首页 > 最新文献

Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III最新文献

英文 中文
Feedback-based scheduling: a toolbox approach 基于反馈的调度:工具箱方法
Pub Date : 1993-10-14 DOI: 10.1109/WWOS.1993.348177
C. Pu, Robert M. Fuhrer
Fine-grain scheduling based on software feedback was introduced in the Synthesis operating system to solve two problems: the dependency between jobs in a pipeline and the low-latency requirements of multimedia type applications. The performance level achieved and the adaptiveness of applications running on Synthesis demonstrated the success of fine-grain scheduling based on software feedback. However, the Synthesis implementation of software feedback is specialized for that particular architecture and a particular application (pipelined process scheduling). Consequently, despite the proven success of fine-grain scheduling, it is not easy to port it to another operating system or to apply its lessons elsewhere, even within Synthesis. To address the problems of portability and extensibility of software feedback scheduling mechanisms, we have taken a toolbox approach in our current research. Instead of creating a specialized solution for each particular scheduling problem, we are developing a toolbox of standard, relatively simple components with well-defined performance and functionality characteristics. The goal is the ability to quickly implement sophisticated software feedback mechanisms by composing these basic toolbox components. The intended applications are primarily in the adaptive scheduling needed in multimedia and real-time domains, especially when input/output operations introduce a large variance in job completion time,.<>
在Synthesis操作系统中引入了基于软件反馈的细粒度调度,以解决流水线作业之间的依赖关系和多媒体类应用的低延迟需求。所达到的性能水平和运行在Synthesis上的应用程序的适应性证明了基于软件反馈的细粒度调度的成功。然而,软件反馈的合成实现是专门为特定的体系结构和特定的应用程序(流水线进程调度)设计的。因此,尽管细粒度调度已被证明是成功的,但将其移植到另一个操作系统或将其经验应用到其他地方并不容易,甚至在Synthesis中也是如此。为了解决软件反馈调度机制的可移植性和可扩展性问题,我们在当前的研究中采用了工具箱方法。我们不是为每个特定的调度问题创建专门的解决方案,而是开发一个标准的、相对简单的组件工具箱,这些组件具有良好定义的性能和功能特征。目标是通过组合这些基本工具箱组件来快速实现复杂的软件反馈机制。预期的应用主要是在多媒体和实时领域中需要的自适应调度,特别是当输入/输出操作在作业完成时间上引入了很大的变化时。
{"title":"Feedback-based scheduling: a toolbox approach","authors":"C. Pu, Robert M. Fuhrer","doi":"10.1109/WWOS.1993.348177","DOIUrl":"https://doi.org/10.1109/WWOS.1993.348177","url":null,"abstract":"Fine-grain scheduling based on software feedback was introduced in the Synthesis operating system to solve two problems: the dependency between jobs in a pipeline and the low-latency requirements of multimedia type applications. The performance level achieved and the adaptiveness of applications running on Synthesis demonstrated the success of fine-grain scheduling based on software feedback. However, the Synthesis implementation of software feedback is specialized for that particular architecture and a particular application (pipelined process scheduling). Consequently, despite the proven success of fine-grain scheduling, it is not easy to port it to another operating system or to apply its lessons elsewhere, even within Synthesis. To address the problems of portability and extensibility of software feedback scheduling mechanisms, we have taken a toolbox approach in our current research. Instead of creating a specialized solution for each particular scheduling problem, we are developing a toolbox of standard, relatively simple components with well-defined performance and functionality characteristics. The goal is the ability to quickly implement sophisticated software feedback mechanisms by composing these basic toolbox components. The intended applications are primarily in the adaptive scheduling needed in multimedia and real-time domains, especially when input/output operations introduce a large variance in job completion time,.<<ETX>>","PeriodicalId":345070,"journal":{"name":"Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126576651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Operating system implications of solid-state mobile computers 固态移动计算机的操作系统含义
Pub Date : 1993-10-14 DOI: 10.1109/WWOS.1993.348178
R. Cáceres, F. Douglis, Kai Li, B. Marsh
Trends in storage technology indicate that future notebook, palmtop, and smaller mobile computers will contain battery-backed DRAM as primary storage and direct-mapped hash memory as secondary storage, but no disk. All storage will offer uniform, random access read times through a single-level 64-bit address space. The paper explores the operating system implications of this storage organization. The system should exploit the benefits of having all data reside in fast memory. It can do away with much of the data duplication and related data movement that take place in conventional organizations. The system also needs to hide the limitations of flash memory: write access times higher than read access times, the need to erase memory before rewriting it, and a limited number of write cycles in the lifetime of the device. It needs to limit write traffic to flash memory and avoid writing repeatedly to the same area of flash memory. These steps will increase performance, improve space utilization, and prolong the life of flash memory.<>
存储技术的趋势表明,未来的笔记本电脑、掌上电脑和较小的移动计算机将包含电池支持的DRAM作为主存储,直接映射的散列内存作为辅助存储,但没有磁盘。所有存储都将通过单级64位地址空间提供统一的随机访问读取时间。本文探讨了这种存储组织的操作系统含义。系统应该充分利用将所有数据驻留在快速内存中的优势。它可以消除传统组织中发生的许多数据重复和相关数据移动。系统还需要隐藏闪存的局限性:写访问次数高于读访问次数,在重写内存之前需要擦除内存,以及设备生命周期中有限的写周期。它需要限制对闪存的写入流量,并避免重复写入闪存的同一区域。这些步骤将提高性能,改善空间利用率,并延长闪存的使用寿命。
{"title":"Operating system implications of solid-state mobile computers","authors":"R. Cáceres, F. Douglis, Kai Li, B. Marsh","doi":"10.1109/WWOS.1993.348178","DOIUrl":"https://doi.org/10.1109/WWOS.1993.348178","url":null,"abstract":"Trends in storage technology indicate that future notebook, palmtop, and smaller mobile computers will contain battery-backed DRAM as primary storage and direct-mapped hash memory as secondary storage, but no disk. All storage will offer uniform, random access read times through a single-level 64-bit address space. The paper explores the operating system implications of this storage organization. The system should exploit the benefits of having all data reside in fast memory. It can do away with much of the data duplication and related data movement that take place in conventional organizations. The system also needs to hide the limitations of flash memory: write access times higher than read access times, the need to erase memory before rewriting it, and a limited number of write cycles in the lifetime of the device. It needs to limit write traffic to flash memory and avoid writing repeatedly to the same area of flash memory. These steps will increase performance, improve space utilization, and prolong the life of flash memory.<<ETX>>","PeriodicalId":345070,"journal":{"name":"Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125259140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Some issues for single address space systems 单地址空间系统的一些问题
Pub Date : 1993-10-14 DOI: 10.1109/WWOS.1993.348157
J. Chase, M. Feeley, H. Levy
We previously described Opal, an OS environment that has a single virtual address space common to all protection domains, rather than the usual private virtual address space per protection domain (e.g., a Unix process). All threads on an Opal node see the same mapping of virtual to physical addresses; any thread can reference any virtual address, but access to the data is determined by the thread's protection domain. The single address space approach is made feasible by the large virtual address spaces of the newest RISC processors. It allows protection domains to pass and share memory segments by mutual consent, while preserving the meaning of pointers. At the time Opal was a paper design, with only a few pieces of implementation. Since that time the key features of Opal have been prototyped. While the current prototype runs on 32-bit MIPS systems, it demonstrates that the model is both workable and useful. Yet the single address space idea remains a difficult adjustment, both conceptually and practically, for those of us long accustomed to per-process address spaces. Having spent much of the past year arguing the benefits of the model, our purpose now is to outline some of its limitations and complications. The goal is to separate the real problems from the false ones, and to focus the debate on the areas that we think are most important, based on our experience.<>
我们之前描述了Opal,这是一个操作系统环境,它具有对所有保护域通用的单个虚拟地址空间,而不是每个保护域(例如Unix进程)通常的私有虚拟地址空间。Opal节点上的所有线程都看到相同的虚拟地址到物理地址的映射;任何线程都可以引用任何虚拟地址,但是对数据的访问由线程的保护域决定。最新RISC处理器的大虚拟地址空间使单地址空间方法成为可能。它允许保护域通过相互同意传递和共享内存段,同时保留指针的含义。当时Opal是一个纸面设计,只有几个实现部分。从那时起,Opal的主要特性就被原型化了。虽然目前的原型运行在32位MIPS系统上,但它表明该模型既可行又有用。然而,对于我们这些长期习惯于每个进程的地址空间的人来说,单地址空间的想法在概念上和实践上仍然是一个困难的调整。在过去的一年里,我们花了很多时间讨论这种模式的好处,现在我们的目的是概述它的一些局限性和复杂性。我们的目标是将真实的问题与虚假的问题区分开来,并根据我们的经验将辩论集中在我们认为最重要的领域。
{"title":"Some issues for single address space systems","authors":"J. Chase, M. Feeley, H. Levy","doi":"10.1109/WWOS.1993.348157","DOIUrl":"https://doi.org/10.1109/WWOS.1993.348157","url":null,"abstract":"We previously described Opal, an OS environment that has a single virtual address space common to all protection domains, rather than the usual private virtual address space per protection domain (e.g., a Unix process). All threads on an Opal node see the same mapping of virtual to physical addresses; any thread can reference any virtual address, but access to the data is determined by the thread's protection domain. The single address space approach is made feasible by the large virtual address spaces of the newest RISC processors. It allows protection domains to pass and share memory segments by mutual consent, while preserving the meaning of pointers. At the time Opal was a paper design, with only a few pieces of implementation. Since that time the key features of Opal have been prototyped. While the current prototype runs on 32-bit MIPS systems, it demonstrates that the model is both workable and useful. Yet the single address space idea remains a difficult adjustment, both conceptually and practically, for those of us long accustomed to per-process address spaces. Having spent much of the past year arguing the benefits of the model, our purpose now is to outline some of its limitations and complications. The goal is to separate the real problems from the false ones, and to focus the debate on the areas that we think are most important, based on our experience.<<ETX>>","PeriodicalId":345070,"journal":{"name":"Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134199290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Providing network video service to mobile clients 为移动客户端提供网络视频业务
Pub Date : 1993-10-14 DOI: 10.1109/WWOS.1993.348173
B. Mah, S. Seshan, K. Keeton, R. Katz, D. Ferrari
Mobile computing and multimedia are two emerging trends in computer systems. One foreseeable application suggested by these two trends is the playback of stored video on both mobile devices and conventional workstations. A system supporting such an application must provide performance-guaranteed delivery of video data to different types of clients, some of which may be mobile. In this paper, we address some of the issues involved in supporting such an application, namely the efficient layout of multiple representations of video data on a file server and network support for host mobility.<>
移动计算和多媒体是计算机系统的两个新兴趋势。这两种趋势提出的一个可预见的应用是在移动设备和传统工作站上播放存储的视频。支持这种应用程序的系统必须向不同类型的客户端提供性能保证的视频数据传输,其中一些客户端可能是移动的。在本文中,我们解决了支持这样一个应用程序所涉及的一些问题,即在文件服务器上视频数据的多种表示的有效布局和对主机移动的网络支持。
{"title":"Providing network video service to mobile clients","authors":"B. Mah, S. Seshan, K. Keeton, R. Katz, D. Ferrari","doi":"10.1109/WWOS.1993.348173","DOIUrl":"https://doi.org/10.1109/WWOS.1993.348173","url":null,"abstract":"Mobile computing and multimedia are two emerging trends in computer systems. One foreseeable application suggested by these two trends is the playback of stored video on both mobile devices and conventional workstations. A system supporting such an application must provide performance-guaranteed delivery of video data to different types of clients, some of which may be mobile. In this paper, we address some of the issues involved in supporting such an application, namely the efficient layout of multiple representations of video data on a file server and network support for host mobility.<<ETX>>","PeriodicalId":345070,"journal":{"name":"Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124559131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Distributed shared object memory 分布式共享对象内存
Pub Date : 1993-10-14 DOI: 10.1109/WWOS.1993.348158
P. Guedes, M. Castro
This paper describes the goals, programming model and design of DiSOM, a software based distributed shared memory system for a multicomputer composed of heterogeneous nodes connected by a high-speed network. A typical configuration is a cluster of tens of high-performance workstations and shared-memory multiprocessors of two or three different architectures, each with a processing power of a few hundred MIPS and several hundred kilobytes of memory, and connected by a high-speed interconnect such as ATM. Programs in DiSOM are written using a shared-memory multiprocessor model where synchronization objects are associated with data items. Programs use a threads library to start new threads, possibly at a specified node, and to synchronize between concurrent threads. Programs must call the synchronization primitives explicitly, as they would in a shared-memory multiprocessor. The system traps these calls and uses the information to drive both distributed synchronization and the memory coherence protocol. DiSOM uses the entry consistency memory model to ensure coherence. This model guarantees memory consistency, as long as an access to a data item is enclosed between an acquire and a release on the synchronization object associated with the data item. Stronger consistency models, such as release consistency and processor consistency, may also be supported.<>
本文介绍了一种基于软件的分布式共享存储系统DiSOM的目标、编程模型和设计方法,该系统适用于由高速网络连接的异构节点组成的多计算机。典型的配置是由数十个高性能工作站和两种或三种不同架构的共享内存多处理器组成的集群,每个处理器的处理能力为几百MIPS和几百kb的内存,并通过ATM等高速互连连接起来。DiSOM中的程序是使用共享内存多处理器模型编写的,其中同步对象与数据项相关联。程序使用线程库来启动新线程(可能在指定的节点上),并在并发线程之间进行同步。程序必须显式地调用同步原语,就像它们在共享内存多处理器中那样。系统捕获这些调用并使用这些信息来驱动分布式同步和内存一致性协议。DiSOM使用表项一致性内存模型来保证一致性。只要对数据项的访问包含在与该数据项关联的同步对象的获取和释放之间,该模型就可以保证内存一致性。更强的一致性模型,如发布一致性和处理器一致性,也可能得到支持。
{"title":"Distributed shared object memory","authors":"P. Guedes, M. Castro","doi":"10.1109/WWOS.1993.348158","DOIUrl":"https://doi.org/10.1109/WWOS.1993.348158","url":null,"abstract":"This paper describes the goals, programming model and design of DiSOM, a software based distributed shared memory system for a multicomputer composed of heterogeneous nodes connected by a high-speed network. A typical configuration is a cluster of tens of high-performance workstations and shared-memory multiprocessors of two or three different architectures, each with a processing power of a few hundred MIPS and several hundred kilobytes of memory, and connected by a high-speed interconnect such as ATM. Programs in DiSOM are written using a shared-memory multiprocessor model where synchronization objects are associated with data items. Programs use a threads library to start new threads, possibly at a specified node, and to synchronize between concurrent threads. Programs must call the synchronization primitives explicitly, as they would in a shared-memory multiprocessor. The system traps these calls and uses the information to drive both distributed synchronization and the memory coherence protocol. DiSOM uses the entry consistency memory model to ensure coherence. This model guarantees memory consistency, as long as an access to a data item is enclosed between an acquire and a release on the synchronization object associated with the data item. Stronger consistency models, such as release consistency and processor consistency, may also be supported.<<ETX>>","PeriodicalId":345070,"journal":{"name":"Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Ubiquitous mobile host internetworking 无处不在的移动主机互联
Pub Date : 1993-10-14 DOI: 10.1109/WWOS.1993.348167
David B. Johnson
Argues that being a mobile host (or a mobile capable host) should be a standard property of all hosts in the Internet, and summarizes the design of a new protocol for transparently allowing these mobile hosts to interoperate in the Internet using IP. A mobile host may move from one network to another at any time, while always using only its "home" IP address. Any host may be configured to be a "mobile host" simply by running the appropriate software on it, and there is no penalty for this configuration, since the protocol automatically uses only the standard IP routing mechanisms, adding no overhead to IP, when a mobile host is currently connected to its home network. The protocol scales well to very large numbers of mobile hosts and adds little overhead for packets sent to a mobile host currently connected to a foreign network. The protocol is currently being implemented within the Berkeley networking code and is expected to be available shortly to interested groups outside Carnegie Mellon.<>
认为作为一个移动主机(或一个能够移动的主机)应该成为互联网上所有主机的标准属性,并总结了一个新协议的设计,以透明地允许这些移动主机使用IP在互联网上互操作。移动主机可以随时从一个网络移动到另一个网络,但始终只使用其“家庭”IP地址。任何主机都可以简单地通过在其上运行适当的软件来配置为“移动主机”,并且这种配置没有任何损失,因为当移动主机当前连接到其家庭网络时,协议自动只使用标准IP路由机制,不会增加IP开销。该协议可以很好地扩展到非常大量的移动主机,并且为发送到当前连接到外部网络的移动主机的数据包增加很少的开销。该协议目前正在伯克利网络代码中实现,并有望很快提供给卡内基梅隆大学以外的感兴趣的团体。
{"title":"Ubiquitous mobile host internetworking","authors":"David B. Johnson","doi":"10.1109/WWOS.1993.348167","DOIUrl":"https://doi.org/10.1109/WWOS.1993.348167","url":null,"abstract":"Argues that being a mobile host (or a mobile capable host) should be a standard property of all hosts in the Internet, and summarizes the design of a new protocol for transparently allowing these mobile hosts to interoperate in the Internet using IP. A mobile host may move from one network to another at any time, while always using only its \"home\" IP address. Any host may be configured to be a \"mobile host\" simply by running the appropriate software on it, and there is no penalty for this configuration, since the protocol automatically uses only the standard IP routing mechanisms, adding no overhead to IP, when a mobile host is currently connected to its home network. The protocol scales well to very large numbers of mobile hosts and adds little overhead for packets sent to a mobile host currently connected to a foreign network. The protocol is currently being implemented within the Berkeley networking code and is expected to be available shortly to interested groups outside Carnegie Mellon.<<ETX>>","PeriodicalId":345070,"journal":{"name":"Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132941813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
How to program networked portable computers 如何为联网的便携式计算机编程
Pub Date : 1993-10-14 DOI: 10.1109/WWOS.1993.348176
David Goldberg, M. M. Tso
What is the correct programming model for networked portable computers? Such computers come in many shapes and sizes, so it is unreasonable to expect that there is one programming model appropriate for every single variety. However, it is likely that there is some model that will work well for a wide range of cases. We propose the intelligently autonomous model for this role. Our goal for a widely applicable model is that it should allow applications to operate during disconnections, and that during disconnections the user shouldn't be surprised, that is, applications should behave predictably. The intelligently autonomous model fulfills these goals by having a remote file system with caching, and allowing user control over the cache. In more detail, we are interested in portable networked computers that: frequently access external data, have a reasonably powerful CPU, have a wireless network that suffers from intermittent, unpredictable disruptions. We survey existing models, and then explain why we think they fall short of user requirements. In particular, we feel that existing models have wrongly assumed that it is not necessary to customize applications for an intermittently connected environment. Then we present our intelligently autonomous model, and give a very brief report of our experiences with a prototype of it.<>
对于联网的便携式计算机,正确的编程模型是什么?这样的计算机有多种形状和大小,因此期望有一种编程模型适用于每种类型是不合理的。然而,很可能会有一些模型适用于广泛的情况。我们为这个角色提出了智能自治模型。对于一个广泛适用的模型,我们的目标是它应该允许应用程序在断开连接期间运行,并且在断开连接期间用户不应该感到惊讶,也就是说,应用程序的行为应该是可预测的。智能自治模型通过具有缓存的远程文件系统并允许用户控制缓存来实现这些目标。更详细地说,我们感兴趣的是便携式联网计算机:经常访问外部数据,具有相当强大的CPU,具有遭受间歇性、不可预测中断的无线网络。我们调查现有的模型,然后解释为什么我们认为它们不能满足用户需求。特别是,我们认为现有的模型错误地认为没有必要为间歇性连接的环境定制应用程序。然后,我们展示了我们的智能自主模型,并简要报告了我们使用它的原型的经验。
{"title":"How to program networked portable computers","authors":"David Goldberg, M. M. Tso","doi":"10.1109/WWOS.1993.348176","DOIUrl":"https://doi.org/10.1109/WWOS.1993.348176","url":null,"abstract":"What is the correct programming model for networked portable computers? Such computers come in many shapes and sizes, so it is unreasonable to expect that there is one programming model appropriate for every single variety. However, it is likely that there is some model that will work well for a wide range of cases. We propose the intelligently autonomous model for this role. Our goal for a widely applicable model is that it should allow applications to operate during disconnections, and that during disconnections the user shouldn't be surprised, that is, applications should behave predictably. The intelligently autonomous model fulfills these goals by having a remote file system with caching, and allowing user control over the cache. In more detail, we are interested in portable networked computers that: frequently access external data, have a reasonably powerful CPU, have a wireless network that suffers from intermittent, unpredictable disruptions. We survey existing models, and then explain why we think they fall short of user requirements. In particular, we feel that existing models have wrongly assumed that it is not necessary to customize applications for an intermittently connected environment. Then we present our intelligently autonomous model, and give a very brief report of our experiences with a prototype of it.<<ETX>>","PeriodicalId":345070,"journal":{"name":"Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Supporting application-specific resolution in an optimistically replicated file system 在乐观复制的文件系统中支持特定于应用程序的解析
Pub Date : 1993-10-14 DOI: 10.1109/WWOS.1993.348170
Puneet Kumar, M. Satyanarayanan
We describe an interface to incorporate application-specific knowledge for conflict resolution in an optimistically replicated file system. Conflicts arise in such systems because replicas of an object can be modified simultaneously in different network partitions. Application-specific knowledge is made available by the application writer in specialized tools called Application-Specific Resolvers (or ASRS). The interface we describe here is used to bind ASRs to objects and to specify the conditions under which a specific ASR is invoked. This allows the system to make conflict resolution transparent to the user, thus improving the usability of optimistic replication.<>
我们描述了一个接口,用于在乐观复制的文件系统中合并特定于应用程序的冲突解决知识。在这样的系统中会出现冲突,因为一个对象的副本可以在不同的网络分区中同时被修改。特定于应用程序的知识由应用程序编写人员通过称为特定于应用程序的解析器(application -specific Resolvers, ASRS)的专用工具提供。我们在这里描述的接口用于将ASR绑定到对象,并指定调用特定ASR的条件。这允许系统使冲突解决对用户透明,从而提高乐观复制的可用性
{"title":"Supporting application-specific resolution in an optimistically replicated file system","authors":"Puneet Kumar, M. Satyanarayanan","doi":"10.1109/WWOS.1993.348170","DOIUrl":"https://doi.org/10.1109/WWOS.1993.348170","url":null,"abstract":"We describe an interface to incorporate application-specific knowledge for conflict resolution in an optimistically replicated file system. Conflicts arise in such systems because replicas of an object can be modified simultaneously in different network partitions. Application-specific knowledge is made available by the application writer in specialized tools called Application-Specific Resolvers (or ASRS). The interface we describe here is used to bind ASRs to objects and to specify the conditions under which a specific ASR is invoked. This allows the system to make conflict resolution transparent to the user, thus improving the usability of optimistic replication.<<ETX>>","PeriodicalId":345070,"journal":{"name":"Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126130713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Transparent mistrust: OS support for cryptography-in-the-large 透明不信任:操作系统支持大规模加密
Pub Date : 1993-10-14 DOI: 10.1109/WWOS.1993.348165
M. Blaze
This position paper advocates the development of new mechanisms to support cooperative computing requiring less than complete trust. Traditional OS security mechanisms have assumed a monolithic or hierarchical model for controlling and arbitrating access to local resources. Operating systems authenticate users as they log in and enforce controlled access to files, devices and memory. Distributed systems change the picture somewhat, with less-trusted clients obtaining some resources from centralized servers, but typically retain some notion of central authority within a framework of global trust and control. Boundaries of trust are going to become increasingly important to future workstation operating systems. Cryptographic algorithms and protocols can protect these boundaries, but the interfaces to them need some attention first. Our experiences, which are admittedly within the research environment, lead us to believe that cryptographic protection can be quite practical across a variety of layers of the system; importantly, no one layer emerges as a decisive winner as to where this protection best belongs. (The application layer, however, does appear to be the clear loser.).<>
这篇立场文件提倡开发新的机制来支持不需要完全信任的协作计算。传统的操作系统安全机制采用单一的或分层的模型来控制和仲裁对本地资源的访问。操作系统在用户登录时对其进行身份验证,并对文件、设备和内存进行控制访问。分布式系统在某种程度上改变了这种情况,不太可信的客户机从集中式服务器获得一些资源,但通常在全局信任和控制的框架内保留一些中央权威的概念。信任边界对未来的工作站操作系统将变得越来越重要。加密算法和协议可以保护这些边界,但首先需要注意它们的接口。我们在研究环境中的经验使我们相信,加密保护在系统的各个层中都是非常实用的;重要的是,对于这种保护的最佳归属,没有一个层会成为决定性的赢家。(然而,应用层显然是输家。)
{"title":"Transparent mistrust: OS support for cryptography-in-the-large","authors":"M. Blaze","doi":"10.1109/WWOS.1993.348165","DOIUrl":"https://doi.org/10.1109/WWOS.1993.348165","url":null,"abstract":"This position paper advocates the development of new mechanisms to support cooperative computing requiring less than complete trust. Traditional OS security mechanisms have assumed a monolithic or hierarchical model for controlling and arbitrating access to local resources. Operating systems authenticate users as they log in and enforce controlled access to files, devices and memory. Distributed systems change the picture somewhat, with less-trusted clients obtaining some resources from centralized servers, but typically retain some notion of central authority within a framework of global trust and control. Boundaries of trust are going to become increasingly important to future workstation operating systems. Cryptographic algorithms and protocols can protect these boundaries, but the interfaces to them need some attention first. Our experiences, which are admittedly within the research environment, lead us to believe that cryptographic protection can be quite practical across a variety of layers of the system; importantly, no one layer emerges as a decisive winner as to where this protection best belongs. (The application layer, however, does appear to be the clear loser.).<<ETX>>","PeriodicalId":345070,"journal":{"name":"Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126162720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Virtual memory support for multiple page sizes 支持多种页面大小的虚拟内存
Pub Date : 1993-10-14 DOI: 10.1109/WWOS.1993.348164
Y. Khalidi, Madhusudhan Talluri, M. Nelson, Dock Williams
The advent of computers with 64-bit virtual address spaces and giga-bytes of physical memory will provide applications with many more orders of magnitude of memory than is possible today. However, to tap the potential of this new hardware, we need to re-examine how virtual memory is traditionally managed. We concentrate in this note on two aspects of virtual memory: software support for multiple page sizes, and memory management policies tuned to large amounts of physical memory. We argue for the need to examine these areas, and we identify several questions that need to be answered. In particular, we show that providing support for multiple page sizes is not as straightforward as may initially appear.<>
具有64位虚拟地址空间和千兆字节物理内存的计算机的出现将为应用程序提供比今天可能的更多数量级的内存。然而,为了挖掘这种新硬件的潜力,我们需要重新检查传统上是如何管理虚拟内存的。在本文中,我们将集中讨论虚拟内存的两个方面:对多个页面大小的软件支持,以及针对大量物理内存进行调整的内存管理策略。我们认为有必要检查这些领域,并确定了几个需要回答的问题。特别是,我们表明,提供对多种页面大小的支持并不像最初看起来那么简单。
{"title":"Virtual memory support for multiple page sizes","authors":"Y. Khalidi, Madhusudhan Talluri, M. Nelson, Dock Williams","doi":"10.1109/WWOS.1993.348164","DOIUrl":"https://doi.org/10.1109/WWOS.1993.348164","url":null,"abstract":"The advent of computers with 64-bit virtual address spaces and giga-bytes of physical memory will provide applications with many more orders of magnitude of memory than is possible today. However, to tap the potential of this new hardware, we need to re-examine how virtual memory is traditionally managed. We concentrate in this note on two aspects of virtual memory: software support for multiple page sizes, and memory management policies tuned to large amounts of physical memory. We argue for the need to examine these areas, and we identify several questions that need to be answered. In particular, we show that providing support for multiple page sizes is not as straightforward as may initially appear.<<ETX>>","PeriodicalId":345070,"journal":{"name":"Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125800174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
期刊
Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1