skip to main content
10.1145/2245276.2232029acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

On using adversary simulators to obtain tight lower bounds for response times

Authors Info & Claims
Published:26 March 2012Publication History

ABSTRACT

Many embedded systems have soft real-time constraints and it is useful to have an estimate for the worst-case response time of each task. Formal analysis provides safe upper bounds but they are too pessimistic for complex architectures. Simulators can be used to establish a lower bound for the worst-case response time, but classic simulators apply arrival patterns originally conceived for uniprocessor and fail to achieve a good estimate. In this paper we present the concept of an adversary simulator that generates arrival patterns to stress the system. We implemented a simple and fast heuristic that allows the adversary simulator to obtain lower bounds that are considerably tighter than those of classic simulators. We designed the heuristic specifically for fixed-priority scheduling with Deadline Monotonic and Deadline minus Computation Time Monotonic priority ordering.

References

  1. B. Andersson and J. Jonsson. Preemptive multiprocessor scheduling anomalies. In Proceedings of the 16th International Parallel and Distributed Processing Symposium, IPDPS 02, pages 271-, Washington, DC, USA, 2002. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. P. Baker and M. Cirinei. Brute-force determination of multiprocessor schedulability for sets of sporadic hard-deadline tasks. In Proc. of the 11th international conference on Principles of distributed systems, OPODIS'07, pages 62--75. Springer-Verlag, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Baruah, G. Koren, D. Mao, B. Mishra, A. Raghunathan, L. Rosier, D. Shasha, and F. Wang. On the competitiveness of on-line real-time task scheduling. In Proceedings of Real-Time Systems Symposium, pages 106--115, December 1991.Google ScholarGoogle ScholarCross RefCross Ref
  4. E. Bini and G. C. Buttazzo. Measuring the performance of schedulability tests. Real-Time Systems, 30: 129--154, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. I. Davis and A. Burns. Priority assignment for global fixed priority pre-emptive scheduling in multiprocessor real-time systems. In Proceedings of the 2009 30th IEEE Real-Time Systems Symposium, RTSS '09, pages 398--409, Washington, DC, USA, 2009. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. I. Davis and A. Burns. Fpzl schedulability analysis. In Proceedings of the 2011 17th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS '11, pages 245--256, Washington, DC, USA, 2011. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. K. G. Thaker, P. Lardieri and M. Price. Empirical quantification of pessimism in state-of-the-art scheduling theory techniques for periodic and sporadic dre tasks. In Proc. of the 10th IEEE Real-Time and Embedded Technology and Applications Symposium, pages 490--499, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Ha and J. Liu. Validating timing constraints in multiprocessor and distributed real-time systems. In Proc. of the 14th International Conference on Dist. Comp. Systems, pages 162--171, jun 1994.Google ScholarGoogle Scholar
  9. C. R. Reeves, editor. Modern heuristic techniques for combinatorial problems. John Wiley & Sons, Inc., New York, NY, USA, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Samii, S. Rafiliu, P. Eles, and Z. Peng. A simulation methodology for worst-case response time estimation of distributed real-time systems. In Design, Automation and Test in Europe, 2008. DATE '08, pages 556--561, march 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On using adversary simulators to obtain tight lower bounds for response times

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
          March 2012
          2179 pages
          ISBN:9781450308571
          DOI:10.1145/2245276
          • Conference Chairs:
          • Sascha Ossowski,
          • Paola Lecca

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 March 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          SAC '12 Paper Acceptance Rate270of1,056submissions,26%Overall Acceptance Rate1,650of6,669submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader