Share this
What is mixed criticality?
by Christopher Trick on Mar 24, 2023 10:53:00 AM
Systems for the military, DoD, and critical infrastructure sectors run complex applications and services with different levels of criticality. This requires that workloads be isolated from one another to reduce interference or intrusion.
In this blog, you'll learn more about what mixed criticality is, how it works, the role of CPUs and FPGAs, and how Trenton's solutions come into play.
What is mixed criticality?
Mixed criticality refers to the use of a single computing system or platform to support applications with different levels of criticality.
These applications may have different requirements for safety, reliability, and security, and may require different levels of testing and certification.
In mixed criticality systems, safety-critical applications (those that have a high level of safety or security requirements) and non-safety-critical applications (those that have lower safety or security requirements) can coexist on the same system, without compromising safety or security.
Why is mixed criticality needed?
Mixed criticality is needed in many complex systems where there are multiple applications with different levels of criticality, such as in aerospace, defense, automotive, and medical industries.
These systems must balance the need for safety and reliability with the need for cost-effectiveness and functionality.
One of the main benefits of mixed criticality is that it can reduce system costs by allowing multiple applications to be consolidated onto a single computing platform, rather than requiring separate platforms for each application. This can lead to significant cost savings in hardware, software, and maintenance.
Mixed criticality can also improve system flexibility and adaptability, as it allows different applications to be added or removed from the system without requiring major changes to the underlying hardware or software.
This can be particularly important in fast-changing industries, such as automotive and aerospace, where new technologies and applications are constantly being developed.
How does mixed criticality work?
Mixed criticality works by allowing multiple applications with different levels of criticality to run on a single computing platform, while ensuring that each application meets its required level of safety, reliability, and security.
This is achieved through a combination of hardware and software techniques that provide isolation and separation between the different applications, ensuring applications are prioritized by their level of criticality.
Hardware techniques for mixed criticality may include the use of multicore CPUs or virtualization technologies to create separate and partition execution environments for each application.
Software techniques for mixed criticality may include the use of real-time operating systems (RTOS) or hypervisors to manage the execution of multiple applications with different levels of criticality.
Mixed criticality systems may also incorporate redundancy and fault tolerance mechanisms to ensure that the system can continue to function even in the event of hardware or software failures.
This may include techniques such as triple modular redundancy (TMR) or error-correcting code (ECC) memory to detect and correct errors in hardware, or software-based techniques such as checkpointing and replication to ensure that critical applications can continue to function in the event of software failures.
However, designing and implementing mixed criticality systems is a challenging task that requires careful consideration of the different requirements of each application and the overall system architecture.
Ensuring guaranteed quality of service (QoS)
By guaranteeing that each application receives the necessary resources, mixed criticality can ensure the quality of service (QoS) required by each application.
One approach to ensuring QoS in mixed-criticality systems is to allocate different levels of resources to each application based on its criticality level. Applications with higher criticality levels may be allocated more processing time, memory, or bandwidth than applications with lower criticality levels.
This ensures that high-criticality applications are always provided with the resources they need to function correctly, even under heavy system load.
Another approach is to use partitioning techniques to separate applications with different criticality levels into separate partitions within the same hardware platform. Each partition can then be assigned its own set of resources, and the partitioning mechanism can ensure that resources are not shared between partitions.
This approach can provide strong isolation between partitions, allowing them to operate independently without interference and ensuring that any failures or attacks in one partition do not affect other partitions.
What role do CPUs and FPGAs play in mixed criticality?
CPUs and FPGAs (Field Programmable Gate Arrays) can both play important roles in mixed-criticality systems.
CPUs can be used to run applications with lower criticality levels or non-real-time requirements, while higher criticality applications can be offloaded to FPGAs.
CPUs are often used in mixed-criticality systems to run software applications that require high flexibility and adaptability, such as operating systems, communication protocols, and control applications.
Multi-core CPUs can assign different cores to different applications, with high-criticality applications receiving more cores than low-criticality applications. CPUs can also support virtualization techniques that allow multiple applications with different criticality levels to run on the same hardware platform while maintaining strong isolation and QoS guarantees.
FPGAs, on the other hand, are often used in mixed-criticality systems to implement hardware acceleration and offloading techniques that can improve the performance, energy efficiency, and security of critical applications.
FPGAs can be customized to perform specific tasks efficiently, such as digital signal processing, encryption/decryption, and real-time control. FPGAs can also support partial reconfiguration techniques that allow the hardware platform to adapt dynamically to changing workload and criticality requirements.
Furthermore, FPGAs can also be used to implement hardware-based partitioning mechanisms, which can provide strong isolation between different partitions and ensure that each partition has its own set of resources.
CPUs and FPGAs can also be combined into a heterogeneous platform within mixed criticality systems that can leverage their respective strengths.
For example, a system can use a CPU to run non-critical software applications, while using an FPGA to perform critical tasks that require high performance, low latency, or high security. The CPU can communicate with the FPGA through high-speed interfaces such as PCIe, AXI, or Ethernet, and can use virtualization techniques to ensure strong isolation and QoS guarantees.
By combining these two technologies, mixed-criticality systems can achieve a high degree of flexibility, scalability, and efficiency while ensuring that each application receives the necessary level of resources it requires to function correctly.
Mixed criticality use cases
Military
Unmanned Aerial Vehicles (UAVs)
UAVs can be used for a variety of applications, such as surveillance, reconnaissance, search and rescue, and even delivery of goods. In a mixed-criticality system, different tasks or missions that a UAV might perform can have different levels of criticality.
For example, if a UAV is being used for a search and rescue mission, the task of locating and saving a person might be considered high criticality, while taking photos or videos of the search area might be considered low criticality.
The system would need to manage these tasks in a way that ensures that high criticality tasks take priority over low criticality tasks to ensure that lives are saved and the mission is successful.
Command and Control (C2) Systems
Command and control systems for the military are used to coordinate and manage the activities of troops and resources in a battlefield environment. In a mixed-criticality system, different types of information and tasks can have different levels of criticality.
For example, a message from a commanding officer might be considered high criticality, while a status update from a logistics officer might be considered low criticality.
The system would need to manage these messages and tasks in a way that ensures that high criticality messages are delivered and acted upon quickly, while low criticality messages do not interfere with the flow of critical information.
A mixed-criticality approach can ensure that critical tasks take priority over non-critical ones and that the system remains safe and reliable during critical operations across a variety of verticals.
Critical infrastructure
Nuclear Power Plant
Nuclear power plants generate electricity by using nuclear reactions to heat water and produce steam, which drives turbines to generate electricity. In a mixed-criticality system, there are different types of safety systems that need to be in place to ensure that the plant operates safely and efficiently.
For example, a safety system that controls the flow of coolant might be considered high criticality, while a monitoring system that detects leaks in pipes might be considered low criticality.
The system would need to manage these different systems in a way that ensures that high criticality systems are always operational and responsive, while low criticality systems do not interfere with the operation of critical systems.
Transportation System
Transportation vehicles, such as cars and trains, are increasingly equipped with advanced driver assistance systems (ADAS) that use sensors and artificial intelligence to help drivers avoid accidents and drive more safely. In a mixed-criticality system, different ADAS features can have different levels of criticality.
For example, a feature that detects and alerts the driver to an imminent collision might be considered high criticality, while a feature that adjusts the temperature in the car might be considered low criticality.
The system would need to manage these different features in a way that ensures that high criticality features take priority over low criticality features to ensure that the vehicle operates safely and efficiently.
Where does Trenton Systems come into play?
At Trenton Systems, we provide our customers with TAA-compliant, COTS HPC solutions that provide hardware-based cybersecurity to protect critical workloads at the edge.
Our solutions utilize FPGAs that can help isolate different criticalities running on high core count CPUs.
The FPGAs also provide spatial isolation at wire speed, meaning the isolation mechanism operates at the same speed as the data being transmitted without any additional latency.
This ensures that data can be securely processed, analyzed, stored, and transferred without interference from other applications or intrusion from unauthorized personnel.
Final thoughts
Mixed criticality is an approach that enables multiple applications with varying levels of criticality to run on the same computing platform, without compromising safety or security.
It is essential in complex systems such as aerospace, defense, automotive, and medical industries that balance the need for safety and reliability with cost-effectiveness and functionality.
Mixed criticality achieves guaranteed quality of service (QoS) by ensuring that each application receives the necessary resources based on its criticality level, either through allocation or partitioning techniques provided by CPUs and FPGAs.
Mixed criticality has various use cases across verticals, including military and critical infrastructure, with companies like Trenton Systems providing flexible, scalable, and efficient solutions for complex systems that require a high level of security.
Interested in learning more? Just reach out to us anytime here.
We'd be more than happy to help. 😎
Share this
- High-performance computers (42)
- Military computers (38)
- Rugged computers (32)
- Cybersecurity (25)
- Industrial computers (25)
- Military servers (24)
- MIL-SPEC (20)
- Rugged servers (19)
- Press Release (17)
- Industrial servers (16)
- MIL-STD-810 (16)
- 5G Technology (14)
- Intel (13)
- Rack mount servers (12)
- processing (12)
- Computer hardware (11)
- Edge computing (11)
- Rugged workstations (11)
- Made in USA (10)
- Partnerships (9)
- Rugged computing (9)
- Sales, Marketing, and Business Development (9)
- Trenton Systems (9)
- networking (9)
- Peripheral Component Interconnect Express (PCIe) (7)
- Encryption (6)
- Federal Information Processing Standards (FIPS) (6)
- GPUs (6)
- IPU (6)
- Joint All-Domain Command and Control (JADC2) (6)
- Server motherboards (6)
- artificial intelligence (6)
- Computer stress tests (5)
- Cross domain solutions (5)
- Mission-critical servers (5)
- Rugged mini PCs (5)
- AI (4)
- BIOS (4)
- CPU (4)
- Defense (4)
- Military primes (4)
- Mission-critical systems (4)
- Platform Firmware Resilience (PFR) (4)
- Rugged blade servers (4)
- containerization (4)
- data protection (4)
- virtualization (4)
- Counterfeit electronic parts (3)
- DO-160 (3)
- Edge servers (3)
- Firmware (3)
- HPC (3)
- Just a Bunch of Disks (JBOD) (3)
- Leadership (3)
- Navy (3)
- O-RAN (3)
- RAID (3)
- RAM (3)
- Revision control (3)
- Ruggedization (3)
- SATCOM (3)
- Storage servers (3)
- Supply chain (3)
- Tactical Advanced Computer (TAC) (3)
- Wide-temp computers (3)
- computers made in the USA (3)
- data transfer (3)
- deep learning (3)
- embedded computers (3)
- embedded systems (3)
- firmware security (3)
- machine learning (3)
- Automatic test equipment (ATE) (2)
- C6ISR (2)
- COTS (2)
- COVID-19 (2)
- Compliance (2)
- Compute Express Link (CXL) (2)
- Computer networking (2)
- Controlled Unclassified Information (CUI) (2)
- DDR (2)
- DDR4 (2)
- DPU (2)
- Dual CPU motherboards (2)
- EW (2)
- I/O (2)
- Military standards (2)
- NVIDIA (2)
- NVMe SSDs (2)
- PCIe (2)
- PCIe 4.0 (2)
- PCIe 5.0 (2)
- RAN (2)
- SIGINT (2)
- SWaP-C (2)
- Software Guard Extensions (SGX) (2)
- Submarines (2)
- Supply chain security (2)
- TAA compliance (2)
- airborne (2)
- as9100d (2)
- chassis (2)
- data diode (2)
- end-to-end solution (2)
- hardware security (2)
- hardware virtualization (2)
- integrated combat system (2)
- manufacturing reps (2)
- memory (2)
- mission computers (2)
- private 5G (2)
- protection (2)
- secure by design (2)
- small form factor (2)
- software security (2)
- vRAN (2)
- zero trust (2)
- zero trust architecture (2)
- 3U BAM Server (1)
- 4G (1)
- 4U (1)
- 5G Frequencies (1)
- 5G Frequency Bands (1)
- AI/ML/DL (1)
- Access CDS (1)
- Aegis Combat System (1)
- Armed Forces (1)
- Asymmetric encryption (1)
- C-RAN (1)
- COMINT (1)
- CPUs (1)
- Cloud-based CDS (1)
- Coast Guard (1)
- Compliance testing (1)
- Computer life cycle (1)
- Containers (1)
- D-RAN (1)
- DART (1)
- DDR5 (1)
- DMEA (1)
- Data Plane Development Kit (DPDK) (1)
- Defense Advanced Research Projects (DARP) (1)
- ELINT (1)
- EMI (1)
- EO/IR (1)
- Electromagnetic Interference (1)
- Electronic Warfare (EW) (1)
- FIPS 140-2 (1)
- FIPS 140-3 (1)
- Field Programmable Gate Array (FPGA) (1)
- Ground Control Stations (GCS) (1)
- Hardware-based CDS (1)
- Hybrid CDS (1)
- IES.5G (1)
- ION Mini PC (1)
- IP Ratings (1)
- IPMI (1)
- Industrial Internet of Things (IIoT) (1)
- Industry news (1)
- Integrated Base Defense (IBD) (1)
- LAN ports (1)
- LTE (1)
- Life cycle management (1)
- Lockheed Martin (1)
- MIL-S-901 (1)
- MIL-STD-167-1 (1)
- MIL-STD-461 (1)
- MIL-STD-464 (1)
- MOSA (1)
- Multi-Access Edge Computing (1)
- NASA (1)
- NIC (1)
- NIC Card (1)
- NVMe (1)
- O-RAN compliant (1)
- Oil and Gas (1)
- OpenRAN (1)
- P4 (1)
- PCIe card (1)
- PCIe lane (1)
- PCIe slot (1)
- Precision timestamping (1)
- Product life cycle (1)
- ROM (1)
- Raytheon (1)
- Remotely piloted aircraft (RPA) (1)
- Rugged computing glossary (1)
- SEDs (1)
- SIM Card (1)
- Secure boot (1)
- Sensor Open Systems Architecture (SOSA) (1)
- Small form-factor pluggable (SFP) (1)
- Smart Edge (1)
- Smart NIC (1)
- SmartNIC (1)
- Software-based CDS (1)
- Symmetric encryption (1)
- System hardening (1)
- System hardening best practices (1)
- TME (1)
- Tech Partners (1)
- Total Memory Encryption (TME) (1)
- Transfer CDS (1)
- USB ports (1)
- VMEbus International Trade Association (VITA) (1)
- Vertical Lift Consortium (VLC) (1)
- Virtual machines (1)
- What are embedded systems? (1)
- Wired access backhaul (1)
- Wireless access backhaul (1)
- accredidation (1)
- aerospace (1)
- air gaps (1)
- airborne computers (1)
- asteroid (1)
- authentication (1)
- autonomous (1)
- certification (1)
- cognitive software-defined radios (CDRS) (1)
- command and control (C2) (1)
- communications (1)
- cores (1)
- custom (1)
- customer service (1)
- customer support (1)
- data linking (1)
- data recording (1)
- ethernet (1)
- full disk encryption (1)
- hardware monitoring (1)
- heat sink (1)
- hypervisor (1)
- in-house technical support (1)
- input (1)
- integrated edge solution (1)
- international business (1)
- licensed spectrum (1)
- liquid cooling (1)
- mCOTS (1)
- microelectronics (1)
- missile defense (1)
- mixed criticality (1)
- moving (1)
- multi-factor authentication (1)
- network slicing (1)
- neural networks (1)
- new headquarters (1)
- next generation interceptor (1)
- non-volatile memory (1)
- operating system (1)
- output (1)
- outsourced technical support (1)
- post-boot (1)
- pre-boot (1)
- private networks (1)
- public networks (1)
- radio access network (RAN) (1)
- reconnaissance (1)
- secure flash (1)
- security (1)
- self-encrypting drives (SEDs) (1)
- sff (1)
- software (1)
- software-defined radios (SDRs) (1)
- speeds and feeds (1)
- standalone (1)
- storage (1)
- systems (1)
- tactical wide area networks (1)
- technical support (1)
- technology (1)
- third-party motherboards (1)
- troposcatter communication (1)
- unlicensed spectrum (1)
- volatile memory (1)
- vpx (1)
- zero trust network (1)
- August 2024 (1)
- July 2024 (1)
- May 2024 (1)
- April 2024 (3)
- February 2024 (1)
- November 2023 (1)
- October 2023 (1)
- July 2023 (1)
- June 2023 (3)
- May 2023 (7)
- April 2023 (5)
- March 2023 (7)
- December 2022 (2)
- November 2022 (6)
- October 2022 (7)
- September 2022 (8)
- August 2022 (3)
- July 2022 (4)
- June 2022 (13)
- May 2022 (10)
- April 2022 (4)
- March 2022 (11)
- February 2022 (4)
- January 2022 (4)
- December 2021 (1)
- November 2021 (4)
- September 2021 (2)
- August 2021 (1)
- July 2021 (2)
- June 2021 (3)
- May 2021 (4)
- April 2021 (3)
- March 2021 (3)
- February 2021 (9)
- January 2021 (4)
- December 2020 (5)
- November 2020 (5)
- October 2020 (4)
- September 2020 (4)
- August 2020 (6)
- July 2020 (9)
- June 2020 (11)
- May 2020 (13)
- April 2020 (8)
- February 2020 (1)
- January 2020 (1)
- October 2019 (1)
- August 2019 (2)
- July 2019 (2)
- March 2019 (1)
- January 2019 (2)
- December 2018 (1)
- November 2018 (2)
- October 2018 (5)
- September 2018 (3)
- July 2018 (1)
- April 2018 (2)
- March 2018 (1)
- February 2018 (9)
- January 2018 (27)
- December 2017 (1)
- November 2017 (2)
- October 2017 (3)
No Comments Yet
Let us know what you think