SlideShare a Scribd company logo
1 of 25
26 e 27 de Agosto, 2014
Transamérica Expo Center, São Paulo/SP
Safe IoT:
Using LTSpice
to Model Failsafe Logic in
Embedded Systems
Jonny Doin, CEO, GridVortex
Agenda
• Safety: What is Safety?
• Failure: What constitutes Failure?
• Design for Safety: Failsafe Design
• Failure in Embedded Systems
• LT Spice as a system modelling tool
• Modelling the Firmware/Hardware interfaces
• Simulating Software failure at the interface
• Circuit behavior under failure scenarios
• Final thoughts
Safety: What is Safety?
A Safe System is one that exhibits:
• Deterministic responses
• Controlled Behaviors for all inputs
• Never place its outputs in a hazardous
state
Safety: What is Safety? (2)
REALITY: ALL SYSTEMS WILL FAIL
Safety: What is Safety? (3)
In the real world, systems are always
connected to other systems.
Hazardous output states must be
qualified from the downstream (external)
systems point of view
Failure
Failure is a malfunction on the system, or
a deviation on designed behavior.
On any system, such a deviation on the
chain of processing can lead to system
failure.
Failure (2)
Designs can handle system failures at the
critical interfaces, by identifying input
failure and insuring a known output state.
This design pattern is recursive, i.e., can
be applied to subsystems down to the
smaller modules, to ensure that the whole
system fails in a safe mode.
Failsafe Design
Identifying the failure modes of the inputs
and the safe state of the outputs are the
main concerns of FailSafe Design.
The hazards must be assessed, e.g.,
following a FME(C)A methodology and
possibly a FTA fault-tree analysis for the
critical components.
Failsafe Design (2)
Once identified, the Hazardous behaviors
can be used to direct system design from
the ground up, designing for maximum
avoidance of such behaviors.
Failsafe Responses must be triggered by
an internal or external failure.
Failsafe Design (3)
Failsafe design can be “costly” in system
resources. For example, achieving
functional safety in Firmware may lead to
fully redundant processors, running in
lockstep mode.
Identifying critical system points can lead
to safe designs at low cost.
Failure in Embedded Systems
Mixed signal embedded systems are
ubiquitous, running from factory
automation to car engines.
The interconnected embedded systems,
also called IoT devices, need to be
designed as critical nodes for functional
safety.
Failure in Embedded Systems (2)
Aside from failsafe Firmware design
techniques, the Firmware/Hardware
interface is one critical design node.
Designing such interface for safety,
simulating and testing the failure modes
are essential safety critical design
concerns.
LT Spice as a System Tool
LT Spice is a very fast and accurate
professional circuit simulation tool.
Used as a circuit simulator, LT Spice can
predict actual behavior with high
precision.
Modelling interaction of Firmware and
Analog hardware in the design stage is a
powerful capability.
LT Spice as a System Tool (2)
LT Spice allows modeling mixed-signal
systems, including Firmware behavior
interaction with Analog hardware:
• Behavioral sources (B)
• Digital Gate primitives (Axxx)
• Hierarchical subcircuits
• Waveform and data file generators
Modelling system interfaces
Designing the Fw/Hw interface as a
failsafe node has a number of
advantages:
• Functional Decoupling of Firmware and
Hardware
• Addresses CPU failure
• Lower cost of implementation
Modelling system interfaces (2)
Examples:
• Failsafe “Passive” drivers
• AC coupled commands
• Failsafe “ON” actuators
Example: Failsafe “passive”
Output analog drivers can be designed to fail
in high-impedance mode
Example: Failsafe “passive” (2)
The 2 analog outputs are buffered with failsafe
drivers that go high impedance when VCC is
lost
Example: Failsafe “passive” (3)
• Each output is buffered and isolated with
2 NPN bipolar transistors.
• When VCC fails, the transistors cut off,
with very high impedance.
• A 68K resistor is seen by the output
current source and will drive the output
voltage to 6.8V, bringing the output to
100%.
• This failsafe guarantees the downstream
system is ON, even on loss of control.
Example: AC-coupled cmds
On a firmware failure, toggling signals will stop at VCC or GND.
AC-coupled commands can detect such firmware failures.
Example: AC-coupled cmds (2)
Example: Failsafe “ON”
When the failsafe behavior is to keep an actuator ON, the
firmware commands are designed to turn it OFF.
A firmware failure will keep the actuator ON.
Example: Failsafe “ON” (2)
Final Thoughts
Embedded Mixed Signal Systems are
becoming a major part of infrastructure and
control systems.
Using LT Spice for failsafe design and
verification on embedded systems can increase
safety, even on low-cost IoT devices.
THANK YOU
Jonny Doin
jonnydoin@gridvortex.com

