跳到主要內容

臺灣博碩士論文加值系統

(3.236.84.188) 您好!臺灣時間:2021/08/06 12:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:李育翰
研究生(外文):Yu-Han Li
論文名稱:設計與實作一個適用於無線感測網路下雙節點系統之檢查點與重啟點機制
論文名稱(外文):A Design and Implementation of Checkpoint/Restart Scheme in Dual-Mote Systems for Wireless Sensor Networks
指導教授:張軒彬張軒彬引用關係
學位類別:碩士
校院名稱:國立中興大學
系所名稱:資訊科學與工程學系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
畢業學年度:97
語文別:中文
論文頁數:40
中文關鍵詞:檢查點/重啟點嵌入式作業系統缺乏記憶體管理單元
外文關鍵詞:Checkpoint/RestartEmbedded OSMMU-less
相關次數:
  • 被引用被引用:2
  • 點閱點閱:148
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
現今無線感測網路常肩負著長週期工作的使命。許多無線感測節點部署的地區也可能面臨著嚴酷的環境考驗,容易導致節點在工作週期裡就意外地產生了錯誤喪失了它的功能性。本文以雙節點架構為基礎,為無線感測網路實作了一個檢查點和重啟點的機制。
除此之外,基於成本和電源消耗的考量,無線感測節點上的微控制器通常是不具備記憶體管理單元。因此,我們也為此平台設計了三種增量式檢查點的機制。在每一檢查點執行的週期裡,我們善用了sandboxing的概念來追蹤記憶體變更的區域。此三類增量式檢查點主要不同在於,產生的檢查點檔案大小與系統執行時的額外負擔;產生較小的檢查點檔案隱含著會有著較大的執行負擔。
最後我們實作了本系統於Mica2感測節點上。在實驗結果裡,我們發現僅需不到6.5毫秒的時間就可完成所需的操作,此機制便能使得感測網路平台能有著更高的信賴度。
Wireless sensor networks are usually expected to work for a long period of time. Furthermore, lots of wireless sensor network applications are deployed in the rigorous environments. As a result, sensor nodes are usually prone to errors and would miss their function during their lifetime. In this thesis, on the basis of dual-mote architecture, we thus implement a checkpoint/restart scheme for wireless sensor networks.
In addition, due to the considerations of cost and energy consumption, the microcontroller equipped in each wireless sensor node usually does not have the memory management unit. Consequently, we also design three incremental checkpoint schemes in the MMU-Less sensor nodes. We leverage the idea of sandboxing to track the memory regions changed during each checkpoint period. The three incremental checkpoint mechanisms differ in the checkpoint data size and system execution overhead. The smaller the checkpoint data size, the larger the execution overhead.
We have implemented our system in the Mica2 mote. For the experimental result, the operations take less than 6.5ms on the sensor node platform. The scheme increases the reliability of the sensor network platform effectively
第一章 緒論 1
1.1 簡介 1
1.2 動機 2
1.3 貢獻 3
1.4 論文架構 3
第二章 相關研究 4
2.1 Checkpoint/Restart 4
2.1.1 Libckpt 4
2.1.2 Diskless Checkpointing 7
2.2 Memory Region Tracking Technique 9
2.2.1 Harbor 9
2.3 Power Analysis 12
2.3.1 Power Analysis of Embedded Software 12
2.4 作業系統(Operating System) 15
2.4.1 核心 15
2.4.2 模組 17
第三章 系統設計與實作 19
3.1 系統架構(System Architecture) 19
3.2 基本型檢查點檢查(Base Checkpoint) 20
3.2.1 基礎環境 20
3.2.2 設計 21
3.2.3 實作 22
3.2.4 最佳化 27
3.3 增量式檢查點(Incremental Checkpoint Scheme) 27
3.3.1 方法一 – 檔頭資訊 27
3.3.2 方法二 – 針對更改流程指令 29
3.3.3 方法三 – 針對記憶體寫入的指令 30
3.3.4 以耗電為觀點之策略選擇法 31
第四章 實驗結果 33
4.1 實驗環境 33
4.2 記憶體使用量 34
4.3 執行時間 35
第五章 結論及未來工作 37
參考文獻 38
[1] K. Lorincz, D. Malan, T. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, M. Welsh and S. Moulton, “Sensor Networks for Emergency Response: Challenges and Opportunities”, IEEE Pervasive Computing, v.3 n.4, p.16-23, October 2004
[2] W. M. Merrill, L. Girod, B. Schiffer, D. McIntire, G. Rava, K. Sohrabi, F. Newberg, J. Elson and W. Kaiser, “Dynamic Networking and Smart Sensing Enable Next-Generation Landmines”, IEEE Pervasive Computing, v.3 n.4, p.84-90, October 2004.
[3] A. Mainwaring, J. Polastre, R. Szewcyk, D. Culler and J. Anderson, ” Wireless Sensor Networks for Habitat Monitoring”, ACM Workshop on Sensor Networks and Applications, 2002
[4] T. Kijewski-Correa, M. Haenggi, and P. Antsaklis, “Wireless Sensor Networks for Structural Health Monitoring: A Multi-Scale Approach”, Proceedings of Structures Congress 2006, St. Louis.
[5] Elmootazbellah Nabil Elnozahy, David B. Johnson, and Willy Zwaenepoel, “The Performance of Consistent Checkpointing”, Proceedings of the 11th Symposium on Reliable Distributed Systems, 1992
[6] Kai Li, Jeffrey F. Naughton, and James S.Plank, “Low-Latency, Concurrent Checkpointing for Parallel Programs”, IEEE Trans. on Parallel and Distributed Systems, Vol.5, No.8, Aug. 1994.
[7] Golden G. Richard III and Mukesh Singhal, “Using Logging and Asynchronous Checkpointing to Implement Recoverable Distributed Shared Memory”, Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993
[8] Roberto Gioiosa, Jose Carlos Sancho, Song Jiang, and Fabrizio Petrini, “Transparent, Incremental Checkpointing at Kernel Level: a Foundation for Fault Tolerance for Parallel Computers”, Proceedings of the 2005 ACM/IEEE conference on Supercomputing, Page 9, 2005
[9] James S. Plank, Micah Beck, Gerry Kingsley, and Kai Li, “Libckpt: Transparent Checkpointing under Unix”, Proceedings of the Usenix Winter 1995 Technical Conference, New Orleans, LA, January, 1995
[10] James S. Plank, Kai Li and Michael A. Puening, “Diskless Checkpointing”, IEEE Transactions on Parallel and Distributed Systems, October, 1998
[11] Robert Wahbe, Steven Lucco, Thomas E. Anderson, Susan L. Graham, “Efficient software-based fault isolation”, Proceedings of the fourteenth ACM symposium on Operating systems principles, Page.203-216, December 05-08, 1993, Asheville, North Carolina, United States
[12] Bryan Ford and Russ Cox, “Vx32: Lightweight, User-level Sandboxing on the x86”, Proceedings of the 2008 USENIX Annual Technical Conference
[13] Haizhi Xu, Wenliang Du, and Steve J. Chapin, “Detecting Exploit Code Execution in Loadable Kernel Modules”, Proceedings of the 20th Annual Computer Security Applications Conference, 2004
[14] R. Kumar, E. Kohler, and M. Srivastava, ”Harbor: Software based memory protection for sensor nodes.” Proceeding of the 6th International Symposium on Information Processing in Sensor Networks, Pages 340-349, 2007
[15] Chih-Chieh Han, Ram Kumar Rengaswamy, Roy Shea, Eddie Kohler and Mani Srivastava, “A Dynamic Operating System for Sensor Nodes,” In Proceedings of the 3rd ACM MobiSys, 2005
[16] Ching-Long Su, Chi-Ying Tsui, and Alvin M. Despain, “Low Power Architecture Design and Compilation Techniques for High-Performance Processors”, Proceddings of the IEEE COMPCON, Feb. 1994
[17] Doherty, L., Warneke, B., Boser, B. and Pister, K., "Energy and Performance Considerations for Smart Dust", International Journal of Parallel Distributed Systems and Networks, Vol.4, No.3, 2001
[18] V.Tiwari, S.Malik, and A. Wolfe, “Power analysis of embedded software: A first step towards software power minimization”, IEEE Transactions on VLSI systems, Vol. 2, No. 4 , Dec. 1994
[19] Jason Hill, “A Software Architecture Supporting Networked Sensors,”, Master thesis, Department of Electrical Engineering and Computer Sciences, University of California at Berkeley.
[20] S. Bhatti, J. Carlson, H. Dai, J. Deng, J. Rose, A. Sheth, B. Shucker, C. Gruenwald, A. Torgerson, R. Han, "MANTIS OS: An Embedded Multithreaded Operating System for Wireless Micro Sensor Platforms", The Journal of ACM/Kluwer Mobile Networks & Applications, 2005
[21] L. Gu and J. A. Stankovic, "t-kernel: Providing Reliable OS Support for Wireless Sensor Networks", In Proceedings of the 4th ACM Conference on Embedded Networked Sensor Systems (SenSys''06), Nov., 2006
[22] NEST Project http://webs.cs.berkeley.edu/nest-index.html
[23] Gaurav Mathur, Peter Desnoyers, Deepak Ganesan, and Prashant Shenoy, “Ultra-Low Power Data Storage for Sensor Networks ”, Proceedings of the 5th international conference on Information processing in sensor networks, 2006
[24] The AVR-LIBC document: http://www.nongnu.org/avr-libc/user-manual/
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top