Analyze error propagation

Assignment Help Software Engineering
Reference no: EM13190530

Given the following description, answer the questions below.

  • A hard real-time (RT) system is one where the failure to meet  any deadline results in loss of life(s), injury, and/or costly equipment  or property. Typically the time constraints  to avoid loss are a fraction of a second. Example systems include cars, missiles,  anti-missiles, airplane flight control, Mars Landers, and elevators. RT systems are event driven, cyclic  (i.e. the same operations are repeated frequently), and highly concurrent  (i.e. need to deal with multiple different events simultaneously).

Reliability, Accuracy, and Availability are typically the most important system goals. Often the RT Systems must be Safe, Secure, and/or Scalable. Predictability (i.e. confidence that the RT System do its work at the acceptable levels of the most important qualities is critical. Goals like User Friendliness, Reuse, Portability, Maintainability are important, but less so than the previous goals.

A RT a system is usual run in a hardware environment that is constrained by weight and/or power consumption (e.g. a missile, spaceship), which in turn constrains the system to use of lower-power CPU's, and constrains the amount and types of memory and permanent storage. Systems that operate high-radiation (e.g. space, a nuclear reactor) are constrained to use hardware that is certified for that environment. Weight, Power, or Certificate requirements can also prevent a system from adopting newer hardware, if later in the project it is discovered that the desired software capabilities, exceed the initial hardware's abilities.

To achieve predictability, a RT System must run in an operation system (RTOS) or run-time environment where (a) the scheduling policies the highest priority (based on deadlines) component(s) that can be run on the currently available resources (e.g. memory), (b) supports rules for share resources (i.e. memory, device, databases) that minimize contention (i.e. 2 or more components trying to read or write to the shared resources at the same times) and minimize delays for the components that have the highest priority. 

The architect has to design an architecture where each component:

1. get its work done by its deadline;

2. are distribute over the available CPU resources;

3. obeys rules for shared resources ("plays nice");

4. can be prioritized by one of the deadline-based schemes;

5. avoids expensive operations (e.g. dynamic allocation, dynamic binding of operations) and unpredictable actions (e.g. queuing, garbage collection).

The architected is aided by the use of tools that can (1) analyze an architecture to determine whether the schedule is likely to be met, (2) analyze error propagation (affects reliability, availability, safety, and security), (3) analyze whether certain safety or security rules are enforce.

  • A soft real-time (sRT) system (also known also human real-time system) is one were  a delayed response or outcome is an inconveniences, possibly minor loss of  money, property or other resources. sRT systems are generally driven by human-generated events (e.g.  typing on a keyboard). Typically  time constraints are on the order of seconds (Human interface design  theory shows that after about 4 seconds, humans start to get impatient). Examples include Bank ATM systems, call  center software, vending machine control software, word processors, and  web browsers.

For sRT systems, Reliability, Availability, Usability, are typically the most important. Security and/or Privacy are often at least as important. Maintainability, Reuse, Portability are often important. Since SRT systems are often multi-user, Fairness is an important quality.

While sRT systems could be built using a RTOS, it would be waist of development time and effort. srT are generally built on operating system that support scheduling algorithms (e.g., run-to-completion, round-robin, run-till-blocked) and resources use algorithms (e.g. locking, queuing, roll-backs) that promote equal treatment. Sometimes priority is assigned based on the importance or the roll of the user. For example, a request from the company president may be given higher priority than that of an ordinary employee, or a preferred customer may be given higher priority. In which case, it would be preferable to use an OS that supports (a) priority queuing of components that are ready to run on the available resources, and selects the highest priority component to run; (b) priority queuing for resources.

sRT are generally run on hardware that has few constraints on power, size, weight.

The architect is generally free to design components that implement the desired capabilities in the time constraints so that the system achieves the other desired qualities. Use of frameworks such as the web, .Net, Java Enterprise, of-the shelf components such as database management systems, is readily available and can save time and effort to develop the sRT system.

  • A non-real-time (nRT) system is one where a delayed response or  outcome is insignificant. In most  of these kinds of systems are research oriented and the result is more  important than the time it takes to get there. Examples include Artificial Intelligence  Research (e.g. Natural Language Processing, Thinking Machines), GNOME  mapping, Search for plants and life outside our planet. nRT project pose few constraints on the  architect other than time, budget, and publication deadlines.

Question

Answer

1. The alarm monitoring parts of the Alarm Monitoring System is (1 point):

a. A hard real-time system,

b. A soft-real-time system

c. A hard real-time system, but has some looser constraints because of the need for human action at some points.

d. A non-real-time system.

 

 

 

2. The customer managements (e.g. adding a new customer, phone number change) parts of the Alarm Monitoring System we are design is (1 point):

a. A hard real-time system,

b. A soft-real-time system

c. A non-real-time system.

 

 

 

3. Any time a software component sends a message to another component, you are applying the Client-Server pattern? (1 point):

True

False

 

4. Model-View-Controller pattern can be used within the Client-Server implementation to create the operator view? (1 point)

True

False

 

5. For each of the following systems select whether it is a hard real-time (RT), soft real-time (sRT) or non-Real Time (nRT). (point 5)

 

 

 

a. An Assembly-Line Manufacturing Control System

RT

sRT

nRT

b.  An Store's Inventory Control System

RT

sRT

nRT

c. A Population Census Analysis System

RT

sRT

nRT

d.  A system that determines the possible routes from your current location to a destination you select.

RT

sRT

nRT

e.  A missile tracking system

RT

sRT

nRT

6. In my solution to the Alarm Monitoring System, I didn't use the internet for communication between send the alarm messages from the home to the Alarm Company. Which of the following reasons contributed to that decision? (5 point):

 

 

a. Security: if I used the internet, I would have to implement defenses against someone prevent the message for reaching its destination or intercepting the message & pass on false data ("A Man in the Middle Attack"), which would make the system more complex and expensive.

Yes

No

b.  Availability: Internet is more like to be unavailable then a phone line

Yes

No

c. Predictability: I cannot predict how long it will take a message to reach the Central Monitoring System.

Yes

No

d.  Sending a message over the internet would be less scalable the using phone lines

Yes

No

e.  If would be harder to add RT streaming video over the internet than a phone line

Yes

No

7. In my Solution to the Alarm Monitoring System that I gave you, I Said That The In-House Monitor Software Had 3 Subcomponents: A Control Loop For Monitoring Windows & Doors, A Control Loop For Controlling Doors, And A Component For Interacting With A User On A Control Panel. The User Monitor Has Subcomponents That Implement The Model-View-Controller Pattern). Even though the CPU it runs on is dual core. Assuming the schedule analysis tools says that each component/subcomponents will meet its deadline, this design works relatively easily because the deadline for turn on the alarm if a doors with a Control Pad nearby sensors is an exact multiple of the deadline for turning on the alarm for windows & doors without near-by Control-Pad. Are the following statements True or False (4 points)

(Note both the In-Home Monitor Component, and its User Monitor Component are examples of the Façade Pattern, where all the work they appear to do is actually delegated to subcomponents.)

Yes

No

a. It would be better to have 1 component that does all the work down by the subcomponents in one place, because it could be executed on a single core CPU.

True

False

b.  It would be better to have 4 components, replacing the single sensor monitoring component with a component to monitor the doors with a near-by control pad, and a component to monitor windows and doors without near-by control pads, as long as deadlines could still be met, since that would allow greater flexibility because the deadline for each component would be more flexible (i.e. one deadline would not have to be a multiple of the other or a common denominator for the analysis too work.

True

False

c. By extending the logic in (b), it would be better to have 5 components, where to component to monitor windows and doors without near-by control pads, would be replaced by a component to monitor windows, and a component to monitor doors without near-by control pads.

True

False

d.  It would be better to have exactly 2 components because that's the number of cores in the CPU

.True

False

 

Reference no: EM13190530

Questions Cloud

Explain how much hexanes would be required to remove : What weight of A would be removed from the same solution by successive extraction with four portions of 25mL of hexanes? How much hexanes would be required to remove 98.5% of A in single extraction?
How large a tax cut would be needed : Assume that a hypothetical economy with an MPC of .7 is experiencing severe recession. By how much would government spending have to increase to shift the aggregate demand curve rightward by $30 billion
Define manganese chloride and sodium acetate : Beginning with 2.5g of manganese(ii) chloride and 6.991g of sodium acetate in 100mL of water, add 11mL of acetylacetone to get phase 2 system, next add 0.491g of potassium permanganatee to 25ml of water and them added to the previous solution. Fin..
What would you expect to happen in the market : If the current price of the product is $100, what is the quantity supplied and the quantity demanded How would you describe this situation and what would you expect to happen in this market
Analyze error propagation : Analyze an architecture to determine whether the schedule is likely to be met and analyze error propagation
How to promote economic activity nd preserve price stability : The Federal Reserve Board testimonies, press releases, monetary policy reports, the Beige Book, and a variety of other publications offer a detailed assessment of current economic activity, financial markets, and the monetary policy tools used to ..
What is the highest feasible black market price : Suppose that the black market for Internet providers arises, with internet service providers developing hidden connections. Illustrate the black market for inter access, including the implicit supply schedule, the ceiling price, the black market s..
Explain if the imaging agent had an initial rate : If the imaging agent had an initial rate of 7500 decays per minute (dpm) and if the imagine required 1 hour to complete, what would the decay rate be immediately after the test is completed?
Find an analytical expression for the maximum correlation : Consider a portfolio of three assets (A,B,C). Denote the expected returns on each asset as rA; rB; rC, respectively. Denote variances and covariance similarly. Suppose the investor will accept a maximum portfolio variance of X.

Reviews

Write a Review

Software Engineering Questions & Answers

  Information flow complexity

Cyclomatic complexity, monitoring devices, wireless dial-out device with controller, Request for Proposals (RFPs), Weighted IFC

  Draw an e-r diagram for hospital staff

Draw an E-R diagram for the following situations. From discussions with hospital staff, reviewing hospital documents and studying existing information systems, the study team developed a list of business rules.

  Pseudocode statement to generate random number

Create a pseudocode statement that generates a random number in the range of one through one hundred and assigns it to a variable named rand.

  Use case diagram for personal trainer information system

Recognize possible use cases and actors, and create use case diagram for Personal Trainer information system. Select one of the use cases and create a class digram.

  Flowchart for steps-processes and milestones-dbms design

Let the design development process. Make the flowchart of major steps, processes, and milestones essential to perform a thorough DBMS design.

  Identify the abstraction of classification entity types

Identify all the important concepts represented in the library database case study described here. In particular, identify the abstraction of classification entity types.

  Draw pattern activity for adapter and data access object

Draw Pattern Activity: Create a 2-3 page paper comparing and contrasting five of design patterns. Select any five from the list.

  Changes require to make to premiere products database design

Indicate changes (using shorthand representation) which you would require to make to Premiere Products database design to support following requirements.

  Risc machine assembly

A compiler for a RISC machine will introduce delay slots into this code so that processor can employ the delayed branch mechanism.

  Identify the data type for variable

Assume you manage a dog walking service, in which you interact with both clients and dog walkers. Your task is to schedule dog-walking appointments based on the customers requested dates and times and the availability of the dog walkers.

  Software development practices

Agile Development is a blanket term that covers a wide variety of software development practices many of which have been codified and documented.

  Compare the quality of commercial proprietary code

Compare the quality of commercial proprietary code with open-source code. These comparisons should consider implementations of the same functionality.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd