A SCHEDULABILITY ANALYSIS OF AN IEC-61499 CONTROL APPLICATION

A SCHEDULABILITY ANALYSIS OF AN IEC-61499 CONTROL APPLICATION

A SCHEDULABILITY ANALYSIS OF AN IEC-61499 CONTROL APPLICATION Mohamed Khalgui, Xavier Rebeuf, Françoise Simonot-Lion LORIA - INPL Campus S ientique...

229KB Sizes 4 Downloads 110 Views

A SCHEDULABILITY ANALYSIS OF AN IEC-61499 CONTROL APPLICATION

Mohamed Khalgui, Xavier Rebeuf, Françoise Simonot-Lion

LORIA - INPL Campus S ientique, BP 239 54506 Vandoeuvre-lès-Nan y - Fran e {khalgui, rebeuf, simonot}loria.fr tel: +33 3 83 58 17 28, fax: +33 3 83 58 17 01

Abstra t: This paper deals with the temporal orre tness of ontrol appli ations designed using the omponent-based standard IEC 61499. In this standard, a fun tion blo k is dened as an event trigger omponent ontaining its own data. To validate the temporal behavior of an appli ation, we have to take into a

ount its s heduling on the exe ution support. We propose an abstra tion of the omponent behavior taking into a

ount all its possible exe utions. Moreover, we propose to verify the temporal orre tness of the appli ation with regard to global temporal properties (end to end delays). Thanks to su h hara terization, we show that it is possible to he k deadlines for the appli ation to ensure its orre tness. To rea h this goal, we transform the appli ation into a dependant tasks model(Copyright

2005 IFAC).

Keywords: Fun tion Blo ks, IEC 61499, Real Time, s hedulability analysis, oine s heduling.

1. INTRODUCTION

In the ontrol systems eld, the IEC 61499 standard (WG6 2003, WG6 2004) is a omponent-based methodology allowing to design appli ations as well

Industrial ontrol appli ations need to satisfy not only fun tional properties but also temporal ones. To validate a priori the orre tness of su h appli ations, one of the key issues is to model their temporal behaviors. To manage the design omplexity, several methods based on omponents have been proposed (Pe os 2005, holoblo 2005, Stewart et

al. 1997, Arti us 1996). In su h approa hes, evaluating temporal behavior requires also a model of the exe ution support.

as the exe ution support (Crnkovi and Larsson 2002). In the standard, the Fun tion Blo k is dened as an event trigger omponent (Lewis n.d.). It is a reusable fun tional unit of software owning data. A ontrol appli ation is spe ied by a fun tion blo ks network" whi h an be distributed on one or more devi es. Several omplex appli ations have been spe ied using fun tion blo ks (Ifak 2005). Moreover, reusable fun tion blo ks libraries already exist (holoblo 2005).

The standard allows to validate stati interoperabil-

(IEC61131-3 1993) for the Programmable Logi

ity between blo ks. Nevertheless, temporal behavior

Controllers. We an divide its des ription into two

depends on dynami data. Therefore, it is di ult

parts: the ar hite ture des ription and the blo k

to a priori validate temporal interoperability. We

behavior through the events sele tion me hanism.

propose an abstra tion of ea h blo k behavior taking into a

ount all its possible exe utions. Su h abstra tion allows to ompute an upper bound of

2.1 Ar hite ture des ription

the appli ation exe ution time. We show that it is possible to verify the temporal orre tness of the ap-

An appli ation fun tion blo k (FB) (gure 1) is

pli ation with regard to global temporal properties

a fun tional unit of software that supports some

(end to end delays).

fun tionalities of an appli ation. It is omposed by

To validate temporal interoperability, we propose a s hedulability analysis of a fun tion blo ks network distributed on one devi e. To perform su h analysis, we propose to transform the fun tion blo ks appli ation into a parti ular dependent tasks model in the order to take advantages of the results in this eld. Some

works

are

proposed

about

s hedulability

analysis of systems in one pro essor. In the nonpreemptive ase, (Cu u et al. 2002) presents an optimal algorithm to s hedule systems with pre eden e, periodi ity and laten y onstraints (end to end deadline). In addition, (Cu u and Sorel 2003) proves the existen e of a hyper-period

T

an interfa e and an implementation. The interfa e

ontains data/event inputs and outputs supporting the intera tion with the environment. Events are responsible for the a tivation of the fun tion blo k while data ontain valued information. The implementation onsists of a body and a head. The body is omposed of internal data and algorithms implementing the blo k fun tionalities. Ea h algorithm gets values in the input data hannel and produ es values in the output data ones. They are programmed in stru tured text (ST) language (IEC61131-3 1993).

for syn-

hronous systems allowing the proposed algorithm to nd a s hedule applying it from of from 0 to

∞.

0

to

T,

instead

On another side, (Jeay et al. 1991)

gives a s hedulability ondition for a set of periodi and sporadi operations with arbitrary release times. (Howell and k. Venkatrao 1995) studies the omplexity for the problem of non-preemptively s heduling of periodi and sporadi tasks on one pro essor using inserted idle times. Using part of this result, we show that it is possible to generate a safe o-line s heduling for a fun tion blo ks network. Moreover,

Figure 1. An IEC 61499 fun tion blo k

the proposed s hedulability analysis allows to dene a strategy for a fun tion blo k to adapt its internal

The blo k head is onne ted to event ows. It sele ts

behavior a

ording to the s heduling.

the sequen e of algorithms to exe ute with regard to

In the next se tion 2, we briey present the IEC 61499 standard. Then we present our behavior hara terization of an appli ation. The se tion 4 deals with its transformation into a tasks model. In the se tion 5, we propose a generation of tasks dead-

an input event o

urren e. The sele tion me hanism of an event o

urren e is en oded in a state ma hine

alled the Exe ution Control Chart (ECC). At the end of the algorithms exe ution, the ECC sends the

orresponding output event o

urren es.

lines a

ording to the appli ation delays. Finally,

In the standard, a fun tion blo ks network denes

we present a s hedulability analysis based on the

the fun tional ar hite ture of a ontrol appli ation.

generated deadlines.

Ea h fun tion blo k event input (resp. output) is linked to an event output (resp. input) by a hannel. Otherwise, it orresponds to a global appli ation

2. THE IEC 61499 STANDARD

input (resp. output). Data inputs and outputs follow the same rules (gure 2).

We present the main on epts of the IEC 61499

The exe ution support ar hite ture (i.e. the indus-

Fun tion Blo ks standard (WG6 2003, WG6 2004).

trial ontrol system) is dened by a devi es net-

This standard is an extension of the IEC 61131.3

work. A devi e is omposed of one pro essing unit,

sensors, a tuators and network interfa es. In order to manage intera tions with a given physi al pro esses, a devi e ontains several resour es. A resour e ontains FBs networks intera ting with a physi al pro ess. Considered as a logi exe ution unit orresponding to time slots of the pro essing unit, the resour e provides s heduling fun tion for its lo al FBs networks. The operational ar hite ture orresponds to a distribution of the appli ation fun tion blo ks over the

Figure 3. The ECC behavior

dierent resour es of the exe ution support ar hite -

* It a tivates the algorithms sequen e orresponding

ture. The advantage of su h approa h is to take into

to the sele ted event. Then, it waits for the resour e

a

ount hardware as well as software omponents.

s heduler to exe ute this sequen e.

For sake of simpli ity, we onsider in this paper only one fun tion blo ks network distributed on a single resour e of a devi e. Running Example. For all the ontinuation, we

onsider the following running example of a ontrol appli ation lo ated in a resour e of a devi e. This

ontrol appli ation is omposed by four FBs supporting its fun tionalities (gure 2).

* When the exe ution ends, it emits orresponding output events o

urren es. We note that an algorithms sequen e is atomi . Moreover, the resour e s heduling fun tion applies only non preemptive poli ies. On the other hand, the poli y of events priorities in the ECC is not spe ied in the standard. Therefore, it is up to the designer to x su h priority for ea h fun tion blo k (Khalgui et

al. 2004). Note that the ECC is spe ied as a state ma hine where ea h tra e is omposed by a waiting of an input event, invo ations of algorithms, sending of output events. Running Example. we present the ECC behavior

of the fun tion blo k

F B1

(gure 4). The sele tion

me hanism is performed thanks to a state variable ′ ′ a of F B1.

ie1 o

urren e, it asks (!ex_fb) the pro essor to perform the orresponding When the ECC sele ts an

algorithms sequen e. When the exe ution is nished

F B1 state variables, F B4 or simultaneously oe2 F B3 and F B2 .

(?end_ex) and depending on the ECC sends and Figure 2. A ontrol appli ation

f bn.

oe3

oe1

to

to respe tively

ie5 o

urren e, it waits the pro essor to exe ute the orresponding algorithms When the ECC sele ts an

oe7 to F B3 depending on the internal variables.

sequen e. When it is nished, it sends 2.2 Events sele tion me hanism

or

oe8

to

F B2

Let turn to the internal des ription of a fun tion blo k. Note that only algorithms exe ution spends

3. BEHAVIOR CHARACTERIZATION

time. In a given fun tion blo k, the ECC is said idle if there is no algorithm to exe ute. Otherwise, the

To hara terize temporal behavior of a fun tion

ECC is busy (gure 4).

blo k, we have to take into a

ount the exe ution

A

ording to the standard (WG6 2004), the FB

ontains an internal buer for input o

urren es. The ECC behavior is devised into three steps:

of the ECC. Indeed, the ECC de ides not only algorithms to exe ute but also the output events to send. Nevertheless, the sele tion of transitions inside the ECC may depend on internal state variables.

* First, it sele ts one input event o

urren e a

ord-

Then we propose to dene sets of output events

ing to priority rules dened in the resour e.

orresponding to all possible exe utions.

f ollow(f b1 , ie1 ) = {{oe1 }, {oe2 , oe3 }} f ollow(f b1 , ie5 ) = {{oe7 }, {oe8 }} f ollow(f b4 , ie4 ) = {{oe4 }} 3.2

f bn

temporal onstraint

A real time appli ation must often respe t temporal

onstraints as end to end delays. To asso iate su h delay to the fun tion blo ks network, we need to rst formalize the omposition between fun tion blo ks. Figure 4. The ECC behavior of

F B1

We propose a fun tion

cause

that spe ies ausali-

To validate the temporal orre tness of the appli a-

ties between an event input of a fun tion blo k and

tion, we propose to dene end to end delays orre-

an output of another one a

ording to the fun tion

sponding to time onstraints imposed by the prob-

blo ks network. Note that

lem spe i ation. In this se tion, we rst present the

site fun tion that asso iates to an output event the

abstra tion of the fun tion blo k behavior. Then we

input event target of the sent o

urren es.

propose a formalization for end to end delays. For all the ontinuation, we denote by

f bn

a fun tion

blo ks network.

Running example. From the link between

and

F B4,

cause(ie4 ) = oe1 ef f ect(oe1) = ie4

We propose to ompute an abstra tion of the fun tion blo k behavior. The di ulty is to identify the output events sent orresponding to an input event

We dene

state ma hine. Nevertheless, ring a transition in the ECC an depend on internal variables of the blo k. Therefore, we propose to identify the supersets of

inputs

set of input (resp output) events of a fun tion blo k

F B. tr

be a tra e in

ECCF B ,

we denote by

• IE(tr) the input event o

urring in tr • OE(tr) the set of output events o

urring in tr We propose a fun tion input event

ie ∈ IEF B ,

f ollow

asso iating to an

the sets of simultaneous

is

outputs = {oe ∈ OE/ef f ect(oe) ∈ / IE} Running example. We have the following sets :

inputs = {ie1 , ie5 } outputs = {oe4 , oe5 , oe6 , oe9 , oe10 }

sible exe ution), we asso iate a superset gathering

IE (resp OE ) the set of input (output) f bn. Let onsider IEF B (resp OEF B ) the

of

inputs = {ie ∈ IE/cause(ie) ∈ / OE}

For ea h tra e of the ECC automaton (i.e. ea h pos-

Let onsider

outputs) the set f bn whi h

not linked to another event.

output events possibly o

urring simultaneously.

all the output event o

urring in this tra e.

(respe tively

input (respe tively output) events in

o

urren e. Su h asso iation is spe ied in the ECC

Let

F B1

one an dedu e :

3.1 Fun tion blo k behavior

events of

ef f ect spe ies the oppo-

We propose the fun tion end to end delays for

delay that en odes all the f bn. delay(ie, oe) denotes

the maximum duration that an take the exe ution

ie ∈ inputs oe ∈ outputs one.

between the re eive of an and the sent of an

o

urren e

Running Example. delay(ie1 , oe4 ) spe ies the maximum duration for the treatment of the ie1 and ie4 algorithms sequen e. Let suppose the following

delay(ie1 , oe4 ) = delay(ie1 , oe5 ) = delay(ie1 , oe6 ) = 10ms and delay(ie5 , oe9 ) = delay(ie5 , oe10 ) = 17.

onstraints :

output events.

f ollow(f b, ie) = {OE(tr)/ie = IE(tr), tr ∈ ECCF B }

4. TRANSFORMATION INTO A TASKS MODEL

Running Example. For example, we asso iate to

ie5

two sets of output events orresponding to the

two tra es in the ECC starting from the transition triggered by

?ie5 .

In this part, we propose to transform system

S

f bn to

a tasks

with pre eden e onstraints (Babanov et

al. 2003). The purpose is to exploit the results on

f irst = {T ∈ T ask/T.pred ∈ / T ask}

this topi to perform the s hedulability analysis of

f bn.

last = {T ∈ T ask/∀s ∈ T.succ, ∀Tj ∈ s, Tj ∈ / T ask}

In this se tion, we dene the task hara terization in the system

S.

A task orresponds to one exe ution

of a fun tion blo k. Then, we dene a tra e as a

4.2 Tra e denition

ausality sequen e of tasks.

To spe ify a ausality sequen e of tasks, we dene

4.1 Task denition starting from a FB network An appli ation task

T

in

We dene the fun tion

generate(ie) that

ie.

onstru ts

ie the orresponding task T . Note is_generated_by(T ) is the opposite fun tion of generate. We denote by T ask the tasks set of S . setOE be a set of output events. We dene target(setOE ) that asso iates for setOE

fun tion

• T0 ∈ f irst • Tn−1 ∈ last • ∀i ∈]1, n − 1], Ti−1 = Ti .pred

the

Thanks to su h tra es prin iple, it is possible to

the

he k the appli ation end to end delays. Let

following set of tasks,

be the tra es set in

target(setOE ) = {T ∈ T ask/∃oe ∈ setOE , oe = cause(is_generated_by(T ))} is hara terized as follows,

We denote by

the rst task of the tra e

tr.

T race f irst(tr)

In this paper, we

onsider the ase of not reentry tra es (Klein et

al. 1993, Liu 2000) : the exe ution of the exe ution end of the

k − th

(k − 1) − th instan e of

the last

task. Otherwise the system is not feasible.

su h as,

Running Example. We distinguish ve tra es in

• W CET :

the worst ase exe ution time of the

algorithms sequen e orresponding to

ie. It an

be evaluated using the ode and the hara teristi s of the exe ution support. The task that must be exe uted before

the exe ution of

T.

It orresponds to the exe-

ution of the FB produ ing

• succ:

S.

instan e of the rst task must not start before the

T = {W CET, pred, succ}

• pred:

as a Tasks sequen e,

su h as,

that

T

tr

tr = T0 , T1 , ....., Tn−1

for an input event

A task

a tra e

orresponds to the exe ution

of a FB a tivated by an input event o

urren e

Let

S

cause(ie).

a set of tasks sets. All the elements of

a set orrespond to tasks to exe ute on e the exe ution of

T

tr1 = T1 , T2 ; tr2 = T1 , T3 tr4 = T5 , T6 and tr5 = T5 , T7 . Ea h a tasks sequen e in f bn.

this ontrol appli ation : ;

tr3 = T1 , T4

tra e spe ies

;

