Hot Topics in OS Research Andy Wang COP 5611 Advanced Operating Systems.

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 3 Operating Systems.
Operating System.
Virtual Machine Technology Dr. Gregor von Laszewski Dr. Lizhe Wang.
Harbor: Software based Memory Protection for Sensor Nodes Ram Kumar, Akhilesh Singhania, Eddie Kohler and Mani Srivastava Introduction: Memory protection.
EXTENSIBILITY, SAFETY AND PERFORMANCE IN THE SPIN OPERATING SYSTEM B. Bershad, S. Savage, P. Pardyak, E. G. Sirer, D. Becker, M. Fiuczynski, C. Chambers,
Figure 1.1 Interaction between applications and the operating system.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Virtualization in Data Centers Prashant Shenoy
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3 Operating System Organization.
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
Operating Systems: Principles and Practice
Introduction to Android Platform Overview
Stack Management Each process/thread has two stacks  Kernel stack  User stack Stack pointer changes when exiting/entering the kernel Q: Why is this necessary?
Programming mobile devices Part II Programming Symbian devices with Symbian C++
Microkernels, virtualization, exokernels Tutorial 1 – CSC469.
UNIX System Administration OS Kernal Copyright 2002, Dr. Ken Hoganson All rights reserved. OS Kernel Concept Kernel or MicroKernel Concept: An OS architecture-design.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 2: System Structures.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
B.Ramamurthy9/19/20151 Operating Systems u Bina Ramamurthy CS421.
Midori Life after windows Microsoft Research’s. Singularity  Midori is a stem off of this operating system  A research project started in 2003 to build.
N. GSU Slide 1 Chapter 02 Cloud Computing Systems N. Xiong Georgia State University.
1 COMPSCI 110 Operating Systems Who - Introductions How - Policies and Administrative Details Why - Objectives and Expectations What - Our Topic: Operating.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Course Introduction Andy Wang COP 5611 Advanced Operating Systems.
CS 346 – Chapter 1 Operating system – definition Responsibilities What we find in computer systems Review of –Instruction execution –Compile – link – load.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
MIDORI The Post Windows Operating System Microsoft Research’s.
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
8/15/99 1 Stanford, Hot Interconnect Open Programmable Architecture for Java-enabled Network Devices A Revolution! Tal Lavian Technology Center Nortel.
Operating System 2 Overview. OPERATING SYSTEM OBJECTIVES AND FUNCTIONS.
OPERATING SYSTEM SUPPORT DISTRIBUTED SYSTEMS CHAPTER 6 Lawrence Heyman July 8, 2002.
OSes: 3. OS Structs 1 Operating Systems v Objectives –summarise OSes from several perspectives Certificate Program in Software Development CSE-TC and CSIM,
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
Processes Introduction to Operating Systems: Module 3.
Welcome to CPS 210 Graduate Level Operating Systems –readings, discussions, and programming projects Systems Quals course –midterm and final exams Gateway.
Full and Para Virtualization
6.894: Distributed Operating System Engineering Lecturers: Frans Kaashoek Robert Morris
Parallel IO for Cluster Computing Tran, Van Hoai.
Match the following Operating System concepts with definition A to E.
Copyright Prentice Hall, Inc. 1 Operating System Overview.
Software Architecture of Sensors. Hardware - Sensor Nodes Sensing: sensor --a transducer that converts a physical, chemical, or biological parameter into.
Chapter 2 Operating System Overview Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
COMPSCI 110 Operating Systems
Containers as a Service with Docker to Extend an Open Platform
Introduction to Operating Systems
Introduction to Operating Systems
Credits: 3 CIE: 50 Marks SEE:100 Marks Lab: Embedded and IOT Lab
Andy Wang COP 5611 Advanced Operating Systems
Walter Binder Giovanna Di Marzo Serugendo Jarle Hulaas
Security Issues.
Course Introduction Dr. Eggen COP 6611 Advanced Operating Systems
Andy Wang COP 5611 Advanced Operating Systems
3.2 Virtualisation.
Introduction and History
Introduction to Operating Systems
Windows Internals Brown-Bag Seminar Chapter 1 – Concepts and Tools
Chapter 1: Intro (excerpt)
Virtualization Layer Virtual Hardware Virtual Networking
Chapter 15, Exploring the Digital Domain
Operating Systems Bina Ramamurthy CSE421 11/27/2018 B.Ramamurthy.
Introduction and History
Chapter 3: Operating-System Structures
Lecture Topics: 11/1 General Operating System Concepts Processes
Andy Wang COP 5611 Advanced Operating Systems
Introduction and History
Andy Wang COP 5611 Advanced Operating Systems
Introduction and History
Chapter 2 Operating System Overview
Operating System Overview
Andy Wang COP 5611 Advanced Operating Systems
Presentation transcript:

Hot Topics in OS Research Andy Wang COP 5611 Advanced Operating Systems

Some Hot Areas Safely executing untrusted code File and storage systems Ubiquitous computing Virtual machine environments Reliability

Safely Executing Untrusted Code Type-safe languages Virtual machines Verified code

File and Storage Systems Very large-scale file systems  Reliability  Performance vs. cost of ownership  Energy consumption Very long-term storage Peer-to-peer backup system  Challenges: privacy, consistency over encrypted data, fairness

File and Storage Systems Some advanced tools:  Rabin fingerprinting  Compare-by-hash  Convergent encryption  Erasure code  Bloom filter  Search on encrypted domain

Ubiquitous Computing Lots and lots of inexpensive mobile wireless devices Distributed resource sharing across untrusted domains  Economic models Bartering Tickets Credits

Ubiquitous Computing Distributed resource discovery  Pastry, Tapestry, Chord Hypercube routing Distributed radix sort O(log(n))  O(1) lookup with clever replication Distributed access control models Peer-to-peer coordination

Ubiquitous Computing Constrained resources  CPU Cannot afford strong security measures  Memory, disk  Variable bandwidth  Energy Battery density approaches that of a grenade Sensor networks

Ubiquitous Computing E-commerce  How to authenticate with unknown servers?  How to make e-cash anonymous, transferable, non-traceable, and non- forgeable?  How to prevent free-rides?  How to provide micropayments?

Virtual Machine Environments OS support for efficient executions  Parasitic virtualization

Reliability Running device drivers in isolated kernel address spaces Static code analysis for common programming errors Soft-state-only systems, designed to crash

Reliability Use computational dependencies to locate failures Secure hardware to certify software General security

Revisiting Existing Designs Path  Vertical paths vs. layers Capriccio  Event-based scheduling  Threads with linked stacks to conserve storage Conquest  Lots of RAM

Introspective Computing Self-administration  Configuration, optimization, evolution  Exploit contextual information Autonomous computing  Automatically detect and repair system problems

Performance Rewrite binaries for smaller memory footprint Use compiler to cluster and issue bulk system calls Download user-level binaries into the kernel