Establishment of Secured Communication

نویسنده

  • Dilip Kumar
چکیده

The main objective of this project is handling the large numbers of faults in F.P.G.A. configurable logic blocks. A key novel feature is the reuse of defective logic blocks to increase the number of effective spares and extend the mission life. To increase fault tolerance, we not only use nonfaulty parts of defective or partially faulty logic blocks, but we also use faulty parts of defective logic blocks in nonfaulty modes. By using and reusing faulty resources, our multilevel approach extends the number of tolerable faults beyond the number of currently available spare logic resources. A challenging aspect of developing applications that target the interfacing of the processor with the surrounding reconfigurable logic is main criteria in this project. O.C.P protocol interfaces the embedded processor with F.P.G.A. Testing all configurable logic blocks is under care of embedded processor. The embedded processor set the test mode for F.P.G.A, when it is needed it stops when it is in sleep mode. INTRODUCTION: ADVANCES in silicon technologies continue to increase the number of transistors that can be integrated into a single device. Many chip manufacturers use this new integration potential to fabricate complete systems on a single silicon device. FPGA manufacturers are using this expanded capacity to implement embedded DSPs, multipliers, and memory blocks along with the reconfigurable fabric. At Xilinx, FPGA designers have developed new generations of FPGA architectures that contain a variety of embedded resources. the processor core is that most FPGAs contained within an embedded system require some level of interaction with an external processor. Moving this processor onto the FPGA chip eliminates bottlenecks associated with communicating through off-chip interfaces. These are replaced by on-chip interfaces that must provide efficient communication between the processor andthe reconfigurable resources. Since direct human intervention for maintenance and repair is impossible in such environments, fault-tolerant (FT) techniques resulting in graceful degradation must be used to achieve the desired mission life span even in the presence of faults. Existing technique: Only offline testing is available in FPGAs,there is no control over the testpatterns implies there is no accuracy while the circuit is in running position. Offline testing Deals with testing a system when it is not carrying out its normal functions (Test mode, Non-Real-Time error detection).There are two types of offline testing. Structural : Execution based on the structure of the CUT(Explicit fault model LFSR, ...). Functional : Running based on functional description of CUT(Functional fault model Diagnostic software) PROPOSED BLOCKDIAGRAMS: By using above block diagram we can develop a ONLINE BIST, Since there is an interaction of embedded processor.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Routing Protocol for Mobile Ad Hoc Network for Secured Communication and Minimized Power Consumption

Security and reliable communication is challenging task in mobile Ad Hoc network. Through mobility of network device compromised with attack and loss of data. For the prevention of attack and reliable communication, various authors proposed a method of secured routing protocol such as SAODV and SBRP (secured backup routing protocol). The process of these methods work along with route discovery ...

متن کامل

Cross Layer Implementation of Key Establishment and Configuration Protocols in WSN

Security in Wireless Sensor Networks (WSN) can be achieved by establishing shared keys among the neighbor sensor nodes to create secure communication links. The protocol to be used for such a pairwise key establishment is a key factor determining the energy to be consumed by each sensor node during the secure network configuration. On the other hand, to achieve the optimum network configuration...

متن کامل

Exploring the infrastructures for establishment of electronic municipality (e-municipality) in metropolis city of Tabriz

The purpose of this study is to explore infrastructures for establishment of electronic municipality in metropolis city of Tabriz. Thisis a descriptive survey and it is an applied one in terms of goal .Total sample consisted of total number of 120 employees in Statistics and Information Technology Department of municipality as well as those working in related sections to information technolog...

متن کامل

A Review of Routing Protocols and Attacks in Mobile Ad-hoc Network

A Mobile Ad-hoc Network (MANET) is a group of wireless mobile devices or nodes that communicate with each other without any help of a pre-installed infrastructure and centralized access points. The mobility and the easy use of mobile devices have motivated researches, to develop MANET protocols to exploit a reliable communication facilities provided by these devices. There are number issues suc...

متن کامل

Towards full collusion resistant ID-based establishment of pairwise keys

Usually a communication link is secured by means of a symmetric-key algorithm. For that, a method is required to securely establish a symmetric-key for that algorithm. This old problem is still relevant and of paramount importance both in existing computer networks and new large-scale ubiquitous systems comprising resource-constrained devices. Identity-based pairwise key agreement allows for th...

متن کامل

Complexity of Increasing the Secure Connectivity in Wireless Ad Hoc Networks

We consider the problem of maximizing the secure connectivity in wireless ad hoc networks, and analyze complexity of the postdeployment key establishment process constrained by physical layer properties such as connectivity, energy consumption and interference. Two approaches, based on graph augmentation problems with nonlinear edge costs, are formulated. The first one is based on establishing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012