Engineering a Safer World Systems Thinking Applied to Safety by Unknown

Engineering a Safer World Systems Thinking Applied to Safety by Unknown

Author:Unknown
Language: eng
Format: epub


Safety-Guided Design

267

The controller must be designed to respond appropriately to the arrival of any

possible (i.e., detectable by the sensors) input at any time as well as the lack of an

expected input over a given time period. Humans are better (and more flexible)

than automated controllers at this task. Often automation is not designed to handle

input arriving unexpectedly, for example, a target detection report from a radar that

was previously sent a message to shut down.

All inputs should be checked for out-of-range or unexpected values and a

response designed into the control algorithm. A surprising number of losses still

occur due to software not being programmed to handle unexpected inputs.

In addition, the time bounds (minimum and maximum) for every input should

be checked and appropriate behavior provided in case the input does not arrive

within these bounds. There should also be a response for the non-arrival of an input

within a given amount of time (a timeout) for every variable in the process model.

The controller must also be designed to respond to excessive inputs (overload condi-

tions) in a safe way.

Because sensors and input channels can fail, there should be a minimum-arrival-

rate check for each physically distinct communication path, and the controller

should have the ability to query its environment with respect to inactivity over a

given communication path. Traditionally these queries are called sanity or health

checks . Care needs to be taken, however, to ensure that the design of the response

to a health check is distinct from the normal inputs and that potential hardware

failures cannot impact the sanity checks. As an example of the latter, in June 1980

warnings were received at the U.S. command and control headquarters that a major

nuclear attack had been launched against the United States [180]. The military

prepared for retaliation, but the officers at command headquarters were able to

ascertain from direct contact with warning sensors that no incoming missile had

been detected and the alert was canceled. Three days later, the same thing hap-

pened again. The false alerts were caused by the failure of a computer chip in a

multiplexor system that formats messages sent out continuously to command posts

indicating that communication circuits are operating properly. This health check

message was designed to report that there were 000 ICBMs and 000 SLBMs

detected. Instead, the integrated circuit failure caused some of the zeros to be

replaced with twos. After the problem was diagnosed, the message formats were

changed to report only the status of the communication system and nothing about

detecting ballistic missiles. Most likely, the developers thought it would be easier to

have one common message format but did not consider the impact of erroneous

hardware behavior.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(56026)
What's Done in Darkness by Kayla Perrin(26592)
The Fifty Shades Trilogy & Grey by E L James(19079)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19058)
Shot Through the Heart by Mercy Celeste(18936)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17112)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(16992)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(16878)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16825)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16447)
The Subtle Art of Not Giving a F*ck by Mark Manson(14353)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14134)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(13640)
Scorched Earth by Nick Kyme(12771)
Drei Generationen auf dem Jakobsweg by Stein Pia(10965)
Suna by Ziefle Pia(10888)
Scythe by Neal Shusterman(10337)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(9522)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(9451)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(9432)