Embedded System Design Embedded Systems Foundations of Cyber Physical Systems and the Internet of Things 3rd Edition by Peter Marwedel ISBN 331956045X 9783319560458 - Download the full set of chapters carefully compiled
Embedded System Design Embedded Systems Foundations of Cyber Physical Systems and the Internet of Things 3rd Edition by Peter Marwedel ISBN 331956045X 9783319560458 - Download the full set of chapters carefully compiled
https://ebookball.com/product/embedded-system-design-
embedded-systems-foundations-of-cyber-physical-systems-and-
the-internet-of-things-3rd-edition-by-peter-marwedel-
isbn-331956045x-9783319560458-15824/
OR CLICK BUTTON
DOWLOAD NOW
ebookball.com
https://ebookball.com/product/the-art-of-the-art-of-designing-
embedded-systems-1st-edition-by-jack-
ganssle-9780080499352-008049935x-8874/
ebookball.com
ebookball.com
Real Time Embedded Systems Design Principles and
Engineering Practices 1st Edition by Xiaocong Fan
0128015071 9780128015070
https://ebookball.com/product/real-time-embedded-systems-design-
principles-and-engineering-practices-1st-edition-by-xiaocong-
fan-0128015071-9780128015070-17208/
ebookball.com
https://ebookball.com/product/systems-controls-embedded-systems-
energy-and-machines-1st-edition-by-richard-
dorf-0849373476-9780849373473-17526/
ebookball.com
ebookball.com
ebookball.com
https://ebookball.com/product/first-steps-with-embedded-systems-1st-
edition-by-byte-craft-limited-isbn-12312/
ebookball.com
Embedded Systems
Peter Marwedel
Embedded System
Design
Embedded Systems, Foundations of
Cyber-Physical Systems, and the
Internet of Things
Third Edition
Embedded Systems
Series editors
Nikil D. Dutt, Irvine, CA, USA
Grant Martin, Santa Clara, CA, USA
Peter Marwedel, Dortmund, Germany
This Series addresses current and future challenges pertaining to embedded
hardware, software, specifications and techniques. Titles in the Series cover a
focused set of embedded topics relating to traditional computing devices as well as
high-tech appliances used in newer, personal devices, and related topics. The
material will vary by topic but in general most volumes will include fundamental
material (when appropriate), methods, designs and techniques.
Third Edition
123
Peter Marwedel
TU Dortmund
Dortmund
Germany
vii
viii Preface
systems and includes an overview of key concepts for the integration of information
technology with physical objects. It covers hardware as well as software aspects.
This is in-line with the ARTIST guidelines for curricula of embedded systems: “The
development of embedded systems cannot ignore the underlying hardware char-
acteristics. Timing, memory usage, power consumption, and physical failures are
important” [86].
This book has been designed as a textbook. However, this book provides more
references than typical textbooks do and also helps to structure the area. Hence, this
book should also be useful for faculty members and engineers. For students, the
inclusion of a rich set of references facilitates access to relevant sources of
information.
This book focuses on the fundamental bases of software and hardware. Specific
products and tools are mentioned only if they have outstanding characteristics.
Again, this is in-line with the ARTIST guidelines: “It seems that fundamental bases
are really difficult to acquire during continuous training if they haven’t been ini-
tially learned, and we must focus on them” [86]. As a consequence, this book goes
beyond teaching embedded system design by programming microcontrollers. This
book presents the fundamentals of embedded systems design which are needed
for the design of CPS and IoT systems. With this approach, we would like to
make sure that the material taught will not be outdated too soon. The concepts
covered in this book should be relevant for a number of years to come.
The proposed positioning of the current textbook in computer science and
computer engineering curricula is explained in a paper [356]. We want to relate the
most important topics in this area to each other. This way, we avoid a problem
mentioned in the ARTIST guidelines: “The lack of maturity of the domain results in
a large variety of industrial practices, often due to cultural habits. … curricula …
concentrate on one technique and do not present a sufficiently wide perspective. …
As a result, industry has difficulty finding adequately trained engineers, fully aware
of design choices” [86].
This book should also help to bridge the gap between practical experiences with
programming microcontrollers and more theoretical issues. Furthermore, it should
help to motivate students and teachers to look at more details. While this book
covers a number of topics in detail, others are covered only briefly. These brief
sections have been included in order to put a number of related issues into per-
spective. Furthermore, this approach allows lecturers to have appropriate links in
this book for adding complementary material of their choice. Due to the rich set of
references, this book can also be used as a comprehensive tutorial, providing
pointers for additional reading. Such references can also stimulate taking benefit of
this book during laboratories, projects, and independent studies as well as a starting
point for research.
The scope of this book includes specification techniques, hardware components,
system software, application mapping, evaluation and validation, as well as
exemplary optimizations and test methods. This book covers embedded systems
and their interface to the physical environment from a wide perspective, but cannot
cover every related area. Legal and socioeconomic aspects, human interfaces, data
Preface ix
The first edition of this book was published in 2003. The field of embedded systems
is moving fast, and many new results have become available since then. Also, there
are areas for which the emphasis has shifted. In some cases, a more detailed
treatment of the topic became desirable. New developments have been taken up
when the first German edition of this book was published in 2007. Therefore, it
became necessary to publish a second English edition in late 2010/early 2011. Since
1
This is consistent with the curriculum described by T. Abdelzaher in a recent report on CPS
education [393].
x Preface
then, some technological changes occurred. There was a clear shift from single core
systems toward multi-core systems. Cyber-physical systems (CPS) and the Internet
of Things (IoT) gained more attention. Power consumption and thermal issues have
become more important, and many designs now have tight power and thermal
constraints. Furthermore, safety and security have gained importance as well.
Overall, it became necessary to publish the current third edition.
The changes just described had an impact on several chapters. We are now
including and linking those aspects of embedded systems that provide foundations
for the design of CPS and IoT systems. The preface and the introduction have been
rewritten to reflect these changes. (a) The chapter on specifications and modeling
now includes partial differential equations and transaction-level modeling (TLM).
The use of this book in flipped-classroom-based teaching led to the consideration of
more details, in particular of specification techniques. (b) The chapter on embedded
system hardware now includes multi-cores, a rewritten section on memories, more
information on the conversion between the analog and the digital domain, including
pulse-width modulation (PWM). There are updated descriptions of field pro-
grammable gate arrays (FPGAs) and a brief section on security issues in embedded
systems. (c) The chapter on system software now contains a section on Linux in
embedded systems and more information on resource access protocols. (d) In the
context of system evaluation, there are new subsections on quality metrics, on
safety/security, on energy models, and on thermal issues. (e) The chapter on
mapping to execution platforms has been restructured: A standard classification of
scheduling problems has been introduced, and multi-core scheduling algorithms
have been added. There is now a clearer distinction between jobs and tasks. The
description of hardware/software codesign has been dropped. (f) The chapter on
optimizations has been updated. Some information on compilation for specialized
processors has been dropped.
All chapters have been carefully reviewed and updated if required. There are
also an improved integration of (color) graphics, more assignments (problems), as
well as a clearer distinction between definitions, theorems, proofs, code, and
examples. We adopted the Springer book layout style.
For this edition, it is typically not feasible to cover the complete book in a single
course for undergraduates and lecturers can select a subset which fits the local needs
and preferences.
xi
xii Acknowledgements
Names used in this book without any reference to copyrights or trademarks may
still be legally protected.
Please enjoy reading the book!
Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 History of Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Opportunities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Common Characteristics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.5 Curriculum Integration of Embedded Systems . . . . . . . . . . . . . . . 16
1.6 Design Flows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.7 Structure of This Book. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.8 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
2 Specifications and Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.1 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.2 Models of Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.3 Early Design Phases. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.3.1 Use Cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.3.2 (Message) Sequence Charts and Time/Distance
Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
2.3.3 Differential Equations . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.4 Communicating Finite State Machines (CFSMs) . . . . . . . . . . . . . 44
2.4.1 Timed Automata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.4.2 StateCharts: Implicit Shared Memory
Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.4.3 Synchronous Languages . . . . . . . . . . . . . . . . . . . . . . . . . 56
2.4.4 Message Passing: SDL as an Example . . . . . . . . . . . . . . 58
2.5 Data Flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.5.1 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.5.2 Kahn Process Networks . . . . . . . . . . . . . . . . . . . . . . . . . 65
2.5.3 Synchronous Data Flow . . . . . . . . . . . . . . . . . . . . . . . . . 67
2.5.4 Simulink . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
xiii
xiv Contents
8 Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
8.1 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
8.2 Test Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
8.2.1 Test Pattern Generation for Gate Level Models . . . . . . . 368
8.2.2 Self-Test Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369
8.3 Evaluation of Test Pattern Sets and System Robustness. . . . . . . . 370
8.3.1 Fault Coverage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370
8.3.2 Fault Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
8.3.3 Fault Injection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
8.4 Design for Testability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
8.4.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
8.4.2 Scan Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
8.4.3 Signature Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
8.4.4 Pseudo-Random Test Pattern Generation . . . . . . . . . . . . 376
8.4.5 The Built-In Logic Block Observer (BILBO) . . . . . . . . . 377
8.5 Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Appendix A: Integer Linear Programming . . . . . . . . . . . . . . . . . . . . . . . 379
Appendix B: Kirchhoff’s Laws and Operational Amplifiers . . . . . . . . . . 381
Appendix C: Paging and Memory Management Units . . . . . . . . . . . . . . 387
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
About the Author
xix
xx About the Author
2
See http://www.sfb876.tu-dortmund.de
Frequently Used Mathematical Symbols
Due to covering many areas in this book, there is a high risk of using the same
symbol for different purposes. Therefore, symbols have been selected such that the
risk of confusion is low. This table is supposed to help maintaining a consistent
notation.
a Weight
a Allocation
A Availability (! reliability)
A Area
A Ampere
b:: Communication bandwidth
B Communication bandwidth
cR Characteristic vector for Petri net
cp Specific thermal capacitance
cv Volumetric heat capacity
Ci Execution time
C Capacitance
C Set of Petri net conditions
Cth Thermal capacity
C Celsius
di Absolute deadline
Di Relative deadline
eð t Þ Input signal
e Euler’s number (2.71828..)
E Energy
E Graph edge
f Frequency
f( ) General function
f Probability density
fi Finishing time of task/job i
xxi
xxii Frequently Used Mathematical Symbols
F Probability distribution
F Flow relation of Petri net
g Gravity
g Gain of operational amplifier
G Graph
h Height
i Index, task/job number
I Current
j Index, dependent task/job
J Set of jobs
J Joule
Jj Job j
J Jitter
k Index, processor number
k Boltzmann constant ð 1:3807 1023 J/KÞ
K Kelvin
l Processor number
li Laxity of task/job i
L Processor type
L Length of conductor
Li Lateness of task si
Lmax Maximum lateness
m Number of processors
m Mass
m Meter
m Milli-prefix
M Marking of Petri net
MSmax Makespan
n Index
n Number of tasks/jobs
N Net
N Natural numbers
O( ) Landauer’s notation
pi Priority of task si
pi Place i of Petri net
P Power
P(S) Semaphore operation
Q Resolution
Q Charge
ri Release time of task/job i
R Reliability
Rth Thermal resistance
R Real numbers
s Time index
Frequently Used Mathematical Symbols xxiii
s Restitution
sj Starting time of task/job j
s Second
S State
S Semaphore
S Schedule
Sj Size of memory j
t Time
ti Transition i of Petri net
T Period
T Timer (for SDL)
Ti Period of task si
T Temperature
ui Utilization of task si
U:: Utilization
Umax Maximum utilization
v Velocity
wðtÞ Signal
V Graph nodes
V Voltage
V Volt
Vt Threshold voltage
VðSÞ Semaphore operation
V Volume
w(t) Signal
W(p,t) Weight in Petri net
W Watt
x Input variable
x(t) Signal
X:: Decision variable
Y:: Decision variable
zðtÞ Signal
Z High impedance
Z Integer numbers
a:: Arrival curve in real-time calculus
a Switching activity
a 1st component in Pinedo’s triplet
b:: Service function in real-time calculus
b 2nd component in Pinedo’s triplet
b Reciprocal of max. utilization
c:: Work load in real-time calculus
c 3rd component in Pinedo’s triplet
D Time interval
j Thermal conductivity
xxiv Frequently Used Mathematical Symbols
k Failure rate
p Number pi (3.1415926..)
p Set of processors
pi Processor i
q Mass density
si Task si
s Set of tasks
n Threshold for RM-US scheduling
Chapter 1
Introduction
This chapter presents terms used in the context of embedded systems together
with their history as well as opportunities, challenges and common characteristic
of embedded and cyber-physical systems. Furthermore, educational aspects, design
flows and the structure of this book are introduced.
Until the late 1980s, information processing was associated with large mainframe
computers and huge tape drives. Later, miniaturization allowed information process-
ing with personal computers (PCs). Office applications were dominating, but some
computers were also controlling the physical environment, typically in the form of
some feedback loop.
Later, Mark Weiser created the term “ubiquitous computing” [548]. This term
reflects Weiser’s prediction to have computing (and information) anytime, anywhere.
Weiser also predicted that computers are going to be integrated into products such
that they will become invisible. Hence, he created the term “invisible computer.”
With a similar vision, the predicted penetration of our day-to-day life with computing
devices led to the terms “pervasive computing” and “ambient intelligence.” These
three terms focus on only slightly different aspects of future information technology.
Ubiquitous computing focuses more on the long-term goal of providing information
anytime, anywhere, whereas pervasive computing focuses more on practical aspects
and the exploitation of already available technology. For ambient intelligence, there
is some emphasis on communication technology in future homes and smart buildings.
Miniaturization also enabled the integration of information processing and the
physical environment using computers. This type of information processing has been
called an “embedded system”:
Definition 1.2 (Lee [317]): “Cyber-Physical Systems (CPS) are integrations of com-
putation and physical processes”.
The new term emphasizes the link to physical quantities such as time, energy, and
space. Emphasizing this link makes sense, since it is frequently ignored in a world of
applications running on servers and on PCs. For CPS, we may be expecting models
to include models of the physical environment as well. In this sense, we may think
of CPS to comprise embedded systems (the information processing part) and the
physical environment, or CPS = ES + physics. This is also reflected in Fig. 1.1.
In their call for proposals, the National Science Foundation in the US mentions
also communication [394]:
“Emerging CPS will be coordinated, distributed, and connected, and must be
robust and responsive.”
This is also done in the acatech report on CPS [11]: CPS … “represent net-
worked, software-intensive embedded systems in a control loop, provide networked
and distributed services.”
Interconnection and collaboration are also explicitly mentioned in a call for pro-
posals by the European Commission [149]: “Cyber-Physical Systems (CPS) refer to
next generation embedded ICT systems that are interconnected and collaborating
including through the Internet of Things, and providing citizens and businesses with
a wide range of innovative applications and services.”
The importance of communication was visualized by the European Commission
earlier, as shown in Fig. 1.2.
1.1 History of Terms 3
Pervasive/
Ubiquitous Computing
- information
anytime, anywhere
From these citations, it is clear that the authors do not only associate the integration
of the cyber- and the physical world with the term CPS. Rather, there is also a
strong communication aspect. Actually, the term CPS is not always used consistently.
Some authors emphasize the integration with the physical environment, and others
emphasize communication.
Communication is more explicit in the term “Internet of Things” (IoT), which
can be defined as follows:
Definition 1.3 ([179]): The term Internet of Things “… describes the pervasive pres-
ence of a variety of devices – such as sensors, actuators, and mobile phones – which,
through unique addressing schemes, are able to interact and cooperate with each
other to reach common goals.”
This term is linking sensors (such that sensed information is available on the
Internet) and actuators (such that things can be controlled from the Internet). Sensor
examples include smoke detectors, heaters, and refrigerators. The Internet of Things
is expected to allow the communication between trillions of devices in the world.
This vision affects a large amount of businesses.
The exploitation of IoT technology for production has been called “Industry 4.0”
[70]. Industry 4.0 targets a more flexible production for which the entire life cycle
from the design phase onward is supported by the IoT.
To some extent, it is a matter of preferences whether the linking of physical objects
to the cyber-world is called CPS or IoT. Taken together, CPS and IoT include most
of the future applications of IT.
The design of these future applications requires knowing fundamental design
techniques for embedded systems. This book focuses on such fundamental tech-
niques and foundations of embedded system design. Please remember that these
are used in IoT and CPS designs though this is not repeatedly stated in each and
every context. This book discusses interfaces of embedded systems to CPS and
IoT systems. However, application-specific aspects of CPS and IoT are usually not
covered.
4 1 Introduction
1.2 Opportunities
New data analysis techniques can be used to detect increased risks and improve
chances for healing. Therapies can be supported with personalized medication.
New devices can be designed to help patients, e.g., handicapped patients. Also,
surgery can be supported with new devices. Embedded system technologies also
allow for a significantly improved result monitoring, giving doctors much better
means for checking whether or not a certain treatment has a positive impact. This
monitoring also applies to remotely located patients. Lists of projects in this area
can be found, for example, at http://cps-vo.org/group/medical-cps and at http://
www.nano-tera.ch/program/health.html.
• Smart buildings: Information processing can be used to increase the comfort
level in buildings, can reduce the energy consumption within buildings, and can
improve safety and security. Sub-systems which traditionally were unrelated must
be connected for this purpose. There is a trend toward integrating air-conditioning,
lighting, access control, accounting, safety features, and distribution of informa-
tion into a single system. Tolerance levels of air-conditioning sub-systems can be
increased for empty rooms, and the lighting can be automatically reduced. Air con-
dition noise can be reduced to a level required for the actual operating conditions.
Intelligent usage of blinds can also optimize lighting and air-conditioning. Avail-
able rooms can be displayed at appropriate places, simplifying ad hoc meetings
and cleaning. Lists of non-empty rooms can be displayed at the entrance of the
building in emergency situations (provided the required power is still available).
This way, energy can be saved on cooling, heating, and lighting. Also, safety can
be improved. Initially, such systems might mostly be present in high-tech office
buildings, but the trend toward energy-efficient buildings also affects the design
of private homes. One of the goals is to design so-called zero-energy-buildings
(buildings which produce as much energy as they consume) [404]. Such a design
would be one contribution toward a reduction of the global carbon dioxide footprint
and global warming.
• Smart grid: In the future, the production of energy is supposed to be much more
decentralized than in the past. Providing stability in such a scenario is difficult. IT
technology is required in order to achieve a sufficiently stable system. Information
on the smart grid can be found, for example, at https://www.smartgrid.gov/the_
smart_grid and at http://www.smartgrids.eu/.
• Scientific experiments: Many contemporary experiments in sciences, in particular
in physics, require the observation of experiment outcomes with IT devices. The
combination of physical experiments and IT devices can be seen as a special case
of CPS.
• Public safety: The interest in various kinds of safety is also increasing. Embedded
and cyber-physical systems and the Internet of Things can be used to improve
safety in many ways. This includes identification/authentication of people, for
example with fingerprint sensors or face recognition systems.
• Structural health monitoring: Natural and artificial structures such as mountains,
volcanoes, bridges, and dams (see, e.g., Fig. 1.3) are potentially threatening lives.
We can use embedded system technology to enable advance warnings in case of
increased dangers like avalanches or collapsing bridges.
6 1 Introduction
• Agriculture and breeding: There are many applications in these areas. For exam-
ple, the “regulations for traceability of agricultural animals and their movements
require the use of technologies like IoT, making possible the real-time detection of
animals, for example, during outbreaks of (a) contagious disease” [493].
• Military applications: Information processing has been used in military equip-
ment for many years. In fact, some of the very first computers analyzed military
radar signals.
• Telecommunication: Mobile phones have been one of the fastest growing markets
in the recent years. For mobile phones, radio frequency (RF) design, digital signal
processing, and low-power design are key aspects. Telecommunication is a key
aspect of IoT. Other forms of telecommunication are also important.
• Consumer electronics: Video and audio equipment is a very important sector of
the electronics industry. The information processing integrated into such equip-
ment is steadily growing. New services and better quality are implemented using
advanced digital signal processing techniques. Many TV sets (in particular, high-
definition TV sets), multimedia phones, and game consoles comprise powerful
high-performance processors and memory systems. They represent special cases
of embedded systems.
Even more applications are listed in a report on opportunities and challenges of the
IoT [493]. The large set of examples demonstrates the huge variety of embedded
systems with applications in CPS and IoT systems. In a way, many of the future
applications of IT technology can be linked to such systems.
The long list of application areas of embedded systems is resulting in a corre-
sponding economic importance of such systems. The acatech report [11] mentions
that at the time of writing the report, 98% of all microprocessors are used in these
systems. In a way, embedded system design is an enabler for many products and has
an impact on the combined market volume size of all the areas mentioned. How-
ever, it is difficult to quantify the size of the CPS/IoT market since the total market
volume of all these areas is significantly larger than the market volume of their IT
components. Referring to the value of semiconductors in the CPS/IoT market would
also be misleading, since that value is only a fraction of the overall value.
The economic importance of CPS and the IoT is reflected in calls for proposals by
funding organizations, such as the NSF [394] and the European Commission [149].
1.3 Challenges
Unfortunately, the design of embedded systems and their integration in CPS and
IoT systems comes with a large number of difficult design issues. Commonly found
issues include the following:
A key reason for the need of being dependable is that these systems are directly
connected to the physical environment and have an immediate impact on that
environment. The issue needs to be considered during the entire design process.
Dependability encompasses the following aspects of a system:
1. Safety:
Definition 1.5: “Safety is the state of being ‘safe’ (from French sauf), the condition
of being protected from harm or other non-desirable outcomes” [557].
Typically, we consider harm or threats from within the system we are using during
its normal operation. For example, no software malfunction should be a threat to
lives.
2. Security:
Connecting components in IoT systems enables attacks from the outside. Cyber-
crime and cyber-warfare are special cases of such attacks, with significant amounts
of potential damages. Connecting more and more components enables even more
attacks and leads to more damages. This has become a serious issue in the design
and proliferation of IoT systems.
The only really secure solution is to disconnect components, which contradicts
the original motivation of using connected systems. Related research is therefore
expected to be one of the fastest growing areas in IT-related research.
According to Ravi et al. [289], the following typical elements of security require-
ments exist:
– A user identification process validates users before allowing them to use the
system.
– Secure network access provides a network connection or service access only if
the device is authorized.
– Secure communications include a number of communication-related features.
– Secure storage requires confidentiality and integrity of data.
– Content security enforces usage restrictions.
3. Confidentiality:
a system will not fail1 . For an evaluation of reliability, we are not considering
malicious attacks from the outside but only effects occurring within the system
itself during normal, intended operation.
5. Repairability: Repairability (also spelled reparability) is the probability that a
failing system can be repaired within a certain time.
6. Availability: Availability is the probability that the system is available. Reliability
and repairability must be high and security hazards absent in order to achieve a
high availability.
Designers may be tempted to focus just on the functionality of systems initially,
assuming that dependability can be added once the design is working. Typically,
this approach does not work, since certain design decisions will not allow achieving
the required dependability in the aftermath. For example, if the physical partitioning
is done in the wrong way, redundancy may be impossible. Therefore, “making the
system dependable must not be an after-thought,” it must be considered from the
very beginning [292]. Good compromises achieving an acceptable level of safety,
security, confidentiality, and reliability have to be found [284].
Even perfectly designed systems can fail if the assumptions about the workload
and possible errors turn out to be wrong [292]. For example, a system might fail if it
is operated outside the initially assumed temperature range.
• If we look closely at the interface between the physical and the cyber-world, we
observe a mismatch between physical and cyber-models. The following list
shows examples:
– Many cyber-physical systems must meet real-time constraints. Not completing
computations within a given time frame can result in a serious loss of the quality
provided by the system (e.g., if the audio or video quality is affected) or may
cause harm to the user (e.g., if cars, trains, or planes do not operate in the
predicted way). Some time, constraints are called hard time constraints:
Definition 1.8 (Kopetz [292]): “A time-constraint is called hard if not meeting that
constraint could result in a catastrophe”.
All other time constraints are called soft time constraints.
Many of today’s information processing systems are using techniques for
speeding-up information processing on the average. For example, caches improve the
average performance of a system. In other cases, reliable communication is achieved
by repeating certain transmissions. These cases include Ethernet protocols: They
typically rely on resending messages whenever the original messages have been lost.
On average, such repetitions result in a (hopefully only) small loss of performance,
even though for a certain message the communication delay can be orders of mag-
nitude larger than the normal delay. In the context of real-time systems, arguments
about the average performance or delay cannot be accepted. “A guaranteed system
response has to be explained without statistical arguments” [292]. Many modeling
techniques in computer science do not model real time. Frequently, time is modeled
1A formal definition of this term is provided in Definition 5.35 on p. 270 of this book.
10 1 Introduction
without any physical units attached to it, which means that no distinction is made
between picoseconds and centuries. The resulting problems are very clearly formu-
lated in a statement made by E. Lee: “The lack of timing in the core abstraction (of
computer science) is a flaw, from the perspective of embedded software” [318].
– Many embedded systems are hybrid systems in the sense that they include analog
and digital parts. Analog parts use continuous signal values in continuous time,
whereas digital parts use discrete signal values in discrete time. Many physical
quantities are represented by a pair, consisting of a real number and a unit. The set of
real numbers is uncountable. In the cyber-world, the set of representable values for
each number is finite. Hence, almost all physical quantities can only be approx-
imated in digital computers. During simulations of physical systems on digital
computers, we are typically assuming that this approximation gives us meaningful
results. In a paper, Taha considered consequences of the non-availability of real
numbers in the cyber-world [499].
– Physical systems can exhibit the so-called Zeno effect. The Zeno effect can be
introduced with the help of the bouncing ball example. Suppose that we are drop-
ping a bouncing ball onto the floor from a particular height. After releasing the
ball, it will start to fall, being accelerated by the gravitation of the earth. When
it hits the floor, it will bounce, i.e., it will start to move in the opposite direction.
However, we assume that bouncing will have some damping effect and that the
initial speed of the ball after the bouncing will be reduced by a factor of s < 1,
compared to the speed right before the bouncing. s is called the restitution. Due
to this, the ball will not reach its initial height. Furthermore, the time to reach
the floor a second time will be shorter than for the initial case. This process will
be repeated, with smaller and smaller intervals between the bounces. However,
according to the ideal model of partially elastic bounces, this process will go on
and on. Figure 1.5 visualizes the trajectory (the height as a function of time) of the
bouncing ball.
Now, let be an arbitrary time interval, anywhere in the time domain. Would
there be an upper bound on the number of bounces in this time interval? No, there
would not be an upper bound, since bouncing is repeated in shorter and shorter
intervals.
This is a special case of the Zeno effect. A system is said to exhibit a Zeno effect,
when it is possible to have an unlimited number of events in an interval of finite
length [386]. Mathematically speaking, this is feasible since infinite series may
be converging to a finite value. In this case, the infinite series of times at which
bouncing occurs is converging to a finite instance in time. In the ideal model,
bouncing happens again and again, but intervals between bounces get shorter and
shorter. See the discussion on p. 43 for more details.
On digital computers, the unlimited number of events can only be approximated.
– Many CPS comprise control loops, like the one shown in Fig. 1.6.
- Plant
periodic sampling
t
Feedback
Control theory was initially based on analog feedback systems. For digital, discrete
time feedback, periodic sampling of signals has been the default assumption for
decades and it worked reasonably well. However, periodic sampling is possibly not
the best approach. We could save resources if we would extend sampling intervals
during times of relatively constant signals. This is the idea of adaptive sampling.
Adaptive sampling is an area of active research [202].
– Traditional sequential programming languages are not the best way to describe
concurrent, timed systems.
– Traditionally, the process of verifying whether or not some product is a correct
implementation of the specification is generating a Boolean result: either the prod-
uct is correct or not. However, two physically existing products will never be
exactly identical. Hence, we can only check with some level of imprecision whether
a product is a correct implementation of the design. This introduces fuzziness, and
Boolean verification is replaced by fuzzy verification [178, 424].
– Edward Lee pointed out that the combination of a deterministic physical model
and a deterministic cyber-model will possibly be a non-deterministic model [314].
Non-deterministic sampling can be one reason for this.
Overall, we observe a mismatch between the physical and the cyber-world. Effec-
tively, we are still looking for appropriate models for CPS, but cannot expect to
completely eliminate the mismatch.
• Embedded systems must be resource aware. The following resources can be
considered:
12 1 Introduction
batteries, consume very small amounts of energy and are therefore not relevant
for global warming. For systems connected to the power grid, energy is not a
really scarce resource. Systems which are only temporarily connected to the
power grid are somewhere between their plugged and unplugged counterparts.
The importance of power and energy efficiency was initially recognized for
embedded systems. The focus on these objectives was later taken up for general-
purpose computing as well and led to initiatives such as the green computing
initiative [10].
2 See http://www.sfb876.tu-dortmund.de.
1.4 Common Characteristics 15
In addition to the challenges listed above, there are more common characteristics of
embedded, cyber-physical, and IoT systems, independently of the application area.
• CPS and IoT systems use sensors and actuators to connect the embedded system
to the physical world. For IoT, these components are connected to the Internet.
Definition 1.9: Actuators are devices converting numbers into physical effects.
• Typically, embedded systems are reactive systems, which are defined as follows:
Definition 1.10 (Bergé [542]): “A reactive system is one that is in continual inter-
action with its environment and executes at a pace determined by that environment.”
Reactive systems are modeled as being in a certain state, waiting for an input.
For each input, they perform some computation and generate an output and a new
state. Hence, automata are good models of such systems. Mathematical functions,
describing the problems solved by most algorithms, would be an inappropriate model.
• Embedded systems are underrepresented in teaching and in public discussions.
Real embedded systems are complex. Hence, comprehensive equipment is required
for realistically teaching embedded systems design. However, teaching CPS design
can be appealing, due to the visible impact on the physical behavior.
• These systems are frequently dedicated toward a certain application.
For example, processors running control software in a car or a train will typically
always run that software, and there will be no attempt to run a game or spreadsheet
program on the same processor. There are mainly two reasons for this:
1. Running additional programs would make those systems less dependable.
2. Running additional programs is only feasible if resources such as memory are
unused. No unused resources should be present in an efficient system.
However, the situation is slowly changing. For example, the AUTOSAR initiative
[26] demonstrates more dynamism in the automotive industry.
• Most embedded systems do not use keyboards, mice, and large computer monitors
for their user interface. Instead, there is a dedicated user interface consisting
of push buttons, steering wheels, pedals, etc. Because of this, the user hardly
recognizes that information processing is involved. This is consistent with the
introduction of the term disappearing computer.
Table 1.2 highlights some distinguishing features between the design of PC-like or
data center server-like systems and embedded systems.
Compatibility with traditional instruction sets employed for PCs is less important
for embedded systems, since it is typically possible to compile software applications
for architectures at hand. Sequential programming languages do not match well
with the need to describe concurrent real-time systems, and other ways of modeling
applications may be preferred. Several objectives must be considered during the
16 1 Introduction
Unfortunately, embedded systems are hardly covered even in the latest edition of the
Computer Science Curriculum, as published by ACM and the IEEE Computer Soci-
ety [9]. However, the growing number of applications results in the need for more
education in this area. This education should help to overcome the limitations of cur-
rently available design technologies for embedded systems. For example, there is still
1.5 Curriculum Integration of Embedded Systems 17
lab
+courses
for minor embedded system fundamentals of project
cyber-physical and IoT systems
undergraduates thesis
graduates ....
3 The partitioning between undergraduate courses and graduate courses may differ between
universities.
1.5 Curriculum Integration of Embedded Systems 19
application test
HW-components mapping
optimization
system software
evaluation & validation
(RTOS, ...)
test
In Fig. 1.8 (as well as in other similar diagrams in this book), we are using boxes
with rounded corners for stored information and rectangles for transformations
on data. In particular, information is stored in the design repository. The repository
allows keeping track of design models. In most cases, the repository should provide
version management or “revision control,” such as CVS [88], SVN [108], or “git” (see
https://www.git-scm.com). A good design repository should also come with a design
management interface which would also keep track of the applicability of design tools
and sequences, all integrated into a comfortable graphical user interface (GUI). The
design repository and the GUI can be extended into an integrated development
environment (IDE), also called design framework (see, e.g.,[329]). An integrated
development environment keeps track of dependencies between tools and design
information.
Using the repository, design decisions can be taken in an iterative fashion. At
each step, design model information must be retrieved. This information is then
considered.
20 1 Introduction
evaluation validation
evaluation validation
hardware compilation
software compilation
simulation
simulation
simulation
manufacturing
Software design
Figure 1.10 very clearly shows the different steps that must be performed. The
steps correspond to certain phases during the software development process (the
precise meaning is again not relevant in the context of this book). Note that taking
design decisions, evaluating and validating designs are lumped into a single box in
this diagram. Application knowledge, system software, and system hardware are not
explicitly shown. The V-model also includes a model of the integration and testing
phase (right “wing”) of the diagram. This corresponds to an inclusion of testing in the
loop of Fig. 1.8. The shown model corresponds to the V-model version “97”. The more
recent V-model XT allows a more general set of design steps. This change matches
very well our interpretation of design flows in Fig. 1.8. Other iterative approaches
include the waterfall model and the spiral model. More information about software
engineering for embedded systems can be found in a book by J. Cooling [109].
Our generic design flow model is also consistent with flow models used in hard-
ware design. For example, Gajski’s Y-chart [165] (see Fig. 1.11) is a very popular
model.
Geometrical
22 1 Introduction
Consistent with the design information flow shown above, this book is structured as
follows: Chap. 2 provides an overview of specification techniques, languages, and
models. Key hardware components of embedded systems are presented in Chap. 3.
Chap. 4 deals with system software components, particularly embedded operating
systems. Chap. 5 contains the essentials of embedded system design evaluation and
verification. Mapping applications to execution platforms is one of the key steps in
the design process of embedded systems. Standard techniques (including scheduling)
for achieving such a mapping are listed in Chap. 6. Due to the need for generating effi-
cient designs, many optimization techniques are needed. From among the abundant
set of available optimization techniques, several groups are mentioned in Chap. 7.
1.7 Structure of This Book 23
1.8 Problems
We suggest solving the following problems either at home or during a flipped class-
room session:
1.2 How would you define the term “cyber-physical system (CPS)”? Do you see any
difference between the terms “embedded systems” and “cyber-physical systems”?
1.5 In which way does this book cover CPS and IoT design?
1.6 In which application areas do you see opportunities for CPS and IoT systems?
Where do you expect major changes caused by information technology?
1.7 Use the sources available to you to demonstrate the importance of embedded
systems!
1.8 Which challenges must be overcome in order to fully take advantage of the
opportunities?
1.12 Which objectives must be considered during the design of embedded systems?
1.14 What are the main differences between PC-based applications and embed-
ded/CPS applications?
1.16 On which Web sites do you find companion material for this book?
1.8 Problems 25
1.17 Compare the curriculum of your educational program with the description of
the curriculum in this introduction. Which prerequisites are missing in your program?
Which advanced courses are available?
How can we describe the system which we would like to design and how can we rep-
resent intermediate design information? Models and description techniques allowing
us to capture the initial specification as well as intermediate design information will
be presented in this chapter.
2.1 Requirements
Consistent with the simplified design flow (see Fig. 1.8), we will first of all describe
requirements and approaches for specifying embedded systems. Specifications for
embedded systems provide models of the system under design (SUD). Models can
be defined as follows:
Definition 2.1 (Jantsch [256]): “A model is a simplification of another entity, which
can be a physical thing or another model. The model contains exactly those char-
acteristics and properties of the modeled entity that are relevant for a given task. A
model is minimal with respect to a task if it does not contain any other characteristics
than those relevant for the task.”
Models are described in languages. Languages should be capable of representing
the following features1 :
• Hierarchy: Human beings are generally not capable of comprehending systems
containing many objects (states, components) having complex relations with each
other. The description of all real-life systems needs more objects than human beings
can understand. Hierarchy (in combination with abstraction) is a key mechanism
1 Information from the books of Burns et al. [81], Bergé et al. [542], and Gajski et al. [166] is used
in this list.
© Springer International Publishing AG 2018 27
P. Marwedel, Embedded System Design, Embedded Systems,
DOI 10.1007/978-3-319-56045-8_2
Another Random Scribd Document
with Unrelated Content
a rope dancer. To the Captain, Donnelly yielded
implicit obedience; but he would not be dictated to
by his equals—indeed, he was totally unmanageable.
Donnelly was extremely fond of a joke; and upon a
porter coming to him, soon after his arrival in
England, late one evening, at the Castle Tavern,
Holborn, informing Dan that his wife would be glad
to see him at the White Horse in Fetter Lane, as soon
as possible, Donnelly asked, with great eagerness,
“What sort of a woman she was?” The porter,
surprised at the singularity of such a question,
enquired, “What, sir, don’t you know your own
Wife?” The champion, smiling, replied, “Is she a big
woman? Well, never mind; tell her I’ll come and look,
[25]
just to see if I know her.”
It should seem that Donnelly had a great aversion
to be looked upon as a prize-fighter. In the course of
two or three evenings after his battle with Oliver,
Dignam’s long room was crowded with his
countrymen, anxious to congratulate him on his
recent victory. Donnelly, who was dining with some
swells above stairs, was informed of the
circumstance, and solicited to go down and to walk
through the room. To which Donnelly replied, “Sure,
now, do they take me for a baste, to be made a show
of? I’m no fighting man, and I won’t make a staring
stock of myself to plase anybody.” This was spoken
angrily, and it required the utmost persuasions of his
friend Dignam to induce him to comply with so
reasonable a request. Dan at length conceded, and
upon entering the room he was received with the
loudest cheers.
In short, poor Dan was a creature of the moment.
He was most excellent company, creating mirth and
laughter all around him. His sayings were droll in the
extreme, and his behaviour was always decorous.
Forethought was no ingredient in his composition;
“to-morrow,” with him, might or might not be
provided for: that never created any uneasiness in his
mind, and was left entirely to chance, or, as Dan
would express it, “Divil may care!” Such was the
character of Donnelly. He was an Irishman every
inch of him—generous, good-natured, and highly
grateful. As a pugilist, it is true, he did not raise
himself in the estimation of the English amateurs by
his battle with Oliver; nor did the Irish fancy in
London think so much of his capabilities as they had
anticipated; indeed, those gentlemen who came from
Ireland to witness the battle expressed themselves
surprised at the deficiency of boxing talent displayed
by their favourite. This, however, will astonish no one
who has perused the few preceding paragraphs of his
heedless conduct and neglect of training. He was
declared to be unlike the same man who defeated
Cooper. The fact is, that our Hibernian friends either
undervalue or thoughtlessly neglect those
precautions, without which strength, pluck, and skill
must succumb to more ordinary physical
qualifications, if backed by temperance. In fact, the
fight was won by Donnelly by his wrestling
superiority, rather than his hitting.
We now quit the living Sir Dan to note the public
and literary honours bestowed upon his decease.
Foremost amongst these comes Blackwood’s
Magazine, for May, 1820, wherein twenty closely
printed pages are devoted to a most amusing
collection of “solemn dirges,” letters of condolence,
lamentations, plaintive ballads, odes and songs, an
eloquent funeral oration, etc., and scraps of Hebrew,
Greek, and Latin poems in honour of the heroic
deceased. The scholar will be delighted, and the
general reader amused, by the genuine humour and
erudite pleasantry therein displayed. Our space
forbids us more than a selection of a few of these
serio-comic effusions of Christopher North and his
coadjutors.
“Recollections of Sir Daniel Donnelly, Knt., P.C.I.[26]
“A PLAINTIVE BALLAD.
“Ere long the Towdies deck the board with a cod’s head and
shoulders,
And the oyster sauce it surely was great joy to all beholders.
To George our king a jolly can of royal port is poured—
Our gracious king who knighted Dan with his own shining sword;
The next we sip with trembling lip—’tis of the claret clear—
To the hero dead that cup we shed, and mix it with a tear.
“’Tis now your servant’s turn to mix the nectar of the bowl;
Still on the ring our thoughts we fix, while round the goblets roll,
Great Jackson, Belcher, Scroggins, Gas, we celebrate in turns,
Each Christian, Jew, and Pagan, with the fancy’s flame that burns;
Carnegie’s finger on the board a mimic circle draws,
And, Egan-like, h’ expounds the rounds and pugilistic laws.
“Tune—‘Molly Astore.’
“We entered soft, for feelings sad were stirring in our breast,
To take our farewell of the lad who now was gone to rest;
We took a drop of Dan’s potheen,[28] and joined the piteous roar;
Oh, where shall be his fellow seen, since Daniel is no more?
“His was the fist, whose weighty dint did Oliver defeat,
His was the fist that gave the hint it need not oft repeat.
His was the fist that overthrew his rivals o’er and o’er;
But now we cry, in phillalu, ‘Sir Daniel is no more!’
“EPITAPH.
.tb
The Funeral.
On Sunday, February 27, 1820, the remains of this
celebrated character were borne, with all due pomp
and solemnity, from his family residence in Greek
Street to the last asylum at Bully’s Acre, where his
ancestors lie quietly inurned. An immense concourse,
some in carriages and some on horseback, moving in
slow and measured pace, formed part of the
procession. There was a strong muster of the fancy.
The gloves were carried on a cushion in front of the
hearse, from which the horses had been unyoked by
the crowd, and multitudes contended for the honour
of assisting in drawing it. The procession took its
route through the leading streets of the city, and the
numbers, as it passed, increased until the body of the
champion was lodged in its last resting-place. It is for
posterity to do justice to the prowess of Sir Daniel
Donnelly. Not the least remarkable feature in his
eventful history is, that he was the last person who
received the honour of knighthood during the
regency: there might have been, and probably were,
worse men among those who received that honour
before him. Although last, he did not deserve to be
held as least, among the knights of our day.
“What dire misfortune has our land o’erspread?
Our Irish Champion’s numbered with the dead;
And he who never did to mortal bend,
By Death’s cut short, and Ireland’s lost her friend.
Ah! cruel Death, why were you so unkind,
To take Sir Dan, and leave such trash behind
As Gregson, Cooper, Carter—such a clan
To leave behind, and take so great a man?
Oh! Erin’s daughters, come and shed your tears
On your bold Champion’s grave, whose shortened years
Have made Erin’s sons this day a day of sorrow—
Who have we now that will defend our Curragh?”
THE FIGHT.
Round 1.—On setting-to, Carter had scarcely placed himself in a
fighting position when, with much dexterity, he gave Stephenson a
desperate nobber. The man of colour seemed rather surprised at this
sudden attack, but he bored his way into a sharp rally. The pink first
appeared on Carter’s face. The latter, in closing, fibbed Stephenson,
but he was undermost when down. (Seven to four against the Black.)
2.—Carter again commenced offensive operations with his left
hand, and the Black’s head was completely open to him. Some blows
were exchanged, and, in closing, Carter found his way to the ground.
3.—It was evident the man of colour was the strongest, and that
Carter might have come into the ring better prepared for action.
Stephenson endeavoured to put in some heavy blows, but the science
of Carter was too much for him. The latter hit and got away in good
style; but, in a sharp rally, the Black showed tolerable resolution. In
struggling to obtain the throw, both went down.
4.—Carter showed bad condition, and was much in want of wind;
but Stephenson did not appear to avail himself of this opportunity of
turning it to account. Carter, with great dexterity, not only nobbed
his opponent successfully with his left hand, without experiencing
any return, but made use of his right better than usual. The Black,
however, in closing, endeavoured to fib his adversary; but Carter
extricated himself with much adroitness, and went down. (Two to
one was now offered on Carter with great confidence.)
5.—Stephenson did not appear eager to commence the attack, and
some little sparring was also necessary, that Carter might recover his
wind. The Black knew more about receiving than any other part of
the science, and Carter milled him on the retreat with great sang
froid. Stephenson, rather passionate from this sort of treatment,
endeavoured to bore in upon his adversary, but Carter stopped short
upon him, and, measuring his distance well, the man of colour
measured his length on the grass in a twinkling.
6.—The strength of the Black at times gave him rather the
advantage, and, in finishing this round, Carter was thrown. (Seven to
two on the latter, but no takers.)
7.—Stephenson seemed almost tired of the battle, and got down in
the best manner he was able. (Any odds upon Carter.)
8.—Stephenson readied the scratch greatly distressed, and Carter
sent him down from a slight touch.
9.—The left hand of Carter was again in motion, but Stephenson
caught hold of it, and the word “stop,” it was understood, had
escaped from his lips. Carter instantly made his exit from the ring,
and upon his seconds preparing to follow him, Stephenson insisted it
was a mistake, and that he was determined to continue the contest.
Nearly half an hour had now elapsed, and Carter immediately
resumed offensive operations.
10.—Carter, somewhat angry at this disappointment, went to work
in sharp style, and the Black again felt the severity of his left hand. In
closing, both went down.
It would be superfluous to detail the succeeding rounds of this
battle. It was perfectly ridiculous on the part of Stephenson to
resume the fight, as not the slightest chance appeared to turn it to his
account. At the expiration of forty-four minutes, victory was declared
in favour of Carter. From the well-known science of the latter, it was
expected that he would have been able to dispose of Stephenson in
much less time; but Carter, it seemed, looked upon the event so
certain as to be indifferent respecting his appearance in the ring in
good condition. Stephenson had merely to boast of strength; in other
respects he was little better than a novice.
THE FIGHT.
Round 1.—Carter had scarcely set-to, when he gave Blacky a severe
facer with his left hand, and quick as lightning put in two more
tremendous hits upon the same cheek, and got away with much
dexterity before the man of colour was able to return. The Black, in
closing, got somewhat fibbed, and went down. (Seven to four
generally was offered, but no takers appeared. Two to one in many
places.)
2.—The Black’s nob was completely at Carter’s service, and the
latter put in five tremendous facers again with his left hand. The
Black, notwithstanding, bored in and got Carter against the ropes,
but did no execution, when, after an awkward struggle in a close,
Carter went down. (It was now ten to two against the man of colour.)
3.—The Black, at this early stage of the fight, seemed not only
damaged, but rather shy, and he sparred cautiously to recover his
wind. Carter again made the same successful use of his left hand, by
planting three more hits upon the old place. A short rally took place,
in which Blacky endeavoured to make a change in the appearance of
things, but without effect, and he ultimately went down. The
superiority of Carter appeared manifest in every round. In fact, the
Black was dead beat, and when on his second’s knee called out for
“brandy.”
4.—Carter hit short, but the Black gained nothing by it. In closing,
the punishment which Carter served out to his opponent was
tremendous in the extreme; he held the Black up with one arm, and
with the other fibbed him so severely that he went down quite
exhausted. The Black’s consequence as a first-rate miller was all
gone. His fanciers now began to look rather blue, and found, too late,
that their judgment had proved erroneous.
5.—The distressed state of the Black was conspicuous to all parties,
and he left his second’s knee in a tottering state. He, however,
endeavoured to make the best of it, and attacked Carter rather
furiously, but the latter soon spoiled his intention, and again fibbed
him down. (Five pounds to five shillings.)
6.—Carter, full of gaiety, smiled at the impotent efforts of his
opponent, and punished him with the utmost sang froid. Blacky put
in a body blow, but received such a staggerer in return that he was
quite abroad, and at length went down.
7.—The left hand of Carter was again busy with the mug of his
antagonist. However, the Black endeavoured to make something like
a rally, but he displayed more of desperation than judgment, and
paid dearly for his temerity by again going down. This was the best
round in the fight.
8.—The nob of the Black, from the severe punishment he had
received, now assumed a terrific aspect, and in his endeavour to
plant a hit, Carter stopped it dexterously, and returned so severe a
facer that Blacky’s pimple appeared to go round upon his shoulders,
like the movement of a harlequin; he went reeling away like a
drunken man, and fell.
9.—The Black reluctantly appeared at the mark, when Carter, as
fresh as a daisy, added more dreadful left-handed hits to his already
disfigured nob. In closing, both down, but Blacky undermost.
10.—It was almost up with the man of colour; he made a running
hit and fell. Some disapprobation now manifested itself.
11.—The game of the Black, if he ever had any, was now all
exhausted, and he went down from a mere push. It was thought
rather currish.
12 and last.—The Black, in a state bordering on frenzy,
endeavoured to follow Carter, but the latter punished him at every
step, fibbed him terribly, and, in closing, both down, but Blacky
undermost. So complete a finish in seventeen minutes and a half was
scarcely to be expected, from the high milling qualities the Black was
said to possess; and even the most knowing upon the subject offered
to bet, previous to the fight, that it continued upwards of forty
minutes.
Remarks.—Blacky, from the above display, lost ground in the
opinion of the amateurs; his strength was more prominent than any
other pugilistic quality. He left the ring apparently much distressed
in body and mind from the punishment he had experienced. Carter
was in good condition and in high spirits, and disposed of his
opponent in first-rate style, and positively retired from the contest
without a scratch, excepting upon his back, which, it is said, occurred
either from a bite or a pinch given him by the man of colour. Carter
showed himself evidently improved as a scientific pugilist: there was
nothing hurried in his manner of attack; he viewed his antagonist
with much fortitude, and scarcely made a hit without doing material
execution. He adopted the milling on the retreat system, and hit and
got away with all the celerity of Richmond. Two Blacks he has thus
completely vanquished; and it is generally considered to the above
might be added a third(?). It must certainly be admitted that Carter
gained a step or two on the pugilistic roll of fame from the above
contest, and perhaps removed many doubts that hitherto existed
respecting his pretensions as a first-rate boxer. An opinion was now
entertained that he had only to look well to himself, and something
higher was still within his reach.
ebookball.com