Abolish Runtime Systems!

Size: px
Start display at page:

Download "Abolish Runtime Systems!"

Transcription

1 Abolish Runtie Systes! Operating Systes Should Control the Execution Environent Jaes Larus Microsoft Research Second International Conference on Virtual Execution Environents June 14, 2006

2 If you coe to a fork in the road, take it. Yogi Berra Jaes Larus Abolish Runtie Systes

3 Crossroad for Languages Jaes Larus Abolish Runtie Systes

4 Abstraction Jaes Larus Abolish Runtie Systes

5 Why Did it Turn Out this Way? Abstraction is good sipler to build runtie on OS than bare hardware ore work to ipleent OS + runtie Liited eory and processor cycles liit language abitions Good OS perforance difficult on liited hardware Expertise and goals languages/systes researchers Copatibility/interoperability existing software and languages Portable platfor was an unfilled niche any processors, any O S es Jaes Larus Abolish Runtie Systes

6 Not the Right Path Language/runtie iproveents do not benefit OS or syste software Duplicate functionality runtie reipleents OS features Elaborate runties increase cost of language safety decrease attractiveness of better languages Foreclose innovation in syste architecture cannot trust software properties rely on hardware for isolation and protection Jaes Larus Abolish Runtie Systes

7 Singularity Project Microsoft Research project Galen Hunt & Ji Larus & any others basis for building ore dependable software attack dependable fro ultiple perspectives New OS, languages, and tools working research prototype not Windows or CLR replaceent no copatibility No single agic bullet utually reinforcing iproveents to languages and copilers, systes, and tools Jaes Larus Abolish Runtie Systes

8 Key Directions 1. Use safe prograing languages everywhere safe = type safe and eory safe (like C# or Java) applications, extensions, OS services, device drivers, kernel 2. Iprove syste resilience despite software errors failure containent boundaries between coponents and extensions explicit failure notification odel 3. Architecture supports verification specify and check behavior at any levels of abstraction core OS architecture facilitates static verification Jaes Larus Abolish Runtie Systes

9 processes Singularity OS content extension ext. class library runtie web server server class library runtie channels TCP/IP stack tcp class library runtie network driver driver class library runtie Safe icro-kernel 95% written in C# 17% of files contain unsafe C# 5% of files contain x86 as or C++ kernel sealed at boot tie services & device drivers in processes Software isolated processes (SIPs) all user code is verified safe soe unsafe code in trusted runtie processes sealed at start tie kernel API kernel page gr scheduler chan gr proc gr i/o gr kernel class library runtie Safe and efficient counication via strong interfaces (channels) channel behavior is specified, checked. checked behavior allows us to ake counication efficient Type safety is key to verification and protection HAL Jaes Larus Abolish Runtie Systes

10 Written in extended C# Challenge 1: Pervasive Safe Languages actually Spec# (C# + pre/post-conditions and invariants) Added features for systes prograing increase prograer control over allocation, initialization, and eory layout Explore language design to support prograing and verification essage passing factoring libraries into coposable pieces copile-tie reflection Jaes Larus Abolish Runtie Systes

11 What About The Runtie? JVM & CLR s design not always appropriate rich runti e ( one size fits all ) onolithic, general-purpose environent large eory footprints (~4 MB process for CLR) any dependencies (CLR PAL requires >300 Win32 APIs) JIT copilation increases runtie size and coplexity unpredictable perforance replicate OS functionality security, threading, configuration, etc. ore is less Jaes Larus Abolish Runtie Systes

12 Singularity Runtie Libraries Singularity Process Application Whole Bartok Progra Optiization Copiler x86 Executable Singularity Runtie (GC, etc.) TAL Proof Jaes Larus Abolish Runtie Systes

13 Sall, Custoizable Runtie Sall execution environent ahead-of-tie, global optiizing copiler (MSR Bartok) specializes runtie and libraries eliinate code for unused/disabled language features and unused application/library code factorable runtie and libraries Runtie, garbage collector, and libraries selectable on per-process basis reduce eory and coputation overhead enforce design discipline and syste policies per process Eliinate OS functionality fro runtie security, resource allocation, etc. Provide OS echanis for enforcing syste policy runtie can constrain behavior (e.g. driver environent) Jaes Larus Abolish Runtie Systes

14 Challenge 2: Iprove Resilience Software errors should not cause syste failure A resilient syste architecture should isolate syste coponents to prevent data corruption provide clear failure notification ipleent policy for restarting failed coponent Jaes Larus Abolish Runtie Systes

15 Process Architectures Process App OS OS Kernel Jaes Larus Abolish Runtie Systes

16 Open Process Architecture Open processes dynaic code loading and runtie code generation DLLs, Java class loading, browser plug-ins, device drivers in kernel, etc. cross-process eory sharing syste API allows one process to alter state of another Near ubiquitous (Windows, Unix, etc.) originated in Multics Shared state reduces dependability 85% of Windows crashes are caused by third party code in kernel interfaces between extension and host are often poorly docuented and understood no isolation boundary between code and extension extension can access non-public interfaces (reflection) Jaes Larus Abolish Runtie Systes

17 Single Process Architecture All code and data in single address space rely on language and eory safety to isolate coponents dynaic code loading and runtie code generation easy data sharing Xerox PARC (Cedar, Salltalk, etc.) and Lisp Machine odel Java and.net odel as well Runtie is single point of failure shared runti e ust also eet allapplications require ents Java isolates and CLR AppDoains have coplex, shared runtie Rely on garbage collection to reclai resources finalizers Difficult to constraint interactions Jaes Larus Abolish Runtie Systes

18 Isolates and AppDoains are Still Interdependent App App App Runtie Singularity Singularity Overview

19 Singularity Sealed Processes Process OS Kernel Singularity processes are sealed no dynaic code loading or runtie code generation all code present when process starts execution extensions execute in separate processes separate closed environents with well-defined interfaces no shared eory Process is fundaental unit of failure isolation Better: optiization, verification, security, failure handling Jaes Larus Abolish Runtie Systes

20 Size Benefits of Sealed Processes Progra Code Whole Reduces process code size by up to 75%. Code w/ Tree Shake Fewer code paths => better optiization & error analysis % Reduction Kernel 2.37 MB 1.29 MB 46% IDE Disk Driver 1.85 MB 455 KB 75% Web Server 2.73 MB 765 KB 72% Content Extension 2.14 MB 502 KB 77% Jaes Larus Abolish Runtie Systes

21 Need for Lightweight Processes Existing processes rely on expensive hardware virtual eory and protection echaniss VM prevents reference to other processes pages protection prevents unprivileged code fro access syste resources (e.g. VM page tables) Processes are expensive to create and schedule encourages onolithic progra developent large, undifferentiated applications dynaic code loading threading to allow independent control flow Jaes Larus Abolish Runtie Systes

22 Software Isolated Processes (SIPs) Protection and isolation enforced by language safety and kernel API design, not hardware process owns a set of pages allof a process s objects reside on its pages (object space,not address space) language safety ensures process can t create or utate references to other pages Global invariants: no process contains a pointer to another process s object space no pointers fro exchange heap into process P1 P2 P3 Jaes Larus Abolish Runtie Systes

23 Interprocess Counications Channels are strongly typed (value & behavior), bidirectional counications ports essages passing with extensive language support Messages live outside processes, in exchange heap only a single reference to a essage M ailbox se antics enforced by linear types P1 P2 P3 exchange heap Jaes Larus Abolish Runtie Systes

24 Micro Bencharks Athlon (1.8GHz) nforce4 SLI Singularity FreeBSD 5.3 Cost (CPU Cycles) Linux (Red Hat FC4) Windows XP (SP2) Miniu kernel API call Message request/reply Process create & start ,041 13,300 5,800 6, ,000 1,030, ,000 5,380,000 Why? static verification replaces hardware protection all SIPs run in ring 0 Jaes Larus good optiizing copiler (not JIT) Abolish Runtie Systes

25 OS Controls Resources OS owns, allocates, and reclais resources On process terination, OS reclais eory pages and channels not dependent on finalization or garbage collection Clean failure notification sent essages still available to other process Jaes Larus Abolish Runtie Systes

26 Would You Trust Your Syste to a Type Syste? Process integrity depends on type and eory safety currently trust copiler and runtie TAL can eliinate copiler fro trusted coputing base Working on verifying the GC as well Sing# C# source csc sgc MSIL+ x86 Singularity TCB Singularity TCB bartok x86 Singularity safety Singularity syste proof syste copiler verification byte code verification application verification Jaes Larus Abolish Runtie Systes

27 Hardware Protection is Orthogonal SIP-Phys SIP-Page HIP-R0 HIP-R0-S HIP-R3 HIP-R3-S Kernel Syste process Application SIP Kernel doain Non-kernel doain Jaes Larus Abolish Runtie Systes

28 Relative perforance Relative perforance Cost of Hardware & Software Isolation Bartok SIP-Phys SIP-Page HIP-R0 HIP-R0-S HIP-R3 HIP-R3-S WebFiles SIP-Phys SIP-Page HIP-R0 HIP-R0-S HIP-R3 HIP-R3-S Metric Metric Jaes Larus Abolish Runtie Systes

29 processes Challenge 3: Facilitate Verification content extension ext. class library runtie kernel API Jaes Larus web server server class library runtie channels kernel page gr scheduler chan gr proc gr i/o gr HAL TCP/IP stack tcp class library runtie kernel class library runtie network driver driver class library runtie Abolish Runtie Systes Verify process internals (code): type safety object invariants ethod pre- & post- conditions coponent interfaces Verify process externals: channel contract conforance resource access & dependencies Verify syste: counication safety hardware resource conflict free naespace conflict free Static verification: before code runs

30 Exaple: Channel Contracts public contract IoStrea {... state Start : { Open? -> { OK! -> Opened; Error! -> End; } } state Opened : { Read? -> Data! -> Opened; Write? -> OK! -> Opened; Close? -> OK! -> End; } state End;... } Start Open? -> OK! Opened Open? -> Error! Read? -> Data! Write? -> OK! End Close? -> OK! Jaes Larus? = receive! = send Abolish Runtie Systes

31 Exaple: Contract Conforance Contract public contract TcpSocketContract {... state Connected : { Read? -> ReadResultPending; Write? -> WriteResultPending; } GetLocalAddress? -> IPAddress! -> Connected; GetLocalPort? -> Port! -> Connected; DoneSending? -> ReceiveOnly; DoneReceiving? -> SendOnly; Close? -> Closed; Abort? -> Closed; state ReadResultPending : { Data! -> Connected; NoMoreData! -> SendOnly; ReoteClose! -> Zobie; }... }... conn.sendread(); switch receive { case conn.data(readdata) : databuffer.addtotail(readdata); return true; }... Web Server (User) case conn.reoteclose() : return false; Missing Case case conn.nomoredata() : Contract conforance catches subtle errors and coon causes of live-lock statically Jaes Larus Abolish Runtie Systes

32 [DriverCategory] [Signature("/pci/03/00/5333/8811")] Exaple: Configuration Specifications class S3Trio64Config : DriverCategoryDeclaration { [IoMeoryRange(0, Length = 0x400000)] IoMeoryRange fraebuffer; requires PCI Device requires 4MB frae buffer (fro in PCI config) requires syste console buffer [IoFixedMeoryRange(Base = 0xb8000, Length = 0x8000)] IoMeoryRange textbuffer; requires VGA I/O ports... [IoFixedPortRange(Base = 0x3c0, Length = 0x20)] IoPortRange control; [ExtensionEndpoint(typeof(ExtensionContract.Exp))] TRef<ExtensionContract.Exp:Start> pnp; [ServiceEndpoint(typeof(VideoDeviceContract.Exp))] TRef<ServiceProviderContract.Exp:Start> video;... requires control by plug-and-play syste Provides video capability to syste Jaes Larus Abolish Runtie Systes

33 Specification Used in Many Ways Conflict Driver (Source + Spec) Driver Manifest Syste Manifest 1. Load driver 2. Allocate I/O objects File Sys. 3. Create channels Disk Driver driver class library runtie kernel page gr scheduler chan gr proc gr i/o gr HAL kernel class library runtie Singularity Overview Abolish Runtie Systes 33

34 Conclusion How can w e funda entally i prove the dependability of today s softw are and platfors? Tie to rethink language, OS, and syste architecture assuptions O S should controlapplication s execution environ ent new echaniss to enhance syste integrity, verifiability, and dependability Prograing languages and runties are central to iproving software Singularity is a coplete (but siple) syste uses safe languages all the way down to the hardware changes OS architecture iprove syste integrity and verification eliinate wasteful duplication verifies any ore aspects of syste behavior Jaes Larus Abolish Runtie Systes

35 Two roads diverged in a wood, and I I took the one less traveled by, And that has ade all the difference. Robert Frost Jaes Larus Abolish Runtie Systes

36 Large, Diverse Research Tea Lead by Galen Hunt and Ji Larus MSR Cabridge Paul Barha, Richard Black, Ti Harris, Rebecca Isaacs, Dushyanth Narayanan MSR Redond Advanced Copiler Technology Group: Juan Chen, Qunyan Mangus, Mark Plesko, Bjarne Steensgaard, David Tarditi Foundations of Software Engineering Group: Wolfgang Grieskap Operating Systes Group: Mark Aiken, Chris Hawblitzel, Orion Hodson, Galen Hunt, Steven Levi Security and Distributed Systes: Dan Sion, Brian Zill Software Design and Ipleentation Group: John DeTreville, Ben Zorn Software Iproveent Group: Manuel Fahndrich, Jaes Larus, Srira Rajaani, Jakob Rehof MSR Silicon Valley Martin Abadi, Andrew Birrell, Ulfar Erlingsson, Roy Levin, Nick Murphy, Ted Wobber

Using the Singularity Research Development Kit

Using the Singularity Research Development Kit Using the Research Development Kit James Larus & Galen Hunt Microsoft Research ASPLOS 08 Tutorial March 1, 2008 Outline Overview (Jim) Rationale & key decisions architecture Details (Galen) Safe Languages

More information

Singularity: Designing Be1er So3ware

Singularity: Designing Be1er So3ware : Designing Be1er So3ware James Larus Microso. Research CAV July 10, 2008 MSR s Decade of Tools Progress (and Frustra?on) MSR has researched, developed, and deployed programming tools for 10+ years Struggle

More information

Singularity Reviewed an Operating System Challenging Common Concepts

Singularity Reviewed an Operating System Challenging Common Concepts an Operating System Challenging Common Concepts by Lothar Schäfer lothar.schaefer@sbg.ac.at Overview Singularity is a research operating system at Microsoft Research. The project started in 2003 and is

More information

The Singularity System

The Singularity System doi:1145/1787234.1787253 Safe, modern programming languages let Microsoft rethink the architectural trade-offs in its experimental operating system. by James Larus and Galen Hunt The Singularity System

More information

Singularity Part 2. Jeff Chase

Singularity Part 2. Jeff Chase Singularity Part 2 Jeff Chase Today Singularity: abstractions How do processes interact? Communicate / share Combine (De)compose Extend How to invoke the kernel? User processes / VAS / segments kernel

More information

Sealing OS Processes to Improve Dependability and Security

Sealing OS Processes to Improve Dependability and Security Sealing OS Processes to Improve Dependability and Security Galen Hunt, Mark Aiken, Paul Barham, Manuel Fähndrich, Chris Hawblitzel, Orion Hodson, James Larus, Steven Levi, Nick Murphy, Bjarne Steensgaard,

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Singularity Technical Report 1: Singularity Design Motivation

Singularity Technical Report 1: Singularity Design Motivation Singularity Technical Report 1: Singularity Design Motivation Galen C. Hunt James R. Larus December 17, 2004 MSR-TR-2004-105 Microsoft Research Microsoft Corporation One Microsoft Way Redmond, WA 98052

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

6.828: OS/Language Co-design. Adam Belay

6.828: OS/Language Co-design. Adam Belay 6.828: OS/Language Co-design Adam Belay Singularity An experimental research OS at Microsoft in the early 2000s Many people and papers, high profile project Influenced by experiences at

More information

I-0 Introduction. I-1 Introduction. Objectives: Quote:

I-0 Introduction. I-1 Introduction. Objectives: Quote: I-0 Introduction Objectives: Explain necessity of parallel/ultithreaded algoriths Describe different fors of parallel processing Present coonly used architectures Introduce a few basic ters Coents: Try

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National

More information

Reusability Analysis for Shipbuilding Components Modeled in XML and Java

Reusability Analysis for Shipbuilding Components Modeled in XML and Java Reusability Analysis for Shipbuilding Coponents Modeled in XML and Java Prof. Steven A. Deurjian, Sr., Jeffrey R. Ellis, Rodrigo Caballero, Hai Lin, and Xiaopei Wang Coputer Science & Engineering Departent

More information

RISCV with Sanctum Enclaves. Victor Costan, Ilia Lebedev, Srini Devadas

RISCV with Sanctum Enclaves. Victor Costan, Ilia Lebedev, Srini Devadas RISCV with Sanctum Enclaves Victor Costan, Ilia Lebedev, Srini Devadas Today, privilege implies trust (1/3) If computing remotely, what is the TCB? Priviledge CPU HW Hypervisor trusted computing base OS

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

Construction and Reconfiguration of a Component-based Embedded JVM

Construction and Reconfiguration of a Component-based Embedded JVM IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 2008 29 Construction and Reconfiguration of a Component-based Embedded JVM Hiroo Ishikawa and Tatsuo Nakajima, Department

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Proceedings of the First Symposium on Networked Systems Design and Implementation

Proceedings of the First Symposium on Networked Systems Design and Implementation USENIX Association Proceedings of the First Syposiu on Networked Systes Design and Ipleentation San Francisco, CA, USA March 29 31, 2004 2004 by The USENIX Association All Rights Reserved For ore inforation

More information

Database Design on Customer Relationship Management System Yanmei Wang

Database Design on Customer Relationship Management System Yanmei Wang 2nd International Conference on Econoics, Social Science, Arts, Education and Manageent Engineering (ESSAEME 2016) Database Design on Custoer Relationship Manageent Syste Yanei Wang College of Inforation

More information

Available online at Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012

Available online at   Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012 Available online at www.sciencedirect.co Procedia Coputer Science 9 (2012 ) 1363 1370 Abstract International Conference on Coputational Science, ICCS 2012 Reachability Analysis of Concurrent Boolean Progras

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Agenda. Threads. Single and Multi-threaded Processes. What is Thread. CSCI 444/544 Operating Systems Fall 2008

Agenda. Threads. Single and Multi-threaded Processes. What is Thread. CSCI 444/544 Operating Systems Fall 2008 Agenda Threads CSCI 444/544 Operating Systems Fall 2008 Thread concept Thread vs process Thread implementation - user-level - kernel-level - hybrid Inter-process (inter-thread) communication What is Thread

More information

Nooks. Robert Grimm New York University

Nooks. Robert Grimm New York University Nooks Robert Grimm New York University The Three Questions What is the problem? What is new or different? What are the contributions and limitations? Design and Implementation Nooks Overview An isolation

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Influential OS Research Security. Michael Raitza

Influential OS Research Security. Michael Raitza Influential OS Research Security Michael Raitza raitza@os.inf.tu-dresden.de 1 Security recap Various layers of security Application System Communication Aspects of security Access control / authorization

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

Recursion-Driven Parallel Code Generation for Multi-Core Platforms

Recursion-Driven Parallel Code Generation for Multi-Core Platforms Recursion-Driven Parallel Generation for Multi- Platfors Rebecca L. Collins, Bharadwaj Vellore, and Luca P. Carloni Departent of Coputer Science, Colubia University, New York, NY 10027 Eail: {rlc2119,vrb2102,luca}@cs.colubia.edu

More information

1 P a g e. F x,x...,x,.,.' written as F D, is the same.

1 P a g e. F x,x...,x,.,.' written as F D, is the same. 11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Modeling Page Replacement: Stack Algorithms. Design Issues for Paging Systems

Modeling Page Replacement: Stack Algorithms. Design Issues for Paging Systems Modeling Page Replacement: Stack Algorithms 7 4 6 5 State of memory array, M, after each item in reference string is processed CS450/550 Memory.45 Design Issues for Paging Systems Local page replacement

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Interoperability/ Conformance Test dpmr Mode 2 Repeater

Interoperability/ Conformance Test dpmr Mode 2 Repeater Interoperability/ Conforance Test dpmr Mode 2 Repeater IOP test Mode 2 Repeater Copyright 2013 dpmr Association All Rights Reserved Version 1.0 0 Revision History Version Date Change By 0v1 16 Oct 2012

More information

Machine-Independent Virtual Memory Management for Paged June Uniprocessor 1st, 2010and Multiproce 1 / 15

Machine-Independent Virtual Memory Management for Paged June Uniprocessor 1st, 2010and Multiproce 1 / 15 Machine-Independent Virtual Memory Management for Paged Uniprocessor and Multiprocessor Architectures Matthias Lange TU Berlin June 1st, 2010 Machine-Independent Virtual Memory Management for Paged June

More information

Grading Results Total 100

Grading Results Total 100 University of California, Berkeley College of Engineering Departent of Electrical Engineering and Coputer Sciences Fall 2003 Instructor: Dave Patterson 2003-11-19 v1.9 CS 152 Exa #2 Solutions Personal

More information

INFLUENTIAL OS RESEARCH

INFLUENTIAL OS RESEARCH INFLUENTIAL OS RESEARCH Multiprocessors Jan Bierbaum Tobias Stumpf SS 2017 ROADMAP Roadmap Multiprocessor Architectures Usage in the Old Days (mid 90s) Disco Present Age Research The Multikernel Helios

More information

Generalised Mixin-based Inheritance to Support Multiple Inheritance

Generalised Mixin-based Inheritance to Support Multiple Inheritance Vrije Universiteit russel Faculteit Wetenschappen VRIJE UNIVERSITEIT RUSSEL SCI EN T I V INCERE T ENE R S Generalised Mixin-based Inheritance to Support Multiple Inheritance Niels oyen, Carine Lucas, Patrick

More information

The Convergence of Storage and Server Virtualization Solarflare Communications, Inc.

The Convergence of Storage and Server Virtualization Solarflare Communications, Inc. The Convergence of Storage and Server Virtualization 2007 Solarflare Communications, Inc. About Solarflare Communications Privately-held, fabless semiconductor company. Founded 2001 Top tier investors:

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

(12) United States Patent Kumar et al.

(12) United States Patent Kumar et al. (12) United States Patent Kuar et al. US006795434B1 (10) Patent N0.: (45) Date of Patent: US 6,795,434 B1 Sep. 21, 2004 (54) REPLICATED SERVER DISCOVERY IN CLIENT-PROXY SERVERS (75) Inventors: Harlharan

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2 2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Database Design on Mechanical Equipent Manageent Syste Zheng Qiu, Wu kaiyuan, Wu Chengyan, Liu Lei2

More information

Windows History 2009 Windows 7 2

Windows History 2009 Windows 7 2 Example: Windows 1 Windows History 2009 Windows 7 2 Features added Windows2000 additions Plug-and-play Network directory service New GUI Vista additions New GUI More focus on security clean-up the code

More information

Predicting x86 Program Runtime for Intel Processor

Predicting x86 Program Runtime for Intel Processor Predicting x86 Progra Runtie for Intel Processor Behra Mistree, Haidreza Haki Javadi, Oid Mashayekhi Stanford University bistree,hrhaki,oid@stanford.edu 1 Introduction Progras can be equivalent: given

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

Virtualization, Xen and Denali

Virtualization, Xen and Denali Virtualization, Xen and Denali Susmit Shannigrahi November 9, 2011 Susmit Shannigrahi () Virtualization, Xen and Denali November 9, 2011 1 / 70 Introduction Virtualization is the technology to allow two

More information

Operating System Structure

Operating System Structure Operating System Structure Joey Echeverria joey42+os@gmail.com December 6, 2004 Carnegie Mellon University: 15-410 Fall 2004 Overview Motivations Kernel Structures Monolithic Kernels Open Systems Microkernels

More information

Fiji VM Safety Critical Java

Fiji VM Safety Critical Java Fiji VM Safety Critical Java Filip Pizlo, President Fiji Systems Inc. Introduction Java is a modern, portable programming language with wide-spread adoption. Goal: streamlining debugging and certification.

More information

Operating-System Structures

Operating-System Structures Operating-System Structures Chapter 2 Operating System Services One set provides functions that are helpful to the user: User interface Program execution I/O operations File-system manipulation Communications

More information

The Z Garbage Collector Low Latency GC for OpenJDK

The Z Garbage Collector Low Latency GC for OpenJDK The Z Garbage Collector Low Latency GC for OpenJDK Per Lidén & Stefan Karlsson HotSpot Garbage Collection Team Jfokus VM Tech Summit 2018 Safe Harbor Statement The following is intended to outline our

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

Data Engine for NoSQL - IBM Power Systems Edition White Paper and Technical Reference

Data Engine for NoSQL - IBM Power Systems Edition White Paper and Technical Reference Data Engine for NoSQL - IBM Power Systes Edition and Technical Reference Brad Brech Juan Rubio Michael Hollinger IBM Systes Group June 2015 Data Engine for NoSQL Power Systes Edition Contents Data Engine

More information

The Slide does not contain all the information and cannot be treated as a study material for Operating System. Please refer the text book for exams.

The Slide does not contain all the information and cannot be treated as a study material for Operating System. Please refer the text book for exams. The Slide does not contain all the information and cannot be treated as a study material for Operating System. Please refer the text book for exams. Operating System Services User Operating System Interface

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

ThinkServer OS AnD virtualization OPTiOnS

ThinkServer OS AnD virtualization OPTiOnS ThinkServer OS AND VIRTUALIZATION OPTIONS Windows Server 2012 R2 ThinkServer systes power business-critical deployents with world-class quality and innovation. Microsoft server software delivers productivity

More information

Back To The Future: A Radical Insecure Design of KVM on ARM

Back To The Future: A Radical Insecure Design of KVM on ARM Back To The Future: A Radical Insecure Design of KVM on ARM Abstract In ARM, there are certain instructions that generate exceptions. Such instructions are typically executed to request a service from

More information

Cloud Programming James Larus Microsoft Research. July 13, 2010

Cloud Programming James Larus Microsoft Research. July 13, 2010 Cloud Programming James Larus Microsoft Research July 13, 2010 New Programming Model, New Problems (and some old, unsolved ones) Concurrency Parallelism Message passing Distribution High availability Performance

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

CSE 4/521 Introduction to Operating Systems. Lecture 29 Windows 7 (History, Design Principles, System Components, Programmer Interface) Summer 2018

CSE 4/521 Introduction to Operating Systems. Lecture 29 Windows 7 (History, Design Principles, System Components, Programmer Interface) Summer 2018 CSE 4/521 Introduction to Operating Systems Lecture 29 Windows 7 (History, Design Principles, System Components, Programmer Interface) Summer 2018 Overview Objective: To explore the principles upon which

More information

Safely and Efficiently Programming a 64kB Computer

Safely and Efficiently Programming a 64kB Computer Safely and Efficiently Programming a 64kB Computer Amit Levy a, Branden Ghena b, Bradford Campbell b, Pat Pannuto b, Prabal Dutta b, Philip Levis a MSR UW Summer Institute August 2, 2017 a University b

More information

GPU-Based Speculative Query Processing for Database Operations

GPU-Based Speculative Query Processing for Database Operations GPU-Based Speculative Query Processing for Database Operations Peter Benjain Volk Dirk Habich Technisch Universiät Dresden Technisch Universiät Dresden peter.benjain.volk@inf.tudresden.de dirk.habich@tudresden.de

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Chapter 2: Operating-System Structures. Operating System Concepts Essentials 8 th Edition

Chapter 2: Operating-System Structures. Operating System Concepts Essentials 8 th Edition Chapter 2: Operating-System Structures Operating System Concepts Essentials 8 th Edition Silberschatz, Galvin and Gagne 2011 Chapter 2: Operating-System Structures Operating System Services User Operating

More information

Copyright Khronos Group Page 1. Vulkan Overview. June 2015

Copyright Khronos Group Page 1. Vulkan Overview. June 2015 Copyright Khronos Group 2015 - Page 1 Vulkan Overview June 2015 Copyright Khronos Group 2015 - Page 2 Khronos Connects Software to Silicon Open Consortium creating OPEN STANDARD APIs for hardware acceleration

More information

A Research of MapReduce with GPU Acceleration

A Research of MapReduce with GPU Acceleration A Research of MapReduce with GPU Acceleration Miao Xin 1, Hao Li 2, Joan Lu 2 1 School of Inforation Science and Engineering, Yunnan University, Kuning, Yunnan, China 2 School of Software, Yunnan University,

More information

Chapter 2: Operating-System

Chapter 2: Operating-System Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services! User Operating System Interface! System Calls! Types of System Calls! System Programs! Operating

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

Chapter 4: Threads. Overview Multithreading Models Thread Libraries Threading Issues Operating System Examples Windows XP Threads Linux Threads

Chapter 4: Threads. Overview Multithreading Models Thread Libraries Threading Issues Operating System Examples Windows XP Threads Linux Threads Chapter 4: Threads Overview Multithreading Models Thread Libraries Threading Issues Operating System Examples Windows XP Threads Linux Threads Chapter 4: Threads Objectives To introduce the notion of a

More information

Chapter 3: Operating-System Structures

Chapter 3: Operating-System Structures 1 Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1

More information

Efficient Software Based Fault Isolation. Software Extensibility

Efficient Software Based Fault Isolation. Software Extensibility Efficient Software Based Fault Isolation Robert Wahbe, Steven Lucco Thomas E. Anderson, Susan L. Graham Software Extensibility Operating Systems Kernel modules Device drivers Unix vnodes Application Software

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

! Software ( kernel ) that runs at all times. ! OS performs two unrelated functions: Maria Hybinette, UGA. user! 1! Maria Hybinette, UGA. user! n!

! Software ( kernel ) that runs at all times. ! OS performs two unrelated functions: Maria Hybinette, UGA. user! 1! Maria Hybinette, UGA. user! n! Review: What is An Operating System?! Software ( ) that runs at all times CSCI 6730 / 4730 Operating Systems Structures & System Design» Really, the part of the that runs in (or need to).» But note - there

More information

Modeling Heap Data Growth Using Average Liveness

Modeling Heap Data Growth Using Average Liveness Modeling Heap Data Growth Using Average Liveness Pengcheng Li, Chen Ding and Hao Luo Departent of Coputer Science, University of Rochester, Rochester, NY14627, USA {pli, cding, hluo}@cs.rochester.edu Abstract

More information

An Architecture for a Distributed Deductive Database System

An Architecture for a Distributed Deductive Database System IEEE TENCON '93 / B eih An Architecture for a Distributed Deductive Database Syste M. K. Mohania N. L. Sarda bept. of Coputer Science and Engineering, Indian Institute of Technology, Bobay 400 076, INDIA

More information

Annexure- (Modified) 07

Annexure- (Modified) 07 RFP for Selection of Service Provider for Panchdeep O&M (Annexure-07) Annexure- (Modified) 07 Profile of Software Manpower required for nology proveent, Additional Software Functionalities Developent Change

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

Distributed Systems Operation System Support

Distributed Systems Operation System Support Hajussüsteemid MTAT.08.009 Distributed Systems Operation System Support slides are adopted from: lecture: Operating System(OS) support (years 2016, 2017) book: Distributed Systems: Concepts and Design,

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Virtual Memory. Reading: Silberschatz chapter 10 Reading: Stallings. chapter 8 EEL 358

Virtual Memory. Reading: Silberschatz chapter 10 Reading: Stallings. chapter 8 EEL 358 Virtual Memory Reading: Silberschatz chapter 10 Reading: Stallings chapter 8 1 Outline Introduction Advantages Thrashing Principal of Locality VM based on Paging/Segmentation Combined Paging and Segmentation

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

Operating System Architecture. CS3026 Operating Systems Lecture 03

Operating System Architecture. CS3026 Operating Systems Lecture 03 Operating System Architecture CS3026 Operating Systems Lecture 03 The Role of an Operating System Service provider Provide a set of services to system users Resource allocator Exploit the hardware resources

More information

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1

Windows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1 Windows 7 Overview Windows 7 Overview By Al Lake History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface Lake 2 Objectives To explore the principles

More information

From DSL to HPC Component-Based Runtime: A Multi-Stencil DSL Case Study

From DSL to HPC Component-Based Runtime: A Multi-Stencil DSL Case Study Fro DSL to HPC Coponent-Based Runtie: A Multi-Stencil DSL Case Study Julien Bigot, Hélène Coullon, Christian Pérez To cite this version: Julien Bigot, Hélène Coullon, Christian Pérez. Fro DSL to HPC Coponent-Based

More information

The benefits and costs of writing a POSIX kernel in a high-level language

The benefits and costs of writing a POSIX kernel in a high-level language 1 / 38 The benefits and costs of writing a POSIX kernel in a high-level language Cody Cutler, M. Frans Kaashoek, Robert T. Morris MIT CSAIL Should we use high-level languages to build OS kernels? 2 / 38

More information

Lecture 1 Introduction to Android. App Development for Mobile Devices. App Development for Mobile Devices. Announcement.

Lecture 1 Introduction to Android. App Development for Mobile Devices. App Development for Mobile Devices. Announcement. CSCE 315: Android Lectures (1/2) Dr. Jaerock Kwon App Development for Mobile Devices Jaerock Kwon, Ph.D. Assistant Professor in Computer Engineering App Development for Mobile Devices Jaerock Kwon, Ph.D.

More information

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,

More information

Spring It takes a really bad school to ruin a good student and a really fantastic school to rescue a bad student. Dennis J.

Spring It takes a really bad school to ruin a good student and a really fantastic school to rescue a bad student. Dennis J. Operating Systems * *Throughout the course we will use overheads that were adapted from those distributed from the textbook website. Slides are from the book authors, modified and selected by Jean Mayo,

More information

CS162 - Operating Systems and Systems Programming. Address Translation => Paging"

CS162 - Operating Systems and Systems Programming. Address Translation => Paging CS162 - Operating Systems and Systems Programming Address Translation => Paging" David E. Culler! http://cs162.eecs.berkeley.edu/! Lecture #15! Oct 3, 2014!! Reading: A&D 8.1-2, 8.3.1. 9.7 HW 3 out (due

More information

Operating System Structure

Operating System Structure Operating System Structure Joey Echeverria joey42+os@gmail.com April 18, 2005 Carnegie Mellon University: 15-410 Spring 2005 Overview Motivations Kernel Structures Monolithic Kernels Open Systems Microkernels

More information

Chapter 2: Operating-System Structures

Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls (important!) Types of System Calls (important!) System

More information

Operating System Security

Operating System Security Operating System Security Operating Systems Defined Hardware: I/o...Memory.CPU Operating Systems: Windows or Android, etc Applications run on operating system Operating Systems Makes it easier to use resources.

More information