Research Trends and Issues in Real-Time Database Systems. Sang H. Son. University of Virginia ABSTRACT

Size: px
Start display at page:

Download "Research Trends and Issues in Real-Time Database Systems. Sang H. Son. University of Virginia ABSTRACT"

Transcription

1 Research Trends and Issues in Real-Time Database Systems Sang H. Son Dept. of Computer Science University of Virginia Charlottesville, Virginia ABSTRACT Real-time database systems need to be designed and developed to address the challenge of simultaneously satisfying data integrity and timing requirements. The latter arises from the need to preserve the temporal validity of data that reect the state of the environment being monitored and controlled by the system, and to meet the response time requirements coming from applications and physical components of the system. These constraints, in turn, necessitate timecognizant transaction processing to meet the deadlines of transactions, and predictable execution of critical transactions. Studies on real-time database systems have been underway for a decade now, and produced a mature body of research results in several areas. As new applications of real-time database systems appear, however, several important aspects need further research, especially in the light of recent information technology trends. In this report, after introducing the characteristics of data and transactions in real-time databases, we discuss issues that are critical in processing time-constrained transactions and improving the predictability of the system. We also address current research activities and remaining important issues for future research.

2 1 Introduction Many real-world applications involve time-constrained access to data as well as access to data that has temporal validity. For example, consider telephone switching systems, network management, program stock trading, process control in automated factories, and command and control systems. All of these involve gathering data from the environment, processing the information gathered in the context of information acquired in the past, and providing a timely and temporally correct response. In several cases, those systems are used for safety-critical applications, in which human lives or expensive machinery may be at stake. Their missions are often long-lived and noninterruptible, making maintenance or reconguration dicult. The constant demands from the operating environments of such systems often pose rigid requirements on their timely performance. These requirements are often dened as real-time constraints on their temporal behavior. For example, in real-time systems an action performed too late (or too early), or a computation that uses temporally invalid (or temporally inconsistent) data may be useless, and sometimes harmful even if such an action or computation is functionally correct. The growing interest in real-time systems has led to a body of real-time computing research work, which permeates many areas in computer science and information science. As real-time systems continue to evolve, their applications become more complex, and often require timely and predictable access to massive amounts of data. This need for advanced data management functionalities in real-time systems poses formidable intellectual and engineering challenges to database researchers and practitioners. Since databases often employ ecient but unpredictable data structures to store the high volume of information, they result in the variations in the data access time. In addition, conventional database systems do not schedule transactions to meet their timing requirements and they commonly lock data to assure consistency. Locks and timedriven scheduling are basically incompatible. Low priority transactions may block higher priority transactions, leading to timing requirement failures. For these reasons, most general-purpose database products are not acceptable to real-time system applications. A real-time database system can be viewed as an amalgamation of a conventional database management system and a real-time system. Like a conventional database system, it has to process transactions and guarantee basic correctness criteria. Furthermore, it has to operate in real-time, satisfying timing constraints imposed on transaction commitments and on the temporal validity of data. A real-time database system may exist as a stand-alone system or as an embedded component in a larger multidatabase system. The tradeos faced by the designers of real-time database systems are quite dierent from those faced by the designers of general-purpose database systems. For example, the conventional concurrency control with transaction blocking may cause some real-time transactions to miss deadlines, even though the database integrity is maintained. To meet the fundamental requirements of timeliness and predictability, we should not only replace the conventional methods for scheduling and concurrency control, but also employ new concepts that have not been considered in non-real-time database systems. Two main issues that must be addressed in real-time database systems are the temporal nature of data and transactions, and predictability of transaction execution. Much of the data in a real-time database is "active" in that it models a rapidly changing environment. Furthermore, transactions may need to have "temporally coherent" views of the database as well as to meet deadlines. The temporal nature of data and transactions has a number of implications: Active data becomes invalid as time progresses; that is, the validity of active data is inde-

3 pendent of the database state and activities. A real-time database may never be completely correct, since there is a time lag between the monitoring and recording of active data. Since active data is not necessarily updated at the same time or rate, there may be a dispersion of ages of active data. That is, their values may not co-exist in any snapshot of the real-world. Schedules must not only be serializable, but temporally-correct; that is, the correctness of a transaction may depend on the ages and dispersion of ages of the data read, as well as a completion time. Real-time transactions must be executed in a timely and predictable manner. Timely and predictable execution of transactions requires good estimates of their worst-case execution times, which is usually dicult to obtain since transactions' execution times depend on the values of data items they access, transactions can be blocked or aborted due to data and other resource conicts, resource requirements and data access requirements of transactions are hard to predict, and I/O scheduling and buer management techniques aect transaction execution time. It is useful to categorize transactions in real-time database systems as hard, soft, and rm transactions. Hard transactions are those for which missing a deadline could result in catastrophic consequences, and hence must not happen. If completed transactions are assigned values to measure the benets obtained by completing them, a hard transaction with a missed deadline is given a very large negative value. In contrast, soft transactions have timing constraints, but there is still justication in completing them after the deadline, since they have some monotonically decreasing value that drops to zero at some point in time. For rm transactions, the value drops to zero at the deadline. Most current work on real-time database systems deals with soft real-time systems, such as program trading in the stock market. They are designed soft because missing a deadline is not catastrophic. Usually, algorithms and protocols for such systems explicitly address deadlines and make a best eort at meeting deadlines. Database systems that support hard transactions are usually called hard real-time database systems, while soft real-time database systems support only soft and rm transactions. Most hard real-time database systems are main memory databases of small size, with predened transactions, and hand crafted for ecient performance. The metrics for hard real-time database systems are dierent from those for soft real-time database systems. For example, in a soft real-time database system, metrics include response time, throughput, and the percentage of transactions which meet deadlines. The system supports consistency (serializability), atomicity, and permanence of transactions. On the other hand, in a hard real-time database, not all transactions have those properties (serializability, atomicity, and permanence). Those properties need to be supported only for specic transactions in certain situations. Metrics such as maximizing the value imparted by completed transactions and maximizing the percentage of soft/rm transactions that complete by their deadlines are primary metric. Throughput and response times are secondary metrics, if they are used at all.

4 While many of the techniques used in real-time systems and databases systems may be combined and applied to problems arising in real-time database systems, it is clear that some fresh approaches and modications are required. Meeting timing constraints demands new approaches to data and transaction management, some of which can be derived by tailoring, adapting, and extending solutions proposed for real-time systems and database systems. In this report, we present some of the basic concepts and terminologies and review some of the recent advances in real-time database research. We also present current research activities and future work in this area. 2 Scheduling Models for Real-Time Systems Hard real-time systems must meet the deadlines for their tasks. For many safety-critical applications, missing the deadline of an important task may bring the system to failure and the application to disaster. It is thus important for the system designer to adopt some well-studied system model and scheduling algorithms that can guarantee all important tasks meet their timing constraints. In this section, we review some commonly used scheduling algorithms. Many dierent types of timing constraints may be dened in real-time systems. The most commonly dened constraint is the deadline which species when a task must be nished. Tasks may also have ready times when they can start to be executed. Many scheduling algorithms have been designed to schedule tasks with some specic types of timing constraints. In scheduling tasks with repetitive requests, a well-known approach is to use the periodic task model. Using the periodic model, each task T i has a period P i and an execution time e i. T i must be executed once in every period. The execution of the task in any one period (called a job) is scheduled independently of the executions of the same task in other periods. The problem of scheduling periodic task systems has been extensively studied [53, 47]. Using this approach, every task (or job) is assigned a priority. At any time during execution, the system executes the job with the highest priority among those unnished active jobs. For periodic task systems, Liu and Layland [53] have shown that the rate-monotonic (RM) and the earliest-deadline-rst (EDF) priority assignments are optimal for xed and dynamic priority-driven preemptive scheduling schemes, respectively. Using RM, tasks with shorter periods are assigned higher priorities. The EDF algorithm assigns priorities to jobs according to their deadlines. The earlier a job's deadline is, the higher its priority. Another dynamic priority policy is the least slack rst (LSF). The slack of a task is dened to be the dierence between its deadline and its remaining execution time. It has been shown that LSF is as eective as EDF. Dening e i P i as the processor utilization of task T i, Liu P and Layland [53] have shown that as n long as the total utilization is less than or equal to 1, i.e. i=1 e i P i 1, the system with n periodic tasks is schedulable using the EDF algorithm. The least upper bound of the total utilization for a system using the RM algorithm is nx e i n(2 1=n? 1) (1) P i=1 i

