Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative...

22
Center for Embedded Computer Systems University of California, Irvine Cooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee Dissertation Oct 27, 2008 Center for Embedded Computer Systems University of California, Irvine Irvine, CA 92697-3425, USA (949) 824-8059 [email protected] http://www.ics.uci.edu/ kyoungwl

Transcript of Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative...

Page 1: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

Center for Embedded Computer SystemsUniversity of California, Irvine

Cooperative Cross-Layer Protection for ResourceConstrained Mobile Multimedia Systems

Kyoungwoo Lee

DissertationOct 27, 2008

Center for Embedded Computer SystemsUniversity of California, IrvineIrvine, CA 92697-3425, USA

(949) 824-8059

[email protected]://www.ics.uci.edu/∼kyoungwl

Page 2: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

Cooperative Cross-Layer Protection for ResourceConstrained Mobile Multimedia Systems

Kyoungwoo Lee

DissertationJune 24, 2008

Center for Embedded Computer SystemsUniversity of California, IrvineIrvine, CA 92697-3425, USA

(949) 824-8059

[email protected]://www.ics.uci.edu/∼kyoungwl

Abstract

With advances in process technology, soft errors are becoming an increasingly critical de-sign concern.

Page 3: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

Contents

1 Introduction 21.1 Embedded Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.1.1 Pervasive Embedded Systems . . . . . . . . . . . . . . . . . . . . . . . . 21.1.2 Mobile Multimedia Embedded Systems . . . . . . . . . . . . . . . . . . . 21.1.3 Multi-dimensional Constraints . . . . . . . . . . . . . . . . . . . . . . . . 2

1.2 Motivation and Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21.2.1 Errors and Failures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21.2.2 Conventional Redundancy Techniques . . . . . . . . . . . . . . . . . . .. 31.2.3 Cost Efficient Reliability . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.3 Our Proposal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41.3.1 PPC (Partially Protected Caches) . . . . . . . . . . . . . . . . . . . . . . . 41.3.2 EAVE (Error Aware Video Encoding) . . . . . . . . . . . . . . . . . . . . 51.3.3 CC-PROTECT (Cooperative Cross-layer Protection) . . . . . . . . .. . . 5

1.4 Thesis Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61.4.1 Effectiveness of Cross-layer Approaches for Reliability . . . . . .. . . . . 61.4.2 Cost-efficient Reliability . . . . . . . . . . . . . . . . . . . . . . . . . . . 61.4.3 Expanded Design Space Exploration . . . . . . . . . . . . . . . . . . . . . 61.4.4 Extended Applicability of Existing Techniques . . . . . . . . . . . . . . . 7

2 Related Work 82.1 Cross-Layer Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . 82.2 Cross-Layer Approach in Network . . . . . . . . . . . . . . . . . . . . . . .. . . 8

2.2.1 Cross-Layer Approaches in OSI Model . . . . . . . . . . . . . . . . . .. 82.2.2 QoS/Performance/Energy Tradeoffs for Multimedia Communications . . .9

2.3 Cross-Layer Approach in Mobile Embedded Systems . . . . . . . . . . . . .. . . 92.3.1 QoS/Performance/Energy Tradeoffs . . . . . . . . . . . . . . . . . . . .. 92.3.2 QoS/Timing Tradeoffs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

3 Partially Protected Caches 123.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123.3 Partially Protected Caches (PPC) . . . . . . . . . . . . . . . . . . . . . . . . . .. 123.4 Effectiveness of PPC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 123.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

4 Error Aware Video Encoding 134.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134.3 Error Aware Video Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 134.4 Effectiveness of EAVE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. 134.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

i

Page 4: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

5 Cooperative Cross-layer Protection 155.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155.3 Cooperative Cross-Layer Protection (CC-PROTECT) . . . . . . . . .. . . . . . . 155.4 Effectiveness of CC-PROTECT . . . . . . . . . . . . . . . . . . . . . . . . .. . . 155.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

6 Conclusion 17

ii

Page 5: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

List of Figures

1 Errors and Redundancy Techniques at System Actraction layer . . . .. . . . . . . 32 No cooperation has been studied to actively exploit existing error-resilient tech-

niques across system abstraction layers. . . . . . . . . . . . . . . . . . . . . .. . 43 Overview of our proposals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .54 ISO OSI 7 Layer Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85 System Abstraction Layers for Mobile Embedded Systems . . . . . . . . . . . .. 96 Overview of our proposal, PPC . . . . . . . . . . . . . . . . . . . . . . . . . . .. 117 PPC (Partially Protected Caches) . . . . . . . . . . . . . . . . . . . . . . . . . . .118 Constraints and knobs considered by previous approaches and ourproposal . . . . 139 Overview of our proposal, EAVE . . . . . . . . . . . . . . . . . . . . . . . . . .. 1410 System Model (Mobile Video Conferencing) and Frame Drop Types I/II/III for Ac-

tive Error Exploitation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1411 Overview of our proposal, CC-PROTECT . . . . . . . . . . . . . . . . . . .. . . 1512 CC-PROTECT (Cooperative Cross-layer Protection) . . . . . . . . . .. . . . . . 16

List of Tables

iii

Page 6: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

Cooperative Cross-Layer Protection for Resource Constrained MobileMultimedia Systems

Kyoungwoo Lee

Center for Embedded Computer SystemsUniversity of California, IrvineIrvine, CA 92697-3425, USA

[email protected]://www.ics.uci.edu/∼kyoungwl

Abstract

With advances in process technology, soft errors are becoming an increasingly critical design con-cern.

1

Page 7: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

1 Introduction

1.1 Embedded Systems

1.1.1 Pervasive Embedded Systems

• Embedded systems are everywhere

• Office

• Home

• Street

• Market

1.1.2 Mobile Multimedia Embedded Systems

• Due to technology advances, multimedia applications are becoming popular andpopular onmobile embedded systems.

1.1.3 Multi-dimensional Constraints

• Application specific constraints

• Multi-dimensional optimizatoin in mobile multimedia embedded systems

• Embedded system designers must take into account multi-dimensional constraints.

1.2 Motivation and Objectives

1.2.1 Errors and Failures

• Due to technology scaling and emerging ubiqutous computing environments, several types oferrors should be considered.

• Due to increasing complexity of embedded systems, incorrect design and wrong implemen-tation generate several software bugs and defects as shown in Fig. 1.

• Since embedded systems are becoming used in wireless networks, network errors are becom-ing popular, and they are burst.

2

Page 8: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

Error−ProneNetwork

data input

PacketLoss

Mobile Multimedia Embedded Systems

data transmission

Error

tionExcep−

Bugs

Soft

Operating System

Hardware

ApplicationN−version

Programming

ExceptionHandling

ECC

TMR

Retransmission

Figure 1: Errors and Redundancy Techniques at System Actraction layer

• Soft errors are becoming a critical design concern.

– Soft Error Rate (SER)

– Technology scaling

– High integration

– Altitude and Latitude affect SER

– For example, soft errors are becoming an every second concern.

1.2.2 Conventional Redundancy Techniques

• Expensive redundancy techniques within system abstraction layers or across system abstrac-tion layers in part

– Traditional techniques are expensive.

– They affect other properties significantly (i.e., high interaction among techniques acrosssystem layers.

• No cooperation has been studied to actively exploit existing error-resilient techniques acrosssystem abstraction layers as shown in Fig. 2.

1.2.3 Cost Efficient Reliability

• Cost-efficient reliability is essential in mobile multimedia embedded systems.

• Cross-layer approachs have been widely investigated, especially for energy/performance/QoStradeoffs.

• This thesis studies a cooperative cross-layer protection methodology in a cross-layer manner.

– This thesis investigates multiple properties in mobile multimedia embedded systemssuch as reliability, performance, energy consumption, and QoS.

3

Page 9: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

Error−ProneNetwork(Error−Resilient Video Encoding)

(Error−Protected Data Cache)

Application

Error−Prone Hardware

video input

Mobile Video Device

No Coupling and No Cooperation

video output

SoftError

PacketLoss

Figure 2: No cooperation has been studied to actively exploit existing error-resilient techniquesacross system abstraction layers.

– This thesis aims at developting the resource efficient techniques for reliability as highas conventional redundancy techniques.

– This thesis presents cooperative cross-layer techniques for cost-efficient reliability.

1.3 Our Proposal

• Cooperative cross-layer approach is our methodology to achieve low-cost reliability for mo-bile multimedia embedded systems.

1.3.1 PPC (Partially Protected Caches)

• Application-aware selective protection techniques for cache-oriented embedded systems

• PPC –

– observes “not all data are equally failure critical.”,

– exploits the content-awareness and the time vulnerability at the application layer, and

– protects caches from soft errors at the hardware layer in a performance and energy effi-cient way as shown in Fig.??.

• Chapter 3

4

Page 10: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

[Chapter 4]Error-Aware Video Encoding (EAVE)

Protection(CC-PROTECT)[Chapter 5]

Cross-layerCooperative

Partially Protected Caches (PPC)[Chapter 3]

Application

Network

Mobile Device

Hardware

Middleware /Operating System

Figure 3: Overview of our proposals

1.3.2 EAVE (Error Aware Video Encoding)

• Intentional error injection to extend energy/QoS tradeoffs using networkerror resilience inmobile video encoding

• EAVE –

– observes the energy inefficiency of error resilient video encodings inthe situation oferror-free networks, which was designed to combat network errors at the applicationlayer,

– drops video frames before the expensive video encoding processingat the middlewarelayer to maximize the energy efficiency of error resilient video encoding atthe applica-tion layer, and

– and significantly expand the energy/QoS tradeoff space as shown in Fig.??.

• Chapter 4

1.3.3 CC-PROTECT (Cooperative Cross-layer Protection)

• Mitigating hardware defects with cooperative cross-layer protection forresource constrainedmobile multimedia systems

• CC-PROTECT –

– investigates the exisiting compositions of error-resilient and error-protected techniquesacross system abstraction layers, and cooperates them in a cost-efficient manner.

– it protects the component at the hardware layer with inexpensive error detection codesrather than error correction codes,

5

Page 11: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

– applies middleware-driven approaches for drop and forward recovery, backward errorrecovery, or hybrid one for QoS/cost tradeoffs, and

– exploits error-resilient video encoding to mitigate the impact of frame drops onthe videoquality for mobile video encoding systems as shown in Fig.??.

• Chapter 5

1.4 Thesis Contributions

1.4.1 Effectiveness of Cross-layer Approaches for Reliability

• This thesis presents cooperative approaches considering multiple properties for mobile mul-timedia embedded systems.

• Previously, cross-layer approaches have been investigated for mobileembedded systems totradeoff power, performance, and QoS.

• This thesis expands the cross-layer methodology for reliability-oriented system optimization.

1.4.2 Cost-efficient Reliability

• Cost-efficiency of PPC

• Cost-efficiency of EAVE

• Cost-efficiency of CC-PROTECT

1.4.3 Expanded Design Space Exploration

• This thesis expands the tradeoff space significantly.

– Active error exploitation has expanded design space significantly.

– Vulnerability-based exploration algorithms have been investigated to expandthe appli-cability of PPC for general applications and for other hardware components.

– CC-PROTECT presents several exploration algorithms to efficiently find out interestingoperation points out of significantly expanded tradeoff space.

6

Page 12: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

1.4.4 Extended Applicability of Existing Techniques

• This theis extends the applicability of existing approaches.

– For energy saving, error-resilience of application has been employed.

– For reliability, drop and forward recovery has been applied.

– For QoS improvement, error-exploiting video encoding has been exploited.

– For data/instruction partitions, vulnerability metric has been applied.

7

Page 13: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

Network

Application

Presentation

Session

Transport

Data Link

Physical

OSI 7 Layer Model

Figure 4: ISO OSI 7 Layer Model

2 Related Work

2.1 Cross-Layer Approach

• Definition of cross-layer approaches

2.2 Cross-Layer Approach in Network

2.2.1 Cross-Layer Approaches in OSI Model

1. Mobile communications

• A tutorial on cross-layer optimization in wireless networks, Xiaojun Lin et al., and itsreferences

• Layering as optimization decomposition: a mathematical theory of network architec-tures, M. Chiang et al., and its references

2. Wireless sensor networks

• Cross-Layer Optimization for High Density Sensor Networks: Distributed Passive Rout-ing Decisions, Primoz Skraba et al., and its references

8

Page 14: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

Operating System

Hardware

Middleware /

Application

System Abstraction Layers

Figure 5: System Abstraction Layers for Mobile Embedded Systems

2.2.2 QoS/Performance/Energy Tradeoffs for Multimedia Communications

1. video quality vs. Transmission energy consumption

• Cross-layer optimization for wireless video streaming - performance and cost, S. Khanet al., and its references

2. network reliability vs. Transmission energy consumption

• Application layer and MAC (Media Access Control) layer [?]

3. Qos vs. performance vs. transmission energy consumption

• Bajic 2007

• Vuran and Akyildiz 2006

• van der Schaar and Turaga 2007

2.3 Cross-Layer Approach in Mobile Embedded Systems

2.3.1 QoS/Performance/Energy Tradeoffs

1. Partial cross-layer works for QoS/Energy tradeoffs for mobile devices

• Flinn’s work

• ECOSystem

9

Page 15: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

• PowerScope

• Middleware approaches

• Proxy-based approaches

2. GRACE

• GRACE-1

• PVS for mobile multimedia applications

• GRACE-2

3. FORGE

• Several our own work

4. DYNAMO

• Recent Mopy’s JSAC journal, and his previous work

2.3.2 QoS/Timing Tradeoffs

1. xTune

• Minyoung’s recent work

10

Page 16: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

Partially Protected Caches (PPC)

Partitioned Caches withUnequal Protection

Content-awarenessVulnerability

NetworkOperating System

Hardware

Mobile Device

Application

Middleware /

Figure 6: Overview of our proposal, PPC

������������������������

������������������������

ProcessorPipeline

Memory

Unprotected Cache

TLB

Processor PPC (Partially Protected Cache)

Protected Cache

ProtectionOverhead

Figure 7: PPC (Partially Protected Caches)

11

Page 17: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

3 Partially Protected Caches

3.1 Motivation

3.2 Related Work

3.3 Partially Protected Caches (PPC)

3.4 Effectiveness of PPC

3.5 Summary

12

Page 18: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

ME DCT Q VLC

A

B

C

D

A Quality Control(e.g., Resolution, IP Ratio,

and Quantization[Mohapatra et al. 2005])

Error−Resilienceiii(e.g., 10% packet loss rate)

Energy−Efficiencyii(e.g., Residual Power)

Quality of Service(e.g., PSNR)

i

D Error Exploitation(e.g., error injection)

C

B

VLC : Variable Length CodingQ : QuantizationDCT : Discrete Cosine TransformME : Motion Estimation

i,ii,iii : ConstraintsA,B,C,D : Knobs

Energy/QoS−awareVideo Encoding(Section 2.1)

Error−Resilient

(Section 2.2)

Standard Video Encoder

Constraint

i

i

ii

i ii iii

i ii iii

Video EncodingKnob

Energy−EfficientVideo Encoder

Error−ResilientVideo Encoder

Error−AwareVideo Encoder

Resilience Control(e.g., Intra−MB Threshold[Kim et al. 2006])

Power Management(e.g., Voltage Scaling[Mohapatra et al. 2003;

Yuan and Nahrstedt 2004])

Our Proposal(Section 2.3)

Figure 8: Constraints and knobs considered by previous approachesand our proposal

4 Error Aware Video Encoding

4.1 Motivation

4.2 Related Work

4.3 Error Aware Video Encoding

4.4 Effectiveness of EAVE

4.5 Summary

13

Page 19: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

Encoding

Error-Aware Video Encoding (EAVE)

Active Error Exploitation

Network Error Resilience

Video

NetworkMiddleware /

Application

Operating System

Mobile Device

Hardware

Figure 9: Overview of our proposal, EAVE

IIFDT

WNI

Tx

WNI

Rx IIIFDT

Dec

CPU

IFDT

AP : Access PointWAN : Wide Area Network

: Video Data Flow

Rx : Receiver: TransmitterTx

FDT : Frame Drop TypeEnc : EncoderDec : Decoder

CPU : Central Processing UnitWNI : Wireless Network Interface

wiredwiredWAN

Network

AP 1 AP 2

wireless wireless

Mobile 1 Mobile 2

Transmission Errors

CPU

Enc

Figure 10: System Model (Mobile Video Conferencing) and Frame Drop Types I/II/III for ActiveError Exploitation

14

Page 20: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

(CC-PROTECT)Protection

EAVE (Error Aware Video Encoding)

Cross-layerCooperative

DFR (Drop and Forward Recovery)BER (Backward Error Recovery)PPC (Partially Protected Caches)

PPC with Error Detection

BER

DFR

EAVEApplication

Network

Hardware

Middleware /Operating System

Mobile Device

Figure 11: Overview of our proposal, CC-PROTECT

5 Cooperative Cross-layer Protection

5.1 Motivation

5.2 Related Work

5.3 Cooperative Cross-Layer Protection (CC-PROTECT)

5.4 Effectiveness of CC-PROTECT

5.5 Summary

15

Page 21: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

������������

NetworkError−Prone

Soft ErrorInduced

Frame Loss

Packet LossInduced

Frame Loss

f1

f3f4

f1f2

f3f4

f1

f3

f2 is dropped due to soft errors f4 is lost due to packet losses

UnprotectedCache EDCProtected

Cache(Data Cache − PPC)

Hardware

Monitor &Translate SER

Support PPC &PBPAIR

TriggerSelective DFR

Middleware/OS

(Video Encoding − PBPAIR)Application

Error−ResilientVideo Encoding

PLR

Feedback

raw video

Resilience Level

Data MappingSER

ErrorDetection

Error Mitigation

Constraints

error−aware video

FLR+PLR BER or DFR

Parameters

Mobile Video Encoding

CC−PROTECT

Figure 12: CC-PROTECT (Cooperative Cross-layer Protection)

16

Page 22: Cooperative Cross-Layer Protection for Resource ...kyoungwl/forge/dfr/report.pdfCooperative Cross-Layer Protection for Resource Constrained Mobile Multimedia Systems Kyoungwoo Lee

6 Conclusion

17