• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Huang Lida, Li Renfa. Scheduling of Mixed Criticality Real-Time Tasks Set with Deadline as the Critical Parameter[J]. Journal of Computer Research and Development, 2016, 53(7): 1641-1647. DOI: 10.7544/issn1000-1239.2016.20150331
Citation: Huang Lida, Li Renfa. Scheduling of Mixed Criticality Real-Time Tasks Set with Deadline as the Critical Parameter[J]. Journal of Computer Research and Development, 2016, 53(7): 1641-1647. DOI: 10.7544/issn1000-1239.2016.20150331

Scheduling of Mixed Criticality Real-Time Tasks Set with Deadline as the Critical Parameter

More Information
  • Published Date: June 30, 2016
  • An increasing trend in real-time systems is to integrate multiple functionalities of different levels of criticality, or importance, on the same platform, which leads the research of mixed criticality systems. In the current mixed criticality scheduling research, worst-case execution times or periods of high critical-level tasks are critical parameters, which are different between in high-critical mode and low-critical mode. Deadline is also an important time-parameter, especially in hard real-time systems, whereas how to schedule mixed criticality tasks using deadline as the critical parameter is still lack of discussion. This paper considers the mixed criticality scheduling in which deadlines of tasks are the critical parameter on a uniprocessor platform. Towards satisfying schedulability of high-criticality tasks in both modes, we use response time analysis to get timing-demand of fixed priority tasks and propose the raising critical-level in advance (RCLA) scheduling algorithm. RCLA gets high-critical tasks with lower priority to preempt low-critical tasks with higher priority earlier and limitedly. As well as meeting the deadlines of high criticality tasks in high-criticality mode and low-criticality mode, RCLA can schedule mixed criticality tasks as many as possible. Simulation results illustrate the benefits of this scheme.
  • Related Articles

    [1]Xia Sibo, Ma Minghua, Jin Pengxiang, Cui Liyue, Zhang Shenglin, Jin Wa, Sun Yongqian, Pei Dan. Response Time Anomaly Diagnosis for Search Service[J]. Journal of Computer Research and Development, 2024, 61(6): 1573-1584. DOI: 10.7544/issn1000-1239.202330054
    [2]Li Liying, Zhang Runze, Wei Tongquan. Service Decoupling and Deployment Strategy for Edge Computing[J]. Journal of Computer Research and Development, 2023, 60(5): 1073-1085. DOI: 10.7544/issn1000-1239.202220736
    [3]Zhang Qiang, Liang Jie, Xu Yinlong, Li Yongkun. Research of SSD Array Architecture Based on Workload Awareness[J]. Journal of Computer Research and Development, 2019, 56(4): 755-766. DOI: 10.7544/issn1000-1239.2019.20170832
    [4]Huang Lida, Li Renfa. The Schedulable Analysis of Real-Time Tasks After Event-Triggered Criticality Level Transition[J]. Journal of Computer Research and Development, 2017, 54(1): 184-191. DOI: 10.7544/issn1000-1239.2017.20150890
    [5]Li Xiang, Fan Yushun, Wang Hongan, Qiao Ying. Estimation on Worst-Case Execution Time of Real-Time Complex Event Processing[J]. Journal of Computer Research and Development, 2012, 49(10): 2054-2065.
    [6]Zhou Hang, Huang Zhiqiu, Zhu Yi, Xia Liang, Liu Linyuan. Real-Time Systems Contact Checking and Resolution Based on Time Petri Net[J]. Journal of Computer Research and Development, 2012, 49(2): 413-420.
    [7]Zhou Hang, Huang Zhiqiu, Hu Jun, Zhu Yi. Real-Time System Resource Conflict Checking Based on Time Petri Nets[J]. Journal of Computer Research and Development, 2009, 46(9): 1578-1585.
    [8]Mu Chengpo, Huang Houkuan, Tian Shengfeng, Li Xiangjun. A Survey of Intrusion Response Decision-Making Techniques of Automated Intrusion Response Systems[J]. Journal of Computer Research and Development, 2008, 45(8): 1290-1298.
    [9]Jiang Hao and Dong Yisheng. A Time Performance Evaluation Method for Workflow Based on Extended Timed Petri Net[J]. Journal of Computer Research and Development, 2005, 42(5): 849-855.
    [10]Xu Mingwei, Hu Chunming, Liu Xudong, and Ma Dianfu. Research and Implementation of Web Service Differentiated QoS[J]. Journal of Computer Research and Development, 2005, 42(4): 669-675.

Catalog

    Article views (1339) PDF downloads (577) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return