首页 > 最新文献

AFIPS '72 (Fall, part I)最新文献

英文 中文
Hardware/software trade-offs: reasons and directions 硬件/软件权衡:原因和方向
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480056
Richard L. Mandell
A hardware/software trade-off is the establishment of the division of responsibility for performing system functions between the software, firmware and hardware. This is part and parcel of the fundamental process of defining computer architecture. It begins the day a computer is conceived and may be carried on by an ever widening group of individuals until the last computer of a given model is retired. There are areas of the trade-off which are the sole preserve of the manufacturer and his hardware/software team. Other areas of the trade-off are the responsibility of the user, or independent equipment manufacturers.
硬件/软件权衡是在软件、固件和硬件之间建立执行系统功能的责任划分。这是定义计算机体系结构的基本过程的重要组成部分。它开始于一台计算机被构想出来的那一天,并可能由越来越多的个人继续使用,直到某一型号的最后一台计算机退役。有些方面的权衡是制造商和他的硬件/软件团队的唯一保留。其他权衡领域是用户或独立设备制造商的责任。
{"title":"Hardware/software trade-offs: reasons and directions","authors":"Richard L. Mandell","doi":"10.1145/1479992.1480056","DOIUrl":"https://doi.org/10.1145/1479992.1480056","url":null,"abstract":"A hardware/software trade-off is the establishment of the division of responsibility for performing system functions between the software, firmware and hardware. This is part and parcel of the fundamental process of defining computer architecture. It begins the day a computer is conceived and may be carried on by an ever widening group of individuals until the last computer of a given model is retired. There are areas of the trade-off which are the sole preserve of the manufacturer and his hardware/software team. Other areas of the trade-off are the responsibility of the user, or independent equipment manufacturers.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132842977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Horizontal domain partitioning of the Navy atmospheric primitive equation prediction model 海军大气原始方程预测模型的水平域划分
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480046
Edward Morenoff, P. G. Kesel, L. Clarke
Development of the Kesel-Winninghoff multi-layer baroclinic primitive equation atmospheric prediction model began at the Fleet Numerical Weather Central, Monterey, California, in late 1968. The model, herein referred to as the Primitive Equation Model (PEM), was initially written as a single processor version to be executed in one of the dual processors of one of the two FNWC CDC 6500 dual processor computer systems. This version, however, required slightly over six and one-half hours to compute a set of 72 hour predictions.
Kesel-Winninghoff多层斜压原始方程大气预报模式的发展始于1968年底加利福尼亚州蒙特雷的舰队数值天气中心。该模型,在此称为原始方程模型(PEM),最初编写为单处理器版本,在两个FNWC CDC 6500双处理器计算机系统中的一个的双处理器中执行。然而,这个版本需要超过六个半小时来计算一组72小时的预测。
{"title":"Horizontal domain partitioning of the Navy atmospheric primitive equation prediction model","authors":"Edward Morenoff, P. G. Kesel, L. Clarke","doi":"10.1145/1479992.1480046","DOIUrl":"https://doi.org/10.1145/1479992.1480046","url":null,"abstract":"Development of the Kesel-Winninghoff multi-layer baroclinic primitive equation atmospheric prediction model began at the Fleet Numerical Weather Central, Monterey, California, in late 1968. The model, herein referred to as the Primitive Equation Model (PEM), was initially written as a single processor version to be executed in one of the dual processors of one of the two FNWC CDC 6500 dual processor computer systems. This version, however, required slightly over six and one-half hours to compute a set of 72 hour predictions.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"527 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133166882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The page fault frequency replacement algorithm 页面故障频率替换算法
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480077
W. Chu, H. Opderbeck
Dynamic memory management is an important advance in memory allocation especially in virtual memory and multiprogramming systems. In this paper we consider the case of paged memory systems: that is, the physical and logical address space of these systems is partitioned into equal size blocks of contiguous addresses. The paged memory system has been used by many computer systems. However, the basic memory management problem of deciding which pages should be kept in the main memory to allow efficient operation without wasting space is still not sufficiently understood and has been of considerable interest. Obviously, pages should only be removed from the main memory if there is a very low probability that they will be used in the near future. The difficulty lies in trying to determine which pages to remove, without incurring difficult implementation problems at the same time.
动态内存管理是内存分配的重要进展,特别是在虚拟内存和多道程序设计系统中。在本文中,我们考虑分页内存系统的情况:也就是说,这些系统的物理和逻辑地址空间被划分为大小相等的连续地址块。分页存储系统已被许多计算机系统所使用。然而,决定哪些页面应该保存在主存中以允许有效操作而不浪费空间的基本内存管理问题仍然没有得到充分的理解,并且引起了相当大的兴趣。显然,只有当页面在不久的将来被使用的可能性非常低时,才应该从主存中删除它们。困难在于确定要删除哪些页面,同时又不会引起困难的实现问题。
{"title":"The page fault frequency replacement algorithm","authors":"W. Chu, H. Opderbeck","doi":"10.1145/1479992.1480077","DOIUrl":"https://doi.org/10.1145/1479992.1480077","url":null,"abstract":"Dynamic memory management is an important advance in memory allocation especially in virtual memory and multiprogramming systems. In this paper we consider the case of paged memory systems: that is, the physical and logical address space of these systems is partitioned into equal size blocks of contiguous addresses. The paged memory system has been used by many computer systems. However, the basic memory management problem of deciding which pages should be kept in the main memory to allow efficient operation without wasting space is still not sufficiently understood and has been of considerable interest. Obviously, pages should only be removed from the main memory if there is a very low probability that they will be used in the near future. The difficulty lies in trying to determine which pages to remove, without incurring difficult implementation problems at the same time.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"27 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116424787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 84
Rotating storage devices as partially associative memories 作为部分联想存储器的旋转存储装置
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480075
N. Minsky
"Associativity" is a highly desirable property of memory devices. Unfortunately, it does not seem to fit very well into the structure of contemporary randomaccess memories. A realization of associativity on such memories is always involved with high density of logic, and in today's technology is bound to be very expensive. Virtually all existing implementations of associative memories are accordingly on a very small scale and are typically used for special purposes such as the support of "virtual memory" schemes. From this situation one can get the impression that large scale associative memories are impractical. Fortunately, however, it turns out that rotating memories, unlike random access memories, are very natural hosts for at least a limited degree of associative addressing.
“结合性”是存储设备非常理想的特性。不幸的是,它似乎不能很好地适应当代随机存取存储器的结构。在这样的存储器上实现联想性总是涉及到高密度的逻辑,在今天的技术中必然是非常昂贵的。实际上,所有现有的关联内存的实现都是在非常小的范围内,并且通常用于特殊目的,例如支持“虚拟内存”方案。从这种情况下,人们可以得到这样的印象:大规模的联想记忆是不切实际的。然而,幸运的是,事实证明,与随机存取存储器不同,旋转存储器是非常自然的宿主,至少是有限程度的关联寻址。
{"title":"Rotating storage devices as partially associative memories","authors":"N. Minsky","doi":"10.1145/1479992.1480075","DOIUrl":"https://doi.org/10.1145/1479992.1480075","url":null,"abstract":"\"Associativity\" is a highly desirable property of memory devices. Unfortunately, it does not seem to fit very well into the structure of contemporary randomaccess memories. A realization of associativity on such memories is always involved with high density of logic, and in today's technology is bound to be very expensive. Virtually all existing implementations of associative memories are accordingly on a very small scale and are typically used for special purposes such as the support of \"virtual memory\" schemes. From this situation one can get the impression that large scale associative memories are impractical. Fortunately, however, it turns out that rotating memories, unlike random access memories, are very natural hosts for at least a limited degree of associative addressing.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131542534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A framework for hardware-software tradeoffs in the design of fault-tolerant computers 容错计算机设计中软硬件折衷的框架
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480000
K. Chandy, C. Ramamoorthy, A. Cowan
The theory of fault-tolerant computer design has developed rapidly. Several techniques using hardware or software have been suggested. A student is often faced with the problem of developing a common perspective for a variety of methods. In this paper we attempt to develop a simple framework within which different methods can be compared. We use a set of very elementary indices to construct the framework. The indices are quite crude and our framework is somewhat ad hoc. Though a unified theory would be extremely useful we have not attempted to develop one here. Our discussion is a first pass at identifying some goals of reliable design and an attempt at quantifying some parameters. We discuss only a very small set of the techniques that have been proposed for fault-tolerant computers. Methods for constructing relevant indices for these techniques are presented. We feel that these indices are relevant for most reliability techniques.
计算机容错设计理论得到了迅速发展。提出了几种使用硬件或软件的技术。学生经常面临的问题是如何为各种方法建立一个共同的视角。在本文中,我们试图建立一个简单的框架,在其中不同的方法可以进行比较。我们使用一组非常基本的指标来构建框架。索引相当粗糙,我们的框架有些特别。虽然统一理论会非常有用,但我们并没有试图在这里建立一个统一理论。我们的讨论是确定可靠设计的一些目标和尝试量化一些参数的第一步。我们只讨论已经提出的用于容错计算机的一小部分技术。提出了构建这些技术相关指标的方法。我们认为这些指标与大多数可靠性技术相关。
{"title":"A framework for hardware-software tradeoffs in the design of fault-tolerant computers","authors":"K. Chandy, C. Ramamoorthy, A. Cowan","doi":"10.1145/1479992.1480000","DOIUrl":"https://doi.org/10.1145/1479992.1480000","url":null,"abstract":"The theory of fault-tolerant computer design has developed rapidly. Several techniques using hardware or software have been suggested. A student is often faced with the problem of developing a common perspective for a variety of methods. In this paper we attempt to develop a simple framework within which different methods can be compared. We use a set of very elementary indices to construct the framework. The indices are quite crude and our framework is somewhat ad hoc. Though a unified theory would be extremely useful we have not attempted to develop one here. Our discussion is a first pass at identifying some goals of reliable design and an attempt at quantifying some parameters. We discuss only a very small set of the techniques that have been proposed for fault-tolerant computers. Methods for constructing relevant indices for these techniques are presented. We feel that these indices are relevant for most reliability techniques.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128657878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Computer simulations of the metropolis 计算机模拟大都市
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480048
B. Harris
The history of modern computer simulation of urban affairs represents the confluence of a number of trends which came to maturity in the middle of this century. Probably the oldest of these tendencies is the emphasis on planned urban development which has existed for millennia and which in the last century has demonstrated considerable vitality as a reaction to the excesses of the industrial revolution and the poverty and squalor of nineteenth-century cities. A second strand is the development of economic and sociological theory which goes a considerable distance in explaining some aspects of the organization and form of metropolitan settlement and its growth. These theories have a long history, but have matured principally during the 1920's and 1930's. Finally, as a methodological catalyst, the development of the automobile, of a Federal Bureau of Public Roads dedicated to providing facilities for it, and of the large-scale metropolitan study based on the origin-and-destination survey have together made possible the crystallization and further growth of simulation methods. These methods are thus proximately based on the engineering attitude and computer technology of the large-scale transportation study, but they are in a position to draw on a number of other important streams of intellectual development.
现代计算机模拟城市事务的历史代表了本世纪中叶走向成熟的许多趋势的汇合。这些趋势中最古老的可能是强调有计划的城市发展,这种趋势已经存在了几千年,在上个世纪,作为对工业革命的过度发展和19世纪城市的贫穷和肮脏的反应,它显示出相当大的活力。第二条线索是经济和社会学理论的发展,这些理论在解释大都市聚落的组织和形式及其增长的某些方面取得了相当大的进展。这些理论有着悠久的历史,但主要是在20世纪20年代和30年代成熟起来的。最后,作为方法论上的催化剂,汽车的发展,致力于为汽车提供设施的联邦公路局,以及基于起点和终点调查的大规模都市研究,共同使模拟方法的结晶和进一步发展成为可能。因此,这些方法近似地基于大规模交通研究的工程态度和计算机技术,但它们也可以借鉴许多其他重要的智力发展趋势。
{"title":"Computer simulations of the metropolis","authors":"B. Harris","doi":"10.1145/1479992.1480048","DOIUrl":"https://doi.org/10.1145/1479992.1480048","url":null,"abstract":"The history of modern computer simulation of urban affairs represents the confluence of a number of trends which came to maturity in the middle of this century. Probably the oldest of these tendencies is the emphasis on planned urban development which has existed for millennia and which in the last century has demonstrated considerable vitality as a reaction to the excesses of the industrial revolution and the poverty and squalor of nineteenth-century cities. A second strand is the development of economic and sociological theory which goes a considerable distance in explaining some aspects of the organization and form of metropolitan settlement and its growth. These theories have a long history, but have matured principally during the 1920's and 1930's. Finally, as a methodological catalyst, the development of the automobile, of a Federal Bureau of Public Roads dedicated to providing facilities for it, and of the large-scale metropolitan study based on the origin-and-destination survey have together made possible the crystallization and further growth of simulation methods. These methods are thus proximately based on the engineering attitude and computer technology of the large-scale transportation study, but they are in a position to draw on a number of other important streams of intellectual development.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134433067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Minimum cost-reliable computer communication networks 最低成本-可靠的计算机通信网络
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480069
J. DeMercado
A designer of a computer-communications network must consider the reliability of a given network design as a function of its realization costs. Although there is an abundance of graph theoretic and queuing tools that have generated algorithms for the topological synthesis and analysis of large networks, it is unfortunate that the reliability and cost dimensions of the problem have not been satisfactorily related.
计算机通信网络的设计者必须考虑给定网络设计的可靠性作为其实现成本的函数。尽管有大量的图论和排队工具已经为大型网络的拓扑综合和分析生成了算法,但不幸的是,问题的可靠性和成本维度并没有令人满意地联系在一起。
{"title":"Minimum cost-reliable computer communication networks","authors":"J. DeMercado","doi":"10.1145/1479992.1480069","DOIUrl":"https://doi.org/10.1145/1479992.1480069","url":null,"abstract":"A designer of a computer-communications network must consider the reliability of a given network design as a function of its realization costs. Although there is an abundance of graph theoretic and queuing tools that have generated algorithms for the topological synthesis and analysis of large networks, it is unfortunate that the reliability and cost dimensions of the problem have not been satisfactorily related.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133801763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The application of program-proving techniques to the verification of synchronization processes 程序验证技术在同步过程验证中的应用
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1479997
K. Levitt
The purpose of this paper is to establish the applicability of program-proving techniques to the verification of operating systems, control programs and synchronization programs. All the illustrative examples to be presented use Dijkstra's P and V operations for controlling the synchronization of competing processes. However, the techniques discussed are applicable to any set of such control primitives. A major portion of the paper is devoted to the proof of correctness of two programs devised by Courtois et al. that control the sequencing of "readers" and "writers" requesting the use of a common device.
本文的目的是建立程序验证技术在操作系统、控制程序和同步程序验证中的适用性。所有的说明性示例都使用Dijkstra的P和V操作来控制竞争进程的同步。然而,所讨论的技术适用于任何一组这样的控制原语。论文的主要部分致力于证明Courtois等人设计的两个程序的正确性,这两个程序控制了请求使用共同设备的“读者”和“作者”的排序。
{"title":"The application of program-proving techniques to the verification of synchronization processes","authors":"K. Levitt","doi":"10.1145/1479992.1479997","DOIUrl":"https://doi.org/10.1145/1479992.1479997","url":null,"abstract":"The purpose of this paper is to establish the applicability of program-proving techniques to the verification of operating systems, control programs and synchronization programs. All the illustrative examples to be presented use Dijkstra's P and V operations for controlling the synchronization of competing processes. However, the techniques discussed are applicable to any set of such control primitives. A major portion of the paper is devoted to the proof of correctness of two programs devised by Courtois et al. that control the sequencing of \"readers\" and \"writers\" requesting the use of a common device.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133522695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Security of information processing: implications from social research 信息处理的安全性:来自社会研究的启示
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1480051
R. Boruch
Many social research programs are characterized by a stringent requirement that identifiable data collected on the subjects of research be kept confidential. This requirement, coupled with the increasing number of sensitive, sometimes controversial research efforts, has stimulated social scientists' interest in legal, administrative, and technical methods for assuring that confidentiality is maintained. We concern ourselves primarily with the technical methods in this paper, treating "security" as a partial operationalization of the notion of confidentiality.
许多社会研究项目的特点是严格要求对研究对象收集的可识别数据保密。这一要求,再加上越来越多的敏感的、有时是有争议的研究工作,激发了社会科学家对确保保密的法律、行政和技术方法的兴趣。我们主要关注本文中的技术方法,将“安全”视为机密性概念的部分操作化。
{"title":"Security of information processing: implications from social research","authors":"R. Boruch","doi":"10.1145/1479992.1480051","DOIUrl":"https://doi.org/10.1145/1479992.1480051","url":null,"abstract":"Many social research programs are characterized by a stringent requirement that identifiable data collected on the subjects of research be kept confidential. This requirement, coupled with the increasing number of sensitive, sometimes controversial research efforts, has stimulated social scientists' interest in legal, administrative, and technical methods for assuring that confidentiality is maintained. We concern ourselves primarily with the technical methods in this paper, treating \"security\" as a partial operationalization of the notion of confidentiality.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121800165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The interaction of multi-programming job scheduling and CPU scheduling 多程序作业调度与CPU调度的相互作用
Pub Date : 1972-12-05 DOI: 10.1145/1479992.1479995
J. Browne, J. Lan, F. Baskett
There have been very few systematic studies of the effect on system performance of strategies for scheduling jobs for execution in a multi-programming system. Most of this work has been concerned with empirical efforts to obtain job mixes which effectively utilize the central processor. These efforts are frequently carried out in commercial or production oriented installations where the job load consists of a relatively few jobs whose internal characteristics can be well determined. This approach is not feasible in an environment where internal job characteristics are not known before run time, or where internal job characteristics may vary rapidly. Such circumstances are often the case in an industrial or research laboratory or in a university computer center. This study uses as its measures for determining job scheduling strategies such quantities as are frequently known or can be accurately estimated such as amount of core memory required, processor service time required, etc. The specific job scheduling strategies used include first-come-first-serve (FCFS), shortest processor service time first (STF), smallest cost (cost = core size X processor service time) first (SCF), and smallest memory requirement first (SMF). We evaluated both preemptive resume and non-preemptive job scheduling. It is typical of virtually all of the previous work that the emphasis has been on improving CPU utilization. There may often be other goals which are more useful measures of performance such as throughput (job completion rate per unit time), the expected wait time before completion of a given class of job, the utilization of I/O resources, etc. We collected several measures of system performance including all of those listed previously to assess the effects of job scheduling. There has been very little previous study of the interaction between job scheduling and CPU scheduling. We systematically vary CPU scheduling algorithms in conjunction with alteration of job scheduling strategies. Those job scheduling strategies which give high throughput are characteristically observed to be more sensitive to CPU scheduling methods than those which yield relatively low throughput. We do not, however, attempt to correlate job scheduling methods with internal job characteristics such as CPU burst time, etc. We did, however, consider the effect of skewed CPU burst time distribution on performance under different pairs of strategies.
在多程序设计系统中,很少有关于作业调度策略对系统性能影响的系统研究。这些工作的大部分都是关于获得有效利用中央处理器的作业混合的经验努力。这些工作通常在商业或面向生产的装置中进行,其中作业负荷由相对较少的作业组成,其内部特征可以很好地确定。在运行前不知道内部作业特征,或者内部作业特征可能变化很快的环境中,这种方法是不可行的。这种情况经常发生在工业或研究实验室或大学计算机中心。本研究使用通常已知或可以准确估计的数量作为确定作业调度策略的度量,例如所需的核心内存量、所需的处理器服务时间等。使用的特定作业调度策略包括先到先服务(FCFS)、最短处理器服务时间优先(STF)、最小成本优先(成本=核心大小X处理器服务时间)和最小内存需求优先(SMF)。我们评估了抢占式恢复和非抢占式作业调度。几乎所有以前的工作都强调提高CPU利用率。通常可能还有其他更有用的性能度量目标,例如吞吐量(单位时间内的作业完成率)、完成给定作业类别之前的预期等待时间、I/O资源的利用率等。我们收集了几个系统性能度量,包括前面列出的所有度量,以评估作业调度的影响。对于作业调度和CPU调度之间的相互作用,以前的研究很少。结合作业调度策略的变化,系统地改变了CPU调度算法。高吞吐量作业调度策略比低吞吐量作业调度策略对CPU调度方法更敏感。然而,我们并不试图将作业调度方法与内部作业特征(如CPU突发时间等)关联起来。然而,我们确实考虑了在不同策略对下CPU突发时间分布的倾斜对性能的影响。
{"title":"The interaction of multi-programming job scheduling and CPU scheduling","authors":"J. Browne, J. Lan, F. Baskett","doi":"10.1145/1479992.1479995","DOIUrl":"https://doi.org/10.1145/1479992.1479995","url":null,"abstract":"There have been very few systematic studies of the effect on system performance of strategies for scheduling jobs for execution in a multi-programming system. Most of this work has been concerned with empirical efforts to obtain job mixes which effectively utilize the central processor. These efforts are frequently carried out in commercial or production oriented installations where the job load consists of a relatively few jobs whose internal characteristics can be well determined. This approach is not feasible in an environment where internal job characteristics are not known before run time, or where internal job characteristics may vary rapidly. Such circumstances are often the case in an industrial or research laboratory or in a university computer center. This study uses as its measures for determining job scheduling strategies such quantities as are frequently known or can be accurately estimated such as amount of core memory required, processor service time required, etc. The specific job scheduling strategies used include first-come-first-serve (FCFS), shortest processor service time first (STF), smallest cost (cost = core size X processor service time) first (SCF), and smallest memory requirement first (SMF). We evaluated both preemptive resume and non-preemptive job scheduling. It is typical of virtually all of the previous work that the emphasis has been on improving CPU utilization. There may often be other goals which are more useful measures of performance such as throughput (job completion rate per unit time), the expected wait time before completion of a given class of job, the utilization of I/O resources, etc. We collected several measures of system performance including all of those listed previously to assess the effects of job scheduling. There has been very little previous study of the interaction between job scheduling and CPU scheduling. We systematically vary CPU scheduling algorithms in conjunction with alteration of job scheduling strategies. Those job scheduling strategies which give high throughput are characteristically observed to be more sensitive to CPU scheduling methods than those which yield relatively low throughput. We do not, however, attempt to correlate job scheduling methods with internal job characteristics such as CPU burst time, etc. We did, however, consider the effect of skewed CPU burst time distribution on performance under different pairs of strategies.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"23 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127567152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
AFIPS '72 (Fall, part I)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1