IJRIT International Journal of Research in Information Technology, Volume 1, Issue 9, September, 2013, Pg. 212-215

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Sigma-F Protocol Access Control for Real Time System Shahid Iqbal1, Faiyaz Ahmad2 1

M.Tech Student, Electrical & Electronics Engg Department, Birla Institute of Technology & Science (BITS) Goa, India 2 Assistant Professor, Computer Engg Department, Jamia Millia Islamia University New Delhi, India 1

[email protected] , [email protected]

Abstract Resource access control protocol is a set of rules that govern when and under what conditions each request for resource is granted and how jobs requiring resources are scheduled .In this paper we will define such access control protocol which we termed as Sigma-f protocol. Sigma-f protocol is based on two parameters which describes its operation. This protocol significantly reduces the response time and blocking time among the jobs which requested for a resource in order to execute.

Key Words- Access control protocol; Scheduling; Real Time System; Response Time.

1. Introduction The Real Time Systems that are subject to a real time constraint e.g – operational deadlines from event to system response. In this each unit of work that is scheduled and executed by the system a ‘job’ and a set of related jobs which jointly provide some system function a ‘task’. A job executes or is executed by the operating system and every job executes on some resources. We divide all the system resources into two major types: processors and resources. By resources, we will specifically mean passive resources, examples of resources are memory, mutexes, database locks etc. A job may need some resources in addition to the processor in order to make progress. For example, computation job may share data with other computations, and the data may be guarded by semaphore. We model (the lock of) each semaphore as a resource. When a job wants to access the shared data guarded by a semaphore R, it must first lock the semaphore, and then it enters the critical section of the code where it Shahid Iqbal,IJRIT

212

accesses the shared data. So in this case, we say that the job requires the resource R for the duration of this critical section. We will use letter R to denote resources and J to denote jobs. The resources which we will mention are reusable, because they are not consumed during use. A Resource may be shared either serially or mutually exclusive manner whose unit of resource may vary from one to infinite. A resource that has an infinite number of units has no effect on the timing behavior of any job since every job can have the resource at any time. We continue to focus on the case where the system contains only one processor, in addition, the system also contains ‘n’ types of reusable resource.

2. Explanation This protocol makes two key assumptions: 1. 2.

The assigned priorities of all jobs are fixed. The resource required by all jobs is known priori before the execution of any job begins.

In this protocol, the symbol used for showing the execution pattern of a job (Jn) as [ [L][R:M][N] ] which means the nth job (Jn) first execute its ‘ L’ time unit without usage of any resource then execution of ‘M’ time unit with usage of resource ‘R’ and then execution of ‘N’ time unit without usage of any resource. So the total execution time for the job (Jn) will be (L+M+N) time unit. A job can execute by using any combination of above i.e with or without usage of resource, but we will focus on the execution of job with the usage of resources. So we will use this symbol for showing execution pattern of jobs in rest of our paper.

3. Definition of Sigma-f Protocol To define the protocol, we need two additional terms. This protocol makes use of a parameter called σi (sigma-i) and σf (sigma-f).The σi is used to assign some values corresponding to each jobs. The assignment is based on execution time unit of job with the usage of resource. Larger the execution time unit of job with the usage of resource , higher will be σi priority(will assign low integer value).If two or more jobs uses the same execution time unit with the usage of resource, then it will assign higher priority(low integer value) to that job whose release time is earlier. The second parameter σf takes two parameters .One is priority of each job (ᴨ-i) and priority of sigma-i(σi). This σf calculates value by multiplying the (ᴨ-i ) and (σi ) values i.e σf = (ᴨ-i ) x (σi ) and this decides which job will first schedule. Lower will be the σf value, higher will be its priority to schedule.

3.1 Scheduling Rule We now define the sigma-f protocol for the case when there is only 1 unit of every resource. 1. 2.

3.

The scheduling rule depends on the σf value. Schedule that job first whose σf value is least (lower integer) and then next job whose σf value greater than previous one and so on until all jobs get scheduled. Only those higher priority jobs will be executed during the CPU idle time whose execution pattern consists of execution time unit without usage of resource and it may be further preempted by the job depending on the σf value. If there exist tie in the σf value, then tie will be broken by earlier availability of higher priority job.

3.2 Allocation Rule 1. 2.

When a job J requests a resource R at time t .If R is free, R is allocated to job J until J releases R. Once resource R is allocated to job J, no other job J’ can preempt J.

Shahid Iqbal,IJRIT

213

4. Example Consideration Table 1 and Fig 1 shows the example of the Sigma-f protocol in which table 1 shows the execution pattern of five jobs and it calculates two parameters (sigma-i and sigma-f) based on the release time, priority of jobs and execution pattern. After calculating these two parameters, fig 1 shows the scheduling diagram for these five jobs. In fig 1 , the shaded region with X and Y shows the execution of jobs with the usage of resource X and Y respectively while the blank shaded region shows the execution of jobs without usage of any resources. Table.1 Shows the different parameters of jobs & calculated Sigma-i and Sigma-f values Jobs

Release time

Execution time

Priority (ᴨ-i )

Execution pattern

Sigma-i ( σi )

Sigma-f ( σf )

J1

7

3

1

[[1][X:1][1]]

5

5

J2

4

3

2

[[1][Y:1][1]]

4

8

J3

3

4

3

[[1][X:2][1]]

3

9

J4

2

4

4

[[1][Y:2][1]]

2

8

J5

0

6

5

[[1][X:4][1]]

1

5

J1

X

J2

Y

J3

X X

J4 J5

Y Y X

0 1 2

X

X 3 4

X 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

Fig.1 Shows the scheduling based on table.1

5. Conclusion This Sigma-f access control protocol helps in reducing the response time and blocking time among the jobs. This protocol effectively suitable for systems in which jobs have soft deadlines i.e for soft real time system applications. It is found that this protocol is better than one of the existing access control protocol especially in terms of complexity of implementation and blocking factor.

Shahid Iqbal,IJRIT

214

6. References [1] Jane W. S. Liu, Real Time Systems, 13th edition, Pearson,2012. [2] Silberschatz , Galvin and Gagne, Operating systems concepts, 8th edition, Wiley,2009 [3] Ramamritham, Krithi, John A. Stankovic, and P-F. Shiah. “Efficient scheduling algorithms for real-time multiprocessor systems." Parallel and Distributed Systems,IEEE Transactions on 1.2 (1990): 184-194. [4] W.Zhao,K. Ramamritham and J. A. Stankovic "Scheduling tasks with resource requirements in hard real-time systems", IEEE Trans. Software Eng.,1985 [5] J.Î .Goodenough and L. Sha "The priority ceiling protocol: A method for minimizing the blocking of high priority Ada tasks",Proc. 2nd ACM Int. Workshop Real-Time Ada Issues,1988

Shahid Iqbal,IJRIT

215

Sigma-F Protocol Access Control for Real Time System - IJRIT

Key Words- Access control protocol; Scheduling; Real Time System; Response Time. 1. Introduction. The Real Time ... database locks etc. A job may need some ...

81KB Sizes 4 Downloads 339 Views

Recommend Documents

Sigma-F Protocol Access Control for Real Time System - IJRIT
Key Words- Access control protocol; Scheduling; Real Time System; Response Time. 1. Introduction. The Real Time ... database locks etc. A job may need some ...

Real Time Protocol (RTP) - EPFL
From a developer's perspective, RTP belongs to the application layer rather than the transport layer. 3. Real Time Transport Protocol (RTP). ❑ RTP. ○ uses UDP.

Optical Code Division Multiple Access System - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, ..... IEEE symposium on wireless technology and applications, September 2011, ...

Optical Code Division Multiple Access System - IJRIT
The main advantages of Optical CDMA system are soft capacity and network ..... IEEE symposium on wireless technology and applications, September 2011, ...

real time transport protocol pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. real time ...

real time streaming protocol pdf
Page 1 of 1. File: Real time streaming protocol pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. real time streaming protocol pdf. real time streaming protocol pdf. Open. Extract. Open with. Sign In. Main menu.

real time streaming protocol pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. real time streaming protocol pdf. real time streaming protocol pdf.

real time streaming protocol pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. real time streaming protocol pdf. real time streaming protocol pdf.

A Framework for Real Time Detection of ... - IJRIT
widely used social networking sites. ... profiles [7], [8] for confusing users, blacklisting URLs for security reasons [9], [10] and tools for reporting spam. [11].

Automatic Control System for Oil Pumping Unit Management ... - IJRIT
The software-defined (SD) TLS is designed for hundreds of oilwells's data ... Evidently, this module, i.e., CPU, is in charge of all data analysis and processing for all I/O ports. .... good generalization capability although its convergence is slow.

Automatic Control System for Oil Pumping Unit Management ... - IJRIT
The motivation of developing this system is that 1) due to the special nature of oil ... IS for power economy and the malfunction report to the maintenance staff via ... networks have drawn much attention for their broad practical applications [1]–

A Framework for Real Time Detection of ... - IJRIT
Twitter is one of the famous OSN sites that provide a platform for virtual communities. ... hackers who will make use of the service for sharing malicious content. ... profiles [7], [8] for confusing users, blacklisting URLs for security reasons [9],

Dynamic programming for robot control in real-time ... - CiteSeerX
is a conception, a design and a development to adapte the robot to ... market jobs. It is crucial for all company to update and ... the software, and it is true for all robots in the community .... goals. This observation allows us to know if the sys

Dynamic programming for robot control in real-time ...
real-time: towards a morphology programming ... conception, features for the dynamic programming and ... Lot of applications exist in the computer science.

Hierarchical Utilization Control for Real-Time and ...
We address a real and important DRE application, i.e., the power grid ...... performance control in software services,” IEEE Control Systems, vol. 23, no. 3, Jun.

A Survey on Routing Protocol Routing Protocol Routing ... - IJRIT
The infrastructure less and the dynamic nature .... faster convergence, it employs a unique method of maintaining information regarding the shortest distance to.

Dynamic programming for robot control in real-time ... - CiteSeerX
performance reasons such as shown in the figure 1. This approach follows .... (application domain). ... is a rate (an object is recognized with a rate a 65 per cent.

Real-time control architecture using Xenomai for intelligent service ...
Real-time control architecture using Xenomai for intelligent service robot in USN environment.pdf. Real-time control architecture using Xenomai for intelligent ...

A Survey on Routing Protocol Routing Protocol Routing ... - IJRIT
CGSR Cluster head Gateway Switch Routing protocol [9] is a multichannel operation ..... protocols of mobile ad-hoc networks”, International Journal of Computer ...

Optofluidic maskless lithography system for real-time ...
Jul 24, 2007 - systems are not dynamically programable in real time and, therefore, it is ... channel for UV-photocurable acrylate oligomer stream, and a.

Real-time Transmission of Layered MDC Video over Relay ... - IJRIT
To enable seamless and uninterrupted real time multimedia transmission to ..... End-to-end delay refers to the time taken for a packet to be transmitted across a ...

75.WIRELESS SYSTEM FOR MONITORING AND REAL TIME ...
WIRELESS SYSTEM FOR MONITORING AND REAL ... CLASSIFICATION OF FUNCTIONAL ACTIVITY.pdf. 75.WIRELESS SYSTEM FOR MONITORING AND ...

Non real time traffic system for a navigator
Aug 20, 2007 - A system for improving the operation of a GPS based navi gator. Statistical and/ ..... II Morrow Waypoint Manager for Windows Version 4 User's Guide,. Part No. ..... Accordingly, the second alternative is to monitor movements.

An intelligent real-time vision system for surface defect detection ...
challenging in real-time in a hot rolling process: (1) The ... sampling requires a data acquisition rate of 80 MB per .... Unlike traditional classifiers such as artificial ...