Worst-Case Timing Analysis of Cycle-Stealing DMA I/O Tasks

نویسنده

  • Tai-Yi Huang
چکیده

A DMA controller that operates in the cycle-stealing mode is allowed to transfer data only when the CPU does not need the system bus. Thus, the execution time of a cycle-stealing DMA I/O task depends on the sequence of instructions executing concurrently with it. This paper describes a method for bounding the worst-case execution time (WCET) of a cycle-stealing DMA I/O task. We rst deene the task model. We next describe several properties of instruction sequences that can execute concurrently with a cycle-stealing DMA I/O task. Based on these properties we develop a recursive formula to compute the WCET of the DMA I/O task. The recursive formula gives the basis of a dynamic programming method to nd the WCET of the DMA I/O task. We conducted a simulation experiment to evaluate the performance of the dynamic programming method.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bounding DMA Interference on Hard-Real-Time Embedded Systems

A DMA controller that operates in the cycle-stealing mode transfers data by stealing bus cycles from the CPU. The concurrent contention for the I/O bus by a CPU task and a cycle-stealing DMA I/O task retards their progress and extends their execution times. In this paper we first describe a method for bounding the worst-case execution time (WCET) of a CPU task when cycle-stealing DMA I/O is pre...

متن کامل

Predicting the Worst-Case Execution Time of the Concurrent Execution of Instructions and Cycle-Stealing DMA I/O Operations

This paper describes an eecient algorithm which gives a bound on the worst-case execution times of the concurrent execution of CPU instructions and cycle-stealing DMA I/O operations. Simulations of several programs were conducted to evaluate this algorithm. Compared with the traditional pessimistic approach, the bound on the worst-case execution time produced by the algorithm is signiicantly ti...

متن کامل

A Method for Bounding the E ect of DMA I / O Interference onProgram Execution

A DMA controller that operates in cycle-stealing mode transfers data by \stealing" bus cycles from an executing program. This cycle stealing operation retards the progress of the executing program and extends its execution time. In this paper we rst present a method that bounds the worst-case execution time of a program executing concurrently with a cycle-stealing DMA I/O operation in the simpl...

متن کامل

Predicting the Worst - Case Execution Time of the Concurrent

This paper describes an eecient algorithm which gives a bound on the worst-case execution times of the concurrent execution of CPU instructions and cycle-stealing DMA I/O operations. Simulations of several programs were conducted to evaluate this algorithm. Compared with the traditional pessimistic approach, the bound on the worst-case execution time produced by the algorithm is signiicantly ti...

متن کامل

Bounds on Multithreaded Computations by Work Stealing

Blumofe and Leiserson [6] gave the first provably good work-stealing work scheduler for multithreaded computations with dependencies. Their scheduler executes a fully strict (i.e., wellstructured) computation on P processors in expected time T1/P + O(T∞), where T1 denotes the minimum serial execution time of the multithreaded computation, and T∞ denotes the minimum execution time with an infini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007