Spin Leading OS Research Astray?

Size: px
Start display at page:

Download "Spin Leading OS Research Astray?"

Transcription

1 Advanced Tpics in Cmputer Systems, CS262B Prf Eric A. Brewer Spin Leading OS Research Astray? January 27, 2004 I. Extensibility, Safety and Perfrmance in the SPIN Operating System Gal: extensible OS that has bth safety and gd crss-dmain perfrmance Why build an extensible OS? Perfrmance: a general-purpse OS handles all apps equally prly. E.g, multimedia apps, passing buffers between netwrk and disk, new netwrk prtcls,... 3rd-party develpment: untrusted third-parties can write extensins withut need kernel surce cde, and withut cmprmising the safety/security f the kernel. In turn, this shuld speed up innvatin. risk management: faster and safer t develp extensins, rather than kernel mds. change is the nrm! better t make a changeable system rather than a mnlithic ne Nte that these gals apply t plug-ins, applets, and Active X as well. In all cases, we enable innvatin and third-party develpment that ideally shuld be safe relative t the base system. Databases have similar extensin mechanisms (ften called blades ). Hw t extend: insert trusted cde int the kernel dynamically -- key claim: this is necessary fr perfrmance reasns (wins by aviding kernel crssings) Use a type-safe language (Mdula 3) t enfrce namespaces securely. I.e., extensin run in the kernel address space, but can t muck with anything that they can t explicitly name. They call this enfrced mdularity. Type-safe => n dangling references => must have autmatic strage management (garbage cllectin) Als need dynamic linking, since we dn t want t rebt fr every new extensin Spin has basic mdules fr VM and scheduling, and uses events t interact with extensins Alternative framewrks have different answers: applets are safe and use dynamic linking, Active X is dynamic but nt safe (but is authenticated); plug-ins are neither safe nr dynamic, same with database blades. 1

2 Signed mdules: Mdula-3 des nt have a byte-cde verifier => mdules must be signed by the cmpiler Hw des the cmpiler have a secret key? this is unclear, but it can t just be in the executable, since an attacker culd steal it. slutin 1: cmpile everything lcally, s that the key is nly valid fr the lcal machine (and hence damage due t a stlen key is limited t the lcal machine as well). Stealing the key shuld be just as hard as getting rt access, and thus intrduces little additinal weakness. Java kind f des this by verifying everything lcally; the cmpiler utput is nt actually trusted. slutin 2: have a cmpiler service that is shared. Stealing its key wuld allw a bad mdule t exist in many places, but the centralizatin makes it pssible t secure the key well. (this is like verisign fr certificates) The bad case ccurs when yu lad mdules signed by cmpilers frm ther machines; can yu trust that machine has nt been cmprmised? Bundaries: althugh nt in this paper, Spin makes a gd venue t talk abut bundaries. By bundary, I mean tw sides f an API that have different trust levels. Extensin bundaries and kernel crssing are examples f bundaries, as are plug-ins and applets. In each case, there is the base side that is trusted, and the extensin side that is nt (at least nt as much). In this sectin, I utline all f the issues that yu have t think abut whenever yu have a bundary; there is a huge number f them and they are rarely explicit r even discussed. Spin cvers mst f them well, but never views the issues all tgether as the set f bundary prblems. Shared prtectin dmain: are the tw sides in the same prtectin dmain? If nt, there is less trust needed. Spin uses a shared address space but depends n Mdula-3 t limit access. Nemesis is an unusual case in that it has ne address space, but separate dmains. Plug-ins are same address space and are trusted but nt always trustwrthy. Shared strage: even when using separate dmains, there may be shared memry regins r shared strage. These regins can clearly be damaged by an extensin. The usual answer t this is t have the base system check the shared regins befre use. A simple example is argument checking fr kernel calls. Similarly, shared files can be checked fr validity befre being used by the base system. Are there pass by reference arguments acrss the bundary? If s, there is clearly shared strage. It is literally shared (extensin updates are immediately visible in the base), r it is really pass-by-cpy-result (pass by value, then cpy the result back). LRPC is cnfused abut this issue. There are tw directins t wrry abut: 1) the extensin passes in a reference -- can it then change the value while the base is using it? 2) the base passes a reference t the extensin -- des the extensin have read/write r readnly access t the base value? There is anther mre subtle issue in the Spin case: if we pass a pinter ut t an extensin, it might pass it back in with a different type, thus defeating the type safety. Spin avids this by externalizing the reference, which basically means make a table f pinters and pass ut the index rather than the pinter. The extensin can pass back in the reference (integer), but the table securely stres the real type. What is the lifetime f a reference passed acrss the bundary? This is a tricky ne 2

3 that is almst always left ut. The default answer is that a reference is gd frever and the base cannt mve, r really even use, the shared bject. (The base culd lck the bject, but these is really n reasn t think the extensin will fllw the lcking discipline.) The tw simplest slutins are t either avid pass by reference (nly pass values), r t have references expire (leases). With expiratin, there needs t be a way t detect the use f expired references, which implies a level f indirectin -- yu can t use pinters directly, nr can yu pass in the timestamp, unless it was signed by the base. In thery, ne culd garbage cllect references acrss a bundary, but requires nt nly a shared GC system, but that the extensin can t pass references utside the GC bundary (such as string them in a file r giving them t a nn-gc system). Faults brake the GC mdel as well: if an extensin becmes discnnected when d yu GC references it had? T summarize, unless yu re within ne prtectin dmain, GC prbably desn t make sense, leases wrk OK, and pass by value is the simplest. The prblem with leases is that it is hard t build systems that wrk rbustly when leases expire during crrect use. Partial failure: can the ther side fail withut this side failing? If s all crssings have nn-transparent exceptinal cnditins, and all crssing prbably need a timeut. If an extensin fails, can yu just restart it? Hw des the base clean-up the state f the lst upcalls? LRPC cvers these cases pretty well, RMI less s. Are there shared threads? I.e. des a thread crss the bundary r is there sme kind f handff? RMI and LRPC clearly have a handff and thus use separate threads. Extensins share threads; Spin kernel crssings d nt share threads. Can an extensin swallw a thread and never return it? This is usually the fear that drives fr separate threads an each side. Evlutin: can the tw sides evlve independently? Fr lng-lived systems this is a prerequisite that is nrmally ignred. It is usually easy t evlve the extensin, but hw d yu evlve the base withut breaking all f the extensins? Mac OS has prbably dne the best at this. One answer is t never evlve a particular interface -- make interfaces immutable and add new interfaces t evlve the system. The ld nes are left just t supprt legacy extensins. Wh decides that a new versin f the base is backward cmpatible (and what if they re wrng)? Fr big upgrades, it is cmmn t frce evlutin f all f the extensins (e.g. fr Windws 2000, mst drivers must be updated, at least thse frm Windws 95/98). Micrsft COM has unique IDs fr every interface s that an evlved interface is clearly marked as different; cnversely, if yu get the same ID, then yu knw yu have the same interface (but nt necessarily the same implementatin!) Admissin cntrl: is there a limit n crssings, r n cncurrent crssings? RMI has this prblem in spades -- every new call typically spawns a new thread and runs cncurrently, eating up resurces until the system falls dwn. Is the admissin cntrl general r per-client? In general, the way t slve this is with explicit queues fr incming crssings; excess crssings can be drpped r failed immediately. A cunt f utstanding calls may als wrk, as lng as it desn t leak (which seems t be surprisingly hard in practice). Fr synchrnus interface, the number f threads limits the number f crssings, but fr async the limit must be enfrced sme ther way. Resurce allcatin: hw d extensins get resurces and hw are their resurce limits defined? This cmes up in netwrk/disk buffers, physical memry (ACPM has a nice slutin), and sckets amng thers. In general, it is hard fr a server t crrectly accunt fr the resurce usage f its clients (n a per-client basis). Hard cases including 3

4 shared verhead in the VM r interrupt system fr example. Can yu uninstall an extensin? Ideally, installing an extensin wuld be transactinal, and if yu abrted it, everything wuld return t nrmal. I dn t really knw f any systems that achieve this, but DLLs clearly d nt. What if applicatins are using the extensin? Typically wuld yu stp new apps frm using it, and then wait fr the current nes t stp. Files systems have t d this fr deleted files. upcall summary: use pass-by-value, r externalized references. It is useful t have timeuts fr calls, and expiratins fr references passed ut. Externalized references are really paque tkens that have n use t the extensin except as smething t pass back later. dwncall summary: decide if it is sync r async; check args n the way dwn; dn t accept true pass by reference (but pass by value-result is OK, since there is n shared regin). It is useful t enable app-specific clsures t be passed in. These are tkens that are paque t the base, but allw the applicatin t have cntext when a result is returned, and thus simplifies reply matching fr the asynchrnus case. In Spin, there are tw kinds f bundaries: extensin bundaries and the user-level bundary. The latter is a fairly typical kernel crssing with arg checking. Externalized references fr the user-level bundary, while type-safety is fr the extensin bundary. Nte that references are OK acrss the extensin bundary because there is a shared GC system (as well as shared memry and address space). Extensins shares threads, but threads never crss the user-level bundary -- during a blcking call there are tw threads invlved, ne fr user level (which blcks) and ne fr the kernel. Unix Interface: Mstly written in C n tp f C-Threads implementatin f the Strand interface Small Mdula-3 cre underneath the Unix C cde Similar t Exkernel LibOS cncept Capabilities: just type-safe pinters! enfrced mstly at cmpile time (e.g. except fr array bunds checks) externalize these pinters if yu need t give them t untrusted cde, just file descriptrs in Unix (an array f pinters and yu pass ut the index). Dmains: Just f set f (name, bject) bindings used fr dynamic linking Reslve lks up unreslved symbls in target against exprted symbls in surce Use tw reslves t crss-link dmains Linked dmains are in the same address space: the new links are new capabilities Can further restrict these links with run-time checks Event dispatch: the default case is ne handler fr each surce f events 4

5 But may have many handlers fr an event -- need t rder them and cmbine them Generates cmbinatin cde dynamically as handlers are added Each handler may have a guard, s that it nly applies in sme situatins -- this is the way t demultiplex events (e.g. netwrk prtcl dispatch) Als need t figure ut return value fr an event, which is nt clear since it may cause many callees t execute. Default plicy is the return value f the last handler executed, but the rder is undefined (!). II. Extensible Kernels are Leading OS Research Astray Claims made by extensible OS researchers: safely achieve high perfrmance fr wide range f apps rapidly deply OS innvatins cntain/manage increasing OS cmplexity Cunterclaim: nly the first ne has been addressed, and cmplexity is in fact much wrse Basic prblems: dn t need general-purpse extensibility -- best ideas can just be added t a regular OS withut the need fr new mechanisms fr safety easily mdified bundaries are nt a gd idea lng term: hinders cmpatibility, interperability, and the ability t evlve... (must yu supprt everything that was extended in the past?) safe extensins intrduce new cmplex prblems that are hard t slve (witness XN disk blck scheme, trusted cmpilers, etc.) Alternatives are OK: simple little language extensins (packet filters) existing techniques: ACPM, scheduler activatins, U-Net are all safe and much simpler Example: web server TCP implementatin: just fix it directly (dne nw) TCP prtcl ptimizatin: better interface is sufficient frking/switching: better threads (Capricci) filesystem: several slutins, including specialized file systems fr web caches VM/cache cntrl: better interface is sufficient cpying verhead: U-net r IO-Lite duble buffering: ACPM TCP checksum calculatin: netwrk layer can cache checksums itself (mre reliable) 5

CS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel

CS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel CS510 Cncurrent Systems Class 2 A Lck-Free Multiprcessr OS Kernel The Synthesis kernel A research prject at Clumbia University Synthesis V.0 ( 68020 Uniprcessr (Mtrla N virtual memry 1991 - Synthesis V.1

More information

Experience With Processes and Monitors in Mesa

Experience With Processes and Monitors in Mesa Advanced Tpics in Cmputer Systems, CS262A Prf. Eric Brewer Experience With Prcesses and Mnitrs in Mesa I. Experience With Prcesses and Mnitrs in Mesa Fcus f this paper: light-weight prcesses (threads in

More information

- Replacement of a single statement with a sequence of statements(promotes regularity)

- Replacement of a single statement with a sequence of statements(promotes regularity) ALGOL - Java and C built using ALGOL 60 - Simple and cncise and elegance - Universal - Clse as pssible t mathematical ntatin - Language can describe the algrithms - Mechanically translatable t machine

More information

Operating systems. Module 15 kernel I/O subsystem. Tami Sorgente 1

Operating systems. Module 15 kernel I/O subsystem. Tami Sorgente 1 Operating systems Mdule 15 kernel I/O subsystem Tami Srgente 1 SWAP SPACE MANAGEMENT Swap space can be defined as a temprary strage lcatin that is used when system s memry requirements exceed the size

More information

Operating systems. Module 7 IPC (Interprocess communication) PART I. Tami Sorgente 1

Operating systems. Module 7 IPC (Interprocess communication) PART I. Tami Sorgente 1 Operating systems Mdule 7 IPC (Interprcess cmmunicatin) PART I Tami Srgente 1 INTERPROCESS COMMUNICATION Prcesses within a system may be independent r cperating Cperating prcess can affect r be affected

More information

Distributed Data Structures xfs: Serverless Network File System

Distributed Data Structures xfs: Serverless Network File System Advanced Tpics in Cmputer Systems, CS262B Prf Eric A. Brewer Distributed Data Structures xfs: Serverless Netwrk File System February 3, 2004 I. DDS Gal: new persistent strage layer that is a better fit

More information

CS510 Concurrent Systems Class 1a. Linux Kernel Locking Techniques

CS510 Concurrent Systems Class 1a. Linux Kernel Locking Techniques CS510 Cncurrent Systems Class 1a Linux Kernel Lcking Techniques Intr t kernel lcking techniques (Linux) Why d we need lcking in the kernel? Which prblems are we trying t slve? What implementatin chices

More information

OpenSceneGraph Tutorial

OpenSceneGraph Tutorial OpenSceneGraph Tutrial Michael Kriegel & Meiyii Lim, Herit-Watt University, Edinburgh February 2009 Abut Open Scene Graph: Open Scene Graph is a mdern pen surce scene Graph. Open Scene Graph (r shrt OSG)

More information

INSTALLING CCRQINVOICE

INSTALLING CCRQINVOICE INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a

More information

Max 8/16 and T1/E1 Gateway, Version FAQs

Max 8/16 and T1/E1 Gateway, Version FAQs Frequently Asked Questins Max 8/16 and T1/E1 Gateway, Versin 1.5.10 FAQs The FAQs have been categrized int the fllwing tpics: Calling Calling Cmpatibility Cnfiguratin Faxing Functinality Glssary Q. When

More information

1 Version Spaces. CS 478 Homework 1 SOLUTION

1 Version Spaces. CS 478 Homework 1 SOLUTION CS 478 Hmewrk SOLUTION This is a pssible slutin t the hmewrk, althugh there may be ther crrect respnses t sme f the questins. The questins are repeated in this fnt, while answers are in a mnspaced fnt.

More information

These tasks can now be performed by a special program called FTP clients.

These tasks can now be performed by a special program called FTP clients. FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad

More information

CS4500/5500 Operating Systems Synchronization

CS4500/5500 Operating Systems Synchronization Operating Systems Synchrnizatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready

More information

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as:

$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as: Lcatin f the map.x.prperties files $ARCSIGHT_HOME/current/user/agent/map File naming cnventin The files are named in sequential rder such as: Sme examples: 1. map.1.prperties 2. map.2.prperties 3. map.3.prperties

More information

SW-G using new DryadLINQ(Argentia)

SW-G using new DryadLINQ(Argentia) SW-G using new DryadLINQ(Argentia) DRYADLINQ: Dryad is a high-perfrmance, general-purpse distributed cmputing engine that is designed t manage executin f large-scale applicatins n varius cluster technlgies,

More information

Transmission Control Protocol Introduction

Transmission Control Protocol Introduction Transmissin Cntrl Prtcl Intrductin TCP is ne f the mst imprtant prtcls f Internet Prtcls suite. It is mst widely used prtcl fr data transmissin in cmmunicatin netwrk such as Internet. Features TCP is reliable

More information

CS4500/5500 Operating Systems Computer and Operating Systems Overview

CS4500/5500 Operating Systems Computer and Operating Systems Overview Operating Systems Cmputer and Operating Systems Overview Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS4E, OS@Austin, Clumbia, UWisc Overview Recap

More information

Infrastructure Series

Infrastructure Series Infrastructure Series TechDc WebSphere Message Brker / IBM Integratin Bus Parallel Prcessing (Aggregatin) (Message Flw Develpment) February 2015 Authr(s): - IBM Message Brker - Develpment Parallel Prcessing

More information

Log shipping is a HA option. Log shipping ensures that log backups from Primary are

Log shipping is a HA option. Log shipping ensures that log backups from Primary are LOG SHIPPING Lg shipping is a HA ptin. Lg shipping ensures that lg backups frm Primary are cntinuusly applied n standby. Lg shipping fllws a warm standby methd because manual prcess is invlved t ensure

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? CCNA 4 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

Please contact technical support if you have questions about the directory that your organization uses for user management.

Please contact technical support if you have questions about the directory that your organization uses for user management. Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP

More information

Common Language Runtime

Common Language Runtime Intrductin t.net framewrk.net is a general-purpse sftware develpment platfrm, similar t Java. Micrsft intrduced.net with purpse f bridging gap between different applicatins..net framewrk aims at cmbining

More information

CSE 3320 Operating Systems Synchronization Jia Rao

CSE 3320 Operating Systems Synchronization Jia Rao CSE 3320 Operating Systems Synchrnizatin Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready queue

More information

Software Engineering

Software Engineering Sftware Engineering Chapter #1 Intrductin Sftware systems are abstract and intangible. Sftware engineering is an engineering discipline that is cncerned with all aspects f sftware prductin. Sftware Prducts

More information

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash

UiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the

More information

1 Binary Trees and Adaptive Data Compression

1 Binary Trees and Adaptive Data Compression University f Illinis at Chicag CS 202: Data Structures and Discrete Mathematics II Handut 5 Prfessr Rbert H. Slan September 18, 2002 A Little Bttle... with the wrds DRINK ME, (r Adaptive data cmpressin

More information

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 1 - Calculatr Intrductin In this lab yu will be writing yur first

More information

Getting it there in one piece

Getting it there in one piece Getting it there in ne piece Service mdel and implementatin Principles f reliable data transfer CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Reliable transfer 9-2 Terminlgy Finite

More information

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager Trubleshting Citrix- Published Resurces Cnfiguratin in VMware Identity Manager VMware Identity Manager A U G U S T 2 0 1 7 V1 Table f Cntents Overview... 1 Supprted Versins f Cmpnents... 1 Prerequisites...

More information

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)

RISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins) Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective

More information

Upgrading Kaltura MediaSpace TM Enterprise 1.0 to Kaltura MediaSpace TM Enterprise 2.0

Upgrading Kaltura MediaSpace TM Enterprise 1.0 to Kaltura MediaSpace TM Enterprise 2.0 Upgrading Kaltura MediaSpace TM Enterprise 1.0 t Kaltura MediaSpace TM Enterprise 2.0 Assumptins: The existing cde was checked ut f: svn+ssh://mediaspace@kelev.kaltura.cm/usr/lcal/kalsurce/prjects/m ediaspace/scial/branches/production/website/.

More information

Custodial Integrator. Release Notes. Version 3.11 (TLM)

Custodial Integrator. Release Notes. Version 3.11 (TLM) Custdial Integratr Release Ntes Versin 3.11 (TLM) 2018 Mrningstar. All Rights Reserved. Custdial Integratr Prduct Versin: V3.11.001 Dcument Versin: 020 Dcument Issue Date: December 14, 2018 Technical Supprt:

More information

CLIC ADMIN USER S GUIDE

CLIC ADMIN USER S GUIDE With CLiC (Classrm In Cntext), teaching and classrm instructin becmes interactive, persnalized, and fcused. This digital-based curriculum, designed by Gale, is flexible allwing teachers t make their classrm

More information

CCNA Security v2.0 Chapter 3 Exam Answers

CCNA Security v2.0 Chapter 3 Exam Answers CCNA Security v2.0 Chapter 3 Exam Answers 1. Because f implemented security cntrls, a user can nly access a server with FTP. Which AAA cmpnent accmplishes this? accunting accessibility auditing authrizatin

More information

In-Class Exercise. Hashing Used in: Hashing Algorithm

In-Class Exercise. Hashing Used in: Hashing Algorithm In-Class Exercise Hashing Used in: Encryptin fr authenticatin Hash a digital signature, get the value assciated with the digital signature,and bth are sent separately t receiver. The receiver then uses

More information

Project 4: System Calls 1

Project 4: System Calls 1 CMPT 300 1. Preparatin Prject 4: System Calls 1 T cmplete this assignment, it is vital that yu have carefully cmpleted and understd the cntent in the fllwing guides which are psted n the curse website:

More information

Operational Security. Speaking Frankly The Internet is not a very safe place. A sense of false security... Firewalls*

Operational Security. Speaking Frankly The Internet is not a very safe place. A sense of false security... Firewalls* Operatinal Security Firewalls and Intrusin Detectin CS242 Cmputer Netwrks Speaking Frankly The Internet is nt a very safe place Frm ur netwrk administratr s pint f view, the wrld divides int tw camps:

More information

CSE 3320 Operating Systems Deadlock Jia Rao

CSE 3320 Operating Systems Deadlock Jia Rao CSE 3320 Operating Systems Deadlck Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Race cnditins Mutual exclusin and critical regins Tw simple appraches

More information

Using SPLAY Tree s for state-full packet classification

Using SPLAY Tree s for state-full packet classification Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,

More information

Intro Lecture. Course prerequisite: no entrance exam this year, but please review undergrad material

Intro Lecture. Course prerequisite: no entrance exam this year, but please review undergrad material Advanced Tpics in Cmputer Systems, CS262a Prf. Brewer Lecture 1 Intr Lecture I. Administrative Matters Instructrs: Eric Brewer and Je Hellerstien Eric Brewer PhD MIT, 1994 Internet Systems, Mbile cmputing,

More information

Project, test structure, test suite and requirement structure names are not allowed to contain commas (,) or double quotes ( ).

Project, test structure, test suite and requirement structure names are not allowed to contain commas (,) or double quotes ( ). TEMPPO 6.1 TEMPPO 6.1.26 Prject, test structure, test suite and requirement structure names are nt allwed t cntain cmmas (,) r duble qutes ( ). Manually created attribute values are nt allwed t begin r

More information

MID-II Examinations April 2018 Course: B. Tech Branch:CSE Year: II. Date of Exam: AN Max.Marks 30 TIME :02:00PM TO 03:00 PM

MID-II Examinations April 2018 Course: B. Tech Branch:CSE Year: II. Date of Exam: AN Max.Marks 30 TIME :02:00PM TO 03:00 PM MID-II Examinatins April 2018 Curse: B. Tech Branch:CSE Year: II Subject: OS Semester :II Date f Exam:06-04-18 AN Max.Marks 30 TIME :02:00PM TO 03:00 PM Answer ANY TWO f the fllwing 2 x 15 = 30 Marks 1.A)

More information

Repstor custodian. On Premise Pre-Requisites. Document Version 1.1 January 2017

Repstor custodian. On Premise Pre-Requisites. Document Version 1.1 January 2017 Repstr custdian On Premise Pre-Requisites Dcument Versin 1.1 January 2017 Intrductin This dcument utlines the pre-requisites fr installatin f the Repstr custdian server cmpnents. There are tw main parts;

More information

Lab 4. Name: Checked: Objectives:

Lab 4. Name: Checked: Objectives: Lab 4 Name: Checked: Objectives: Learn hw t test cde snippets interactively. Learn abut the Java API Practice using Randm, Math, and String methds and assrted ther methds frm the Java API Part A. Use jgrasp

More information

CSE 3320 Operating Systems Computer and Operating Systems Overview Jia Rao

CSE 3320 Operating Systems Computer and Operating Systems Overview Jia Rao CSE 3320 Operating Systems Cmputer and Operating Systems Overview Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Overview Recap f last class What is an perating system?

