Spin Leading OS Research Astray?
|
|
- Dominick Ferguson
- 5 years ago
- Views:
Transcription
1 Advanced Tpics in Cmputer Systems, CS262B Prf Eric A. Brewer Spin Leading OS Research Astray? January 27, 2004 I. Extensibility, Safety and Perfrmance in the SPIN Operating System Gal: extensible OS that has bth safety and gd crss-dmain perfrmance Why build an extensible OS? Perfrmance: a general-purpse OS handles all apps equally prly. E.g, multimedia apps, passing buffers between netwrk and disk, new netwrk prtcls,... 3rd-party develpment: untrusted third-parties can write extensins withut need kernel surce cde, and withut cmprmising the safety/security f the kernel. In turn, this shuld speed up innvatin. risk management: faster and safer t develp extensins, rather than kernel mds. change is the nrm! better t make a changeable system rather than a mnlithic ne Nte that these gals apply t plug-ins, applets, and Active X as well. In all cases, we enable innvatin and third-party develpment that ideally shuld be safe relative t the base system. Databases have similar extensin mechanisms (ften called blades ). Hw t extend: insert trusted cde int the kernel dynamically -- key claim: this is necessary fr perfrmance reasns (wins by aviding kernel crssings) Use a type-safe language (Mdula 3) t enfrce namespaces securely. I.e., extensin run in the kernel address space, but can t muck with anything that they can t explicitly name. They call this enfrced mdularity. Type-safe => n dangling references => must have autmatic strage management (garbage cllectin) Als need dynamic linking, since we dn t want t rebt fr every new extensin Spin has basic mdules fr VM and scheduling, and uses events t interact with extensins Alternative framewrks have different answers: applets are safe and use dynamic linking, Active X is dynamic but nt safe (but is authenticated); plug-ins are neither safe nr dynamic, same with database blades. 1
2 Signed mdules: Mdula-3 des nt have a byte-cde verifier => mdules must be signed by the cmpiler Hw des the cmpiler have a secret key? this is unclear, but it can t just be in the executable, since an attacker culd steal it. slutin 1: cmpile everything lcally, s that the key is nly valid fr the lcal machine (and hence damage due t a stlen key is limited t the lcal machine as well). Stealing the key shuld be just as hard as getting rt access, and thus intrduces little additinal weakness. Java kind f des this by verifying everything lcally; the cmpiler utput is nt actually trusted. slutin 2: have a cmpiler service that is shared. Stealing its key wuld allw a bad mdule t exist in many places, but the centralizatin makes it pssible t secure the key well. (this is like verisign fr certificates) The bad case ccurs when yu lad mdules signed by cmpilers frm ther machines; can yu trust that machine has nt been cmprmised? Bundaries: althugh nt in this paper, Spin makes a gd venue t talk abut bundaries. By bundary, I mean tw sides f an API that have different trust levels. Extensin bundaries and kernel crssing are examples f bundaries, as are plug-ins and applets. In each case, there is the base side that is trusted, and the extensin side that is nt (at least nt as much). In this sectin, I utline all f the issues that yu have t think abut whenever yu have a bundary; there is a huge number f them and they are rarely explicit r even discussed. Spin cvers mst f them well, but never views the issues all tgether as the set f bundary prblems. Shared prtectin dmain: are the tw sides in the same prtectin dmain? If nt, there is less trust needed. Spin uses a shared address space but depends n Mdula-3 t limit access. Nemesis is an unusual case in that it has ne address space, but separate dmains. Plug-ins are same address space and are trusted but nt always trustwrthy. Shared strage: even when using separate dmains, there may be shared memry regins r shared strage. These regins can clearly be damaged by an extensin. The usual answer t this is t have the base system check the shared regins befre use. A simple example is argument checking fr kernel calls. Similarly, shared files can be checked fr validity befre being used by the base system. Are there pass by reference arguments acrss the bundary? If s, there is clearly shared strage. It is literally shared (extensin updates are immediately visible in the base), r it is really pass-by-cpy-result (pass by value, then cpy the result back). LRPC is cnfused abut this issue. There are tw directins t wrry abut: 1) the extensin passes in a reference -- can it then change the value while the base is using it? 2) the base passes a reference t the extensin -- des the extensin have read/write r readnly access t the base value? There is anther mre subtle issue in the Spin case: if we pass a pinter ut t an extensin, it might pass it back in with a different type, thus defeating the type safety. Spin avids this by externalizing the reference, which basically means make a table f pinters and pass ut the index rather than the pinter. The extensin can pass back in the reference (integer), but the table securely stres the real type. What is the lifetime f a reference passed acrss the bundary? This is a tricky ne 2
3 that is almst always left ut. The default answer is that a reference is gd frever and the base cannt mve, r really even use, the shared bject. (The base culd lck the bject, but these is really n reasn t think the extensin will fllw the lcking discipline.) The tw simplest slutins are t either avid pass by reference (nly pass values), r t have references expire (leases). With expiratin, there needs t be a way t detect the use f expired references, which implies a level f indirectin -- yu can t use pinters directly, nr can yu pass in the timestamp, unless it was signed by the base. In thery, ne culd garbage cllect references acrss a bundary, but requires nt nly a shared GC system, but that the extensin can t pass references utside the GC bundary (such as string them in a file r giving them t a nn-gc system). Faults brake the GC mdel as well: if an extensin becmes discnnected when d yu GC references it had? T summarize, unless yu re within ne prtectin dmain, GC prbably desn t make sense, leases wrk OK, and pass by value is the simplest. The prblem with leases is that it is hard t build systems that wrk rbustly when leases expire during crrect use. Partial failure: can the ther side fail withut this side failing? If s all crssings have nn-transparent exceptinal cnditins, and all crssing prbably need a timeut. If an extensin fails, can yu just restart it? Hw des the base clean-up the state f the lst upcalls? LRPC cvers these cases pretty well, RMI less s. Are there shared threads? I.e. des a thread crss the bundary r is there sme kind f handff? RMI and LRPC clearly have a handff and thus use separate threads. Extensins share threads; Spin kernel crssings d nt share threads. Can an extensin swallw a thread and never return it? This is usually the fear that drives fr separate threads an each side. Evlutin: can the tw sides evlve independently? Fr lng-lived systems this is a prerequisite that is nrmally ignred. It is usually easy t evlve the extensin, but hw d yu evlve the base withut breaking all f the extensins? Mac OS has prbably dne the best at this. One answer is t never evlve a particular interface -- make interfaces immutable and add new interfaces t evlve the system. The ld nes are left just t supprt legacy extensins. Wh decides that a new versin f the base is backward cmpatible (and what if they re wrng)? Fr big upgrades, it is cmmn t frce evlutin f all f the extensins (e.g. fr Windws 2000, mst drivers must be updated, at least thse frm Windws 95/98). Micrsft COM has unique IDs fr every interface s that an evlved interface is clearly marked as different; cnversely, if yu get the same ID, then yu knw yu have the same interface (but nt necessarily the same implementatin!) Admissin cntrl: is there a limit n crssings, r n cncurrent crssings? RMI has this prblem in spades -- every new call typically spawns a new thread and runs cncurrently, eating up resurces until the system falls dwn. Is the admissin cntrl general r per-client? In general, the way t slve this is with explicit queues fr incming crssings; excess crssings can be drpped r failed immediately. A cunt f utstanding calls may als wrk, as lng as it desn t leak (which seems t be surprisingly hard in practice). Fr synchrnus interface, the number f threads limits the number f crssings, but fr async the limit must be enfrced sme ther way. Resurce allcatin: hw d extensins get resurces and hw are their resurce limits defined? This cmes up in netwrk/disk buffers, physical memry (ACPM has a nice slutin), and sckets amng thers. In general, it is hard fr a server t crrectly accunt fr the resurce usage f its clients (n a per-client basis). Hard cases including 3
4 shared verhead in the VM r interrupt system fr example. Can yu uninstall an extensin? Ideally, installing an extensin wuld be transactinal, and if yu abrted it, everything wuld return t nrmal. I dn t really knw f any systems that achieve this, but DLLs clearly d nt. What if applicatins are using the extensin? Typically wuld yu stp new apps frm using it, and then wait fr the current nes t stp. Files systems have t d this fr deleted files. upcall summary: use pass-by-value, r externalized references. It is useful t have timeuts fr calls, and expiratins fr references passed ut. Externalized references are really paque tkens that have n use t the extensin except as smething t pass back later. dwncall summary: decide if it is sync r async; check args n the way dwn; dn t accept true pass by reference (but pass by value-result is OK, since there is n shared regin). It is useful t enable app-specific clsures t be passed in. These are tkens that are paque t the base, but allw the applicatin t have cntext when a result is returned, and thus simplifies reply matching fr the asynchrnus case. In Spin, there are tw kinds f bundaries: extensin bundaries and the user-level bundary. The latter is a fairly typical kernel crssing with arg checking. Externalized references fr the user-level bundary, while type-safety is fr the extensin bundary. Nte that references are OK acrss the extensin bundary because there is a shared GC system (as well as shared memry and address space). Extensins shares threads, but threads never crss the user-level bundary -- during a blcking call there are tw threads invlved, ne fr user level (which blcks) and ne fr the kernel. Unix Interface: Mstly written in C n tp f C-Threads implementatin f the Strand interface Small Mdula-3 cre underneath the Unix C cde Similar t Exkernel LibOS cncept Capabilities: just type-safe pinters! enfrced mstly at cmpile time (e.g. except fr array bunds checks) externalize these pinters if yu need t give them t untrusted cde, just file descriptrs in Unix (an array f pinters and yu pass ut the index). Dmains: Just f set f (name, bject) bindings used fr dynamic linking Reslve lks up unreslved symbls in target against exprted symbls in surce Use tw reslves t crss-link dmains Linked dmains are in the same address space: the new links are new capabilities Can further restrict these links with run-time checks Event dispatch: the default case is ne handler fr each surce f events 4
5 But may have many handlers fr an event -- need t rder them and cmbine them Generates cmbinatin cde dynamically as handlers are added Each handler may have a guard, s that it nly applies in sme situatins -- this is the way t demultiplex events (e.g. netwrk prtcl dispatch) Als need t figure ut return value fr an event, which is nt clear since it may cause many callees t execute. Default plicy is the return value f the last handler executed, but the rder is undefined (!). II. Extensible Kernels are Leading OS Research Astray Claims made by extensible OS researchers: safely achieve high perfrmance fr wide range f apps rapidly deply OS innvatins cntain/manage increasing OS cmplexity Cunterclaim: nly the first ne has been addressed, and cmplexity is in fact much wrse Basic prblems: dn t need general-purpse extensibility -- best ideas can just be added t a regular OS withut the need fr new mechanisms fr safety easily mdified bundaries are nt a gd idea lng term: hinders cmpatibility, interperability, and the ability t evlve... (must yu supprt everything that was extended in the past?) safe extensins intrduce new cmplex prblems that are hard t slve (witness XN disk blck scheme, trusted cmpilers, etc.) Alternatives are OK: simple little language extensins (packet filters) existing techniques: ACPM, scheduler activatins, U-Net are all safe and much simpler Example: web server TCP implementatin: just fix it directly (dne nw) TCP prtcl ptimizatin: better interface is sufficient frking/switching: better threads (Capricci) filesystem: several slutins, including specialized file systems fr web caches VM/cache cntrl: better interface is sufficient cpying verhead: U-net r IO-Lite duble buffering: ACPM TCP checksum calculatin: netwrk layer can cache checksums itself (mre reliable) 5
CS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel
CS510 Cncurrent Systems Class 2 A Lck-Free Multiprcessr OS Kernel The Synthesis kernel A research prject at Clumbia University Synthesis V.0 ( 68020 Uniprcessr (Mtrla N virtual memry 1991 - Synthesis V.1
More informationExperience With Processes and Monitors in Mesa
Advanced Tpics in Cmputer Systems, CS262A Prf. Eric Brewer Experience With Prcesses and Mnitrs in Mesa I. Experience With Prcesses and Mnitrs in Mesa Fcus f this paper: light-weight prcesses (threads in
More information- Replacement of a single statement with a sequence of statements(promotes regularity)
ALGOL - Java and C built using ALGOL 60 - Simple and cncise and elegance - Universal - Clse as pssible t mathematical ntatin - Language can describe the algrithms - Mechanically translatable t machine
More informationOperating systems. Module 15 kernel I/O subsystem. Tami Sorgente 1
Operating systems Mdule 15 kernel I/O subsystem Tami Srgente 1 SWAP SPACE MANAGEMENT Swap space can be defined as a temprary strage lcatin that is used when system s memry requirements exceed the size
More informationOperating systems. Module 7 IPC (Interprocess communication) PART I. Tami Sorgente 1
Operating systems Mdule 7 IPC (Interprcess cmmunicatin) PART I Tami Srgente 1 INTERPROCESS COMMUNICATION Prcesses within a system may be independent r cperating Cperating prcess can affect r be affected
More informationDistributed Data Structures xfs: Serverless Network File System
Advanced Tpics in Cmputer Systems, CS262B Prf Eric A. Brewer Distributed Data Structures xfs: Serverless Netwrk File System February 3, 2004 I. DDS Gal: new persistent strage layer that is a better fit
More informationCS510 Concurrent Systems Class 1a. Linux Kernel Locking Techniques
CS510 Cncurrent Systems Class 1a Linux Kernel Lcking Techniques Intr t kernel lcking techniques (Linux) Why d we need lcking in the kernel? Which prblems are we trying t slve? What implementatin chices
More informationOpenSceneGraph Tutorial
OpenSceneGraph Tutrial Michael Kriegel & Meiyii Lim, Herit-Watt University, Edinburgh February 2009 Abut Open Scene Graph: Open Scene Graph is a mdern pen surce scene Graph. Open Scene Graph (r shrt OSG)
More informationINSTALLING CCRQINVOICE
INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a
More informationMax 8/16 and T1/E1 Gateway, Version FAQs
Frequently Asked Questins Max 8/16 and T1/E1 Gateway, Versin 1.5.10 FAQs The FAQs have been categrized int the fllwing tpics: Calling Calling Cmpatibility Cnfiguratin Faxing Functinality Glssary Q. When
More information1 Version Spaces. CS 478 Homework 1 SOLUTION
CS 478 Hmewrk SOLUTION This is a pssible slutin t the hmewrk, althugh there may be ther crrect respnses t sme f the questins. The questins are repeated in this fnt, while answers are in a mnspaced fnt.
More informationThese tasks can now be performed by a special program called FTP clients.
FTP Cmmander FAQ: Intrductin FTP (File Transfer Prtcl) was first used in Unix systems a lng time ag t cpy and mve shared files. With the develpment f the Internet, FTP became widely used t uplad and dwnlad
More informationCS4500/5500 Operating Systems Synchronization
Operating Systems Synchrnizatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready
More information$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as:
Lcatin f the map.x.prperties files $ARCSIGHT_HOME/current/user/agent/map File naming cnventin The files are named in sequential rder such as: Sme examples: 1. map.1.prperties 2. map.2.prperties 3. map.3.prperties
More informationSW-G using new DryadLINQ(Argentia)
SW-G using new DryadLINQ(Argentia) DRYADLINQ: Dryad is a high-perfrmance, general-purpse distributed cmputing engine that is designed t manage executin f large-scale applicatins n varius cluster technlgies,
More informationTransmission Control Protocol Introduction
Transmissin Cntrl Prtcl Intrductin TCP is ne f the mst imprtant prtcls f Internet Prtcls suite. It is mst widely used prtcl fr data transmissin in cmmunicatin netwrk such as Internet. Features TCP is reliable
More informationCS4500/5500 Operating Systems Computer and Operating Systems Overview
Operating Systems Cmputer and Operating Systems Overview Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS4E, OS@Austin, Clumbia, UWisc Overview Recap
More informationInfrastructure Series
Infrastructure Series TechDc WebSphere Message Brker / IBM Integratin Bus Parallel Prcessing (Aggregatin) (Message Flw Develpment) February 2015 Authr(s): - IBM Message Brker - Develpment Parallel Prcessing
More informationLog shipping is a HA option. Log shipping ensures that log backups from Primary are
LOG SHIPPING Lg shipping is a HA ptin. Lg shipping ensures that lg backups frm Primary are cntinuusly applied n standby. Lg shipping fllws a warm standby methd because manual prcess is invlved t ensure
More information2. When logging is used, which severity level indicates that a device is unusable?
CCNA 4 Chapter 8 v5.0 Exam Answers 2015 (100%) 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput
More informationUiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash
UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the
More informationPlease contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationCommon Language Runtime
Intrductin t.net framewrk.net is a general-purpse sftware develpment platfrm, similar t Java. Micrsft intrduced.net with purpse f bridging gap between different applicatins..net framewrk aims at cmbining
More informationCSE 3320 Operating Systems Synchronization Jia Rao
CSE 3320 Operating Systems Synchrnizatin Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready queue
More informationSoftware Engineering
Sftware Engineering Chapter #1 Intrductin Sftware systems are abstract and intangible. Sftware engineering is an engineering discipline that is cncerned with all aspects f sftware prductin. Sftware Prducts
More informationUiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash
UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the
More information1 Binary Trees and Adaptive Data Compression
University f Illinis at Chicag CS 202: Data Structures and Discrete Mathematics II Handut 5 Prfessr Rbert H. Slan September 18, 2002 A Little Bttle... with the wrds DRINK ME, (r Adaptive data cmpressin
More informationLab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 1 - Calculatr Intrductin In this lab yu will be writing yur first
More informationGetting it there in one piece
Getting it there in ne piece Service mdel and implementatin Principles f reliable data transfer CS242 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege Reliable transfer 9-2 Terminlgy Finite
More informationTroubleshooting Citrix- Published Resources Configuration in VMware Identity Manager
Trubleshting Citrix- Published Resurces Cnfiguratin in VMware Identity Manager VMware Identity Manager A U G U S T 2 0 1 7 V1 Table f Cntents Overview... 1 Supprted Versins f Cmpnents... 1 Prerequisites...
More informationRISKMAN REFERENCE GUIDE TO USER MANAGEMENT (Non-Network Logins)
Intrductin This reference guide is aimed at managers wh will be respnsible fr managing users within RiskMan where RiskMan is nt cnfigured t use netwrk lgins. This guide is used in cnjunctin with the respective
More informationUpgrading Kaltura MediaSpace TM Enterprise 1.0 to Kaltura MediaSpace TM Enterprise 2.0
Upgrading Kaltura MediaSpace TM Enterprise 1.0 t Kaltura MediaSpace TM Enterprise 2.0 Assumptins: The existing cde was checked ut f: svn+ssh://mediaspace@kelev.kaltura.cm/usr/lcal/kalsurce/prjects/m ediaspace/scial/branches/production/website/.
More informationCustodial Integrator. Release Notes. Version 3.11 (TLM)
Custdial Integratr Release Ntes Versin 3.11 (TLM) 2018 Mrningstar. All Rights Reserved. Custdial Integratr Prduct Versin: V3.11.001 Dcument Versin: 020 Dcument Issue Date: December 14, 2018 Technical Supprt:
More informationCLIC ADMIN USER S GUIDE
With CLiC (Classrm In Cntext), teaching and classrm instructin becmes interactive, persnalized, and fcused. This digital-based curriculum, designed by Gale, is flexible allwing teachers t make their classrm
More informationCCNA Security v2.0 Chapter 3 Exam Answers
CCNA Security v2.0 Chapter 3 Exam Answers 1. Because f implemented security cntrls, a user can nly access a server with FTP. Which AAA cmpnent accmplishes this? accunting accessibility auditing authrizatin
More informationIn-Class Exercise. Hashing Used in: Hashing Algorithm
In-Class Exercise Hashing Used in: Encryptin fr authenticatin Hash a digital signature, get the value assciated with the digital signature,and bth are sent separately t receiver. The receiver then uses
More informationProject 4: System Calls 1
CMPT 300 1. Preparatin Prject 4: System Calls 1 T cmplete this assignment, it is vital that yu have carefully cmpleted and understd the cntent in the fllwing guides which are psted n the curse website:
More informationOperational Security. Speaking Frankly The Internet is not a very safe place. A sense of false security... Firewalls*
Operatinal Security Firewalls and Intrusin Detectin CS242 Cmputer Netwrks Speaking Frankly The Internet is nt a very safe place Frm ur netwrk administratr s pint f view, the wrld divides int tw camps:
More informationCSE 3320 Operating Systems Deadlock Jia Rao
CSE 3320 Operating Systems Deadlck Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Race cnditins Mutual exclusin and critical regins Tw simple appraches
More informationUsing SPLAY Tree s for state-full packet classification
Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,
More informationIntro Lecture. Course prerequisite: no entrance exam this year, but please review undergrad material
Advanced Tpics in Cmputer Systems, CS262a Prf. Brewer Lecture 1 Intr Lecture I. Administrative Matters Instructrs: Eric Brewer and Je Hellerstien Eric Brewer PhD MIT, 1994 Internet Systems, Mbile cmputing,
More informationProject, test structure, test suite and requirement structure names are not allowed to contain commas (,) or double quotes ( ).
TEMPPO 6.1 TEMPPO 6.1.26 Prject, test structure, test suite and requirement structure names are nt allwed t cntain cmmas (,) r duble qutes ( ). Manually created attribute values are nt allwed t begin r
More informationMID-II Examinations April 2018 Course: B. Tech Branch:CSE Year: II. Date of Exam: AN Max.Marks 30 TIME :02:00PM TO 03:00 PM
MID-II Examinatins April 2018 Curse: B. Tech Branch:CSE Year: II Subject: OS Semester :II Date f Exam:06-04-18 AN Max.Marks 30 TIME :02:00PM TO 03:00 PM Answer ANY TWO f the fllwing 2 x 15 = 30 Marks 1.A)
More informationRepstor custodian. On Premise Pre-Requisites. Document Version 1.1 January 2017
Repstr custdian On Premise Pre-Requisites Dcument Versin 1.1 January 2017 Intrductin This dcument utlines the pre-requisites fr installatin f the Repstr custdian server cmpnents. There are tw main parts;
More informationLab 4. Name: Checked: Objectives:
Lab 4 Name: Checked: Objectives: Learn hw t test cde snippets interactively. Learn abut the Java API Practice using Randm, Math, and String methds and assrted ther methds frm the Java API Part A. Use jgrasp
More informationCSE 3320 Operating Systems Computer and Operating Systems Overview Jia Rao
CSE 3320 Operating Systems Cmputer and Operating Systems Overview Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Overview Recap f last class What is an perating system?
More informationContents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.
1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding
More informationCSE 3320 Operating Systems Page Replacement Algorithms and Segmentation Jia Rao
CSE 0 Operating Systems Page Replacement Algrithms and Segmentatin Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f last Class Virtual memry Memry verlad What if the
More informationCampuses that access the SFS nvision Windows-based client need to allow outbound traffic to:
Summary This dcument is a guide intended t guide yu thrugh the prcess f installing and cnfiguring PepleTls 8.55.27 (r current versin) via Windws Remte Applicatin (App). Remte App allws the end user t run
More informationLink-layer switches. Jurassic Park* LANs with backbone hubs are good. LANs with backbone hubs are bad. Hubs, bridges, and switches
Link-layer switches Jurassic Park* Hubs, bridges, and switches CS4 Cmputer Netwrks Department f Cmputer Science Wellesley Cllege *A multi-tier hub design. Switches 0- LANs with backbne hubs are gd. Prvide
More informationWEB LAB - Subset Extraction
WEB LAB - Subset Extractin Fall 2005 Authrs: Megha Siddavanahalli Swati Singhal Table f Cntents: Sl. N. Tpic Page N. 1 Abstract 2 2 Intrductin 2 3 Backgrund 2 4 Scpe and Cnstraints 3 5 Basic Subset Extractin
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested
More informationNiceLabel LMS. Installation Guide for Single Server Deployment. Rev-1702 NiceLabel
NiceLabel LMS Installatin Guide fr Single Server Deplyment Rev-1702 NiceLabel 2017. www.nicelabel.cm 1 Cntents 1 Cntents 2 2 Architecture 3 2.1 Server Cmpnents and Rles 3 2.2 Client Cmpnents 3 3 Prerequisites
More informationECAT-1000 Version Info
ECAT-1000 Versin Inf 11.26.2018 V5.700 Metasys release Fixed issue in Metasys N2 slave driver where COS ntificatins stp being sent t the master. Fixed delays in Metasys N2 COS reprting n high traffic netwrks.
More informationOn the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks
On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.
More informationAdmin Report Kit for Exchange Server
Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses
More informationLab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2 Iterative Code Design handout Style Guidelines handout
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2013 Lab 1 - Calculatr Intrductin Reading Cncepts In this lab yu will be
More informationFrequently Asked Questions
Frequently Asked Questins Date f Last Update: FAQ SatView 0001 SatView is nt pening and hangs at the initial start-up splash screen This is mst likely an issue with ne f the dependency, SQL LcalDB, missing
More informationLinking network nodes
Linking netwrk ndes The data link layer CS242 Cmputer Netwrks The link layer The transprt layer prvides cmmunicatin between tw prcesses. The netwrk layer prvides cmmunicatin between tw hsts. The link layer
More informationAscii Art Capstone project in C
Ascii Art Capstne prject in C CSSE 120 Intrductin t Sftware Develpment (Rbtics) Spring 2010-2011 Hw t begin the Ascii Art prject Page 1 Prceed as fllws, in the rder listed. 1. If yu have nt dne s already,
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This
More informationPages of the Template
Instructins fr Using the Oregn Grades K-3 Engineering Design Ntebk Template Draft, 12/8/2011 These instructins are fr the Oregn Grades K-3 Engineering Design Ntebk template that can be fund n the web at
More information2. What is the most cost-effective method of solving interface congestion that is caused by a high level of traffic between two switches?
CCNA 3 Chapter 3 v5.0 Exam Answers 2015 (100%) 1. Refer t the exhibit. Which switching technlgy wuld allw each access layer switch link t be aggregated t prvide mre bandwidth between each Layer 2 switch
More informationCreate Your Own Report Connector
Create Yur Own Reprt Cnnectr Last Updated: 15-December-2009. The URS Installatin Guide dcuments hw t cmpile yur wn URS Reprt Cnnectr. This dcument prvides a guide t what yu need t create in yur cnnectr
More informationOverview of Threads and Concurrency
CS533 Cncepts f Operating Systems Class 2 Overview f Threads and Cncurrency Questins Why study threads and cncurrent prgramming in an OS class? What is a thread? Is multi-threaded prgramming easy? If nt,
More informationTo over come these problems collections are recommended to use. Collections Arrays
Q1. What are limitatins f bject Arrays? The main limitatins f Object arrays are These are fixed in size ie nce we created an array bject there is n chance f increasing r decreasing size based n ur requirement.
More informationt w readify.net Managing database schemas in a Continuous Delivery world
t +61 3 9600 2339 w readify.net Managing database schemas in a Cntinuus Delivery wrld January 2015 Executive Summary One f the trickier technical prblems t address when mving t a cntinuus delivery develpment
More informationPerformance of VSA in VMware vsphere 5
Perfrmance f VSA in VMware vsphere 5 Perfrmance Study TECHNICAL WHITE PAPER Table f Cntents Intrductin... 3 Executive Summary... 3 Test Envirnment... 3 Key Factrs f VSA Perfrmance... 4 Cmmn Strage Perfrmance
More informationEntering an NSERC CCV: Step by Step
Entering an NSERC CCV: Step by Step - 2018 G t CCV Lgin Page Nte that usernames and passwrds frm ther NSERC sites wn t wrk n the CCV site. If this is yur first CCV, yu ll need t register: Click n Lgin,
More informationCLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER. Course 10964B; Duration: 5 Days; Instructor-led
CENTER OF KNOWLEDGE, PATH TO SUCCESS Website: www.inf-trek.cm CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER Curse 10964B; Duratin: 5 Days; Instructr-led WHAT YOU WILL LEARN This curse
More informationWelcome to Remote Access Services (RAS) Virtual Desktop vs Extended Network. General
Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu
More informationTEMPPO TM JIRA (defect management) integration supports now autocomplete when entering characters for the user in the field Assignee
TEMPPO 6.1 TEMPPO 6.1.30 TEMPPO TM JIRA (defect management) integratin supprts nw autcmplete when entering characters fr the user in the field Assignee TEMPPO Installer prvides nw the pssibility nt / t
More informationAn Introduction to Crescendo s Maestro Application Delivery Platform
An Intrductin t Crescend s Maestr Applicatin Delivery Platfrm Intrductin This dcument is intended t serve as a shrt intrductin t Crescend s Maestr Platfrm and its cre features/benefits. The dcument will
More informationXilinx Answer Xilinx PCI Express DMA Drivers and Software Guide
Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer
More informationCS4500/5500 Operating Systems Page Replacement Algorithms and Segmentation
Operating Systems Page Replacement Algrithms and Segmentatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOSE, OS@Austin, Clumbia, Rchester Recap f
More informationFIREWALL RULE SET OPTIMIZATION
Authr Name: Mungle Mukupa Supervisr : Mr Barry Irwin Date : 25 th Octber 2010 Security and Netwrks Research Grup Department f Cmputer Science Rhdes University Intrductin Firewalls have been and cntinue
More informationKindle Fire Guide. Requires OverDrive Account/Adobe ID authorization.
Getting started Depending n yur preference OverDrive App Supprts EPUB ebks and MP3 Audibks. Direct dwnlad thrugh mbile app. N publisher restrictins. Yu ll need the fllwing: A Kindle Fire registered with
More informationCustomer Upgrade Checklist
Custmer Upgrade Checklist Getting Ready fr Yur Sabre Prfiles Upgrade Kicking Off the Prject Create a prfiles prject team within yur agency. Cnsider including peple wh can represent bth the business and
More informationQuerying Data with Transact SQL
Querying Data with Transact SQL Curse Cde: 20761 Certificatin Exam: 70-761 Duratin: 5 Days Certificatin Track: MCSA: SQL 2016 Database Develpment Frmat: Classrm Level: 200 Abut this curse: This curse is
More informationSummary. Server environment: Subversion 1.4.6
Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin
More informationKaltura MediaSpace TM Enterprise 2.0 Requirements and Installation
Kaltura MediaSpace TM Enterprise 2.0 Requirements and Installatin Updated Aug 30, 2011 Server Requirements Hardware The hardware requirements are mstly dependent n the number f cncurrent users yu expect
More informationSoftware Toolbox Extender.NET Component. Development Best Practices
Page 1 f 16 Sftware Tlbx Extender.NET Cmpnent Develpment Best Practices Table f Cntents Purpse... 3 Intended Audience and Assumptins Made... 4 Seeking Help... 5 Using the ErrrPrvider Cmpnent... 6 What
More informationJava Programming Course IO
Java Prgramming Curse IO By Võ Văn Hải Faculty f Infrmatin Technlgies Industrial University f H Chi Minh City Sessin bjectives What is an I/O stream? Types f Streams Stream class hierarchy Cntrl flw f
More informationPower365. Quick Start Guide
Pwer365 Quick Start Guide 12/2017 Table f Cntents Prject Types... 4 The Email Frm File Prject Type... 4 The Email With Discvery Prject Type... 4 The Integratin Prject Type... 4 The Integratin Pr Prject
More informationIT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016
IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 1. What are tw functins f an perating system? (Chse tw.) cntrlling hardware access managing applicatins text prcessing flw chart editing prgram
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Designing a mdule with multiple memries Designing and using a bitmap fnt Designing a memry-mapped display Cmp 541 Digital
More informationImplementation of Authentication Mechanism for a Virtual File System
Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura Abstract
More informationTroubleshooting Citrix- Published Resources Configuration in VMware Identity Manager
Trubleshting Citrix- Published Resurces Cnfiguratin in VMware Identity Manager VMware Identity Manager SEP 2 0 1 8 V 4 Table f Cntents Overview... 1 Supprted Versins f Cmpnents... 1 Prerequisites... 1
More informationCONTROL-COMMAND. Software Technical Specifications for ThomX Suppliers 1.INTRODUCTION TECHNICAL REQUIREMENTS... 2
Réf. ThmX-NT-SI-CC001 Table f Cntents Sftware Technical Specificatins fr ThmX Authr : Philippe Page 1 / 9 1.INTRODUCTION... 2 2.TECHNICAL REQUIREMENTS... 2 3.DOCUMENTATION REQUIREMENTS... 4 4.COMPUTING
More informationEnterprise Installation
Enterprise Installatin Mnnit Crpratin Versin 3.6.0.0 Cntents Prerequisites... 3 Web Server... 3 SQL Server... 3 Installatin... 4 Activatin Key... 4 Dwnlad... 4 Cnfiguratin Wizard... 4 Activatin... 4 Create
More informationUsing the Swiftpage Connect List Manager
Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts
More informationDNS (Domain Name Service)
mywbut.cm DNS (Dmain Name Service) The internet primarily uses IP addresses fr lcating ndes. Hwever, its humanly nt pssible fr us t keep track f the many imprtant ndes as numbers. Alphabetical names as
More informationReading and writing data in files
Reading and writing data in files It is ften very useful t stre data in a file n disk fr later reference. But hw des ne put it there, and hw des ne read it back? Each prgramming language has its wn peculiar
More informationFREE UP SPACE ON YOUR C: DRIVE IN "WINDOWS.."
FREE UP SPACE ON YOUR C: DRIVE IN "WINDOWS.." Web lcatin fr this presentatin: http://aztcs.rg Click n Meeting Ntes 2 SUMMARY The manufacturers f cmputers have been replacing the internal hard drives with
More informationCopyrights and Trademarks
Cpyrights and Trademarks Sage One Accunting Cnversin Manual 1 Cpyrights and Trademarks Cpyrights and Trademarks Cpyrights and Trademarks Cpyright 2002-2014 by Us. We hereby acknwledge the cpyrights and
More informationGmail and Google Drive for Rutherford County Master Gardeners
Gmail and Ggle Drive fr Rutherfrd Cunty Master Gardeners Gmail Create a Ggle Gmail accunt. https://www.yutube.cm/watch?v=kxbii2dprmc&t=76s (Hw t Create a Gmail Accunt 2014 by Ansn Alexander is a great
More informationDELL EMC VxRAIL vcenter SERVER PLANNING GUIDE
WHITE PAPER - DELL EMC VxRAIL vcenter SERVER PLANNING GUIDE ABSTRACT This planning guide discusses guidance fr the varius vcenter Server deplyment ptins supprted n VxRail Appliances. Nvember 2017 TABLE
More informationRSA SecurID (Token): Passcode & PIN Initialization / Setup Guide
T h e R c k e f e l l e r U n i v e r s i t y I N F O R M A T I O N T E C H N O L O G Y E D U C A T I O N & T R A I N I N G RSA SecurID (Tken): Passcde & PIN Initializatin / Setup Guide RSA Tken PIN Initializatin
More informationDepartment of Computer Information Systems KEMU
Advanced DBMS: CISY 423 Department f Cmputer Infrmatin Systems KEMU Database Security OBJECTIVES Database Security and Authrizatin Database Users Creating Users/Accunts in cmmercial DBMS Discretinary Access
More informationTroubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.
Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are
More information