This document summarizes a seminar presentation on scheduling fixed-priority tasks with preemption thresholds. The presentation covered scheduling basics, real-time scheduling goals, classification of scheduling algorithms, motivation for using fixed-priority scheduling with preemption thresholds (FPTS), preemptive vs. non-preemptive scheduling, the concept of limited preemptive scheduling with preemption thresholds, an example to motivate FPTS, schedulability analysis including worst-case response time calculation, critical instant, level-1 active period, algorithms to find optimal preemption thresholds and optimal priorities/thresholds.
Analysis and design of algorithms part2Deepak John
Analysis of searching and sorting. Insertion sort, Quick sort, Merge sort and Heap sort. Binomial Heaps and Fibonacci Heaps, Lower bounds for sorting by comparison of keys. Comparison of sorting algorithms. Amortized Time Analysis. Red-Black Trees – Insertion & Deletion.
Analysis and design of algorithms part2Deepak John
Analysis of searching and sorting. Insertion sort, Quick sort, Merge sort and Heap sort. Binomial Heaps and Fibonacci Heaps, Lower bounds for sorting by comparison of keys. Comparison of sorting algorithms. Amortized Time Analysis. Red-Black Trees – Insertion & Deletion.
System Software /Operating System Lab ReportVishnu K N
This is my report of System Software/Operating System lab for APJ Abdul Kalaam Kerala Technological University ,B Tech,S5 Computer Science.Please pardon me if there are any mistakes.
Chronological Decomposition Heuristic: A Temporal Divide-and-Conquer Strateg...Alkis Vazacopoulos
The chronological decomposition heuristic (CDH) is a simple divide-and-conquer strategy intended to find rapidly, integer-feasible solutions to production scheduling optimization problems of practical scale. It is not an exact algorithm in that it will not find the global optimum although it does use either branch-and-bound or branch-and-cut. The CDH is specifically designed for production scheduling optimization problems which are formulated using a uniform discretization of time where a time grid is pre-specified with fixed time-period spacing. The basic premise of the CDH is to slice the scheduling time horizon into aggregate time-intervals or “time-chunks” which are some multiple of the base time-period. Each time-chunk is solved using mixed-integer linear programming (MILP) techniques starting from the first time-chunk and moving forward in time using the technique of chronological backtracking if required (Marriott and Stuckey, 1998; for more details see the extensive literature on constraint logic programming). The efficiency of the heuristic is that it decomposes the temporal dimension into smaller size time-chunks which are solved in succession instead of solving one large problem over the entire scheduling horizon. The basic idea of such a decomposition strategy was partially presented in Bassett et. al. (1996) whereby they provided a hierarchical interaction or collaboration between a planning layer and a temporally decomposed scheduling layer. For the CDH, we focus on the time-based decomposition of the scheduling layer without the need for a higher-level coordinating or planning layer.
For many industrial size problems, solving the MILP using commercial branch-and-bound or branch-and-cut optimization can be a somewhat futile exercise even for well-formulated problems of practical interest. Instead, many researchers such as Kudva et. al. (1994), Wolsey (1998), Nott and Lee (1999), Blomer and Gunther (2000) and Kelly (2002) have devised elaborate primal heuristic techniques to enable the solution of problems of large scale and complexity; these techniques can also be augmented by other decomposition strategies such as Lagrangean and Bender’s relaxation. Unfortunately with these heuristics global optimality or even global feasibility cannot be guaranteed, however these methods and others not mentioned, have proven useful for problems which are sometimes too large to be solved using conventional methods alone. Therefore, the CDH should be considered as a step in the direction of aiding the scheduling user in finding integer-feasible solutions of reasonable quality quickly.
This file contains the contents about dynamic programming, greedy approach, graph algorithm, spanning tree concepts, backtracking and branch and bound approach.
This presentation defines online algorithms, and discusses how we can analyze them using competitive analysis. Using ski rental and ice cream machine as example problems, it covers the applications of online algorithms in load balancing and other verticals.
St hack2015 dynamic_behavior_analysis_using_binary_instrumentation_jonathan_s...Jonathan Salwan
Abstract: This talk can be considered like the part 2 of my talk at SecurityDay. In the previous part, I talked about how it was possible to cover a targeted function in memory using the DSE (Dynamic Symbolic Execution) approach. Cover a function (or its states) doesn't mean find all vulnerabilities, some vulnerability doesn't crashes the program. That's why we must implement specific analysis to find specific bugs. These analysis are based on the binary instrumentation and the runtime behavior analysis of the program. In this talk, we will see how it's possible to find these following kind of bugs : off-by-one, stack / heap overflow, use-after-free, format string and {write, read}-what-where.
System Software /Operating System Lab ReportVishnu K N
This is my report of System Software/Operating System lab for APJ Abdul Kalaam Kerala Technological University ,B Tech,S5 Computer Science.Please pardon me if there are any mistakes.
Chronological Decomposition Heuristic: A Temporal Divide-and-Conquer Strateg...Alkis Vazacopoulos
The chronological decomposition heuristic (CDH) is a simple divide-and-conquer strategy intended to find rapidly, integer-feasible solutions to production scheduling optimization problems of practical scale. It is not an exact algorithm in that it will not find the global optimum although it does use either branch-and-bound or branch-and-cut. The CDH is specifically designed for production scheduling optimization problems which are formulated using a uniform discretization of time where a time grid is pre-specified with fixed time-period spacing. The basic premise of the CDH is to slice the scheduling time horizon into aggregate time-intervals or “time-chunks” which are some multiple of the base time-period. Each time-chunk is solved using mixed-integer linear programming (MILP) techniques starting from the first time-chunk and moving forward in time using the technique of chronological backtracking if required (Marriott and Stuckey, 1998; for more details see the extensive literature on constraint logic programming). The efficiency of the heuristic is that it decomposes the temporal dimension into smaller size time-chunks which are solved in succession instead of solving one large problem over the entire scheduling horizon. The basic idea of such a decomposition strategy was partially presented in Bassett et. al. (1996) whereby they provided a hierarchical interaction or collaboration between a planning layer and a temporally decomposed scheduling layer. For the CDH, we focus on the time-based decomposition of the scheduling layer without the need for a higher-level coordinating or planning layer.
For many industrial size problems, solving the MILP using commercial branch-and-bound or branch-and-cut optimization can be a somewhat futile exercise even for well-formulated problems of practical interest. Instead, many researchers such as Kudva et. al. (1994), Wolsey (1998), Nott and Lee (1999), Blomer and Gunther (2000) and Kelly (2002) have devised elaborate primal heuristic techniques to enable the solution of problems of large scale and complexity; these techniques can also be augmented by other decomposition strategies such as Lagrangean and Bender’s relaxation. Unfortunately with these heuristics global optimality or even global feasibility cannot be guaranteed, however these methods and others not mentioned, have proven useful for problems which are sometimes too large to be solved using conventional methods alone. Therefore, the CDH should be considered as a step in the direction of aiding the scheduling user in finding integer-feasible solutions of reasonable quality quickly.
This file contains the contents about dynamic programming, greedy approach, graph algorithm, spanning tree concepts, backtracking and branch and bound approach.
This presentation defines online algorithms, and discusses how we can analyze them using competitive analysis. Using ski rental and ice cream machine as example problems, it covers the applications of online algorithms in load balancing and other verticals.
St hack2015 dynamic_behavior_analysis_using_binary_instrumentation_jonathan_s...Jonathan Salwan
Abstract: This talk can be considered like the part 2 of my talk at SecurityDay. In the previous part, I talked about how it was possible to cover a targeted function in memory using the DSE (Dynamic Symbolic Execution) approach. Cover a function (or its states) doesn't mean find all vulnerabilities, some vulnerability doesn't crashes the program. That's why we must implement specific analysis to find specific bugs. These analysis are based on the binary instrumentation and the runtime behavior analysis of the program. In this talk, we will see how it's possible to find these following kind of bugs : off-by-one, stack / heap overflow, use-after-free, format string and {write, read}-what-where.
Improvement of Scheduling Granularity for Deadline Scheduler Yoshitake Kobayashi
(Embedded Linux Conference Europe 2012)
https://github.com/ystk/sched-deadline/tree/dlmiss-detection-dev
Real-time system need to meet deadline. In this point of view, the system is required two functions to have determinism. One is interruptlatency stabilization and the other one is processing time reservation. The SCHED_DEADLINE has a feature to reserve CPU time in advance to ensure predictable behavior. In our evaluation, the granularity of CPU reservation is millisecond order.In this presentation, we show the evaluation results of current implementation to make clear the issue. Then we explain how to overcome this issue and its results.
Real-time system need to meet deadline. In this point of view, the system is required two functions to have determinism. One is interruptlatency stabilization and the other one is processing time reservation. The SCHED_DEADLINE has a feature to reserve CPU time in advance to ensure predictable behavior. In our evaluation, the granularity of CPU reservation is millisecond order.In this presentation, we show the evaluation results of current implementation to make clear the issue. Then we explain how to overcome this issue and its results.
Introduction 1
Network is a technique used for planning and scheduling of large projects in the fields of construction, maintenance, fabrication, purchasing, computer system instantiation, research and development planning etc. There is multitude of operations research situations that can be modeled and solved as network. Some recent surveys reports that as much as 70% of the real-world mathematical programming problems can be represented by network related models. Network analysis is known by many names _PERT (Programme Evaluation and Review Technique), CPM (Critical Path Method), PEP (Programme Evaluation Procedure), LCES (Least Cost Estimating and Scheduling), SCANS (Scheduling and Control by Automated Network System), etc
This chapter will present three of algorithms.
1. PERT & CPM
2. Shortest- route algorithms
3. Maximum-flow algorithms
operating systems , ch-05, (CPU Scheduling), 3rd level, College of Computers, Seiyun University. انظمة التشغيل لطلاب المستوى الثالث بكلية الحاسبات بجامعة سيئون المحاضرة 05
Operating System Lab Manual B.tech (CSE) Vth semester.
Department of Computer Science & Engineering, Mohammad Ali Jauhar University, Rampur, U.P., India
The ppt contains detail about issues and scheduling technique of real-time systems. It includes scheduling both online and offline for uniprocessor system. The applications of real-time system is also there
Similar to Scheduling Fixed Priority Tasks with Preemption Threshold (20)
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
Scheduling Fixed Priority Tasks with Preemption Threshold
1. Seminar System Architecture and Networking
(2IN95)
Scheduling Fixed-Priority
Tasks with Preemption
Threshold
Yun Wang Manas Saksena
Department of CSC Concordia University
Presented by
Deepak Vedha Raj Sudhakar (0925172)
01/12/2014
2. Agenda
➢ Scheduling Basics
➢ Goal of Real time Scheduling
➢ Classification of Scheduling algorithms
➢ Motivation for FPTS
➢ Preemptive Vs Non Preemptive Scheduling
➢ Limited Preemptive Scheduling with Preemption Thresholds(FPTS)
➢ Motivating example
➢ Schedulability Analysis
➢ Worst Case Response time
➢ Critical Instant
➢ Level - I active period
➢ Algorithms to find optimal thresholds
➢ Algorithm to find optimal priorities and thresholds
➢ Conclusion
2
3. Scheduling Basics
System Resources
➢ CPU time
➢ Memory
➢ I/O (access to devices)
➢ Network resources
➢ Energy
S
C
H
E
D
U
L
E
R
USER 1
USER 2
USER 3
USER N
.
.
3
4. Goal of Real time Scheduling
➢ Deadlines must be met
➢ Tasks are of different importance ⇒ No fairness
➢ Short response times are not sufficient, guaranteed response
times are needed.
➢ Parameters (Period , Deadline)
4
6. Agenda
➢ Scheduling Basics
➢ Goal of Real time Scheduling
➢ Classification of Scheduling algorithms
➢ Motivation for FPTS
➢ Preemptive Vs Non Preemptive Scheduling
➢ Limited Preemptive Scheduling with Preemption Thresholds(FPTS)
➢ Motivating example
➢ Schedulability Analysis
➢ Worst Case Response time
➢ Critical Instant
➢ Level - I active period
➢ Algorithms to find optimal thresholds
➢ Algorithm to find optimal priorities and thresholds
➢ Conclusion
6
7. Priority-based Real-time Scheduling Assumptions
➢ All tasks are periodic (periodic task model)
➢ Tasks are preemptive at any time
➢ Preemption costs nothing
➢ Context switch costs nothing
➢ Scheduling decision costs nothing
➢ Tasks are independent
➢ Resources (except CPU) are sufficient
Costly Assumptions
7
8. Hidden Costs
➢ Scheduling costs
➢ Pipeline costs
➢ Cache-related costs
➢ Bus related costs
WCET( i
)∝ Total number of preemptions
WCET( i
)∝ Point of preemption
8
9. Preemptive Vs Non Preemptive
9
Preemptive Non preemptive
Better Schedulability ratio
(Least Upper bound = 69%)
Simpler WCET analysis
No Mutual exclusion problem
Stack Sharing possible
Minimize I/O delay and jitter
12. FPPS - Not Schedulable
12
Task Ci Ti Di Pi WCRT
T1 20 70 50 3 20
T2 20 80 80 2 40
T3 35 200 100 1 115
13. FPNS - Not Schedulable
13
Task Ci Ti Di Pi WCRT
T1 20 70 50 3 55
T2 20 80 80 2 75
T3 35 200 100 1 75
14. FPTS - Schedulable
14
Task Ci Ti Di Pi θi
WCRT
T1 20 70 50 3 3 40
T2 20 80 80 2 3 75
T3 35 200 100 1 2 95
15. Agenda
➢ Scheduling Basics
➢ Goal of Real time Scheduling
➢ Classification of Scheduling algorithms
➢ Motivation for FPTS
➢ Preemptive Vs Non Preemptive Scheduling
➢ Limited Preemptive Scheduling with Preemption Thresholds(FPTS)
➢ Motivating example
➢ Schedulability Analysis
➢ Worst Case Response time
➢ Critical Instant
➢ Level - I active period
➢ Algorithms to find optimal thresholds
➢ Algorithm to find optimal priorities and thresholds
➢ Conclusion
15
16. Schedulability Test
Task set is Schedulable if all tasks meet their deadlines
Condition : WCRT(Ti)<= D(i)
Question: How to determine WCRT(Ti)?
16
17. Response Time
Question: How to determine WCRT(Ti)?
Solution: Identify Critical Instant of task(Ti)
17[1] “Fig 8.7:Hard Real-Time Computing Systems by Giorgio C. Buttazzo”
Response time = ←------------Blocking time--------------------->+<------------------ Interference Time ------------->
Ph
= Priority
θi
= Threshold
18. Task Ci Ti Di Pi θi
T1 20 70 50 3 3
T2 20 80 80 2 3
T3 35 200 100 1 2
Critical Instant
Critical Instant results in
Maximum block time + Maximum interference time
18
Critical instant(T3) = Time when task T3 arrives at the same time as task T1 and task T2
Critical instant(T2) = Time when task T2 arrives at the same time as task T1 and task T3 just
started executing prior to arrival of task T2.
Critical instant(T1) = Time when task T3 just started executing prior to arrival of task T1
19. Critical Instant of Task 3
19
Question:
Does the first task instance
after critical instant
correspond to the worst case
response time of the task?
Answer : Not always
20. Self Pushing Mechanism
20
WCRT(T3) does not occur at first instance.
[1] “Fig 8.7:Hard Real-Time Computing Systems by Giorgio C. Buttazzo”
21. Level-I Active period
Question: How many task instances should I consider after
critical instant?
Answer: All instances in the Level-I Active period should be
considered
21
22. Level-I Active period
Level-I active period : Interval [a,b) for which level -I pending
workload (>=Pi) is positive. Null at a and b.
22
Level-I active
period
At t= 0-Δ , W1
p
(0-Δ) = 0
At t= 0 , W1
p
(0) > 0
At t= 10 , W1
p
(0) > 0
At t= 20 , W1
p
(0) > 0
At t= 40 , W1
p
(0) = 0
23. Schedulability test (Recap)
For all tasks (i=1 to n) do
Step 1 : Identify critical instant of task(i)
Step 2: Find Level-I active period of task(i)
Step 3: Determine WCRT(i)
Step 4: Check WCRT(i)<= D(i)
23
24. WCRT(T1)
Level-I active period
24
L1
(0) = C1
+ B1
= 20 + 20 = 40
L1
(1) = B1
+∑h:Ph>=1
⌈L1
(0)/Th
⌉ *Ch
= 20 + ⌈ 40/70⌉ * 20
= 40
L1
(0) = L1
(1) - Stop
WCRT(T1) = (finish time) F1
- Arrival time
= 40 - 0 = 40
Level-I
active
period
27. Formula : Worst case response time
Computing Start time
Computing Finish time
Computing Worst case Response time
27
28. Agenda
➢ Scheduling Basics
➢ Goal of Real time Scheduling
➢ Classification of Scheduling algorithms
➢ Motivation for FPTS
➢ Preemptive Vs Non Preemptive Scheduling
➢ Limited Preemptive Scheduling with Preemption Thresholds(FPTS)
➢ Motivating example
➢ Schedulability Analysis
➢ Worst Case Response time
➢ Critical Instant
➢ Level - I active period
➢ Algorithm to find optimal thresholds
➢ Algorithm to find optimal priorities and thresholds
➢ Conclusion
28
29. Algorithm : Optimal Minimum Threshold assignment
Goal : Find minimum threshold assignment for a task set if one
exists
29
Algorithm
Taskset T = { Ci Ti Di Pi),
∀ i
∊ T
Task set Feasible or
not?
Threshold θi
∀ i
∊ T
31. Algorithm : Example
Start from lowest priority task - T3
31
Task Ci Ti Di Pi θi
WCRT
T1 20 70 50 3 3 20
T2 20 80 80 2 2 40
T3 35 200 100 1 1 115
32. Algorithm : Example
Increase threshold of task T3 from 1 to 2.
Meets deadline , assign threshold θ3
= 2
32
Task Ci Ti Di Pi θi
WCRT
T1 20 70 50 3 3 20
T2 20 80 80 2 2 95
T3 35 200 100 1 2 95
33. Algorithm : Example
Increase threshold of task T2 from 2 to 3.
Meets deadline , assign threshold θ2
= 3
33
Task Ci Ti Di Pi θi
WCRT
T1 20 70 50 3 3 40
T2 20 80 80 2 3 75
T3 35 200 100 1 2 95
34. Algorithm : Example
Meets deadline , assign threshold θ1
= 3
34
Task Ci Ti Di Pi θi
WCRT
T1 20 70 50 3 3 40
T2 20 80 80 2 3 75
T3 35 200 100 1 2 95
35. Agenda
➢ Scheduling Basics
➢ Goal of Real time Scheduling
➢ Classification of Scheduling algorithms
➢ Motivation for FPTS
➢ Preemptive Vs Non Preemptive Scheduling
➢ Limited Preemptive Scheduling with Preemption Thresholds(FPTS)
➢ Motivating example
➢ Schedulability Analysis
➢ Worst Case Response time
➢ Critical Instant
➢ Level - I active period
➢ Algorithm to find optimal thresholds
➢ Algorithm to find optimal priorities and thresholds
➢ Conclusion
35
36. Algorithm : Optimal Priority and Threshold
assignment
Goal : Find optimal priority and minimum threshold assignment
for a task set if one exists.
36
Algorithm
Taskset T = { Ci Ti Di),
∀ i
∊ T
Task set Feasible or
not?
Priority Pi
∀ i
∊ T
Threshold θi
∀ i
∊ T
39. Algorithm : Example
TaskSet T = {T 1 , T2 , T3} Priority Ordered TaskSet = {}
Priority P = { 1, 2 , 3 }
39
Task Ci Ti Di Pi θi
WCRT
T1 20 70 50
T2 20 80 80
T3 35 200 100
40. Algorithm : Example
TaskSet T = {T 1 , T2 , T3} Priority Ordered TaskSet = {}
Priority P = { 1, 2 , 3 }
40
Task Ci Ti Di Pi θi
WCRT Lateness
WCRT (i)- Di
T1 20 70 50 1 55 5
T2 20 80 80
T3 35 200 100
41. Algorithm : Example
TaskSet T = {T 1 , T2 , T3} Priority Ordered TaskSet = {}
Priority P = { 1, 2 , 3 }
41
Task Ci Ti Di Pi θi
WCRT Lateness
WCRT (i)- Di
T1 20 70 50
T2 20 80 80 1 95 15
T3 35 200 100
42. Algorithm : Example
TaskSet T = {T 1 , T2 , T3} Priority Ordered TaskSet = {}
Priority P = { 1, 2 , 3 }
Sorted List = {T 1 , T2 , T3} (Ascending Lateness - { 5, 15 , 15} )
Refine (Sorted List) = {T2,T3}
// prune infeasible path ( T1 -> P1
= 1 , θ1
= 3)
42
Task Ci Ti Di Pi θi
WCRT Lateness
WCRT (i)- Di
T1 20 70 50
T2 20 80 80
T3 35 200 100 1 115 15
43. Algorithm : Example
TaskSet T = {T 1 , T3} Priority Ordered TaskSet = { T2(1)}
Priority P = { 2 , 3 }
43
Task Ci Ti Di Pi θi
WCRT Lateness
WCRT (i)- Di
T1 20 70 50 2 55 5
T3 35 200 100
44. Algorithm : Example
TaskSet T = {T 1 , T3} Priority Ordered TaskSet = { T2(1)}
Priority P = { 2 , 3 }
44
Task Ci Ti Di Pi θi
WCRT Lateness
WCRT (i)- Di
T1 20 70 50
T3 35 200 100 2 55 -45
45. Algorithm : Example
TaskSet T = {T1} Priority Ordered TaskSet = { T3(2),T2(1)}
Priority P = { 3 }
45
Task Ci Ti Di Pi θi
WCRT Lateness
WCRT (i)- Di
T3 35 200 100
46. Algorithm : Example
TaskSet T = {T1} Priority Ordered TaskSet = { T1(2),T2(1)}
Priority P = { 3 }
46
Task Ci Ti Di Pi θi
WCRT Lateness
WCRT (i)- Di
T1 20 70 50 3 20 30
47. Algorithm : Optimal Priority ordering
TaskSet T = {} Priority Ordered TaskSet = { T1(3),T3(2),T2(1) }
Priority P = {}
47
Task Ci Ti Di Pi θi
WCRT
T1 20 70 50 3
T2 20 80 80 1
T3 35 200 100 2
49. Missing Information
➢ Next Priority ordering selection information missing.
➢ Algorithmic Complexity not mentioned. Exponential
➢ Task ordering when heuristics value matches?
➢ Experimental Results showing advantages of FPTS missing
➢ Minimal threshold assignment algorithm does not limit the
preemptions
49
50. Agenda
➢ Scheduling Basics
➢ Goal of Real time Scheduling
➢ Classification of Scheduling algorithms
➢ Motivation for FPTS
➢ Preemptive Vs Non Preemptive Scheduling
➢ Limited Preemptive Scheduling with Preemption Thresholds(FPTS)
➢ Motivating example
➢ Schedulability Analysis
➢ Worst Case Response time
➢ Critical Instant
➢ Level - I active period
➢ Algorithm to find optimal thresholds
➢ Algorithm to find optimal priorities and thresholds
➢ Conclusion
50
51. Conclusion
➢ Limitation of Preemptions
➢ Why Limited Fixed priority scheduling techniques?
➢ How to perform Schedulability test by determining WCRT?
➢ Find minimum thresholds given priorities of the task set
➢ Find optimal priorities and feasible threshold assignment for
task set
51
52. References
1. Hard Real-Time Computing Systems by Giorgio C. Buttazzo
2. Y. Wang and M. Saksena. “Scheduling fixed-priority tasks with preemption threshold”. In Proc. 6th IEEE
Real-Time Computing Systems and Applications (RTCSA), pages 328–335, Dec. 1999.
3. Reinder J. Bril and Johan J. Lukkien Wim F.J. Verhaegh “Worst-case response time analysis of real-time
tasks under fixed-priority scheduling with deferred preemption revisited “ , TU/e, CS-Report 06-34,
December 2006
4. K. W. Tindell , A. Burns , A. J. Wellings, An extendible approach for analyzing fixed priority hard real-time
tasks, Real-Time Systems, v.6 n.2, p.133-151, March 1994
5. Buttazzo, G.C. ; Scuola Superiore Sant'anna, Pisa, Italy ; Bertogna, M. ; Gang Yao , Limited Preemptive
Scheduling for Real-Time Systems. A Survey . In Industrial Informatics, I,05 March 2012
6. N. Audsley. Optimal priority assignment and feasibility of static priority tasks with arbitrary start times.
Technical Report YCS 164, Department of Computer Science, University of York, England, Dec. 1999
52
54. Questions
1. Why is the worst case response time calculated as the maximum response time of the jobs in the Level-i active period?
2. How do you determine / measure the least upper bound utilisation schedulability criteria for FPTS?
3. What is the additional costs incurred by optimal priority and preemption threshold assignment algorithm? How does it
compare to the preemption costs incurred by FPPS?
4. Is the optimal priority and preemption threshold assignment done in static or dynamic manner?
5. How efficient it is for resource constrained set up ?
6. What is the difference between level-i active and level-i busy period?
7. FPTS increases schedulability of task set by combining FPPS & FPNS, but the worst case response time of some of
the tasks are increased (compared to FPDS) although they meet the deadlines.Does it have any impact on the
system?
8. What is the run-time complexity of the proposed algorithms based on task set (n)?
54
55. What to follow ?
Scalable real time system design using Preemption Thresholds
by Shashidhar B.L
55