Scheduling algorithm for delay and jitter reduction of periodic tasks in real-time systems
Real-time systems, especially software control systems, are developed to meet the requirements of real-time automation systems. One such crucial requirement is reducing the delay and jitter of periodic tasks in such systems. In this paper, we present a new method for reducing delays and jitters of periodic tasks, which are enforced by the operating system, control tasks, kernel mechanisms, etc. Our algorithm is evaluated and compared with other scheduling algorithms in terms of jitter. The effectiveness of our algorithm is confirmed by the experimental results. Streszczenie. W pracy przedstawiono algorytm szeregowania dla redukcji fluktuacji i opóźnień zadań okresowych w systemach czasu rzeczywistego. Zastosowanie takiego algorytmu gwarantuje przewidywalność oraz poprawia efektywność działania systemów. Dodatkowo dzięki niemu jest możliwe zmniejszenie fluktuacji czasu odpowiedzi zadań okresowych. Możliwości działania prezentowanego algorytmu zostały potwierdzone w badaniach symulacyjnych. (Algorytm szeregowania dla redukcji fluktuacji i opóźnień zadań okresowych w systemach czasu rzeczywistego) Keywords: scheduling algorithms, real-time systems, periodic tasks, reducing the delay and jitter of periodic tasks. Słowa kluczowe: algorytmy szeregowania, systemy czasu rzeczywistego, redukcja fluktuacji i opóźnień zadań okresowych. Introduction In real-time control applications many periodic tasks are executed which are associated with periodic activities such as periodic execution of control tasks, action planning, etc. These tasks are periodically invoked by the scheduler implemented in the kernel of the operating system. The factors which degraduate the performance of realtime systems are delays and jitter appearing during the execution of periodic tasks. A jitter can be interpreted as disturbances acting upon the system which as a result of interrupts, calls of the operating system kernel, the activities of the scheduler, control program[...]
EFFECTIVE POWER ALLOCATION FOR OFDM-BASED GREEN COGNITIVE RADIO NETWORKS WITH RATE LOSS CONSTRAINTS DOI:10.15199/59.2015.8-9.22
In this paper, we study a new power allocation
scheme for OFDM-based green cognitive radio networks
(CRNs). Due to the secondary transmission, the primary
users (PUs) and the secondary users (SUs) cause mutual interference.
Instead of using the conventional interference
power constraint (IPC) to protect the PUs in the primary
system, we propose a criterion in the form of an upper
bound on the rate loss of PU due the SU transmission. Under
the suggested constraints along with the SUs transmission
constraint, the effective power allocation scheme in
green CRN for the SU to maximise its transmission rate is
given.
1. INTRODUCTION
A cognitive radio (CR) is a new concept for the
wireless communication system. The idea of CR was
first presented by J. Mitola III and G.Q. Maquire [1].
Later S. Haykin [2] treated CR as brain-empowered
wireless communications. The main goal of CR is to
improve the utilisation of a natural resource: the radio
electromagnetic spectrum.
CR is considered as a future radio technology that
should be aware of its surrounding environment and
internal state. Moreover, the CR system may be deployed
and distributed in network, ad hoc, and mesh
architectures. Thus, it serves both - licensed (primary
users, PUs) and unlicensed users (secondary users,
SUs). On the other hand, the CR network should be
capable of using bands assigned to unlicensed users and
utilising the licensed part of a radio spectrum without
harmful interference.
In CR, the secondary users need to sense the idle
channel. Once an idle channel is sensed, the secondary
system will access this channel. Recently, SUs are allowed
to transmit their data with the PU over the same
spectrum band simultaneously on condition that the
resultant interference at the PU receiver is below tolerable
interference threshold. This kind of architecture is
referred to as spectrum underlay [3]. Otherwise, in this
approach simultaneous cognitive and non cognitive
[...]
ELLIPTIC CURVE CRYPTOGRAPHY SYSTEMS AND THEIR HARDWARE IMPLEMENTATIONS IN WIRELESS AD HOC AND SENSOR NETWORKS DOI:10.15199/59.2015.8-9.111
Elliptic curve cryptography (ECC) is a complex
computational method and before its implementation some
parameters have to be selected. Several software implementations
of ECC systems have been realised. Nevertheless,
the most popular in the wireless ad hoc and sensor networks
are demands in the hardware implementations. Most
of them are implemented on Application Specific Integrated
Circuits (ASIC) and only two were implemented on
Field Programmable Gate Array (FPGA). This paper surveys
the ECC systems and investigates different implementations
on wireless ad hoc and sensor networks.
1. INTRODUCTION
Ad hoc networks have received their name due to
the fact that there is no predefined structure or infrastructure
of communication, but they consist of nodes that
relay information to their neighbours possibly on behalf
of other neighbours. Typical ad hoc networks are composed
of heterogeneous mobile devices, such as cellular
phones, PDAs, laptops, etc. and fixed equipment (base
stations, access points, etc.). Wireless sensor networks
(WSNs) are a particular type of ad hoc networks, in
which the nodes are equipped with sensing facilities
(thermometer, sensing device, etc.).
A necessary component of wireless ad hoc and sensor
networks is the ability to reliably authenticate the
communication between the nodes and other network
entities. The provision of security services such as authentication,
confidentiality, integrity is critical in order
to deploy the wireless ad hoc and wireless sensor networks
in commercial or military environments. Some
traditional security mechanisms, such as authentication
protocols, digital signature and encryption are used in
the ad hoc networks [1]. However, these mechanisms are
not sufficient by themselves.
Security requirements are mainly satisfied in WSNs
through a symmetric key cryptography [2, 3]. These protocols
are based on the keys concept. However, due to
the limitation on memory resources[...]
AN EFFICIENT RESOURCE ALLOCATION ALGORITHM WITH QoS REQUIREMENTS IN MULTICARRIER-BASED COGNITIVE RADIO NETWORKS DOI:10.15199/59.2016.8-9.63
An orthogonal frequency-division multipleaccess-
based cognitive radio (CR) network is considered in
this study, where primary users (PUs) dynamically sense
the spectrum and opportunistically use the available channels.
The objective is to maximise the CR network
throughput under the PUs maximum interference constraint.
The optimal resource allocation problem for this
network with QoS requirements is presented and an algorithm
is proposed. Simulations confirm that the proposed
algorithm is nearly the optimal solution.
Streszczenie: W artykule przedstawiono kognitywne sieci
radiowe z modulacją OFDMA, w których licencjonowani
użytkownicy (PUs) mogą badać widmo elektromagnetyczne
i wykorzystywać dostępne kanały transmisji. W artykule
sformułowano problem maksymalizacji przepustowości
kognitywnej sieci radiowej, uwzględniając ograniczenia
powodowane zakłóceniami i wymaganiami transmisji multimedialnej.
Jako rozwiązanie problemu przedstawiono
algorytm alokacji zasobów. Przeprowadzona symulacja
potwierdziła, że zaproponowany algorytm jest prawie optymalnym
rozwiązaniem tego zagadnienia.
Keywords: cognitive radio networks, quality of service,
resource allocation, optimization
Słowa kluczowe: kognitywne sieci radiowe, jakość usługi,
alokacja zasobów, optymalizacja
1. INTRODUCTION
Most current wireless applications widely exploit
the spectrum, but investigations show that many licensed
frequency bands are far underutilised [1]. Cognitive
radio (CR), a technique first introduced by J. Mitola [2],
is a promising technology to solve the problem with
underutilised spectrum. The CR nodes allow to share the
spectrum with licensed primary user (PU) nodes and
adapt their transmission characteristics according to the
instantaneous behaviour of licensed users. The CR networks,
based on the CR devices, can improve the overall
spectral utilisation. However, the maximisation of
the throughput of the network leads to the undesirable
interfer[...]
A RESOURCE ALLOCATION ALGORITHM FOR SVC CODING MULTICAST OVER HETEROGENEOUS CELLULAR NETWORKS DOI:10.15199/59.2016.8-9.72
This paper presents a joint adaptive modulation
and coding (AMC) and power allocation problem in heterogeneous
cellular networks from scalable video coding
(SVC) video multicast transmission. Then, the problem for
joint power control and modulation and coding scheme
(MCS) for each sub-channel for SVC video multicast is
detailed. As a solution of this problem, an algorithm is
proposed to maximise the defined utility of the system. The
simulation study shows that its performance is comparable
to other solutions.
Streszczenie: W artykule przedstawiono zagadnienie alokacji
mocy oraz przydzielania stosownego schematu modulacji
i kodowania (AMC) w heterogenicznych sieciach komórkowych
z transmisją multikastową. Jako rozwiązanie
problemu zaproponowano algorytm maksymalizujący
zdefiniowaną użyteczność systemu. Badania symulacyjne
pokazują, że uzyskane wydajność jest porównywalna
z innymi metodami.
Keywords: scalable video multicast, power allocation problem,
adaptive modulation and coding, heterogeneous cellular
networks.
Słowa kluczowe: skalowalna transmisja multikastowa
wideo, zagadnienie alokacji mocy, adaptacyjna modulacja
i kodowanie, heterogeniczne sieci komórkowe
1. INTRODUCTION
Most modern mobile devices have the capabilities
to receive different frequency bands. For instance,
smartphones can be connected to 5 G or 4 G LTE, laptops
that use the Wi-MAX networks, etc. Moreover,
most cities are covered by 4 G or 3 G wireless technology,
where additionally numerous Wi-Fi hot spots are
operating. All this makes that we are dealing with an
infrastructure, which is defined as heterogeneous cellular
networks [1], [2]. Very often, the different types of networks
are owned by the same operator. This means that
there may be cooperation between base stations belonging
to different networks, which in total can greatly
improve the efficiency of the whole network.
The multicast technique is an efficient mechanism
for video transmiss[...]
ENERGY-AWARE RESOURCE ALLOCATION IN CLOUD COMPUTING ENVIRONMENTS DOI:10.15199/59.2017.8-9.79
Cloud computing provides applications, hardware
platforms, and infrastructure to a large number of private
and corporate users. Most of them expect an efficient
service from cloud providers, including low cost of ownership.
Moreover, the implementation of a number of
computing clouds is linked to a number of objectives,
such as quality of service, cost-effectiveness, or energy
savings. Including these goals, often contradictory, is
a serious challenge for cloud computing designers.
It is recalled that cloud computing can be defined as
‘a type of parallel and distributed system consisting of
a collection of inter-connected and virtualized computers
that are dynamically provisioned, and presented as one
or more unified computing resources based on servicelevel
agreements established through negotiation between
the service provider and consumers’ [1]. An
available example of a cloud computing infrastructure
platforms is Microsoft Azure [2], Google App Engine
[3], Aneka [4], etc.
The quality of the cloud computing determines the
performance of the entire system. If the provider does
Fig. 1. Layered cloud computing architecture.
not provide service according to Service Level Agreements
(SLAs) [5], then the clients will depart from it to
find such a service elsewhere. So the key is an efficient
resource allocation system. Fig. 1 shows the architecture
of a typical cloud computing environment. Its first part is
the customers who can rent Virtual Machines (VMs)
from cloud providers. During the rental period, customers
specify their desire. The key element of the cloud is
the scheduler, whose purpose is to schedule the VM
requests and connection requests in the fastest possible
way. At the same time, requirements such as energy
savings or QoS constraints must be met. An attempt to
summarize the challenges awaiting designers of cloud
computing is presented in the article [6].
The crucial problem of the cloud computing [...]
OPTIMAL POWER ALLOCATION FOR COGNITIVE LTE-FEMTOCELL NETWORKS BASED ON GAME THEORY DOI:10.15199/59.2017.8-9.90
According to the research study given by ATT [1], 70
percent of data services will take place indoors in the
next years. Therefore, it is becoming increasingly important
to conduct research into the development of the
femtocell network, to increase their capabilities, especially
for the transmission of multimedia data, which is
characterized by the requirements described by the QoS
parameters. Moreover, the provision of high transmission
capacity to each femtocell requires good, proven
techniques, as evidenced by the research papers [2], [3].
Femtocells are cost-effective, small-coverage networking
systems, where a femtocell access point (FAP)
or femtocell base station is localised at home or in an
office. They are connected to a service provider's internet
network. The entire overlaid network is referred as a
two-tier femtocell network [2]. To fully exploit the benefits
of the two-tier architecture, the problems of resource
allocation (power control, rate allocation, etc.) are a big
challenge for achieving a significant performance level
and minimal electricity consumption.
Cognitive femtocells are a promising new technique
that allows for even better use of radio resources [5].
They have been studied, among others, by [6], [7], [8].
In the first paper, presented by N. K. Gupta et al. [6]
power control and subcarrier allocation for an OFDMA
based underlay cognitive radio network was introduced.
An admission control and channel allocation algorithm
based on particle swarm optimization for cognitive cellular
networks has been described by A. Martínez-Vargas
et al. [7]. In the paper by S. Saadat et al. [8] a QoS guaranteed
resource allocation scheme for cognitive
femtocells in LTE networks has been proposed. The
interference mitigation in the cognitive radio-based
femtocells has been carried out by Kpojime et al. [9].
The main goal of this paper is to introduce a new
optimal power allocation scheme in the femtocell network.[...]
ANALYSIS OF ENERGY HARVESTING IN COGNITIVE FEMTOCELL RADIO NETWORK DOI:10.15199/59.2018.6.58
1. INTRODUCTION
A cognitive radio (CR) [1] is a wireless device that
senses the surrounding radio environment and opportunistically
accesses the unutilised spectrum bands based on
its assessment of the activities of the surrounding primary
(licensed) network. Otherwise, CR is a system that
senses its operational electromagnetic environment and
can dynamically and autonomously adjust its radio operating
parameters to modify system operation, such as
maximise throughput, mitigate interference, etc.
Cognitive radio networks (CRNs) are foreseen as
the future of wireless communication. In CRN a secondary
(unlicensed) user (SU) in the secondary network
is allowed to access the spectrum that is originally
allocated to the primary users (PUs) when the spectrum
is not used by any PU. This secondary spectrum
usage method is called opportunistic spectrum
access [2]. In this way, the spectrum utilisation efficiency
can be greatly improved. Moreover, this is a very
crucial feature of CR networks which allow users to
operate in licensed bands without a license.
CR devices and femtocell system is a very promising
technology for possible use in two-tier cognitive
femtocell networks [3]. Then, a dynamic and opportunistic
access to free frequencies is possible using the socalled
holes. Two-tiered cognitive radio networks provide
a high cell capacity at a low cost of construction [4].
Examples of such networks can be found among the
various home hotspots and urban hot spots [5]. The
femtocell radio range ranges from 10 to 50 m, while the
radius of the macrocell reaches a value of from 300 to
2000 m [6].
Recently, it has been reported in the literature that
harvesting energy can be achieved from other ambient
sources such as wind, solar, vibration, etc. As presented
in the paper by Vullers et al. [7] radio-frequency (RF)
signals can power a network of low-power devices. Furthermore,
the amount of energy harvested from the primary
channel [...]
RESOURCE ALLOCATION IN LTE-UNLICENSED FEMTOCELL NETWORKS DOI:
As it has been noted, the global traff c is more than
doubling each year and the mobile industry needs to
prepare for 1000 times as much traff c by 2000 [1]. To
meet such big demands, both industry and academia
are looking for enormous network capacities that have
met such huge f ow increases. Among others, it was
proposed carrier aggregation (CA) technology [2],
which is standarized in Long Term Evolution (LTE)
Release 10-12, aggregates multiple small band segments
into maximum 100 MHz virtual bandwidth to achieve a
higher data rate.
For cellular networks carrier aggregation can be
used to combine the huge amount of WiFi spectrum with
cellular LTE band, so that it signif cantly increases the
bitrate of users [3]. This concept, called LTE-U, allows
to improve the throughput of cellular users by providing
them higher bandwidth, but it deteriorates the performance
of existing WiFi users. This is due, among other
things, the fact that CSMA/CA mechanism delays the
transmission of WiFi users resulted from the increased
competition for channel access from cellular users.
In the paper by W. J. Hillery et al. [4] a network performance
study of LTE in unlicensed spectrum has been
studied. The authors of the paper [5] have shown that
the performance of WiFi is more vulnerable to LTE interference
while the performance of LTE users is degraded.
Listen-Before-Talk (LBT) protocol as an essential mechanism
that allows WiFi and LTE systems to share the unlicensed
band while maintaining the performance of each
individual system has been proposed by Chung K. Kim
et al. [6].
Recently, a Q-reinforcement learning method was
presented by C. Dhahri et al. [7] for a non-stationary
femtocell network. The same method was presented for
licensed-assisted access of LTE in the unlicensed spectrum
to achieve satisfactionary throughput in both LTE
and WiFi was proposed by N. Rupasinghe [8]. In turn,
the performance of various network architectures suc[...]
ANALIZA WYDAJNO´SCI SYSTEMU KOMUNIKACYJNEGO WSPÓŁPRACUJA˛CEGO Z RADAREM MIMO DOI:10.15199/59.2019.6.41
1. WPROWADZENIE
Rozwój systemów komunikacji bezprzewodowej
umo˙zliwia powstawanie coraz nowszych zastosowa´n
znanych juz˙ urza˛dzen´ radiowych. Przewiduje sie˛, z˙e
liczba tego typu rza˛dzen´ sie˛gnie milionów sztuk. Dotyczy
to takz˙e radarów, które znajda˛ sie˛ w szerokim
uz˙yciu z chwila˛ upowszechnienia sie˛ autonomicznych
samochodów [1]. Dzi˛eki nim autonomiczny samochód
be˛dzie mógł uzyskiwac´ informacje dotycza˛ce przeszkód
terenowych czy innych pojazdów, które b˛edzie mo˙zna
dalej analizowa´c przy u˙zyciu pokładowego komputera.
Stosowane obecnie aplikacje radarowe działaja˛w pas´mie
S (2 - 4 GHz) (tzw. 10-centymetrowe systemy radarowe)
oraz pa´smie L (4 - 8 GHz) (tzw. 20-centymetrowe systemy
radarowe), co oznacza, z˙e współdziela˛ one cze˛stotliwo
´sci u˙zywane w systemach naziemnej cyfrowej
transmisji radiowej DAB czy bezprzewodowych sieciach
komputerowych (IEEE 802.11, IEEE 802.16).
Współczesne systemy radarowe moga˛ posiadac´
współdzielony kanał radiowy, co oznacza, z˙e moga˛
dokonywa´c transmisji danych, ale po wykryciu sygnału
radarowego zaprzestaja˛ transmisji i przesyłaja˛ tylko impulsy
radarowe. Technika ta została przedstawiona w
pracy R. Saruthirathanaworakun i in. [2]. W pracy S.
Sodari i in. [3] zaproponowano metod˛e projekcji NSP
(Null Space Projection) dla jednoczesnego współdziałania
radaru typu MIMO oraz stacji bazowej. W dalszych
badaniach, przeprowadzonych m.in. przez A.
Kluwera i in. [4], zbadano efektywno´s´c detekcji obiektów
przy u˙zyciu radaru MIMO. W pracy J. A. Mahala
i in. [5] zaproponowanometode˛ ła˛czenia radarówMIMO
oraz systemów komórkowych wykorzystuja˛cych technik
˛e MIMO.
W innych badaniach rozwia˛zano problem współistnienia
radaruMIMO i komunikacji z wieloma u˙zytkownikami
w systemach MIMO poprzez wprowadzenie
wia˛zki radarowej z niepełna˛ informacja˛ o stanie kanału
(ang. imperfect channel state information, CSI) [6].
W kolejnej pracy [7] zaproponowano nowy projekt formowania
[...]