Two-by-two takes two computer security

 Double 2 - VOTE overall structure composed of two computer security

  The main function of (1) two by two to take two computer security by two functionally identical subsystems. The two subsystems form complementary system. Each computer system has a separate signal input operation is performed by comparing the calculation result two subsystems can be drawn whether some technical changes in cases, if the calculation result is consistent then the two subsystems no failure occurs, if two subsystems the calculation results of the different instructions required for this technique to improve in some way, then we should be careful examination of the technology, identify the cause of failure, and timely resolution.

  (2) the take two secure computer is a computer subsystem of working in independent two by two, in order to allow two input and data acquisition subsystems exchanging data, we can make two synchronized data acquisition subsystem . The current two-way simultaneous implementation of the work of system synchronization and task synchronization command has two kinds. Synchronization command means is to use two identical system's CPU, which is mainly to be able to compare the consistency. Using different types of code bis connector system when application of computer technology and security-related part, so to avoid using the same code as the fault occurs. But the command did not function dual code to run simultaneously, so this command synchronization mode can not be used, so we have to adopt the way task synchronization, task synchronization mode refers to the indication of the role in the management system running, combined with external parts, be transmission, according to an instruction of the analysis and comparison of the calculation results of the two subsystems, the program to obtain the final results.

Take two 2-by-2 computer security Platform

  Two-by-two takes two algorithm design

  Taken two by two is assumed that only one of two computer security subsystem may output, after the comprehensive inspection system for the system to select the primary and secondary mode, specifically divided into the following state.

  (1) The system operator checks two normal circumstances, the host system may be a random selection, selection subsystem 1 if the main operation program is the backup subsystem 2 operation program.

  (2) two operational inspection systems are normal, but can not use the main system, the random selection of a subsystem, then remove another subsystem, so as to ensure the normal operation of the operational program.

  (3) If the two subsystems found during inspection of a system does not meet inspection standards, check the normal operation of the subsystem for the main program that abnormalities subsystem was safe to delete.

  (4) When the two sub-systems test fails, the two systems are secure deletion, operation program by the host system.

  Two forms of the synchronization system: initial synchronization and synchronization cycles. Initially task synchronization procedure is not required to perform the task immediately, when the main system is started, the main system subsystem 2 to complete the initial preparation work, so before the primary system into operation, carried out computer security management began to make two subsystems synchronization, if synchronization fails, it is necessary to process the initial failure, if successful synchronization can be executed in real-time tasks. Cycle Synchronization ensures that two subsystems simultaneously. For example, in 2000 times the duty cycle, the program cycle operation to be performed twice, when a change occurs in the main system of the first program, each of the two subsystems are synchronized into the respective program, and when the two subsystems to give when the indicator indicates, the process of the second synchronization operations. When the other operations in synchronism. The second is synchronization process before the data output, first synchronize two systems, then the output data. So, when combined with hardware synchronization when using two tasks simultaneously perform a task.

  Taken two by two intersecting two computer security module design

  3.1 Design of the cross-connect module

  Communicate with each other dual computer cross-connect data is taken, it can be divided and connected in series and two kinds of communication. Data cross connection is achieved through the use of a common transport reservoir. This approach applies to the case of transport of large volumes of information between the two planes. However, it is compared with the series design, its design is complex, relatively weak interference and advantage of this cross mode is not obvious. But by opening CROSS series data exchange, it is possible to improve noise immunity.

  3.2 Data Acquisition Module Design

  Action data acquisition module is an adapter for the effect of another data acquisition module (we call in the following I / O module) between the ultimate goal is to achieve a communication I / O module and the total system, and also the All data I / O module stored in the shared storage provided by an external sensor. Data Module vote by the data bus system to get the results of the vote could determine whether the program can continue to perform the final effect if voted henselae can communicate data acquisition module will manifested in this way.

  3.3 Design of synchronous voting module

  Taken two by two in each of two subsystems of the overall system, the connection between the two subsystems vote modules are designed to exchange data through the strip to achieve site conditions. Synchronization voting module contains two core processor, processor core 1 main role is to run the software task, to complete the command you want to execute. The main role is to run the 2 core processor platform software, in order to achieve voting function. These two core processors working together, is synchronized vote smooth indispensable in two parts. On each of the operation flow chart of the overall system, the processor core 2 obtained from the data acquisition module data, then the resultant data were analyzed to obtain the results of the vote, to repeat the results of the voting core processor computer through the dual port 1 reasonable operation. Then the result of the operation out of the core transport processor to an I / O module I / O module will block obtained by processing the voting computer. Core processors use different connection port system and the application of computer technology and security-related parts, as a special case to avoid using the same processor core occurs. If the command does not run the processor core functionality, so this command synchronization mode can not be used, so we have to adopt the way task synchronization, task synchronization mode refers to the case management system running, combined with an indication of the role of external parts, transmission, according to an instruction of the processor core operation results are analyzed and compared, to give the final outcome of a program.

  3.4 Communication Module Design

  Taken two by two each of two computer systems security This section contains the communication module. The communication module is composed of two communication template. The main role is to provide external communications template networking interface. The main task of communication template is responsible for taking two by two outer contact function within two security of computer systems, it is mainly the host sends a command to be executed by way of the Internet, it is get the final result of computer parts. This part of the building has a decisive role to use for the entire computer. Composition mode communications module is that it is connected to the data acquisition module, and connected to the network through the backplane together, in order to achieve transmission of information.

  Design 3.5 conversion module

  Taken two by two in the course of two computer security, the system is configured between the two structures taken two by two by two inductively. Primary and secondary methods of the overall system is automatically converted according to the check result of the system. Concrete steps we have taken two by two the previous two talked about half of algorithm design, this time we propose a new conversion program. We can achieve the conversion by the method of active and standby embodiment of the output circuit. We still subsystem 1 and subsystem 2 to represent. When the total system is operating normally, the output line 1 is the subsystem operating state, indicating that the program is the active subsystem 1, the output path subsystem 2 in the closed state, indicates that the subsystem 2 is an alternative. When the core processor subsystem 1 checks fails, to perform the conversion module of the overall system via a communication network bus, then immediately interrupt the output conversion module route of the overall system, and with the conversion template subsystem 2 communication, so that the system can be opened so that the total output path subsystem 2, in order to achieve the object of the standby program flexible switching.

  Overview

  This article was written by two by two to take two computer security solutions design. In this article we focus on the two-by-two takes two cross secure computer module design are discussed. Taken two by two computer security technology is a two safety, convenience, reliability of the network technology. From this article, we get what conclusions:

  Two by two to take two security computer security are carried out by the dynamic data input and output circuits I / O modules, in order to ensure automatically disconnected when the safety I / O module circuit problems, to avoid errors in the program generation. At the same time the core processor software may take part in the calculation method using two two-by-two vote, the problem when the core processor checks subsystem 1, to carry out communications with the conversion module of the overall system via a network bus, in this case the output conversion module immediately interrupted line of the overall system, and communicates with the sub conversion template 2, so that the total system can open the output path subsystem 2, this can be achieved flexibly standby switching scheme.

  This new type of two-by-two takes two security computer security technology, mainly achieved through networking functions vote the way. Two-by-two takes two security computer security technology can be synchronized with the voting function computing power to govern the different core processor for fast and accurate calculations. Taken two by two in two security computer security method conversion module using the output of the input circuit is restricted, enables flexible switching between the module and the module from the external conditions. Two-by-two takes two security computer security technology can effectively detect whether the computer system is stable and reliable ,, and he is also one of the main ways to improve the stability of the computer system. Taken two by two security computer security has two high feasibility, it can save cost and save time, has a wide use of space can be efficiently used in the field of network integration technologies. It will use to develop our technology has brought huge benefits. Please visit www.f

Guess you like

Origin blog.51cto.com/14117269/2407980