Download presentation
Presentation is loading. Please wait.
Published byAnnabelle Rich Modified over 9 years ago
1
1 Taxonomy and Trends Dan Siewiorek Carnegie Mellon University June 2012
2
2 Outline u Taxonomy and Trends u General Purpose Examples u High Availability Examples u A Methodology u Conclusion
3
3 Application Taxonomy u General purpose Wide range of applications; frequently high performance u High availability Occasional loss of single user but not system; rapid restart u Long life No human maintenance; automatically detect and reconfigure; high coverage u Critical computations Usually real-time control systems; low recovery time; high coverage
4
4
5
5 General Purpose Examples
6
6 Error Detection Techniques in Typical General-Purpose System u Memory Double-error-detection code on memory data Parity on address and control information u Cache Parity on data, address, control information u I/O Unit Parity on data and control u CPU Parity on data paths Parity on control store Duplication and comparison of control logic
7
7 Error Recovery Techniques in Typical General-Purpose System u Memory Single-error-detection code on data Retry on address or control information parity error u Cache Retry on data, address, control information parity error u I/O Unit Retry on data or control parity errors u CPU Retry on control store parity error Invert sense of control store Macroinstruction retry
8
8 IBM 3090 Series Fault-Tolerance Features u Reliability Low intrinsic failure rate technology Extensive component burn-in during manufacture Dual processor controller that incorporates switchover Dual 3370 Direct Access Storage units support switchover Multiple consoles for monitoring processor activity and for backup LSI packaging vastly reduces number of circuit connections Internal machine power and temperature monitoring Chip sparing in memory replaces defective chips automatically
9
9 IBM 3090 Series Fault-Tolerance Features u Availability Two or four central processors Automatic error detection and correction in central and expanded storage –Single bit error correction and double bit error detection in central storage –Double bit error correction and triple bit error detection in expanded storage Storage deallocation in 4K-byte increments under system program control Ability to vary channels off line in one channel increments Instruction retry Channel command retry Error detection and fault isolation circuits provide improved recovery and serviceability Multipath I/O controllers and units
10
10 IBM 3090 Series Fault-Tolerance Features u Data integrity Key controlled storage protection (store and fetch) Critical address storage protection Storage error checking and correction Processor cache error handling Parity and other internal error checking Segment protection (S/370 mode) Page protection (S/370 mode) Clear reset of registers and main storage Automatic Remote Support authorization Block multiplexer channel command retry Extensive I/O recovery by hardware and control programs
11
11 IBM 3090 Series Fault-Tolerance Features u Serviceability Automatic fault isolation (analysis routines) concurrent with operation Automatic remote support capability – auto call to IBM if authorized by the customer Automatic customer engineer and parts dispatching Trade facilities Error logout recording Microcode update distribution via remote support facilities Remote service console capability Automatic validation tests after repair Customer problem analysis facilities
12
12 ED/FI in IBM 308X / 3090 u Hundreds of thousands of isolation domains u Parity checks account for 70-80% of checkers – data, address, and shift/increment parity predictors u Decoder/encoder checkers u 25% of IBM 3090 circuits for RAS u Can instantaneously detect 90% of all errors u 25% of faults assumed solid for the technology u If less that two weeks between events, the cause is assumed to be the same intermittent u Call service if 24 errors in 2 hours
13
13 High Availability Examples
14
14 Tandem Design Objectives u “Nonstop” operation where failures detected, components configured out of service, repaired components configured back in without stopping other system components u No single hardware failure can compromise data integrity of the system u Modular system expansion through adding more processing power, memory, and peripherals without impacting application software
15
15
16
16
17
17 Fault Containment u Software processes do not share state – only message passing u Hardware – no shared memory, dual porting I/O, multiple power supply
18
18 Fast-Fail Modules (detection) u Software – consistency checks, defensive programming u Hardware – software generated status probes, hardware self-tests
19
19 Software Bugs u Backup process does not encounter same state and environment, code takes a different path
20
20 Software u Process pairs u Transaction processing – two phase commit protocol u Log write-ahead protocol – record before and after- image of database in an audit trail u Network systems management – programmed operators help reduce administrative errors u Tandem maintenance and diagnostic system – analyze event loss to successfully call out FRU 90% of time
21
21
22
22 Error Handling u Error detection logic records error u Operating system runs diagnostics Incident of failure algorithm If transient return board to service If permanent call Customer Assistant Center – CAC u CAC determines problem Selects board of same revision level Print installation instructions Ship via overnight courier u 22 field engineers support 400 systems u Service 6% / year of LCC vs. 9% for others
23
23
24
24 A Methodology
25
25 A Methodology u Define objectives u Limit the scope u Define confinement regions u Design error handling mechanisms u Design error reporting mechanisms u Testing of error handling/reporting mechanisms u Evaluate design
26
26
27
27
28
28
29
29
30
30
31
31
32
32
33
33
34
34
35
35 Exercising Latent Faults Dormant AreaExercise Memory locationsMCU periodically reads every array location (scrubbing) Detection mechanismsSoftware* periodically forces error conditions into the detection mechanisms Reporting mechanismsSoftware* periodically initiates and observes error reports Recovery mechanismsSoftware* periodically invokes recovery operations *Special commands to support exercising dormant areas are provided in BIUs and MCUs
36
36 Recovery Mechanisms and Coverage MechanismCoverage RetryTransient errors ECCStorage array address and data Spare bitDRAM replacement Memory bus pairsMemory bus failure Module shadowingModule failure, GDP, IP, or memory
37
37 Conclusion
38
38 Conclusion u Designing from first principles to produce an architecture to tolerate failures achieves better reliability, availability, and cost-effectiveness than an ad-hoc, add-on approach u It is possible to build systems in which the activities of fault detection, diagnosis, and recovery are completely automated and transparent to the user
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.