In this paper we present a branch-and-bound (B&B) algorithm for combined task and message scheduling in distributed hard real-time systems. The algorithm finds an optimal schedule for a set of communicating tasks ...
详细信息
In this paper we present a branch-and-bound (B&B) algorithm for combined task and message scheduling in distributed hard real-time systems. The algorithm finds an optimal schedule for a set of communicating tasks with known arrival times, precedence constraints, and resource requirements in conjunction with the assignment and scheduling of intertask messages over communication links. The schedule is "optimal" in the sense of minimizing maximum task lateness under a heuristic message priority assignment found during the search. A robotics application is used to illustrate the utility and potential of the algorithm. Results of an extensive simulation study analyzing its performance are also presented.
Describes a domain modeling process and framework for use in lifecycle engineering of software to monitor and control agile machining equipment. The authors focus on an approach of defining initial requirements in a w...
详细信息
Describes a domain modeling process and framework for use in lifecycle engineering of software to monitor and control agile machining equipment. The authors focus on an approach of defining initial requirements in a way that facilitates evolution. The process has been used in an industrial case study.
Although the VMEbus has been widely used for real-time control systems, its real-time performance has not been evaluated thoroughly. This paper evaluates the latency of interprocessor communication in a VMEbus-based r...
详细信息
Although the VMEbus has been widely used for real-time control systems, its real-time performance has not been evaluated thoroughly. This paper evaluates the latency of interprocessor communication in a VMEbus-based real-time control system. To minimize communication latency, mixed priority/round-robin (MPR) bus arbitration is proposed and its performance is evaluated along with standard PRI and RRS arbitration. The latency is evaluated via computer simulations and experimental measurements using a high-resolution timing-measuring instrument that can be directly plugged into the VMEbus.
Ensuring that a distributed system with strict dependability constraints meets its prescribed specification is a growing challenge that confronts software developers and system engineers. This paper presents a techniq...
详细信息
Ensuring that a distributed system with strict dependability constraints meets its prescribed specification is a growing challenge that confronts software developers and system engineers. This paper presents a technique for probing and fault injection of fault-tolerant distributed protocols. The proposed technique, called script-driven probing and fault injection, can be used for studying the behavior of distributed systems and for detecting design and implementation errors of fault-tolerant protocols. The focus of this work is on fault injection techniques that can be used to demonstrate three aspects of a target protocol: i) detection of design or implementation errors, ii) identification of violations of protocol specifications, and iii) insight into design decisions made by the implementers. The emphasis of our approach is on experimental techniques intended to identify specific "problems" in a protocol or its implementation rather than the evaluation of system dependability through statistical metrics such as fault coverage. To demonstrate the capabilities of this technique, the paper describes a probing and fault injection tool, called the PFI tool (Probe/Fault Injection Tool), and a summary of several extensive experiments that studied the behavior of two protocols: the transmission control protocol (TCP) and a group membership protocol (GMP).
This paper discusses the need for and the use of a software architecture as an important means in the development of complex systems. We start out with a brief analysis of the term "complex" with regard to c...
详细信息
This paper discusses the need for and the use of a software architecture as an important means in the development of complex systems. We start out with a brief analysis of the term "complex" with regard to computerized systems. On this basis, we introduce software architectures as a means to cope with the software design aspect of system complexity. We then identify the architectural concepts that are necessary to capture a comprehensive, high level system design and discuss their characterizing properties. Finally, we propose a "construction-oriented" technique for architecture specification which is based on a generic set of architectural elements and is supported by a tool, d-ASPECT (domain Architecture Specification Tool), currently under development at NJIT.
The new generation of real-time systems are characterized by multiple, conflicting non-functional desiderata on goals. Furthermore, the systems exhibit very large size and complexity-in both application structures and...
The new generation of real-time systems are characterized by multiple, conflicting non-functional desiderata on goals. Furthermore, the systems exhibit very large size and complexity-in both application structures and underlying software and hardware platforms. We argue that current high-level real-time languages do not meet the challenge of these complex real-time systems and introduce a new language-CRL-that we claim does. Relevant real-time features of CRL are discussed and a summary is provided vis-ri-vis future features that would address non-functional goals other than timeliness. A current implementation status and how CRL fits into a rather ambitious environment for the construction of complex real-time systems (under construction in our real-timecomputing Lab at NJIT) are briefly presented.
Achieving fault-tolerance using a primary-backup approach involves overhead of recovery such as activating the backup and propagating execution states, which may affect the timeliness properties of real-time systems. ...
详细信息
Achieving fault-tolerance using a primary-backup approach involves overhead of recovery such as activating the backup and propagating execution states, which may affect the timeliness properties of real-time systems. We propose a semi-passive architecture for fault-tolerance and show that speculative execution can enhance overall performance and hence shorten the recovery time in the presence of failure. The compiler is used to detect speculative execution, to insert check-points and to construct the updated messages. Simulation results are reported to show the contribution of speculative execution under the proposed architecture.
The paper addresses the issue of guaranteeing the timely delivery of isochronous messages with hard deadlines in a distributed queue dual bus (DQDB) network. The authors propose a slot allocation scheme which can allo...
详细信息
The paper addresses the issue of guaranteeing the timely delivery of isochronous messages with hard deadlines in a distributed queue dual bus (DQDB) network. The authors propose a slot allocation scheme which can allocate bandwidth for a set of isochronous message streams and provide deterministic deadline guarantees. The allocation scheme is guaranteed to find a feasible slot allocation (in the sense that all messages can be transmitted in a timely manner) as long as the total message density is less than or equal to a certain threshold, where the total message density is defined as the summation (over all message streams) of the ratio of maximum message size to message deadline. The implementation of this scheme is simple and does not require any change of the current DQDB standard.
A complex application consists of a set of software modules, executed on a distributed system, guided by requirements imposed by the designer and the system. The real project at NJIT has been investigating the resourc...
详细信息
A complex application consists of a set of software modules, executed on a distributed system, guided by requirements imposed by the designer and the system. The real project at NJIT has been investigating the resource allocation problem for such a system. We give a classification of and syntax for constraints, provide a rule-based approach for constraint management, and discuss issues in generating implied constraints and consistency checking.
The switching scheme of a point-to-point network determines how packets flow through each node, and is a primary element in determining the network's performance. In this paper, we present and evaluate a new switc...
详细信息
The switching scheme of a point-to-point network determines how packets flow through each node, and is a primary element in determining the network's performance. In this paper, we present and evaluate a new switching scheme called hybrid switching. Hybrid switching dynamically combines both virtual cut-through and wormhole switching to provide higher achievable throughput than wormhole alone, while significantly reducing the buffer space required at intermediate nodes when compared to virtual cut-through. This scheme is motivated by a comparison of virtual cut-through and wormhole switching through cycle-level simulations, and then evaluated using the same methods. To show the feasibility of hybrid switching, as well as to provide a common base for simulating and implementing a variety of switching schemes, we have designed SPIDER, a communication adapter built around a custom ASIC, the Programmable Routing Controller (PRC).
暂无评论