Advanced Operating Systems Lecture notes Dr Clifford Neuman

  • Slides: 40
Download presentation
Advanced Operating Systems Lecture notes Dr. Clifford Neuman University of Southern California Information Sciences

Advanced Operating Systems Lecture notes Dr. Clifford Neuman University of Southern California Information Sciences Institute Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

CSci 555: Advanced Operating Systems Lecture 4 – September 18 2009 Naming and Binding

CSci 555: Advanced Operating Systems Lecture 4 – September 18 2009 Naming and Binding Dr. Clifford Neuman University of Southern California Information Sciences Institute Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Naming Concepts v. Name q What you call something v. Address q Where it

Naming Concepts v. Name q What you call something v. Address q Where it is located v. Route q How one gets to it What is http: //www. isi. edu/~bcn ? v. But it is not that clear anymore, it depends on perspective. A name from one perspective may be an address from another. q Perspective means layer of abstraction Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

What are things we name v Users q To direct, and to identify v

What are things we name v Users q To direct, and to identify v Hosts (computers) q High level and low level v Services q Service and instance v Files and other “objects” q Content and repository v Groups q Of any of the above Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

How we name things v Host-Based Naming q Host-name is required part of object

How we name things v Host-Based Naming q Host-name is required part of object name v Global Naming q Must look-up name in global database to find address q Name transparency v User/Object Centered Naming q Namespace is centered around user or object v Attribute-Based Naming q Object identified by unique characteristics q Related to resource discovery / search / indexes Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Namespace v. A name space maps: S * ®X e O At a particular

Namespace v. A name space maps: S * ®X e O At a particular point in time. v. The rest of the definition, and even some of the above, is open to discussion/debate. v. What is a “flat namespace” q Implementation issue Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Case Studies v. Host Table Get. Host. By. Name(usc. arpa){ q Flat namespace (?

Case Studies v. Host Table Get. Host. By. Name(usc. arpa){ q Flat namespace (? ) scan(host file); return(matching entry); q Global namespace (? ) } v. Grapevine Get. Host. By. Name(host. q Two-level, iterative lookup sc) q Clearinghouse 3 level v. Domain name system gv es q Arbitrary depth q Iterative or recursive(chained) lookup q Multi-level caching Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE sc gv

Domain Name System Iterative query edu 2 usc isi 1 3 aludra venera Lookup(venera.

Domain Name System Iterative query edu 2 usc isi 1 3 aludra venera Lookup(venera. isi. edu) Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Caching in the Domain Name System Chained query edu 2 usc 3 isi cache

Caching in the Domain Name System Chained query edu 2 usc 3 isi cache 1 a 4 aludra Lookup(venera. isi. edu) venera cache Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Scalability of naming v Scalability q Ability to continue to operate efficiently as a

Scalability of naming v Scalability q Ability to continue to operate efficiently as a system grows large, either numerically, geographically, or administratively. v Affected by q Frequency of update q Granularity q Evolution/reconfiguration v DNS characteristics q Multi-level implementation q Replication of root and other servers q Multi-level caching Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Closure v Closure binds an object to the namespace within which names embedded in

Closure v Closure binds an object to the namespace within which names embedded in the object are to be resolved. q “Object” may as small as the name itself § GNS binds the names to namespaces § Prospero binds enclosing object to multiple namespaces § Tilde and quicksilver bind users to namespaces § NFS mount table constructs system centered namespace q Movement of objects can cause problems § When closure is associated with wrong entity Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Other implementations of naming v. Broadcast q Limited scalability, but faster local response v.

