Details

Fault-Tolerance Techniques for Spacecraft Control Computers


Fault-Tolerance Techniques for Spacecraft Control Computers


1. Aufl.

von: Mengfei Yang, Gengxin Hua, Yanjun Feng, Jian Gong

128,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 23.01.2017
ISBN/EAN: 9781119107408
Sprache: englisch
Anzahl Seiten: 344

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<i><b>Comprehensive coverage of all aspects of space application oriented fault tolerance techniques </b></i><br /><br />• Experienced expert author working on fault tolerance for Chinese space program for almost three decades<br />• Initiatively provides a systematic texts for the cutting-edge fault tolerance techniques in spacecraft control computer, with emphasis on practical engineering knowledge<br />• Presents fundamental and advanced theories and technologies in a logical and easy-to-understand manner<br />• Beneficial to readers inside and outside the area of space applications
<p>Brief Introduction xiii</p> <p>Preface xv</p> <p><b>1 Introduction 1</b></p> <p>1.1 Fundamental Concepts and Principles of Fault?-tolerance Techniques 1</p> <p>1.1.1 Fundamental Concepts 1</p> <p>1.1.2 Reliability Principles 4</p> <p>1.1.2.1 Reliability Metrics 4</p> <p>1.1.2.2 Reliability Model 6</p> <p>1.2 The Space Environment and Its Hazards for the Spacecraft Control Computer 9</p> <p>1.2.1 Introduction to Space Environment 9</p> <p>1.2.1.1 Solar Radiation 9</p> <p>1.2.1.2 Galactic Cosmic Rays (GCRs) 10</p> <p>1.2.1.3 Van Allen Radiation Belt 10</p> <p>1.2.1.4 Secondary Radiation 12</p> <p>1.2.1.5 Space Surface Charging and Internal Charging 12</p> <p>1.2.1.6 Summary of Radiation Environment 13</p> <p>1.2.1.7 Other Space Environments 14</p> <p>1.2.2 Analysis of Damage Caused by the Space Environment 14</p> <p>1.2.2.1 Total Ionization Dose (TID) 14</p> <p>1.2.2.2 Single Event Effect (SEE) 15</p> <p>1.2.2.3 Internal/surface Charging Damage Effect 20</p> <p>1.2.2.4 Displacement Damage Effect 20</p> <p>1.2.2.5 Other Damage Effect 20</p> <p>1.3 Development Status and Prospects of Fault Tolerance Techniques 21</p> <p>References 25</p> <p><b>2 Fault?-Tolerance Architectures and Key Techniques 29</b></p> <p>2.1 Fault?- tolerance Architecture 29</p> <p>2.1.1 Module?-level Redundancy Structures 30</p> <p>2.1.2 Backup Fault?-tolerance Structures 32</p> <p>2.1.2.1 Cold?-backup Fault?-tolerance Structures 32</p> <p>2.1.2.2 Hot?-backup Fault?-tolerance Structures 34</p> <p>2.1.3 Triple?-modular Redundancy (TMR) Fault?-tolerance Structures 36</p> <p>2.1.4 Other Fault?-tolerance Structures 40</p> <p>2.2 Synchronization Techniques 40</p> <p>2.2.1 Clock Synchronization System 40</p> <p>2.2.1.1 Basic Concepts and Fault Modes of the Clock Synchronization System 40</p> <p>2.2.1.2 Clock Synchronization Algorithm 41</p> <p>2.2.2 System Synchronization Method 52</p> <p>2.2.2.1 The Real?-time Multi?-computer System Synchronization Method 52</p> <p>2.2.2.2 System Synchronization Method with Interruption 56</p> <p>2.3 Fault?-tolerance Design with Hardware Redundancy 60</p> <p>2.3.1 Universal Logic Model and Flow in Redundancy Design 60</p> <p>2.3.2 Scheme Argumentation of Redundancy 61</p> <p>2.3.2.1 Determination of Redundancy Scheme 61</p> <p>2.3.2.2 Rules Obeyed in the Scheme Argumentation of Redundancy 62</p> <p>2.3.3 Redundancy Design and Implementation 63</p> <p>2.3.3.1 Basic Requirements 63</p> <p>2.3.3.2 FDMU Design 63</p> <p>2.3.3.3 CSSU Design 64</p> <p>2.3.3.4 IPU Design 65</p> <p>2.3.3.5 Power Supply Isolation Protection 67</p> <p>2.3.3.6 Testability Design 68</p> <p>2.3.3.7 Others 68</p> <p>2.3.4 Validation of Redundancy by Analysis 69</p> <p>2.3.4.1 Hardware FMEA 69</p> <p>2.3.4.2 Redundancy Switching Analysis (RSA) 69</p> <p>2.3.4.3 Analysis of the Common Cause of Failure 69</p> <p>2.3.4.4 Reliability Analysis and Checking of the Redundancy Power 70</p> <p>2.3.4.5 Analysis of the Sneak Circuit in the Redundancy Management Circuit 72</p> <p>2.3.5 Validation of Redundancy by Testing 73</p> <p>2.3.5.1 Testing by Failure Injection 73</p> <p>2.3.5.2 Specific Test for the Power of the Redundancy Circuit 74</p> <p>2.3.5.3 Other Things to Note 74</p> <p>References 74</p> <p><b>3 Fault Detection Techniques 77</b></p> <p>3.1 Fault Model 77</p> <p>3.1.1 Fault Model Classified by Time 78</p> <p>3.1.2 Fault Model Classified by Space 78</p> <p>3.2 Fault Detection Techniques 80</p> <p>3.2.1 Introduction 80</p> <p>3.2.2 Fault Detection Methods for CPUs 81</p> <p>3.2.2.1 Fault Detection Methods Used for CPUs 82</p> <p>3.2.2.2 Example of CPU Fault Detection 83</p> <p>3.2.3 Fault Detection Methods for Memory 87</p> <p>3.2.3.1 Fault Detection Method for ROM 88</p> <p>3.2.3.2 Fault Detection Methods for RAM 91</p> <p>3.2.4 Fault Detection Methods for I/Os 95</p> <p>References 96</p> <p><b>4 Bus Techniques 99</b></p> <p>4.1 Introduction to Space?-borne Bus 99</p> <p>4.1.1 Fundamental Concepts 99</p> <p>4.1.2 Fundamental Terminologies 99</p> <p>4.2 The MIL?-STD?-1553B Bus 100</p> <p>4.2.1 Fault Model of the Bus System 101</p> <p>4.2.1.1 Bus?-level Faults 103</p> <p>4.2.1.2 Terminal Level Faults 104</p> <p>4.2.2 Redundancy Fault?-tolerance Mechanism of the Bus System 106</p> <p>4.2.2.1 The Bus?-level Fault?-tolerance Mechanism 107</p> <p>4.2.2.2 The Bus Controller Fault?-tolerance Mechanism 108</p> <p>4.2.2.3 Fault?-tolerance Mechanism of Remote Terminals 113</p> <p>4.3 The CAN Bus 116</p> <p>4.3.1 The Bus Protocol 117</p> <p>4.3.2 Physical Layer Protocol and Fault?-tolerance 117</p> <p>4.3.2.1 Node Structure 117</p> <p>4.3.2.2 Bus Voltage 118</p> <p>4.3.2.3 Transceiver and Controller 119</p> <p>4.3.2.4 Physical Fault?-tolerant Features 119</p> <p>4.3.3 Data Link Layer Protocol and Fault?-tolerance 120</p> <p>4.3.3.1 Communication Process 120</p> <p>4.3.3.2 Message Sending 120</p> <p>4.3.3.3 The President Mechanism of Bus Access 120</p> <p>4.3.3.4 Coding 121</p> <p>4.3.3.5 Data Frame 121</p> <p>4.3.3.6 Error Detection 122</p> <p>4.4 The SpaceWire Bus 124</p> <p>4.4.1 Physical Layer Protocol and Fault?-tolerance 126</p> <p>4.4.1.1 Connector 126</p> <p>4.4.1.2 Cable 126</p> <p>4.4.1.3 Low Voltage Differential Signal 126</p> <p>4.4.1.4 Data Filter (DS) Coding 128</p> <p>4.4.2 Data Link Layer Protocol and Fault?-tolerance 129</p> <p>4.4.2.1 Packet Character 129</p> <p>4.4.2.2 Packet Parity Check Strategy 131</p> <p>4.4.2.3 Packet Structure 131</p> <p>4.4.2.4 Communication Link Control 131</p> <p>4.4.3 Networking and Routing 136</p> <p>4.4.3.1 Major Technique used by the SpaceWire Network 136</p> <p>4.4.3.2 SpaceWire Router 138</p> <p>4.4.4 Fault?-tolerance Mechanism 139</p> <p>4.5 Other Buses 141</p> <p>4.5.1 The IEEE 1394 Bus 141</p> <p>4.5.2 Ethernet 143</p> <p>4.5.3 The I2C Bus 145</p> <p>References 148</p> <p><b>5 Software Fault?-Tolerance Techniques 151</b></p> <p>5.1 Software Fault?-tolerance Concepts and Principles 151</p> <p>5.1.1 Software Faults 151</p> <p>5.1.2 Software Fault?-tolerance 152</p> <p>5.1.3 Software Fault Detection and Voting 153</p> <p>5.1.4 Software Fault Isolation 154</p> <p>5.1.5 Software Fault Recovery 155</p> <p>5.1.6 Classification of Software Fault?-tolerance Techniques 156</p> <p>5.2 Single?-version Software Fault?-tolerance Techniques 156</p> <p>5.2.1 Checkpoint and Restart 157</p> <p>5.2.2 Software?-implemented Hardware Fault?-tolerance 160</p> <p>5.2.2.1 Control Flow Checking by Software Signatures (CFCSS) 161</p> <p>5.2.2.2 Error Detection by Duplicated Instructions (EDDI) 164</p> <p>5.2.3 Software Crash Trap 165</p> <p>5.3 Multiple?-version Software Fault?-tolerance Techniques 165</p> <p>5.3.1 Recovery Blocks (RcB) 165</p> <p>5.3.2 N?-version Programming (NVP) 167</p> <p>5.3.3 Distributed Recovery Blocks (DRB) 168</p> <p>5.3.4 N Self?-checking Programming (NSCP) 169</p> <p>5.3.5 Consensus Recovery Block (CRB) 172</p> <p>5.3.6 Acceptance Voting (AV) 172</p> <p>5.3.7 Advantage and Disadvantage of Multiple?-version Software 172</p> <p>5.4 Data Diversity Based Software Fault?-tolerance Techniques 173</p> <p>5.4.1 Data Re?-expression Algorithm (DRA) 173</p> <p>5.4.2 Retry Blocks (RtB) 174</p> <p>5.4.3 N?-copy Programming (NCP) 174</p> <p>5.4.4 Two?-pass Adjudicators (TPA) 175</p> <p>References 177</p> <p><b>6 Fault?-Tolerance Techniques for FPGA 179</b></p> <p>6.1 Effect of the Space Environment on FPGAs 180</p> <p>6.1.1 Single Event Transient Effect (SET) 181</p> <p>6.1.2 Single Event Upset (SEU) 181</p> <p>6.1.3 Single Event Latch?-up (SEL) 182</p> <p>6.1.4 Single Event Burnout (SEB) 182</p> <p>6.1.5 Single Event Gate Rupture (SEGR) 182</p> <p>6.1.6 Single Event Functional Interrupt (SEFI) 183</p> <p>6.2 Fault Modes of SRAM?-based FPGAs 183</p> <p>6.2.1 Structure of a SRAM?-based FPGA 183</p> <p>6.2.2 Faults Classification and Fault Modes Analysis of SRAM?-based FPGAs 186</p> <p>6.2.2.1 Faults Classification 186</p> <p>6.2.2.2 Fault Modes Analysis 186</p> <p>6.3 Fault?-tolerance Techniques for SRAM?-based FPGAs 190</p> <p>6.3.1 SRAM?-based FPGA Mitigation Techniques 191</p> <p>6.3.1.1 The Triple Modular Redundancy (TMR) Design Technique 191</p> <p>6.3.1.2 The Inside RAM Protection Technique 193</p> <p>6.3.1.3 The Inside Register Protection Technique 194</p> <p>6.3.1.4 EDAC Encoding and Decoding Technique 195</p> <p>6.3.1.5 Fault Detection Technique Based on DMR and Fault Isolation Technique Based on Tristate Gate 198</p> <p>6.3.2 SRAM?-based FPGA Reconfiguration Techniques 199</p> <p>6.3.2.1 Single Fault Detection and Recovery Technique Based on ICAP+FrameECC 199</p> <p>6.3.2.2 Multi?-fault Detection and Recovery Technique Based on ICAP Configuration Read?-back+RS Coding 205</p> <p>6.3.2.3 Dynamic Reconfiguration Technique Based on EAPR 210</p> <p>6.3.2.4 Fault Recovery Technique Based on Hardware Checkpoint 216</p> <p>6.3.2.5 Summary of Reconfiguration Fault?-tolerance Techniques 217</p> <p>6.4 Typical Fault?-tolerance Design of SRAM?-based FPGA 219</p> <p>6.5 Fault?-tolerance Techniques of Anti?-fuse Based FPGA 227</p> <p>References 230</p> <p><b>7 Fault?-Injection Techniques 233</b></p> <p>7.1 Basic Concepts 233</p> <p>7.1.1 Experimenter 234</p> <p>7.1.2 Establishing the Fault Model 234</p> <p>7.1.3 Conducting Fault?-injection 235</p> <p>7.1.4 Target System for Fault?-injection 235</p> <p>7.1.5 Observing the System’s Behavior 235</p> <p>7.1.6 Analyzing Experimental Findings 235</p> <p>7.2 Classification of Fault?-injection Techniques 236</p> <p>7.2.1 Simulated Fault?-injection 236</p> <p>7.2.1.1 Transistor Switch Level Simulated Fault?-injection 237</p> <p>7.2.1.2 Logic Level Simulated Fault?-injection 237</p> <p>7.2.1.3 Functional Level Simulated Fault?-injection 237</p> <p>7.2.2 Hardware Fault?-injection 238</p> <p>7.2.3 Software Fault?-injection 240</p> <p>7.2.3.1 Injection During Compiling 240</p> <p>7.2.3.2 Injection During Operation 241</p> <p>7.2.4 Physical Fault?-injection 242</p> <p>7.2.5 Mixed Fault?-injection 244</p> <p>7.3 Fault?-injection System Evaluation and Application 245</p> <p>7.3.1 Injection Controllability 245</p> <p>7.3.2 Injection Observability 246</p> <p>7.3.3 Injection Validity 246</p> <p>7.3.4 Fault?-injection Application 247</p> <p>7.3.4.1 Verifying the Fault Detection Mechanism 247</p> <p>7.3.4.2 Fault Effect Domain Analysis 247</p> <p>7.3.4.3 Fault Restoration 247</p> <p>7.3.4.4 Coverage Estimation 247</p> <p>7.3.4.5 Delay Time 247</p> <p>7.3.4.6 Generating Fault Dictionary 248</p> <p>7.3.4.7 Software Testing 248</p> <p>7.4 Fault?-injection Platform and Tools 248</p> <p>7.4.1 Fault?-injection Platform in Electronic Design Automation (EDA) Environment 249</p> <p>7.4.2 Computer Bus?-based Fault?-injection Platform 252</p> <p>7.4.3 Serial Accelerator Based Fault?-injection Case 254</p> <p>7.4.4 Future Development of Fault?-injection Technology 256</p> <p>References 258</p> <p><b>8 Intelligent Fault?-Tolerance Techniques 261</b></p> <p>8.1 Evolvable Hardware Fault?-tolerance 261</p> <p>8.1.1 Fundamental Concepts and Principles 261</p> <p>8.1.2 Evolutionary Algorithm 266</p> <p>8.1.2.1 Encoding Methods 270</p> <p>8.1.2.2 Fitness Function Designing 272</p> <p>8.1.2.3 Genetic Operators 273</p> <p>8.1.2.4 Convergence of Genetic Algorithm 277</p> <p>8.1.3 Programmable Devices 277</p> <p>8.1.3.1 ROM 278</p> <p>8.1.3.2 PAL and GAL 279</p> <p>8.1.3.3 FPGA 281</p> <p>8.1.3.4 VRC 282</p> <p>8.1.4 Evolvable Hardware Fault?-tolerance Implementation Methods 285</p> <p>8.1.4.1 Modeling and Organization of Hardware Evolutionary Systems 286</p> <p>8.1.4.2 Reconfiguration and Its Classification 289</p> <p>8.1.4.3 Evolutionary Fault?-tolerance Architectures and Methods 291</p> <p>8.1.4.4 Evolutionary Fault?-tolerance Methods at Various Layers of the Hardware 293</p> <p>8.1.4.5 Method Example 298</p> <p>8.2 Artificial Immune Hardware Fault?-tolerance 302</p> <p>8.2.1 Fundamental Concepts and Principles 302</p> <p>8.2.1.1 Biological Immune System and Its Mechanism 304</p> <p>8.2.1.2 Adaptive Immunity 305</p> <p>8.2.1.3 Artificial Immune Systems 307</p> <p>8.2.1.4 Fault?-tolerance Principle of Immune Systems 310</p> <p>8.2.2 Fault?-tolerance Methods with Artificial Immune System 314</p> <p>8.2.2.1 Artificial Immune Fault?-tolerance System Architecture 316</p> <p>8.2.2.2 Immune Object 318</p> <p>8.2.2.3 Immune Control System 321</p> <p>8.2.2.4 Working Process of Artificial Immune Fault?-tolerance System 325</p> <p>8.2.3 Implementation of Artificial Immune Fault?-tolerance 328</p> <p>8.2.3.1 Hardware 328</p> <p>8.2.3.2 Software 330</p> <p>References 334</p> <p>Acronyms 337</p> <p>Index 343</p>
<p><b>Dr. Yang Mengfei</b>, Professor, Chief Engineer and Chief Commander of China Academy of Space Technology, Beijing, China. Professor Yang Mengfei received his Master's degree in computer application from Beijing Institute of Control Engineering, China Academy of Space Technology in 1985. He then devoted himself to the research of fault tolerance computing, control of computer technology for space applications, and high-dependable software. In 2005, he received Ph.D. degree from Tsinghua University. Professor Yang has received numerous awards for his outstanding work and contribution to this sector.</p> <p><b>Dr. Hua Gengxin</b>, Professor, Chief Engineer, Beijing Institute of Control Engineering, Beijing, China.</p> <p><b>Dr. Feng Yanjun</b>, Senior Engineer, Director, China Academy of Space Technology, Beijing, China.</p> <p><b>Dr. Gong Jian</b>, Senior Engineer, Engineer in Charge, Beijing Institute of Control Engineering, Beijing, China.</p>

Diese Produkte könnten Sie auch interessieren:

Strategies to the Prediction, Mitigation and Management of Product Obsolescence
Strategies to the Prediction, Mitigation and Management of Product Obsolescence
von: Bjoern Bartels, Ulrich Ermel, Peter Sandborn, Michael G. Pecht
PDF ebook
116,99 €