SlideShare a Scribd company logo
1 of 35
Download to read offline
Critical Systems


                              Loganathan R.



Prof. Loganathan R., CSE, HKBKCE          1
Objectives
• To explain what is meant by a critical system
  where system failure can have severe human
  or economic consequence.
• To explain four dimensions of dependability -
  availability, reliability, safety and security.
• To explain that, to achieve dependability, you
  need to avoid mistakes, detect and remove
  errors and limit damage caused by failure.

                Prof. Loganathan R., CSE, HKBKCE   2
Critical Systems
• If the system failure results in significant economic losses,
  physical damages or threats to human life than the system is
  called critical systems. 3 types of it are:
• Safety-critical systems
   – Failure results in loss of life, injury or damage to the environment;
   – Chemical plant protection system;
• Mission-critical systems
   – Failure results in failure of some goal-directed activity;
   – Spacecraft navigation system;
• Business-critical systems
   – Failure results in high economic losses;
   – Customer accounting system in a bank;
                          Prof. Loganathan R., CSE, HKBKCE                   3
System dependability
• The most important emergent property of a critical
  system is its dependability. It covers the related
  system attributes of availability, reliability, safety &
  security.
• Importance of dependability
   – Systems that are unreliable, unsafe or insecure are often rejected
     by their users(refuse to the product from the same company).
   – System failure costs may be very high.(reactor / aircraft navigation)
   – Untrustworthy systems may cause information loss with a high
     consequent recovery cost.


                        Prof. Loganathan R., CSE, HKBKCE                 4
Development methods for critical systems

• Trusted methods and technique must be used.
• These methods are not cost-effective for other
  types of system.
• The older methods strengths & weaknesses
  are understood
• Formal methods reduce the amount of testing
  required. Example :
  – Formal mathematical method

                Prof. Loganathan R., CSE, HKBKCE   5
Socio-technical critical systems Failures
 • Hardware failure
   – Hardware fails because of design and manufacturing
     errors or because components have reached the end
     of their natural life.
 • Software failure
   – Software fails due to errors in its specification, design
     or implementation.
 • Human Operator failure
   – Fail to operate correctly.
   – Now perhaps the largest single cause of system
     failures.

                     Prof. Loganathan R., CSE, HKBKCE        6
A Simple safety Critical System

• Example of software-controlled insulin pump.
• Used by diabetics to simulate the function of
  insulin, an essential hormone that metabolises
  blood glucose.
• Measures blood glucose (sugar) using a micro-
  sensor and computes the insulin dose
  required to metabolise the glucose.


                Prof. Loganathan R., CSE, HKBKCE   7
Insulin pump organisation
                    Insulin reservoir


  Needle                                        Clock
 assembly
                          Pump



 Sensor                 Controller              Alarm




             Display1                Display2


                     Power supply


            Prof. Loganathan R., CSE, HKBKCE            8
Insulin pump data-flow

                           Blood
Blood
           Blood sugar   parameters     Blood sugar
             sensor                       analysis            Blood sugar
                                                                 level

                                                                         Insulin
                                                                      requirement
                                                                      computation

 Insulin                 Pump control                             Insulin
                          commands          Insulin            requirement
             Insulin
                                            delivery
              pump
                                           controller




                           Prof. Loganathan R., CSE, HKBKCE                         9
Dependability requirements
• The system shall be available to deliver insulin
  when required to do so.
• The system shall perform reliably and deliver
  the correct amount of insulin to counteract
  the current level of blood sugar.
• The essential safety requirement is that
  excessive doses of insulin should never be
  delivered as this is potentially life threatening.

                  Prof. Loganathan R., CSE, HKBKCE   10
System Dependability
• The dependability of a system equates to its
  trustworthiness.
• A dependable system is a system that is trusted by its
  users.
• Principal dimensions of dependability are:
   – Availability :- Probability that it will be up & running & able to deliver
     at any given time ;
   – Reliability :-Correct delivery of services as expected by user over a
     given period of time;
   – Safety :-A Judgment of how likely the system will cause damage to
     people or its environment;
   – Security :- A Judgment of how likely the system can resist accidental
     or deliberate intrusions;

                          Prof. Loganathan R., CSE, HKBKCE                   11
Dimensions of dependability

                                               Dependability




     Availability                Reliability                Safety                     Security



The ability of the system     The ability of the    The ability of the system   The ability of the system
to deliver services when      system to deliver       to operate without         to protect itself against
        requested           services as specified     catastrophic failure      accidental or deliberate
                                                                                         intrusion




                                    Prof. Loganathan R., CSE, HKBKCE                                     12
Other dependability properties
• Repairability
   – Reflects the extent to which the system can be repaired in the event of
     a failure
• Maintainability
   – Reflects the extent to which the system can be adapted to new
     requirements;
• Survivability
   – Reflects the extent to which the system can deliver services while it is
     under hostile attack;
• Error tolerance
   – Reflects the extent to which user input errors can be avoided and
     tolerated.



                         Prof. Loganathan R., CSE, HKBKCE                  13
Dependability vs performance
• It is very difficult to tune systems to make
  them more dependable
• High level dependability can be achieved by
  expense of performance. Because it include
  extra/ redundant code to perform necessary
  checking
• It also increases the cost.


               Prof. Loganathan R., CSE, HKBKCE   14
Dependability costs
• Dependability costs tend to increase exponentially as
  increasing levels of dependability are required
• There are two reasons for this
   – The use of more expensive development techniques and
     hardware that are required to achieve the higher levels of
     dependability
   – The increased testing and system validation that is
     required to convince the system client that the required
     levels of dependability have been achieved



                     Prof. Loganathan R., CSE, HKBKCE        15
Costs of increasing dependability

     Cost




            Low     Medium           High        Very Ultra-high
                                                 high
                            Dependability
                  Prof. Loganathan R., CSE, HKBKCE                 16
Availability and reliability
• Reliability
   – The probability of failure-free system operation
     over a specified time in a given environment for a
     specific purpose
• Availability
   – The probability that a system, at a point in time,
     will be operational and able to deliver the
     requested services
• Both of these attributes can be expressed
  quantitatively
                  Prof. Loganathan R., CSE, HKBKCE   17
Availability and reliability
• It is sometimes possible to include system
  availability under system reliability
  – Obviously if a system is unavailable it is not
    delivering the specified system services
• However, it is possible to have systems with
  low reliability that must be available. So long
  as system failures can be repaired quickly and
  do not damage data, low reliability may not be
  a problem
• Availability takes repair time into account

                Prof. Loganathan R., CSE, HKBKCE   18
Faults, Errors and failures
• Failures are a usually a result of system errors that
  are derived from faults in the system
• However, faults do not necessarily result in system
  errors
   – The faulty system state may be transient and ‘corrected’
     before an error arises
• Errors do not necessarily lead to system failures
   – The error can be corrected by built-in error detection and
     recovery
   – The failure can be protected against by built-in protection
     facilities. These may, for example, protect system
     resources from system errors
                     Prof. Loganathan R., CSE, HKBKCE         19
Reliability terminology
Term              Description


                  An event that occurs at some point in time when the system
System failure
                  does not deliver a service as expected by its users

                  An erroneous system state that can lead to system behaviour
System error
                  that is unexpected by system users.

                  A characteristic of a software system that can lead to a
                  system error. For example, failure to initialise a variable
System fault
                  could lead to that variable having the wrong value when it is
                  used.

Human error or    Human behaviour that results in the introduction of faults
mistake           into a system.

                       Prof. Loganathan R., CSE, HKBKCE                           20
Reliability Improvement
• Three approaches to improve reliability
• Fault avoidance
   – Development technique are used that either minimise the possibility
     of mistakes or trap mistakes before they result in the introduction of
     system faults
• Fault detection and removal
   – Verification and validation techniques that increase the probability of
     detecting and correcting errors before the system goes into service are
     used
• Fault tolerance
   – Run-time techniques are used to ensure that system faults do not
     result in system errors and/or that system errors do not lead to system
     failures


                         Prof. Loganathan R., CSE, HKBKCE                 21
Reliability modelling
• You can model a system as an input-output
  mapping where some inputs will result in
  erroneous outputs
• The reliability of the system is the probability
  that a particular input will lie in the set of
  inputs that cause erroneous outputs
• Different people will use the system in
  different ways so this probability is not a static
  system attribute but depends on the system’s
  environment

                  Prof. Loganathan R., CSE, HKBKCE   22
Input/output mapping
                                            Inputs causing
                                            erroneous outputs
Input set              Ie




             Program




                                             Erroneous
                                              outputs
Output set             Oe



              Prof. Loganathan R., CSE, HKBKCE                  23
Reliability perception

               Possible
                inputs

     User
      1                       Erroneous
                                inputs


     User
      3                   User
                           2




     Prof. Loganathan R., CSE, HKBKCE     24
Reliability improvement
• Removing X% of the faults in a system will not necessarily
  improve the reliability by X%. A study at IBM showed that
  removing 60% of product defects resulted in a 3%
  improvement in reliability
• Program defects may be in rarely executed sections of the
  code so may never be encountered by users. Removing these
  does not affect the perceived reliability
• A program with known faults may therefore still be seen as
  reliable by its users




                    Prof. Loganathan R., CSE, HKBKCE      25
Safety
• Safety is a property of a system that reflects the system
  should never damage people or the system’s environment
• For example control & monitoring systems in aircraft
• It is increasingly important to consider software safety as
  more and more devices incorporate software-based control
  systems
• Safety requirements are exclusive requirements i.e. they
  exclude undesirable situations rather than specify required
  system services
• Safety critical software are 2 types


                     Prof. Loganathan R., CSE, HKBKCE      26
Types of Safety-critical software
• Primary safety-critical systems
   – Embedded software systems whose failure can cause
     hardware malfunction which results inhuman injury or
     environmental damage.
• Secondary safety-critical systems
   – Systems whose failure indirectly results in injury.
   – Eg. Medical Database holding details of drugs
• Discussion here focuses on primary safety-critical
  systems


                      Prof. Loganathan R., CSE, HKBKCE     27
Safety and reliability
• Safety and reliability are related but distinct
  – In general, reliability and availability are necessary
    but not sufficient conditions for system safety
• Reliability is concerned with conformance to a
  given specification and delivery of service
• Safety is concerned with ensuring system
  cannot cause damage irrespective of whether
  or not it conforms to its specification


                   Prof. Loganathan R., CSE, HKBKCE     28
Unsafe reliable systems
• Reasons why reliable                         system   are   not
  necessarily safe:
  • Specification errors
     • It does not describe the required behaviour in some
       critical situations
  • Hardware failures generating spurious inputs
     • Hard to anticipate in the specification
  • Operator error
     • Context-sensitive commands i.e. issuing the right
       command at the wrong time

                    Prof. Loganathan R., CSE, HKBKCE            29
Safety terminology
Term              Definition

                  An unplanned event or sequence of events which results in human death or injury,
Accident (or
                  damage to property or to the environment. A computer-controlled machine injuring its
mishap)
                  operator is an example of an accident.
                  A condition with the potential for causing or contributing to an accident. A failure of the
Hazard
                  sensor that detects an obstacle in front of a machine is an example of a hazard.
                  A measure of the loss resulting from a mishap. Damage can range from many people
Damage
                  killed as a result of an accident to minor injury or property damage.
                  An assessment of the worst possible damage that could result from a particular
Hazard severity   hazard. Hazard severity can range from catastrophic where many people are killed to
                  minor where only minor damage results.
                  The probability of the events occurring which create a hazard. Probability values tend
Hazard
                  to be arbitrary but range from probable (say 1/100 chance of a hazard occurring) to
probability
                  implausible (no conceivable situations are likely where the hazard could occur).
                  This is a measure of the probability that the system will cause an accident. The risk is
Risk              assessed by considering the hazard probability, the hazard severity and the
                  probability that a hazard will result in an accident.

                                   Prof. Loganathan R., CSE, HKBKCE                                     30
Ways to achieve Safety
• Hazard avoidance
   – The system is designed so that hazard simply cannot arise.
   – Eg. Press 2 buttons at the same time in a cutting machine to start
• Hazard detection and removal
   – The system is designed so that hazards are detected and removed
     before they result in an accident.
   – Eg. Open relief valve on detection over pressure in chemical plant.
• Damage limitation
   – The system includes protection features that minimise the damage
     that may result from an accident
   – Automatic fire safety system in aircraft.


                         Prof. Loganathan R., CSE, HKBKCE                 31
Security
• Security is a system property that reflects the
  ability to protect itself from accidental or
  deliberate external attack.
• Security is becoming increasingly important as
  systems are networked so that external access
  to the system through the Internet is possible
• Security is an essential pre-requisite for
  availability, reliability and safety
• Example : Viruses, unauthorised use of service/data modification

                      Prof. Loganathan R., CSE, HKBKCE          32
Security terminology
Term            Definition
                Possible loss or harm in a computing system. This can be loss or
Exposure        damage to data or can be a loss of time and effort if recovery is
                necessary after a security breach.
                A weakness in a computer-based system that may be exploited to
Vulnerability
                cause loss or harm.
                An exploitation of a system vulnerability. Generally, this is from
Attack          outside the system and is a deliberate attempt to cause some
                damage.
                Circumstances that have potential to cause loss or harm. You can
Threats         think of these as a system vulnerability that is subjected to an
                attack.
                A protective measure that reduces a system vulnerability.
Control         Encryption would be an example of a control that reduced a
                vulnerability of a weak access control system.
                             Prof. Loganathan R., CSE, HKBKCE                 33
Damage from insecurity
• Denial of service
   – The system is forced into a state where normal services
     become unavailable.
• Corruption of programs or data
   – The system components of the system may altered in an
     unauthorised way, which affect system behaviour & hence
     its reliability and safety
• Disclosure of confidential information
   – Information that is managed by the system may be
     exposed to people who are not authorised to read or use
     that information
                      Prof. Loganathan R., CSE, HKBKCE    34
Security assurance
• Vulnerability avoidance
   – The system is designed so that vulnerabilities do not occur.
     For example, if there is no external network connection
     then external attack is impossible
• Attack detection and elimination
   – The system is designed so that attacks on vulnerabilities
     are detected and remove them before they result in an
     exposure. For example, virus checkers find and remove
     viruses before they infect a system
• Exposure limitation
   – The consequences of a successful attack are minimised.
     For example, a backup policy allows damaged information
     to be restored
                      Prof. Loganathan R., CSE, HKBKCE         35

More Related Content

What's hot

Software Engineering : Requirement Analysis & Specification
Software Engineering : Requirement Analysis & SpecificationSoftware Engineering : Requirement Analysis & Specification
Software Engineering : Requirement Analysis & SpecificationAjit Nayak
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems Haitham Ahmed
 
Design Concept software engineering
Design Concept software engineeringDesign Concept software engineering
Design Concept software engineeringDarshit Metaliya
 
Software architecture design ppt
Software architecture design pptSoftware architecture design ppt
Software architecture design pptfarazimlak
 
golden rules of user interface design
golden rules of user interface designgolden rules of user interface design
golden rules of user interface designgadige harshini
 
Coding and testing in Software Engineering
Coding and testing in Software EngineeringCoding and testing in Software Engineering
Coding and testing in Software EngineeringAbhay Vijay
 
Chapter 13 software testing strategies
Chapter 13 software testing strategiesChapter 13 software testing strategies
Chapter 13 software testing strategiesSHREEHARI WADAWADAGI
 
Quality and productivity factors
Quality and productivity factorsQuality and productivity factors
Quality and productivity factorsNancyBeaulah_R
 
Architectural styles and patterns
Architectural styles and patternsArchitectural styles and patterns
Architectural styles and patternsHimanshu
 
Importance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningImportance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningABHISHEK KUMAR
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9Ian Sommerville
 
Software engineering: design for reuse
Software engineering: design for reuseSoftware engineering: design for reuse
Software engineering: design for reuseMarco Brambilla
 
User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design Saqib Raza
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activitiessommerville-videos
 
Model Based Software Architectures
Model Based Software ArchitecturesModel Based Software Architectures
Model Based Software ArchitecturesMunazza-Mah-Jabeen
 

What's hot (20)

Software Engineering : Requirement Analysis & Specification
Software Engineering : Requirement Analysis & SpecificationSoftware Engineering : Requirement Analysis & Specification
Software Engineering : Requirement Analysis & Specification
 
Security in distributed systems
Security in distributed systems Security in distributed systems
Security in distributed systems
 
Unit1
Unit1Unit1
Unit1
 
Analysis modeling
Analysis modelingAnalysis modeling
Analysis modeling
 
Software Engineering by Pankaj Jalote
Software Engineering by Pankaj JaloteSoftware Engineering by Pankaj Jalote
Software Engineering by Pankaj Jalote
 
Paging and segmentation
Paging and segmentationPaging and segmentation
Paging and segmentation
 
Design Concept software engineering
Design Concept software engineeringDesign Concept software engineering
Design Concept software engineering
 
Software architecture design ppt
Software architecture design pptSoftware architecture design ppt
Software architecture design ppt
 
golden rules of user interface design
golden rules of user interface designgolden rules of user interface design
golden rules of user interface design
 
Coding and testing in Software Engineering
Coding and testing in Software EngineeringCoding and testing in Software Engineering
Coding and testing in Software Engineering
 
Chapter 13 software testing strategies
Chapter 13 software testing strategiesChapter 13 software testing strategies
Chapter 13 software testing strategies
 
Quality and productivity factors
Quality and productivity factorsQuality and productivity factors
Quality and productivity factors
 
Architectural styles and patterns
Architectural styles and patternsArchitectural styles and patterns
Architectural styles and patterns
 
Importance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML DesigningImportance & Principles of Modeling from UML Designing
Importance & Principles of Modeling from UML Designing
 
Ch5- Software Engineering 9
Ch5- Software Engineering 9Ch5- Software Engineering 9
Ch5- Software Engineering 9
 
Software engineering: design for reuse
Software engineering: design for reuseSoftware engineering: design for reuse
Software engineering: design for reuse
 
User Interface Analysis and Design
User Interface Analysis and DesignUser Interface Analysis and Design
User Interface Analysis and Design
 
Fundamental software engineering activities
Fundamental software engineering activitiesFundamental software engineering activities
Fundamental software engineering activities
 
Model Based Software Architectures
Model Based Software ArchitecturesModel Based Software Architectures
Model Based Software Architectures
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 

Similar to Software engineering critical systems

Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes arvind pandey
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring systemVikram Purohit
 
Complexity Reduction for Cyber-Physical-Human Medical Systems
Complexity Reduction for Cyber-Physical-Human Medical SystemsComplexity Reduction for Cyber-Physical-Human Medical Systems
Complexity Reduction for Cyber-Physical-Human Medical SystemsPo-Liang Wu
 
Complexity Reduction for Cyber-Physical-Human Medical Systems
Complexity Reduction for Cyber-Physical-Human Medical SystemsComplexity Reduction for Cyber-Physical-Human Medical Systems
Complexity Reduction for Cyber-Physical-Human Medical SystemsMDPnP_UIUC
 
Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Ian Sommerville
 
Software archiecture lecture05
Software archiecture   lecture05Software archiecture   lecture05
Software archiecture lecture05Luktalja
 
Low Complexity System Designs for Medical Cyber Physical Human Systems
Low Complexity System Designs for Medical Cyber Physical Human SystemsLow Complexity System Designs for Medical Cyber Physical Human Systems
Low Complexity System Designs for Medical Cyber Physical Human SystemsMDPnP_UIUC
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013Ian Sommerville
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systemsAlan Tatourian
 
Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3Siddharth Ayer
 
Software engineering 23 software reliability
Software engineering 23 software reliabilitySoftware engineering 23 software reliability
Software engineering 23 software reliabilityVaibhav Khanna
 
Human Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & SafetyHuman Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & SafetyDushyant Kalchuri
 
Software engineering socio-technical systems
Software engineering   socio-technical systemsSoftware engineering   socio-technical systems
Software engineering socio-technical systemsDr. Loganathan R
 
5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdfFelixKipyego1
 

Similar to Software engineering critical systems (20)

Unit 2-software development process notes
Unit 2-software development process notes Unit 2-software development process notes
Unit 2-software development process notes
 
Critical Systems
Critical SystemsCritical Systems
Critical Systems
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
 
Complexity Reduction for Cyber-Physical-Human Medical Systems
Complexity Reduction for Cyber-Physical-Human Medical SystemsComplexity Reduction for Cyber-Physical-Human Medical Systems
Complexity Reduction for Cyber-Physical-Human Medical Systems
 
Complexity Reduction for Cyber-Physical-Human Medical Systems
Complexity Reduction for Cyber-Physical-Human Medical SystemsComplexity Reduction for Cyber-Physical-Human Medical Systems
Complexity Reduction for Cyber-Physical-Human Medical Systems
 
Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)
 
Software archiecture lecture05
Software archiecture   lecture05Software archiecture   lecture05
Software archiecture lecture05
 
Low Complexity System Designs for Medical Cyber Physical Human Systems
Low Complexity System Designs for Medical Cyber Physical Human SystemsLow Complexity System Designs for Medical Cyber Physical Human Systems
Low Complexity System Designs for Medical Cyber Physical Human Systems
 
Ch3
Ch3Ch3
Ch3
 
Ch3
Ch3Ch3
Ch3
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013
 
SEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptxSEPM_MODULE 2 PPT.pptx
SEPM_MODULE 2 PPT.pptx
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systems
 
Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3
 
Software engineering 23 software reliability
Software engineering 23 software reliabilitySoftware engineering 23 software reliability
Software engineering 23 software reliability
 
Human Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & SafetyHuman Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & Safety
 
Ch3
Ch3Ch3
Ch3
 
Ch11
Ch11Ch11
Ch11
 
Software engineering socio-technical systems
Software engineering   socio-technical systemsSoftware engineering   socio-technical systems
Software engineering socio-technical systems
 
5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf5 - Safety - Critical Systems.pdf
5 - Safety - Critical Systems.pdf
 

More from Dr. Loganathan R

Ch 6 IoT Processing Topologies and Types.pdf
Ch 6 IoT Processing Topologies and Types.pdfCh 6 IoT Processing Topologies and Types.pdf
Ch 6 IoT Processing Topologies and Types.pdfDr. Loganathan R
 
IoT Sensing and Actuation.pdf
 IoT Sensing and Actuation.pdf IoT Sensing and Actuation.pdf
IoT Sensing and Actuation.pdfDr. Loganathan R
 
Program in ‘C’ language to implement linear search using pointers
Program in ‘C’ language to implement linear search using pointersProgram in ‘C’ language to implement linear search using pointers
Program in ‘C’ language to implement linear search using pointersDr. Loganathan R
 
Implement a queue using two stacks.
Implement a queue using two stacks.Implement a queue using two stacks.
Implement a queue using two stacks.Dr. Loganathan R
 
Bcsl 033 data and file structures lab s5-3
Bcsl 033 data and file structures lab s5-3Bcsl 033 data and file structures lab s5-3
Bcsl 033 data and file structures lab s5-3Dr. Loganathan R
 
Bcsl 033 data and file structures lab s5-2
Bcsl 033 data and file structures lab s5-2Bcsl 033 data and file structures lab s5-2
Bcsl 033 data and file structures lab s5-2Dr. Loganathan R
 
Bcsl 033 data and file structures lab s4-3
Bcsl 033 data and file structures lab s4-3Bcsl 033 data and file structures lab s4-3
Bcsl 033 data and file structures lab s4-3Dr. Loganathan R
 
Bcsl 033 data and file structures lab s4-2
Bcsl 033 data and file structures lab s4-2Bcsl 033 data and file structures lab s4-2
Bcsl 033 data and file structures lab s4-2Dr. Loganathan R
 
Bcsl 033 data and file structures lab s3-3
Bcsl 033 data and file structures lab s3-3Bcsl 033 data and file structures lab s3-3
Bcsl 033 data and file structures lab s3-3Dr. Loganathan R
 
Bcsl 033 data and file structures lab s3-2
Bcsl 033 data and file structures lab s3-2Bcsl 033 data and file structures lab s3-2
Bcsl 033 data and file structures lab s3-2Dr. Loganathan R
 
Bcsl 033 data and file structures lab s3-1
Bcsl 033 data and file structures lab s3-1Bcsl 033 data and file structures lab s3-1
Bcsl 033 data and file structures lab s3-1Dr. Loganathan R
 
Bcsl 033 data and file structures lab s2-3
Bcsl 033 data and file structures lab s2-3Bcsl 033 data and file structures lab s2-3
Bcsl 033 data and file structures lab s2-3Dr. Loganathan R
 
Bcsl 033 data and file structures lab s2-2
Bcsl 033 data and file structures lab s2-2Bcsl 033 data and file structures lab s2-2
Bcsl 033 data and file structures lab s2-2Dr. Loganathan R
 
Bcsl 033 data and file structures lab s2-1
Bcsl 033 data and file structures lab s2-1Bcsl 033 data and file structures lab s2-1
Bcsl 033 data and file structures lab s2-1Dr. Loganathan R
 
Bcsl 033 data and file structures lab s1-4
Bcsl 033 data and file structures lab s1-4Bcsl 033 data and file structures lab s1-4
Bcsl 033 data and file structures lab s1-4Dr. Loganathan R
 
Bcsl 033 data and file structures lab s1-3
Bcsl 033 data and file structures lab s1-3Bcsl 033 data and file structures lab s1-3
Bcsl 033 data and file structures lab s1-3Dr. Loganathan R
 
Bcsl 033 data and file structures lab s1-2
Bcsl 033 data and file structures lab s1-2Bcsl 033 data and file structures lab s1-2
Bcsl 033 data and file structures lab s1-2Dr. Loganathan R
 
Bcsl 033 data and file structures lab s1-1
Bcsl 033 data and file structures lab s1-1Bcsl 033 data and file structures lab s1-1
Bcsl 033 data and file structures lab s1-1Dr. Loganathan R
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 

More from Dr. Loganathan R (20)

Ch 6 IoT Processing Topologies and Types.pdf
Ch 6 IoT Processing Topologies and Types.pdfCh 6 IoT Processing Topologies and Types.pdf
Ch 6 IoT Processing Topologies and Types.pdf
 
IoT Sensing and Actuation.pdf
 IoT Sensing and Actuation.pdf IoT Sensing and Actuation.pdf
IoT Sensing and Actuation.pdf
 
Ch 4 Emergence of IoT.pdf
Ch 4 Emergence of IoT.pdfCh 4 Emergence of IoT.pdf
Ch 4 Emergence of IoT.pdf
 
Program in ‘C’ language to implement linear search using pointers
Program in ‘C’ language to implement linear search using pointersProgram in ‘C’ language to implement linear search using pointers
Program in ‘C’ language to implement linear search using pointers
 
Implement a queue using two stacks.
Implement a queue using two stacks.Implement a queue using two stacks.
Implement a queue using two stacks.
 
Bcsl 033 data and file structures lab s5-3
Bcsl 033 data and file structures lab s5-3Bcsl 033 data and file structures lab s5-3
Bcsl 033 data and file structures lab s5-3
 
Bcsl 033 data and file structures lab s5-2
Bcsl 033 data and file structures lab s5-2Bcsl 033 data and file structures lab s5-2
Bcsl 033 data and file structures lab s5-2
 
Bcsl 033 data and file structures lab s4-3
Bcsl 033 data and file structures lab s4-3Bcsl 033 data and file structures lab s4-3
Bcsl 033 data and file structures lab s4-3
 
Bcsl 033 data and file structures lab s4-2
Bcsl 033 data and file structures lab s4-2Bcsl 033 data and file structures lab s4-2
Bcsl 033 data and file structures lab s4-2
 
Bcsl 033 data and file structures lab s3-3
Bcsl 033 data and file structures lab s3-3Bcsl 033 data and file structures lab s3-3
Bcsl 033 data and file structures lab s3-3
 
Bcsl 033 data and file structures lab s3-2
Bcsl 033 data and file structures lab s3-2Bcsl 033 data and file structures lab s3-2
Bcsl 033 data and file structures lab s3-2
 
Bcsl 033 data and file structures lab s3-1
Bcsl 033 data and file structures lab s3-1Bcsl 033 data and file structures lab s3-1
Bcsl 033 data and file structures lab s3-1
 
Bcsl 033 data and file structures lab s2-3
Bcsl 033 data and file structures lab s2-3Bcsl 033 data and file structures lab s2-3
Bcsl 033 data and file structures lab s2-3
 
Bcsl 033 data and file structures lab s2-2
Bcsl 033 data and file structures lab s2-2Bcsl 033 data and file structures lab s2-2
Bcsl 033 data and file structures lab s2-2
 
Bcsl 033 data and file structures lab s2-1
Bcsl 033 data and file structures lab s2-1Bcsl 033 data and file structures lab s2-1
Bcsl 033 data and file structures lab s2-1
 
Bcsl 033 data and file structures lab s1-4
Bcsl 033 data and file structures lab s1-4Bcsl 033 data and file structures lab s1-4
Bcsl 033 data and file structures lab s1-4
 
Bcsl 033 data and file structures lab s1-3
Bcsl 033 data and file structures lab s1-3Bcsl 033 data and file structures lab s1-3
Bcsl 033 data and file structures lab s1-3
 
Bcsl 033 data and file structures lab s1-2
Bcsl 033 data and file structures lab s1-2Bcsl 033 data and file structures lab s1-2
Bcsl 033 data and file structures lab s1-2
 
Bcsl 033 data and file structures lab s1-1
Bcsl 033 data and file structures lab s1-1Bcsl 033 data and file structures lab s1-1
Bcsl 033 data and file structures lab s1-1
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 

Recently uploaded

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Recently uploaded (20)

Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Software engineering critical systems

  • 1. Critical Systems Loganathan R. Prof. Loganathan R., CSE, HKBKCE 1
  • 2. Objectives • To explain what is meant by a critical system where system failure can have severe human or economic consequence. • To explain four dimensions of dependability - availability, reliability, safety and security. • To explain that, to achieve dependability, you need to avoid mistakes, detect and remove errors and limit damage caused by failure. Prof. Loganathan R., CSE, HKBKCE 2
  • 3. Critical Systems • If the system failure results in significant economic losses, physical damages or threats to human life than the system is called critical systems. 3 types of it are: • Safety-critical systems – Failure results in loss of life, injury or damage to the environment; – Chemical plant protection system; • Mission-critical systems – Failure results in failure of some goal-directed activity; – Spacecraft navigation system; • Business-critical systems – Failure results in high economic losses; – Customer accounting system in a bank; Prof. Loganathan R., CSE, HKBKCE 3
  • 4. System dependability • The most important emergent property of a critical system is its dependability. It covers the related system attributes of availability, reliability, safety & security. • Importance of dependability – Systems that are unreliable, unsafe or insecure are often rejected by their users(refuse to the product from the same company). – System failure costs may be very high.(reactor / aircraft navigation) – Untrustworthy systems may cause information loss with a high consequent recovery cost. Prof. Loganathan R., CSE, HKBKCE 4
  • 5. Development methods for critical systems • Trusted methods and technique must be used. • These methods are not cost-effective for other types of system. • The older methods strengths & weaknesses are understood • Formal methods reduce the amount of testing required. Example : – Formal mathematical method Prof. Loganathan R., CSE, HKBKCE 5
  • 6. Socio-technical critical systems Failures • Hardware failure – Hardware fails because of design and manufacturing errors or because components have reached the end of their natural life. • Software failure – Software fails due to errors in its specification, design or implementation. • Human Operator failure – Fail to operate correctly. – Now perhaps the largest single cause of system failures. Prof. Loganathan R., CSE, HKBKCE 6
  • 7. A Simple safety Critical System • Example of software-controlled insulin pump. • Used by diabetics to simulate the function of insulin, an essential hormone that metabolises blood glucose. • Measures blood glucose (sugar) using a micro- sensor and computes the insulin dose required to metabolise the glucose. Prof. Loganathan R., CSE, HKBKCE 7
  • 8. Insulin pump organisation Insulin reservoir Needle Clock assembly Pump Sensor Controller Alarm Display1 Display2 Power supply Prof. Loganathan R., CSE, HKBKCE 8
  • 9. Insulin pump data-flow Blood Blood Blood sugar parameters Blood sugar sensor analysis Blood sugar level Insulin requirement computation Insulin Pump control Insulin commands Insulin requirement Insulin delivery pump controller Prof. Loganathan R., CSE, HKBKCE 9
  • 10. Dependability requirements • The system shall be available to deliver insulin when required to do so. • The system shall perform reliably and deliver the correct amount of insulin to counteract the current level of blood sugar. • The essential safety requirement is that excessive doses of insulin should never be delivered as this is potentially life threatening. Prof. Loganathan R., CSE, HKBKCE 10
  • 11. System Dependability • The dependability of a system equates to its trustworthiness. • A dependable system is a system that is trusted by its users. • Principal dimensions of dependability are: – Availability :- Probability that it will be up & running & able to deliver at any given time ; – Reliability :-Correct delivery of services as expected by user over a given period of time; – Safety :-A Judgment of how likely the system will cause damage to people or its environment; – Security :- A Judgment of how likely the system can resist accidental or deliberate intrusions; Prof. Loganathan R., CSE, HKBKCE 11
  • 12. Dimensions of dependability Dependability Availability Reliability Safety Security The ability of the system The ability of the The ability of the system The ability of the system to deliver services when system to deliver to operate without to protect itself against requested services as specified catastrophic failure accidental or deliberate intrusion Prof. Loganathan R., CSE, HKBKCE 12
  • 13. Other dependability properties • Repairability – Reflects the extent to which the system can be repaired in the event of a failure • Maintainability – Reflects the extent to which the system can be adapted to new requirements; • Survivability – Reflects the extent to which the system can deliver services while it is under hostile attack; • Error tolerance – Reflects the extent to which user input errors can be avoided and tolerated. Prof. Loganathan R., CSE, HKBKCE 13
  • 14. Dependability vs performance • It is very difficult to tune systems to make them more dependable • High level dependability can be achieved by expense of performance. Because it include extra/ redundant code to perform necessary checking • It also increases the cost. Prof. Loganathan R., CSE, HKBKCE 14
  • 15. Dependability costs • Dependability costs tend to increase exponentially as increasing levels of dependability are required • There are two reasons for this – The use of more expensive development techniques and hardware that are required to achieve the higher levels of dependability – The increased testing and system validation that is required to convince the system client that the required levels of dependability have been achieved Prof. Loganathan R., CSE, HKBKCE 15
  • 16. Costs of increasing dependability Cost Low Medium High Very Ultra-high high Dependability Prof. Loganathan R., CSE, HKBKCE 16
  • 17. Availability and reliability • Reliability – The probability of failure-free system operation over a specified time in a given environment for a specific purpose • Availability – The probability that a system, at a point in time, will be operational and able to deliver the requested services • Both of these attributes can be expressed quantitatively Prof. Loganathan R., CSE, HKBKCE 17
  • 18. Availability and reliability • It is sometimes possible to include system availability under system reliability – Obviously if a system is unavailable it is not delivering the specified system services • However, it is possible to have systems with low reliability that must be available. So long as system failures can be repaired quickly and do not damage data, low reliability may not be a problem • Availability takes repair time into account Prof. Loganathan R., CSE, HKBKCE 18
  • 19. Faults, Errors and failures • Failures are a usually a result of system errors that are derived from faults in the system • However, faults do not necessarily result in system errors – The faulty system state may be transient and ‘corrected’ before an error arises • Errors do not necessarily lead to system failures – The error can be corrected by built-in error detection and recovery – The failure can be protected against by built-in protection facilities. These may, for example, protect system resources from system errors Prof. Loganathan R., CSE, HKBKCE 19
  • 20. Reliability terminology Term Description An event that occurs at some point in time when the system System failure does not deliver a service as expected by its users An erroneous system state that can lead to system behaviour System error that is unexpected by system users. A characteristic of a software system that can lead to a system error. For example, failure to initialise a variable System fault could lead to that variable having the wrong value when it is used. Human error or Human behaviour that results in the introduction of faults mistake into a system. Prof. Loganathan R., CSE, HKBKCE 20
  • 21. Reliability Improvement • Three approaches to improve reliability • Fault avoidance – Development technique are used that either minimise the possibility of mistakes or trap mistakes before they result in the introduction of system faults • Fault detection and removal – Verification and validation techniques that increase the probability of detecting and correcting errors before the system goes into service are used • Fault tolerance – Run-time techniques are used to ensure that system faults do not result in system errors and/or that system errors do not lead to system failures Prof. Loganathan R., CSE, HKBKCE 21
  • 22. Reliability modelling • You can model a system as an input-output mapping where some inputs will result in erroneous outputs • The reliability of the system is the probability that a particular input will lie in the set of inputs that cause erroneous outputs • Different people will use the system in different ways so this probability is not a static system attribute but depends on the system’s environment Prof. Loganathan R., CSE, HKBKCE 22
  • 23. Input/output mapping Inputs causing erroneous outputs Input set Ie Program Erroneous outputs Output set Oe Prof. Loganathan R., CSE, HKBKCE 23
  • 24. Reliability perception Possible inputs User 1 Erroneous inputs User 3 User 2 Prof. Loganathan R., CSE, HKBKCE 24
  • 25. Reliability improvement • Removing X% of the faults in a system will not necessarily improve the reliability by X%. A study at IBM showed that removing 60% of product defects resulted in a 3% improvement in reliability • Program defects may be in rarely executed sections of the code so may never be encountered by users. Removing these does not affect the perceived reliability • A program with known faults may therefore still be seen as reliable by its users Prof. Loganathan R., CSE, HKBKCE 25
  • 26. Safety • Safety is a property of a system that reflects the system should never damage people or the system’s environment • For example control & monitoring systems in aircraft • It is increasingly important to consider software safety as more and more devices incorporate software-based control systems • Safety requirements are exclusive requirements i.e. they exclude undesirable situations rather than specify required system services • Safety critical software are 2 types Prof. Loganathan R., CSE, HKBKCE 26
  • 27. Types of Safety-critical software • Primary safety-critical systems – Embedded software systems whose failure can cause hardware malfunction which results inhuman injury or environmental damage. • Secondary safety-critical systems – Systems whose failure indirectly results in injury. – Eg. Medical Database holding details of drugs • Discussion here focuses on primary safety-critical systems Prof. Loganathan R., CSE, HKBKCE 27
  • 28. Safety and reliability • Safety and reliability are related but distinct – In general, reliability and availability are necessary but not sufficient conditions for system safety • Reliability is concerned with conformance to a given specification and delivery of service • Safety is concerned with ensuring system cannot cause damage irrespective of whether or not it conforms to its specification Prof. Loganathan R., CSE, HKBKCE 28
  • 29. Unsafe reliable systems • Reasons why reliable system are not necessarily safe: • Specification errors • It does not describe the required behaviour in some critical situations • Hardware failures generating spurious inputs • Hard to anticipate in the specification • Operator error • Context-sensitive commands i.e. issuing the right command at the wrong time Prof. Loganathan R., CSE, HKBKCE 29
  • 30. Safety terminology Term Definition An unplanned event or sequence of events which results in human death or injury, Accident (or damage to property or to the environment. A computer-controlled machine injuring its mishap) operator is an example of an accident. A condition with the potential for causing or contributing to an accident. A failure of the Hazard sensor that detects an obstacle in front of a machine is an example of a hazard. A measure of the loss resulting from a mishap. Damage can range from many people Damage killed as a result of an accident to minor injury or property damage. An assessment of the worst possible damage that could result from a particular Hazard severity hazard. Hazard severity can range from catastrophic where many people are killed to minor where only minor damage results. The probability of the events occurring which create a hazard. Probability values tend Hazard to be arbitrary but range from probable (say 1/100 chance of a hazard occurring) to probability implausible (no conceivable situations are likely where the hazard could occur). This is a measure of the probability that the system will cause an accident. The risk is Risk assessed by considering the hazard probability, the hazard severity and the probability that a hazard will result in an accident. Prof. Loganathan R., CSE, HKBKCE 30
  • 31. Ways to achieve Safety • Hazard avoidance – The system is designed so that hazard simply cannot arise. – Eg. Press 2 buttons at the same time in a cutting machine to start • Hazard detection and removal – The system is designed so that hazards are detected and removed before they result in an accident. – Eg. Open relief valve on detection over pressure in chemical plant. • Damage limitation – The system includes protection features that minimise the damage that may result from an accident – Automatic fire safety system in aircraft. Prof. Loganathan R., CSE, HKBKCE 31
  • 32. Security • Security is a system property that reflects the ability to protect itself from accidental or deliberate external attack. • Security is becoming increasingly important as systems are networked so that external access to the system through the Internet is possible • Security is an essential pre-requisite for availability, reliability and safety • Example : Viruses, unauthorised use of service/data modification Prof. Loganathan R., CSE, HKBKCE 32
  • 33. Security terminology Term Definition Possible loss or harm in a computing system. This can be loss or Exposure damage to data or can be a loss of time and effort if recovery is necessary after a security breach. A weakness in a computer-based system that may be exploited to Vulnerability cause loss or harm. An exploitation of a system vulnerability. Generally, this is from Attack outside the system and is a deliberate attempt to cause some damage. Circumstances that have potential to cause loss or harm. You can Threats think of these as a system vulnerability that is subjected to an attack. A protective measure that reduces a system vulnerability. Control Encryption would be an example of a control that reduced a vulnerability of a weak access control system. Prof. Loganathan R., CSE, HKBKCE 33
  • 34. Damage from insecurity • Denial of service – The system is forced into a state where normal services become unavailable. • Corruption of programs or data – The system components of the system may altered in an unauthorised way, which affect system behaviour & hence its reliability and safety • Disclosure of confidential information – Information that is managed by the system may be exposed to people who are not authorised to read or use that information Prof. Loganathan R., CSE, HKBKCE 34
  • 35. Security assurance • Vulnerability avoidance – The system is designed so that vulnerabilities do not occur. For example, if there is no external network connection then external attack is impossible • Attack detection and elimination – The system is designed so that attacks on vulnerabilities are detected and remove them before they result in an exposure. For example, virus checkers find and remove viruses before they infect a system • Exposure limitation – The consequences of a successful attack are minimised. For example, a backup policy allows damaged information to be restored Prof. Loganathan R., CSE, HKBKCE 35