More information

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.

Contents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the. 1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding

More information

CSE 3320 Operating Systems Page Replacement Algorithms and Segmentation Jia Rao

CSE 3320 Operating Systems Page Replacement Algorithms and Segmentation Jia Rao CSE 0 Operating Systems Page Replacement Algrithms and Segmentatin Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f last Class Virtual memry Memry verlad What if the

More information

Campuses that access the SFS nvision Windows-based client need to allow outbound traffic to:

Campuses that access the SFS nvision Windows-based client need to allow outbound traffic to: Summary This dcument is a guide intended t guide yu thrugh the prcess f installing and cnfiguring PepleTls 8.55.27 (r current versin) via Windws Remte Applicatin (App). Remte App allws the end user t run

More information

Link-layer switches. Jurassic Park* LANs with backbone hubs are good. LANs with backbone hubs are bad. Hubs, bridges, and switches

Link-layer switches. Jurassic Park* LANs with backbone hubs are good. LANs with backbone hubs are bad. Hubs, bridges, and switches Link-layer switches Jurassic Park* Hubs, bridges, and switches CS4 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege *A multi-tier hub design. Switches 0- LANs with backbne hubs are gd. Prvide

More information

WEB LAB - Subset Extraction

WEB LAB - Subset Extraction WEB LAB - Subset Extractin Fall 2005 Authrs: Megha Siddavanahalli Swati Singhal Table f Cntents: Sl. N. Tpic Page N. 1 Abstract 2 2 Intrductin 2 3 Backgrund 2 4 Scpe and Cnstraints 3 5 Basic Subset Extractin

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested

More information

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel

NiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel NiceLabel LMS Installatin Guide fr Single Server Deplyment Rev-1702 NiceLabel 2017. www.nicelabel.cm 1 Cntents 1 Cntents 2 2 Architecture 3 2.1 Server Cmpnents and Rles 3 2.2 Client Cmpnents 3 3 Prerequisites

More information

ECAT-1000 Version Info

ECAT-1000 Version Info ECAT-1000 Versin Inf 11.26.2018 V5.700 Metasys release Fixed issue in Metasys N2 slave driver where COS ntificatins stp being sent t the master. Fixed delays in Metasys N2 COS reprting n high traffic netwrks.

More information

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks

On the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.

More information

Admin Report Kit for Exchange Server

Admin Report Kit for Exchange Server Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses

More information

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 Iterative Code Design handout Style Guidelines handout

Lab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 Iterative Code Design handout Style Guidelines handout UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2013 Lab 1 - Calculatr Intrductin Reading Cncepts In this lab yu will be

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questins Date f Last Update: FAQ SatView 0001 SatView is nt pening and hangs at the initial start-up splash screen This is mst likely an issue with ne f the dependency, SQL LcalDB, missing

More information

Linking network nodes

Linking network nodes Linking netwrk ndes The data link layer CS242 Cmputer Netwrks The link layer The transprt layer prvides cmmunicatin between tw prcesses. The netwrk layer prvides cmmunicatin between tw hsts. The link layer

More information

Ascii Art Capstone project in C

Ascii Art Capstone project in C Ascii Art Capstne prject in C CSSE 120 Intrductin t Sftware Develpment (Rbtics) Spring 2010-2011 Hw t begin the Ascii Art prject Page 1 Prceed as fllws, in the rder listed. 1. If yu have nt dne s already,

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This

More information

Pages of the Template

Pages of the Template Instructins fr Using the Oregn Grades K-3 Engineering Design Ntebk Template Draft, 12/8/2011 These instructins are fr the Oregn Grades K-3 Engineering Design Ntebk template that can be fund n the web at

More information

2. What is the most cost-effective method of solving interface congestion that is caused by a high level of traffic between two switches?

2. What is the most cost-effective method of solving interface congestion that is caused by a high level of traffic between two switches? CCNA 3 Chapter 3 v5.0 Exam Answers 2015 (100%) 1. Refer t the exhibit. Which switching technlgy wuld allw each access layer switch link t be aggregated t prvide mre bandwidth between each Layer 2 switch

More information

Create Your Own Report Connector

Create Your Own Report Connector Create Yur Own Reprt Cnnectr Last Updated: 15-December-2009. The URS Installatin Guide dcuments hw t cmpile yur wn URS Reprt Cnnectr. This dcument prvides a guide t what yu need t create in yur cnnectr

More information

Overview of Threads and Concurrency

Overview of Threads and Concurrency CS533 Cncepts f Operating Systems Class 2 Overview f Threads and Cncurrency Questins Why study threads and cncurrent prgramming in an OS class? What is a thread? Is multi-threaded prgramming easy? If nt,

More information

To over come these problems collections are recommended to use. Collections Arrays

To over come these problems collections are recommended to use. Collections Arrays Q1. What are limitatins f bject Arrays? The main limitatins f Object arrays are These are fixed in size ie nce we created an array bject there is n chance f increasing r decreasing size based n ur requirement.

More information

t w readify.net Managing database schemas in a Continuous Delivery world

t w readify.net Managing database schemas in a Continuous Delivery world t +61 3 9600 2339 w readify.net Managing database schemas in a Cntinuus Delivery wrld January 2015 Executive Summary One f the trickier technical prblems t address when mving t a cntinuus delivery develpment

More information

Performance of VSA in VMware vsphere 5

Performance of VSA in VMware vsphere 5 Perfrmance f VSA in VMware vsphere 5 Perfrmance Study TECHNICAL WHITE PAPER Table f Cntents Intrductin... 3 Executive Summary... 3 Test Envirnment... 3 Key Factrs f VSA Perfrmance... 4 Cmmn Strage Perfrmance

More information

Entering an NSERC CCV: Step by Step

Entering an NSERC CCV: Step by Step Entering an NSERC CCV: Step by Step - 2018 G t CCV Lgin Page Nte that usernames and passwrds frm ther NSERC sites wn t wrk n the CCV site. If this is yur first CCV, yu ll need t register: Click n Lgin,

More information

CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER. Course 10964B; Duration: 5 Days; Instructor-led

CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER. Course 10964B; Duration: 5 Days; Instructor-led CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: www.inf-trek.cm CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER Curse 10964B; Duratin: 5 Days; Instructr-led WHAT YOU WILL LEARN This curse

More information

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General

Welcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu

More information

TEMPPO TM JIRA (defect management) integration supports now autocomplete when entering characters for the user in the field Assignee

TEMPPO TM JIRA (defect management) integration supports now autocomplete when entering characters for the user in the field Assignee TEMPPO 6.1 TEMPPO 6.1.30 TEMPPO TM JIRA (defect management) integratin supprts nw autcmplete when entering characters fr the user in the field Assignee TEMPPO Installer prvides nw the pssibility nt / t

More information

An Introduction to Crescendo s Maestro Application Delivery Platform

An Introduction to Crescendo s Maestro Application Delivery Platform An Intrductin t Crescend s Maestr Applicatin Delivery Platfrm Intrductin This dcument is intended t serve as a shrt intrductin t Crescend s Maestr Platfrm and its cre features/benefits. The dcument will

More information

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide

Xilinx Answer Xilinx PCI Express DMA Drivers and Software Guide Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer

More information

CS4500/5500 Operating Systems Page Replacement Algorithms and Segmentation

CS4500/5500 Operating Systems Page Replacement Algorithms and Segmentation Operating Systems Page Replacement Algrithms and Segmentatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOSE, OS@Austin, Clumbia, Rchester Recap f

More information

FIREWALL RULE SET OPTIMIZATION

FIREWALL RULE SET OPTIMIZATION Authr Name: Mungle Mukupa Supervisr : Mr Barry Irwin Date : 25 th Octber 2010 Security and Netwrks Research Grup Department f Cmputer Science Rhdes University Intrductin Firewalls have been and cntinue

More information

Kindle Fire Guide. Requires OverDrive Account/Adobe ID authorization.

Kindle Fire Guide. Requires OverDrive Account/Adobe ID authorization. Getting started Depending n yur preference OverDrive App Supprts EPUB ebks and MP3 Audibks. Direct dwnlad thrugh mbile app. N publisher restrictins. Yu ll need the fllwing: A Kindle Fire registered with

More information

Customer Upgrade Checklist

Customer Upgrade Checklist Custmer Upgrade Checklist Getting Ready fr Yur Sabre Prfiles Upgrade Kicking Off the Prject Create a prfiles prject team within yur agency. Cnsider including peple wh can represent bth the business and

More information

Querying Data with Transact SQL

Querying Data with Transact SQL Querying Data with Transact SQL Curse Cde: 20761 Certificatin Exam: 70-761 Duratin: 5 Days Certificatin Track: MCSA: SQL 2016 Database Develpment Frmat: Classrm Level: 200 Abut this curse: This curse is

More information

Summary. Server environment: Subversion 1.4.6

Summary. Server environment: Subversion 1.4.6 Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin

More information

Kaltura MediaSpace TM Enterprise 2.0 Requirements and Installation

Kaltura MediaSpace TM Enterprise 2.0 Requirements and Installation Kaltura MediaSpace TM Enterprise 2.0 Requirements and Installatin Updated Aug 30, 2011 Server Requirements Hardware The hardware requirements are mstly dependent n the number f cncurrent users yu expect

More information

Software Toolbox Extender.NET Component. Development Best Practices

Software Toolbox Extender.NET Component. Development Best Practices Page 1 f 16 Sftware Tlbx Extender.NET Cmpnent Develpment Best Practices Table f Cntents Purpse... 3 Intended Audience and Assumptins Made... 4 Seeking Help... 5 Using the ErrrPrvider Cmpnent... 6 What

More information

Java Programming Course IO

Java Programming Course IO Java Prgramming Curse IO By Võ Văn Hải Faculty f Infrmatin Technlgies Industrial University f H Chi Minh City Sessin bjectives What is an I/O stream? Types f Streams Stream class hierarchy Cntrl flw f

More information

Power365. Quick Start Guide

Power365. Quick Start Guide Pwer365 Quick Start Guide 12/2017 Table f Cntents Prject Types... 4 The Email Frm File Prject Type... 4 The Email With Discvery Prject Type... 4 The Integratin Prject Type... 4 The Integratin Pr Prject

More information

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 1. What are tw functins f an perating system? (Chse tw.) cntrlling hardware access managing applicatins text prcessing flw chart editing prgram

More information

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL

The UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Designing a mdule with multiple memries Designing and using a bitmap fnt Designing a memry-mapped display Cmp 541 Digital

More information

Implementation of Authentication Mechanism for a Virtual File System

Implementation of Authentication Mechanism for a Virtual File System Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura Abstract

More information

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager

Troubleshooting Citrix- Published Resources Configuration in VMware Identity Manager Trubleshting Citrix- Published Resurces Cnfiguratin in VMware Identity Manager VMware Identity Manager SEP 2 0 1 8 V 4 Table f Cntents Overview... 1 Supprted Versins f Cmpnents... 1 Prerequisites... 1

More information

CONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2

CONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2 Réf. ThmX-NT-SI-CC001 Table f Cntents Sftware Technical Specificatins fr ThmX Authr : Philippe Page 1 / 9 1.INTRODUCTION... 2 2.TECHNICAL REQUIREMENTS... 2 3.DOCUMENTATION REQUIREMENTS... 4 4.COMPUTING

More information

Enterprise Installation

Enterprise Installation Enterprise Installatin Mnnit Crpratin Versin 3.6.0.0 Cntents Prerequisites... 3 Web Server... 3 SQL Server... 3 Installatin... 4 Activatin Key... 4 Dwnlad... 4 Cnfiguratin Wizard... 4 Activatin... 4 Create

More information

Using the Swiftpage Connect List Manager

Using the Swiftpage Connect List Manager Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts

More information

DNS (Domain Name Service)

DNS (Domain Name Service) mywbut.cm DNS (Dmain Name Service) The internet primarily uses IP addresses fr lcating ndes. Hwever, its humanly nt pssible fr us t keep track f the many imprtant ndes as numbers. Alphabetical names as

More information

Reading and writing data in files

Reading and writing data in files Reading and writing data in files It is ften very useful t stre data in a file n disk fr later reference. But hw des ne put it there, and hw des ne read it back? Each prgramming language has its wn peculiar

More information

FREE UP SPACE ON YOUR C: DRIVE IN "WINDOWS.."

FREE UP SPACE ON YOUR C: DRIVE IN WINDOWS.. FREE UP SPACE ON YOUR C: DRIVE IN "WINDOWS.." Web lcatin fr this presentatin: http://aztcs.rg Click n Meeting Ntes 2 SUMMARY The manufacturers f cmputers have been replacing the internal hard drives with

More information

Copyrights and Trademarks

Copyrights and Trademarks Cpyrights and Trademarks Sage One Accunting Cnversin Manual 1 Cpyrights and Trademarks Cpyrights and Trademarks Cpyrights and Trademarks Cpyright 2002-2014 by Us. We hereby acknwledge the cpyrights and

More information

Gmail and Google Drive for Rutherford County Master Gardeners

Gmail and Google Drive for Rutherford County Master Gardeners Gmail and Ggle Drive fr Rutherfrd Cunty Master Gardeners Gmail Create a Ggle Gmail accunt. https://www.yutube.cm/watch?v=kxbii2dprmc&t=76s (Hw t Create a Gmail Accunt 2014 by Ansn Alexander is a great

More information

DELL EMC VxRAIL vcenter SERVER PLANNING GUIDE

DELL EMC VxRAIL vcenter SERVER PLANNING GUIDE WHITE PAPER - DELL EMC VxRAIL vcenter SERVER PLANNING GUIDE ABSTRACT This planning guide discusses guidance fr the varius vcenter Server deplyment ptins supprted n VxRail Appliances. Nvember 2017 TABLE

More information

RSA SecurID (Token): Passcode & PIN Initialization / Setup Guide

RSA SecurID (Token): Passcode & PIN Initialization / Setup Guide T h e R c k e f e l l e r U n i v e r s i t y I N F O R M A T I O N T E C H N O L O G Y E D U C A T I O N & T R A I N I N G RSA SecurID (Tken): Passcde & PIN Initializatin / Setup Guide RSA Tken PIN Initializatin

More information

Department of Computer Information Systems KEMU

Department of Computer Information Systems KEMU Advanced DBMS: CISY 423 Department f Cmputer Infrmatin Systems KEMU Database Security OBJECTIVES Database Security and Authrizatin Database Users Creating Users/Accunts in cmmercial DBMS Discretinary Access

More information

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.

Troubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools. Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are

More information