779 research outputs found
Handling Overload Conditions in Real-Time Systems
This chapter deals with the problem of handling overload conditions, that is, those critical situations in which the computational demand requested by the application exceeds the processor capacity. If not properly handled, an overload can cause an abrupt performance degradation, or even a system crash. Therefore, a real-time system should be designed to anticipate and tolerate unexpected overload situations through specific kernel mechanisms
Ensuring the sustainability of real-time embedded system under both QoS and Energy Constraints
Nowadays, wireless sensor networks (WSNs) are more and more used in applications such as environment monitoring, healthcare monitoring, etc...The challenge in sensor networks is to ensure the sustainability of the system by guaranteeing the required performance level. However, with the limited capacity of finite power sources and the need of guaranteeing a long lifetime of those systems, it is suitable to use energy harvesting which allows to supply low-power electronic systems by converting ambient energy into electric power. Hence, our study is concerned with the problem of soft periodic and aperiodic tasks scheduling in sensor nodes powered by energy harvesters. In this paper, we address this issue by proposing three energy-aware schedulers, namely BG-Green-RTO, BG-Green-BWP and Green-AWP which aim to improve the responsiveness of aperiodic tasks while still guaranteeing the execution of periodic tasks considering their timing and energy constraints. Such algorithms allow to gracefully cope with processing overload and energy starvation. Moreover, a simulation study permits to show their performance
Stability and Performance Analysis of Control Systems Subject to Bursts of Deadline Misses
Control systems are by design robust to various disturbances, ranging from noise to unmodelled dynamics. Recent work on the weakly hard model - applied to controllers - has shown that control tasks can also be inherently robust to deadline misses. However, existing exact analyses are limited to the stability of the closed-loop system. In this paper we show that stability is important but cannot be the only factor to determine whether the behaviour of a system is acceptable also under deadline misses. We focus on systems that experience bursts of deadline misses and on their recovery to normal operation. We apply the resulting comprehensive analysis (that includes both stability and performance) to a Furuta pendulum, comparing simulated data and data obtained with the real plant. We further evaluate our analysis using a benchmark set composed of 133 systems, which is considered representative of industrial control plants. Our results show the handling of the control signal is an extremely important factor in the performance degradation that the controller experiences - a clear indication that only a stability test does not give enough indication about the robustness to deadline misses
Identifying Native Applications with High Assurance
The work described in this paper investigates the problem
of identifying and deterring stealthy malicious processes on
a host. We point out the lack of strong application iden-
tication in main stream operating systems. We solve the
application identication problem by proposing a novel iden-
tication model in which user-level applications are required
to present identication proofs at run time to be authenti-
cated by the kernel using an embedded secret key. The se-
cret key of an application is registered with a trusted kernel
using a key registrar and is used to uniquely authenticate
and authorize the application. We present a protocol for
secure authentication of applications. Additionally, we de-
velop a system call monitoring architecture that uses our
model to verify the identity of applications when making
critical system calls. Our system call monitoring can be
integrated with existing policy specication frameworks to
enforce application-level access rights. We implement and
evaluate a prototype of our monitoring architecture in Linux
as device drivers with nearly no modication of the ker-
nel. The results from our extensive performance evaluation
shows that our prototype incurs low overhead, indicating the
feasibility of our model
- …