XtratuM integration on bespoke TTNoCbased. Assessment of the HW/SW.

Size: px
Start display at page:

Download "XtratuM integration on bespoke TTNoCbased. Assessment of the HW/SW."

Transcription

1 XtratuM integration on bespoke TTNoCbased HW. Assessment of the HW/SW. Deliverable Project acronym : MultiPARTES Project Number: Version: v1.1 Due date of deliverable: September 2014 Submission date: 19/11/2014 Dissemination level: Public Author: FENT, TUW, IKERLAN, UPV Part of the Seventh Framework Programme Funded by the EC - DG INFSO

2 Table of Contents 1 DOCUMENT HISTORY LIST OF ACRONYMS EXECUTIVE SUMMARY INTRODUCTION PURPOSE OF THE DOCUMENT OUTPUT OF THE WORK STRUCTURE OF THE DOCUMENT ASSESSMENT OF TEMPORAL AND SPATIAL ISOLATION ASSESSMENT OF THE TTNOC-BASED HARDWARE Spatial Isolation Temporal Isolation Fault/error containment Security Heterogeneity ASSESSMENT OF XTRATUM Spatial Isolation Temporal Isolation Task synchronization ASSESSMENT OUTLINE BESPOKE TTNOC-BASED HW EVALUATION INTRODUCTION SYSTEM ARCHITECTURE FUNCTIONAL EVALUATION PERFORMANCE EVALUATION TEMPORAL INTERFERENCE ANALYSIS EVALUATION RESULTS INTRODUCTION FUNCTIONAL TEST RESULTS PERFORMANCE EVALUATION Partition Context Switch (PCS) Effective slot time of partition execution Partition overhead Overhead due to number of partitions Overhead due to the number of slots in the plan Stability of the plan Inter-partition communications Service costs /09/2013 IST

3 7.3.9 TTNoC services costs DSMC services costs Inter-partition-core communication message TEMPORAL INTERFERENCE ANALYSIS COMPARISON WITH RESPECT TO COTS SOLUTION TEMPORAL INTERFERENCE Computation time CONCLUSION REFERENCES /09/2013 IST

4 1 Document History Version Status Date V0.1 Initial draft 13/09/2014 V0.2 Update with TUWIEN contribution 29/09/2014 V0.3 Update contents 20/10/2014 V0.4 Major Internal review 02/11/2014 V1.0 First release 13/11/2014 V1.1 Ready to be delivered 19/11/2014 Approval Name Date Prepared UPV 13 September 2014 Updated TUWIEN 29 September 2014 Updated fentiss 18 October 2014 Updated IKERLAN 20 October 2014 Reviewed All Project Partners 18 November 2014 Authorised Salvador Trujillo 19 November 2014 Circulation Recipient Date of submission Project partners 20/10/2014 European Commission 19/11/ /09/2013 IST

5 2 List of Acronyms AMP COTS DSM DSMC FPGA IPC MMS MPSoC MPT NoC PCS SMP TISS TTNoC Asymmetric Multiprocessing Commercial off-the-shelf Distributed Shared Memory Deterministic Shared Memory Controller Field-Programmable Gate Array Inter-Process Communication Multiple Module Schedule Multiprocessor System-on-Chip MultiPARTES Project Network-on-Chip Partition Context Switch Symmetric multiprocessing Trusted Interface Subsystem Time Triggered Network on Chip 01/09/2013 IST

6 3 Executive Summary In addition to the initial dual-core hardware platform for LEON3 evaluated in the WP4 (referenced in this document as COTS platform), WP6 has consolidated two platforms that the goal was to experiment with hardware solutions in order to avoid the temporal interference of cores when partitions run in parallel. This document provides the assessment for the functional and performance evaluation report of the multicore platform virtualization layer developed in the frame of work package 6 based on TTNOC. Deliverables D6.5.1 ( XtratuM integration on bespoke TTNoC-based HW. Hardware design and implementation ) detail the hardware modifications performed in order to avoid the temporal interference and D6.5.2 ( XtratuM integration on bespoke TTNoC-based HW. Virtualization layer design and implementation. ) explain the modifications at virtualization layer required to adapt it for this hardware architecture. The main goal of this document is to analyse, evaluate and assess the hardware and software with respect to the functionalities achieved in the initial hardware platform and provide specific test evaluation of the expected improvements with respect to the temporal interference. The evaluation is based in the test suites used and detailed in D4.5 adapted to new execution platform. Additionally, a set of new tests has been defined to evaluate specific aspects of the platform. 01/09/2013 IST

7 4 Introduction 4.1 Purpose of the document This document is one of the output of task 6.4 activities, Xtratum integration on bespoke TTNoC-based HW. The goal of this document is to present the analysis, performance evaluation and assessment of the results of MultiPARTES multicore platform virtualization layer. The general dependence of the task in the new reconfiguration of WP6 and the deliverables is shown on Figure 1. Figure 1 MultiPARTES work package and task dependences 4.2 Output of the work The main result of this document is the assessment with respect to the system properties, in special with respect the temporal interference and the analysis of the system performance of the integration of the MultiPARTES virtualization layer on bespoke TTNoC-based HW. One important aspect to be pointed out is the focus on the SPARC-V8 platform that has been considered in the activities carried out in WP6. x86 platform is out of scope of this analysis. 01/09/2013 IST

8 The output of this work will be used in order to investigate future upgrades of the MultiPARTES platform and virtualization layer with respect to system performance Structure of the document This document is organised as follows: Chapter 4 offers the summary and structure of this document. Chapter 5 provides the assessment of the system properties considering as system the hardware and the virtualization layer Chapter 6 defines the metric to evaluate the platform and the set of tests adapted or designed to evaluate it. Chapter 7 provides the evaluation results. Chapter 8 performs the comparison of the results obtained with respect to the COTS SPARC. Chapter 9 concludes the results of this deliverable. 01/09/2013 IST

9 5 Assessment of Temporal and Spatial Isolation The following assessment provides an overview of the system properties required for mixedcriticality integration. We evaluate the platform according to its capabilities to provide temporal isolation, spatial isolation, and implications on fault containment and security. In this chapter we analyse the platform on an analytic basis and evaluate an influence of these critical points on system properties. In further chapters an experimental evaluation will be performed, that verifies the theoretical assumptions regarding system properties, as well as performance aspects of the system. In the analytical assessment of the platform we will evaluate both hardware and software individually and their integration at the platform level. This platform introduces several radical changes in hardware. The assessment of the COTS based platform showed inadequacies for safety-critical applications with hard real-time requirements. As a solution for this problem two platforms were proposed which provide a higher level of temporal isolation and determinism. This document provides a description of the platform based on a TTNoC and asymmetric processor (AMP) configuration. In this section we assess the extent of advantages introduced by this platform in regard to mixed-criticality systems. In this project we defined key properties which should be satisfied such that mixed-criticality applications can be hosted: Spatial isolation: The separation of functional units in hardware or software, such that no unit is allowed to access private resources of any other unit. Temporal isolation: The execution timing of a functional unit must be uninfluenced by execution of any other. Fault tolerance / error containment: The ability of a system to tolerate faults and deny error propagation from one subsystem to the rest. Security: The platform design supports security properties and provides a secure environment for mixed-criticality integration. The analysis of the platform will concentrate on these key points and try to identify critical points which will then be investigated further using experimental evaluation. The resources considered are: memory, communication channels, and IO devices. 5.1 Assessment of the TTNoC-based Hardware The analysis of the platform based on COTS hardware components showed that it lacked full guarantees w.r.t. temporal isolation, which are required for hard real-time systems. On the other side the COTS-hardware platform (D3.4 Implementation of the generic virtualization layer) is able to guarantee complete spatial isolation in software using static resource management. The sharing of resources is avoided either by dividing them (i.e. memory, comm. channels) or strict reservation to a single partition (IO devices). The platform used a symmetric multiprocessor which allowed two processor cores to work in parallel. And while the spatial 01/09/2013 IST

10 interference access could be avoided the temporal concurrency couldn t. If the schedule of two tasks on two processors overlapping and they both require a specific resource during the overlap period one of them would be forced to wait. This could disrupt the scheduling plan from the point of view of effective execution time of partition, i.e. the use effective of CPU for partitions could be different to than expected in the assignation of resources. In order to avoid this problem, an evaluation of the execution predictability and worst case execution analysis must be performed. This information allows us more precise scheduling policies that are able to guarantee temporal isolation. The main obstacle for this task is complexity, which increases additionally with each software iteration. On top of this even if this task was plausible there could still be schedulability boundaries. The central part of the proposed TTNoC platform is a Time-Triggered Network on Chip (TTNoC). This on-chip communication concept has proven itself as a reliable and deterministic communication mechanism for interconnected on-chip systems. The concept has been used in the European project ACROSS with great success. The main properties of the TTNoC approach are: encapsulated communication channels, a trusted interface sub-system (TISS), a global time base, deterministic communication. These components allow deterministic and reliable on-chip communication, core decupling via generic interfaces and synchronisation. These properties directly support temporal and spatial isolation, and provide a strong platform for an implementation of mixed-criticality systems. The proposed hardware platform is based on an AMP LEON3 processor with two cores. Each core is equipped with a local working memory, which stores all transient data of the core. In the further text we will refer to the combination of the CPU and local memory as a host. The XtratuM hypervisor, designated to a specific core, has an exclusive control over this local memory. The segregation of partitions in local memory is controlled by the hypervisor. The temporal isolation of partitions is controlled by hypervisor s scheduler. Each core is controlled by a virtualization layer copy or instance following the Asymmetric Multiprocessing (AMP) approach. Both virtualization layer instances require to be synchronized and services for partition management and communications between partitions allocated in different cores. The proposed platform also provides a shared memory. It is an off-chip memory coupled with a special memory controller. The memory controller is a single core LEON3 processor with dedicated software for memory control. It is attached to the rest of the system via TTNoC. It allows a complete deterministic access to the shared memory to the cores. The communication with IO devices is performed using a special gateway component such as an IO-Server partition. The cores use TTNoC to access IO gateway. 01/09/2013 IST

11 5.1.1 Spatial Isolation Mixed-criticality integration requires a clear segregation among sub-systems. Each sub-system is allowed to access only resources which are designated to that specific sub-system. In the earlier work (see D3.5) we established that software based methods for the implementations of spatial isolation are quite sufficient. Using these methods an operating system can efficiently control access to resources such that complete spatial isolation is satisfied. The proposed architecture has two hosts. The local memory of each host is completely decupled from the rest of the system and only a local core is able to access this memory. This means the working memory of each core on MPSoC level is also isolated in hardware. The local memory is partitioned using software methods and regulated by XtratuM. In earlier evaluations XtratuM showed that it is capable of implementing complete spatial isolation among partitions (see D3.5). The TTNoC provides encapsulated communicated channels. Each channel occupies specific ports designated to specific hosts. If the architecture uses a static configuration method the channel configuration cannot be changed during runtime Temporal Isolation The deterministic time behaviour is crucial for systems with high-real time requirements. Systems based COTS hardware are almost exclusively designed to accommodate performance requirements. In the analysis of COTS hardware we identified several sources of temporal interferences. The proposed TTNoC architecture abandons the SMP approach, used in the original COTS based platform, and introduces a time-triggered communication between the cores. This eliminates an influence of the bus on the temporal behaviour of the system. The second significant change is related to the working memory. Each core has a local working memory now. By removing these two shared resources (memory and bus) the temporal interferences caused by waiting on access to the given resource are eliminated. The temporal separation is performed on the TTNoC level. There is no implicit synchronization among hosts, but one could be established if needed by using synchronisation signals that propagate over the TTNoC. These signals could be used as a task triggers and thus provide synchronized start of tasks. This is only possible if the overlaying software architecture supports these features. In Section 5.2 we will provide a further analysis of the temporal alignment between TTNoC and the XtratuM hypervisor. 01/09/2013 IST

12 5.1.3 Fault/error containment A system ability to contain and tolerate faults is a very important aspect of mixed-criticality integration. The fault is considered to be an anomaly in the correct and anticipated behaviour of the system. We distinguish two types of faults: design faults (also known as systematic faults) and random faults (physical faults). Design faults are anomalies introduced during the development process. They could be part of software or hardware (e.g. programming bugs, engineering miscalculation etc.). Random faults are caused either by an external event, or damage to the system not caused by design. Under random faults we understand single event upsets (SEU), manufacturing faults, or damage due to physical stress. Hardware is generally prone to both types of faults and we can observe containment regions according to type of the fault. The platform is implemented as a combination of several independent computational units: processor cores with local memory, TTNoC, and shared memory unit. The spatial and temporal isolation are ensured in hardware and by design they provide fault containment regions for systematic faults. Each unit is able to operate in complete isolation even if all other components fail. We assume that a random fault would affect all components regardless of the relation between them. The MPSoC in general is observed as a fault containment unit with regard to random faults Security In the earlier reports we evaluated native security of the hypervisor and underlying architecture. The security is evaluated by the capability of the system to establish and preserve security related properties (e.g., confidentiality, integrity, authenticity). Hardware architectures are rarely built with security tools implemented in hardware. Security is in most cases a responsibility of higher level developers. The hardware architecture must ensure that there are no design faults which could cause a violation of security properties. Separation of entities using different policies is a cornerstone for enforcing security. Spatial isolation is therefore a natural pre-requisite for any security architecture. The spatial isolation allows confidentiality of local data among hosts, and confidentiality of data transferred through encapsulated TTNoC channels. The security of the data communicated with the outside world must be enforced using additional methods, e.g. encryption. 01/09/2013 IST

13 A set of security properties depends highly from the application requirements. The platform supports security properties but they final implementation requires additional security measures. These must be applied either on the application level or using middleware security services Heterogeneity The proposed architecture enables an integration of heterogeneous computational units without breach of, above mentioned, basic system properties. The TTNoC is connected to processor cores via TISSes and they are fully decoupled from the rest of the system. Each TISS has a private memory area, where the messages and configuration data are stored. The configuration of the TISSes is static and is performed a priori. This principle allows an implementation of a deterministic gateway towards other types of processing cores without compatibility problems. The global time base allows both types of systems to stay phase aligned even on the application layer. (Salloum C., Elshuber, Hoftberger, Isakovic, & Wasicek, 2012) The heterogeneity in this case is not bounded on a specific system integration layer, and it can be applied on device level, as it is in this case. It can be also applied on chip level where two different cores are connected via TTNoC on a single chip. 5.2 Assessment of XtratuM In this section we evaluate the impact of the platform shift on basic properties of the virtualisation layer. Again, our focus will be on the properties needed for safe and reliable mixed-criticality integration, spatial and temporal isolation. In D3.5 we established that on COTS hardware the majority of tasks involved in ensuring spatial and temporal isolation, are responsibility of software. The OS layer is responsible for resource separation and execution of the tasks in correct temporal order. The COTS platform used in the original evaluation provided very low amount of support towards mixed-criticality integration. Despite this fact the hypervisor was able to provide full spatial isolation among different tasks and partial temporal isolation. The encountered boundaries were a direct consequence of the hardware architecture Spatial Isolation A separation of different applications is critical for mixed-criticality systems. It is also a foundation for other system properties e.g. fault tolerance and security. On the proposed 01/09/2013 IST

14 platform the CPU implementation changed from SMP to AMP. This means that basic computer resources are not shared among CPUs anymore. The task of the hypervisor in an SMP version in regard to spatial isolation was to establish a safe and secure way for tasks, partitions, and CPUs to manage resources. With an AMP approach the responsibility of the hypervisor on this matter reduces. The memory and other resources (e.g. bus, cache etc.) are not shared among CPUs anymore. Therefore the hypervisor must only manage resource separation among partitions. Previous functional tests (D3.5 Assemsment of XtratuM, 2013) (D4.5 Platform validation report, 2013) showed that XtratuM fully implements spatial isolation and we can conclude that the same properties hold for the adapted version. According to (D6.5.2 XtratuM integration on bespoke TTNoC-based HW. Virtualization layer design and implementation, 2014) no changes have been done such that these properties could be violated Temporal Isolation The second property crucial for mixed-criticality applications is the ability to isolate different tasks in time. An execution of each task cannot be violated by any external event within its execution window. In the SMP version of the MultiPARTES platform a time isolation was affected by due to interferences created by shared memory, shared cache, and system management interrupts (e.g., Intel x86). In the AMP version the temporal violations are possible only in case of under dimensioning of task execution windows (i.e., partitions). A task must be evaluated using worst case execution time (WCET) analysis, to establish execution time bounds and to be able to correctly schedule tasks in the system. These conflicts can be resolved a-prior without any risks. The task execution can also be pre-empted by the hypervisor itself. These interrupts can be measured and calculated in schedule. The effects of under dimensioned partitions have been explored in and earlier assessment (D3.5 Assemsment of XtratuM, 2013). We can apply the same conclusions here, eventual error in configuration and integration could cause temporal interferences Task synchronization The proposed platform provides deterministic means of communication among different cores, as well as a notion of global time between them. This allows tasks to coordinate their actions based on time. The proposed concept allows coordination of tasks over TTNoC using specialized synchronization signals. The signals are implemented either through TTNoC or via dedicated lines. The synchronization is performed on two levels of abstraction: hypervisor and user. 01/09/2013 IST

15 The hypervisor coordinates the start of the schedule with the rest of the system using dedicated signal. It allows schedules on different cores to be phase aligned. This functionality allows systems to reintegrate on reset or switch schedules if needed. The coordination of tasks on heterogeneous systems with independent clocks requires additional synchronization or phase alignment methods, and a deterministic communication system between two parties (Salloum C. E., Elshuber, Höftberger, Isakovic, & Wasicek, 2013). In principle the architecture allows phase alignment of tasks on heterogeneous processors. 5.3 Assessment Outline In the sections above we analysed the proposed platform with regard to temporal and spatial isolation, as basic properties for mixed-criticality systems. We also identified additional properties that are also closely related, and emerging effects on these properties. The hardware part of the platform allows execution of complete spatial and segregation of overlaying virtualisation layers. It provides means for the virtualization layers to coordinate their actions, and it is included in basic services of the platform. As an optional service there is a capability of a temporal coordination between user tasks. The platform provides a minimal local memory for each core, this way spatial isolation between cores is guaranteed in hardware. The shared memory is still accessible through the deterministic shared memory controller. This increases temporal and spatial isolation, and overall reliability and dependability. On the other side, it reduces the performance factor of memory accesses to shared memory. The matter of temporal isolation is also solved by dividing hardware cores in separate independent computational units. Of course there is still a risk of false scheduling and dimensioning of execution windows. This can be avoided by applying a sort of WCET analysis during the configuration of the system. The concept of the proposed architecture doesn t allow temporal interferences due to non-deterministic hardware. If the system possesses the above mentioned characteristics, it improves other properties. It increases fault and error containment of the system, and it provides certain security properties by design. The heterogeneous system can be built in a deterministic fashion using COTS hardware, and without major trade-offs. This improves overall compensability of a system. The weak spot of the platform is a performance decrease. This is a typical trade-off in mixedcriticality systems. A more deterministic hardware design with high-performance capabilities oriented for mixed-criticality is a high-rated future challenge. 01/09/2013 IST

16 6 Bespoke TTNoC-based HW Evaluation Deliverable v Introduction This section provides an overview of the metrics used, tests and results obtained for the evaluation of the XtratuM on top of the bespoke TTNoC-based HW developed in work package WP6. The goal of the evaluation is to analyse that the hardware platform fulfils the same functionalities and solves the problems raised in the COTS platform. The main problem raised was the temporal interference due the parallel execution of application code on different cores. In the following sections the performance metrics, benchmark scenarios and respective results are presented. 6.2 System architecture The hardware and software architecture has been described in D6.5.1 and D We summarise here the main aspects to be consider for the evaluation purposes. Figure 2 shows the hardware and software architecture. Each LEON3 core is handled by one instance of the virtualization layer (AMP software architecture) which supports the execution of a set of partitions. Each LEON3 core has a local memory and can access to the shared memory through the TTNoC bus and the Deterministic Shared Memory Controller (DSMC). Figure 2: HW and SW architecture For the evaluation purposes, the aspects to be considered are: - The processing mode of the virtualization layer is Asymmetric multiprocessing (AMP) which implies that each core is controlled by one instance of the virtualization layer. This implies: 01/09/2013 IST

17 o Partitions have to be monocore o Virtualization layer communication and synchronization is managed through the TTNoC o The synchronization between Virtualization layer instances is required for: system management services partition management involving partition allocated to different cores plan management synchronization - Shared memory is accessed through a DSMC (distributed shared memory controller) - System build, load and boot. 6.3 Functional evaluation In order to evaluate the functional behaviour of the hardware solution and virtualization layer adaptation, we have selected as reference test suite for the MPT Abstraction Layer: Conformance test suite defined in section 7 of D4.4. It defines the set of tests for System, Partition, Inter-Partition Communication (IPC), Time, Multiple Module Schedule (MMS), and Health Monitor. As the tracing is local and no changes to the tracing subsystem have been made, this set of tests have not been included in this new evaluation. However, the modifications of the hardware have required the modification of the virtualization layer and the addition of new hypercalls. These new services are considered in the functional evaluation. In order to fulfil the functionalities, a set of new requirements and tests have been included. New functionalities have been detailed in Deliverable D due to the H- AMP software architecture. System status and actions between hypervisor instances Partition status and actions between partitions allocated in different hypervisor instances. We will refer as different core. Plan synchronization between cyclic scheduling running executed by different hypervisor instances. Communication services between partitions allocated in different cores. Specific services for shared memory management New tests for these services have been designed and implemented. Table 1 summarizes the MPT Abstraction Layer test. Columns define: Test status: details which is the test status. o New test: the test has been defined due to the hardware modifications. o Adapted: the test has been adapted from a previous test due to architecture constraints o : test is executed without modification o Not Applicable NA : test can not be executed due to architecture constraints Test No.: defines a unique test identifier. Test Purpose: defines the goal of the test Comments: provides the constraints of the test. 01/09/2013 IST

18 o Same core: test applicability restricted to partitions allocated in the same hypervisor instance o Different core: test applicability restricted to partitions allocated in different hypervisor instance o New hardware: test has been defined due to the new hardware Table 1: MPT Abstraction Layer test definition Test Status Test No Test Purpose Comments System Management T-API-SYS-0110_0010 Successful system status check Adapted T-API-SYS-0110_0011 Successful system status check Different node T-API-SYS-0110_0020 T-API-SYS-0110_0030 Successful management of service being called by a non-system partition. Successful management of the service being called with an invalid SYSTEM_STATUS reference address. NA T-API-SYS-0120_0010 Successful system mode setting New T-API-SYS-0120_0011 Successful system mode setting T-API-SYS-0120_0020 Partition Management Successful management of service being called by a non-system partition. T-API-PM-0210_0010 Successful system partition status check Adapted T-API-PM-0210_0011 Successful system partition status check Different node Adapted Adapted Adapted T-API-PM-0210_0020 T-API-PM-0210_0030 T-API-PM-0220_0010 T-API-PM-0220_0011 T-API-PM-0220_0020 T-API-PM-0220_0021 T-API-PM-0220_0030 T-API-PM-0220_0031 T-API-PM-0220_0040 Successful handling of invalid input parameters error cases. Successful handling of the case when the calling partition is not a system partition. Successful setting of a partition mode to WARM_START from states NORMAL and WARM_START. Successful setting of a partition mode to WARM_START from states NORMAL and WARM_START. Successful setting of a partition mode from NORMAL to IDLE and back to NORMAL. Successful setting of a partition mode from NORMAL to IDLE and back to NORMAL. Successful setting of a partition mode from NORMAL to COLD_START and back to NORMAL. Successful setting of a partition mode from NORMAL to COLD_START and back to NORMAL. Successful handling of NORMAL to NORMAL mode transition request. Reset the system is supported by a programmable external device that generates a signal. Different node Different node Different node 01/09/2013 IST

19 T-API-PM-0220_0050 T-API-PM-0220_0060 T-API-PM-0230_0010 Inter-Partition Communication Successful handling of invalid values passed as service parameters. Successful handling of the error case when the calling partition is not a system partition. Successful idling of a partition until its next scheduling slot or interrupt reception. T-API-IPC-0310_0010 Successful creation of a queuing port. T-API-PM-0310_0020 Successful management of the service being called with wrong or invalid parameters values. T-API-PM-0310_0030 Successful management of the service being called when the calling partition is in NORMAL state. T-API-IPC-0320_0010 Sampling port creation. T-API-IPC-0320_0020 T-API-IPC-0320_0030 Sampling port creation (when called with invalid parameters). Sampling port creation (when called by partition in NORMAL state). T-API-IPC-0330_0010 Successful queuing port ID check. T-API-IPC-0330_0020 Successful management of the service being called when the passed port name does not exist. T-API-IPC-0340_0010 Successful queuing port status check. T-API-IPC-0340_0020 Queuing port status check failure because of invalid port id passed. T-API-IPC-0350_0010 Successful sampling port current status check. T-API-IPC-0350_0020 Successful management of service call with an invalid port Id. T-API-IPC-0360_0010 Successful sampling port ID check. T-API-IPC-0360_0020 Successful management of service call with an invalid port Name. T-API-IPC-0370_0010 Successful sampling port status check. T-API-IPC-0370_0020 Successful handling of service call with an invalid port Id T-API-IPC-0380_0010 Successful sampling message readout. T-API-IPC-0380_0020 Successful sampling message readout (message age>refreshperiod) T-API-IPC-0380_0030 Successful sampling message readout. T-API-IPC-0390_0010 Successful conditional sampling message readout. T-API-IPC-03100_0010 Successful updated sampling message readout. T-API-IPC-03110_0010 Successful queuing message readout. T-API-IPC-03110_0020 T-API-IPC-03110_0030 Successful Management of service being called when the queuing port is empty. Successful management of service being called when the port has overflowed since the last time it was read. 01/09/2013 IST

20 T-API-IPC-03110_0040 T-API-IPC-03110_0050 T-API-IPC-03110_0060 Successful management of service being called when the given queuing port is not configured to operate as a destination port. Successful management of service being called when the given timeout value is not valid. Successful management of service being called when the given queuing port does not exist. T-API-IPC-03120_0010 Successful queuing message sending. T-API-IPC-03120_0020 T-API-IPC-03120_0030 T-API-IPC-03120_0040 T-API-IPC-03120_0050 T-API-IPC-03120_0060 Successful management of service being called when there is not sufficient space left in the queuing port for the new message. Successful management of service being called when the message is larger than the maximum allowed message size. Successful management of service being called when the port passed is not configured to operate as a source port. Successful management of service being called when the passed time out value for the port is invalid. Successful management of service being called when the passed port id does not identify an existing queuing port. T-API-IPC-03130_0010 Successful sampling message writing. T-API-IPC-03130_0020 T-API-IPC-03130_0030 T-API-IPC-03130_0040 Successful management of the service being called when the input message length is greater than the maximum allowed length. Successful management of the service being called when the passed port is not configured to operate as a source. Successful management of the service being called when the passed port id does not identify an existing port. TTNoC Management New T-API-TTN-03200_0010 Successful creation of a ttnoc port. New hardware New T-API-TTN-03200_0020 Unsuccessful ttnoc port creation (when called with invalid parameters). New hardware New T-API-TTN-03200_0030 Successful ttnoc port ID check. New hardware New New T-API-TTN-03200_0040 T-API-TTN-03200_0050 Successful management of the service being called when the passed ttnoc port name does not exist. Successful management of service call with an invalid ttnoc port Id. New hardware New hardware New T-API-TTN-03200_0060 Successful ttnoc message readout. New hardware New T-API-TTN-03200_0070 Successful ttnoc message writing. New hardware DSMC Management 01/09/2013 IST

21 New T-API-TTN-03300_0010 Successful management of the service being called when invalid parameters in the call New hardware New T-API-TTN-03300_0020 Successful dsmc message readout. New hardware New T-API-TTN-03300_0030 Successful dsmc message writing. New hardware Time Management T-API-TM-0410_0010 Health Monitor Management T-API-HM-0510_0010 T-API-HM-0520_0010 T-API-HM-0520_0020 T-API-HM-0520_0030 Multiple Module Schedule T-API-SCH-0610_0010 T-API-SCH-0610_0020 T-API-SCH-0620_0010 T-API-SCH-0630_0010 T-API-SCH-0630_0020 T-API-SCH-0630_0030 Successful get access service Successful error status confirmation. Successful application error raising. Successful management service being called with an invalid length of error message. Successful management service being called with an invalid provided error code. Successful retrieval of the current schedule Id. Successful management of the service being called with a non-existent schedule name. Successful retrieval of scheduling status information. Successful changing of module schedule. Successful management of the service being called when the passed schedule Id does not exist. Successful management of the service being called by a non-system partition. Adapted T-API-SCH-0640_0010 Successful start of major frame New hardware supporting the external MAF synchronization Section 7.2 ( Functional test results ) details the results, considerations and limitations of this test suite execution on the target of the evaluation. 6.4 Performance evaluation In order to evaluate the bespoke TTNoC-based HW MultiPARTES platform, we have used the same performance metrics as defined in deliverable 4.6 Platform validation report. The metric consist on the following elements: 1. Maximum and average Partition Context switch time: maximum and average time for switching between two partitions in the scheduling plan. 2. Effective slot time of partition execution: time available to the partition code in a slot. 3. Partition overhead due to the virtualization layer. Performance loss of the partition due to its execution on top the hypervisor. 01/09/2013 IST

22 4. Stability of the plan with respect to the mid and long term: time variability of the Major Frame (MAF) occurrences. 5. Inter-partition communication message transfer: time needed to send a message to resp. receive a message from another partition 6. Service cost: evaluation of the maximum and average execution time of the hypervisor services. The detailed specification of the test cases for the collection of the above metrics was presented in D4.6. Additionally, some new elements are going to be considered: 1. Inter-partition communication message transfer between partitions allocated in different nodes. Evaluation of the time used to send and receive messages. 2. Time to access to shared memory blocks. Evaluation of the time needed to read and write memory blocks. These new tests are described below. Table 2 Inter core communication Test Case Id Test purpose Test Configuration T-PERF To measure the time to send/receive a message between two partitions allocated in different cores The scenario is built with 2 partitions. Each partition is allocated to one of the instances of the Virtualization Layer (VL). P1 is allocated to VL1 and P2 to VL2. The scheduling plan consists of one slot with a duration that is large enough to execute the partition code (50 ms). Test Description In every MAF, P1 sends a message of maximum size 26 bytes to P2 measuring the cost of the hypercall and waits for the reception of a message from P2 with the time the message was read. P1 stores the total time and prints a summary after 50 MAFS. P2 waits for a message and, when received, reads the clock value and sends back a message with the ACK and the clock value. Test constraints Test measurement The TTNoC limits the messages to 26 bytes for the message Local time stored during the execution. 01/09/2013 IST

23 Table 3 Memory block read/write Test Case Id Test purpose Test Configuration Test Description Test constraints Test measurement T-PERF To measure the time to read/write a memory block The scenario is built with 2 partitions. Each partition is allocated to one of the instances of the Virtualization Layer (VL). P1 is allocated to VL1 and P2 to VL2. The scheduling plan consists in one slot with a duration that is large enough to execute the partition code (500 ms). Every MAF, P1 writes a buffer (maximum size 26 bytes) in shared memory, measures the cost of the hypercall and send a message to P2 to inform about the write completion. P2 waits for the P1 message and reads the memory block and measures the cost of the hypercall. P2 verify the contents of the message (predefined). The TTNoC limits the messages to 26 bytes for the message. Several read/write hypercalls are needed to read/write buffers with larger size. Execution time of the hypercalls. Message content is the same. 6.5 Temporal interference analysis The design of this hardware platform was aimed to avoid the effects of the temporal interference of the parallel execution of two partitions on two different cores. In order to evaluate the temporal interference, the same experiment as described in section of D3.5 has been adapted to and performed on the current platform. Next, a summary of this experiment is presented. The goal of the experiment is to analyse the effect of the parallel execution of two partitions on different cores with different time intervals of partition overlaps. Table 4 Test case description Test Case Id Test purpose Test Configuration T-MTP-INTERF XXX To analyse the effect of the parallel execution of two partitions on different cores with different overlapping time interval The scenario is built with 2 partitions. Each partition is allocated to one of the instances of the Virtualization Layer (VL) running on different cores. P1 is allocated to VL1 and P2 to VL2. The scheduling plan consists of one slot with a duration that is large enough to execute the payloads of both partitions (20ms). The test is instantiated with a value for the overlap. This figure shows 01/09/2013 IST

24 the example when no overlap is produced. Test Description Partition P1 and P2 execute a known predefined payload that has been measured in isolation. Test constraints To force the maximum impact of the memory interference, the memory areas of both partitions P1 and P2 are configured as non-cacheable. Test measurement Time that P1 and P2 execute their payloads in the different test cases, i.e., for different partition overlaps (see Table 5). The following tests have been considered. Table 5: Test cases Test Case Id T-MTP-INTERF T-MTP-INTERF T-MTP-INTERF T-MTP-INTERF T-MTP-INTERF Test Configuration P1 and P2 overlap in 0% of their duration P1 and P2 overlap in 25% of their duration P1 and P2 overlap in 50% of their duration P1 and P2 overlap in 75% of their duration P1 and P2 overlap in 100% of their duration 01/09/2013 IST

25 7 Evaluation results 7.1 Introduction This section provides the results obtained with the different evaluation items described in the previous section. 7.2 Functional test results This section provides the results obtained with the different test scenarios for the functional evaluation (see Section 6.3 Functional evaluation ). The term OK/KO is used to show the test result. The term PASSED/NO PASSED is used to show the fulfilment of a global functionality. PASSED is used when all test in the category are OK. Table 6: MPT Abstraction Layer test results Status Test No Result Status Test No Result System Management PASSED Inter-Partition Communication PASSED T-API-SYS-0110_0010 OK T-API-IPC-0310_0010 OK Adapted T-API-SYS-0110_0011 OK T-API-PM-0310_0020 OK T-API-SYS-0110_0020 OK T-API-PM-0310_0030 OK T-API-SYS-0110_0030 OK T-API-IPC-0320_0010 OK NA T-API-SYS-0120_ T-API-IPC-0320_0020 OK Adapted T-API-SYS-0120_0011 OK T-API-IPC-0320_0030 OK T-API-SYS-0120_0020 OK T-API-IPC-0330_0010 OK Partition Management PASSED T-API-IPC-0330_0020 OK T-API-PM-0210_0010 OK T-API-IPC-0340_0010 OK Adapted T-API-PM-0210_0011 OK T-API-IPC-0340_0020 OK T-API-PM-0210_0020 OK T-API-IPC-0350_0010 OK T-API-PM-0210_0030 OK T-API-IPC-0350_0020 OK T-API-PM-0220_0010 OK T-API-IPC-0360_0010 OK Adapted T-API-PM-0220_0011 OK T-API-IPC-0360_0020 OK T-API-PM-0220_0020 OK T-API-IPC-0370_0010 OK Adapted T-API-PM-0220_0021 OK T-API-IPC-0370_0020 OK T-API-PM-0220_0030 OK T-API-IPC-0380_0010 OK Adapted T-API-PM-0220_0031 OK T-API-IPC-0380_0020 OK T-API-PM-0220_0040 OK T-API-IPC-0380_0030 OK T-API-PM-0220_0050 OK T-API-IPC-0390_0010 OK T-API-PM-0220_0060 OK T-API-IPC-03100_0010 OK T-API-PM-0230_0010 OK T-API-IPC-03110_0010 OK TTNoC Management PASSED T-API-IPC-03110_0020 OK 01/09/2013 IST

26 New T-API-TTN-03200_0010 OK T-API-IPC-03110_0030 OK New T-API-TTN-03200_0020 OK T-API-IPC-03110_0040 OK New T-API-TTN-03200_0030 OK T-API-IPC-03110_0050 OK New T-API-TTN-03200_0040 OK T-API-IPC-03110_0060 OK New T-API-TTN-03200_0050 OK T-API-IPC-03120_0010 OK New T-API-TTN-03200_0060 OK T-API-IPC-03120_0020 OK New T-API-TTN-03200_0070 OK T-API-IPC-03120_0030 OK DSMC Management PASSED T-API-IPC-03120_0040 OK New T-API-TTN-03300_0010 OK T-API-IPC-03120_0050 OK New T-API-TTN-03300_0020 OK T-API-IPC-03120_0060 OK New T-API-TTN-03300_0030 OK T-API-IPC-03130_0010 OK Time Management PASSED T-API-IPC-03130_0020 OK T-API-TM-0410_0010 OK T-API-IPC-03130_0030 OK Health Monitor Management OK T-API-IPC-03130_0040 OK T-API-HM-0510_0010 OK T-API-HM-0520_0010 OK T-API-HM-0520_0020 OK T-API-HM-0520_0030 OK Multiple Module Schedule PASSED T-API-SCH-0610_0010 OK T-API-SCH-0610_0020 OK T-API-SCH-0620_0010 OK T-API-SCH-0630_0010 OK T-API-SCH-0630_0020 OK T-API-SCH-0630_0030 OK Adapted T-API-SCH-0640_0010 OK These results show that all tests have been successfully executed and passed. Comparing with the results obtained on the COTS platform (D4.5), the set of tests that have run unchanged provide the same functionalities than the COTS platform. Adapted tests, as result of the hardware modification, provide also the same functionalities New tests have satisfactory validated the new functionalities. 7.3 Performance Evaluation This section presents the performance-test cases and different configurations that were used in order to retrieve the performance metrics presented in Section 6.4 of this deliverable that is based in the test description detailed in D4.6. Two configurations have been used: 1. XtratuM and partitions in each core have been allocated in static memory (SRAM) 2. XtratuM and partitions in each core have been allocated in dynamic memory (DDR) 01/09/2013 IST

27 7.3.1 Partition Context Switch (PCS) Deliverable v1.0 The next table summarizes the results from measurements that assessed the maximum, minimum and average time values required for the partition context-switch (PCS). Same test T- MTP-PERF (defined in D4.6) has been used. Last column shows the results obtained in the COTS platform. Table 7: Overall Partition Context Switch test results Processor LEON3 SRAM LEON3 DDR COTS LEON3 DDR Average (µsec) Maximum (µsec) Minimum (µsec) Standard deviation 0,721 1,432 1,663 These results show that the maximum PCS is 61 µsecs and 205 µsecs when the software runs on static (SRAM) or dynamic (DDR) memory Effective slot time of partition execution The effective slot time used by a partition is the time when the partition executes its own code. Next figure shows the scheme. Black rectangle refers to the partition context switch executed by the hypervisor. Figure 3: Effective partition execution slot time scheme The tests defined in D4.6 (T-MTP-PERF XXX) have been executed for the different configurations of slot duration specified. In these tests, the columns Avg, Max and Min show the average, maximum and minimum counter increments in a fixed period of 1 second. Diff column computes the differences with respect to a reference value (average counter with slot of 1000 milliseconds). Loss obtains in percentage the difference with respect to the reference value. PCS1 estimates the difference in counts with respect to the number of PCS that a partition has required. For instance, in the case of slot duration of 100ms, the partition has required to execute 10 times the slot in 1 second and, as consequence, 9 PCS have been needed. PCS2 estimates the value of the PCS in µsec taking into account PCS1 and the number of counts that have been measured in the reference value. Next table summarizes the results for the SRAM and DDR configurations. 01/09/2013 IST

28 Table 8: Effective slot time for SRAM configuration SRAM Configuration Slot (ms) Avg (counts) Max (counts) Min (counts) Diff (counts) Loss (%) PCS1 (counts) PCS2 (µsec) Table 9: Effective slot time for DDR configuration DDR Configuration Avg (counts) Max (counts) Min (counts) Diff (counts) Loss (%) PCS1 (counts) PCS2 (usec) Avg (counts) This scenario estimates the partition context switch indirectly through the performance loss of a partition when it is split in several slots. The performance loss corresponds to the external computation required to execute the partitions that are directly associated to the hypervisor scheduling. The reported results confirm the previous measurements of the PCS for the SRAM and DDR configurations which were measured by instrumenting the hypervisor code Partition overhead Overhead due to the virtualization layer Previous scenarios permit to estimate the performance lost due to the virtualization layer. It strongly depends on the effective time of the partition with respect to the allocated time. From previous table, we summarize the virtualization-layer overhead (last line of the following tables). Table 10: Virtualisation layer overhead for SRAM configuration Test ID Slot(ms) Avg (counts) /09/2013 IST

Multicore partitioned systems based on hypervisor

Multicore partitioned systems based on hypervisor Preprints of the 19th World Congress The International Federation of Automatic Control Multicore partitioned systems based on hypervisor A. Crespo M. Masmano J. Coronel S. Peiró P. Balbastre J. Simó Universitat

More information

IPR issues update Deliverable 8.2

IPR issues update Deliverable 8.2 IPR issues update Deliverable 8.2 Project acronym : MultiPARTES Project Number: 287702 Version: v1.0 Due date of deliverable: December 2014 Submission date: 26/01/2015 Dissemination level: PUBLIC Author:

More information

MultiPARTES. Virtualization on Heterogeneous Multicore Platforms. 2012/7/18 Slides by TU Wien, UPV, fentiss, UPM

MultiPARTES. Virtualization on Heterogeneous Multicore Platforms. 2012/7/18 Slides by TU Wien, UPV, fentiss, UPM MultiPARTES Virtualization on Heterogeneous Multicore Platforms 2012/7/18 Slides by TU Wien, UPV, fentiss, UPM Contents Analysis of scheduling approaches Virtualization of devices Dealing with heterogeneous

More information

XtratuM hypervisor redesign for LEON4 multicore processor

XtratuM hypervisor redesign for LEON4 multicore processor XtratuM hypervisor redesign for LEON4 multicore processor E.Carrascosa, M.Masmano, P.Balbastre and A.Crespo Universidad Politécnica de Valencia, Spain Outline Motivation/Introduction XtratuM hypervisor

More information

Experience with the integration of distribution middleware into partitioned systems

Experience with the integration of distribution middleware into partitioned systems Experience with the integration of distribution middleware into partitioned systems Héctor Pérez Tijero (perezh@unican.es) J. Javier Gutiérrez García (gutierjj@unican.es) Computers and Real-Time Group,

More information

PikeOS: Multi-Core RTOS for IMA. Dr. Sergey Tverdyshev SYSGO AG 29.10.2012, Moscow

PikeOS: Multi-Core RTOS for IMA. Dr. Sergey Tverdyshev SYSGO AG 29.10.2012, Moscow PikeOS: Multi-Core RTOS for IMA Dr. Sergey Tverdyshev SYSGO AG 29.10.2012, Moscow Contents Multi Core Overview Hardware Considerations Multi Core Software Design Certification Consideratins PikeOS Multi-Core

More information

HIPEAC 2015. Segregation of Subsystems with Different Criticalities on Networked Multi-Core Chips in the DREAMS Architecture

HIPEAC 2015. Segregation of Subsystems with Different Criticalities on Networked Multi-Core Chips in the DREAMS Architecture HIPEAC 2015 Segregation of Subsystems with Different Criticalities on Networked Multi-Core Chips in the DREAMS Architecture University of Siegen Roman Obermaisser Overview Mixed-Criticality Systems Modular

More information

Mixed-Criticality: Integration of Different Models of Computation. University of Siegen, Roman Obermaisser

Mixed-Criticality: Integration of Different Models of Computation. University of Siegen, Roman Obermaisser Workshop on "Challenges in Mixed Criticality, Real-time, and Reliability in Networked Complex Embedded Systems" Mixed-Criticality: Integration of Different Models of Computation University of Siegen, Roman

More information

Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser

Mixed-Criticality Systems Based on Time- Triggered Ethernet with Multiple Ring Topologies. University of Siegen Mohammed Abuteir, Roman Obermaisser Mixed-Criticality s Based on Time- Triggered Ethernet with Multiple Ring Topologies University of Siegen Mohammed Abuteir, Roman Obermaisser Mixed-Criticality s Need for mixed-criticality systems due to

More information

Industrial Application of MultiPARTES

Industrial Application of MultiPARTES Industrial Application of MultiPARTES January 21st, 2012 HiPEAC Workshop 2013 Integration of mixed-criticality subsystems on multi-core processors David Gonzalez (dgonzalez@ikerlan.es) 1 Definitions and

More information

Title: Partitioned Embedded Architecture based on Hypervisor: the XtratuM approach. Authors: S. Peiró, A. Crespo, I. Ripoll, M.

Title: Partitioned Embedded Architecture based on Hypervisor: the XtratuM approach. Authors: S. Peiró, A. Crespo, I. Ripoll, M. Title: Partitioned Embedded Architecture based on Hypervisor: the XtratuM approach. Authors: S. Peiró, A. Crespo, I. Ripoll, M. Masmano Affiliation: Instituto de Informática Industrial, Universidad Politécnica

More information

XtratuM: a Hypervisor for Safety Critical Embedded Systems

XtratuM: a Hypervisor for Safety Critical Embedded Systems XtratuM: a Hypervisor for Safety Critical Embedded Systems M. Masmano, I. Ripoll, and A. Crespo Instituto de Informática Industrial, Universidad Politécnica de Valencia (Spain) {mmasmano, iripoll, alfons}@ai2.upv.es

More information

A Dual-Layer Bus Arbiter for Mixed-Criticality Systems with Hypervisors

A Dual-Layer Bus Arbiter for Mixed-Criticality Systems with Hypervisors A Dual-Layer Bus Arbiter for Mixed-Criticality Systems with Hypervisors Bekim Cilku, Bernhard Frömel, Peter Puschner Institute of Computer Engineering Vienna University of Technology A1040 Wien, Austria

More information

AFDX Emulator for an ARINC-based Training Platform. Jesús Fernández Héctor Pérez J. Javier Gutiérrez Michael González Harbour

AFDX Emulator for an ARINC-based Training Platform. Jesús Fernández Héctor Pérez J. Javier Gutiérrez Michael González Harbour AFDX Emulator for an ARINC-based Training Platform Jesús Fernández Héctor Pérez J. Javier Gutiérrez Michael González Harbour 2 2 Motivation Mature standards for safety-critical applications ARINC-653 for

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Open Source Implementation of Hierarchical Scheduling for Integrated Modular Avionics

Open Source Implementation of Hierarchical Scheduling for Integrated Modular Avionics Open Source Implementation of Hierarchical Scheduling for Integrated Modular Avionics Juan Zamorano, Juan A. de la Puente Universidad Politécnica de Madrid (UPM) E-28040 Madrid, Spain jzamora@fi.upm.es,

More information

Title: XtratuM: a Hypervisor for Safety Critical Embedded Systems. Authors:M. Masmano, I. Ripoll, A. Crespo and J.J. Metge

Title: XtratuM: a Hypervisor for Safety Critical Embedded Systems. Authors:M. Masmano, I. Ripoll, A. Crespo and J.J. Metge Title: XtratuM: a Hypervisor for Safety Critical Embedded Systems. Authors:M. Masmano, I. Ripoll, A. Crespo and J.J. Metge Affiliation: Instituto de Informática Industrial, Universidad Politécnica de Valencia,

More information

Towards a European Strategy for Cyber Physical Systems

Towards a European Strategy for Cyber Physical Systems Towards a European Strategy for Cyber Physical Systems Concertation Workshop on Mixed Criticality Systems and Multicore MultiPARTES Dr. Salvador Trujillo IK4 IKERLAN Project General Information Project

More information

Networking Virtualization Using FPGAs

Networking Virtualization Using FPGAs Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Massachusetts,

More information

Operating Systems 4 th Class

Operating Systems 4 th Class Operating Systems 4 th Class Lecture 1 Operating Systems Operating systems are essential part of any computer system. Therefore, a course in operating systems is an essential part of any computer science

More information

Ada Real-Time Services and Virtualization

Ada Real-Time Services and Virtualization Ada Real-Time Services and Virtualization Juan Zamorano, Ángel Esquinas, Juan A. de la Puente Universidad Politécnica de Madrid, Spain jzamora,aesquina@datsi.fi.upm.es, jpuente@dit.upm.es Abstract Virtualization

More information

ARINC-653 Inter-partition Communications and the Ravenscar Profile

ARINC-653 Inter-partition Communications and the Ravenscar Profile ARINC-653 Inter-partition Communications and the Ravenscar Profile Jorge Garrido jgarrido@dit.upm.es Juan Zamorano jzamora@datsi.fi.upm.es Universidad Politécnica de Madrid (UPM), Spain Juan A. de la Puente

More information

Real Time Programming: Concepts

Real Time Programming: Concepts Real Time Programming: Concepts Radek Pelánek Plan at first we will study basic concepts related to real time programming then we will have a look at specific programming languages and study how they realize

More information

Real-Time Component Software. slide credits: H. Kopetz, P. Puschner

Real-Time Component Software. slide credits: H. Kopetz, P. Puschner Real-Time Component Software slide credits: H. Kopetz, P. Puschner Overview OS services Task Structure Task Interaction Input/Output Error Detection 2 Operating System and Middleware Applica3on So5ware

More information

Replication on Virtual Machines

Replication on Virtual Machines Replication on Virtual Machines Siggi Cherem CS 717 November 23rd, 2004 Outline 1 Introduction The Java Virtual Machine 2 Napper, Alvisi, Vin - DSN 2003 Introduction JVM as state machine Addressing non-determinism

More information

Operatin g Systems: Internals and Design Principle s. Chapter 10 Multiprocessor and Real-Time Scheduling Seventh Edition By William Stallings

Operatin g Systems: Internals and Design Principle s. Chapter 10 Multiprocessor and Real-Time Scheduling Seventh Edition By William Stallings Operatin g Systems: Internals and Design Principle s Chapter 10 Multiprocessor and Real-Time Scheduling Seventh Edition By William Stallings Operating Systems: Internals and Design Principles Bear in mind,

More information

Scheduling. Scheduling. Scheduling levels. Decision to switch the running process can take place under the following circumstances:

Scheduling. Scheduling. Scheduling levels. Decision to switch the running process can take place under the following circumstances: Scheduling Scheduling Scheduling levels Long-term scheduling. Selects which jobs shall be allowed to enter the system. Only used in batch systems. Medium-term scheduling. Performs swapin-swapout operations

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits:

Hypervisors. Introduction. Introduction. Introduction. Introduction. Introduction. Credits: Hypervisors Credits: P. Chaganti Xen Virtualization A practical handbook D. Chisnall The definitive guide to Xen Hypervisor G. Kesden Lect. 25 CS 15-440 G. Heiser UNSW/NICTA/OKL Virtualization is a technique

More information

OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect

OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE Guillène Ribière, CEO, System Architect Problem Statement Low Performances on Hardware Accelerated Encryption: Max Measured 10MBps Expectations: 90 MBps

More information

Proactive, Resource-Aware, Tunable Real-time Fault-tolerant Middleware

Proactive, Resource-Aware, Tunable Real-time Fault-tolerant Middleware Proactive, Resource-Aware, Tunable Real-time Fault-tolerant Middleware Priya Narasimhan T. Dumitraş, A. Paulos, S. Pertet, C. Reverte, J. Slember, D. Srivastava Carnegie Mellon University Problem Description

More information

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada ken@unb.ca Micaela Serra

More information

XTRATUM: AN OPEN SOURCE HYPERVISOR FOR TSP EMBEDDED SYSTEMS IN AEROSPACE

XTRATUM: AN OPEN SOURCE HYPERVISOR FOR TSP EMBEDDED SYSTEMS IN AEROSPACE XTRATUM: AN OPEN SOURCE HYPERVISOR FOR TSP EMBEDDED SYSTEMS IN AEROSPACE A. Crespo 1, I. Ripoll 1, M. Masmano 1, P. Arberet 2, and J.J. Metge 2 1 Instituto de Informática Industrial, Universidad Politécnica

More information

The Temporal Firewall--A Standardized Interface in the Time-Triggered Architecture

The Temporal Firewall--A Standardized Interface in the Time-Triggered Architecture 1 The Temporal Firewall--A Standardized Interface in the Time-Triggered Architecture H. Kopetz TU Vienna, Austria July 2000 Outline 2 Introduction Temporal Accuracy of RT Information The Time-Triggered

More information

Symmetric Multiprocessing

Symmetric Multiprocessing Multicore Computing A multi-core processor is a processing system composed of two or more independent cores. One can describe it as an integrated circuit to which two or more individual processors (called

More information

Distributed Real-time Architecture for Mixed Criticality Systems

Distributed Real-time Architecture for Mixed Criticality Systems Distributed Real-time Architecture for Mixed Criticality Systems Architectural Style of DREAMS D 1.2.1 Project Acronym DREAMS Grant Agreement Number FP7-ICT-2013.3.4-610640 Document Version 1.0 Date 2014-07-31

More information

theguard! ApplicationManager System Windows Data Collector

theguard! ApplicationManager System Windows Data Collector theguard! ApplicationManager System Windows Data Collector Status: 10/9/2008 Introduction... 3 The Performance Features of the ApplicationManager Data Collector for Microsoft Windows Server... 3 Overview

More information

Attaining EDF Task Scheduling with O(1) Time Complexity

Attaining EDF Task Scheduling with O(1) Time Complexity Attaining EDF Task Scheduling with O(1) Time Complexity Verber Domen University of Maribor, Faculty of Electrical Engineering and Computer Sciences, Maribor, Slovenia (e-mail: domen.verber@uni-mb.si) Abstract:

More information

Outline. Introduction. Multiprocessor Systems on Chip. A MPSoC Example: Nexperia DVP. A New Paradigm: Network on Chip

Outline. Introduction. Multiprocessor Systems on Chip. A MPSoC Example: Nexperia DVP. A New Paradigm: Network on Chip Outline Modeling, simulation and optimization of Multi-Processor SoCs (MPSoCs) Università of Verona Dipartimento di Informatica MPSoCs: Multi-Processor Systems on Chip A simulation platform for a MPSoC

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

The Microsoft Windows Hypervisor High Level Architecture

The Microsoft Windows Hypervisor High Level Architecture The Microsoft Windows Hypervisor High Level Architecture September 21, 2007 Abstract The Microsoft Windows hypervisor brings new virtualization capabilities to the Windows Server operating system. Its

More information

Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC

Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC 1 Public ETAS/ESC 2014-02-20 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, reproduction,

More information

Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014)

Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014) Virtualization in the ARMv7 Architecture Lecture for the Embedded Systems Course CSD, University of Crete (May 20, 2014) ManolisMarazakis (maraz@ics.forth.gr) Institute of Computer Science (ICS) Foundation

More information

SQL Server 2012 Optimization, Performance Tuning and Troubleshooting

SQL Server 2012 Optimization, Performance Tuning and Troubleshooting 1 SQL Server 2012 Optimization, Performance Tuning and Troubleshooting 5 Days (SQ-OPT2012-301-EN) Description During this five-day intensive course, students will learn the internal architecture of SQL

More information

A hypervisor approach with real-time support to the MIPS M5150 processor

A hypervisor approach with real-time support to the MIPS M5150 processor ISQED Wednesday March 4, 2015 Session 5B A hypervisor approach with real-time support to the MIPS M5150 processor Authors: Samir Zampiva (samir.zampiva@acad.pucrs.br) Carlos Moratelli (carlos.moratelli@pucrs.br)

More information

Agenda. Michele Taliercio, Il circuito Integrato, Novembre 2001

Agenda. Michele Taliercio, Il circuito Integrato, Novembre 2001 Agenda Introduzione Il mercato Dal circuito integrato al System on a Chip (SoC) La progettazione di un SoC La tecnologia Una fabbrica di circuiti integrati 28 How to handle complexity G The engineering

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

A Data Centric Approach for Modular Assurance. Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011

A Data Centric Approach for Modular Assurance. Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011 A Data Centric Approach for Modular Assurance The Real-Time Middleware Experts Workshop on Real-time, Embedded and Enterprise-Scale Time-Critical Systems 23 March 2011 Gabriela F. Ciocarlie Heidi Schubert

More information

Long-term monitoring of apparent latency in PREEMPT RT Linux real-time systems

Long-term monitoring of apparent latency in PREEMPT RT Linux real-time systems Long-term monitoring of apparent latency in PREEMPT RT Linux real-time systems Carsten Emde Open Source Automation Development Lab (OSADL) eg Aichhalder Str. 39, 78713 Schramberg, Germany C.Emde@osadl.org

More information

Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging

Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.

More information

An Implementation Of Multiprocessor Linux

An Implementation Of Multiprocessor Linux An Implementation Of Multiprocessor Linux This document describes the implementation of a simple SMP Linux kernel extension and how to use this to develop SMP Linux kernels for architectures other than

More information

find model parameters, to validate models, and to develop inputs for models. c 1994 Raj Jain 7.1

find model parameters, to validate models, and to develop inputs for models. c 1994 Raj Jain 7.1 Monitors Monitor: A tool used to observe the activities on a system. Usage: A system programmer may use a monitor to improve software performance. Find frequently used segments of the software. A systems

More information

THROUGHPUTER. Parallel Program Development and Execution Platform as a Service

THROUGHPUTER. Parallel Program Development and Execution Platform as a Service THROUGHPUTER Parallel Program Development and Execution Platform as a Service Many Cloud Computing Challenge - Technical Example: Average demands by applications sharing a 16- processor app1 12.5% Actual

More information

Embedded Systems. 6. Real-Time Operating Systems

Embedded Systems. 6. Real-Time Operating Systems Embedded Systems 6. Real-Time Operating Systems Lothar Thiele 6-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

Principles and characteristics of distributed systems and environments

Principles and characteristics of distributed systems and environments Principles and characteristics of distributed systems and environments Definition of a distributed system Distributed system is a collection of independent computers that appears to its users as a single

More information

Chapter 11 I/O Management and Disk Scheduling

Chapter 11 I/O Management and Disk Scheduling Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization

More information

XtratuM for LEON3: an Open Source Hypervisor for High Integrity Systems

XtratuM for LEON3: an Open Source Hypervisor for High Integrity Systems XtratuM for LEON3: an Open Source Hypervisor for High Integrity Systems Miguel Masmano, Ismael Ripoll, Alfons Crespo and Salvador Peiro Instituto de Informática Industrial. Universidad Politécnica de Valencia.

More information

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE

MODULE 3 VIRTUALIZED DATA CENTER COMPUTE MODULE 3 VIRTUALIZED DATA CENTER COMPUTE Module 3: Virtualized Data Center Compute Upon completion of this module, you should be able to: Describe compute virtualization Discuss the compute virtualization

More information

An Oracle White Paper July 2014. Oracle Database 12c: Meeting your Performance Objectives with Quality of Service Management

An Oracle White Paper July 2014. Oracle Database 12c: Meeting your Performance Objectives with Quality of Service Management An Oracle White Paper July 2014 Oracle Database 12c: Meeting your Performance Objectives with Quality of Service Management Introduction... 1 Overview of Oracle Database QoS Management... 1 Benefits of

More information

Real-Time Scheduling 1 / 39

Real-Time Scheduling 1 / 39 Real-Time Scheduling 1 / 39 Multiple Real-Time Processes A runs every 30 msec; each time it needs 10 msec of CPU time B runs 25 times/sec for 15 msec C runs 20 times/sec for 5 msec For our equation, A

More information

SYSTEM ecos Embedded Configurable Operating System

SYSTEM ecos Embedded Configurable Operating System BELONGS TO THE CYGNUS SOLUTIONS founded about 1989 initiative connected with an idea of free software ( commercial support for the free software ). Recently merged with RedHat. CYGNUS was also the original

More information

Do AUTOSAR and functional safety rule each other out?

Do AUTOSAR and functional safety rule each other out? Software development Do AUTOSAR and functional safety rule each other out? While simplicity is a factor in safety-critical applications, AUTOSAR has over 6,000 configuration parameters and well over 100,000

More information

USB readout board for PEBS Performance test

USB readout board for PEBS Performance test June 11, 2009 Version 1.0 USB readout board for PEBS Performance test Guido Haefeli 1 Li Liang 2 Abstract In the context of the PEBS [1] experiment a readout board was developed in order to facilitate

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

Real-Time Operating Systems for MPSoCs

Real-Time Operating Systems for MPSoCs Real-Time Operating Systems for MPSoCs Hiroyuki Tomiyama Graduate School of Information Science Nagoya University http://member.acm.org/~hiroyuki MPSoC 2009 1 Contributors Hiroaki Takada Director and Professor

More information

EECatalog SPECIAL FEATURE

EECatalog SPECIAL FEATURE Type Zero Hypervisor the New Frontier in Embedded Virtualization The hypervisor s full control over the hardware platform and ability to virtualize hardware platforms are beneficial in environments that

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Technical Note. Micron NAND Flash Controller via Xilinx Spartan -3 FPGA. Overview. TN-29-06: NAND Flash Controller on Spartan-3 Overview

Technical Note. Micron NAND Flash Controller via Xilinx Spartan -3 FPGA. Overview. TN-29-06: NAND Flash Controller on Spartan-3 Overview Technical Note TN-29-06: NAND Flash Controller on Spartan-3 Overview Micron NAND Flash Controller via Xilinx Spartan -3 FPGA Overview As mobile product capabilities continue to expand, so does the demand

More information

Tools Page 1 of 13 ON PROGRAM TRANSLATION. A priori, we have two translation mechanisms available:

Tools Page 1 of 13 ON PROGRAM TRANSLATION. A priori, we have two translation mechanisms available: Tools Page 1 of 13 ON PROGRAM TRANSLATION A priori, we have two translation mechanisms available: Interpretation Compilation On interpretation: Statements are translated one at a time and executed immediately.

More information

Design and Implementation of the Heterogeneous Multikernel Operating System

Design and Implementation of the Heterogeneous Multikernel Operating System 223 Design and Implementation of the Heterogeneous Multikernel Operating System Yauhen KLIMIANKOU Department of Computer Systems and Networks, Belarusian State University of Informatics and Radioelectronics,

More information

159.735. Final Report. Cluster Scheduling. Submitted by: Priti Lohani 04244354

159.735. Final Report. Cluster Scheduling. Submitted by: Priti Lohani 04244354 159.735 Final Report Cluster Scheduling Submitted by: Priti Lohani 04244354 1 Table of contents: 159.735... 1 Final Report... 1 Cluster Scheduling... 1 Table of contents:... 2 1. Introduction:... 3 1.1

More information

Memory Access Control in Multiprocessor for Real-time Systems with Mixed Criticality

Memory Access Control in Multiprocessor for Real-time Systems with Mixed Criticality Memory Access Control in Multiprocessor for Real-time Systems with Mixed Criticality Heechul Yun +, Gang Yao +, Rodolfo Pellizzoni *, Marco Caccamo +, Lui Sha + University of Illinois at Urbana and Champaign

More information

TCP Servers: Offloading TCP Processing in Internet Servers. Design, Implementation, and Performance

TCP Servers: Offloading TCP Processing in Internet Servers. Design, Implementation, and Performance TCP Servers: Offloading TCP Processing in Internet Servers. Design, Implementation, and Performance M. Rangarajan, A. Bohra, K. Banerjee, E.V. Carrera, R. Bianchini, L. Iftode, W. Zwaenepoel. Presented

More information

Memory Isolation in Many-Core Embedded Systems

Memory Isolation in Many-Core Embedded Systems Memory Isolation in Many-Core Embedded Systems Juan Zamorano and Juan A. de la Puente Universidad Politécnica de Madrid (UPM), Abstract. The current approach to developing mixed-criticality systems is

More information

A Dynamic Link Allocation Router

A Dynamic Link Allocation Router A Dynamic Link Allocation Router Wei Song and Doug Edwards School of Computer Science, the University of Manchester Oxford Road, Manchester M13 9PL, UK {songw, doug}@cs.man.ac.uk Abstract The connection

More information

Optimizing Performance. Training Division New Delhi

Optimizing Performance. Training Division New Delhi Optimizing Performance Training Division New Delhi Performance tuning : Goals Minimize the response time for each query Maximize the throughput of the entire database server by minimizing network traffic,

More information

EFFICIENT EXTERNAL SORTING ON FLASH MEMORY EMBEDDED DEVICES

EFFICIENT EXTERNAL SORTING ON FLASH MEMORY EMBEDDED DEVICES ABSTRACT EFFICIENT EXTERNAL SORTING ON FLASH MEMORY EMBEDDED DEVICES Tyler Cossentine and Ramon Lawrence Department of Computer Science, University of British Columbia Okanagan Kelowna, BC, Canada tcossentine@gmail.com

More information

Real-time Operating Systems. VO Embedded Systems Engineering Armin Wasicek 11.12.2012

Real-time Operating Systems. VO Embedded Systems Engineering Armin Wasicek 11.12.2012 Real-time Operating Systems VO Embedded Systems Engineering Armin Wasicek 11.12.2012 Overview Introduction OS and RTOS RTOS taxonomy and architecture Application areas Mixed-criticality systems Examples:

More information

Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems

Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems Using VMware VMotion with Oracle Database and EMC CLARiiON Storage Systems Applied Technology Abstract By migrating VMware virtual machines from one physical environment to another, VMware VMotion can

More information

AXI Performance Monitor v5.0

AXI Performance Monitor v5.0 AXI Performance Monitor v5.0 LogiCORE IP Product Guide Vivado Design Suite Table of Contents IP Facts Chapter 1: Overview Advanced Mode...................................................................

More information

10.04.2008. Thomas Fahrig Senior Developer Hypervisor Team. Hypervisor Architecture Terminology Goals Basics Details

10.04.2008. Thomas Fahrig Senior Developer Hypervisor Team. Hypervisor Architecture Terminology Goals Basics Details Thomas Fahrig Senior Developer Hypervisor Team Hypervisor Architecture Terminology Goals Basics Details Scheduling Interval External Interrupt Handling Reserves, Weights and Caps Context Switch Waiting

More information

Advanced Core Operating System (ACOS): Experience the Performance

Advanced Core Operating System (ACOS): Experience the Performance WHITE PAPER Advanced Core Operating System (ACOS): Experience the Performance Table of Contents Trends Affecting Application Networking...3 The Era of Multicore...3 Multicore System Design Challenges...3

More information

Performance Tuning Guide for ECM 2.0

Performance Tuning Guide for ECM 2.0 Performance Tuning Guide for ECM 2.0 Rev: 20 December 2012 Sitecore ECM 2.0 Performance Tuning Guide for ECM 2.0 A developer's guide to optimizing the performance of Sitecore ECM The information contained

More information

Delivering Quality in Software Performance and Scalability Testing

Delivering Quality in Software Performance and Scalability Testing Delivering Quality in Software Performance and Scalability Testing Abstract Khun Ban, Robert Scott, Kingsum Chow, and Huijun Yan Software and Services Group, Intel Corporation {khun.ban, robert.l.scott,

More information

POSIX. RTOSes Part I. POSIX Versions. POSIX Versions (2)

POSIX. RTOSes Part I. POSIX Versions. POSIX Versions (2) RTOSes Part I Christopher Kenna September 24, 2010 POSIX Portable Operating System for UnIX Application portability at source-code level POSIX Family formally known as IEEE 1003 Originally 17 separate

More information

Chapter 02: Computer Organization. Lesson 04: Functional units and components in a computer organization Part 3 Bus Structures

Chapter 02: Computer Organization. Lesson 04: Functional units and components in a computer organization Part 3 Bus Structures Chapter 02: Computer Organization Lesson 04: Functional units and components in a computer organization Part 3 Bus Structures Objective: Understand the IO Subsystem and Understand Bus Structures Understand

More information

Middleware. Peter Marwedel TU Dortmund, Informatik 12 Germany. technische universität dortmund. fakultät für informatik informatik 12

Middleware. Peter Marwedel TU Dortmund, Informatik 12 Germany. technische universität dortmund. fakultät für informatik informatik 12 Universität Dortmund 12 Middleware Peter Marwedel TU Dortmund, Informatik 12 Germany Graphics: Alexandra Nolte, Gesine Marwedel, 2003 2010 年 11 月 26 日 These slides use Microsoft clip arts. Microsoft copyright

More information

Optimizing Configuration and Application Mapping for MPSoC Architectures

Optimizing Configuration and Application Mapping for MPSoC Architectures Optimizing Configuration and Application Mapping for MPSoC Architectures École Polytechnique de Montréal, Canada Email : Sebastien.Le-Beux@polymtl.ca 1 Multi-Processor Systems on Chip (MPSoC) Design Trends

More information

FPGA-based Multithreading for In-Memory Hash Joins

FPGA-based Multithreading for In-Memory Hash Joins FPGA-based Multithreading for In-Memory Hash Joins Robert J. Halstead, Ildar Absalyamov, Walid A. Najjar, Vassilis J. Tsotras University of California, Riverside Outline Background What are FPGAs Multithreaded

More information

Interconnection Networks

Interconnection Networks Advanced Computer Architecture (0630561) Lecture 15 Interconnection Networks Prof. Kasim M. Al-Aubidy Computer Eng. Dept. Interconnection Networks: Multiprocessors INs can be classified based on: 1. Mode

More information

Multicore Programming with LabVIEW Technical Resource Guide

Multicore Programming with LabVIEW Technical Resource Guide Multicore Programming with LabVIEW Technical Resource Guide 2 INTRODUCTORY TOPICS UNDERSTANDING PARALLEL HARDWARE: MULTIPROCESSORS, HYPERTHREADING, DUAL- CORE, MULTICORE AND FPGAS... 5 DIFFERENCES BETWEEN

More information

Debugging A MotoHawk Application using the Application Monitor

Debugging A MotoHawk Application using the Application Monitor CONTROL SYSTEM SOLUTIONS Debugging A MotoHawk Application using the Application Monitor Author(s): New Eagle Consulting 3588 Plymouth Road, #274 Ann Arbor, MI 48105-2603 Phone: +1 (734) 929-4557 Ben Hoffman

More information

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:

More information

Virtualization. Dr. Yingwu Zhu

Virtualization. Dr. Yingwu Zhu Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the

More information

Computer System Design. System-on-Chip

Computer System Design. System-on-Chip Brochure More information from http://www.researchandmarkets.com/reports/2171000/ Computer System Design. System-on-Chip Description: The next generation of computer system designers will be less concerned

More information

Resource Efficient Computing for Warehouse-scale Datacenters

Resource Efficient Computing for Warehouse-scale Datacenters Resource Efficient Computing for Warehouse-scale Datacenters Christos Kozyrakis Stanford University http://csl.stanford.edu/~christos DATE Conference March 21 st 2013 Computing is the Innovation Catalyst

More information

Chapter 1 Computer System Overview

Chapter 1 Computer System Overview Operating Systems: Internals and Design Principles Chapter 1 Computer System Overview Eighth Edition By William Stallings Operating System Exploits the hardware resources of one or more processors Provides

More information

VxWorks Guest OS Programmer's Guide for Hypervisor 1.1, 6.8. VxWorks GUEST OS PROGRAMMER'S GUIDE FOR HYPERVISOR 1.1 6.8

VxWorks Guest OS Programmer's Guide for Hypervisor 1.1, 6.8. VxWorks GUEST OS PROGRAMMER'S GUIDE FOR HYPERVISOR 1.1 6.8 VxWorks Guest OS Programmer's Guide for Hypervisor 1.1, 6.8 VxWorks GUEST OS PROGRAMMER'S GUIDE FOR HYPERVISOR 1.1 6.8 Copyright 2009 Wind River Systems, Inc. All rights reserved. No part of this publication

More information

Operating Systems. III. Scheduling. http://soc.eurecom.fr/os/

Operating Systems. III. Scheduling. http://soc.eurecom.fr/os/ Operating Systems Institut Mines-Telecom III. Scheduling Ludovic Apvrille ludovic.apvrille@telecom-paristech.fr Eurecom, office 470 http://soc.eurecom.fr/os/ Outline Basics of Scheduling Definitions Switching

More information

Hardware Implementation of Improved Adaptive NoC Router with Flit Flow History based Load Balancing Selection Strategy

Hardware Implementation of Improved Adaptive NoC Router with Flit Flow History based Load Balancing Selection Strategy Hardware Implementation of Improved Adaptive NoC Rer with Flit Flow History based Load Balancing Selection Strategy Parag Parandkar 1, Sumant Katiyal 2, Geetesh Kwatra 3 1,3 Research Scholar, School of

More information