More Related Content

What's hot

Fault tolerance techniques tsp
Fault tolerance techniques tspFault tolerance techniques tsp
Fault tolerance techniques tspPradeep Kumar TS
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsAngela Hauber
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Mikro Elektronik GmbH
 
Chap 4 lesson02emsysnewinterruptbasedi_os
Chap 4 lesson02emsysnewinterruptbasedi_osChap 4 lesson02emsysnewinterruptbasedi_os
Chap 4 lesson02emsysnewinterruptbasedi_osMontassar BEN ABDALLAH
 
SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
 SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEMNadeem Choudhary
 
Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10Risman BizNet
 
Viewpoint on ISA TR84.0.02 - simplified methods and fault tree analysis
Viewpoint on ISA TR84.0.02 - simplified methods and fault tree analysisViewpoint on ISA TR84.0.02 - simplified methods and fault tree analysis
Viewpoint on ISA TR84.0.02 - simplified methods and fault tree analysisISA Interchange
 
Fault tolerant real-time scheduling
Fault tolerant real-time schedulingFault tolerant real-time scheduling
Fault tolerant real-time schedulingReza Ramezani
 
Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Byres Security Inc.
 
EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1PRADEEP
 
Оптимізація процесу відлагоджування Embedded рішень, Богдан Костів
Оптимізація процесу відлагоджування Embedded рішень, Богдан КостівОптимізація процесу відлагоджування Embedded рішень, Богдан Костів
Оптимізація процесу відлагоджування Embedded рішень, Богдан КостівSigma Software
 
Embedded System Design latest
Embedded System Design latestEmbedded System Design latest
Embedded System Design latestDeepak Chouhan
 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...Marina Krotofil
 
Designing and implementing malicious processors
Designing and implementing malicious processorsDesigning and implementing malicious processors
Designing and implementing malicious processorsNebyueAwoke
 

What's hot (19)

Fault tolerance techniques tsp
Fault tolerance techniques tspFault tolerance techniques tsp
Fault tolerance techniques tsp
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
Chap 4 lesson02emsysnewinterruptbasedi_os
Chap 4 lesson02emsysnewinterruptbasedi_osChap 4 lesson02emsysnewinterruptbasedi_os
Chap 4 lesson02emsysnewinterruptbasedi_os
 
SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
 SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
SMART AND INTELLIGENCE HI-TECH ARMY SECURITY SYSTEM
 
Hardware firmware algorithm
Hardware firmware algorithmHardware firmware algorithm
Hardware firmware algorithm
 
Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10
 
Interrupts
InterruptsInterrupts
Interrupts
 
Viewpoint on ISA TR84.0.02 - simplified methods and fault tree analysis
Viewpoint on ISA TR84.0.02 - simplified methods and fault tree analysisViewpoint on ISA TR84.0.02 - simplified methods and fault tree analysis
Viewpoint on ISA TR84.0.02 - simplified methods and fault tree analysis
 
Fault tolerant real-time scheduling
Fault tolerant real-time schedulingFault tolerant real-time scheduling
Fault tolerant real-time scheduling
 
F33 book-depend-pres-pt6
F33 book-depend-pres-pt6F33 book-depend-pres-pt6
F33 book-depend-pres-pt6
 
Lect13
Lect13Lect13
Lect13
 
Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2Mission Critical Security in a Post-Stuxnet World Part 2
Mission Critical Security in a Post-Stuxnet World Part 2
 
Stuxnet dc9723
Stuxnet dc9723Stuxnet dc9723
Stuxnet dc9723
 
EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1
 
Оптимізація процесу відлагоджування Embedded рішень, Богдан Костів
Оптимізація процесу відлагоджування Embedded рішень, Богдан КостівОптимізація процесу відлагоджування Embedded рішень, Богдан Костів
Оптимізація процесу відлагоджування Embedded рішень, Богдан Костів
 
Embedded System Design latest
Embedded System Design latestEmbedded System Design latest
Embedded System Design latest
 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
 
Designing and implementing malicious processors
Designing and implementing malicious processorsDesigning and implementing malicious processors
Designing and implementing malicious processors
 

Viewers also liked (19)

3ra actividad mapa conceptual
3ra actividad mapa conceptual3ra actividad mapa conceptual
3ra actividad mapa conceptual
 
Personas juridicas del dip
Personas juridicas del dipPersonas juridicas del dip
Personas juridicas del dip
 
Info cc
Info ccInfo cc
Info cc
 
Reverse auctioning engine
Reverse auctioning engine Reverse auctioning engine
Reverse auctioning engine
 
Importancia del estudio del derecho adjetivo procesal laboral
Importancia del estudio del derecho adjetivo procesal laboralImportancia del estudio del derecho adjetivo procesal laboral
Importancia del estudio del derecho adjetivo procesal laboral
 
Posiciones juradas probatorio
Posiciones juradas probatorioPosiciones juradas probatorio
Posiciones juradas probatorio
 
AutoCAD
AutoCAD   AutoCAD
AutoCAD
 
las tic
las ticlas tic
las tic
 
Modelados con solidos
Modelados con solidosModelados con solidos
Modelados con solidos
 
Tecnología Scolari - Lombardi - Dabove
Tecnología Scolari - Lombardi - DaboveTecnología Scolari - Lombardi - Dabove
Tecnología Scolari - Lombardi - Dabove
 
Contratos informáticos y contratos electrónicos
Contratos informáticos y contratos electrónicosContratos informáticos y contratos electrónicos
Contratos informáticos y contratos electrónicos
 
pagina web Hotel Castelar
pagina web Hotel Castelarpagina web Hotel Castelar
pagina web Hotel Castelar
 
Passive Voice
Passive VoicePassive Voice
Passive Voice
 
SoC Newsletter
SoC NewsletterSoC Newsletter
SoC Newsletter
 
Ensayo derecho internacional privado
Ensayo derecho internacional privadoEnsayo derecho internacional privado
Ensayo derecho internacional privado
 
Presentación Fauna y Flora
Presentación Fauna y FloraPresentación Fauna y Flora
Presentación Fauna y Flora
 
AutoCAD
AutoCAD   AutoCAD
AutoCAD
 
08220_Final Project
08220_Final Project08220_Final Project
08220_Final Project
 
Esc 209 slides-doin
Esc 209 slides-doinEsc 209 slides-doin
Esc 209 slides-doin
 

Similar to Jonny doin safe io t- lt_spice failsafe

5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Mikro Elektronik GmbH
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Micro
 
SiliconFailsafeForIoT_Doin
SiliconFailsafeForIoT_DoinSiliconFailsafeForIoT_Doin
SiliconFailsafeForIoT_DoinJonny Doin
 
Troubleshooting & Tools
Troubleshooting & ToolsTroubleshooting & Tools
Troubleshooting & ToolsPrabu U
 
Low cost embedded system
Low cost embedded systemLow cost embedded system
Low cost embedded systemece svit
 
PLC, DCS and PLC vs DCS Presentation by Jitender Singh Shekhawat
PLC, DCS and PLC vs DCS Presentation by Jitender Singh ShekhawatPLC, DCS and PLC vs DCS Presentation by Jitender Singh Shekhawat
PLC, DCS and PLC vs DCS Presentation by Jitender Singh ShekhawatJitender Singh Shekhawat
 
Embeddedsystem 110412132957-phpapp02
Embeddedsystem 110412132957-phpapp02Embeddedsystem 110412132957-phpapp02
Embeddedsystem 110412132957-phpapp02ishan111
 
btech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptxbtech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptxSattiBabu16
 
CS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptxCS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptxAsst.prof M.Gokilavani
 
Rodrigo Almeida - Microkernel development from project to implementation
Rodrigo Almeida - Microkernel development from project to implementationRodrigo Almeida - Microkernel development from project to implementation
Rodrigo Almeida - Microkernel development from project to implementationFelipe Prado
 
Microprocessors and microcontrollers
Microprocessors and microcontrollersMicroprocessors and microcontrollers
Microprocessors and microcontrollersAditya Porwal
 
01 introduction to_plc-pac_rev01_fa16
01 introduction to_plc-pac_rev01_fa1601 introduction to_plc-pac_rev01_fa16
01 introduction to_plc-pac_rev01_fa16John Todora
 
CS304PC: Computer Organization and Architecture Session 27 priority interrupt...
CS304PC: Computer Organization and Architecture Session 27 priority interrupt...CS304PC: Computer Organization and Architecture Session 27 priority interrupt...
CS304PC: Computer Organization and Architecture Session 27 priority interrupt...Asst.prof M.Gokilavani
 
Embedded Systems Implementation and Applications
Embedded Systems Implementation and ApplicationsEmbedded Systems Implementation and Applications
Embedded Systems Implementation and ApplicationsKaushik Padmanabhan
 
Embedded systems presentation
Embedded systems presentationEmbedded systems presentation
Embedded systems presentationSurender Singh
 
System-level Threats: Dangerous Assumptions in modern Product Security
System-level Threats: Dangerous Assumptions in modern Product SecuritySystem-level Threats: Dangerous Assumptions in modern Product Security
System-level Threats: Dangerous Assumptions in modern Product SecurityCristofaro Mune
 

Similar to Jonny doin safe io t- lt_spice failsafe (20)

5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
SiliconFailsafeForIoT_Doin
SiliconFailsafeForIoT_DoinSiliconFailsafeForIoT_Doin
SiliconFailsafeForIoT_Doin
 
Troubleshooting & Tools
Troubleshooting & ToolsTroubleshooting & Tools
Troubleshooting & Tools
 
Low cost embedded system
Low cost embedded systemLow cost embedded system
Low cost embedded system
 
PLC, DCS and PLC vs DCS Presentation by Jitender Singh Shekhawat
PLC, DCS and PLC vs DCS Presentation by Jitender Singh ShekhawatPLC, DCS and PLC vs DCS Presentation by Jitender Singh Shekhawat
PLC, DCS and PLC vs DCS Presentation by Jitender Singh Shekhawat
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Embeddedsystem
EmbeddedsystemEmbeddedsystem
Embeddedsystem
 
DSDConference07
DSDConference07DSDConference07
DSDConference07
 
Embeddedsystem 110412132957-phpapp02
Embeddedsystem 110412132957-phpapp02Embeddedsystem 110412132957-phpapp02
Embeddedsystem 110412132957-phpapp02
 
btech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptxbtech embedded systems ppt ES UNIT-1.pptx
btech embedded systems ppt ES UNIT-1.pptx
 
Soc.pptx
Soc.pptxSoc.pptx
Soc.pptx
 
CS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptxCS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptx
 
Rodrigo Almeida - Microkernel development from project to implementation
Rodrigo Almeida - Microkernel development from project to implementationRodrigo Almeida - Microkernel development from project to implementation
Rodrigo Almeida - Microkernel development from project to implementation
 
Microprocessors and microcontrollers
Microprocessors and microcontrollersMicroprocessors and microcontrollers
Microprocessors and microcontrollers
 
01 introduction to_plc-pac_rev01_fa16
01 introduction to_plc-pac_rev01_fa1601 introduction to_plc-pac_rev01_fa16
01 introduction to_plc-pac_rev01_fa16
 
CS304PC: Computer Organization and Architecture Session 27 priority interrupt...
CS304PC: Computer Organization and Architecture Session 27 priority interrupt...CS304PC: Computer Organization and Architecture Session 27 priority interrupt...
CS304PC: Computer Organization and Architecture Session 27 priority interrupt...
 
Embedded Systems Implementation and Applications
Embedded Systems Implementation and ApplicationsEmbedded Systems Implementation and Applications
Embedded Systems Implementation and Applications
 
Embedded systems presentation
Embedded systems presentationEmbedded systems presentation
Embedded systems presentation
 
System-level Threats: Dangerous Assumptions in modern Product Security
System-level Threats: Dangerous Assumptions in modern Product SecuritySystem-level Threats: Dangerous Assumptions in modern Product Security
System-level Threats: Dangerous Assumptions in modern Product Security
 

More from Jonny Doin

Impacto metrologialegal jonnydoin
Impacto metrologialegal jonnydoinImpacto metrologialegal jonnydoin
Impacto metrologialegal jonnydoinJonny Doin
 
Jonny doin lt spice servo_dac
Jonny doin lt spice servo_dacJonny doin lt spice servo_dac
Jonny doin lt spice servo_dacJonny Doin
 
Sts 401 slides-doin
Sts 401 slides-doinSts 401 slides-doin
Sts 401 slides-doinJonny Doin
 
Esc 209 paper_doin
Esc 209 paper_doinEsc 209 paper_doin
Esc 209 paper_doinJonny Doin
 
Network insecuritysimplehackscortexm jonnydoin
Network insecuritysimplehackscortexm jonnydoinNetwork insecuritysimplehackscortexm jonnydoin
Network insecuritysimplehackscortexm jonnydoinJonny Doin
 
Io t hurdles_i_pv6_slides_doin
Io t hurdles_i_pv6_slides_doinIo t hurdles_i_pv6_slides_doin
Io t hurdles_i_pv6_slides_doinJonny Doin
 
Implementing lora smartcity doin
Implementing lora smartcity doinImplementing lora smartcity doin
Implementing lora smartcity doinJonny Doin
 
Csc jonny doin_painel1_sm
Csc jonny doin_painel1_smCsc jonny doin_painel1_sm
Csc jonny doin_painel1_smJonny Doin
 
ParallelLogicToEventDrivenFirmware_Doin
ParallelLogicToEventDrivenFirmware_DoinParallelLogicToEventDrivenFirmware_Doin
ParallelLogicToEventDrivenFirmware_DoinJonny Doin
 
ImplementingCryptoSecurityARMCortex_Doin
ImplementingCryptoSecurityARMCortex_DoinImplementingCryptoSecurityARMCortex_Doin
ImplementingCryptoSecurityARMCortex_DoinJonny Doin
 

More from Jonny Doin (10)

Impacto metrologialegal jonnydoin
Impacto metrologialegal jonnydoinImpacto metrologialegal jonnydoin
Impacto metrologialegal jonnydoin
 
Jonny doin lt spice servo_dac
Jonny doin lt spice servo_dacJonny doin lt spice servo_dac
Jonny doin lt spice servo_dac
 
Sts 401 slides-doin
Sts 401 slides-doinSts 401 slides-doin
Sts 401 slides-doin
 
Esc 209 paper_doin
Esc 209 paper_doinEsc 209 paper_doin
Esc 209 paper_doin
 
Network insecuritysimplehackscortexm jonnydoin
Network insecuritysimplehackscortexm jonnydoinNetwork insecuritysimplehackscortexm jonnydoin
Network insecuritysimplehackscortexm jonnydoin
 
Io t hurdles_i_pv6_slides_doin
Io t hurdles_i_pv6_slides_doinIo t hurdles_i_pv6_slides_doin
Io t hurdles_i_pv6_slides_doin
 
Implementing lora smartcity doin
Implementing lora smartcity doinImplementing lora smartcity doin
Implementing lora smartcity doin
 
Csc jonny doin_painel1_sm
Csc jonny doin_painel1_smCsc jonny doin_painel1_sm
Csc jonny doin_painel1_sm
 
ParallelLogicToEventDrivenFirmware_Doin
ParallelLogicToEventDrivenFirmware_DoinParallelLogicToEventDrivenFirmware_Doin
ParallelLogicToEventDrivenFirmware_Doin
 
ImplementingCryptoSecurityARMCortex_Doin
ImplementingCryptoSecurityARMCortex_DoinImplementingCryptoSecurityARMCortex_Doin
ImplementingCryptoSecurityARMCortex_Doin
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Jonny doin safe io t- lt_spice failsafe

  • 1. 26 e 27 de Agosto, 2014 Transamérica Expo Center, São Paulo/SP Safe IoT: Using LTSpice to Model Failsafe Logic in Embedded Systems Jonny Doin, CEO, GridVortex
  • 2. Agenda • Safety: What is Safety? • Failure: What constitutes Failure? • Design for Safety: Failsafe Design • Failure in Embedded Systems • LT Spice as a system modelling tool • Modelling the Firmware/Hardware interfaces • Simulating Software failure at the interface • Circuit behavior under failure scenarios • Final thoughts
  • 3. Safety: What is Safety? A Safe System is one that exhibits: • Deterministic responses • Controlled Behaviors for all inputs • Never place its outputs in a hazardous state
  • 4. Safety: What is Safety? (2) REALITY: ALL SYSTEMS WILL FAIL
  • 5. Safety: What is Safety? (3) In the real world, systems are always connected to other systems. Hazardous output states must be qualified from the downstream (external) systems point of view
  • 6. Failure Failure is a malfunction on the system, or a deviation on designed behavior. On any system, such a deviation on the chain of processing can lead to system failure.
  • 7. Failure (2) Designs can handle system failures at the critical interfaces, by identifying input failure and insuring a known output state. This design pattern is recursive, i.e., can be applied to subsystems down to the smaller modules, to ensure that the whole system fails in a safe mode.
  • 8. Failsafe Design Identifying the failure modes of the inputs and the safe state of the outputs are the main concerns of FailSafe Design. The hazards must be assessed, e.g., following a FME(C)A methodology and possibly a FTA fault-tree analysis for the critical components.
  • 9. Failsafe Design (2) Once identified, the Hazardous behaviors can be used to direct system design from the ground up, designing for maximum avoidance of such behaviors. Failsafe Responses must be triggered by an internal or external failure.
  • 10. Failsafe Design (3) Failsafe design can be “costly” in system resources. For example, achieving functional safety in Firmware may lead to fully redundant processors, running in lockstep mode. Identifying critical system points can lead to safe designs at low cost.
  • 11. Failure in Embedded Systems Mixed signal embedded systems are ubiquitous, running from factory automation to car engines. The interconnected embedded systems, also called IoT devices, need to be designed as critical nodes for functional safety.
  • 12. Failure in Embedded Systems (2) Aside from failsafe Firmware design techniques, the Firmware/Hardware interface is one critical design node. Designing such interface for safety, simulating and testing the failure modes are essential safety critical design concerns.
  • 13. LT Spice as a System Tool LT Spice is a very fast and accurate professional circuit simulation tool. Used as a circuit simulator, LT Spice can predict actual behavior with high precision. Modelling interaction of Firmware and Analog hardware in the design stage is a powerful capability.
  • 14. LT Spice as a System Tool (2) LT Spice allows modeling mixed-signal systems, including Firmware behavior interaction with Analog hardware: • Behavioral sources (B) • Digital Gate primitives (Axxx) • Hierarchical subcircuits • Waveform and data file generators
  • 15. Modelling system interfaces Designing the Fw/Hw interface as a failsafe node has a number of advantages: • Functional Decoupling of Firmware and Hardware • Addresses CPU failure • Lower cost of implementation
  • 16. Modelling system interfaces (2) Examples: • Failsafe “Passive” drivers • AC coupled commands • Failsafe “ON” actuators
  • 17. Example: Failsafe “passive” Output analog drivers can be designed to fail in high-impedance mode
  • 18. Example: Failsafe “passive” (2) The 2 analog outputs are buffered with failsafe drivers that go high impedance when VCC is lost
  • 19. Example: Failsafe “passive” (3) • Each output is buffered and isolated with 2 NPN bipolar transistors. • When VCC fails, the transistors cut off, with very high impedance. • A 68K resistor is seen by the output current source and will drive the output voltage to 6.8V, bringing the output to 100%. • This failsafe guarantees the downstream system is ON, even on loss of control.
  • 20. Example: AC-coupled cmds On a firmware failure, toggling signals will stop at VCC or GND. AC-coupled commands can detect such firmware failures.
  • 22. Example: Failsafe “ON” When the failsafe behavior is to keep an actuator ON, the firmware commands are designed to turn it OFF. A firmware failure will keep the actuator ON.
  • 24. Final Thoughts Embedded Mixed Signal Systems are becoming a major part of infrastructure and control systems. Using LT Spice for failsafe design and verification on embedded systems can increase safety, even on low-cost IoT devices.