SLIDE 1
Some current topics Recent OS research and development tends to - - PowerPoint PPT Presentation
Some current topics Recent OS research and development tends to - - PowerPoint PPT Presentation
Some current topics Recent OS research and development tends to centre around distributed systems and large scale networks, but not exclusively. What follows is a personal selection of some recent topics presented at the Workshop on Hot Topics
SLIDE 2
SLIDE 3
TCP Offload is a dumb idea whose time has come
by J. Mogul. TCP is the protocol used at the transport layer for the vast majority of Internet traffic. As such, computers spend a lot of resource executing it. As with I/O, one might expect that this computation could be offloaded from the CPU. Historically, this has not been shown to be effective. This paper argues that in a context where dedicated inter-storage channels (such as SCSI or Fibre Channel) are being replaced by gigabit(+) Ethernet, and DMA needs to be extended to RDMA (Remote DMA), offloading TCP is worth the effort.
SLIDE 4
Scheduling and Simulation:
how to upgrade distributed systems, by S. Ajmani, B. Liskov, L. Shrira. How do you upgrade the software on a distributed system comprising many nodes, which may or may not be up, without taking the whole system down? This paper proposes a system for scheduling such upgrades among the nodes, in such a way that persistent state survives upgrades, and the system continues to work during the (possibly long) upgrade process, when different nodes are running different versions.
SLIDE 5
POST: A Secure, Resilient, Cooperative Messaging System
by A. Mislove et 9 al.(!) This paper presents a messaging infrastructure (for email, IM, calendars, shared whiteboards etc.) that uses no centralized server, but rather uses P2P techniques among the participants’ desktop computers.
SLIDE 6
Cosy: develop in user-land, run in kernel-mode
by A. Purohit, C.P. Wright, J. Spadavecchia, E. Zadok. Most communication (Web, FTP, email) involves transporting large amounts of data between userspace and the kernel device drivers, wasting a great deal of time. Some applications (e.g. ls) make very many small system calls, giving high context-switching
- verhead.
Cosy is an extended GCC which allows segments of code to be marked as compounds. These are then (via a new system call) executed in kernel space. To make this safe, a number of static and dynamic checks are made on the code, as well as techniques such the use of a separate
- segment. (However, it’s not completely safe; we wouldn’t run it
here!)
SLIDE 7
Certifying program execution with secure processors
by B. Chen, R. Morris. This paper presents the design of a secure processor for applications such as copy protection, remote execution, etc. The processor trusts itself and its on-chip cache, but nothing else (not even memory). It is built in to a tamper-resistant package. The user provides encrypted or signed data to the CPU; the CPU encrypts or signs all data sent to memory. The user can run any code, but the processor reports whether it’s running trusted code.
SLIDE 8
Towards a semantic-aware file store
by Z. Xu, M. Karlsson, C. Tang, C. Karamanolis. “Traditional hierarchical namespaces are not sufficient for representing and managing the rich semantics of today’s storage
- systems. In this paper, we discuss the principles of semantic-aware