Safety-Critical Systems 2 T 79.232 Ilkka Herttua.

Slides:



Advertisements
Similar presentations
Configuration management
Advertisements

Configuration management
Configuration Management
T Safety Critical Systems (4 cr)
HP Quality Center Overview.
ITIL: Service Transition
Safety-Critical Systems 2 Requirement Engineering T Spring 2006 Ilkka Herttua.
Requirements and Design
Safety-Critical Systems 2 T Risk analysis and design for safety Ilkka Herttua.
Safety-Critical Systems 2 Requirement Engineering T Spring 2008 Ilkka Herttua.
Metrics Project and Process Metrics. Why do we measure? Assessing project status Allows us to track risks Before they go critical Adjust workflow See.
Software Configuration Management
SE 555 Software Requirements & Specification Requirements Management.
Requirements Management
Supplement 02CASE Tools1 Supplement 02 - Case Tools And Franchise Colleges By MANSHA NAWAZ.
Lucas Phillips Anurag Nanajipuram FAILURE MODE AND EFFECT ANALYSIS.
Annex I: Methods & Tools prepared by some members of the ICH Q9 EWG for example only; not an official policy/guidance July 2006, slide 1 ICH Q9 QUALITY.
Configuration Management
IV&V Facility Model-based Design Verification IVV Annual Workshop September, 2009 Tom Hempler.
This chapter is extracted from Sommerville’s slides. Text book chapter
Configuration Management Process and Environment MACS Review 1 February 5th, 2010 Roland Moser PR a-RMO, February 5 th, 2010 R. Moser 1 R. Gutleber.
What is Business Analysis Planning & Monitoring?
Safety-Critical Systems 6 Quality Management and Certification T
Software Testing Verification and validation planning Software inspections Software Inspection vs. Testing Automated static analysis Cleanroom software.
Safety Critical Systems
CLEANROOM SOFTWARE ENGINEERING.
Thirteenth Lecture Hour 8:30 – 9:20 am, Sunday, September 16 Software Management Disciplines Process Automation (from Part III, Chapter 12 of Royce’ book)
Software Engineering ‘The establishment and use of sound engineering principles (methods) in order to obtain economically software that is reliable and.
Safety-Critical Systems 6 Certification
 To explain the importance of software configuration management (CM)  To describe key CM activities namely CM planning, change management, version management.
Configuration Management (CM)
IT Requirements Management Balancing Needs and Expectations.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 3 Slide 1 Critical Systems 1.
ISM 5316 Week 3 Learning Objectives You should be able to: u Define and list issues and steps in Project Integration u List and describe the components.
© 2006 ITT Educational Services Inc. System Analysis for Software Engineers: Unit 3 Slide 1 Chapter 16 Maintaining Information Systems.
Safety-Critical Systems T Ilkka Herttua. Safety Context Diagram HUMANPROCESS SYSTEM - Hardware - Software - Operating Rules.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 22 Slide 1 Software Verification, Validation and Testing.
© Mahindra Satyam 2009 Configuration Management QMS Training.
Safety-Critical Systems T Ilkka Herttua. Safety Context Diagram HUMANPROCESS SYSTEM - Hardware - Software - Operating Rules.
Safety Critical Systems 5 Testing T Safety Critical Systems.
1 Safety - definitions Accident - an unanticipated loss of life, injury, or other cost beyond a pre-determined threshhold.  If you expect it, it’s not.
Safety-Critical Systems 5 Testing and V&V T
University of Toronto at Scarborough © Kersti Wain-Bantin CSCC40 systems analysis 1 what is systems analysis? preparation of the system’s requirements/definition,
Safety-Critical Systems 7 Summary T V - Lifecycle model System Acceptance System Integration & Test Module Integration & Test Requirements Analysis.
Configuration Management and Change Control Change is inevitable! So it has to be planned for and managed.
Software Maintenance Speaker: Jerry Gao Ph.D. San Jose State University URL: Sept., 2001.
Safety Critical Systems T Safeware - Design for safety hardware and software Ilkka Herttua.
Software Engineering Lecture # 1.
Software Engineering1  Verification: The software should conform to its specification  Validation: The software should do what the user really requires.
Smart Home Technologies
1 Chapter 12 Configuration management This chapter is extracted from Sommerville’s slides. Text book chapter 29 1.
Software Configuration Management SEII-Lecture 21
Requirements Engineering Requirements Validation and Management Lecture-24.
Requirements Engineering Requirements Management Lecture-25.
Attributes Availability Reliability Safety Confidentiality Integrity Maintainability Dependability Means Fault Prevention Fault Tolerance Fault Removal.
Software Engineering Lecture 8: Quality Assurance.
SwCDR (Peer) Review 1 UCB MAVEN Particles and Fields Flight Software Critical Design Review Peter R. Harvey.
Safety-Critical Systems 3 T Designing Safety Software Ilkka Herttua.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
 System Requirement Specification and System Planning.
Software Development Module Code: CST 240 Chapter 6: Software Maintenance Al Khawarizmi International College, AL AIN, U.A.E Lecturer: Karamath Ateeq.
ITIL: Service Transition
Software Project Configuration Management
CMPE 280 Web UI Design and Development August 29 Class Meeting
Chapter 18 Maintaining Information Systems
Engineering Processes
Chapter 13 Quality Management
Maintaining Information Systems (SAD- 18)
Chapter 8 Software Evolution.
Configuration management
Presentation transcript:

Safety-Critical Systems 2 T Ilkka Herttua

Main topics for spring 2003 Fault tolerance/reliability (III) Hardware/Programmable Logic Controllers (III) Safety-Critical Software (IV) Formal Methods – modelling (IV/V) Verification/Validation and Testing (V) Seminars (VI)

Risk Analysis Risk is a combination of the severity (class) and frequency (probability) of the hazardous event. Classes: - Catastrophic – multiple deaths - Critical – a death or severe injuries - Marginal – a severe injury - Negligible – a minor injury

Hazard probability Probability classes: Frequent Probable Occasional Remote Improbable Incredible

Risk acceptability National/international decision – level of an acceptable loss (ethical, political and economical) Risk Analysis Methods: ALARP – as low as reasonable practical (UK, USA) GAMAB – not greater than before (France)

Integrity levels Safety Integrity is a measure of the likelihood of the safety system correctly performing its task. Safety Integrity levels: (failures/year) SIL 410E-5 – 10E-4 SIL 310E-4 – 10E-3 SIL 210E-3 – 10E-2 SIL 1 10E-2 – 10E-1

V - Lifecycle model System Acceptance System Integration & Test Module Integration & Test Requirements Analysis Requirements Model Test Scenarios Software Implementation & Unit Test Software Design Requirements Document Systems Analysis & Design Functional / Architechural - Model Specification Document Knowledge Base * * Configuration controlled Knowledge that is increasing in Understanding until Completion of the System: Requirements Documentation Requirements Traceability Model Data/Parameters Test Definition/Vectors

Overall safety lifecycle

Development Methods Right Requirements phase complete – linking to hazards - correct – testing & modelling - consistent – semiformal language - unambiguous - better English

Requirement Engineering Methods – Reveal (UK) -All necessary included, right structure and understandable wording. Tools – Doors (Telelogic) -Data base and configuration management -History, traceability and linking

REVEAL REVEAL is a requirements engineering method (Praxis UK) –independent of particular notations –compatible with different tools The application of scientific principles –the role of domain knowledge in relating requirements to specifications Through a systematic process –what has to be done –what order it should be done in –how it can be done

The REVEAL Process

On-going Processes Management –Baselining –Tracing –Change management –Fault management –Use of tools Conflict Management –Identification of conflicts –Negotiation –Recording conflict and outcome for future change management

Requirements Management with DOORS Slides provided by Telelogic/ Quality Systems & Software

Dynamic Object Oriented Requirements System Effizienz Interfaces Requirements Links Reports Analysis Change Proposal System Filter, Views Multiuser-Databank User Accounts Configuration- management Text Processing Templates, Standards DOORS Capture, Link, Trace, Analyse, Administer

Terminology in DOORS One Document, Group of related Information Requirements, Tests, Specifications, Change Requests, etc Consists of numerous Modules Project Module Object Attribute Data of a Module Characteristics of Objects or Links Date of last Change, Priority, Status, Costs,... Relation between two Objects Links

“How do I manage change?” Stay on track and meet schedule Changes from all users including DOORSNet TM Read-only user submits “Change Proposal” Changes reviewed on-line Changes automatically update module Accepted Rejected Link On Hold In Review

Team Work: DOORS in Intranet/Internet DOORSNet User Read, Comment, Review, Change Request submission View by Browser Over the Web in your Project Data DOORS User

Traceability in DOORS User DemandsSystem Requirements Architectural Design Test Plan Follow Customer Ammendments through all the Documentation

Traceability - Requirements from Scenarios Goal hierarchy user requirements traceability Two people shall be able to lift the boat onto the roof of the average saloon car. The sailor shall be able to contact the coastguard when the boat is capsized. The sailor shall be able to perform a tacking manoeuvre. To have sailed and survived Ready to sail Sailed Returned home Boat loaded Boat lifted Boat unloaded Boat rigged Boat on car Mast rigged Center-plate rigged Rudder rigged Gibed Boat manoeuvred Tacked Cruised Boat capsized Gone ashore Boat righted Coast guard contacted

References TelecommunicationsAT&T, Alcatel, British Telecom, General Dynamics, ITT, L3 Comm, MCI Worldcom, Motorola, Nokia, Nortel, Tellabs Defense/AerospaceBoeing, Jet Propulsion Labs, Lockheed Martin, Raytheon Equipment ManufacturersCadence, Carrier, Cisco Systems, Hewlett Packard, Kodak, Otis Elevator, Pitney Bowes, Xerox AutomotiveBMW, Chrysler Daimler-Benz, Ford, General Motors, Rolls-Royce Financial/InsuranceCiticorp, Experian, Freddie Mac, Mastercard, NASD/NASDAQ/ASE, Nations Bank, Norwest Financial Services, Prudential, State Farm, UNUM, USAA, VISA GovernmentCND, FDA, FAA, MoD, NIMA, NASA, NSA, DISA, IRS, DOD Healthcare/MedicalAbbott Labs, Beckman Instruments, GE Medical, HP Medical, Kaiser Permanente, Siemans Medical Systems IntegratorsBooz Allen, CSC, EDS, IBM, Litton/PRC, Mitre, SAIC, Unisys

Designing for Safety Faults groups: - requirement/specification errors - random component failures - systematic faults in design (software) Approaches to tackle problems - right system architecture (fault-tolerant) - reliability engineering (component, system) - quality management (designing and producing processes)

Designing for Safety Hierarchical design - simple modules, encapsulated functionality - separated safety kernel – safety critical functions Maintainability - preventative versa corrective maintenance - scheduled maintenance routines for whole lifecycle - easy to find faults and repair – short MTTR mean time to repair Human error - Proper HMI

Safety management Safety culture/policy of the organisation - Task for management ( Tarkets ) Safety planning - Task for safety manager ( How to ) Safety reporting - All personal - Safety log / validation reports

Home assignments 4.18 (tolerable risk) 5.10 (incompleteness within specification) before 25. February to