Advanced Operating Systems Lecture notes Dr Clifford Neuman
- Slides: 40
Advanced Operating Systems Lecture notes Dr. Clifford Neuman University of Southern California Information Sciences Institute Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
CSci 555: Advanced Operating Systems Lecture 4 – September 18 2009 Naming and Binding Dr. Clifford Neuman University of Southern California Information Sciences Institute Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Naming Concepts v. Name q What you call something v. Address q Where it is located v. Route q How one gets to it What is http: //www. isi. edu/~bcn ? v. But it is not that clear anymore, it depends on perspective. A name from one perspective may be an address from another. q Perspective means layer of abstraction Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
What are things we name v Users q To direct, and to identify v Hosts (computers) q High level and low level v Services q Service and instance v Files and other “objects” q Content and repository v Groups q Of any of the above Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
How we name things v Host-Based Naming q Host-name is required part of object name v Global Naming q Must look-up name in global database to find address q Name transparency v User/Object Centered Naming q Namespace is centered around user or object v Attribute-Based Naming q Object identified by unique characteristics q Related to resource discovery / search / indexes Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Namespace v. A name space maps: S * ®X e O At a particular point in time. v. The rest of the definition, and even some of the above, is open to discussion/debate. v. What is a “flat namespace” q Implementation issue Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Case Studies v. Host Table Get. Host. By. Name(usc. arpa){ q Flat namespace (? ) scan(host file); return(matching entry); q Global namespace (? ) } v. Grapevine Get. Host. By. Name(host. q Two-level, iterative lookup sc) q Clearinghouse 3 level v. Domain name system gv es q Arbitrary depth q Iterative or recursive(chained) lookup q Multi-level caching Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE sc gv
Domain Name System Iterative query edu 2 usc isi 1 3 aludra venera Lookup(venera. isi. edu) Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Caching in the Domain Name System Chained query edu 2 usc 3 isi cache 1 a 4 aludra Lookup(venera. isi. edu) venera cache Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Scalability of naming v Scalability q Ability to continue to operate efficiently as a system grows large, either numerically, geographically, or administratively. v Affected by q Frequency of update q Granularity q Evolution/reconfiguration v DNS characteristics q Multi-level implementation q Replication of root and other servers q Multi-level caching Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Closure v Closure binds an object to the namespace within which names embedded in the object are to be resolved. q “Object” may as small as the name itself § GNS binds the names to namespaces § Prospero binds enclosing object to multiple namespaces § Tilde and quicksilver bind users to namespaces § NFS mount table constructs system centered namespace q Movement of objects can cause problems § When closure is associated with wrong entity Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Other implementations of naming v. Broadcast q Limited scalability, but faster local response v. Prefix tables q Essentially a form of caching v. Capabilities q Combines security and naming q Traditional name service built over capability based addresses Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Advanced Name Systems v DEC’s Global Naming q Support for reorganization the key idea q Little coordination needed in advance v Half Closure q Names are all tagged with namespace identifiers § DID - Directory Identifier § Hidden part of name - makes it global § Upon reorganization, new DID assigned § Old names relative to old root q But the DID’s must be unique - how do we assign? Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Prospero Directory Service v Multiple namespace centered around a “root” node that is specific to each namespace. q Closure binds objects to this “root” node. v Layers of naming q User level names are “object” centered q Objects still have an address which is global q Namespaces also have global addresses v Customization in Prospero q Filters create user level derived namespaces on the fly q Union links support merging of views Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Resource Discovery v. Similar to naming q Browsing related to directory services q Indexing and search similar to attribute based naming v. Attribute based naming q Profile q Multi-structured naming v. Search engines v. Computing resource discovery Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
The Web v. Object handles q Uniform Resource Identifier (URI’s) q Uniform Resource Locators (URL’s) q Uniform Resource Names (URN’s) v. XML q Definitions provide a form of closure § Conceptual level rather than the “namespace” level. Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
LDAP v. Manage information about users, services q Lighter weight than X. 500 DAP § Heavier than DNS q Applications have conventions on where to look § Often data is duplicated because of multiple conventions q Performance enhancements not as well defined § Caching harder because of less constrained patterns of access Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
CSci 555: Advanced Operating Systems Lecture 5 – September 26 2008 ADVANCE SLIDES (These slides WILL change) Dr. Clifford Neuman University of Southern California Information Sciences Institute Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