Note that we an lassi ally dene an operation

op(T )

in

S

as the set of tra es having the same

root. It orresponds to all possible exe utions of when

T

f bn

is a tivated (the orresponding input event

o

urs)

is nished. Note that ea h set

op(T ) = {tr ∈ T race/f irst(tr) = T }

orresponds to a possible exe ution s enario. (i.e. one tra e in the

ECC )

T.succ = {setT /setT ⊂ T ask, ∃setOE ∈ f ollow(f b, is_generated_by(T )), setT = target(setOE )} Running example. We generate the prede essor of

T4

and the su

essors of

T1

as follows,

T4 .pred = T1 T1 .succ = {{T2 , T3 }; {T4}} T1 exe ution is nished, two s enarios are possible : Either we exe ute T2 and T3 or we exe ute T4 . When the

We dene

f irst

(resp

last)

the tasks set that they

have not a prede essor (resp su

essor). These sets

orrespond to the

inputs

and

outputs

sets,

5. TASKS DEADLINES GENERATION

delay(tr) as the end to end tr ∈ T race. This temporal

onstraint orresponds to the delay(ie, oe) where ie

orresponds to the f irst(tr) and oe orresponds to an event produ ing by the last task of tr. We lassi ally dene deadline of a tra e

d(T ) the deadline of the task T ∈ tr. d(T ) has to take into a

ount the time for exe uting all the su

essors belonging to a same set of T.succ

We dene

before their respe tive deadlines. We hara terize

If

d(T )as

follows,

T ∈ last, d(T ) = delay(tr)

Otherwise ,

the s hedulability analysis of asyn hronous systems (Leung and Whitehead 1982). By analogy with

d(T ) = mins∈T.succ {minTi ∈s {d(Ti ) − Pd(Tj )≤d(Ti ) Tj .W CET }} Tj ∈s Running

[rmin +

our ase, the analysis may be done in

jmin , rmax + jmax + 2.lcm].

Example. We onstru t the dierent

deadlines of the dierent tasks. For the operation

op1 , we ompute rst of T2 , T3 and T4 .

all the deadlines of the tasks

• d(T2 ) = delay(tr1 ) = 10 • d(T3 ) = delay(tr2 ) = 10 • d(T4 ) = delay(tr3 ) = 10 We ompute then the deadline of

6.1 A

essibility graph generation Let

state

be the a

essibility graph orresponding to

C

of

G

Where,

• S • T

d(T4 ) − T4 .W CET }

a tasks set to exe ute, a sele ted task to exe ute between all the

S . We apply the EDF

a tivated tasks of

Therefore,

poli y

to perform su h sele tion.

• t

d(T1 ) = min{10 − 3 − 4, 10 − 1} = 3

S

be the tasks

system.

S

is s hedulable if its temporal behavior

is orre t. The s hedulability riterion is the respe t of the deadline for ea h task. To perform the s hedulability analysis of

S,

we propose to onstru t an

s heduling traje tories. Ea h traje tory represents a possible exe ution s enario of the appli ation. Therefore, several tra es are used to onstru t a

EDF

algorithm during

ea h traje tory onstru tion to verify end to end delays of the orresponding tra es. We present a temporal hara terization of

G.

[rmin + jmin , rmax + jmax + 2.lcm]. We present the following steps to

onstru t G. The rst step lets to onstru t the rst tasks state C0 .

Sin e

f bn are periodi , then ea h task T belonging to f irst is a tivated periodi ally. We

hara terize su h task by a release time r, a period p and a jitter j (the maximum deviation of the

all input events of

period).

be the rst state in

belonging to rst.

S0 = f irst We generate then step by step the dierent tasks states in the dierent

G

where

traje tories as follows,

Ci = {Ti , Si , ti } be a state Ti = {W CETi , predi , succi }

in the graph

Ti ∈ / last

Let suppose that

succi

ontains

k

tasks sets.

Ti .succ = {ts1 , ..., tsk } We onstru t

Ci

k

tasks states

C0 , ...., Ck−1

target of

as follows,

∀j ∈ [0, k − 1], Sj = (Si \{Ti })∪tsj if

Ti ∈ last tr

periods.

