13.07.2015 Views

9. Safety Architectural Patterns - Research - Mälardalens högskola

9. Safety Architectural Patterns - Research - Mälardalens högskola

9. Safety Architectural Patterns - Research - Mälardalens högskola

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.1. <strong>Safety</strong> Requirements ............................................................................................................. 327.2. <strong>Safety</strong> Properties ................................................................................................................... 337.3. <strong>Safety</strong> Components ............................................................................................................... 337.4. Software Architecture ........................................................................................................... 367.5. Is it Important? ...................................................................................................................... 367.6. <strong>Safety</strong> Software Architecture ................................................................................................ 367.7. <strong>Architectural</strong> <strong>Patterns</strong> ........................................................................................................... 378. <strong>Safety</strong> <strong>Patterns</strong> .............................................................................................................................. 388.1. Formal Specification <strong>Patterns</strong> ............................................................................................... 388.2. <strong>Safety</strong> Tactics ......................................................................................................................... 408.2.1. <strong>Safety</strong> Tactics and <strong>Patterns</strong> ........................................................................................... 418.2.2. Tactics Identification and Selection ............................................................................... 42<strong>9.</strong> <strong>Safety</strong> <strong>Architectural</strong> <strong>Patterns</strong> ........................................................................................................ 44<strong>9.</strong>1. Automatic Failure Detection ................................................................................................. 44<strong>9.</strong>2. Managing Component Interactions ...................................................................................... 45<strong>9.</strong>3. Failure Isolation ..................................................................................................................... 46<strong>9.</strong>4. Automatic Failure Recovery .................................................................................................. 46<strong>9.</strong>5. Reconfiguration ..................................................................................................................... 47<strong>9.</strong>6. Testability .............................................................................................................................. 4810. <strong>Safety</strong> Architecture Transformational <strong>Patterns</strong> ........................................................................ 4910.1. Protected Single Channel .................................................................................................. 4910.2. Recovery Block .................................................................................................................. 5010.3. Process Fusion ................................................................................................................... 5110.4. Hardware Platform Substitution ....................................................................................... 5110.5. Hardware Platform Reassignment .................................................................................... 5210.6. Integrity Check ................................................................................................................... 5211. General <strong>Safety</strong> and Reliability <strong>Patterns</strong> ..................................................................................... 5411.1. Homogenous Redundancy Pattern ................................................................................... 5411.2. Diverse Redundancy Pattern ............................................................................................. 5511.3. Monitor-Actuator Pattern ................................................................................................. 5611.4. Sanity-Check Pattern ......................................................................................................... 5711.5. Watchdog Pattern ............................................................................................................. 5711.6. <strong>Safety</strong> Executive Pattern .................................................................................................... 5812. <strong>Safety</strong> Formulation Suggestion ................................................................................................. 604

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!