SlideShare a Scribd company logo
1 of 10
Download to read offline
Textmasterformat bearbeiten
▪ Second Level
▪ Third Level
▪ Fourth Level
Fifth Level
August 24, 2017
5 Techniques to Achieve Functional Safety for
Embedded Systems
2
The Need for Safe Computing
Failures of safety-critical electronic systems can result in loss of life, substantial
financial damage or severe harm to the environment.
Safe computer systems are typically used in avionics or railway applications
requiring particularly high reliability. This also goes for the medical market, while
industrial automation environments demand more and more functional safety as
technology becomes readily available.
One of the key design elements of a safety-critical system is redundancy. Other
techniques are diversity in components, determinism and predictable behavior,
clustering to increase availability and supervisor and event logging features.
Considerations about mission-critical computer architectures are complex and
include safety-critical characteristics, reliability questions, error behavior modes,
Safety Integrity Levels (up to SIL 3 or SIL 4) and the major IEC and EN standards,
e.g., EN 50128 / EN 50129 for railways or DO-254 for avionics (up to DAL-A).
3
Proven Techniques in Functional Safety
1. Redundancy
2. Diversity
3. Determinism
4. Clustering
5. Supervisors, Event Logging
4
Redundancy
Redundancy. Multiplying critical components, such as the CPU, increases the
function's reliability.
The most important strategy to make a system less vulnerable to risk is to
multiply significant components. A component that by failing brings the entire
system to a halt is called a "Single Point of Failure" (SPOF). If critical components,
such as the CPU, are redundant, the availability and/or reliability of the functions
increase.
Depending on what you want to achieve, you can use different redundancy
configurations. To do this, you name the number of functions that must be in
working order in case of a failure (M) compared to the total number of
redundant functions (N). This results in “M out of N”, abbreviated as MooN.
5
Redundancy - MooN Constellations
With safe redundant functions, all
components must also deliver the same
computing results, to allow for the detection
of errors, in the simplest case in a 2oo2
system. This reduces availability (fail-safe)
Inputs Controller Outputs
M
Inputs Controller Outputs
Inputs Controller Outputs
M
Inputs Controller Outputs
Inputs Controller Outputs
Inputs Controller Outputs
Inputs Controller Outputs
2oo3
Voter
M
A 1oo2 constellation increases availability of
the system and, by consequence, the Mean
Time Between Failures (MTBF). If one of two
processors fails, a 1oo2 system can still go on
operating (fail-operational).
The 2oo3 set-up is used frequently, because it
increases both safety and availability. With
such a level of complexity, a voting
mechanism, or voter, is an inherent part of
the system. It permanently compares and
analyzes computing results.
6
Diversity
Diversity. If redundant components are identical, a common cause can make
them fail. This is why a system must support dissimilarities both in hardware and
in software.
For instance, you can run different,
independently designed software applications
on the subsystems. On the hardware side you
could use different I/O interfaces. Identical
functions are implemented in varying ways. In
the end the two dissimilar set-ups must lead to
the same result, so that the system can act in a
defined way. Diversity is even possible on one
single board: memory management of the
processors allows to partition the resources,
which is in turn supported by real-time
operating systems like PikeOS.
Safe Application Safe Application
Linux Windows
Linux Drivers Windows Drivers
x86 Architecture RISC Architecture
7
Clustering
Clustering. This does not increase a subsystem's safety, but it raises availability.
Backing up a system is using redundancy on a higher level with the aim of
keeping your system up even in case of a failure.
It is possible to combine two assemblies to form a highly available computer
cluster. In a set-up like this, every channel – being redundant itself – works
independently, but only one channel is active. If the active channel fails, the
system automatically switches to the second channel. The boards can be
connected using dedicated serial interfaces:
Sensors
1
2
3
Cluster
Active Computer
Stand-By Computer Stand-By Output
Active Output
Actor
UARTs (DEX) make for communication
between the two channels. A direct
connection between the Board
Management Controllers (BMCX)
controls the switch-over from the active
to the inactive channel.
8
Determinism
Determinism. The need for predictable behavior forbids a number of
mechanisms, like interrupts, common in non-critical applications. Design
engineers need particular expertise in this respect.
Next to failure safety, mission-critical environments also demand calculable
execution times. The system must react to an external event within a defined
time, even under worst case conditions.
Engineers need to consider possible behavior and its consequences in detail at
an early stage, in preparation for their actual design. In terms of hardware and
firmware, BITE components are used here – Built-In Test Equipment. Errors
handling techniques such as ECC (Error Correcting Code) or the monitoring of
internal voltages play an important role, here, too.
When it comes to software, system integrators in need of deterministic behavior
select a real-time system like VxWorks or PikeOS.
9
Supervisors, Event Logging
Supervisors. Board management and supervision in safe computers need to go
beyond the usual CPU functions. A reliable CPU should have a dedicated monitor
at its side rather than supervise itself.
Event Logging. While this is not a necessary safety function, it can help track back
faults in critical systems in case of an incident. Chances are higher to avoid the
error cause in the future by taking precautions.
www.men.de/competencies/safe-computing/
www.menmicro.com/competencies/safe-computing/
www.men-france.fr/competencies/safe-computing/

More Related Content

What's hot

Embedded systems introduction
Embedded systems introductionEmbedded systems introduction
Embedded systems introductionSagar Adroja
 
EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1PRADEEP
 
Wallace moreira bessa breakfast coffee with a professor 21052021
Wallace moreira bessa breakfast coffee with a professor 21052021Wallace moreira bessa breakfast coffee with a professor 21052021
Wallace moreira bessa breakfast coffee with a professor 21052021Business Turku
 
Embedded system and its platforms
Embedded system and its platformsEmbedded system and its platforms
Embedded system and its platformsMrunal Deshkar
 
Fault avoidance and fault tolerance
Fault avoidance and fault toleranceFault avoidance and fault tolerance
Fault avoidance and fault toleranceJabez Winston
 
ME Information Security
ME Information SecurityME Information Security
ME Information SecurityMohamed Monsef
 
Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10Risman BizNet
 
1. advantages and applications of embedded system
1. advantages and applications of embedded system1. advantages and applications of embedded system
1. advantages and applications of embedded systemVikas Dongre
 
Jonny doin safe io t- lt_spice failsafe
Jonny doin safe io t- lt_spice failsafeJonny doin safe io t- lt_spice failsafe
Jonny doin safe io t- lt_spice failsafeJonny Doin
 
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwal
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwalCpu register, instruction exucution and interrupts unit 1 by ram k paliwal
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwalRam Paliwal
 
Gsm the operation support subsystem(oss)
Gsm   the operation support subsystem(oss)Gsm   the operation support subsystem(oss)
Gsm the operation support subsystem(oss)Manish Kumar
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Embedded System Design latest
Embedded System Design latestEmbedded System Design latest
Embedded System Design latestDeepak Chouhan
 

What's hot (18)

Embedded systems introduction
Embedded systems introductionEmbedded systems introduction
Embedded systems introduction
 
EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1
 
Wallace moreira bessa breakfast coffee with a professor 21052021
Wallace moreira bessa breakfast coffee with a professor 21052021Wallace moreira bessa breakfast coffee with a professor 21052021
Wallace moreira bessa breakfast coffee with a professor 21052021
 
Embedded system and its platforms
Embedded system and its platformsEmbedded system and its platforms
Embedded system and its platforms
 
Fault avoidance and fault tolerance
Fault avoidance and fault toleranceFault avoidance and fault tolerance
Fault avoidance and fault tolerance
 
Embedded system...
Embedded system...Embedded system...
Embedded system...
 
Embedded system - embedded system programming
Embedded system - embedded system programmingEmbedded system - embedded system programming
Embedded system - embedded system programming
 
ME Information Security
ME Information SecurityME Information Security
ME Information Security
 
Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10
 
Embedded operating systems
Embedded operating systemsEmbedded operating systems
Embedded operating systems
 
1. advantages and applications of embedded system
1. advantages and applications of embedded system1. advantages and applications of embedded system
1. advantages and applications of embedded system
 
Jonny doin safe io t- lt_spice failsafe
Jonny doin safe io t- lt_spice failsafeJonny doin safe io t- lt_spice failsafe
Jonny doin safe io t- lt_spice failsafe
 
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwal
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwalCpu register, instruction exucution and interrupts unit 1 by ram k paliwal
Cpu register, instruction exucution and interrupts unit 1 by ram k paliwal
 
Gsm the operation support subsystem(oss)
Gsm   the operation support subsystem(oss)Gsm   the operation support subsystem(oss)
Gsm the operation support subsystem(oss)
 
Infrastructure control
Infrastructure controlInfrastructure control
Infrastructure control
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Embedded System Design latest
Embedded System Design latestEmbedded System Design latest
Embedded System Design latest
 
System Security Plans 101
System Security Plans 101System Security Plans 101
System Security Plans 101
 

Similar to 5 Techniques to Achieve Functional Safety for Embedded Systems

IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET Journal
 
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE WITH ON-LINE PARAMETER PR...
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE  WITH ON-LINE PARAMETER PR...FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE  WITH ON-LINE PARAMETER PR...
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE WITH ON-LINE PARAMETER PR...Sheikh R Manihar Ahmed
 
CS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptxCS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptxAsst.prof M.Gokilavani
 
An Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors RisksAn Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors Riskssipij
 
Troubleshooting & Tools
Troubleshooting & ToolsTroubleshooting & Tools
Troubleshooting & ToolsPrabu U
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsEditor IJCATR
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...TI Safe
 
Evolution of protective systems in petro chem
Evolution of protective systems in petro chemEvolution of protective systems in petro chem
Evolution of protective systems in petro chemGlen Alleman
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReportabhishekroushan
 
Electranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdfElectranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdfsmrasteg12
 
introduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfintroduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfPrabaKaran649935
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingIRJET Journal
 
Report on Enviorment Panel Monitoring
Report on Enviorment Panel MonitoringReport on Enviorment Panel Monitoring
Report on Enviorment Panel MonitoringMohammed Irshad S K
 
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...IJERA Editor
 

Similar to 5 Techniques to Achieve Functional Safety for Embedded Systems (20)

ATS @Station
ATS @StationATS @Station
ATS @Station
 
DSDConference07
DSDConference07DSDConference07
DSDConference07
 
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
 
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE WITH ON-LINE PARAMETER PR...
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE  WITH ON-LINE PARAMETER PR...FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE  WITH ON-LINE PARAMETER PR...
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE WITH ON-LINE PARAMETER PR...
 
CS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptxCS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptx
 
Unit 1 - Introduction
Unit 1 - IntroductionUnit 1 - Introduction
Unit 1 - Introduction
 
An Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors RisksAn Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors Risks
 
Troubleshooting & Tools
Troubleshooting & ToolsTroubleshooting & Tools
Troubleshooting & Tools
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance Applications
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...
 
Evolution of protective systems in petro chem
Evolution of protective systems in petro chemEvolution of protective systems in petro chem
Evolution of protective systems in petro chem
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport
 
DISTRIBUTED CONTROL SYSTEMS
DISTRIBUTED   CONTROL  SYSTEMSDISTRIBUTED   CONTROL  SYSTEMS
DISTRIBUTED CONTROL SYSTEMS
 
Electranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdfElectranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdf
 
introduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfintroduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdf
 
Ig3514391443
Ig3514391443Ig3514391443
Ig3514391443
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault Mapping
 
Report on Enviorment Panel Monitoring
Report on Enviorment Panel MonitoringReport on Enviorment Panel Monitoring
Report on Enviorment Panel Monitoring
 
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...
 

More from MEN Mikro Elektronik GmbH

5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)MEN Mikro Elektronik GmbH
 
5 choses à savoir sur le refroidissement par conduction (CCA)
5 choses à savoir sur le refroidissement par conduction (CCA)5 choses à savoir sur le refroidissement par conduction (CCA)
5 choses à savoir sur le refroidissement par conduction (CCA)MEN Mikro Elektronik GmbH
 
5 wissenswerte Fakten zu Conduction Cooling (CCA)
5 wissenswerte Fakten zu Conduction Cooling (CCA)5 wissenswerte Fakten zu Conduction Cooling (CCA)
5 wissenswerte Fakten zu Conduction Cooling (CCA)MEN Mikro Elektronik GmbH
 
5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen
5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen
5 Fakten über den F75P: Embedded Computer für sicherheitskritische AnwendungenMEN Mikro Elektronik GmbH
 
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...MEN Mikro Elektronik GmbH
 
3 points à connaître sur les Panel PC robustes de MEN
3 points à connaître sur les Panel PC robustes de MEN 3 points à connaître sur les Panel PC robustes de MEN
3 points à connaître sur les Panel PC robustes de MEN MEN Mikro Elektronik GmbH
 
Rugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsRugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsMEN Mikro Elektronik GmbH
 
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet SwitchesMEN Mikro Elektronik GmbH
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...MEN Mikro Elektronik GmbH
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in AerospaceMEN Mikro Elektronik GmbH
 
10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCSMEN Mikro Elektronik GmbH
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI SerialMEN Mikro Elektronik GmbH
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch FamilyMEN Mikro Elektronik GmbH
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationMEN Mikro Elektronik GmbH
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26LMEN Mikro Elektronik GmbH
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCSMEN Mikro Elektronik GmbH
 
5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDC5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDCMEN Mikro Elektronik GmbH
 

More from MEN Mikro Elektronik GmbH (20)

5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)
 
5 choses à savoir sur le refroidissement par conduction (CCA)
5 choses à savoir sur le refroidissement par conduction (CCA)5 choses à savoir sur le refroidissement par conduction (CCA)
5 choses à savoir sur le refroidissement par conduction (CCA)
 
5 wissenswerte Fakten zu Conduction Cooling (CCA)
5 wissenswerte Fakten zu Conduction Cooling (CCA)5 wissenswerte Fakten zu Conduction Cooling (CCA)
5 wissenswerte Fakten zu Conduction Cooling (CCA)
 
5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen
5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen
5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen
 
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
 
3 Dinge über robuste Panel-PCs von MEN
3 Dinge über robuste Panel-PCs von MEN3 Dinge über robuste Panel-PCs von MEN
3 Dinge über robuste Panel-PCs von MEN
 
3 points à connaître sur les Panel PC robustes de MEN
3 points à connaître sur les Panel PC robustes de MEN 3 points à connaître sur les Panel PC robustes de MEN
3 points à connaître sur les Panel PC robustes de MEN
 
Rugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsRugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-Applications
 
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace
 
10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
 
CB30C Rugged COM Express Safe Computer
CB30C Rugged COM Express Safe ComputerCB30C Rugged COM Express Safe Computer
CB30C Rugged COM Express Safe Computer
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
 
5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDC5 Things to Know about the Railway Data Center menRDC
5 Things to Know about the Railway Data Center menRDC
 
menRDC - MEN Railway Data Center
menRDC - MEN Railway Data CentermenRDC - MEN Railway Data Center
menRDC - MEN Railway Data Center
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

5 Techniques to Achieve Functional Safety for Embedded Systems

  • 1. Textmasterformat bearbeiten ▪ Second Level ▪ Third Level ▪ Fourth Level Fifth Level August 24, 2017 5 Techniques to Achieve Functional Safety for Embedded Systems
  • 2. 2 The Need for Safe Computing Failures of safety-critical electronic systems can result in loss of life, substantial financial damage or severe harm to the environment. Safe computer systems are typically used in avionics or railway applications requiring particularly high reliability. This also goes for the medical market, while industrial automation environments demand more and more functional safety as technology becomes readily available. One of the key design elements of a safety-critical system is redundancy. Other techniques are diversity in components, determinism and predictable behavior, clustering to increase availability and supervisor and event logging features. Considerations about mission-critical computer architectures are complex and include safety-critical characteristics, reliability questions, error behavior modes, Safety Integrity Levels (up to SIL 3 or SIL 4) and the major IEC and EN standards, e.g., EN 50128 / EN 50129 for railways or DO-254 for avionics (up to DAL-A).
  • 3. 3 Proven Techniques in Functional Safety 1. Redundancy 2. Diversity 3. Determinism 4. Clustering 5. Supervisors, Event Logging
  • 4. 4 Redundancy Redundancy. Multiplying critical components, such as the CPU, increases the function's reliability. The most important strategy to make a system less vulnerable to risk is to multiply significant components. A component that by failing brings the entire system to a halt is called a "Single Point of Failure" (SPOF). If critical components, such as the CPU, are redundant, the availability and/or reliability of the functions increase. Depending on what you want to achieve, you can use different redundancy configurations. To do this, you name the number of functions that must be in working order in case of a failure (M) compared to the total number of redundant functions (N). This results in “M out of N”, abbreviated as MooN.
  • 5. 5 Redundancy - MooN Constellations With safe redundant functions, all components must also deliver the same computing results, to allow for the detection of errors, in the simplest case in a 2oo2 system. This reduces availability (fail-safe) Inputs Controller Outputs M Inputs Controller Outputs Inputs Controller Outputs M Inputs Controller Outputs Inputs Controller Outputs Inputs Controller Outputs Inputs Controller Outputs 2oo3 Voter M A 1oo2 constellation increases availability of the system and, by consequence, the Mean Time Between Failures (MTBF). If one of two processors fails, a 1oo2 system can still go on operating (fail-operational). The 2oo3 set-up is used frequently, because it increases both safety and availability. With such a level of complexity, a voting mechanism, or voter, is an inherent part of the system. It permanently compares and analyzes computing results.
  • 6. 6 Diversity Diversity. If redundant components are identical, a common cause can make them fail. This is why a system must support dissimilarities both in hardware and in software. For instance, you can run different, independently designed software applications on the subsystems. On the hardware side you could use different I/O interfaces. Identical functions are implemented in varying ways. In the end the two dissimilar set-ups must lead to the same result, so that the system can act in a defined way. Diversity is even possible on one single board: memory management of the processors allows to partition the resources, which is in turn supported by real-time operating systems like PikeOS. Safe Application Safe Application Linux Windows Linux Drivers Windows Drivers x86 Architecture RISC Architecture
  • 7. 7 Clustering Clustering. This does not increase a subsystem's safety, but it raises availability. Backing up a system is using redundancy on a higher level with the aim of keeping your system up even in case of a failure. It is possible to combine two assemblies to form a highly available computer cluster. In a set-up like this, every channel – being redundant itself – works independently, but only one channel is active. If the active channel fails, the system automatically switches to the second channel. The boards can be connected using dedicated serial interfaces: Sensors 1 2 3 Cluster Active Computer Stand-By Computer Stand-By Output Active Output Actor UARTs (DEX) make for communication between the two channels. A direct connection between the Board Management Controllers (BMCX) controls the switch-over from the active to the inactive channel.
  • 8. 8 Determinism Determinism. The need for predictable behavior forbids a number of mechanisms, like interrupts, common in non-critical applications. Design engineers need particular expertise in this respect. Next to failure safety, mission-critical environments also demand calculable execution times. The system must react to an external event within a defined time, even under worst case conditions. Engineers need to consider possible behavior and its consequences in detail at an early stage, in preparation for their actual design. In terms of hardware and firmware, BITE components are used here – Built-In Test Equipment. Errors handling techniques such as ECC (Error Correcting Code) or the monitoring of internal voltages play an important role, here, too. When it comes to software, system integrators in need of deterministic behavior select a real-time system like VxWorks or PikeOS.
  • 9. 9 Supervisors, Event Logging Supervisors. Board management and supervision in safe computers need to go beyond the usual CPU functions. A reliable CPU should have a dedicated monitor at its side rather than supervise itself. Event Logging. While this is not a necessary safety function, it can help track back faults in critical systems in case of an incident. Chances are higher to avoid the error cause in the future by taking precautions.