Failure-Erasure Circuitry: A Duplicative Technique of Failure-Masking Systems

نویسندگان

  • John B. Connolly
  • William G. Schmidt
چکیده

There are generally considered to be four major types of digital circuit redundancy techniques in use today. They are the Shannon-Moore component redundancy method, the "quadded logic" approach suggested by Tryon,von Neumann's triplication and majority-voting technique, and the basic standby redundancy systems. When viewed in the light of design criteria which are based upon the requirements of non-maintainable spacecraft, it appears that the triplication and majority-voting scheme is optimal, although more costly in weight, power, and component cost than one would prefer. It is the purpose of this paper to describe a redundancy technique which would require mere duplication to achieve the same failure-masking capabilities as the von Neumann method. An analysis of the circuit-failure problem is approached from the viewpoint of coding theory with comparisons made between the "noisy channel" and "circuit-failure" problems. Some of the difficulties of extrapolating from the former to the latter are discussed, as well as recent attempts to minimize the redundancy "overhead" by coding over larger numbers of bits. Following a description of the binary erasure channel model, a proposal of a failure-erasure technique based upon it is outlined. The method enables failure-masking at duplicative rather than triplicative costs. There are constraints which this scheme imposes upon the circuit elements, however, and the characteristics of the ideal circuit element and logic signaling are proposed. The paper concludes with a discussion of existing hardware which approximates the desired characteristics. Accepted for the Air Force Stanley J. Wisniewski Lt Colonel, USAF Chief, Lincoln Laboratory Office

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Non-MDS Erasure Code Scheme for Storage Applications

This paper investigates the use of redundancy and self repairing against node failures indistributed storage systems using a novel non-MDS erasure code. In replication method, accessto one replication node is adequate to reconstruct a lost node, while in MDS erasure codedsystems which are optimal in terms of redundancy-reliability tradeoff, a single node failure isrepaired after recovering the ...

متن کامل

Supporting server-level fault tolerance in concurrent-push-based parallel video servers

Parallel video servers have been proposed for building large-scale video-on-demand (VoD) systems from multiple low-cost servers. However, when adding more servers to scale up the capacity, system-level reliability will decrease as failure of any one of the servers will cripple the entire system. To tackle this reliability problem, this paper proposes and analyzes architectures to support server...

متن کامل

Erasure Coding in Distributed Storage Systems

Data centers are nowadays highly distributed, possibly over continents, to cope with the huge amounts of data collected these days. To deal with data loss in an environment where hardware failures are very common, researchers have developed new kinds of erasure codes. Erasure coding is a common technique used in all sorts of digital communication, including deep space communication and QR-codes...

متن کامل

On the Impact of the Data Redundancy Strategy on the Recoverability of Friend-to-Friend Backup Systems

Social network-based systems, also known as Friend-to-Friend (F2F) systems, are a promising approach to develop backup solutions that provide high reliability with a much lower consumption of bandwidth and storage than P2P ones. F2F backup systems can use two data redundancy strategies to handle peer failure events, namely: replication and erasure coding. In this paper we evaluate the use of th...

متن کامل

On the Duality of Erasures and Defects

In this paper, the duality of erasures and defects will be investigated by comparing the binary erasure channel (BEC) and the binary defect channel (BDC). The duality holds for channel capacities, capacity achieving schemes, minimum distances, and upper bounds on the probability of failure to retrieve the original message. Also, the binary defect and erasure channel (BDEC) will be introduced by...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Electronic Computers

دوره 16  شماره 

صفحات  -

تاریخ انتشار 1967