1992
DOI: 10.1007/bf00365404
|View full text |Cite
|
Sign up to set email alerts
|

An improved hard real-time scheduling for the IEEE 802.5

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

1994
1994
1999
1999

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…The bandwidth allocation schemes are often based on well-known real-time scheduling results, for example rate-monotonic scheduling [19,15,21], pin-wheel scheduling [5], and weighted round-robin [2]. The success of a particular bandwidth allocation scheme depends on whether a suitable media access control can be used to enforce the scheme.…”
Section: Related Workmentioning
confidence: 99%
“…The bandwidth allocation schemes are often based on well-known real-time scheduling results, for example rate-monotonic scheduling [19,15,21], pin-wheel scheduling [5], and weighted round-robin [2]. The success of a particular bandwidth allocation scheme depends on whether a suitable media access control can be used to enforce the scheme.…”
Section: Related Workmentioning
confidence: 99%
“…The approach is based on the notion of Schedulable Unit which is essentially the time necessary to service a message, including the time to get the token, the time to transmit the message and the time to pass the token to another station. In (Pleinevaux 1992) we showed that the time to get the token can in some error-free conditions be larger than the ring latency. In fact, we showed that a priority inversion can happen when a message gets ready for transmission.…”
Section: The Scheduling Problemmentioning
confidence: 99%
“…The Token Ring has recently been the subject of multiple studies since Strosnider showed how the Rate Monotonic Algorithm can be applied to schedule message transmissions (Strosnider, Marchok and Lehoczky 1988). It was shown (Pleinevaux 1992) that the original approximations can be improved when taking different factors into account: ring length or concurrent alarms. Modifications of the token ring protocol have been studied in (Yao 1991) while similar studies have been made for FDDI, a token ring whose operation is based on timed tokens (Agrawal et at.…”
Section: Introductionmentioning
confidence: 99%
“…The gateway node N G is only able to broadcast on the TTC in the slot S G of the TDMA rounds circulating on the TTP bus. According to the MEDL of the gateway, a set of messages not exceeding size S G of the slot S G will be removed from the front of the Out TTP queue in every round, and will be packed in the S G slot (12). Once the frame is broadcast (13) it will arrive at node N 1 (14), where all the messages in the frame will be copied in the input buffers of the destination processes (15).…”
Section: Software Architecturementioning
confidence: 99%