12.07.2015 Views

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Advanced <strong>HVAC</strong> <strong>Control</strong>, Information Technology and Open Systemsto switch to an alternative component that cont<strong>in</strong>ues to function dur<strong>in</strong>ga failure. This redundancy is fundamental for a system that ei<strong>the</strong>r recoversfrom or masks failures. Redundancy can be passive or active. Thegoal is to recover from failures <strong>in</strong> passive redundant systems and tomask failures so that <strong>the</strong>y are transparent to <strong>the</strong> user <strong>in</strong> active redundantsystems.Passive RedundancyA passive redundant system provides access to alternative componentsthat are not associated with <strong>the</strong> current task and must be ei<strong>the</strong>ractivated or modified <strong>in</strong> some way to pick up <strong>the</strong> failed component’sload. The transition is noticeable and may even <strong>in</strong>terrupt service anddegrade system performance.Examples of passive redundant systems <strong>in</strong>clude standby serversand clustered systems. The mechanism for handl<strong>in</strong>g failures <strong>in</strong> passiveredundant systems is to switch over to an alternative server. The currentstate of <strong>the</strong> application may be lost, and <strong>the</strong> application may need to berestarted. The restart typically causes some <strong>in</strong>terruption or delay <strong>in</strong> serviceto <strong>the</strong> users.Passive solutions are offered by NCR, V<strong>in</strong>ca, Microsoft and Novelland active redundant systems are offered by Stratus/Ascend and Tandem/Compaq.All require that <strong>the</strong> OS and <strong>the</strong> application have specificknowledge of <strong>the</strong> system architecture to take advantage of redundancy.This means that <strong>the</strong> OS and applications must be modified.Systems that recover from failures use a s<strong>in</strong>gle system to run <strong>the</strong>application until a failure occurs. The detection of a failure may takeseveral seconds to several m<strong>in</strong>utes before <strong>the</strong> recovery process beg<strong>in</strong>s.In <strong>the</strong> simplest type of recovery system, an operator moves <strong>the</strong>disks from <strong>the</strong> failed system to ano<strong>the</strong>r system and boots <strong>the</strong> secondsystem. In more sophisticated systems, <strong>the</strong> second system has knowledgeof <strong>the</strong> application and users, it reboots <strong>the</strong> applications and logs on<strong>the</strong> users. In ei<strong>the</strong>r case <strong>the</strong>re is a pause <strong>in</strong> operation and a lose of data.Applications that have been modified to know <strong>the</strong> system architecturecan reboot automatically, provid<strong>in</strong>g a smoo<strong>the</strong>r recovery.Some automatic backup systems periodically copy certa<strong>in</strong> filesonto ano<strong>the</strong>r system that is <strong>the</strong>n rebooted if <strong>the</strong> first system fails. Theconfigurations are known as clusters. These clusters <strong>in</strong>clude standby©2001 by The Fairmont Press, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!