SlideShare a Scribd company logo
1



Error Detection Enhanced
Decoding of Difference Set
Codes for Memory Applications

     SHERIN DEENA SAM
2




What a difference a bit makes!!!
• NASA engineers believe they have traced the cause
 of Voyager 2's glitch (in 2010) to single flip of bit in
 the spacecraft’s memory.


• "A value in a single memory location was changed
 from a 0 to a 1," said JPL’s Veronia McGregor.
3




Contents
• Error Correcting Code Memory
• OSMLD Difference Set Codes
    (21,11) DS code

• Conventional Decoder for (21,11) DS code
    Avoiding silent data corruption

• Error Detection Majority Logic Decoding
4




Error Correcting Code Memory
5



ECC memory
• Error correcting code memory is a type of computer data
  storage that can detect and correct common kinds of internal
  data corruption.
• It is used in computers where data corruption cannot be
  tolerated under any circumstances, such as for scientific or
  financial computing, as spacecrafts and as servers.

• Electrical or magnetic interference can cause a single bit to
  spontaneously flip to the opposite state.
• Majority of soft errors in RAM chips occur as a result of
  ionizing radiation.

• ECC is used in NAND flash, SRAM, DRAM, SDRAM etc.
• ECC schemes used are BCH Error Correction Code, Euclidean
  Geometry ECC, Difference Set ECC.
6




OSMLD Difference Set Codes
DS codes are attractive because
they are One Step Majority Logic
Decodable (OSMLD).
7



 Difference Set
• P={l0,l1,l2,……,lq} is a set with q+1 nonnegative integers such that
  0≤lo<l1<l2<…..<lq ≤q(q+1)
• q(q+1) ordered differences D={lj-li:j≠i}
• P is a perfect simple difference-set of order q iff
  1.   All positive differences in D are distinct.
  2.   All negative differences in D are distinct.
  3.   If lj-li is a negative difference in D, then q(q+1)+1+(lj-li) is not equal to any
       positive difference in D.
• Consider the set P= {0,2,7,8,11} with q=4
• 4.5=20 ordered differences
  D={2,7,8,11,5,6,9,1,4,3, -2,-7,-8,-11,-5,-6,-9,-1,-4,-3}
8




(21,11) DS Cyclic Code
• We define a polynomial


• n=q(q+1)+1=21
• Parity-check polynomial


• k=degree of h(x)=11
• Generator polynomial
9


Code Parameters
• Code length=n=q(q+1)+1=21
• Number of parity check digits=n-k=10
• Number of correctable errors=t=2
• Number of detectable errors=t+s=3
• Number of parity check equations=2t+1=5
• Minimum distance=d=q+2=6=2t+s+1
• So, this is a Double Error Correction Triple Error Detection (DEC-
  TED) Code
10




Dual Code
• (n, n-k) cyclic code.
• Code generated by
• It gives the dual code of the code generated by g(x).
• It is in the null space of the DS code generated by
 g(x).
• We define a polynomial
11



• We define




• Shifting w0(x) cyclically to the right 2 times, 7 times, 8
  times, and 11 times, we obtain




• w0(x),w1(x), w2(x), w3(x), w4(x) are 5 polynomials
  orthogonal on
12




• We can form 5 parity-check sums orthogonal on e20.

•   A1=e9+e12+e13+ e18+e20
•   A2=e1+e11+e14+e15+e20
•   A3=e4+e6+e16+e19+e20
•   A4=e0+e5+e7+e17+e20
•   A5=e2+e3+e8+e10+e20

• e20 is checked by all 5 check sums and no other error
    digit is checked by more than one check sum.
13



One Step Majority Logic Decoding
• If e20 = 1 and if there is one or no error occurring among the
  other 20 digit positions, then at least 4 of the 5 check sums are
  equal to 1.
• If e20= 0 and if there are two or fewer errors occurring among
  the other 20 digit positions, then at least 3 of the 5 check sums
  are equal to 0.
  ▫ If there are two or fewer errors , the one step majority logic
     decoding always results in correct decoding of e20.

• Consider e9= e1= e4= 1. We have
  A1=1, A2=1, A3=1, A4=0,A5=0. Since the majority of the five
  sums is 1, e20 is decoded as 1. This results in an incorrect
  decoding.

