2010
DOI: 10.1016/j.sysarc.2010.02.003
|View full text |Cite
|
Sign up to set email alerts
|

A capacity sharing and stealing strategy for open real-time systems

Abstract: ,5,. 9$,73,3/$90,3$97,90147 503#0,920$89028 AbstractThis paper focuses on the scheduling of tasks with hard and soft real-time constraints in open and dynamic real-time systems. It starts by presenting a capacity sharing and stealing (CSS) strategy that supports the coexistence of guaranteed and non-guaranteed bandwidth servers to efficiently handle soft-tasks' overloads by making additional capacity available from two sources: (i) reclaiming unused reserved capacity when jobs complete in less than their … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 33 publications
(40 reference statements)
0
8
0
Order By: Relevance
“…Therefore, hard real-time tasks can miss deadlines in overload conditions with these algorithms. In traditional real-time systems, there are many mixed scheduling algorithms based on resource reservation strategies to schedule hard periodic tasks and soft aperiodic tasks [27], [28], [29], [30]. These algorithms are based on reserving a fraction of the processor time to each task using the EDF algorithm.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, hard real-time tasks can miss deadlines in overload conditions with these algorithms. In traditional real-time systems, there are many mixed scheduling algorithms based on resource reservation strategies to schedule hard periodic tasks and soft aperiodic tasks [27], [28], [29], [30]. These algorithms are based on reserving a fraction of the processor time to each task using the EDF algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…However, the existing algorithms based on resource reservation strategies [27], [28], [29], [30] assume that a single task has only one deadline or period. Consequently, these algorithms cannot handle tasks with multiple deadlines directly.…”
Section: Related Workmentioning
confidence: 99%
“…In [46], we provide a complete description of the server-based schedulers used in the CooperatES framework, simultaneously dealing with capacity sharing, stealing and exchanging. Hard schedulability guarantees can be provided either for independent and interdependent task sets, even when hard and soft real-time tasks do share resources and exhibit precedence constraints.…”
Section: The Cooperates Frameworkmentioning
confidence: 99%
“…Note that if the system adapts too late to the new resource requirements, it may not be useful and may even be disadvantageous. This idea has been formalised using the concepts of anytime QoS optimisation algorithms, in which there are a range of acceptable solutions with varying qualities, adapting the distributed service allocation to the available deliberation time that is dynamically imposed as a result of emerging environmental conditions [46]. Nodes start by negotiating partial, acceptable service proposals that are latter refined if time permits, in contrast to a traditional QoS optimisation approach that either runs to completion or is not able to provide a useful solution.…”
Section: The Cooperates Frameworkmentioning
confidence: 99%
“…Other CPU schedulers can also be used, like the Capacity Sharing and Stealing scheduler (CSS) proposed in [13]. For the network scheduling, any scheduling algorithm with similar characteristics can also be used, like the ones based on the Flexible Time-Triggered approach [14].…”
Section: B Resource Managementmentioning
confidence: 99%