SlideShare a Scribd company logo
Components in Real Time
Systems
Under the Guidance of
Prof. Neha
By
Himanshu Mann 2k11/Se/033
Mayur Gupta 2k11/Se/039
Mohit Garg 2k11/Se/041
Ravi Kumar 2k11/Se/056
Ravi Gupta 2k11/Se/058
What are real time system?
 Real time systems are those where there is tight timing
constraints.Real-time programs must guarantee
response within strict time constraints, often referred to
as "deadlines"
 Real-time responses are often in the order of milliseconds
or microseconds.
 The correct behavior of these systems depends not only
on the logical results of the computation but also at
which time the results are produced , If the system
delivers the correct answer, but after a certain deadline,
it could be regarded as having failed.
Continued…..
Asmedical control equipment
-Pacemaker
Air bags
Vehicle Control Systems
What are Components?
 A software component is a software package, a web service,
a web resource, or a module that encapsulates a set of
related functions.
 All system processes are placed into separate components
so that component are modular and cohesive.
 components communicate with each other via interfaces.
 Reusable components are those components which can be
used in several different systems .These are like parts of a car
as one part can be placed in several different cars same way
reusable components can be used in different systems
Applying component-based software
engineering (CBSE) in real-time systems.
 Designing reusable real-time components is more complex
than designing reusable non-real-time components.
 The development of standard real-time components which
can be run on different H/W platforms is complicated by the
components having different timing characteristics on
different platforms. Thus a component must be adapted and
re-verified for each HW-platform to which it is ported,
especially in safety-critical systems.
Designing component based real-time system
 Here we present a method for system development using real-time
components.
 It is a standard top-down development process to which timing and other real-
time specific constraints have been added and precisely defined (or more
correctly, have been predicted) at design time.
 the system is designed not only in accordance with the system requirements,
but also with respect to existing components.
 This concept assumes that a library of well-defined real-time components is
available.
 The development process requires a system specification, obtained by
analyzing the customer's requirements.
 We assume that the specification is consistent and correct, in order to simplify
the presentation of the method.
The development process
 The development process with real-time components is divided into several stages, as
depicted in following Figure .
The development process (contd.)
I. Top-level design
 The first stage of the development process involves de-composition of the system into manageable
components.
 We need to determine the interfaces between them and to specify the functionality and safety issues
associated with each component.
 Parallel with the decomposition, we browse the component library to identify a set of candidate
components, (i.e., components which might be useful in our design).
II. Detailed design
 A detailed component design is performed, by selecting components to be used in each component
from the candidate set.
 In a perfect world, we could design our system by only using the library components. In a more realistic
scenario we must identify missing components that we need according to our design but which are not
available in the component library.
 A time budget is assigned to each component. A component is required to complete its execution
within its time budget.
III. Scheduling
 At this point we need to check if the system's temporal requirements can be fulfilled,
assuming time budgets assigned in the detailed design stage. In other words, we need
to make a schedulability analysis of the system based on temporal requirements of
each component.
 It may be sufficient to revise the detailed design by reengineering the temporal
requirements or by simply replacing components with others from the candidate set.
 An alternative is to return to top-level design and either select others from the library or
specify new components.
 During the scheduling we must check that the system is properly integrated;
component interfaces are to be checked to ensure that input ports are connected and
that their types match. Further, if the specified system passes the test, besides the
schedules, the infrastructure for communication between components will be
generated.
IV. WCET verification
 Even if the component supplier provides a specification of the WCET, it must be verified
on the target platform.
 We can verify the WCET by running test cases developed by the
 component designer and measuring the execution time.
V. Implementation of new components
 New components; those not already in the library must be implemented.
(discussed later)
VI. System build and test
 Finally, we build the system using old and new components.
 We must verify the functional and temporal properties of the system obtained.
 If the verification test fails, we must return to the appropriate stage of the
development process and correct the error.
 When selecting components we examine the attributes available in the library.
 A component library containing real-time components should provide the
following in addition to component identification, functional description,
interface, component binary and test cases :
 Memory requirements
 WCET test cases - Test cases which indicate the WCET of the components
WCET for a particular processor family.
 Dependencies – Describing dependencies on other components.
 Environment assumptions - Assumptions about the environment in which the
component operates, for example the processor family.
Component Library
WCET(Worst case execution time) test cases
 Since the timing behavior of components depends on both the processor
and the memory organization, it is necessary to re-test the WCET for each
target different from that specified.
 The process of finding the WCET can be a difficult and tedious process,
especially if complete information or the source code is not available.
 Time behavior shown as a function of input parameters as shown in the
figure. The execution time shows different values for the different input sub-
domains.
Continued…….
 In many cases, however, the component developer can derive WCET test
cases by combining source code analysis with the test execution.
 The exact values of the execution time are not as important as the
maximum value within input intervals, as depicted in Figure
Composition of components
 As mentioned earlier a component consists of one or more tasks. Several
components can be composed into a more complex one. This is achieved
by defining an interface for the new component and connecting the input
and output ports of its building blocks, as shown in Fig
 his new kind of component is also stored in the component library, in much
the same way as the other components.
Continued……
 The WCET of a composed component cannot be computed since its parts
 may be executing with different periods. Instead we propose that end-to-
end deadlines should be specified for the input to and output from the
component. End-to-end deadlines are set such that the system
requirements are fulfilled in the same way as the time budgets are set.
 Furthermore, we specify virtual timing attributes (period, release time and
deadline) of the composed component, which are used to compute the
timing attributes of sub-components.
 For example, if the virtual period is set to P, then the period of a sub-
component A should be fA * P and the period of B is fB * P, where fA and fB
are constants for the composed component,which are stored in the
component library.
Case Study: RT components in Rubus OS
 Currently there are not so many real-time operating systems that have
some concept of components. The Rubus operating system is one of those.
 Rubus is hybrid operating system, in the sense that it supports both pre-
emptive static scheduling(pre-run time) and fixed priority scheduling(run-
time), also referred to as the red and blue parts of Rubus. The red part deals
only with hard real-time and the blue part only with soft. Here we focus on
the red part only.
 It was first designed for the qulsar processors that works on the field
of Telecommunications Electronics and Automotive.
 Each task in the red part is periodic and has a set of input and output ports,
which are used for unbuffered communication with other tasks. This set also
defines a task’s interface.
Continued…..
 Each tasks has an entry function that
which as arguments have input and
output ports. The value of the input
ports are guaranteed not to change
during the execution of the current
instance of the task, in order to avoid
inconsistency problems. The entry
function is reinvoked by the kernel
periodically.
Timing Requirements and logic functions
 The timing requirements are specified by release-time, deadline, WCET and
period. Besides the timing requirements, it is also possible to specify ordering
of tasks using precedence relations, and mutual exclusion.
 For example the depicted task in is required to execute before the
outputBrakeValues task, i.e., task BrakeLeftRight precedes task
outputBrakeValues. A system is composed of a set of components/tasks for
which the input and output ports have been connected, as depicted in
Figure.
Scope for Development:Extension for CBSE
Let’s see what is missing in Rubus and its supporting tools to make them more
suitable for component based development :-
 Firstly, there is currently no support for creating composite components, i.e.,
components that are built of other components
 Secondly, some tool is needed to manage the available components and
their associated source files, so that components can be fetched from a
library and instantiated into new designs
 Thirdly, there is a lack of real-time tools like: WCET analysis
Reuse of RT Components
 Design for reuse means that a component from a current project should
require a minimum of modification for use in a future project.
 Abstraction is extremely valuable for reuse.
 The objective should be to minimize the difference between the
component's selected and ideal degrees of abstraction. The smaller the
variance from the ideal level of abstraction, the more frequently a
component will be reused.
Important factors of a reusable component
 There are other important factors which designers of reusable components
must consider, they must not only anticipate future design contexts and
future reuses. They must consider :
 What users need and do not need to know about a reusable design, or
how to emphasize relevant information and conceal that which is
irrelevant.
 To inculcate what is expected from potential users, and what are their
expectations about their usable design.
 To allow users to instantiate only relevant parts of components. For
example, if a user wants to use only some of the available ports of a
component, then only the relevant parts should be instantiated.
Independence
No designer can actually anticipate all future design contexts, when and in
which environment the component will be reused. This means that a reusable
component should depend as little as possible on its environment and be able
to perform sufficient self-checking.In other words, it should be as independent
as possible. Frequency of reuse and utility increase with independence. Thus
independence should be another main area of concern when designing
reusable components.
Development criteria’s
 An interesting observation about efficient reuse of real-time components,
made by engineers at Siemens labs is that, as a rule of thumb, the
overhead cost of developing a reusable component, including design plus
documentation, is recovered after the fifth reuse.That is the amount of time
taken after it reaches a stable state
 Designing reusable components for embedded real-time systems is even
more complicated due to memory and execution time restrictions.
Furthermore, real-time components must be much more carefully tested
because of their safety-critical nature
Online Upgrades of Components
 An online upgrade of components is available in case a component is not
compatible.
 Replacing a component in a safety critical system can result in
catastrophic consequences if the new component is faulty. Complete
testing of new components is often not economically feasible or even
possible, e.g., shutting down a process plant with high demands on
availability can result in big financial losses.
 To overcome these problems it is proposed that the new component
should be monitored to check that its output is within valid ranges. If it is
not, then the original component will resume control of the system.
Summary
 Basic definition of RT systems and components
 Development process
 Composition of components and library
 Analysis of components
 Case study
 Reusable Components
Conclusion
 Major challenges faced are
 Guarantee the temporal behavior i.e the deadline
 Coherence of each component with another
 Development process must have space for time analysis
and high level analysis on architectural level
Thank
You

More Related Content

What's hot

Depth Buffer Method
Depth Buffer MethodDepth Buffer Method
Depth Buffer Method
Ummiya Mohammedi
 
Kevin Knight, Elaine Rich, B. Nair - Artificial Intelligence (2010, Tata McGr...
Kevin Knight, Elaine Rich, B. Nair - Artificial Intelligence (2010, Tata McGr...Kevin Knight, Elaine Rich, B. Nair - Artificial Intelligence (2010, Tata McGr...
Kevin Knight, Elaine Rich, B. Nair - Artificial Intelligence (2010, Tata McGr...
JayaramB11
 
Webinar : P, NP, NP-Hard , NP - Complete problems
Webinar : P, NP, NP-Hard , NP - Complete problems Webinar : P, NP, NP-Hard , NP - Complete problems
Webinar : P, NP, NP-Hard , NP - Complete problems
Ziyauddin Shaik
 
Query Decomposition and data localization
Query Decomposition and data localization Query Decomposition and data localization
Query Decomposition and data localization
Hafiz faiz
 
Embedded system custom single purpose processors
Embedded system custom single  purpose processorsEmbedded system custom single  purpose processors
Embedded system custom single purpose processorsAiswaryadevi Jaganmohan
 
Algorithm chapter 10
Algorithm chapter 10Algorithm chapter 10
Algorithm chapter 10chidabdu
 
backtracking algorithms of ada
backtracking algorithms of adabacktracking algorithms of ada
backtracking algorithms of ada
Sahil Kumar
 
Lecture 3 parallel programming platforms
Lecture 3   parallel programming platformsLecture 3   parallel programming platforms
Lecture 3 parallel programming platforms
Vajira Thambawita
 
Mathematical Analysis of Recursive Algorithm.
Mathematical Analysis of Recursive Algorithm.Mathematical Analysis of Recursive Algorithm.
Mathematical Analysis of Recursive Algorithm.
mohanrathod18
 
Real-Time Scheduling
Real-Time SchedulingReal-Time Scheduling
Real-Time Scheduling
sathish sak
 
Addressing sequencing
Addressing sequencingAddressing sequencing
Addressing sequencing
rajshreemuthiah
 
Back face detection
Back face detectionBack face detection
Back face detection
Pooja Dixit
 
Instruction level parallelism
Instruction level parallelismInstruction level parallelism
Instruction level parallelism
deviyasharwin
 
data structures- back tracking
data structures- back trackingdata structures- back tracking
data structures- back tracking
Abinaya B
 
Vector clock algorithm
Vector clock algorithmVector clock algorithm
Vector clock algorithm
S. Anbu
 
Elements of dynamic programming
Elements of dynamic programmingElements of dynamic programming
Elements of dynamic programming
Tafhim Islam
 
IoT-A ARM
IoT-A ARMIoT-A ARM
IoT-A ARM
Yu-Ting Chen
 
Seed filling algorithm
Seed filling algorithmSeed filling algorithm
Seed filling algorithm
Mani Kanth
 
Algorithm Using Divide And Conquer
Algorithm Using Divide And ConquerAlgorithm Using Divide And Conquer
Algorithm Using Divide And Conquer
UrviBhalani2
 
Pipelining & All Hazards Solution
Pipelining  & All Hazards SolutionPipelining  & All Hazards Solution
Pipelining & All Hazards Solution
.AIR UNIVERSITY ISLAMABAD
 

What's hot (20)

Depth Buffer Method
Depth Buffer MethodDepth Buffer Method
Depth Buffer Method
 
Kevin Knight, Elaine Rich, B. Nair - Artificial Intelligence (2010, Tata McGr...
Kevin Knight, Elaine Rich, B. Nair - Artificial Intelligence (2010, Tata McGr...Kevin Knight, Elaine Rich, B. Nair - Artificial Intelligence (2010, Tata McGr...
Kevin Knight, Elaine Rich, B. Nair - Artificial Intelligence (2010, Tata McGr...
 
Webinar : P, NP, NP-Hard , NP - Complete problems
Webinar : P, NP, NP-Hard , NP - Complete problems Webinar : P, NP, NP-Hard , NP - Complete problems
Webinar : P, NP, NP-Hard , NP - Complete problems
 
Query Decomposition and data localization
Query Decomposition and data localization Query Decomposition and data localization
Query Decomposition and data localization
 
Embedded system custom single purpose processors
Embedded system custom single  purpose processorsEmbedded system custom single  purpose processors
Embedded system custom single purpose processors
 
Algorithm chapter 10
Algorithm chapter 10Algorithm chapter 10
Algorithm chapter 10
 
backtracking algorithms of ada
backtracking algorithms of adabacktracking algorithms of ada
backtracking algorithms of ada
 
Lecture 3 parallel programming platforms
Lecture 3   parallel programming platformsLecture 3   parallel programming platforms
Lecture 3 parallel programming platforms
 
Mathematical Analysis of Recursive Algorithm.
Mathematical Analysis of Recursive Algorithm.Mathematical Analysis of Recursive Algorithm.
Mathematical Analysis of Recursive Algorithm.
 
Real-Time Scheduling
Real-Time SchedulingReal-Time Scheduling
Real-Time Scheduling
 
Addressing sequencing
Addressing sequencingAddressing sequencing
Addressing sequencing
 
Back face detection
Back face detectionBack face detection
Back face detection
 
Instruction level parallelism
Instruction level parallelismInstruction level parallelism
Instruction level parallelism
 
data structures- back tracking
data structures- back trackingdata structures- back tracking
data structures- back tracking
 
Vector clock algorithm
Vector clock algorithmVector clock algorithm
Vector clock algorithm
 
Elements of dynamic programming
Elements of dynamic programmingElements of dynamic programming
Elements of dynamic programming
 
IoT-A ARM
IoT-A ARMIoT-A ARM
IoT-A ARM
 
Seed filling algorithm
Seed filling algorithmSeed filling algorithm
Seed filling algorithm
 
Algorithm Using Divide And Conquer
Algorithm Using Divide And ConquerAlgorithm Using Divide And Conquer
Algorithm Using Divide And Conquer
 
Pipelining & All Hazards Solution
Pipelining  & All Hazards SolutionPipelining  & All Hazards Solution
Pipelining & All Hazards Solution
 

Viewers also liked

Real Time Operating Systems
Real Time Operating SystemsReal Time Operating Systems
Real Time Operating SystemsRohit Joshi
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating SystemTech_MX
 
Real time system slides
Real time system slidesReal time system slides
Real time system slides
Vijay Kakani
 
Ch21 real time software engineering
Ch21 real time software engineeringCh21 real time software engineering
Ch21 real time software engineering
software-engineering-book
 
RTOS - Real Time Operating Systems
RTOS - Real Time Operating SystemsRTOS - Real Time Operating Systems
RTOS - Real Time Operating Systems
Emertxe Information Technologies Pvt Ltd
 
droidcon 2012: Merodroid – A Search-Engine for Android Software Components, M...
droidcon 2012: Merodroid – A Search-Engine for Android Software Components, M...droidcon 2012: Merodroid – A Search-Engine for Android Software Components, M...
droidcon 2012: Merodroid – A Search-Engine for Android Software Components, M...
Droidcon Berlin
 
Microcontroller lec 3
Microcontroller  lec 3Microcontroller  lec 3
Microcontroller lec 3
Ibrahim Reda
 
Real-Time Operating Systems
Real-Time Operating SystemsReal-Time Operating Systems
Real-Time Operating Systems
Praveen Penumathsa
 
Memory allocation for real time operating system
Memory allocation for real time operating systemMemory allocation for real time operating system
Memory allocation for real time operating systemAsma'a Lafi
 
Multiprocessor architecture and programming
Multiprocessor architecture and programmingMultiprocessor architecture and programming
Multiprocessor architecture and programming
Raul Goycoolea Seoane
 
Computer Hardware - Platforms and Technologies
Computer Hardware - Platforms and TechnologiesComputer Hardware - Platforms and Technologies
Computer Hardware - Platforms and Technologieselectricgeisha
 
Embedded Platform Architecture - I
Embedded Platform Architecture - IEmbedded Platform Architecture - I
Embedded Platform Architecture - I
Muhammad Asif
 
Debugging
DebuggingDebugging
REAL TIME OPERATING SYSTEM
REAL TIME OPERATING SYSTEMREAL TIME OPERATING SYSTEM
REAL TIME OPERATING SYSTEMprakrutijsh
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9Ian Sommerville
 
Debugging
DebuggingDebugging
Component based software engineering
Component based software engineeringComponent based software engineering
Component based software engineering
Charotar University Of Science And Technology,Gujrat
 
Ese 2008 RTSC Draft1
Ese 2008 RTSC Draft1Ese 2008 RTSC Draft1
Ese 2008 RTSC Draft1
drusso
 
Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
sommerville-videos
 
Introduction to embedded system design
Introduction to embedded system designIntroduction to embedded system design
Introduction to embedded system design
Mukesh Bansal
 

Viewers also liked (20)

Real Time Operating Systems
Real Time Operating SystemsReal Time Operating Systems
Real Time Operating Systems
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating System
 
Real time system slides
Real time system slidesReal time system slides
Real time system slides
 
Ch21 real time software engineering
Ch21 real time software engineeringCh21 real time software engineering
Ch21 real time software engineering
 
RTOS - Real Time Operating Systems
RTOS - Real Time Operating SystemsRTOS - Real Time Operating Systems
RTOS - Real Time Operating Systems
 
droidcon 2012: Merodroid – A Search-Engine for Android Software Components, M...
droidcon 2012: Merodroid – A Search-Engine for Android Software Components, M...droidcon 2012: Merodroid – A Search-Engine for Android Software Components, M...
droidcon 2012: Merodroid – A Search-Engine for Android Software Components, M...
 
Microcontroller lec 3
Microcontroller  lec 3Microcontroller  lec 3
Microcontroller lec 3
 
Real-Time Operating Systems
Real-Time Operating SystemsReal-Time Operating Systems
Real-Time Operating Systems
 
Memory allocation for real time operating system
Memory allocation for real time operating systemMemory allocation for real time operating system
Memory allocation for real time operating system
 
Multiprocessor architecture and programming
Multiprocessor architecture and programmingMultiprocessor architecture and programming
Multiprocessor architecture and programming
 
Computer Hardware - Platforms and Technologies
Computer Hardware - Platforms and TechnologiesComputer Hardware - Platforms and Technologies
Computer Hardware - Platforms and Technologies
 
Embedded Platform Architecture - I
Embedded Platform Architecture - IEmbedded Platform Architecture - I
Embedded Platform Architecture - I
 
Debugging
DebuggingDebugging
Debugging
 
REAL TIME OPERATING SYSTEM
REAL TIME OPERATING SYSTEMREAL TIME OPERATING SYSTEM
REAL TIME OPERATING SYSTEM
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
Debugging
DebuggingDebugging
Debugging
 
Component based software engineering
Component based software engineeringComponent based software engineering
Component based software engineering
 
Ese 2008 RTSC Draft1
Ese 2008 RTSC Draft1Ese 2008 RTSC Draft1
Ese 2008 RTSC Draft1
 
Architectural patterns for real-time systems
Architectural patterns for real-time systemsArchitectural patterns for real-time systems
Architectural patterns for real-time systems
 
Introduction to embedded system design
Introduction to embedded system designIntroduction to embedded system design
Introduction to embedded system design
 

Similar to Components in real time systems

Runtimeperformanceevaluationofembeddedsoftware 100825224539-phpapp02
Runtimeperformanceevaluationofembeddedsoftware 100825224539-phpapp02Runtimeperformanceevaluationofembeddedsoftware 100825224539-phpapp02
Runtimeperformanceevaluationofembeddedsoftware 100825224539-phpapp02NNfamily
 
Runtime performance evaluation of embedded software
Runtime performance evaluation of embedded softwareRuntime performance evaluation of embedded software
Runtime performance evaluation of embedded softwareMr. Chanuwan
 
Scale and Load Testing of Micro-Service
Scale and Load Testing of Micro-ServiceScale and Load Testing of Micro-Service
Scale and Load Testing of Micro-Service
IRJET Journal
 
System verilog important
System verilog importantSystem verilog important
System verilog important
elumalai7
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
MuhammadTalha436
 
A generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration systemA generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration system
Conference Papers
 
Integrating fault tolerant scheme with feedback control scheduling algorithm ...
Integrating fault tolerant scheme with feedback control scheduling algorithm ...Integrating fault tolerant scheme with feedback control scheduling algorithm ...
Integrating fault tolerant scheme with feedback control scheduling algorithm ...
ijics
 
4213ijsea06
4213ijsea064213ijsea06
4213ijsea06
ijseajournal
 
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
IJSEA
 
Benchmark methods to analyze embedded processors and systems
Benchmark methods to analyze embedded processors and systemsBenchmark methods to analyze embedded processors and systems
Benchmark methods to analyze embedded processors and systems
XMOS
 
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...
ijics
 
ideas.doc
ideas.docideas.doc
ideas.docbutest
 
safety assurence in process control
safety assurence in process controlsafety assurence in process control
safety assurence in process control
Nathiya Vaithi
 
Formal Verification of Distributed Checkpointing Using Event-B
Formal Verification of Distributed Checkpointing Using Event-BFormal Verification of Distributed Checkpointing Using Event-B
Formal Verification of Distributed Checkpointing Using Event-B
ijcsit
 
Block-Chain Oriented Software Testing Approach
Block-Chain Oriented Software Testing ApproachBlock-Chain Oriented Software Testing Approach
Block-Chain Oriented Software Testing Approach
IRJET Journal
 
Qtp interview questions
Qtp interview questionsQtp interview questions
Qtp interview questionsRamu Palanki
 
Qtp interview questions
Qtp interview questionsQtp interview questions
Qtp interview questionsRamu Palanki
 
Traffic Simulator
Traffic SimulatorTraffic Simulator
Traffic Simulator
gystell
 

Similar to Components in real time systems (20)

Runtimeperformanceevaluationofembeddedsoftware 100825224539-phpapp02
Runtimeperformanceevaluationofembeddedsoftware 100825224539-phpapp02Runtimeperformanceevaluationofembeddedsoftware 100825224539-phpapp02
Runtimeperformanceevaluationofembeddedsoftware 100825224539-phpapp02
 
Runtime performance evaluation of embedded software
Runtime performance evaluation of embedded softwareRuntime performance evaluation of embedded software
Runtime performance evaluation of embedded software
 
Scale and Load Testing of Micro-Service
Scale and Load Testing of Micro-ServiceScale and Load Testing of Micro-Service
Scale and Load Testing of Micro-Service
 
System verilog important
System verilog importantSystem verilog important
System verilog important
 
IRJET-V3I7169
IRJET-V3I7169IRJET-V3I7169
IRJET-V3I7169
 
Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
A generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration systemA generic log analyzer for auto recovery of container orchestration system
A generic log analyzer for auto recovery of container orchestration system
 
Integrating fault tolerant scheme with feedback control scheduling algorithm ...
Integrating fault tolerant scheme with feedback control scheduling algorithm ...Integrating fault tolerant scheme with feedback control scheduling algorithm ...
Integrating fault tolerant scheme with feedback control scheduling algorithm ...
 
4213ijsea06
4213ijsea064213ijsea06
4213ijsea06
 
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
SIMULATION-BASED APPLICATION SOFTWARE DEVELOPMENT IN TIME-TRIGGERED COMMUNICA...
 
Benchmark methods to analyze embedded processors and systems
Benchmark methods to analyze embedded processors and systemsBenchmark methods to analyze embedded processors and systems
Benchmark methods to analyze embedded processors and systems
 
PID2143641
PID2143641PID2143641
PID2143641
 
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...
Integrating Fault Tolerant Scheme With Feedback Control Scheduling Algorithm ...
 
ideas.doc
ideas.docideas.doc
ideas.doc
 
safety assurence in process control
safety assurence in process controlsafety assurence in process control
safety assurence in process control
 
Formal Verification of Distributed Checkpointing Using Event-B
Formal Verification of Distributed Checkpointing Using Event-BFormal Verification of Distributed Checkpointing Using Event-B
Formal Verification of Distributed Checkpointing Using Event-B
 
Block-Chain Oriented Software Testing Approach
Block-Chain Oriented Software Testing ApproachBlock-Chain Oriented Software Testing Approach
Block-Chain Oriented Software Testing Approach
 
Qtp interview questions
Qtp interview questionsQtp interview questions
Qtp interview questions
 
Qtp interview questions
Qtp interview questionsQtp interview questions
Qtp interview questions
 
Traffic Simulator
Traffic SimulatorTraffic Simulator
Traffic Simulator
 

More from Saransh Garg

Technical non-technical-requirement-of-cots-selection
Technical non-technical-requirement-of-cots-selectionTechnical non-technical-requirement-of-cots-selection
Technical non-technical-requirement-of-cots-selectionSaransh Garg
 
Selecting with multiple interfaces
Selecting with multiple interfacesSelecting with multiple interfaces
Selecting with multiple interfacesSaransh Garg
 
Selecting cots vendor in cbse process
Selecting cots vendor in cbse processSelecting cots vendor in cbse process
Selecting cots vendor in cbse processSaransh Garg
 
Predicting system trustworthyness
Predicting system trustworthynessPredicting system trustworthyness
Predicting system trustworthynessSaransh Garg
 
Koala component model (1)
Koala component model (1)Koala component model (1)
Koala component model (1)Saransh Garg
 
Integration in component based technology
Integration in component based technologyIntegration in component based technology
Integration in component based technologySaransh Garg
 
Embedded system.pptx
Embedded system.pptxEmbedded system.pptx
Embedded system.pptxSaransh Garg
 
Composition of cots
Composition of cotsComposition of cots
Composition of cotsSaransh Garg
 
Component object model and
Component object model andComponent object model and
Component object model andSaransh Garg
 
Component based models and technology
Component based models and technologyComponent based models and technology
Component based models and technologySaransh Garg
 
Cbt component based technology architectures
Cbt   component based technology architecturesCbt   component based technology architectures
Cbt component based technology architecturesSaransh Garg
 
Architecture support for component
Architecture support for component Architecture support for component
Architecture support for component Saransh Garg
 

More from Saransh Garg (18)

Technical non-technical-requirement-of-cots-selection
Technical non-technical-requirement-of-cots-selectionTechnical non-technical-requirement-of-cots-selection
Technical non-technical-requirement-of-cots-selection
 
Selecting with multiple interfaces
Selecting with multiple interfacesSelecting with multiple interfaces
Selecting with multiple interfaces
 
Selecting cots vendor in cbse process
Selecting cots vendor in cbse processSelecting cots vendor in cbse process
Selecting cots vendor in cbse process
 
Scs.pptx repaired
Scs.pptx repairedScs.pptx repaired
Scs.pptx repaired
 
Repo for cbt
Repo for cbtRepo for cbt
Repo for cbt
 
Rbce
Rbce Rbce
Rbce
 
Predicting system trustworthyness
Predicting system trustworthynessPredicting system trustworthyness
Predicting system trustworthyness
 
Koala component model (1)
Koala component model (1)Koala component model (1)
Koala component model (1)
 
Javabean1
Javabean1Javabean1
Javabean1
 
Integration in component based technology
Integration in component based technologyIntegration in component based technology
Integration in component based technology
 
Embedded system.pptx
Embedded system.pptxEmbedded system.pptx
Embedded system.pptx
 
Cots integration
Cots integrationCots integration
Cots integration
 
Corba model ppt
Corba model pptCorba model ppt
Corba model ppt
 
Composition of cots
Composition of cotsComposition of cots
Composition of cots
 
Component object model and
Component object model andComponent object model and
Component object model and
 
Component based models and technology
Component based models and technologyComponent based models and technology
Component based models and technology
 
Cbt component based technology architectures
Cbt   component based technology architecturesCbt   component based technology architectures
Cbt component based technology architectures
 
Architecture support for component
Architecture support for component Architecture support for component
Architecture support for component
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

Components in real time systems

  • 1. Components in Real Time Systems Under the Guidance of Prof. Neha By Himanshu Mann 2k11/Se/033 Mayur Gupta 2k11/Se/039 Mohit Garg 2k11/Se/041 Ravi Kumar 2k11/Se/056 Ravi Gupta 2k11/Se/058
  • 2. What are real time system?  Real time systems are those where there is tight timing constraints.Real-time programs must guarantee response within strict time constraints, often referred to as "deadlines"  Real-time responses are often in the order of milliseconds or microseconds.  The correct behavior of these systems depends not only on the logical results of the computation but also at which time the results are produced , If the system delivers the correct answer, but after a certain deadline, it could be regarded as having failed.
  • 4. What are Components?  A software component is a software package, a web service, a web resource, or a module that encapsulates a set of related functions.  All system processes are placed into separate components so that component are modular and cohesive.  components communicate with each other via interfaces.  Reusable components are those components which can be used in several different systems .These are like parts of a car as one part can be placed in several different cars same way reusable components can be used in different systems
  • 5. Applying component-based software engineering (CBSE) in real-time systems.  Designing reusable real-time components is more complex than designing reusable non-real-time components.  The development of standard real-time components which can be run on different H/W platforms is complicated by the components having different timing characteristics on different platforms. Thus a component must be adapted and re-verified for each HW-platform to which it is ported, especially in safety-critical systems.
  • 6. Designing component based real-time system  Here we present a method for system development using real-time components.  It is a standard top-down development process to which timing and other real- time specific constraints have been added and precisely defined (or more correctly, have been predicted) at design time.  the system is designed not only in accordance with the system requirements, but also with respect to existing components.  This concept assumes that a library of well-defined real-time components is available.  The development process requires a system specification, obtained by analyzing the customer's requirements.  We assume that the specification is consistent and correct, in order to simplify the presentation of the method.
  • 7. The development process  The development process with real-time components is divided into several stages, as depicted in following Figure .
  • 8. The development process (contd.) I. Top-level design  The first stage of the development process involves de-composition of the system into manageable components.  We need to determine the interfaces between them and to specify the functionality and safety issues associated with each component.  Parallel with the decomposition, we browse the component library to identify a set of candidate components, (i.e., components which might be useful in our design). II. Detailed design  A detailed component design is performed, by selecting components to be used in each component from the candidate set.  In a perfect world, we could design our system by only using the library components. In a more realistic scenario we must identify missing components that we need according to our design but which are not available in the component library.  A time budget is assigned to each component. A component is required to complete its execution within its time budget.
  • 9. III. Scheduling  At this point we need to check if the system's temporal requirements can be fulfilled, assuming time budgets assigned in the detailed design stage. In other words, we need to make a schedulability analysis of the system based on temporal requirements of each component.  It may be sufficient to revise the detailed design by reengineering the temporal requirements or by simply replacing components with others from the candidate set.  An alternative is to return to top-level design and either select others from the library or specify new components.  During the scheduling we must check that the system is properly integrated; component interfaces are to be checked to ensure that input ports are connected and that their types match. Further, if the specified system passes the test, besides the schedules, the infrastructure for communication between components will be generated. IV. WCET verification  Even if the component supplier provides a specification of the WCET, it must be verified on the target platform.  We can verify the WCET by running test cases developed by the  component designer and measuring the execution time.
  • 10. V. Implementation of new components  New components; those not already in the library must be implemented. (discussed later) VI. System build and test  Finally, we build the system using old and new components.  We must verify the functional and temporal properties of the system obtained.  If the verification test fails, we must return to the appropriate stage of the development process and correct the error.
  • 11.  When selecting components we examine the attributes available in the library.  A component library containing real-time components should provide the following in addition to component identification, functional description, interface, component binary and test cases :  Memory requirements  WCET test cases - Test cases which indicate the WCET of the components WCET for a particular processor family.  Dependencies – Describing dependencies on other components.  Environment assumptions - Assumptions about the environment in which the component operates, for example the processor family. Component Library
  • 12. WCET(Worst case execution time) test cases  Since the timing behavior of components depends on both the processor and the memory organization, it is necessary to re-test the WCET for each target different from that specified.  The process of finding the WCET can be a difficult and tedious process, especially if complete information or the source code is not available.  Time behavior shown as a function of input parameters as shown in the figure. The execution time shows different values for the different input sub- domains.
