Advanced Operating Systems and Kernel Applications: Techniques and Technologies (Premier Reference Source)
Format: PDF / Kindle (mobi) / ePub
As any application running on a computer makes use of the operating system, the potential impact of improving areas such as memory management, process scheduling, file systems, and device drivers is tremendous. The Handbook of Research on Advanced Operating Systems and Kernel Applications: Techniques and Technologies discusses non-distributed operating systems that benefit researchers, academicians, and practitioners desiring to delve into this subject area and learn more on this important field of study. This innovative publication includes an overview of topical issues, methods, and advancements in the field of one-processor operating systems.
kernel or the driver protection domains. The code for synchronizing simple objects is placed directly in the wrappers, while the object tracker provides synchronization routines for complex objects with many pointers. As an optimization, wrappers may pass parameters that are only read but not written by drivers without modification, as any attempt to modify the parameter will cause a memory access fault. To improve performance, the wrappers rely on several techniques for moving complex objects
are 93% and 63%, respectively. Figure 13 presents the memory performance measured by MAD and RSS of two concurrently running programs LU1 and LU2 when the swap token is introduced. In the first spikes of both LU1 and LU2 processes after a few seconds of executions, both processes started page faults due to memory shortage. The token was taken by LU1 after this moment. Figure 12 shows that LU1 quickly built up its working set, reflected by keeping its RSS curve very similar to its RSS curve in the
and Ito, 2000). Typically LRU is the basic scheme that both hardware and software victim selection algorithms employ. However, the LRU algorithm is manipulated differently by hardware and software implementations. Naturally, hardware solutions must be much simpler for implementation; but on the other hand, hardware solutions can use data that the operating system does not know e.g. the cache can distinguish between an instructions block and a data block; while the operating system does not
that resources are scarce” (Engler, Kaashoek, & O’Toole, 1995). When an Exokernel breaks a secure binding, it uses a technique that the researchers have named visible revocation. With visible revocation, communication occurs between the kernel and the process. Because of this communication, the process is informed of the need to have the resource binding broken. By being warned of the resource revocation before the event, the process 143 The Exokernel Operating System and Active Networks can
has benefited from the Exokernel is Active Networking. The concept of an active network evolved from research being conducted at the Defense Advanced Research Projects Agency. This group is known for developing the “DARPA Internet”, which is the foundation for our modern day Internet. In a traditional network like the Internet, data is passively transported from a start point to an end point. Along its journey, the data passes through nodes that route the data packets based on header information