{"title":"Commons: resource sharing and protection in mobile appliance OS","authors":"Tetsuya Saito, T. Hagino","doi":"10.1145/566726.566774","DOIUrl":"https://doi.org/10.1145/566726.566774","url":null,"abstract":"In this paper, we propose a new operating system abstraction, called a common, for mobile appliances. We can use a common to prevent the excessive use of computational resources on appliances.Mobile appliances will have networked servers such as a http server. We need a new resource abstraction for mobile appliance OS to protect relatively precious and limited resources against service requests from the Internet.The common abstraction can restrict accesses of machine resources and maintain stability on appliances against unknown users on the Internet. We describe two applications of the common: resource allocation for a WWW server and restriction on a bad influence of DoS attacks.In the next section, we describe system requirements for mobile appliance OS and point out its needs. In Section 3, we describe the abstraction of a common. Section 4 describe the applications of commons. In Section 5 we describe current status of our project. Section 6 discusses related work and Section 7. concludes.","PeriodicalId":147728,"journal":{"name":"Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134334405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deferring trust in fluid replication","authors":"Brian D. Noble, Ben Fleis, Landon P. Cox","doi":"10.1145/566726.566745","DOIUrl":"https://doi.org/10.1145/566726.566745","url":null,"abstract":"Mobile nodes rely on external services to provide safety, sharing, and additional resources. Unfortunately, as mobile nodes move through the networking infrastructure, the costs of accessing servers change. Fluid replication allows mobile clients to create replicas where and when they are needed. Unfortunately, one must trust the nodes holding these replicas, and establishing trust in autonomously administered nodes is a difficult task. Instead, we argue that trust should be deferred. In this position paper, we present the design of Stonewall, a system that defers trust decisions through the use of two mechanisms: packages and receipts. The former ensure confidentiality and detect breaches of integrity; the latter detect breaches of non-repudiation.","PeriodicalId":147728,"journal":{"name":"Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134358947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Veiga, J. Garcia, João Nuno de Oliveira e Silva, P. Ferreira
{"title":"Distributed object invocation in OBIWAN","authors":"L. Veiga, J. Garcia, João Nuno de Oliveira e Silva, P. Ferreira","doi":"10.1145/566726.566776","DOIUrl":"https://doi.org/10.1145/566726.566776","url":null,"abstract":"The need for sharing is well-known in a large number of distributed collaborative applications. These applications are difficult to develop for an environment in which network connections are slow and not reliable.For this purpose, we developed a platform called OBIWAN that: i) allows the application programmer to decide the mechanism by which objects should be invoked, remote method invocation or invocation on a local replica, and ii) provides hooks for the application programmer to implement a set of application specific properties such as transactional support, for example.This functionality allows the application programmer to deal with situations that frequently occur in a wide-area network, such as disconnections and slow links. As a matter of fact, as long as the objects needed by an application are locally accessible, there is no need to be connected to the network. In addition, it allows the programmer to easily replace, in run-time, remote by local invocations, thus improving the performance of his application and its adaptability.The prototype is developed in Java, is very small and simple to use, the preliminary performance results are very encouraging, and existing applications can be easily modified to take advantage of the OBIWAN functionality.","PeriodicalId":147728,"journal":{"name":"Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115017559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Milojicic, A. Messer, J. Shau, G. Fu, Alberto Muñoz
{"title":"Increasing relevance of memory hardware errors: a case for recoverable programming models","authors":"D. Milojicic, A. Messer, J. Shau, G. Fu, Alberto Muñoz","doi":"10.1145/566726.566749","DOIUrl":"https://doi.org/10.1145/566726.566749","url":null,"abstract":"It is a common belief that most of computer system failures nowadays stem from programming errors. Computer systems are becoming more complex and harder to maintain and administer, making software errors an even more common case, while contemporary computer architectures are optimized for price and performance and not for availability. In this paper, we raise a case for an increasing relevance of memory hardware soft-errors. In particular with the introduction of 64-bit processors, memory scaling is significantly increased, resulting in higher probability for memory errors. At the same time, due to the ubiquitous use of computers, such as at higher altitudes, environmental conditions impact errors (terrestrial cosmic rays). Finally, in shared memory systems, the failure of one node's memory can take the whole machine down. Current commodity systems do not tolerate memory errors, neither commodity hardware (processors, memories, interconnects) nor software (operating systems, applications, application environments). At the same time, users expect increased reliability. We present the problems of such errors and some solutions for memory error recovery at the processor, operating system and programming model level.","PeriodicalId":147728,"journal":{"name":"Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121430855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A system architecture for pervasive computing","authors":"R. Grimm, T. Anderson, B. Bershad, D. Wetherall","doi":"10.1145/566726.566763","DOIUrl":"https://doi.org/10.1145/566726.566763","url":null,"abstract":"Pervasive computing, with its focus on users and their tasks rather than on computing devices and technology, provides an attractive vision for the future of computing. But, while hardware and networking infrastructure to realize this vision are increasingly becoming a reality, precious few applications run in this infrastructure. We believe that this lack of applications can be attributed to three characteristics that are inadequately addressed by existing systems. First, devices are heterogeneous, ranging from wearable devices to conventional computers. Second, network connectivity often is limited and intermittent. And, third, interactions typically involve several autonomous administrative domains. In this paper, we introduce a system architecture that directly addresses these challenges. Our architecture is targeted at application developers and administrators, and it supports mobile computations, persistent storage, and resource discovery within a single, comprehensive framework.","PeriodicalId":147728,"journal":{"name":"Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126799732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Session 7: OS architecture II","authors":"P. Guedes","doi":"10.1145/3247720","DOIUrl":"https://doi.org/10.1145/3247720","url":null,"abstract":"","PeriodicalId":147728,"journal":{"name":"Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127224559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Session 4: Naming and mobility","authors":"M. Shapiro","doi":"10.1145/3247718","DOIUrl":"https://doi.org/10.1145/3247718","url":null,"abstract":"","PeriodicalId":147728,"journal":{"name":"Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Session 2: OS architecture I","authors":"A. Herbert","doi":"10.1145/3247716","DOIUrl":"https://doi.org/10.1145/3247716","url":null,"abstract":"","PeriodicalId":147728,"journal":{"name":"Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127371088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Morris, John Jannotti, F. Kaashoek, Jinyang Li, Douglas Decouto
{"title":"CarNet: a scalable ad hoc wireless network system","authors":"R. Morris, John Jannotti, F. Kaashoek, Jinyang Li, Douglas Decouto","doi":"10.1145/566726.566741","DOIUrl":"https://doi.org/10.1145/566726.566741","url":null,"abstract":"CarNet is an application for a large ad hoc mobile network system that scales well without requiring a fixed network infrastructure to route messages. CarNet places radio nodes in cars, which communicate using Grid, a novel scalable routing system. Grid uses geographic forwarding and a scalable distributed location service to route packets from car to car without flooding the network. CarNet will support IP connectivity as well as applications such as cooperative highway congestion monitoring, fleet tracking, and discovery of nearby points of interest.","PeriodicalId":147728,"journal":{"name":"Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124195604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mechanisms for effective caching in the Globe location service","authors":"A. Baggio, G. Ballintijn, M. V. Steen","doi":"10.1145/566726.566740","DOIUrl":"https://doi.org/10.1145/566726.566740","url":null,"abstract":"Globe is a wide-area distributed system that supports mobile objects. To track and locate objects, we use a worldwide distributed location service, implemented as a search tree.An object registers its current position by storing its address in a nearby leaf node of the tree. This knowledge propagates up to the top of the tree, so every object can be found from the root. Remote objects can cache the location of an object. However, if the object moves, the cache entry is no longer valid.In this paper, we show how caching can be made to work effectively even in the presence of mobile objects.","PeriodicalId":147728,"journal":{"name":"Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125429101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}