DBOS

2021 ◽  
Vol 15 (1) ◽  
pp. 21-30
Author(s):  
Athinagoras Skiadopoulos ◽  
Qian Li ◽  
Peter Kraft ◽  
Kostis Kaffes ◽  
Daniel Hong ◽  
...  

This paper lays out the rationale for building a completely new operating system (OS) stack. Rather than build on a single node OS together with separate cluster schedulers, distributed filesystems, and network managers, we argue that a distributed transactional DBMS should be the basis for a scalable cluster OS. We show herein that such a database OS (DBOS) can do scheduling, file management, and inter-process communication with competitive performance to existing systems. In addition, significantly better analytics can be provided as well as a dramatic reduction in code complexity through implementing OS services as standard database queries, while implementing low-latency transactions and high availability only once.

2013 ◽  
Vol 373-375 ◽  
pp. 1634-1637
Author(s):  
Bo Qu

This paper describes the design and implementation of piping functionality for ARM based multi-process mono-kernel embedded operating system, including overview of inter-process communication, key techniques of designing piping routines such as getting i-node for piping, creating pipe, reading and writing pipe, and terminating pipe, etc. At the final, the paper provides a demo example to show the effect. Based on the piping routines described in this paper, more powerful shell interpreter with redirecting and piping functionalities as well as other shell commands analogous to that of embedded Linux can be implemented.


2013 ◽  
Vol 380-384 ◽  
pp. 3826-3829
Author(s):  
Ning Wang ◽  
Sheng Wen Gong ◽  
Huai Xiao Wang

SELinux (Security Enhanced Linux) inherited the basic design of LINUX, and it is a high secure operating system. It is important to know how to make the IPC (Inter-Process Communication) for this kind of multi-task and multi-user system. In this paper, Finite State Automaton is used to verify the security of IPC mechanisms of SELinux. Finally, IPC mechanisms are verified with SPIN model checker.


Author(s):  
Kevin J. Sgroi ◽  
Scott E. Spetka

Utilizing threads and other parallel execution techniques efficiently to achieve concurrency on multiple processors/cores is becoming more difficult as the complexity of engineering applications increases. While hardware performance and scalability in this environment have been well-studied, software and operating system aspects of parallel code execution deserve additional attention. This is especially the case for smaller multi-core architectures such as those found in desktop computers. A matrix-multiply application has been customized to generate a multi-threaded load for testing, to address issues associated with mixing a multi-threaded load with available Linux benchmarking tools. This application was executed with the UNIXBENCH benchmark test suite in this study to conduct experiments designed to reveal problem areas that should be considered when implementing applications on modern parallel computing architectures. The analysis covers five types of operations: CPU intensive, Inter-process communication with pipes, shell script execution, file I/O and System call overhead. The results indicate that shell script execution, file I/O and system call overhead had the most degradation in performance as the multi-threaded load was increased. Pipe-based communication (directly between processes) and CPU intensive operations tended to scale well as the load increased.


2014 ◽  
Vol 981 ◽  
pp. 161-166
Author(s):  
Chen Chen ◽  
Jia Xing Song ◽  
Wei Dong Liu

As one of the most popular mobile operating system, Android has been troubled by privilege escalation attacks. This is because that the original Android ignores the inspection of transmitted data inintent. It only checks the permission ofintentto determine whether the Inter-Process Communication (IPC) could continue. We developed Nipdroid to solve the mentioned defect in Android IPC detection. Nipdroid is based on the technology of marking and tracking sensitive data. After the original Android detection, Nipdroid extracts the sensitive tags fromintent, and matches them with the permission lists of both communication apps, and then checks whether there is unreasonable data transmission in IPC. Experiments show that Nipdroid is effective on both preventing privilege escalation attacks and protecting user's sensitive data.


Interprocess Communication (IPC) is used by the cooperating processes for communication and synchronization. With the advent of Distributed Systems and Microkernel Operating systems, IPC has been used for designing the system for cooperation. This raised the requirements for improving the communication and synchronization for the better performance of the system. Here, a mechanism of synchronization between the processes to reduce the waiting time of process using POSIX (Portable Operating System Interface) threads has been proposed to perform and synchronize the given task.


Author(s):  
Bhushana Samyuel Neelam ◽  
Benjamin A Shimray

: The ever-increasing dependency of the utilities on networking brought several cyber vulnerabilities and burdened them with dynamic networking demands like QoS, multihoming, and mobility. As the existing network was designed without security in context, it poses several limitations in mitigating the unwanted cyber threats and struggling to provide an integrated solution for the novel networking demands. These limitations resulted in the design and deployment of various add-on protocols that made the existing network architecture a patchy and complex network. The proposed work introduces one of the future internet architectures, which seem to provide abilities to mitigate the above limitations. Recursive internetworking architecture (RINA) is one of the future internets and appears to be a reliable solution with its promising design features. RINA extended inter-process communication to distributed inter-process communication and combined it with recursion. RINA offered unique inbuilt security and the ability to meet novel networking demands with its design. It has also provided integration methods to make use of the existing network infrastructure. The present work reviews the unique architecture, abilities, and adaptability of RINA based on various research works of RINA. The contribution of this article is to expose the potential of RINA in achieving efficient networking solutions among academia and industry.


Sign in / Sign up

Export Citation Format

Share Document