P.G. Jansen’s research while affiliated with University of Twente and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (74)


A simulation framework for evaluating complete reprogramming solutions in wireless sensor networks
  • Conference Paper

June 2008

·

21 Reads

·

3 Citations

Michiel Horsman

·

·

Pierre Jansen

·

We propose a simulation framework developed in Simulink for analyzing the performance of code dissemination in wireless sensor networks. The complete solution relies on a three-layer network stack where the LMAC, FixTree and RMD protocols operate in conjunction. For performance evaluation, we use in our simulations the radio link quality model derived from previous field trials. In this way, we can study the impact of real network conditions (e.g. fluctuating link quality, changing neighborhood) on the higher layer protocols and thus verify our design choices in non-idealized circumstances.


Fig. 1: Positions during the Experiments
Fig. 2: Experimented PER versus channel spacing
Fig. 3: SIR variance  
Fig. 4: Calculated PER versus channel spacing
Fig. 5: Capacity with Overlapping Channels (512) versus Discrete Channels (10)  

+2

Characterization of Multi-Channel Interference
  • Conference Paper
  • Full-text available

May 2008

·

192 Reads

·

11 Citations

Multi-channel communication protocols in wireless networks usually assume perfect orthogonality between wireless channels or consider only the use of interference-free channels. The first approach may overestimate the performance whereas the second approach may fail to utilize the spectrum efficiently. Therefore, a more realistic approach would be the careful use of interfering channels by controlling the interference at an acceptable level. We present a methodology to estimate the packet error rate (PER) due to inter-channel interference in a wireless network. The methodology experimentally characterizes the multi-channel interference and analytically estimates it based on the observations from the experiments. Furthermore, the analytical estimation is used in simulations to derive estimates of the capacity in larger networks. Simulation results show that the achievable network capacity, which is defined as the number of simultaneous transmissions, significantly increases with realistic interfering channels compared with the use of only orthogonal channels. When we consider the same number of channels, the achievable capacity with realistic interfering channels can be close to the capacity of idealistic orthogonal channels. This shows that overlapping channels which constitute a much smaller band, provides more efficient use of the spectrum. Finally, we explore the correctness of channel orthogonality and show why this assumption may fail in a practical setting.

Download

Communication between nested loop programs via circular buffers in an embedded multiprocessor system

March 2008

·

58 Reads

·

23 Citations

Multimedia applications, executed by embedded multiprocessor systems, can in some cases be represented as task graphs, with the tasks containing nested loop programs. The nested loop programs communicate via arrays and can be executed on different processors. Typically an array can be communicated via a circular buffer with a capacity smaller than the array. For such buffers, the communicating nested loop programs have to synchronize and a sufficient buffer capacity needs to be computed. In a circular buffer we use a write and a read window to support rereading, out-of-order reading or writing, and skipping of locations. A cyclo static dataflow model is derived from the application and used to compute buffer capacities that guarantee deadlock free execution. Our case-study applies circular buffers in a Digital Audio Broadcasting channel decoder application, where the frequency deinterleaver reads according to a non-affine pseudo-random function. For this application, buffer capacities are calculated that guarantee deadlock free execution.


Capacity analysis of interfering channels

October 2007

·

75 Reads

·

1 Citation

The current literature on multi-channel protocols in wireless networks mostly assume perfect orthogonality among different channels. However, channel orthogonality depends on factors like transceiver characteristics, transmission power, distance between transmitters, etc. In this paper we investigate the impact of channel orthogonality on the network capacity by simulations. We explore the difference in capacity of the orthogonal hannels and interfering channels. We use an interference model which is based on extensive measurements on an example radio platform. Simulation results show that the achievable overall network capacity with realistic interfering channels can be close to the capacity ofidealistic orthogonal channels depending how much the re-ceiver is prone to the adjacent channel interference. This is an important implication since the careful use of interfering channels can provide better utilization of the spectrum.


Poster Abstract: Measurements on the Efficiency of Overlapping Channels

July 2007

·

20 Reads

·

1 Citation

We have investigated the radio interference behavior of a multi-channel WSN system with a typical radio platform. We have analyzed the results in terms of throughput and throughput per-channel spacing. The experimental results show that we can adjust the channel spacing with respect to the level of tolerated interference according to the application requirements. This gives us the possibility of simultaneous usage of as many as channels possible according to the permitted interference.


Efficient Computation of Buffer Capacities for Cyclo-Static Real-Time Systems with Back-Pressure

May 2007

·

17 Reads

·

46 Citations

This paper describes a conservative approximation algorithm that derives close to minimal buffer capacities for an application described as a cyclo-static dataflow graph. The resulting buffer capacities satisfy constraints on the maximum buffer capacities and end-to-end throughput and latency constraints. Furthermore we show that the effects of run-time arbitration can be included in the response times of dataflow actors. We show that modelling an MP3 playback application as a cyclo-static dataflow graph instead of a multi-rate dataflow graph results in buffer capacities that are reduced up to 39%. Furthermore, the algorithm is applied to a real-life car-radio application, in which two independent streams are processed


Statistical quality analysis of schedulers under soft-real-time constraints

May 2007

·

12 Reads

This paper describes an algorithm to determine the performance of real-time systems with tasks using stochastic processing times. Such an algorithm can be used for guaranteeing Quality of Service of periodic tasks with soft real-time constraints. We use a discrete distribution model of processing times instead of worst case times like in hard real-time systems. Such a model gives a more realistic view on the actual requirements of the system. The presented algorithm works for all deterministic scheduling systems, which makes it more general than existing algorithms and allows us to compare performance between these systems. To demonstrate our method, we make a comparison between the performance of the well known scheduling algorithms Earliest Deadline First and Rate Monotonic. We show that the complexity of our method can compete with other algorithms that work for a wide range of schedulers.


Efficient Inter-Task Communication for Nested Loop Programs on a Multiprocessor System

January 2007

·

13 Reads

·

3 Citations

ACM SIGOPS Operating Systems Review

In modern multiprocessor systems, proces-sors can be stalled by inter-task communication when read-ing from a remote buffer. This paper presents a solution for the inter-task communication, that has a minimal im-pact on the performance of the system, hides the inter-task communication latency without requiring additional hard-ware. The solution applies to jobs, represented as task graphs, where the tasks are nested loop programs. Buffers are allocated in scratch-pad memories of the consuming tasks to provide low latency read access. For the nested loop programs, minimal buffer sizes can be determined to cover all possible communication patterns. The added computational complexity is low, as the solution adds only a few operations to the nested loop programs.


Efficient computation of buffer capacities for multi-rate real-time systems with back-pressure

November 2006

·

28 Reads

·

52 Citations

A key step in the design of multi-rate real-time systems is the determination of buffer capacities. In our multi-processor system, we apply back-pressure as caused by bounded buffers in order to control jitter. This requires the derivation of buffer capacities that both satisfy the temporal constraints as well as constraints on the buffer capacity. Existing exact solutions suffer from the computational complexity associated with the required conversion from a multi-rate dataflow graph to a single-rate dataflow graph. In this paper we present an algorithm, with linear computational complexity, that does not require this conversion and that determines close to minimal buffer capacities. The algorithm is applied to an MP3 play-back application that is mapped on our network based multi-processor system.


Figure 1. Interference level at 30m  
Figure 3. Interference level at 60m  
Figure 4. Interference level at 75m
Multi-Channel Interference Measurements for Wireless Sensor Networks

November 2006

·

131 Reads

·

32 Citations

This paper presents measurements of radio interference using "ambient munode" sensor nodes. By varying distances and frequencies we get a measure of the interference caused by transmissions on adjacent bands. Our observations show that adjacent spectrum interference influences the data delivery, considerably. Channels should be separated in the spatial or in the frequency domains if interference is to be avoided. In addition, the distance to simultaneous transmitters and the number of simultaneous transmissions are highly correlated with channel spacing. Therefore, channel spacing can be adjusted according to spatial distances so that multiple concurrent transmissions can be performed without interference. We also give proposals for further investigation on the usage of this correlation that are relevant to the design of future multi-channel protocols


Citations (41)


... We use this linear algebra formulation to obtain simple algebraic expressions for marginalization algorithms. In the general cases, our representation provides a slight improvement on the asymptotic worst-case running time of existing transducer algorithms [36]. We also characterize a subclass of problems, which we call triangular problems, where the running time can be further improved. ...

Reference:

A Note on Probabilistic Models over Strings: The Linear Algebra Approach
Monographs in Computer Science
  • Citing Conference Paper
  • January 2004

... This sample processing is mapped on three Montium tiles [9]. The computation of operation frequency of each of the Montium tiles in figure 5.4 can be done using the basic models for sending, receiving and processing as proposed in [11]. These models give several timing constraints for block-based processes. ...

Stream-processing pipelines: processing of streams on multiprocessor architecture
  • Citing Article

... The third part to be studied is the question of how to design a periodic and aperiodic task decomposition technique in terms of guaranteeing the deadlines of all the periodic tasks and aiming to provide aperiodic tasks with good average response time. Existing WSN platforms, such as TinyOS [1], DCOS [2], AvrX [3], MANTIS [4], and CONTIKI [5], have been only focused on solving the efficient exploitation of limited resources and the maximization of the energy efficiency. Envisioned application scenarios applied in WSN platforms need to activate real-time sensing as well as provide the good average response time of tasks. ...

DCOS, a Real-Time Lightweight Data Centric Operating System
  • Citing Article
  • January 2004

Tjerk J. Hofmeijer

·

Stefan O. Dullman

·

Pierre G. Jansen

·

[...]

·

S. Sahni

... With CSDF graphs, the synchronization behavior can be modeled more accurately because the synchronization behavior within the execution of a task can be modeled. The discussed resynchronization method is implemented as an optimization step in an automatic parallelization tool-flow for real-time throughput constraint applications [5]. The parallelization flow will now look like the one shown in Figure 4.1. ...

Omphale: Streamlining the Communication for Jobs in a Multi Processor System on Chip
  • Citing Article

... Zigbee. Jamming to IEEE 802.15.4 standardized wireless sensor networks (WSNs) has been studied in Ref. [25] in which the channel spacing is changed with respect to the distance of a receiver to a jammer and a transmitter. is paper empirically shows that the impact of adjacent channel interference is not trivial. ...

Multi-Channel Interference Measurements for Wireless Sensor Networks

... Synchronous Dataflow graphs (SDFGs in short) were introduced by Lee and Messerschmitt [24] to model exchanges between components of Digital Signal Processing Systems. This model and some basic extensions were intensively considered in the context of electronic design [4,14,29,30,33] and software development [1,25] to model computational systems. ...

Efficient Computation of Buffer Capacities for Cyclo-Static Real-Time Systems with Back-Pressure
  • Citing Conference Paper
  • May 2007

... Another approach to provide GS and BE services in the NoC is using virtual channels. The high priority virtual channels are used for guaranteed throughput traffic while low priority virtual channels are assigned to BE traffic [146,147]. There are some NoC architectures which provide both GS and BE based communication. ...

Providing QoS Guarantees in a NoC by Virtual Channel Reservation
  • Citing Conference Paper
  • March 2006

Lecture Notes in Computer Science

... Since designing is a reasonable complex task, the use of formal methods plays an important role to guarantee correct design and reliable implementation. Motivated by noticeable advances in the field [Clarke et al. 1999, Henzinger et al. 1992 , formal methods have increasingly been applied in the study and verification of many of these communication protocols [Johnson et al. 2004, Narayana et al. 2006, Barboza et al. 2006, Hanssen et al. 2006, some of which with real-time characteristics. Presenting the case study of the specification and verification of a new real-time communication protocol, called DoRiS (a Double Ring Service protocol for Real-Time Systems), we illustrate how formal methods can help the design of the protocol as well as its implementation. ...

Verifying the Distributed Real-Time Network Protocol RTnet Using Uppaal

... As a model of computation, the timed SDFG model offers strong compile-time analyzability of many useful predefined properties, such as absence of deadlock, channel boundedness and throughput bounds [6][7][8]. These properties make the model suitable for various design tasks, such as computing the buffer requirements of streaming applications [9,10], scheduling tasks in single-processor or multiprocessor architectures [11][12][13][14], analyzing the performance of a system under certain constraints [15][16][17][18][19], modeling resource-sharing arbiters [20][21][22][23], and modeling hardware-software codesign [24]. While the algorithms for the analysis of SDFG's predefined properties are well established and integrated into graph analysis tools such as the SDF3 tool [25], there is still a lack of support for the formal verification of user-defined properties and model equivalence. ...

Architecture Design Space Exploration for Streaming Applications Through Timing Analysis
  • Citing Conference Paper
  • September 2005

... An other approach for inter-task communication between a reading and writing task is presented in [4]. A non-overlapping sliding Read Window (RW) and Write Window (WW) are used in a so called Circular Buffer (CB), as depicted in Figure 1. ...

Communication between nested loop programs via circular buffers in an embedded multiprocessor system