EVALUATION OF COMMUNICATION INDUCED CHECKPOINTING IN RESOURCE CONSTRAINED EMBEDDED SYSTEMS

被引:0
作者
Sababha, Belal H. [1 ]
Rawashdeh, Osamah A. [1 ]
机构
[1] Oakland Univ, Dept Elect & Comp Engn, Rochester, MI 48309 USA
来源
PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2011, VOL 3, PTS A AND B | 2012年
关键词
TIME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Reconfiguration-Based Fault-Tolerance is one approach for developing dependable safety-critical embedded applications. This approach, compared to traditional hardware and software redundancy, is a promising technique that may achieve the required dependability with a significant reduction in cost in terms of size, weight, price, and power consumption. Reconfiguration necessitates using proper checkpointing protocols to support state reservation and task migration. One of the most common approaches is to use Communication Induced Checkpointing (CIC) protocols, which are well developed and understood for large parallel and information systems, but not much has been done for resource limited embedded systems. This paper implements four common CIC protocols in a resource constrained distributed embedded system with a Controller Area Network (CAN) backbone. An example feedback control system implementation is used for a case study. The four implemented protocols are described and performances are contrasted. The paper compares the protocols in terms of network bandwidth consumptions, CPU usages, checkpointing times, and checkpoint sizes in additional to the traditional measures of forced to local checkpoint rations and total number of checkpoints.
引用
收藏
页码:39 / 45
页数:7
相关论文
共 22 条
[1]  
Bartlett J. F., 1981, Operating Systems Review, V15, P22, DOI 10.1145/1067627.806587
[2]  
Briatico D., 1984, Proceedings of the Fourth Symposium on Reliability in Distributed Software and Database Systems (Cat. No. 84CH2082-6), P207
[3]   CORDS: Hardware-software co-synthesis of reconfigurable real-time distributed embedded systems [J].
Dick, RP ;
Jha, NK .
1998 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN: DIGEST OF TECHNICAL PAPERS, 1998, :62-68
[4]   A framework for run-time reconfigurable systems [J].
Eisenring, M ;
Platzner, M .
JOURNAL OF SUPERCOMPUTING, 2002, 21 (02) :145-159
[5]   A survey of rollback-recovery protocols in message-passing systems [J].
Elnozahy, EN ;
Alvisi, L ;
Wang, YM ;
Johnson, DB .
ACM COMPUTING SURVEYS, 2002, 34 (03) :375-408
[6]  
Feldmann R, 2003, LECT NOTES COMPUT SC, V2778, P478
[7]   Communication-based prevention of useless checkpoints in distributed computations [J].
Hélary, JM ;
Mostefaoui, A ;
Netzer, RHB ;
Raynal, M .
DISTRIBUTED COMPUTING, 2000, 13 (01) :29-43
[8]   Preventing useless checkpoints in distributed computations [J].
Helary, JM ;
Mostefaoui, A ;
Netzer, RHB ;
Raynal, M .
SIXTEENTH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1997, :183-190
[9]   TIME, CLOCKS, AND ORDERING OF EVENTS IN A DISTRIBUTED SYSTEM [J].
LAMPORT, L .
COMMUNICATIONS OF THE ACM, 1978, 21 (07) :558-565
[10]   Theoretical and Experimental Evaluation of Communication-Induced Checkpointing Protocols in FE Family [J].
Luo, Yi ;
Manivannan, D. .
2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, :217-224