Embedded Intelligent Systems Edward A. Lee Robert S. Pepper Distinguished Professor UC Berkeley Keynote: ARTEMIS Sprint Event April 13, 2016 Vienna, Austria
ARTEMIS: 2006 Annual Conference, Graz, Austria, May 22-24, 2006
#$%&'EG=$832.6"1$8-&*8" H,66")>"#)0-'.532-)'$":&F,3'&*&0-8" Biomedical !"#$%&'"%()$"%*&+',-./'&%"012&'3'45%.&5-',0 !" " • ! #$%&'"(" !"#$%&'() Energy • ! #)*+,-./)0"(" *#+',%&$) • ! 1&2,'3-$"(" -'./0#) 6'&",.7*1/'&$8% Automotive Avionics • ! 45.+-.%363-$"789":&+&.-.%363-$" • ! ;3<="2)00&2/73-$"789" -/&12%0#)'+3)!2%4'&#) Military • ! ;3<="+&'>)'*.02&"789" 567)8+/29#) • ! 48$02=')0$"789" :6623%+';6+<:66=/2';6+ " • ! 12.6.%363-$"789" >/(%'?%(%0#)'+3)!2/3%&0'?%(%0#) • ! ?.@8".05":&<,6./)08"789" @/&"+%&'()!6$$%?%(%;/$) • ! A2)0)*3&8")>"82.6&"B26),5C"789" 56&'(%0#)A.69B) Buildings • ! D+&0"789" !26=2%/0'2#) • ! 46<)'3-=*8"789" *#+',%&$) !&&'9./'&8% Manufacturing #$%&'E+=$832.6"8$8-&*8"'&F,3'&"0&@"&0<30&&'30<"" *&-=)58".05"*)5&68"-)".55'&88"-=&8&"2)0-'.532/)089" Lee, Berkeley 3
I)J!"K830<"I0-&'0&-"-&2=0)6)<$"-)"30-&'.2-" @3-="+=$832.6"5&732&8"BL-=30<8MC9" This Bosch Rexroth printing press is a cyber- Industrial automation physical factory using Ethernet and TCP/IP example from 2008: with high-precision clock synchronization Bosch-Rexroth printing (IEEE 1588) on an isolated LAN. press. The term “IoT” includes the technical solution “Internet technology” in the problem statement “connect things”. The term CPS does not. Lee, Berkeley 4
H)2,8")0"N)5&68" Lee, Berkeley 5
N)5&68"789":&.63-$" I0"-=38"&O.*+6&P" The model -=&" ,63/(%+9) .2',/762C) 38" 2.62,6,8".05" Q&@-)0R8"6.@89" The target " (the thing D%3/(%0# "38"=)@" being @&66"-=&"*)5&6" modeled). .05"3-8"-.'<&-" *.-2=" Lee, Berkeley 6
Engineers often confuse the model with its target " You will never strike oil by drilling through the map! But this does not in any way diminish the value of a map! Solomon Wolf Golomb Lee, Berkeley 7
S&-&'*30.2$" 1)*&")>"-=&"*)8-"7.6,.%6&"*)5&68".'&" 3/0/2,%+%$;& 9" " 4"*)5&6"38" 3/0/2,%+%$;&) 3>P"<37&0"-=&"303/.6"8-.-&".05" -=&"30+,-8P"-=&"*)5&6"5&T0&8"&O.2-6$")0&"%&=.73)'9" " S&-&'*3038/2"*)5&68"=.7&"+')7&0"&O-'&*&6$"7.6,.%6&" 30"-=&"+.8-9" Lee, Berkeley 8
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ierre-Simon Laplace (1749–1827). Posthumous portrait by Joan-Baptiste Paulin Guérin, 1838 Lee, Berkeley 9
Z,-"=.80R-"?.+6.2&R8"5&*)0"" %&&0"5&%,0W&5[" ?.+6.2&"'&\&2-&5"." Deterministic model +&'3)5")>" )+/*38*"30" 823&02&"-=.-" -&05&5"-)"&F,.-&" Nondeterministic -=&"*)5&6"@3-=" target -=&"-',-=9" " ;&"@.8"5'36630<" -='),<="."*.+]" Lee, Berkeley 10
4"N)5&6"Q&&5"0)-"" %&" @21/ "-)"%&" I$/.1( " " " LA88&0/.66$P".66"*)5&68".'&"@')0<P"" %,-"8)*&".'&",8&>,69M" " " Z)OP"^9"A9"G9".05"Q9":9"S'.+&'P"_`ab!" 8,=%2%&'()J63/(KL1%(3%+9)'+3)>/$=6+$/) -12.'&/$ 9"U36&$"1&'3&8"30"G')%.%363-$".05"1-./8/28P"U36&$9"" " Lee, Berkeley 11
12=&*./2")>"."83*+6&"#G1" What kinds of models should we use? Let’s look at the most successful kinds of models from the cyber and the physical worlds. Lee, Berkeley 12
1)c@.'&"38"."N)5&6" G=$832.6"1$8-&*" J63/( ) -%+9(/K0"2/'3/3)%,=/2';4/)=2692',$ ) '2/)3/0/2,%+%$;&),63/($ ) Lee, Berkeley 13
#)0835&'"830<6&E-='&.5&5"" 3*+&'./7&"+')<'.*8" This program defines exactly one behavior, given the input x. Note that the modeling framework (the C language, in this case) defines “behavior” and “input.” J=&"-.'<&-")>"-=&"*)5&6"38" 0)05&-&'*3038/2"B&6&2-')08".05" =)6&8"86)8=30<".'),05"30"83632)0C9 " Lee, Berkeley 14
1)c@.'&"'&63&8")0".0)-=&'"5&-&'*3038/2" *)5&6"-=.-".%8-'.2-8"-=&"=.'5@.'&" G=$832.6"1$8-&*" Model Waterman, et al., The RISC-V Instruction Set Manual, Image: Wikimedia Commons UCB/EECS-2011-62, 2011 Instruction Set Architectures (ISAs) are deterministic models Lee, Berkeley 15
d"@=32="'&63&8")0"$&-".0)-=&'" 5&-&'*3038/2"*)5&6" G=$832.6"1$8-&*" J63/( ) -#+&"26+61$)3%9%0'()(69%& ) %$)')3/0/2,%+%$;&),63/( ) Lee, Berkeley 16
S&-&'*3038/2"N)5&68">)'"-=&"" G=$832.6"135&")>"#G1" G=$832.6"1$8-&*" J63/( ) Signal Signal Image: Wikimedia Commons *%M/2/+;'()8N1';6+$ ) '2/)3/0/2,%+%$;&),63/($ ) Lee, Berkeley 17
4"N.Y)'"G')%6&*">)'"#G1!"#)*%30./)08")>" S&-&'*3038/2"N)5&68".'&"Q)05&-&'*3038/2" Signal Signal Lee, Berkeley Image: Wikimedia Commons 18
Timing is not Part of Software and Network Semantics " Correct execution of a program in all widely used programming languages, and correct delivery of a network message in all general-purpose networks has nothing to do with how long it takes to do anything. Programmers have to step outside the programming abstractions to specify timing behavior. Embedded software designers have no map! Lee, Berkeley 19
AO.*+6&")>"-=&"Z&0&T-8")>"A*%'.230<" J&*+)'.6"1&*.0/28" This Bosch Rexroth printing press is a cyber- Despite using TCP/IP physical factory using Ethernet and TCP/IP on Ethernet, this with high-precision clock synchronization network achieves highly (IEEE 1588 ) on an isolated LAN . reliable bounded latency. TSN (time-sensitive networks) technology is starting to become pervasive ! Lee, Berkeley 20
S&-&'*3038*[":&.66$[" " #G1".++632./)08")+&'.-&"30".0"30-'30832.66$" 0)05&-&'*3038/2"@)'659" " *6/$)%0)2/'((#),'C/)$/+$/)06)%+$%$0)6+) 3/0/2,%+%$;&),63/($O) Lee, Berkeley 21
Recommend
More recommend