SlideShare a Scribd company logo
1 of 43
02229: Safety-Critical Embedded Systems



              Lecture 1:
             Introduction

          Paul.Pop@imm.dtu.dk
Lecture outline

• Course information
   – Examination: project

• Embedded systems
   – Non-functional requirements
• Real-time systems
   – Hard vs. soft
• Safety-critical systems
   – Dependability attributes
• Example application area
   – Automotive electronics
                                       Lecture 1/2
Course information

• Contact
  – Paul Pop, course leader and examiner
     • Email: paul.pop@imm.dtu.dk
     • Phone: 4525 3732
     • Office: building 322, office 228


• Webpage
  – CampusNet
  – http://eselab.imm.dtu.dk/cgi-bin/wiki.cgi/SCESCourse/Home
     • FeedBack [Edit this page]
         – anonymously add feedback about the course


                                                            Lecture 1/3
Course information, cont.

• Lectures
  – Language: English
  – 12 lectures + 1 invited lecture (from industry)
  – Lecture notes
     • available on CampusNet as a PDF file the day before
  – Reading materials
     • available on CampusNet as PDFs the day before


• Examination
  – Project: 70% report + 20% presentation + 10% opposition
     • 5 ECTS points

                                                              Lecture 1/4
Course information, cont.

•   Course literature (available as PDFs via CampusNet or DTV)
    1.   Laprie et al.,
         Fundamental Concepts of Dependability
    2.   Barry W. Johnson,
         An Introduction to the Design and Analysis of Fault-Tolerant Systems
    3.   Neil Storey,
         Safety Critical Computer Systems,
         Addison Wesley (selected chapters)
    4.   Hermann Kopetz,
         Real-time Systems:
         Design Principles for Distributed Embedded Applications,
         Springer (selected chapters)
    5.   Giorgio Buttazzo,
         Hard Real-time Computing Systems:
         Predictable Scheduling Algorithms and Applications,
         Springer (selected chapters)
                                                                          Lecture 1/5
Project, cont.

•   Topic categories
    1. Literature survey
        •   See the “references” and “further reading” in the course literature
    2. Tool case-study
        •   Select a commercial or research tool and
            use it on a case-study
    3. Software implementation
        •   Implement a technique,
            e.g., error detection or fault-tolerance technique


    –   Suggested topics on the course website:
        http://eselab.imm.dtu.dk/cgi-bin/wiki.cgi/SCESCourse/Project

                                                                            Lecture 1/6
Project, cont.

•   Examples of last year’s projects
    –   Worst case execution time analysis—
        Theory and application
    –   Scheduling Anomalies
    –   A Fault-Tolerant Scheduling Algorithm for
        Real-Time Period Tasks with Possible Software Faults
    –   Mars Climate Orbiter failure
    –   ARIANE 5: Flight 501 Failure
    –   London Ambulance Service
    –   Hamming Correcting Code Implementation in
        Transmitting System
    –   Application of a Fault Tolerance to a Wind Turbine

                                                               Lecture 1/7
Project, cont.

•   Milestones
    –   Sept. 21: Group registration and topic selection
        •   Email to paul.pop@imm.dtu.dk
    –   Oct. 26: Project report draft
        •   Upload draft to CampusNet
    –   Nov. 23: Report submission
        •   Upload final report to CampusNet
    –   Dec. 4: Project presentation and oral opposition
        •   Upload presentation to CampusNet




                                                           Lecture 1/8
Project, cont.

• Project registration
   – E-mail Paul Pop, paul.pop@imm.dtu.dk              Deadline:
      • Subject: 02229 registration                     Sept. 21
      • Body:
          –   Name student #1, CPR number, e-mail
          –   Name student #2, CPR number, e-mail
          –   Name student #3, CPR number, e-mail
          –   Project title
          –   Project details
                                                     Project approval
• Notes
   – Groups of up to 3 persons
   – Contact me if you can’t find project partners
                                                                   Lecture 1/9
Project presentation & opposition

• Presentation of project
                                                      Deadline:
   – 15 min. + 5 min. questions
                                                       Dec. 5


• Oral opposition
   – Read the draft report
   – Prepare at least one question per group member
      • Ask the questions after the presentation




                                                                  Lecture 1/10
Project deliverables

1. Literature survey              2. Tool case-study
   –   Written report                –   Case-study files
       •   ~5000 words               –   Report
       •   Structure                     •   Document your work
            –   Title, authors
            –   Abstract
                                  3. Software implementation
            –   Introduction
            –   Body                 –   Source code with comments
            –   Conclusions
                                     –   Report
            –   References
                                         •   Document your work


       Deadline for draft:            Deadline for final version
            Oct. 26                           Nov. 23

                                                                   Lecture 1/11
Project: important dates

     September 2007                             October   2007
Su   Mo Tu We Th Fr   Sa                  Su   Mo Tu We   Th Fr   Sa
 2    34567            8                        123        45      6
 9   10 11 12 13 14   15                   7    8 9 10    11 12   13
16   17 18 19 20 21   22
                                          14   15 16 17   18 19   20
23   24 25 26 27 28   29                                                Upload
                            Register      21   22 23 24   25 26   27
                                                                         draft
30
                                          28   29 30 31

      November 2007                           December 2007
Su   Mo Tu We Th Fr   Sa                  Su Mo Tu We Th Fr Sa
               12      3                                     1
 4    56789           10                   2345678
                              Upload                                   Present &
                           final report                                 oppose
11   12 13 14 15 16   17                   9 10 11 12 13 14 15
18   19 20 21 22 23   24                  16 17 18 19 20 21 22
25   26 27 28 29 30                       23 24 25 26 27 28 29
                                                                             Lecture 1/12
Embedded systems

• Computing systems are everywhere
• Most of us think of “desktop” computers
   –   PC’s
   –   Laptops
   –   Mainframes
   –   Servers
• But there’s another type of computing system
   – Far more common...




                                                 Lecture 1/13
Embedded systems, cont.

• Embedded computing systems
                                                Computers are in here...
  – Computing systems embedded within
    electronic devices                                       and here...


  – Hard to define. Nearly any computing                and even here...
    system other than a desktop computer
  – Billions of units produced yearly, versus
    millions of desktop units
  – Perhaps 50 per household and per
    automobile                                                 Lots more of these,
                                                              though they cost a lot
                                                                    less each.




                                                                                  Lecture 1/14
A “short list” of embedded systems
Anti-lock brakes            Modems
Auto-focus cameras          MPEG decoders
Automatic teller machines   Network cards
Automatic toll systems      Network switches/routers
Automatic transmission      On-board navigation
Avionic systems             Pagers
Battery chargers            Photocopiers
Camcorders                  Point-of-sale systems
Cell phones                 Portable video games
Cell-phone base stations    Printers
Cordless phones             Satellite phones
Cruise control              Scanners
Curbside check-in systems   Smart ovens/dishwashers
Digital cameras             Speech recognizers
Disk drives                 Stereo systems
Electronic card readers     Teleconferencing systems
Electronic instruments      Televisions
Electronic toys/games       Temperature controllers
Factory control             Theft tracking systems
Fax machines                TV set-top boxes
Fingerprint identifiers     VCR’s, DVD players
Home security systems       Video game consoles
Life-support systems        Video phones
Medical testing systems     Washers and dryers


Our daily lives depend on embedded systems
                                                       Lecture 1/15
General-purpose vs. special-purpose

General-purpose systems                      Special-purpose systems



                      Microprocessor
                      market shares
                                       99%




                          1%




                                                             Lecture 1/16
What is an embedded system?

• Definition
   – an embedded system special-purpose computer system,
     part of a larger system which it controls.


• Notes
   – A computer is used in such devices primarily as a means to
     simplify the system design and to provide flexibility.
   – Often the user of the device is not even aware that a
     computer is present.



                                                             Lecture 1/17
Characteristics of embedded systems

• Single-functioned
   – Dedicated to perform a single function
• Complex functionality
   – Often have to run sophisticated algorithms or multiple algorithms.
       • Cell phone, laser printer.
• Tightly-constrained
   – Low cost, low power, small, fast, etc.
• Reactive and real-time
   – Continually reacts to changes in the system’s environment
   – Must compute certain results in real-time without delay
• Safety-critical
   – Must not endanger human life and the environment

                                                                          Lecture 1/18
Functional vs. non-functional requirements

• Functional requirements
  – output as a function of input


• Non-functional requirements:
  – Time required to compute output
  – Reliability, availability, integrity,
    maintainability, dependability
  – Size, weight, power consumption, etc.




                                            Lecture 1/19
Real-time systems

• Time
  – The correctness of the system behavior depends not only on
    the logical results of the computations, but also on the time
    at which these results are produced.


• Real
  – The reaction to the outside events must occur during their
    evolution. The system time must be measured using the
    same time scale used for measuring the time in the
    controlled environment.


                                                             Lecture 1/20
Real-time systems, cont.




                           Lecture 1/21
Real-time systems, cont.




                           Lecture 1/22
Hard vs. soft

• Definitions
   – A real-time task is said to be hard if missing its deadline may
     cause catastrophic consequences on the environment under
     control.
   – A real-time task is said to be soft if meeting its deadline is
     desirable for performance reasons, but missing its deadline
     does not cause serious damage to the environment and
     does not jeopardize correct system behaviour.

• Definition
   – A real-time system that is able to handle hard real-time
     tasks is called a hard real-time system.

                                                                Lecture 1/23
Hard vs. soft, cont.

• Examples of hard activities
   –   Sensory data acquisition
   –   Detection of critical conditions
   –   Actuator serving
   –   Low-level control of critical system components
   –   Planning sensory-motor actions that tightly interact with the
       environment
• Examples of soft activities
   –   The command interpreter of the user interface
   –   Handling input data from the keyboard
   –   Displaying messages on the screen
   –   Representation of system state variables
   –   Graphical activities
   –   Saving report data

                                                                       Lecture 1/24
Murphy’s laws

•   Murphy’s general law
     – “If something can go wrong, it will go wrong”
        Major Edward A. Murphy, Jr., US Air Force, 1949
•   Murphy’s constant
     – Damage to an object is proportional to its value.
•   Troutman postulates
     – Any software bug will tend to maximize the damage.
     – The worst software bug will be discovered six months after the filed test.
•   Green’s law
     – If the system is designed to be tolerant to a set of faults,
       there will always exist an idiot so skilled to cause a nontolerated fault.
•   Corollary
     – Dummies are always more skilled than measures taken to keep them from harm.
•   Johnson’s first law
     – If a system stops working, it will do it a the worst possible time.
•   Sodd’s second law
     – Sooner or later, the worst possible combination of circumstances will happen.
•   Corollary
     – A system must always be designed to resist
       the worst possible combination of circumstances
                                                                                       Lecture 1/25
Genesis Space Capsule

• Genesis capsule
   – Cost: $260 million
   – Collecting samples of the solar wind over 3 years period
   – Crashed in Sept 2004 due to the failure of the parachutes


• Reason of crash
  – The accelerometers were all
    installed backwards. The craft’s
    autopilot never got a clue that it
    had hit an atmosphere and that
    hard ground was just ahead.




                                                                 Lecture 1/26
Mars Orbiter

• One of the Mars Orbiter probes crashed into the planet in 1999.
• It did turn out that engineers who built the Mars Climate
  Orbiter had provided a data table in “pound-force” rather than
  Newtons, the metric measure of force.
• NASA flight controllers at the Jet Propulsion Laboratory in
  Pasadena, Calif., had used the faulty table for their navigation
  calculations during the long trip from Earth to Mars.