• Thus, by one-step majority logic decoding, the code is capable
  of correcting any error pattern with two or fewer errors.
14




Conventional Decoder for
(21,11) DS code
15




Decoder for (21,11) DS code
16




Correction of 2 errors
17




SDC- Silent Data Corruption
• Considering the (21,11) DS code, when a triple
 error occurs, it can cause Silent Data Corruption
 (SDC) because it can trigger a miscorrection
 that then can result in the word being decoded
 into another valid coded word.
18




SDC on decoding word with 3 errors
19




Avoiding SDC
• To avoid SDC, the proposed decoder for the (21,11)
 code is the same but requiring at least four check
 equations to be one to perform a bit correction.


• Requiring at least t+2 ones instead of a majority of
 ones will ensure that there is no miscorrection with
 t+1 errors and at the same time guarantees that t
 errors are corrected.
20




Avoiding SDC with 3 errors
21



Issues
• The decoder requires 21 iterations to decode a word.
 This results in a large latency that in a memory
 application would increase the access time.


• Additionally, the number of iterations would
 increase linearly with the length of the coded word.
22




Error Detection Majority Logic
Decoding (EDMLD)
23




Avoiding decoding latency
• All errors affecting five or less bits are detected in
 the first three iterations.
• This can be used to reduce the decoding latency by
 stopping the process when no error has been
 detected in the first three iterations.
• This technique reduces the decoding latency
 significantly as most words will have no errors.
24




No error detected in 3 cycles
25




Error detected in 3 cycles
26




Detection of uncorrectable errors
• Additionally, it can also be used to detect
 uncorrected errors once the decoding has been
 completed.
• This will be useful to detect errors that affect t+1
 bits and can not be corrected.
27




3 errors corrected
28




3 errors uncorrected
29




Conclusion
• The decoder has been implemented in Verilog HDL.
• The conventional decoder has been modified to avoid
 SDC.
• Error Detection Majority Logic Decoding (EDMLD) has
 been done which provides detection of errors in addition
 to correction.
  ▫ It reduces latency.
  ▫ It detects errors that affect t+1 bits and can not be
    corrected.
30



References
[1]S. Liu, P. Reviriego and J. A. Maestro “Error-Detection Enhanced Decoding
  of Difference Set Codes for Memory Applications ” IEEE Trans. on Device
  and Materials Reliability, Vol. 12, No. 2, 2012, pp 335 – 340.


[2]S. Liu, P. Reviriego and J. A. Maestro “Efficient Majority Logic Fault
  Detection with Difference-Set Codes for Memory Applications” IEEE Trans.
  on Very Large Scale Integration Systems, Vol. 20, No. 1, 2012, pp 148-156.


[3]S. Lin and D. J. Costello, Error Control Coding, 2nd ed. Englewood
  Cliffs, NJ: Prentice-Hall, 2004.
31




THANK YOU

More Related Content

What's hot

Digital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systemsDigital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systems
Imran Waris
 
Number System & Data Representation
Number System & Data RepresentationNumber System & Data Representation
Number System & Data Representation
Phillip Glenn Libay
 
Chapter 01 Basic Principles of Digital Systems
Chapter 01 Basic Principles of Digital SystemsChapter 01 Basic Principles of Digital Systems
Chapter 01 Basic Principles of Digital Systems
SSE_AndyLi
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
NilaNila16
 
Logic Circuits Design - "Chapter 1: Digital Systems and Information"
Logic Circuits Design - "Chapter 1: Digital Systems and Information"Logic Circuits Design - "Chapter 1: Digital Systems and Information"
Logic Circuits Design - "Chapter 1: Digital Systems and Information"
Ra'Fat Al-Msie'deen
 
linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
saigopinadh bodigiri
 
Hamming codes
Hamming codesHamming codes
Hamming codes
GIGI JOSEPH
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
TechiNerd
 
Cmp104 lec 2 number system
Cmp104 lec 2 number systemCmp104 lec 2 number system
Cmp104 lec 2 number system
kapil078
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
bheemsain
 
Oth1
Oth1Oth1
Oth1
b137
 
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
ShivangiSingh241
 
06 floating point
06 floating point06 floating point
06 floating point
Piyush Rochwani
 
Calculating the hamming code
Calculating the hamming codeCalculating the hamming code
Calculating the hamming code
Umesh Gupta
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
bhagavanprasad
 
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
IRJET Journal
 
Digital Electronics and Computer Language
Digital Electronics and Computer Language Digital Electronics and Computer Language
Digital Electronics and Computer Language
Manthan Chavda
 
Number System | Types of Number System | Binary Number System | Octal Number ...
Number System | Types of Number System | Binary Number System | Octal Number ...Number System | Types of Number System | Binary Number System | Octal Number ...
Number System | Types of Number System | Binary Number System | Octal Number ...
Get & Spread Knowledge
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
Faisal Mehmood
 
