2005 International Conference on Dependable Systems and Networks (DSN'05)
DOI: 10.1109/dsn.2005.31
|View full text |Cite
|
Sign up to set email alerts
|

Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems

Abstract: A Cyclic Redundancy Code (CRC), when used properly, can be an effective and relatively inexpensive method to detect data corruption across communication channels. However, some systems use CRCs in ways that violate common assumptions made in analyzing CRC effectiveness, resulting in an overly optimistic prediction of system dependability. CRCs detect errors with some finite probability, which depends on factors including the strength of the particular code used, the bit-error rate, and the message length being… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
19
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(21 citation statements)
references
References 30 publications
2
19
0
Order By: Relevance
“…Such faults may be common for implementations deploying 32-bit-based computing architectures handling frames. In [22], Paulitsch et al argue that the error detection coverage credit may even be less.…”
Section: Description Of Dual-star Modelmentioning
confidence: 96%
“…Such faults may be common for implementations deploying 32-bit-based computing architectures handling frames. In [22], Paulitsch et al argue that the error detection coverage credit may even be less.…”
Section: Description Of Dual-star Modelmentioning
confidence: 96%
“…In fact, paper [2] details assumptions taken explicitly or implicitly by most of existing works and shows that they do not reflect sometimes the real system requirements. Unrealistic assumptions are likely to result in an inefficient policy.…”
Section: Related Workmentioning
confidence: 99%
“…Since the error detection policy depends closely on the problem assumptions [2], we detail here our specific assumptions which are: 1) our policy is implemented in the application layer so it is independent of the network architecture, 2) a calculation refresh cycle of some ms (10 ms for FCS), 3) no redundancy of the communication channels and 4) communication channels are i) memoryless (output at the time t depends only on the input at the time t and not on previous ones); ii) binary (two symbols 0 and 1) and iii) symmetric (the error probability is independent of the transmitted symbol).…”
Section: A Specific Assumptionsmentioning
confidence: 99%
“…It is envisaged that even more stringent reliability requirements may be necessary for automotive safety-critical systems. This is as a result of the increasing number of automotive vehicles, and thus the increased number of hours of operation, as opposed to the aerospace applications, such as fly-by-wire systems in commercial aircraft [10].…”
Section: Introductionmentioning
confidence: 99%
“…Such ultra-reliable systems are required to have a failure rate of failures per hour or less [7], [10], [11]. Such systems are also required to have a maximum system service outage time (i.e., the maximum time that a specific system service, such as steering, is unavailable) of between 10 and 100 ms, depending on the application [7], [10].…”
Section: Introductionmentioning
confidence: 99%