Consider the problem of scheduling sporadic message transmission requests with deadlines. For wired channels, this has been achieved successfully using the CAN bus. For wireless channels, researchers have recently pro...
详细信息
ISBN:
(纸本)0769526764
Consider the problem of scheduling sporadic message transmission requests with deadlines. For wired channels, this has been achieved successfully using the CAN bus. For wireless channels, researchers have recently proposed a similar solution;a collision-free medium access control (AMC) protocol that implements static-priority scheduling. Unfortunately no implementation has been reported, yet. We implement and evaluate it to find that the implementation indeed is collision-free and prioritized. this allows us to develop schedulability analysis for, the implementation. We measure the response times of messages in our implementation and find that our new response-time analysis indeed offers an upper bound on the response times. this enables a new class of wireless real-timesystems withtimeliness guarantees for sporadic messages and it opens-up a new research area: schedulability analysis for wireless networks.
In this paper, we present a model-driven approach to RTOS-based embedded software development and an automated tool that can produce RTOS-specific code. Our contributions are twofold. First, we defined generic RTOS AP...
详细信息
ISBN:
(纸本)0769526764
In this paper, we present a model-driven approach to RTOS-based embedded software development and an automated tool that can produce RTOS-specific code. Our contributions are twofold. First, we defined generic RTOS APIs (Application Programming Interfaces) that can capture most of typical RTOS services but are not bound to any specific RTOS. the generic RTOS APIs can be used as a means for describing application's RTOS-related behavior at an early design stage. We then developed an automated transformation tool that can generate functional code by transforming generic RTOS APIs into RTOS-specific APIs. Our tool, called TransPI, is able to produce 'C' code aimed at POSIX-compliant RTOSs, and is also configurable to target other RTOSs that do not conform to the POSLX standard.
Updating real-time system software is often needed in response to errors and added requirements to the software. Stopping a running application, updating the software, and then restarting the application is not suitab...
详细信息
ISBN:
(纸本)0769526764
Updating real-time system software is often needed in response to errors and added requirements to the software. Stopping a running application, updating the software, and then restarting the application is not suitable for systems with high availability requirements. On the other hand, dynamically updating a system may increase the execution time of the tasks, thus, degrading the performance of the system. Degradation is not acceptable for performance critical real-timesystems as there are strict requirements on the performance. In this paper we present an approach that enables dynamic reconfiguration of a real-time system, where the performance of the system during a reconfiguration satisfies a given worst-case performance specification. Evaluation shows that the presented method is efficient in guaranteeing the worst-case performance of dynamically reconfigurable firm real-timesystems.
High-energy physics experiments require an extraordinary amount of real-time computation, and the computers implementing the online data processing must be very reliable because of the large cost associated with opera...
详细信息
High-energy physics experiments require an extraordinary amount of real-time computation, and the computers implementing the online data processing must be very reliable because of the large cost associated with operating the facilities and the potential for loss of irreplaceable data. Conventional redundancy-based fault tolerance and adaptive approaches are not appropriate because of the tremendous system cost (fault tolerance is limited to a maximum of 10% overhead). In this work, we developed a framework for building robust embeddedsystems, which utilizes an autonomic reflex-healing approach to achieve fault tolerance. Components of the framework implement user-defined failure adaptation strategies within the context of a large-scale embedded environment. the tools embrace a model-based approach combining design specification and code-generation for both simulation and system implementation. In this paper we present the concepts and entities of the reflex and healing framework.
real-time logic (RTL) is useful for the verification of a safety assertion SA with respect to the specification SP of a real-time system. Since the satisfiability problem for RTL is undecidable, there were many effort...
详细信息
ISBN:
(纸本)0769526764
real-time logic (RTL) is useful for the verification of a safety assertion SA with respect to the specification SP of a real-time system. Since the satisfiability problem for RTL is undecidable, there were many efforts to find proper heuristics for proving that SP -> SA holds. However, none of such heuristics necessarily finds an "optimal implication". After verifying SP -> SA and the system implementing SP is deployed, performance changes as a result of power-saving, faulty components, and cost-saving in the processing platform for the tasks specified in SP affect the computation times of the specified tasks. this leads to a different but related SP, which would violate the original SP -> SA theorem if SA remains the same. It is desirable, therefore, to determine an optimal SP withthe slowest possible computation times for its tasks such that the SA is still guaranteed. this is clearly a fundamental issue in the design and implementation of highly dependable real-time/embeddedsystems. this paper tackles this fundamental issue by describing a new method for relaxing SP and tightening SA such that SP -> SA is still a theorem. Experimental results show that less than 20% overhead of the running time of the algorithm for the verification of SP -> SA is needed to find an optimal theorem.
A real-time address tracer provides designers a real-time monitoring capability which is the kernel of a dynamic debugging system for any embedded system such as the ARM7TDMI. According to the localities of programs, ...
详细信息
ISBN:
(纸本)9781424403943
A real-time address tracer provides designers a real-time monitoring capability which is the kernel of a dynamic debugging system for any embedded system such as the ARM7TDMI. According to the localities of programs, in our previous version, we have provided an effective compression method, which usually uses only 8 to 32 entries (32 bits each entry) of table, a simple counter and low cost hardware instead of 0.5k to 4k entries of dictionary and window used by LZW-based compression methods. this new version adds a preprocessing and its corresponding post-procession steps such that the needed tracing memories can be further greatly decreased by shifting the on-line work loading to the preprocessing and post-processing. Comparing with other work on cost and compression ratio for several benchmarks, the average results of our system are also better than others.
As the increasing of system performance and computing power, embeddedsystems are more complicated and interactive. therefore, operating system (OS) plays a more important role in embeddedsystems to utilize various h...
详细信息
ISBN:
(纸本)0769526764
As the increasing of system performance and computing power, embeddedsystems are more complicated and interactive. therefore, operating system (OS) plays a more important role in embeddedsystems to utilize various hardware and software resources. However, no OS can meet all requirements of various embeddedsystems. Due to the advance of reconfigurable processors, system requirements can be more dynamic. embedded OS has becoming more critical in the development of embeddedsystems and thus there is a strong need of configurable embedded OS to better and faster build up the target system. In this paper, we propose a configurable OS, called COS, based on SOA (Service-Oriented Architecture) for embedded SoC (System on a Chip) systems to build an application specific OS according to the system requirements. COS can be easily configured to better utilize the resources of the target embedded platform and have better support to the embedded application. Moreover, the COS can easily extend new features or functionatities of other OSes and even be adapted to the designs of other OSes. We implement COS on an ARM platform to prove its configurability and also evaluate its overhead. We believe that COS can be configured to meet the various requirements in embedded SoC systems and help to speed up the embedded system development process.
A QoS adaptation to dynamically changing system conditions that takes into consideration the user's constraints on the stability of service provisioning is presented. the goal is to allow the system to make QoS ad...
详细信息
ISBN:
(纸本)0769526764
A QoS adaptation to dynamically changing system conditions that takes into consideration the user's constraints on the stability of service provisioning is presented. the goal is to allow the system to make QoS adaptation decisions in response to fluctuations in task traffic flow, under the control of the user We pay special attention to the case where monitoring the stability period and resource load variation of Service Level Agreements for different types of services is used to dynamically adapt future stability periods, according to a feedback control scheme. System's adaptation behaviour can be configured according to a desired confidence level on future resource usage. the viability of the proposed approach is validated by preliminary experiments.
Securing communication sessions between networked embeddedsystems is a major challenge that needs to be addressed as an increasing number of such systems become Internet-enabled. Securely and quickly establishing a s...
详细信息
ISBN:
(纸本)0769526764
Securing communication sessions between networked embeddedsystems is a major challenge that needs to be addressed as an increasing number of such systems become Internet-enabled. Securely and quickly establishing a session key between communicating nodes in a network requires authentication of node identities. In this paper, we propose a simple elliptic-curve based key negotiation protocol suitable for fully hardware implementation as a protocol on chip (PoC). the protocol uses the elliptic curve variants of boththe Diffie Hellmann exchange and the Digital Signature Algorithm. Timing results demonstrate that an end-to-end protocol run can be performed in as little as 28ms on a 25MHz clock, which is several times faster than previous microprocessor-based implementations of similar protocols. the results indicate that session keys can thereby have shorter lifetimes, since there is little computational overhead in re-generating them, thus enhancing overall security of the networked embeddedsystems.
real-time database system must meet time constraints in addition to the integrity constraints. Concurrency control is one of the main issues in the studies of real-time database systems. Traditional concurrency contro...
详细信息
暂无评论