Talk by Prof. Dr.-Ing. J. Teich
Multi-Core Computing with Timing, Reliability, and Security Guarantees
by Prof. Dr.-Ing. Jurgen Teich
Friedrich-Alexander-Universitat Erlangen-Nurnberg (FAU), Germany
at 14:00- on 2019 April 18th
Meeting room A/B on 2nd Floor, I-REF building, The University of Tokyo.
In this talk, we give an overview of novel techniques for systematically mapping applications to NoC-based (network-on-chip based) multi-core architectures (MPSoCs, multi-processor system-on-chips). Complex applications requiring heterogenous processing resources are often described by task graphs with data dependencies. Here, the nodes represent actors or tasks which are typically activated periodically based on the availability of data. One prominent domain of applications fitting this model is stream processing. Here, it is often important to guarantee either bandwidth or execution time requirements. But more recently, also security, energy and reliability aspects impose constraints on the mapping of the tasks as well as their communication to cores, respectively routes in the underlying NoC.
In the context of mapping methodologies, we first present a class of algorithms that perform "Self-Embedding". The idea is here that a source node issues a request to find appropriate resources to embed its sucessor tasks, and so on. The next class of techniques introduced is called "Hybrid Application Mapping (HAM)". Here, a careful analysis and characterization of symmetric mappings by constellations of cores and routes is explored in a static (compile-time) phase called "Design Space Exploration (DSE)". At run-time, the operating system then only needs to search within such pre-analysed constellations for finding a concrete mapping that will satisfy the given non-functional constraints by construction. We present ideas of how timing constraints may be statically analysed in case of compositional MPSoC architectures such that deadlines or throughput requirements will be automatically met for streaming applications. Finally, we conclude with a discussion on resource constellations that may satisfy certain security requirements on an MPSoC.