Other implementations of naming v. Broadcast q Limited scalability, but faster local response v. Prefix tables q Essentially a form of caching v. Capabilities q Combines security and naming q Traditional name service built over capability based addresses Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Advanced Name Systems v DEC’s Global Naming q Support for reorganization the key idea

Advanced Name Systems v DEC’s Global Naming q Support for reorganization the key idea q Little coordination needed in advance v Half Closure q Names are all tagged with namespace identifiers § DID - Directory Identifier § Hidden part of name - makes it global § Upon reorganization, new DID assigned § Old names relative to old root q But the DID’s must be unique - how do we assign? Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Prospero Directory Service v Multiple namespace centered around a “root” node that is specific

Prospero Directory Service v Multiple namespace centered around a “root” node that is specific to each namespace. q Closure binds objects to this “root” node. v Layers of naming q User level names are “object” centered q Objects still have an address which is global q Namespaces also have global addresses v Customization in Prospero q Filters create user level derived namespaces on the fly q Union links support merging of views Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Resource Discovery v. Similar to naming q Browsing related to directory services q Indexing

Resource Discovery v. Similar to naming q Browsing related to directory services q Indexing and search similar to attribute based naming v. Attribute based naming q Profile q Multi-structured naming v. Search engines v. Computing resource discovery Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

The Web v. Object handles q Uniform Resource Identifier (URI’s) q Uniform Resource Locators

The Web v. Object handles q Uniform Resource Identifier (URI’s) q Uniform Resource Locators (URL’s) q Uniform Resource Names (URN’s) v. XML q Definitions provide a form of closure § Conceptual level rather than the “namespace” level. Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

LDAP v. Manage information about users, services q Lighter weight than X. 500 DAP

LDAP v. Manage information about users, services q Lighter weight than X. 500 DAP § Heavier than DNS q Applications have conventions on where to look § Often data is duplicated because of multiple conventions q Performance enhancements not as well defined § Caching harder because of less constrained patterns of access Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

CSci 555: Advanced Operating Systems Lecture 5 – September 26 2008 ADVANCE SLIDES (These

CSci 555: Advanced Operating Systems Lecture 5 – September 26 2008 ADVANCE SLIDES (These slides WILL change) Dr. Clifford Neuman University of Southern California Information Sciences Institute Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

New Computing Environments v. Ubiquitous and Pervasive Computing q Including Sensor Nodes q Managing

New Computing Environments v. Ubiquitous and Pervasive Computing q Including Sensor Nodes q Managing Devices v. Mobile computing q Portable Devices Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Characteristics v. Low power availability v. Constrained resources v. Transient relationships v. Ad-hoc deployment

Characteristics v. Low power availability v. Constrained resources v. Transient relationships v. Ad-hoc deployment v. Peer to Peer relationships v. Weakly managed Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Ubiquitous computing v. According to Mark Weiser at Xerox: q Transparent computing is the

Ubiquitous computing v. According to Mark Weiser at Xerox: q Transparent computing is the ultimate goal q Computers should disappear into the background q Computation becomes part of the environment Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Ubiquitous Computing v Computing everywhere q Desktop, Laptop, Palmtop q Cars, Cell phones q

Ubiquitous Computing v Computing everywhere q Desktop, Laptop, Palmtop q Cars, Cell phones q Shoes, Clothing, Walls (paper / paint) v Connectivity everywhere q Broadband q Wireless v Mobile everywhere q Users move around q Disposable devices Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Ubiquitous Computing v. Structure q q q Resource and service discovery critical User location

Ubiquitous Computing v. Structure q q q Resource and service discovery critical User location an issue Interface discovery Disconnected operation Ad-hoc organization v. Security q q Small devices with limited power Intermittent connectivity v. Agents v. Sensor Networks Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Mobile Computing v. Often managed devices q Cell phones q PDA’s q Subscription Services

Mobile Computing v. Often managed devices q Cell phones q PDA’s q Subscription Services Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Ad-hoc Networking v. Peer-to-peer of network routing v. Transient devices v. Issues: q Discovery

Ad-hoc Networking v. Peer-to-peer of network routing v. Transient devices v. Issues: q Discovery q Security q Power v. Examples: q Many Sensor Networks Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

CSci 555: Advanced Operating Systems Lecture 5 – September 25 2009 Ubiquitous and Mobile

CSci 555: Advanced Operating Systems Lecture 5 – September 25 2009 Ubiquitous and Mobile Computing Dr. Clifford Neuman University of Southern California Information Sciences Institute Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

New Computing Environments v. Ubiquitous and Pervasive Computing q Including Sensor Nodes q Managing

New Computing Environments v. Ubiquitous and Pervasive Computing q Including Sensor Nodes q Managing Devices v. Mobile computing q Portable Devices Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Characteristics v. Low power availability v. Constrained resources v. Transient relationships v. Ad-hoc deployment

Characteristics v. Low power availability v. Constrained resources v. Transient relationships v. Ad-hoc deployment v. Peer to Peer relationships v. Weakly managed v. Context aware Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Ubiquitous computing v. According to Mark Weiser at Xerox: q Transparent computing is the

Ubiquitous computing v. According to Mark Weiser at Xerox: q Transparent computing is the ultimate goal q Computers should disappear into the background q Computation becomes part of the environment Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Ubiquitous Computing v Computing everywhere q Desktop, Laptop, Palmtop q Cars, Cell phones q

Ubiquitous Computing v Computing everywhere q Desktop, Laptop, Palmtop q Cars, Cell phones q Shoes, Clothing, Walls (paper / paint) v Connectivity everywhere q Broadband q Wireless v Mobile everywhere q Users move around q Disposable devices Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Ubiquitous Computing v. Structure q q q Resource and service discovery critical User location

Ubiquitous Computing v. Structure q q q Resource and service discovery critical User location an issue Interface discovery Disconnected operation Ad-hoc organization v. Security q q Small devices with limited power Intermittent connectivity v. Agents v. Sensor Networks Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Mobile Computing v. Often managed devices q Cell phones q PDA’s q Subscription Services

Mobile Computing v. Often managed devices q Cell phones q PDA’s q Subscription Services Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Ad-hoc Networking v. Peer-to-peer of network routing v. Transient devices v. Issues: q Discovery

Ad-hoc Networking v. Peer-to-peer of network routing v. Transient devices v. Issues: q Discovery q Security q Power v. Examples: q Many Sensor Networks Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Source: ISI & DARPA PAC/C Program Communication/Computation Technology Projection Assume: 10 kbit/sec. Radio, 10

Source: ISI & DARPA PAC/C Program Communication/Computation Technology Projection Assume: 10 kbit/sec. Radio, 10 m range. Large cost of communications relative to computation continues (source – talk by Deborah Estrin) Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Active Badges v. Provides location information and one or more buttons v. Simple interface

Active Badges v. Provides location information and one or more buttons v. Simple interface q Controlled access q Carries context § Two way, device knows where your are, and your location knows you are present § Moves your environment Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

In-Network Processing v. Communication is expensive, computing less-so, so pre-process to reduce data sent.

In-Network Processing v. Communication is expensive, computing less-so, so pre-process to reduce data sent. v. Send information, not-data. v. Requires more knowledge at the edges so that query can be distributed. v. Intermediate nodes correlate and agregate results. Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Directed Diffusion v. Publish/Subscribe model v. Data named, not nodes v. But what are

Directed Diffusion v. Publish/Subscribe model v. Data named, not nodes v. But what are the implications q discussion Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

A Taxonomy v. Approaches/Products/Devices differ by placement/nature of: q Management q Storage q Computing

A Taxonomy v. Approaches/Products/Devices differ by placement/nature of: q Management q Storage q Computing q Communication q Context maintenance q Authority Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Classes v. Mobile Terminals v. Passive devices v. Personal Devices v. Remote Sensors/Actuators v.

Classes v. Mobile Terminals v. Passive devices v. Personal Devices v. Remote Sensors/Actuators v. Communicating Devices v. Sensor Networks Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE

Examples v. Cell Phones vi-phone v. PDA v. Home automation v. Proximity cards v.

Examples v. Cell Phones vi-phone v. PDA v. Home automation v. Proximity cards v. Laptop computer v. In Vehicle networks v. Active Badges Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE