The search functionality is under construction.

Keyword Search Result

[Keyword] schedulability(9hit)

1-9hit
  • Incorporating Zero-Laxity Policy into Mixed-Criticality Multiprocessor Real-Time Systems

    Namyong JUNG  Hyeongboo BAEK  Donghyouk LIM  Jinkyu LEE  

     
    PAPER-Systems and Control

      Vol:
    E101-A No:11
      Page(s):
    1888-1899

    As real-time embedded systems are required to accommodate various tasks with different levels of criticality, scheduling algorithms for MC (Mixed-Criticality) systems have been widely studied in the real-time systems community. Most studies have focused on MC uniprocessor systems whereas there have been only a few studies to support MC multiprocessor systems. In particular, although the ZL (Zero-Laxity) policy has been known to an effective technique in improving the schedulability performance of base scheduling algorithms on SC (Single-Criticality) multiprocessor systems, the effectiveness of the ZL policy on MC multiprocessor systems has not been revealed to date. In this paper, we focus on realizing the potential of the ZL policy for MC multiprocessor systems, which is the first attempt. To this end, we design the ZL policy for MC multiprocessor systems, and apply the policy to EDF (Earliest Deadline First), yielding EDZL (Earliest Deadline first until Zero-Laxity) tailored for MC multiprocessor systems. Then, we develop a schedulability analysis for EDZL (as well as its base algorithm EDF) to support its timing guarantee. Our simulation results show a significant schedulability improvement of EDZL over EDF, demonstrating the effectiveness of the ZL policy for MC multiprocessor systems.

  • A Genetic Algorithm for Packing CAN FD Frame with Real-Time Constraints

    Shan DING  Gang ZENG  Ryo KURACHI  Ruifeng HUANG  

     
    PAPER-Software System

      Pubricized:
    2017/07/18
      Vol:
    E100-D No:10
      Page(s):
    2505-2514

    As a next-generation CAN (Controller Area Network), CAN FD (CAN with flexible data rate) has attracted much attention recently. However, how to use the improved bus bandwidth efficiently in CAN FD is still an issue. Contrasting with existing methods using greedy approximate algorithms, this paper proposes a genetic algorithm for CAN FD frame packing. It tries to minimize the bandwidth utilization by considering the different periods of signals when packing them in the same frame. Moreover, it also checks the schedulability of packed frames to guarantee the real-time constraints of each frame and proposed a merging algorithm to improve the schedulability for signal set with high bus load. Experimental results validate that the proposed algorithm can achieve significantly less bandwidth utilization and improved schedulability than existing methods for a given set of signals.

  • Incorporating Security Constraints into Mixed-Criticality Real-Time Scheduling

    Hyeongboo BAEK  Jinkyu LEE  

     
    PAPER-Software System

      Pubricized:
    2017/05/31
      Vol:
    E100-D No:9
      Page(s):
    2068-2080

    While conventional studies on real-time systems have mostly considered the real-time constraint of real-time systems only, recent research initiatives are trying to incorporate a security constraint into real-time scheduling due to the recognition that the violation of either of two constrains can cause catastrophic losses for humans, the system, and even environment. The focus of most studies, however, is the single-criticality systems, while the security of mixed-criticality systems has received scant attention, even though security is also a critical issue for the design of mixed-criticality systems. In this paper, we address the problem of the information leakage that arises from the shared resources that are used by tasks with different security-levels of mixed-criticality systems. We define a new concept of the security constraint employing a pre-flushing mechanism to cleanse the state of shared resources whenever there is a possibility of the information leakage regarding it. Then, we propose a new non-preemptive real-time scheduling algorithm and a schedulability analysis, which incorporate the security constraint for mixed-criticality systems. Our evaluation demonstrated that a large number of real-time tasks can be scheduled without a significant performance loss under a new security constraint.

  • Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems

    Hyeongboo BAEK  Jaewoo LEE  Yongjae LEE  Hyunsoo YOON  

     
    PAPER-Dependable Computing

      Pubricized:
    2016/04/22
      Vol:
    E99-D No:8
      Page(s):
    2121-2130

    Since many cyber-physical systems (CPSs) manipulate security-sensitive data, enhancing the quality of security in a CPS is a critical and challenging issue in CPS design. Although there has been a large body of research on securing general purpose PCs, directly applying such techniques to a CPS can compromise the real-time property of CPSs since the timely execution of tasks in a CPS typically relies on real-time scheduling. Recognizing this property, previous works have proposed approaches to add a security constraint to the real-time properties to cope with the information leakage problem that can arise between real-time tasks with different security levels. However, conventional works have mainly focused on non-preemptive scheduling and have suggested a very naive approach for preemptive scheduling, which shows limited analytical capability. In this paper, we present a new preemptive fixed-priority scheduling algorithm incorporating a security constraint, called lowest security-level first (LSF) and its strong schedulability analysis to reduce the potential of information leakage. Our simulation results show that LSF schedulability analysis outperforms state-of-the-art FP analysis when the security constraint has reasonable timing penalties.

  • Hierarchical System Schedulability Analysis Framework Using UPPAAL

    So Jin AHN  Dae Yon HWANG  Miyoung KANG  Jin-Young CHOI  

     
    LETTER-Software System

      Pubricized:
    2016/05/06
      Vol:
    E99-D No:8
      Page(s):
    2172-2176

    Analyzing the schedulability of hierarchical real-time systems is difficult because of the systems' complex behavior. It gets more complicated when shared resources or dependencies among tasks are included. This paper introduces a framework based on UPPAAL that can analyze the schedulability of hierarchical real-time systems.

  • Utilization-Aware Hybrid Beacon Scheduling in Cluster-Tree ZigBee Networks

    Junghee HAN  Jiyong HAN  Dongseup LEE  Changgun LEE  

     
    PAPER-Information Network

      Pubricized:
    2015/05/28
      Vol:
    E98-D No:9
      Page(s):
    1657-1666

    In this paper, we propose an utilization-aware hybrid beacon scheduling method for a large-scale IEEE 802.15.4 cluster-tree ZigBee network. The proposed method aims to enhance schedulability of a target network by better utilizing transmission medium, while avoiding inter-cluster collisions at the same time. To achieve this goal, the proposed scheduling method partially allows beacon overlaps, if appropriate. In particular, this paper answers for the following questions: 1) on which condition clusters can send overlapped beacons, 2) how to select clusters to overlap with minimizing utilization, and 3) how to adjust beacon parameters for grouped clusters. Also, we quantitatively evaluate the proposed method compared to previous works — i.e., non-beacon scheduling and a serialized beacon scheduling algorithm — from several aspects including total duty cycles, packet drop rate, and end-to-end delay.

  • Effective Scheduling Algorithms for I/O Blocking with a Multi-Frame Task Model

    Shan DING  Hiroyuki TOMIYAMA  Hiroaki TAKADA  

     
    PAPER-System Programs

      Vol:
    E92-D No:7
      Page(s):
    1412-1420

    A task that suspends itself to wait for an I/O completion or to wait for an event from another node in distributed environments is called an I/O blocking task. Conventional hard real-time scheduling theories use framework of rate monotonic analysis (RMA) to schedule such I/O blocking tasks. However, most of them are pessimistic. In this paper, we propose effective algorithms that can schedule a task set which has I/O blocking tasks under dynamic priority assignment. We present a new critical instant theorem for the multi-frame task set under dynamic priority assignment. The schedulability is analyzed under the new critical instant theorem. For the schedulability analysis, this paper presents saturation summation which is used to calculate the maximum interference function (MIF). With saturation summation, the schedulability of a task set having I/O blocking tasks can be analyzed more accurately. We propose an algorithm which is called Frame Laxity Monotonic Scheduling (FLMS). A genetic algorithm (GA) is also applied. From our experiments, we can conclude that FLMS can significantly reduce the calculation time, and GA can improve task schedulability ratio more than is possible with FLMS.

  • Schedulability Analysis of Periodic and Sporadic Tasks Using a Timed Discrete Event Model with Memorable Events

    Jung-Min YANG  Seong-Jin PARK  

     
    LETTER-Systems and Control

      Vol:
    E91-A No:10
      Page(s):
    3076-3079

    In a real-time system, when the execution of a task is preempted by another task, the interrupted task falls into a blocked state. Since its re-execution begins from the interrupted point generally, the task's timer containing the remaining time until its completion should be maintained in the blocked state. This is the reason for introducing the notion of memorable events in this paper. We present a new timed discrete event model (TDEM) that adds the memorable events to the TDEM framework of Brandin and Wonham (1994). Using supervisory control theory upon the proposed TDEM, we analyze the schedulability of preemptable periodic and sporadic tasks executing on a uniprocessor.

  • Real-Time Data Access on HSDPA for WCDMA

    Chiang-Shiang WAN  Wei-Kuan SHIH  Ruei-Chuan CHANG  

     
    PAPER-Wireless Communication Technology

      Vol:
    E87-B No:2
      Page(s):
    215-226

    This paper presents new High Speed Downlink Shared Channel (HS-DSCH) code management schemes on High Speed Downlink Packet Access (HSDPA) for IP-based multimedia provisioning. The proposed management schemes simplify HS-DSCH code allocation while simultaneously increasing HS-DSCH code utilization. Applying the code management schemes, furthermore, we implement two scheduling algorithms for real-time packets to guarantee the quality-of-service (QoS) requirement. The Real-Time Code Allocation (RTCA) algorithm applies the functionalities of the radio management framework to decide the admission for a new real-time service. Once a new real-time session is established, RTCA allocates HS-DSCH codes to that session such that all real-time packets in the session are scheduled before their related deadlines. Based on the RTCA algorithm, the Real-Time Code Sharing (RTCS) algorithm implements the Early-Deadline-First (EDF) scheme for the schedulability analysis, increasing the schedulable probability for the real-time sessions and thus to improve the utilization of HS-DSCH codes. Experimental results show that RTCS outperforms RTCA in terms of packet drop rates, HS-DSCH code blocking rates and the number of code-domain reassignments.