SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Overview : Introduction Design principles Inferno Interfaces Application  Layer Kernel Layer Hardware Layer Inferno Resources Pros & Cons Questions 8/12/2010 1
Introduction: Developed in Lucent technologies by Dennis Ritchie. but is now developed and maintained by Vita Nuova Holdings as free software. Replaces a plethora of protocols in a network by a simple unifying file service protocol (styx). Applications compute their own name spaces and consider all resources as file systems. Inferno was based on the experience gained with Plan 9  os from Bell Labs. The name of the operating system and many of its associated programs, as well as that of the current company, were inspired by Dante Alighieri'sDivine Comedy. 8/12/2010 2
Inferno's definitive strength lies in its portability and versatility across several dimensions: Portability across processors Portability across environments Minimal hardware requirements Portable applications 8/12/2010 3
Design Principles:- Inferno was first made in 1995 by members of Bell Labs' Computer .It is  a distributed operating system based on 3 basic principles drawn from Plan 9.  Resources as files:- all resources are represented as files within a hierarchical file system .The advantages of using file systems are:- File systems have simple and well understood interfaces across a wide variety of operating systems.  Naming conventions for files are well known, uniform and easily understood  8/12/2010 4
Reliance on file systems reduces the amount of interface code and keeps the Inferno system small, reliable and highly portable . Access rights and permissions to files are simple, yet can be used to ensure multiple levels of security  NAMESPACE:- the application view of the network is a single, coherent namespace that appears as a hierarchical file system but may represent physically separated (locally or remotely) resources. The Inferno Namespace is a hierarchical collection of files (i.e. resources). 8/12/2010 5
Every process accesses its resources via its own namespace can inherit from parent share with other processes Local and remote resources are bound into the namespace Standard communication protocol:a standard protocol, called Styx,is used to access all resources, both local and remote. 8/12/2010 6
Styx Message Structure:- Indicates message type: initial transmission (T-message) or reply message (R-message) Unique identifier used to track commands Unsigned integer that represents “current” file Message specific data fid Contents tag type 8/12/2010 7
History:- 8/12/2010 8
Inferno Interfaces:- 8/12/2010 9
Inferno has mainly three layers.   (i)  Application layer (ii)  Kernel layer (iii)Hardware layer  8/12/2010 10
Application Layer:- Limbo is fully type checked at compile and run time. No memory protection H/W is there. All LIMBO data and program objects are subject to a garbage collector built deeply into LIMBO run time system. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 11
DisVirtualmachine: - Limbo programs are compiled into byte-codes representing instructions for a virtual machine called Dis. Dis has 3 address machine , supplemented with few specialized operations  for handling  arrays and strings. The byte codes are expanded into a format more efficient for execution. 8/12/2010 12
Kernel Layer:- Namespace : Memory management Process management Security in Inferno  Security mechanisms  8/12/2010 13
Hardware Layer:-   Device drivers:- A device driver simplifies programming by acting as a translator between a device and the applications or operating systems that use it In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. A driver typically communicates with the device through the computer bus or communications subsystem to which the hardware is connected. 8/12/2010 14
Host os:-  Inferno can run in different host operating  system Host systems  Windows NT/2000/XP Linux MacOS Plan9os Solaris 8/12/2010 15
Inferno Resources:- 8/12/2010 16
External Environment of Inferno Applications :- The purpose of most Inferno applns is to present information n/media to user. Regardless of whether resources are local/global, a communication protocol called styx is used. The glue that connects diff parts of the resource name space together is the styx protocol. Inferno kernel implements a mount driver which transforms file operations to RPC’s  for transport over the network. 8/12/2010 17
Internal Environment of Inferno Applications:- LIMBO programs are built of modules, which are self contained units . Modules are accessed dynamically by executing a load statement. Limbo is fully type checked at compile and run time. No memory protection H/W is there. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 18
Advantages:- Cross platform integration Transparent resource access Secure communication 8/12/2010 19
Future scope:- Telephony Call setup Device control Text to Speech Network Gateways 8/12/2010 20
Conlcusion:- “ Inferno does have a full-blown operating system and a virtual machine and a protocol stack, and in a lot of respects is something Java would like to be when it grows up. “ - Peter Bernstein,  Inferno is a unique network operating system that adapts to whatever you plug into it -- from a high-end workstation to an inexpensive hand-held device," noted Dennis Ritchie,  One of the most significant differences between Inferno and other operating systems such as JavaOS is the way in which Inferno presents network resources to an application.  8/12/2010 21
References:- Bell Labs Technical Journal. Plugins, Vita Nuova. http://code.google.com/p/inferno-ds. www.vitanuova.com 8/12/2010 22
8/12/2010 23
QUESTIONS 8/12/2010 24

Weitere ähnliche Inhalte

Was ist angesagt? (6)

Sector Cloudcom Tutorial
Sector Cloudcom TutorialSector Cloudcom Tutorial
Sector Cloudcom Tutorial
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Glossary vp 9
Glossary vp 9Glossary vp 9
Glossary vp 9
 
Presentation1
Presentation1Presentation1
Presentation1
 
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinuxNguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
 
Presentation1
Presentation1Presentation1
Presentation1
 

Andere mochten auch

Translucent optical networks the way forward
Translucent optical networks  the way forward Translucent optical networks  the way forward
Translucent optical networks the way forward Philippe Fanaro
 
Latest seminar topics
Latest seminar topicsLatest seminar topics
Latest seminar topicsPulla Surya
 
Seminar blue eye
Seminar blue eyeSeminar blue eye
Seminar blue eyeanju ann
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technologyYusuf Shaik
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry reportShruthi K Gowda
 
Deep Web
Deep WebDeep Web
Deep WebSt John
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarkajol agarwal
 
Raspberry pi : an introduction
Raspberry pi : an introductionRaspberry pi : an introduction
Raspberry pi : an introductionLTG Oxford
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technologyDivya Mohan
 
Wireless power / Wireless Electricity
Wireless power / Wireless ElectricityWireless power / Wireless Electricity
Wireless power / Wireless ElectricityMuhammad Umair Iqbal
 
Wireless transmission of electricity
Wireless transmission of electricityWireless transmission of electricity
Wireless transmission of electricitydeepak113
 
Apple's Smart Sensor Technologies -- market research report (sample)
Apple's Smart Sensor Technologies -- market research report (sample)Apple's Smart Sensor Technologies -- market research report (sample)
Apple's Smart Sensor Technologies -- market research report (sample)MEMS Journal, Inc.
 
Wireless power transmission ppt
Wireless power transmission pptWireless power transmission ppt
Wireless power transmission pptAishwary Verma
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmissionrakeshkk
 
wireless power transmission via solar power satellite
wireless power transmission via solar power satellitewireless power transmission via solar power satellite
wireless power transmission via solar power satellitechingaro
 

Andere mochten auch (20)

Translucent optical networks the way forward
Translucent optical networks  the way forward Translucent optical networks  the way forward
Translucent optical networks the way forward
 
Latest seminar topics
Latest seminar topicsLatest seminar topics
Latest seminar topics
 
GENOMICS
GENOMICSGENOMICS
GENOMICS
 
Seminar blue eye
Seminar blue eyeSeminar blue eye
Seminar blue eye
 
Dna computing
Dna computingDna computing
Dna computing
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
 
Deep Web
Deep WebDeep Web
Deep Web
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
 
WiTricity
WiTricityWiTricity
WiTricity
 
Raspberry pi : an introduction
Raspberry pi : an introductionRaspberry pi : an introduction
Raspberry pi : an introduction
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Witricity
WitricityWitricity
Witricity
 
Wireless power / Wireless Electricity
Wireless power / Wireless ElectricityWireless power / Wireless Electricity
Wireless power / Wireless Electricity
 
Wireless transmission of electricity
Wireless transmission of electricityWireless transmission of electricity
Wireless transmission of electricity
 
Apple's Smart Sensor Technologies -- market research report (sample)
Apple's Smart Sensor Technologies -- market research report (sample)Apple's Smart Sensor Technologies -- market research report (sample)
Apple's Smart Sensor Technologies -- market research report (sample)
 
Wireless power transmission ppt
Wireless power transmission pptWireless power transmission ppt
Wireless power transmission ppt
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmission
 
wireless power transmission via solar power satellite
wireless power transmission via solar power satellitewireless power transmission via solar power satellite
wireless power transmission via solar power satellite
 

Ähnlich wie K2presentation

Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming ReportShivek Khurana
 
Inferno operating system
Inferno operating systemInferno operating system
Inferno operating systemSadhana28
 
Plan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemPlan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemQuentin Fennessy
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrationshaile468688
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helixJeff Carroll
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating SystemKunalKewat1
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, DockerSatrioBudi10
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure amol_chavan
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systemsAbDul ThaYyal
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesInformation Technology
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiSowmya Jyothi
 

Ähnlich wie K2presentation (20)

Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming Report
 
Inferno operating system
Inferno operating systemInferno operating system
Inferno operating system
 
Plan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemPlan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating System
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helix
 
Linux OS presentation
Linux OS presentationLinux OS presentation
Linux OS presentation
 
Linux
Linux Linux
Linux
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Linux notes
Linux notesLinux notes
Linux notes
 
Introduction to unix
Introduction to unixIntroduction to unix
Introduction to unix
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, Docker
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 
Inferno
InfernoInferno
Inferno
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
 
Linux Vulnerabilities
Linux VulnerabilitiesLinux Vulnerabilities
Linux Vulnerabilities
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
 
Final
FinalFinal
Final
 

Kürzlich hochgeladen

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 

Kürzlich hochgeladen (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 

K2presentation

  • 1. Overview : Introduction Design principles Inferno Interfaces Application Layer Kernel Layer Hardware Layer Inferno Resources Pros & Cons Questions 8/12/2010 1
  • 2. Introduction: Developed in Lucent technologies by Dennis Ritchie. but is now developed and maintained by Vita Nuova Holdings as free software. Replaces a plethora of protocols in a network by a simple unifying file service protocol (styx). Applications compute their own name spaces and consider all resources as file systems. Inferno was based on the experience gained with Plan 9 os from Bell Labs. The name of the operating system and many of its associated programs, as well as that of the current company, were inspired by Dante Alighieri'sDivine Comedy. 8/12/2010 2
  • 3. Inferno's definitive strength lies in its portability and versatility across several dimensions: Portability across processors Portability across environments Minimal hardware requirements Portable applications 8/12/2010 3
  • 4. Design Principles:- Inferno was first made in 1995 by members of Bell Labs' Computer .It is a distributed operating system based on 3 basic principles drawn from Plan 9. Resources as files:- all resources are represented as files within a hierarchical file system .The advantages of using file systems are:- File systems have simple and well understood interfaces across a wide variety of operating systems. Naming conventions for files are well known, uniform and easily understood 8/12/2010 4
  • 5. Reliance on file systems reduces the amount of interface code and keeps the Inferno system small, reliable and highly portable . Access rights and permissions to files are simple, yet can be used to ensure multiple levels of security NAMESPACE:- the application view of the network is a single, coherent namespace that appears as a hierarchical file system but may represent physically separated (locally or remotely) resources. The Inferno Namespace is a hierarchical collection of files (i.e. resources). 8/12/2010 5
  • 6. Every process accesses its resources via its own namespace can inherit from parent share with other processes Local and remote resources are bound into the namespace Standard communication protocol:a standard protocol, called Styx,is used to access all resources, both local and remote. 8/12/2010 6
  • 7. Styx Message Structure:- Indicates message type: initial transmission (T-message) or reply message (R-message) Unique identifier used to track commands Unsigned integer that represents “current” file Message specific data fid Contents tag type 8/12/2010 7
  • 10. Inferno has mainly three layers. (i) Application layer (ii) Kernel layer (iii)Hardware layer 8/12/2010 10
  • 11. Application Layer:- Limbo is fully type checked at compile and run time. No memory protection H/W is there. All LIMBO data and program objects are subject to a garbage collector built deeply into LIMBO run time system. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 11
  • 12. DisVirtualmachine: - Limbo programs are compiled into byte-codes representing instructions for a virtual machine called Dis. Dis has 3 address machine , supplemented with few specialized operations for handling arrays and strings. The byte codes are expanded into a format more efficient for execution. 8/12/2010 12
  • 13. Kernel Layer:- Namespace : Memory management Process management Security in Inferno Security mechanisms 8/12/2010 13
  • 14. Hardware Layer:- Device drivers:- A device driver simplifies programming by acting as a translator between a device and the applications or operating systems that use it In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. A driver typically communicates with the device through the computer bus or communications subsystem to which the hardware is connected. 8/12/2010 14
  • 15. Host os:- Inferno can run in different host operating system Host systems Windows NT/2000/XP Linux MacOS Plan9os Solaris 8/12/2010 15
  • 17. External Environment of Inferno Applications :- The purpose of most Inferno applns is to present information n/media to user. Regardless of whether resources are local/global, a communication protocol called styx is used. The glue that connects diff parts of the resource name space together is the styx protocol. Inferno kernel implements a mount driver which transforms file operations to RPC’s for transport over the network. 8/12/2010 17
  • 18. Internal Environment of Inferno Applications:- LIMBO programs are built of modules, which are self contained units . Modules are accessed dynamically by executing a load statement. Limbo is fully type checked at compile and run time. No memory protection H/W is there. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 18
  • 19. Advantages:- Cross platform integration Transparent resource access Secure communication 8/12/2010 19
  • 20. Future scope:- Telephony Call setup Device control Text to Speech Network Gateways 8/12/2010 20
  • 21. Conlcusion:- “ Inferno does have a full-blown operating system and a virtual machine and a protocol stack, and in a lot of respects is something Java would like to be when it grows up. “ - Peter Bernstein, Inferno is a unique network operating system that adapts to whatever you plug into it -- from a high-end workstation to an inexpensive hand-held device," noted Dennis Ritchie, One of the most significant differences between Inferno and other operating systems such as JavaOS is the way in which Inferno presents network resources to an application. 8/12/2010 21
  • 22. References:- Bell Labs Technical Journal. Plugins, Vita Nuova. http://code.google.com/p/inferno-ds. www.vitanuova.com 8/12/2010 22