5 The bound can be used for pessimistically checking the schedulability of a real-time system since the condition is only a sucient, not necessary, condition. In other words, meeting the condition means all tasks in the system can meet their deadlines, but violating the condition doesn't always mean that the system cannot meet all task deadlines using RM priorities. In fact, studies show that most system with utilizations around 0.85 can still meet all deadlines using the xed priority assigned by RM. A more precise but more complicated schedulability condition has been presented in [47]. For systems where some tasks are not periodic, or some tasks may have occasional overrun, systems can use additional protocols to handle them [46]. If tasks must share some data or resources in an exclusive manner, a priority ceiling protocol can be used to prevent unbounded delays [63] for systems using the RM xed priority scheduling. Protocols for bounding resource access delays under EDF have also been studied [7]. 3 Concurrency Control Database systems are designed to manage persistent data that are shared among concurrent tasks. Maintaining its logical consistency while processing concurrent transactions is one of the primary requirements for most databases. In real-time databases, temporal aspects of data and timing constraints of transactions must be considered as well. The temporal consistency of data requires that the actual state of the external world and the state represented by the contents of the database must be close enough to remain within the tolerance limit of applications. In general, temporal consistency of data has two aspects: absolute and relative. The absolute temporal consistency represents the requirement of data freshness, while relative temporal consistency represents the required correlation among data that is used together, as described below: An absolute validity interval is the length of time during which the current value of the data object is considered to be valid. The value of a data object x achieves absolute temporal consistency (or external consistency) only when t now? t x avi x, where t now is the current time, t x is the timestamp of x, and avi x is the absolute validity interval of x. A relative validity interval is associated with a set of data objects y used to derive a new data object y. Such a set y has a relative temporal consistency when the timestamp dierence (or temporal distance) between the data object y and any data object in the set is not greater than the relative validity interval rvi y. The value of a derived object y has temporal consistency only when all the values of data objects in y are externally consistent and y satises relative temporal consistency. The real-time (or temporal) characteristics of data in a real-time database system have also been discussed in details in [59]. These characteristics may give rise to stringent timing constraints that must be satised when transactions are executed. These constraints are in addition to the logical constraints imposed by the concurrency control protocol to ensure the database integrity. The satisfaction of both timing and logical constraints is inherently dicult due to the fact that concurrency control algorithms may introduce unpredictable delays due to transaction restarts and/or blocking. Early attempts to solve this problem have focussed on relaxing either the deadline semantics ( for soft [31] and rm [27] deadlines), or the transactions ACID properties (serializability in

6 particular) [60, 50, 84, 42, 51]. Various concurrency control algorithms dier in the time when conicts are detected, and in the way they are resolved. Pessimistic Concurrency Control (PCC) protocols detect conicts as soon as they occur and resolve them using blocking. Optimistic Concurrency Control (OCC) protocols detect conicts at transaction commit time and resolve them using rollbacks. Most real-time concurrency control schemes considered in the literature could be viewed as extensions of either PCC-based or OCC-based protocols [85]. In particular, transactions are assigned priorities that reect the urgency of their timing constraints. These priorities are used in conjunction with PCC-based techniques to make it possible for more urgent transactions to abort conicting, less urgent ones (thus avoiding the hazards of blockages). Examples include the Priority Abort (PA) technique [2], Priority Inheritance (PI) technique [62], and variations of these techniques [61, 30, 6, 65, 80]. These priorities are also used in conjunction with OCC-based techniques to favor more urgent transactions when conicting, less urgent ones attempt to validate and commit (thus avoiding the hazards of restarts). Examples include the Broadcast Commit (BC) technique [41, 27] and the Wait-50 technique [26]. Performance evaluation studies of these concurrency control techniques can be found in [2, 29, 63, 32, 1, 28, 31]. Other priority-driven real-time concurrency control protocols, which are not direct extensions of PCC or OCC, were also suggested in the literature. In [35], Kim and Srivastava studied and evaluated the potential performance improvement of using several protocols based on multipleversion two-phase locking concurrency control in real-time database systems. In [52, 66], Son et al propose a hybrid protocol that combines OCC and timestamp ordering. Using that protocol, the decision regarding the exact serialization order of transactions is delayed as much as possible to allow urgent transactions to commit. This is done through the dynamic allocation and adjustment of timestamp intervals [17]. In [12], Bestavros and Braoudakis proposed the use of Speculative Concurrency Control (SCC), whereby a transaction is allowed to use more resources so as to achieve better speculation and hence improve its chances for a timely commitment. One of the major problems in priority-based locking protocols is that, due to the eect of blocking, a condition known as priority inversion may occur. Priority inversion is said to occur when a higher priority task is forced to wait for the execution of a lower priority task for an indenite period of time. When two transactions attempt to access the same data object, the access must be serialized to maintain consistency. If the transaction of the higher priority task gains access rst, then the proper priority order is maintained; however, if the transaction of the lower priority gains access rst and then the higher priority transaction requests access to the data object, this higher priority task will be blocked until the lower priority transaction completes its access to the data object. Priority inversion is inevitable in transaction systems. However, to achieve a high degree of schedulability in real-time applications, priority inversion must be minimized. To address this problem, the priority ceiling protocol was proposed in [63]. It tries to achieve not only minimizing the blocking time of a transaction to at most one lower priority transaction execution time, but also preventing the formation of deadlocks. While the priority ceiling protocol is very useful in providing a bound on transaction blocking delay and schedulability analysis, it suers from unnecessary blockings due to the conservative transaction scheduling in data access. Recently, several approaches are being proposed to improve the performance by applying the notion of dynamic adjustment of serialization order, avoiding unnecessary blockings [40, 43].

7 4 Resource Management and Operating System Support The interaction between a real-time database system and its underlying operating system (OS) is another important topic of research because the correct functioning and timing behavior of realtime database systems cannot be guaranteed without a thorough understanding of the impact of OS internals including resource management in general, and scheduling in particular. The interplay between OS and real-time database system can be best understood through implementation eorts. In [5], Adelberg, Kao and Garcia-Molina describe their implementation of the Stanford STRIP platform. The main philosophy underlying STRIP is that soft real-time database systems are likely to be part of larger open systems (i.e. not a monolithic stand-alone system) consisting of many heterogeneous databases. Towards that end, STRIP is designed on top of UNIX and provides support for value function scheduling and for temporal constraints on data. Son et al. developed a suite of database systems on several platforms, including UNIX, ARTS, and Real-Time Mach [55]. The main focus of their work has been to apply current real-time technology to architect an actual real-time database systems [68]. The issues they considered included the interface between OS and real-time database systems [36], exible control of concurrent transactions [45], resource and data contention [49, 67], and predictable transaction execution [37]. One of the most recent work on resource management in real-time databases is the BeeHive project [75, 74]. BeeHive is an eort to develop a distributed real-time database which could oer features along dierent types of requirements: real-time, fault-tolerance, security, and quality-of service for audio and video. Support of these features and potential trade-os between them could provide a signicant improvement in performance and functionality over current distributed database and object management systems. BeeHive is an application-focussed distributed database system. For example, it could provide the database level support needed for information technology in the integrated battleeld. BeeHive is dierent from the World Wide Web and databases accessed on the Internet in many ways including BeeHive's emphasis on sensor data, use of time valid data, level of support for adaptive fault tolerance, support for real-time databases and security, and the special features that deal with crisis mode operation. Parts of the system can run on xed secure hosts and other parts can be more dynamic such as for mobile computers or general processors on the Internet. It is important to mention that BeeHive, while application focussed, is not isolated. BeeHive can interact with other virtual global databases, or Web browsers, or individual non-application specic databases via BeeHive wrappers. BeeHive will access these databases via downloaded Java applets that include standard SQL commands [75]. There are many research problems that must be solved to support a large scale distributed realtime databases. Solutions to these problems are needed both in terms of a distributed environment at the database level as well as real-time resource management below the database level, i.e., in both the operating system and network layers. Included is the need to provide end-to-end guarantees to a diverse set of real-time and non-real-time applications over the current and next generation Internet. Some of the research problems are developing an overall a priori analysis on the performance and security properties of the system, given a collection of adaptive objects, developing ecient techniques for on-line dynamic composition of these new objects, analyzing interactions and tradeos among the myriad of choices available to the system,

8 determining if the fault models are sucient, creating time bounded resource management and admission control policies, determining if there is enough access to legacy systems to achieve the security, functionality, timeliness, and reliability required, determining how the system works in crisis mode, and determining how the system scales. One of the main challenges in applying real-time technology (e.g., scheduling) to database systems is that the resources needed by a transaction may not be known a priori. A priori knowledge of transaction requirements is important for building a predictable system, even more so for meeting hard deadlines. This a priori knowledge is the underlying assumption taken by Ulusoy and Buchmann in their eorts described in [81] to improve timeliness by exploiting main memory database system features. Possessing complete knowledge of transaction requirements reduces resource management problems (e.g., concurrency control, memory and buer management) to scheduling problems. For many applications, however, the set of objects to be read (written) by a transaction may be dependent on user input (e.g., in a stock market application) or dependent on sensory inputs (e.g., in a process control application). In such systems, the a priori reservation of resources (e.g., read/write locks on data objects) to guarantee a particular Worst Case Execution Time (WCET) becomes impossible. And the non-deterministic delays associated with the on-the-y acquisition of such resources pose the real challenge of integrating scheduling into database system technology. This non-determinism has led to a wealth of work on scheduling and resource management techniques for best-eort systems (e.g., [20]), and prot-based systems (e.g., [13] and [21]). Scheduling issues permeates several facets of a real-time database system. One such facet is I/O scheduling and memory management. Example work includes the development of time-cognizant variants of the traditional SCAN disk scheduling algorithm by Abbott and Garcia-Molina [4] and by Carey, Jauhari, and Livny [20], the development of time-cognizant broadcast disk organizations by Bestavros [10], the development of priority-based buer managers by Abbott and Garcia-Molina [3] and by Kim and Srivastava [35], and the development of page replacement strategies for realtime memory managers by Carey, Jauhari, and Livny [20, 33] and by Abbott and Garcia-Molina [4]. In [57], Pang, Carey and Livny consider memory management at a higher level. They propose an admission control algorithm for real-time queries with large memory requirements, in which the multiprogramming level is related to the dynamic demand on the system's resources (memory). 5 Models and Paradigms Given the diverse and often conicting requirements on real-time database systems, it is useful to have a powerful real-time database model which can consistently address the tradeos among the requirements. The notion of transaction values and value functions [34, 54] has been utilized in both general real-time systems [15, 19] as well as in real-time database systems [2, 29, 73]. In [15, 19], the value of a task is evaluated during the admission control process. The decision to reject a task or remove a previously guaranteed task is based upon tasks' values. A task that is accepted into the system is conditionally guaranteed to complete its execution provided that no higher valued (critical) task (with which it conicts) arrives.

9 In [38, 39], Kim establishes a real-time database system model which includes both hard and soft real-time transactions, maintains temporal and logical consistency of data [59], and supports multiple guarantee levels. Under this model, an integrated transaction processing scheme is devised, providing both predictability and consistency for real-time database systems such that every application in the system is assured to achieve its own performance goal (the guarantee level) and maintain consistency requirement. A simulation study shows that higher guarantee levels require more system resources and therefore cost more than non-guaranteed transactions. In [18], Braoudakis takes a dierent approach, whereby transactions are associated with value functions that identify the nature of their timing constraints, as well as their overall importance to the system's mission. Under this framework a whole spectrum of transactions could be specied, including transactions with no timing constraints, as well as transactions with soft, rm, and hard deadlines. The novelty of this approach is that it allows transaction processing to be carried uniformly on all types of transactions. The ecacy of this approach has been demonstrated by applying it to the concurrency control problem in real-time database systems. In particular, speculative concurrency control algorithms [11] were extended to work under this framework and were shown to yield superior performance. An area which is closely related to real-time database is the Temporal and Active Databases. A temporal database is one that supports some aspects of time [76]. It is in general based on two dimensions of time: valid time which denotes the time a fact was true in reality, and transaction time during which the fact was was present in the database as stored data. An event's valid time is the time the event occurred in the real world, regardless of whether it is stored in some database. Valid time can also be in the future, if it is expected that a fact will be true at a specied future time. The transaction time (in fact, an interval) of a fact identies the transaction that inserted the fact into the database and the transaction that removed it from the database. While temporal databases deal with the validity of data and support a rich semantics for specifying temporal data models, they do not deal with time-constrained access of transactions which is essential in real-time database systems. For many applications such as control systems, a real-time constraint is imposed on a transaction to guarantee that the system's response to a trigger is committed in a timely manner. If the generation of this trigger depends on the state of the database, then the database is characterized as being both real-time and active. Application areas for active real-time database systems include automated manufacturing, air trac control, and stock market trading, among others. Early work on active real-time database systems include Dayal et al's High Performance ACtive (HiPAC) Database System project [23] and Korth et al's active real-time database system paradigm [41]. Over the last few years, interest in active real-time database systems has grown substantially [9]. We expect to see more fruitful work on the protocols designed for the integrated database model in the near future. 6 Predictability and Temporal Consistency There has been a signicant amount of work in real-time transaction processing [1, 14]. However, most of the work supports only soft/rm real-time transactions, and cannot provide predictability which is essential to support hard real-time transactions. In fact, there is no clearly dened notion of predictability widely accepted in the research community. It is important to identify the issues to guarantee hard real-time transactions and the temporal consistency requirements of data to be accessed by those hard real-time transactions.

10 One of the interesting research issues to be studied here is how to handle interactions between hard and soft/rm real-time transactions. Another important issue associated with predictability is how to schedule update transactions triggered by changes in the external world, while supporting timeliness of real-time transactions. If the system does not consider the dynamic workload of triggered transactions to enforce the temporal consistency, the desired level of predictability may not be achieved. In several applications, recomputing values of derived data could spend a signicant amount of resources, and hence in situations where real-time objects are changing rather rapidly, the system cannot keep up with the requirements of maintaining the real-time data "fresh" while satisfying all the timing constraints of transactions. Since the performance requirements may be dierent for each type of real-time applications, the term \predictability" should be interpreted in a specic context. A hard real-time system must be predictable in the sense that we should be able to know beforehand whether its tasks will complete before their deadlines. This prediction will be possible only if we know the worstcase execution time of a task and the data and resource needs of the task. However, in real-time database applications, it is not always possible to get this information in advance. Thus, we cannot give this kind of guarantee to all real-time transactions. Instead, we should provide dierent levels of guarantee to each type of real-time transaction. For example, for a group of real-time transactions, we should be able to predict at least what percentage of the transactions will meet the deadlines. The objective is to support all the hard timing constraints of critical transactions and temporal consistency requirements of data accessed by those critical transactions, and to achieve the specied guarantee levels or to minimize the deadline miss ratio of other transactions. Classifying transactions and data based on their characteristics and requirements, to be studied in the modeling work, is essential to the success of this eort. One approach is to determine certain attributes of a transaction (e.g., period and priority) based on the requirements, and then apply dierent processing schemes to each transaction [39]. Predictability is also important for soft deadline transactions, albeit to a lesser degree. For instance, using some scheduling policies designed for on-line scheduling, a system may provide an earlier feedback on whether a transaction can be completed before its deadline. Within the xed-priority preemptive scheduling framework, a number of approaches have been proposed for scheduling soft real-time tasks. One of the promising approaches for improving the timeliness of soft real-time tasks is dynamic slack stealing [48]. In the dynamic slack stealing algorithm, the slack stealer computes the slack time of each task at each time instant. The slack time is the spare time that can be yield to other tasks without violating the next deadline. However, since the abstraction of task and transaction is based on dierent assumptions, this approach is not directly applicable to soft real-time transaction scheduling. The dynamic slack stealer steals slacks with the highest priority and serves the slacks for soft-deadline transactions. When processing soft-deadline transactions using these slacks, it is desirable that we satisfy both the deadlines and the temporal consistency. If we process updates (recomputes) rst, every transactions can always read valid data but many soft-deadlines might be missed. Otherwise, more soft-deadlines can be met but the temporal consistency might be sacriced instead. Therefore, balancing the update (recompute) processing and transaction processing is an important problem. There are two approaches to maintaining temporal consistency of real-time data objects: static and dynamic. In a static approach, temporal consistency requirements are transformed into timing constraints of transactions. The system has only to provide a guarantee on the timing constraints

11 since as long as the corresponding transactions meet their deadlines, the temporal consistency of the data accessed by the transactions is automatically maintained. In a dynamic approach, the system repeatedly checks the temporal constraints of data at run time and tries to meet the temporal consistency requirements dynamically, either by using multiple versions of data objects or by delaying some transactions in favor of more urgent transactions to enforce the temporal consistency at the specic moment. The main concern is how to keep the data objects "fresh", while at the same time ensuring that transactions read valid data and meet the deadlines. It is necessary to consider how to handle transient overloads and develop proper mechanisms for time-cognizant scheduling. Previous work in supporting temporal consistency in real-time databases is mostly based on static enforcement to reduce overhead. The schemes that use this approach update image data objects or recompute derived data objects periodically so that the data is kept "always fresh". To achieve this objective, the update or recompute period of a real-time data object should be less than the half of the valid interval of that object. However, it can be easily seen that data need not always be fresh because it is sucient to maintain the data fresh only when the data is actually used by transactions. These needless updates consume processor time and hence reduce the probability that aperiodic soft real-time transactions can be completed by their deadlines. Another problem with this approach is that hard real-time deadlines are not solely determined by the original requirements coming from the specication of the application, but are strictly restricted by the update or recompute period of real-time data. This restriction on the deadline reduces the schedulability of the given transactions that require guaranteed service. In certain applications, update and recompute loads can be very high and thus an ecient scheme is needed to balance the update (recompute) processing and transaction processing. Several approaches need to be investigated for enforcing the temporal consistency of real-time data. One possible approach to minimize the updates (recomputes) is updating (recomputing) the image data (derived data) only when these updates are actually required by hard-deadline transactions. Such approach is called the on-demand update scheme. In the on-demand scheme, a transaction is blocked when it tries to read an invalid data object, and another transaction is triggered to update the invalid data. On-demand schemes are expected to show the good performance in terms of the temporal consistency. If data are updated whenever they are to be used, we can guarantee that transactions always read fresh data. However, to satisfy the temporal consistency, a transaction should be committed before the valid interval of any data read by it expires. To guarantee this, it is necessary to adjust the deadline of the transaction by considering both absolute temporal consistency and relative temporal consistency requirements. 7 Object-Oriented Paradigm The increasing interest in Object Oriented (OO) systems, as shown in several real-time applications being developed using an object-oriented paradigm, has prompted a number of researchers to investigate the suitability of the OO paradigm for real-time database systems. In [86], Zhou, Rundensteiner, and Shin propose ROMPP, a Real-time Object Model with Performance Polymorphism, to capture the characteristics of real-time control applications. In [82], issues of temporal and logical consistency, and precision are investigated within an OO framework. The object-oriented approach seems promising for complex real-time system development. However, it is not clear whether object-oriented database systems would be superior to rela-

12 tional database systems for supporting real-time applications. Object-oriented data models can better support advanced data-intensive applications by providing the capabilities for modeling, storing and manipulating complex objects, and improve software engineering in building large and complex application systems by providing the support for encapsulated objects. The need for supporting real-time database requirements with object-oriented data models arises because real-time applications may require the modeling of complex encapsulated objects. Is there any inherent problem in object-oriented data models satisfying timing constraints of real-time applications? It is obvious that the basic features of object-oriented data models (objects, attributes, methods, messages, classes, class hierarchy, and inheritance) do not directly help timely processing of transactions. It is also true, however, that none of these features particularly interfere with the active pursuit of timely processing of transactions, except for the potential lack of ecient implementation techniques. Thus, issues in supporting real-time requirements with an objectoriented data model lie in extending the object-oriented data model to include specication of timing constraints on objects (more specically on attributes/methods), and to actively pursue timely execution of transactions, rather than in combating any incompatibility between objectoriented data models and real-time requirements. In order for an object-oriented database to support real-time applications, it would be necessary to integrate features for scheduling real-time transactions with the conventional object-oriented database model. There are four major policies for scheduling transactions in real-time requirements: (1) priority assignment, i.e., a policy for assigning priorities to transactions, (2) eligibility test, i.e., a policy to determine which transactions are eligible for service, (3) concurrency control, i.e., a basic synchronization mechanism, and (4) conict-resolution, i.e., a policy for resolving con- icts between two (or more) transactions that access the same data object. Each scheduling policy should work cooperatively to maximize the number of transactions that meet their deadlines. Object-oriented databases generalize the traditional database model in several ways. First, nested executions of transactions on objects are natural, since a method can invoke another method on some other objects. Second, instead of simple read and write operations on database objects, object-oriented databases permit arbitrary operations on objects. Finally, inheritance in objectoriented databases allows class hierarchies. These properties often make the problem of ensuring data consistency in object-oriented databases more dicult, because objects of arbitrary complexity become the unit of locking (resulting in less concurrency in transaction execution), and sometimes concurrency control requires the locking of not only the object accessed by a transaction, but also several other objects not directly accessed by the transaction. Specically, due to inheritance, (1) while a transaction accesses instances of a class, another transaction should not be able to modify the denition of any of the super classes of the class, and (2) while a transaction is evaluating a query, a set of class sub-hierarchies must not be modied by a conicting transaction. Also, diculties in managing transactions caused by objects of arbitrary complexity and their hierarchical relationship make the implementation of an object-oriented database system complicated, and have an adverse impact on its capability to support real-time applications. In order for an object-oriented database system to eciently support real-time applications, the system needs to be carefully designed to mitigate the complexity in transaction management. One of the important issues that need to be investigated is the interaction between triggering mechanisms and the object class hierarchy. To control potentially unbounded triggering sequences, the system must put certain restrictions to control the complexities coming from the class hierarchy and its interaction with triggering schemes of active real-time database systems.

13 8 Integrating Security Requirements In many applications of real-time databases, security is another important requirement, since the system maintains sensitive information to be shared by multiple users with dierent levels of security clearance. As more and more of such systems are in use, one cannot avoid the need for integrating them. That is, real-time systems have to be made acceptably secure and the secure systems need to support the timeliness requirements of real-time applications. For example, electronic commerce becomes an interesting application where both security and real-time requirements should be considered together. Security is critical in electronic commerce applications where the system often manages sensitive information (such as credit card numbers). Service providers are usually very sensitive to the needs of the clients, including implicit and explicit timing constraints. In some cases, if providing full security to each activity causes the system to become less timely (e.g., missing deadlines), the service providers would be reluctant in providing necessary security guarantees. If the amount of money at stake is below certain threshold (e.g., less than $10), the system should use mechanisms with less overhead for timely service, although it may involve certain level of insecurity (e.g., loss of $10 due to incomplete credit check). Another example could be command and control in military applications. When an attack is under way or damage/failure is detected and considered severe, the system must switch into crisis mode so that critical transactions and data must be maintained. In such situations, it would be much more desirable to allow minor security violations to satisfy critical timing constraints than to keep strict security rules and lose the battle. Although some recent work recognizes the need to consider non-absolute security (e.g., [16, 79]), the notion of security has been considered binary. A system is either secure or not. A security hole either exists or not. The problem with such binary notion of security is that in many cases, it is critical to develop a system that provides an acceptable level of security and risks, based on the notion of partial security rather than unconditional absolute security, to satisfy other conicting requirements such as real-time performance. In that regard, it is important to consider multiple security service levels for real-time database applications. To achieve that, the meaning of partial security must be clearly dened for security violations of sensitive data must be strictly controlled, while the cost of providing that level of service should not reduce the timeliness of the system. To improve the timeliness and security in such applications, several issues need to be carefully considered. The research in this area has been focused on identifying architectural and transaction processing issues. It is clear that a more rigorous model to capture the characteristics and semantics of transactions and data in secure real-time databases is necessary. This can enable ecient processing to improve the timeliness of the system. In addition, new approaches need to be developed and analyzed for supporting both requirements in transaction processing that can make trade-os if necessary. Security is concerned with the ability of a system to enforce a certain policy governing the use, modication, and destruction of information. There are two dierent policies that have been studied: discretionary security policy and mandatory (or multilevel) security policy. While discretionary access control has been used in several systems, it may not be adequate for preventing unauthorized disclosure of the information. Recently, many systems have been developed based on multilevel security policy such as the Bell-LaPadula model [8]. In the Bell-LaPadula model, security policies are stated in terms of subjects and objects. A subject is an active entity that can access objects. Every object is assigned a classication, and every subject a clearance. Classications and clearances are collectively referred to as security classes (or levels) and they are partially ordered.

14 Database systems that support the Bell-LaPadula properties are called multilevel secure database systems. The Bell-LaPadula model prevents direct ow of information from a higher access class to a lower access class, but the conditions are not sucient to ensure that security is not violated indirectly through what are known as covert channels [44]. A covert channel allows indirect transfer of information from a subject at a higher access class to a subject at a lower access class. An important class of covert channels that are usually associated with database systems are timing channels. A timing channel arises when a resource or object in the database is shared between subjects with dierent access classes. From earlier study, it became clear that security requirements are not compatible with real-time requirements [58, 69, 71, 72]. Frequently, priority inversion is necessary to avoid covert channels. Consider a transaction with a high security level and a high priority entering the database, and it nds that a transaction with a lower security level and a lower priority holds a write lock on a data item that it needs to access. If the system preempts the lower priority transaction to allow the higher priority transaction to execute, the principle of non-interference is violated, for the presence of a high security transaction aects the execution of a lower security transaction. On the other hand, if the system delays the high priority transaction, a priority inversion occurs. The system has encountered an unresolvable conict. In general, these unresolvable conicts occur when two transactions contend for the same resource, with one transaction having both a higher security level and a higher priority level than the other. Therefore, creating a database that is completely secure and strictly meets real-time requirements is not feasible. A system that wishes to accomplish the fusion of multi-level security and real-time requirements must make some concessions at times. An important but challenging problem to be addressed in supporting security and real-time is identifying the correct metrics to evaluate the level of security obtained in an adaptable system. To achieve the desired level of timeliness, the system may need to allow potential security violations at times. When the system has to trade-o security, the system is no longer completely secure; rather it only will be partially secure. In that case, it is extremely important to dene the exact meaning of partial security. In fact, several security practitioners recognize that complete security is a fallacy there is no system completely secure. In one way or the other, any operational system becomes vulnerable to security leaks. The real question is how we can make the system acceptably secure while it remains available and provides timely services. With appropriate policies and the mechanisms to enforce them in the system, increased availability and timeliness can be provided in situations where other systems without such capability may just freeze or stop operating to ensure the (imaginary) complete security. Two of the major research issues to be addressed are 1) to identify policies to specify quantitative levels of partial security, and 2) mechanisms to enforce the required level of partial security. One approach involves adapting the Bell-LaPadula security model and dening security requirements such that partial security could be allowed only between certain security levels. In this way, the designer can specify that the most sensitive information will never be allowed to be involved in potential security violations. Initially, the system may support the original Bell- LaPadula security model. As the real-time performance of the system degrades, the system allows more potential security violations and reduces the number of security conicts. Using this scheme, guarantees can be made about the security of the data, based on the specication of the security policy. It is possible to combine this approach with other methods of specifying the degree of potential security violations. For example, the bandwidth of the covert channels that may show up as the

Optimistic Concurrency Control Methods for Real-Time Database Systems

Optimistic Concurrency Control Methods for Real-Time Database Systems DEPARTMENT OF COMPUTER SCIENCE SERIES OF PUBLICATIONS C REPORT C-2001-9 Optimistic Concurrency Control Methods for Real-Time Database Systems Jan Lindström UNIVERSITY OF HELSINKI FINLAND Optimistic Concurrency

More information

Maintaining Temporal Consistency: Issues and Algorithms

Maintaining Temporal Consistency: Issues and Algorithms Maintaining Temporal Consistency: Issues and Algorithms Ming Xiong, John A. Stankovic, Krithi Ramamritham, Don Towsley, Rajendran Sivasankaran Department of Computer Science University of Massachusetts

More information

Multiprocessor and Real-Time Scheduling. Chapter 10

Multiprocessor and Real-Time Scheduling. Chapter 10 Multiprocessor and Real-Time Scheduling Chapter 10 1 Roadmap Multiprocessor Scheduling Real-Time Scheduling Linux Scheduling Unix SVR4 Scheduling Windows Scheduling Classifications of Multiprocessor Systems

More information

requests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor

requests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor Scheduling Aperiodic Tasks in Dynamic Priority Systems Marco Spuri and Giorgio Buttazzo Scuola Superiore S.Anna, via Carducci 4, 561 Pisa, Italy Email: spuri@fastnet.it, giorgio@sssup.it Abstract In this

More information

Performance Evaluation of Two New Disk Scheduling Algorithms. for Real-Time Systems. Department of Computer & Information Science

Performance Evaluation of Two New Disk Scheduling Algorithms. for Real-Time Systems. Department of Computer & Information Science Performance Evaluation of Two New Disk Scheduling Algorithms for Real-Time Systems Shenze Chen James F. Kurose John A. Stankovic Don Towsley Department of Computer & Information Science University of Massachusetts

More information

transaction in an information management system usually has a soft deadline, may request highly complex queries, and arrives aperiodically. Even thoug

transaction in an information management system usually has a soft deadline, may request highly complex queries, and arrives aperiodically. Even thoug Supporting Predictability in Real-Time Database Systems Young-Kuk Kim Sang H. Son Department of Computer Science Department of Computer Science Chungnam National University University of Virginia Taejon,

More information

ECE519 Advanced Operating Systems

ECE519 Advanced Operating Systems IT 540 Operating Systems ECE519 Advanced Operating Systems Prof. Dr. Hasan Hüseyin BALIK (10 th Week) (Advanced) Operating Systems 10. Multiprocessor, Multicore and Real-Time Scheduling 10. Outline Multiprocessor

More information

Scheduling Periodic and Aperiodic. John P. Lehoczky and Sandra R. Thuel. and both hard and soft deadline aperiodic tasks using xed-priority methods.

Scheduling Periodic and Aperiodic. John P. Lehoczky and Sandra R. Thuel. and both hard and soft deadline aperiodic tasks using xed-priority methods. Chapter 8 Scheduling Periodic and Aperiodic Tasks Using the Slack Stealing Algorithm John P. Lehoczky and Sandra R. Thuel This chapter discusses the problem of jointly scheduling hard deadline periodic

More information

Priority Assignment in Real-Time Active Databases 1. Bhaskar Purimetla, Rajendran M. Sivasankaran, John A. Stankovic, Krithi Ramamritham & Don Towsley

Priority Assignment in Real-Time Active Databases 1. Bhaskar Purimetla, Rajendran M. Sivasankaran, John A. Stankovic, Krithi Ramamritham & Don Towsley Priority Assignment in Real-Time Active Databases 1 Bhaskar Purimetla, Rajendran M. Sivasankaran, John A. Stankovic, Krithi Ramamritham & Don Towsley Department of Computer Science University of Massachusetts,

More information

Mobile and Heterogeneous databases Distributed Database System Transaction Management. A.R. Hurson Computer Science Missouri Science & Technology

Mobile and Heterogeneous databases Distributed Database System Transaction Management. A.R. Hurson Computer Science Missouri Science & Technology Mobile and Heterogeneous databases Distributed Database System Transaction Management A.R. Hurson Computer Science Missouri Science & Technology 1 Distributed Database System Note, this unit will be covered

More information

Analyzing Real-Time Systems

Analyzing Real-Time Systems Analyzing Real-Time Systems Reference: Burns and Wellings, Real-Time Systems and Programming Languages 17-654/17-754: Analysis of Software Artifacts Jonathan Aldrich Real-Time Systems Definition Any system

More information

Microkernel/OS and Real-Time Scheduling

Microkernel/OS and Real-Time Scheduling Chapter 12 Microkernel/OS and Real-Time Scheduling Hongwei Zhang http://www.cs.wayne.edu/~hzhang/ Ack.: this lecture is prepared in part based on slides of Lee, Sangiovanni-Vincentelli, Seshia. Outline

More information

SAMOS: an Active Object{Oriented Database System. Stella Gatziu, Klaus R. Dittrich. Database Technology Research Group

SAMOS: an Active Object{Oriented Database System. Stella Gatziu, Klaus R. Dittrich. Database Technology Research Group SAMOS: an Active Object{Oriented Database System Stella Gatziu, Klaus R. Dittrich Database Technology Research Group Institut fur Informatik, Universitat Zurich fgatziu, dittrichg@ifi.unizh.ch to appear

More information

CPS352 Lecture - The Transaction Concept

CPS352 Lecture - The Transaction Concept Objectives: CPS352 Lecture - The Transaction Concept Last Revised March 3, 2017 1. To introduce the notion of a transaction and the ACID properties of a transaction 2. To introduce the notion of the state

More information

A Transaction Processing Technique in Real-Time Object- Oriented Databases

A Transaction Processing Technique in Real-Time Object- Oriented Databases 122 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008 A Transaction Processing Technique in Real-Time Object- Oriented Databases Woochun Jun Dept. of Computer

More information

Subject Name: OPERATING SYSTEMS. Subject Code: 10EC65. Prepared By: Kala H S and Remya R. Department: ECE. Date:

Subject Name: OPERATING SYSTEMS. Subject Code: 10EC65. Prepared By: Kala H S and Remya R. Department: ECE. Date: Subject Name: OPERATING SYSTEMS Subject Code: 10EC65 Prepared By: Kala H S and Remya R Department: ECE Date: Unit 7 SCHEDULING TOPICS TO BE COVERED Preliminaries Non-preemptive scheduling policies Preemptive

More information

Lisa Cingiser DiPippo and Victor Fay Wolfe. September 23, 1995

Lisa Cingiser DiPippo and Victor Fay Wolfe. September 23, 1995 Real-Time Databases Lisa Cingiser DiPippo and Victor Fay Wolfe September 23, 1995 1 Introduction Real-time databases manage time-constrained data and time-constrained transactions. They are useful in systems

More information

Precedence Graphs Revisited (Again)

Precedence Graphs Revisited (Again) Precedence Graphs Revisited (Again) [i,i+6) [i+6,i+12) T 2 [i,i+6) [i+6,i+12) T 3 [i,i+2) [i+2,i+4) [i+4,i+6) [i+6,i+8) T 4 [i,i+1) [i+1,i+2) [i+2,i+3) [i+3,i+4) [i+4,i+5) [i+5,i+6) [i+6,i+7) T 5 [i,i+1)

More information

Introduction to Embedded Systems

Introduction to Embedded Systems Introduction to Embedded Systems Sanjit A. Seshia UC Berkeley EECS 9/9A Fall 0 008-0: E. A. Lee, A. L. Sangiovanni-Vincentelli, S. A. Seshia. All rights reserved. Chapter : Operating Systems, Microkernels,

More information

Towards the Evaluation of Algorithms used in Real-Time Databases

Towards the Evaluation of Algorithms used in Real-Time Databases Towards the Evaluation of Algorithms used in Real-Time Databases VÁCLAV KRÓL 1, JINDŘICH ČERNOHORSKÝ 2, JAN POKORNÝ 2 1 Institute of Information Technologies Silesian University in Opava, Faculty of Business

More information

Event-Driven Scheduling. (closely following Jane Liu s Book)

Event-Driven Scheduling. (closely following Jane Liu s Book) Event-Driven Scheduling (closely following Jane Liu s Book) Real-Time Systems, 2006 Event-Driven Systems, 1 Principles Assign priorities to Jobs At events, jobs are scheduled according to their priorities

More information

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA

A taxonomy of race. D. P. Helmbold, C. E. McDowell. September 28, University of California, Santa Cruz. Santa Cruz, CA A taxonomy of race conditions. D. P. Helmbold, C. E. McDowell UCSC-CRL-94-34 September 28, 1994 Board of Studies in Computer and Information Sciences University of California, Santa Cruz Santa Cruz, CA

More information

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems

On Object Orientation as a Paradigm for General Purpose. Distributed Operating Systems On Object Orientation as a Paradigm for General Purpose Distributed Operating Systems Vinny Cahill, Sean Baker, Brendan Tangney, Chris Horn and Neville Harris Distributed Systems Group, Dept. of Computer

More information

REAL-TIME DATABASES (RTDB)

REAL-TIME DATABASES (RTDB) REAL-TIME DATABASES (RTDB) Prof. Fabio A. Schreiber Politecnico di Milano REAL-TIME DATABASE SYSTEMS DATABASE SYSTEMS WHICH MANAGE TIME CONSTRAINED DATA SPECIFIC TIME INTERVALS FOR DATA VALIDITY VALIDITY

More information

Fault tolerant scheduling in real time systems

Fault tolerant scheduling in real time systems tolerant scheduling in real time systems Afrin Shafiuddin Department of Electrical and Computer Engineering University of Wisconsin-Madison shafiuddin@wisc.edu Swetha Srinivasan Department of Electrical

More information

Degrees of Transaction Isolation in SQL*Cache: A Predicate-based Client-side Caching System. Oracle Corporation Palo Alto, CA

Degrees of Transaction Isolation in SQL*Cache: A Predicate-based Client-side Caching System. Oracle Corporation Palo Alto, CA Degrees of Transaction Isolation in SQL*Cache: A Predicate-based Client-side Caching System Julie Basu Arthur M. Keller Stanford University Stanford University and Computer Science Department Oracle Corporation

More information

An Improved Priority Ceiling Protocol to Reduce Context Switches in Task Synchronization 1

An Improved Priority Ceiling Protocol to Reduce Context Switches in Task Synchronization 1 An Improved Priority Ceiling Protocol to Reduce Context Switches in Task Synchronization 1 Albert M.K. Cheng and Fan Jiang Computer Science Department University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu

More information

Concurrent activities in daily life. Real world exposed programs. Scheduling of programs. Tasks in engine system. Engine system

Concurrent activities in daily life. Real world exposed programs. Scheduling of programs. Tasks in engine system. Engine system Real world exposed programs Programs written to interact with the real world, outside the computer Programs handle input and output of data in pace matching the real world processes Necessitates ability

More information

STAR: Secure Real-Time Transaction Processing with Timeliness Guarantees y

STAR: Secure Real-Time Transaction Processing with Timeliness Guarantees y STAR: Secure Real-Time Transaction Processing with Timeliness Guarantees y Kyoung-Don Kang Sang H. Son John A. Stankovic Department of Computer Science University of Virginia fkk7v, son, stankovicg@cs.virginia.edu

More information

Global Transactions Global Transaction Global Manager Transaction Interface Global Global Scheduler Recovery Manager Global Log Server Log

Global Transactions Global Transaction Global Manager Transaction Interface Global Global Scheduler Recovery Manager Global Log Server Log Recovery in Multidatabase Systems Angelo Brayner Federal University of Ceara brayner@lia.ufc.br Theo Harder University of Kaiserslautern haerder@informatik.uni-kl.de Abstract A multidatabase consists of

More information

Database Systems Concepts *

Database Systems Concepts * OpenStax-CNX module: m28156 1 Database Systems Concepts * Nguyen Kim Anh This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 3.0 Abstract This module introduces

More information

CS352 Lecture - The Transaction Concept

CS352 Lecture - The Transaction Concept CS352 Lecture - The Transaction Concept Last Revised 11/7/06 Objectives: 1. To introduce the notion of a transaction and the ACID properties of a transaction 2. To introduce the notion of the state of

More information

Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ

Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ Dongkun Shin Jihong Kim School of CSE School of CSE Seoul National University Seoul National University Seoul, Korea

More information

Memory hierarchy. 1. Module structure. 2. Basic cache memory. J. Daniel García Sánchez (coordinator) David Expósito Singh Javier García Blas

Memory hierarchy. 1. Module structure. 2. Basic cache memory. J. Daniel García Sánchez (coordinator) David Expósito Singh Javier García Blas Memory hierarchy J. Daniel García Sánchez (coordinator) David Expósito Singh Javier García Blas Computer Architecture ARCOS Group Computer Science and Engineering Department University Carlos III of Madrid

More information

Real-Time Scalability of Nested Spin Locks. Hiroaki Takada and Ken Sakamura. Faculty of Science, University of Tokyo

Real-Time Scalability of Nested Spin Locks. Hiroaki Takada and Ken Sakamura. Faculty of Science, University of Tokyo Real-Time Scalability of Nested Spin Locks Hiroaki Takada and Ken Sakamura Department of Information Science, Faculty of Science, University of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo 113, Japan Abstract

More information

EXTENDING THE PRIORITY CEILING PROTOCOL USING READ/WRITE AFFECTED SETS MICHAEL A. SQUADRITO A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE

EXTENDING THE PRIORITY CEILING PROTOCOL USING READ/WRITE AFFECTED SETS MICHAEL A. SQUADRITO A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE EXTENDING THE PRIORITY CEILING PROTOCOL USING READ/WRITE AFFECTED SETS BY MICHAEL A. SQUADRITO A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER

More information

Locking Based Concurrency Control. for Integrated Real-Time Database Systems. D. Hong y. S. Chakravarthy. T. Johnson

Locking Based Concurrency Control. for Integrated Real-Time Database Systems. D. Hong y. S. Chakravarthy. T. Johnson Locking Based Concurrency Control for Integrated Real-Time Database Systems D. Hong y S. Chakravarthy T. Johnson Database Systems Research and Development Center Computer and Information Science and Engineering

More information

Priority assignment in real-time active databases 1

Priority assignment in real-time active databases 1 The VLDB Journal 1996) 5: 19 34 The VLDB Journal c Springer-Verlag 1996 Priority assignment in real-time active databases 1 Rajendran M. Sivasankaran, John A. Stankovic, Don Towsley, Bhaskar Purimetla,

More information

Department of Computer Science Institute for System Architecture, Operating Systems Group REAL-TIME MICHAEL ROITZSCH OVERVIEW

Department of Computer Science Institute for System Architecture, Operating Systems Group REAL-TIME MICHAEL ROITZSCH OVERVIEW Department of Computer Science Institute for System Architecture, Operating Systems Group REAL-TIME MICHAEL ROITZSCH OVERVIEW 2 SO FAR talked about in-kernel building blocks: threads memory IPC drivers

More information

Multi-User-Synchronization

Multi-User-Synchronization Chapter 10 Multi-User-Synchronization Database Systems p. 415/569 Why Run TAs Concurrently? We could run all TAs serially (one after the other) This would prevent all unwanted side effects However, this

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

In Proceedings of RTAS 97: The 1997 IEEE Real-Time Technology and Applications Symposium, Montreal, Canada, June 1997.

In Proceedings of RTAS 97: The 1997 IEEE Real-Time Technology and Applications Symposium, Montreal, Canada, June 1997. In Proceedings of RTAS 97: The 1997 IEEE Real-Time Technology and Applications Symposium, Montreal, Canada, June 1997. Admission Control for Soft-Deadline Transactions in ACCORD Sue Nagy y Azer Bestavros

More information

Abstract One way of avoiding unpredictable delays, in a distributed real-time database, is to allow transactions to commit locally. In a system suppor

Abstract One way of avoiding unpredictable delays, in a distributed real-time database, is to allow transactions to commit locally. In a system suppor A CONFLICT DETECTION AND RESOLUTION MECHANISM FOR BOUNDED-DELAY REPLICATION Johan Lundstrom Submitted by Johan Lundstrom to the University of Skovde as a dissertation towards the degree of M.Sc. by examination

More information

Resolving Executing Committing Conflicts in Distributed Real-time Database Systems

Resolving Executing Committing Conflicts in Distributed Real-time Database Systems Resolving Executing Committing Conflicts in Distributed Real-time Database Systems KAM-YIU LAM 1,CHUNG-LEUNG PANG 1,SANG H. SON 2 AND JIANNONG CAO 3 1 Department of Computer Science, City University of

More information

CS352 Lecture - Concurrency

CS352 Lecture - Concurrency CS352 Lecture - Concurrency Objectives: Last revised 3/21/17 1. To introduce locking as a means of preserving the serializability of concurrent schedules. 2. To briefly introduce other approaches to this

More information

T H. Runable. Request. Priority Inversion. Exit. Runable. Request. Reply. For T L. For T. Reply. Exit. Request. Runable. Exit. Runable. Reply.

T H. Runable. Request. Priority Inversion. Exit. Runable. Request. Reply. For T L. For T. Reply. Exit. Request. Runable. Exit. Runable. Reply. Experience with Real-Time Mach for Writing Continuous Media Applications and Servers Tatsuo Nakajima Hiroshi Tezuka Japan Advanced Institute of Science and Technology Abstract This paper describes the

More information

A can be implemented as a separate process to which transactions send lock and unlock requests The lock manager replies to a lock request by sending a lock grant messages (or a message asking the transaction

More information

SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988

SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988 SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS BY IAN RAMSAY PHILP B.S., University of North Carolina at Chapel Hill, 1988 M.S., University of Florida, 1990 THESIS Submitted in partial fulllment

More information

Ch 4 : CPU scheduling

Ch 4 : CPU scheduling Ch 4 : CPU scheduling It's the basis of multiprogramming operating systems. By switching the CPU among processes, the operating system can make the computer more productive In a single-processor system,

More information

Multiprocessor scheduling

Multiprocessor scheduling Chapter 10 Multiprocessor scheduling When a computer system contains multiple processors, a few new issues arise. Multiprocessor systems can be categorized into the following: Loosely coupled or distributed.

More information

PROCESS SCHEDULING II. CS124 Operating Systems Fall , Lecture 13

PROCESS SCHEDULING II. CS124 Operating Systems Fall , Lecture 13 PROCESS SCHEDULING II CS124 Operating Systems Fall 2017-2018, Lecture 13 2 Real-Time Systems Increasingly common to have systems with real-time scheduling requirements Real-time systems are driven by specific

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Consistent Logical Checkpointing. Nitin H. Vaidya. Texas A&M University. Phone: Fax:

Consistent Logical Checkpointing. Nitin H. Vaidya. Texas A&M University. Phone: Fax: Consistent Logical Checkpointing Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 77843-3112 hone: 409-845-0512 Fax: 409-847-8578 E-mail: vaidya@cs.tamu.edu Technical

More information

Correctness Criteria Beyond Serializability

Correctness Criteria Beyond Serializability Correctness Criteria Beyond Serializability Mourad Ouzzani Cyber Center, Purdue University http://www.cs.purdue.edu/homes/mourad/ Brahim Medjahed Department of Computer & Information Science, The University

More information

Maintaining integrity constraints and security in real-time database systems

Maintaining integrity constraints and security in real-time database systems Maintaining integrity constraints and security in real-time database systems Q. N. Ahmed and S. V. Vrbsky Department of Computer Science, The University of Alabama 101 Houser Hall, Box 870290, Tuscaloosa,

More information

Algorithms Implementing Distributed Shared Memory. Michael Stumm and Songnian Zhou. University of Toronto. Toronto, Canada M5S 1A4

Algorithms Implementing Distributed Shared Memory. Michael Stumm and Songnian Zhou. University of Toronto. Toronto, Canada M5S 1A4 Algorithms Implementing Distributed Shared Memory Michael Stumm and Songnian Zhou University of Toronto Toronto, Canada M5S 1A4 Email: stumm@csri.toronto.edu Abstract A critical issue in the design of

More information

DATABASE TRANSACTIONS. CS121: Relational Databases Fall 2017 Lecture 25

DATABASE TRANSACTIONS. CS121: Relational Databases Fall 2017 Lecture 25 DATABASE TRANSACTIONS CS121: Relational Databases Fall 2017 Lecture 25 Database Transactions 2 Many situations where a sequence of database operations must be treated as a single unit A combination of

More information

Multimedia Applications Require Adaptive CPU Scheduling. Veronica Baiceanu, Crispin Cowan, Dylan McNamee, Calton Pu, and Jonathan Walpole

Multimedia Applications Require Adaptive CPU Scheduling. Veronica Baiceanu, Crispin Cowan, Dylan McNamee, Calton Pu, and Jonathan Walpole Multimedia Applications Require Adaptive CPU Scheduling Veronica Baiceanu, Crispin Cowan, Dylan McNamee, Calton Pu, and Jonathan Walpole Department of Computer Science and Engineering Oregon Graduate Institute

More information

Using the Imprecise-Computation Technique for Congestion. Control on a Real-Time Trac Switching Element

Using the Imprecise-Computation Technique for Congestion. Control on a Real-Time Trac Switching Element Appeared in Proc. of the Int'l Conf. on Parallel & Distributed Systems, Hsinchu, Taiwan, December 994. Using the Imprecise-Computation Technique for Congestion Control on a Real-Time Trac Switching Element

More information

Copyright Notice. COMP9242 Advanced Operating Systems S2/2014 Week 9: Real-Time Systems. Real-Time System: Definition

Copyright Notice. COMP9242 Advanced Operating Systems S2/2014 Week 9: Real-Time Systems. Real-Time System: Definition Copyright Notice These slides are distributed under the Creative Commons Attribution.0 License COMP94 Advanced Operating Systems S/014 Week 9: Real- Systems @GernotHeiser You are free: to share to copy,

More information

Node Application Logic. SCI Interface. Output FIFO. Input FIFO. Bypass FIFO M U X. Output Link. Input Link. Address Decoder

Node Application Logic. SCI Interface. Output FIFO. Input FIFO. Bypass FIFO M U X. Output Link. Input Link. Address Decoder Real-Time Message Transmission Over The Scalable Coherent Interface (SCI) Lei Jiang Sarit Mukherjee Dept. of Computer Science & Engg. University of Nebraska-Lincoln Lincoln, NE 68588-0115 Email: fljiang,

More information

Service Differentiation in Real-Time Main Memory Databases

Service Differentiation in Real-Time Main Memory Databases Service Differentiation in Real-Time Main Memory Databases Kyoung-Don Kang Sang H. Son John A. Stankovic Department of Computer Science University of Virginia kk7v, son, stankovic @cs.virginia.edu Abstract

More information

Implementation Techniques

Implementation Techniques V Implementation Techniques 34 Efficient Evaluation of the Valid-Time Natural Join 35 Efficient Differential Timeslice Computation 36 R-Tree Based Indexing of Now-Relative Bitemporal Data 37 Light-Weight

More information

Performance of Distributed Optimistic Concurrency Control in Real-Time databases

Performance of Distributed Optimistic Concurrency Control in Real-Time databases Performance of Distributed Optimistic Concurrency Control in Real-Time databases Jan Lindström University of Helsinki, Department of Computer Science P.O. Box 26 (Teollisuuskatu 23), FIN-00014 University

More information

Learning Outcomes. Scheduling. Is scheduling important? What is Scheduling? Application Behaviour. Is scheduling important?

Learning Outcomes. Scheduling. Is scheduling important? What is Scheduling? Application Behaviour. Is scheduling important? Learning Outcomes Scheduling Understand the role of the scheduler, and how its behaviour influences the performance of the system. Know the difference between I/O-bound and CPU-bound tasks, and how they

More information

Number of bits in the period of 100 ms. Number of bits in the period of 100 ms. Number of bits in the periods of 100 ms

Number of bits in the period of 100 ms. Number of bits in the period of 100 ms. Number of bits in the periods of 100 ms Network Bandwidth Reservation using the Rate-Monotonic Model Sourav Ghosh and Ragunathan (Raj) Rajkumar Real-time and Multimedia Systems Laboratory Department of Electrical and Computer Engineering Carnegie

More information

3. Quality of Service

3. Quality of Service 3. Quality of Service Usage Applications Learning & Teaching Design User Interfaces Services Content Process ing Security... Documents Synchronization Group Communi cations Systems Databases Programming

More information

Frequently asked questions from the previous class survey

Frequently asked questions from the previous class survey CS 370: OPERATING SYSTEMS [CPU SCHEDULING] Shrideep Pallickara Computer Science Colorado State University L14.1 Frequently asked questions from the previous class survey Turnstiles: Queue for threads blocked

More information

Datenbanksysteme II: Implementation of Database Systems Synchronization of Concurrent Transactions

Datenbanksysteme II: Implementation of Database Systems Synchronization of Concurrent Transactions Datenbanksysteme II: Implementation of Database Systems Synchronization of Concurrent Transactions Material von Prof. Johann Christoph Freytag Prof. Kai-Uwe Sattler Prof. Alfons Kemper, Dr. Eickler Prof.

More information

Fault-Tolerant RT-Mach (FT-RT-Mach) and. an Application to Real-Time Train Control. A. Egan, D. Kutz, D. Mikulin, R. Melhem, D.

Fault-Tolerant RT-Mach (FT-RT-Mach) and. an Application to Real-Time Train Control. A. Egan, D. Kutz, D. Mikulin, R. Melhem, D. 19 0 Fault-Tolerant RT-Mach (FT-RT-Mach) and an Application to Real-Time Train Control A. Egan, D. Kutz, D. Mikulin, R. Melhem, D. Mosse Department of Computer Science University of Pittsburgh Pittsburgh,

More information

Two-Version-Based Concurrency Control and Recovery in Real-Time Client/Server Databases

Two-Version-Based Concurrency Control and Recovery in Real-Time Client/Server Databases Two-Version-Based Concurrency Control and Recovery in Real-Time Client/Server Databases Tei-Wei Kuo, Yuan-Ting Kao, and Chin-Fu Kuo Department of Computer Science and Information Engineering National Taiwan

More information

Recovering from Main-Memory Lapses. H.V. Jagadish Avi Silberschatz S. Sudarshan. AT&T Bell Labs. 600 Mountain Ave., Murray Hill, NJ 07974

Recovering from Main-Memory Lapses. H.V. Jagadish Avi Silberschatz S. Sudarshan. AT&T Bell Labs. 600 Mountain Ave., Murray Hill, NJ 07974 Recovering from Main-Memory Lapses H.V. Jagadish Avi Silberschatz S. Sudarshan AT&T Bell Labs. 600 Mountain Ave., Murray Hill, NJ 07974 fjag,silber,sudarshag@allegra.att.com Abstract Recovery activities,

More information

Exam Review TexPoint fonts used in EMF.

Exam Review TexPoint fonts used in EMF. Exam Review Generics Definitions: hard & soft real-time Task/message classification based on criticality and invocation behavior Why special performance measures for RTES? What s deadline and where is

More information

Interprocess Communication By: Kaushik Vaghani

Interprocess Communication By: Kaushik Vaghani Interprocess Communication By: Kaushik Vaghani Background Race Condition: A situation where several processes access and manipulate the same data concurrently and the outcome of execution depends on the

More information

(Preliminary Version 2 ) Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science. Texas A&M University. College Station, TX

(Preliminary Version 2 ) Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science. Texas A&M University. College Station, TX Towards an Adaptive Distributed Shared Memory (Preliminary Version ) Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 77843-3 E-mail: fjhkim,vaidyag@cs.tamu.edu

More information

Real-Time Scheduling of Sensor-Based Control Systems

Real-Time Scheduling of Sensor-Based Control Systems In Proceedings of Eighth IEEE Workshop on Real-Time Operatings Systems and Software, in conjunction with 7th IFAC/IFIP Workshop on Real-Time Programming, Atlanta, GA, pp. 44-50, May 99. Real-Time Scheduling

More information

RTC: Language Support for Real-Time Concurrency

RTC: Language Support for Real-Time Concurrency RTC: Language Support for Real-Time Concurrency Insup Lee, Susan Davidson, and Victor Wolfe 1 Introduction The RTC (Real-Time Concurrency) programming concepts and language constructs for expressing timing

More information

A Capacity Sharing and Stealing Strategy for Open Real-time Systems

A Capacity Sharing and Stealing Strategy for Open Real-time Systems A Capacity Sharing and Stealing Strategy for Open Real-time Systems Luís Nogueira, Luís Miguel Pinho CISTER Research Centre School of Engineering of the Polytechnic Institute of Porto (ISEP/IPP) Rua Dr.

More information

Deterministic Best Eort and Planning Based. Protocols for Real-time Communication in Multiple. Access Networks. Samphel Norden S.

Deterministic Best Eort and Planning Based. Protocols for Real-time Communication in Multiple. Access Networks. Samphel Norden S. Deterministic Best Eort and Planning Based Protocols for Real-time Communication in Multiple Access Networks Samphel Norden S. Balaji G. Manimaran C. Siva Ram Murthy? Department of Computer Science and

More information

ABSTRACT AN OBJECT-ORIENTED REAL-TIME DATABASE SYSTEM FOR MULTIPROCESSORS. by Victor Bradley Lortz Chair: Kang G. Shin Complex real-time systems need

ABSTRACT AN OBJECT-ORIENTED REAL-TIME DATABASE SYSTEM FOR MULTIPROCESSORS. by Victor Bradley Lortz Chair: Kang G. Shin Complex real-time systems need AN OBJECT-ORIENTED REAL-TIME DATABASE SYSTEM FOR MULTIPROCESSORS. by Victor Bradley Lortz A dissertation submitted in partial fulllment of the requirements for the degree of Doctor of Philosophy (Computer

More information

Object-based Semantic Real-time Concurrency Control With. Lisa Cingiser DiPippo and Victor Fay Wolfe. University of Rhode Island.

Object-based Semantic Real-time Concurrency Control With. Lisa Cingiser DiPippo and Victor Fay Wolfe. University of Rhode Island. Object-based Semantic Real-time Concurrency Control With Bounded Imprecision Lisa Cingiser DiPippo and Victor Fay Wolfe Department of Computer Science University of Rhode Island Kingston, RI 02881 Abstract

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

An Approach to Task Attribute Assignment for Uniprocessor Systems

An Approach to Task Attribute Assignment for Uniprocessor Systems An Approach to ttribute Assignment for Uniprocessor Systems I. Bate and A. Burns Real-Time Systems Research Group Department of Computer Science University of York York, United Kingdom e-mail: fijb,burnsg@cs.york.ac.uk

More information

CS352 Lecture - Concurrency

CS352 Lecture - Concurrency CS352 Lecture - Concurrency Objectives: Last revised 11/16/06 1. To introduce locking as a means of preserving the serializability of concurrent schedules. 2. To briefly introduce other approaches to this

More information

UNIT 3 UNIT 3. Transaction Management and Concurrency Control, Performance tuning and query optimization of SQL and NoSQL Databases.

UNIT 3 UNIT 3. Transaction Management and Concurrency Control, Performance tuning and query optimization of SQL and NoSQL Databases. UNIT 3 Transaction Management and Concurrency Control, Performance tuning and query optimization of SQL and NoSQL Databases. 1. Transaction: A transaction is a unit of program execution that accesses and

More information

2 Data Reduction Techniques The granularity of reducible information is one of the main criteria for classifying the reduction techniques. While the t

2 Data Reduction Techniques The granularity of reducible information is one of the main criteria for classifying the reduction techniques. While the t Data Reduction - an Adaptation Technique for Mobile Environments A. Heuer, A. Lubinski Computer Science Dept., University of Rostock, Germany Keywords. Reduction. Mobile Database Systems, Data Abstract.

More information

Simplified design flow for embedded systems

Simplified design flow for embedded systems Simplified design flow for embedded systems 2005/12/02-1- Reuse of standard software components Knowledge from previous designs to be made available in the form of intellectual property (IP, for SW & HW).

More information

Intergrity Policies CS3SR3/SE3RA3. Ryszard Janicki. Outline Integrity Policies The Biba Integrity Model

Intergrity Policies CS3SR3/SE3RA3. Ryszard Janicki. Outline Integrity Policies The Biba Integrity Model Intergrity Policies CS3SR3/SE3RA3 Ryszard Janicki Acknowledgments: Material based on Computer Security: Art and Science by Matt Bishop (Chapter 6) Ryszard Janicki Intergrity Policies 1 / 13 Outline 1 2

More information

Reading Temporally Consistent Data in Broadcast Disks

Reading Temporally Consistent Data in Broadcast Disks Reading Temporally Consistent Data in Broadcast Disks Victor C.S. Lee Joseph K. Ng Jo Y. P. Chong Kwok-wa Lam csvlee@cityu.edu.hk jng@comp.hkbu.edu.hk csleric@cityu.edu.hk Department of Computer Science,City

More information

Concurrency Control and Recovery. Michael J. Franklin. Department of Computer Science and UMIACS. University of Maryland.

Concurrency Control and Recovery. Michael J. Franklin. Department of Computer Science and UMIACS. University of Maryland. Concurrency Control and Recovery Michael J. Franklin Department of Computer Science and UMIACS University of Maryland College Park, MD 1 Introduction Many service-oriented businesses and organizations,

More information

Redo Log Undo Log. Redo Log Undo Log. Redo Log Tail Volatile Store. Pers. Redo Log

Redo Log Undo Log. Redo Log Undo Log. Redo Log Tail Volatile Store. Pers. Redo Log Recovering from Main-Memory Lapses H.V. Jagadish AT&T Research Murray Hill, NJ 07974 jag@research.att.com Avi Silberschatz Bell Laboratories Murray Hill, NJ 07974 avi@bell-labs.com S. Sudarshan Indian

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer

More information

Computer Science 4500 Operating Systems

Computer Science 4500 Operating Systems Computer Science 4500 Operating Systems Module 6 Process Scheduling Methods Updated: September 25, 2014 2008 Stanley A. Wileman, Jr. Operating Systems Slide 1 1 In This Module Batch and interactive workloads

More information

Tasks. Task Implementation and management

Tasks. Task Implementation and management Tasks Task Implementation and management Tasks Vocab Absolute time - real world time Relative time - time referenced to some event Interval - any slice of time characterized by start & end times Duration

More information

Overview of Scheduling a Mix of Periodic and Aperiodic Tasks

Overview of Scheduling a Mix of Periodic and Aperiodic Tasks Overview of Scheduling a Mix of Periodic and Aperiodic Tasks Minsoo Ryu Department of Computer Science and Engineering 2 Naive approach Background scheduling Algorithms Under static priority policy (RM)

More information

CHAPTER 7 CONCLUSION AND FUTURE SCOPE

CHAPTER 7 CONCLUSION AND FUTURE SCOPE 121 CHAPTER 7 CONCLUSION AND FUTURE SCOPE This research has addressed the issues of grid scheduling, load balancing and fault tolerance for large scale computational grids. To investigate the solution

More information

4/6/2011. Informally, scheduling is. Informally, scheduling is. More precisely, Periodic and Aperiodic. Periodic Task. Periodic Task (Contd.

4/6/2011. Informally, scheduling is. Informally, scheduling is. More precisely, Periodic and Aperiodic. Periodic Task. Periodic Task (Contd. So far in CS4271 Functionality analysis Modeling, Model Checking Timing Analysis Software level WCET analysis System level Scheduling methods Today! erformance Validation Systems CS 4271 Lecture 10 Abhik

More information

Global Scheduling in Multiprocessor Real-Time Systems

Global Scheduling in Multiprocessor Real-Time Systems Global Scheduling in Multiprocessor Real-Time Systems Alessandra Melani 1 Global vs Partitioned scheduling Single shared queue instead of multiple dedicated queues Global scheduling Partitioned scheduling

More information

Scheduling Algorithm and Analysis

Scheduling Algorithm and Analysis Scheduling Algorithm and Analysis Model and Cyclic Scheduling (Module 27) Yann-Hang Lee Arizona State University yhlee@asu.edu (480) 727-7507 Summer 2014 Task Scheduling Schedule: to determine which task

More information

Concurrency Control in Distributed Systems. ECE 677 University of Arizona

Concurrency Control in Distributed Systems. ECE 677 University of Arizona Concurrency Control in Distributed Systems ECE 677 University of Arizona Agenda What? Why? Main problems Techniques Two-phase locking Time stamping method Optimistic Concurrency Control 2 Why concurrency

More information