SlideShare a Scribd company logo
1 of 10
Download to read offline
Textmasterformat bearbeiten
▪ Second Level
▪ Third Level
▪ Fourth Level
Fifth Level
August 24, 2017
5 Techniques to Achieve Functional Safety for
Embedded Systems
2
The Need for Safe Computing
Failures of safety-critical electronic systems can result in loss of life, substantial
financial damage or severe harm to the environment.
Safe computer systems are typically used in avionics or railway applications
requiring particularly high reliability. This also goes for the medical market, while
industrial automation environments demand more and more functional safety as
technology becomes readily available.
One of the key design elements of a safety-critical system is redundancy. Other
techniques are diversity in components, determinism and predictable behavior,
clustering to increase availability and supervisor and event logging features.
Considerations about mission-critical computer architectures are complex and
include safety-critical characteristics, reliability questions, error behavior modes,
Safety Integrity Levels (up to SIL 3 or SIL 4) and the major IEC and EN standards,
e.g., EN 50128 / EN 50129 for railways or DO-254 for avionics (up to DAL-A).
3
Proven Techniques in Functional Safety
1. Redundancy
2. Diversity
3. Determinism
4. Clustering
5. Supervisors, Event Logging
4
Redundancy
Redundancy. Multiplying critical components, such as the CPU, increases the
function's reliability.
The most important strategy to make a system less vulnerable to risk is to
multiply significant components. A component that by failing brings the entire
system to a halt is called a "Single Point of Failure" (SPOF). If critical components,
such as the CPU, are redundant, the availability and/or reliability of the functions
increase.
Depending on what you want to achieve, you can use different redundancy
configurations. To do this, you name the number of functions that must be in
working order in case of a failure (M) compared to the total number of
redundant functions (N). This results in “M out of N”, abbreviated as MooN.
5
Redundancy - MooN Constellations
With safe redundant functions, all
components must also deliver the same
computing results, to allow for the detection
of errors, in the simplest case in a 2oo2
system. This reduces availability (fail-safe)
Inputs Controller Outputs
M
Inputs Controller Outputs
Inputs Controller Outputs
M
Inputs Controller Outputs
Inputs Controller Outputs
Inputs Controller Outputs
Inputs Controller Outputs
2oo3
Voter
M
A 1oo2 constellation increases availability of
the system and, by consequence, the Mean
Time Between Failures (MTBF). If one of two
processors fails, a 1oo2 system can still go on
operating (fail-operational).
The 2oo3 set-up is used frequently, because it
increases both safety and availability. With
such a level of complexity, a voting
mechanism, or voter, is an inherent part of
the system. It permanently compares and
analyzes computing results.
6
Diversity
Diversity. If redundant components are identical, a common cause can make
them fail. This is why a system must support dissimilarities both in hardware and
in software.
For instance, you can run different,
independently designed software applications
on the subsystems. On the hardware side you
could use different I/O interfaces. Identical
functions are implemented in varying ways. In
the end the two dissimilar set-ups must lead to
the same result, so that the system can act in a
defined way. Diversity is even possible on one
single board: memory management of the
processors allows to partition the resources,
which is in turn supported by real-time
operating systems like PikeOS.
Safe Application Safe Application
Linux Windows
Linux Drivers Windows Drivers
x86 Architecture RISC Architecture
7
Clustering
Clustering. This does not increase a subsystem's safety, but it raises availability.
Backing up a system is using redundancy on a higher level with the aim of
keeping your system up even in case of a failure.
It is possible to combine two assemblies to form a highly available computer
cluster. In a set-up like this, every channel – being redundant itself – works
independently, but only one channel is active. If the active channel fails, the
system automatically switches to the second channel. The boards can be
connected using dedicated serial interfaces:
Sensors
1
2
3
Cluster
Active Computer
Stand-By Computer Stand-By Output
Active Output
Actor
UARTs (DEX) make for communication
between the two channels. A direct
connection between the Board
Management Controllers (BMCX)
controls the switch-over from the active
to the inactive channel.
8
Determinism
Determinism. The need for predictable behavior forbids a number of
mechanisms, like interrupts, common in non-critical applications. Design
engineers need particular expertise in this respect.
Next to failure safety, mission-critical environments also demand calculable
execution times. The system must react to an external event within a defined
time, even under worst case conditions.
Engineers need to consider possible behavior and its consequences in detail at
an early stage, in preparation for their actual design. In terms of hardware and
firmware, BITE components are used here – Built-In Test Equipment. Errors
handling techniques such as ECC (Error Correcting Code) or the monitoring of
internal voltages play an important role, here, too.
When it comes to software, system integrators in need of deterministic behavior
select a real-time system like VxWorks or PikeOS.
9
Supervisors, Event Logging
Supervisors. Board management and supervision in safe computers need to go
beyond the usual CPU functions. A reliable CPU should have a dedicated monitor
at its side rather than supervise itself.
Event Logging. While this is not a necessary safety function, it can help track back
faults in critical systems in case of an incident. Chances are higher to avoid the
error cause in the future by taking precautions.
www.men.de/competencies/safe-computing/
www.menmicro.com/competencies/safe-computing/
www.men-france.fr/competencies/safe-computing/

More Related Content

What's hot

Microcontroller 8051 timer 274 P$
Microcontroller 8051 timer 274 P$Microcontroller 8051 timer 274 P$
Microcontroller 8051 timer 274 P$PusHkar SaIni
 
Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10Risman BizNet
 
IT6701 Information Management - Unit II
IT6701 Information Management - Unit II   IT6701 Information Management - Unit II
IT6701 Information Management - Unit II pkaviya
 
Embedded system
Embedded systemEmbedded system
Embedded systemAnum Naz
 
basic of embedded system
basic of embedded systembasic of embedded system
basic of embedded systemDinesh35833
 
IJSRED-V2I3P91
IJSRED-V2I3P91IJSRED-V2I3P91
IJSRED-V2I3P91IJSRED
 
Reliability Assessment of Induction Motor Drive using Failure Mode Effects An...
Reliability Assessment of Induction Motor Drive using Failure Mode Effects An...Reliability Assessment of Induction Motor Drive using Failure Mode Effects An...
Reliability Assessment of Induction Motor Drive using Failure Mode Effects An...IOSR Journals
 
Wallace moreira bessa breakfast coffee with a professor 21052021
Wallace moreira bessa breakfast coffee with a professor 21052021Wallace moreira bessa breakfast coffee with a professor 21052021
Wallace moreira bessa breakfast coffee with a professor 21052021Business Turku
 
Sensors and Actuators Integration in Embedded Systems
Sensors and Actuators Integration in Embedded SystemsSensors and Actuators Integration in Embedded Systems
Sensors and Actuators Integration in Embedded SystemsIDES Editor
 
Vector Supercomputers and Scientific Array Processors
Vector Supercomputers and Scientific Array ProcessorsVector Supercomputers and Scientific Array Processors
Vector Supercomputers and Scientific Array ProcessorsHsuvas Borkakoty
 
Yokogawa UGS Solution for System Integration with Third Party
Yokogawa UGS Solution for System Integration with Third PartyYokogawa UGS Solution for System Integration with Third Party
Yokogawa UGS Solution for System Integration with Third PartyAmit Sharma
 
Embedded Basics
Embedded Basics Embedded Basics
Embedded Basics Electro 8
 

What's hot (19)

ATS @Station
ATS @StationATS @Station
ATS @Station
 
Lect02
Lect02Lect02
Lect02
 
Microcontroller 8051 timer 274 P$
Microcontroller 8051 timer 274 P$Microcontroller 8051 timer 274 P$
Microcontroller 8051 timer 274 P$
 
F33 book-depend-pres-pt6
F33 book-depend-pres-pt6F33 book-depend-pres-pt6
F33 book-depend-pres-pt6
 
DISTRIBUTED CONTROL SYSTEMS
DISTRIBUTED   CONTROL  SYSTEMSDISTRIBUTED   CONTROL  SYSTEMS
DISTRIBUTED CONTROL SYSTEMS
 
Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10Brochure triconex emergency_shutdownsystemssolutions_03-10
Brochure triconex emergency_shutdownsystemssolutions_03-10
 
