Chapter 12 — Error Budget & System Safeguards


I. One-Sentence Goal

Establish an end-to-end error model and protection framework for early objects from causation (seed/trigger) → growth (state) → radiation (L_nu/LC) → propagation (n_eff, segmentation, two forms) → observation (T_arr/Delta_T_arr/F_nu/LC). Provide both GUM and MC uncertainty propagation, two-form–specific errors, thin/thick switching tau_switch, interface energy closure and sidedness, differential out-of-band leakage, c_ref drift, coordinate/unit consistency, and auditable criteria for spectral and causation parameter ill-posedness and clamping/saturation—together with falsification lines.


II. Scope & Non-Goals

Covered: error stratification and sources; two-form GUM/MC propagation formulae; spectrum–arrival joint propagation; thin/thick consistency; safeguard checklist; energy closure and sidedness; differential OOB leakage; path discretization and quadrature error; c_ref calibration/drift; K-correction and luminosity distance; guardband and falsification; logging and interface anchors.
Not covered: re-derivation of Chs. 3–9; detailed instrument response; any propagation construct violating n_eff ≥ 1.


III. Minimal Terms & Symbols


IV. Error Stratification & Sources


V. GUM Uncertainty Propagation (Two-Form Arrival Time)


Constant pull-out (discrete approximation)

T_arr ≈ (1/c_ref) * ∑_{k=0}^{N-1} n_eff[k] • Δell[k]

Sensitivities:

∂T_arr/∂c_ref = − T_arr / c_ref

∂T_arr/∂n_eff[k] = Δell[k] / c_ref

∂T_arr/∂Δell[k] = n_eff[k] / c_ref

Combination:

u_c^2(T_arr) ≈ (∂T/∂c_ref)^2 u^2(c_ref)

+ ∑ ( (Δell[k]/c_ref)^2 u^2(n_eff[k]) )

+ ∑ ( (n_eff[k]/c_ref)^2 u^2(Δell[k]) )

+ 2∑∑ ρ_ij (∂T/∂q_i)(∂T/∂q_j) u(q_i) u(q_j)

with q_i ∈ { c_ref, n_eff[*], Δell[*] }. Report the correlation model ρ_ij.


General form (discrete approximation)

T_arr ≈ ∑ ( n_eff[k] / c_ref[k] ) • Δell[k]

Sensitivities:

∂T_arr/∂n_eff[k] = Δell[k] / c_ref[k]

∂T_arr/∂c_ref[k] = − n_eff[k] • Δell[k] / c_ref[k]^2

∂T_arr/∂Δell[k] = n_eff[k] / c_ref[k]

Model the spatio-temporal correlation of c_ref[k] (and its correlation with n_eff[k]) explicitly in V_ξ.


VI. Spectrum↔Arrival Joint Propagation (GUM View)

Observation model:

F_nu(f_obs) = L_nu(f_em)/(4π D_L^2) • K(z_obs), f_em = f_obs • (1+z_obs)

Illustrative first-order sensitivities:

∂F_nu/∂L_nu = [K / (4π D_L^2)], ∂F_nu/∂D_L = − 2 F_nu / D_L,

∂F_nu/∂z ≈ (∂K/∂z) • L_nu / (4π D_L^2)

Build a joint block covariance over {T_arr, F_nu, LC}, carrying cross-terms from θ_growth / params_sed / n_eff / c_ref for joint fitting and GUM composition of u_c.


VII. MC Propagation (Nonlinearity, Clamping & Events)

Use when: n_eff ∈ [1,n_max] clamping, discrete Delta_T_sigma triggers, interface type switching, significant c_ref(x,t,f) variation, or strongly nonlinear multi-path weights.
Flow:


VIII. Two-Form–Specific Error & Consistency


IX. Thin/Thick Switching Error & Safeguards


X. Differential & Out-of-Band Leakage

Same-path differential:

Delta_T_arr = (1/c_ref) ∫ ( n_path(f1) − n_path(f2) ) d ell (constant pull-out)

Delta_T_arr = ∫ ( ( n_path(f1) − n_path(f2) ) / c_ref ) d ell (general form)

Consistency: share the same { gamma[k], Δell[k] }, segmentation, and Delta_T_sigma settings across the two bands; fold OOB residuals into u_sys and record leakage ratio & alignment policy.


XI. Path Discretization, Quadrature & Interpolation


XII. c_ref Calibration & Drift Guard


XIII. K-Correction, Luminosity Distance & Spectral Errors


XIV. Clamping, Saturation & Nonlinearity


XV. Bias Detectors, Falsification Lines & Guardband


Detectors:

Falsification: meet any detector and rule out implementation/metrology error → register a falsification sample and enter Ch. 11 audit; three independent reproducible falsifications on the same dimension trigger P70-* and parameterization review.
Guardband: GB = k_guard • u_c; edge samples enter a review queue and receive MC re-checks.


XVI. Logging & Audit (Minimal Fields)


XVII. Interfaces & Implementation Binding (Aligned with Template; I70-* Safety Checks)

Constraints: enforce n_eff ≥ 1 and lower-bound auditing at ingress; differential reuse of identical path discretization and correction settings.


XVIII. Cross-References


XIX. Deliverables