Professional Documents
Culture Documents
Lecture 1
Lecture 1
CPSC-4328/5328,
Lecture 1
Stefan Andrei
09/03/15
CPSC-4328/5328, Lecture 1
Real-time systems
09/03/15
CPSC-4328/5328, Lecture 1
Course Policies
Attendance Policy:
Students are expected to attend every class and are
solely responsible for anything missed in the class.
Poor attendance will ultimately be reflected in the
course grade.
Participation Policy:
You are encouraged to ask questions.
You are encouraged to offer answers.
09/03/15
CPSC-4328/5328, Lecture 1
The team
Associate Professor:
11:30am-12:30pm
please send an email to make an appointment
Recommended books:
09/03/15
CPSC-4328/5328, Lecture 1
Pre-requisites:
Symbolic logic;
Automata and languages;
Programming language recommended (C, C++,
or Java)
09/03/15
3.
4.
5.
09/03/15
CPSC-4328/5328, Lecture 1
Lecture structure
09/03/15
CPSC-4328/5328, Lecture 1
What is time?
What is a real-time system?
Simulation
Testing
Verification
Run-time monitoring
09/03/15
CPSC-4328/5328, Lecture 1
What is time?
09/03/15
CPSC-4328/5328, Lecture 1
What is time?
09/03/15
CPSC-4328/5328, Lecture 1
10
Clocks synchronization
09/03/15
CPSC-4328/5328, Lecture 1
11
For computers whose time is kept by quartzbased computer clocks, the clocks should be
periodically synchronized such that they
maintain a bounded drift relative to UTC.
In this course, when we want refer to wall
clock or absolute time, we refer to the
standard time provided by a bounded-drift
computer clock on UTC.
So, there is a mapping
clock: RealTime StandardClockTime
09/03/15
CPSC-4328/5328, Lecture 1
12
09/03/15
CPSC-4328/5328, Lecture 1
13
Real-time (computer)
systems
Many years ago, there were only non-real
09/03/15
CPSC-4328/5328, Lecture 1
14
Distinguishing embedded
and real-time systems
09/03/15
CPSC-4328/5328, Lecture 1
15
Correctness of real-time
systems
09/03/15
CPSC-4328/5328, Lecture 1
16
A model of a real-time
system
X:
space of sensor input
D: decision map
vectors
x(t) is the value of x at
time t
Y: space of decision
vectors
y(t) is the value of y at
X
time t
S: space of state vectors
T: set of timing
constraints
I: set of integrity
constraints
09/03/15
A
Y
D
CPSC-4328/5328, Lecture 1
SXSY
D(s,x)=(s,y) means
that given s and x at
time t, then D
determines the next
decision y and system
state s at time t+1.
A: relation over X and
Y about the effect of a
control decision on the
external world.
17
09/03/15
CPSC-4328/5328, Lecture 1
18
09/03/15
CPSC-4328/5328, Lecture 1
19
Analysis techniques
Simulation
Testing
Verification
Run-time monitoring
09/03/15
CPSC-4328/5328, Lecture 1
20
Simulation
Comparison:
09/03/15
CPSC-4328/5328, Lecture 1
21
Simulation
09/03/15
CPSC-4328/5328, Lecture 1
22
Simulation
09/03/15
CPSC-4328/5328, Lecture 1
23
09/03/15
CPSC-4328/5328, Lecture 1
24
Simulation techniques
Real-time-event simulation
Discrete-event simulation
Hybrid simulation
09/03/15
CPSC-4328/5328, Lecture 1
25
Real-time-event simulation
09/03/15
CPSC-4328/5328, Lecture 1
26
Discrete-event simulation
09/03/15
CPSC-4328/5328, Lecture 1
27
Hybrid simulation
09/03/15
CPSC-4328/5328, Lecture 1
28
Simulation. Disadvantages
09/03/15
CPSC-4328/5328, Lecture 1
29
Testing
09/03/15
CPSC-4328/5328, Lecture 1
30
Exhaustive testing
Functional testing
Structural testing
Code reading
09/03/15
CPSC-4328/5328, Lecture 1
31
Exhaustive testing
09/03/15
CPSC-4328/5328, Lecture 1
32
Functional testing
09/03/15
CPSC-4328/5328, Lecture 1
33
Structural testing
09/03/15
CPSC-4328/5328, Lecture 1
34
Code reading
09/03/15
CPSC-4328/5328, Lecture 1
35
Verification
09/03/15
CPSC-4328/5328, Lecture 1
36
Verification. Personnel
Applications expert:
09/03/15
CPSC-4328/5328, Lecture 1
37
Specification of real-time
systems
Mechanical components
Electrical components
Electronic components
Behavioral specification
09/03/15
CPSC-4328/5328, Lecture 1
38
09/03/15
CPSC-4328/5328, Lecture 1
39
Timing Constraints
09/03/15
CPSC-4328/5328, Lecture 1
40
09/03/15
CPSC-4328/5328, Lecture 1
41
Verification of timing
properties
09/03/15
CPSC-4328/5328, Lecture 1
42
Run-time monitoring
Motivation:
09/03/15
CPSC-4328/5328, Lecture 1
43
09/03/15
CPSC-4328/5328, Lecture 1
44
09/03/15
CPSC-4328/5328, Lecture 1
45
Monitoring techniques
Intrusive monitoring
Non-intrusive monitoring
The availability of monitoring systems does not
mean that we can relax on the task of stringent
pre-run-time analysis and verification of the
target system.
Rather, monitoring should serve as an additional
guarantee on the safety and reliability of the
safety-critical target real-time systems.
09/03/15
CPSC-4328/5328, Lecture 1
46
Intrusive monitoring
09/03/15
CPSC-4328/5328, Lecture 1
47
Non-intrusive monitoring
09/03/15
CPSC-4328/5328, Lecture 1
48
Summary
09/03/15
CPSC-4328/5328, Lecture 1
49
Reading suggestions
09/03/15
CPSC-4328/5328, Lecture 1
50
Coming up next
09/03/15
CPSC-4328/5328, Lecture 1
51
09/03/15
CPSC-4328/5328, Lecture 1
52