{"title":"Packet Reordering Analysis for LEO Satellite Networks","authors":"Guyin Wang, Junfeng Wang, Lu Liu, Guisheng Chen","doi":"10.1109/ICESS.2008.62","DOIUrl":"https://doi.org/10.1109/ICESS.2008.62","url":null,"abstract":"In this paper we study the influences of packet reordering on the throughput and link utilization in Low Earth Orbit (LEO) satellite networks. In the absence of any packet reordering, the throughput and link utilization remain high. Our results indicate that packet reordering combined with packet error can severely deteriorate the performance of transmission in LEO satellite networks, especially at very high levels of packet reordering. Meanwhile different reordering patterns have different influences on LEO satellite networks.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115431049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Schedulability Analysis for Fault-Tolerant Hard Real-Time Tasks with Arbitrary Large Deadlines","authors":"Li Jun, Wan-hua Cao","doi":"10.1109/ICESS.2008.71","DOIUrl":"https://doi.org/10.1109/ICESS.2008.71","url":null,"abstract":"Schedulability analysis based the worst-case response time is an important research issue in real-time systems. Due to the restriction that the traditional schedulability analysis for fault-tolerant real-time systems only considered that the deadline of each task must be no larger than its period, this paper extends the computation model that the deadline of each task can be longer than its period. Based on the worst-case response time schedulability analysis for fault-tolerant hard real-time task set, we present a fault-tolerant priority assignment algorithm for our proposed computation model. This algorithm can be useful, together with schedulability analysis, especially for the real-time communication systems and distribution systems.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114177675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Load-balanced Routing Consideration with Delay-based RREQ Scheme in Wireless Mesh Networks","authors":"Ching-Lung Chang, T. Lin","doi":"10.1109/ICESS.2008.92","DOIUrl":"https://doi.org/10.1109/ICESS.2008.92","url":null,"abstract":"The wireless mesh network (WMN) is a novel wireless network architecture that puts several wireless routers into wireless ad hoc networks for mobile nodes to access the Internet. Due to the similarity in network topology between WMN and the Mobile ad hoc network (MANET), the routing algorithm from MANET can be adopted to WMN. Traditionally, the routing algorithms in MANET choose the shortest route to build up the communication path; however, this manner may incur traffic unbalanced problems in the WMN. Those routing algorithm cannot fully utilize system capacity. In order to overcome this drawback, we propose a delay-based RREP routing named DRR to balance the traffic loading. The concept of DRR is to convert the factor of node load into the time. Once the intermediate node receives an RREQ packet, an internal extra delay proportional to the node loading is added before forwarding this RREQ packet. Using the DRR scheme, the first replied RREP packet stands for the optimal path that considers the metrics of path distance, path hop-count, intermediate node load, and neighboring node load. In this work, we also propose a new weight assignment scheme in which the node weights are proportional to the exponential of node loading. It is used to differentiate the node in different loads in order to arrive at load balanced routing. Simulation results reveal that the DRR can flexibly spread traffic among all nodes and that it extends the lifetime of an entire ad hoc network by fairly consuming each nodepsilas energy.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129628196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Event-driven Multi-threading Real-time Operating System Dedicated to Wireless Sensor Networks","authors":"Haiying Zhou, Feng Wu, K. Hou","doi":"10.1109/ICESS.2008.58","DOIUrl":"https://doi.org/10.1109/ICESS.2008.58","url":null,"abstract":"At present, the OSs (Operating system) employed for WSN (wireless sensor networks) are either satisfied with only one or two application classes or unsuitable for strict-constrained resources. In view of a variety of WSN applications, there is a need of developing a self-adaptable and self-configurable embedded real-time operating system (RTOS). This paper presents a resource-aware and low-power RTOS termed LIMOS. This kernel adopts a component-based three-level system architecture: action (system operation), thread (component) and event (container). In accordance, a predictable and deterministic two-level scheduling mechanism is proposed: 'non pre-emption priority based' high level scheduling for events and 'preemptive priority-based' low level scheduling for threads. Employing the concepts of LINDA language, LIMOS provides a simplified tuple space and a light IN/OUT system primitive-pair to achieve system communication and synchronization. LIMOS is capable of self-adapting to run on two operation modes: event-driven and multi-threading, with respect to the application diversity. The performance evaluation and comparison shows LIMOS has tiny resource consumption and is fit for the real-time applications. Currently LIMOS has been ported on several hardware platforms for different WSN applications.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128491620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ARMISS: An Instruction Set Simulator for the ARM Architecture","authors":"Mingsong Lv, Qingxu Deng, Nan Guan, Y. Xie, Ge Yu","doi":"10.1109/ICESS.2008.73","DOIUrl":"https://doi.org/10.1109/ICESS.2008.73","url":null,"abstract":"The development efficiency of embedded systems is highly pressured due to the pursuit of short time-to-market of embedded products. In traditional design flow, although software can be developed in parallel with the hardware platform, it can only be tested and verified after the platform is fabricated. ARMISS, an Instruction Set Simulator for the ARM architecture, is developed to enable early software testing and verification. The ARM instruction set, MMU and interrupt handling are emulated in this tool. An instruction caching technique is designed to accelerate the interpretation-based instruction emulation. ARMISS is implemented in the C programming language, thus is highly portable across varies host operating systems for embedded system design.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130401311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wugang Tian, M. Pan, F. Luo, Song Jianbin, Dixiang Chen
{"title":"An Embedded System for Borescope and Eddy Current Dual Nondestructive Testing Based on ARM Microcontroller","authors":"Wugang Tian, M. Pan, F. Luo, Song Jianbin, Dixiang Chen","doi":"10.1109/ICESS.2008.53","DOIUrl":"https://doi.org/10.1109/ICESS.2008.53","url":null,"abstract":"In this paper, based on ARM9 microcontroller S3C2440A and embedded operating system Windows CE, a new nondestructive system was established. The system uses borescope and eddy current testing dual techniques combined into a single probe, which takes advantage of borescope and eddy current testing. The system combines traditional nondestructive testing technology with some advanced technologies, such as digital signal processing, automatic testing and embedded system. The system has excellent characteristics of miniaturization, low power consumption, intelligence, etc. The hardware and software of the system are described. The system works successfully, the detection results are available. The system can meet the requirements of in situ nondestructive testing for equipments.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126977067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficiency of Scratch-Pad Memory at 65 nm and Below: An Empirical Study","authors":"Hideki Takase, H. Tomiyama, Gang Zeng, H. Takada","doi":"10.1109/ICESS.2008.60","DOIUrl":"https://doi.org/10.1109/ICESS.2008.60","url":null,"abstract":"A number of approaches have been proposed so far for reducing the energy consumption of embedded systems by using scratch-pad memory. However, most of previous work focused on dynamic energy reduction, and did not take enough consideration of the leakage energy in their evaluations. As the technology scales down to the deep submicron domain, the leakage energy in memory devices could contribute to a significant portion of the total energy consumption. Therefore, evaluation of energy consumption including the leakage energy is necessary. In this paper, we investigate the effectiveness of scratch-pad memory on energy reduction considering both the dynamic and leakage energy. The experiments are performed for 65 nm, 45 nm, and 32 nm technologies. The results demonstrate the effectiveness of scratch-pad memory in deep submicron technology. It is also observed that the leakage energy becomes less significant along with the technology scaling.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"120 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114219461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating the Emulational Device Model in Virtualization System","authors":"Xinmei Huang, L. Hang","doi":"10.1109/ICESS.2008.68","DOIUrl":"https://doi.org/10.1109/ICESS.2008.68","url":null,"abstract":"Suffering from the low performance, conventional emulational device model is the bottle-neck of the whole virtual machine system. Utilizing memory virtualizating technology, a novel virtual device acceleration solution with high performance is presented and implemented by the video device accelerating solution on Xen, which is an open-source project. A test result generated by the specific the benchmark \"vConsolidate\" indicates that this solution can significantly improve the system performance and scalability as well as ease the I/O bottle-neck.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124123450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Notice of Violation of IEEE Publication PrinciplesExploring Fault-tolerant Distributed Storage System using GE code","authors":"Zheng Chen, Xiaojing Wang, Yili Jin, Honglei Zhou","doi":"10.1109/ICESS.2008.12","DOIUrl":"https://doi.org/10.1109/ICESS.2008.12","url":null,"abstract":"On the basis of introducing GE code, we explore the feasibility of implementing a reliable distributed storage system, with high performance and low spending, which is very suitable for embedded systems. Files are distributed across storage nodes using erasure coding with GE code which provides high-reliability with small storage and performance overhead. We present efficient measurements done on a series of prototype systems, and the tests results corroborate our expectation.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"356 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125642156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Matrix Key Pre-distribution Scheme for Wireless Sensor Networks","authors":"N. Chen, Jian-bo Yao, Guang-jun Wen","doi":"10.1109/ICESS.2008.44","DOIUrl":"https://doi.org/10.1109/ICESS.2008.44","url":null,"abstract":"Wireless sensor networks are widely applied in various applications. But due to the resource-constrained sensor nodes and the malicious attacks, the traditional key management schemes are not suitable for the network. Based on the particularities, many relevant key management schemes are developed for wireless sensor networks. This paper proposes an improved matrix key-distribution scheme for wireless sensor networks. This scheme can delete and update key information with the network topology changes to avoid key information to be revealed. Also, base on the clustered structure, this scheme can reduce communication, computation and key storage overhead, which can solve the problem that each sensor node has limited resource. Comparison and simulation results show that the proposed scheme can perform better than most of the existing key management schemes in the network security, key storage overhead.","PeriodicalId":278372,"journal":{"name":"2008 International Conference on Embedded Software and Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130070522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}