Towards controllable distributed real-time systems with feasible utilization control

Xiaorui Wang, Yingming Chen, Chenyang Lu, Xenofon D. Koutsoukos

Research output: Contribution to journalArticlepeer-review

7 Scopus citations

Abstract

Feedback control techniques have recently been applied to a variety of real-time systems. However, a fundamental issue that was left out is guaranteeing system controllability and the feasibility of applying feedback control to such systems. No control algorithms can effectively control a system which itself is uncontrollable or infeasible. In this paper, we use the multiprocessor utilization control problem as a representative example to study the controllability and feasibility of distributed real-time systems. We prove that controllability and feasibility of a system depend crucially on end-to-end task allocations. We then present algorithms for deploying end-to-end tasks to ensure that the system is controllable and utilization control is feasible for the system. Furthermore, we develop runtime algorithms to maintain controllability and feasibility by reallocating tasks dynamically in response to workload variations, such as task terminations and migrations caused by processor failures. We implement our algorithms in a robust real-time middleware system and report empirical results on an experimental test-bed. We also evaluate the performance of our approach in large systems using numerical experiments. Our results demonstrate that the proposed task allocation algorithms improve the robustness of feedback control in distributed real-time systems.

Original languageEnglish
Article numberA9
Pages (from-to)1095-1110
Number of pages16
JournalIEEE Transactions on Computers
Volume58
Issue number8
DOIs
StatePublished - 2009

Keywords

  • Controllability
  • Distributed systems
  • Feasibility
  • Feedback control
  • Real-time and embedded systems
  • Utilization control

Fingerprint

Dive into the research topics of 'Towards controllable distributed real-time systems with feasible utilization control'. Together they form a unique fingerprint.

Cite this