A method for bounding the effect of DMA I/O interference on program execution time

被引:0
|
作者
Huang, TY
Liu, JWS
Hull, D
机构
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A DMA controller that operates in the cycle-stealing mode transfers data by ''stealing'' bus cycles from an executing program. This cycle stealing operation retards the progress of the executing program and extends its execution time. In this paper we first present a method that bounds the worst-case execution time of a program executing concurrently with a cycle-stealing DMA NO operation in the simple case where the execution time of each machine instruction is fixed. We next extend this method to deal with the case of instruction-cache architectures. We demonstrate the effectiveness of our methods by the results of simulations of several programs.
引用
收藏
页码:275 / 285
页数:11
相关论文
共 50 条
  • [1] Bounding the execution times of DMA I/O tasks on hard-real-time embedded systems
    Huang, TY
    Chou, CC
    Chen, PY
    REAL-TIME AND EMBEDDED COMPUTING SYSTEMS AND APPLICATIONS, 2003, 2968 : 499 - 512
  • [2] Bounding DMA interference on hard-real-time embedded systems
    Huang, Tai-Yi
    Chou, Chih-Chieh
    Chen, Po-Yuan
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (05) : 1229 - 1247
  • [3] PREDICTING THE WORST-CASE EXECUTION TIME OF THE CONCURRENT EXECUTION OF INSTRUCTIONS AND CYCLE-STEALING DMA I/O OPERATIONS
    HUANG, TY
    LIU, JWS
    SIGPLAN NOTICES, 1995, 30 (11): : 1 - 6
  • [4] A Software Watermarking Method Based on Program Execution Time
    Zhang Y.
    Chen K.
    Bao X.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1811 - 1819
  • [5] A Software Watermarking Method Based on Program Execution Time
    Zhang Yingjun
    Chen Kai
    Bao Xuhua
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (08) : 1811 - 1819
  • [6] A comparative evaluation of implementation methods for controlling the execution speed of a program by regulating I/O performance
    Taniguchi, Hideo
    Systems and Computers in Japan, 2006, 37 (07) : 72 - 82
  • [7] Measurement method of interregional bounding-back effects within the context of intraregional I-O analysis
    Katada, Toshitaka
    Morisugi, Hisa
    Miyagi, Toshihiko
    Ishikawa, Yoshifumi
    Doboku Gakkai Rombun-Hokokushu/Proceedings of the Japan Society of Civil Engineers, 1994, (488 pt 4-23): : 87 - 92
  • [8] Requirements-based execution time prediction of a partitioned real-time system using I/O and SLOC estimates
    Prokop, Loraine E.
    Hirsh, Robert L.
    Pagan, Carlos
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2012, 8 (04) : 309 - 320
  • [9] Understanding the Behavior of Ransomware: An I/O Request Packet (IRP) Driven Study on Ransomware Detection against Execution Time
    Ayub, Md. Ahsan
    Siraj, Ambareen
    2023 IEEE 9TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING, CIC, 2023, : 62 - 71
  • [10] An Enhanced Statistical Analysis Method for I/O Links Considering Supply Voltage Fluctuations and Intersymbol Interference
    Kim, Jingook
    Lee, Jongjoo
    Park, Eunkyeong
    Park, Youngwoo
    IEEE TRANSACTIONS ON COMPONENTS PACKAGING AND MANUFACTURING TECHNOLOGY, 2015, 5 (08): : 1129 - 1141