Fault Tolerance

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/75

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

76 Terms

1
New cards

Hardware Redundancy

addition of extra hardware, usually for the purpose of detecting and tolerating faults

2
New cards

Software Redundancy

addition of extra software beyond what is needed to perform a given function, to detect and possibly tolerate faults.

3
New cards

Information Redundancy

addition of extra information beyond that is required to implement a given function, for example error detecting codes.

4
New cards

Time Redundancy

uses additional time to perform the functions of a system such that fault detection and often fault-tolerance can be achieved.

5
New cards

Hardware Redundancy DISADVANTAGE/Solution

higher production cost

using time redundancy to preform the task

better suited for non-time-critical applications

6
New cards

Transient Fault Detection:

Perform same computation 2 or more times (2 times: fault detection; 3 or more times: fault correction by majority vote)

7
New cards

Permanent Fault Detection:

Calculating everything twice will not help, so instead 1) calculate normal result, 2) repeat calculation with encoded data (e.g. complement, arithmetic shift, etc.

8
New cards

Time Redundancy - Transient Fault Detection

computations are repeated at different points in time and then compared. No extra hardware is required

<p>computations are repeated at different points in time and then compared. No extra hardware is required</p>
9
New cards

Time Redundancy - Permanent Fault Detection

During first computation, the operands are used as presented. • During second computation, the operands are encoded in some fashion. • The selection of encoding function is made so as to allow faults in the hardware to be detected.

<p>During first computation, the operands are used as presented. • During second computation, the operands are encoded in some fashion. • The selection of encoding function is made so as to allow faults in the hardware to be detected.</p>
10
New cards

3 basic forms of hardware redundancy:

passive (static) techniques

active (dynamic) techniques

hybrid techniques

11
New cards

Passive (static) techniques

use fault masking to hide the occurrence of faults and prevent the faults from resulting in errors.

12
New cards

Active (dynamic) techniques

achieve fault tolerance by detecting the existence of faults and performing some actions to remove the faulty hardware.

13
New cards

Hybrid techniques

ombine attractive features of both passive and active techniques. Fault masking is used in hybrid systems to prevent erroneous results from being generated. Fault detection, location and recovery are also used to improve fault tolerance by removing faulty hardware.-

often used in critical applications-

very expensive form of redundancy scheme to implemen

14
New cards

N-Modular Redundancy (NMR)

N must be odd and can tolerate the upper bound of N/2

15
New cards

Pair-and-a-Spare Technique

combines the features present in both standby sparing and duplication with comparison

Two modules are operated in parallel at all times and their results are compared to provide the error detection capability required in the standby sparing approach .

Second duplicate (pair, and possibly more in case of pair and k spare) is used to take over in case the working duplicate (pair) detects an error.

A pair is always operational

<p>combines the features present in both standby sparing and duplication with comparison</p><p>Two modules are operated in parallel at all times and their results are compared to provide the error detection capability required in the standby sparing approach . </p><p>Second duplicate (pair, and possibly more in case of pair and k spare) is used to take over in case the working duplicate (pair) detects an error. </p><p>A pair is always operational</p>
16
New cards

INFORMATION REDUNDANCY

Adding extra information beyond that is required to implement a function (i.e. addition of extra information to data words)

17
New cards

Coding

knowt flashcard image
18
New cards

Set of all non-code words.

W - C w= set of all possible words. c set of code words

19
New cards

Bit Error:

A single bit of information is corrupted from 1 to 0 or from 0 to 1

20
New cards

Symmetric Errors:

0→1 and 1 → 0 errors are equally likely to occur

21
New cards

Asymmetric Errors:

A given word has only 0 → 1 OR 1 → 0 errors, and it is known a priori which type exists.

22
New cards

Unidirectional Errors

A given word has only 0 → 1 OR 1 → 0 errors, but it is not known a priori which type exists

23
New cards

Byte Errors

Errors will affect bytes independently, but it is not known how many bits are affected or the type of effect

24
New cards

Burst Errors

cluster of K consecutive bits are in error

25
New cards

Code / Hamming Distance

how much they differ in position

0011 and 0101 have a hamming distance of 2

26
New cards

hamming distance value 1

then it is possible to change one into another by magnifying one bit in one of the words. However, if 2 words differ in 2 bit positions, it is impossible to transform one word to another by changing 1 bit in one of the words

27
New cards

code distance

as the minimum Hamming distance between any two valid code words

28
New cards

Error detecting codes (EDC) To detect d errors

the code words must have code distance of at least d+1

29
New cards

Error correcting codes (ECC) To correct c errors

the code words must have code distance of at least 2c+1

30
New cards

a code can correct up to c bit errors and simultaneously detect up to d additional bit errors if and only if

Hd ≥ 2c + d + 1

31
New cards

A separable code

is one which, original information is appended with new information to form code words

<p>is one which, original information is appended with new information to form code words</p>
32
New cards

A non-separable code

does not posses the property of separability, i.e, not partitioned directly into info and check bits => complicated decoding procedure!

<p>does not posses the property of separability, i.e, not partitioned directly into info and check bits =&gt; complicated decoding procedure!</p>
33
New cards

m-out-of-n codes

n bits in total; m # 1’s and (n-m) # 0’s

<p>n bits in total; m # 1’s and (n-m) # 0’s</p>
34
New cards

Advantages of m-out-of-n codes

conceptually simple • easy to visualize error detection process

35
New cards

Disadvantages - m -out of -n

encoding, decoding and detection processes are often difficult to perfor

36
New cards

Berger Codes (separable codes)

are formed by appending a special set of bits (check bits) to each word of information. Hence, they are separable codes

37
New cards

arithmetic code error corection

can correct up to c errors if and only if the arithmetic distance is ≥ 2c + 1

38
New cards

Residue Codes

a seperable srithmitic code formed by appending the residue of a number to that number

ie D|R where D is the original data and R is the residue to the og data

<p>a seperable srithmitic code formed by appending the residue of a number to that number </p><p>ie D|R where D is the original data and R is the residue to the og data </p>
39
New cards

Inverse-Residue Codes

Rather than appending the residue, the inverse residue is calculated and appended.

40
New cards

weight of a code word

the number of 1s in a word

41
New cards

Reflexivity

Hd (x, y) = 0 if and only if x = y.

42
New cards

symmetry

Hd (x, y) = Hd (y, x).

43
New cards

Triangle inequality:

Hd (x, y) + Hd (y, z) ≥ Hd (x, z).

44
New cards

Odd Parity:

Total # 1’s in the code word is odd

45
New cards

even Parity:

Total # 1’s in the code word is even

46
New cards

(n,k) codes

a code of length n (# of columns in the matrix) will have 2^k code words k = (n - rows)

47
New cards

If H has a column of all zeros

Hd = 1

48
New cards

if H has 2 collums that are the same

Hd=2

49
New cards

if no columns are all 0 and all distinct

Hd>=3, if 3 columns are LD (add up to 0) then the Hd = 3

50
New cards

N(x,y)

number of 1 → 0 changes we have when we go from x to y

51
New cards

N(x,y) + N(y,x) =

Hd(x,y)

52
New cards

For a code to detect all unidirectional errors, it must have

min N(x,y) >= 1 min Hd (x,y) >= 2

53
New cards

For a code to correct c symmetric errors plus detect all unidirectional errors, we must have:

Min N(x,y) >= c +1 Hd(x,y) >= 2(c+1)

54
New cards

Berger Codes (separable codes

formed by appending a special set of bits (check bits) to each word of information. Hence, they are separable codes.

55
New cards

advantages of berger codes

separable code

can detect multiple uni directional errors

use fewest number of check bits of all seperable codes

56
New cards

UED codes

unidirectional error detection

57
New cards

SEC - UED code

requires 2log(base 2) K

58
New cards

arithmetic codes correction

can correct c erroes if Hd >= 2c+1

59
New cards

arithmetic code detection

can only detect d errors i Hd >= C+ d + 1

60
New cards

arithmetic code

An ____ code A has the property that A(x op y) = A(x) op A(y), where x and y are operands, op is some arithmetic operation, and A(x) and A(y) are arithmetic codes for x and y, respectively.

61
New cards

Residue Codes

a ___ code is a separable arithmetic code formed by appending the residue of a number to that number

<p>a ___ code is a separable arithmetic code formed by appending the residue of a number to that number </p>
62
New cards

cyclic codes

a parity check code which has the additional property that every cyclic shift of a code word is also a code word

63
New cards

m out of n codes, number of code words for length n and number of 1s m

knowt flashcard image
64
New cards

m out of n codes, best codes of this type for length n and number of 1s m

knowt flashcard image
65
New cards

berger codes, number of check bits given K INFO bits

upper bound of log base 2(k+1)

66
New cards

AN Codes

simplest arithamtic codes, formed by multiplying each data word N by some constant A

<p>simplest arithamtic codes, formed by multiplying each data word N by some constant A</p>
67
New cards

D(X) Non-Systematic Cyclic Encoding: given d = [1110]

starting with X^0—> X^n where n is the length of d add the vaues of d to the X^i

D(x) = X²+X+1

68
New cards

The generator polynomial has the following properties:

degree of G(x) = n - k

G(x) is the unique lowest-degree nonzero polynomial having unity coefficient in its highest-degree term

each code word V(x) is a multiple of G(x) and is computed as V(x) = D(x) G(x

<p>degree of G(x) = n - k</p><p>G(x) is the unique lowest-degree nonzero polynomial having unity coefficient in its highest-degree term</p><p>each code word V(x) is a multiple of G(x) and is computed as V(x) = D(x) G(x</p>
69
New cards

For t malfunction diagnosis:

>= 2t + 1 units

70
New cards

each unit in t-diagnosable systems must be tested by

>= t other units

71
New cards

Fail silent model

when a processor becomes faulty, it will produce known, fixed outputs (deterministic fault)

72
New cards

Byzantine fault model-

when a processor becomes faulty, it will produce unpredictable (and possibly malicious) outputs (non deterministic fault

73
New cards

Byzantine General’s Problem

m is a model of computer failure that allows for malicious behavior, A failed computer can send conflicting information to different parts of a system causing operational components to make incorrect decisions.

74
New cards

Two conditions must be satisfied: Byzantine General’s Problem

A commanding general must send an order to its n-1

lieutenants such that:

IC1 -- all loyal (fault-free) lieutenants obey the same order–

IC2 -- if the commanding general is loyal then every loyal lieutenant obeys the order from the commanding general

75
New cards

The Byzantine General’s problem is modeled after a military analogy.

Several divisions of an army are camped outside enemy lines.Each division is commanded by a general. the generals can either send or recive an ATTACK or RETRITE message, one more more gernals can be traitors, in order to reach an agreement 2/3 of the generals must be loyal

<p> Several divisions of an army are camped outside enemy lines.Each division is commanded by a general.  the generals can either send or recive an ATTACK or RETRITE message, one more more gernals can be traitors, in order to reach an agreement 2/3 of the generals must be loyal </p>
76
New cards

Byzantine Requirements

tolerate up to M faults

at least 3m+1fault contaiment regions (generals)

at least 2m+1 disjoint connectivity (communication paths)

inputs must be changed at least m+1 times (rounds of communication)