Stanford Operating System: Aligning Purpose with People and Performance

2015 ◽  
pp. 256-263
2013 ◽  
Vol 1 (3) ◽  
pp. 48-65
Author(s):  
Yuting Chen

A concurrent program is intuitively associated with probability: the executions of the program can produce nondeterministic execution program paths due to the interleavings of threads, whereas some paths can always be executed more frequently than the others. An exploration of the probabilities on the execution paths is expected to provide engineers or compilers with support in helping, either at coding phase or at compile time, to optimize some hottest paths. However, it is not easy to take a static analysis of the probabilities on a concurrent program in that the scheduling of threads of a concurrent program usually depends on the operating system and hardware (e.g., processor) on which the program is executed, which may be vary from machine to machine. In this paper the authors propose a platform independent approach, called ProbPP, to analyzing probabilities on the execution paths of the multithreaded programs. The main idea of ProbPP is to calculate the probabilities on the basis of two kinds of probabilities: Primitive Dependent Probabilities (PDPs) representing the control dependent probabilities among the program statements and Thread Execution Probabilities (TEPs) representing the probabilities of threads being scheduled to execute. The authors have also conducted two preliminary experiments to evaluate the effectiveness and performance of ProbPP, and the experimental results show that ProbPP can provide engineers with acceptable accuracy.


2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


1995 ◽  
Vol 29 (5) ◽  
pp. 267-283 ◽  
Author(s):  
B. N. Bershad ◽  
S. Savage ◽  
P. Pardyak ◽  
E. G. Sirer ◽  
M. E. Fiuczynski ◽  
...  

Author(s):  
B. N. Bershad ◽  
S. Savage ◽  
P. Pardyak ◽  
E. G. Sirer ◽  
M. E. Fiuczynski ◽  
...  

Author(s):  
Mohamed Wahba ◽  
Robert Leary ◽  
Nicolás Ochoa-Lleras ◽  
Jariullah Safi ◽  
Sean Brennan

This paper presents implementation details and performance metrics for software developed to connect the Robot Operating System (ROS) with Simulink Real-Time (SLRT). The communication takes place through the User Datagram Protocol (UDP) which allows for fast transmission of large amounts of data between the two systems. We use SLRT’s built-in UDP communication and binary packing blocks to send and receive the data over a network. We use implementation metrics from several examples to illustrate the effectiveness and drawbacks of this bridge in a real-time environment. The time latency of the bridge is analyzed by performing loop-back tests and obtaining the statistics of the time delay. A proof of concept experiment is presented that utilizes two laboratories that ran a driver-in-the-loop system despite a large physical separation. This work provides recommendations for implementing data integrity measures as well as the potential to use the system with other applications that demand high speed real-time communication.


1990 ◽  
Vol 5 (2) ◽  
pp. 267-304 ◽  
Author(s):  
Stephanie Doane ◽  
James Pellegrino ◽  
Roberta Klatzky

2020 ◽  
Vol 1 (2) ◽  
pp. 48-55
Author(s):  
Naji Harki ◽  
Abdulraheem Ahmed ◽  
Lailan Haji

The operating system (OS) is now being widely used in many of the various modern applications in recent years, ranging from diabetic monitoring to other strategic planning. The main function of any OS is to control and coordinate all hardware resources among the commands of the same/different user, which increases the efficiency of advanced comprehensive applications. In an autonomous computer system, the CPU is one of the important resources to manage and process all activities which require scheduling techniques on a processor. Since the early days of computing and other multi-programming OS, various studies have been assigned to CPU scheduling techniques based on processes management and performance evaluation. Thus, outlining the many issues related to scheduling methodologies and the weaknesses that need to be addressed. This review paper is organized based on two distinct perspectives: the implement strategies of CPU scheduling technique and criteria-based measures used, which assess how the strategies are analyzed and used under performance evaluation.


2001 ◽  
Vol 50 (11) ◽  
pp. 1219-1233 ◽  
Author(s):  
B. Abali ◽  
Xiaowei Shen ◽  
H. Franke ◽  
D.E. Poff ◽  
T.B. Smith

Sign in / Sign up

Export Citation Format

Share Document