Send
Close Add comments:
(status displays here)
Got it! This site "creationpie.com" uses cookies. You consent to this by clicking on "Got it!" or by continuing to use this website. Note: This appears on each machine/browser from which this site is accessed.
Fault-tolerant computing concepts
1. Fault-tolerant computing concepts
Fault tolerance is important in distributed systems and in organizations.
Redundancy can be used to
detect and
correct errors (discrepancies).
Bar codes, ISBN, Credit card numbers, UPC, CRC checks, parity checks, etc.
Space shuttle: Four redundant computers with one backup (cross-checking 500 times a second).
Accounting (manual) method of casting out nines.
Masoretic Hebrew text copying rules.
Two (reliable) witnesses (at least) needed.
An understanding of
FTC (Fault Tolerant Computing) techniques is important in understanding the differences in various Bible texts.
The key to fault tolerance is
redundancy. The simplest model is to use redundancy and take a majority vote of the various ways. There are many more advanced methods not discussed here.
2. Organizations
Any fault tolerant system needs to account for parts of the system (e.g., members) not operating properly or operating with motives against the organization or organizational goals (which might or might not be the same thing).
3. Being right
One usually wants to be correct or right.
There are times when this may not be clear.
4. Matthew 11:15 Hearing test
Matthew 11:15 He that hath ears to hear, let him hear. [kjv]
ο εχων ωτα ακουετω [gnt]
Gather the facts and get them right. This may not be easy. If you pluck out your "
eyes", would you be able to "
see"? If, by extension, you pluck out your "
ears", would you be able to "
hear"? This is an example of a many-to-one relationship or association.
Story:
I was getting tired of getting the wife admitting that she had a hearing problem. Aside: A hearing problem, not a listening problem.
One day, I decided to gather proof with which to confront her (in love, of course).
5. Matthew 11:15
KJV: He that hath ears to hear, let him hear.
Greek: ο εχων ωτα ακουειν ακουετω
Latin: qui habet aures audiendi audiat
Wessex: se þe earan haebbe to geherene ge-hyre.
Wycliffe: He that hath eris of heryng, here he.
Tyndale: He yt hathe eares to heare let him heare.
Luther: Wer Ohren hat zu hören, der höre!
6. The hearing test
Coming home, I quietly opened the door. She was working quietly in the kitchen two rooms away. Just inside the door, I said softly, "Dear, can you hear me?".
No response. Just as I thought. A hearing issue.
7. The hearing test
I went to the next room and did the same thing again, softly. "Dear, can you hear me?".
No response. This is worse than I suspected. Now I had proof.
8. The hearing test
Finally, I got right outside the room she was in and said softly. "Dear, can you hear me?".
Finally, a response, as I heard her say, "For the third time, yes!".
9. Human activities and God
Romans 8:31 What shall we then say to these things? If God be for us, who can be against us? [kjv]
Many use this verse as a "
battle cry" or puffed-up-in-pride "
badge of honor". Some pastors (and others) promote this misconception.
Sir, my concern is not whether God is on our side; my greatest concern is to be on God's side, for God is always right. Abraham Lincoln (16th U.S. President)
If God is the primary customer, then the customer is always right.
Man's "righteousness" is "what is right" as in an "opinion" that is the "glory" of man (humanism).
God's "righteousness" is "what is right" as in an "opinion" that is the "glory" of God (theism).
10. Inside security threats
It is often said that 80% of security problems come from inside and not outside the organization.
A malicious insider is someone inside the company who is a non-cooperating user. This type of user is very dangerous because the entire system depends on cooperating users inside the system.
11. Incomplete information
There have been solutions found to various problems that involve ideas of fault tolerant computing or distributed decisions in the presence of incomplete information.
12. Expected value: biased coin flips
Suppose that two individuals want to use a coin flip to settle a dispute, but neither person trusts the other.
How would you use a (possibly biased) coin to perform the coin flip so that neither individual has an advantage?
John Von Neumann provided in interesting solution to this problem.
13. Ethernet resolution
The Ethernet network protocol was originally designed in the following way.
Each side can talk any time it wants.
Each side can detect if there is a collision in that someone else is trying to talk at the same time.
If a collision happens, both sides wait a random amount of time and then try again.
This helps resolve talking conflicts in a distributed and local manner without a global level of control - as long as all sides agree to the rules.
Ethernet is a CSMA/CD, for
CSMA (Carrier sense multiple access) , CD (Collision detect) system.
14. End of page