Stealing cycles: Can we get along?
نویسندگان
چکیده
The exploitation of networked workstations as a set of under-util ized computational resources is an attractive idea for cost effective parallel computing. The use of these resources, however, raises a number of interesting policy and performance questions (e.g, what impact will a parallel application have on the normal workstation user, what performance levels can be expected when many users are logged on?). We present performance models for parallel computations executing on shared, networked workstations that can help to address these questions.
منابع مشابه
Title of dissertation : EXPLOITING IDLE CYCLES IN NETWORS OF WORKSTATIONS
Title of dissertation: EXPLOITING IDLE CYCLES IN NETWORS OF WORKSTATIONS Kyung Dong Ryu, Doctor of Philosophy, 2001 Dissertation directed by: Associate Professor Jeffrey K. Hollingsworth Department of Computer Science Studies have shown that workstations are idle a significant fraction of the time. Traditional idle resource harvesting systems define a social contract that permits guest jobs to ...
متن کاملOn Optimal Strategies for Stealing Cycles in Clusters of Workstations
We study aspects of the parallel scheduling problem for a new modality of parallel computing: having one workstation “steal cycles” from another. We focus on a draconian mode of cycle-stealing, in which the owner of workstation B allows workstation A to take control of B’s processor whenever it is idle, with the promise of relinquishing control immediately upon demand. The costs for such cycle-...
متن کاملAnalysis of cycle stealing with switching times and thresholds
We consider two processors, each serving its own M/GI/1 queue, where one of the processors (the “donor”) can help the other processor (the “beneficiary”) with its jobs, during times when the donor processor is idle. That is the beneficiary processor “steals idle cycles” from the donor processor. There is a switching time required for the donor processor to start working on the beneficiary jobs,...
متن کاملCycle Stealing Buffers and Physical Channel Management Scheme for Wormhole Based On-chip Networks
With the improvement of chip manufacture process, a single chip may contain many processor cores and functional units. These cores and functional units communicate with each other through an on-chip interconnection network. Therefore, a key issue in the design of multi-core chip is how to construct a low latency high bandwidth on-chip interconnect. In this paper, a cycle stealing buffer and a p...
متن کاملBounding DMA Interference on Hard-Real-Time Embedded Systems
A DMA controller that operates in the cycle-stealing mode transfers data by stealing bus cycles from the CPU. The concurrent contention for the I/O bus by a CPU task and a cycle-stealing DMA I/O task retards their progress and extends their execution times. In this paper we first describe a method for bounding the worst-case execution time (WCET) of a CPU task when cycle-stealing DMA I/O is pre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995