  • 13. Continued…….  In many cases, however, the component developer can derive WCET test cases by combining source code analysis with the test execution.  The exact values of the execution time are not as important as the maximum value within input intervals, as depicted in Figure
  • 14. Composition of components  As mentioned earlier a component consists of one or more tasks. Several components can be composed into a more complex one. This is achieved by defining an interface for the new component and connecting the input and output ports of its building blocks, as shown in Fig  his new kind of component is also stored in the component library, in much the same way as the other components.
  • 15. Continued……  The WCET of a composed component cannot be computed since its parts  may be executing with different periods. Instead we propose that end-to- end deadlines should be specified for the input to and output from the component. End-to-end deadlines are set such that the system requirements are fulfilled in the same way as the time budgets are set.  Furthermore, we specify virtual timing attributes (period, release time and deadline) of the composed component, which are used to compute the timing attributes of sub-components.  For example, if the virtual period is set to P, then the period of a sub- component A should be fA * P and the period of B is fB * P, where fA and fB are constants for the composed component,which are stored in the component library.
  • 16. Case Study: RT components in Rubus OS  Currently there are not so many real-time operating systems that have some concept of components. The Rubus operating system is one of those.  Rubus is hybrid operating system, in the sense that it supports both pre- emptive static scheduling(pre-run time) and fixed priority scheduling(run- time), also referred to as the red and blue parts of Rubus. The red part deals only with hard real-time and the blue part only with soft. Here we focus on the red part only.  It was first designed for the qulsar processors that works on the field of Telecommunications Electronics and Automotive.  Each task in the red part is periodic and has a set of input and output ports, which are used for unbuffered communication with other tasks. This set also defines a task’s interface.
  • 17. Continued…..  Each tasks has an entry function that which as arguments have input and output ports. The value of the input ports are guaranteed not to change during the execution of the current instance of the task, in order to avoid inconsistency problems. The entry function is reinvoked by the kernel periodically.
  • 18. Timing Requirements and logic functions  The timing requirements are specified by release-time, deadline, WCET and period. Besides the timing requirements, it is also possible to specify ordering of tasks using precedence relations, and mutual exclusion.  For example the depicted task in is required to execute before the outputBrakeValues task, i.e., task BrakeLeftRight precedes task outputBrakeValues. A system is composed of a set of components/tasks for which the input and output ports have been connected, as depicted in Figure.
  • 19. Scope for Development:Extension for CBSE Let’s see what is missing in Rubus and its supporting tools to make them more suitable for component based development :-  Firstly, there is currently no support for creating composite components, i.e., components that are built of other components  Secondly, some tool is needed to manage the available components and their associated source files, so that components can be fetched from a library and instantiated into new designs  Thirdly, there is a lack of real-time tools like: WCET analysis
  • 20. Reuse of RT Components  Design for reuse means that a component from a current project should require a minimum of modification for use in a future project.  Abstraction is extremely valuable for reuse.  The objective should be to minimize the difference between the component's selected and ideal degrees of abstraction. The smaller the variance from the ideal level of abstraction, the more frequently a component will be reused.
  • 21. Important factors of a reusable component  There are other important factors which designers of reusable components must consider, they must not only anticipate future design contexts and future reuses. They must consider :  What users need and do not need to know about a reusable design, or how to emphasize relevant information and conceal that which is irrelevant.  To inculcate what is expected from potential users, and what are their expectations about their usable design.  To allow users to instantiate only relevant parts of components. For example, if a user wants to use only some of the available ports of a component, then only the relevant parts should be instantiated.
  • 22. Independence No designer can actually anticipate all future design contexts, when and in which environment the component will be reused. This means that a reusable component should depend as little as possible on its environment and be able to perform sufficient self-checking.In other words, it should be as independent as possible. Frequency of reuse and utility increase with independence. Thus independence should be another main area of concern when designing reusable components.
  • 23. Development criteria’s  An interesting observation about efficient reuse of real-time components, made by engineers at Siemens labs is that, as a rule of thumb, the overhead cost of developing a reusable component, including design plus documentation, is recovered after the fifth reuse.That is the amount of time taken after it reaches a stable state  Designing reusable components for embedded real-time systems is even more complicated due to memory and execution time restrictions. Furthermore, real-time components must be much more carefully tested because of their safety-critical nature
  • 24. Online Upgrades of Components  An online upgrade of components is available in case a component is not compatible.  Replacing a component in a safety critical system can result in catastrophic consequences if the new component is faulty. Complete testing of new components is often not economically feasible or even possible, e.g., shutting down a process plant with high demands on availability can result in big financial losses.  To overcome these problems it is proposed that the new component should be monitored to check that its output is within valid ranges. If it is not, then the original component will resume control of the system.
  • 25. Summary  Basic definition of RT systems and components  Development process  Composition of components and library  Analysis of components  Case study  Reusable Components
  • 26. Conclusion  Major challenges faced are  Guarantee the temporal behavior i.e the deadline  Coherence of each component with another  Development process must have space for time analysis and high level analysis on architectural level