Next Article in Journal
An Improved Force Feedback Control Algorithm for Active Tendons
Next Article in Special Issue
Formal Specification and Validation of a Hybrid Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks
Previous Article in Journal
A Self-Optimizing Scheme for Energy Balanced Routing in Wireless Sensor Networks Using SensorAnt
Previous Article in Special Issue
Complete Scene Recovery and Terrain Classification in Textured Terrain Meshes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy-Efficient Scheduling for Hybrid Tasks in Control Devices for the Internet of Things

1
College of Computer Science, Hangzhou Dianzi University, Hangzhou 310018, China
2
College of Informatics & Electronics, Zhejiang Sci-Tech University, Hangzhou 310018, China
*
Author to whom correspondence should be addressed.
Sensors 2012, 12(8), 11334-11359; https://doi.org/10.3390/s120811334
Submission received: 19 June 2012 / Revised: 1 August 2012 / Accepted: 6 August 2012 / Published: 17 August 2012
(This article belongs to the Special Issue Ubiquitous Sensing)

Abstract

: In control devices for the Internet of Things (IoT), energy is one of the critical restriction factors. Dynamic voltage scaling (DVS) has been proved to be an effective method for reducing the energy consumption of processors. This paper proposes an energy-efficient scheduling algorithm for IoT control devices with hard real-time control tasks (HRCTs) and soft real-time tasks (SRTs). The main contribution of this paper includes two parts. First, it builds the Hybrid tasks with multi-subtasks of different function Weight (HoW) task model for IoT control devices. HoW describes the structure of HRCTs and SRTs, and their properties, e.g., deadlines, execution time, preemption properties, and energy-saving goals, etc. Second, it presents the Hybrid Tasks' Dynamic Voltage Scaling (HTDVS) algorithm. HTDVS first sets the slowdown factors of subtasks while meeting the different real-time requirements of HRCTs and SRTs, and then dynamically reclaims, reserves, and reuses the slack time of the subtasks to meet their ideal energy-saving goals. Experimental results show HTDVS can reduce energy consumption about 10%–80% while meeting the real-time requirements of HRCTs, HRCTs help to reduce the deadline miss ratio (DMR) of systems, and HTDVS has comparable performance with the greedy algorithm and is more favorable to keep the subtasks' ideal speeds.

1. Introduction

The term IoT first appeared in the white papers of Auto-ID Center about the Electronic Product Code (EPC) by Brock in 2001 [1]. From then on, IoT has been applied to areas far beyond logistics and permeated into every aspect of industrial production and our social lives, e.g., from industrial plants to healthcare, from assisted driving to intelligent homes [2]. Different from the traditional Internet which only connects computers, IoT implements widely interconnection between human beings, computers, and things, and provides intelligent computing and services for people [3].

Today, the IoT is regarded as an extension of ubiquitous computing [4]. Because of the need of improving ubiquitous ability or controlling effects, there are sensors, controllers and actuators in many IoT systems. In these IoT systems, sensing is often for the purpose of better controlling, and controlling is often for better sensing or working. For example, an Android mobile phone may have up to 10 kinds of sensors, such as accelerometers, gyroscopes, light sensors, etc. The Android mobile phone can control the status of its lenses, images, or menus to be convenient to use according to the values measured by its sensors. In fact, the above three components often consist of sensor/actuator networks (SANs). In SANs, the sensors and the actuators can communicate with the controllers by wired or wireless links. The sensors are often composed of nodes with low computing capability and low power. The sensors are used to monitor the states of the environment or physical systems, and send the sensed information to the controllers. Therefore, the sensors act as the bridges between physical and digital world [2]. The controllers are responsible for analyzing the information coming from the sensors, and recognizing the states of the environment or physical systems. After that, the controllers calculate the control parameters and send control commands to the actuators. The controllers usually have strong computing capability in order to run computation-intensive tasks. The actuators can adjust the states of the environment or physical systems by performing appropriate actions. In spite of being limited in number, the controllers play critical roles in SANs. On the one hand, they have important influence on the availability of SANs because they are the relay between the sensors and the actuators. On the other hand, they are closely involved in the control effects because multiple tasks may lead to larger response time jitters. In this paper, we call the controllers in SANs the control devices of the IoT. These devices are purely hard real-time systems from the point of view of traditional embedded systems. However, in the IoT, they are not isolated systems, but usually need to send information (e.g., states or feedback information) to and receive information (e.g., command information) from remote nodes or control centers, i.e., they are hybrid systems with both HRCTs and SRTs. Besides inherent real-time constraints in control systems [5], because of the limitation of volume or weight, these devices usually have limited energy. Because the processors in controllers usually have powerful ability to carry out complex computing, the energy savings of processors is critical to lengthening the device lifetime and/or improving the flexibility of use. Hence, an energy-efficient scheduling method is necessary for the control devices of the IoT with energy constraints.

The existing energy-saving research usually aims at only hard real-time systems [614] or soft real-time systems [1519], and does not consider improving the control performance of HRCTs during energy savings. Moreover, IoT control devices usually interact with external systems which have different speed requirements, while the existing research does not consider the diversity of subtasks' speed requirements. In this paper, we first present the HoW task model. In HoW, a task consists of multiple subtasks with different function weight and two kinds of energy-saving goals under the fixed priority scheduling mode. After that, we extend the method proposed in [20], and present a new energy-efficient uniprocessor scheduling method HTDVS for IoT control devices with HRCTs and SRTs. Under real-time constraints and different energy-saving goals, HTDVS can effectively save energy while reducing the response time jitters of HRCTs.

The work in this paper is suitable for IoT control devices for the following reasons:

  • HoW simplifies task modeling and describes tasks' importance levels, energy characteristics and execution order. For example, besides algorithms, peripherals (such as integrated actuators and communication modules) can be modeled as interface tasks with spcific function weight and energy-saving goals. A process including information-acquiring, information-processing and command-sending can be modeled as a task with multiple subtasks.

  • Energy can be saved by using HTDVS, which enhances the availability of SANs and improves the continuity of information from sensors.

  • HTDVS reduces response time jitters, and improves the control quality for actuators.

  • HTDVS guarantees the real-time requirements of tasks when there are both HRCTs and SRTs, which makes it meet the real-time requirements of control tasks.

  • HTDVS tries its best to meet the speed requirements of subtasks, which makes it suitable for different speeds in communication links and peripherals.

The rest of this paper is organized as follows: Section 2 summarizes the related work. Section 3 presents the task model and processor model. The timing analysis technique is proposed in Section 4. In Section 5 we describe the implementation of energy-efficient speed control in design time and run time. Experiment results and analysis are given in Section 6. We conclude this paper in Section 7.

2. Related Work

This paper focuses on the energy-saving problem of IoT control devices, which is applied to ubiquitous sensing and controlling, and involves energy-saving and real-time requirements. In this section, we first introduce the research in ubiquitous sensing and controlling, and then review the energy-saving work in real-time systems.

2.1. Ubiquitous Sensing and Controlling

Sensor networks are the information sources of IoT control devices. Currently, many research efforts have been made on the energy-saving problems in Wireless Sensor Networks (WSNs). Chamam and Pierre presented a method to optimally plan the states of sensors in cluster-based sensor networks [21]. This method can generate an energy-optimal topology with longest network lifetime under the condition of full area coverage. Wang et al. studied the target tracking problem in WSNs [22], and developed an energy-efficient three-phase tracking approach in order to increase network lifetime. Xia et al. proposed the Energy-Efficient Opportunistic Localization (EEOL) method by waking up some a number of sensor nodes [23]. This method greatly reduces energy consumption while keeping high localization accuracy. In the existing research work of energy-saving problem in WSNs, a common assumption is there are a number of sensors with low computing capability and limited energy. The existing work usually focuses on controlling appropriate sensor nodes to be in active states and balancing the energy consumption in order to prolong the lifetime of the whole network, while not consider the real-time requirements of systems.

With the development of IoT, more and more research efforts are made on the ubiquitous sensing and controlling. Yoerger et al. reported an autonomous underwater vehicle called Autonomous Benthic Explorer (ABE) to carry out near-bottom surveys in deep sea [24]. ABE was equipped with a large number of sensors, such as the scanning and multibeam sonars, a magnetometer, a digital still camera, etc., which made it suitable for conducting fine-scale quantitative surveys and mapping of the seafloor. They presented three algorithms in order to control the location of ABE and navigate during carrying out missions. Xia et al. presented a simple yet efficient method to deal with unpredictable packet loss on actuator nodes [5]. They used the PID algorithm to predict the control commands whenever data packets sensed are lost. This method guaranteed actuators produced control commands reliably and timely. Aroca et al. presented a simple but universal control architecture for low-cost mobile robots [25]. They used the sensors in both robots and computing devices (such as mobile phones and tablet computers) to obtain the states of robots or physical environment. The computing ability of computing devices is used to execute the control algorithms. The communication between a robot and a computing device was implemented through an audio interface. Their work mainly focused on the implementation of the audio interface between the robot and the computing device. Jing et al. presented a wearable gestural device named Magic Ring (MR) to implement the control of appliances [26]. MR served as a controller with sensing and controlling functions. MR had the ability to sense the gestures of a finger, recognize what control commands it represented, and send these control commands to the corresponding appliances. They emphasized on the architecture and gesture recognition of MR. Except for Xia et al. who considered the real-time requirement of communication [5], all of the above research efforts do not involve the real-time and energy-saving requirements.

In this paper, although we focus on the energy-saving problem of single processor with powerful performance by using DVS technique, the method presented in this paper can be easily integrated to a network with multiple controller and actuator nodes.

2.2. Energy Savings for Hard/Soft Real-Time Systems

Till now, there have been a large number of research efforts on applying DVS to real-time systems. The running voltages of tasks can be determined at design time (in a static manner) or run time (in a dynamic manner), or by combining the static and dynamic manners. On one hand, static DVS algorithms make use of tasks' information such as periods, deadlines, Worst-Case Execution Time (WCET), and other information to decide the supply voltages of tasks offline. On the other hand, dynamic DVS algorithms make use of runtime information of tasks to decide the supply voltages of tasks online.

In hard real-time systems, the timing requirements of tasks must be respected when energy is saved. Saewong and Rajkumar provided three static DVS algorithms [6]: the Sys-Clock algorithm, the PM-Clock algorithm, and the Opt-Clock algorithm. The Sys-Clock algorithm assigns a fixed processor voltage for a task set; the PM-Clock algorithm assigns a fixed voltage on the basis of every individual task; and the Opt-Clock algorithm tries to assign an optimal voltage for every task. Yao et al. proposed a static, optimal, and polynomial-time scheduling algorithm for aperiodic tasks [7]. Pillai and Shin first proposed a DVS algorithm based on schedulability tests [8], which selected a fixed supply voltage to meet all the deadlines of a task set under the Earliest Deadline First (EDF) or Rate Monotonic (RM) scheduling model, and then they presented two dynamic DVS algorithms. The first one is the Cycle-Conserving RT-DVS algorithm, which uses the information of the Actual Execution Time (AET) of the completed tasks under EDF scheduling, and the remaining time information of the running tasks under RM scheduling, to select the lowest feasible operating frequency. The second one is the Look-Ahead RT-DVS algorithm, which defers the execution of tasks as late as possible to make the energy consumption as little as possible. Zhu presented a novel approach combining feedback control with DVS schemes (Feedback-DVS) for hard real-time systems with dynamic workloads under EDF scheduling [9]. In Feedback-DVS, each task is divided into two portions. In the first portion, Feedback-DVS exploits frequency scaling when tasks execute with the average execution time in order to minimize the energy consumption of tasks. In the second portion, Feedback-DVS meets hard real-time requirements even in the worst execution time case. Chen and Thiele explored energy-efficient real-time task scheduling in leakage-aware DVS systems for homogeneous multiprocessor platforms [10]. They showed the critical speed might not be good enough to be viewed as the lowest speed of execution, and load balancing might not be good from the energy-saving point of view. Aiming at periodic tasksets, they developed a new algorithm (i.e., the RSLTF algorithm) to perform processor and task assignment, which was more effective in energy savings. Although static DVS algorithms have few runtime overheads, there is almost no purely static DVS energy-saving algorithm for hard real-time systems. Static DVS algorithms take pessimistic views about the execution time of tasks in order to guarantee the hard real-time requirements of tasks, which will lead to pessimistic energy-saving results. In fact, the AET of tasks is usually less than the WCET of tasks [11,12], so there is more slack time to use in runtime to lower the voltage of a processor further. Most of the existing research uses dynamic DVS algorithms [9,10], or combines static DVS and dynamic DVS algorithms [68,13,14].

Energy-saving problem has also been widely researched in soft real-time systems where there are usually the requirements of DMR. Kargahi and Movaghar presented a method for reducing the long run power consumption of a soft real-time system using DVS [15]. They modeled the system by using a continuous-time Markov process model and gave a predefined upper bound on the fraction of lost jobs. Aiming at the voltage assignment with probability (VAP) of soft real-time embedded systems with uncertain execution times and discrete voltage DVS processors, Qiu et al. used Probabilistic Data-Flow Graph to model tasks and proposed two optimal algorithms [16], VAP_S for uniprocessors and VAP_M for multiprocessors to minimize the expected value of total energy consumption while meeting timing constraints with guaranteed confidence probabilities. Rusu et al. evaluated several DVS algorithms for systems with unpredictable workloads [17]. They found the stochastic DVS scheme based on the collected statistical information about the workload probability distribution was simple and effective to obtain the DVS scheduling and better explore power-performance tradeoffs. Kluge et al. presented the autocorrelation clustering (ACC) method to optimize the energy consumption of periodic soft real-time applications [18]. By learning the workload of single iterations within a higher period, ACC predicts future workloads to adjust clock frequency and scheduling parameters, which is completely application-independent. Yuan and Nahrstedt presented an energy-efficient scheduler named GRACE-OS for soft real-time multimedia applications to save energy [19]. GRACE-OS obtains demand distribution via online profiling and estimation, and then makes scheduling decisions based on the probability distribution of applications' cycle demands. It saves energy significantly, and guarantees the quality of service of applications by limiting their DMR. In the current research on DVS for soft real-time systems, static DVS algorithms are usually used for soft real-time systems when their runtime characteristics, such as the probabilities of execution time and/or the execution paths of tasks are known a priori, and dynamic DVS algorithms are usually used to set the voltages of tasks by predicting tasks' workload online. Similar to that in hard real-time systems, most of the existing research uses dynamic DVS algorithms [15,1719].

In this paper, we present an energy-saving method for IoT control devices with hybrid tasks. Our research is different from the existing ones in the following points. First, it is required to meet both hard real-time requirements and soft real-time requirements, rather than merely one of them. Second, tasks have two energy-saving goals, rather than merely the lowest, the best as usual. Third, tasks have different function weight, and they are not so important as each other. Fourth, HRCTs have the requirements for reducing response time jitters.

3. System Model

In this section, we introduce the task model and processor model that will be used throughout this paper.

3.1. Task Model

In this subsection, we define the HoW task model. Under HoW, a system is composed of n periodic tasks, represented as Γ = {τ1,···, τn}. A task τi is represented as a five-tuple {Ti, Di, Ci, CB, TYi}, where Ti is its period, Di is its relative deadline, Ci is its WCET, CB is its best-case execution time (BCET), and TYi is its task type. There are two kinds of tasks in HoW according to their real-time requirements.

  • HRCTs. If τi HRCTs, its worst-case response time (WCRT) Ri must be no more than Di in order to meet its deadline requirement, and should be as close as possible to Di in order to improve control effect [27].

  • SRTs. If τi SRTs, Ri should try to be no more than Di, but this is not a mandatory requirement. Ri can also be more than Di in order to improve CPU utilization and/or save more energy.

The set of all HRCTs is denoted as ΓH, and the set of all SRTs is denoted as ΓS. If τi is a hard real-time control task, TYi is true. Otherwise, TYi is false.

A task τi consists of m subtasks, i.e., τ(i,1),···, τ(i,m). Because of the interaction between processors and exterior components or exterior environment, the energy-saving behavior of tasks is not only restricted by the real-time requirements of tasks, but also influenced by other factors. For example, if a subtask τ(i,k) receives data from a sensor node, the execution speed of τ(i,k) is constrained by the speed of the data transmission of the sensor node. A suitable execution speed is favorable for the sensor node to avoid staying in the active state for a long time. Moreover, subtasks may have different importance levels when meeting their execution speeds. For example, a subtask which collects solar energy is more important than a subtask which shows its work state in a solar-powered device. In this paper, we use function weight to denote the importance level of a subtask when meeting their execution speeds.

The subtask τ(i,k) (1 ≤ k ≤ m) is characterized by a seven-tuple {C(i,k), CB(i,k), P(i,k), PP(i,k), W(i,k), EG(i,k), Sidl(i,k)}, where C(i,k) is its WCET, CB(i,k) is its BCET, P(i,k) is its priority, PP(i,k) is its preemptive property, W(i,k) is its function weight, EG(i,k) is its energy-saving goal.

The energy-saving goals of subtasks are classified into two classes:

  • Optimal speed first, i.e., G1-type. For a subtask with the G1-type energy-saving goal, EG(i,k) is 1, and Sidl(i,k) is its corresponding slowdown factor when runs at its ideal running speed. It is favorable for a G1-type subtask to run at the ideal running speed, and a higher speed is also acceptable. But it is unnecessary to run at a speed below its ideal running speed.

  • Lower speed better, i.e., G2-type. For a task with the G2-type energy-saving goal, EG(i,k) is 2, Sidl(i,k) is the slowdown factor when the processor runs at its lowest running speed, and a higher speed above the lowest speed of the processor is also reasonable. Moreover, a lower speed is better.

If τi is a HRCT, PP(i,m) is false (i.e., τ(i,m) is a non-preemptive task), and C(i,m) is equal to CB(i,m) (Note that we can make C(i,m) equal to CB(i,m) by properly partitioning tasks). For any other τ(i,k), PP(i,k) is true (i.e., τ(i,k) is a preemptive task). One instance of τi is generated every Ti intervals, called a job of τi. τ(i,k) has the same period as that of τi, and the WCET/BCET of τi is equal to the sum of the WCET/BCET of all τi's subtasks. After a job of τi is released, the job's subtasks are executed sequentially, that is to say, the subtask τ(i,k + 1) will only be released after the subtask τ(i,k) is completed. Moreover, the (q + 1)st job of τi will only be executed after the qth job of τi completes. We assume no subtask can be included in more than one task; there is no blocking time caused by resource sharing among subtasks of different tasks; and system overheads, such as scheduler and context-switching overheads, are ignored.

Note that two points should be put forward. First, in IoT control devices, although the majority of tasks are periodic ones, there are some aperiodic tasks and sporadic tasks triggered by external physical events or commands. In our current research, we do not consider the aperiodic tasks and sporadic tasks. Although aperiodic tasks and sporadic tasks can be modeled as SRTs and HRCTs respectively, it will lead to pessimistic results in scheduling and energy savings because of the using of their minimal trigger intervals. In scheduling, combining bandwidth reservation with slack stealling may be a promising solution in our future research. Second, although we do not limit the DMR of SRTs in this paper, DMR can be controlled by monitoring the runtime DMR of SRTs and adjusting the slowdown factors of SRTs.

3.2. Processor Model

Currently, the vast majority of modern processors are made using Complementary Metal-Oxide-Semiconductor (CMOS) technology. The power consumption of a processor consists of two parts. One is the dynamic power consumption PD caused by the charging and discharging of gates on the circuits. PD can be modeled as a convex function of the processor speed, denoted as: P D ( s ) = C eff V d d 2 s [28], where s = k(VddVt)2/Vdd is the processor speed, and Ceff, Vdd, Vt, and k denote the effective switching capacitance, the supply voltage, the threshold voltage, and the design-specific constant (VddVt ≥ 0, k > 0, and Ceff > 0) respectively. The other is the leakage power consumption PL mainly coming from leakage current. The leakage power can be modeled as a constant when it does not change with temperature, or a linear function of temperature. Therefore, PL can be denoted as PL(T) = βT + γ, where T is the temperature of the processor, β and γ are two constants. The total power of the processor is:

P = P D ( s ) + P L ( T ) = C eff V d d 2 s + β T + γ

In this paper, we use the periodic task model and assume the processor is never shutdown. We ignore the influence of leakage power, and simplify the CPU power consumption to be:

P = P D ( s ) = C eff V d d 2 s

A wide range of processors can run at a sequence of discrete operating frequencies with corresponding supply voltages. Changing the supply voltage of a processor will lead to the corresponding changes of the processor's operating frequency. We assume a processor Pri has the parameters of {(f1,V1),···, (fmax,Vmax)}, where fj is the operating frequency, and Vj is the supply voltage. In this paper, subtasks are fundamental entities to which DVS is applied. We are only interested in the relative power consumption of subtasks when they run at different supply voltages. Therefore, we normalize the power to the maximum power consumption. If Pri is running at Vi, its unit power consumption is defined as Vi2fi/(Vmax2fmax). Note that the WCET and the AET of a subtask τ(i,j) are all measured at the full speed of the processor where τ(i,j) resides.

4. Timing Analysis Technique

In this section, we first introduce the analysis method of tasks' schedulability and some basic notations used in the schedulability analysis, and then present the strategies for controlling the response time jitters of HRCTs and prove the upper bound of tasks' WCRT in HoW.

4.1. Timing Analysis Algorithm

We call the timing analysis algorithm presented by Harbour, Klein, and Lehoczky the HKL algorithm [29]. In [30], we extend the HKL algorithm and present a schedulability analysis method for a task set whose tasks have both preemptive subtasks and non-preemptive tasks. In this paper, we use the timing method in [30]. For the convenience of understanding, we introduce some basic notations which will be used in the timing analysis of this paper.

Let's assume Pmin(j) refer to the minimum priority of all the subtasks of τj. When Pmin(j) > P(i,k), τj has multiply preemptive effect on τ(i,k). If l , ( P ( j , 1 ) , , P ( j , l ) > P ( i , k ) ) ( P ( j , l + 1 ) < P ( i , k ) ), τj has singly preemptive effect on τ(i,k). MP(i,k) denotes the task set that has multiply preemptive effect on τ(i,k). τj has blocking effect on τ(i,k) if l , r , ( P ( j , l ) < P ( i , k ) ) ( ( P ( j , l + 1 ) , , P ( j , r ) ) > P ( i , k ) ) ( P ( j , r + 1 ) < P ( i , k ) ). SP(i,k) denotes the task set that has singly preemptive effect on τ(i,k). If τj has multiply preemptive effect, singly preemptive effect, or blocking effect on τ(i,k), we say τj is a multiply preemptive task, singly preemptive task, or blocking task of τ(i,k). If the priorities of several continuous subtasks of τj are higher than P(i,k), they are called an H segment; If the priorities of several continuous subtasks of τj are lower than P(i,k), they are called an L segment.

The canonical form of a task τi is a task τi′ whose subtasks maintain the same order, but have the priority levels that do not decrease. Harbour et al. proved that the completion time of τi was equal to that of τi′. When we calculate the WCRT of τi, we need to consider the influence from other tasks. For a given canonical form subtask τ(i,k)′, other tasks can be classified into five types as follows.

  • Type-1 tasks, i.e., (H) tasks. All subtasks' priorities of a type-1 task are higher than P(i,k)′. Type-1 tasks have multiply preemptive effect on τ(i,k)′;

  • Type-2 tasks, i.e., ((HL)+) tasks (+ denotes one or more times). In type-2 tasks, an H segment is followed by an L segment. Type-2 tasks usually have singly preemptive effect on τ(i,k)′;

  • Type-3 tasks, i.e., ((HL)+H) tasks. In type-3 tasks, an H segment is followed by an L segment except that the final segment is an H segment. Type-3 tasks usually have singly preemptive effect on τ(i,k)′. One of type-2 or type-3 tasks may have blocking effect on τ(i,k)′;

  • Type-4 tasks, i.e., (LH)+L0 tasks (0 denotes zero or one time). In type-4 tasks, an L segment is followed by an H segment except that there is one or no L segment as its final segment. Type-4 tasks only have blocking effect on τ(i,k)′;

  • Type-5 tasks, i.e., (L) tasks. All subtasks' priorities of a type-5 task are lower than P(i,k)′. Type-5 tasks have no influence on τ(i,k)′.

The WCRT of τi can be calculated as follows. First, convert τi into τi′. Second, classify other tasks into five types and calculate the busy period of τi′. Third, calculate the response time of each job of τi′ in its busy period in ascending order of subtasks. The longest response time of all τi′'s jobs is the WCRT of τi. More details about the HKL algorithm and the timing analysis for hybrid tasks can refer to [29] and [30] respectively.

4.2. WCRT Upper Bound of Tasks

Many of the current embedded operating systems (OSs) (e.g., Windows CE, Linux, VxWorks, Android, iOS) provide self-suspension mechanisms to control the execution of tasks flexibly. In order to reduce the response time jitter of τi, we insert a suspension time segment before τ(i,m). The runtime structure of τi is shown in Figure 1. In run time, the scheduler of an OS records the release time of a τi instance, and inserts some a suspension time segment to make τ(i,m) suspend itself for a specific time. τ(i,m) can remove or effectively reduce its response time jitter because of the following reasons.

  • The response time before the release of τ(i,m) can be measured by the scheduler;

  • There is no task preemption between the end of the self-suspension and the end of τ(i,m) because the interrupt mechanism of OS and τ(i,m) is non-preemptive;

  • Self-suspension time length can be set.

After using the self-suspension mechanism before the last subtasks of HRCTs, the response time of HRCTs and SRTs will change in comparison to that without the self-suspension mechanism. In this paper, we do not analyze the exact response time of a HRCT with a specific suspension time segment, and only give an upper bound of WCRT in order to guarantee the hard real-time requirements of HRCTs and try to meet the soft real-time requirements of SRTs.

In the following discussion, we call the task set where there is no suspension time segment ΓN, and τiN denotes the task which has no self-suspension time segment. For example, if τi belongs to ΓH, τiN is the corresponding task of τi which has no self-suspension segment in runtime; if τi belongs to ΓS, τiN is the same task as τi whether at design time or run time. IiN denotes the interference time when the tasks having interference effect on τi have their suspension time of zero. ITiN denotes the interference tasks of τi in ΓN. ITi denotes the interference tasks of τi in Γ. Let's prove the WCRT of τiN in ΓN is the upper bound of WCRT of τi in Γ.

Lemma 1

The interference time Ii that τi suffers from is no more than IiN when all of its interference tasks have no suspension time.

