C-Element Metastability Mitigation using Schmitt-Trigger
نویسندگان
چکیده
As all state holding elements, Muller C-elements are prone to metastable upsets [1], [2], [3]. In case of an input spike or a short overlap of both input signals, a metastable state may arise in the element. The cause for the problem is that the storage loop starts to flip its state but while doing so, the input is removed and the loop is left in an undecided state. Based only on the characteristics of the loop, the resolution process may take an arbitrary long time. The outcome of the resolving process can either be a flip of the state, or the state my not change after all. Figure 1 shows the typical behavior of a metastable logic gate. It can be seen that the storage loop starts to change its value but then enters the metastable region and does not leave it for an extended time. The resolution may be either of the both stable states. While the resolving process is active, the nodes of the storage loop are at intermediate, analog voltage levels [2]. The voltage levels as well as the metastable response may be estimated using a Spice analysis [4]. As has been previously shown [5], metastability is unavoidable. Therefore one can not hope to devise a functioning countermeasure eliminating metastability. It may nevertheless be possible to mitigate or convert the malicious effects of metastability into a more benign form. This conversion is even more essential as metastability may fool conventional error containment circuits (like voters, e.g.) [6]. Such a containment is especially important for asynchronous circuits. In contrast to synchronous circuits no temporal masking is present, meaning that the asynchronous circuit may propagate the erroneous state immediately, whereas the propagation in synchronous circuits is only done at clock edges. Therefore it is unacceptable to generate even Figure 2. Metastability mitigation principle
منابع مشابه
On the Appropriate Handling of Metastable Voltages in FPGAs
The signi ̄cant process, voltage and temperature (PVT) variations seen with modern technologies make strictly synchronous design ine±cient. Asynchronous design with its °exible timing is a promising alternative, but prototyping is di±cult on the available FPGA platforms which are clock centric and do not provide the required functional primitives like mutual exclusion or Muller C-elements. The s...
متن کاملComplex Dynamics in Hysteretic Nonlinear Oscillator Circuit
The present paper introduces a new, fourth order, analogue chaos generator, aiming at noise, random pulse and spread spectrum signal applications. The proposed system has a simpler implementation compared to other circuits reported in the literature, using only one nonlinear element, namely a Schmitt trigger type hysteretic block, and leading to a uniform circuit structure. The analysis of the ...
متن کاملA Simple Current Mode Schmitt Trigger Circuit Based On Single CCDDCCTA without Employing Any Passive Components
This paper introduce a new current mode Schmitt trigger circuit using a single Current Controlled Differential Difference Current Conveyor Transconductance Amplifier (CCDDCCTA). The circuit is designed using a single CCDDCCTA without any passive component. The proposed Schmitt trigger circuit is designed at a supply voltage of ±1.25V, bias voltage of -0.8V using PSPICE and the model parameter o...
متن کاملPerformance Optimization of Nonlinear VLSI Interconnect Circuit using Schmitt Trigger
Chip Interconnect delay and power is a primary criterion in the design of an Integrated Circuit because of its close connection to the speed of IC. Interconnect Buffers in VLSI circuits is the most widespread procedure used to decrease power and delay but they outcome in high Delay and power dissipation, thereby degrading the performance (i.e.) operating speed of an integrated circuit. Use of b...
متن کاملMeasured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System
In this paper we address the development of measured responses to coercive actions. We demonstrate, via a case study of kinetic and cyber attacks on a safety-critical software-intensive system, the application of the Schmitt Analysis to the question of whether the attacks have risen to the level of a “use of force” under international law, taking into account both the quantitative and qualitati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012