Original version of DMA Rorc_receive  Too many options that are not needed now  Restrictions  Unstructured  Changing the code quickly and experimenting.

Slides:



Advertisements
Similar presentations
Possible Windows 8 Improvements By: Scott Hill. Improve Windows 8 Split Screen Mode The only options for split screen mode currently is to have one screen.
Advertisements

Principles of I/O Hardware I/O Devices Block devices, Character devices, Others Speed Device Controllers Separation of electronic from mechanical components.
Memory management.
4/14/2017 Discussed Earlier segmentation - the process address space is divided into logical pieces called segments. The following are the example of types.
Institute for Clinical and Translational Science (ICTS) Fred McClurg Neil Nuehring New Features and Improvements in REDCap
Versioning Extensions for Linux CS736 Spring 1999 J. Adam Butts Paramjit Oberoi.
Java.  Java is an object-oriented programming language.  Java is important to us because Android programming uses Java.  However, Java is much more.
Installing Windows 7 Lesson 2.
Contiki A Lightweight and Flexible Operating System for Tiny Networked Sensors Presented by: Jeremy Schiff.
Virtual Memory Operating Systems Lecture # 8. Multi-tasking OS OS Excel MS Word Outlook 0x0000 0x7000 0x4000 0x8000 0x9000.
INTRODUCTION OS/2 was initially designed to extend the capabilities of DOS by IBM and Microsoft Corporations. To create a single industry-standard operating.
CS 333 Introduction to Operating Systems Class 18 - File System Performance Jonathan Walpole Computer Science Portland State University.
1 Disco: Running Commodity Operating Systems on Scalable Multiprocessors Edouard Bugnion, Scott Devine, and Mendel Rosenblum, Stanford University, 1997.
Updating an installation with Windows® Embedded Developer Update. Windows and Microsoft are registered trademarks, All rights reversed. KRAK LLC © 2011.
OPERATING SYSTEMS Introduction
1 COMP541 VGA Character Terminal Montek Singh Mar 1, 2007.
HW API internal meeting 2/10/2001 Eric CANO, CERN/EP-CMD1 What’s proposed? l Integration with Christoph’s generic hardware access library for user-friendly.
Introduction to The Linaro Toolchain Embedded Processors Training Multicore Software Applications Literature Number: SPRPXXX 1.
1 Introduction to Tool chains. 2 Tool chain for the Sitara Family (but it is true for other ARM based devices as well) A tool chain is a collection of.
Stack Management Each process/thread has two stacks  Kernel stack  User stack Stack pointer changes when exiting/entering the kernel Q: Why is this necessary?
CMS Project Ozarks Technical Community College Joint project of: Jason Huddleston, Asst. Coord. Internet Services & Network Security Karyn O’Dell, Coordinator.
How do people communicate with computers?
Minix Jeff Ward, Robert Burghart, Jeb Collins, Joe Creech.
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
DDL hardware, DATE training1 Detector Data Link (DDL) DDL hardware Csaba SOOS.
UNIX and Shell Programming (06CS36)
Codeigniter is an open source web application. It occupies a very small amount of space in the memory and is most useful for developers who aim to develop.
Upgrade to Real Time Linux Target: A MATLAB-Based Graphical Control Environment Thesis Defense by Hai Xu CLEMSON U N I V E R S I T Y Department of Electrical.
A Real-Time Garbage Collector Based on the Lifetimes of Objects Henry Lieberman and Carl Hewitt (CACM, June 1983) Rudy Kaplan Depena CS395T: Memory Management.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
1 Computer and Network Bottlenecks Author: Rodger Burgess 27th October 2008 © Copyright reserved.
Memory Map, Programming Language, and Windows Dr. Harold D. Camp IT February 2007.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
The Performance of Microkernel-Based Systems
The Performance of Micro-Kernel- Based Systems H. Haertig, M. Hohmuth, J. Liedtke, S. Schoenberg, J. Wolter Presentation by: Seungweon Park.
Can We Make Operating Systems Reliable and Secure? Andrew S. Tanenbaum, Jorrit N. Herder, and Herbert Bos Vrije Universiteit, Amsterdam May 2006 Group.
Disco: Running Commodity Operating Systems on Scalable Multiprocessors Edouard et al. Madhura S Rama.
Capabilities of Software. Object Linking & Embedding (OLE) OLE allows information to be shared between different programs For example, a spreadsheet created.
OSes: 3. OS Structs 1 Operating Systems v Objectives –summarise OSes from several perspectives Certificate Program in Software Development CSE-TC and CSIM,
UNIX and Shell Programming
Update on ALICE software status and ideas Ervin Dénes Wigner Research Center Hungarian Academy of Sciences.
How to defeat feature gluttony Gluttony Source:
DataLink for the Office 2007 Platform Jason King OSIsoft, Inc.
UDI Advanced Topics DMA and Interrupts Robert Lipe UDI Development Team Lead
The Performance of Micro-Kernel- Based Systems H. Haertig, M. Hohmuth, J. Liedtke, S. Schoenberg, J. Wolter Presentation by: Tim Hamilton.
Protection of Processes Security and privacy of data is challenging currently. Protecting information – Not limited to hardware. – Depends on innovation.
1 Is HD ratio mechanism too complex? Jan Žorž (just asking questions)
UDI Technology Benefits Slide 1 Uniform Driver Interface UDI Technology Benefits.
ISeries Note3. Technology independence Technology independence  change the underlying hardware architecture and add new functionality without disrupting.
© Dr. A. Williams, Fall Present Software Quality Assurance – Clover Lab 1 Tutorial / lab 2: Code instrumentation Goals of this session: 1.Create.
Installing Windows 7 Lesson 2.
Bare metal OS project CSSE 332 Operating Systems
Jonathan Walpole Computer Science Portland State University
Questionnaires 3. Structured and unstructured questions: advantages and disadvantages of each type.
Operating System Structure
An Introduction To Flash Application Development
Sinhala Language Support for Java Micro Edition
Introduction to Computers
Disco: Running Commodity Operating Systems on Scalable Multiprocessors
Quicken 2018 Support Team More info :
Windows 10 Windows 10 Customer Support Call At:
Quicken Customer Service Phone Number
IS3440 Linux Security Unit 7 Securing the Linux Kernel
(Mobile App & PayTM wallet flow)
4.02 Develop web pages using various layouts and technologies.
RECHORDS Assignment #6: Med-Fi Prototype
Paging and Segmentation
CS703 - Advanced Operating Systems
O.S. Security.
Presentation transcript:

Original version of DMA Rorc_receive  Too many options that are not needed now  Restrictions  Unstructured  Changing the code quickly and experimenting is difficult Driver also needs to be upgraded to newer kernel version while remaining compatible with older versions

Simpler version  Aim : building a new DMA method from scratch for CRU  For better understanding  It will be easier to customize and to add new functions to it later  rorc_dma  Performs DMA and fill physmem  Doesn’t use the RORC at the moment  It can’t receive data via SIU, DIU  It could use the RORC’s data generator  For testing a rorc_emulator program was used instead of the RORC  Generated data and wrote it to the given pages

Alternative approach #1 Portable Driver Architecture (PDA) by Dominic Eschweiler  DMA features:  Persistent memory allocation of large buffers  User space buffer registration  DMA buffer sharing  Scatter/Gather lists  IOMMU protection and consecutive mapping  Wrap mapping  NUMA control Still need time to understand it entirely

Alternative approach #2 Altera’s version of DMA