吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (5): 1398-1403.doi: 10.7964/jdxbgxb201405028

Previous Articles     Next Articles

Worst case of CAN massage response time in FPNS

CHEN Yun-han1,QIN Gui-he1,2,CHEN Si-guo1,CANG Chen-yang1,GAO Yang3   

  1. 1.College of Computer Science and Technology, Jilin University, Changchun 130012,China;
    2.State Key Laboratory of Automobile Simulation and Control, Jilin University, Changchun 130022, China;
    3.Information Communication Company, Jilin Electric Power Company Limited, Changchun 130021, China
  • Received:2013-05-07 Online:2014-09-01 Published:2014-09-01

Abstract: In the Fixed Priority Non-preemptive Scheduling (FPNS) research for Controller Area Network (CAN) message set, the existing Worst Case Response Time (WCRT) analysis may draw wrong conclusions to the schedulability of certain message sets. To overcome this problem, based on the message busy period concept of PFNS for CAN message set, this paper reanalyzes the scenarios that message enters the transmit queue of node for the first time and the subsequent times, and revises the worst case response time. The WCRT calculated from this worst case is employed to revise the optimistic result obtained by tradition WCRT analysis, and eliminate the pessimistic factor introduced in the modified WCRT analysis.

Key words: computer application, controller area network, fixed priority non-preemptive scheduling, response time, worst case

CLC Number: 

  • TP336
[1] 饶运涛,邹继军,郑勇芸. 现场总线CAN原理与应用技术[M]. 北京:北京航空航天大学出版社, 2003.
[2] Cena G, Valenzano A, Vitturi S. Advances in automotive digital communications[J]. Computer Standard and Interface, 2005, 27(5): 665-678.
[3] Davis R I, Burns A, Bril R J, et al. Controller area network (CAN) schedulability analysis: refuted, revisited and revised[J]. Real-Time System, 2007, 35(3): 239-272.
[4] Broster I, Burns A, Rodriguez-Navas G. Timing analysis of real-time communication under electromagnetic interference[J]. Real-Time System, 2005, 30(1/2):55-81.
[5] Lehoczky J P. Fixed priority scheduling of periodic task sets with arbitrary deadline[C]∥Proceedings Real-Time Symposium,IEEE, 1991: 201-209.
[6] Tindell K W, Hansson H, Wellings A J. Analysis real-time communications: controller area network (CAN)[C]∥Proceedings Real-Time Systems Symposium,IEEE, 1994: 259-263.
[7] Tindell K W, Burns A, Wellings A J. Calculating controller area network(CAN) message response times[J]. Control Engineering Practice, 1995,8(3):1163-1169.
[8] Bril R J, Lukkien J J, Davis R I, et al. Message response time analysis for ideal Controller Area Network (CAN) refuted[R].CS-Report 06-09, Technische Universiteit Eindhoven (TU/e), The Netherlands, 2006.
[9] Harbour M G, Klein M H, Lechoczky J P. Fixed priority scheduling of periodic tasks with varying execution priority[C]∥Proceedings 12th IEEE Real-Time Systems Symposium,IEEE,1991: 116-128.
[10] Liu C L, Layland J W. Scheduling algorithms for multiprogramming in a hard real-time environment[J]. JACM, 1973, 20(1): 46-61.
[11] Joseph M, Pandya P. Finding response times in a real-time system[J]. Computer Journal, 1986, 29(5): 390-395.
[12] Audsley N, Burns A, Richardson M, et al. Applying new scheduling theory to static priority pre-emptive scheduling[J]. Software Engineering Journal, 1993, 8(5): 284-292.
[13] SAE. Class C Application Requirement Considerations[R]. Technical Report J2056/1, SAE Handbook: 23.366-23.371, 1993.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!