779 research outputs found

    Handling Overload Conditions in Real-Time Systems

    Get PDF
    This chapter deals with the problem of handling overload conditions, that is, those critical situations in which the computational demand requested by the application exceeds the processor capacity. If not properly handled, an overload can cause an abrupt performance degradation, or even a system crash. Therefore, a real-time system should be designed to anticipate and tolerate unexpected overload situations through specific kernel mechanisms

    Ensuring the sustainability of real-time embedded system under both QoS and Energy Constraints

    Get PDF
    Nowadays, wireless sensor networks (WSNs) are more and more used in applications such as environment monitoring, healthcare monitoring, etc...The challenge in sensor networks is to ensure the sustainability of the system by guaranteeing the required performance level. However, with the limited capacity of finite power sources and the need of guaranteeing a long lifetime of those systems, it is suitable to use energy harvesting which allows to supply low-power electronic systems by converting ambient energy into electric power. Hence, our study is concerned with the problem of soft periodic and aperiodic tasks scheduling in sensor nodes powered by energy harvesters. In this paper, we address this issue by proposing three energy-aware schedulers, namely BG-Green-RTO, BG-Green-BWP and Green-AWP which aim to improve the responsiveness of aperiodic tasks while still guaranteeing the execution of periodic tasks considering their timing and energy constraints. Such algorithms allow to gracefully cope with processing overload and energy starvation. Moreover, a simulation study permits to show their performance

    Stability and Performance Analysis of Control Systems Subject to Bursts of Deadline Misses

    Get PDF
    Control systems are by design robust to various disturbances, ranging from noise to unmodelled dynamics. Recent work on the weakly hard model - applied to controllers - has shown that control tasks can also be inherently robust to deadline misses. However, existing exact analyses are limited to the stability of the closed-loop system. In this paper we show that stability is important but cannot be the only factor to determine whether the behaviour of a system is acceptable also under deadline misses. We focus on systems that experience bursts of deadline misses and on their recovery to normal operation. We apply the resulting comprehensive analysis (that includes both stability and performance) to a Furuta pendulum, comparing simulated data and data obtained with the real plant. We further evaluate our analysis using a benchmark set composed of 133 systems, which is considered representative of industrial control plants. Our results show the handling of the control signal is an extremely important factor in the performance degradation that the controller experiences - a clear indication that only a stability test does not give enough indication about the robustness to deadline misses

    Identifying Native Applications with High Assurance

    Get PDF
    The work described in this paper investigates the problem of identifying and deterring stealthy malicious processes on a host. We point out the lack of strong application iden- tication in main stream operating systems. We solve the application identication problem by proposing a novel iden- tication model in which user-level applications are required to present identication proofs at run time to be authenti- cated by the kernel using an embedded secret key. The se- cret key of an application is registered with a trusted kernel using a key registrar and is used to uniquely authenticate and authorize the application. We present a protocol for secure authentication of applications. Additionally, we de- velop a system call monitoring architecture that uses our model to verify the identity of applications when making critical system calls. Our system call monitoring can be integrated with existing policy specication frameworks to enforce application-level access rights. We implement and evaluate a prototype of our monitoring architecture in Linux as device drivers with nearly no modication of the ker- nel. The results from our extensive performance evaluation shows that our prototype incurs low overhead, indicating the feasibility of our model
    corecore