On Optimal Strategies for Stealing Cycles?
نویسندگان
چکیده
The growing importance of networked workstations as a computing milieu has created a new modality of parallel computing, namely, the possibility of having one workstation \steal cycles" from another. In a typical episode of cycle-stealing, the owner of workstation B allows the owner of workstation A to take control of B's processor whenever it is idle, with the promise of relinquishing control immediately upon the demand of the owner of B. Typically, the costs for an episode reside in the overhead required to supply workstation B with work (data and, perhaps, the programs to process the data), coupled with the fact that work in progress when the owner of B reclaims the workstation is lost to the owner of A. The rst cost militates toward supplying B with a large amount of work at once; the second cost militates toward repeatedly supplying B with small amounts of work. It is this tension that makes the problem interesting. In this paper, we formulate two models of cycle-stealing. The rst model focusses on accomplishing as much work as possible during a single episode, when one knows the probability distribution of the return of B's owner. The second model |||||||||||||||||{ ? A portion of this paper was presented in the minitrack on Partitioning and Scheduling for Parallel and
منابع مشابه
On Optimal Strategies for Stealing Cycles in Clusters of Workstations
We study aspects of the parallel scheduling problem for a new modality of parallel computing: having one workstation “steal cycles” from another. We focus on a draconian mode of cycle-stealing, in which the owner of workstation B allows workstation A to take control of B’s processor whenever it is idle, with the promise of relinquishing control immediately upon demand. The costs for such cycle-...
متن کاملConfidence-Based Work Stealing in Parallel Constraint Programming
The most popular architecture for parallel search is work stealing: threads that have run out of work (nodes to be searched) steal from threads that still have work. Work stealing not only allows for dynamic load balancing, but also determines which parts of the search tree are searched next. Thus the place from where work is stolen has a dramatic effect on the efficiency of a parallel search a...
متن کاملApproximate Slack Stealing Algorithms for Fixed Priority Pre-emptive Systems
Recent research into the problem of jointly scheduling tasks with both hard and soft time constraints has focused on the development of optimal slack stealing algorithms. Theoretically, these optimal algorithms offer significant performance improvements over previous bandwidth preserving algorithms such as the Sporadic Server or Extended Priority Exchange algorithm. However, there are problems ...
متن کاملExecuting Dynamic Task Graphs Using Work-Stealing
Nabbit is a work-stealing library for executing dynamic task graphs with arbitrary dependencies. We prove that Nabbit achieves asymptotically optimal performance for task graphs whose nodes have constant in-degree and out-degree. We have implemented Nabbit in the multithreaded programming language Cilk++. Since the implementation of Nabbit required no modification to the Cilk++ runtime system, ...
متن کاملBounding DMA Interference on Hard-Real-Time Embedded Systems
A DMA controller that operates in the cycle-stealing mode transfers data by stealing bus cycles from the CPU. The concurrent contention for the I/O bus by a CPU task and a cycle-stealing DMA I/O task retards their progress and extends their execution times. In this paper we first describe a method for bounding the worst-case execution time (WCET) of a CPU task when cycle-stealing DMA I/O is pre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995