簡易檢索 / 詳目顯示

研究生: 林明權
Ming-chuan Lin
論文名稱: 基於Reed Solomon code的VLIW處理器控制訊號之錯誤修復與偵測
Self-Recovery Control Flow Check Technology for VLIW Processor Based on Reed Solomon Code
指導教授: 洪西進
Shi-Jinn Horng
口試委員: 陳秋華
Chyou-hwa Chen
高宗萬
Tzong-Wann Kao
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2009
畢業學年度: 97
語文別: 中文
論文頁數: 61
中文關鍵詞: 容錯系統Reed Solomon codeVLIW錯誤偵測錯誤修復
外文關鍵詞: fault tolerance, Reed Solomon code, VLIW, error detection, error recovery
相關次數: 點閱:431下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於奈米製程的進步,VLSI也進入奈米製程,進入奈米製程之後,chip中線與線的距離相當的短,在一些異常的環境下,chip的線路會產生短暫的錯誤,在這種情形下我們要將錯誤偵測出來,在這篇論文中,我們使用Reed Solomon code來幫助我們進行錯誤的偵測,Reed Solomon code是一個強大的錯誤偵測工具,在偵測階段,Reed Solomon code會產生16-bits的Parity Symbol,這些16-bits的Parity Symbol會被嵌入到記憶體來降低記憶體的overhead,Reed Solomon code的偵測計算也相當地簡單,處理器不需等待錯誤偵測完畢才進行執行的動作,Reed Solomon code不僅是一個強大的錯誤偵測工具,也有很強大的錯誤修復能力,在VLIW的容錯領域中,尚未被提出擁有錯誤修復的容錯系統,在這篇論文中,我們也會利用Reed Solomon code來幫助錯誤修復,Reed Solomon code的錯誤修復是以symbol計量,在此篇論文中我們分別實作one-symbol recovery 和two-symbol recovery來比較他們的錯誤修復能力。


    In this paper, we base on data computing blocks (DCBs) and Reed Solomon code watchdog technology to implement VLIW watchdog processor. There are 16-bits parity symbol will be computed by Reed Solomon code watchdog scheme. These generated signatures are embedded into the instruction memory and then used to do the run time error checking. In this paper, the processor degradation can be improved by doing the whole block error checking after the branch instruction, the fault detection latency is improved by doing the intermediate error checking at the R-type instruction, and the memory overhead is reduced by storing the parity symbol to the R-type instruction. The experimental results show that the proposed watchdog has very high error detection coverage and shortest error detection latency to detect either single fault or multi-faults, no matter what the fault is transient or intermittent. In VLIW fault tolerance, error recovery has not been proposed. Reed Solomon code has good recovery ability. In this paper, we also implement recovery ability in the watchdog. The symbol which Reed Solomon code defines is a measure of recovery. We implement one-symbol recovery and two-symbol recovery and compare the recovery ability. The experiment result shows that two-symbol recovery is better than one-symbol recovery.

    第一章 緒論 第二章 Reed Solomon code 2.1 Reed Solomon code編碼器 2.2 Reed Solomon code解碼器 第三章 VLIW指令格式 3.1 VLIW指令格式 3.2編碼指令格式 3.3 特徵值結構 第四章 Reed Solomon code Watchdog架構 4.1 Reed Solomon code Watchdog Scheme 4.2 錯誤偵測架構圖 4.3 one-symbol錯誤修復架構 4.4 two-symbols錯誤修復架構 第五章 實驗結果 5.1 錯誤模組與錯誤注入模擬 5.2 實驗結果 第六章 結論 第七章 參考資料

    [1] Aleksandras Šaramentovas, Paulius Ruzgys, Analyzing and Implementing a Reed-Solomon Decoder for Forward Error Correction in ADSL, Aalborg University Institute of Electronic Systems Applied Signal Processing and Implementation, 10th Semester
    [2] Amir Rajabzadeh, M.M., Ghassem Miremad, Error Detection Enhancement in COTS Superscalar Processors with Event Monitoring Features. Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004.
    [3] B. Nicolescu, Y.S., R. Velazco, Software Detection Mechanisms Providing Full Coverage Against Single Bit-Flip Faults. IEEE TRANSACTIONS ON NUCLEAR SCIENCE, 2004. VOL. 51, NO. 6.
    [4] Chen, Y.Y. and K.L. Leu, Signature-monitoring technique based on instruction-bit grouping. Computers and Digital Techniques, IEE Proceedings -, 2005. vol. 152(no. 4): p. 527-536.
    [5] C.K.P. Clarke, R&D White Paper: Reed-Solomon error correction, Research & Development
    [6] Delong, T.A., B.W. Johnson, and J.A. Profeta, III, A fault injection technique for VHDL behavioral-level models. Design & Test of Computers, IEEE, 1996. vol. 13(no. 4): p. 24-33.
    [7] Fazeli, M., R. Farivar, and S.G. Miremadi, A software-based concurrent error detection technique for power PC processor-based embedded systems. Defect and Fault Tolerance in VLSI Systems, 2005. DFT 2005. 20th IEEE International Symposium on, 2005: p. 266-274.
    [8] Gil, D., et al., A study of the effects of transient fault injection into the VHDL model of a fault-tolerant microcomputer system. On-Line Testing Workshop, 2000. Proceedings. 6th IEEE International, 2000: p. 73-79.
    [9] Goloubeva, O., et al., Soft-error detection using control flow assertions. Defect and Fault Tolerance in VLSI Systems, 2003. Proceedings. 18th IEEE International Symposium on, 2003: p. 581-588.
    [10] Hennessy, J. and D. Patterson, Computer Architecture: A Quantitative Approach. Third ed. 2002: Morgan Kaufmann.
    [11] Hsiao, S.F., et al., Efficient VLSI Implementations of Fast Multiplierless Approximated DCT Using Parameterized Hardware Modules for Silicon Intellectual Property Design. Circuits and Systems I: Regular Papers, IEEE Transactions on, 2005. vol. 52(no. 8): p. 1568-1579.
    [12] Hung-Chuan, Lai, S. J, Horng, Y. Y Chen, P. Fan, Y. Pan, A New concurrent detection of Control Flow Errors Based on DCT Technique, 2007 PRDC
    [13] I. S. Reed and G. Solomon, “Polynomial Codes over Certain Finite Fields, ” J. Soc. Ind. Appl. Math.,8, pp. 300-304, June 1960.
    [14] Jenn, E., Fault injection into VHDL models: the MEFISTO tool. Fault-Tolerant Computing, 1994. FTCS-24. Digest of Papers., Twenty-Fourth International Symposium on, 1994: p. 66-75.
    [15] Junqiang, L. and Z. Xinhua, Embedded image compression using DCT based subband decomposition and SLCCA data organization. Multimedia Signal Processing, 2002 IEEE Workshop on, 2002: p. 81-84.
    [16] Kwak, J. and J. You, One- and two-dimensional constant geometry fast cosine transform algorithms and architectures. Signal Processing, IEEE Transactions on, 1999. vol. 47 no. 7, p. 2023-2034.
    [17] Larus, J., SPIM S20: A MIPS R2000 Simulator. 1997. p. 1-25.
    [18] Leveugle, R., T. Michel, and G. Saucier, Design of microprocessors with built-in on-line test. Fault-Tolerant Computing, 1990. FTCS-20. Digest of Papers., 20th International Symposium, 1990: p. 450-456.
    [19] Ma, T.P. and P.V. Dressendorfer, Ionizing Radiation Effects in MOS Devices and Circuits. 2001, New York: Wiley-Interscience.
    [20] Moon, Todd K., Error correction coding : mathematical methods and algorithms / Todd K. Moon., Hoboken, N.J. : Wiley-Interscience, c2005.
    [21] Patterson, D. and J. Hennessy, Computer Organization & Design: The Hardware/Software Interface. 1998: Morgan Kaufmann.
    [22] Reis, G.A., et al., SWIFT: software implemented fault tolerance. Code Generation and Optimization, 2005. CGO 2005. International Symposium on, 2005: p. 243-254.
    [23] Rodriguez, F., J.C. Campelo, and J.J. Serrano, Improving the interleaved signature instruction stream technique. Electrical and Computer Engineering, 2003. IEEE CCECE 2003. Canadian Conference on, 2003. vol. 1: p. 93-96.
    [24] Schuette, M.A. and J.P. Shen, Processor Control Flow Monitoring Using Signatured Instruction Streams. Transactions on Computers, 1987. vol. C-36(no. 3): p. 264-276.
    [25] Sergei V. Fedorenko, A Simple Algorithm for Decoding Reed–Solomon Codes and its Relation to the Welch–Berlekamp Algorithm, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 3, MARCH 2005
    [26] Shen-Fu, H. and S. Wei-Ren, A new hardware-efficient algorithm and architecture for computation of 2-D DCTs on a linear array. Circuits and Systems for Video Technology, IEEE Transactions on, 2001. vol. 11(no. 11): p. 1149-1159.
    [27] Shuming Chen, X. Hu, B. Liu, J. Chen, An On-Line Control Flow Checking Method for VLIW Processor, Conf. of PRDC 2007.
    [28] Technology, M., ModelSim SE/PLUS 5.7b. 2003.
    [29] Tsai, T.K., et al., Stress-based and path-based fault injection. Transactions on Computers, 1999. vol. 48(no. 11): p. 1183-1201.
    [30] Upadhyaya, S.J. and B. Ramamurthy, Concurrent process monitoring with no reference signatures. Transactions on Computers, 1994. vol. 43(no. 4): p. 475-480.
    [31] Venkatesh, S. and S. Srinivasan, Modified butterfly structure for efficient implementation of pruned fast cosine transform. Electronics Letters, 1998. vol. 34 no. 14, p. 1383-1385.
    [32] Wilken, K. and J.P. Shen, Continuous signature monitoring: efficient concurrent-detection of processor control errors. Test Conference, 1988. Proceedings. 'New Frontiers in Testing'., International, 1988: p. 914-925.
    [33] Wilken, K. and J.P. Shen, Continuous signature monitoring: low-cost concurrent detection of processor control errors. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on, 1990. vol. 9(no. 6): p. 629-641.
    [34] Wilken, K.D. and T. Kong, Concurrent detection of software and hardware data-access faults. Transactions on Computers, 1997. vol. 46(no. 4): p. 412-424.
    [35] Yuh-Ming, H., W. Ja-Ling, and H. Chiou-Ting, A refined fast 2-D discrete cosine transform algorithm with regular butterfly structure. Consumer Electronics, IEEE Transactions on, 1998. vol. 44(no. 2): p. 376-383.
    [36] Yung-Yuan, C., Concurrent detection of control flow errors by hybrid signature monitoring. Transactions on Computers, 2005. vol. 54(no. 10): p. 1298-1313.
    [37] Yung-Yuan Chen, K. F Chen, Incorporating Signature-Monitoring Technique in VLIW Processors, 19’th IEEE International Symposium on Defect and Fault Tolerance in VLSI.

    QR CODE