Embedded Virtual Machines for Robust Wireless Control Systems

Embedded Virtual Machines for Robust Wireless Control Systems

University of Pennsylvania ScholarlyCommons Real-Time and Embedded Systems Lab (mLAB) School of Engineering and Applied Science 1-1-2009 Embedded Virtual Machines for Robust Wireless Control Systems. Rahul Mangharam University of Pennsylvania, [email protected] Miroslav Pajic University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/mlab_papers Recommended Citation Rahul Mangharam and Miroslav Pajic, "Embedded Virtual Machines for Robust Wireless Control Systems.", . January 2009. Suggested Citation: Mangharam, R. and Pajic, M. (2009). Embedded Virtual Machines for Robust Wireless Control Systems. Distributed Computing Systems Workshops, 2009. ©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. http://dx.doi.org/10.1109/ICDCSW.2009.31 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/mlab_papers/27 For more information, please contact [email protected]. Embedded Virtual Machines for Robust Wireless Control Systems. Abstract Embedded wireless networks have largely focused on openloop sensing and monitoring. To address actuation in closedloop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), a powerful and flexible programming abstraction where virtual components and their properties are maintained across node boundaries. In the context of process and discrete control, an EVM is the distributed runtime system that dynamically selects primary-backup sets of controllers to guarantee QoS given spatial and temporal constraints of the underlying wireless network. The EVM architecture defines explicit mechanisms for control, data and fault communication within the virtual component. EVM-based algorithms introduce new capabilities such as predictable outcomes and provably minimal graceful degradation during sensor/actuator failure, adaptation to mode changes and runtime optimization of resource consumption. Through the design of a natural gas process plant hardware-in-loop simulation we aim to demonstrate the preliminary capabilities of EVM-based wireless networks. Keywords Real-time systems, embedded systems, wireless sensor networks, virtual machines. Comments Suggested Citation: Mangharam, R. and Pajic, M. (2009). Embedded Virtual Machines for Robust Wireless Control Systems. Distributed Computing Systems Workshops, 2009. ©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. http://dx.doi.org/10.1109/ICDCSW.2009.31 This conference paper is available at ScholarlyCommons: https://repository.upenn.edu/mlab_papers/27 Embedded Virtual Machines for Robust Wireless Control Systems Rahul Mangharam and Miroslav Pajic Dept. of Electrical & Systems Engineering University of Pennsylvania, U.S.A. {rahulm, pajic}@seas.upenn.edu Abstract ample, are built to operate without interruption for over 25 years and can never be shutdown for preventive maintenance or up- Embedded wireless networks have largely focused on open- grades. They are built with rigid ranges of operating through- loop sensing and monitoring. To address actuation in closed- put and require a significant re-haul to adapt to changing mar- loop wireless control systems there is a strong need to re-think ket conditions. This rigidity has resulted in proprietary sys- the communication architectures and protocols for reliability, tems with limited scope for re-appropriation of resources during coordination and control. As the links, nodes and topology of faults and retooling to match design changes on-demand. For wireless systems are inherently unreliable, such time-critical example, automotive assembly lines lose an average of $22,000 and safety-critical applications require programming abstrac- per minute of downtime [2] during system faults. This has cre- tions where the tasks are assigned to the sensors, actuators ated a culture where the operating engineer is forced to patch a and controllers as a single component rather than statically faulty unit in an ad hoc manner which often necessitates mask- mapping a set of tasks to a specific physical node at design ing certain sensor inputs to let the operation proceed. This pro- time. To this end, we introduce the Embedded Virtual Ma- cess of unsystematic alteration to the system exacerbates the chine (EVM), a powerful and flexible programming abstrac- problem and makes the assembly line difficult and expensive to tion where virtual components and their properties are main- operate, maintain and modify. tained across node boundaries. In the context of process and discrete control, an EVM is the distributed runtime system that dynamically selects primary-backup sets of controllers to guar- Embedded Wireless Sensor-Actuator-Controller (WSAC) antee QoS given spatial and temporal constraints of the under- networks are emerging as a practical means to monitor and op- lying wireless network. The EVM architecture defines explicit erate automation systems with lower setup/maintenance costs. mechanisms for control, data and fault communication within While the physical benefits of wireless, in terms of cable re- the virtual component. EVM-based algorithms introduce new placement, are apparent, automation manufacturers and plant capabilities such as predictable outcomes and provably mini- owners have increasing interest in the logical benefits. mal graceful degradation during sensor/actuator failure, adap- tation to mode changes and runtime optimization of resource With multi-hop WSAC networks, it is possible to build mod- consumption. Through the design of a natural gas process plant ular systems which can be swapped out for off-line maintenance hardware-in-loop simulation we aim to demonstrate the prelim- during faults. Modular systems can be dynamically assigned inary capabilities of EVM-based wireless networks. to be primary or backup on the basis of available resources or availability of the desired calibration. Modularity allows for in- Keywords: Real-time systems, embedded systems, wireless cremental expansion of the plant and is a major consideration in sensor networks, virtual machines. emerging economies. WSAC networks allow for runtime con- figuration where resources can be re-appropriated on-demand, 1. Introduction for example when throughput targets change due to lower price Automation control systems form the basis for significant electricity during off-peak hours or due to seasonal changes in pieces of our nation’s critical infrastructure. Time-critical and end-to-end demand. safety-critical automation systems are at the heart of essential infrastructures such as oil refineries, automated factories, logis- While WSAC networks facilitate both planned and un- tics and power generation systems. Discrete and process control planned mode changes, runtime programmable WSAC net- represent an important domain for real-time embedded systems works allow for flexible item-by-item process customization. with over a trillion dollars in installed systems and $90 billion For example, a high demand for fuel-efficient Toyota Prius’ will in projected revenues for 2008 [1]. require major retooling of a traditional wired factory that is de- In order to meet the reliability requirements, automation sys- signed for the Toyota Camry chassis. With re-programmable tems are traditionally severely constrained along three dimen- WSAC, the assembly line stations can adapt to a schedule where sions, namely, operating resources, scalability of interconnected every 3 Camrys are interleaved with 2 Prius’ with synchronized systems and flexibility to mode changes. Oil refineries, for ex- changes in operation modes and assembly line operations. 1 Figure 1. (a) A wireless sensor, actuator and controller network. (b) Algorithm assignment to a set of controllers, each mapped to the respective nodes. (c) Three Virtual Components, each composed of several network elements 1.1. Embedded Virtual Machines sensor inputs, etc.). The current generation of embedded wireless systems has 3. Composable and reconfigurable runtime system through largely focused on open-loop sensing and monitoring applica- synthesis In the EVM approach, a collection of sensors, actu- tions. To address actuation in closed-loop wireless control sys- ators and controllers make a Virtual Component as shown in tems there is a strong need to re-think the communication archi- Fig. 1. A Virtual Component is a composition of interconnected tectures and protocols for reliability, coordination and control. communicating physical components defined by object trans- As the links,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us