End-to-end Delay Analysis for Mixed-criticality WirelessHART Networks

2015-08-09 02:00XiJinJintaoWangandPengZeng
IEEE/CAA Journal of Automatica Sinica 2015年3期

Xi Jin,Jintao Wang,and Peng Zeng

End-to-end Delay Analysis for Mixed-criticality WirelessHART Networks

Xi Jin,Jintao Wang,and Peng Zeng

—WirelessHART,as a robust and reliable wireless protocol,has been widely-used in industrial wireless sensoractuator networks.Its real-time performance has been extensively studied,but limited to the single criticality case.Many advanced applications have mixed-criticality communications,where different data fl ows come with different levels of importance or criticality.Hence,in this paper,we study the real-time mixedcriticality communication using WirelessHART protocol,and propose an end-to-end delay analysis approach based on fi xed priority scheduling.To the best of our knowledge,this is the fi rst work that introduces the concept of mixed-criticality into wireless sensor-actuator networks.Evaluation results show the effectiveness and ef fi cacy of our approach.

Index Terms—WirelessHART networks,mixed-criticality,endto-end delay,delay analysis.

I.INTRODUCTION

W IRELESSHART[1]is a robust and reliable wireless sensor-actuator network(WSAN)protocol,and has been widely-used in industrial process monitoring and control. It is based on centralized network management and multichannel time division multiple access(TDMA).These special features have attracted researchers’attentions,and they have done some works about real-time performance of WirelessHART networks,e.g.,[2-5].However,all these works focus on the single criticality case.

Advanced real-life applications come with mixed-criticality data communications.Different data fl ows not only own different priorities but also have different levels of importance or criticality.For example,Fig.1 shows different sensor and actuator nodes installed for cement manufacturing.In cement manufacturing,the current data of motors have more importance or higher criticality than the pressure data of preheater.Motor current data must be sent to destinations within their end-to-end deadlines,otherwise production inef fi ciency or even explosions may happen.By contrast,the less important preheater pressure data can miss their deadlines occasionally without causing any serious accidents.However,preheaterpressure data usually have the highest priority due to their frequent state change and urgent transmission requirement. Hence,criticality levels are not equivalent to priorities and are independent of real-time requirements.Mixed-criticality combined with priority provides a way to guarantee both the importance and real-time requirement of data fl ows.During normal operations,all data fl ows are scheduled according to their priorities.During errors or exceptions,the important data are more frequently delivered and more network resources are needed.In this situation,if there are not enough network resources to serve all data,the less important data will be discarded.

Fig.1.The wireless network for cement manufacturing industry.

The key difference between mixed-and single-criticality systems is that the importance of data in mixed-criticality systems must be considered together with real-time performance.This leads to the problem that directly using traditional priority-based scheduling theory of single-criticality systems to mixed-criticality systems is infeasible due to independence between criticality and priority.So the traditional real-time theory needs a revision to support mixed-criticality.The endto-end delay analysis is the foundation of the real-time theory. In this paper,we propose an end-to-end delay analysis approach for fi xed priority scheduling in mixed-criticality realtime WirelessHART networks.To the best of our knowledge, this paper is the fi rst work that introduces the concept of mixed-criticality into real-time WSANs.The end-to-end delay is used to test whether the data fl ows can meet their special requirements at design time,i.e.,analyzing end-to-end delay is the effective way to guarantee systems’reliability.This paper covers the fi rst stage of our study for mixed-criticality realtime WSANs.

In this paper,our contributions are listed as follows:

1)We introduce the concept of mixed-criticality into real-time wireless networks and propose a formulated system model,which is the common platform for mixed-criticality real-time theories of wireless networks.

2)We propose an end-to-end delay analysis approach.It is a fast feasible approach to test the reliability of mixed-criticality systems.

3)Evaluation results show that our approach is very effective and only incurs little pessimism comparing with simulation results and a real testbed.

The rest of this paper is organized as follows:Section II introduces related works.Section III describes the system model.Section IV presents our end-to-end delay analysis. Section V shows evaluation results.And Section VI concludes this paper.

II.RELATEDWORK

The mixed-criticality concept is fi rst introduced to real-time community in[6],and then many works address how to adapt existing uniprocessor/multiprocessor scheduling theories to support both criticality and priority under a single scheduling framework,e.g.,[7-13].But these works do not consider the communication media.

For the communication media,there are a few related works on mixed-criticality.References[14-16]study Network-on-Chips for mixed-criticality multiprocessor systems.[17]proposes mixed-criticality protocols for the controller area network(CAN),and then a response-time analysis method and an optimal priority assignment scheme are provided.[18] designs a virtual CAN controller to provide differentiated services for different criticality levels.[19-21]focus on the wired network-TTEthernet.They propose some scheduling algorithms to guarantee messages’time constraints.To the best of our knowledge,the reference[22]is the only work about wireless networks,which considers mixed-criticality.It introduces mixed-criticality scheduling method to JPEG2000 video systems based on the IEEE 802.11 standard.But WirelessHART networks are based on the IEEE 802.15.4 standard and are quite different from the wireless video system.So existing system models and solutions cannot be used in our model.

III.SYSTEMMODEL

A.Mixed-Criticality WirelessHART Network Model

We consider a WirelessHART network characterized byG=〈V,E,m〉:

1)A WirelessHART network consists of sensor/actuator nodes and a gateway with centralized network manager.We usennodesV={v1,v2,...,vn}to denote these devices, such as,in Fig.1,the gateway isv1and the pressure sensor node of the cooler isv2.Each node is equipped with a transmitter,so it cannot send and receive in the same time slot.

2)E:V×Vis the set of links.Each elementeijinErepresents existing reliable communication betweenviandvj. Transmitting a packet through one link is called transmission.

3)We usemto denote the number of available channels. WirelessHART networks support 16 non-overlapping channels.But not all of these channels can always be accessed, since they may suffer from persistent external interference. Hence,0<m≤16.Each channel supports a transmission in one time slot.

The data fl ow set is denoted byF.Each fl owFiis characterized byFi=〈χi,ci,ti(x),pi,φi〉.pidenotes the distinct fi xed priority.φi(φi⊆E)is an ordered sequence of links and denotes the routing path of the fl owFi.The centralized manager of the WirelessHART network collects sensor data and distributes actuator data,so the gateway is the source or destination for each fl ow.For TDMA protocol, each time slot allows a one-hop data transmission and its acknowledgement to be transmitted.We usecito denote the number of time slots required to deliver a packet from the source to the destination,i.e.,ciis equal to the number of hops of the fl owFi.

χidenotes the criticality level of the fl owFi.For ease of presentation,we only focus on dual-criticality system,in which there are only two criticality levelsL(low)andH(high).However,it can be easily extended to systems with an arbitrary number of criticality levels.Correspondingly, the network also has dual-criticality modes{H,L}.If the criticality level of the fl owFiis not less than the current network modex,it can be delivered;otherwise,the fl ow is discarded.The network starts in the low criticality mode(x=L),in which all fl ows are served.When the error or the exception occurs in a node,the node will trigger the changing of the network mode from low criticality to high criticality (x=H).Then only the fl ows with high criticality level can be delivered,and the low criticality fl ows are discarded.Note that the mode change will introduce additional time to the delay of the high criticality fl ow and the message of mode change should be broadcast to the entire network as soon as possible.There are some methods used to solve this problem. For example,one channel and one transmitter of each node can be reserved to serve the message.The detail of mode change is out of the range of this paper.Therefore,we only model the duration of the mode change asC,which is used to calculate the delay of the packet delivered during the mode change.

When errors and exceptions occur,workers will handle problems and change the mode from high criticality to low criticality.We do not consider this process due to the unpredictability of workers’behavior,i.e.,we do not study the mode change from high criticality to low criticality.The assumption is also widely adopted in existing works([9-10,12,14]et al.).

In mixed-criticality uniprocessor/multiprocessor systems, the execution time of a task is a function of the system mode. In wireless networks,the number of time slots required to deliver a packet is equal to the number of hops and fi xed. However,the periodtiis dependent on the network criticality mode.Since the important fl ow is more frequently delivered when the network mode is changed to high criticality due to exceptions,hence,ti(H)<ti(L).

According to the periodti(x),the fl owFiperiodically releases a packet,which is assigned the parameters speci fi ed inFi.Our system adopts the implicit-deadline,i.e.,the packet’s relative deadline is equal to the fl ow’s period corresponding with the network mode of generating the packet.For example, if the packet is released in the network modeL,then its relativedeadline isti(L).So in a stable network,at most one packet of each fl ow is active at any time.But when the network mode is changed fromLtoH,there may exist two active packets belonging to one fl ow because of the change of the fl ow’s period.In this case,the packet released in the network modeHhas higher priority than another.

A packet is released at time slots1,and arrives its destination at time slots2,then its end-to-end delay is(s2-s1+1). The end-to-end delay of a fl ow is the maximum delay among all its packets.If a scheduling algorithm can schedule all fl ows such that all packets’end-to-end delays are less than or equal to their deadlines,the fl ow set is called schedulable under the scheduling algorithm.

Note that not all of the above assumptions are supported by the original WirelessHART protocol.But they can be implemented in the application layer[2-4].In Section V,our real testbed is introduced.

B.Fixed Priority Scheduling

We focus on the end-to-end delay analysis for fi xed priority scheduling,which is the most commonly used real-time scheduling in real-life systems.In fi xed priority scheduling, transmissions are scheduled within a hyper-periodT,which is equal to the least common multiple of periods of all fl ows, since after that all schedulings are cyclically repeated.The period supported by the WirelessHART protocol is 2i,wherei≥0.So the hyper-periodTis equal to the maximum period among all fl ows.At each time slot ofT,if there exist unused channels,the transmission with the highest priority is scheduled.But,if the released transmission shares nodes with the transmissions that have been scheduled at this time slot,it cannot be scheduled since one node cannot serve more than one transmission at one time slot.So there are two factors in fl uencing the transmission scheduling:channel contention (there are no unused channels assigned to the transmission) and transmission con fl icts(a transmission cannot be scheduled, if it shares a node with a transmission that has been scheduled in this time slot)[3].In other words,the two factors introduce extra delays.In the following,we analyze delays introduced by two factors separately.

Problem Statement.Given the mixed-criticality WirelessHART networkG,the fl ow setFand the fi xed priority scheduling algorithm,our objective is to analyze the end-toend delay for each fl ow,such that the schedulability of the fl ow set can be determined.

Table I summarizes the key notations used in this paper.

IV.END-TO-ENDDELAYANALYSIS

Our analysis is based on the end-to-end delay analysis (EDA)method[2],which is the state-of-the-art end-to-end delay analysis for fi xed priority scheduling in single-criticality real-time WirelessHART networks.To make our paper selfcontained,we fi rst introduce EDA.Then we present our end-to-end delay analysis for mixed-criticality WirelessHART networks.

A.Analysis for Single-criticality WirelessHART Networks

The EDA analysis contains two steps.The fi rst step calculates the delay due to channel contention,which is called pseudo upper bound of the worst case end-to-end delay and denoted byThen the second step incorporates the delay due to transmission con fl icts into the result of the fi rst step.

TABLE I KEY NOTATIONS

1)Pseudo delay

The fl owFkexperiences the worst case delay when the level-kbusy period occurs.The level-k busy period is the maximum continuous time interval during which all channels are occupied by fl ows of priority higher than the priority ofFk, untilFkfi nishes its active packet transmitting.The notationhp(Fk)is used to denote the set of fl ows whose priorities are higher thanFk.If the fl owFi(Fi∈hp(Fk))has a packet with release time earlier than the level-kbusy period and deadline in the level-kbusy period,it is said to have carry-in workload in the busy period.Then two types of workload are presented as follows:

whereUk(α)is the sum of the min(|hp(Fk)|,m-1)largest values of the differences(Fi,α)among allFi∈hp(Fk).

The WirelessHART network containsmchannels,so(3) shows the delay due to channel contention.And the pseudo upper boundis the minimal value ofαthat solves(3).αcan be found using the iterative fi xed-point algorithm[23], which is widely used in the delay analysis of real time systems. The iterative calculation ofαstarts atα=ck.During the iterations,ifαis larger than the deadline of the fl owFk,the algorithm terminates and the fl ow set is unschedulable;if the value ofαis fi xed and less than the deadline,the fi xed-point is

2)Worst case delay

This step incorporates the delay due to transmission conf l icts intoto calculate the actual end-to-end delayRk. First,we introduce some de fi nitions.

a)Q(k,i):the total number oftransmissions that share nodes withtransmissions.

b)δj(k,i):the number of nodes along thejth maximal common path betweenFkandFi.is the length of the maximal common path with length at least 4.The delay caused by a maximal common path is at most 3,so the extra length is specially marked using

c)Δ(k,i):the upper bound of end-to-end delay due to transmission con fl icts thatFicontributes toFk,

whereσis the number of maximal common paths betweenFkandFi.

Thus the upper bound of the actual delayRkis the minimal solution of(4)by running the iterative fi xed point algorithm starting atβ=

B.Analysis for Mixed-criticality WirelessHART Networks

Mixed-criticality networks dynamically change the network mode,which results in three types of packets transmitted in the network:

1)The release time and deadline of a packet are all in the network modeL.The end-to-end delay of this packet is denoted byRk(L).

2)The release time and deadline of a packet are all in the network modeH.The notationRk(H)is used to present the upper bound of its delay.

3)When the network mode is changed,the packet,which is released by high criticality fl ow in the network modeL,cannot be dropped.In this situation,the packet’s release time is in the network modeL,but its deadline is in theHmode.Flows formed by these packets are delivered only once.The notationF′presents the set of these fl ows andRk(L2H)denotes the upper bound of the delay.

Rk(L)is unaffected by the mode change and is equal to the delayRkcalculated in single-criticality networks.So we only analyzeRk(H)andRk(L2H).

1)AnalyzingRk(H):In the network modeH,packets belonging to the high criticality fl ow are delivered,no matter when they are released.SoRk(H)is interfered by two fl ow setshpL(Fk)={Fi|Fi∈F′,pi>pk,χi=H}andhpH(Fk)={Fi|Fi∈F,pi>pk,χi=H}.From these, we can derive that the delay due to channel contention is

whereUk(α)is also for the interferences ofhpH(Fk)andhpL(Fk).Note that the interferences of fl ows inhpH(Fk) are the same with(1)and(2),since the fl ows release packets periodically.But the fl owFi(Fi∈hpL(Fk))is delivered only once.In the worst case,its workload in the level-kbusy period is min{α,ci}.SoThen the pseudo upper bound(H)can be derived based on(3).

For the delay due to transmission con fl icts,similarly,besides the periodic fl ows inhpH(Fk),the fl ows inhpL(Fk) delivered only once will introduce Δ(k,i)toRk(H).So

According to(5),the iterative algorithm is used to fi nd the fi xedβ,i.e.,Rk(H).

2)AnalyzingRk(L2H):The fl owFk(Fk∈F′)is divided into two fl ows.The fi rst fl owFkLis delivered in theLmode, and the second fl owFkHis in theHmode.We use(L) and(H)to denote the delays ofFkLandFkH,respectively, wherermeans that the packet has passed throughrhops before the mode change,andr∈[0,ck-1].Correspondingly,ckL=randckH=ck-r.And priorities ofFkLandFkHare assigned aspk.

The calculation of(L)is the same with that ofRk(L), since they are all in the stable network.But(H)is different fromRk(H).According to our system model,packets released byFkin the network modeHhave higher priority than the packets ofFkH.Therefore,the delay contributed by these higher priority packets must be added to(H),i.e.,FkHis interfered byhpL(Fk),hpH(Fk)and{Fk}in the network modeH.From these,we can derive

whereUkHis forhpL(Fk),hpH(Fk)and{Fk}.For the f l owFkH,Fkreleases higher priority packets periodically. The interference introduced byFkis the same with that byhpH(Fk).So(1)and(2)also can be used to calculate it.

For the delay due to transmission con fl icts,the packets released by{Fk}must be considered.Then the actual endto-end delay is shown as follows:

And(H)is also solved by the iterative algorithm.

The range ofris from 0 tock-1.Ifr=0,it means that the packet has been released but not been delivered before the network mode is changed toH.Thus,ckL=0.This will cause the failure of the iterative algorithm.So if∃Fiandpi>pk,αstarts with 1;otherwise,there are no interferences forFkand(L)=0.Ifr=ck,it means that the packet has been delivered to its destination in theLnetwork mode.So the delay of the packet isRk(L).

The delay ofFkis the sum of(L)and(H).But different values ofrlead to different(L)and(H). Therefore,the upper bound ofdelay is

whereCis the additional time introduced by the mode change (shown in Section III).

To sum up,if the fl owFksatis fi esRk(L)≤tk(L),Rk(H)≤tk(H)andRk(L2H)≤tk(L),then it is schedulable. In a fl ow set,if all the fl ows are schedulable,the fl ow set is schedulable.The calculation of our analysis is in pseudo polynomial time because our analysis is based on the iterative fi xed-point algorithm.

V.EVALUATION

Our approach is the fi rst end-to-end delay analysis in mixedcriticality WirelessHART networks.There are no previous works to compare our analysis’performance.Therefore,we compare our analysis with simulations and a real testbed.A.Simulations

In order to illustrate the applicability of our approach,for each parameter con fi guration,100 test cases are generated randomly.For each test case,the gateway is placed at the center and other nodes are placed randomly in the playground areaA.According to the suggestion in[24],the number of nodesnand the playground areaAshould satisfy

where the transmitting rangedis set as 40m.Then each node connects to the nearest node,which must be in its transmitting range and have been connected to the gateway.If some nodes cannot connect to the gateway,their locations are generated randomly again.

The fl ow setFcontains 0.8nfl ows.Other parameters are set as follows.We use the utilizationu(u=P∀Fi∈Fci/ti)

to control the workload of the entire network,and UUniFast algorithm[25]is used to generate each fl ow’s utilizationui(ui=ci/ti).The result generated by UUniFast algorithm follows a uniform distribution and is neither pessimistic,nor optimistic for the analysis.For the fl owFi,its criticality level is assigned randomly.Ifχi=H,thenti(L)=andti(H)=otherwise,ti(L)=andti(H)=+∞.The mode change durationCis set as the maximum number of hops between any two nodes of the network.If one channel and one transmitter of each node are reserved to serve the mode change,the change command can be broadcast to all of nodes in the durationC.The fi xed priority assignment follows the two classical algorithms[26]:1)Deadline monotonic(DM), in which the fl ow with the shorter deadline is assigned the higher priority;2)Proportional deadline monotonic(PD),in which the fl ow with the shorter subdeadline is assigned the higher priority.Subdeadline is de fi ned for its deadline divided by the total number of its transmissions.

The mode change can occur at any time slot.So the simulation should list all cases.But for the complex statespace,the execution time of simulations is unacceptable.So if the execution time exceeds 30 minutes,the simulation is suspended and the maximum delay is chosen as the worst case end-to-end delay.We use pessimism ratio(the proportion of our analyzed delay to the maximum delay observed in simulations)and acceptance ratio(the percentage of fl ow sets that are schedulable)as the performance metrics.

Fig.2 plots the pessimism ratios with different number of nodes.We set thatm=12 andu=1.In order to make test cases simulated in an acceptable time,the number of nodes is only up to 110.From the fi gures,we can see that the 75th percentile of the pessimism ratios is less than 2.1 and 2.2 for DM and PD,respectively.And in[2],the result of the state-of-the-art analysis EDA for single-criticality networks is 1.5 and 1.6,respectively.Comparing with them,our analysis only introduces a small degree of pessimism,even through the mode change increases the complexity of the end-to-end delay analysis.Therefore,our analysis is highly effective.

Fig.2.Pessimism ratio under varying network sizes withm=12.

In order to evaluate the performance of our analysis for the larger scale networks in an acceptable time,we setm=6 andu=1.Fig.3 shows the boxplots of the pessimism ratios under varying network sizes.From the experimental results,we know that our analysis is stable under different network sizes. Comparing with Fig.2,Fig.3 is more pessimistic.Because the less number of channels introduces more contentions,and the delay analysis is to consider the worst case scenario.So all of additional contentions are considered in the delay analysis,but not all of them appear in simulations.Therefore,the analysis with less channels is more pessimistic.

Fig.3.Pessimism ratio under varying network sizes withm=6.

We compare acceptance ratios of our analysis and simulations,and the utilizationuis increased to 3.2.Fig.4 shows the comparison,in whichAMCis our analysis for mixedcriticality networks andSIMis the result of simulations. We observe that our results are close to those of simulations. Therefore,our analysis can be used to verify whether fl ows can meet their deadlines before implementing the real system.

Comparing Fig.4(a)and Fig.4(b),we observe that the acceptance ratio of the policy PD is less than that of the policy DM.It is because that,comparing with the policy DM,the policy PD introduces more interferences for the fl ow with short path,which leads to longer delay.Similarly,all of interferences are considered in the delay analysis,but not all of them appear in simulations.So in Fig.2 and Fig.3,the analysis of PD is more pessimistic than that of DM.

B.The Real Testbed

Fig.4.Acceptance ratio under varying utilizations withm=6.

We implement a real testbed that contains threes types of physical devices:the gateway device,routing devices and fi eld devices.The gateway device manages the network and adopts a low power SoC(system of chip)AT91RM9200 and a CC2420 transceiver chip.The routing device is implemented on a MSP430 and a CC2420.The fi eld device is equipped with a temperature and humidity sensor SHT15 besides a MSP430 and a CC2420.Our testbed supports the IEEE 802.15.4 protocol,which is the physical and MAC(medium access control)layers of WirelessHART networks,and an improved WirelessHART network according to our requirements.The improved WirelessHART implements the speci fi c requirements in the application layer,and it is compatible with the original WirelessHART.Channel 23 is used to broadcast mode change messages and con fi guration messages.Six schedulable channels are 15-20.Additionally,six devices are con fi gured as sniffers to monitor packets transmitted on the six channels. Then the sniffed packet with a timestamp is sent to a PC via a 8-port RS-232 PCI express serial board.

Fig.5 shows our testbed.The network is deployed in a building.For each parameter con fi guration,100 test cases are implemented.The generation of con fi gurations is the same as in simulations.The con fi guration message is sent to devices via the gateway.Fig.6 shows pessimism ratios in a certain scope under different parameters.The point of the pessimism ratio 1.4 reports the number of test cases,whose pessimism ratios are between 1.4 and 1.6.When the utilization is set as 1 and the number of channels is 12,comparing with PD and DM,our average pessimism ratio of 100 test cases is about 2.5 and 2.4,respectively.The result is more pessimistic than simulations.It is because that real cases only cover a little state space.The delay observed in the real testbed is not the worst case delay,while our analysis focuses on the worst case.So for the end-to-end delay,our analysis approach is more reliable than real tests.

Fig.5.Our testbed.

Fig.6.Pessimism ratio on the testbed.

VI.CONCLUSION

Nowadays,multiple criticality levels co-exist in real-life wireless network.But previous works only focus on the single criticality network.We propose an end-to-end delay analysis approach for fi xed priority scheduling in mixed criticality WirelessHART networks,which can be used to determine whether all fl ows can be delivered to destinations within theirdeadlines.In evaluations,we compare our analysis results with simulations and a testbed.The results show that the pessimism of our analysis is acceptable and reliable.

In the further work,we will propose a fi xed priority assignment algorithm based on our delay analysis,and a revision for the dynamic priority assignment will be designed to deal with the dynamic systems.

REFERENCES

[1]WirelessHARTspeci fi catioin[Online],available: http://www.hartcomm2.org,September 30,2014

[2]Saifullah A,Xu Y,Lu C Y,Chen Y X.End-to-end delay analysis for fi xed priority scheduling in WirelessHART networks.In:Proceedings of the 17th IEEE Real-Time and Embedded Technology and Applications Symposium.Chicago,United States:IEEE,2011.13-22

[3]Saifullah A,Xu Y,Lu C Y,Chen Y X.Real-time scheduling for WirelessHART networks.In:Proceedings of the 31st IEEE Real-Time Systems Symposium.San Diego,United States:IEEE,2010.150-159

[4]Saifullah A,Xu Y,Lu C Y,Chen Y X.Priority assignment for real-time fl ows in WirelessHART networks.In:Proceedings of the 23rd Euromicro Conference on Real-Time Systems.Porto,Portugal:IEEE,2011.35-44

[5]Soldati P,Zhang H B,Johansson M.Deadline-constrained transmission scheduling and data evacuation in WirelessHART networks.In:Proceedings of the 10th European Control Conference.Budapest,Hungary: IEEE,2009.1-7

[6]Vestal S.Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance.In:Proceedings of the 28th IEEE Real-Time System Symposium.Tucson,United States:IEEE,2007. 239-243

[7]de Niz D,Lakshmanan K,Rajkumar R.On the scheduling of mixedcriticality real-time task sets.In:Proceedings of the 30th IEEE Real-Time Systems Symposium.Washington,United States:IEEE,2009. 291-300

[8]Baruah S,Li H H,Stougie L.Towards the design of certi fi able mixed-criticality systems.In:Proceedings of the 16th IEEE Real-Time and Embedded Technology and Applications Symposium.Stockholm, Sweden:IEEE,2010.13-22

[9]Baruah S,Bonifaci V,D’Angelo G,Li H H,Marchietti-Spaccamela A, Megow N,Stougie L.Scheduling real-time mixed-criticality jobs.IEEE Transactions on Computers,2012,61(8):1140-1152

[10]Li H H,Baruah S.Global mixed-criticality scheduling on multiprocessors.In:Proceedings of the 24th Euromicro Conference on Real-Time Systems.Pisa,Italy:IEEE,2012.166-175

[11]Baruah S K,Bonifaci V,D’Angelo G,Marchietti-Spaccamela A,Van Der Ster S,Stougie L.Mixed-criticality scheduling of sporadic task systems.In:Proceedings of the 2011 European Conference on Algorithms. Berlin,Germany:Springer,2011.555-566

[12]Guan N,Ekberg P,Stigge M,Wang Y.Effective and ef fi cient scheduling of certi fi able mixed-criticality sporadic task systems.In:Proceedings of the 32nd IEEE Real-Time Systems Symposium.Vienna,Austria:IEEE, 2011.13-23

[13]Huang H M,Gill C,Lu C Y.Implementation and evaluation of mixedcriticality scheduling approaches for sporadic tasks.ACM Transactions on Embedded Computing Systems,2014,13(4):1-25

[14]Tobuschat S,Axer P,Ernst R,Diemer J.IDAMC:a NoC for mixed criticality systems.In:Proceedings of the 19th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.Taipei,China:IEEE,2013.149-156

[15]Diemer J,Ernst R.Back suction:service guarantees for latency-sensitive on-chip networks.In:Proceedings of the 4th ACM/IEEE International Symposium on Networks-on-Chip.Grenoble,France:IEEE,2010. 155-162

[16]Audsley N.Memory architectures for NoC-based real-time mixed criticality systems.In:Proceedings of the 1st Workshop on Mixed Criticality Systems.Vancouver,Canada:IEEE,2013.37-42

[17]Burns A,Davis R I.Mixed criticality on controller area network.In: Proceedings of the 25th Euromicro Conference on Real-Time Systems. Paris,France:IEEE,2013.125-134

[18]Herber C,Richter A,Rauchfuss H,Herkersdorf A.Spatial and temporal isolation of virtual CAN controllers.In:Proceedings of the 19th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.Taipei,China:IEEE,2013.1-7

[19]Tamas-Selicean D,Pop P,Steiner W.Synthesis of communication schedulers for TTEthernet-based mixed-criticality systems.In:Proceedings of the 9th International Conference on Hardware/software Codesign and System Synthesis.New York,United States:IEEE,2011.473-482

[20]Suethanuwong E.Scheduling time-triggered traf fi c in TTEthernet systems.In:Proceedings of the 17th Conference on Emerging Technologies and Factory Automation.Krakow,Poland:IEEE,2012.1-4

[21]Steiner W.Synthesis of static communication schedules for mixedcriticality systems.In:Proceedings of the 14th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshop.Newport Beach,United States:IEEE,2011.11-18

[22]Addisu A,George L,Sciandra V,Agueh M.Mixed criticality scheduling applied to JPEG2000 video streaming over wireless multimedia sensor networks.In:Proceedings of the 1st Workshop on Mixed Criticality Systems.Vancouver,Canada:IEEE,2013.1-6

[23]Joseph M,Pandya P.Finding response times in a real-time system.The Computer Journal,1986,29(5):390-395

[24]Camilo T,Silva J S,Rodrigues A,Boavida F.Gensen:a topology generator for real wireless sensor networks deployment.In:Proceedings of the 2007 International Conference on Software Technologies for Embedded and Ubiquitous Systems.Santorini Island,Greece:Springer, 2007.436-445

[25]Bini E,Buttazzo C C.Measuring the performance of schedulability tests.Real-Time Systems,2005,30(1):129-154

[26]Liu J.Real-Time Systems.United States:Prentice Hall,2000.42-49

Xi Jin graduated from Northeastern University, China,in 2006.She received the M.Sc.and Ph.D. degrees from NEU in 2008 and 2013,respectively. She is currently a research associate at Shenyang Institute of Automation,Chinese Academy of Sciences.Her research interests include wireless sensor networks and real-time systems,especially the realtime scheduling algorithms,and worst case end-toend delay analysis.Corresponding author of this paper.

Jintao Wang graduated from Heilongjiang University,China,in 2010.He received the M.Sc.degree from Northeastern University,China,in 2012.He is currently a Ph.D.candidate at Shenyang Institute of Automation,Chinese Academy of Sciences.His research interests include industrial Ethernet and wireless sensor networks.

receivedhisPh.D.degreefrom ShenyangInstituteofAutomation,Chinese Academy of Sciences.He is currently a professor atShenyangInstituteofAutomation,Chinese Academy of Sciences.His research interests include industrialcommunicationandwirelesssensor networks.

Manuscript received September 29,2014;accepted February 16,2015.This work was supported by the“Strategic Priority Research Program”of the Chinese Academy of Sciences(XDA06020500).Recommended by Associate Editor Xinping Guan.

:Xi Jin,Jintao Wang,Peng Zeng.End-to-end delay analysis for mixed-criticality WirelessHART networks.IEEE/CAA Journal of Automatica Sinica,2015,2(3):282-289

Xi Jin and Peng Zeng are with the Laboratory of Networked Control Systems,Shenyang Institute of Automation,Chinese Academy of Science, Shenyang 110016,China(e-mail:jinxi@sia.cn;zp@sia.cn).

Jintao Wang is with University of Chinese Academy of Sciences,Beijing 100049,China and Shenyang Institute of Automation,Chinese Academy of Science,Shenyang 110016,China(e-mail:wangjintao@sia.cn).