New Computing Environments v. Ubiquitous and Pervasive Computing q Including Sensor Nodes q Managing Devices v. Mobile computing q Portable Devices Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Characteristics v. Low power availability v. Constrained resources v. Transient relationships v. Ad-hoc deployment v. Peer to Peer relationships v. Weakly managed Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Ubiquitous computing v. According to Mark Weiser at Xerox: q Transparent computing is the ultimate goal q Computers should disappear into the background q Computation becomes part of the environment Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Ubiquitous Computing v Computing everywhere q Desktop, Laptop, Palmtop q Cars, Cell phones q Shoes, Clothing, Walls (paper / paint) v Connectivity everywhere q Broadband q Wireless v Mobile everywhere q Users move around q Disposable devices Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Ubiquitous Computing v. Structure q q q Resource and service discovery critical User location an issue Interface discovery Disconnected operation Ad-hoc organization v. Security q q Small devices with limited power Intermittent connectivity v. Agents v. Sensor Networks Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Mobile Computing v. Often managed devices q Cell phones q PDA’s q Subscription Services Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Ad-hoc Networking v. Peer-to-peer of network routing v. Transient devices v. Issues: q Discovery q Security q Power v. Examples: q Many Sensor Networks Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
CSci 555: Advanced Operating Systems Lecture 5 – September 25 2009 Ubiquitous and Mobile Computing Dr. Clifford Neuman University of Southern California Information Sciences Institute Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
New Computing Environments v. Ubiquitous and Pervasive Computing q Including Sensor Nodes q Managing Devices v. Mobile computing q Portable Devices Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Characteristics v. Low power availability v. Constrained resources v. Transient relationships v. Ad-hoc deployment v. Peer to Peer relationships v. Weakly managed v. Context aware Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Ubiquitous computing v. According to Mark Weiser at Xerox: q Transparent computing is the ultimate goal q Computers should disappear into the background q Computation becomes part of the environment Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Ubiquitous Computing v Computing everywhere q Desktop, Laptop, Palmtop q Cars, Cell phones q Shoes, Clothing, Walls (paper / paint) v Connectivity everywhere q Broadband q Wireless v Mobile everywhere q Users move around q Disposable devices Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Ubiquitous Computing v. Structure q q q Resource and service discovery critical User location an issue Interface discovery Disconnected operation Ad-hoc organization v. Security q q Small devices with limited power Intermittent connectivity v. Agents v. Sensor Networks Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Mobile Computing v. Often managed devices q Cell phones q PDA’s q Subscription Services Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Ad-hoc Networking v. Peer-to-peer of network routing v. Transient devices v. Issues: q Discovery q Security q Power v. Examples: q Many Sensor Networks Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Source: ISI & DARPA PAC/C Program Communication/Computation Technology Projection Assume: 10 kbit/sec. Radio, 10 m range. Large cost of communications relative to computation continues (source – talk by Deborah Estrin) Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Active Badges v. Provides location information and one or more buttons v. Simple interface q Controlled access q Carries context § Two way, device knows where your are, and your location knows you are present § Moves your environment Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
In-Network Processing v. Communication is expensive, computing less-so, so pre-process to reduce data sent. v. Send information, not-data. v. Requires more knowledge at the edges so that query can be distributed. v. Intermediate nodes correlate and agregate results. Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Directed Diffusion v. Publish/Subscribe model v. Data named, not nodes v. But what are the implications q discussion Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
A Taxonomy v. Approaches/Products/Devices differ by placement/nature of: q Management q Storage q Computing q Communication q Context maintenance q Authority Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Classes v. Mobile Terminals v. Passive devices v. Personal Devices v. Remote Sensors/Actuators v. Communicating Devices v. Sensor Networks Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
Examples v. Cell Phones vi-phone v. PDA v. Home automation v. Proximity cards v. Laptop computer v. In Vehicle networks v. Active Badges Copyright © 1995 -2009 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE
- Clifford neuman rate my professor
- Operating systems lecture notes
- 01:640:244 lecture notes - lecture 15: plat, idah, farad
- Advanced inorganic chemistry lecture notes
- Concept map neuman systems model
- Neuman system model
- Neuman's systems theory
- Using the neuman systems model for best practices
- Thick description
- J. clifford baxter
- Clifford materials reactivity testing
- Amanda martin enron
- Gwen nuttall
- Clifford postermino
- Ann eliza clifford lewis
- Clifford sifton open door policy
- Síndrome de postmadurez de clifford
- Crmworkshop
- Arthur clifford howard
- Millivoltage
- Commercial tire inspection
- Gari clifford
- Immigration lawyers charlton
- Clifford tse
- Cliff baxter note
- Clifford robinson md
- Ricart agrawala algorithm code in java
- Advanced operating system
- Multiprocessor scheduling in os
- Project procurement management lecture notes
- Theology proper lecture notes
- Public sector accounting definition
- Software project management lecture notes
- Electricity and magnetism lecture notes
- Physics 111 lecture notes
- Physical science lecture notes
- Power system dynamics and stability lecture notes
- Microbial physiology notes
- Sensors and actuators ppt
- Limits fits and tolerances lecture notes
- Financial engineering notes