Advanced Operating Systems

An Overview of Cryptography An Overview of Cryptography Notes
  Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for commerce, security becomes a tremendously important issue to deal with.
Rate this Book:
Conventional_Cryptography Conventional_Cryptography Notes
  Asymmetric Cryptography,Message Digest,Digitally signed document
Rate this Book:
Fault Tolerance Fault Tolerance Notes
  The Byzantine generals problem for 3 loyal generals and 1 traitor. ... The same as in previous , except now with 2 loyal generals and one traitor.
Rate this Book:
operating systems operating systems Notes
  Issues in the design and functioning of operating systems. Emphasis on synchronization of concurrent activity in both centralized and distributed systems. Deadlock, scheduling, performance analysis, operating system design, and memory systems including distributed file systems.
Rate this Book:
Types of architecture Types of architecture Notes
  Architecture applies to various aspects of software systems development, understandably so given its generic and flexible terms of reference. The classification of an architecture into a particular type may be obvious from its context and is, arguably, irrelevant to its success. Nonetheless, it can be useful to have an understanding of the breadth of the discipline - it may also help to put the subject of these essays into perspective.
Rate this Book:
Time, Clocks, and Global State Time, Clocks, and Global State  Notes
  The simplest case of clock synchronization involves two processes in a synchronous system. Here, bounds are known for: drift rate of clocks maximum transmission delay time for each step in the process
Rate this Book:
Software Architecture Software Architecture Notes
  Software architecture encompasses the set of significant decisions about the organization of a software system Selection of the structural elements and their interfaces by which a system is composed Behavior as specified in collaborations among those elements Composition of these structural and behavioral elements into larger subsystems Architectural style that guides this organization
Rate this Book:
Scheduling and Migration Scheduling and Migration Notes
  A distributed scheduler is a resource management component of a distributed operating system that focuses on judiciously and transparently redistributing the load of the system among the computers to maximize the overall performance
Rate this Book:
Recovery Recovery Notes
  Computer system recovery: Restore the system to a normal operational state   Process recovery: Reclaim resources allocated to process, Undo modification made to databases, and Restart the process Or restart process from point of failure and resume execution
Rate this Book:
Protection and Security in Distributed Systems Protection and Security in Distributed Systems  Notes
  How to identify users to the system? Passwords Shared secret between two parties Since only user knows password, someone types correct password ? must be user typing it Very common technique Smart Cards Electronics embedded in card capable of providing long passwords or satisfying challenge ? response queries May have display to allow reading of password Or can be plugged in directly; several credit cards now in this category
Rate this Book:
Symmetric encryption Symmetric encryption Notes
  Encryption involves applying an operation (an algorithm) to the data to be encrypted using the private key to make them unintelligible. The slightest algorithm (such as an exclusive OR) can make the system nearly tamper proof (there being so such thing as absolute security). However, in the 1940s, Claude Shannon proved that to be completely secure, private-key systems need to use keys that are at least as long as the message to be encrypted. Moreover, symmetric encryption requires that a secure channel be used to exchange the key, which seriously diminishes the usefulness of this kind of encryption system.
Rate this Book:
Distributed Mutual Exclusion Distributed Mutual Exclusion Notes
  Mutual exclusion : makes sure that concurrent process access shared resources or data in a serialized way. If a process , say Pi , is executing in its critical section, then no other processes can be executing in their critical sections
Rate this Book:
Multiprocessor OS Multiprocessor OS Notes
  A computer system in which two or more CPUs share full access to the main memory Each CPU might have its own cache and the coherence among multiple cache is maintained Write operation by a CPU is visible to all other CPUs writes to the same location is seen in the same order by all CPUs (also called write serialization)
Rate this Book:
MultiProcesser-Concepts and Architectures MultiProcesser-Concepts and Architectures Notes
  Flynn, 1966+1972 classification of computer systems in terms of instruction and data stream organizations Based on Von-Neumann model (separate processor and memory units 4 machine organizations SISD - Single Instruction, Single Data SIMD - Single Instruction, Multiple Data MISD - Multiple Instruction, Single Data MIMD - Multiple Instruction, Multiple Data
Rate this Book:
Multiple Processor Systems Multiple Processor Systems  Notes
  Goal of computer architects, engineers and scientists to get more and more computing power Problem with the goal: Previous approaches: make clock run faster to speed up We are beginning to hit some fundamental limits on clock speed Reason: Einstein’s special theory of relativity No electrical signal can propagate faster than the speed of light: 30 cm/ns in a vacuum and 20 cm/ns over copper or optical fiber This means: with 10 GHz clock, signals cannot travel more than 2 cm total, with 100 GHz clock, total signal path length at most 2 mm, and at 1000 GHz (1 THz) computer would have to be smaller than 100 µm
Rate this Book:
The Design and Implementation of a Log-Structured File System The Design and Implementation of a Log-Structured File System Notes
  This paper presents a new technique for disk storage management called a log-structured file system. A logstructured file system writes all modifications to disk sequentially in a log-like structure, thereby speeding up both file writing and crash recovery.
Rate this Book:
The Design and Implementation of a Log-Structured File System The Design and Implementation of a Log-Structured File System Notes
  Data needs to be flushed out to disk for safety reasons Disk performance becomes dominated by write operations Executing writes as soon as they occur reduces traffic, but less than 5% of the potential bandwidth is used for new data
Rate this Book:
Load Balancing and Stability Issues in Algorithms Load Balancing and Stability Issues in Algorithms Notes
  Abstract—Service composition enables flexible creation of new services by assembling independent service components. We are focused on the scenario where such composition takes place across the wide-area Internet. We envision independent providers deploying and managing service instances and portal providers composing them to quickly enable new applications in nextgeneration networks.
Rate this Book:
Logical Clocks and Causal Ordering Logical Clocks and Causal Ordering Notes
  Transaction T transfers Rs 10,000 from S1 to S2 • Consider the situation when: – State of S1 is recorded after the deduction and state of S2 is recorded before the addition – State of S1 is recorded before the deduction and state of S2 is recorded after the addition
Rate this Book:
Inherent Limitations of a Distributed System Inherent Limitations of a Distributed System Notes
  A distributed system is a set of computers that communicate over a network, and do not share a common memory or a common clock n Absence of a common (global) clock u No concept of global time u It’s difficult to reason about the temporal ordering of events F Cooperation between processes (e.g., producer/consumer, client/server) F Arrival of requests to the OS (e.g., for resources) F Collecting up-to-date global state u It’s difficult to design and debug algorithms in a distributed system F Mutua
Rate this Book:
Recovery System Recovery System Notes
  Transaction failure : Logical errors: transaction cannot complete due to some internal error condition System errors: the database system must terminate an active transaction due to an error condition (e.g., deadlock) System crash: a power failure or other hardware or software failure causes the system to crash.
Rate this Book:
Distributed Scheduling Distributed Scheduling Notes
  Resource management component of a system which moves jobs around the processors to balance load and maximize overall performance. Typically makes sense in LAN level distributed systems due to latency concerns. Needed because of uneven distribution of tasks on individual processors
Rate this Book:
Distributed Mutual Exclusion Algorithms Distributed Mutual Exclusion Algorithms Notes
  Mutual exclusion: Concurrent access of processes to a shared resource or data is executed in mutually exclusive manner. Only one process is allowed to execute the critical section (CS) at any given time. In a distributed system, shared variables (semaphores) or a local kernel cannot be used to implement mutual exclusion.
Rate this Book:
Distributed Systems -Major Design Issues Distributed Systems-Major Design Issues Notes
  Integration of system services presenting a transparent view of a multiple computer system with distributed resources and control.Consisting of concurrent processes accessing distributed shared or replicated resources through message passing in a network environment.
Rate this Book:
Distributed Systems Architectures Distributed Systems Architectures Notes
  To explain the advantages and disadvantages of distributed systems architectures To describe different approaches to the development of client-server systems
Rate this Book:
Distributed Shared Memory Distributed Shared Memory Notes
  Abstraction that supports the notion of shared memory in a physically non shared (distributed) architecture. Local as well as remote memories can be accessed in a uniform manner, with the location of the shared region transparent to the application program.
Rate this Book:
DISTRIBUTED MUTUAL EXCLUSION DISTRIBUTED MUTUAL EXCLUSION Notes
  Mutual exclusion ensures that concurrent processes make a serialized access to shared resources or data.
Rate this Book:
Distributed DBMS Distributed DBMS Notes
  Distributed transaction management. Distributed concurrency control. Distributed deadlock detection. Distributed recovery control. Distributed integrity control. X/OPEN DTP standard. Replication servers as an alternative. How DBMSs can support the mobile worker.
Rate this Book:
Distributed File Systems Distributed File Systems Notes
  The purpose of a distributed file system (DFS) is to allow users of physically distributed computers to share data and storage resources by using a common file system. A typical configuration for a DFS is a collection of workstations and mainframes connected by a local area network (LAN).
Rate this Book:
Distributed Deadlock Detection Distributed Deadlock Detection Notes
  Distributed deadlock models are presented for resource and communication deadlocks. Simple distributed algorithms for detection of these deadlocks are given. We show that all true deadlocks are detected and that no false deadlocks are reported.
Rate this Book:
Distributed Computation Distributed Computation Notes
  Abstract. We describe a new circulation-based method to determine cuts in an undirected graph. A circulation is an oriented labeling of edges with integers so that at each vertex, the sum of the in-labels equals the sum of out-labels. For an integer k, our approach is based on simple algorithms for sampling a circulation (mod k) uniformly at random.
Rate this Book:
Distributed Deadlock Distributed Deadlock Notes
  Prevention Too expensive in time and network traffic in a distributed system Avoidance Determining safe and unsafe states would require a huge number of messages in a DS Detection May be practical, and is primary chapter focus Resolution More complex than in non-distributed systems
Rate this Book:
Distributed Deadlock Detection Algorithm Distributed Deadlock Detection Algorithm Notes
  We propose an algorithm for detecting deadlocks among transactions running concurrently in a distributed processing network (i.e., a distributed database system). The proposed algorithm is a distributed deadlock detection algorithm. A proof of the correctness of the distributed portion of the algorithm is given, followed by an example of the algorithm in operation. The performance characteristics of the algorithm are also presented.
Rate this Book:
Database Concurrency Control and Recovery Database Concurrency Control and Recovery Notes
  Pessimistic concurrency control Two-phase locking (2PL) and Strict 2PL Timestamp ordering (TSO) and Strict TSO Optimistic concurrency control (OCC)
Rate this Book:
Database System Architectures Database System Architectures  Notes
  Database functionality can be divided into: Back-end: manages access structures, query evaluation and optimization, concurrency control and recovery. Front-end: consists of tools such as forms, report-writers, and graphical user interface facilities. The interface between the front-end and the back-end is through SQL or through an application program interface.
Rate this Book:
Database Recovery Techniques Database Recovery Techniques Notes
  Purpose of Database Recovery To bring the database into the last consistent state, which existed prior to the failure. To preserve transaction properties (Atomicity, Consistency, Isolation and Durability).
Rate this Book:
Cryptography Cryptography Notes
  Cryptography – Greek for hidden and writing is a means of transforming data in a way that renders it unreadable by anyone except the intended recipient.
Rate this Book:
Conventional Encryption Conventional Encryption Notes
  An encryption scheme has five ingredients: – Plaintext – Encryption algorithm – Secret Key – Ciphertext – Decryption algorithm • Security depends on the secrecy of the key, not the secrecy of the algorithm
Rate this Book:
Concurrency Control Concurrency Control  Notes
  A lock is a mechanism to control concurrent access to a data item Data items can be locked in two modes : 1. exclusive (X) mode. Data item can be both read as well as written. X-lock is requested using lock-X instruction. 2. shared (S) mode. Data item can only be read. S-lock is requested using lock-S instruction
Rate this Book:
Causal Order of Messages Causal Order of Messages Notes
  The purpose of causal ordering of messages is to insure that the same causal relationship for the "message send" events correspond with "message receive" events. (i.e. All the messages are processed in order that they were created.)
Rate this Book:
Backward Error Recovery in Redundant Disk Arrays Backward Error Recovery in Redundant Disk Arrays Notes
  Redundant disk arrays are single fault tolerant, incorporating a layer of error handling not found in nonredundant disk systems. Recovery from these errors is complex, due in part to the large number of erroneous states the system may reach. The established approach to error recovery in disk systems is to transition directly from an erroneous state to completion.
Rate this Book:
Authentication for Distributed Systems Authentication for Distributed Systems Notes
  A fundamental concern in building a secure distributed system is authentication of local and remote entities in the system. We survey authentication issues in distributed system design. Two basic paradigms underlying the design of authentication protocols are presented.
Rate this Book:
AgreementProtocols AgreementProtocols Notes
  Classification of Tolerance • Types of tolerance: – Masking – system always behaves as per specifications even in presence of faults – Non Non-masking – system may violate specifications in presence of faults. Should at least behave in a well well-defined manner
Rate this Book:
A Cryptographic Model for Access-Control A Cryptographic Model for Access-Control Notes
  Trying to reconcile “trust models” in cryptography, access-control,Cryptographic models,Access-control models Case study: object storage The issue: Distributed storage servers The (obvious?) protocol: Capabilities Delegation: problem and solution
Rate this Book: