| With the development of society and technology, Humans began to explore and develop space resources. The harsh environment in space and a large amount of information resources in space require us to establish a high performance and high reliable information processing platform. Although the reliability of the aerospace grade processor is high but the performance is low, and the transaction of high-end chip is limited. The performance of commercial processor is good, but it cannot meet the requirements of reliability. So, how to evaluate and improve the reliability of a system has become an important issue. The method of reliability assessment can be divided into fault injection method and ACE-bits analysis method. Compared with the fault injection method, the ACE bit analysis method has the advantages of low cost, short period and high accuracy.In this paper, we first introduce some basic knowledge. Then study the calculated of AVF on important storage unit for Xxx DSP. Then inferred the reliability based on AVF. Finally, we analyze the influence of protection method. The main work of this paper is as follows:(1) For the Xxx series DSP completed the calculation of AVF on storage unit. For a specific processor to simulate the execution of the instructions, and analyze the Un_ACE-bits on the assembly line. According to the data operation on register and DRAM, identify the life-time of data on register and DRAM, then use the life-time calculate the AVF. For PRAM, identify the life-time of program data on PRAM by analyze the execution process of program.(2) For the convenience of calculation, the concept of intrinsic reliability is introduced. Then deduction the formula about AVF and intrinsic reliability. Then introduced how to calculate the MTTF and FIT from intrinsic reliability. Through the intrinsic reliability that can be very convenient to launch other reliability evaluation index, and can be easily used for the protection model.(3) For the triple modular redundancy, scrubbing and hamming code three kinds of protection methods. First introduces the basic concepts of these three methods, and then analyzed their own protection principles and scope of application. |