RCPCP: A Ceiling-based Protocol for Multiple-disk Environments
نویسندگان
چکیده
Processes running in a multiple-disk environment may share non-preemptible resources on the processor and, at the same time, request services from disk subsystems. In this paper, we propose a methodology which is efficient and easy to implement for scheduling processes in multiple-disk environments. In other words, our methodology addresses the scheduling of real-time processes which may stop to wait for disk I/O without releasing any locked semaphores. Our proposed methodology is a variation of the well-known priority ceiling protocol to schedule processes running in multiple-disk environments. The capability of the proposed methodology is verified by a series of simulation experiments under different workloads of CPU-bound and I/O-bound processes in multiple-disk environments, for which we have some encouraging experimental results.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملDotDFS: A Grid-based high-throughput file transfer system
DotGrid platform is a Grid infrastructure integrated with a set of open and standard protocols recently implemented on the top of Microsoft .NET in Windows and MONO .NET in UNIX/Linux. DotGrid infrastructure along with its proposed protocols provides a right and solid approach to targeting other platforms, e.g., the native C/C++ runtime. In this paper, we propose a new file transfer protocol ca...
متن کاملAN Improved UTD Based Model For The Multiple Building Diffraction Of Plane Waves In Urban Environments By Using Higher Order Diffraction Coeficients
This paper describes an improved model for multiple building diffraction modeling based on the uniform theory of diffraction (UTD). A well-known problem in conventional uniform theory of diffraction (CUTD) is multiple-edge transition zone diffraction. Here, higher order diffracted fields are used in order to improve the result; hence, we use higher order diffraction coefficients to improve a hy...
متن کاملA Worst-Case Behavior Analysis for Hard Real-Time Transactions
Most hard real-time systems that incorporate database components assume that the data is resident in main memory. For these systems, priority ceiling protocols can be used to limit priority inversion. In this paper we consider disk resident data, additionally we assume optimistic concurrency control with abort and restart. Hence, when a high priority transaction requires access to the disk it w...
متن کاملAdaptive Checkpointing with Storage Management for Mobile Environments
Conclusions ~~ The limited stable storage available in mobile-computing environments can make traditional checkpointing and message logging umuitable. Since storage on a mobile liost is not considered stable, most protocols designed for these environments save the checkpoints on base stations. Previous approaches have assumed that the base station always has sufficient disk space for storing ch...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Comput. J.
دوره 46 شماره
صفحات -
تاریخ انتشار 2003