Breaking the Limits of Redundancy Systems Analysis

12/11/2019
by   Clemens Dubslaff, et al.
0

Redundancy mechanisms such as triple modular redundancy protect safety-critical components by replication and thus improve systems fault tolerance. However, the gained fault tolerance comes along with costs to be invested, e.g., increasing execution time, energy consumption, or packaging size, for which constraints have to be obeyed during system design. This turns the question of finding suitable combinations of components to be protected into a challenging task as the number of possible protection combinations grows exponentially in the number of components. We propose family-based approaches to tackle the combinatorial blowup in redundancy systems modeling and analysis phases. Based on systems designed in SIMULINK we show how to obtain models that include all possible protection combinations and present a tool chain that, given a probabilistic error model, generates discrete Markov chain families. Using symbolic techniques that enable concise family representation and analysis, we show how SIMULINK models of realistic size can be protected and analyzed with a single family-based analysis run while a one-by-one analysis of each protection combination would clearly exceed any realistic time constraints.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/27/2019

Majority and Minority Voted Redundancy for Safety-Critical Applications

A new majority and minority voted redundancy (MMR) scheme is proposed th...
research
04/28/2020

Iterative Variable Reordering: Taming Huge System Families

For the verification of systems using model-checking techniques, symboli...
research
11/29/2016

FPGA Based Implementation of Distributed Minority and Majority Voting Based Redundancy for Mission and Safety-Critical Applications

Electronic circuits and systems used in mission and safety-critical appl...
research
04/01/2021

Investigating the Reliability in Three RAID Storage Models and Effect of Ordering Replicas on Disks

One of the most important parts of cloud computing is storage devices, a...
research
03/22/2018

Securing Conditional Branches in the Presence of Fault Attacks

In typical software, many comparisons and subsequent branch operations a...
research
03/25/2016

Power, Delay and Area Comparisons of Majority Voters relevant to TMR Architectures

N-modular redundancy (NMR) is commonly used to enhance the fault toleran...

Please sign up or login with your details

Forgot password? Click here to reset