SlideShare a Scribd company logo
1 of 43
02229: Safety-Critical Embedded Systems



              Lecture 1:
             Introduction

          Paul.Pop@imm.dtu.dk
Lecture outline

• Course information
   – Examination: project

• Embedded systems
   – Non-functional requirements
• Real-time systems
   – Hard vs. soft
• Safety-critical systems
   – Dependability attributes
• Example application area
   – Automotive electronics
                                       Lecture 1/2
Course information

• Contact
  – Paul Pop, course leader and examiner
     • Email: paul.pop@imm.dtu.dk
     • Phone: 4525 3732
     • Office: building 322, office 228


• Webpage
  – CampusNet
  – http://eselab.imm.dtu.dk/cgi-bin/wiki.cgi/SCESCourse/Home
     • FeedBack [Edit this page]
         – anonymously add feedback about the course


                                                            Lecture 1/3
Course information, cont.

• Lectures
  – Language: English
  – 12 lectures + 1 invited lecture (from industry)
  – Lecture notes
     • available on CampusNet as a PDF file the day before
  – Reading materials
     • available on CampusNet as PDFs the day before


• Examination
  – Project: 70% report + 20% presentation + 10% opposition
     • 5 ECTS points

                                                              Lecture 1/4
Course information, cont.

•   Course literature (available as PDFs via CampusNet or DTV)
    1.   Laprie et al.,
         Fundamental Concepts of Dependability
    2.   Barry W. Johnson,
         An Introduction to the Design and Analysis of Fault-Tolerant Systems
    3.   Neil Storey,
         Safety Critical Computer Systems,
         Addison Wesley (selected chapters)
    4.   Hermann Kopetz,
         Real-time Systems:
         Design Principles for Distributed Embedded Applications,
         Springer (selected chapters)
    5.   Giorgio Buttazzo,
         Hard Real-time Computing Systems:
         Predictable Scheduling Algorithms and Applications,
         Springer (selected chapters)
                                                                          Lecture 1/5
Project, cont.

•   Topic categories
    1. Literature survey
        •   See the “references” and “further reading” in the course literature
    2. Tool case-study
        •   Select a commercial or research tool and
            use it on a case-study
    3. Software implementation
        •   Implement a technique,
            e.g., error detection or fault-tolerance technique


    –   Suggested topics on the course website:
        http://eselab.imm.dtu.dk/cgi-bin/wiki.cgi/SCESCourse/Project

                                                                            Lecture 1/6
Project, cont.

•   Examples of last year’s projects
    –   Worst case execution time analysis—
        Theory and application
    –   Scheduling Anomalies
    –   A Fault-Tolerant Scheduling Algorithm for
        Real-Time Period Tasks with Possible Software Faults
    –   Mars Climate Orbiter failure
    –   ARIANE 5: Flight 501 Failure
    –   London Ambulance Service
    –   Hamming Correcting Code Implementation in
        Transmitting System
    –   Application of a Fault Tolerance to a Wind Turbine

                                                               Lecture 1/7
Project, cont.

•   Milestones
    –   Sept. 21: Group registration and topic selection
        •   Email to paul.pop@imm.dtu.dk
    –   Oct. 26: Project report draft
        •   Upload draft to CampusNet
    –   Nov. 23: Report submission
        •   Upload final report to CampusNet
    –   Dec. 4: Project presentation and oral opposition
        •   Upload presentation to CampusNet




                                                           Lecture 1/8
Project, cont.

• Project registration
   – E-mail Paul Pop, paul.pop@imm.dtu.dk              Deadline:
      • Subject: 02229 registration                     Sept. 21
      • Body:
          –   Name student #1, CPR number, e-mail
          –   Name student #2, CPR number, e-mail
          –   Name student #3, CPR number, e-mail
          –   Project title
          –   Project details
                                                     Project approval
• Notes
   – Groups of up to 3 persons
   – Contact me if you can’t find project partners
                                                                   Lecture 1/9
Project presentation & opposition

• Presentation of project
                                                      Deadline:
   – 15 min. + 5 min. questions
                                                       Dec. 5


• Oral opposition
   – Read the draft report
   – Prepare at least one question per group member
      • Ask the questions after the presentation




                                                                  Lecture 1/10
Project deliverables

1. Literature survey              2. Tool case-study
   –   Written report                –   Case-study files
       •   ~5000 words               –   Report
       •   Structure                     •   Document your work
            –   Title, authors
            –   Abstract
                                  3. Software implementation
            –   Introduction
            –   Body                 –   Source code with comments
            –   Conclusions
                                     –   Report
            –   References
                                         •   Document your work


       Deadline for draft:            Deadline for final version
            Oct. 26                           Nov. 23

                                                                   Lecture 1/11
Project: important dates

     September 2007                             October   2007
Su   Mo Tu We Th Fr   Sa                  Su   Mo Tu We   Th Fr   Sa
 2    34567            8                        123        45      6
 9   10 11 12 13 14   15                   7    8 9 10    11 12   13
16   17 18 19 20 21   22
                                          14   15 16 17   18 19   20
23   24 25 26 27 28   29                                                Upload
                            Register      21   22 23 24   25 26   27
                                                                         draft
30
                                          28   29 30 31

      November 2007                           December 2007
Su   Mo Tu We Th Fr   Sa                  Su Mo Tu We Th Fr Sa
               12      3                                     1
 4    56789           10                   2345678
                              Upload                                   Present &
                           final report                                 oppose
11   12 13 14 15 16   17                   9 10 11 12 13 14 15
18   19 20 21 22 23   24                  16 17 18 19 20 21 22
25   26 27 28 29 30                       23 24 25 26 27 28 29
                                                                             Lecture 1/12
Embedded systems

• Computing systems are everywhere
• Most of us think of “desktop” computers
   –   PC’s
   –   Laptops
   –   Mainframes
   –   Servers
• But there’s another type of computing system
   – Far more common...




                                                 Lecture 1/13
Embedded systems, cont.

• Embedded computing systems
                                                Computers are in here...
  – Computing systems embedded within
    electronic devices                                       and here...


  – Hard to define. Nearly any computing                and even here...
    system other than a desktop computer
  – Billions of units produced yearly, versus
    millions of desktop units
  – Perhaps 50 per household and per
    automobile                                                 Lots more of these,
                                                              though they cost a lot
                                                                    less each.




                                                                                  Lecture 1/14
A “short list” of embedded systems
Anti-lock brakes            Modems
Auto-focus cameras          MPEG decoders
Automatic teller machines   Network cards
Automatic toll systems      Network switches/routers
Automatic transmission      On-board navigation
Avionic systems             Pagers
Battery chargers            Photocopiers
Camcorders                  Point-of-sale systems
Cell phones                 Portable video games
Cell-phone base stations    Printers
Cordless phones             Satellite phones
Cruise control              Scanners
Curbside check-in systems   Smart ovens/dishwashers
Digital cameras             Speech recognizers
Disk drives                 Stereo systems
Electronic card readers     Teleconferencing systems
Electronic instruments      Televisions
Electronic toys/games       Temperature controllers
Factory control             Theft tracking systems
Fax machines                TV set-top boxes
Fingerprint identifiers     VCR’s, DVD players
Home security systems       Video game consoles
Life-support systems        Video phones
Medical testing systems     Washers and dryers


Our daily lives depend on embedded systems
                                                       Lecture 1/15
General-purpose vs. special-purpose

General-purpose systems                      Special-purpose systems



                      Microprocessor
                      market shares
                                       99%




                          1%




                                                             Lecture 1/16
What is an embedded system?

• Definition
   – an embedded system special-purpose computer system,
     part of a larger system which it controls.


• Notes
   – A computer is used in such devices primarily as a means to
     simplify the system design and to provide flexibility.
   – Often the user of the device is not even aware that a
     computer is present.



                                                             Lecture 1/17
Characteristics of embedded systems

• Single-functioned
   – Dedicated to perform a single function
• Complex functionality
   – Often have to run sophisticated algorithms or multiple algorithms.
       • Cell phone, laser printer.
• Tightly-constrained
   – Low cost, low power, small, fast, etc.
• Reactive and real-time
   – Continually reacts to changes in the system’s environment
   – Must compute certain results in real-time without delay
• Safety-critical
   – Must not endanger human life and the environment

                                                                          Lecture 1/18
Functional vs. non-functional requirements

• Functional requirements
  – output as a function of input


• Non-functional requirements:
  – Time required to compute output
  – Reliability, availability, integrity,
    maintainability, dependability
  – Size, weight, power consumption, etc.




                                            Lecture 1/19
Real-time systems

• Time
  – The correctness of the system behavior depends not only on
    the logical results of the computations, but also on the time
    at which these results are produced.


• Real
  – The reaction to the outside events must occur during their
    evolution. The system time must be measured using the
    same time scale used for measuring the time in the
    controlled environment.


                                                             Lecture 1/20
Real-time systems, cont.




                           Lecture 1/21
Real-time systems, cont.




                           Lecture 1/22
Hard vs. soft

• Definitions
   – A real-time task is said to be hard if missing its deadline may
     cause catastrophic consequences on the environment under
     control.
   – A real-time task is said to be soft if meeting its deadline is
     desirable for performance reasons, but missing its deadline
     does not cause serious damage to the environment and
     does not jeopardize correct system behaviour.

• Definition
   – A real-time system that is able to handle hard real-time
     tasks is called a hard real-time system.

                                                                Lecture 1/23
Hard vs. soft, cont.

• Examples of hard activities
   –   Sensory data acquisition
   –   Detection of critical conditions
   –   Actuator serving
   –   Low-level control of critical system components
   –   Planning sensory-motor actions that tightly interact with the
       environment
• Examples of soft activities
   –   The command interpreter of the user interface
   –   Handling input data from the keyboard
   –   Displaying messages on the screen
   –   Representation of system state variables
   –   Graphical activities
   –   Saving report data

                                                                       Lecture 1/24
Murphy’s laws

•   Murphy’s general law
     – “If something can go wrong, it will go wrong”
        Major Edward A. Murphy, Jr., US Air Force, 1949
•   Murphy’s constant
     – Damage to an object is proportional to its value.
•   Troutman postulates
     – Any software bug will tend to maximize the damage.
     – The worst software bug will be discovered six months after the filed test.
•   Green’s law
     – If the system is designed to be tolerant to a set of faults,
       there will always exist an idiot so skilled to cause a nontolerated fault.
•   Corollary
     – Dummies are always more skilled than measures taken to keep them from harm.
•   Johnson’s first law
     – If a system stops working, it will do it a the worst possible time.
•   Sodd’s second law
     – Sooner or later, the worst possible combination of circumstances will happen.
•   Corollary
     – A system must always be designed to resist
       the worst possible combination of circumstances
                                                                                       Lecture 1/25
Genesis Space Capsule

• Genesis capsule
   – Cost: $260 million
   – Collecting samples of the solar wind over 3 years period
   – Crashed in Sept 2004 due to the failure of the parachutes


• Reason of crash
  – The accelerometers were all
    installed backwards. The craft’s
    autopilot never got a clue that it
    had hit an atmosphere and that
    hard ground was just ahead.




                                                                 Lecture 1/26
Mars Orbiter

• One of the Mars Orbiter probes crashed into the planet in 1999.
• It did turn out that engineers who built the Mars Climate
  Orbiter had provided a data table in “pound-force” rather than
  Newtons, the metric measure of force.
• NASA flight controllers at the Jet Propulsion Laboratory in
  Pasadena, Calif., had used the faulty table for their navigation
  calculations during the long trip from Earth to Mars.




                                                              Lecture 1/27
Lockheed Martin Titan 4

• In 1998, a LockMart Titan 4 booster carrying a $1 billion
  LockMart Vortex-class spy satellite pitched sideways and
  exploded 40 seconds after liftoff from Cape Canaveral, Fla.
• Reason: fried wiring that apparently had not been inspected.
  The guidance systems were without power for a fraction of a
  second.




                                                             Lecture 1/28
Therac-25

• Therac-25:
   – the most serious computer-related accidents to date (at least
     nonmilitary and admitted)
   – machine for radiation therapy (treating cancer)
   – between June 1985 and January 1987 (at least) six patients received
     severe overdoses (two died shortly afterward, two might have died but
     died because of cancer, the other two had permanent disabilities)
   – scanning magnets are used to spread the beam and vary the beam
     energy
   – dual-mode: electron beams for surface tumors, X-ray for deep tumors




                                                                       Lecture 1/29
Lecture 1/30
Denver Airport

• Denver International Airport, Colorado: intelligent luggage
  transportation system with 4000 “Telecars”, 35km rails,
  controlled by a network of 100 computers with 5000
  sensors, 400 radio antennas, and 56 barcode readers.
  Price: $186 million (BAE Automated Systems).
• Due to SW problems about one year delay which costs $1.1
  million per day (1993).
• Abondoned in 2005 to save $1 million per month on
  maintenance



                                                          Lecture 1/31
Reliability

• Definition
   – Reliability is the probability of a component, or system, functioning
     correctly over a period of time under a given set of operating
     conditions.

• Notes
   – “Function correctly” means:
       • Operating as defined within its specification
       • Was functioning correctly at the beginning of the period
       • No maintenance is carried out during the period
   – Reliability varies with time
       • The probability of operating correctly over one year is
         much lower than over a month
   – Important where continuous uninterrupted operation is essential
       • Flight-critical aircraft system


                                                                             Lecture 1/32
Availability

• Definition
   – The availability of a system is the probability that the system will be
     functioning correctly at any given time.


• Notes
   – Relates to a particular point in time, not period as reliability
   – Average availability
       • Example: during 1000 hours the system is out of operation for 1 hour, the
         average availability is 900/1000 = 0.999
   – Important
       • High availability systems: telephone exchanges have just a few hours of
         “downtime” during their life-time
       • Safety-critical systems: a nuclear reactor shutdown system is employed
         infrequently, but it has to work correctly when needed


                                                                                   Lecture 1/33
Failsafe operation

• Definition
   – A system is failsafe if it adopts “safe” output states in the
     event of failure and inability to recover.


• Notes
   – Example of failsafe operation
      • Railway signaling system: failsafe corresponds to all the lights on red
   – Many systems are not failsafe
      • Fly-by-wire system in an aircraft: the only safe state is on the ground




                                                                          Lecture 1/34
System integrity

• Definition
   – The integrity of a system is its ability to detect faults in its
     own operation and to inform the human operator.


• Notes
   – The system will enter a failsafe state if faults are detected
   – High-integrity system
       • Failure could result large financial loss
       • Examples: telephone exchanges, communication satellites




                                                                    Lecture 1/35
Safety-critical systems

• Definitions
   – Safety is a property of a system that will not endanger
     human life or the environment.
   – A safety-related system is one by which the safety of the
     equipment or plant is ensured.


• Safety-critical system is:
   – Safety-related system, or
   – High-integrity system



                                                             Lecture 1/36
Developing safety-critical systems

Requirements                                                             Completed system

    Hazard and
    Hazard and                                                         Certification
                                                                       Certification
    risk analysis
    risk analysis

                                                                  System
                                                                  System
            Specification
            Specification                                        validation
                                                                 validation

                    Architectural                         System
                    Architectural                         System
                       design                           verification
                       design                           verification

                                                System
                                                System
                               Module
                               Module         integration
                                              integration
                               design
                               design         and testing
                                               and testing
                                      Module
                                       Module
                                    construction
                                    construction
                                     and testing
                                     and testing                                   Lecture 1/37
Preliminary topics

• Introduction
• Fundamental concepts: faults, types, models;
  error detection
• Dependability analysis
• Fault-tolerance, techniques
• Hazard and risk analysis
• Scheduling, fundamental concepts
• Time, clock synchronization
• Periodic scheduling, schedulability analysis
• System architecture and design
                                                 Lecture 1/38
Example application area:
               automotive electronics

• What is “automotive electronics”?
   – Vehicle functions implemented with electronics
      • Body electronics
      • System electronics (chassis, engine)
      • Information/entertainment




                                                      Lecture 1/39
Automotive electronics market

              Cost of Electronics / Car ($)
    1400
    1200
   1000
     800
     600
     400
     200
       0
              1998        1999        2000    2001   2002   2003   2004    2005

  Market
              8.9         10.5        13.1    14.1   15.8   17.4   19.3   21.0
($billions)
                      More than 25% of the total cost
                          of a car is electronics

                                                                           Lecture 1/40
Typical automotive application

                          Driver




  Switches                Instruments         Discrete

                  Modes


    Reference    Controller

 Actuators                                    Continuous
                                    Sensors

             Physical environment
                   (vehicle)


                                                           Lecture 1/41
Non-critical: body and Infotainment




                                      Lecture 1/42
Safety-critical: brake-by-wire




                                 Lecture 1/43

More Related Content

What's hot

Software design principles
Software design principlesSoftware design principles
Software design principlesMd.Mojibul Hoque
 
Class 11 - MAINTENANCE PLANNING AND SCHEDULING_Dr.Adel_.ppt
Class 11 - MAINTENANCE PLANNING AND SCHEDULING_Dr.Adel_.pptClass 11 - MAINTENANCE PLANNING AND SCHEDULING_Dr.Adel_.ppt
Class 11 - MAINTENANCE PLANNING AND SCHEDULING_Dr.Adel_.pptNazeeh11
 
System call (Fork +Exec)
System call (Fork +Exec)System call (Fork +Exec)
System call (Fork +Exec)Amit Ghosh
 
Operating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - ArchitecturesOperating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - ArchitecturesPeter Tröger
 
Unit 9 implementing the reliability strategy
Unit 9  implementing the reliability strategyUnit 9  implementing the reliability strategy
Unit 9 implementing the reliability strategyCharlton Inao
 
EMC Documentum - xCP 2.x Troubleshooting
EMC Documentum - xCP 2.x TroubleshootingEMC Documentum - xCP 2.x Troubleshooting
EMC Documentum - xCP 2.x TroubleshootingHaytham Ghandour
 
Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Navjyotsinh Jadeja
 
Software Cost Estimation in Software Engineering SE23
Software Cost Estimation in Software Engineering SE23Software Cost Estimation in Software Engineering SE23
Software Cost Estimation in Software Engineering SE23koolkampus
 
Google File System
Google File SystemGoogle File System
Google File Systemguest2cb4689
 
Progress control
Progress controlProgress control
Progress controlashamarsha
 
EMBEDDED OS
EMBEDDED OSEMBEDDED OS
EMBEDDED OSAJAL A J
 
Process Scheduler and Balancer in Linux Kernel
Process Scheduler and Balancer in Linux KernelProcess Scheduler and Balancer in Linux Kernel
Process Scheduler and Balancer in Linux KernelHaifeng Li
 
Writing Reusable Web Components with jQuery and jQuery UI
Writing Reusable Web Components with jQuery and jQuery UIWriting Reusable Web Components with jQuery and jQuery UI
Writing Reusable Web Components with jQuery and jQuery UIYnon Perek
 

What's hot (20)

Software design principles
Software design principlesSoftware design principles
Software design principles
 
Class 11 - MAINTENANCE PLANNING AND SCHEDULING_Dr.Adel_.ppt
Class 11 - MAINTENANCE PLANNING AND SCHEDULING_Dr.Adel_.pptClass 11 - MAINTENANCE PLANNING AND SCHEDULING_Dr.Adel_.ppt
Class 11 - MAINTENANCE PLANNING AND SCHEDULING_Dr.Adel_.ppt
 
Real-Time Operating Systems
Real-Time Operating SystemsReal-Time Operating Systems
Real-Time Operating Systems
 
Documenting Software Architectures
Documenting Software ArchitecturesDocumenting Software Architectures
Documenting Software Architectures
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
System call (Fork +Exec)
System call (Fork +Exec)System call (Fork +Exec)
System call (Fork +Exec)
 
Operating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - ArchitecturesOperating Systems 1 (3/12) - Architectures
Operating Systems 1 (3/12) - Architectures
 
Project Scheduling
Project SchedulingProject Scheduling
Project Scheduling
 
Equipment Criticality Analysis
Equipment Criticality AnalysisEquipment Criticality Analysis
Equipment Criticality Analysis
 
Implementing Lightweight Networking
Implementing Lightweight NetworkingImplementing Lightweight Networking
Implementing Lightweight Networking
 
Unit 9 implementing the reliability strategy
Unit 9  implementing the reliability strategyUnit 9  implementing the reliability strategy
Unit 9 implementing the reliability strategy
 
EMC Documentum - xCP 2.x Troubleshooting
EMC Documentum - xCP 2.x TroubleshootingEMC Documentum - xCP 2.x Troubleshooting
EMC Documentum - xCP 2.x Troubleshooting
 
Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)Risk Mitigation, Monitoring and Management Plan (RMMM)
Risk Mitigation, Monitoring and Management Plan (RMMM)
 
Introduction to parallel computing
Introduction to parallel computingIntroduction to parallel computing
Introduction to parallel computing
 
Software Cost Estimation in Software Engineering SE23
Software Cost Estimation in Software Engineering SE23Software Cost Estimation in Software Engineering SE23
Software Cost Estimation in Software Engineering SE23
 
Google File System
Google File SystemGoogle File System
Google File System
 
Progress control
Progress controlProgress control
Progress control
 
EMBEDDED OS
EMBEDDED OSEMBEDDED OS
EMBEDDED OS
 
Process Scheduler and Balancer in Linux Kernel
Process Scheduler and Balancer in Linux KernelProcess Scheduler and Balancer in Linux Kernel
Process Scheduler and Balancer in Linux Kernel
 
Writing Reusable Web Components with jQuery and jQuery UI
Writing Reusable Web Components with jQuery and jQuery UIWriting Reusable Web Components with jQuery and jQuery UI
Writing Reusable Web Components with jQuery and jQuery UI
 

Viewers also liked

EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1PRADEEP
 
Educ6505 assignment 3 taverne
Educ6505 assignment 3 taverneEduc6505 assignment 3 taverne
Educ6505 assignment 3 tavernephil_taverne
 
B.tech admission in idia
B.tech admission in idiaB.tech admission in idia
B.tech admission in idiaEdhole.com
 
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsIntland Software GmbH
 
Reliability And Validity
Reliability And ValidityReliability And Validity
Reliability And ValidityJames Penny
 
Reliability bachman 1990 chapter 6
Reliability bachman 1990 chapter 6Reliability bachman 1990 chapter 6
Reliability bachman 1990 chapter 6ahfameri
 
Mes camp 2012 phuongdoosan general introduction about asme code
Mes camp 2012  phuongdoosan  general introduction about asme codeMes camp 2012  phuongdoosan  general introduction about asme code
Mes camp 2012 phuongdoosan general introduction about asme codeNgọc Trần Đặng Minh
 
1 Reliability and Validity in Physical Therapy Tests
1  Reliability and Validity in Physical Therapy Tests1  Reliability and Validity in Physical Therapy Tests
1 Reliability and Validity in Physical Therapy Testsaebrahim123
 
Reliability in Language Testing
Reliability in Language Testing Reliability in Language Testing
Reliability in Language Testing Seray Tanyer
 
Embedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM ProcessorEmbedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM ProcessorMomenMostafa
 
Non functional requirements. do we really care…?
Non functional requirements. do we really care…?Non functional requirements. do we really care…?
Non functional requirements. do we really care…?OSSCube
 
E post office system
E post office systemE post office system
E post office systemTech_MX
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 

Viewers also liked (20)

EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1EMBEDDED SYSTEMS 1
EMBEDDED SYSTEMS 1
 
Educ6505 assignment 3 taverne
Educ6505 assignment 3 taverneEduc6505 assignment 3 taverne
Educ6505 assignment 3 taverne
 
B.tech admission in idia
B.tech admission in idiaB.tech admission in idia
B.tech admission in idia
 
How to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded SystemsHow to Achieve Functional Safety in Safety-Critical Embedded Systems
How to Achieve Functional Safety in Safety-Critical Embedded Systems
 
Reliability And Validity
Reliability And ValidityReliability And Validity
Reliability And Validity
 
PS19 SQA Presentation
PS19 SQA PresentationPS19 SQA Presentation
PS19 SQA Presentation
 
Reliability bachman 1990 chapter 6
Reliability bachman 1990 chapter 6Reliability bachman 1990 chapter 6
Reliability bachman 1990 chapter 6
 
Week 8 & 9 - Validity and Reliability
Week 8 & 9 - Validity and ReliabilityWeek 8 & 9 - Validity and Reliability
Week 8 & 9 - Validity and Reliability
 
Mes camp 2012 phuongdoosan general introduction about asme code
Mes camp 2012  phuongdoosan  general introduction about asme codeMes camp 2012  phuongdoosan  general introduction about asme code
Mes camp 2012 phuongdoosan general introduction about asme code
 
Project based learning methodologies for Embedded Systems and Intelligent Sys...
Project based learning methodologies for Embedded Systems and Intelligent Sys...Project based learning methodologies for Embedded Systems and Intelligent Sys...
Project based learning methodologies for Embedded Systems and Intelligent Sys...
 
1 Reliability and Validity in Physical Therapy Tests
1  Reliability and Validity in Physical Therapy Tests1  Reliability and Validity in Physical Therapy Tests
1 Reliability and Validity in Physical Therapy Tests
 
Reliability in Language Testing
Reliability in Language Testing Reliability in Language Testing
Reliability in Language Testing
 
Reliability
ReliabilityReliability
Reliability
 
Embedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM ProcessorEmbedded System Practical Workshop using the ARM Processor
Embedded System Practical Workshop using the ARM Processor
 
Non functional requirements. do we really care…?
Non functional requirements. do we really care…?Non functional requirements. do we really care…?
Non functional requirements. do we really care…?
 
E post office system
E post office systemE post office system
E post office system
 
Drive by wire technology
Drive by wire technologyDrive by wire technology
Drive by wire technology
 
Reliability
ReliabilityReliability
Reliability
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Reliability and validity
Reliability and validityReliability and validity
Reliability and validity
 

Similar to Safety-Critical Embedded Systems Course

Thesispresentatie November
Thesispresentatie NovemberThesispresentatie November
Thesispresentatie NovemberRobin De Croon
 
Problem Solving and Programming
Problem Solving and ProgrammingProblem Solving and Programming
Problem Solving and ProgrammingSelvaraj Seerangan
 
Creating a textual domain specific language
Creating a textual domain specific languageCreating a textual domain specific language
Creating a textual domain specific languageVicente García Díaz
 
Craftsmanship in Computational Work
Craftsmanship in Computational WorkCraftsmanship in Computational Work
Craftsmanship in Computational WorkYung-Yu Chen
 
About Microservices, Containers and their Underestimated Impact on Network Pe...
About Microservices, Containers and their Underestimated Impact on Network Pe...About Microservices, Containers and their Underestimated Impact on Network Pe...
About Microservices, Containers and their Underestimated Impact on Network Pe...Nane Kratzke
 
Sustainable Architecture Design
Sustainable Architecture DesignSustainable Architecture Design
Sustainable Architecture DesignKevin Francis
 
Safety-Crtical Embedded Systems
Safety-Crtical Embedded SystemsSafety-Crtical Embedded Systems
Safety-Crtical Embedded Systemseselab
 
Devops syllabus
Devops syllabusDevops syllabus
Devops syllabusLen Bass
 
Creating Web Presentation for Observatory and Planetarium with Topic Maps
Creating Web Presentation for Observatory and Planetarium with Topic MapsCreating Web Presentation for Observatory and Planetarium with Topic Maps
Creating Web Presentation for Observatory and Planetarium with Topic Mapstmra
 
Documenting For Interactive Websites
Documenting For Interactive WebsitesDocumenting For Interactive Websites
Documenting For Interactive WebsitesPatrick Kennedy
 
Eventum Presentation
Eventum PresentationEventum Presentation
Eventum Presentationjoaopmaia
 
Data Science in Production: Technologies That Drive Adoption of Data Science ...
Data Science in Production: Technologies That Drive Adoption of Data Science ...Data Science in Production: Technologies That Drive Adoption of Data Science ...
Data Science in Production: Technologies That Drive Adoption of Data Science ...Nir Yungster
 
CocomoModels MGK .ppt
CocomoModels MGK .pptCocomoModels MGK .ppt
CocomoModels MGK .pptssuser3d1dad3
 
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008Yishay Mor
 
On the fragility of open source software packaging ecosystems
On the fragility of open source software packaging ecosystemsOn the fragility of open source software packaging ecosystems
On the fragility of open source software packaging ecosystemsTom Mens
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performanceJisc
 
The Railpocket Wifi Project Anonymous
The Railpocket Wifi Project AnonymousThe Railpocket Wifi Project Anonymous
The Railpocket Wifi Project Anonymouskielegat
 
Between Cocoa and Cocoa Touch: A Comparative Introduction
Between Cocoa and Cocoa Touch: A Comparative IntroductionBetween Cocoa and Cocoa Touch: A Comparative Introduction
Between Cocoa and Cocoa Touch: A Comparative Introductionlukhnos
 
What the cloud has to do with a burning house?
What the cloud has to do with a burning house?What the cloud has to do with a burning house?
What the cloud has to do with a burning house?Nane Kratzke
 

Similar to Safety-Critical Embedded Systems Course (20)

Thesispresentatie November
Thesispresentatie NovemberThesispresentatie November
Thesispresentatie November
 
Problem Solving and Programming
Problem Solving and ProgrammingProblem Solving and Programming
Problem Solving and Programming
 
Creating a textual domain specific language
Creating a textual domain specific languageCreating a textual domain specific language
Creating a textual domain specific language
 
Craftsmanship in Computational Work
Craftsmanship in Computational WorkCraftsmanship in Computational Work
Craftsmanship in Computational Work
 
About Microservices, Containers and their Underestimated Impact on Network Pe...
About Microservices, Containers and their Underestimated Impact on Network Pe...About Microservices, Containers and their Underestimated Impact on Network Pe...
About Microservices, Containers and their Underestimated Impact on Network Pe...
 
Sustainable Architecture Design
Sustainable Architecture DesignSustainable Architecture Design
Sustainable Architecture Design
 
Safety-Crtical Embedded Systems
Safety-Crtical Embedded SystemsSafety-Crtical Embedded Systems
Safety-Crtical Embedded Systems
 
Devops syllabus
Devops syllabusDevops syllabus
Devops syllabus
 
Creating Web Presentation for Observatory and Planetarium with Topic Maps
Creating Web Presentation for Observatory and Planetarium with Topic MapsCreating Web Presentation for Observatory and Planetarium with Topic Maps
Creating Web Presentation for Observatory and Planetarium with Topic Maps
 
Documenting For Interactive Websites
Documenting For Interactive WebsitesDocumenting For Interactive Websites
Documenting For Interactive Websites
 
Eventum Presentation
Eventum PresentationEventum Presentation
Eventum Presentation
 
Data Science in Production: Technologies That Drive Adoption of Data Science ...
Data Science in Production: Technologies That Drive Adoption of Data Science ...Data Science in Production: Technologies That Drive Adoption of Data Science ...
Data Science in Production: Technologies That Drive Adoption of Data Science ...
 
CocomoModels MGK .ppt
CocomoModels MGK .pptCocomoModels MGK .ppt
CocomoModels MGK .ppt
 
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008
PLaNet talk @ LKL Knowledge Seminar, 30 Jan, 2008
 
On the fragility of open source software packaging ecosystems
On the fragility of open source software packaging ecosystemsOn the fragility of open source software packaging ecosystems
On the fragility of open source software packaging ecosystems
 
Challenges in end-to-end performance
Challenges in end-to-end performanceChallenges in end-to-end performance
Challenges in end-to-end performance
 
The Railpocket Wifi Project Anonymous
The Railpocket Wifi Project AnonymousThe Railpocket Wifi Project Anonymous
The Railpocket Wifi Project Anonymous
 
computer programming C++
computer  programming C++computer  programming C++
computer programming C++
 
Between Cocoa and Cocoa Touch: A Comparative Introduction
Between Cocoa and Cocoa Touch: A Comparative IntroductionBetween Cocoa and Cocoa Touch: A Comparative Introduction
Between Cocoa and Cocoa Touch: A Comparative Introduction
 
What the cloud has to do with a burning house?
What the cloud has to do with a burning house?What the cloud has to do with a burning house?
What the cloud has to do with a burning house?
 

Recently uploaded

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 

Recently uploaded (20)

Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 

Safety-Critical Embedded Systems Course

  • 1. 02229: Safety-Critical Embedded Systems Lecture 1: Introduction Paul.Pop@imm.dtu.dk
  • 2. Lecture outline • Course information – Examination: project • Embedded systems – Non-functional requirements • Real-time systems – Hard vs. soft • Safety-critical systems – Dependability attributes • Example application area – Automotive electronics Lecture 1/2
  • 3. Course information • Contact – Paul Pop, course leader and examiner • Email: paul.pop@imm.dtu.dk • Phone: 4525 3732 • Office: building 322, office 228 • Webpage – CampusNet – http://eselab.imm.dtu.dk/cgi-bin/wiki.cgi/SCESCourse/Home • FeedBack [Edit this page] – anonymously add feedback about the course Lecture 1/3
  • 4. Course information, cont. • Lectures – Language: English – 12 lectures + 1 invited lecture (from industry) – Lecture notes • available on CampusNet as a PDF file the day before – Reading materials • available on CampusNet as PDFs the day before • Examination – Project: 70% report + 20% presentation + 10% opposition • 5 ECTS points Lecture 1/4
  • 5. Course information, cont. • Course literature (available as PDFs via CampusNet or DTV) 1. Laprie et al., Fundamental Concepts of Dependability 2. Barry W. Johnson, An Introduction to the Design and Analysis of Fault-Tolerant Systems 3. Neil Storey, Safety Critical Computer Systems, Addison Wesley (selected chapters) 4. Hermann Kopetz, Real-time Systems: Design Principles for Distributed Embedded Applications, Springer (selected chapters) 5. Giorgio Buttazzo, Hard Real-time Computing Systems: Predictable Scheduling Algorithms and Applications, Springer (selected chapters) Lecture 1/5
  • 6. Project, cont. • Topic categories 1. Literature survey • See the “references” and “further reading” in the course literature 2. Tool case-study • Select a commercial or research tool and use it on a case-study 3. Software implementation • Implement a technique, e.g., error detection or fault-tolerance technique – Suggested topics on the course website: http://eselab.imm.dtu.dk/cgi-bin/wiki.cgi/SCESCourse/Project Lecture 1/6
  • 7. Project, cont. • Examples of last year’s projects – Worst case execution time analysis— Theory and application – Scheduling Anomalies – A Fault-Tolerant Scheduling Algorithm for Real-Time Period Tasks with Possible Software Faults – Mars Climate Orbiter failure – ARIANE 5: Flight 501 Failure – London Ambulance Service – Hamming Correcting Code Implementation in Transmitting System – Application of a Fault Tolerance to a Wind Turbine Lecture 1/7
  • 8. Project, cont. • Milestones – Sept. 21: Group registration and topic selection • Email to paul.pop@imm.dtu.dk – Oct. 26: Project report draft • Upload draft to CampusNet – Nov. 23: Report submission • Upload final report to CampusNet – Dec. 4: Project presentation and oral opposition • Upload presentation to CampusNet Lecture 1/8
  • 9. Project, cont. • Project registration – E-mail Paul Pop, paul.pop@imm.dtu.dk Deadline: • Subject: 02229 registration Sept. 21 • Body: – Name student #1, CPR number, e-mail – Name student #2, CPR number, e-mail – Name student #3, CPR number, e-mail – Project title – Project details Project approval • Notes – Groups of up to 3 persons – Contact me if you can’t find project partners Lecture 1/9
  • 10. Project presentation & opposition • Presentation of project Deadline: – 15 min. + 5 min. questions Dec. 5 • Oral opposition – Read the draft report – Prepare at least one question per group member • Ask the questions after the presentation Lecture 1/10
  • 11. Project deliverables 1. Literature survey 2. Tool case-study – Written report – Case-study files • ~5000 words – Report • Structure • Document your work – Title, authors – Abstract 3. Software implementation – Introduction – Body – Source code with comments – Conclusions – Report – References • Document your work Deadline for draft: Deadline for final version Oct. 26 Nov. 23 Lecture 1/11
  • 12. Project: important dates September 2007 October 2007 Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa 2 34567 8 123 45 6 9 10 11 12 13 14 15 7 8 9 10 11 12 13 16 17 18 19 20 21 22 14 15 16 17 18 19 20 23 24 25 26 27 28 29 Upload Register 21 22 23 24 25 26 27 draft 30 28 29 30 31 November 2007 December 2007 Su Mo Tu We Th Fr Sa Su Mo Tu We Th Fr Sa 12 3 1 4 56789 10 2345678 Upload Present & final report oppose 11 12 13 14 15 16 17 9 10 11 12 13 14 15 18 19 20 21 22 23 24 16 17 18 19 20 21 22 25 26 27 28 29 30 23 24 25 26 27 28 29 Lecture 1/12
  • 13. Embedded systems • Computing systems are everywhere • Most of us think of “desktop” computers – PC’s – Laptops – Mainframes – Servers • But there’s another type of computing system – Far more common... Lecture 1/13
  • 14. Embedded systems, cont. • Embedded computing systems Computers are in here... – Computing systems embedded within electronic devices and here... – Hard to define. Nearly any computing and even here... system other than a desktop computer – Billions of units produced yearly, versus millions of desktop units – Perhaps 50 per household and per automobile Lots more of these, though they cost a lot less each. Lecture 1/14
  • 15. A “short list” of embedded systems Anti-lock brakes Modems Auto-focus cameras MPEG decoders Automatic teller machines Network cards Automatic toll systems Network switches/routers Automatic transmission On-board navigation Avionic systems Pagers Battery chargers Photocopiers Camcorders Point-of-sale systems Cell phones Portable video games Cell-phone base stations Printers Cordless phones Satellite phones Cruise control Scanners Curbside check-in systems Smart ovens/dishwashers Digital cameras Speech recognizers Disk drives Stereo systems Electronic card readers Teleconferencing systems Electronic instruments Televisions Electronic toys/games Temperature controllers Factory control Theft tracking systems Fax machines TV set-top boxes Fingerprint identifiers VCR’s, DVD players Home security systems Video game consoles Life-support systems Video phones Medical testing systems Washers and dryers Our daily lives depend on embedded systems Lecture 1/15
  • 16. General-purpose vs. special-purpose General-purpose systems Special-purpose systems Microprocessor market shares 99% 1% Lecture 1/16
  • 17. What is an embedded system? • Definition – an embedded system special-purpose computer system, part of a larger system which it controls. • Notes – A computer is used in such devices primarily as a means to simplify the system design and to provide flexibility. – Often the user of the device is not even aware that a computer is present. Lecture 1/17
  • 18. Characteristics of embedded systems • Single-functioned – Dedicated to perform a single function • Complex functionality – Often have to run sophisticated algorithms or multiple algorithms. • Cell phone, laser printer. • Tightly-constrained – Low cost, low power, small, fast, etc. • Reactive and real-time – Continually reacts to changes in the system’s environment – Must compute certain results in real-time without delay • Safety-critical – Must not endanger human life and the environment Lecture 1/18
  • 19. Functional vs. non-functional requirements • Functional requirements – output as a function of input • Non-functional requirements: – Time required to compute output – Reliability, availability, integrity, maintainability, dependability – Size, weight, power consumption, etc. Lecture 1/19
  • 20. Real-time systems • Time – The correctness of the system behavior depends not only on the logical results of the computations, but also on the time at which these results are produced. • Real – The reaction to the outside events must occur during their evolution. The system time must be measured using the same time scale used for measuring the time in the controlled environment. Lecture 1/20
  • 23. Hard vs. soft • Definitions – A real-time task is said to be hard if missing its deadline may cause catastrophic consequences on the environment under control. – A real-time task is said to be soft if meeting its deadline is desirable for performance reasons, but missing its deadline does not cause serious damage to the environment and does not jeopardize correct system behaviour. • Definition – A real-time system that is able to handle hard real-time tasks is called a hard real-time system. Lecture 1/23
  • 24. Hard vs. soft, cont. • Examples of hard activities – Sensory data acquisition – Detection of critical conditions – Actuator serving – Low-level control of critical system components – Planning sensory-motor actions that tightly interact with the environment • Examples of soft activities – The command interpreter of the user interface – Handling input data from the keyboard – Displaying messages on the screen – Representation of system state variables – Graphical activities – Saving report data Lecture 1/24
  • 25. Murphy’s laws • Murphy’s general law – “If something can go wrong, it will go wrong” Major Edward A. Murphy, Jr., US Air Force, 1949 • Murphy’s constant – Damage to an object is proportional to its value. • Troutman postulates – Any software bug will tend to maximize the damage. – The worst software bug will be discovered six months after the filed test. • Green’s law – If the system is designed to be tolerant to a set of faults, there will always exist an idiot so skilled to cause a nontolerated fault. • Corollary – Dummies are always more skilled than measures taken to keep them from harm. • Johnson’s first law – If a system stops working, it will do it a the worst possible time. • Sodd’s second law – Sooner or later, the worst possible combination of circumstances will happen. • Corollary – A system must always be designed to resist the worst possible combination of circumstances Lecture 1/25
  • 26. Genesis Space Capsule • Genesis capsule – Cost: $260 million – Collecting samples of the solar wind over 3 years period – Crashed in Sept 2004 due to the failure of the parachutes • Reason of crash – The accelerometers were all installed backwards. The craft’s autopilot never got a clue that it had hit an atmosphere and that hard ground was just ahead. Lecture 1/26
  • 27. Mars Orbiter • One of the Mars Orbiter probes crashed into the planet in 1999. • It did turn out that engineers who built the Mars Climate Orbiter had provided a data table in “pound-force” rather than Newtons, the metric measure of force. • NASA flight controllers at the Jet Propulsion Laboratory in Pasadena, Calif., had used the faulty table for their navigation calculations during the long trip from Earth to Mars. Lecture 1/27
  • 28. Lockheed Martin Titan 4 • In 1998, a LockMart Titan 4 booster carrying a $1 billion LockMart Vortex-class spy satellite pitched sideways and exploded 40 seconds after liftoff from Cape Canaveral, Fla. • Reason: fried wiring that apparently had not been inspected. The guidance systems were without power for a fraction of a second. Lecture 1/28
  • 29. Therac-25 • Therac-25: – the most serious computer-related accidents to date (at least nonmilitary and admitted) – machine for radiation therapy (treating cancer) – between June 1985 and January 1987 (at least) six patients received severe overdoses (two died shortly afterward, two might have died but died because of cancer, the other two had permanent disabilities) – scanning magnets are used to spread the beam and vary the beam energy – dual-mode: electron beams for surface tumors, X-ray for deep tumors Lecture 1/29
  • 31. Denver Airport • Denver International Airport, Colorado: intelligent luggage transportation system with 4000 “Telecars”, 35km rails, controlled by a network of 100 computers with 5000 sensors, 400 radio antennas, and 56 barcode readers. Price: $186 million (BAE Automated Systems). • Due to SW problems about one year delay which costs $1.1 million per day (1993). • Abondoned in 2005 to save $1 million per month on maintenance Lecture 1/31
  • 32. Reliability • Definition – Reliability is the probability of a component, or system, functioning correctly over a period of time under a given set of operating conditions. • Notes – “Function correctly” means: • Operating as defined within its specification • Was functioning correctly at the beginning of the period • No maintenance is carried out during the period – Reliability varies with time • The probability of operating correctly over one year is much lower than over a month – Important where continuous uninterrupted operation is essential • Flight-critical aircraft system Lecture 1/32
  • 33. Availability • Definition – The availability of a system is the probability that the system will be functioning correctly at any given time. • Notes – Relates to a particular point in time, not period as reliability – Average availability • Example: during 1000 hours the system is out of operation for 1 hour, the average availability is 900/1000 = 0.999 – Important • High availability systems: telephone exchanges have just a few hours of “downtime” during their life-time • Safety-critical systems: a nuclear reactor shutdown system is employed infrequently, but it has to work correctly when needed Lecture 1/33
  • 34. Failsafe operation • Definition – A system is failsafe if it adopts “safe” output states in the event of failure and inability to recover. • Notes – Example of failsafe operation • Railway signaling system: failsafe corresponds to all the lights on red – Many systems are not failsafe • Fly-by-wire system in an aircraft: the only safe state is on the ground Lecture 1/34
  • 35. System integrity • Definition – The integrity of a system is its ability to detect faults in its own operation and to inform the human operator. • Notes – The system will enter a failsafe state if faults are detected – High-integrity system • Failure could result large financial loss • Examples: telephone exchanges, communication satellites Lecture 1/35
  • 36. Safety-critical systems • Definitions – Safety is a property of a system that will not endanger human life or the environment. – A safety-related system is one by which the safety of the equipment or plant is ensured. • Safety-critical system is: – Safety-related system, or – High-integrity system Lecture 1/36
  • 37. Developing safety-critical systems Requirements Completed system Hazard and Hazard and Certification Certification risk analysis risk analysis System System Specification Specification validation validation Architectural System Architectural System design verification design verification System System Module Module integration integration design design and testing and testing Module Module construction construction and testing and testing Lecture 1/37
  • 38. Preliminary topics • Introduction • Fundamental concepts: faults, types, models; error detection • Dependability analysis • Fault-tolerance, techniques • Hazard and risk analysis • Scheduling, fundamental concepts • Time, clock synchronization • Periodic scheduling, schedulability analysis • System architecture and design Lecture 1/38
  • 39. Example application area: automotive electronics • What is “automotive electronics”? – Vehicle functions implemented with electronics • Body electronics • System electronics (chassis, engine) • Information/entertainment Lecture 1/39
  • 40. Automotive electronics market Cost of Electronics / Car ($) 1400 1200 1000 800 600 400 200 0 1998 1999 2000 2001 2002 2003 2004 2005 Market 8.9 10.5 13.1 14.1 15.8 17.4 19.3 21.0 ($billions) More than 25% of the total cost of a car is electronics Lecture 1/40
  • 41. Typical automotive application Driver Switches Instruments Discrete Modes Reference Controller Actuators Continuous Sensors Physical environment (vehicle) Lecture 1/41
  • 42. Non-critical: body and Infotainment Lecture 1/42