Abolish Runtime Systems!
|
|
- Daniella Johnston
- 5 years ago
- Views:
Transcription
1 Abolish Runtie Systes! Operating Systes Should Control the Execution Environent Jaes Larus Microsoft Research Second International Conference on Virtual Execution Environents June 14, 2006
2 If you coe to a fork in the road, take it. Yogi Berra Jaes Larus Abolish Runtie Systes
3 Crossroad for Languages Jaes Larus Abolish Runtie Systes
4 Abstraction Jaes Larus Abolish Runtie Systes
5 Why Did it Turn Out this Way? Abstraction is good sipler to build runtie on OS than bare hardware ore work to ipleent OS + runtie Liited eory and processor cycles liit language abitions Good OS perforance difficult on liited hardware Expertise and goals languages/systes researchers Copatibility/interoperability existing software and languages Portable platfor was an unfilled niche any processors, any O S es Jaes Larus Abolish Runtie Systes
6 Not the Right Path Language/runtie iproveents do not benefit OS or syste software Duplicate functionality runtie reipleents OS features Elaborate runties increase cost of language safety decrease attractiveness of better languages Foreclose innovation in syste architecture cannot trust software properties rely on hardware for isolation and protection Jaes Larus Abolish Runtie Systes
7 Singularity Project Microsoft Research project Galen Hunt & Ji Larus & any others basis for building ore dependable software attack dependable fro ultiple perspectives New OS, languages, and tools working research prototype not Windows or CLR replaceent no copatibility No single agic bullet utually reinforcing iproveents to languages and copilers, systes, and tools Jaes Larus Abolish Runtie Systes
8 Key Directions 1. Use safe prograing languages everywhere safe = type safe and eory safe (like C# or Java) applications, extensions, OS services, device drivers, kernel 2. Iprove syste resilience despite software errors failure containent boundaries between coponents and extensions explicit failure notification odel 3. Architecture supports verification specify and check behavior at any levels of abstraction core OS architecture facilitates static verification Jaes Larus Abolish Runtie Systes
9 processes Singularity OS content extension ext. class library runtie web server server class library runtie channels TCP/IP stack tcp class library runtie network driver driver class library runtie Safe icro-kernel 95% written in C# 17% of files contain unsafe C# 5% of files contain x86 as or C++ kernel sealed at boot tie services & device drivers in processes Software isolated processes (SIPs) all user code is verified safe soe unsafe code in trusted runtie processes sealed at start tie kernel API kernel page gr scheduler chan gr proc gr i/o gr kernel class library runtie Safe and efficient counication via strong interfaces (channels) channel behavior is specified, checked. checked behavior allows us to ake counication efficient Type safety is key to verification and protection HAL Jaes Larus Abolish Runtie Systes
10 Written in extended C# Challenge 1: Pervasive Safe Languages actually Spec# (C# + pre/post-conditions and invariants) Added features for systes prograing increase prograer control over allocation, initialization, and eory layout Explore language design to support prograing and verification essage passing factoring libraries into coposable pieces copile-tie reflection Jaes Larus Abolish Runtie Systes
11 What About The Runtie? JVM & CLR s design not always appropriate rich runti e ( one size fits all ) onolithic, general-purpose environent large eory footprints (~4 MB process for CLR) any dependencies (CLR PAL requires >300 Win32 APIs) JIT copilation increases runtie size and coplexity unpredictable perforance replicate OS functionality security, threading, configuration, etc. ore is less Jaes Larus Abolish Runtie Systes
12 Singularity Runtie Libraries Singularity Process Application Whole Bartok Progra Optiization Copiler x86 Executable Singularity Runtie (GC, etc.) TAL Proof Jaes Larus Abolish Runtie Systes
13 Sall, Custoizable Runtie Sall execution environent ahead-of-tie, global optiizing copiler (MSR Bartok) specializes runtie and libraries eliinate code for unused/disabled language features and unused application/library code factorable runtie and libraries Runtie, garbage collector, and libraries selectable on per-process basis reduce eory and coputation overhead enforce design discipline and syste policies per process Eliinate OS functionality fro runtie security, resource allocation, etc. Provide OS echanis for enforcing syste policy runtie can constrain behavior (e.g. driver environent) Jaes Larus Abolish Runtie Systes
14 Challenge 2: Iprove Resilience Software errors should not cause syste failure A resilient syste architecture should isolate syste coponents to prevent data corruption provide clear failure notification ipleent policy for restarting failed coponent Jaes Larus Abolish Runtie Systes
15 Process Architectures Process App OS OS Kernel Jaes Larus Abolish Runtie Systes
16 Open Process Architecture Open processes dynaic code loading and runtie code generation DLLs, Java class loading, browser plug-ins, device drivers in kernel, etc. cross-process eory sharing syste API allows one process to alter state of another Near ubiquitous (Windows, Unix, etc.) originated in Multics Shared state reduces dependability 85% of Windows crashes are caused by third party code in kernel interfaces between extension and host are often poorly docuented and understood no isolation boundary between code and extension extension can access non-public interfaces (reflection) Jaes Larus Abolish Runtie Systes
17 Single Process Architecture All code and data in single address space rely on language and eory safety to isolate coponents dynaic code loading and runtie code generation easy data sharing Xerox PARC (Cedar, Salltalk, etc.) and Lisp Machine odel Java and.net odel as well Runtie is single point of failure shared runti e ust also eet allapplications require ents Java isolates and CLR AppDoains have coplex, shared runtie Rely on garbage collection to reclai resources finalizers Difficult to constraint interactions Jaes Larus Abolish Runtie Systes
18 Isolates and AppDoains are Still Interdependent App App App Runtie Singularity Singularity Overview
19 Singularity Sealed Processes Process OS Kernel Singularity processes are sealed no dynaic code loading or runtie code generation all code present when process starts execution extensions execute in separate processes separate closed environents with well-defined interfaces no shared eory Process is fundaental unit of failure isolation Better: optiization, verification, security, failure handling Jaes Larus Abolish Runtie Systes
20 Size Benefits of Sealed Processes Progra Code Whole Reduces process code size by up to 75%. Code w/ Tree Shake Fewer code paths => better optiization & error analysis % Reduction Kernel 2.37 MB 1.29 MB 46% IDE Disk Driver 1.85 MB 455 KB 75% Web Server 2.73 MB 765 KB 72% Content Extension 2.14 MB 502 KB 77% Jaes Larus Abolish Runtie Systes
21 Need for Lightweight Processes Existing processes rely on expensive hardware virtual eory and protection echaniss VM prevents reference to other processes pages protection prevents unprivileged code fro access syste resources (e.g. VM page tables) Processes are expensive to create and schedule encourages onolithic progra developent large, undifferentiated applications dynaic code loading threading to allow independent control flow Jaes Larus Abolish Runtie Systes
22 Software Isolated Processes (SIPs) Protection and isolation enforced by language safety and kernel API design, not hardware process owns a set of pages allof a process s objects reside on its pages (object space,not address space) language safety ensures process can t create or utate references to other pages Global invariants: no process contains a pointer to another process s object space no pointers fro exchange heap into process P1 P2 P3 Jaes Larus Abolish Runtie Systes
23 Interprocess Counications Channels are strongly typed (value & behavior), bidirectional counications ports essages passing with extensive language support Messages live outside processes, in exchange heap only a single reference to a essage M ailbox se antics enforced by linear types P1 P2 P3 exchange heap Jaes Larus Abolish Runtie Systes
24 Micro Bencharks Athlon (1.8GHz) nforce4 SLI Singularity FreeBSD 5.3 Cost (CPU Cycles) Linux (Red Hat FC4) Windows XP (SP2) Miniu kernel API call Message request/reply Process create & start ,041 13,300 5,800 6, ,000 1,030, ,000 5,380,000 Why? static verification replaces hardware protection all SIPs run in ring 0 Jaes Larus good optiizing copiler (not JIT) Abolish Runtie Systes
25 OS Controls Resources OS owns, allocates, and reclais resources On process terination, OS reclais eory pages and channels not dependent on finalization or garbage collection Clean failure notification sent essages still available to other process Jaes Larus Abolish Runtie Systes
