EVALUATION OF COMMUNICATION INDUCED CHECKPOINTING IN RESOURCE CONSTRAINED EMBEDDED SYSTEMS

被引:0
|
作者
Sababha, Belal H. [1 ]
Rawashdeh, Osamah A. [1 ]
机构
[1] Oakland Univ, Dept Elect & Comp Engn, Rochester, MI 48309 USA
关键词
TIME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Reconfiguration-Based Fault-Tolerance is one approach for developing dependable safety-critical embedded applications. This approach, compared to traditional hardware and software redundancy, is a promising technique that may achieve the required dependability with a significant reduction in cost in terms of size, weight, price, and power consumption. Reconfiguration necessitates using proper checkpointing protocols to support state reservation and task migration. One of the most common approaches is to use Communication Induced Checkpointing (CIC) protocols, which are well developed and understood for large parallel and information systems, but not much has been done for resource limited embedded systems. This paper implements four common CIC protocols in a resource constrained distributed embedded system with a Controller Area Network (CAN) backbone. An example feedback control system implementation is used for a case study. The four implemented protocols are described and performances are contrasted. The paper compares the protocols in terms of network bandwidth consumptions, CPU usages, checkpointing times, and checkpoint sizes in additional to the traditional measures of forced to local checkpoint rations and total number of checkpoints.
引用
收藏
页码:39 / 45
页数:7
相关论文
共 50 条
  • [1] Translating Java']Java for Resource Constrained Embedded Systems
    Plumbridge, Gary
    Audsley, Neil
    2012 7TH INTERNATIONAL WORKSHOP ON RECONFIGURABLE AND COMMUNICATION-CENTRIC SYSTEMS-ON-CHIP (RECOSOC), 2012,
  • [2] A Neural Network Engine for Resource Constrained Embedded Systems
    Jelcicova, Zuzana
    Mardari, Adrian
    Andersson, Oskar
    Kasapaki, Evangelia
    Sparso, Jens
    2020 54TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2020, : 125 - 131
  • [3] A discrete-event systems approach to communication induced checkpointing
    Ricker, SL
    WODES'02: SIXTH INTERNATIONAL WORKSHOP ON DISCRETE EVENT SYSTEMS, PROCEEDINGS, 2002, : 69 - 74
  • [4] A Scalable Communication-Induced Checkpointing Algorithm for Distributed Systems
    Simon, Alberto Calixto
    Hernandez, Saul E. Pomares
    Cruz, Jose Roberto Perez
    Gomez-Gil, Pilar
    Drira, Khalil
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (04) : 886 - 896
  • [5] Analysis of communication induced checkpointing
    Alvisi, Lorenzo
    Elnozahy, Elmootazbellah
    Rao, Sriram
    Husain, Syed Amir
    De Mel, Asanka
    Proceedings - Annual International Conference on Fault-Tolerant Computing, 1999, : 242 - 249
  • [6] An analysis of communication induced checkpointing
    Alvisi, L
    Elnozahy, E
    Rao, S
    Husain, SA
    De Mel, A
    TWENTY-NINTH ANNUAL INTERNATIONAL SYMPOSIUM ON FAULT-TOLERANT COMPUTING, DIGEST OF PAPERS, 1999, : 242 - 249
  • [7] Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems
    Tasopoulos, George
    Li, Jinhui
    Fournaris, Apostolos P.
    Zhao, Raymond K.
    Sakzad, Amin
    Steinfeld, Ron
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 432 - 451
  • [8] Predictive Resource Management in Energy-constrained Embedded Systems
    Crippa, Simone
    Massari, Giuseppe
    Reghenzani, Federico
    Zanella, Michele
    Fornaciari, William
    2020 23RD EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2020), 2020, : 159 - 166
  • [9] Communication protocol evaluation for embedded systems
    Tournier, JC
    Babau, JP
    2003 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2003, : 1006 - 1011
  • [10] An efficient communication induced rollforward checkpointing and recovery protocol for distributed systems
    Gu, MM
    Zeng, L
    Liang, ZH
    Gupta, B
    COMPUTERS AND THEIR APPLICATIONS, 2000, : 298 - 302