Preview

To Improve Register File Integrity Against Soft Errors Using Self-Immunity Technique

Best Essays
Open Document
Open Document
4208 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
To Improve Register File Integrity Against Soft Errors Using Self-Immunity Technique
To Improve Register File Integrity against Soft Errors Using Self-Immunity Technique

G.Suvarna susi
P.G Student,
Sri Vishnu Engineering College For Women,
Bhimavaram,
Andhra Pradesh.
E-mail:suvarna.susi@gmail.com

D.Murali Krishna
Sr Assistant.Professor,
ECE Department,
Sri Vishnu Engineering College For Women, Bhimavaram, Andhra Pradesh.
E-mail: mkrishna557@gmail.com

Abstract—Continuous shrinking in feature size, increasing power density etc. increase the vulnerability of microprocessors against soft errors even in terrestrial applications. The register file is one of the essential architectural components where soft errors can be very mischievous because errors may rapidly spread from there throughout the whole system. Thus, register files are recognized as one of the major concerns when it comes to reliability. This paper introduces Self-Immunity, a technique that improves the integrity of the register file with respect to soft errors. Based on the observation that a certain number of register bits are not always used to represent a value stored in a register. This paper deals with the difficulty to exploit this obvious observation to enhance the register file integrity against soft errors. We show that our technique can reduce the vulnerability of the register file considerably while exhibiting smaller overhead in terms of area and power consumption compared to state-of-the-art in register file protection. I.INTRODUCTION
Over the last decade, and in spite of the increasingly complex architectures, and the rapid growth of new technologies, the technology scaling has raised soft errors tobecome one of the major sources for processor crashing in many systems in the nanoscale era. Soft errors caused by charged particles are dangerous primarily in highatmospheric, where heavy alpha particles are available.However, trends in today’s nanometer technologies such as aggressive shrinking have made low-energy particles,



References: [4] Jongeun Lee and A. Shrivastava, “A Compiler-Microarchitecture Hybrid Approach to Soft Error Reduction for Register Files,” in Computer-Aided Design of Integrated Circuits and Systems, pp. 1018-1027, 2010. [6] G. Memik, M.T. Kandemir and O. Ozturk, “Increasing register file immunity to transient errors,” in Design, Automation and Test in Europe, pp. 586-591, 2005. [8] Jason A. Blome, Shantanu Gupta, Shuguang Feng, and Scott Mahlke, “Cost-efficient soft error protection for embedded microprocessors,” in CASES ’06, pp. 421–431, 2006. [9] P. Montesinos, W. Liu, and J. Torrellas, “Using register lifetime predictions to protect register files against soft errors,” in Dependable Systems and Networks, pp. 286–296, 2007. [10] M. Rebaudengo, M. S. Reorda, and M.Violante, “An Accurate Analysis of the Effects of Soft Errors in the Instruction and Data Caches of a Pipelined Microprocessor,” in DATE’03, pp. 602-607, 2003. [11] T. Slegel et al, “IBM’s S/390 G5 microprocessor design,” in IEEE Micro, 19, pp. 12-23, 1999. [13] K. Walther, C. Galke and H.T. VIERHAUS, “On-Line Techniques for Error Detection and Correction in Processor Registers with Cross-Parity Check,” in Journal of Electronic Testing: Theory and Applications 19, pp.501-510, 2003. [14] M. Spica and T.M. Mak, “Do we need anything more than single bit error correction (ECC)?,“ in Memory Technology, Design and Testing, Records of the International Workshop on 9-10, pp. 111– 116, 2004.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Business Law

    • 592 Words
    • 2 Pages

    Sterling computer has entered into a partnership with NoBugs a microchip processing computer. The collaboration was developing into a something successful until an incident put a strain in the business relationship. Some month ago Sterling computer has had several of their computers explode shortly after customers install them. Upon an investigation which was conducted by Sterling researchers have discovered evidence of NoBugs’s microchips aggravating a dormant defect in their computers, causing them to explode. The analysis on NoBugs microchips revealed that they were indeed below design specification and that the imperfections were caused by a slight miscalibration of NoBugs’s encoding equipment. Once, the information was presented to NoBugs they course of action correcting the problem by recalibrating the equipment and promptly resumed production of making perfect chips. However, this incident has caused Sterling business to bare the gaunt of the financial burden which is a loss of profits, out-of-pocket associated with compensating customers for the explosions, and injury to its business reputation by total accumulation will exceed somewhere north of $20 million dollars.…

    • 592 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4 Case Study

    • 359 Words
    • 2 Pages

    We saw effective access time is directly proportional to the page fault rate . suppose one access out of 1,000 cause a page fault,…

    • 359 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    2. For direct-mapped cache, a main memory address is viewed as consisting of three fields. List and define the three fields.…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Back in June, 1994 the Pentium Flaw was noticed by Intel testers, who had discovered a division error on the Pentium chip. Intel managers didn’t see this as a major problem so they kept this from anyone outside their corporation. The nature of this issue was a mathematical problem in their Floating Point Unit (FPU), or the math coprocessor. The Pentium chip was having glitches in calculating large divisions. It wasn’t until October 19th, when Dr. Thomas R. Nicely had revealed the malfunction of the (FPU) trying to do certain calculations. Dr. Nicely was a mathematics teacher at Lynchburg College in Virginia. After running several test on the 486 and Pentium he had pin pointed the error to the Pentium chip. Dr. Nicely contacted Intel and they had confirmed the error, but said they had no reports till then. Intel handled the situation very poorly; they would not return contact to Dr. Nicely, forcing him to write a…

    • 554 Words
    • 3 Pages
    Good Essays
  • Good Essays

    10. N.G. Leveson, "Software Safety in Embedded Computer Systems," Comm. ACM, Feb. 1991, pp. 34-46.…

    • 10546 Words
    • 43 Pages
    Good Essays
  • Satisfactory Essays

    Cs Programming Chapter 1

    • 2450 Words
    • 10 Pages

    ____ errors are relatively easy to locate and correct because the compiler or interpreter you use highlights every error.…

    • 2450 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    “Intel's policy, when it first publicly admitted the problem around November 28 of 1994, was to replace Pentium chips only for those who could explain their need of high accuracy in complex calculations.” That initial resolution received great public disapproval. To appease the consumers, by late December, the company announced a free replacement Pentium for…

    • 411 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Pentium Flaw

    • 319 Words
    • 2 Pages

    Intel after months of research and help from outside professionals decided to recall the chip and have them replaced. Nicely said he had run more than one quadrillion calculations on a revised chip and could not reproduce the error.…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Acct 242 Intel Case

    • 3750 Words
    • 15 Pages

    No contingent liability, no disclosure. According to Intel, a series of tests has showed that an error would occur only once every nine billion random calculations, or every 27,000 years for most users. Therefore, the chance that customers would encounter errors in calculations on their Pentium-driven PCs is slight and the event that customers would request chip replacement is remote. This means that the implementation of a replacement program is not probable, nor is the cost of such a program reasonably estimable because the theoretical participation rate is close to or equal to 0%.…

    • 3750 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    The Springville Herald Case

    • 5252 Words
    • 22 Pages

    Almost half the errors are accounted for by copy error, typesetting, and wrong position. If we also include ran-in error and velox, almost two-third of the errors are included. We would suggest that reduction of these errors be focused upon if our goal is improvement in the number of errors committed.…

    • 5252 Words
    • 22 Pages
    Powerful Essays
  • Better Essays

    Why Software Systems Fail

    • 4462 Words
    • 18 Pages

    <b>1.0 Introduction</b><br>In this report I will be concentrating on the failure of software systems. To understand why software systems fail we need to understand what are software systems. Software systems are a type of information system. This is because a software system is basically a means for hardware to process information. Flynn 's definition of an information system is:<br><br>"An information system provides procedures to record and make available information, concerning part of an organization, to assist organization-related activities."<br><br>Humans have been processing information manually for thousands of years, but with the vast increase of demand for knowledge this century has meant that a new method of information processing has been needed. Software systems have provided a new means that is much faster and efficient. As a result a huge number of organisations have become software dependent. Some of these systems are used to safeguard the lives of many people. This means that if these systems were to fail they could lead to devastating consequences. Here are some examples of where software systems are used heavily and could be very dangerous if they were to fail - aviation, hospitals, space exploration, nuclear power stations and communications. I will be looking at some examples of actual software failure in these fields to explain the reasons why systems fail.<br><br><b>2.0 Reasons for Systems Failure</b><br>If software systems failure can be so dangerous why can they not be completely eliminated? According to Parnas, "The main reason is that software can never be guaranteed to be 100% reliable. Software systems are discrete-state systems that do not have repetitive structures. The mathematical functions that describe the behaviour of software systems are not continuous, and traditional engineering mathematics do not help in their verification." In other words some software can be so large that thorough testing can be almost…

    • 4462 Words
    • 18 Pages
    Better Essays
  • Good Essays

    – arithmetic-logic instructions: add, sub, and, or, slt – memory-reference instructions: lw, sw – control-flow instructions: beq, j…

    • 4876 Words
    • 20 Pages
    Good Essays
  • Powerful Essays

    Uart

    • 19141 Words
    • 77 Pages

    This section of the manual contains the following major topics: 47.1 47.2 47.3 47.4 47.5 47.6 47.7 47.8 47.9 Introduction .................................................................................................................. 47-2 Non-Maskable Traps.................................................................................................... 47-7 Interrupt Processing Timing ....................................................................................... 47-12 Interrupt Control and Status Registers....................................................................... 47-15 Interrupt Setup Procedures........................................................................................ 47-65 Register Maps............................................................................................................ 47-68 Design Tips ................................................................................................................ 47-70 Related Application Notes.......................................................................................... 47-71 Revision History ......................................................................................................... 47-72…

    • 19141 Words
    • 77 Pages
    Powerful Essays
  • Powerful Essays

    Abstract—In this paper we present the “Variation Trained Drowsy Cache” (VTD-Cache) architecture. VTD-Cache allows for a significant reduction in power consumption while addressing reliability issues raised by memory cell process variability. By managing voltage scaling at a very fine granularity, each cache way can be sourced at a different voltage where the selection of voltage levels depends on both the vulnerability of the memory cells in that cache way to process variation and the likelihood of access to that cache location. After a short training period, the proposed architecture will micro-tune the cache, allowing significant power reduction with negligible increase in the number of misses. In addition, the proposed architecture actively monitors the access pattern and reconfigures the supply voltage setting to adapt to the execution pattern of the program. The novel and modular architecture of the VTD-Cache and its associated controller makes it easy to be implemented in memory compilers with a small area and power overhead. In a case study, the SimpleScalar simulation of the proposed 32 kB cache architecture reports over 57% reduction in power consumption over standard SPEC2000 integer benchmarks while incurring an area overhead of less than 4% and an execution time penalty smaller than 1%. Index Terms—Cache, drowsy cache, fault tolerance, leakage, low power, manufacturing defects, power efficient, process variation, static random access memory (SRAM), technology scaling, voltage scaling.…

    • 9807 Words
    • 40 Pages
    Powerful Essays
  • Satisfactory Essays

    C C++ User Guide

    • 126111 Words
    • 505 Pages

    Seventh Edition (September 2007) This edition applies to XL C/C++ in Version 1 Release 9 of z/OS (5694-A01) and to all subsequent releases until otherwise indicated in new editions. This edition replaces SC09-4767-05. Make sure that you use the correct edition for the level of the program listed above. Also, ensure that you apply all necessary PTFs for the program. Order publications through your IBM representative or the IBM branch office serving your location. Publications are not stocked at the address below. You can also browse the books on the World Wide Web by clicking on ″The Library″ link on the z/OS home page. The web address for this page is www.ibm.com/servers/eserver/zseries/zos/ bkserv IBM welcomes your comments. You can send your comments to the following Internet address: compinfo@ca.ibm.com. Be sure to include your e-mail address if you want a reply. Include the title and order number of this book, and the page number or topic related to your comment. When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1996, 2007. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.…

    • 126111 Words
    • 505 Pages
    Satisfactory Essays