Let

Let Tmax = {rmax , pmax , jmax } and Tmin = {rmin , pmin , jmin } be two tasks of f irst su h as,

We onstru t

∀Ti ∈ f irst, rmin + jmin ≤ ri + ji ≤ rmax + jmax

G

Step: Let

T = {r, p, j} be the least ommon multiple of the tasks

C0 = {S0 , Tmin , tmin = rmin + G. S0 ontains the tasks

First step: Let

jmin }

if

S.

exe ution.

tions s enarios in the interval

a

essibility graph. The a

essibility graph is a set of

traje tory. We apply the

T

We apply su h algorithm to analyze all the exe u-

In this part, we propose a s hedulability analysis of an IEC 61499 ontrol appli ation. Let

the start time of the

We present the following algorithm to onstru t

6. SCHEDULABILITY ANALYSIS

lcm

We dene a tasks

C = {S, T, t}

min{d(T2 ) − T2 .W CET − T3 .W CET ;

Let

S.

as follows :

T1 .

d(T1 ) =

The system

G

the s hedulability analysis of

be the tra e ontaining

Cj

target of

Ci

Ti .

as follows

Sj = (Si \{Ti }) ∪{f irst(tr)} Thanks to this graph onstru tion, we dedu e that

As we treat only not reentry tra es, we an ex-

the appli ation is not s hedulable if one deadline of

ploit the result on the hyper period proposed for

a task belonging to a tasks state is not satised.

Running the example. We perform the proposed

algorithm to analyze the s hedulability of the ontrol appli ation

f bn.

hara teristi s of

We propose the following temporal

T1

and

T5 .

• r1 = 2; p1 = 50; j1 = 1. • r5 = 1; p5 = 50; j5 = 1. We suppose the following worst ase exe ution times of the dierent tasks :

By onstru ting the a

essibility graph in the hyper period

[2, 103], the algorithm

veries all the temporal

onstraints and proves that the appli ation is s hedulable. We present a part of su h graph (gure 5). Applying the rst step, we onstru t the rst tasks

C0 = {{T1 , T5 }, T5 , t = 2}. Then, we apply step to onstru t the remainder states.

state

Figure 6. The s hedulability analysis of the FBs network of o

urren es to sele t in su h hyper period. The sele tion me hanism must be ompatible with the generated s hedulability analysis. Let

Ti,m

be two o

urren es to sele t, we note that

Tj,n

if the ECC has to sele t

Ti,m

before

Tj,n Ti,m ≪

and

Tj,n .

Therefore, the s heduler will re eive at a time

t

from an ECC the adequate task that it is dedi ated to pro ess a

ording to the s hedulability analysis. Su h poli y lets to guarantee the onformity between the internal behavior of a FB and the s heduler behavior inside the resour e. Figure 5. The a

essibility graph

We dedu e from the a

essibility graph an o-line s heduling of the appli ation (gure 6). We show in ea h state of this graph the task and the start time of its exe ution. Note that for sake of on iseness, identi al bran hes parts of the tree are merged.

Running Example. We dedu e the following events

priorities for

ECC1 , ECC2

and

ECC3 .

• F B1 : T51 ≪ T11 ≪ T52 ≪ T12 ≪ T53 ≪ T13 • F B2 : T61 ≪ T21 ≪ T62 ≪ T22 ≪ T63 • F B3 : T71 ≪ T31 ≪ T72 ≪ T32 In ea h blo k, the ECC must sele t always the input o

urren es a

ording to su h order to guarantee the

orre t omposition with the s heduler.

6.2 Events priorities poli y In a fun tion blo k

f b,

the sele tion of input o

ur-

ren es must be based on the orresponding tasks deadlines. Indeed, the o

urren e to sele t orresponds to the task that has the earliest deadline. But the

ECC

is unaware of these temporal prop-

erties. We propose therefore to exploit the previous s hedulability analysis to generate events priorities for ea h blo k.

7. CONCLUSION AND FUTURE WORKS This paper presents a ontribution to develop an industrial ontrol appli ation a

ording to the IEC 61499 standard. This ontribution lets to validate the temporal interoperability of su h appli ation. First of all, we propose an abstra tion of the fun tion blo k behavior to take into a

ount all its possible

As the s hedulability analysis is performed in the

exe utions. Moreover, we propose to verify the or-

[rmin + jmin , rmax + jmax + 2.lcm],

re tness of the appli ation with regard to end to end

we propose to generate for ea h ECC the order

delays. To perform su h validation, we propose to

hyper period

transform the appli ation to a parti ular dependant

Ifak (2005). http://www.ifak-md.de/wg7/.

tasks model. We propose then the generation of

Jeay, K., D. Stanat and C. Martel (1991). On non-

tasks deadlines to guarantee the temporal orre t-

preemptive s heduling of periodi and sporadi

ness of the appli ation. Finally, we propose a s hedu-

tasks. In: IEEE Real-Time Systems Symposium.

lability analysis and an o-line s heduling genera-

Khalgui, M., X. Rebeuf and F. Simonot-Lion (2004).

tion. On the other hand, to guarantee the orre t

A behavior model for ie 61499 fun tion blo ks.

omposition between blo ks and the s heduler, we

In: Third Workshop on modelling of Obje ts,

propose to take into a

ount the o-line s heduling

Components and Agents. Denmark.

in the denition of the events sele tion poli y. We are urrently working to nd heuristi s redu ing the number of states in the a

essibility graph in order to redu e the ombinatory explosion. Moreover, we are plan to perform the s hedulability analysis of an appli ation distributed over several resour es of a devi e. We also will extend our work to the distribution over resour es of several devi es. Su h extension imposes to take into a

ount the ommuni ation interfa e inside ea h devi e and the networks delays. On another side, we will extend our resear hes by exploiting the fault tolerant s heduling approa h to redu e temporal onstraints in the ase of non riti-

Klein, M H., T. Ralya, B. Polla k, R. Obenza and MG. Harbour (1993). A pra tioner's hand-

book for Real-Time analysis. Guide to Rate monotoni

Analysis for

Real-Time Systems.

Kluwer A ademi Publisher. Leung, J. and J. Whitehead (1982). On the omplexity of xed-priority s heduling of periodi realtime tasks. In: performan e Evaluation 2(1982).

237250. Lewis, R. (n.d.). Modelling ontrol systems using

IEC 61499. The institution of Ele tri al Engineers. Liu, JWS. (2000). Real-time systems. In: Prenti e

Hall.

al systems. Therefore, we authorize the appli ation

Pe os (2005). http://www.pe os-proje t.org.

to not respe t some of its end to end delays.

Stewart, D B., R A. Volpe and P K. Khosla (1997). Design of dynami ally re ongurable real-time software using port-based obje ts. In: IEEE

Transa tions on Software Engineering.

REFERENCES Arti us (1996). Rubus OS Referen e Manual. Arti us Systems. Babanov, A., J. Collins and M. Gini (2003). S heduling tasks with pre eden e onstraints to soli it desirable bid ombinations. In: International

Conferen e on Autonomous Agents. Melbourne. Australia. Crnkovi , I. and M. Larsson (2002). Building reli-

able omponent-based software systems. Arte h House. London. Cu u, L. and Y. Sorel (2003). S hedulability ondition for real-time systems with pre eden e and periodi ity onstraints, without preemption. In:

11th Real-Time Systems Conferen e. Fran e. Cu u, L., R. Ko ik and Y. Sorel (2002). Realtime s heduling for systems with pre eden e, periodi ity and laten y onstraints. In: 10th

Real-Time Systems Conferen e. Fran e. holoblo (2005). http://www.holoblo . om. Howell, R R. and M k. Venkatrao (1995). On nonpreemptive s heduling of re urring tasks using inserted idle time. In: Information and ompu-

tation Journal. IEC61131-3, International Standard (1993). Pro-

grammable Controllers Part3. Bureau Central de

la

ommission

tionale. Switzerland.

Ele trote hnique

Interna-

WG6, International Standard IEC TC65 (2003). Fun tion blo ks for industrial pro ess measurements and ontrol systems. Committee Draft. WG6, International Standard IEC TC65 (2004).

Industrial Pro ess Measurements and Control Systems. Committee Draft.