Presented By, Bhargavi Konduru.  Nowadays, most electronic appliances have computing capabilities that run on embedded operating system (OS) kernels,

Slides:



Advertisements
Similar presentations
MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Advertisements

Introduction CSCI 444/544 Operating Systems Fall 2008.
Virtual Machine Security Design of Secure Operating Systems Summer 2012 Presented By: Musaad Alzahrani.
Chapter 13 Embedded Systems
Chapter 13 Embedded Systems Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
ECE 526 – Network Processing Systems Design Software-based Protocol Processing Chapter 7: D. E. Comer.
CS-3013 & CS-502, Summer 2006 Virtual Machine Systems1 CS-502 Operating Systems Slides excerpted from Silbershatz, Ch. 2.
INTRODUCTION OS/2 was initially designed to extend the capabilities of DOS by IBM and Microsoft Corporations. To create a single industry-standard operating.
Operating System Structure. Announcements Make sure you are registered for CS 415 First CS 415 project is up –Initial design documents due next Friday,
Chapter 13 Embedded Systems
Cs238 Lecture 3 Operating System Structures Dr. Alan R. Davis.
The Design of Robust and Efficient Microkernel ManRiX, The Design of Robust and Efficient Microkernel Presented by: Manish Regmi
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3 Operating System Organization.
Dreams in a Nutshell Steven Sommer Microsoft Research Institute Department of Computing Macquarie University.
CSE598C Virtual Machines and Their Applications Operating System Support for Virtual Machines Coauthored by Samuel T. King, George W. Dunlap and Peter.
Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Chapter 3 Operating Systems Introduction to CS 1 st Semester, 2015 Sanghyun Park.
Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Operating System Overview
Operating System A program that controls the execution of application programs An interface between applications and hardware 1.
Silberschatz, Galvin and Gagne ©2009 Operating System Concepts – 8 th Edition, Chapter 2: System Structures.
9/14/2015B.Ramamurthy1 Operating Systems : Overview Bina Ramamurthy CSE421/521.
1 Operating System Overview Chapter 2 Advanced Operating System.
B.Ramamurthy9/19/20151 Operating Systems u Bina Ramamurthy CS421.
ICOM Noack Operating Systems - Administrivia Prontuario - Please time-share and ask questions Info is in my homepage amadeus/~noack/ Make bookmark.
Fall 2000M.B. Ibáñez Lecture 01 Introduction What is an Operating System? The Evolution of Operating Systems Course Outline.
Virtualization: Not Just For Servers Hollis Blanchard PowerPC kernel hacker.
Operating Systems ECE344 Ashvin Goel ECE University of Toronto OS-Related Hardware.
Silberschatz, Galvin and Gagne  2002 Modified for CSCI 399, Royden, Operating System Concepts Operating Systems Lecture 7 OS System Structure.
The Performance of Micro-Kernel- Based Systems H. Haertig, M. Hohmuth, J. Liedtke, S. Schoenberg, J. Wolter Presentation by: Seungweon Park.
Advanced Design and System Patterns The Microkernel Pattern.
Computers Operating System Essentials. Operating Systems PROGRAM HARDWARE OPERATING SYSTEM.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
 Virtual machine systems: simulators for multiple copies of a machine on itself.  Virtual machine (VM): the simulated machine.  Virtual machine monitor.
Operating Systems Lecture November 2015© Copyright Virtual University of Pakistan 2 Agenda for Today Review of previous lecture Hardware (I/O, memory,
1 Operating System Overview Chapter 2. 2 Operating System A program that controls the execution of application programs An interface between applications.
Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
System Components ● There are three main protected modules of the System  The Hardware Abstraction Layer ● A virtual machine to configure all devices.
A. Frank - P. Weisberg Operating Systems Structure of Operating Systems.
Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Concepts and Structures. Main difficulties with OS design synchronization ensure a program waiting for an I/O device receives the signal mutual exclusion.
1 Operating System Overview Chapter 2. 2 Operating System A program that controls the execution of application programs An interface between applications.
1.  System Characteristics  Features of Real-Time Systems  Implementing Real-Time Operating Systems  Real-Time CPU Scheduling  An Example: VxWorks5.x.
Embedded Real-Time Systems Processing interrupts Lecturer Department University.
1 Chapter 2: Operating-System Structures Services Interface provided to users & programmers –System calls (programmer access) –User level access to system.
1.3 Operating system services An operating system provide services to programs and to the users of the program. It provides an environment for the execution.
Introduction to Operating Systems Concepts
Operating System Structure
CS490 Windows Internals Quiz 2 09/27/2013.
Chapter 3: Windows7 Part 1.
Operating Systems : Overview
Operating Systems Bina Ramamurthy CSE421 11/27/2018 B.Ramamurthy.
Basic Concepts Protection: Security:
Lecture Topics: 11/1 General Operating System Concepts Processes
Operating Systems : Overview
Operating Systems : Overview
Operating Systems : Overview
Operating Systems Lecture 3.
Operating Systems : Overview
Operating Systems : Overview
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Operating Systems : Overview
Operating Systems : Overview
Operating Systems : Overview
Operating Systems : Overview
Outline Operating System Organization Operating System Examples
Chapter 2 Operating System Overview
Operating Systems Structure
CSE 451: Operating Systems Autumn Module 24 Virtual Machine Monitors
Presentation transcript:

Presented By, Bhargavi Konduru

 Nowadays, most electronic appliances have computing capabilities that run on embedded operating system (OS) kernels, which provide basic execution primitives that can be commonly used by many appliances.  The recent emergence of digital appliances requires more advancde features, such as networking and GUI, which dramatically complicates the appliances’ software systems and increases their code size.  Networked systems need to be prepared for attacks through the internet.

 Users software systems must be more robust than ordinary personal computer systems.  Building such large, complex, and robust software systems on embedded kernels with the absence of a protection domain is very difficult as software bugs can cause system malfunction, data corruption, security breaches, or even system destruction.  To reduce the problem of the attacks a new system architecture is proposed in this paper.

 A system architecture that co-locates multiple embedded operating systems on a microkernel is proposed.  It employs a microkernel to provide protected execution environment for the existing embedded kernels that have no protection mechanism.  No need to run the existing software on different operating systems as the same protection domain is shared.  As the micro kernel supports multiple protected execution environments, we can run multiple instances along with the applications.

 System reinforces reliability and security, as the applications and servers can be decoupled to different protection domains.  The microkernel performs the scheduling of embedded kernel instances.  Here a system is developed that consists of a TL4 microkernel and a μITRON kernel.

 It enables the provision of protected domains without affecting the compatibility of the kernel APIs by employing a microkernel.  It can achieve maximum reusability of the existing software resources including embedded OS kernels and their applications.  It enables the schedulability analysis of real-time tasks on an embedded OS kernel.  These features can protect the existing software resources, maintain the software quality, and save costs.

 To accommodate large and complex software systems, new kernels that support protection domains have been created.  But this is considered as a drawback as there will be compatibility issues.  The architecture proposed in this paper enables the reuse of the current kernel, by co-locating multiple kernels on a micro kernel.  The proposed architecture incorporates the hierarchical CPU scheduling to handle the multiple independent instances of a real time kernel.

 It consists of TL4 microkernel, the multiple instances of a μITRON kernel.  Multiple applications can run within a single instance of a μITRON kernel.  Applications can access services provided by servers through server proxies.  Only TL4 microkernel executes in the privileged mode directly on top of hardware. It provides protection domains, threads, and IPC.  The misbehaviors of applications do not cause data destruction in servers protection domains as different protection domains are allocated for applications and servers.

 It can effectively utilize multiple protection domains.  Mainly a protection domain should be dedicated to personal data file services in order to isolate personal data files from any illegal access.  Network services are isolated in another protection domain since a network subsystem is the most likely an entry point for a system to be compromised.  Local device servers implement the drivers of devices shared by applications and the other services

 We can make system consume less resources by using protection domain.  It is desirable to dedicate a protection domain to an application program when it is not trusted or it needs to be installed from the internet.  Another use of protection domain is for debugging, as it is usually difficult to find bugs that share the same domain.  Out of range memory references can be easily detected.

 TL4 microkernel is based on L4 μ-kernel and is enhanced to enable the execution of multiple μITRON kernel instances.  TL4 microkernel inherits L4 μ-kernel’s simple abstractions, that include threads, protection domains, memory pages, and IPC.  Here TL4 microkernel’s execution entities are referred as threads and μITRON kernel’s execution entities are referred to as tasks or applications.

 A μITRON kernel is a simple embedded real-time kernel that provides real-time tasks, synchronization and communication mechanisms and device drivers.  It is divided in to 3 parts Machine Independent Part Machine dependent part Processor Emulator

 To maximize the reusability and minimize the modifications, a layer called processor emulator is introduced that emulates the hardware and encapsulates the differences from the hardware.  The processor emulator deals with interrupts, time management, scheduling events, and the idle state.  Controlling Interrupts: Interrupts are disabled by setting a flag and enabled by a message notification.  Time Management: Here we need to consider the scheduling of the timer interrupt emulation threads for those kernel instances.

 Dealing with external scheduling events: It happens when an interrupt occurs and a higher priority task wakes up.  Dealing with Idle State: When all tasks are blocked and there is no task to run in a ITRON kernel, the kernel falls into the idle state. Here the main execution thread needs to block in order to avoid disturbing the other instances execution.

 Enhancements:  Scheduler: Here the scheduler determines which thread to run as each instance has a thread queue that maintains runnable threads of the instance.  Scheduling of Interrupt Emulation Threads: It has three States. The instance is running The instance is runnable but not running The instance is not runnable

 As the implementation of the system is finished and described let us see the evaluation of the system.  Memory Footprints: It shows the memory sizes consumed to run a single instance of μITRON kernel on TL4 microkernel.  The memory footprint of a μITRON kernel instance on TL4 microkernel is 63KB, which is slightly smaller than the original μITRON kernel.

 Invocation Latencies: Latencies from the software entry point of interrupt are measured.  They are measured by considering two tasks Application task 1 and Application task 2.  Latency values are measured for both cases of μITRON kernel on TL4kernel and μITRONkernel on hardware.  The results show that the μITRONkernel on TL4 kernel outperforms the μITRONkernel on the hardware.

 Here the authors proposed an alternative approach to introduce protected domains to the existing embedded systems.  This approach employs a microkernel to provide protected execution environments for the existing embedded kernels.  It can achieve the maximum reusability of the existing software resources including embedded OS kernels and their applications.  Future work includes creating more realistic and practical setup, and more accurate system and its evaluation.

 G. Bollella and K. Jeffay. Support for Real-Time Computing within General Purpose Operating Systems - Supporting Co-Resident Operating Systems. In Proceedings of the 1st IEEE Real-Time Technology and Applications Symposium, May  R. J. Creasy. The Origin of the VM/370 Time-Sharing System. IBM Journal of Research and Development, 25 (5),  R. P. Goldberg. Survey of Virtual Machine Research. IEEE Computer Magazine, pages 34–45, June  G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, P. M. Chen. ReVirt: EnablingIntrusion Analysis through Virtual-Machine Logging and Replay.In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation, December  T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection BasedArchitecture for Intrusion Detection. In Proceedings of the Internet Society’s 2003 Symposium on Network and Distributed System Security, February  S. T. King, G. W. Dunlap, and P. M. Chen. Operating System Support for Virtual Machines. In Proceedings of the 2003 Annual USENIX Technical Conference, June  J. Sugerman, G. Venkitachalam, and B. H. Lim. Virtualizing I/O Devices on VMware Workstation’s Hosted Virtual Machine Monitor. In Proceedings of 2001 USENIX Annual Technical Conference,  H. Takada ed. μITRON4.0 Specification. TRON Association, (In Japanese)  H. Takada ed. μITRON4.0/PX Specification: Protection MechanismExtension to μITRON4.0 Specification. TRON Association Version Up WG, (In Japanese)