26 Would You Trust Your Syste to a Type Syste? Process integrity depends on type and eory safety currently trust copiler and runtie TAL can eliinate copiler fro trusted coputing base Working on verifying the GC as well Sing# C# source csc sgc MSIL+ x86 Singularity TCB Singularity TCB bartok x86 Singularity safety Singularity syste proof syste copiler verification byte code verification application verification Jaes Larus Abolish Runtie Systes
27 Hardware Protection is Orthogonal SIP-Phys SIP-Page HIP-R0 HIP-R0-S HIP-R3 HIP-R3-S Kernel Syste process Application SIP Kernel doain Non-kernel doain Jaes Larus Abolish Runtie Systes
28 Relative perforance Relative perforance Cost of Hardware & Software Isolation Bartok SIP-Phys SIP-Page HIP-R0 HIP-R0-S HIP-R3 HIP-R3-S WebFiles SIP-Phys SIP-Page HIP-R0 HIP-R0-S HIP-R3 HIP-R3-S Metric Metric Jaes Larus Abolish Runtie Systes
29 processes Challenge 3: Facilitate Verification content extension ext. class library runtie kernel API Jaes Larus web server server class library runtie channels kernel page gr scheduler chan gr proc gr i/o gr HAL TCP/IP stack tcp class library runtie kernel class library runtie network driver driver class library runtie Abolish Runtie Systes Verify process internals (code): type safety object invariants ethod pre- & post- conditions coponent interfaces Verify process externals: channel contract conforance resource access & dependencies Verify syste: counication safety hardware resource conflict free naespace conflict free Static verification: before code runs
30 Exaple: Channel Contracts public contract IoStrea {... state Start : { Open? -> { OK! -> Opened; Error! -> End; } } state Opened : { Read? -> Data! -> Opened; Write? -> OK! -> Opened; Close? -> OK! -> End; } state End;... } Start Open? -> OK! Opened Open? -> Error! Read? -> Data! Write? -> OK! End Close? -> OK! Jaes Larus? = receive! = send Abolish Runtie Systes
31 Exaple: Contract Conforance Contract public contract TcpSocketContract {... state Connected : { Read? -> ReadResultPending; Write? -> WriteResultPending; } GetLocalAddress? -> IPAddress! -> Connected; GetLocalPort? -> Port! -> Connected; DoneSending? -> ReceiveOnly; DoneReceiving? -> SendOnly; Close? -> Closed; Abort? -> Closed; state ReadResultPending : { Data! -> Connected; NoMoreData! -> SendOnly; ReoteClose! -> Zobie; }... }... conn.sendread(); switch receive { case conn.data(readdata) : databuffer.addtotail(readdata); return true; }... Web Server (User) case conn.reoteclose() : return false; Missing Case case conn.nomoredata() : Contract conforance catches subtle errors and coon causes of live-lock statically Jaes Larus Abolish Runtie Systes
32 [DriverCategory] [Signature("/pci/03/00/5333/8811")] Exaple: Configuration Specifications class S3Trio64Config : DriverCategoryDeclaration { [IoMeoryRange(0, Length = 0x400000)] IoMeoryRange fraebuffer; requires PCI Device requires 4MB frae buffer (fro in PCI config) requires syste console buffer [IoFixedMeoryRange(Base = 0xb8000, Length = 0x8000)] IoMeoryRange textbuffer; requires VGA I/O ports... [IoFixedPortRange(Base = 0x3c0, Length = 0x20)] IoPortRange control; [ExtensionEndpoint(typeof(ExtensionContract.Exp))] TRef<ExtensionContract.Exp:Start> pnp; [ServiceEndpoint(typeof(VideoDeviceContract.Exp))] TRef<ServiceProviderContract.Exp:Start> video;... requires control by plug-and-play syste Provides video capability to syste Jaes Larus Abolish Runtie Systes
33 Specification Used in Many Ways Conflict Driver (Source + Spec) Driver Manifest Syste Manifest 1. Load driver 2. Allocate I/O objects File Sys. 3. Create channels Disk Driver driver class library runtie kernel page gr scheduler chan gr proc gr i/o gr HAL kernel class library runtie Singularity Overview Abolish Runtie Systes 33
34 Conclusion How can w e funda entally i prove the dependability of today s softw are and platfors? Tie to rethink language, OS, and syste architecture assuptions O S should controlapplication s execution environ ent new echaniss to enhance syste integrity, verifiability, and dependability Prograing languages and runties are central to iproving software Singularity is a coplete (but siple) syste uses safe languages all the way down to the hardware changes OS architecture iprove syste integrity and verification eliinate wasteful duplication verifies any ore aspects of syste behavior Jaes Larus Abolish Runtie Systes
35 Two roads diverged in a wood, and I I took the one less traveled by, And that has ade all the difference. Robert Frost Jaes Larus Abolish Runtie Systes
36 Large, Diverse Research Tea Lead by Galen Hunt and Ji Larus MSR Cabridge Paul Barha, Richard Black, Ti Harris, Rebecca Isaacs, Dushyanth Narayanan MSR Redond Advanced Copiler Technology Group: Juan Chen, Qunyan Mangus, Mark Plesko, Bjarne Steensgaard, David Tarditi Foundations of Software Engineering Group: Wolfgang Grieskap Operating Systes Group: Mark Aiken, Chris Hawblitzel, Orion Hodson, Galen Hunt, Steven Levi Security and Distributed Systes: Dan Sion, Brian Zill Software Design and Ipleentation Group: John DeTreville, Ben Zorn Software Iproveent Group: Manuel Fahndrich, Jaes Larus, Srira Rajaani, Jakob Rehof MSR Silicon Valley Martin Abadi, Andrew Birrell, Ulfar Erlingsson, Roy Levin, Nick Murphy, Ted Wobber
Using the Singularity Research Development Kit
Using the Research Development Kit James Larus & Galen Hunt Microsoft Research ASPLOS 08 Tutorial March 1, 2008 Outline Overview (Jim) Rationale & key decisions architecture Details (Galen) Safe Languages
More informationSingularity: Designing Be1er So3ware
: Designing Be1er So3ware James Larus Microso. Research CAV July 10, 2008 MSR s Decade of Tools Progress (and Frustra?on) MSR has researched, developed, and deployed programming tools for 10+ years Struggle
More informationSingularity Reviewed an Operating System Challenging Common Concepts
an Operating System Challenging Common Concepts by Lothar Schäfer lothar.schaefer@sbg.ac.at Overview Singularity is a research operating system at Microsoft Research. The project started in 2003 and is
More informationThe Singularity System
doi:1145/1787234.1787253 Safe, modern programming languages let Microsoft rethink the architectural trade-offs in its experimental operating system. by James Larus and Galen Hunt The Singularity System
More informationSingularity Part 2. Jeff Chase
Singularity Part 2 Jeff Chase Today Singularity: abstractions How do processes interact? Communicate / share Combine (De)compose Extend How to invoke the kernel? User processes / VAS / segments kernel
More informationSealing OS Processes to Improve Dependability and Security
Sealing OS Processes to Improve Dependability and Security Galen Hunt, Mark Aiken, Paul Barham, Manuel Fähndrich, Chris Hawblitzel, Orion Hodson, James Larus, Steven Levi, Nick Murphy, Bjarne Steensgaard,
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationSingularity Technical Report 1: Singularity Design Motivation
Singularity Technical Report 1: Singularity Design Motivation Galen C. Hunt James R. Larus December 17, 2004 MSR-TR-2004-105 Microsoft Research Microsoft Corporation One Microsoft Way Redmond, WA 98052
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More information6.828: OS/Language Co-design. Adam Belay
6.828: OS/Language Co-design Adam Belay Singularity An experimental research OS at Microsoft in the early 2000s Many people and papers, high profile project Influenced by experiences at
More informationI-0 Introduction. I-1 Introduction. Objectives: Quote:
I-0 Introduction Objectives: Explain necessity of parallel/ultithreaded algoriths Describe different fors of parallel processing Present coonly used architectures Introduce a few basic ters Coents: Try
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationThe Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network
The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National
More informationReusability Analysis for Shipbuilding Components Modeled in XML and Java
Reusability Analysis for Shipbuilding Coponents Modeled in XML and Java Prof. Steven A. Deurjian, Sr., Jeffrey R. Ellis, Rodrigo Caballero, Hai Lin, and Xiaopei Wang Coputer Science & Engineering Departent
More informationRISCV with Sanctum Enclaves. Victor Costan, Ilia Lebedev, Srini Devadas
RISCV with Sanctum Enclaves Victor Costan, Ilia Lebedev, Srini Devadas Today, privilege implies trust (1/3) If computing remotely, what is the TCB? Priviledge CPU HW Hypervisor trusted computing base OS
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationCarving Differential Unit Test Cases from System Test Cases
Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln
More informationConstruction and Reconfiguration of a Component-based Embedded JVM
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 2008 29 Construction and Reconfiguration of a Component-based Embedded JVM Hiroo Ishikawa and Tatsuo Nakajima, Department
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationProceedings of the First Symposium on Networked Systems Design and Implementation
USENIX Association Proceedings of the First Syposiu on Networked Systes Design and Ipleentation San Francisco, CA, USA March 29 31, 2004 2004 by The USENIX Association All Rights Reserved For ore inforation
More informationDatabase Design on Customer Relationship Management System Yanmei Wang
2nd International Conference on Econoics, Social Science, Arts, Education and Manageent Engineering (ESSAEME 2016) Database Design on Custoer Relationship Manageent Syste Yanei Wang College of Inforation
More informationAvailable online at Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012
Available online at www.sciencedirect.co Procedia Coputer Science 9 (2012 ) 1363 1370 Abstract International Conference on Coputational Science, ICCS 2012 Reachability Analysis of Concurrent Boolean Progras
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationAgenda. Threads. Single and Multi-threaded Processes. What is Thread. CSCI 444/544 Operating Systems Fall 2008
Agenda Threads CSCI 444/544 Operating Systems Fall 2008 Thread concept Thread vs process Thread implementation - user-level - kernel-level - hybrid Inter-process (inter-thread) communication What is Thread
More informationNooks. Robert Grimm New York University
Nooks Robert Grimm New York University The Three Questions What is the problem? What is new or different? What are the contributions and limitations? Design and Implementation Nooks Overview An isolation
More informationPrivacy-preserving String-Matching With PRAM Algorithms
Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationInfluential OS Research Security. Michael Raitza
Influential OS Research Security Michael Raitza raitza@os.inf.tu-dresden.de 1 Security recap Various layers of security Application System Communication Aspects of security Access control / authorization
More informationRECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS
RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationMAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer
MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The
More informationRecursion-Driven Parallel Code Generation for Multi-Core Platforms
Recursion-Driven Parallel Generation for Multi- Platfors Rebecca L. Collins, Bharadwaj Vellore, and Luca P. Carloni Departent of Coputer Science, Colubia University, New York, NY 10027 Eail: {rlc2119,vrb2102,luca}@cs.colubia.edu
More information1 P a g e. F x,x...,x,.,.' written as F D, is the same.
11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando
More informationMAC schemes - Fixed-assignment schemes
MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on
More informationModeling Page Replacement: Stack Algorithms. Design Issues for Paging Systems
Modeling Page Replacement: Stack Algorithms 7 4 6 5 State of memory array, M, after each item in reference string is processed CS450/550 Memory.45 Design Issues for Paging Systems Local page replacement
More informationSecure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals
Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract
More informationInteroperability/ Conformance Test dpmr Mode 2 Repeater
Interoperability/ Conforance Test dpmr Mode 2 Repeater IOP test Mode 2 Repeater Copyright 2013 dpmr Association All Rights Reserved Version 1.0 0 Revision History Version Date Change By 0v1 16 Oct 2012
More informationMachine-Independent Virtual Memory Management for Paged June Uniprocessor 1st, 2010and Multiproce 1 / 15
Machine-Independent Virtual Memory Management for Paged Uniprocessor and Multiprocessor Architectures Matthias Lange TU Berlin June 1st, 2010 Machine-Independent Virtual Memory Management for Paged June
More informationGrading Results Total 100
University of California, Berkeley College of Engineering Departent of Electrical Engineering and Coputer Sciences Fall 2003 Instructor: Dave Patterson 2003-11-19 v1.9 CS 152 Exa #2 Solutions Personal
More informationINFLUENTIAL OS RESEARCH
INFLUENTIAL OS RESEARCH Multiprocessors Jan Bierbaum Tobias Stumpf SS 2017 ROADMAP Roadmap Multiprocessor Architectures Usage in the Old Days (mid 90s) Disco Present Age Research The Multikernel Helios
More informationGeneralised Mixin-based Inheritance to Support Multiple Inheritance
Vrije Universiteit russel Faculteit Wetenschappen VRIJE UNIVERSITEIT RUSSEL SCI EN T I V INCERE T ENE R S Generalised Mixin-based Inheritance to Support Multiple Inheritance Niels oyen, Carine Lucas, Patrick
More informationThe Convergence of Storage and Server Virtualization Solarflare Communications, Inc.
The Convergence of Storage and Server Virtualization 2007 Solarflare Communications, Inc. About Solarflare Communications Privately-held, fabless semiconductor company. Founded 2001 Top tier investors:
More informationDynamical Topology Analysis of VANET Based on Complex Networks Theory
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis
More information(12) United States Patent Kumar et al.
(12) United States Patent Kuar et al. US006795434B1 (10) Patent N0.: (45) Date of Patent: US 6,795,434 B1 Sep. 21, 2004 (54) REPLICATED SERVER DISCOVERY IN CLIENT-PROXY SERVERS (75) Inventors: Harlharan
More informationControl Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:
More informationCOLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS
International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde
More informationDatabase Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2
2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Database Design on Mechanical Equipent Manageent Syste Zheng Qiu, Wu kaiyuan, Wu Chengyan, Liu Lei2
More informationWindows History 2009 Windows 7 2
Example: Windows 1 Windows History 2009 Windows 7 2 Features added Windows2000 additions Plug-and-play Network directory service New GUI Vista additions New GUI More focus on security clean-up the code
More informationPredicting x86 Program Runtime for Intel Processor
Predicting x86 Progra Runtie for Intel Processor Behra Mistree, Haidreza Haki Javadi, Oid Mashayekhi Stanford University bistree,hrhaki,oid@stanford.edu 1 Introduction Progras can be equivalent: given
More informationKnowledge Discovery Applied to Agriculture Economy Planning
Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn
More informationVirtualization, Xen and Denali
Virtualization, Xen and Denali Susmit Shannigrahi November 9, 2011 Susmit Shannigrahi () Virtualization, Xen and Denali November 9, 2011 1 / 70 Introduction Virtualization is the technology to allow two
More informationOperating System Structure
Operating System Structure Joey Echeverria joey42+os@gmail.com December 6, 2004 Carnegie Mellon University: 15-410 Fall 2004 Overview Motivations Kernel Structures Monolithic Kernels Open Systems Microkernels
More informationFiji VM Safety Critical Java
Fiji VM Safety Critical Java Filip Pizlo, President Fiji Systems Inc. Introduction Java is a modern, portable programming language with wide-spread adoption. Goal: streamlining debugging and certification.
More informationOperating-System Structures
Operating-System Structures Chapter 2 Operating System Services One set provides functions that are helpful to the user: User interface Program execution I/O operations File-system manipulation Communications
More informationThe Z Garbage Collector Low Latency GC for OpenJDK
The Z Garbage Collector Low Latency GC for OpenJDK Per Lidén & Stefan Karlsson HotSpot Garbage Collection Team Jfokus VM Tech Summit 2018 Safe Harbor Statement The following is intended to outline our
More informationClosing The Performance Gap between Causal Consistency and Eventual Consistency
Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive
More informationResearch on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm
roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,
More informationData Engine for NoSQL - IBM Power Systems Edition White Paper and Technical Reference
Data Engine for NoSQL - IBM Power Systes Edition and Technical Reference Brad Brech Juan Rubio Michael Hollinger IBM Systes Group June 2015 Data Engine for NoSQL Power Systes Edition Contents Data Engine
More informationThe Slide does not contain all the information and cannot be treated as a study material for Operating System. Please refer the text book for exams.
The Slide does not contain all the information and cannot be treated as a study material for Operating System. Please refer the text book for exams. Operating System Services User Operating System Interface
More informationVerifying the structure and behavior in UML/OCL models using satisfiability solvers
IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on
More informationThinkServer OS AnD virtualization OPTiOnS
ThinkServer OS AND VIRTUALIZATION OPTIONS Windows Server 2012 R2 ThinkServer systes power business-critical deployents with world-class quality and innovation. Microsoft server software delivers productivity
More informationBack To The Future: A Radical Insecure Design of KVM on ARM
Back To The Future: A Radical Insecure Design of KVM on ARM Abstract In ARM, there are certain instructions that generate exceptions. Such instructions are typically executed to request a service from
More informationCloud Programming James Larus Microsoft Research. July 13, 2010
Cloud Programming James Larus Microsoft Research July 13, 2010 New Programming Model, New Problems (and some old, unsolved ones) Concurrency Parallelism Message passing Distribution High availability Performance
More informationTheoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem
Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The
More informationCSE 4/521 Introduction to Operating Systems. Lecture 29 Windows 7 (History, Design Principles, System Components, Programmer Interface) Summer 2018
CSE 4/521 Introduction to Operating Systems Lecture 29 Windows 7 (History, Design Principles, System Components, Programmer Interface) Summer 2018 Overview Objective: To explore the principles upon which
More informationSafely and Efficiently Programming a 64kB Computer
Safely and Efficiently Programming a 64kB Computer Amit Levy a, Branden Ghena b, Bradford Campbell b, Pat Pannuto b, Prabal Dutta b, Philip Levis a MSR UW Summer Institute August 2, 2017 a University b
More informationGPU-Based Speculative Query Processing for Database Operations
GPU-Based Speculative Query Processing for Database Operations Peter Benjain Volk Dirk Habich Technisch Universiät Dresden Technisch Universiät Dresden peter.benjain.volk@inf.tudresden.de dirk.habich@tudresden.de
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationChapter 2: Operating-System Structures. Operating System Concepts Essentials 8 th Edition
Chapter 2: Operating-System Structures Operating System Concepts Essentials 8 th Edition Silberschatz, Galvin and Gagne 2011 Chapter 2: Operating-System Structures Operating System Services User Operating
More informationCopyright Khronos Group Page 1. Vulkan Overview. June 2015
Copyright Khronos Group 2015 - Page 1 Vulkan Overview June 2015 Copyright Khronos Group 2015 - Page 2 Khronos Connects Software to Silicon Open Consortium creating OPEN STANDARD APIs for hardware acceleration
More informationA Research of MapReduce with GPU Acceleration
A Research of MapReduce with GPU Acceleration Miao Xin 1, Hao Li 2, Joan Lu 2 1 School of Inforation Science and Engineering, Yunnan University, Kuning, Yunnan, China 2 School of Software, Yunnan University,
More informationChapter 2: Operating-System
Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services! User Operating System Interface! System Calls! Types of System Calls! System Programs! Operating
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationA Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design
A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India
More informationChapter 4: Threads. Overview Multithreading Models Thread Libraries Threading Issues Operating System Examples Windows XP Threads Linux Threads
Chapter 4: Threads Overview Multithreading Models Thread Libraries Threading Issues Operating System Examples Windows XP Threads Linux Threads Chapter 4: Threads Objectives To introduce the notion of a
More informationChapter 3: Operating-System Structures
1 Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1
More informationEfficient Software Based Fault Isolation. Software Extensibility
Efficient Software Based Fault Isolation Robert Wahbe, Steven Lucco Thomas E. Anderson, Susan L. Graham Software Extensibility Operating Systems Kernel modules Device drivers Unix vnodes Application Software
More informationDYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION
www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent
More information! Software ( kernel ) that runs at all times. ! OS performs two unrelated functions: Maria Hybinette, UGA. user! 1! Maria Hybinette, UGA. user! n!
Review: What is An Operating System?! Software ( ) that runs at all times CSCI 6730 / 4730 Operating Systems Structures & System Design» Really, the part of the that runs in (or need to).» But note - there
More informationModeling Heap Data Growth Using Average Liveness
Modeling Heap Data Growth Using Average Liveness Pengcheng Li, Chen Ding and Hao Luo Departent of Coputer Science, University of Rochester, Rochester, NY14627, USA {pli, cding, hluo}@cs.rochester.edu Abstract
More informationAn Architecture for a Distributed Deductive Database System
IEEE TENCON '93 / B eih An Architecture for a Distributed Deductive Database Syste M. K. Mohania N. L. Sarda bept. of Coputer Science and Engineering, Indian Institute of Technology, Bobay 400 076, INDIA
More informationAnnexure- (Modified) 07
RFP for Selection of Service Provider for Panchdeep O&M (Annexure-07) Annexure- (Modified) 07 Profile of Software Manpower required for nology proveent, Additional Software Functionalities Developent Change
More informationDeterministic Voting in Distributed Systems Using Error-Correcting Codes
IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract
More informationDistributed Systems Operation System Support
Hajussüsteemid MTAT.08.009 Distributed Systems Operation System Support slides are adopted from: lecture: Operating System(OS) support (years 2016, 2017) book: Distributed Systems: Concepts and Design,
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationVirtual Memory. Reading: Silberschatz chapter 10 Reading: Stallings. chapter 8 EEL 358
Virtual Memory Reading: Silberschatz chapter 10 Reading: Stallings chapter 8 1 Outline Introduction Advantages Thrashing Principal of Locality VM based on Paging/Segmentation Combined Paging and Segmentation
More informationA wireless sensor network for visual detection and classification of intrusions
A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang
More informationOperating System Architecture. CS3026 Operating Systems Lecture 03
Operating System Architecture CS3026 Operating Systems Lecture 03 The Role of an Operating System Service provider Provide a set of services to system users Resource allocator Exploit the hardware resources
More informationWindows 7 Overview. Windows 7. Objectives. The History of Windows. CS140M Fall Lake 1
Windows 7 Overview Windows 7 Overview By Al Lake History Design Principles System Components Environmental Subsystems File system Networking Programmer Interface Lake 2 Objectives To explore the principles
More informationFrom DSL to HPC Component-Based Runtime: A Multi-Stencil DSL Case Study
Fro DSL to HPC Coponent-Based Runtie: A Multi-Stencil DSL Case Study Julien Bigot, Hélène Coullon, Christian Pérez To cite this version: Julien Bigot, Hélène Coullon, Christian Pérez. Fro DSL to HPC Coponent-Based
More informationThe benefits and costs of writing a POSIX kernel in a high-level language
1 / 38 The benefits and costs of writing a POSIX kernel in a high-level language Cody Cutler, M. Frans Kaashoek, Robert T. Morris MIT CSAIL Should we use high-level languages to build OS kernels? 2 / 38
More informationLecture 1 Introduction to Android. App Development for Mobile Devices. App Development for Mobile Devices. Announcement.
CSCE 315: Android Lectures (1/2) Dr. Jaerock Kwon App Development for Mobile Devices Jaerock Kwon, Ph.D. Assistant Professor in Computer Engineering App Development for Mobile Devices Jaerock Kwon, Ph.D.
More informationA Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems
A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,
More informationSpring It takes a really bad school to ruin a good student and a really fantastic school to rescue a bad student. Dennis J.
Operating Systems * *Throughout the course we will use overheads that were adapted from those distributed from the textbook website. Slides are from the book authors, modified and selected by Jean Mayo,
More informationCS162 - Operating Systems and Systems Programming. Address Translation => Paging"
CS162 - Operating Systems and Systems Programming Address Translation => Paging" David E. Culler! http://cs162.eecs.berkeley.edu/! Lecture #15! Oct 3, 2014!! Reading: A&D 8.1-2, 8.3.1. 9.7 HW 3 out (due
More informationOperating System Structure
Operating System Structure Joey Echeverria joey42+os@gmail.com April 18, 2005 Carnegie Mellon University: 15-410 Spring 2005 Overview Motivations Kernel Structures Monolithic Kernels Open Systems Microkernels
More informationChapter 2: Operating-System Structures
Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls (important!) Types of System Calls (important!) System
More informationOperating System Security
Operating System Security Operating Systems Defined Hardware: I/o...Memory.CPU Operating Systems: Windows or Android, etc Applications run on operating system Operating Systems Makes it easier to use resources.
More information