Scientific Journal

Applied Aspects of Information Technology

IMPROVING FPGA COMPONENTS OF CRITICAL SYSTEMS BASED ON NATURAL VERSION REDUNDANCY
Abstract:

The article is devoted to the problem of improving FPGA (Field Programmable Gate Array) components developed for safety related systems. FPGA components are improved in the checkability of their circuits and the trustworthiness of the results calculated  on them to support fault-tolerant solutions, which are basic in ensuring the functional safety of critical systems. Fault-tolerant solu tions need protection from sources of multiple failures, which include hidden faults. They can be accumulated in significant quanti ties during a long normal operation and disrupt the functionality of fault-tolerant circuits with the onset of the most responsible emer gency mode. Protection against hidden faults is ensured by the checkability of the circuits, which is aimed at the manifestation of  faults and therefore must be supported in conjunction with the trustworthiness of the results, taking into account the decrease in  trustworthiness in the event of the manifestation of faults. The problem of increasing the checkability of the FPGA component in  normal operation and the trustworthiness of the results calculated in the emergency mode is solved by using the natural version re dundancy inherent in the LUT-oriented architecture (Look-Up Table). This redundancy is manifested in the existence of many ver sions of the program code that preserve the functionality of the FPGA component with the same hardware implementation. The  checkability of the FPGA component and the trustworthiness of the calculated results are considered taking into account the typical  failures of the LUT-oriented architecture. These malfunctions are investigated from the standpoint of the consistency of their mani festation and masking, respectively, in normal and emergency modes on versions of the program code. Malfunctions are identified  with bit distortion in the memory of the LUT units. Bits that are only observed in emergency mode are potentially dangerous because  they can hide faults in normal mode. Moving potentially dangerous bits to checkable positions, observed in normal mode, is per formed by choosing the appropriate versions of the program code and organizing the operation of the FPGA component on several  versions. Experiments carried out with the FPGA component using the example of an iterative array multiplier of binary codes have shown the effectiveness of using the natural version redundancy of the LUT-oriented architecture to solve the problem of hidden faults.

Authors:
Keywords
DOI
https://doi.org/10.15276/aait.02.2021.4
References

1. Smith, D. & Simpson, K. “The Safety Critical Systems Handbook”. [5th ed.]. Butterworth Heinemann: 2019. DOI: https://doi.org/10.1016/C2019-0-00966-1. 

2. Otradskaya, T. V., Rudnichenko, N. M., Shibaev, D. S., Shibaeva, N. O. & Vychuzhanin, V. V. “Da ta Control in the Diagnostics and Forecasting the State of Complex Technical Systems”. Herald of Advanced  Information Technology. Publ. Nauka i Tekhnika. Odesa: Ukraine. 2019; Vol. 2 No. 3: 183–196.  DOI: https://doi.org/10.15276/hait.03.2019.2. 

3. Tyurin, S. F. “Investigation of a Hybrid Redundancy in the Fault-Tolerant Systems”. Radio Electron ics, Computer Science, Control. 2019; Vol. 2: 23–33. DOI: https://doi.org/10.15588/1607-3274-2019-2-3. 4. Arya, N. & Singh, A. P. “Fault Tolerant System for Embedded System Architecture”. International  Journal of Engineering and Technology (IJET). 2017; Vol.9 No.3: 93–97. DOI: https://doi.org/10.21817/ ijet/2017/v9i3/170903S016.  

5. Gillis, D. “The Apocalypses that Might Have Been”. – Available from:  https://www.damninteresting.com/the-apocalypses-that-might-have-been/. 2007. – [Accessed 20th Mar. 2019]. 

6. Hussain, Y., Rehalia, A. & Dhyan, A. “Case Study: Chernobyl Disaster”. International Journal of  Advanced Research in Computer Science and Software Engineering. 2018; Vol.8 No.2: 76–78.

7. Kovalev, I. S., Drozd, O. V., Rucinski, A., Drozd, M. O., Antoniuk, V. V. & Sulima, Y. Y. “Devel opment of Computer System Components in Critical Applications: Problems, Their Origins and Solutions”.  Herald of Advanced Information TechnologyPubl. Nauka i Tekhnika. Odesa: Ukraine. 2020; Vol.3 No.4:  252–262. DOI: https://doi.org/10.15276/hait.04.2020.4. 

8. Murugesan, S. & Gangadharan, G. “Harnessing Green IT”. Principles and Practices; Wiley and Sons  Ltd.: Hoboken. NJ: USA. 2012. 

9. Kharchenko, V., Gorbenko, A., Sklyar, V. & Phillips, C. “Green Computing and Communications in  Critical Application Domains: Challenges and Solutions”. In: IX International Conference of Digital Tech nology. Zhilina: Slovak Republic. 2013. DOI: https://doi.org/10.1109/DT.2013.6566310.  

10. Drozd, J., Drozd, A., Antoshchuk, S., Kushnerov, A. & Nikul, V. “Effectiveness of Matrix and Pipe line FPGA-Based Arithmetic Components of Safety-Related Systems”. The 8th IEEE International Confer ence IDAACS. Warsaw: Poland. 2015. p. 785–789. DOI: https://doi.org/10.1109/IDAACS.2015.7341410. 

11.Warren, S. & Anderson, J. “FPGA Glitch Power Analysis and Reduction”. In: International Sympo sium on Low Power Electronics and Design. Fukuoka: Japan. 2011. p. 27–32.  DOI: https://doi.org/10.1109/ISLPED.2011.5993599. 

12.Velegalati, R. & Kaps, J.-P. “Glitch Detection in Hardware Implementations on FPGAs Using Delay  Based Sampling Techniques”. In: Euromicro Conference on Digital System. Design Los Alamitos. CA: USA. 2013. DOI: https://doi.org/10.1109/DSD.2013.107.  

13. Alizadeh, S. & Sriramula, S. “Impact of Common Cause Failure on Reliability Performance of Re dundant Safety Related Systems Subject to Process Demand”. Reliability Engineering & System Safety. 2018; Vol. 172: 129–150. DOI: https://doi.org/10.1016/j.ress.2017.12.011.  

14. Kumar, M., Kabra, A., Karmakar, G. & Marathe, P. P. “A Review of Defences against Common  Cause Failures in Reactor Protection Systems”. In: 4th International Conference on Reliability, Infocom Technology and Optimization (ICRITO). Noida: India. 2015. p. 1–5. DOI: https://doi.org/10.1109/  ICRITO.2015.7359232. 

15. Kharchenko, V., Bakhmach, E., Siora, A., Sklyar, V. & Tokarev, V. “Diversity-Oriented FPGA Based NPP I&C Systems: Safety Assessment, Development and Implementation”. 18th International Con ference on Nuclear Engineering. Xi’an: China. 2010. p. 755–764. DOI: https://doi.org/10.1115/ICONE18- 29754. 

16. Ebrahimi, M., Sadeghi, R. & Navabi, Z. “LUT Input Reordering to Reduce Aging Impact on FPGA  LUTs”. IEEE Transactions on Computers. 2020; Vol.69 No.10: 1500–1506. DOI: https://doi.org/10.1109/  TC.2020.2974955.  

17. Drozd, O., Zashcholkin, K., Martynyuk, O., Ivanova, O. & Drozd J. “Development of Checkability  in FPGA Components of Safety-Related Systems”. CEUR Workshop Proceedings. 2020; Vol. 2762: 30–42.  Available from: http://ceur-ws.org/Vol-2762/paper1.pdf.  

18. Amano, H. “Principles and Structures of FPGAs”. Publ. Springer. Singapore: 2018.  DOI: https://doi.org/10.1007/978-981-13-0824-6. 

19. Shah, T., Matrosova, A., Fujita, M. et. al. “Multiple Stuck-at Fault Testability Analysis of ROBDD  Based Combinational Circuit Design”. Journal of Electronic Testing. 2018; Vol.34 No.1: 53–65.  DOI: https://doi.org/10.1007/s10836-018-5703-3.  

20. “Intel FPGA Integer Arithmetic IP Cores User Guide”. 2020. – Available from:  https://www.intel.com/content/dam/www/programmable/us/en/pdfs/literature/ug/ug_lpm_alt_mfug.pdf. 

21. “Intel Cyclone 10 LP Core Fabric and General Purpose I/Os Handbook”. 2020. – Available from:  https://www.intel.com/content/dam/www/programmable/us/en/pdfs/literature/hb/cyclone-10/c10lp-51003.pdf.

22. “Intel Quartus Prime Standard Edition User Guide”. 2020. – Available from:  https://www.intel.com/content/dam/ altera-www/global/en_US/pdfs/literature/ug/ug-qps-getting-started.pdf.

23. “Delphi 10 Seattle: Embarcadero”. – Available from: https://www.embarcadero.com/docs/ datasheet.pdf.

Published:
Last download:
22 Oct 2021

Contents


[ © KarelWintersky ] [ All articles ] [ All authors ]
[ © Odessa National Polytechnic University, 2018.]