New Strategies for Ensuring Time and Value Correctness in Dependable Real-time Systems
نویسنده
چکیده
Dependable real-time embedded systems are typically composed of tasks with multiple criticality levels allocated to a number of heterogeneous computing nodes connected by heterogeneous networks. The heterogeneous nature of the hardware, results in a varying level of vulnerability to different types of hardware failures. For example, a computing node with effective shielding shows higher resistance to failures caused by transient faults, such as radiation or temperature changes, than an unshielded node. Similarly, resistance to failures caused by permanent faults can vary depending on the manufacturing procedures used. Task vulnerability to different types of errors, potentially leading to a system failure, varies from task to task, and depends on several factors, such as the hardware on which the task runs and communicates, the software architecture and the implementation quality of the software. This variance, the different criticality levels of tasks, and the real-time requirements, necessitate novel fault-tolerance approaches to be developed and used, in order to meet the stringent dependability requirements of resource-constrained real-time systems. In this thesis, we provide four major contributions in the area of dependable real-time systems. Firstly, we describe an error classification for real-time embedded systems and address error propagation aspects. The goal of this work is to perform the analysis on a given system, in order to find bottlenecks towards satisfying dependability requirements, and to provide guidelines on the usage of appropriate error detection and fault tolerance mechanisms. Secondly, we present a time-redundancy approach to provide a-priori guarantees in fixed-priority scheduling (FPS) such that the system will be able to tolerate a single value error per every critical task instance, while keeping the potential costs minimized. Our third contribution is a novel approach, Voting on Time and Value (VTV), which extends the N-modular redundancy approach by explicitly coni Copyright © Hüseyin Aysan, 2009 ISSN 1651-9256 ISBN 978-91-86135-28-7 Printed by Mälardalen University, Västerås, Sweden
منابع مشابه
Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach
Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...
متن کاملAdding the Time Dimension to Majority Voting Strategies∗
Real-time applications typically have to satisfy high dependability requirements and require fault tolerance in both value and time domains. A widely used approach to ensure fault tolerance in dependable systems is the N-modular redundancy (NMR) which typically uses a majority voting mechanism. However, NMR primarily focuses on producing the correct value, without taking into account the time d...
متن کاملPotentials of Evolving Linear Models in Tracking Control Design for Nonlinear Variable Structure Systems
Evolving models have found applications in many real world systems. In this paper, potentials of the Evolving Linear Models (ELMs) in tracking control design for nonlinear variable structure systems are introduced. At first, an ELM is introduced as a dynamic single input, single output (SISO) linear model whose parameters as well as dynamic orders of input and output signals can change through ...
متن کاملFault-Tolerance Strategies and Probabilistic Guarantees for Real-Time Systems
Ubiquitous deployment of embedded systems is having a substantial impact on our society, since they interact with our lives in many critical real-time applications. Typically, embedded systems used in safety or mission critical applications (e.g., aerospace, avionics, automotive or nuclear domains) work in harsh environments where they are exposed to frequent transient faults such as power supp...
متن کاملOn the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols
The e ective design of composite dependable and real time protocols entails demonstrating their proof of correctness and in practice the e cient delivery of services We focus on these aspects of correctness and e ciency speci cally considering the real time aspects where the need is to ensure satisfaction of stringent timing and operational constraints In this paper we establish the use of math...
متن کامل