Proof

Without losing generality, we compare the interference effect from a HRCT τj, and its corresponding task τjN. From the task type classification, we know the following facts: (1) If τj is a multiply/singly preemptive task of τi, τjN is still a multiply/singly preemptive task of τi; (2) If τj is a blocking task of τi, τjN is still a blocking task of τi; (3) If τj has no interference effect on τi, τjN has also no interference effect on τi. So the tasks in ITi are the same as those in ITiN. If τi is a HRCT, from [30,31], we know τi has the same critical instant with tasks in ITi as with those in ITiN. Otherwise, it is obvious that τi has the same critical instant with tasks in ITi as with those in ITiN. Because there is suspension time in τj, the suspension time could be used to execute other interference tasks in ITi or τi, which will make the length of τi-busy period when τi is executed with tasks in ITiN larger than or equal to that of τi-busy period when τi is executed with tasks in ITi. So the τi-busy period when τi is executed with tasks in ITiN is long enough to calculate the WCRT of τi. Consider the scenario that the job of τi has its WCRT, if the suspension time of some an interference task is filled with other interference tasks, the WCRT of τi in Γ is equal to that of τi in ΓN. Otherwise, the completion time of τi will be sooner, i.e., the WCRT of τi in Γ will be less than that of τi in ΓN. Therefore, the interference time Ii that τi suffers from is no more than IiN when all of its interference tasks have no suspension time, i.e., τi will have the same or larger WCRT from IiN as or than that from Ii.

Lemma 2

In ΓN, when converting a task τiN into τi by adding the suspension time segment of a HRCT, the WCRT of τiN is no less than that of τi.

Proof

Because the suspension time lies before the last subtask τ(i,m) of τi, the multiply preemptive tasks, singly preemptive tasks and blocking task of τi are the same as those of τiN. τi will also suffer from the maximum blocking time when it is released with its multiply preemptive tasks, singly preemptive tasks, and blocking task simultaneously, which is the same as that of τiN. Because the suspension time segment of τi will permit its interference tasks running during that time interval, the length of τiN-busy period is no less than that of τi-busy period. Because the suspension time of τi is no more than Ri − C(i,m) − R(i,m-1), its suspension time can be filled with its interference tasks in the τiN-busy period. Let's assume the WCRT of τi is more than that of τiN. If the job which has the WCRT is the first job in the τi-busy period, it means the suspension time of τi has been filled with its interference tasks. We may obtain larger or equal WCRT of τiN when replacing τi with τiN, which contradicts the assumption. If the job which has the WCRT is not the first job in the τi-busy period, it means the suspension time of the previous jobs of τi has been filled with its interference tasks. Similarly, we can obtain larger or equal WCRT of τiN when replacing τi with τiN, which contradicts the assumption, too. Therefore, In ΓN, when converting a task τiN into τi by adding some a suspension time segment, the WCRT of τiN is no less than that of τi.

From Lemma 1 and Lemma 2, we can easily derive theorem 1.

Theorem 1

Under the HoW model, the upper bound of WCRT of any task τi in Γ can be derived from the corresponding task τiN in ΓN while respects the deadline requirement of τi.

Hence, we can use the method in [30] to analyze the schedulability of tasks in HoW.

5. Speed Assign Algorithms

Aiming at the energy-saving problem under the HoW task model, we present an energy-saving scheduling algorithm—the HTDVS algorithm. The HTDVS algorithm includes two phases, as shown in Figure 2. During design phase, it first calculates the Time Scaling Factors for a Single task/subtask Except Non-preemptive subtasks (TSFS-EN) factors of tasks (TSFS-EN Calculation) from a given task set TS. After that, it sets the slowdown factors of subtasks using hierarchical method (Slowdown Factor Setting). Finally, it marks the slack time restriction points of tasks and the reserved time requirements (Mark Jump Points and Reserved Slack Time). During the running phase, it reclaims and reuses the slack time of runtime subtasks according to the energy-saving goals of subtasks, dynamically sets the voltages of subtasks in order to save energy further, and sets the self-suspension time of HRCTs in order to reduce the response time jitters.

5.1. TSFS-EN and Slowdown Factors

In [20], Gao et al. presented the notation of Time Scaling Factors for a Single task/ subtask (TSFS). In this paper, we extend the time scaling factor to HoW, and present the notation of TSFS-EN. For a task τi with a TSFS-EN of α, if we multiply every subtask's WCET of all tasks except their non-preemptive subtasks by a factor of α, τi is still schedulable. The TSFS-EN factor of a task can be calculated using binary search.

From the definition of TSFS-EN, we know that the TSFS-EN of τi only considers the schedulability of τi, but not consider the influence of τi on other tasks. Although there are two kinds of tasks, it only needs to restrict the interference time on HRCTs in order to guarantee the real-time requirements of HRCTs, and try its best to execute SRTs as slow as possible (of course, its speed is restricted by the slowdown factors and the energy-saving goals of its subtasks) in order to save more energy. In HoW, τi may consist of more than one subtask. Because the interference on other tasks is based on that of τi's subtasks, we restrict the TSFS-EN of subtasks of τi to avoid the pessimism of setting a minimum TSFS-EN for all subtasks of τi.

In the following discussion, we denote the TSFS-EN of τi TSFS-EN(τi). If τ(i,k) has not been given an individual TSFS-EN, it uses the TSFS-EN of τi as its TSFS-EN. From the response time analysis of the HKL algorithm, we know all the multiply preemptive tasks and singly preemptive tasks of τj must fall into the set of MP(j,1) (x0222A) SP(j,1), that is to say, we can analyze the interference tasks of τj according to P(j,1)′. For the convenience of understanding, we introduce some notations in [20] which will be used in the following parts. When reducing τ(i,k)'s execution speed, we call the maximum allowable execution time of τ(i,k) its maximum time extension. For an H/L task segment, its maximum time extension is equal to the sum of the maximum time extension of all its subtasks. The slowdown factor of τ(i,k), denoted as S(i,k), is defined as (τ(i,k)'s maximum time extension)/C(i,k). Under the fixed priority scheduling and discrete voltage levels, assigning the optimal slowdown factors of tasks is an NP-hard problem [32]. In this paper, we do not make our effort to obtain the optimal slowdown factors of subtasks, but to assign the feasible and “effective” slowdown factors of subtasks. We assume T1(j) denotes the (H) task set of τ(j,1)′, T23(j) denotes the set of ((HL)+) and ((HL)+H) tasks of τ(j,1)′, and T234(j) is the set of ((HL)+), ((HL)+H), and ((LH)+L0) tasks of τ(j,1)′; H i , j I denotes the initial H segment of τi against P(j,1)′; denotes the internal H segment to which τ(i,k) belongs against P(j,1)′; H i , j L denotes the final H segment of τi against P(j,1)′; M T E ( i , k ) , j M denotes the maximum time extension of H ( i , k ) , j M ; M T E i , j L denotes the maximum time extension of H i , j L. Let Cih denote the WCET of the initial H segment of τi; Bi denotes the maximum blocked time that τi can suffers from. For τi ∈Γ, we set down the following three rules to restrict the interference time of τi on other task τj where τj ∈ {Γ − τi − ΓS}.≤

  • Rule 1: if τiT1(j), for any subtask τ(i,k), S(i,k)TSFS-EN(τj);

  • Rule 2: if τiT23(j), for any τ(i,k) H i , j I, S(i,k) ≤ TSFS-EN(τj);

  • Rule 3: if τiT234(j), S(i,k)TSFS(τj)(Cih + Bj)/when τ(i,k) H ( i , k ) , j M;

    S(i,k)TSFS-EN(τj)* B j / M T E i , j L when τ(i,k) H i , j I and τi ΓS;

    S(i,k) ≤ (BiC(i,m))/(MTEL i,jC(i,m)) (k < m) when τ(i,k) H i , j L and τi ΓH.

After that, we use the hierarchical tree method in [20] to classify tasks and set the slowdown factors of subtasks according to the above three rules. The classifying operation ends until there is no HRCT or only one task in TS or OT (other tasks except multiply preemptive tasks in a level). The structure of a hierarchical tree is shown in Figure 3. Note that the tasks with the minimum TSFS-EN in TS, MP and OT are only selected from ΓH because the real-time requirements of SRTs are not mandatory.

5.2. Setting Jump Points and Reserved Slack Time of Tasks

In [20], we have proven that the reclamation and reuse of slack time intra-a-task will not increase the WCRT of this task. However, it is necessary to restrict the maximum reusable slack time at jump points (i.e., the first tasks of H segments after L segments).

Because real-time properties are not mandatory in SRTs, we only consider the jump points in HRCTs. From the classification of task types, we know the jump points of a task τj only appear in type-2, type-3, and type-4 tasks of τj, i.e., in T234(j).

If τ(i,k) is a jump point of the internal H segment H(i,k),jM, the maximum reusable slack time (MRS) of τ(i,k) is

MRS ( i , k ) = TSFS E N ( τ j ) ( B j + C i h ) τ ( i , p ) H ( i , k ) , j M S ( i , p ) C ( i , p )

If τ(i,k) is a jump point of the final H segment Hi,jL, the maximum reusable slack time of τ(i,k) is

M R S ( i , k ) = TSFS E N ( τ j ) ( B j + C ( j , n ) ) + C ( j , n ) τ ( i , p ) H i , j L S ( i , p ) C ( i , p )

We adopt the method in [20] to set the jump points of tasks. Note that it only processes HRCTs. The slowdown factors and MRS of non-preemptive subtasks are set to 1 and 0 respectively.

The slack time requirements of τ(i,k) are characterized by STIDL(i,k), STMIN(i,k), and STMAX(i,k). STIDL(i,k) denotes the ideal slack time that τ(i,k) needs, STMIN(i,k) denotes the minimum slack time that τ(i,k) needs, and STMAX(i,k) denotes the maximum slack time that τ(i,k) needs. If τ(i,k) is a G1-type subtask, STIDL(i,k), STMIN(i,k), and STMAX(i,k) are all set to 0 if its ideal slowdown factor Sidl(i,k) is between 1 and S(i,k). Otherwise, STIDL(i,k) and STMAX(i,k) are set to C(i,k)*(Sidl(i,k) − S(i,k)), and STMIN(i,k) is set to CB(i,k)*(Sidl(i,k) − S(i,k)). If τ(i,k) is a G2-type subtask, STIDL(i,k) is set to 1/2*(CB(i,k) + C(i,k))*(Smin(i,k) − S(i,k)), STMIN(i,k) is set to 0, and STMAX(i,k) is set to C(i,k)*(Smin(i,k) − S(i,k)), where Smin(i,k) is the slowdown factor which is corresponding to the slowest speed of the processor.

In order to meet the real-time requirements and energy-saving requirements of tasks in HoW, it is necessary to mark the minimum reserved slack time (LRST), the ideal reserved slack time (IRST) and the maximum reserved slack time (MRST) of a subtask for its subsequent subtasks before using the runtime slack reclamation and reuse. For a subtask τ(i,k), its LRST is:

LRS T ( i , k ) = l > k and W ( i , l ) > W ( i , k ) STMIN ( i , l )
where LRST(i,k) is the LRST of τ(i, k). Equation (5) means the LRST of τ(i,k) is the sum of the STMIN of its subsequent subtasks with larger function weight. Similarly, IRST and MRST are defined as Equation (6) and Equation (7) respectively.

IRST ( i , k ) = l > k and W ( i , l ) > W ( i , k ) STIDL ( i , l )
MRST ( i , k ) = l > k and W ( i , l ) > W ( i , k ) STMAX ( i , l )

By scanning each subtask of all tasks, we can obtain their LRST, IRST, and MRST, and mark these information into the corresponding subtasks in order to reserve slack time for the following subtasks of a task.

5.3. Reclamation and Reuse of Slack Time in Runtime

In this section, we present two energy reclamation and reuse algorithms, i.e., HTDVS-HRCT for HRCTs and HTDVS-SRT for SRTs respectively. By applying the two algorithms, the speeds of subtasks are adjusted dynamically according to their WCET, the H/L segments it belongs to, and the slack time it can use in run time. There are two kinds of slack time, i.e., global slack time (GST) and local slack time (LST). GST of τi, denoted as GST(i), is the slack time which is reclaimed in the executed subtasks of τi and can be used by all its subsequent subtasks. LST of τi, denoted as LST(i), is the slack time which comes from GST(i) or is reclaimed in an H/L segment and can be reused in the same H/L segment.

The initialization, use and conversion rulers of LST and GST are as follows:

  • Both LST and GST of a task are set to 0 before a task runs.

  • LST are set in the first subtask of the first H/L segment, and all the slack reclaimed in a segment can be reused in the same segment.

  • Before the first subtask of an L segment runs, all GST can be put into the LST of the first subtask. Before the first subtask of an H segment runs, the maximum value of LST can be equal to the maximum reusable slack time of the subtask, and it can extract slack from GST. Additional slack can be put into GST after an H/L segment completes.

On the basis of slack time reservation, the HTDVS-HRCT algorithm decides whether the subtask to be run can reuse the reclaimed slack time, and how much slack time the subtask can reuse. We define the following five rules when reusing slack time. Note that Rule 1 takes precedence over Rule 2.≥

  • Rule 1: When τ(i, k) is a G1-type subtask, if LST(i) + GST(i)LRST(i,k)STIDL(i,k) and LST(i)STIDL(i, k), τ(i, k) reuses the slack time of STIDL(i, k), and runs at its ideal speed;

  • Rule 2: For a G1-type subtask τ(i, k), under the condition that LST(i) + GST(i)LRST(i,k)STMIN(i,k) and LST(i)STMIN(i,k), τ(i, k) can reuse the slack time of LST(i) + GST(i)LRST(i,k) and run at a lower speed if LRST(i,k) > GST(i); τ(i, k) can reuse the slack time of LST(i) and run at a lower speed if GST(i)LRST(i,k);

  • Rule 3: For a G2-type subtask τ(i, k) in an H segment, if GST(i)IRST(i,k), τ(i, k) can reuse the slack time of LST(i) and run at a lower speed; otherwise, if LST(i) + GST(i)IRST(i,k) and IRST(i,k) > GST(i), τ(i, k) can reuse the slack time of LST(i) + GST(i)IRST(i,k) and run at a lower speed.

  • Rule 4: For a G2-type subtask τ(i, k) in an L segment, if GST(I)MRST(i,k), τ(i, k) can reuse the slack time of LST(i) and run at a lower speed; otherwise, if LST(i) + GST(i)MRST(i,k) and MRST(i,k) > GST(i), τ(i, k) can reuse the slack time of LST(i) + GST(i)MRST(i,k) and run at a lower speed.

  • Rule 5: All subtasks which do not meet Rule 1–4 run at the speeds corresponding to their slowdown factors.

An HRCT can use the above five rules to reuse slack time. For a G1-type subtask τ(i, k), using Rule 1, τ(i, k) reserves LRST time for its subsequent subtasks and it runs at its ideal speed. Using Rule 2, τ(i, k) reserves LRST time for its subsequent subtasks and it runs at a lower speed. By using Rule 1 and Rule 2, τ(i, k) tries its best to work at its ideal speed or a lower speed above its ideal speed. For a G2-type subtask τ(i, k), using Rule 3, τ(i, k) in an H segment reserves IRST time for its subsequent subtasks and it runs at a lower speed. Because a subtask in an H segment is usually restricted in slack time reuse, it tries its best to reuse more slack time. Using Rule 4, τ(i, k) in an L segment reserves MRST time for its subsequent subtasks, and τ(i, k) runs at a lower speed. Because a subtask in an L segment is usually not restricted during slack time reuse, it tries its best to reserve more slack time. By using Rule 3 and Rule 4, τ(i, k) will work at a lower speed after reserving enough slack time. Even if Rule 1–4 are not met, a subtask can reduce its running speed by using its slowdown factor. The HTDVS-HRCT algorithm is shown in Algorithm 1.

In Algorithm 1, Line 3–Line 47 are the pseudo code before releasing a subtask τ(i, k), and Line 49 is the pseudo code upon τ(i, k) ends. Line 3–Line 5 suspend the last subtask of τi for a specific time segment Ri − C(i, m) − R(i, m-1) according to the difference between Ri and R(i, m − 1) in order to reduce the response time jitter of τi. Line 7–Line 14 set the LST of τ(i, k). If τ(i, k) is in a jump point, i.e., its restriction flag is true, its LST is set to its MRS, and GST are adjusted according to the slack time left. Otherwise, all slack time are assigned to the LST of τ(i, k). Line 21 sets the runtime slowdown factor of τ(i, k) to its static slowdown factor by default. If τ(i, k) is a G1-type subtask, Rule 1 (Line 23–Line 24) or Rule 2 (Line 25–Line 29) can be used to calculate its runtime slowdown factor. If τ(i, k) is a G2-type subtask, Rule 3 (Line 33–Line 37) or Rule 4 (Line 40–Line 43) can be used to calculate its runtime slowdown factor. The runtime voltage of τ(i, k) is set in Line 46–Line 47. Upon task completion, LST is recalculated according to the running speed and AET of τ(i, k) in Line 49.

On the basis of slack time reservation, the HTDVS-SRT algorithm decides whether the subtask to be run can reuse the reclaimed slack time, and how much slack time the subtask can reuse. We define the following four rules when reusing slack time.

  • Rule 1: When τ(i, k) is a G1-type subtask, if LST(i) + GST(i)LRST(i,k)STIDL(i,k)/2 and LST(i)STIDL(i,k), τ(i,k) reuses the slack time of STIDL(i,k), and runs at its ideal speed;

  • Rule 2: For a G1-type subtask τ(i, k), under the condition that STIDL(i,k)/2 ≥ LST(i) + GST(i)LRST(i,k)STMIN(i,k) and LST(i)STMIN(i,k), τ(i, k) can reuse the slack time of LST(i) + GST(i)LRST(i,k) and run at a lower speed if LRST(i,k) > GST(i); τ(i, k) can reuse the slack time of LST(i) and run at a lower speed if GST(i)LRST(i,k);

  • Rule 3: For a G2-type subtask τ(i, k), if GST(i)IRST(i,k), τ(i, k) can reuse the slack time of LST(i) and run at a lower speed; otherwise, if LST(i) + GST(i)IRST(i,k) and IRST(i,k) > GST(i), τ(i, k) can reuse the slack time of LST(i) + GST(i)IRST(i,k) and run at a lower speed.

  • Rule 4: All subtasks which do not meet Rule 1–3 run at the speeds corresponding to their slowdown factors.

Algorithm 1. HTDVS-HRCT algorithm.

