2007
Authors
Pereira, N; Andersson, B; Tovar, E;
Publication
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Abstract
Wireless networks play an increasingly important role in application areas such as factory-floor automation, process control, and automotive electronics. In this paper, we address the problem of sharing a wireless channel among a set of sporadic message streams where a message stream issues transmission requests with real-time deadlines. For this problem, we propose a collision-free wireless medium access control (MAC) protocol, which implements static-priority scheduling and supports a large number of priority levels. The MAC protocol allows multiple masters and is fully distributed; it is an adaptation to a wireless channel of the dominance protocol used in the CAN bus, a proven communication technology for various industrial applications. However, unlike that protocol, our protocol does not require a node having the ability to receive an incoming bit from the channel while transmitting to the channel. The evaluation of the protocol with real embedded computing platforms is presented to show that the proposed protocol is in fact collision-free and prioritized. We measure the response times of our implementation and find that the response-time analysis developed for the protocol indeed offers an upper bound on the response times.
2009
Authors
Pereira, N; Andersson, B; Tovar, E; Carvalho, P;
Publication
2009 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS
Abstract
WiDom is a previously proposed prioritized medium access control protocol for wireless channels. We present a modification to this protocol in order to improve its reliability. This modification has similarities with cooperative relaying schemes, but, in our protocol, all nodes can relay a carrier wave. The preliminary evaluation shows that, under transmission errors, a significant reduction on the number of failed tournaments can be achieved.
2007
Authors
Pereira, N; Tovar, E; Andersson, B;
Publication
13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, Proceedings
Abstract
Consider a communication medium shared among a set of computer nodes;. these computer nodes issue messages that are requested to be transmitted and they must finish their transmission before their respective deadlines. TDMA/SS is, a protocol that solves this problem; it is a specific type of Time Division Multiple Access (TDMA) where. a computer node is allowed to skip its time slot and then this time slot can be used by another computer node.. We present an algorithm that computes exact queuing times for TDMA/SS in conjunction with Rate-Monotonic (RM) or Earliest-Deadline-First (EDF).
2009
Authors
Pereira, N; Gomes, R; Andersson, B; Tovar, E;
Publication
15TH IEEE REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATION SYMPOSIUM: RTAS 2009, PROCEEDINGS
Abstract
We focus on large-scale and dense deeply embedded systems where, due to the large amount of information generated by all nodes, even simple aggregate computations such as the minimum value (MIN) of the sensor readings become notoriously expensive to obtain. Recent research has exploited a dominance-based medium access control (MAC) protocol, the CAN bits, for computing aggregated quantities in wired systems. For example, MIN can be computed efficiently and an interpolation function which approximates sensor data in an. area can be obtained efficiently as well. Dominance-based MAC protocols have recently been proposed for wireless channels and these protocols can be expected to be used for achieving highly scalable aggregate computations in. wireless systems. But no experimental demonstration is currently available in the research literature. In this paper we demonstrate that highly scalable aggregate computations in wireless networks are possible. We do so by (i) building a new wireless hardware platform with appropriate characteristics for making dominance-based MAC protocols efficient, (ii) implementing dominance-based MAC protocols on this platform, (iii) implementing distributed algorithms for aggregate computations (MIN, MAX, Interpolation) using the new implementation of the dominance-based MAC protocol and (iv) performing experiments to prove that such highly scalable aggregate computations in wireless networks are possible.
2004
Authors
Pereira, N; Tovar, E; Pinho, LM;
Publication
IEEE COMPUTER SOCIETY'S 12TH ANNUAL INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATIONS SYSTEMS - PROCEEDINGS
Abstract
The continuous improvement of Ethernet technologies is boosting the eagerness of extending their use to also cover factory-floor distributed real time applications. Indeed, it is remarkable the considerable amount of research work that has been devoted to the timing analysis of Ethernet-based technologies in the past few years. It happens, however, that the majority of those works are restricted to the analysis of sub-sets of the overall computing and communication system, thus without addressing timeliness in a holistic fashion. To this end, in this paper we address an approach, based on simulation, aiming at extracting temporal properties of Commercial-Off-The-Shelf (COTS) Ethernet-based factory-floor distributed systems. This framework is being applied to a specific COTS technology, Ethernet/IP. In this paper, we reason about the modeling and simulation of Ethernet/IP-based systems, and on the use of statistical analysis techniques to provide useful results on timeliness.
2007
Authors
Andersson, B; Pereira, N; Tovar, E;
Publication
ETFA 2007: 12TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOLS 1-3
Abstract
Consider the problem of deciding whether a set of n sporadic message streams meet deadlines on a Controller Area Network (CAN) bits for a specified priority assignment. It is assumed that message streams have implicit deadlines and no release jitter. An algorithm to solve this problem is well known but unfortunately it time complexity is non-polynomial. We present an algorithm with polynomial time-complexity for computing an tipper bound on the response times. Clearly, if the tipper bound on the response time does not exceed the deadline then all deadlines are met. The pessimism of our approach is proven: if the upper bound of the response time exceeds the deadline then the response time exceeds the deadline as well for a CAN network with half the speed.
The access to the final selection minute is only available to applicants.
Please check the confirmation e-mail of your application to obtain the access code.