Queuing theory and traffic analysis in depthIdcIdk1
This document provides a summary of concepts in queuing theory and network traffic analysis. It discusses queuing theory concepts like Little's Law, M/M/1 queues, and Kendall's notation. It then covers an empirical study of router delay that models delays using a fluid queue and reports on busy period metrics. Finally, it discusses the concept of network traffic self-similarity found in measurements of Ethernet LAN traffic.
The document discusses different types of switching structures used in networks, including circuit switching and packet switching. It describes circuit switching techniques like space division switching using crossbar and multistage switches, as well as time division switching using time slot interchange. It also covers the basic components of a packet switch including input/output ports, routing processor, and switching fabrics like crossbar, banyan, and batcher banyan switches. The advantages and disadvantages of different switching techniques are highlighted.
The document discusses developing a transformation product line (TPL) approach to define model transformations over variants of a meta-model product line (MMPL) in a compact, reusable, extensible, and analyzable way by using transformation fragments with presence conditions and composing them through abstraction and overriding mechanisms. It aims to address the challenges of defining transformations over many variants of a meta-model in a scalable way while maintaining correctness through analysis at the TPL level.
This document summarizes a formal analysis of the TESLA authentication protocol using the Timed OTS/CafeOBJ method. It provides an overview of the modeling and verification process, including:
1) Modeling the protocol, messages, and network as a timed observational transition system (TOTS) in the CafeOBJ algebraic specification language.
2) Formally specifying security properties to verify, such as an invariant that the receiver only accepts authentic messages from the actual sender.
3) Outlining the verification procedure using induction, lemmas, and proof scores executed with the CafeOBJ system.
This document discusses state space representation of systems. It begins by outlining how to find a state space model for a linear time-invariant system using state equations and matrices. It then provides examples of deriving state space models for electrical, mechanical, and electromechanical systems. The document also covers converting between transfer functions and state space models, and defines key terms like state vector, state space, controllability, and observability.
Privacy Preserving State Transitions on EthereumClearmatics
This document provides a summary of a presentation about implementing Zerocash-style private transactions on Ethereum called ZETH. It discusses using zero-knowledge proofs (zkSNARKs) to prove that transactions follow rules without revealing details of payments. ZETH would use a "mixer" smart contract to obscure transaction data and leverage Ethereum events for encrypted broadcasts. Further work is needed on MPC for the common reference string and optimizations before ZETH can move beyond proof-of-concept status. The presentation references several academic papers and code repositories relevant to implementing private transactions with zero-knowledge proofs on Ethereum.
The document discusses control system design and key concepts in state space models. It covers:
- Assignment breakdown of 30% exercises and 70% exam
- Definitions of systems, inputs/outputs, and time responses
- Types of systems including single-variable, multivariable, continuous/discrete time, and digital
- Properties of linear, time-invariant systems and their responses
- State space representation using state variables, state equations, and output equations
- Typical state space models and extracting data from models in MATLAB
Invited talk held by Karsten Wolf on June 26, 2007 on the 28th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS 2007) in Siedlce, Poland.
This document summarizes different modeling and control approaches for continuous and discrete event systems. It discusses how Petri nets can be used to model discrete event systems and manufacturing processes. It also provides an example of using a Petri net to model a batch plant and analyzing its performance. Finally, it mentions how Petri nets can be combined with artificial intelligence search methods for scheduling.
Fundamentals of Electrons - Latches FlipFlopAryanMehra32
Examples are: Adders, subtractors, comparators, decoders, encoders, and multiplexers.
• These components are available in integrated circuits as medium-scale integration (MSI) circuits.
• The analysis of a combinational circuit requires that we determine the function that the circuit
implements.
This document discusses test generation for digital circuits. It covers fault detection and location in digital systems, as well as various test generation methods for combinational and sequential logic circuits. For combinational circuits, it describes path sensitization and Boolean difference methods. For sequential circuits, it discusses converting the circuit to combinational form and verifying the state table. The document also discusses design for testability, including testability measures and techniques like LSSD. Reed-Muller expansion is presented as a method to derive and implement logic functions.
This document presents an agenda for a talk on Petri nets. It begins with an introduction to Petri nets that defines their structure, including places, transitions, tokens, and firing rules. It then discusses several analysis methods for Petri nets, including reachability trees, incidence matrices, and reduction rules. Next, it covers high-level Petri nets and colored Petri nets. The document concludes by mentioning an application of Petri nets to rumor detection and blocking in online social networks, and introduces orbital Petri nets as a promising approach.
This document discusses Ethernet, a widely used local area network (LAN) technology. It defines Ethernet under IEEE 802.3 standards and describes how Ethernet uses CSMA/CD for collision handling. It also discusses token ring networks as another LAN technology and compares their frame formats and how token passing works in each.
This document discusses Markov chains and their use for algorithmic sampling. It introduces Markov chains and their transition matrices. An example of using a Markov chain for card shuffling is provided. It is shown that an ergodic Markov chain has a unique stationary distribution that it converges to. Coupling techniques are introduced to prove this, and the mixing time is defined as the time it takes to converge to the stationary distribution. An example of using a Markov chain to sample matchings in a graph uniformly is given.
Dynamic time warping and PIC 16F676 for control of devicesRoger Gomes
A presentation done as a part of the final year project during Semester 8 in the under-graduate degree course in engineering.
This presentation explains one of the modules of the project "Speaker and Speech Recognition based Embedded System Design for User Authentication and remote Device Control" which is the Speech Recognition Module.
It effectively explains the Dynamic Time Warping Algorithm used for Speech Recognition and how that is further used along with PIC 16F676 Microcontroller to acquire control of remote devices connected to the system.
This document discusses various sorting algorithms that can be used on parallel computers. It begins with an overview of sorting and comparison-based sorting algorithms. It then covers sorting networks like bitonic sort, which can sort in parallel using a network of comparators. It discusses how bitonic sort can be mapped to hypercubes and meshes. It also covers parallel implementations of bubble sort variants, quicksort, and shellsort. For each algorithm, it analyzes the parallel runtime and efficiency. The document provides examples and diagrams to illustrate the sorting networks and parallel algorithms.
The document discusses intelligent character recognition using deep learning techniques such as recurrent neural networks and connectionist temporal classification. It begins by motivating the need for intelligent character recognition over traditional optical character recognition due to variations in handwritten text. It then reviews previous approaches using preprocessing, feature extraction, and hybrid neural networks before describing an approach using multidimensional recurrent neural networks with LSTM cells trained end-to-end using CTC loss. The proposed architecture involves stacking multiple bidirectional LSTM layers to capture spatial and temporal dependencies in handwritten text. Results on a public dataset show a character error rate of 15% without a lexicon and 12.6% with a lexicon during testing.
This document discusses state space representation of systems. It begins by outlining how to find a state space model for a linear time-invariant system using state equations and matrices. It then provides examples of deriving state space models for electrical, mechanical, and electromechanical systems. The document also covers converting between transfer functions and state space models, and defines key terms like state vector, state space, controllability, and observability.
Privacy Preserving State Transitions on EthereumClearmatics
This document provides a summary of a presentation about implementing Zerocash-style private transactions on Ethereum called ZETH. It discusses using zero-knowledge proofs (zkSNARKs) to prove that transactions follow rules without revealing details of payments. ZETH would use a "mixer" smart contract to obscure transaction data and leverage Ethereum events for encrypted broadcasts. Further work is needed on MPC for the common reference string and optimizations before ZETH can move beyond proof-of-concept status. The presentation references several academic papers and code repositories relevant to implementing private transactions with zero-knowledge proofs on Ethereum.
The document discusses control system design and key concepts in state space models. It covers:
- Assignment breakdown of 30% exercises and 70% exam
- Definitions of systems, inputs/outputs, and time responses
- Types of systems including single-variable, multivariable, continuous/discrete time, and digital
- Properties of linear, time-invariant systems and their responses
- State space representation using state variables, state equations, and output equations
- Typical state space models and extracting data from models in MATLAB
Invited talk held by Karsten Wolf on June 26, 2007 on the 28th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS 2007) in Siedlce, Poland.
This document summarizes different modeling and control approaches for continuous and discrete event systems. It discusses how Petri nets can be used to model discrete event systems and manufacturing processes. It also provides an example of using a Petri net to model a batch plant and analyzing its performance. Finally, it mentions how Petri nets can be combined with artificial intelligence search methods for scheduling.
Fundamentals of Electrons - Latches FlipFlopAryanMehra32
Examples are: Adders, subtractors, comparators, decoders, encoders, and multiplexers.
• These components are available in integrated circuits as medium-scale integration (MSI) circuits.
• The analysis of a combinational circuit requires that we determine the function that the circuit
implements.
This document discusses test generation for digital circuits. It covers fault detection and location in digital systems, as well as various test generation methods for combinational and sequential logic circuits. For combinational circuits, it describes path sensitization and Boolean difference methods. For sequential circuits, it discusses converting the circuit to combinational form and verifying the state table. The document also discusses design for testability, including testability measures and techniques like LSSD. Reed-Muller expansion is presented as a method to derive and implement logic functions.
This document presents an agenda for a talk on Petri nets. It begins with an introduction to Petri nets that defines their structure, including places, transitions, tokens, and firing rules. It then discusses several analysis methods for Petri nets, including reachability trees, incidence matrices, and reduction rules. Next, it covers high-level Petri nets and colored Petri nets. The document concludes by mentioning an application of Petri nets to rumor detection and blocking in online social networks, and introduces orbital Petri nets as a promising approach.
This document discusses Ethernet, a widely used local area network (LAN) technology. It defines Ethernet under IEEE 802.3 standards and describes how Ethernet uses CSMA/CD for collision handling. It also discusses token ring networks as another LAN technology and compares their frame formats and how token passing works in each.
This document discusses Markov chains and their use for algorithmic sampling. It introduces Markov chains and their transition matrices. An example of using a Markov chain for card shuffling is provided. It is shown that an ergodic Markov chain has a unique stationary distribution that it converges to. Coupling techniques are introduced to prove this, and the mixing time is defined as the time it takes to converge to the stationary distribution. An example of using a Markov chain to sample matchings in a graph uniformly is given.
Dynamic time warping and PIC 16F676 for control of devicesRoger Gomes
A presentation done as a part of the final year project during Semester 8 in the under-graduate degree course in engineering.
This presentation explains one of the modules of the project "Speaker and Speech Recognition based Embedded System Design for User Authentication and remote Device Control" which is the Speech Recognition Module.
It effectively explains the Dynamic Time Warping Algorithm used for Speech Recognition and how that is further used along with PIC 16F676 Microcontroller to acquire control of remote devices connected to the system.
This document discusses various sorting algorithms that can be used on parallel computers. It begins with an overview of sorting and comparison-based sorting algorithms. It then covers sorting networks like bitonic sort, which can sort in parallel using a network of comparators. It discusses how bitonic sort can be mapped to hypercubes and meshes. It also covers parallel implementations of bubble sort variants, quicksort, and shellsort. For each algorithm, it analyzes the parallel runtime and efficiency. The document provides examples and diagrams to illustrate the sorting networks and parallel algorithms.
The document discusses intelligent character recognition using deep learning techniques such as recurrent neural networks and connectionist temporal classification. It begins by motivating the need for intelligent character recognition over traditional optical character recognition due to variations in handwritten text. It then reviews previous approaches using preprocessing, feature extraction, and hybrid neural networks before describing an approach using multidimensional recurrent neural networks with LSTM cells trained end-to-end using CTC loss. The proposed architecture involves stacking multiple bidirectional LSTM layers to capture spatial and temporal dependencies in handwritten text. Results on a public dataset show a character error rate of 15% without a lexicon and 12.6% with a lexicon during testing.
TD5.95 New Holland tractor service repair manual, A complete heavy equipment service manual tailored for mechanics, operators, and fleet maintenance teams. This guide covers all major systems, including engine, transmission, hydraulics, electrical, and control systems. It features easy-to-follow instructions, detailed illustrations, and OEM specifications to ensure safe and effective repairs. Ideal for workshop or on-site service, the manual helps extend the lifespan of your machinery and supports preventive maintenance. Save time and avoid costly mistakes with clear, professional guidance on every page.
Charging at the Workplace: The EVAL Certification ProgramForth
Michael Ryer, Senior Program Associate at Forth, gave this presentation at the Forth Building EV-ready Communities to Accelerate Adoption webinar on May 13, 2025.
What Does It Mean When Your Volvo Says ‘Engine System Service Required’AutoScandia
When your Volvo displays “Engine System Service Required,” it signals a potential issue within the engine or emissions system. This warning can indicate anything from sensor faults to needed software updates or mechanical problems. Prompt professional diagnostics are essential to identify the cause, maintain performance, and prevent more serious engine damage. Don’t delay—get it checked promptly.
Service Manual John Deere LX277AWS Repair.pdf, This professional-grade heavy machinery service manual is your go-to resource for efficient equipment maintenance and repair. With factory specifications, torque values, hydraulic schematics, and troubleshooting charts, it's a must-have for any technician or operator. Whether you're replacing parts, diagnosing faults, or performing routine service, this manual ensures you're equipped with accurate, model-specific procedures. Boost productivity and confidence by having all the technical knowledge you need in one place.
New holland Td5.75 tractor service repair manual.pdf, This heavy equipment service manual provides detailed repair procedures, troubleshooting guides, and maintenance instructions for technicians and operators. It includes high-quality diagrams, technical specifications, and step-by-step instructions to ensure accurate repairs and diagnostics. Designed for professionals and DIY users alike, the manual covers everything from engine overhauls to hydraulic systems, wiring, and calibration settings. Whether you're working in the field or the shop, this manual is an essential tool to maximize performance, reduce downtime, and maintain your equipment’s reliability.
This heavy equipment service manual provides detailed repair procedures, troubleshooting guides, and maintenance instructions for technicians and operators. It includes high-quality diagrams, technical specifications, and step-by-step instructions to ensure accurate repairs and diagnostics. Designed for professionals and DIY users alike, the manual covers everything from engine overhauls to hydraulic systems, wiring, and calibration settings. Whether you're working in the field or the shop, this manual is an essential tool to maximize performance, reduce downtime, and maintain your equipment’s reliability. John Deere LX255 Service Manual.pdf
TD5.85 New holland tractor service repair manual, This heavy equipment service manual provides detailed repair procedures, troubleshooting guides, and maintenance instructions for technicians and operators. It includes high-quality diagrams, technical specifications, and step-by-step instructions to ensure accurate repairs and diagnostics. Designed for professionals and DIY users alike, the manual covers everything from engine overhauls to hydraulic systems, wiring, and calibration settings. Whether you're working in the field or the shop, this manual is an essential tool to maximize performance, reduce downtime, and maintain your equipment’s reliability.
T7.210 New Holland Tractor Service Repair Manual.pdf, A complete heavy equipment service manual tailored for mechanics, operators, and fleet maintenance teams. This guide covers all major systems, including engine, transmission, hydraulics, electrical, and control systems. It features easy-to-follow instructions, detailed illustrations, and OEM specifications to ensure safe and effective repairs. Ideal for workshop or on-site service, the manual helps extend the lifespan of your machinery and supports preventive maintenance. Save time and avoid costly mistakes with clear, professional guidance on every page.
New Holland T7.175 Autocommand Tractor Service Repair Manual.pdfService Repair Manual
New Holland T7.175 Autocommand Tractor Service Repair Manual, This professional-grade heavy machinery service manual is your go-to resource for efficient equipment maintenance and repair. With factory specifications, torque values, hydraulic schematics, and troubleshooting charts, it's a must-have for any technician or operator. Whether you're replacing parts, diagnosing faults, or performing routine service, this manual ensures you're equipped with accurate, model-specific procedures. Boost productivity and confidence by having all the technical knowledge you need in one place.
Covers Preventive Maintenance
Includes service intervals, checklists, and maintenance charts to help you prevent costly breakdowns and extend equipment life. WA500-6 GALEO KOMATSU WHEEL LOADER Service Repair Manual.pdf
Engine New Holland Tc29da Tractors Service Manual.pdf, Official factory manual detailing troubleshooting, diagnostics, and service routines to keep your heavy equipment running at peak performance
Komatsu WA150-6 Wheel Loader Service Repair Manual.pdf, What’s Included in the Manual (SN 80001 and up)
✅ Complete Coverage of All Major Components
Engine and cooling system
Transmission and powertrain
Hydraulic systems
Electrical circuits and wiring diagrams
Axles, brakes, and steering
Frame, cab, and body
Troubleshooting procedures
✅ Additional Features
Exploded views and diagrams for clear part identification
Torque specifications and adjustment data
Maintenance intervals and service checklists
Step-by-step disassembly and reassembly instructions
New Holland T7.190 Tractor Service Repair Manual.pdf, A complete heavy equipment service manual tailored for mechanics, operators, and fleet maintenance teams. This guide covers all major systems, including engine, transmission, hydraulics, electrical, and control systems. It features easy-to-follow instructions, detailed illustrations, and OEM specifications to ensure safe and effective repairs. Ideal for workshop or on-site service, the manual helps extend the lifespan of your machinery and supports preventive maintenance. Save time and avoid costly mistakes with clear, professional guidance on every page.
4. Introduction
• Simulation & Testing:
—Needs experiments before system deployment
—Simulation is performed on an abstraction of a
model of the system
—Testing is performed on the real system.
— It is very diffucult to evaluate all
possible interactions / faults /
behaviors / states
5. Introduction (3)
• Deductive Verification:
— Validate a system's performance
based on deductive rules
—Applicable to infinite-state systems
—A time-consuming process
—Needs expert people with good
experiments
— Usually is used for critical systems (e.g.,
security protocols)
6. Introduction
• Model Checking:
—An automated technique to evaluate finite-state
systems
— Perform a thorough search in the state
space of the system in order to determine some
properties of the system.
7. Introduction
• The process of Model Checking:
• Modeling: Transform a design to formalism
(e.g., a state-transition graph of the system)
• Verification: Perform a thorough search in the state
space of the system in order to determine whether some
properties of the system are true or not.
• Is performed automatically
8. Petri Net
• A ‘Petri Net’ was introduced by a
German mathematician and used to model a
system
— Condition: a Boolean description of the state
of the system
— Event: an action that depends on the state
of the system
• Petri net is a graphical and mathematical tools
for
the analysis of discrete event dynamic systems.
— The system model is represented by a
set of conditions and a set of events
—A condition is represented by a place and an event by
transition.
9. Petri Net: Building Blocks
Basic
Elements
• PN consists of three types of components: places (circles),
transitions
(rectangles) and arcs (arrows):
— Places represent possible states of the system;
— Transitions are events or actions which cause the change of
state; And
— Avery arc simply connects a place with a transition or a
transition
with a place.
10. • Building Blocks:
• An
example:
tJ
Petri Net
input place
token
P
Input arc
transition
'
1
P2
output place
output arc
11. Petri Net: Marks
(Tokens)
• A marking M is an assignment
of (dots) to places of a petri net.
token
s
• Dots are placed in the circle to
represent place in which its condition is
satisfied
— e.g. a resource is available or
operation in a process
• The marking can be represented as M
= (1,1,0)
12. Petri Net: Marks (Tokens)
• A place can have more than one token
and
therefore can represent a queue
— (e.g. a @ffer holding several prgcesses).
13. Petri Net : Firing a transition
• Executing a marked Petri net causes the number
and positions of the token to change. The rules for
the execution are:
—A transition is enabled if all its input places contain at least
one token.
—Any enabled transition may fire
—Firing of a transition results in one token being removed
from each of its input places and being deposited
of its output places
—Execution halts when there are no enabled transitions.
Each time a transitions fires, the marking of the petri net
will change.
15. Petri Net: Formal Definition
A Petri net (PN) is a 5 tuple
PN (P,T,IN,OUT,M)
where:
P = {p1,p2,....,p } is a finite set of
places, T = {t1 , t2, ...,tn} is a finite set of
transitions IN: (PxT)—+S
OUT: (TxP)—>S
M: Marking vector
16. Petri Net: Formal Definition (cont'd)
• IN are
input
functions defining directed
arcs
fro
m
• places to transitions
• OUT are output functions defining directed
arcs
• from transitions to places
• S is a set of all nonnegative integers k such
that:
• If k = 1 a directed arc is drawn without a
label
• If k > 1 a directed arc is drawn with label k.
• If k = 0 no arc is drawn.
17. Petri Net: Formal Definition (cont'd)
• An example:
Its I = Opgl Ott I = I sql
If q = t l , O,O, 0, OJ
1
7
18. Petri Net: Firing Rules for
Transitions
• A specific transition I, is said to be firable or
enabled if each input place pt is marked with at least
w(p„t ) tokens where w(p„t,) is the weight of the arc
from p, to t,.
• An enabled transition may or may not fire depending
on whether or not the event actually takes place .
• The firing of an enabled transition th removes vv(p ,t )
tokens from each input place p, of I;, and
adds w(pj§ ) tokens to each
output place p, of t
h where w(p„t) is the weight of
the arc from input place p, to t„ and
w(p„t;) is the weight of the arc from I, to
output place p,
19. Petri Net: Firing Rules for Transitions
P1
P2
T1
TI is not etabled
T1
T'i i”s
enabled
20. Petri Net: Firing Rules for Transitions
• Firing Examples
p
1
p
2
Ti
p3
p
1
p2
p3
22. PN: Firing Rules for Transitions
• Fïring of a sequence of
transitions:
), -- (1, 2, 0, 2,1)
23. Firing Rules for Transitions
• Firing of a sequence of
transitïons:
r.
24. Firing Rules for Transitions
• Firing of a sequence of transitïons:
25. Firing Rules for Transitions
• Firing of a sequence of transitïons:
3' (0,3,1,1,2)
26. PN: Change of States
(1)
• is denoted by a movement of token(s)
(black dots) from place(s) to place(s);
and is caused by the firing of a
transition.
• The firing represents an occurrence of
the event or an action taken.
• The firing is subject to the input
conditions, denoted by token
availability.
27. PN: Change of States (2)
• A transition is lira///e or enabled when
there are sufficient tokens in its input
places.
• After firing, tokens will be transferred
from
the input places (old state) to the
output
places, denoting the new state.
• Note that the examples are Petri nets
representation of a finite state machine
(FSM). PNs are much more powerful to
model systems beyond F5Ms.
28. Modelling with petri net
• Petri net is mainly used for modelling.
—Many systems can be modelled by petri net.
• The system may be of many different
kinds like computer hardware, computer
software, physical system and so on.
— Petri net is used to model the
occurrence of various events and activities in the
system.
30. Modelling with petri net
— Concurrency: two events
could take place in
parallel, without
interfering with one
another.
31. Modelling with petri net
Synchronisation:
By having two
places as input
conditions to the
same transition,
these two
conditions
become
synchronised.
Sjmchronation
33. Modelling with petri net
• Confilincts:
• Two transitions t1 and t2 are
said to be conflict if
either th
or t can occur but not
both of
2
them,
—i.e., when there is one
place acting as
input
to a number
of
that is
condition
transition
s.
— Therefore, only one
transition can be fire.
ti 2
Co
d
35. Modelling with petri net
• Example: Font
Selection
T1
Bold on
T2
Bold off
User presses
Old
User presses
italic
T3
Italic on
T4
User presses
italic
36. Modelling with petri net
• Another Example: a finite-state machine
— Consider a vending machine
• It accepts either nickels or dimes
• Sells 15c or 20c candy bars
• The vending machine can hold up to 20c
• Coin return transitions are omitted
the next slides are the state diagram of this
vending machine which represented by the
Petri net Any finite-state machine (or its state
diagram) can be modeled with a state
machine.
37. Modelling with petri net
• Another Example: a finite-state machine
Deposit 5c
Deposit 5
Deposit 10c
Get 20c
candy
38. Modelling with petri net
• Mutual exclusion
Recall: Mutual exclusion is a technique of defining
entry and exit code so that at most one process is
allowed to access the critical region at the same
time.
• The idea is that no process is allowed to enter the
critical region, unless it checks that no other process is
executing its own critical region.
Mutual exclusion can be represented in Petri net
using conflict.
39. Mutual exclusion
permission to enter
• The place s
represents
the
the
critical region
and
there must be token in p 1
and p .
2
— If both processes want
to
simultaneously,
enter the critical region
then
transition t1 and t2 are in
conflict
— i.e., only one of them can
fire.
' ' I ''
I( ''!
t2 “
Critical
section
Process 2
2 1
Process
1
{1
section
41. Analysis of Petri net
• Petri nets are capable of modelling a
large variety of systems and properly
representing the interactions between the
various actions which can occur.
— The strength of Petri net is its capability to
model the system.
• However, modelling by itself is of little use and its
necessary to analyse the modelled system.
This could lead to important insights into the
behaviour of the modelled system.
42. Reachibility
• Given a Petri net, one would like to know
which marking Mr can be reached from an
initial marking MO
• Example:
For the Petri net of the bounded
buffer
consumer producer problem, M0 = (1,
0, 1, 0,
0, n) and M1 = (0, 1, 1, 0, 0, n)
— is immediately reachable from the marking
of M .
43. Analysis of Petri net : Safeness
• A place in a Petri
net is safe if the
number of tokens in
that place never
exceeds one.
A petri net is same if
all
its places are safe.
what does this Petri
net do?
44. Analysis of Petri net : Boundedness
• A place is k-safe or k-bounded if the number
of tokens in that place cannot exceed an
integer k.
—Therefore a place is 1-bounded is simply a safe place.
• Example:
—The Petri net for the producer/consumer
problem with a bounded buffer, is it safe? Bounded?
The Petri net for the producer/
consumer problem with a unbounded buffer, is
it bounded? Why?
45. Analysis of Petri net : Conservation
• A Petri net with an initial marking M0, is
strictly
conservative,
if for all the reachable marking, the total number of
tokens in each marking is exactly the same as the
initial marking.
• A Petri net can be used to model
resource allocation systems. In this systems
some tokens may represents the resources.
— Therefore, in such Petri nets conservation is
an important property such that resources can neither
be created nor destroyed.
46. Analysis of Petri net : Liveness
• Another problem that could occur in
resource allocation is deadlock.
—A deadlock in a Petri net is a transition (or a
set of transition) which cannot fire.
—A transition is alive if it is not deadlock.
—A transition is live in a marking M if it is potentially
fireable in every marking in the Petri net.
I-- i | --. | › , |
t , ,-I
.' - ' ! '',' 'i .' .
”
. .- . ”
47. Exercises
• For the above
Petri bounded,
live, and why?
net, indicate whether
each is conservative or
not and show
48. Summary
• Petri net
concepts
Petri net representation
Firing a transition
— Marks (Tokens)
• Modeling with Petri
net
Events and condition