SlideShare a Scribd company logo
Petri
Nets
Lecturer. Roohollah Abdipour
Agenda
• Introduction
• Petri Net
• Modelling wïth Petri
Net
• Analysïs of Petri net
Introduction
• Techniques for Evaluating SW / HW:
—Simulation
—Testing
Deductive Verification
—Model Checking
Introduction
• Simulation & Testing:
—Needs experiments before system deployment
—Simulation is performed on an abstraction of a
model of the system
—Testing is performed on the real system.
— It is very diffucult to evaluate all
possible interactions / faults /
behaviors / states
Introduction (3)
• Deductive Verification:
— Validate a system's performance
based on deductive rules
—Applicable to infinite-state systems
—A time-consuming process
—Needs expert people with good
experiments
— Usually is used for critical systems (e.g.,
security protocols)
Introduction
• Model Checking:
—An automated technique to evaluate finite-state
systems
— Perform a thorough search in the state
space of the system in order to determine some
properties of the system.
Introduction
• The process of Model Checking:
• Modeling: Transform a design to formalism
(e.g., a state-transition graph of the system)
• Verification: Perform a thorough search in the state
space of the system in order to determine whether some
properties of the system are true or not.
• Is performed automatically
Petri Net
• A ‘Petri Net’ was introduced by a
German mathematician and used to model a
system
— Condition: a Boolean description of the state
of the system
— Event: an action that depends on the state
of the system
• Petri net is a graphical and mathematical tools
for
the analysis of discrete event dynamic systems.
— The system model is represented by a
set of conditions and a set of events
—A condition is represented by a place and an event by
transition.
Petri Net: Building Blocks
Basic
Elements
• PN consists of three types of components: places (circles),
transitions
(rectangles) and arcs (arrows):
— Places represent possible states of the system;
— Transitions are events or actions which cause the change of
state; And
— Avery arc simply connects a place with a transition or a
transition
with a place.
• Building Blocks:
• An
example:
tJ
Petri Net
input place
token
P
Input arc
transition
'
1
P2
output place
output arc
Petri Net: Marks
(Tokens)
• A marking M is an assignment
of (dots) to places of a petri net.
token
s
• Dots are placed in the circle to
represent place in which its condition is
satisfied
— e.g. a resource is available or
operation in a process
• The marking can be represented as M
= (1,1,0)
Petri Net: Marks (Tokens)
• A place can have more than one token
and
therefore can represent a queue
— (e.g. a @ffer holding several prgcesses).
Petri Net : Firing a transition
• Executing a marked Petri net causes the number
and positions of the token to change. The rules for
the execution are:
—A transition is enabled if all its input places contain at least
one token.
—Any enabled transition may fire
—Firing of a transition results in one token being removed
from each of its input places and being deposited
of its output places
—Execution halts when there are no enabled transitions.
Each time a transitions fires, the marking of the petri net
will change.
Petri Net : Exam
Ie
q 1 1 0
t2
001
010
Petri Net: Formal Definition
A Petri net (PN) is a 5 tuple
PN (P,T,IN,OUT,M)
where:
P = {p1,p2,....,p } is a finite set of
places, T = {t1 , t2, ...,tn} is a finite set of
transitions IN: (PxT)—+S
OUT: (TxP)—>S
M: Marking vector
Petri Net: Formal Definition (cont'd)
• IN are
input
functions defining directed
arcs
fro
m
• places to transitions
• OUT are output functions defining directed
arcs
• from transitions to places
• S is a set of all nonnegative integers k such
that:
• If k = 1 a directed arc is drawn without a
label
• If k > 1 a directed arc is drawn with label k.
• If k = 0 no arc is drawn.
Petri Net: Formal Definition (cont'd)
• An example:
Its I = Opgl Ott I = I sql
If q = t l , O,O, 0, OJ
1
7
Petri Net: Firing Rules for
Transitions
• A specific transition I, is said to be firable or
enabled if each input place pt is marked with at least
w(p„t ) tokens where w(p„t,) is the weight of the arc
from p, to t,.
• An enabled transition may or may not fire depending
on whether or not the event actually takes place .
• The firing of an enabled transition th removes vv(p ,t )
tokens from each input place p, of I;, and
adds w(pj§ ) tokens to each
output place p, of t
h where w(p„t) is the weight of
the arc from input place p, to t„ and
w(p„t;) is the weight of the arc from I, to
output place p,
Petri Net: Firing Rules for Transitions
P1
P2
T1
TI is not etabled
T1
T'i i”s
enabled
Petri Net: Firing Rules for Transitions
• Firing Examples
p
1
p
2
Ti
p3
p
1
p2
p3
PN: Firing Rules for Transitions
• Firing Examples
(b
)
PN: Firing Rules for Transitions
• Fïring of a sequence of
transitions:
), -- (1, 2, 0, 2,1)
Firing Rules for Transitions
• Firing of a sequence of
transitïons:
r.
Firing Rules for Transitions
• Firing of a sequence of transitïons:
Firing Rules for Transitions
• Firing of a sequence of transitïons:
3' (0,3,1,1,2)
PN: Change of States
(1)
• is denoted by a movement of token(s)
(black dots) from place(s) to place(s);
and is caused by the firing of a
transition.
• The firing represents an occurrence of
the event or an action taken.
• The firing is subject to the input
conditions, denoted by token
availability.
PN: Change of States (2)
• A transition is lira///e or enabled when
there are sufficient tokens in its input
places.
• After firing, tokens will be transferred
from
the input places (old state) to the
output
places, denoting the new state.
• Note that the examples are Petri nets
representation of a finite state machine
(FSM). PNs are much more powerful to
model systems beyond F5Ms.
Modelling with petri net
• Petri net is mainly used for modelling.
—Many systems can be modelled by petri net.
• The system may be of many different
kinds like computer hardware, computer
software, physical system and so on.
— Petri net is used to model the
occurrence of various events and activities in the
system.
Modelling with petri net
• Sequential Execution:
ti
Sequencetial execution
Modelling with petri net
— Concurrency: two events
could take place in
parallel, without
interfering with one
another.
Modelling with petri net
Synchronisation:
By having two
places as input
conditions to the
same transition,
these two
conditions
become
synchronised.
Sjmchronation
Modelling with petri net
• Example : Concurrency and Synchronisation
Modelling with petri net
• Confilincts:
• Two transitions t1 and t2 are
said to be conflict if
either th
or t can occur but not
both of
2
them,
—i.e., when there is one
place acting as
input
to a number
of
that is
condition
transition
s.
— Therefore, only one
transition can be fire.
ti 2
Co
d
Modelling with petri net
• Merging:
4
Mergin g
Modelling with petri net
• Example: Font
Selection
T1
Bold on
T2
Bold off
User presses
Old
User presses
italic
T3
Italic on
T4
User presses
italic
Modelling with petri net
• Another Example: a finite-state machine
— Consider a vending machine
• It accepts either nickels or dimes
• Sells 15c or 20c candy bars
• The vending machine can hold up to 20c
• Coin return transitions are omitted
the next slides are the state diagram of this
vending machine which represented by the
Petri net Any finite-state machine (or its state
diagram) can be modeled with a state
machine.
Modelling with petri net
• Another Example: a finite-state machine
Deposit 5c
Deposit 5
Deposit 10c
Get 20c
candy
Modelling with petri net
• Mutual exclusion
Recall: Mutual exclusion is a technique of defining
entry and exit code so that at most one process is
allowed to access the critical region at the same
time.
• The idea is that no process is allowed to enter the
critical region, unless it checks that no other process is
executing its own critical region.
Mutual exclusion can be represented in Petri net
using conflict.
Mutual exclusion
permission to enter
• The place s
represents
the
the
critical region
and
there must be token in p 1
and p .
2
— If both processes want
to
simultaneously,
enter the critical region
then
transition t1 and t2 are in
conflict
— i.e., only one of them can
fire.
' ' I ''
I( ''!
t2 “
Critical
section
Process 2
2 1
Process
1
{1
section
Producer consumer problem
• bounded
buffer
Produc
e
Put in
buffe
Re ove
buffe
r
Consum
e
Consume
r
Analysis of Petri net
• Petri nets are capable of modelling a
large variety of systems and properly
representing the interactions between the
various actions which can occur.
— The strength of Petri net is its capability to
model the system.
• However, modelling by itself is of little use and its
necessary to analyse the modelled system.
This could lead to important insights into the
behaviour of the modelled system.
Reachibility
• Given a Petri net, one would like to know
which marking Mr can be reached from an
initial marking MO
• Example:
For the Petri net of the bounded
buffer
consumer producer problem, M0 = (1,
0, 1, 0,
0, n) and M1 = (0, 1, 1, 0, 0, n)
— is immediately reachable from the marking
of M .
Analysis of Petri net : Safeness
• A place in a Petri
net is safe if the
number of tokens in
that place never
exceeds one.
A petri net is same if
all
its places are safe.
what does this Petri
net do?
Analysis of Petri net : Boundedness
• A place is k-safe or k-bounded if the number
of tokens in that place cannot exceed an
integer k.
—Therefore a place is 1-bounded is simply a safe place.
• Example:
—The Petri net for the producer/consumer
problem with a bounded buffer, is it safe? Bounded?
The Petri net for the producer/
consumer problem with a unbounded buffer, is
it bounded? Why?
Analysis of Petri net : Conservation
• A Petri net with an initial marking M0, is
strictly
conservative,
if for all the reachable marking, the total number of
tokens in each marking is exactly the same as the
initial marking.
• A Petri net can be used to model
resource allocation systems. In this systems
some tokens may represents the resources.
— Therefore, in such Petri nets conservation is
an important property such that resources can neither
be created nor destroyed.
Analysis of Petri net : Liveness
• Another problem that could occur in
resource allocation is deadlock.
—A deadlock in a Petri net is a transition (or a
set of transition) which cannot fire.
—A transition is alive if it is not deadlock.
—A transition is live in a marking M if it is potentially
fireable in every marking in the Petri net.
I-- i | --. | › , |
t , ,-I
.' - ' ! '',' 'i .' .
”
. .- . ”
Exercises
• For the above
Petri bounded,
live, and why?
net, indicate whether
each is conservative or
not and show
Summary
• Petri net
concepts
Petri net representation
Firing a transition
— Marks (Tokens)
• Modeling with Petri
net
Events and condition
Ad

More Related Content

Similar to all about petri netis model and simulation (20)

Computer Networks
Computer NetworksComputer Networks
Computer Networks
Aabha Tiwari
 
lecture19-2xwwdver21119095256-7ef20eb1.ppt
lecture19-2xwwdver21119095256-7ef20eb1.pptlecture19-2xwwdver21119095256-7ef20eb1.ppt
lecture19-2xwwdver21119095256-7ef20eb1.ppt
h04324193
 
lecture1 (9).ppt
lecture1 (9).pptlecture1 (9).ppt
lecture1 (9).ppt
HebaEng
 
Privacy Preserving State Transitions on Ethereum
Privacy Preserving State Transitions on EthereumPrivacy Preserving State Transitions on Ethereum
Privacy Preserving State Transitions on Ethereum
Clearmatics
 
Introduction
IntroductionIntroduction
Introduction
UdayangaHemapala
 
lTransfer Function: Mathematical modelling from state space to s domain
lTransfer Function: Mathematical modelling from state space to s domainlTransfer Function: Mathematical modelling from state space to s domain
lTransfer Function: Mathematical modelling from state space to s domain
KrishnaPYadav1
 
Exploring Petri Net State Spaces
Exploring Petri Net State SpacesExploring Petri Net State Spaces
Exploring Petri Net State Spaces
Universität Rostock
 
Continuous Systems To Discrete Event Systems
Continuous Systems To Discrete Event SystemsContinuous Systems To Discrete Event Systems
Continuous Systems To Discrete Event Systems
ahmad bassiouny
 
Fundamentals of Electrons - Latches FlipFlop
Fundamentals of Electrons - Latches FlipFlopFundamentals of Electrons - Latches FlipFlop
Fundamentals of Electrons - Latches FlipFlop
AryanMehra32
 
test generation
test generationtest generation
test generation
dennis gookyi
 
LectIntroduction to Finite Automata.pptx
LectIntroduction to Finite Automata.pptxLectIntroduction to Finite Automata.pptx
LectIntroduction to Finite Automata.pptx
kennethnamonye77
 
Financial Networks III. Centrality and Systemic Importance
Financial Networks III. Centrality and Systemic ImportanceFinancial Networks III. Centrality and Systemic Importance
Financial Networks III. Centrality and Systemic Importance
Kimmo Soramaki
 
Petri Nets: Properties, Analysis and Applications
Petri Nets: Properties, Analysis and ApplicationsPetri Nets: Properties, Analysis and Applications
Petri Nets: Properties, Analysis and Applications
Dr. Mohamed Torky
 
Lecture 8performanceevaluationnperfo.pdf
Lecture 8performanceevaluationnperfo.pdfLecture 8performanceevaluationnperfo.pdf
Lecture 8performanceevaluationnperfo.pdf
kyrillosishak16
 
SOC Interconnect modified version 2019 course
SOC Interconnect modified version 2019 courseSOC Interconnect modified version 2019 course
SOC Interconnect modified version 2019 course
deepaliyewale1
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
RiteshKumar630578
 
Markov Chain Basic
Markov Chain BasicMarkov Chain Basic
Markov Chain Basic
Sanghyuk Chun
 
Dynamic time warping and PIC 16F676 for control of devices
Dynamic time warping and PIC 16F676 for control of devicesDynamic time warping and PIC 16F676 for control of devices
Dynamic time warping and PIC 16F676 for control of devices
Roger Gomes
 
Chap9 slides
Chap9 slidesChap9 slides
Chap9 slides
BaliThorat1
 
Intelligent Handwriting Recognition_MIL_presentation_v3_final
Intelligent Handwriting Recognition_MIL_presentation_v3_finalIntelligent Handwriting Recognition_MIL_presentation_v3_final
Intelligent Handwriting Recognition_MIL_presentation_v3_final
Suhas Pillai
 
lecture19-2xwwdver21119095256-7ef20eb1.ppt
lecture19-2xwwdver21119095256-7ef20eb1.pptlecture19-2xwwdver21119095256-7ef20eb1.ppt
lecture19-2xwwdver21119095256-7ef20eb1.ppt
h04324193
 
lecture1 (9).ppt
lecture1 (9).pptlecture1 (9).ppt
lecture1 (9).ppt
HebaEng
 
Privacy Preserving State Transitions on Ethereum
Privacy Preserving State Transitions on EthereumPrivacy Preserving State Transitions on Ethereum
Privacy Preserving State Transitions on Ethereum
Clearmatics
 
lTransfer Function: Mathematical modelling from state space to s domain
lTransfer Function: Mathematical modelling from state space to s domainlTransfer Function: Mathematical modelling from state space to s domain
lTransfer Function: Mathematical modelling from state space to s domain
KrishnaPYadav1
 
Continuous Systems To Discrete Event Systems
Continuous Systems To Discrete Event SystemsContinuous Systems To Discrete Event Systems
Continuous Systems To Discrete Event Systems
ahmad bassiouny
 
Fundamentals of Electrons - Latches FlipFlop
Fundamentals of Electrons - Latches FlipFlopFundamentals of Electrons - Latches FlipFlop
Fundamentals of Electrons - Latches FlipFlop
AryanMehra32
 
LectIntroduction to Finite Automata.pptx
LectIntroduction to Finite Automata.pptxLectIntroduction to Finite Automata.pptx
LectIntroduction to Finite Automata.pptx
kennethnamonye77
 
Financial Networks III. Centrality and Systemic Importance
Financial Networks III. Centrality and Systemic ImportanceFinancial Networks III. Centrality and Systemic Importance
Financial Networks III. Centrality and Systemic Importance
Kimmo Soramaki
 
Petri Nets: Properties, Analysis and Applications
Petri Nets: Properties, Analysis and ApplicationsPetri Nets: Properties, Analysis and Applications
Petri Nets: Properties, Analysis and Applications
Dr. Mohamed Torky
 
Lecture 8performanceevaluationnperfo.pdf
Lecture 8performanceevaluationnperfo.pdfLecture 8performanceevaluationnperfo.pdf
Lecture 8performanceevaluationnperfo.pdf
kyrillosishak16
 
SOC Interconnect modified version 2019 course
SOC Interconnect modified version 2019 courseSOC Interconnect modified version 2019 course
SOC Interconnect modified version 2019 course
deepaliyewale1
 
Ethernet Data link layer Local area network
Ethernet Data link layer Local area networkEthernet Data link layer Local area network
Ethernet Data link layer Local area network
RiteshKumar630578
 
Dynamic time warping and PIC 16F676 for control of devices
Dynamic time warping and PIC 16F676 for control of devicesDynamic time warping and PIC 16F676 for control of devices
Dynamic time warping and PIC 16F676 for control of devices
Roger Gomes
 
Intelligent Handwriting Recognition_MIL_presentation_v3_final
Intelligent Handwriting Recognition_MIL_presentation_v3_finalIntelligent Handwriting Recognition_MIL_presentation_v3_final
Intelligent Handwriting Recognition_MIL_presentation_v3_final
Suhas Pillai
 

More from AssadLeo1 (20)

Law and Order in PK in a country is most important
Law and Order in PK in a country is most importantLaw and Order in PK in a country is most important
Law and Order in PK in a country is most important
AssadLeo1
 
Types of Multipule things and other things
Types of Multipule things and other thingsTypes of Multipule things and other things
Types of Multipule things and other things
AssadLeo1
 
Model_of_Heterogeneous_System and other things
Model_of_Heterogeneous_System and other thingsModel_of_Heterogeneous_System and other things
Model_of_Heterogeneous_System and other things
AssadLeo1
 
what a knowledge and other things in this slide
what a knowledge and other things in this slidewhat a knowledge and other things in this slide
what a knowledge and other things in this slide
AssadLeo1
 
full with knowledge and other things with
full with knowledge and other things withfull with knowledge and other things with
full with knowledge and other things with
AssadLeo1
 
that is the most important part of this topic
that is the most important part of this topicthat is the most important part of this topic
that is the most important part of this topic
AssadLeo1
 
Discrete and other examples with great intrest
Discrete and other examples with great intrestDiscrete and other examples with great intrest
Discrete and other examples with great intrest
AssadLeo1
 
Decoding Insights and some extra examples
Decoding Insights and some extra examplesDecoding Insights and some extra examples
Decoding Insights and some extra examples
AssadLeo1
 
system updates Best to other Presentations
system updates Best to other Presentationssystem updates Best to other Presentations
system updates Best to other Presentations
AssadLeo1
 
Combined_Simulation and some other detail about
Combined_Simulation and some other detail aboutCombined_Simulation and some other detail about
Combined_Simulation and some other detail about
AssadLeo1
 
Checking Model Validity and Verification.pptx
Checking Model Validity and Verification.pptxChecking Model Validity and Verification.pptx
Checking Model Validity and Verification.pptx
AssadLeo1
 
cyberCrime and other knowledge with ful detail
cyberCrime and other knowledge with ful detailcyberCrime and other knowledge with ful detail
cyberCrime and other knowledge with ful detail
AssadLeo1
 
System Dymola with all the things and other
System Dymola with all the things and otherSystem Dymola with all the things and other
System Dymola with all the things and other
AssadLeo1
 
Time Simulation Discrete Event (time) Simulation.pptx
Time Simulation Discrete Event (time) Simulation.pptxTime Simulation Discrete Event (time) Simulation.pptx
Time Simulation Discrete Event (time) Simulation.pptx
AssadLeo1
 
Introduction and some other things that can
Introduction and some other things that canIntroduction and some other things that can
Introduction and some other things that can
AssadLeo1
 
open system with great detail about netowrk
open system with great detail about netowrkopen system with great detail about netowrk
open system with great detail about netowrk
AssadLeo1
 
12 Malware very useful Presentation for others
12 Malware very useful Presentation for others12 Malware very useful Presentation for others
12 Malware very useful Presentation for others
AssadLeo1
 
Vulnerabilities and Protections in Information Security.pptx
Vulnerabilities and Protections in Information Security.pptxVulnerabilities and Protections in Information Security.pptx
Vulnerabilities and Protections in Information Security.pptx
AssadLeo1
 
Details of Malwareand Their Types with pptx
Details of Malwareand Their Types with pptxDetails of Malwareand Their Types with pptx
Details of Malwareand Their Types with pptx
AssadLeo1
 
Malware Presentation with great explanination
Malware Presentation with great explaninationMalware Presentation with great explanination
Malware Presentation with great explanination
AssadLeo1
 
Law and Order in PK in a country is most important
Law and Order in PK in a country is most importantLaw and Order in PK in a country is most important
Law and Order in PK in a country is most important
AssadLeo1
 
Types of Multipule things and other things
Types of Multipule things and other thingsTypes of Multipule things and other things
Types of Multipule things and other things
AssadLeo1
 
Model_of_Heterogeneous_System and other things
Model_of_Heterogeneous_System and other thingsModel_of_Heterogeneous_System and other things
Model_of_Heterogeneous_System and other things
AssadLeo1
 
what a knowledge and other things in this slide
what a knowledge and other things in this slidewhat a knowledge and other things in this slide
what a knowledge and other things in this slide
AssadLeo1
 
full with knowledge and other things with
full with knowledge and other things withfull with knowledge and other things with
full with knowledge and other things with
AssadLeo1
 
that is the most important part of this topic
that is the most important part of this topicthat is the most important part of this topic
that is the most important part of this topic
AssadLeo1
 
Discrete and other examples with great intrest
Discrete and other examples with great intrestDiscrete and other examples with great intrest
Discrete and other examples with great intrest
AssadLeo1
 
Decoding Insights and some extra examples
Decoding Insights and some extra examplesDecoding Insights and some extra examples
Decoding Insights and some extra examples
AssadLeo1
 
system updates Best to other Presentations
system updates Best to other Presentationssystem updates Best to other Presentations
system updates Best to other Presentations
AssadLeo1
 
Combined_Simulation and some other detail about
Combined_Simulation and some other detail aboutCombined_Simulation and some other detail about
Combined_Simulation and some other detail about
AssadLeo1
 
Checking Model Validity and Verification.pptx
Checking Model Validity and Verification.pptxChecking Model Validity and Verification.pptx
Checking Model Validity and Verification.pptx
AssadLeo1
 
cyberCrime and other knowledge with ful detail
cyberCrime and other knowledge with ful detailcyberCrime and other knowledge with ful detail
cyberCrime and other knowledge with ful detail
AssadLeo1
 
System Dymola with all the things and other
System Dymola with all the things and otherSystem Dymola with all the things and other
System Dymola with all the things and other
AssadLeo1
 
Time Simulation Discrete Event (time) Simulation.pptx
Time Simulation Discrete Event (time) Simulation.pptxTime Simulation Discrete Event (time) Simulation.pptx
Time Simulation Discrete Event (time) Simulation.pptx
AssadLeo1
 
Introduction and some other things that can
Introduction and some other things that canIntroduction and some other things that can
Introduction and some other things that can
AssadLeo1
 
open system with great detail about netowrk
open system with great detail about netowrkopen system with great detail about netowrk
open system with great detail about netowrk
AssadLeo1
 
12 Malware very useful Presentation for others
12 Malware very useful Presentation for others12 Malware very useful Presentation for others
12 Malware very useful Presentation for others
AssadLeo1
 
Vulnerabilities and Protections in Information Security.pptx
Vulnerabilities and Protections in Information Security.pptxVulnerabilities and Protections in Information Security.pptx
Vulnerabilities and Protections in Information Security.pptx
AssadLeo1
 
Details of Malwareand Their Types with pptx
Details of Malwareand Their Types with pptxDetails of Malwareand Their Types with pptx
Details of Malwareand Their Types with pptx
AssadLeo1
 
Malware Presentation with great explanination
Malware Presentation with great explaninationMalware Presentation with great explanination
Malware Presentation with great explanination
AssadLeo1
 
Ad

Recently uploaded (20)

TD5.95 New holland tractor service repair manual.pdf
TD5.95 New holland tractor service repair manual.pdfTD5.95 New holland tractor service repair manual.pdf
TD5.95 New holland tractor service repair manual.pdf
Service Repair Manual
 
Charging at the Workplace: The EVAL Certification Program
Charging at the Workplace:  The EVAL Certification ProgramCharging at the Workplace:  The EVAL Certification Program
Charging at the Workplace: The EVAL Certification Program
Forth
 
Caterpillar cat m318 Excavator Manual.pdf
Caterpillar cat m318 Excavator Manual.pdfCaterpillar cat m318 Excavator Manual.pdf
Caterpillar cat m318 Excavator Manual.pdf
Service Repair Manual
 
What Does It Mean When Your Volvo Says ‘Engine System Service Required’
What Does It Mean When Your Volvo Says ‘Engine System Service Required’What Does It Mean When Your Volvo Says ‘Engine System Service Required’
What Does It Mean When Your Volvo Says ‘Engine System Service Required’
AutoScandia
 
Service Manual John Deere LX277AWS Repair.pdf
Service Manual John Deere LX277AWS Repair.pdfService Manual John Deere LX277AWS Repair.pdf
Service Manual John Deere LX277AWS Repair.pdf
Service Repair Manual
 
New holland Td5.75 tractor service repair manual.pdf
New holland Td5.75 tractor service repair manual.pdfNew holland Td5.75 tractor service repair manual.pdf
New holland Td5.75 tractor service repair manual.pdf
Service Repair Manual
 
John Deere LX255 Service Manual Download
John Deere LX255 Service Manual DownloadJohn Deere LX255 Service Manual Download
John Deere LX255 Service Manual Download
Service Repair Manual
 
TD5.85 New holland tractor service repair manual.pdf
TD5.85 New holland tractor service repair manual.pdfTD5.85 New holland tractor service repair manual.pdf
TD5.85 New holland tractor service repair manual.pdf
Service Repair Manual
 
T7.210 New Holland Tractor Service Repair Manual.pdf
T7.210 New Holland Tractor Service Repair Manual.pdfT7.210 New Holland Tractor Service Repair Manual.pdf
T7.210 New Holland Tractor Service Repair Manual.pdf
Service Repair Manual
 
New Holland T7.175 Autocommand Tractor Service Repair Manual.pdf
New Holland T7.175 Autocommand Tractor Service Repair Manual.pdfNew Holland T7.175 Autocommand Tractor Service Repair Manual.pdf
New Holland T7.175 Autocommand Tractor Service Repair Manual.pdf
Service Repair Manual
 
2 3 1 principle automotive location guide align
2 3 1 principle automotive location guide align2 3 1 principle automotive location guide align
2 3 1 principle automotive location guide align
kirandatal1
 
WA500-6 GALEO KOMATSU WHEEL LOADER Service Repair Manual.pdf
WA500-6 GALEO KOMATSU WHEEL LOADER Service Repair Manual.pdfWA500-6 GALEO KOMATSU WHEEL LOADER Service Repair Manual.pdf
WA500-6 GALEO KOMATSU WHEEL LOADER Service Repair Manual.pdf
Service Repair Manual
 
real illuminati Uganda agent 0782561496/0756664682
real illuminati Uganda agent 0782561496/0756664682real illuminati Uganda agent 0782561496/0756664682
real illuminati Uganda agent 0782561496/0756664682
REAL ILLUMINATI UGANDA CALL WhatsApp number on0782561496/0756664682
 
LECTURE-13b APPROACHES TO TEXT ANALYSIS.pptx
LECTURE-13b APPROACHES TO TEXT ANALYSIS.pptxLECTURE-13b APPROACHES TO TEXT ANALYSIS.pptx
LECTURE-13b APPROACHES TO TEXT ANALYSIS.pptx
ABDULBASIT631009
 
Engine New Holland Tc29da Tractors Service Manual.pdf
Engine New Holland Tc29da Tractors Service Manual.pdfEngine New Holland Tc29da Tractors Service Manual.pdf
Engine New Holland Tc29da Tractors Service Manual.pdf
Service Repair Manual
 
RPS Degree of freedom automotive locator fixation
RPS Degree of freedom automotive locator fixationRPS Degree of freedom automotive locator fixation
RPS Degree of freedom automotive locator fixation
kirandatal1
 
Komatsu WA150-6 Wheel Loader Service Repair Manual.pdf
Komatsu WA150-6 Wheel Loader Service Repair Manual.pdfKomatsu WA150-6 Wheel Loader Service Repair Manual.pdf
Komatsu WA150-6 Wheel Loader Service Repair Manual.pdf
Service Repair Manual
 
real illuminati Uganda agent 0782561496/0756664682
real illuminati Uganda agent 0782561496/0756664682real illuminati Uganda agent 0782561496/0756664682
real illuminati Uganda agent 0782561496/0756664682
REAL ILLUMINATI UGANDA CALL WhatsApp number on0782561496/0756664682
 
New Holland T7.190 Tractor Service Repair Manual.pdf
New Holland T7.190 Tractor Service Repair Manual.pdfNew Holland T7.190 Tractor Service Repair Manual.pdf
New Holland T7.190 Tractor Service Repair Manual.pdf
Service Repair Manual
 
Boilee energy performance and role of steam trap
Boilee energy performance and role of steam trapBoilee energy performance and role of steam trap
Boilee energy performance and role of steam trap
kaifvahora1
 
TD5.95 New holland tractor service repair manual.pdf
TD5.95 New holland tractor service repair manual.pdfTD5.95 New holland tractor service repair manual.pdf
TD5.95 New holland tractor service repair manual.pdf
Service Repair Manual
 
Charging at the Workplace: The EVAL Certification Program
Charging at the Workplace:  The EVAL Certification ProgramCharging at the Workplace:  The EVAL Certification Program
Charging at the Workplace: The EVAL Certification Program
Forth
 
Caterpillar cat m318 Excavator Manual.pdf
Caterpillar cat m318 Excavator Manual.pdfCaterpillar cat m318 Excavator Manual.pdf
Caterpillar cat m318 Excavator Manual.pdf
Service Repair Manual
 
What Does It Mean When Your Volvo Says ‘Engine System Service Required’
What Does It Mean When Your Volvo Says ‘Engine System Service Required’What Does It Mean When Your Volvo Says ‘Engine System Service Required’
What Does It Mean When Your Volvo Says ‘Engine System Service Required’
AutoScandia
 
Service Manual John Deere LX277AWS Repair.pdf
Service Manual John Deere LX277AWS Repair.pdfService Manual John Deere LX277AWS Repair.pdf
Service Manual John Deere LX277AWS Repair.pdf
Service Repair Manual
 
New holland Td5.75 tractor service repair manual.pdf
New holland Td5.75 tractor service repair manual.pdfNew holland Td5.75 tractor service repair manual.pdf
New holland Td5.75 tractor service repair manual.pdf
Service Repair Manual
 
John Deere LX255 Service Manual Download
John Deere LX255 Service Manual DownloadJohn Deere LX255 Service Manual Download
John Deere LX255 Service Manual Download
Service Repair Manual
 
TD5.85 New holland tractor service repair manual.pdf
TD5.85 New holland tractor service repair manual.pdfTD5.85 New holland tractor service repair manual.pdf
TD5.85 New holland tractor service repair manual.pdf
Service Repair Manual
 
T7.210 New Holland Tractor Service Repair Manual.pdf
T7.210 New Holland Tractor Service Repair Manual.pdfT7.210 New Holland Tractor Service Repair Manual.pdf
T7.210 New Holland Tractor Service Repair Manual.pdf
Service Repair Manual
 
New Holland T7.175 Autocommand Tractor Service Repair Manual.pdf
New Holland T7.175 Autocommand Tractor Service Repair Manual.pdfNew Holland T7.175 Autocommand Tractor Service Repair Manual.pdf
New Holland T7.175 Autocommand Tractor Service Repair Manual.pdf
Service Repair Manual
 
2 3 1 principle automotive location guide align
2 3 1 principle automotive location guide align2 3 1 principle automotive location guide align
2 3 1 principle automotive location guide align
kirandatal1
 
WA500-6 GALEO KOMATSU WHEEL LOADER Service Repair Manual.pdf
WA500-6 GALEO KOMATSU WHEEL LOADER Service Repair Manual.pdfWA500-6 GALEO KOMATSU WHEEL LOADER Service Repair Manual.pdf
WA500-6 GALEO KOMATSU WHEEL LOADER Service Repair Manual.pdf
Service Repair Manual
 
LECTURE-13b APPROACHES TO TEXT ANALYSIS.pptx
LECTURE-13b APPROACHES TO TEXT ANALYSIS.pptxLECTURE-13b APPROACHES TO TEXT ANALYSIS.pptx
LECTURE-13b APPROACHES TO TEXT ANALYSIS.pptx
ABDULBASIT631009
 
Engine New Holland Tc29da Tractors Service Manual.pdf
Engine New Holland Tc29da Tractors Service Manual.pdfEngine New Holland Tc29da Tractors Service Manual.pdf
Engine New Holland Tc29da Tractors Service Manual.pdf
Service Repair Manual
 
RPS Degree of freedom automotive locator fixation
RPS Degree of freedom automotive locator fixationRPS Degree of freedom automotive locator fixation
RPS Degree of freedom automotive locator fixation
kirandatal1
 
Komatsu WA150-6 Wheel Loader Service Repair Manual.pdf
Komatsu WA150-6 Wheel Loader Service Repair Manual.pdfKomatsu WA150-6 Wheel Loader Service Repair Manual.pdf
Komatsu WA150-6 Wheel Loader Service Repair Manual.pdf
Service Repair Manual
 
New Holland T7.190 Tractor Service Repair Manual.pdf
New Holland T7.190 Tractor Service Repair Manual.pdfNew Holland T7.190 Tractor Service Repair Manual.pdf
New Holland T7.190 Tractor Service Repair Manual.pdf
Service Repair Manual
 
Boilee energy performance and role of steam trap
Boilee energy performance and role of steam trapBoilee energy performance and role of steam trap
Boilee energy performance and role of steam trap
kaifvahora1
 
Ad

all about petri netis model and simulation

  • 2. Agenda • Introduction • Petri Net • Modelling wïth Petri Net • Analysïs of Petri net
  • 3. Introduction • Techniques for Evaluating SW / HW: —Simulation —Testing Deductive Verification —Model Checking
  • 4. Introduction • Simulation & Testing: —Needs experiments before system deployment —Simulation is performed on an abstraction of a model of the system —Testing is performed on the real system. — It is very diffucult to evaluate all possible interactions / faults / behaviors / states
  • 5. Introduction (3) • Deductive Verification: — Validate a system's performance based on deductive rules —Applicable to infinite-state systems —A time-consuming process —Needs expert people with good experiments — Usually is used for critical systems (e.g., security protocols)
  • 6. Introduction • Model Checking: —An automated technique to evaluate finite-state systems — Perform a thorough search in the state space of the system in order to determine some properties of the system.
  • 7. Introduction • The process of Model Checking: • Modeling: Transform a design to formalism (e.g., a state-transition graph of the system) • Verification: Perform a thorough search in the state space of the system in order to determine whether some properties of the system are true or not. • Is performed automatically
  • 8. Petri Net • A ‘Petri Net’ was introduced by a German mathematician and used to model a system — Condition: a Boolean description of the state of the system — Event: an action that depends on the state of the system • Petri net is a graphical and mathematical tools for the analysis of discrete event dynamic systems. — The system model is represented by a set of conditions and a set of events —A condition is represented by a place and an event by transition.
  • 9. Petri Net: Building Blocks Basic Elements • PN consists of three types of components: places (circles), transitions (rectangles) and arcs (arrows): — Places represent possible states of the system; — Transitions are events or actions which cause the change of state; And — Avery arc simply connects a place with a transition or a transition with a place.
  • 10. • Building Blocks: • An example: tJ Petri Net input place token P Input arc transition ' 1 P2 output place output arc
  • 11. Petri Net: Marks (Tokens) • A marking M is an assignment of (dots) to places of a petri net. token s • Dots are placed in the circle to represent place in which its condition is satisfied — e.g. a resource is available or operation in a process • The marking can be represented as M = (1,1,0)
  • 12. Petri Net: Marks (Tokens) • A place can have more than one token and therefore can represent a queue — (e.g. a @ffer holding several prgcesses).
  • 13. Petri Net : Firing a transition • Executing a marked Petri net causes the number and positions of the token to change. The rules for the execution are: —A transition is enabled if all its input places contain at least one token. —Any enabled transition may fire —Firing of a transition results in one token being removed from each of its input places and being deposited of its output places —Execution halts when there are no enabled transitions. Each time a transitions fires, the marking of the petri net will change.
  • 14. Petri Net : Exam Ie q 1 1 0 t2 001 010
  • 15. Petri Net: Formal Definition A Petri net (PN) is a 5 tuple PN (P,T,IN,OUT,M) where: P = {p1,p2,....,p } is a finite set of places, T = {t1 , t2, ...,tn} is a finite set of transitions IN: (PxT)—+S OUT: (TxP)—>S M: Marking vector
  • 16. Petri Net: Formal Definition (cont'd) • IN are input functions defining directed arcs fro m • places to transitions • OUT are output functions defining directed arcs • from transitions to places • S is a set of all nonnegative integers k such that: • If k = 1 a directed arc is drawn without a label • If k > 1 a directed arc is drawn with label k. • If k = 0 no arc is drawn.
  • 17. Petri Net: Formal Definition (cont'd) • An example: Its I = Opgl Ott I = I sql If q = t l , O,O, 0, OJ 1 7
  • 18. Petri Net: Firing Rules for Transitions • A specific transition I, is said to be firable or enabled if each input place pt is marked with at least w(p„t ) tokens where w(p„t,) is the weight of the arc from p, to t,. • An enabled transition may or may not fire depending on whether or not the event actually takes place . • The firing of an enabled transition th removes vv(p ,t ) tokens from each input place p, of I;, and adds w(pj§ ) tokens to each output place p, of t h where w(p„t) is the weight of the arc from input place p, to t„ and w(p„t;) is the weight of the arc from I, to output place p,
  • 19. Petri Net: Firing Rules for Transitions P1 P2 T1 TI is not etabled T1 T'i i”s enabled
  • 20. Petri Net: Firing Rules for Transitions • Firing Examples p 1 p 2 Ti p3 p 1 p2 p3
  • 21. PN: Firing Rules for Transitions • Firing Examples (b )
  • 22. PN: Firing Rules for Transitions • Fïring of a sequence of transitions: ), -- (1, 2, 0, 2,1)
  • 23. Firing Rules for Transitions • Firing of a sequence of transitïons: r.
  • 24. Firing Rules for Transitions • Firing of a sequence of transitïons:
  • 25. Firing Rules for Transitions • Firing of a sequence of transitïons: 3' (0,3,1,1,2)
  • 26. PN: Change of States (1) • is denoted by a movement of token(s) (black dots) from place(s) to place(s); and is caused by the firing of a transition. • The firing represents an occurrence of the event or an action taken. • The firing is subject to the input conditions, denoted by token availability.
  • 27. PN: Change of States (2) • A transition is lira///e or enabled when there are sufficient tokens in its input places. • After firing, tokens will be transferred from the input places (old state) to the output places, denoting the new state. • Note that the examples are Petri nets representation of a finite state machine (FSM). PNs are much more powerful to model systems beyond F5Ms.
  • 28. Modelling with petri net • Petri net is mainly used for modelling. —Many systems can be modelled by petri net. • The system may be of many different kinds like computer hardware, computer software, physical system and so on. — Petri net is used to model the occurrence of various events and activities in the system.
  • 29. Modelling with petri net • Sequential Execution: ti Sequencetial execution
  • 30. Modelling with petri net — Concurrency: two events could take place in parallel, without interfering with one another.
  • 31. Modelling with petri net Synchronisation: By having two places as input conditions to the same transition, these two conditions become synchronised. Sjmchronation
  • 32. Modelling with petri net • Example : Concurrency and Synchronisation
  • 33. Modelling with petri net • Confilincts: • Two transitions t1 and t2 are said to be conflict if either th or t can occur but not both of 2 them, —i.e., when there is one place acting as input to a number of that is condition transition s. — Therefore, only one transition can be fire. ti 2 Co d
  • 34. Modelling with petri net • Merging: 4 Mergin g
  • 35. Modelling with petri net • Example: Font Selection T1 Bold on T2 Bold off User presses Old User presses italic T3 Italic on T4 User presses italic
  • 36. Modelling with petri net • Another Example: a finite-state machine — Consider a vending machine • It accepts either nickels or dimes • Sells 15c or 20c candy bars • The vending machine can hold up to 20c • Coin return transitions are omitted the next slides are the state diagram of this vending machine which represented by the Petri net Any finite-state machine (or its state diagram) can be modeled with a state machine.
  • 37. Modelling with petri net • Another Example: a finite-state machine Deposit 5c Deposit 5 Deposit 10c Get 20c candy
  • 38. Modelling with petri net • Mutual exclusion Recall: Mutual exclusion is a technique of defining entry and exit code so that at most one process is allowed to access the critical region at the same time. • The idea is that no process is allowed to enter the critical region, unless it checks that no other process is executing its own critical region. Mutual exclusion can be represented in Petri net using conflict.
  • 39. Mutual exclusion permission to enter • The place s represents the the critical region and there must be token in p 1 and p . 2 — If both processes want to simultaneously, enter the critical region then transition t1 and t2 are in conflict — i.e., only one of them can fire. ' ' I '' I( ''! t2 “ Critical section Process 2 2 1 Process 1 {1 section
  • 40. Producer consumer problem • bounded buffer Produc e Put in buffe Re ove buffe r Consum e Consume r
  • 41. Analysis of Petri net • Petri nets are capable of modelling a large variety of systems and properly representing the interactions between the various actions which can occur. — The strength of Petri net is its capability to model the system. • However, modelling by itself is of little use and its necessary to analyse the modelled system. This could lead to important insights into the behaviour of the modelled system.
  • 42. Reachibility • Given a Petri net, one would like to know which marking Mr can be reached from an initial marking MO • Example: For the Petri net of the bounded buffer consumer producer problem, M0 = (1, 0, 1, 0, 0, n) and M1 = (0, 1, 1, 0, 0, n) — is immediately reachable from the marking of M .
  • 43. Analysis of Petri net : Safeness • A place in a Petri net is safe if the number of tokens in that place never exceeds one. A petri net is same if all its places are safe. what does this Petri net do?
  • 44. Analysis of Petri net : Boundedness • A place is k-safe or k-bounded if the number of tokens in that place cannot exceed an integer k. —Therefore a place is 1-bounded is simply a safe place. • Example: —The Petri net for the producer/consumer problem with a bounded buffer, is it safe? Bounded? The Petri net for the producer/ consumer problem with a unbounded buffer, is it bounded? Why?
  • 45. Analysis of Petri net : Conservation • A Petri net with an initial marking M0, is strictly conservative, if for all the reachable marking, the total number of tokens in each marking is exactly the same as the initial marking. • A Petri net can be used to model resource allocation systems. In this systems some tokens may represents the resources. — Therefore, in such Petri nets conservation is an important property such that resources can neither be created nor destroyed.
  • 46. Analysis of Petri net : Liveness • Another problem that could occur in resource allocation is deadlock. —A deadlock in a Petri net is a transition (or a set of transition) which cannot fire. —A transition is alive if it is not deadlock. —A transition is live in a marking M if it is potentially fireable in every marking in the Petri net. I-- i | --. | › , | t , ,-I .' - ' ! '',' 'i .' . ” . .- . ”
  • 47. Exercises • For the above Petri bounded, live, and why? net, indicate whether each is conservative or not and show
  • 48. Summary • Petri net concepts Petri net representation Firing a transition — Marks (Tokens) • Modeling with Petri net Events and condition
  翻译: