Motivation. Eingebettete Systeme. Terms. Terms. Echtzeitverhalten und Betriebssysteme. 7. Ressourcen

Similar documents
Real-Time Process Scheduling

Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

QoS in the Linux Operating System. Technical Report

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , info@teltonika.

Fault tolerance in cloud technologies presented as a service

Research of concurrency control protocol based on the main memory database

Dynamic Fleet Management for Cybercars

Project Networks With Mixed-Time Constraints

Ravenscar Computational Model compliant AADL Simulation on LEON2

A Hybrid Embedded Real-time Operating System for Wireless Sensor Networks

Activity Scheduling for Cost-Time Investment Optimization in Project Management

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Conferencing protocols and Petri net analysis

The Greedy Method. Introduction. 0/1 Knapsack Problem

Section 2.2 Future Value of an Annuity

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Traffic State Estimation in the Traffic Management Center of Berlin

An Analysis of Task Scheduling for a Generic Avionics Mission Computer

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Checkng and Testng in Nokia RMS Process

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

The University of Texas at Austin. Austin, Texas December Abstract. programs in which operations of dierent processes mayoverlap.

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

What is Candidate Sampling

QoS-based Scheduling of Workflow Applications on Service Grids

1. Math 210 Finite Mathematics

Alarm Task Script Language

Period and Deadline Selection for Schedulability in Real-Time Systems

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

Thursday, December 10, 2009 Noon - 1:50 pm Faraday 143

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

Basic Queueing Theory M/M/* Queues. Introduction

Sciences Shenyang, Shenyang, China.

Canon NTSC Help Desk Documentation

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE e WLANs Environments

QBox: Guaranteeing I/O Performance on Black Box Storage Systems

2. SYSTEM MODEL. the SLA (unlike the only other related mechanism [15] we can compare it is never able to meet the SLA).

Session-Based Overload Control in QoS-Aware Web Servers

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

2016/17

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

Load Balancing By Max-Min Algorithm in Private Cloud Environment

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Modeling and Analysis of 2D Service Differentiation on e-commerce Servers

A Generic and Compositional Framework for Multicore Response Time Analysis

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications

Recurrence. 1 Definitions and main statements

The Choice of Direct Dealing or Electronic Brokerage in Foreign Exchange Trading

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Politecnico di Torino. Porto Institutional Repository

Computer Networks 55 (2011) Contents lists available at ScienceDirect. Computer Networks. journal homepage:

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

Design of control applications on WSAN with mesh architecture

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

DEFINING %COMPLETE IN MICROSOFT PROJECT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

1 Example 1: Axis-aligned rectangles

An RFID Distance Bounding Protocol

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

Case Study: Load Balancing

J. Parallel Distrib. Comput.

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

Implementation of Deutsch's Algorithm Using Mathcad

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Time Value of Money. Types of Interest. Compounding and Discounting Single Sums. Page 1. Ch. 6 - The Time Value of Money. The Time Value of Money

Hosted Voice Self Service Installation Guide

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

A Priority Queue Algorithm for the Replication Task in HBase

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Section 5.3 Annuities, Future Value, and Sinking Funds

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

RequIn, a tool for fast web traffic inference

Availability-Based Path Selection and Network Vulnerability Assessment

Types of Injuries. (20 minutes) LEARNING OBJECTIVES MATERIALS NEEDED

Texas Instruments 30X IIS Calculator

Sangam - Efficient Cellular-WiFi CDN-P2P Group Framework for File Sharing Service

Value Driven Load Balancing

Special Issue on Performance and Resource Management in Big Data Applications

Simple Interest Loans (Section 5.1) :

2015/16

LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

SDN: Systemic Risks due to Dynamic Load Balancing

Transcription:

Motvaton Engebettete Systeme Echtzetverhalten und Betrebssysteme 7. Ressourcen 1 2 Terms A resource s any software structure that can be used by a process to advance ts executon, e.g. data structure, a set of varables, a man memory area, a fle or a set of regsters of a perpheral devce. A resource dedcated to a partcular process s sad to be prvate, whereas a resource that can be used by more tasks s called a shared resource. A shared resource protected aganst concurrent accesses s called an exclusve resource. A pece of code executed under mutual excluson (to guarantee consstency of data structures n exclusve resources n case of competng tasks) s called a crtcal secton. Operatng systems typcally provde a general synchronzaton tool called a semaphore for buldng crtcal sectons. A semaphore can be accessed only through kernel prmtves called wat and sgnal. Terms A task watng for an exclusve resource s sad to be blocked on that resource. Otherwse, t proceeds by enterng the crtcal secton and holds the resource. When a task leaves a crtcal secton, the assocated resource becomes free. Watng state caused by resource constrants: actvaton ready sgnal dspatchng preempton wat run wat termnaton 3 4

Terms Each exclusve resource R must be protected by a dfferent semaphore S and each crtcal secton operatng on a resource must begn wth a wat(s ) prmtve and end wth a sgnal(s ) prmtve. All tasks blocked on the same resource are kept n a queue assocated wth the semaphore. When a runnng task executes a wat on a locked semaphore, t enters a watng state, untl another tasks executes a sgnal prmtve that unlocks the semaphore. When a task leaves the watng state, t goes nto the ready state. From all tasks n the ready state, the scheduler selects one for dspatchng accordng to ts schedulng polcy. Blockng on an exclusve resource Software structure 5 6 Prorty nverson Prorty nverson Unavodable blockng J 1 blocked by J 3 prorty nverson can last arbtrarly long [But97, S.184] 7 8

Solutons Dsallow preempton durng the executon of all crtcal sectons. Smple, but creates unnecessary blockng as unrelated tasks may be blocked. Solutons Dsallow preempton n crtcal sectons (+) smple (-) unrelated tasks can be blocked Construct schedule whch s guaranteed to be free of conflcts (+) smple concept (no semaphores etc.) (-) complex to construct (search procedure) (-) must be changed n case of dynamc tasks (-) no on-lne schedule possble Resource Access Protocols 9 10 Resource access protocols Basc dea: Modfy the prorty of those tasks that cause blockng. When a task J blocks one or more hgher prorty tasks, t temporarly assumes a hgher prorty. Methods: Prorty Inhertance Protocol (PIP), for statc prortes Prorty Celng Protocol (PCP), for statc prortes Stack Resource Polcy (SRP), for statc and dynamc prortes others Prorty Inhertance Protocol (PIP) Assumptons: n perodc tasks whch cooperate through m shared resources; fxed prortes, deadlnes equal perods, all crtcal sectons on a resource begn wth a wat(s ) and end wth a sgnal(s ) operaton. Basc dea: When a task J blocks one or more hgher prorty tasks, t temporarly assumes (nherts) the hghest prorty of the blocked tasks. Terms: We dstngush a fxed nomnal prorty P and an actve prorty p larger or equal to P. Jobs J 1, J n are ordered wth respect to nomnal prorty where J 1 has hghest prorty. Jobs do not suspend themselves. The crtcal sectons used by any task are properly nested; that s, one secton s ether entrely contaned n another one or they are unrelated. 11 12

Prorty Inhertance Protocol (PIP) Algorthm: Jobs are scheduled based on ther actve prortes. Jobs wth the same prorty are executed n a FCFS dscplne. When a job J tres to enter a crtcal secton and the resource s blocked by a lower prorty job, the job J s blocked. Otherwse t enters the crtcal secton. When a job J s blocked, t transmts ts actve prorty to the job J k that holds the semaphore. J k resumes and executes the rest of ts crtcal secton wth a prorty p k =p (t nherts the prorty of the hghest prorty of the jobs blocked by t). When J k exts a crtcal secton, t unlocks the semaphore and the hghest prorty job blocked on that semaphore s awakened. If no other jobs are blocked by J k, then p k s set to P k, otherwse t s set to the hghest prorty of the jobs blocked by J k. Prorty nhertance s transtve,.e. f 1 s blocked by 2 and 2 s blocked by 3, then 3 nherts the prorty of 1 va 2. 13 Example: Drect Blockng: hgher-prorty job tres to acqure a resource held by a lower-prorty job Push-through Blockng: medum-prorty job s blocked by a lowerprorty job that has nherted a hgher prorty form a job t drectly. blocks 14 Example wth nested crtcal sectons: prorty does not change Example of transtve prorty nhertance: J1 blocked by J2, J2 blocked by J3. J3 nherts prorty from J1 va J2. [But97, S. 189] [But97, S. 190] 15 16

Schedulablty test: A set of n perodc tasks usng PIP can be scheduled by the rate-monotonc algorthm f, 1 n, k = 1 C T k k B + T 1/ ( 2 1) Problem: Chaned Blockng Maxmum blockng tme B: Under PIP, a job J can be blocked for at most the duraton of mn(n,m) crtcal sectons, where n s the number of lowerprorty jobs that could block J and m s the number of dstnct semaphores that can be used to block J. There are algorthms to compute the maxmum blockng tmes B. [But97, S. 200] 17 18 Prorty nhertance protocol Problem: Deadlock [But97, S. 200] 19