Rtnet: a Distributed Real-Time Protocol for Broadcast-Capable Networks∗

Rtnet: a Distributed Real-Time Protocol for Broadcast-Capable Networks∗

RTnet: a distributed real-time protocol for broadcast-capable networks∗ Ferdy Hanssen, Pierre G. Jansen, Hans Scholten, Sape Mullender Distributed and Embedded Systems group Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente PO-Box 217, 7500 AE, Enschede, the Netherlands, FAX: +31 53 489 4590 E-mail: [email protected] Abstract ity of Service (QoS) support and flexibility is required. We RTnet is a distributed real-time network protocol, to will show the analysis and the performance of a current be used on fully-connected local area networks with a prototype on top of Ethernet. broadcast capability. It supports on-the-fly addition and removal of network nodes, resource-lavish and resource- 2. Goals of the protocol lean devices, streaming real-time and regular non-real- time traffic. It allows the use of standard real-time schedul- ing paradigms to control network traffic, allows dynamic The requirements and constraints of our network are: scheduling and is flexible in stream handling. The design is Able to run on resource-lean devices: it must be imple- presented, together with measurement results of an experi- mentable on devices with both few and many resources. ment with an implementation on top of Ethernet. QoS guarantees: to prevent buffer under- and overflow the network should guarantee that messages are delivered before their deadlines. Thus a scheduling technique is required to assure that messages are sent before their 1. Introduction deadlines expire. To give such guarantees, an admission RTnet is a distributed protocol for use on digital net- control, based on feasibility analysis, is required before works with real-time requirements. It allows processors admitting a new real-time stream to the network. So no connected by a broadcast-capable network to communicate streams are admitted that cause other streams to miss in real-time. The control is distributed and all nodes in the their deadlines. network are expected to cooperate to guarantee real-time Non-real-time traffic: besides periodic real-time traffic our behaviour. We describe the goals of the protocol, its de- network protocol should allow for best-effort traf- sign and operation, and the analysis of an implementation fic, which must not affect the deadlines of real-time on top of Ethernet. streams. The only constraint is that the network re- The protocol requires a fully-connected communica- serves a certain percentage of the available bandwidth tion medium, such as a common bus, Ethernet, or a radio for non-real-time traffic. medium, where every message sent can be received directly Fault tolerance: the physical layer of a network generally by all other nodes. Broadcast capabilities are needed to en- does not provide faultless delivery of all packets. Our able automatic addition and removal of nodes and to syn- network protocol should recover from network faults chronize the nodes’ clocks. during token transmissions. Note, however, that dead- The protocol supports both real-time and non-real-time line misses are impossible to rule out when network communication. Applications are able to reserve a portion faults occur. of the available bandwidth to transmit real-time data, or- Plug-and-play: when a new node is added to the network ganised in streams. At the same time the network uses the it should be recognized by the network protocol and au- remaining bandwidth for best-effort traffic. The network is tomatically added to the schedule. When a node goes scheduled dynamically, using standard real-time schedul- off-line the network should also remove the node from ing algorithms normally used to schedule tasks on a CPU. its internal data structures and update the schedule. Nodes and streams may be flexibly added and removed. Can be based on existing hardware and protocols: it must The protocol can be used in any local area environment be possible to use cheap existing hardware and soft- where a distributed protocol is appropriate and where Qual- ware. This requires that the network used should at least be based on existing hardware. Customized hard- ∗ This work is sponsored by the Netherlands Organisation for Scientific ware would drive up the price of experimental devices Research (NWO) under grant number 612.060.111, and this work is sup- ported by the IBM Equinox programme. considerably. 3. Related work proposed by Gallager, has been modified to allow imple- mentation of Minimum Laxity First (MLF) or other poli- Broadcast networks are typically set up as a shared- cies, to make it suitable for real-time applications. Zhao bus network, where any node can talk directly to all other et al. [14] based the window on the latest time to send nodes. Ethernet 1 [1] is the best-known example of such a a message to make it meet its deadline. Znati [15] built network. Ethernet networks operate at a speed of 10 Mbit/s a simulation of a window protocol which implements the or 100 Mbit/s and can typically be found in home and MLF strategy. Collisions, resulting from messages with office environments. Ethernet networks that operate at equal laxity, are resolved using a MLF policy preserving 1000 Mbit/s are beginning to be used in data and network contention-parameter selection, based on a node’s latest centres. time to send and this node’s position in the logical ring, Common-bus network protocols need a way to resolve in which all nodes have been placed for this protocol. collisions. Ethernet uses an exponential back-off algorithm The real-time network RETHER [16–18], developed at to do this. This algorithm is not deterministic so, in order the State University of New York at Stony Brook, is based to build a real-time network on top of it, determinism will on Ethernet. It uses a token-based technique to regulate have to be enforced by using some algorithm to avoid col- access of all the nodes to the network. This circumvents lisions. There have been and there still are people working the danger of collisions inherent to the CSMA/CD (Carrier on creating deterministic Ethernet networks, enabling it to Sense Multiple Access with Collision Detection) protocol be used for real-time purposes [2]. employed on Ethernet networks. The simplest approach to have some guarantees on a bus Many solutions exist to create a real-time network from network is by using a TDMA (Time Division Multiple Ac- an existing non-real-time, fully-connected, broadcast ca- cess) approach. Providing guarantees on bandwidth can pable network. However, we consider them inadequate also be achieved by putting contraints on the traffic gener- for our needs. TDMA is inflexible and needs a master ated by the nodes. There are three classes of methods to node. This creates a single point of failure, when this node do this, without making changes to the Ethernet protocols: leaves the network. Traffic smoothing’s statistical method traffic smoothing, virtual time protocols, and window pro- by its nature cannot guarantee real-time demands 100% tocols. of the time. Virtual time and window protocols are com- The traffic smoothing approach [3, 4] uses a statistical plex, making it hard to implement them in resource-lean method to bound the medium access time by limiting the devices. RETHER inspired us to do this work. RETHER packet arrival rate at the Medium Access Control (MAC) uses a long time to switch to real-time mode when the first layer. Thus non-real-time traffic bursts are smoothed: they real-time stream arrives and uses a less than optimal real- are spread out over a longer time period, to allow real-time time scheduling strategy. Our approach does not have these traffic to use the network as soon as it arrives. shortcomings as we will show in this paper. Virtual time protocols, first proposed by Molle and 4. Design of the protocol Kleinrock [5], implement a packet release delay mecha- nism. Zhao and Ramamritham [6] describe several virtual This section describes our real-time token network pro- time CSMA (Carrier Sense Multiple Access) protocols, in tocol. Its specification meets the design requirements given which the virtual clocks differ. Recently Salian et al. [7] in section 2. improved on the minimum-deadline-first variant of Zhao and Ramamritham to support both hard real-time and soft 4.1. Overview real-time messages. El-Derini and El-Sakka [8] proposed a Our protocol provides real-time communication facili- virtual time CSMA variant which uses two priority classes, ties in a distributed manner. It can be implemented on any where higher-priority messages will be given precedence network standard which provides a fully-connected net- when sending. Molle [9] improved the original protocol, work with broadcast capability. For building a prototype allowing for a certain number of priority classes. His sim- we selected Ethernet because it is readily available and ulation results indicate the performance of this prioritized cheap. The Ethernet hardware is not changed. virtual time CSMA protocol compares very favourably to We use a token as a form of shared memory between the other prioritized CSMA protocols [10–12]. nodes. The main difference between our protocol and other Gallager [13] was the first to propose a window proto- token-based protocols is the way the token is distributed col, in which the enabled set of stations are those that have to the nodes in the course of time. E.g., RETHER uses a messages in the queue which were generated during some simple static round-robin method. Our network uses pre- interval, or window. The traditional window protocol, as emptive Earliest Deadline First (EDF) [19]. Any other de- 1This paper will use the term Ethernet throughout for networks adhering sired real-time scheduling algorithm, such as Rate Mono- to the IEEE 802.3 standard.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us