12.12.2012 Views

Dependable Memory - Laboratoire Interface Capteurs ...

Dependable Memory - Laboratoire Interface Capteurs ...

Dependable Memory - Laboratoire Interface Capteurs ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CONTENTS 3<br />

4.5.1 Error Detecting in ALU . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87<br />

4.5.2 Error Detecting in Register and Data-Path . . . . . . . . . . . . . . . . . . . 92<br />

4.5.3 Self-Checking Processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93<br />

4.5.4 Store Sensitive Elements (SE) . . . . . . . . . . . . . . . . . . . . . . . . . 93<br />

4.5.5 Protecting Opcode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94<br />

4.6 Solution-II: Performance Aspects of Self-Checking Processor Core . . . . . . . . . . 94<br />

4.6.1 Solution-II (a): Multiple-byte Instructions . . . . . . . . . . . . . . . . . . . 94<br />

4.6.2 Solution-II (b): 2-Stage Pipelining to resolve Multi-clock Instruction Execution 95<br />

4.6.3 Reducing Overhead for Conditional Branches . . . . . . . . . . . . . . . . . 96<br />

4.7 Implementation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98<br />

4.8 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100<br />

5 Design of a Self Checking Hardware Journal 103<br />

5.1 Error Detection and Correction in the Journal . . . . . . . . . . . . . . . . . . . . . 104<br />

5.2 Principle of the technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104<br />

5.3 Journal Architecture and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . 107<br />

5.3.1 Modes of SCHJ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109<br />

5.4 Risk of data contamination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113<br />

5.5 Implementation Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115<br />

5.5.1 Minimizing the Size of the Journal . . . . . . . . . . . . . . . . . . . . . . . 115<br />

5.5.2 Dynamic Sequence Duration . . . . . . . . . . . . . . . . . . . . . . . . . . 119<br />

5.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119<br />

6 Fault Tolerant Processor Validation 121<br />

6.1 Design Hypothesis and Properties to be Checked . . . . . . . . . . . . . . . . . . . 122<br />

6.2 Error Injection Methodology and Error Profiles . . . . . . . . . . . . . . . . . . . . 122<br />

6.3 Experimental Validation of Self-Checking Methodology . . . . . . . . . . . . . . . 123<br />

6.4 Performance Degradation due to Re-execution . . . . . . . . . . . . . . . . . . . . . 126<br />

6.4.1 Evaluating Performance Degradation . . . . . . . . . . . . . . . . . . . . . 127<br />

6.5 Effect of Error Injection on Rate of Rollback . . . . . . . . . . . . . . . . . . . . . . 130<br />

6.6 Comparison with LEON FT-3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131<br />

6.7 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131<br />

GENERAL CONCLUSION AND PROSPECTS 135<br />

A Canonical Stack Computers: 139<br />

B Instruction Set of Stack Processor 141<br />

B.1 Data Operations in Stack Processor: . . . . . . . . . . . . . . . . . . . . . . . . . . 145

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!