United States - Flag United States

Please confirm your currency selection:

Bench Talk for Design Engineers

Bench Talk


Bench Talk for Design Engineers | The Official Blog of Mouser Electronics

Understand When and Why System Reliability Matters Christine Young

(Source: ra2 studio/Shutterstock.com)

As much as we try to avoid or prevent it, failure does happen. The important thing is to be prepared for failure, so we can quickly address or resolve it. But not all failures are alike. For example, a laptop that you use daily might experience glitches from time to time. If it’s well-designed, you can simply reset the machine to get it back to its original state. As Carlos Rodriguez, a Maxim Integrated microcontroller expert, says: “We don’t always have this luxury of having a manual reset and being able to reset the device we are designing.”

Rodriguez recently hosted a webinar, “When and Why System Reliability Matters,” during Maxim’s virtual Sensors Experience. In the session, he highlighted some key challenges to maintaining system reliability, plus some solutions to help you keep your systems up and running.

To frame his discussion, Rodriguez outlined four scenarios where system reliability is really non-negotiable:

  • Devices are not easily accessible: This is the case for agricultural or industrial applications, where there could be hundreds of sensors across a field (Figure 1) or inside a manufacturing facility. Having to locate a failing sensor in these situations physically isn’t a sustainable way of doing business. And in an Industrial Internet of Things (IIoT) environment, if the sensor is in a hard-to-reach location, this could entail stopping the manufacturing line to resolve the issue.
  • Maintaining robust communication is critical. An example is an emergency response device, where missed communication could have a devastating consequence.
  • Continuous processing is crucial. Medical devices such as pacemakers, for instance, cannot stop working for even a brief moment; otherwise, the consequences could be lethal.
  • Stored data is valuable. Examples in this scenario include a crypto hardware wallet application. Access to funds could be hampered if the memory location where a private encryption key is stored gets corrupted.

Figure 1: When sensors are spread out across a farm, it can be time-consuming to track down a point of failure. A better scenario would be to establish and maintain high system reliability. (Source: panuwat phimpha/Shutterstock.com)

What are the three main things that could go wrong and cause a system to fail? Rodriguez noted that there could be corruption in code that prevents the desired output from being produced. Data could get lost or corrupted. Or, something goes wrong while data is in transit from point A to point B.

Diving into the root causes of these system failures, Rodriguez pinpointed two key problems and ways to solve them. One of the problems is something we can’t see: alpha particles. Cosmic rays that rain down from space contain these alpha particles, which can trigger undesired bit flips within the memory of electronic devices and lead to:

  • System failures
  • Memory corruption, causing data loss
  • Unpredicted device output
  • And other unexpected events

The larger device’s memory, the greater the likelihood of bit errors because there’s more probability of the alpha particles getting into those areas. When a device such as a laptop becomes hindered in this way, you can reset it. But if it’s a device that cannot be reset, that system needs error-correcting code (ECC) in its memory. ECC detects the exact location of bit errors in memory and corrects those errors. “ECC is going to increase the robustness of the memory and decrease the likelihood of the system failing throughout the lifetime of the product,” Rodriguez says.

Hackers present another key problem. Rodriguez says that hackers have been known to find numerous ways to change the performance of a device. For example, by:

  • Intersecting data during communication and replacing it with false information
  • Injecting code into the microcontroller to change the behavior of the application
  • Stealing information from the stored data

The solution, Rodriguez says, is to integrate into your design a microcontroller built with robust security features, such as:

  • Encryption engines
  • Cyclic redundancy code (CRC)
  • Secure bootloaders
  • True random number generators (TRNG)
  • Secure nonvolatile key storage

Such features make it harder for hackers to do any kind of tampering, he said.

Microcontroller for Highly Reliable Systems

Maxim Integrated introduced a low-power microcontroller designed to keep system reliability high: the MAX32670, which is based on a 100MHz Arm® Cortex®-M4 processor a floating-point unit. Its embedded memory includes 384KB of flash with ECC, 160KB of SRAM with optional ECC, and 16KB unified cache with ECC. For security, the device features a secure boot ROM, secure nonvolatile key storage, TRNG, CRC 16/32, and Advanced Encryption Standard (AES) 128/192/256. The device is energy efficient, operating as low as 44µA/MHz in active mode and roughly 0.1µA in its lowest power sleep mode, and is available in a 5mm x 5mm TQFN package (a smaller WLP will soon be available).

“It’s really going to allow you to take your system to the next level as far as reliability goes,” Rodriguez says.

Take the Next Step


This post was written by Christine Young and originally appeared on Maxim Integrated’s mgineer blog.

« Back

Christine YoungChristine Young is a blogger at Maxim Integrated. 

All Authors

Show More Show More
View Blogs by Date