Preface |
|
xiii | |
Book Layout |
|
xv | |
Acknowledgments |
|
xvii | |
|
1 Introduction to Real-Time Embedded Systems |
|
|
1 | (16) |
|
1.1 Real-Time Embedded Systems |
|
|
1 | (2) |
|
1.2 Example: Automobile Antilock Braking System |
|
|
3 | (7) |
|
1.2.1 Slip Rate and Brake Force |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (2) |
|
1.2.2.3 Electrical Control Unit |
|
|
7 | (1) |
|
|
8 | (2) |
|
1.3 Real-Time Embedded System Characteristics |
|
|
10 | (3) |
|
|
10 | (1) |
|
|
10 | (1) |
|
1.3.3 Highly Constrained Environments |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
1.3.6 Safety and Reliability |
|
|
13 | (1) |
|
1.4 Hard and Soft Real-Time Embedded Systems |
|
|
13 | (4) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (2) |
|
|
17 | (16) |
|
|
17 | (6) |
|
|
17 | (2) |
|
|
19 | (1) |
|
2.1.3 Application-Specific Integrated Circuits (ASICs) |
|
|
19 | (1) |
|
2.1.4 Field-Programmable Gate Arrays (FPGAs) |
|
|
19 | (1) |
|
2.1.5 Digital Signal Processors (DSPs) |
|
|
20 | (1) |
|
2.1.6 Application-Specific Instruction Set Processors (ASIPs) |
|
|
20 | (1) |
|
2.1.7 Multicore Processors |
|
|
20 | (1) |
|
2.1.8 Von Neumann Architecture and Harvard Architecture |
|
|
21 | (1) |
|
2.1.9 Complex Instruction Set Computing and Reduced Instruction Set Computing |
|
|
22 | (1) |
|
|
23 | (3) |
|
2.2.1 Read-Only Memory (ROM) |
|
|
23 | (1) |
|
2.2.2 Random-Access Memory (RAM) |
|
|
24 | (1) |
|
|
24 | (2) |
|
|
26 | (1) |
|
2.4 Sensors and Actuators |
|
|
27 | (2) |
|
|
29 | (4) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (2) |
|
3 Real-Time Operating Systems |
|
|
33 | (20) |
|
3.1 Main Functions of General-Purpose Operating Systems |
|
|
33 | (9) |
|
|
34 | (2) |
|
|
36 | (3) |
|
3.1.3 Interrupts Management |
|
|
39 | (1) |
|
|
39 | (1) |
|
3.1.5 File System Management |
|
|
39 | (2) |
|
|
41 | (1) |
|
3.2 Characteristics of RTOS Kernels |
|
|
42 | (6) |
|
|
42 | (2) |
|
3.2.2 Priority Scheduling |
|
|
44 | (1) |
|
3.2.3 Intertask Communication and Resource Sharing |
|
|
45 | (1) |
|
3.2.3.1 Real-Time Signals |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
|
48 | (5) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
3.3.5 Windows Embedded Compact |
|
|
50 | (1) |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (46) |
|
|
53 | (6) |
|
|
54 | (2) |
|
|
56 | (2) |
|
4.1.3 Precedence Constraints |
|
|
58 | (1) |
|
4.1.4 Task Assignment and Scheduling |
|
|
59 | (1) |
|
4.2 Clock-Driven Scheduling |
|
|
59 | (10) |
|
4.2.1 Structured Clock-Driven Scheduling |
|
|
62 | (1) |
|
|
62 | (3) |
|
|
65 | (1) |
|
4.2.2 Scheduling Aperiodic Tasks |
|
|
66 | (2) |
|
4.2.3 Scheduling Sporadic Tasks |
|
|
68 | (1) |
|
|
69 | (1) |
|
4.4 Priority-Driven Scheduling Algorithms |
|
|
70 | (19) |
|
4.4.1 Fixed-Priority Algorithms |
|
|
70 | (2) |
|
4.4.1.1 Schedulability Test Based on Time Demand Analysis |
|
|
72 | (4) |
|
4.4.1.2 Deadline-Monotonic Algorithm |
|
|
76 | (1) |
|
4.4.2 Dynamic-Priority Algorithms |
|
|
76 | (1) |
|
4.4.2.1 Earliest-Deadline-First (EDF) Algorithm |
|
|
76 | (2) |
|
4.4.2.2 Optimality of EDF |
|
|
78 | (4) |
|
4.4.3 Priority-Driven Scheduling of Aperiodic and Sporadic Tasks |
|
|
82 | (1) |
|
4.4.3.1 Scheduling of Aperiodic Tasks |
|
|
82 | (3) |
|
4.4.3.2 Scheduling of Sporadic Tasks |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (1) |
|
4.4.4.4 Schedulability Test |
|
|
87 | (2) |
|
|
89 | (10) |
|
4.5.1 Bin-Packing Algorithms |
|
|
89 | (1) |
|
4.5.1.1 First-Fit Algorithm |
|
|
90 | (1) |
|
4.5.1.2 First-Fit Decreasing Algorithm |
|
|
91 | (1) |
|
4.5.1.3 Rate-Monotonic First-Fit (RMFF) Algorithm |
|
|
91 | (1) |
|
4.5.2 Assignment with Communication Cost |
|
|
92 | (2) |
|
|
94 | (3) |
|
|
97 | (1) |
|
|
97 | (2) |
|
5 Resource Sharing and Access Control |
|
|
99 | (28) |
|
|
99 | (4) |
|
|
100 | (1) |
|
5.1.2 Resource Requirement Specification |
|
|
100 | (1) |
|
5.1.3 Priority Inversion and Deadlocks |
|
|
101 | (2) |
|
5.1.4 Resource Access Control |
|
|
103 | (1) |
|
5.2 Nonpreemptive Critical Section Protocol |
|
|
103 | (3) |
|
5.3 Priority Inheritance Protocol |
|
|
106 | (5) |
|
5.3.1 Rules of Priority Inheritance Protocol |
|
|
106 | (3) |
|
5.3.2 Properties of Priority Inheritance Protocol |
|
|
109 | (2) |
|
5.4 Priority Ceiling Protocol |
|
|
111 | (8) |
|
5.4.1 Rules of Priority Ceiling Protocol |
|
|
112 | (2) |
|
5.4.2 Properties of Priority Ceiling Protocol |
|
|
114 | (2) |
|
5.4.3 Worst-Case Blocking Time |
|
|
116 | (3) |
|
5.5 Stack-Sharing Priority Ceiling Protocol |
|
|
119 | (8) |
|
5.5.1 Rules of Stack-Sharing Priority Ceiling Protocol |
|
|
119 | (2) |
|
5.5.2 Properties of Stack-Sharing Priority Ceiling Protocol |
|
|
121 | (1) |
|
|
122 | (3) |
|
|
125 | (1) |
|
|
125 | (2) |
|
|
127 | (52) |
|
|
127 | (1) |
|
|
128 | (5) |
|
6.3 Synchronization Primitives |
|
|
133 | (15) |
|
6.3.1 Race Conditions and Critical Sections |
|
|
133 | (1) |
|
|
134 | (3) |
|
6.3.3 Condition Variables |
|
|
137 | (5) |
|
|
142 | (6) |
|
6.4 Communication among Tasks |
|
|
148 | (14) |
|
|
149 | (6) |
|
|
155 | (2) |
|
6.4.3 Shared Memory Protection |
|
|
157 | (5) |
|
|
162 | (17) |
|
|
162 | (1) |
|
|
163 | (1) |
|
6.5.1.2 Dealing with Signals |
|
|
164 | (1) |
|
|
165 | (4) |
|
6.5.3 Implement Periodic Tasks |
|
|
169 | (1) |
|
6.5.3.1 Using sleep() Function |
|
|
169 | (3) |
|
|
172 | (1) |
|
6.5.4 Implement an Application with Multiple Periodic Tasks |
|
|
173 | (1) |
|
|
173 | (4) |
|
|
177 | (1) |
|
|
177 | (2) |
|
|
179 | (18) |
|
7.1 Finite State Machine Basics |
|
|
179 | (2) |
|
7.2 Deterministic Finite Automation (DFA) |
|
|
181 | (7) |
|
|
182 | (2) |
|
|
184 | (4) |
|
7.3 Nondeterministic Finite Automation |
|
|
188 | (1) |
|
7.4 Programming Finite-State Machines |
|
|
188 | (9) |
|
|
191 | (3) |
|
|
194 | (1) |
|
|
195 | (2) |
|
|
197 | (22) |
|
|
198 | (2) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
202 | (4) |
|
|
203 | (2) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (5) |
|
8.5.1 History Pseudostates |
|
|
206 | (2) |
|
8.5.2 Entry and Exit Points |
|
|
208 | (2) |
|
8.5.3 Fork and Join Pseudostates |
|
|
210 | (1) |
|
8.5.4 Terminate Pseudostates |
|
|
210 | (1) |
|
8.6 UML State Machine of Antilock Braking System |
|
|
211 | (8) |
|
|
215 | (2) |
|
|
217 | (1) |
|
|
217 | (2) |
|
|
219 | (34) |
|
|
219 | (6) |
|
|
221 | (1) |
|
|
222 | (3) |
|
|
225 | (9) |
|
9.2.1 Behavioral Properties |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
9.2.1.3 Reachability Analysis Algorithm |
|
|
227 | (2) |
|
9.2.1.4 Boundedness and Safeness |
|
|
229 | (1) |
|
|
229 | (1) |
|
9.2.2 Structural Properties |
|
|
230 | (1) |
|
9.2.2.1 T-Invariants and S-Invariants |
|
|
230 | (3) |
|
9.2.2.2 Siphons and Traps |
|
|
233 | (1) |
|
|
234 | (19) |
|
9.3.1 Deterministic Timed Petri Nets |
|
|
234 | (3) |
|
9.3.1.1 Performance Evaluation Based on DTPNs |
|
|
237 | (3) |
|
|
240 | (1) |
|
9.3.2.1 States in a Time Petri Net |
|
|
241 | (1) |
|
9.3.2.2 Enabling and Firing Conditions of Transitions |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
244 | (6) |
|
|
250 | (1) |
|
|
251 | (2) |
|
|
253 | (40) |
|
10.1 Introduction to Model Checking |
|
|
253 | (1) |
|
|
254 | (15) |
|
10.2.1 Linear Temporal Logic |
|
|
256 | (1) |
|
|
256 | (1) |
|
10.2.1.2 Parse Trees for LTL Formulas |
|
|
257 | (1) |
|
10.2.1.3 Semantics of LTL |
|
|
258 | (4) |
|
10.2.1.4 Equivalencies of LTL Formulas |
|
|
262 | (1) |
|
10.2.1.5 System Property Specification |
|
|
263 | (1) |
|
10.2.2 Computation Tree logic |
|
|
264 | (1) |
|
|
264 | (1) |
|
10.2.2.2 Semantics of CTL |
|
|
265 | (3) |
|
10.2.2.3 Equivalencies of CTL Formulas |
|
|
268 | (1) |
|
|
268 | (1) |
|
10.3 The NuSMV Model Checking Tool |
|
|
269 | (10) |
|
10.3.1 Description Language |
|
|
269 | (1) |
|
10.3.1.1 Single-Module SMV Program |
|
|
269 | (2) |
|
10.3.1.2 Multimodule SMV Program |
|
|
271 | (2) |
|
10.3.1.3 Asynchronous Systems |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
275 | (4) |
|
10.4 Real-Time Computation Tree Logic |
|
|
279 | (14) |
|
|
285 | (5) |
|
|
290 | (1) |
|
|
290 | (3) |
|
|
293 | (12) |
|
11.1 Software Reliability |
|
|
293 | (3) |
|
|
293 | (1) |
|
11.1.2 Reliability Measurement |
|
|
294 | (1) |
|
11.1.3 Improving Software Reliability |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
295 | (1) |
|
|
296 | (1) |
|
11.2 Software Aging and Rejuvenation |
|
|
296 | (1) |
|
|
297 | (3) |
|
|
297 | (1) |
|
11.3.2 Common Vulnerabilities |
|
|
298 | (1) |
|
11.3.3 Secure Software Design |
|
|
299 | (1) |
|
|
300 | (1) |
|
|
301 | (4) |
|
|
302 | (1) |
|
|
302 | (3) |
Index |
|
305 | |