to be robust, or designed to be robust but exhibit poor performance. A first contribution of this thesis is the design of a new protocol which achieves the best of both worlds. This protocol, R-Aliph, combines an efficient but not robust protocol with a protocol designed to be robust. The result is a protocol that is both robust and efficient. We evaluate this protocol experimentally and show that its performance under attack equals the performance of the underlying robust protocol. Moreover, its performance in the fault-free case is close to the performance of the best known efficient protocol: the maximal throughput difference is less than 6%. In the second part of this thesis we analyze the state-of-the-art robust protocols and demonstrate that they are not effectively robust. Indeed, one can run an attack on each of these protocols such that the throughput loss is at least equal to 78%. We identify the problem of these protocols and design a new, effectively robust, protocol called RBFT. The main idea of this protocol is to execute several instances of a robust protocol in parallel and closely monitor their performance, in order to detect a malicious behaviour. We evaluate RBFT in the fault-free case and under attack. We observe that its performance in the fault-free case is equivalent to the performance of the other so-called robust BFT protocols. Moreover, we show that the maximal throughput degradation, under the worst possible attack, is less than 3%
Maurer, Alexandre. "Communication fiable dans les réseaux multi-sauts en présence de fautes byzantines." Thesis, Paris 6, 2014. http://www.theses.fr/2014PA066347/document.
Full textAs modern networks grow larger and larger, they become more likely to fail. Indeed, their nodes can be subject to attacks, failures, memory corruptions... In order to encompass all possible types of failures, we consider the most general model of failure: the Byzantine model, where the failing nodes have an arbitrary (and thus, potentially malicious) behavior. Such failures are extremely dangerous, as one single Byzantine node, if not neutralized, can potentially lie to the entire network. We consider the problem of reliably exchanging information in a multihop network despite such Byzantine failures. Solutions exist but require a dense network, where each node has a large number of neighbors. In this thesis, we propose solutions for sparse networks, such as the grid, where each node has at most 4 neighbors. In a first part, we accept that some correct nodes fail to communicate reliably. In exchange, we propose quantitative solutions that tolerate a large number of Byzantine failures, and significantly outperform previous solutions in sparse networks. In a second part, we propose algorithms that ensure reliable communication between all correct nodes, provided that the Byzantine nodes are sufficiently distant from each other. At last, we generalize existing results to new contexts: dynamic networks, and networks with an unbounded diameter
Maurer, Alexandre. "Communication fiable dans les réseaux multi-sauts en présence de fautes byzantines." Electronic Thesis or Diss., Paris 6, 2014. http://www.theses.fr/2014PA066347.
Full textAs modern networks grow larger and larger, they become more likely to fail. Indeed, their nodes can be subject to attacks, failures, memory corruptions... In order to encompass all possible types of failures, we consider the most general model of failure: the Byzantine model, where the failing nodes have an arbitrary (and thus, potentially malicious) behavior. Such failures are extremely dangerous, as one single Byzantine node, if not neutralized, can potentially lie to the entire network. We consider the problem of reliably exchanging information in a multihop network despite such Byzantine failures. Solutions exist but require a dense network, where each node has a large number of neighbors. In this thesis, we propose solutions for sparse networks, such as the grid, where each node has at most 4 neighbors. In a first part, we accept that some correct nodes fail to communicate reliably. In exchange, we propose quantitative solutions that tolerate a large number of Byzantine failures, and significantly outperform previous solutions in sparse networks. In a second part, we propose algorithms that ensure reliable communication between all correct nodes, provided that the Byzantine nodes are sufficiently distant from each other. At last, we generalize existing results to new contexts: dynamic networks, and networks with an unbounded diameter
Quéma, Vivien. "Contributions to Building Efficient and Robust State-Machine Replication Protocols." Habilitation à diriger des recherches, Université de Grenoble, 2010. http://tel.archives-ouvertes.fr/tel-00540897.
Full textSouza, Luciano Freitas de. "Achieving accountability, reconfiguration, randomness, and secret leadership in byzantine fault tolerant distributed systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT043.
Full textThis thesis explores three fundamental problems in distributed computing. The first contribution focuses on accountable and reconfigurable distributed systems that detect and respond to component failures. A framework for implementing accountable and reconfigurable replicated services, leveraging the lattice agreement abstraction is presented. The asynchronous implementation ensures any consistency violation is followed by undeniable evidence of misbehavior, enabling seamless system reconfiguration. The second contribution addresses leader election in partially synchronous environments. Homomorphic Sortition, the first SSLE protocol for partially synchronous blockchains is introduced. Using Threshold Fully Homomorphic Encryption (ThFHE), this protocol supports diverse stake distributions and efficient off-chain execution, addressing network instability issues. Additionally, a Secret Leader Permutation (SLP) abstraction to ensure non-repeating leaders in certain blockchains, improving performance and consensus termination is proposed. Finally, the thesis explores randomness generation in distributed systems, focusing on the common coin primitive. Recognizing its impossibility in asynchronous, fault-prone environments, two relaxed versions are introduced: the approximate common coin and the Monte Carlo common coin. These abstractions provide efficient, scalable solutions tolerating up to one-third Byzantine processes without requiring trusted setup or public key infrastructure. Applying our Monte Carlo common coin protocol in binary Byzantine agreement achieves improved communication complexity, setting a new standard. All these contributions advance the robustness, efficiency, and reliability of distributed systems, providing new methods to handle accountability, leader election, and randomness generation in the lack of synchrony
Albouy, Timothé. "Foundations of reliable cooperation under asynchrony, Byzantine faults, and message adversaries." Electronic Thesis or Diss., Université de Rennes (2023-....), 2024. http://www.theses.fr/2024URENS062.
Full textThis thesis explores fault-tolerant distributed systems. It focuses more specifically on implementing reliable broadcast in asynchronous environments prone to hybrid failures. We introduce a novel computing model combining Byzantine process failures with a message adversary. We then define the Message-Adversary-tolerant Byzantine Reliable Broadcast (MBRB) abstraction and prove its optimal resilience condition. We present three key algorithms implementing this abstraction: a simple signature-based MBRB algorithm, a new primitive called k2l-cast for cryptography-free MBRB implementations, and an erasure-coding-based MBRB algorithm optimizing communication complexity. These contributions advance the understanding of fault-tolerant distributed systems and provide a foundation for designing resilient and efficient distributed algorithms, with applications in critical infrastructures, financial systems, and blockchain technologies
Tonkikh, Andrei. "Distributed computing for blockchains and beyond." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT041.
Full textIn this dissertation, we address three major challenges in the design of blockchain systems in particular and large-scale fault-tolerant distributed systems in general. This work aims at improving the performance of such systems directly, as well as providing useful tools for future development of distributed algorithms.First, we explore the limits of what can be done with minimal synchronization by designing CryptoConcurrency—an asset transfer system that, instead of totally ordering all users' requests, processes concurrent requests in parallel as much as possible. Unlike other similar systems, in CryptoConcurrency, we allow the users to have shared accounts and do not make the unrealistic assumption that an honest user's account is never accessed from two devices concurrently. CryptoConcurrency explores novel theoretical grounds by addressing transaction conflicts in a dynamic, non-pairwise manner, allowing the owners of each account to independently choose their preferred mechanism for conflict resolution. Then, we improve the performance of consensus—the synchronization problem at the heart of most practical distributed systems. We build the first consensus protocol that manages to combine two desirable properties: extremely fast termination in favorable conditions and graceful recovery when such conditions are not met. The design involves a novel type of cryptographic proofs, with an efficient practical implementation.Finally, we set out to tackle the problem of designing efficient distributed protocols with weighted participation. To this end, we define several new optimization problems, related to reducing or, in other words, quantizing the weights of the participants in a way that preserves important structural properties. We show how to apply them to make weighted-model variants of a large class of distributed protocols with very little overhead compared to their counterparts in the simpler non-weighted model. For these optimization problems, we prove upper bounds, provide a practical open-source approximate solver that satisfies these upper bounds, and perform an empirical study on the weight distributions from real-world blockchain systems
Farina, Giovanni. "Tractable Reliable Communication in Compromised Networks." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS310.
Full textReliable communication is a fundamental primitive in distributed systems prone to Byzantine (i.e. arbitrary, and possibly malicious) failures to guarantee the integrity, delivery, and authorship of the messages exchanged between processes. Its practical adoption strongly depends on the system assumptions. Several solutions have been proposed so far in the literature implementing such a primitive, but some lack in scalability and/or demand topological network conditions computationally hard to be verified. This thesis aims to investigate and address some of the open problems and challenges implementing such a communication primitive. Specifically, we analyze how a reliable communication primitive can be implemented in 1) a static distributed system where a subset of processes is compromised, 2) a dynamic distributed system where part of the processes is Byzantine faulty, and 3) a static distributed system where every process can be compromised and recover. We define several more efficient protocols and we characterize alternative network conditions guaranteeing their correctness
Diarra, Amadou. "Vers une prise en charge des comportements rationnels dans les systèmes distribués." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAM074/document.
Full textAccountability is becoming increasingly required in today's distributed systems. It allows not only to detect faults but also to build provable evidence about the misbehaving nodes in a distributed system. Rational nodes that aim at maximising their benefit without contributing their fair share to the system, are an example. In the literature, there exists two types of solutions that exploit accountability: specific solutions and generic solutions.Specific solutions are related to a given type of distributed system and are built by taking into account the structure of the system and the running application. As for generic solutions, they are independent to the system.In this thesis we consider the second type of solutions i.e., generic solutions. There exists two approaches in this class of solutions: hardware approach and software approach. Nowadays the only software and generic protocol that allows to enforce accountability in a distributed system is PeerReview protocol. This protocol is not based on any hardware configuration. However, it is not robust to rational behaviour in its own steps.Our objective is to provide a generic software solution to enforce accountability on any underlying application that running on a distributed system in presence of rational nodes.To reach this goal we propose FullReview a protocol that uses game theory to motivate and force rational participants to follow different steps, not only in its own protocol but also in the application that it monitors. Moreover FullReview uses the classical architecture of an accountable system. This architecture assigns to each node in the system, a set of nodes called monitors. Periodically each node is monitored by its set of monitors.We theoretically prove that our protocol is a Nash equilibrium, i.e., nodes do not have any interest in deviating from it.This kind of protocol being costly in terms of messages exchanged, we are interested to the theoretic study of different techniques of monitors management. The objective of this study is to identify conditions on protocol parameters for which a method of management is more appropriate than another.Furthermore, we practically evaluate FullReview by deploying it for enforcing accountability in two applications: (1) SplitStream, an efficient multicast protocol for live streaming, and (2) Onion Routing, the most widely used anonymous communication protocol. Performance evaluation shows that FullReview effectively detects faults in presence of rational nodes while introducing a small overhead compared to PeerReview and scaling as PeerReview
Leduc, Guilain. "Performance et sécurité d'une Blockchain auto-adaptative et innovante." Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0220.
Full textResearch on blockchain application frameworks rarely offers performance evaluation. This thesis proposes a comprehensive methodology to help software integrators better understand and measure the influence of configuration parameters on the overall quality of long-term service performance. In order to improve performance, the new adaptive consensus protocol Sabine (Self-Adaptive BlockchaIn coNsEnsus) is proposed to dynamically modify one of these parameters in the PBFT consensus. The configuration parameter of this consensus is the number of validators involved and result of a trade-off between security and performance. The Sabine protocol maximises this number provided that the output rate matches the input rate. Sabine is evaluated and validated in real-world settings, the results of which show that Sabine has an acceptable relative error between the requested and committed transaction rates. Two new validator selection algorithms are proposed that reverse the random paradigm of current protocols to select the nodes leading to better performance. The first is based on a reputation system that rewards the fastest nodes. The second selects the closest nodes by imposing a continuous rotation of the selection. These two algorithms have been simulated and their impact on decentralisation discussed. This selection, associated with Sabine, improves security by giving the system more margin to increase the number of validators. This work opens the way to more reactive chains, with less latency and more throughput
Shoker, Ali. "Byzantine fault tolerance from static selection to dynamic switching." Toulouse 3, 2012. http://thesesups.ups-tlse.fr/1924/.
Full textByzantine Fault Tolerance (BFT) is becoming crucial with the revolution of online applications and due to the increasing number of innovations in computer technologies. Although dozens of BFT protocols have been introduced in the previous decade, their adoption by practitioners sounds disappointing. To some extant, this indicates that existing protocols are, perhaps, not yet too convincing or satisfactory. The problem is that researchers are still trying to establish 'the best protocol' using traditional methods, e. G. , through designing new protocols. However, theoretical and experimental analyses demonstrate that it is hard to achieve one-size-fits-all BFT protocols. Indeed, we believe that looking for smarter tac-tics like 'fasten fragile sticks with a rope to achieve a solid stick' is necessary to circumvent the issue. In this thesis, we introduce the first BFT selection model and algorithm that automate and simplify the election process of the 'preferred' BFT protocol among a set of candidate ones. The selection mechanism operates in three modes: Static, Dynamic, and Heuristic. For the two latter modes, we present a novel BFT system, called Adapt, that reacts to any potential changes in the system conditions and switches dynamically between existing BFT protocols, i. E. , seeking adaptation. The Static mode allows BFT users to choose a single BFT protocol only once. This is quite useful in Web Services and Clouds where BFT can be sold as a service (and signed in the SLA contract). This mode is basically designed for systems that do not have too fuctuating states. In this mode, an evaluation process is in charge of matching the user preferences against the profiles of the nominated BFT protocols considering both: reliability, and performance. The elected protocol is the one that achieves the highest evaluation score. The mechanism is well automated via mathematical matrices, and produces selections that are reasonable and close to reality. Some systems, however, may experience fluttering conditions, like variable contention or message payloads. In this case, the static mode will not be e?cient since a chosen protocol might not fit the new conditions. The Dynamic mode solves this issue. Adapt combines a collection of BFT protocols and switches between them, thus, adapting to the changes of the underlying system state. Consequently, the 'preferred' protocol is always polled for each system state. This yields an optimal quality of service, i. E. , reliability and performance. Adapt monitors the system state through its Event System, and uses a Support Vector Regression method to conduct run time predictions for the performance of the protocols (e. G. , throughput, latency, etc). Adapt also operates in a Heuristic mode. Using predefined heuristics, this mode optimizes user preferences to improve the selection process. The evaluation of our approach shows that selecting the 'preferred' protocol is automated and close to reality in the static mode. In the Dynamic mode, Adapt always achieves the optimal performance among available protocols. The evaluation demonstrates that the overall system performance can be improved significantly too. Other cases explore that it is not always worthy to switch between protocols. This is made possible through conducting predictions with high accuracy, that can reach more than 98% in many cases. Finally, the thesis shows that Adapt can be smarter through using heursitics
Franca, Rezende Tuanir. "Leaderless state-machine replication : from fail-stop to Byzantine failures." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS016.
Full textModern distributed services are expected to be highly available, as our societies have been growing increasingly dependent on them. The common way to achieve high availability is through the replication of data in multiple service replicas. In this way, the service remains operational in case of failures as clients can be relayed to other working replicas. In distributed systems, the classic technique to implement such fault-tolerant services is called State-Machine Replication (SMR), where a service is defined as a deterministic state-machine and each replica keeps a local copy of the machine. To guarantee that the service remains consistent, replicas coordinate with each other and agree on the order of transitions to be applied to their copies of the state-machine. The replication performed by modern Internet services spans across several geographical locations (geo-replication). This allows for increased availability and low latency, since clients can communicate with the closest geo-graphical replica. Due to their reliance on a leader replica, classical SMR protocols offer limited scalability and availability under this setting. To solve this problem, recent protocols follow instead a leaderless approach, in which each replica is able to make progress using a quorum of its peers. These new leaderless protocols are complex and each one presents an ad-hoc approach to leaderlessness. The first contribution of this thesis is a framework that captures the essence of Leaderless State-Machine Replication (Leaderless SMR) and the formalization of some of its limits. Due to the increasingly sensitive nature of replicated services, leveraging simple benign failures is no longer enough. Recent research is headed towards developing protocols that support arbitrary behavior of some replicas (Byzantine failures) and that also thrive in a geo-replicated environment. An example of this new type of sensitive replicated services that has been the focus of a lot of research are blockchains. Blockchains are powered by Byzantine replication protocols adapted to work over hundreds or even thousands of replicas. When the membership control over such replicas is open, that is, anyone can run a replica, we say the blockchain is permissionless. In the converse case, when the membership is controlled by a set of known entities like companies, we say the blockchain is permissioned. When such Byzantine protocols follow the classic leader-driven approach they suffer from scalability and availability issues, similarly to their non-byzantine counterparts. In the second part of this thesis, we adapt our framework to support Byzantine failures and present the first framework for Byzantine Leaderless SMR. Furthermore, we show that when properly instantiated it allows to sidestep the scalability problems in leader-driven Byzantine SMR protocols for permissioned blockchains
Kefi, Mohamed Ridha. "Outil pour le masquage/démasquage des fautes byzantines." Sherbrooke : Université de Sherbrooke, 2000.
Find full textLussier, Benjamin. "Tolérance aux fautes dans les systèmes autonomes." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2007. http://tel.archives-ouvertes.fr/tel-00172161.
Full textDumont, Pierre-Emmanuel. "Tolérance active aux fautes des systèmes d'instrumentation." Lille 1, 2006. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/2006/50376-2006-Dumont.pdf.
Full textSopena, Julien. "Algorithmes d'exclusion mutuelle : tolérance aux fautes et adaptation aux grilles." Paris 6, 2008. http://www.theses.fr/2008PA066665.
Full textBirolleau, Damien. "Étude d'actionneurs électriques pour la tolérance aux fautes." Grenoble INPG, 2008. http://www.theses.fr/2008INPG0080.
Full textThis work focuses on electrical actuators for safety critical applications in the automotive industry, as steer or brake. First, a bibliography to study existing solution to make a fault tolerant actuator, which means able to work after a fault, has been done. The internal short-circuit has been aimed as one of the most difficult faults to tolerate. Different methods to estimate this fault impact in tooth wound permanent magnet motors were developed. A modeling with a finite elements software is shown, then different analytical approaches are proposed. These analytical modeling bring orders of magnitudes for the short circuit current, the torque and the field in the magnets when an internal short-circuit occurred
Gupta, Divya. "Performance et fiabilité des protocoles de tolérance aux fautes." Thesis, Université Grenoble Alpes (ComUE), 2016. http://www.theses.fr/2016GREAM005/document.
Full textIn the modern era of on-demand ubiquitous computing, where applications and services are deployed in well-provisioned, well-managed infrastructures, administered by large groups of cloud providers such as Amazon, Google, Microsoft, Oracle, etc., performance and dependability of the systems have become primary objectives.Cloud computing has evolved from questioning the Quality-of-Service (QoS) making factors such as availability, reliability, liveness, safety and security, extremely necessary in the complete definition of a system. Indeed, computing systems must be resilient in the presence of failures and attacks to prevent their inaccessibility which can lead to expensive maintenance costs and loss of business. With the growing components in cloud systems, faults occur more commonly resulting in frequent cloud outages and failing to guarantee the QoS. Cloud providers have seen episodic incidents of arbitrary (i.e., Byzantine) faults where systems demonstrate unpredictable conducts, which includes incorrect response of a client's request, sending corrupt messages, intentional delaying of messages, disobeying the ordering of the requests, etc.This has led researchers to extensively study Byzantine Fault Tolerance (BFT) and propose numerous protocols and software prototypes. These BFT solutions not only provide consistent and available services despite arbitrary failures, they also intend to reduce the cost and performance overhead incurred by the underlying systems. However, BFT prototypes have been evaluated in ad-hoc settings, considering either ideal conditions or very limited faulty scenarios. This fails to convince the practitioners for the adoption of BFT protocols in a distributed system. Some argue on the applicability of expensive and complex BFT to tolerate arbitrary faults while others are skeptical on the adeptness of BFT techniques. This thesis precisely addresses this problem and presents a comprehensive benchmarking environment which eases the setup of execution scenarios to analyze and compare the effectiveness and robustness of these existing BFT proposals.Specifically, contributions of this dissertation are as follows.First, we introduce a generic architecture for benchmarking distributed protocols. This architecture, comprises reusable components for building a benchmark for performance and dependability analysis of distributed protocols. The architecture allows defining workload and faultload, and their injection. It also produces performance, dependability, and low-level system and network statistics. Furthermore, the thesis presents the benefits of a general architecture.Second, we present BFT-Bench, the first BFT benchmark, for analyzing and comparing representative BFT protocols under identical scenarios. BFT-Bench allows end-users evaluate different BFT implementations under user-defined faulty behaviors and varying workloads. It allows automatic deploying these BFT protocols in a distributed setting with ability to perform monitoring and reporting of performance and dependability aspects. In our results, we empirically compare some existing state-of-the-art BFT protocols, in various workloads and fault scenarios with BFT-Bench, demonstrating its effectiveness in practice.Overall, this thesis aims to make BFT benchmarking easy to adopt by developers and end-users of BFT protocols.BFT-Bench framework intends to help users to perform efficient comparisons of competing BFT implementations, and incorporating effective solutions to the detected loopholes in the BFT prototypes. Furthermore, this dissertation strengthens the belief in the need of BFT techniques for ensuring correct and continued progress of distributed systems during critical fault occurrence
Anghel, Lorena. "Les limites technologiques du silicium et tolérance aux fautes." Grenoble INPG, 2000. http://www.theses.fr/2000INPG0131.
Full textSeba, Lagraa Hamida. "Sécurité et tolérance aux fautes dans les environnements mobiles." Compiègne, 2003. http://www.theses.fr/2003COMP1476.
Full textConsensus and group key management are fundamental problems in the design of dependable systems. Ln this thesis, we propose a new protocol that solves the consensus problem in an asynchronous mobile environment prone to failures and disconnections. Then, we use this solution to develop a new non-blocking atomic commitment protocol for mobile transactions and to build a group communication service for mobile hosts. We elaborated a state of the art on group key management protocols. This comparative study points out a new group key management approach based on group characteristics. This approach enhances the performance of group key management protocols. We also propose a new fault-tolerant group key management protocol that uses failure detectors to increase the number of participants to the key establishment process
Singh, Pushpendra. "Environnement de tolérance aux fautes pour terminaux mobiles embarqués." Rennes 1, 2004. http://www.theses.fr/2004REN10054.
Full textCharpentier, Philippe. "Architecture d'automatisme en sécurité des machines : étude des conditions de conception liées aux défaillances de mode commun." Vandoeuvre-les-Nancy, INPL, 2002. http://www.theses.fr/2002INPL042N.
Full textBarbaria, Khaled. "Architectures intergicielles pour la tolérance aux fautes et le consensus." Phd thesis, Télécom ParisTech, 2008. http://pastel.archives-ouvertes.fr/pastel-00004308.
Full textYahfoufi, Nassireddine. "Contribution à la tolérance aux fautes dans les applications distribuées." Versailles-St Quentin en Yvelines, 1999. http://www.theses.fr/1999VERS0005.
Full textAssas, Mohamed Larbi. "Analyse de la tolérance aux fautes : approches fonctionnelle et structurelle." Lille 1, 2002. https://pepite-depot.univ-lille.fr/RESTREINT/Th_Num/2002/50376-2002-361.pdf.
Full textDuong, Phuong Quynh. "La tolérance aux fautes adaptable pour les systèmes à composants." Grenoble INPG, 2003. http://www.theses.fr/2003INPG0112.
Full textAbboud, Mohssen. "Tolérance aux défaillances dans les réseaux dynamiques." Paris 7, 2008. http://www.theses.fr/2008PA077176.
Full textWe study how some fault-tolerant algorithms for classical Systems can be extended to t}e used in larger scale networks. In the first part of this thesis we address the problems of reliable broadcast and consensus in sensor networks communicating with radio-broadcast. Communication is prone to collision when several sensors broadcast simultaneously. Moreover sensors may crash and stop sending. In this framework, reliable broadcast and consensus are not possible to solve. Sensors are equipped with collision detectors. We propose some specifications of collision detectors that enable us to achieve reliable broadcast, consensus and we give some algorithms for this. In the second part we consider a dynamic network of processes communicating by sending messages. The network is dynamic in the sense that the processes are created dynamically and each process does not know either the number or the set of created processes, but it has a unique identity. Created processes are prone to failure. We study three classical problems of fault-tolerance in the case where the set of processes is unknown. The three problems are: the consensus problem, the implementation of atomic registers and the eventual leader election. For this we consider different models in respect of their degree of synchrony (asynchronous, partially synchronous, synchronous), and we prove how to solve these problems in every considered models
Durand, Bastien. "Proposition d'une architecture de contrôle adaptative pour la tolérance aux fautes." Phd thesis, Université Montpellier II - Sciences et Techniques du Languedoc, 2011. http://tel.archives-ouvertes.fr/tel-00684149.
Full textLaribi, Youcef. "Structuration des mécanismes de tolérance aux fautes dans les systèmes répartis." Grenoble INPG, 1996. http://www.theses.fr/1996INPG0168.
Full textHoblos, Ghaleb. "Contribution à l'analyse de la tolérance aux fautes des systèmes d'instrumentation." Lille 1, 2001. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/2001/50376-2001-21.pdf.
Full textKebbal, Djemai. "Tolérance aux fautes et ordonnancement adaptatif dans les systèmes distribués hétérogènes." Lille 1, 2000. https://pepite-depot.univ-lille.fr/LIBRE/Th_Num/2000/50376-2000-316.pdf.
Full textDurand, Bastien. "Proposition d’une architecture de contrôle adaptative pour la tolérance aux fautes." Thesis, Montpellier 2, 2011. http://www.theses.fr/2011MON20082/document.
Full textThe software control architectures are the decisional center of robots. Unfortunately, the robots and their architectures suffer from numerous flaws that disrupt and / or compromise the achievement of missions they are assigned. We therefore propose a methodology for designing adaptive control architecture for the implementation of fault tolerance.The first part of this thesis proposes a state of the art of dependability, at first in a generic way before being specified in the context of control architectures. The second part allows us to detail the proposed methodology to identify potential errors of a robot and respond using the means of fault tolerance. The third part presents the experimental context and application in which the proposed methodology will be implemented and described in the fourth part of this manuscript. An experiment highlighting specific aspects of the methodology is detailed in the last part
Boué, Jérôme. "Test de la tolérance aux fautes par injection de fautes dans des modèles de simulation VHDL." Toulouse, INPT, 1997. http://www.theses.fr/1997INPT104H.
Full textRanéa, Pierre-Guy. "La tolérance aux intrusions par fragmentation-dissémination." Toulouse, INPT, 1989. http://www.theses.fr/1989INPT007H.
Full textLazzari, Cristiano. "Génération Automatique de circuits durcis aux rayonnements au niveau transistor." Grenoble INPG, 2007. http://www.theses.fr/2007INPG0170.
Full textDeep submicron technologies have increased the challenges in circuit designs due to geometry shrinking, power supply reduction, frequency increasing and high logic density. One of the goals of this thesis is to develop EDA tools able to cope with these DSM challenges. This thesis is divided in two major contributions. The first contribution is related to the development of a new methodology able to generate optimized circuits in respect to timing and power consumption. A new design flow is proposed in which the circuit is optimized at transistor level. The second contribution of this thesis is related with the development of techniques for radiation-hardened circuits. The Code Word State Preserving technique is used to apply timing redundancy into latches and flipflops. Further, a new transistor sizing methodology for Single Event Transient attenuation is proposed. The sizing method is based on an analytic model. The model considers independently pull-up and pull-down blocks
Morin, Christine. "Architectures et systèmes distribués tolérants aux fautes." Habilitation à diriger des recherches, Université Rennes 1, 1998. http://tel.archives-ouvertes.fr/tel-00434053.
Full textBennani, Taha. "Tolérance aux fautes dans les systèmes répartis à base d'intergiciels réflexifs standards." Phd thesis, INSA de Toulouse, 2005. http://tel.archives-ouvertes.fr/tel-00009746.
Full textKillijian, Marc-Olivier. "Tolérance aux fautes sur CORBA par protocole à métaobjets et langages réflexifs." Phd thesis, Institut National Polytechnique de Toulouse - INPT, 2000. http://tel.archives-ouvertes.fr/tel-00131879.
Full textBennani, Mohamed Taha. "Tolérance aux fautes dans les systèmes répartis à base d'intergiciels réflexifs standards." Toulouse, INSA, 2005. http://www.theses.fr/2005ISAT0010.
Full textReflection makes it possible to improve the design and maintenance of the applications, by separating their functional and non-functional aspects. Based on our analysis of the reflective fault tolerant approaches, we defined a new classification that shows the pertinence of this approach with respect to more conventional ones to provide fault tolerance. The core contribution of this thesis is to explore the reflexive capabilities of the CORBA middleware standard i. E. Portable Interceptors, to build fault tolerant distributed applications. In order to carry out an in-depth analysis of such capabilities, we designed a generic component based platform, called DAISY "Dependable Adaptative Interceptors and Serialization-based sYstem", providing replication mechanisms in a transparent way
Allia, Mourad. "Saturation et vote pour la tolérance aux fautes dans les systèmes répartis." Toulouse 3, 1990. http://www.theses.fr/1990TOU30234.
Full textPotiron, Katia. "Systèmes multi-agents et tolérance aux fautes : conséquences de l'autonomie des agents." Paris 6, 2010. http://www.theses.fr/2010PA066656.
Full textTeixeira, Franco Denis. "Fiabilité du signal des circuits logiques combinatoires sous fautes simultanées multiples." Phd thesis, Télécom ParisTech, 2008. http://pastel.archives-ouvertes.fr/pastel-00005125.
Full textFlauzac, Olivier. "Conception d'algorithmes distribués de routage tolérants aux fautes." Compiègne, 2000. http://www.theses.fr/2000COMP1257.
Full textBesseron, Xavier. "Tolérance aux fautes et reconfiguration dynamique pour les applications distribuées à grande échelle." Phd thesis, Grenoble, 2010. http://tel.archives-ouvertes.fr/tel-00486939.
Full textFall, Diarga. "Techniques de tolérance aux fautes : conception des circuits fiables dans les technologies avancées." Thesis, Grenoble, 2013. http://www.theses.fr/2013GRENT030.
Full textApproaching their ultimate limits, silicon technologies are affected by various problems that make more difficult further miniaturization technology. These problems relate particularly to power dissipation, parametric yield (affected by the variation of process parameters of manufacturing, supply voltage and temperature), and reliability (affected by these changes as well as the accelerated aging, interference and soft-errors). This thesis deals with the development and implementation of fault tolerant architectures and dedicated self-calibration and validation of their ability to mitigate the problems mentioned above
Bouzelat, Amor. "Analyse des performances temporelles et de tolérance aux fautes dans la synchronisation d'horloges." Vandoeuvre-les-Nancy, INPL, 1995. http://www.theses.fr/1995INPL090N.
Full textDa, penha coelho Alexandre Augusto. "Tolérance aux fautes et fiabilité pour les réseaux sur puce 3D partiellement connectés." Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAT054.
Full textNetworks-on-Chip (NoC) have emerged as a viable solution for the communication challenges in highly complex Systems-on-Chip (SoC). The NoC architecture paradigm, based on a modular packet-switched mechanism, can address many of the on-chip communication challenges such as wiring complexity, communication latency, and bandwidth. Furthermore, the combined benefits of 3D IC and Networks-on-Chip (NoC) schemes provide the possibility of designing a high-performance system in a limited chip area. The major advantages of Three-Dimensional Networks-on-Chip (3D-NoCs) are a considerable reduction in the average wire length and wire delay, resulting in lower power consumption and higher performance. However, 3D-NoCs suffer from some reliability issues such as the process variability of 3D-IC manufacturing. In particular, the low yield of vertical connection significantly impacts the design of three-dimensional die stacks with a large number of Through Silicon Via (TSV). Equally concerning, advances in integrated circuit manufacturing technologies are resulting in a potential increase in their sensitivity to the effects of radiation present in the environment in which they will operate. In fact, the increasing number of transient faults has become, in recent years, a major concern in the design of critical SoC. As a result, the evaluation of the sensitivity of circuits and applications to events caused by energetic particles present in the real environment is a major concern that needs to be addressed. So, this thesis presents contributions in two important areas of reliability research: in the design and implementation of deadlock-free fault-tolerant routing schemes for the emerging three-dimensional Networks-on-Chips; and in the design of fault injection frameworks able to emulate single and multiple transient faults in the HDL-based circuits. The first part of this thesis addresses the issues of transient and permanent faults in the architecture of 3D-NoCs and introduces a new resilient routing computation unit as well as a new runtime fault-tolerant routing scheme. A novel resilient mechanism is introduced in order to tolerate transient faults occurring in the route computation unit (RCU), which is the most important logical element in NoC routers. Failures in the RCU can provoke misrouting, which may lead to severe effects such as deadlocks or packet loss, corrupting the operation of the entire chip. By combining a reliable fault detection circuit leveraging circuit-level double-sampling, with a cost-effective rerouting mechanism, we develop a full fault-tolerance solution that can efficiently detect and correct such fatal errors before the affected packets leave the router. Yet in the first part of this thesis, a novel fault-tolerant routing scheme for vertically-partially-connected 3D Networks-on-Chip called FL-RuNS is presented. Thanks to an asymmetric distribution of virtual channels, FL-RuNS can guarantee 100% packet delivery under an unconstrained set of runtime and permanent vertical link failures. With the aim to emulate the radiation effects on new SoCs designs, the second part of this thesis addresses the fault injection methodologies by introducing two frameworks named NETFI-2 (Netlist Fault Injection) and NoCFI (Networks-on-Chip Fault Injection). NETFI-2 is a fault injection methodology able to emulate transient faults such as Single Event Upsets (SEU) and Single Event Transient (SET) in a HDL-based (Hardware Description Language) design. Extensive experiments performed on two appealing case studies are presented to demonstrate NETFI-2 features and advantage. Finally, in the last part of this work, we present NoCFI as a novel methodology to inject multiple faults such as MBUs and SEMT in a Networks-on-Chip architecture. NoCFI combines ASIC-design-flow, in order to extract layout information, and FPGA-design-flow to emulate multiple transient faults
Drid, Hamza. "Tolérance aux pannes dans les réseaux optiques de type WDM." Rennes 1, 2010. http://www.theses.fr/2010REN1S031.
Full textSurvivability in optical network is an important issue due to the huge bandwidth offered by optical technology. Survivability means that the network has the ability to maintain an acceptable service level even after an occurrence of failures within the network. In this thesis, we study the survivability in optical networks. Indeed, our work focuses on two main parts. The first part addresses the survivability in networks composed of one single domain. Firstly, we study and classify the various mechanisms of survivability proposed in the literature. Then we focus on p-cycles design. The major challenge of p-cycle design resides in finding an optimal set of p-cycles protecting the network for a given working capacity. In our thesis we propose a novel heuristic approach, which computes an efficient set of p-cycles protecting the network in one step. Our heuristic approach takes into consideration two main criteria: the redundancy and the number of p-cycles involved in the solution. The mechanisms studied in the first part are typically destined to single-domain protection, because they assume that each node in the network may have a complete vision of the physical topology of the network. Such an assumption is not realistic in the case of large networks, such as a multi-domain networks. Few works have focused on survivability in multi-domain optical networks. The second part of this thesis describes and evaluates existing solutions and compares their performances. We propose also a solution based on p-cycles and topology aggregation which overcomes the different problems of the existing solutions
Cukier, Michel. "Estimation de la couverture de systèmes tolérants aux fautes." Toulouse, INPT, 1996. http://www.theses.fr/1996INPT090H.
Full text