Bca 2nd sem-u-1.8 digital logic circuits, digital component floting and fixed...
Bca 2nd sem-u-1.8 digital logic circuits, digital component floting and fixed...Bca 2nd sem-u-1.8 digital logic circuits, digital component floting and fixed...
Bca 2nd sem-u-1.8 digital logic circuits, digital component floting and fixed...
Rai University
 

What's hot (20)

Digital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systemsDigital and Logic Design Chapter 1 binary_systems
Digital and Logic Design Chapter 1 binary_systems
 
Number System & Data Representation
Number System & Data RepresentationNumber System & Data Representation
Number System & Data Representation
 
Chapter 01 Basic Principles of Digital Systems
Chapter 01 Basic Principles of Digital SystemsChapter 01 Basic Principles of Digital Systems
Chapter 01 Basic Principles of Digital Systems
 
Linear Block Codes
Linear Block CodesLinear Block Codes
Linear Block Codes
 
Logic Circuits Design - "Chapter 1: Digital Systems and Information"
Logic Circuits Design - "Chapter 1: Digital Systems and Information"Logic Circuits Design - "Chapter 1: Digital Systems and Information"
Logic Circuits Design - "Chapter 1: Digital Systems and Information"
 
linear codes and cyclic codes
linear codes and cyclic codeslinear codes and cyclic codes
linear codes and cyclic codes
 
Hamming codes
Hamming codesHamming codes
Hamming codes
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
 
Cmp104 lec 2 number system
Cmp104 lec 2 number systemCmp104 lec 2 number system
Cmp104 lec 2 number system
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Oth1
Oth1Oth1
Oth1
 
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
DIGITAL COMMUNICATION: ENCODING AND DECODING OF CYCLIC CODE
 
06 floating point
06 floating point06 floating point
06 floating point
 
Calculating the hamming code
Calculating the hamming codeCalculating the hamming code
Calculating the hamming code
 
Ch10 2 v1
Ch10 2 v1Ch10 2 v1
Ch10 2 v1
 
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
Review paper on Reed Solomon (204,188) Decoder for Digital Video Broadcasting...
 
Digital Electronics and Computer Language
Digital Electronics and Computer Language Digital Electronics and Computer Language
Digital Electronics and Computer Language
 
Number System | Types of Number System | Binary Number System | Octal Number ...
Number System | Types of Number System | Binary Number System | Octal Number ...Number System | Types of Number System | Binary Number System | Octal Number ...
Number System | Types of Number System | Binary Number System | Octal Number ...
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Bca 2nd sem-u-1.8 digital logic circuits, digital component floting and fixed...
Bca 2nd sem-u-1.8 digital logic circuits, digital component floting and fixed...Bca 2nd sem-u-1.8 digital logic circuits, digital component floting and fixed...
Bca 2nd sem-u-1.8 digital logic circuits, digital component floting and fixed...
 

Similar to Error detection enhanced decoding of difference set codes for memory applications

3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.ppt
Annymus
 
Memory ECC - The Comprehensive of SEC-DED.
Memory ECC - The Comprehensive of SEC-DED. Memory ECC - The Comprehensive of SEC-DED.
Memory ECC - The Comprehensive of SEC-DED.
Sk Cheah
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
Nitesh Singh
 
New error-detection
New error-detectionNew error-detection
New error-detection
Nitesh Singh
 
error_detection_correction.pptx
error_detection_correction.pptxerror_detection_correction.pptx
error_detection_correction.pptx
ssuser50f4fd1
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
Abdul Razaq
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
alamelumani
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
Nt Arvind
 
ece552_23_main_memory_ecc.ppt
ece552_23_main_memory_ecc.pptece552_23_main_memory_ecc.ppt
ece552_23_main_memory_ecc.ppt
BezaAlem2
 
O41049497
O41049497O41049497
O41049497
IJERA Editor
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
DhanashriNandre
 
Iaetsd efficient majority logic fault detection with
Iaetsd efficient majority logic fault detection withIaetsd efficient majority logic fault detection with
Iaetsd efficient majority logic fault detection with
Iaetsd Iaetsd
 
Final Oral Defense 040109
Final Oral Defense 040109Final Oral Defense 040109
Final Oral Defense 040109
hakimhussien
 
f33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.pptf33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.ppt
MaddulaCharishma
 
Binary and EC codes
Binary and EC codesBinary and EC codes
Binary and EC codes
Mahesh Singh Madai
 
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
IOSR Journals
 
03 ddl
03 ddl03 ddl
03 ddl
douglaslyon
 
DLD-W3-L1.pptx
DLD-W3-L1.pptxDLD-W3-L1.pptx
DLD-W3-L1.pptx
aneesurrehman54
 
Lecture 4 from virtual university of pakistan
Lecture 4 from virtual university of pakistanLecture 4 from virtual university of pakistan
Lecture 4 from virtual university of pakistan
Saba Hanif
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

Similar to Error detection enhanced decoding of difference set codes for memory applications (20)

3F4ecc.ppt
3F4ecc.ppt3F4ecc.ppt
3F4ecc.ppt
 
Memory ECC - The Comprehensive of SEC-DED.
Memory ECC - The Comprehensive of SEC-DED. Memory ECC - The Comprehensive of SEC-DED.
Memory ECC - The Comprehensive of SEC-DED.
 
New error-detection (2)
New error-detection (2)New error-detection (2)
New error-detection (2)
 
New error-detection
New error-detectionNew error-detection
New error-detection
 
error_detection_correction.pptx
error_detection_correction.pptxerror_detection_correction.pptx
error_detection_correction.pptx
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Error Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networksError Detection and correction concepts in Data communication and networks
Error Detection and correction concepts in Data communication and networks
 
ece552_23_main_memory_ecc.ppt
ece552_23_main_memory_ecc.pptece552_23_main_memory_ecc.ppt
ece552_23_main_memory_ecc.ppt
 
O41049497
O41049497O41049497
O41049497
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Iaetsd efficient majority logic fault detection with
Iaetsd efficient majority logic fault detection withIaetsd efficient majority logic fault detection with
Iaetsd efficient majority logic fault detection with
 
Final Oral Defense 040109
Final Oral Defense 040109Final Oral Defense 040109
Final Oral Defense 040109
 
f33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.pptf33-ft-computing-lec09-correct.ppt
f33-ft-computing-lec09-correct.ppt
 
Binary and EC codes
Binary and EC codesBinary and EC codes
Binary and EC codes
 
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
 
03 ddl
03 ddl03 ddl
03 ddl
 
DLD-W3-L1.pptx
DLD-W3-L1.pptxDLD-W3-L1.pptx
DLD-W3-L1.pptx
 
Lecture 4 from virtual university of pakistan
Lecture 4 from virtual university of pakistanLecture 4 from virtual university of pakistan
Lecture 4 from virtual university of pakistan
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Recently uploaded

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 

Recently uploaded (20)

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 

Error detection enhanced decoding of difference set codes for memory applications

  • 1. 1 Error Detection Enhanced Decoding of Difference Set Codes for Memory Applications SHERIN DEENA SAM
  • 2. 2 What a difference a bit makes!!! • NASA engineers believe they have traced the cause of Voyager 2's glitch (in 2010) to single flip of bit in the spacecraft’s memory. • "A value in a single memory location was changed from a 0 to a 1," said JPL’s Veronia McGregor.
  • 3. 3 Contents • Error Correcting Code Memory • OSMLD Difference Set Codes  (21,11) DS code • Conventional Decoder for (21,11) DS code  Avoiding silent data corruption • Error Detection Majority Logic Decoding
  • 5. 5 ECC memory • Error correcting code memory is a type of computer data storage that can detect and correct common kinds of internal data corruption. • It is used in computers where data corruption cannot be tolerated under any circumstances, such as for scientific or financial computing, as spacecrafts and as servers. • Electrical or magnetic interference can cause a single bit to spontaneously flip to the opposite state. • Majority of soft errors in RAM chips occur as a result of ionizing radiation. • ECC is used in NAND flash, SRAM, DRAM, SDRAM etc. • ECC schemes used are BCH Error Correction Code, Euclidean Geometry ECC, Difference Set ECC.
  • 6. 6 OSMLD Difference Set Codes DS codes are attractive because they are One Step Majority Logic Decodable (OSMLD).
  • 7. 7 Difference Set • P={l0,l1,l2,……,lq} is a set with q+1 nonnegative integers such that 0≤lo<l1<l2<…..<lq ≤q(q+1) • q(q+1) ordered differences D={lj-li:j≠i} • P is a perfect simple difference-set of order q iff 1. All positive differences in D are distinct. 2. All negative differences in D are distinct. 3. If lj-li is a negative difference in D, then q(q+1)+1+(lj-li) is not equal to any positive difference in D. • Consider the set P= {0,2,7,8,11} with q=4 • 4.5=20 ordered differences D={2,7,8,11,5,6,9,1,4,3, -2,-7,-8,-11,-5,-6,-9,-1,-4,-3}
  • 8. 8 (21,11) DS Cyclic Code • We define a polynomial • n=q(q+1)+1=21 • Parity-check polynomial • k=degree of h(x)=11 • Generator polynomial
  • 9. 9 Code Parameters • Code length=n=q(q+1)+1=21 • Number of parity check digits=n-k=10 • Number of correctable errors=t=2 • Number of detectable errors=t+s=3 • Number of parity check equations=2t+1=5 • Minimum distance=d=q+2=6=2t+s+1 • So, this is a Double Error Correction Triple Error Detection (DEC- TED) Code
  • 10. 10 Dual Code • (n, n-k) cyclic code. • Code generated by • It gives the dual code of the code generated by g(x). • It is in the null space of the DS code generated by g(x). • We define a polynomial
  • 11. 11 • We define • Shifting w0(x) cyclically to the right 2 times, 7 times, 8 times, and 11 times, we obtain • w0(x),w1(x), w2(x), w3(x), w4(x) are 5 polynomials orthogonal on
  • 12. 12 • We can form 5 parity-check sums orthogonal on e20. • A1=e9+e12+e13+ e18+e20 • A2=e1+e11+e14+e15+e20 • A3=e4+e6+e16+e19+e20 • A4=e0+e5+e7+e17+e20 • A5=e2+e3+e8+e10+e20 • e20 is checked by all 5 check sums and no other error digit is checked by more than one check sum.
  • 13. 13 One Step Majority Logic Decoding • If e20 = 1 and if there is one or no error occurring among the other 20 digit positions, then at least 4 of the 5 check sums are equal to 1. • If e20= 0 and if there are two or fewer errors occurring among the other 20 digit positions, then at least 3 of the 5 check sums are equal to 0. ▫ If there are two or fewer errors , the one step majority logic decoding always results in correct decoding of e20. • Consider e9= e1= e4= 1. We have A1=1, A2=1, A3=1, A4=0,A5=0. Since the majority of the five sums is 1, e20 is decoded as 1. This results in an incorrect decoding. • Thus, by one-step majority logic decoding, the code is capable of correcting any error pattern with two or fewer errors.
  • 17. 17 SDC- Silent Data Corruption • Considering the (21,11) DS code, when a triple error occurs, it can cause Silent Data Corruption (SDC) because it can trigger a miscorrection that then can result in the word being decoded into another valid coded word.
  • 18. 18 SDC on decoding word with 3 errors
  • 19. 19 Avoiding SDC • To avoid SDC, the proposed decoder for the (21,11) code is the same but requiring at least four check equations to be one to perform a bit correction. • Requiring at least t+2 ones instead of a majority of ones will ensure that there is no miscorrection with t+1 errors and at the same time guarantees that t errors are corrected.
  • 21. 21 Issues • The decoder requires 21 iterations to decode a word. This results in a large latency that in a memory application would increase the access time. • Additionally, the number of iterations would increase linearly with the length of the coded word.
  • 22. 22 Error Detection Majority Logic Decoding (EDMLD)
  • 23. 23 Avoiding decoding latency • All errors affecting five or less bits are detected in the first three iterations. • This can be used to reduce the decoding latency by stopping the process when no error has been detected in the first three iterations. • This technique reduces the decoding latency significantly as most words will have no errors.
  • 24. 24 No error detected in 3 cycles
  • 26. 26 Detection of uncorrectable errors • Additionally, it can also be used to detect uncorrected errors once the decoding has been completed. • This will be useful to detect errors that affect t+1 bits and can not be corrected.
  • 29. 29 Conclusion • The decoder has been implemented in Verilog HDL. • The conventional decoder has been modified to avoid SDC. • Error Detection Majority Logic Decoding (EDMLD) has been done which provides detection of errors in addition to correction. ▫ It reduces latency. ▫ It detects errors that affect t+1 bits and can not be corrected.
  • 30. 30 References [1]S. Liu, P. Reviriego and J. A. Maestro “Error-Detection Enhanced Decoding of Difference Set Codes for Memory Applications ” IEEE Trans. on Device and Materials Reliability, Vol. 12, No. 2, 2012, pp 335 – 340. [2]S. Liu, P. Reviriego and J. A. Maestro “Efficient Majority Logic Fault Detection with Difference-Set Codes for Memory Applications” IEEE Trans. on Very Large Scale Integration Systems, Vol. 20, No. 1, 2012, pp 148-156. [3]S. Lin and D. J. Costello, Error Control Coding, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 2004.