Skip to content

Commit 4915422

Browse files
author
Ulrich Becker
committed
Minor editorial and stilistic changes
Harmonize use of title case Harmonize use of "system" vs. "systems" Use periods only for complete sentences Remove requirement for domain knowledge from LG 2-5, since this is not specific to model-based development Move memory constraints from chapter 1 to chapter 2
1 parent 16db29a commit 4915422

11 files changed

+65
-63
lines changed

docs/00b-basics/01-what-to-expect-of-this-module.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ achieved:
2424
The module “{curriculum-short}” conveys a methodical approach to architecture
2525
design for dependable embedded systems. It shows how software architecture
2626
interacts with the overall systems architecture, and how the requirements with
27-
regards to safety, dependability, real time and adaptability are addressed in a
27+
regards to safety, dependability, real-time and adaptability are addressed in a
2828
systematic way. In addition to patterns and solution concepts for designing
2929
appropriate software architectures, the module also addresses the analysis of
3030
software architectures with regard to the required quality characteristics.

docs/00b-basics/02-curriculum-structure-and-chronological-breakdown.adoc

+4-4
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,10 @@
88
|===
99
| Content
1010
| Recommended minimum duration (minutes)
11-
| 1. System development for embedded systems | 120
12-
| 2. Software development for embedded systems | 180
13-
| 3. Dependability and Functional safety | 330
14-
| 4. Real time and concurrency | 360
11+
| 1. Systems Development for Embedded Systems | 120
12+
| 2. Software Development for Embedded Systems | 180
13+
| 3. Dependability and Functional Safety | 330
14+
| 4. Real-Time and Concurrency | 360
1515
| 5. Adaptability | 90
1616
| |
1717
| Total | 1080 (18h)

docs/01-system-development/00-structure.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
// end::DE[]
77

88
// tag::EN[]
9-
== System development for embedded systems
9+
== Systems Development for Embedded Systems
1010
// end::EN[]
1111

1212

docs/01-system-development/01-duration-terms.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,6 @@
99
=== Terms and Principles
1010

1111
Systems architecture, functional architecture, technical systems architecture,
12-
event chain, systems development, software development, hardware development.
12+
event chain, systems development, software development, hardware development
1313

1414
// end::EN[]

docs/01-system-development/02-learning-goals.adoc

+23-22
Original file line numberDiff line numberDiff line change
@@ -47,11 +47,11 @@ functional architectures:
4747

4848
* Model the system context with external systems, physical entities, users of
4949
the system and the logical events that occur between the system and its
50-
environment
50+
environment.
5151

5252
* Hierarchically decompose the system from a purely functional perspective,
5353
identifying function blocks and their interactions via events or information
54-
flows
54+
flows.
5555

5656
* Define event chains based on the functional architecture. An event chain
5757
traces the end-to-end behavior from an external triggering event to the
@@ -62,44 +62,45 @@ Participants understand that a functional architecture enables reasoning about
6262
system quality characteristics at an abstract level, e.g., regarding time
6363
behavior, dependability, or flexibility.
6464

65-
Participants know examples of how functional architectures can be modelled,
66-
e.g. with SysML or FAS <<weilkiens-mbsa>>..
65+
Participants know examples of how functional architectures can be modeled (e.g.,
66+
with SysML or FAS <<weilkiens-mbsa>>).
6767

6868

6969
[[LG-1-3]]
70-
==== LG 1-3: Modeling and Analysis of Technical Systems Architectures
70+
==== LG 1-3: Modeling and Analysis of Technical System Architectures
7171

7272
Participants understand the systematic approach to modeling and analysis of
7373
technical systems architectures:
7474

7575
* Analyze the impact factors, like quality requirements, organizational
7676
constraints, technological constraints, as defined in the CPSA Foundation
77-
Level curriculum. For the technical systems architecture of embedded systems,
77+
Level curriculum. For the technical system architecture of an embedded system,
7878
impact factors are often related to dependability and safety requirements,
79-
performance, memory and real-time requirements, flexibility requirements and support
80-
for different product variants and product lines. Examples for further
79+
performance and real-time requirements, and flexibility requirements to
80+
support different product variants and product lines. Examples for further
8181
considerations are physical proximity to sensors and actuators, limited
82-
construction space, connectivity requirements, hardware cost, or development
82+
construction space, connectivity requirements, hardware cost, and development
8383
schedules.
8484

85-
* Based on the impact-factor analysis, identify architectural issues and
86-
develop solution strategies for topics such as error handling, resource
87-
efficiency, real-time architectural design and variability.
85+
* Based on the impact factors, identify architectural issues and develop
86+
solution strategies for topics such as error handling, resource efficiency,
87+
real-time architectural design and variability.
8888

89-
* Evaluate alternative technical systems architectures, and select a technical
90-
systems architecture for further refinement.
89+
* Evaluate alternative technical system architectures, and select a technical
90+
system architecture for further refinement.
9191

9292
* Hierarchically decompose the system into technical building blocks, and
93-
establish a mapping to the elements of the functional architecture, if applicable.
93+
establish a mapping to the elements of the functional architecture, if
94+
applicable.
9495

9596
* Map event chains to the technical architecture, if applicable: For example,
96-
allocate a function to determine a measurement to a physical sensor, or allocate
97-
an information flow to a bus.
97+
allocate a function to determine a measurement to a physical sensor, or
98+
allocate an information flow to a bus.
9899

99-
* Evaluate the defined technical systems architecture with regard to the impact
100+
* Evaluate the defined technical system architecture with regard to the impact
100101
factors.
101102

102-
Participants know examples of how technical systems architectures can be modelled,
103+
Participants know examples of how technical system architectures can be modeled,
103104
for example with SysML.
104105

105106
Participants understand that the design of a technical systems architecture is an
@@ -116,7 +117,7 @@ technical systems architecture:
116117
(e.g., single core, homogeneous multi core, heterogeneous multi core, amount of
117118
RAM, ROM, NVRAM, peripherals like sensors and actuators, custom hardware).
118119

119-
* Allocation of functional blocks to one or more control units, considering
120+
* Allocation of function blocks to one or more control units, considering
120121
for example performance and isolation requirements.
121122

122123
* Decide on the communication paradigm (e.g., time triggered vs. event triggered).
@@ -125,7 +126,7 @@ technical systems architecture:
125126
both wired (e.g., ethernet, flexray, CAN), and wireless (e.g., Bluetooth,
126127
WiFi, cellular).
127128

128-
* Understand the challenges of distributed systems regarding latency,
129-
throughput, lack of a global clock, impact on dependability.
129+
Participants understand the challenges of distributed systems regarding latency,
130+
throughput, lack of a global clock, and the impact on dependability.
130131

131132
// end::EN[]

docs/02-software-development/00-structure.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
// end::DE[]
66

77
// tag::EN[]
8-
== Software development for embedded systems
8+
== Software Development for Embedded Systems
99
// end::EN[]
1010

1111
include::01-duration-terms.adoc[{include_configuration}]

docs/02-software-development/02-learning-goals.adoc

+9-10
Original file line numberDiff line numberDiff line change
@@ -13,20 +13,19 @@ Participants know different approaches for modeling software for embedded
1313
systems. They understand the basic concepts, strengths and weaknesses of these
1414
approaches:
1515

16-
* UML as a general-purpose modeling language.
16+
* UML as a general-purpose modeling language
1717

1818
* UML profiles to adapt UML to a specific domain (e.g., MARTE as a UML profile
1919
for modeling real-time systems).
2020

21-
* Graphical and textual domain-specific languages (e.g., AADL).
21+
* Graphical and textual domain-specific languages (e.g., AADL)
2222

2323
* State machines for modeling reactive systems.
2424

25-
* Modeling data- and signal-flows (e.g., function-block diagrams).
25+
* Modeling data- and signal-flows (e.g., function-block diagrams)
2626

2727
Participants understand how models can be used for analyzing the software, for
28-
examples with regards to failures (e.g., FTA / FMEA), schedulability, error
29-
propagation, and latency.
28+
example regarding failures, schedulability, error propagation, and latency.
3029

3130
Participants are able to select a suitable modeling approach based on the
3231
requirements and boundary conditions of the system under development.
@@ -64,16 +63,16 @@ flexibility, predictability, performance and programming complexity:
6463
collection, automated reference counting, ownership / non-lexical scoping) and
6564
their trade-offs.
6665

67-
* Know the impact of systems-architectural decisions on memory management (e.g.,
68-
availability of memory management hardware like an MMU or MPU, CPU caches),
69-
know software-based approaches to memory safety.
66+
* Know the impact of system-architectural decisions on memory management (e.g.,
67+
amount of memory, availability of memory management hardware like an MMU or
68+
MPU, CPU caches), know software-based approaches to memory safety.
7069

7170
[[LG-2-4]]
7271
==== LG 2-4: Error Handling
7372

7473
Participants know different language features and patterns for error handling
7574
and their strengths and weaknesses, such as return values, global error status
76-
variables, global error handlers, exceptions, monadic error handling (e.g.
75+
variables, global error handlers, exceptions, monadic error handling (e.g.,
7776
"Result" types, "Either" types).
7877

7978

@@ -101,7 +100,7 @@ realization, and understand the trade-offs:
101100

102101
* Using a model-based approach has the following potential costs:
103102

104-
** Creating a sufficiently detailed model requires significant effort and domain knowledge, which
103+
** Creating a sufficiently detailed model requires significant effort, which
105104
needs to be weighed against the potential savings.
106105

107106
** Generated code often has increased resource demands.

docs/03-dependability/02-learning-goals.adoc

+11-11
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,14 @@ system:
2222

2323
* Perform a hazard and risk analysis.
2424

25-
* Decide the kind of risk treatment (mitigate, eliminate, transfer or accept).
25+
* Decide the kind of risk treatment (mitigate, eliminate, transfer, or accept).
2626

2727
* Define and allocate safety requirements.
2828

29-
* Implement safety requirements on system, hardware and software level.
29+
* Implement safety requirements on system, hardware, and software level.
3030

31-
* Analyze the system's residual risk, e.g. with FMEA and FTA, to verify that
32-
an acceptable level of risk has been achieved.
31+
* Analyze the system's residual risk to verify that an acceptable level of risk
32+
has been achieved (e.g., with FMEA and FTA).
3333

3434
Participants understand that functional safety must be considered on the system
3535
level, and impacts systems architecture, software architecture, and hardware
@@ -62,7 +62,7 @@ Participants understand the process of safety classification:
6262
* By decomposing a building block, its associated risk can be distributed over
6363
and encapsulated in multiple building blocks. This can lead to a lower risk
6464
classification for the individual building blocks. To do so, freedom from
65-
interference must to be ensured between these.
65+
interference must be ensured between these building blocks.
6666

6767
* The details of safety classification and decomposition are subject to specific
6868
norms and standards.
@@ -96,7 +96,7 @@ fault-tolerant systems and how they interact with each other:
9696
undetected or unhandled errors may lead to system failure.
9797

9898
* The externally observable behavior of component in the event of an error can
99-
be classified as fail stop, fail operational, fail silent or fail consistent
99+
be classified as fail stop, fail operational, fail silent, or fail consistent
100100
behavior.
101101

102102
* Redundancy can help to build fault-tolerant systems. Homogeneous and
@@ -117,8 +117,8 @@ fault-tolerant and safety-related systems:
117117
redundancy. Replication is applied to an architectural building
118118
block. Therefore, the sphere of replication has to be aligned with
119119
architectural building blocks. Strong cohesion and loose coupling principles
120-
have to be taken into consideration for that. The concept of the sphere of replication can
121-
also be applied to isolation zones with respect to memory regions (i.e.,
120+
have to be taken into consideration for that. The sphere of replication is
121+
often aligned with isolation zones with respect to memory regions (i.e.,
122122
address spaces) and control flows (i.e., threads).
123123

124124
* Participants can select and apply architectural patterns and techniques to
@@ -160,7 +160,7 @@ recommendations for processes and methods.
160160
==== LG 3-8: Patterns for Detecting Errors and Failures
161161

162162
Participants an select and apply patterns and techniques such as Checksum,
163-
Parameter Checking, Heartbeat, Leaky-Bucket Counter, System Monitor, Watchdog,
163+
Parameter Checking, Heartbeat, Leaky Bucket Counter, System Monitor, Watchdog,
164164
Plausibility Checks, Control-Flow Monitoring.
165165

166166
Participants can select and apply detection patterns that are used with
@@ -179,7 +179,7 @@ Restart, Return to Reference Point, Rollback, Roll-Forward.
179179
[[LG-3-10]]
180180
==== LG 3-10: Patterns for Error Mitigation
181181

182-
Participants can select and apply patterns for error mitigation such as Error-Correcting Codes and Marked Data.
183-
182+
Participants can select and apply patterns for error mitigation such as
183+
Error-Correcting Codes and Marked Data.
184184

185185
// end::EN[]

docs/04-realtime/00-structure.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
// end::DE[]
66

77
// tag::EN[]
8-
== Real time and concurrency
8+
== Real-Time and Concurrency
99
// end::EN[]
1010

1111
include::01-duration-terms.adoc[{include_configuration}]

docs/04-realtime/01-duration-terms.adoc

+8-7
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,14 @@
88

99
=== Terms and Principles
1010

11-
Hard and firm vs. soft real-time requirements, cyclic executive and cyclic schedules, interrupts, real-time
12-
operating systems, jobs, tasks, threads, processes, static vs dynamic
13-
scheduling, time-triggered vs event-triggered real-time systems, priority
14-
inversion, priority inheritance, priority ceiling, schedulability analysis, worst-case execution time (WCET), worst observed execution time (WOET),
15-
execution time estimation, CPU load estimation, real-time architectural design
16-
simulation and verification, concurrent resource access and coordination
17-
techniques, black-box simulation vs. white-box simulation.
11+
Hard and firm vs. soft real-time requirements, cyclic executive and cyclic
12+
schedules, interrupts, real-time operating systems, jobs, tasks, threads,
13+
processes, static vs dynamic scheduling, time-triggered vs event-triggered
14+
real-time systems, priority inversion, priority inheritance, priority ceiling,
15+
schedulability analysis, worst-case execution time (WCET), worst observed
16+
execution time (WOET), execution time estimation, CPU load estimation, real-time
17+
architectural design simulation and verification, concurrent resource access and
18+
coordination techniques, black-box simulation vs. white-box simulation.
1819

1920

2021
// end::EN[]

docs/04-realtime/02-learning-goals.adoc

+5-4
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ result of their interaction with the environment.
1212

1313
Participants can explain the difference between timeliness and speed.
1414

15-
Participants can explain the difference between hard/firm real-time requirements and
16-
soft real-time requirements.
15+
Participants can explain the difference between hard/firm real-time requirements
16+
and soft real-time requirements.
1717

1818
Participants understand that all actions along the event chain from the
1919
occurrence of a relevant event to the system reaction must be examined when
@@ -76,8 +76,9 @@ Participants understand that real-time is a cross-cutting concern.
7676
==== LG 4-3: Real-Time Requirements
7777

7878
Participants are able to specify and model real-time requirements. They know
79-
different approaches to specifying real-time requirements (e.g., UML, SysML, AADL)
80-
and are able to select a suitable approach for a particular system.
79+
different approaches to specifying real-time requirements (e.g., specifiying
80+
real-time requirements in UML, SysML, or AADL) and are able to select a suitable
81+
approach for a particular system.
8182

8283

8384
[[LG-4-4]]

0 commit comments

Comments
 (0)