                                                              Lecture 1/27
Lockheed Martin Titan 4

• In 1998, a LockMart Titan 4 booster carrying a $1 billion
  LockMart Vortex-class spy satellite pitched sideways and
  exploded 40 seconds after liftoff from Cape Canaveral, Fla.
• Reason: fried wiring that apparently had not been inspected.
  The guidance systems were without power for a fraction of a
  second.




                                                             Lecture 1/28
Therac-25

• Therac-25:
   – the most serious computer-related accidents to date (at least
     nonmilitary and admitted)
   – machine for radiation therapy (treating cancer)
   – between June 1985 and January 1987 (at least) six patients received
     severe overdoses (two died shortly afterward, two might have died but
     died because of cancer, the other two had permanent disabilities)
   – scanning magnets are used to spread the beam and vary the beam
     energy
   – dual-mode: electron beams for surface tumors, X-ray for deep tumors




                                                                       Lecture 1/29
Lecture 1/30
Denver Airport

• Denver International Airport, Colorado: intelligent luggage
  transportation system with 4000 “Telecars”, 35km rails,
  controlled by a network of 100 computers with 5000
  sensors, 400 radio antennas, and 56 barcode readers.
  Price: $186 million (BAE Automated Systems).
• Due to SW problems about one year delay which costs $1.1
  million per day (1993).
• Abondoned in 2005 to save $1 million per month on
  maintenance



                                                          Lecture 1/31
Reliability

• Definition
   – Reliability is the probability of a component, or system, functioning
     correctly over a period of time under a given set of operating
     conditions.

• Notes
   – “Function correctly” means:
       • Operating as defined within its specification
       • Was functioning correctly at the beginning of the period
       • No maintenance is carried out during the period
   – Reliability varies with time
       • The probability of operating correctly over one year is
         much lower than over a month
   – Important where continuous uninterrupted operation is essential
       • Flight-critical aircraft system


                                                                             Lecture 1/32
Availability

• Definition
   – The availability of a system is the probability that the system will be
     functioning correctly at any given time.


• Notes
   – Relates to a particular point in time, not period as reliability
   – Average availability
       • Example: during 1000 hours the system is out of operation for 1 hour, the
         average availability is 900/1000 = 0.999
   – Important
       • High availability systems: telephone exchanges have just a few hours of
         “downtime” during their life-time
       • Safety-critical systems: a nuclear reactor shutdown system is employed
         infrequently, but it has to work correctly when needed


                                                                                   Lecture 1/33
Failsafe operation

• Definition
   – A system is failsafe if it adopts “safe” output states in the
     event of failure and inability to recover.


• Notes
   – Example of failsafe operation
      • Railway signaling system: failsafe corresponds to all the lights on red
   – Many systems are not failsafe
      • Fly-by-wire system in an aircraft: the only safe state is on the ground




                                                                          Lecture 1/34
System integrity

• Definition
   – The integrity of a system is its ability to detect faults in its
     own operation and to inform the human operator.


• Notes
   – The system will enter a failsafe state if faults are detected
   – High-integrity system
       • Failure could result large financial loss
       • Examples: telephone exchanges, communication satellites




                                                                    Lecture 1/35
Safety-critical systems

• Definitions
   – Safety is a property of a system that will not endanger
     human life or the environment.
   – A safety-related system is one by which the safety of the
     equipment or plant is ensured.


• Safety-critical system is:
   – Safety-related system, or
   – High-integrity system



                                                             Lecture 1/36
Developing safety-critical systems

Requirements                                                             Completed system

    Hazard and
    Hazard and                                                         Certification
                                                                       Certification
    risk analysis
    risk analysis

                                                                  System
                                                                  System
            Specification
            Specification                                        validation
                                                                 validation

                    Architectural                         System
                    Architectural                         System
                       design                           verification
                       design                           verification

                                                System
                                                System
                               Module
                               Module         integration
                                              integration
                               design
                               design         and testing
                                               and testing
                                      Module
                                       Module
                                    construction
                                    construction
                                     and testing
                                     and testing                                   Lecture 1/37
Preliminary topics

• Introduction
• Fundamental concepts: faults, types, models;
  error detection
• Dependability analysis
• Fault-tolerance, techniques
• Hazard and risk analysis
• Scheduling, fundamental concepts
• Time, clock synchronization
• Periodic scheduling, schedulability analysis
• System architecture and design
                                                 Lecture 1/38
Example application area:
               automotive electronics

• What is “automotive electronics”?
   – Vehicle functions implemented with electronics
      • Body electronics
      • System electronics (chassis, engine)
      • Information/entertainment




                                                      Lecture 1/39
Automotive electronics market

              Cost of Electronics / Car ($)
    1400
    1200
   1000
     800
     600
     400
     200
       0
              1998        1999        2000    2001   2002   2003   2004    2005

  Market
              8.9         10.5        13.1    14.1   15.8   17.4   19.3   21.0
($billions)
                      More than 25% of the total cost
                          of a car is electronics

                                                                           Lecture 1/40
Typical automotive application

                          Driver




  Switches                Instruments         Discrete

                  Modes


    Reference    Controller

 Actuators                                    Continuous
                                    Sensors

             Physical environment
                   (vehicle)


                                                           Lecture 1/41
Non-critical: body and Infotainment




                                      Lecture 1/42
Safety-critical: brake-by-wire




                                 Lecture 1/43

More Related Content

What's hot

Aspect oriented architecture
Aspect oriented architecture Aspect oriented architecture
Aspect oriented architecture tigneb
 
Automotive architecture examples with EAST-ADL models
Automotive architecture examples with EAST-ADL modelsAutomotive architecture examples with EAST-ADL models
Automotive architecture examples with EAST-ADL modelsJuha-Pekka Tolvanen
 
Abc cycle in sw architecture ashish
Abc cycle  in sw architecture ashishAbc cycle  in sw architecture ashish
Abc cycle in sw architecture ashishAshish Agrawal
 
Implementing Early Hints in Chrome - Approaches and Challenges
Implementing Early Hints in Chrome - Approaches and ChallengesImplementing Early Hints in Chrome - Approaches and Challenges
Implementing Early Hints in Chrome - Approaches and ChallengesViet-Hoang Tran
 
Manual Testing Questions
Manual Testing QuestionsManual Testing Questions
Manual Testing QuestionsUser1test
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration managementJulia Carolina
 
Case Study Research in Software Engineering
Case Study Research in Software EngineeringCase Study Research in Software Engineering
Case Study Research in Software Engineeringalessio_ferrari
 
Requirement Engineering
Requirement EngineeringRequirement Engineering
Requirement EngineeringSlideshare
 
Remote sensing technology and applications
Remote  sensing technology and applicationsRemote  sensing technology and applications
Remote sensing technology and applicationsShyam Sundar Roy
 
Software engineering 23 software reliability
Software engineering 23 software reliabilitySoftware engineering 23 software reliability
Software engineering 23 software reliabilityVaibhav Khanna
 
Reverse engineering
Reverse  engineeringReverse  engineering
Reverse engineeringYuffie Valen
 
Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)Er. Shiva K. Shrestha
 
GPS and Weapons Technology
GPS  and Weapons TechnologyGPS  and Weapons Technology
GPS and Weapons TechnologySuchit Moon
 
Software requirement engineering
Software requirement engineeringSoftware requirement engineering
Software requirement engineeringSyed Zaid Irshad
 
MODEL DRIVEN DEVELOPMENT (1).pptx
MODEL DRIVEN DEVELOPMENT (1).pptxMODEL DRIVEN DEVELOPMENT (1).pptx
MODEL DRIVEN DEVELOPMENT (1).pptxpawan745387
 
Unmanned aerial vehicle or drone applicability in mining
Unmanned aerial vehicle or drone applicability in miningUnmanned aerial vehicle or drone applicability in mining
Unmanned aerial vehicle or drone applicability in miningPrasant Sahu
 

What's hot (20)

Aspect oriented architecture
Aspect oriented architecture Aspect oriented architecture
Aspect oriented architecture
 
Software Reliability
Software ReliabilitySoftware Reliability
Software Reliability
 
Automotive architecture examples with EAST-ADL models
Automotive architecture examples with EAST-ADL modelsAutomotive architecture examples with EAST-ADL models
Automotive architecture examples with EAST-ADL models
 
Abc cycle in sw architecture ashish
Abc cycle  in sw architecture ashishAbc cycle  in sw architecture ashish
Abc cycle in sw architecture ashish
 
Implementing Early Hints in Chrome - Approaches and Challenges
Implementing Early Hints in Chrome - Approaches and ChallengesImplementing Early Hints in Chrome - Approaches and Challenges
Implementing Early Hints in Chrome - Approaches and Challenges
 
Manual Testing Questions
Manual Testing QuestionsManual Testing Questions
Manual Testing Questions
 
Software configuration management
Software configuration managementSoftware configuration management
Software configuration management
 
Case Study Research in Software Engineering
Case Study Research in Software EngineeringCase Study Research in Software Engineering
Case Study Research in Software Engineering
 
Requirement Engineering
Requirement EngineeringRequirement Engineering
Requirement Engineering
 
Remote sensing technology and applications
Remote  sensing technology and applicationsRemote  sensing technology and applications
Remote sensing technology and applications
 
Software engineering 23 software reliability
Software engineering 23 software reliabilitySoftware engineering 23 software reliability
Software engineering 23 software reliability
 
Unit 2
Unit 2Unit 2
Unit 2
 
Unit 7
Unit 7Unit 7
Unit 7
 
Reverse engineering
Reverse  engineeringReverse  engineering
Reverse engineering
 
Slides chapters 21-23
Slides chapters 21-23Slides chapters 21-23
Slides chapters 21-23
 
Software Configuration Management (SCM)
Software Configuration Management (SCM)Software Configuration Management (SCM)
Software Configuration Management (SCM)
 
GPS and Weapons Technology
GPS  and Weapons TechnologyGPS  and Weapons Technology
GPS and Weapons Technology
 
Software requirement engineering
Software requirement engineeringSoftware requirement engineering
Software requirement engineering
 
MODEL DRIVEN DEVELOPMENT (1).pptx
MODEL DRIVEN DEVELOPMENT (1).pptxMODEL DRIVEN DEVELOPMENT (1).pptx
MODEL DRIVEN DEVELOPMENT (1).pptx
 
Unmanned aerial vehicle or drone applicability in mining
Unmanned aerial vehicle or drone applicability in miningUnmanned aerial vehicle or drone applicability in mining
Unmanned aerial vehicle or drone applicability in mining
 

Viewers also liked

EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1PRADEEP
 
Educ6505 assignment 3 taverne
Educ6505 assignment 3 taverneEduc6505 assignment 3 taverne
Educ6505 assignment 3 tavernephil_taverne
 
B.tech admission in idia
B.tech admission in idiaB.tech admission in idia
B.tech admission in idiaEdhole.com
 
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsIntland Software GmbH
 
Reliability And Validity
Reliability And ValidityReliability And Validity
Reliability And ValidityJames Penny
 
Reliability bachman 1990 chapter 6
Reliability bachman 1990 chapter 6Reliability bachman 1990 chapter 6
Reliability bachman 1990 chapter 6ahfameri
 
Mes camp 2012 phuongdoosan general introduction about asme code
Mes camp 2012  phuongdoosan  general introduction about asme codeMes camp 2012  phuongdoosan  general introduction about asme code
Mes camp 2012 phuongdoosan general introduction about asme codeNgọc Trần Đặng Minh
 
1 Reliability and Validity in Physical Therapy Tests
1  Reliability and Validity in Physical Therapy Tests1  Reliability and Validity in Physical Therapy Tests
1 Reliability and Validity in Physical Therapy Testsaebrahim123
 
Reliability in Language Testing
Reliability in Language Testing Reliability in Language Testing
Reliability in Language Testing Seray Tanyer
 
Embedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM ProcessorEmbedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM ProcessorMomenMostafa
 
Non functional requirements. do we really care…?
Non functional requirements. do we really care…?Non functional requirements. do we really care…?
Non functional requirements. do we really care…?OSSCube
 
E post office system
E post office systemE post office system
E post office systemTech_MX
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 

Viewers also liked (20)

EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1
 
Educ6505 assignment 3 taverne
Educ6505 assignment 3 taverneEduc6505 assignment 3 taverne
Educ6505 assignment 3 taverne
 
B.tech admission in idia
B.tech admission in idiaB.tech admission in idia
B.tech admission in idia
 
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded Systems
 
Reliability And Validity
Reliability And ValidityReliability And Validity
Reliability And Validity
 
PS19 SQA Presentation
PS19 SQA PresentationPS19 SQA Presentation
PS19 SQA Presentation
 
Reliability bachman 1990 chapter 6
Reliability bachman 1990 chapter 6Reliability bachman 1990 chapter 6
Reliability bachman 1990 chapter 6
 
Week 8 & 9 - Validity and Reliability
Week 8 & 9 - Validity and ReliabilityWeek 8 & 9 - Validity and Reliability
Week 8 & 9 - Validity and Reliability
 
Mes camp 2012 phuongdoosan general introduction about asme code
Mes camp 2012  phuongdoosan  general introduction about asme codeMes camp 2012  phuongdoosan  general introduction about asme code
Mes camp 2012 phuongdoosan general introduction about asme code
 
Project based learning methodologies for Embedded Systems and Intelligent Sys...
Project based learning methodologies for Embedded Systems and Intelligent Sys...Project based learning methodologies for Embedded Systems and Intelligent Sys...
Project based learning methodologies for Embedded Systems and Intelligent Sys...
 
1 Reliability and Validity in Physical Therapy Tests
1  Reliability and Validity in Physical Therapy Tests1  Reliability and Validity in Physical Therapy Tests
1 Reliability and Validity in Physical Therapy Tests
 
Reliability in Language Testing
Reliability in Language Testing Reliability in Language Testing
Reliability in Language Testing
 
Reliability
ReliabilityReliability
Reliability
 
Embedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM ProcessorEmbedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM Processor
 
Non functional requirements. do we really care…?
Non functional requirements. do we really care…?Non functional requirements. do we really care…?
Non functional requirements. do we really care…?
 
E post office system
E post office systemE post office system
E post office system
 
Drive by wire technology
Drive by wire technologyDrive by wire technology
Drive by wire technology
 
Reliability
ReliabilityReliability
Reliability
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Reliability and validity
Reliability and validityReliability and validity
Reliability and validity
 

Similar to Safety-Critical Embedded Systems Course

Thesispresentatie November
Thesispresentatie NovemberThesispresentatie November
Thesispresentatie NovemberRobin De Croon
 
Problem Solving and Programming
Problem Solving and ProgrammingProblem Solving and Programming
Problem Solving and ProgrammingSelvaraj Seerangan
 
Creating a textual domain specific language
Creating a textual domain specific languageCreating a textual domain specific language
Creating a textual domain specific languageVicente García Díaz
 
Craftsmanship in Computational Work
Craftsmanship in Computational WorkCraftsmanship in Computational Work
Craftsmanship in Computational WorkYung-Yu Chen
 
About Microservices, Containers and their Underestimated Impact on Network Pe...
About Microservices, Containers and their Underestimated Impact on Network Pe...About Microservices, Containers and their Underestimated Impact on Network Pe...
About Microservices, Containers and their Underestimated Impact on Network Pe...Nane Kratzke
 
Sustainable Architecture Design
Sustainable Architecture DesignSustainable Architecture Design
Sustainable Architecture DesignKevin Francis
 
Safety-Crtical Embedded Systems
Safety-Crtical Embedded SystemsSafety-Crtical Embedded Systems
Safety-Crtical Embedded Systemseselab
 
Devops syllabus
Devops syllabusDevops syllabus
Devops syllabusLen Bass
 
Creating Web Presentation for Observatory and Planetarium with Topic Maps
Creating Web Presentation for Observatory and Planetarium with Topic MapsCreating Web Presentation for Observatory and Planetarium with Topic Maps
Creating Web Presentation for Observatory and Planetarium with Topic Mapstmra
 
Documenting For Interactive Websites
Documenting For Interactive WebsitesDocumenting For Interactive Websites
Documenting For Interactive WebsitesPatrick Kennedy
 
Eventum Presentation
Eventum PresentationEventum Presentation
Eventum Presentationjoaopmaia
 
Data Science in Production: Technologies That Drive Adoption of Data Science ...
Data Science in Production: Technologies That Drive Adoption of Data Science ...Data Science in Production: Technologies That Drive Adoption of Data Science ...
Data Science in Production: Technologies That Drive Adoption of Data Science ...Nir Yungster
 
CocomoModels MGK .ppt
CocomoModels MGK .pptCocomoModels MGK .ppt
CocomoModels MGK .pptssuser3d1dad3
 
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008Yishay Mor
 
On the fragility of open source software packaging ecosystems
On the fragility of open source software packaging ecosystemsOn the fragility of open source software packaging ecosystems
On the fragility of open source software packaging ecosystemsTom Mens
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performanceJisc
 
The Railpocket Wifi Project Anonymous
The Railpocket Wifi Project AnonymousThe Railpocket Wifi Project Anonymous
The Railpocket Wifi Project Anonymouskielegat
 
Between Cocoa and Cocoa Touch: A Comparative Introduction
Between Cocoa and Cocoa Touch: A Comparative IntroductionBetween Cocoa and Cocoa Touch: A Comparative Introduction
Between Cocoa and Cocoa Touch: A Comparative Introductionlukhnos
 
What the cloud has to do with a burning house?
What the cloud has to do with a burning house?What the cloud has to do with a burning house?
What the cloud has to do with a burning house?Nane Kratzke
 

Similar to Safety-Critical Embedded Systems Course (20)

Thesispresentatie November
Thesispresentatie NovemberThesispresentatie November
Thesispresentatie November
 
Problem Solving and Programming
Problem Solving and ProgrammingProblem Solving and Programming
Problem Solving and Programming
 
Creating a textual domain specific language
Creating a textual domain specific languageCreating a textual domain specific language
Creating a textual domain specific language
 
Craftsmanship in Computational Work
Craftsmanship in Computational WorkCraftsmanship in Computational Work
Craftsmanship in Computational Work
 
About Microservices, Containers and their Underestimated Impact on Network Pe...
About Microservices, Containers and their Underestimated Impact on Network Pe...About Microservices, Containers and their Underestimated Impact on Network Pe...
About Microservices, Containers and their Underestimated Impact on Network Pe...
 
Sustainable Architecture Design
Sustainable Architecture DesignSustainable Architecture Design
Sustainable Architecture Design
 
Safety-Crtical Embedded Systems
Safety-Crtical Embedded SystemsSafety-Crtical Embedded Systems
Safety-Crtical Embedded Systems
 
Devops syllabus
Devops syllabusDevops syllabus
Devops syllabus
 
Creating Web Presentation for Observatory and Planetarium with Topic Maps
Creating Web Presentation for Observatory and Planetarium with Topic MapsCreating Web Presentation for Observatory and Planetarium with Topic Maps
Creating Web Presentation for Observatory and Planetarium with Topic Maps
 
Documenting For Interactive Websites
Documenting For Interactive WebsitesDocumenting For Interactive Websites
Documenting For Interactive Websites
 
Eventum Presentation
Eventum PresentationEventum Presentation
Eventum Presentation
 
Data Science in Production: Technologies That Drive Adoption of Data Science ...
Data Science in Production: Technologies That Drive Adoption of Data Science ...Data Science in Production: Technologies That Drive Adoption of Data Science ...
Data Science in Production: Technologies That Drive Adoption of Data Science ...
 
CocomoModels MGK .ppt
CocomoModels MGK .pptCocomoModels MGK .ppt
CocomoModels MGK .ppt
 
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008
 
On the fragility of open source software packaging ecosystems
On the fragility of open source software packaging ecosystemsOn the fragility of open source software packaging ecosystems
On the fragility of open source software packaging ecosystems
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performance
 
The Railpocket Wifi Project Anonymous
The Railpocket Wifi Project AnonymousThe Railpocket Wifi Project Anonymous
The Railpocket Wifi Project Anonymous
 
computer programming C++
computer  programming C++computer  programming C++
computer programming C++
 
Between Cocoa and Cocoa Touch: A Comparative Introduction
Between Cocoa and Cocoa Touch: A Comparative IntroductionBetween Cocoa and Cocoa Touch: A Comparative Introduction
Between Cocoa and Cocoa Touch: A Comparative Introduction
 
What the cloud has to do with a burning house?
What the cloud has to do with a burning house?What the cloud has to do with a burning house?
What the cloud has to do with a burning house?
 

Recently uploaded

Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 

Recently uploaded (20)

Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 

Safety-Critical Embedded Systems Course

  • 1. 02229: Safety-Critical Embedded Systems Lecture 1: Introduction Paul.Pop@imm.dtu.dk
  • 2. Lecture outline • Course information – Examination: project • Embedded systems – Non-functional requirements • Real-time systems – Hard vs. soft • Safety-critical systems – Dependability attributes • Example application area – Automotive electronics Lecture 1/2
  • 3. Course information • Contact – Paul Pop, course leader and examiner • Email: paul.pop@imm.dtu.dk • Phone: 4525 3732 • Office: building 322, office 228 • Webpage – CampusNet – http://eselab.imm.dtu.dk/cgi-bin/wiki.cgi/SCESCourse/Home • FeedBack [Edit this page] – anonymously add feedback about the course Lecture 1/3
  • 4. Course information, cont. • Lectures – Language: English – 12 lectures + 1 invited lecture (from industry) – Lecture notes • available on CampusNet as a PDF file the day before – Reading materials • available on CampusNet as PDFs the day before • Examination – Project: 70% report + 20% presentation + 10% opposition • 5 ECTS points Lecture 1/4
  • 5. Course information, cont. • Course literature (available as PDFs via CampusNet or DTV) 1. Laprie et al., Fundamental Concepts of Dependability 2. Barry W. Johnson, An Introduction to the Design and Analysis of Fault-Tolerant Systems 3. Neil Storey, Safety Critical Computer Systems, Addison Wesley (selected chapters) 4. Hermann Kopetz, Real-time Systems: Design Principles for Distributed Embedded Applications, Springer (selected chapters) 5. Giorgio Buttazzo, Hard Real-time Computing Systems: Predictable Scheduling Algorithms and Applications, Springer (selected chapters) Lecture 1/5
  • 6. Project, cont. • Topic categories 1. Literature survey • See the “references” and “further reading” in the course literature 2. Tool case-study • Select a commercial or research tool and use it on a case-study 3. Software implementation • Implement a technique, e.g., error detection or fault-tolerance technique – Suggested topics on the course website: http://eselab.imm.dtu.dk/cgi-bin/wiki.cgi/SCESCourse/Project Lecture 1/6
  • 7. Project, cont. • Examples of last year’s projects – Worst case execution time analysis— Theory and application – Scheduling Anomalies – A Fault-Tolerant Scheduling Algorithm for Real-Time Period Tasks with Possible Software Faults – Mars Climate Orbiter failure – ARIANE 5: Flight 501 Failure – London Ambulance Service – Hamming Correcting Code Implementation in Transmitting System – Application of a Fault Tolerance to a Wind Turbine Lecture 1/7
  • 8. Project, cont. • Milestones – Sept. 21: Group registration and topic selection • Email to paul.pop@imm.dtu.dk – Oct. 26: Project report draft • Upload draft to CampusNet – Nov. 23: Report submission • Upload final report to CampusNet – Dec. 4: Project presentation and oral opposition • Upload presentation to CampusNet Lecture 1/8
  • 9. Project, cont. • Project registration – E-mail Paul Pop, paul.pop@imm.dtu.dk Deadline: • Subject: 02229 registration Sept. 21 • Body: – Name student #1, CPR number, e-mail – Name student #2, CPR number, e-mail – Name student #3, CPR number, e-mail – Project title – Project details Project approval • Notes – Groups of up to 3 persons – Contact me if you can’t find project partners Lecture 1/9
  • 10. Project presentation & opposition • Presentation of project Deadline: – 15 min. + 5 min. questions Dec. 5 • Oral opposition – Read the draft report – Prepare at least one question per group member • Ask the questions after the presentation Lecture 1/10
  • 11. Project deliverables 1. Literature survey 2. Tool case-study – Written report – Case-study files • ~5000 words – Report • Structure • Document your work – Title, authors – Abstract 3. Software implementation – Introduction – Body – Source code with comments – Conclusions – Report – References • Document your work Deadline for draft: Deadline for final version Oct. 26 Nov. 23 Lecture 1/11
  • 12. Project: important dates September 2007 October 2007 Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa 2 34567 8 123 45 6 9 10 11 12 13 14 15 7 8 9 10 11 12 13 16 17 18 19 20 21 22 14 15 16 17 18 19 20 23 24 25 26 27 28 29 Upload Register 21 22 23 24 25 26 27 draft 30 28 29 30 31 November 2007 December 2007 Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa 12 3 1 4 56789 10 2345678 Upload Present & final report oppose 11 12 13 14 15 16 17 9 10 11 12 13 14 15 18 19 20 21 22 23 24 16 17 18 19 20 21 22 25 26 27 28 29 30 23 24 25 26 27 28 29 Lecture 1/12
  • 13. Embedded systems • Computing systems are everywhere • Most of us think of “desktop” computers – PC’s – Laptops – Mainframes – Servers • But there’s another type of computing system – Far more common... Lecture 1/13
  • 14. Embedded systems, cont. • Embedded computing systems Computers are in here... – Computing systems embedded within electronic devices and here... – Hard to define. Nearly any computing and even here... system other than a desktop computer – Billions of units produced yearly, versus millions of desktop units – Perhaps 50 per household and per automobile Lots more of these, though they cost a lot less each. Lecture 1/14
  • 15. A “short list” of embedded systems Anti-lock brakes Modems Auto-focus cameras MPEG decoders Automatic teller machines Network cards Automatic toll systems Network switches/routers Automatic transmission On-board navigation Avionic systems Pagers Battery chargers Photocopiers Camcorders Point-of-sale systems Cell phones Portable video games Cell-phone base stations Printers Cordless phones Satellite phones Cruise control Scanners Curbside check-in systems Smart ovens/dishwashers Digital cameras Speech recognizers Disk drives Stereo systems Electronic card readers Teleconferencing systems Electronic instruments Televisions Electronic toys/games Temperature controllers Factory control Theft tracking systems Fax machines TV set-top boxes Fingerprint identifiers VCR’s, DVD players Home security systems Video game consoles Life-support systems Video phones Medical testing systems Washers and dryers Our daily lives depend on embedded systems Lecture 1/15
  • 16. General-purpose vs. special-purpose General-purpose systems Special-purpose systems Microprocessor market shares 99% 1% Lecture 1/16
  • 17. What is an embedded system? • Definition – an embedded system special-purpose computer system, part of a larger system which it controls. • Notes – A computer is used in such devices primarily as a means to simplify the system design and to provide flexibility. – Often the user of the device is not even aware that a computer is present. Lecture 1/17
  • 18. Characteristics of embedded systems • Single-functioned – Dedicated to perform a single function • Complex functionality – Often have to run sophisticated algorithms or multiple algorithms. • Cell phone, laser printer. • Tightly-constrained – Low cost, low power, small, fast, etc. • Reactive and real-time – Continually reacts to changes in the system’s environment – Must compute certain results in real-time without delay • Safety-critical – Must not endanger human life and the environment Lecture 1/18
  • 19. Functional vs. non-functional requirements • Functional requirements – output as a function of input • Non-functional requirements: – Time required to compute output – Reliability, availability, integrity, maintainability, dependability – Size, weight, power consumption, etc. Lecture 1/19
  • 20. Real-time systems • Time – The correctness of the system behavior depends not only on the logical results of the computations, but also on the time at which these results are produced. • Real – The reaction to the outside events must occur during their evolution. The system time must be measured using the same time scale used for measuring the time in the controlled environment. Lecture 1/20
  • 23. Hard vs. soft • Definitions – A real-time task is said to be hard if missing its deadline may cause catastrophic consequences on the environment under control. – A real-time task is said to be soft if meeting its deadline is desirable for performance reasons, but missing its deadline does not cause serious damage to the environment and does not jeopardize correct system behaviour. • Definition – A real-time system that is able to handle hard real-time tasks is called a hard real-time system. Lecture 1/23
  • 24. Hard vs. soft, cont. • Examples of hard activities – Sensory data acquisition – Detection of critical conditions – Actuator serving – Low-level control of critical system components – Planning sensory-motor actions that tightly interact with the environment • Examples of soft activities – The command interpreter of the user interface – Handling input data from the keyboard – Displaying messages on the screen – Representation of system state variables – Graphical activities – Saving report data Lecture 1/24
  • 25. Murphy’s laws • Murphy’s general law – “If something can go wrong, it will go wrong” Major Edward A. Murphy, Jr., US Air Force, 1949 • Murphy’s constant – Damage to an object is proportional to its value. • Troutman postulates – Any software bug will tend to maximize the damage. – The worst software bug will be discovered six months after the filed test. • Green’s law – If the system is designed to be tolerant to a set of faults, there will always exist an idiot so skilled to cause a nontolerated fault. • Corollary – Dummies are always more skilled than measures taken to keep them from harm. • Johnson’s first law – If a system stops working, it will do it a the worst possible time. • Sodd’s second law – Sooner or later, the worst possible combination of circumstances will happen. • Corollary – A system must always be designed to resist the worst possible combination of circumstances Lecture 1/25
  • 26. Genesis Space Capsule • Genesis capsule – Cost: $260 million – Collecting samples of the solar wind over 3 years period – Crashed in Sept 2004 due to the failure of the parachutes • Reason of crash – The accelerometers were all installed backwards. The craft’s autopilot never got a clue that it had hit an atmosphere and that hard ground was just ahead. Lecture 1/26
  • 27. Mars Orbiter • One of the Mars Orbiter probes crashed into the planet in 1999. • It did turn out that engineers who built the Mars Climate Orbiter had provided a data table in “pound-force” rather than Newtons, the metric measure of force. • NASA flight controllers at the Jet Propulsion Laboratory in Pasadena, Calif., had used the faulty table for their navigation calculations during the long trip from Earth to Mars. Lecture 1/27
  • 28. Lockheed Martin Titan 4 • In 1998, a LockMart Titan 4 booster carrying a $1 billion LockMart Vortex-class spy satellite pitched sideways and exploded 40 seconds after liftoff from Cape Canaveral, Fla. • Reason: fried wiring that apparently had not been inspected. The guidance systems were without power for a fraction of a second. Lecture 1/28
  • 29. Therac-25 • Therac-25: – the most serious computer-related accidents to date (at least nonmilitary and admitted) – machine for radiation therapy (treating cancer) – between June 1985 and January 1987 (at least) six patients received severe overdoses (two died shortly afterward, two might have died but died because of cancer, the other two had permanent disabilities) – scanning magnets are used to spread the beam and vary the beam energy – dual-mode: electron beams for surface tumors, X-ray for deep tumors Lecture 1/29
  • 31. Denver Airport • Denver International Airport, Colorado: intelligent luggage transportation system with 4000 “Telecars”, 35km rails, controlled by a network of 100 computers with 5000 sensors, 400 radio antennas, and 56 barcode readers. Price: $186 million (BAE Automated Systems). • Due to SW problems about one year delay which costs $1.1 million per day (1993). • Abondoned in 2005 to save $1 million per month on maintenance Lecture 1/31
  • 32. Reliability • Definition – Reliability is the probability of a component, or system, functioning correctly over a period of time under a given set of operating conditions. • Notes – “Function correctly” means: • Operating as defined within its specification • Was functioning correctly at the beginning of the period • No maintenance is carried out during the period – Reliability varies with time • The probability of operating correctly over one year is much lower than over a month – Important where continuous uninterrupted operation is essential • Flight-critical aircraft system Lecture 1/32
  • 33. Availability • Definition – The availability of a system is the probability that the system will be functioning correctly at any given time. • Notes – Relates to a particular point in time, not period as reliability – Average availability • Example: during 1000 hours the system is out of operation for 1 hour, the average availability is 900/1000 = 0.999 – Important • High availability systems: telephone exchanges have just a few hours of “downtime” during their life-time • Safety-critical systems: a nuclear reactor shutdown system is employed infrequently, but it has to work correctly when needed Lecture 1/33
  • 34. Failsafe operation • Definition – A system is failsafe if it adopts “safe” output states in the event of failure and inability to recover. • Notes – Example of failsafe operation • Railway signaling system: failsafe corresponds to all the lights on red – Many systems are not failsafe • Fly-by-wire system in an aircraft: the only safe state is on the ground Lecture 1/34
  • 35. System integrity • Definition – The integrity of a system is its ability to detect faults in its own operation and to inform the human operator. • Notes – The system will enter a failsafe state if faults are detected – High-integrity system • Failure could result large financial loss • Examples: telephone exchanges, communication satellites Lecture 1/35
  • 36. Safety-critical systems • Definitions – Safety is a property of a system that will not endanger human life or the environment. – A safety-related system is one by which the safety of the equipment or plant is ensured. • Safety-critical system is: – Safety-related system, or – High-integrity system Lecture 1/36
  • 37. Developing safety-critical systems Requirements Completed system Hazard and Hazard and Certification Certification risk analysis risk analysis System System Specification Specification validation validation Architectural System Architectural System design verification design verification System System Module Module integration integration design design and testing and testing Module Module construction construction and testing and testing Lecture 1/37
  • 38. Preliminary topics • Introduction • Fundamental concepts: faults, types, models; error detection • Dependability analysis • Fault-tolerance, techniques • Hazard and risk analysis • Scheduling, fundamental concepts • Time, clock synchronization • Periodic scheduling, schedulability analysis • System architecture and design Lecture 1/38
  • 39. Example application area: automotive electronics • What is “automotive electronics”? – Vehicle functions implemented with electronics • Body electronics • System electronics (chassis, engine) • Information/entertainment Lecture 1/39
  • 40. Automotive electronics market Cost of Electronics / Car ($) 1400 1200 1000 800 600 400 200 0 1998 1999 2000 2001 2002 2003 2004 2005 Market 8.9 10.5 13.1 14.1 15.8 17.4 19.3 21.0 ($billions) More than 25% of the total cost of a car is electronics Lecture 1/40
  • 41. Typical automotive application Driver Switches Instruments Discrete Modes Reference Controller Actuators Continuous Sensors Physical environment (vehicle) Lecture 1/41
  • 42. Non-critical: body and Infotainment Lecture 1/42