Hardware and Software Error Detection
نویسندگان
چکیده
1 INTRODUCTION A reliable computer system needs to provide its normal level of service in the presence of hardware and software faults [Avi86, Lap92]. There are two philosophies of achieving this reliability: fault avoidance, wherein techniques prevent the occurrence of faults in the first place, and fault tolerance, wherein techniques allow the system to continue execution despite the occurrence of faults. Fault tolerance can be implemented using one of two basic approaches: error masking, in which the system avoids the effect of an error through some form of majority voting, and error detection and recovery, in which the system has notices the presence of an error, locates and isolates the error, reconfigures in a spare, and restarts the system [Ren84].
منابع مشابه
A Software-Based Hardware Fault Tolerance Scheme for Multicomputers
A hardware fault tolerance scheme for large multicomputers executing time-consuming non-interactive applications is described. Error detection and recovery are done mostly by software with little hardware support. The scheme is based on simultaneous execution of identical copies of the application on two subnetworks of the system. Normal system operation is periodically suspended and the logica...
متن کاملParallelizing Software-Implemented Error Detection
Because of economic pressure, more commodity hardware with insufficient error detection is used in critical applications. Moreover, it is expected that commodity hardware is becoming less reliable because of the continuously decreasing feature size. Thus, we expect that software-implemented approaches to deal with unreliable hardware will be needed. Arithmetic codes are well suited for this pur...
متن کاملHardwar Trojan classification and implementation and offer a new detection approach
A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...
متن کاملA non-intrusive on-line control flow error detection technique for SoCs
The time to market demands of embedded systems make the reuse of software and hardware components a mandatory design approach, while the growing sensitivity of hardware to soft errors requires effective error detection techniques to be used even in general purpose systems. Control flow error detection techniques are usually either hardware or software intrusive, requiring modification of the pr...
متن کاملPhoton dosimetry based on selective data sampling for the NaI(TL) detector
Radiation detection is essential for determining of radiation dose. Depend on the detector and dosimetry method, detection process is performed in different levels. Pulse counting is the first level of detection. Typically, the output of a radiation detector for determining value of the radiation dose cannot be used directly. Through changing the response function or the readout detector, is tr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003