Implement the power-aware scheduling algorithm

Assignment Help Operating System
Reference no: EM133125280

This assignment consists of two parts: (1) read and understand the referenced paper [1], and (2) write a program to implement the power-aware scheduling algorithm for sporadic tasks in this referenced paper (Algorithm STS).

A sporadic task is denoted by T = {a, c, d}, where a is the arrival time, c is the computation time, and d is the deadline. In this assignment, it is assumed that the speed/voltage of the system/processor running these tasks can be scaled in the interval (0, 1.0].

A scheduling decisionis made whenever any of the following two events occurs: (i) Event-1: a new sporadic task arrives and is accepted into the system by the acceptance test, and (ii) Event-2: the current task completes its execution. When an Event-1 occurs, the scheduler updates the optimal voltage schedule of the processor for all the tasks including this new one in the task queue. The variable voltage scheduling algorithm is shown as Algorithm STS in [1]. When an Event-2 occurs, the completed task is removed from the task queue and we execute the task at the head of the task queue following the current voltageschedule.

What you need to do when implementing the STS algorithm [1]:

Given an input - a set of sporadic tasks arriving dynamically, schedule the tasks in an online manner to (1) meet all deadlines or discard the newly arriving task if it would cause any accepted/uncompleted task to its deadline, including the new task itself; and (2) to schedule the tasks in optimal speeds in order to minimize the energy consumption.

Output: The complete task schedule and the optimal speed schedule.

What you will be given for the input is a file input.txt. You program needs to read the input from this file. In the file, the format of the inputis:

Number of tasks: N Task 1: [a c d]

Task 2: [a c d]
....
....
Task N: [a c d]

Here is an example of the file:
Number of tasks: 3 Task 1: [0 4 10]
Task 2: [3 5 9]
Task 3: [6 5 14]

Please note that the tasks are assumed to arrive dynamically, although the input file makes it looks like static. That is, your system does not know the task until it arrives. You can always assume tha tall tasks arrive and finish their works in [0,200]. There is no floating point number in the program and result, rounding the floating point numbers to integers appropriately if necessary.

Your report should contain:

1. Listing of your source code.

2. Explicit description of how to run your program, and how to add my testing input file into your project.
Turn-in requirements... Reference:
[1] I. Hong, M. Potkonjak, and M. B. Srivastava, "On-line scheduling of hard real-time tasks on variable voltage processor," Proc. Computer-Aided Design (ICCAD), pages 653-656, November 1998.

Attachment:- Scheduling algorithm.rar

Reference no: EM133125280

Questions Cloud

Calculate the expenditure multiplier : The government of South Korea announced a $29 billion (35.3 trillion won) fiscal stimulus package The goal is to create 550,000 new jobs and boost social safety
What amount of cash would mary be willing to accept today : What amount of cash would Mary be willing to accept today as an alternative to waiting to receive the monies as referenced above
Implications for the long-term survivability of the eurozone : Current problems facing the Euro, their potential remedies, and implications for the long-term survivability of the Eurozone.
What price did linda pay for the bond : Linda was attracted to the Bond because she knew that she would receive $75.00 in interest twice per year. What price did Linda pay for the Bond
Implement the power-aware scheduling algorithm : What you need to do when implementing the STS algorithm - There is no floating point number in the program and result, rounding the floating point numbers
Example of neoclassical government intervention : Is the greek government falsifying their finance to join the european union an example of neoclassical government intervention?
Discuss how informal labor markets emerge as a response : Discuss how informal labor markets emerge as a response to market failure, harnessing social ties to avoid information, enforcement, and coordination problems.
Determine his adjusted basis for the building : The value of the land was $400,000. Juan sold the apartment building and land on November 22, 2028. Determine his adjusted basis for the building
Enactment of minimum wages laws : Do you think the enactment of minimum wages laws is beneficial to labor and economically justified?

Reviews

Write a Review

Operating System Questions & Answers

  Question about network security

Suppose that you are the network security officer of one corporation, what will be your plan to enhance your network security firewall? VPN, Content level protection or combination of them?

  Preserve the verifiable integrity of digital evidence

Explain the process used to preserve the verifiable integrity of digital evidence. How does this ensure that data is preserved unmodified? How can an analyst show that the original evidence is modified?

  Question about information security

Discover an article about information security. Give an introduction, and select various aspects of the article or Web site.

  Why use threads and explain a complication that concurrent

why use threads? and explain a complication that concurrent processing adds to an operating system.provide support for

  Develop and manage internet usage

Discuss how does management in business or education develop and manage Internet usage as it relates to research, supplemental resources and functional support? Explain your answer with examples.

  Identification of theft in social media

Identification of Theft in Social Media. What is Social Media Theft. Types of Thefts in Social Media. Prevents of Social Media Theft

  Pattern matching

Question 1 In sed, when you do pattern matching, the largest pattern is always matched first, left to right.

  Can a dll be mapped into two process virtual address spaces

Can a DLL be mapped into two process' virtual address spaces at different virtual ad- dresses? If so, what problems arise? Can they be solved? If not, what can be done to eliminate them?

  Provide the design and justification for your mechanism

Provide the design and justification for your mechanism that supports process dispatching and discuss the design advantage and disadvantage of each approach throughout the process lifecycle.

  Ddos attack on router

Recently had a DDoS attack on border router. Discuss how would you estimate where the attack came from and what would you put in place to save it from happening again?

  The master distribution center in bend

The master distribution center in Bend, Oregon, has 42 people, including nine Windows 2000 users, 22 people using Windows XP Professional, and 11 people using Windows Vista Business Edition.

  Operating system security fundamentals

1. Explain the function of an operating system. 2. Describe the operating system security environment from a database perspective.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd