exploring weakly hard paradigm for networked systems
play

Exploring Weakly-Hard Paradigm for Networked Systems C. Huang, K. - PowerPoint PPT Presentation

Exploring Weakly-Hard Paradigm for Networked Systems C. Huang, K. Wardega*, W. Li & Q. Zhu DETTION19 - Montreal, QC. Background The design of systems that work Timing and Failure 2 Hard Real-Time Model WCET Analysis Deadlines


  1. Exploring Weakly-Hard Paradigm for Networked Systems C. Huang, K. Wardega*, W. Li & Q. Zhu DETTION’19 - Montreal, QC.

  2. Background The design of systems that work Timing and Failure 2

  3. Hard Real-Time Model WCET Analysis Deadlines Scheduling Characterize the system. Plan everything. Give each task a deadline. How bad can it get, exactly? Power, resources, period. Can I even do this? Is it just hard? Or impossible? 3

  4. Firm/Sofu Real-Time Model pWCET* Analysis Distributions* Scheduling Characterize the system. Plan everything. Assign each task a distribution*. How bad can it get, probably*? Power, resources, period. Is this useful for my application? 4

  5. Timing Constraints vs Guarantees Hard Firm Soft 5

  6. Timing Constraints vs Guarantees Hard Firm Soft Trace guarantee Set of traces guarantee (deterministic) (probabilistic) 6

  7. Timing Constraints vs Guarantees Hard Firm Soft ? Trace guarantee Trace guarantee Set of traces guarantee (deterministic) (deterministic) (probabilistic) 7

  8. Can I get trace guarantees if computing WCETs is hard? How about introducing bounded non-determinism ? 8

  9. Meet Consecutive Meaning 1 ⟨ m,K ⟩ Meet at least m deadlines of every K 2 ⟪ m,K ⟫ Meet at least m consecutive deadlines in every K 3 ( m,K ) Miss no more than m deadlines of every K 4 Miss no more than m consecutive deadlines (( m,K )) in every K 9

  10. Meet Consecutive Meaning 1 ⟨ m,K ⟩ Meet at least m deadlines of every K 2 ⟪ m,K ⟫ Meet at least m consecutive deadlines in every K 3 ( m,K ) Miss no more than m deadlines of every K 4 Miss no more than m consecutive deadlines (( m,K )) in every K 10

  11. Weakly-Hard Real-Time Model “Analysis” “Deadlines” Scheduling Characterize the system. Give each task a deadline. Plan everything. pWCET or ( m,K )-type Deadline misses are bounded. Power, resources, period. constraints. Traded probabilities for Easier than analysis during bounded non-determinism. design of a Hard Real-Time Potentially higher System. performance! Still get trace guarantees! 11

  12. Applications of the Weakly-Hard Model Weakly-Hard Constraints Energy-Constrained RTS RT Linear Control Methodology introduced. Maximize performance within Reachability analysis via (Bernat, IEEE Trans. Comp.) energy limits under Weakly-Hard bounded time safety constraints. (AlEnawy, RTSS) verification. (Duggirala, RTSS) 2002 2008 2019 2001 2005 2015 Controller Area Networks Multimedia RT Nonlinear Control Weakly-Hard vs Scheduling for a multimedia Sufficient conditions for safety overly-pessimistic Hard service under overload analysis of weakly-hard control. real-time. (Broster, ECRTS) conditions. (Wu, UMEDIA) (Huang, HSCC) 12

  13. Applications of the Weakly-Hard Model Embedded Systems Weakly-Hard Constraints Energy-Constrained RTS RT Linear Control Methodology introduced. Maximize performance within Reachability analysis via (Bernat, IEEE Trans. Comp.) energy limits under Weakly-Hard bounded time safety constraints. (AlEnawy, RTSS) verification. (Duggirala, RTSS) 2002 2008 2019 2001 2005 2015 Controller Area Networks Multimedia RT Nonlinear Control Weakly-Hard vs Scheduling for a multimedia Sufficient conditions for safety overly-pessimistic Hard service under overload analysis of weakly-hard control. real-time. (Broster, ECRTS) conditions. (Wu, UMEDIA) (Huang, HSCC) 13

  14. Applications of the Weakly-Hard Model Not an Embedded System 20?? Networked systems Weakly-Hard Constraints Energy-Constrained RTS RT Linear Control Methodology introduced. Maximize performance within Reachability analysis via (Bernat, IEEE Trans. Comp.) energy limits under Weakly-Hard bounded time safety constraints. (AlEnawy, RTSS) verification. (Duggirala, RTSS) 2002 2008 2019 2001 2005 2015 Controller Area Networks Multimedia RT Nonlinear Control Weakly-Hard vs Scheduling for a multimedia Sufficient conditions for safety overly-pessimistic Hard service under overload analysis of weakly-hard control. real-time. (Broster, ECRTS) conditions. (Wu, UMEDIA) (Huang, HSCC) 14

  15. Mobile Cloud Cloud Robotics Connected Vehicles IoT Consensus Reliability QoS Control Reachability Flooding Stability 15

  16. WCET-based analysis of networked systems is likely impossible. 16

  17. Related Work (Ahrendts, ECRTS 2018) Permanent (Hao, HPSR 2004) node Scheduling failures Fault Weakly-Hard Tolerance Models Transient Control disturbances stability (Zhang, RTAS 2018) (Frehse, RTSS 2014) 17

  18. Network Flooding Florian Lindner Capturing Node or Link Failures Glossy Low-Power Wireless Bus (Ferrari, IPSN’11) 18

  19. Worst-case Flooding Latency round The flood is initialized by node #6 19

  20. Flooding Synchronous Weakly-Hard Specification Updates Constraints INIT, FLOOD EVOLVE, PERSIST ( m,K ) on every node Throw it to the SMT solver and iterate over the finite horizon 20

  21. Example: the EVOLVE Constraint Node i Node j Node i Node j Time t , i and j on, j has the packet Time t+1 , i and j on, i and j have the packet The EVOLVE constraint 21

  22. ∞ ∇ WCET < ∞ Worst-case latency increases as either m increases or K decreases 22

  23. The fraction of m over K is not what drives high worst-case latency (consecutive misses do). 23

  24. Richer Design Choices with Weakly-Hard Under a hard timing model Under a weakly-hard timing model Allowing bounded misses can enable shorter periods, potentially enabling faster runtimes and better performance 24

  25. V2V Networks Beyond single-vehicle autonomous driving à la VANET 25

  26. Emergency Vehicle Warning Intersection Management Jamming Spoofing Cooperative Adaptive Cruise Control ! Side Road Merging Sharp Curve Assistant 26

  27. Communication Disturbance in V2V Packet Delay & Loss Prior Work ● Communication delay ● Doesn’t consider packet loss ● Packet collision/loss ● Deadlock & unsafe situations Jamming/flooding attacks Liveness issues ● ● How should one measure the impact of disturbances? How should one derive the communication requirements? 27

  28. Cooperative Lane Changing Under Disturbance a. unsafe scenario under b. safe scenario under c. less safe than (b) d. less safe than (c) partial agreement global agreement but safer than (a) but safer than (a) (consensus) 28

  29. Impact of Disturbances on Lane Changing Performance degrades as disturbances cause increasing rates of partial consensus. 29

  30. A Weakly-Hard Model of V2V disturbances allows us to directly reason about safety and performance 30

  31. Research Directions Networked Systems through the lens of Weakly-Hard Models 31

  32. Stabilization Given any, even faulty, initial state, the system should reach a correct state. Reachability Packets of a given class should only reach the designated host. Consensus Leader selection in the presence of faulty nodes or links. Reliability Correctness should be tolerant to occasional link failures. QoS Bounded latency in packet routing. 32

  33. Thanks! 33

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend