25-02-2012, 12:57 PM
I want a seminar report on infermo os. please send me this report.
Thanks.
25-02-2012, 12:57 PM
I want a seminar report on infermo os. please send me this report. Thanks.
10-10-2012, 11:01 AM
INFERNO
INFERNO.docx (Size: 211.59 KB / Downloads: 40) ABSTRACT Inferno is an operating system for creating and supporting distributed services. It was originally developed by the Computer Science Research Center of Bell Labs, the R&D arm of Lucent Technologies, and further developed by other group in Lucent. Inferno was designed specifically as commercial product, both for licensing product, and both for licensing in the marketplace and for use within new lucent offerings. It encapsulates many years of Bell Labs research in operating systems, language, on-the-fly compilers, graphics, security, networking and portability. Inferno is parsimonious enough in its resource requirements to support interesting applications on today's hardware, while being versatile enough to grow into the future. In particular, it enables developers to create applications that will work across a range of facilities. An example: an interactive shopping catalog that works in text mode over a POTS modem, shows still pictures (perhaps with audio) of the merchandise over ISDN, and includes video clips over digital cable. INTRODUCTION Inferno is intended to be used in a variety of network environments, for example those supporting advanced telephones, hand-held devices, TV set-top boxes attached to cable or satellite systems, and inexpensive Internet computers, but also in conjunction with traditional computing systems. The most visible new environments involve cable television, direct satellite broadcast, the Internet, and other networks. As the entertainment, telecommunications, and computing industries converge and interconnect, a variety of public data networks are emerging, each potentially as useful and profitable as the telephone system. Unlike the telephone system, which started with standard terminals and signaling, these networks are developing in a world of diverse terminals, network hardware, and protocols. Only a well-designed, economical operating system can insulate the various providers of content and services from the equally varied transport and presentation platforms. Inferno is a network operating system for this new world. License Inferno 4th edition was released in early 2005 as free software. Specifically, it was dual-licensed under two sets of licenses. Users could either obtain it under a set of free software licenses, or they could obtain it under a more traditional commercial license. In the case of the free software license scheme, different parts of the system were covered by different licenses, including the GNU General Public License, the GNU Lesser General Public License, the Lucent Public License, and the MIT License. Subsequently Vita Nuova has made it possible to acquire the entire system (excluding the fonts, which are sub-licensed from Bigelow and Holmes) under the GPLv2. All three license options are currently available. DESIGN PRINCIPLES Inferno was first made in 1995 by members of Bell Labs' Computer Science Research division to bring ideas of Plan 9 from Bell Labs to a wider range of devices and networks. Inferno is a distributed operating system based on three basic principles drawn from Plan 9: • Resources as files: all resources are represented as files within a hierarchical file system. • Namespaces: the application view of the network is a single, coherent namespace that appears as a hierarchical file system but may represent physically separated (locally or remotely) resources. • Standard communication protocol: a standard protocol, called Styx, is used to access all resources, both local and remote. To handle the diversity of network environments it was intended to be used in, the designers decided a virtual machine was a necessary component of the system. This is the same conclusion of the Oak project that became Java, but arrived at independently. The Dis virtual machine is a register machine intended to closely match the architecture it runs on, as opposed to the stack machine of the Java Virtual Machine. An advantage of this approach is the relative simplicity of creating a just-in-time compiler for new architectures. APPLICATIONS The role of the Inferno system is to create several standard interfaces for its applications: • Applications use various resources internal to the system, such as a consistent virtual machine that runs the application programs, together with library modules that perform services as simple as string manipulation through more sophisticated graphics services for dealing with text, pictures, higher-level toolkits, and video. • Applications exist in an external environment containing resources such as data files that can be read and manipulated, together with objects that are named and manipulated like files but are more active. Devices (for example a hand-held remote control, an MPEG decoder or a network interface) present themselves to the application as files. • Standard protocols exist for communication within and between separate machines running Inferno, so that applications can cooperate. INTERNAL ENVIRONMENT OF INFERNO APPLICATIONS Inferno applications are written in a new language called Limbo, which was designed specifically for the Inferno environment. Its syntax is influenced by C and Pascal, and it supports the standard data types common to them, together with several higher-level data types such as lists, tuples, strings, dynamic arrays, and simple abstract data types. In addition, Limbo supplies several advanced constructs carefully integrated into the Inferno virtual machine. In particular, a communication mechanism called a channel is used to connect different Limbo tasks on the same machine or across the network. A channel transports typed data in a machine-independent fashion, so that complex data structures (including channels themselves) may be passed between Limbo tasks or attached to files in the name space for language-level communication between machines. Multi-tasking is supported directly by the Limbo language: independently scheduled threads of control may be spawned, and an alt statement is used to coordinate the channel communication between tasks (that is, alt is used to select one of several channels that are ready to communicate). By building channels and tasks into the language and its virtual machine, Inferno encourages a communication style that is easy to use and safe. THE ENVIORNMENT OF THE INFERNO SYSTEM Inferno creates a standard environment for applications. Identical application programs can run under any instance of this environment, even in distributed fashion, and see the same resources. Depending on the environment in which Inferno itself is implemented, there are several versions of the Inferno kernel, Dis/Limbo interpreter, and device driver set. When running as the native operating system, the kernel includes all the low-level glue (interrupt handlers, graphics and other device drivers) needed to implement the abstractions presented to applications. For a hosted system, for example under UNIX, Windows NT or Windows 95, Inferno runs as a set of ordinary processes. Instead of mapping its device-control functionality to real hardware, it adapts to the resources provided by the operating system under which it runs. For example, under UNIX, the graphics library might be implemented using the X window system and the networking using the socket interface; under Windows, it uses the native Windows graphics and Winsock calls. SECURITY IN INFERNO Inferno provides security of communication, resource control, and system integrity. Each external communication channel may be transmitted in the clear, accompanied by message digests to prevent corruption, or encrypted to prevent corruption and interception. Once communication is set up, the encryption is transparent to the application. Key exchange is provided through standard public-key mechanisms; after key exchange, message digesting and line encryption likewise use standard symmetric mechanisms. Inferno is secure against erroneous or malicious applications, and encourages safe collaboration between mutually suspicious service providers and clients. The resources available to applications appear exclusively in the name space of the application, and standard protection modes are available. This applies to data, to communication resources, and to the executable modules that constitute the applications. Security sensitive resources of the system are accessible only by calling the modules that provide them; in particular, adding new files and servers to the name space is controlled and is an authenticated operation. For example, if the network resources are removed from an application's name space, then it is impossible for it to establish new network connections. Object modules may be signed by trusted authorities who guarantee their validity and behavior, and these signatures may be checked by the system the modules are accessed. |
|
Possibly Related Threads… | |||||
Thread | Author | Replies | Views | Last Post | |
beauty parlour management system project report | Guest | 1 | 7,445 |
07-04-2020, 11:06 PM Last Post: |
|
polytronics seminar | Guest | 4 | 19,120 |
28-09-2018, 07:46 PM Last Post: [email protected] |
|
hotel management system project report | Guest | 6 | 6,160 |
06-09-2018, 07:41 PM Last Post: Snehal shivaji pawar |
|
pvc coating seminar report | Guest | 1 | 4,058 |
22-09-2017, 11:00 AM Last Post: jaseela123 |
|
li fi seminar | Guest | 1 | 1,294 |
21-09-2017, 03:16 PM Last Post: jaseela123 |
|
google wave protocol seminar report | Guest | 1 | 8,173 |
21-09-2017, 12:39 PM Last Post: jaseela123 |
|
laboratory management system project report in vb | Guest | 1 | 3,430 |
20-09-2017, 02:56 PM Last Post: jaseela123 |
|
seminar artificial leaf | Guest | 1 | 2,343 |
19-09-2017, 04:09 PM Last Post: jaseela123 |
|
ieee seminar topics for information technology | Guest | 1 | 7,262 |
18-09-2017, 04:17 PM Last Post: jaseela123 |
|
seminar report on hydrogen super highway | bishwas | 1 | 2,844 |
15-09-2017, 03:15 PM Last Post: jaseela123 |