Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Utility-Based Resource Overbooking for Cyber-Physical Systems

Published: 06 October 2014 Publication History

Abstract

Traditional hard real-time scheduling algorithms require the use of the worst-case execution times to guarantee that deadlines will be met. Unfortunately, many algorithms with parameters derived from sensing the physical world suffer large variations in execution time, leading to pessimistic overall utilization, such as visual recognition tasks. In this article, we present ZS-QRAM, a scheduling approach that enables the use of flexible execution times and application-derived utility to tasks in order to maximize total system utility. In particular, we provide a detailed description of the algorithm, the formal proofs for its temporal protection, and a detailed, evaluation. Our evaluation uses the Utility Degradation Resilience (UDR) showing that ZS-QRAM is able to obtain 4× as much UDR as ZSRM, a previous overbooking approach, and almost 2× as much UDR as Rate-Monotonic with Period Transformation (RM/TP). We then evaluate a Linux kernel module implementation of our scheduler on an Unmanned Air Vehicle (UAV) platform. We show that, by using our approach, we are able to keep the tasks that render the most utility by degrading lower-utility ones even in the presence of highly dynamic execution times.

References

[1]
S. Baruah, H. Li, and L. Stougie. 2010. Towards the design of certifiable mixed-criticality systems. In Proceedings of the IEEE Real-Time Technology and Applications Symposium (RTAS'10). 13--22.
[2]
S. Baruah and S. Vestal. 2008. Schedulability analysis of sporadic tasks with multiple criticality specifications. In Proceedings of the Euromicro Conference on Real-Time Systems (ECRTS'08). 147--155.
[3]
G. Buttazzo, G. Lipari, and L. Abeni. 1998. Elastic task model for adaptive rate control. In Proceedings of the IEEE 19th Real-Time Systems Symposium (RTSS'98). 286.
[4]
G. Buttazzo, M. Spuri, and F. Sensini. 1995. Value vs deadline scheduling in overload conditions. In Proceedings of the 16th IEEE Real-Time Systems Symposium (RTSS'95). 90.
[5]
S. Cho, S.-K. Lee, A. Han, and K.-J. Lin. 2002. Efficient real-time scheduling algorithms for multiprocessor systems. IEICE Trans. Comm. E85-B, 2859--2867.
[6]
M. Cirinei and T. Baker. 2007. EDZL scheduling analysis. In Proceedings of the Euromicro Conference on Real-Time Systems (ECRTS'08). 9--18.
[7]
D. De Niz, K. Lakshmanan, and R. Rajkumar. 2009. On the scheduling of mixed-criticality real-time task sets. In Proceedings of the 30th IEEE Real-Time Systems Symposium (RTSS'09). 291--300.
[8]
D. De Niz, L. Wrage, N. Storer, A. Rowe, and R. Rajkumar. 2012. On resource overbooking in an unmanned aerial vehicle. In Proceedings of the 3rd IEEE/ACM International Conference on Cyber-Physical Systems (ICCPS'12). 97--106.
[9]
DRONE-RK. 2013. Drone-rk. http://www.drone-rk.org/.
[10]
H.-M. Huan, C. Gill, and C. Lu. 2012. Implementation and evaluation of mixed-criticality scheduling approaches for periodic tasks. In Proceedings of the IEEE Real-Time Technology and Applications Symposium (RTAS'12). 22--32.
[11]
M. Joseph and P. Padya. 1986. Finding response times in a real-time system. The Comput. J. 29, 5, 390--395.
[12]
S. Kato, R. Rajkumar, and Y. Ishikawa. 2009. A loadable real-time scheduler suite for multicore platforms. http://ertl.jp/~shinpei/papers/techrep09.pdf.
[13]
K. Lakshmanan, D. De Niz, R. Rajkumar, and G. Moreno. 2010. Resource allocation in distributed mixed-criticality cyber-physical systems. In Proceedings of the 30th IEEE International Conference on Distributed Computing Systems (ICDCS'10). 169--178.
[14]
C. L. Liu and J. W. Layland. 1973. Scheduling algorithms for multiprogramming in a hard-real-time environment. J. ACM 20, 1, 46--61.
[15]
P. Mejia-Alvarez, R. Melhem, and D. Mosse. 2000. An incremental approach to scheduling during overloads in real-time systems. In Proceedings of the 21st IEEE Real-Time Systems Symposium (RTSS'00). 283--293.
[16]
S. Oikawa and R. Rajkumar. 1999. Portable rk: A portable resource kernel for guaranteed and enforced timing behavior. In Proceedings of the 5th IEEE Real-Time Technology and Applications Symposium (RTAS'99). 111.
[17]
Parrot. 2011. Parrot ar drone. http://ardrone.parrot.com/.
[18]
R. Rajkumar, C. Lee, J. Lehoczky, and D. Siewiorek. 1997. A resource allocation model for qos management. In Proceedings of the 18th IEEE Real-Time Systems Symposium (RTSS'97). 298.
[19]
C.-S. Shih, P. Ganti, and L. Sha. 2004. Schedulability and fairness for computation tasks in surveillance radar systems. In Proceedings of the 10th IEEE Real-Time Technology and Applications Symposium (RTAS'04).
[20]
S. Vestal. 2007. Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance. In Proceedings of the 28th IEEE International Real-Time Systems Symposium (RTSS'07). 239--243.
[21]
ZS-QRAM. 2013. ZS-QRAM documentation. http://andrew.cmu.edu/dionisio/projects.html.

Cited By

View all
  • (2018)Semi-Slack Scheduling Arbitrary Activation Patterns in Mixed-Criticality SystemsIEEE Access10.1109/ACCESS.2018.28797176(68507-68524)Online publication date: 2018
  • (2018)Rethink data dissemination in opportunistic mobile networks with mutually exclusive requirementJournal of Parallel and Distributed Computing10.1016/j.jpdc.2018.03.012119(50-63)Online publication date: Sep-2018
  • (2017)A Design That Incorporates Adaptive Reservation into Mixed-Criticality SystemsScientific Programming10.1155/2017/34036852017(4)Online publication date: 1-Feb-2017
  • Show More Cited By

Index Terms

  1. Utility-Based Resource Overbooking for Cyber-Physical Systems

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Embedded Computing Systems
      ACM Transactions on Embedded Computing Systems  Volume 13, Issue 5s
      Special Issue on Risk and Trust in Embedded Critical Systems, Special Issue on Real-Time, Embedded and Cyber-Physical Systems, Special Issue on Virtual Prototyping of Parallel and Embedded Systems (ViPES)
      November 2014
      501 pages
      ISSN:1539-9087
      EISSN:1558-3465
      DOI:10.1145/2660459
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 06 October 2014
      Accepted: 01 May 2014
      Received: 01 September 2013
      Published in TECS Volume 13, Issue 5s

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Real-time scheduling
      2. mixed-criticality systems
      3. quality of service
      4. unmanned aerial vehicles
      5. utility functions

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • Carnegie Mellon University
      • Department of Defense under contract no. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)Semi-Slack Scheduling Arbitrary Activation Patterns in Mixed-Criticality SystemsIEEE Access10.1109/ACCESS.2018.28797176(68507-68524)Online publication date: 2018
      • (2018)Rethink data dissemination in opportunistic mobile networks with mutually exclusive requirementJournal of Parallel and Distributed Computing10.1016/j.jpdc.2018.03.012119(50-63)Online publication date: Sep-2018
      • (2017)A Design That Incorporates Adaptive Reservation into Mixed-Criticality SystemsScientific Programming10.1155/2017/34036852017(4)Online publication date: 1-Feb-2017
      • (2017)Supporting low-latency, low-criticality tasks in a certified mixed-criticality OSProceedings of the 25th International Conference on Real-Time Networks and Systems10.1145/3139258.3139274(227-236)Online publication date: 4-Oct-2017
      • (2017)Cyber Physical System (CPS)-Based Industry 4.0: A SurveyJournal of Industrial Integration and Management10.1142/S242486221750014202:03(1750014)Online publication date: Sep-2017
      • (2016)Mutually Exclusive Data Dissemination in the Mobile Publish/Subscribe System2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)10.1109/MASS.2016.020(75-83)Online publication date: Oct-2016
      • (2015)Eliminating Inter-Domain Vulnerabilities in Cyber-Physical SystemsProceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy10.1145/2808705.2808714(11-22)Online publication date: 16-Oct-2015

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media