1Algorithm HTDVS-HRCT()
/*τ(i,k) is the subtask to be executed. τ(i,m) is the last subtask of τi. LST(i) and GST(i) are the slack time before τ(i,k) is released. f(V(i,k)′) is the operating frequency corresponding to V(i,k)′; AET(i,k) is the actual execution time of τ(i,k). S(i,k) is the slowdown factor of τ(i,k). S(i,k) is a temporary variable.*/
2Before task release:
3if ((k == m) and (RiC(i,m)R(i,m-1) > 0)) {
4  Sleep(RiC(i,m)R(i,m-1));
5  return;
6 }
7  if (the restriction flag of τ(i,k) is true) {
8   if (GST(i) + LST(i)MRS(i,k)){
9    GST(i) = GST(i) + LST(i) − MRS(i,k);
10    LST(i) = MRS(i,k);
11   }
12  else {
13   LST(i) = LST(i) + GST(i);
14   GST(i) = 0;
15   }
16  }
17else {
18  LST(i) = LST(i)+GST(i);
19  GST(i) =0;
20 }
21S(i,k)′ = S(i,k);
22  if (τ(i,k) is G1-type) {
23   if (LST(i) + GST(i) − LRST(i,k)STIDL(i,k) and LST(i)STIDL(i,k))
24    S(i,k)= Sidl(i,k);
25   else if (LST(i) + GST(i)-LRST(i,k)STMIN(i,k) and LST(i)STMIN(i,k)) {
26    if (LRST(i,k) > GST(i))
27     S(i,k) = (S(i,k)*C(i,k) + LST(i) + GST(i) − LRST(i,k))/C(i,k);
28    else if (GST(i)LRST(i,k))
29     S(i,k) = (S(i,k)*C(i,k) + LST(i))/C(i,k);
30   }
31  }
32  else if (τ(i,k) is G2-type) {
33   if (the H tag of τ(i,k) is true) {
34    if (LST(i) + GST(i)IRST(i,k) and GST(i) < IRST(i,k))
35     S(i,k)=(S(i,k)*C(i,k) + LST(i) + GST(i) − IRST (i,k))/C(i,k);
36    else if (GST(i)IRST(i,k))
37     S(i,k) = (S(i,k)*C(i,k) + LST(i))/C(i,k);
38   }
39  else {
40   if (LST(i) + GST(i)MRST(i,k) and GST(i) < MRST(i,k))
41    S(i,k) = (S(i,k)*C(i,k) + LST(i) + GST(i) − MRST(i,k))/C(i,k);
42   else (GST(i) ≥ MRST(i,k))
43   S(i,k) = (S(i,k)*C(i,k) + LST(i))/C(i,k);
44   }
45  }
46if (Vi is the least voltage that makes fi/fmax equal to or larger than 1/S(i,k));
47  Set the operating voltage V(i,k) to Vi;
48Upon task completion:
49LST(i) = LST(i) + S(i,k)*C(i,k)fmax/f(V(i,k)′)*AET(i,k);

In Rule 1 and Rule 2, the purpose of setting a lower threshold for reserved slack time is to use more slack time to lower the running speed of a G1-type SRT's subtask. By using Rule 1 and Rule 2, a G1-type SRT's subtask τ(i, k) will try its best to work at its ideal speed or a lower speed. Using Rule 3, a G2-type SRT's subtask τ(i, k) reserves IRST time for its subsequent subtasks, and τ(i, k) runs at a lower speed.

The HTDVS-SRT algorithm is shown in Algorithm 2. In Algorithm 2, Line 3–Line 35 are the pseudo code before releasing τ(i, k), and Line 37 is the pseudo code upon τ(i, k) ends. Line 3–Line 16 set the LST of τ(i, k). Line 17 sets the runtime slowdown factor of τ(i, k) to its static slowdown factors by default. If τ(i, k) is a G1-type subtask, Rule 1 (Line 19–Line 20) or Rule 2 (Line 21–Line 25) can be used to calculate its runtime slowdown factor. If τ(i, k) is a G2-type subtask, Rule 3 (Line 29–Line 32) can be used to calculate its runtime slowdown factor. The runtime voltage of τ(i, k) is set in Line 34–Line 35. Upon task completion, LST is recalculated according to the running speed and AET of τ(i, k) in Line 37.

Algorithm 2. HTDVS-SRT algorithm.

1Algorithm HTDVS-SRT()
/*τ(i,k) is the subtask to be executed. τ(i,m) is the last subtask of τi. LST(i) and GST(i) are the slack time before τ(i,k) is released. f(V(i,k)′) is the operating frequency corresponding to V(i,k)′; AET(i,k) is the actual execution time of τ(i,k). S(i,k) is the slowdown factor of τ(i,k). S(i,k) is a temporary variable.*/
2Before task release:
3if (the restriction flag of τ(i,k) is true) {
4  if (GST(i) + LST(i)MRS(i,k)){
5   GST(i) = GST(i) + LST(i)MRS(i,k);
6   LST(i) = MRS(i,k);
7  }
8  else {
9   LST(i) = LST(i) + GST(i);
10   GST(i) = 0;
11  }
12 }
13else {
14   LST(i) = LST(i) + GST(i);
15   GST(i) = 0;
16 }
17S(i,k)′= S(i,k);
18if (τ(i,k) is G1-type) {
19  if (LST(i) + GST(i) − LRST(i,k) STIDL(i,k)/2 and LST(i) ≥ STIDL(i,k))
20   S(i,k) = Sidl(i,k);
21  else if (LST(i) + GST(i) − LRST(i,k) STMIN(i,k) and LST(i) ≥ STMIN(i,k)) {
22   if (LRST(i,k) > GST(i))
23    S(i,k)=(S(i,k)*C(i,k) + LST(i) + GST(i) − LRST(i,k))/C(i,k);
24   else if (GST(i) ≥ LRST(i,k))
25    S(i,k) = (S(i,k)*C(i,k) + LST(i))/C(i,k);
26  }
27 }
28else if (τ(i,k) is G2-type) {
29  if (LST(i) + GST(i) ≥ IRST(i,k) and GST(i) < IRST(i,k))
30   S(i,k)=(S(i,k)*C(i,k) + LST(i) + GST(i)IRST (i,k))/C(i,k);
31  else if (GST(i) ≥ IRST(i,k))
32   S(i,k)=(S(i,k)*C(i,k) + LST(i))/C(i,k);
33 }
34if (Vi is the least voltage that makes fi/fmax equal to or larger than 1/S(i,k));
35  Set the operating voltage V(i,k) to Vi;
36Upon task completion:
37  LST(τi) = LST(τi) + S(i,k)*C(i,k)fmax/f(V(i,k)′)*AET(i,k);

6. Experiments and Analysis

We developed a simulator using Visual C++ to test the HTDVS algorithm presented in this paper. This simulator can accept the speed/energy consumption function of a processor in its processor model and tasks' parameters in its task model as input, and analyze the energy consumption when using the HTDVS algorithm. In the following experiments, we use the method presented in [8] to generate the experimental task sets. The periods of tasks can be the short (1–10 ms), medium (10–100 ms), or long (100–1,000 ms) periods in order to simulate different kinds of applications. Tasks are generated randomly and uniformly distributed in the three kinds of periods. The WCET and BCET of the subtasks of a task τi is generated randomly under the condition that C(i,k) is no less than CB(i,k). When testing the energy consumption of a task set under a specific utilization, we first generate a task set with the maximum utilization 0.9, and then multiply the WCET and BCET of all tasks and its subtasks by a factor to obtain the task set under the specified utilization. After that, we use the uniform distribution function to generate the AET of subtasks. The AET of a subtask is uniformly distributed between its BCET and its WCET. In order to reduce error, we use the average value of ten experiments as the measure value of every data point. The total energy consumption of a task set is measured in [0, LCM], where LCM is the least common multiple of all tasks' periods.

Because the task model and scheduling model in this paper are different from those of the existing works in energy-saving research, we are not able to compare our method to other known DVS algorithms, such as the RT-DVS algorithm [8], the DRA algorithm [33], and the DVSST algorithm [34]. We performed three kinds of simulation experiments under the condition of different task type ratio, different energy reuse algorithms, and different subtask type ratio. In the following three experiments, we use the normalized speed/energy consumption parameters of Transmeta TM5800 processor {(1, 1), (0.9, 0.835), (0.8, 0.632), (0.667, 0.443), (0.533, 0.292), (0.433, 0.203), (0.3, 0.105)} as the processor parameters to calculate the energy consumption of tasks because it has fine and uniform speed-scaling granularity and can better reveal the energy characteristic of task sets [35]. We use the task sets generated randomly with the following parameters: number of tasks: 6; number of subtasks in each task: 2–5. When generating the task sets, all tasks are schedulable under the utilization of 0.9 and CPU speed of 1.

6.1. Different Task Type Ratio

In this experiment, after generating the task set, we randomly changed the properties of task type and made the HRCTs have the following ratio: 0, 33%, 50%, 66%, and 100%, corresponding to T0, T33, T50, T66 and T100 respectively. Under each utilization, we measured the energy consumption and the DMR of SRTs (deadline-missing task number of SRTs/total number of SRTs) at different HRCT ratio when using the HTDVS algorithm. The experiment results are shown in Figures 4 and 5 respectively.

Figure 4 shows that the five task sets consume more energy with increased utilization. With the increase in utilization, the TSFS-EN factors of tasks become smaller, and the dynamically reclaimed and reused energy also becomes small, which leads to high energy consumption. When the utilization is no more than 0.3, the energy consumption of T0-T100 is very close. Under those utilization, the energy savings of tasks mainly come from their static slowdown factors. Due to their bigger static slowdown factors, the G1-type subtasks and the G2-type subtasks except the final subtasks of HRCTs are all running at the lowest CPU speed. In these five task sets, the difference of energy consumption is mainly due to the difference of the energy consumption caused by the non-scaling final subtasks of HRCTs. When the utilization is greater than 0.3, the energy consumption of T0 is obviously lower than that of other task sets. The reason is all tasks in SRT can use their TSFS-EN factors and dynamically reclaim and reuse runtime slack without requiring meeting real-time requirements, which makes it use the energy-saving capability of tasks more effectively. Although we can also see T0 ≥ T66 ≥ T50 ≥ T33 ≥ T100 in energy consumption at most case, there are some abnormal points. For example, at the utilization of 0.7, T66 and T100 have similar energy consumption, and T33 has more energy consumption than that of T50. This is because the G1-type subtasks have the favorite running speeds and the reserved energy may not be fully used in the HTDVS algorithm. When the utilization is greater than 0.7, the energy consumption among T33-T100 is very close to each other. It means even little number of HRCTs will have strongly influence on the energy-saving effect in hybrid tasks systems with great utilization. It is because the hard real-time requirements of HRCTs should be guaranteed by restricting other tasks' slowdown factors.

Figure 5 shows the DMR of SRTs when performing the experiments in Figure 4. There is no T100 because there is no SRT in T100. Figure 5 shows the DMR of all four task sets is zero when the utilization is less than 0.4. It is because tasks have less WCET at lower utilization, the main energy savings come from their static TSFS-ENs. Because of the restriction of the lowest CPU running speed, their WCRT does not exceed their deadlines after using HTDVS. When the utilization is greater than 0.4, the DMR of T0 and T33 is bigger than zero. T0 has the largest DMR is because the tasks in T0 uses static TSFS-EN factors as their slowdown factors and dynamically reclaim and reuse slack time at runtime without mandatory requirements in meeting the deadlines of tasks, which will lead to much interference time among tasks. With the increment of utilization, the increment of interference time among tasks makes more tasks miss their deadlines. The DMR of T33 keeps stable from the utilization of 0.5. The increment of the DMR of T33 is mainly contributed by some SRTs which have less TSFS-EN factors and are easy to miss their deadlines, and these tasks do not increase with the increment of utilization (of course, whether the DMR of tasks will increase is dependent on the distribution of TSFS-EN factors of tasks.). The DMR of T50 and T66 is always zero in Figure 5 because more HRCTs in the two task sets exert more restriction on the slowdown factors of tasks and their dynamic slack time reuse. Note that although the values of the DMR in Figure 5 have something to do with the subtasks' structure and TSFS-EN distribution, more HRCTs will lead to lower DMR.

6.2. Different Energy Reuse Algorithms

The greedy algorithm is a widely used dynamic energy reclamation and reuse algorithm [8,20,36], and has proved its good energy-saving effects. In this experiment, we compared the energy-saving effect of the HTDVS algorithm to that of the greedy algorithm. We use a randomly generated task set with 50% HRCTs and 50% SRTs. Because the subtasks in HoW have different function weight, we compare their energy-saving effect in two cases, i.e., without weight and with weight respectively. When not considering weight, we believe the energy-saving benefit is the same among all subtasks, and compared energy consumption ratio between the HTDVS algorithm and the greedy algorithm. When considering weight, we compared the weighted energy consumption between the HTDVS algorithm and the greedy algorithm. The weighted energy consumption of a task is the sum of the multiplication of energy-saving energy of each subtask and the function weight of each subtask. In Figure 6, T1 denotes the energy consumption when the HTDVS algorithm is used, and T2 denotes the energy consumption when the greedy algorithm is used. The experiment results are shown in Figures 6 and 7, respectively.

Figure 6 shows the energy consumption increase with the increment of utilization whether using the HTDVS algorithm or the greedy algorithm. The lowest energy consumption in T1 and T2 is about 18% due to the same reason as in experiment 1. When the utilization is greater than 0.3, the energy consumption of T1 is usually more than that of T2 because the reserved energy in the HTDVS algorithm may not be fully used, and the G1-type subtasks can only use some specific energy, while the subtasks can try its best to use any slack time in the greedy algorithm. However, the energy-saving effect is very close between T1 and T2 at the most case, which proves the HTDVS algorithm have good energy-saving effect.

Figure 7 shows the energy-saving effect of T2 is better than that of T1 when we consider the function weight. It is because the energy-reserving mechanism in the HTDVS algorithm can serve for subtasks with larger function weight, and obtain more energy-saving benefit.

6.3. Different Subtask Type Ratio

In this experiment, we use a randomly generated task set with 50% HRCTs and 50% SRTs. After generated the task set, we randomly change the energy-saving goals of subtasks and make the tasks with G2-type energy-saving goals have the following ratio: 0, 33%, 50%, 66%, and 100%, corresponding to T0-100 respectively. Under each utilization, we measure the energy consumption when using the HTDVS algorithm. The experimental results are shown in Figure 8.

Figure 8 shows the energy consumption increase with the increment of utilization. When the utilization is less than 0.2, the energy consumption of all five task sets is restricted by the lowest CPU energy consumption and the energy consumption of the final subtasks of HRCTs. Because the lowest CPU energy consumption is the same and the energy consumption of the final subtasks of HRCTs is very close, the energy consumption of the five task sets is almost equal. When the utilization is greater than 0.3, the energy consumption of T0, T33, T50, T66, and T100 is in descending order. It is because the G2-type subtasks can use dynamic slack time effectively compare to the G1-type subtasks with specific favorite running speeds. More G2-type subtasks can fully use dynamic slack time to lower the subtasks' speeds, and obtain better energy-saving effect.

7. Conclusions and Future Work

Aiming at the energy-saving problem for IoT control devices, we present the HoW task model and an energy-saving method called HTDVS. Experimental results show the HTDVS algorithm is influenced by the ratio of HRCTs and the energy-saving goals of subtasks, and it has similar energy-saving effect with the greedy algorithm. Our future work will focus on: (1) how to extend HoW to model aperiodic tasks and sporadic tasks, extend the processor model to multiple core processors, and integrate the new system model into HTDVS; (2) how to accelerate specific SRTs to meet their DMR under a given threshold; and (3) how to integrate other constraints, such as temperature, into energy-saving algorithm in order to avoid errors when software runs in extreme environment.

Acknowledgments

This work has been supported by the National Natural Science Foundation of China (No. 60773042 and No. 60903167), the sub-foundation of Zhejiang Provincial Key Innovation Team on Sensor Networks (No. 2009R50046-3), the Zhejiang Provincial Key Science and Technology Program (No. 2009C14013), the Zhejiang Provincial Natural Science Found (No. Y1101336) and the Scientific Research Found (No. KYS055608107).

References

  1. Brock, L. The Electronic Product Code (EPC)—A naming Scheme for Physical Objects, Available online: http://autoid.mit.edu/whitepapers/MIT-AUTOID-WH-002.PDF (accessed on 2 June 2012).
  2. Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar]
  3. Liu, Y. From pervasive computing, CPS, to internet of things: A viewpoint for the future internet (in Chinese). Commun. CCF. 2009, 12, 66–69. [Google Scholar]
  4. Bleda, A.L.; Jara, A.J.; Maestre, R.; Santa, G.; Skarmeta, A.F.G. Evaluation of the impact of furniture on communications performance for ubiquitous deployment of wireless sensor networks in smart homes. Sensors 2012, 12, 6463–6496. [Google Scholar]
  5. Xia, F.; Tian, Y.C.; Li, Y.; Sun, Y. Wireless sensor/actuator network design for mobile control applications. Sensors 2007, 7, 1793–1816. [Google Scholar]
  6. Saewong, S.; Rajkumar, R. Practical Voltage-Scaling for Fixed-Priority RT-Systems. Proceedings of the 9th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'03), Washington, DC, USA, 27– 30 May 2003; pp. 106–114.
  7. Yao, F.; Demers, A.J.; Shenker, S. A Scheduling Model for Reduced CPU Energy. Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS'95), Milwaukee, WI, USA, 23–25 October 1995; pp. 374–382.
  8. Pillai, P.; Shin, K.G. Real-Time Dynamic Voltage Scaling for Low-Power Embedded Operating Systems. Proceedings of the 18th ACM Symposium Operating Systems Principles (SOSP'01), Chateau Lake Louise, AB, Canada, 21–24 October 2001; pp. 89–102.
  9. Zhu, Y. Feedback EDF scheduling exploiting dynamic voltage scaling. Real Time Syst. 2005, 31, 33–63. [Google Scholar]
  10. Chen, J.; Thiele, L. Energy-Efficient Scheduling on Homogeneous Multiprocessor Platforms. Proceedings of the 25th ACM Symposium on Applied Computing (SAC 2010), Sierre, Switzerland, 22–26 March 2010; pp. 542–549.
  11. Ernst, R.; Ye, W. Embedded Program Timing Analysis Based on Path Clustering and Architecture Classification. Proceedings of the 1997 International Conference on Computer-Aided Design (ICCAD'97), San Jose, CA, USA, 9–13 November 1997; pp. 598–604.
  12. Scordino, C.; Bini, E. Optimal Speed Assignment for Probabilistic Execution Times. Proceedings of the 2nd Workshop Power-Aware Real-Time Computing (PARC'05), Jersey City, NJ, USA, 22 September 2005.
  13. Gruian, F. Hard Real-Time Scheduling Using Stochastic Data and DVS Processors. Proceedings of the 2001 International Symposium on Low Power Electronic and Design (ISLPED'01), Huntington Beach, CA, USA, 6–7 August 2001; pp. 46–51.
  14. Liu, Y.; Mok, A.K. An Integrated Approach for Applying Dynamic Voltage Scaling to Hard Real-Time Systems. Proceedings of the 9th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'03), Washington, DC, USA, 27– 30 May 2003; pp. 116–123.
  15. Kargahi, M.; Movaghar, A. A Stochastic DVS-Based Dynamic Power Management for Soft Real-Time Systems. Proceedings of the IEEE International Conference on Wireless Networks, Communications and Mobile Computing Mobility Management and Wireless Access (Wirelsscom/MobiWac 2005), Maui, HI, USA, 13– 16 June 2005; pp. 63–68.
  16. Qiu, M.; Xue, C.; Shao, Z.; Sha, E.H.M. Energy Minimization with Soft Real-time and DVS for Uniprocessor and Multiprocessor Embedded Systems. Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2007 (DATE '07), Nice, France, 16– 20 April 2007; pp. 1–6.
  17. Rusu, C.; Xu, R.; Melhem, R.; Mossé, D. Energy-Efficient Policies for Request-Driven Soft Real-Time Systems. Proceedings of the 16th Euromicro Conference on Real-Time Systems (ECRTS'04), Catania, Sicily, Italy, 30 June–2 July 2004; pp. 175–183.
  18. Kluge, F.; Uhrig, S.; Mische, J.; Satzger, B.; Ungerer, T. Optimisation of Energy Consumption of Soft Real-Time Applications by Workload Prediction. Proceedings of the 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops (ISORCW 2010), Parador of Carmona, Spain, 5– 6 May 2010; pp. 63–72.
  19. Yuan, W.; Nahrstedt, K. Energy-Efficient Soft Real-Time CPU Scheduling for Mobile Multimedia Systems. Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003 (SOSP 2003), Sagamore, Bolton Landing (Lake George), NY, USA, 19–22 October 2003; pp. 149–163.
  20. Gao, Z.; Wu, Z.; Lin, M. Energy-efficient scheduling for small pervasive computing devices under fixed-priority multi-subtask model. Intell. Autom. Soft Comput. 2008, 15, 509–524. [Google Scholar]
  21. Chamam, A.; Pierre, S. On the planning of wireless sensor networks: Energy-efficient clustering under the joint routing and coverage constraint. IEEE Trans. Mob. Comput. 2009, 8, 1077–1086. [Google Scholar]
  22. Wang, X.; Ding, L.; Bi, D.; Wang, S. Energy-efficient optimization of reorganization-enabled wireless sensor networks. Sensors 2007, 7, 1793–1816. [Google Scholar]
  23. Xia, F.; Yang, X.; Liu, H.; Zhang, D.; Zhao, W. Energy-efficient opportunistic localization with indoor wireless sensor networks. Comput. Sci. Inform. Syst. 2011, 8, 973–990. [Google Scholar]
  24. Yoerger, D.R.; Jakuba, M.; Bradley, A.M.; Bingham, B. Techniques for deep sea near bottom survey using an autonomous underwater vehicle. Robot. Res. 2007, 28, 416–429. [Google Scholar]
  25. Aroca, R.V.; Burlamaqui, A.F.; Gonçalves, L.M.G. Method for reading sensors and controlling actuators using audio interfaces of mobile devices. Sensors 2012, 12, 1572–1593. [Google Scholar]
  26. Jing, L.; Zhou, Y.; Cheng, Z.; Huang, T. Magic Ring: A Finger-worn device for multiple appliances control using static finger gestures. Sensors 2012, 12, 5775–5790. [Google Scholar]
  27. Cervin, A.; Lincoln, B.; Eker, J.; Arzen, K.-E.; Buttazzo, G. The Jitter Margin and Its Application in the Design of Real-time Control Systems. Proceedings of the 10th Real-Time and Embedded Computing Systems and Applications (RTCSA 2004), Gothenborg, Sweden, 25–27 August 2004.
  28. Wolf, W. Modern VLSI Design. In Prentice Hall Modern Semiconductor Design Series, 3rd ed.; Prentice Hall: Upper Saddle River, NJ, USA, 2002; Chapter 2. [Google Scholar]
  29. Harbour, M.G.; Klein, M.H.; Lehoczky, J. Timing analysis for fixed-priority scheduling of hard real-time systems. IEEE Trans. Softw. Eng. 1994, 20, 13–28. [Google Scholar]
  30. Gao, Z.; Wu, Z. Schedulability analysis for linear transactions under fixed priority hybrid scheduling. J. Zhejiang Univ. Sci. A. 2008, 9, 776–785. [Google Scholar]
  31. Audsley, N.C.; Bletsas, K. Fixed Priority Timing Analysis of Realtime Systems with Limited Parallelism. Proceedings of the 16th Euromicro Conference on Real-Time Systems (ECRTS 2004), Catania, Sicily, Italy, 30 June–2 July 2004; pp. 231–238.
  32. Yun, H.; Kim, J. On energy-optimal voltage scheduling for fixed priority hard real-time systems. ACM Trans. Embed. Comput. Syst. (TECS) 2003, 2, 393–430. [Google Scholar]
  33. Aydin, H.; Melhem, R.; Mossé, D.; Mejia-Alvarez, P. Power-aware scheduling for periodic real-time tasks. IEEE Trans. Comput. 2004, 53, 584–600. [Google Scholar]
  34. Qadi, A.; Goddard, S.; Farritor, S. A Dynamic Voltage Scaling Algorithm for Sporadic Tasks. Proceedings of the 24th Real-Time Systems Symposium (RTSS'03), Cancun, Mexico, 3–5 December 2003; pp. 52–62.
  35. Crusoe Processor Model TM5800 Version 2.1 Data Book Revision 2.01, Available online: http://www.datasheets.org.uk/TM5800-datasheet.html (accessed on 3 April 2012).
  36. Zhu, D.; Mosse, D.; Melhem, R.G. Power-aware scheduling for AND/OR graphs in real-time systems. IEEE Trans. Parallel Distrib. Syst. 2004, 15, 849–864. [Google Scholar]
Figure 1. Structure of a HRCT τi.
Figure 1. Structure of a HRCT τi.
Sensors 12 11334f1 1024
Figure 2. Process of assigning tasks' speeds.
Figure 2. Process of assigning tasks' speeds.
Sensors 12 11334f2 1024
Figure 3. Task level tree in [20].
Figure 3. Task level tree in [20].
Sensors 12 11334f3 1024
Figure 4. Normalized energy consumption at different task type ratio.
Figure 4. Normalized energy consumption at different task type ratio.
Sensors 12 11334f4 1024
Figure 5. DMR of SRTs at different task type ratio.
Figure 5. DMR of SRTs at different task type ratio.
Sensors 12 11334f5 1024
Figure 6. Normalized unweighted energy consumption when using different energy-saving algorithms.
Figure 6. Normalized unweighted energy consumption when using different energy-saving algorithms.
Sensors 12 11334f6 1024
Figure 7. Normalized weighted energy consumption when using different energy-saving algorithms.
Figure 7. Normalized weighted energy consumption when using different energy-saving algorithms.
Sensors 12 11334f7 1024
Figure 8. Normalized energy consumption at different subtask type ratio.
Figure 8. Normalized energy consumption at different subtask type ratio.
Sensors 12 11334f8 1024

Share and Cite

MDPI and ACS Style

Gao, Z.; Wu, Y.; Dai, G.; Xia, H. Energy-Efficient Scheduling for Hybrid Tasks in Control Devices for the Internet of Things. Sensors 2012, 12, 11334-11359. https://doi.org/10.3390/s120811334

AMA Style

Gao Z, Wu Y, Dai G, Xia H. Energy-Efficient Scheduling for Hybrid Tasks in Control Devices for the Internet of Things. Sensors. 2012; 12(8):11334-11359. https://doi.org/10.3390/s120811334

Chicago/Turabian Style

Gao, Zhigang, Yifan Wu, Guojun Dai, and Haixia Xia. 2012. "Energy-Efficient Scheduling for Hybrid Tasks in Control Devices for the Internet of Things" Sensors 12, no. 8: 11334-11359. https://doi.org/10.3390/s120811334

APA Style

Gao, Z., Wu, Y., Dai, G., & Xia, H. (2012). Energy-Efficient Scheduling for Hybrid Tasks in Control Devices for the Internet of Things. Sensors, 12(8), 11334-11359. https://doi.org/10.3390/s120811334

Article Metrics

Back to TopTop