首页 > 最新文献

SIGBED Rev.最新文献

英文 中文
Size-based queuing: an approach to improve bandwidth utilization in TSN networks 基于大小的排队:一种提高TSN网络带宽利用率的方法
Pub Date : 2019-02-20 DOI: 10.1145/3314206.3314207
Florian Heilmann, G. Fohler
Ethernet has become one of the most researched network technologies for modern, safety-critical, distributed systems due to its maturity and low cost. Standard Ethernet, however, is unsuitable for safety-critical applications due to its lack of delivery guarantees and lack of delay bounds. The Time-Sensitive Networking (TSN) task group proposes several extensions to Standard Ethernet to address these shortcomings. One of the proposed extensions is the Time-Aware Shaper (TAS, IEEE 802.1Qbv-2015) which introduces a gate mechanism that enables scheduled transmissions and minimal jitter for high-priority messages. In order to achieve low jitter for these messages, guard bands are inserted into the schedule of the other traffic classes to ensure that the outgoing link is idle when the transmission of the high-priority message is scheduled to occur. This can result in wasted bandwidth. In this work, we propose Size-Based Queuing (SBQ) - an approach to improve bandwidth utilization in TSN networks that utilize TAS and guard bands. After a detailed description of SBQ, we provide a method to schedule an SBQ-enabled TSN network and conduct a qualitative analysis of the impact of SBQ on the transmission time of messages and the improvements on bandwidth utilization. We show that SBQ can reduce the amount of wasted bandwidth in a network, without impacting the transmission of high-priority messages or requiring extensive changes of the TSN network.
以太网由于其成熟和低成本,已成为现代分布式安全系统中研究最多的网络技术之一。然而,由于缺乏传输保证和延迟界限,标准以太网不适合安全关键应用。时间敏感网络(TSN)任务组提出了对标准以太网的几种扩展来解决这些缺点。其中一个被提议的扩展是时间感知Shaper (TAS, IEEE 802.1Qbv-2015),它引入了一种门机制,可以对高优先级消息进行计划传输和最小化抖动。为了实现这些消息的低抖动,在其他流类的调度中插入保护带,以确保高优先级消息的调度发生时,出链路处于空闲状态。这可能导致带宽浪费。在这项工作中,我们提出了基于大小的队列(SBQ) -一种在利用TAS和保护带的TSN网络中提高带宽利用率的方法。在详细描述SBQ之后,我们提供了一种调度启用SBQ的TSN网络的方法,并定性分析了SBQ对消息传输时间的影响以及对带宽利用率的改进。我们表明,SBQ可以减少网络中浪费的带宽,而不会影响高优先级消息的传输或需要对TSN网络进行大量更改。
{"title":"Size-based queuing: an approach to improve bandwidth utilization in TSN networks","authors":"Florian Heilmann, G. Fohler","doi":"10.1145/3314206.3314207","DOIUrl":"https://doi.org/10.1145/3314206.3314207","url":null,"abstract":"Ethernet has become one of the most researched network technologies for modern, safety-critical, distributed systems due to its maturity and low cost. Standard Ethernet, however, is unsuitable for safety-critical applications due to its lack of delivery guarantees and lack of delay bounds. The Time-Sensitive Networking (TSN) task group proposes several extensions to Standard Ethernet to address these shortcomings. One of the proposed extensions is the Time-Aware Shaper (TAS, IEEE 802.1Qbv-2015) which introduces a gate mechanism that enables scheduled transmissions and minimal jitter for high-priority messages. In order to achieve low jitter for these messages, guard bands are inserted into the schedule of the other traffic classes to ensure that the outgoing link is idle when the transmission of the high-priority message is scheduled to occur. This can result in wasted bandwidth.\u0000 In this work, we propose Size-Based Queuing (SBQ) - an approach to improve bandwidth utilization in TSN networks that utilize TAS and guard bands. After a detailed description of SBQ, we provide a method to schedule an SBQ-enabled TSN network and conduct a qualitative analysis of the impact of SBQ on the transmission time of messages and the improvements on bandwidth utilization. We show that SBQ can reduce the amount of wasted bandwidth in a network, without impacting the transmission of high-priority messages or requiring extensive changes of the TSN network.","PeriodicalId":447904,"journal":{"name":"SIGBED Rev.","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126614523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Heuristic list scheduler for time triggered traffic in time sensitive networks 时间敏感网络中时间触发流量的启发式列表调度
Pub Date : 2019-02-20 DOI: 10.1145/3314206.3314208
Maryam Pahlevan, Nadra Tabassam, R. Obermaisser
Time Sensitive Networks (TSN) are a novel technology that combines the larger bandwidth capabilities of Ethernet with determinism and fault tolerance for safety relevant real time systems. TSN offers bounded latency for the time triggered (TT) communication by transmitting messages according to a global schedule. Most of the scheduling algorithms in this context provide the solution only from the perspective of scheduling constraints and do not consider the impacts of routing on the scheduling problem. Therefore, these algorithms are not capable to provide effective results in the domain of many real time systems. To address interdependence of routing and scheduling constraints, we introduce a heuristic list scheduler (HLS). Our approach generates valid schedules using joint routing and scheduling constraints in one step. Due to this approach, ability to find feasible schedules is dramatically increased in comparison to the schedulers with fixed routing. In addition, HLS supports multi-cast communication, distributed real time applications and inter-flow dependencies. Experimental results shows the significant increase in the schedulability because of the task and message scheduling combined with routing.
时间敏感网络(TSN)是一种新颖的技术,它将以太网的更大带宽能力与安全相关实时系统的确定性和容错能力相结合。TSN通过根据全局调度传输消息,为时间触发(TT)通信提供有限的延迟。在这种情况下,大多数调度算法只从调度约束的角度提供解决方案,而没有考虑路由对调度问题的影响。因此,这些算法不能在许多实时系统中提供有效的结果。为了解决路由和调度约束的相互依赖性,我们引入了启发式列表调度程序(HLS)。我们的方法使用联合路由和调度约束在一个步骤中生成有效的调度。由于这种方法,与具有固定路由的调度程序相比,查找可行调度的能力大大提高了。此外,HLS支持多播通信、分布式实时应用和流间依赖。实验结果表明,将任务和消息调度与路由相结合,可以显著提高系统的可调度性。
{"title":"Heuristic list scheduler for time triggered traffic in time sensitive networks","authors":"Maryam Pahlevan, Nadra Tabassam, R. Obermaisser","doi":"10.1145/3314206.3314208","DOIUrl":"https://doi.org/10.1145/3314206.3314208","url":null,"abstract":"Time Sensitive Networks (TSN) are a novel technology that combines the larger bandwidth capabilities of Ethernet with determinism and fault tolerance for safety relevant real time systems. TSN offers bounded latency for the time triggered (TT) communication by transmitting messages according to a global schedule. Most of the scheduling algorithms in this context provide the solution only from the perspective of scheduling constraints and do not consider the impacts of routing on the scheduling problem. Therefore, these algorithms are not capable to provide effective results in the domain of many real time systems. To address interdependence of routing and scheduling constraints, we introduce a heuristic list scheduler (HLS). Our approach generates valid schedules using joint routing and scheduling constraints in one step. Due to this approach, ability to find feasible schedules is dramatically increased in comparison to the schedulers with fixed routing. In addition, HLS supports multi-cast communication, distributed real time applications and inter-flow dependencies. Experimental results shows the significant increase in the schedulability because of the task and message scheduling combined with routing.","PeriodicalId":447904,"journal":{"name":"SIGBED Rev.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123304390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
IoT boot integrity measuring and reporting 物联网启动完整性测量和报告
Pub Date : 2018-11-13 DOI: 10.1145/3292384.3292387
Tom Broström, John Zhu, R. Robucci, M. Younis
The current era can be characterized by the massive reliance on computing platforms in almost all domains, such as manufacturing, defense, healthcare, government. However, with the increased productivity, flexibility, and effectiveness that computers provide, comes the vulnerability to cyber-attacks where software, or even firmware, gets subtly modified by a hacker. The integration of a Trusted Platform Module (TPM) opts to tackle this issue by aiding in the detection of unauthorized modifications so that devices get remediation as needed. Nonetheless, the use of a TPM is impractical for resource-constrained devices due to power, space and cost limitations. With the recent proliferation of miniaturized devices along with the push towards the Internet-of Things (IoT) there is a need for a lightweight and practical alternative to the TPM. This paper proposes a cost-effective solution that incorporates modest amounts of integrated roots-of-trust logic and supports attestation of the integrity of the device's boot-up state. Our solution leverages crypto-acceleration modules found on many microprocessor and microcontroller based IoT devices nowadays, and introduces little additional overhead. The basic concepts have been validated through implementation on an SoC with an FPGA and a hard microcontroller. We report the validation results and highlight the involved tradeoffs.
当前时代的特点是几乎所有领域都大量依赖计算平台,例如制造业、国防、医疗保健和政府。然而,随着计算机提供的生产力、灵活性和效率的提高,网络攻击的脆弱性也随之而来,黑客可以对软件甚至固件进行微妙的修改。可信平台模块(Trusted Platform Module, TPM)的集成选择通过帮助检测未经授权的修改来解决此问题,以便根据需要对设备进行修复。尽管如此,由于电源、空间和成本的限制,对于资源受限的设备来说,使用TPM是不切实际的。随着最近小型化设备的激增以及向物联网(IoT)的推进,需要一种轻量级且实用的TPM替代品。本文提出了一种具有成本效益的解决方案,该解决方案包含适量的集成信任根逻辑,并支持对设备启动状态的完整性进行证明。我们的解决方案利用了当今许多基于微处理器和微控制器的物联网设备上的加密加速模块,并且引入了很少的额外开销。通过在带有FPGA和硬微控制器的SoC上实现,验证了基本概念。我们报告验证结果并强调所涉及的权衡。
{"title":"IoT boot integrity measuring and reporting","authors":"Tom Broström, John Zhu, R. Robucci, M. Younis","doi":"10.1145/3292384.3292387","DOIUrl":"https://doi.org/10.1145/3292384.3292387","url":null,"abstract":"The current era can be characterized by the massive reliance on computing platforms in almost all domains, such as manufacturing, defense, healthcare, government. However, with the increased productivity, flexibility, and effectiveness that computers provide, comes the vulnerability to cyber-attacks where software, or even firmware, gets subtly modified by a hacker. The integration of a Trusted Platform Module (TPM) opts to tackle this issue by aiding in the detection of unauthorized modifications so that devices get remediation as needed. Nonetheless, the use of a TPM is impractical for resource-constrained devices due to power, space and cost limitations. With the recent proliferation of miniaturized devices along with the push towards the Internet-of Things (IoT) there is a need for a lightweight and practical alternative to the TPM. This paper proposes a cost-effective solution that incorporates modest amounts of integrated roots-of-trust logic and supports attestation of the integrity of the device's boot-up state. Our solution leverages crypto-acceleration modules found on many microprocessor and microcontroller based IoT devices nowadays, and introduces little additional overhead. The basic concepts have been validated through implementation on an SoC with an FPGA and a hard microcontroller. We report the validation results and highlight the involved tradeoffs.","PeriodicalId":447904,"journal":{"name":"SIGBED Rev.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115803328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A service-oriented middleware framework for manufacturing industry 4.0 面向服务的制造工业4.0中间件框架
Pub Date : 2018-11-13 DOI: 10.1145/3292384.3292389
J. Al-Jaroodi, N. Mohamed, I. Jawhar
The advantages of the Internet of things (IoT) initiated the vision of Industry 4.0 in Europe and smart manufacturing in USA. Both visions aim to implement the smart factory to achieve similar objectives by utilizing new technologies. These technologies include cloud computing, fog computing, cyber-physical systems (CPS), and data analytics. Together they help automate and autonomize the manufacturing processes and controls to optimize the productivity, reliability, quality, cost-effeteness, and safety of these processes. While both visions are promising, developing and operating Industry 4.0 applications are extremely challenging. This is due to the complexity of the manufacturing processes as well as their management, controls, and integration dynamics. This paper introduces Man4Ware, a service-oriented middleware for Industry 4.0. Man4Ware can help facilitate the development and operations of cloud and fog-integrated smart manufacturing applications. Man4Ware offers many advantages through service level interfaces to enable easy utilization of new technologies and integration of different services to relax many of the challenges facing the development and operations of such applications1.
物联网(IoT)的优势开启了欧洲工业4.0和美国智能制造的愿景。这两种愿景都旨在通过利用新技术实现智能工厂的类似目标。这些技术包括云计算、雾计算、网络物理系统(CPS)和数据分析。它们共同帮助自动化和自动化制造过程和控制,以优化这些过程的生产率、可靠性、质量、成本效益和安全性。虽然这两种愿景都很有希望,但开发和运营工业4.0应用程序极具挑战性。这是由于制造过程的复杂性以及它们的管理、控制和集成动态。本文介绍了面向工业4.0的面向服务的中间件——Man4Ware。Man4Ware可以帮助促进云和雾集成智能制造应用程序的开发和运营。Man4Ware通过服务级接口提供了许多优势,可以轻松地利用新技术和集成不同的服务,从而减轻此类应用程序开发和操作所面临的许多挑战1。
{"title":"A service-oriented middleware framework for manufacturing industry 4.0","authors":"J. Al-Jaroodi, N. Mohamed, I. Jawhar","doi":"10.1145/3292384.3292389","DOIUrl":"https://doi.org/10.1145/3292384.3292389","url":null,"abstract":"The advantages of the Internet of things (IoT) initiated the vision of Industry 4.0 in Europe and smart manufacturing in USA. Both visions aim to implement the smart factory to achieve similar objectives by utilizing new technologies. These technologies include cloud computing, fog computing, cyber-physical systems (CPS), and data analytics. Together they help automate and autonomize the manufacturing processes and controls to optimize the productivity, reliability, quality, cost-effeteness, and safety of these processes. While both visions are promising, developing and operating Industry 4.0 applications are extremely challenging. This is due to the complexity of the manufacturing processes as well as their management, controls, and integration dynamics. This paper introduces Man4Ware, a service-oriented middleware for Industry 4.0. Man4Ware can help facilitate the development and operations of cloud and fog-integrated smart manufacturing applications. Man4Ware offers many advantages through service level interfaces to enable easy utilization of new technologies and integration of different services to relax many of the challenges facing the development and operations of such applications1.","PeriodicalId":447904,"journal":{"name":"SIGBED Rev.","volume":"12 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120899046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Hybrid blockchain and pseudonymous authentication for secure and trusted IoT networks 用于安全可信的物联网网络的混合区块链和假名认证
Pub Date : 2018-11-13 DOI: 10.1145/3292384.3292388
Jollen Chen
This paper addresses the issue of secure and trusted Internet of Things (IoT) networks by adopting the emerging blockchain technologies. This paper proposes a new hybrid blockchain technology to address the trusted IoT issues such as trustless communications and decentralized applications. Besides, we also present that the pseudonymous authentication technique can use a puzzle-solving computation to enable trustless communications for the IoT and provide the capabilities of near real-time transactions. In our previous work, we presented a decentralized software framework for the IoT by using a p2p network and the concept of the blockchain. In this paper, we outline the core components of the hybrid blockchain and delve deeper the algorithms of the hybrid consensus to provide the capabilities for our hybrid blockchain technology.
本文通过采用新兴的区块链技术解决了安全可信的物联网(IoT)网络问题。本文提出了一种新的混合区块链技术来解决可信物联网问题,如无信任通信和分散应用。此外,我们还提出了假名认证技术可以使用解谜计算来实现物联网的无信任通信,并提供近实时交易的能力。在我们之前的工作中,我们通过使用p2p网络和区块链的概念为物联网提供了一个分散的软件框架。在本文中,我们概述了混合区块链的核心组件,并深入研究了混合共识的算法,为我们的混合区块链技术提供了功能。
{"title":"Hybrid blockchain and pseudonymous authentication for secure and trusted IoT networks","authors":"Jollen Chen","doi":"10.1145/3292384.3292388","DOIUrl":"https://doi.org/10.1145/3292384.3292388","url":null,"abstract":"This paper addresses the issue of secure and trusted Internet of Things (IoT) networks by adopting the emerging blockchain technologies. This paper proposes a new hybrid blockchain technology to address the trusted IoT issues such as trustless communications and decentralized applications. Besides, we also present that the pseudonymous authentication technique can use a puzzle-solving computation to enable trustless communications for the IoT and provide the capabilities of near real-time transactions. In our previous work, we presented a decentralized software framework for the IoT by using a p2p network and the concept of the blockchain. In this paper, we outline the core components of the hybrid blockchain and delve deeper the algorithms of the hybrid consensus to provide the capabilities for our hybrid blockchain technology.","PeriodicalId":447904,"journal":{"name":"SIGBED Rev.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114705223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Bounding execution resources for the task scheduling problem in cyber-physical systems 网络物理系统中任务调度问题的执行资源边界
Pub Date : 2018-08-20 DOI: 10.1145/3269482.3269486
V. Radulescu, S. Andrei, A. Cheng
In designing and analyzing real-time systems, the central problem resides in finding a feasible schedule for a given task set, if one exists. A lot of research effort has been carried out in approaching the various aspects of task scheduling. While most results have been achieved for preemptive scheduling, the non-preemptive case has still room for improvement, due to its complexity. In addition, the widespread usage of cyber-physical systems (CPS) is putting real-time scheduling in the position to deal with new challenges, as additional (and sometimes particular) requirements are raised by such systems. This paper, which continues the previous work of the authors, introduces a new lower bound on the number of processing units that allows a feasible schedule of a task set for both preemptive and non-preemptive scheduling. As a specific CPS issue, the necessity of moving the processing units in space, which incurs additional time requirements, is considered. The single-instance case is first discussed, then the results are extended to the periodic case.
在设计和分析实时系统时,中心问题在于为给定的任务集(如果存在的话)找到一个可行的调度。人们对任务调度的各个方面进行了大量的研究。虽然抢占调度已经取得了大部分成果,但非抢占调度由于其复杂性仍有改进的空间。此外,网络物理系统(CPS)的广泛使用使实时调度处于应对新挑战的位置,因为此类系统提出了额外(有时是特殊)要求。本文在继承前人工作的基础上,引入了一个新的处理单元数下界,使得任务集在抢占调度和非抢占调度中都具有可行的调度。作为一个特定的CPS问题,考虑了在空间中移动处理单元的必要性,这需要额外的时间要求。首先讨论了单实例情况,然后将结果推广到周期情况。
{"title":"Bounding execution resources for the task scheduling problem in cyber-physical systems","authors":"V. Radulescu, S. Andrei, A. Cheng","doi":"10.1145/3269482.3269486","DOIUrl":"https://doi.org/10.1145/3269482.3269486","url":null,"abstract":"In designing and analyzing real-time systems, the central problem resides in finding a feasible schedule for a given task set, if one exists. A lot of research effort has been carried out in approaching the various aspects of task scheduling. While most results have been achieved for preemptive scheduling, the non-preemptive case has still room for improvement, due to its complexity. In addition, the widespread usage of cyber-physical systems (CPS) is putting real-time scheduling in the position to deal with new challenges, as additional (and sometimes particular) requirements are raised by such systems.\u0000 This paper, which continues the previous work of the authors, introduces a new lower bound on the number of processing units that allows a feasible schedule of a task set for both preemptive and non-preemptive scheduling. As a specific CPS issue, the necessity of moving the processing units in space, which incurs additional time requirements, is considered. The single-instance case is first discussed, then the results are extended to the periodic case.","PeriodicalId":447904,"journal":{"name":"SIGBED Rev.","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123384571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P-FRP task scheduling with preemption threshold 带抢占阈值的P-FRP任务调度
Pub Date : 2018-08-20 DOI: 10.1145/3269482.3269485
Jian Lin, A. Cheng
Abort-and-Restart model is used in Priority-based Functional Reactive Programming in which higher priority tasks can preempt lower priority tasks and the lower priority tasks are aborted and restarted after the higher priority tasks have finished execution. This paper discusses a potential of improving schedulability in P-FRP systems by using preemption threshold that it allows a task to only disable preemption of tasks up to a specified threshold priority. Also, a sufficient schedulability test condition is studied in this paper for P-FRP tasks using preemption threshold, which is a critical problem to be solved in order to explore the potential benefit.
在基于优先级的功能响应式编程中使用了中止重启模型,高优先级的任务可以抢占低优先级的任务,在高优先级的任务完成执行后,低优先级的任务被中止并重新启动。本文讨论了通过使用抢占阈值来提高P-FRP系统可调度性的潜力,该阈值允许任务仅禁用高达指定阈值优先级的任务的抢占。此外,本文还研究了P-FRP任务的充分可调度性测试条件,这是探索P-FRP任务潜在效益需要解决的关键问题。
{"title":"P-FRP task scheduling with preemption threshold","authors":"Jian Lin, A. Cheng","doi":"10.1145/3269482.3269485","DOIUrl":"https://doi.org/10.1145/3269482.3269485","url":null,"abstract":"Abort-and-Restart model is used in Priority-based Functional Reactive Programming in which higher priority tasks can preempt lower priority tasks and the lower priority tasks are aborted and restarted after the higher priority tasks have finished execution. This paper discusses a potential of improving schedulability in P-FRP systems by using preemption threshold that it allows a task to only disable preemption of tasks up to a specified threshold priority. Also, a sufficient schedulability test condition is studied in this paper for P-FRP tasks using preemption threshold, which is a critical problem to be solved in order to explore the potential benefit.","PeriodicalId":447904,"journal":{"name":"SIGBED Rev.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122089425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application validation on RTDroid RTDroid上的应用程序验证
Pub Date : 2018-08-20 DOI: 10.1145/3269482.3269484
Yin Yan, Lukasz Ziarek
Android is becoming used more frequently in domains that expect some real-time guarantees. To facilitate the adoption of Android for programming real-time systems, this work presents a first effort to apply real-time scheduling theories to a real-time extension on Android, RTDroid. We integrate real-time properties specified in RT-Droid's application manifest with an existing real-time scheduling framework, Cheddar. We leverage Cheddar to perform schedulability analysis and feasibility tests, based on the properties of RTDroid application components specified in the application manifest. This paper details our integration process and reports our experience of validating real-time properties in a real-time application developed on RTDroid.
Android正越来越多地应用于那些需要实时保证的领域。为了促进Android在编程实时系统中的应用,本工作首次尝试将实时调度理论应用于Android的实时扩展RTDroid。我们将RT-Droid的应用程序清单中指定的实时属性与现有的实时调度框架Cheddar集成在一起。基于应用程序清单中指定的RTDroid应用程序组件的属性,我们利用Cheddar执行可调度性分析和可行性测试。本文详细介绍了我们的集成过程,并报告了我们在RTDroid上开发的实时应用程序中验证实时属性的经验。
{"title":"Application validation on RTDroid","authors":"Yin Yan, Lukasz Ziarek","doi":"10.1145/3269482.3269484","DOIUrl":"https://doi.org/10.1145/3269482.3269484","url":null,"abstract":"Android is becoming used more frequently in domains that expect some real-time guarantees. To facilitate the adoption of Android for programming real-time systems, this work presents a first effort to apply real-time scheduling theories to a real-time extension on Android, RTDroid. We integrate real-time properties specified in RT-Droid's application manifest with an existing real-time scheduling framework, Cheddar. We leverage Cheddar to perform schedulability analysis and feasibility tests, based on the properties of RTDroid application components specified in the application manifest. This paper details our integration process and reports our experience of validating real-time properties in a real-time application developed on RTDroid.","PeriodicalId":447904,"journal":{"name":"SIGBED Rev.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124983531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Game-theoretic network bandwidth distribution for self-adaptive cameras 自适应摄像机的博弈论网络带宽分配
Pub Date : 2018-08-15 DOI: 10.1145/3267419.3267424
Gautham Nayak Seetanadi, Luis Oliveira, L. Almeida, Karl-Erik Årzén, M. Maggio
Devices sharing a network compete for bandwidth, being able to transmit only a limited amount of data. This is for example the case with a network of cameras, that should record and transmit video streams to a monitor node for video surveillance. Adaptive cameras can reduce the quality of their video, thereby increasing the frame compression, to limit network congestion. In this paper, we exploit our experience with computing capacity allocation to design and implement a network bandwidth allocation strategy based on game theory, that accommodates multiple adaptive streams with convergence guarantees. We conduct some experiments with our implementation and discuss the results, together with some conclusions and future challenges.
共享网络的设备争夺带宽,只能传输有限数量的数据。例如,摄像机网络应该记录视频流并将其传输到监控节点以进行视频监控。自适应摄像机可以降低其视频质量,从而增加帧压缩,以限制网络拥塞。在本文中,我们利用我们在计算能力分配方面的经验,设计并实现了一种基于博弈论的网络带宽分配策略,该策略可以容纳多个具有收敛保证的自适应流。我们对我们的实现进行了一些实验,并讨论了结果,以及一些结论和未来的挑战。
{"title":"Game-theoretic network bandwidth distribution for self-adaptive cameras","authors":"Gautham Nayak Seetanadi, Luis Oliveira, L. Almeida, Karl-Erik Årzén, M. Maggio","doi":"10.1145/3267419.3267424","DOIUrl":"https://doi.org/10.1145/3267419.3267424","url":null,"abstract":"Devices sharing a network compete for bandwidth, being able to transmit only a limited amount of data. This is for example the case with a network of cameras, that should record and transmit video streams to a monitor node for video surveillance. Adaptive cameras can reduce the quality of their video, thereby increasing the frame compression, to limit network congestion. In this paper, we exploit our experience with computing capacity allocation to design and implement a network bandwidth allocation strategy based on game theory, that accommodates multiple adaptive streams with convergence guarantees. We conduct some experiments with our implementation and discuss the results, together with some conclusions and future challenges.","PeriodicalId":447904,"journal":{"name":"SIGBED Rev.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127874379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Constraint-aware software-defined network for routing real-time multimedia 用于路由实时多媒体的约束感知软件定义网络
Pub Date : 2018-08-15 DOI: 10.1145/3267419.3267425
Oluwaseyi Oginni, P. Bull, Yonghao Wang
Traditional Ethernet-based IP networks do not have the capability to provide the Quality of Service (QoS) required for professional real-time multimedia applications. This is because they operate on a best-effort network service model that does not provide service guarantee. Network operators and service providers require a novel network architecture to efficiently handle the increasing demands of this changing network domain. Software-Defined Networking has emerged as an effective network architecture that decouples the control plane and data plane, which makes it capable of handling the dynamic nature of future network functions and intelligent applications while reducing cost through simplified hardware, software, and management. This paper presents an SDN architecture for real-time low latency applications that offer adaptive path provisioning based on the calculated end-to-end delay, available bandwidth, and traditional shortest path first algorithm. The SDN architecture utilises the Ryu OpenFlow application programming interface (API) to perform real-time monitoring to collect network statistics and computes the appropriate paths by using this information. The experiment to ascertain the feasibility and evaluate the effectiveness of this approach is carried out in an emulated network environment using Mininet.
传统的基于以太网的IP网络无法提供专业实时多媒体应用所需的服务质量(QoS)。这是因为它们运行在尽力而为的网络服务模型上,而不提供服务保证。网络运营商和服务提供商需要一种新颖的网络架构来有效地应对不断变化的网络领域日益增长的需求。软件定义网络作为一种有效的网络架构已经出现,它将控制平面和数据平面解耦,使其能够处理未来网络功能和智能应用的动态特性,同时通过简化硬件、软件和管理来降低成本。本文提出了一种用于实时低延迟应用的SDN架构,该架构基于计算的端到端延迟、可用带宽和传统的最短路径优先算法提供自适应路径配置。SDN架构利用Ryu OpenFlow应用程序编程接口(API)进行实时监控,收集网络统计数据,并利用这些信息计算出合适的路径。利用Mininet在仿真网络环境中进行了实验,验证了该方法的可行性和有效性。
{"title":"Constraint-aware software-defined network for routing real-time multimedia","authors":"Oluwaseyi Oginni, P. Bull, Yonghao Wang","doi":"10.1145/3267419.3267425","DOIUrl":"https://doi.org/10.1145/3267419.3267425","url":null,"abstract":"Traditional Ethernet-based IP networks do not have the capability to provide the Quality of Service (QoS) required for professional real-time multimedia applications. This is because they operate on a best-effort network service model that does not provide service guarantee. Network operators and service providers require a novel network architecture to efficiently handle the increasing demands of this changing network domain. Software-Defined Networking has emerged as an effective network architecture that decouples the control plane and data plane, which makes it capable of handling the dynamic nature of future network functions and intelligent applications while reducing cost through simplified hardware, software, and management.\u0000 This paper presents an SDN architecture for real-time low latency applications that offer adaptive path provisioning based on the calculated end-to-end delay, available bandwidth, and traditional shortest path first algorithm. The SDN architecture utilises the Ryu OpenFlow application programming interface (API) to perform real-time monitoring to collect network statistics and computes the appropriate paths by using this information. The experiment to ascertain the feasibility and evaluate the effectiveness of this approach is carried out in an emulated network environment using Mininet.","PeriodicalId":447904,"journal":{"name":"SIGBED Rev.","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122210495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
SIGBED Rev.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1