logging in or signing up INFERNO OPERATING SM CiTS Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Dynamic Copy Does not support media & animations Automatically changes to Flash or non-Flash embed WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 537 Category: Entertainment License: All Rights Reserved Like it (0) Dislike it (0) Added: December 12, 2011 This Presentation is Public Favorites: 0 Presentation Description No description available. Comments Posting comment... Premium member Presentation Transcript Inferno operating system: Inferno operating system Seminar on Safwana p S7 IT R no: 58OVERVIEW: OVERVIEW INTRODUCTION INFERNO INTERFACES PORTABILITY ACROSS PROCESSORS PORTABILITY ACROSS ENVIRONMENTS DISTRIBUTED DESIGN APPLICATION-TIME LAPSE PHOTOGRAPHY PORTING INFERNO CONCLUSION 2INTRODUCTION: INTRODUCTION Developed in Lucent technologies by Dennis Ritchie. Create & support distributed services & network application New environment involve cable TV, direct satellite broadcast & internet. Runs on Intel, Sparc , MIPS, ARM, HPPA . Runs as standalone OS on small terminals. Runs as user application under Windows & UNIX. It has a Distributed Design. Inferno applications are written in the type-safe language Limbo 3INFERNO INTERFACES: INFERNO INTERFACES Role is create several standard interfaces for its applications. Applications use various resources internal to the system. Applications exist in an environment containing resources such as data files. Standard protocols exist for communication between separate machines running Inferno. On these server machines it might interface to databases, transaction systems. 4 PORTABILITY ACROSS PROCESSORS: PORTABILITY ACROSS PROCESSORS The Inferno kernel and device drivers are written in C. Porting Inferno to a new device is a simple process. 5 PORTABILITY ACROSS ENVIRONMENTS: PORTABILITY ACROSS ENVIRONMENTS 1.External Environment of Inferno Applications The purpose of most Inferno applns is to present informn to user. To the applns the user’s devices shows up as resources for it. The way the resources are designed to show up to the applns are 1.Resources - Named & accessed like files. 2.Disjoint resource hierarchies provided by different services show up in a single hierarchical name space . 6PowerPoint Presentation: External Environment of Inferno Applications 3.Regardless of whether resources are local/global, a communication protocol called styx is used. The glue that connects diff parts of the resource name space together is the styx protocol. Inferno kernel implements a mount driver which transforms file operations to RPC’s for transport over the network.PowerPoint Presentation: 2. Internal Environment of Inferno Applications Inferno application are written in a language Limbo. Supplies advanced constructs integrated into Inferno virtual machine. Communication mechanism ‘ channel’ is used to connect different Limbo tasks It supports multi tasking. built of modules 8PowerPoint Presentation: Internal Environment of Inferno Applications Limbo is fully type checked at compile and run time. No memory protection H/W is there. All LIMBO data and program objects are subject to a garbage collector built into LIMBO run time system. All System data objects are kept track of and freed as soon as they become idle. Limbo programs are complied into byte codes representing instructions for a virtual machine ‘ DIS’.PowerPoint Presentation: Environment of the Inferno system Inferno creates a standard environment for applns . Several versions of Inferno kernel, DIS/LIMBO interpreter and device driver set can be used depending on the environment. When running as the native operating system kernel includes all the low level glue like interrupt handlers, device drivers . But when running in a hosted system like Windows NT, Inferno runs as an ordinary process.PowerPoint Presentation: SECURITY IN INFERNO Inferno provides security of communication, resource control, and system integrity. I nferno is secure against erroneous or malicious applications, and encourages safe collaboration between mutually suspicious service providers and clients. Security mechanisms Authentication and digital signatures are performed using public key cryptography . encryption algorithms provided by Inferno include SHA, , and MD5 secure hashes; Elgamal public key signatures etcPowerPoint Presentation: DISTRIBUTED DESIGN Identical environment at client and server . A simple, unifying mechanism for the representation of resources in the network. This mechanism is based upon the import and export of a hierarchical ‘namespace’. The Styx protocol is used for access to all resources whether local or remote. Styx can run over simple link protocols that connect small devices one to another.PowerPoint Presentation: NAMESPACE EXAMPLE WINDOWS PC Hosted version of Inferno providing an environment for distributed application development . IPAQ Native version of Inferno that controls the entire device including a driver for a PCMCIA Wireless card Video Recorder and Digital Camera Both of these devices could run Inferno as a native operating systemPowerPoint Presentation: The Application Time Lapse Photography The photographs are to be taken at 10 second intervals I t is to be copied to a VCR for playback as a video. Each image is to be stored for posterity in some local store either on the hard disk or on the iPAQ . Different steps M ount the different name spaces . Bind the namespaces together . Run the application from the PC. Run the application from the IPAQ. Run on the iPAQ store on PC.PowerPoint Presentation: CONCLUSION The inferno operating system is very useful for supporting distributed services and network applications . As a user application under windows , linux and unix . Inferno is absolutely portable . Inferno provides more security of communication, resource control, and system integrity .Questions: Questions ? ? ? You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.