IT6701 Information Management - Unit II
IT6701 Information Management - Unit II   IT6701 Information Management - Unit II
IT6701 Information Management - Unit II
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 
basic of embedded system
basic of embedded systembasic of embedded system
basic of embedded system
 
IJSRED-V2I3P91
IJSRED-V2I3P91IJSRED-V2I3P91
IJSRED-V2I3P91
 
Embedded System
Embedded SystemEmbedded System
Embedded System
 
Reliability Assessment of Induction Motor Drive using Failure Mode Effects An...
Reliability Assessment of Induction Motor Drive using Failure Mode Effects An...Reliability Assessment of Induction Motor Drive using Failure Mode Effects An...
Reliability Assessment of Induction Motor Drive using Failure Mode Effects An...
 
Wallace moreira bessa breakfast coffee with a professor 21052021
Wallace moreira bessa breakfast coffee with a professor 21052021Wallace moreira bessa breakfast coffee with a professor 21052021
Wallace moreira bessa breakfast coffee with a professor 21052021
 
Sensors and Actuators Integration in Embedded Systems
Sensors and Actuators Integration in Embedded SystemsSensors and Actuators Integration in Embedded Systems
Sensors and Actuators Integration in Embedded Systems
 
Vector Supercomputers and Scientific Array Processors
Vector Supercomputers and Scientific Array ProcessorsVector Supercomputers and Scientific Array Processors
Vector Supercomputers and Scientific Array Processors
 
Yokogawa UGS Solution for System Integration with Third Party
Yokogawa UGS Solution for System Integration with Third PartyYokogawa UGS Solution for System Integration with Third Party
Yokogawa UGS Solution for System Integration with Third Party
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Embedded Basics
Embedded Basics Embedded Basics
Embedded Basics
 

Similar to 5 Techniques to Achieve Functional Safety for Embedded Systems

Jonny doin safe io t- lt_spice failsafe
Jonny doin safe io t- lt_spice failsafeJonny doin safe io t- lt_spice failsafe
Jonny doin safe io t- lt_spice failsafeJonny Doin
 
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET Journal
 
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE WITH ON-LINE PARAMETER PR...
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE  WITH ON-LINE PARAMETER PR...FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE  WITH ON-LINE PARAMETER PR...
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE WITH ON-LINE PARAMETER PR...Sheikh R Manihar Ahmed
 
CS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptxCS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptxAsst.prof M.Gokilavani
 
An Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors RisksAn Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors Riskssipij
 
Troubleshooting & Tools
Troubleshooting & ToolsTroubleshooting & Tools
Troubleshooting & ToolsPrabu U
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsEditor IJCATR
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...TI Safe
 
Evolution of protective systems in petro chem
Evolution of protective systems in petro chemEvolution of protective systems in petro chem
Evolution of protective systems in petro chemGlen Alleman
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReportabhishekroushan
 
Electranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdfElectranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdfsmrasteg12
 
introduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfintroduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfPrabaKaran649935
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingIRJET Journal
 
Report on Enviorment Panel Monitoring
Report on Enviorment Panel MonitoringReport on Enviorment Panel Monitoring
Report on Enviorment Panel MonitoringMohammed Irshad S K
 
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...IJERA Editor
 
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA   New Questions 29Tuts.Com New CCNA 200-120 New CCNA   New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2Lori Head
 

Similar to 5 Techniques to Achieve Functional Safety for Embedded Systems (20)

Jonny doin safe io t- lt_spice failsafe
Jonny doin safe io t- lt_spice failsafeJonny doin safe io t- lt_spice failsafe
Jonny doin safe io t- lt_spice failsafe
 
DSDConference07
DSDConference07DSDConference07
DSDConference07
 
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
 
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE WITH ON-LINE PARAMETER PR...
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE  WITH ON-LINE PARAMETER PR...FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE  WITH ON-LINE PARAMETER PR...
FAULT DETECTION AND DIAGNOSIS OF INDUCTION MACHINE WITH ON-LINE PARAMETER PR...
 
CS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptxCS304PC:Computer Organization and Architecture Session 15 program control.pptx
CS304PC:Computer Organization and Architecture Session 15 program control.pptx
 
Unit 1 - Introduction
Unit 1 - IntroductionUnit 1 - Introduction
Unit 1 - Introduction
 
An Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors RisksAn Efficient Approach Towards Mitigating Soft Errors Risks
An Efficient Approach Towards Mitigating Soft Errors Risks
 
Troubleshooting & Tools
Troubleshooting & ToolsTroubleshooting & Tools
Troubleshooting & Tools
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Proposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance ApplicationsProposed Algorithm for Surveillance Applications
Proposed Algorithm for Surveillance Applications
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...
 
Evolution of protective systems in petro chem
Evolution of protective systems in petro chemEvolution of protective systems in petro chem
Evolution of protective systems in petro chem
 
2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport2012A8PS309P_AbhishekKumar_FinalReport
2012A8PS309P_AbhishekKumar_FinalReport
 
Electranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdfElectranix_Advanced_Simulation_Lab_July_2021.pdf
Electranix_Advanced_Simulation_Lab_July_2021.pdf
 
introduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfintroduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdf
 
Ig3514391443
Ig3514391443Ig3514391443
Ig3514391443
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault Mapping
 
Report on Enviorment Panel Monitoring
Report on Enviorment Panel MonitoringReport on Enviorment Panel Monitoring
Report on Enviorment Panel Monitoring
 
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...
Implementation of T-Junction Traffic Light Control System Using Simatic S7-20...
 
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA   New Questions 29Tuts.Com New CCNA 200-120 New CCNA   New Questions 2
9Tuts.Com New CCNA 200-120 New CCNA New Questions 2
 

More from MEN Micro

5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)MEN Micro
 
5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical EnvironmentsMEN Micro
 
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...MEN Micro
 
5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded Computing5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded ComputingMEN Micro
 
5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)MEN Micro
 
Rugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsRugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsMEN Micro
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...MEN Micro
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in AerospaceMEN Micro
 
10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCSMEN Micro
 
Modular Train Control System menTCS
Modular Train Control System menTCSModular Train Control System menTCS
Modular Train Control System menTCSMEN Micro
 
A25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon DA25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon DMEN Micro
 
5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT EnvironmentsMEN Micro
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded SystemsMEN Micro
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI SerialMEN Micro
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch FamilyMEN Micro
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationMEN Micro
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26LMEN Micro
 
5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe Computer5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe ComputerMEN Micro
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCSMEN Micro
 
5 Things to Know about the F75P
5 Things to Know about the F75P5 Things to Know about the F75P
5 Things to Know about the F75PMEN Micro
 

More from MEN Micro (20)

5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)
 
5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments
 
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
 
5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded Computing5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded Computing
 
5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)
 
Rugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsRugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-Applications
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace
 
10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS
 
Modular Train Control System menTCS
Modular Train Control System menTCSModular Train Control System menTCS
Modular Train Control System menTCS
 
A25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon DA25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon D
 
5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments
 
5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems5 Things to Know about Safety and Security of Embedded Systems
5 Things to Know about Safety and Security of Embedded Systems
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
 
5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe Computer5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe Computer
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
 
5 Things to Know about the F75P
5 Things to Know about the F75P5 Things to Know about the F75P
5 Things to Know about the F75P
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

5 Techniques to Achieve Functional Safety for Embedded Systems

  • 1. Textmasterformat bearbeiten ▪ Second Level ▪ Third Level ▪ Fourth Level Fifth Level August 24, 2017 5 Techniques to Achieve Functional Safety for Embedded Systems
  • 2. 2 The Need for Safe Computing Failures of safety-critical electronic systems can result in loss of life, substantial financial damage or severe harm to the environment. Safe computer systems are typically used in avionics or railway applications requiring particularly high reliability. This also goes for the medical market, while industrial automation environments demand more and more functional safety as technology becomes readily available. One of the key design elements of a safety-critical system is redundancy. Other techniques are diversity in components, determinism and predictable behavior, clustering to increase availability and supervisor and event logging features. Considerations about mission-critical computer architectures are complex and include safety-critical characteristics, reliability questions, error behavior modes, Safety Integrity Levels (up to SIL 3 or SIL 4) and the major IEC and EN standards, e.g., EN 50128 / EN 50129 for railways or DO-254 for avionics (up to DAL-A).
  • 3. 3 Proven Techniques in Functional Safety 1. Redundancy 2. Diversity 3. Determinism 4. Clustering 5. Supervisors, Event Logging
  • 4. 4 Redundancy Redundancy. Multiplying critical components, such as the CPU, increases the function's reliability. The most important strategy to make a system less vulnerable to risk is to multiply significant components. A component that by failing brings the entire system to a halt is called a "Single Point of Failure" (SPOF). If critical components, such as the CPU, are redundant, the availability and/or reliability of the functions increase. Depending on what you want to achieve, you can use different redundancy configurations. To do this, you name the number of functions that must be in working order in case of a failure (M) compared to the total number of redundant functions (N). This results in “M out of N”, abbreviated as MooN.
  • 5. 5 Redundancy - MooN Constellations With safe redundant functions, all components must also deliver the same computing results, to allow for the detection of errors, in the simplest case in a 2oo2 system. This reduces availability (fail-safe) Inputs Controller Outputs M Inputs Controller Outputs Inputs Controller Outputs M Inputs Controller Outputs Inputs Controller Outputs Inputs Controller Outputs Inputs Controller Outputs 2oo3 Voter M A 1oo2 constellation increases availability of the system and, by consequence, the Mean Time Between Failures (MTBF). If one of two processors fails, a 1oo2 system can still go on operating (fail-operational). The 2oo3 set-up is used frequently, because it increases both safety and availability. With such a level of complexity, a voting mechanism, or voter, is an inherent part of the system. It permanently compares and analyzes computing results.
  • 6. 6 Diversity Diversity. If redundant components are identical, a common cause can make them fail. This is why a system must support dissimilarities both in hardware and in software. For instance, you can run different, independently designed software applications on the subsystems. On the hardware side you could use different I/O interfaces. Identical functions are implemented in varying ways. In the end the two dissimilar set-ups must lead to the same result, so that the system can act in a defined way. Diversity is even possible on one single board: memory management of the processors allows to partition the resources, which is in turn supported by real-time operating systems like PikeOS. Safe Application Safe Application Linux Windows Linux Drivers Windows Drivers x86 Architecture RISC Architecture
  • 7. 7 Clustering Clustering. This does not increase a subsystem's safety, but it raises availability. Backing up a system is using redundancy on a higher level with the aim of keeping your system up even in case of a failure. It is possible to combine two assemblies to form a highly available computer cluster. In a set-up like this, every channel – being redundant itself – works independently, but only one channel is active. If the active channel fails, the system automatically switches to the second channel. The boards can be connected using dedicated serial interfaces: Sensors 1 2 3 Cluster Active Computer Stand-By Computer Stand-By Output Active Output Actor UARTs (DEX) make for communication between the two channels. A direct connection between the Board Management Controllers (BMCX) controls the switch-over from the active to the inactive channel.
  • 8. 8 Determinism Determinism. The need for predictable behavior forbids a number of mechanisms, like interrupts, common in non-critical applications. Design engineers need particular expertise in this respect. Next to failure safety, mission-critical environments also demand calculable execution times. The system must react to an external event within a defined time, even under worst case conditions. Engineers need to consider possible behavior and its consequences in detail at an early stage, in preparation for their actual design. In terms of hardware and firmware, BITE components are used here – Built-In Test Equipment. Errors handling techniques such as ECC (Error Correcting Code) or the monitoring of internal voltages play an important role, here, too. When it comes to software, system integrators in need of deterministic behavior select a real-time system like VxWorks or PikeOS.
  • 9. 9 Supervisors, Event Logging Supervisors. Board management and supervision in safe computers need to go beyond the usual CPU functions. A reliable CPU should have a dedicated monitor at its side rather than supervise itself. Event Logging. While this is not a necessary safety function, it can help track back faults in critical systems in case of an incident. Chances are higher to avoid the error cause in the future by taking precautions.