skip to main content
10.1145/2834848.2834850acmotherconferencesArticle/Chapter ViewAbstractPublication PagesrtnsConference Proceedingsconference-collections
research-article

Mixed criticality systems with weakly-hard constraints

Published:04 November 2015Publication History

ABSTRACT

Current adaptive mixed criticality scheduling policies assume a high criticality mode in which all low criticality tasks are descheduled to ensure that high criticality tasks can meet timing constraints derived from certification approved methods. In this paper we present a new scheduling policy, Adaptive Mixed Criticality - Weakly Hard, which provides a guaranteed minimum quality of service for low criticality tasks in the event of a criticality mode change. We derive response time based schedulability tests for this model. Empirical evaluations are then used to assess the relative performance against previously published policies and their schedulability tests.

References

  1. N. Audsley. On priority assignment in fixed priority scheduling. Information Processing Letters, 79(1):39--44, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. N. Audsley, A. Burns, M. F. Richardson, and A. J. Wellings. Hard real-time scheduling: The deadline-monotonic approach. In Proceedings of IEEE Workshop on Real-Time Operating Systems and Software, pages 133--137, 1991.Google ScholarGoogle ScholarCross RefCross Ref
  3. S. Baruah, A. Burns, and R. Davis. Response-time analysis for mixed criticality systems. In Proceedings of IEEE Real-Time Systems Symposium (RTSS), pages 34--43, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Baruah and S. Vestal. Schedulability analysis of sporadic tasks with multiple criticality specifications. In Proceedings of Euromicro Conference on Real-Time Systems (ECRTS), pages 147--155, July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Bastoni, B. Brandenburg, and J. Anderson. Cache-related preemption and migration delays: Empirical approximation and impact on schedulability. In Proceedings of OSPERT, pages 33--44, 2010.Google ScholarGoogle Scholar
  6. I. Bate, A. Burns, and R. I. Davis. A bailout protocol for mixed criticality systems. In Proceedings 27th Euromicro Conference on Real-Time Systems (ECRTS) 2015, pages 259--268, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Bernat, A. Burns, and A. Liamosi. Weakly hard real-time systems. IEEE Transactions on Computers, 50(4):308--321, Apr 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Bernat and R. Cayssials. Guaranteed on-line weakly-hard real-time systems. In Proceedings of IEEE Real-Time Systems Symposium (RTSS), Dec 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. E. Bini and G. C. Buttazzo. Measuring the performance of schedulability tests. Real-Time Systems, 30(1-2):129--154, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Burns and S. Baruah. Timing faults and mixed criticality systems. In Dependable and Historic Computing, volume 6875 of Lecture Notes in Computer Science, pages 147--166. Springer Berlin Heidelberg, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Burns and S. Baruah. Towards a more practical model for mixed criticality systems. In Workshop on Mixed-Criticality Systems (colocated with RTSS), 2013.Google ScholarGoogle Scholar
  12. A. Burns and R. Davis. Adaptive mixed criticality scheduling with deferred preemption. In Proceedings of IEEE Real-Time Systems Symposium (RTSS), pages 21--30, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  13. R. Davis and M. Bertogna. Optimal fixed priority scheduling with deferred pre-emption. In Proceedings of IEEE Real-Time Systems Symposium (RTSS), pages 39--50, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Davis and A. Burns. Improved priority assignment for global fixed priority pre-emptive scheduling in multiprocessor real-time systems. Real-Time Systems, 47(1):1--40, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. F. Dorin, P. Richard, M. Richard, and J. Goossens. Schedulability and sensitivity analysis of multiple criticality tasks with fixed-priorities. Real-Time Systems, 46(3):305--331, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Erickson, N. Kim, and J. Anderson. Recovering from overload in multicore mixed-criticality systems. In IEEE International Parallel and Distributed Processing Symposium (IPDPS), May 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Fleming and A. Burns. Extending mixed criticality scheduling. In Proceedings of Workshop on Mixed Criticality, IEEE Real-Time Systems Symposium (RTSS), pages 7--12, 2013.Google ScholarGoogle Scholar
  18. T. Fleming and A. Burns. Incorporating the notion of importance into mixed criticality systems. In Proceedings of Workshop on Mixed Criticality, IEEE Real-Time Systems Symposium (RTSS), pages 33--38, 2014.Google ScholarGoogle Scholar
  19. G. Frehse, A. Hamann, S. Quinton, and M. Woehrle. Formal analysis of timing effects on closed-loop properties of control software. In Proceedings of IEEE Real-Time Systems Symposium (RTSS), pages 53--62, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  20. X. Gu, A. Easwaran, K.-M. Phan, and I. Shin. Resource efficient isolation mechanisms in mixed-criticality scheduling. In 27th Euromicro Conference on Real-Time Systems (ECRTS), pages 13--24, July 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Z. A. H. Hammadeh, S. Quinton, and R. Ernst. Extending typical worst-case analysis using response-time dependencies to bound deadline misses. In 2014 International Conference on Embedded Software, EMSOFT 2014, New Delhi, India, October 12-17, 2014, pages 10:1--10:10, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Jan, L. Zaourar, and M. Pitel. Maximizing the execution rate of low-criticality tasks in mixed criticality system. In Proceedings of Workshop on Mixed Criticality, IEEE Real-Time Systems Symposium (RTSS), pages 43--48, 2013.Google ScholarGoogle Scholar
  23. M. Joseph and P. Pandya. Finding response times in a real-time system. The Computer Journal, 29(5):390--395, 1986.Google ScholarGoogle ScholarCross RefCross Ref
  24. G. Koren and D. Shasha. Skip-over: algorithms and complexity for overloaded systems that allow skips. In Proceedings of IEEE Real-Time Systems Symposium (RTSS), pages 110--117, Dec 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. C. L. Liu and J. W. Layland. Scheduling algorithms for multiprogramming in a hard-real-time environment. J. ACM, 20(1):46--61, Jan. 1973. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. P. Ramanathan and M. Hamdaoui. A dynamic priority assignment technique for streams with (m, k)-firm deadlines. IEEE Transactions on Computers, 44(12):1443--1451, Dec. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. F. Santy, L. George, P. Thierry, and J. Goossens. Relaxing mixed-criticality scheduling strictness for task sets scheduled with fp. In Proceedings of Euromicro Conference on Real-Time Systems (ECRTS), pages 155--165, July 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. H. Su and D. Zhu. An elastic mixed-criticality task model and its scheduling algorithm. In Design, Automation Test in Europe Conference Exhibition (DATE), 2013, pages 147--152, March 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Vestal. Preemptive scheduling of multi-criticality systems with varying degrees of execution time assurance. In Proceedings of IEEE Real-Time Systems Symposium (RTSS), pages 239--243, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. E. Yip, M. Kuo, P. Roop, and D. Broman. Relaxing the synchronous approach for mixed-criticality systems. In Proceedings of Real-Time and Embedded Technology and Applications Symposium (RTAS), pages 89--100, April 2014.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Mixed criticality systems with weakly-hard constraints

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        RTNS '15: Proceedings of the 23rd International Conference on Real Time and Networks Systems
        November 2015
        320 pages
        ISBN:9781450335911
        DOI:10.1145/2834848

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 November 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        RTNS '15 Paper Acceptance Rate31of66submissions,47%Overall Acceptance Rate119of255submissions,47%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader