SlideShare une entreprise Scribd logo
1  sur  24
Overview : Introduction Design principles Inferno Interfaces Application  Layer Kernel Layer Hardware Layer Inferno Resources Pros & Cons Questions 8/12/2010 1
Introduction: Developed in Lucent technologies by Dennis Ritchie. but is now developed and maintained by Vita Nuova Holdings as free software. Replaces a plethora of protocols in a network by a simple unifying file service protocol (styx). Applications compute their own name spaces and consider all resources as file systems. Inferno was based on the experience gained with Plan 9  os from Bell Labs. The name of the operating system and many of its associated programs, as well as that of the current company, were inspired by Dante Alighieri'sDivine Comedy. 8/12/2010 2
Inferno's definitive strength lies in its portability and versatility across several dimensions: Portability across processors Portability across environments Minimal hardware requirements Portable applications 8/12/2010 3
Design Principles:- Inferno was first made in 1995 by members of Bell Labs' Computer .It is  a distributed operating system based on 3 basic principles drawn from Plan 9.  Resources as files:- all resources are represented as files within a hierarchical file system .The advantages of using file systems are:- File systems have simple and well understood interfaces across a wide variety of operating systems.  Naming conventions for files are well known, uniform and easily understood  8/12/2010 4
Reliance on file systems reduces the amount of interface code and keeps the Inferno system small, reliable and highly portable . Access rights and permissions to files are simple, yet can be used to ensure multiple levels of security  NAMESPACE:- the application view of the network is a single, coherent namespace that appears as a hierarchical file system but may represent physically separated (locally or remotely) resources. The Inferno Namespace is a hierarchical collection of files (i.e. resources). 8/12/2010 5
Every process accesses its resources via its own namespace can inherit from parent share with other processes Local and remote resources are bound into the namespace Standard communication protocol:a standard protocol, called Styx,is used to access all resources, both local and remote. 8/12/2010 6
Styx Message Structure:- Indicates message type: initial transmission (T-message) or reply message (R-message) Unique identifier used to track commands Unsigned integer that represents “current” file Message specific data fid Contents tag type 8/12/2010 7
History:- 8/12/2010 8
Inferno Interfaces:- 8/12/2010 9
Inferno has mainly three layers.   (i)  Application layer (ii)  Kernel layer (iii)Hardware layer  8/12/2010 10
Application Layer:- Limbo is fully type checked at compile and run time. No memory protection H/W is there. All LIMBO data and program objects are subject to a garbage collector built deeply into LIMBO run time system. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 11
DisVirtualmachine: - Limbo programs are compiled into byte-codes representing instructions for a virtual machine called Dis. Dis has 3 address machine , supplemented with few specialized operations  for handling  arrays and strings. The byte codes are expanded into a format more efficient for execution. 8/12/2010 12
Kernel Layer:- Namespace : Memory management Process management Security in Inferno  Security mechanisms  8/12/2010 13
Hardware Layer:-   Device drivers:- A device driver simplifies programming by acting as a translator between a device and the applications or operating systems that use it In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. A driver typically communicates with the device through the computer bus or communications subsystem to which the hardware is connected. 8/12/2010 14
Host os:-  Inferno can run in different host operating  system Host systems  Windows NT/2000/XP Linux MacOS Plan9os Solaris 8/12/2010 15
Inferno Resources:- 8/12/2010 16
External Environment of Inferno Applications :- The purpose of most Inferno applns is to present information n/media to user. Regardless of whether resources are local/global, a communication protocol called styx is used. The glue that connects diff parts of the resource name space together is the styx protocol. Inferno kernel implements a mount driver which transforms file operations to RPC’s  for transport over the network. 8/12/2010 17
Internal Environment of Inferno Applications:- LIMBO programs are built of modules, which are self contained units . Modules are accessed dynamically by executing a load statement. Limbo is fully type checked at compile and run time. No memory protection H/W is there. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 18
Advantages:- Cross platform integration Transparent resource access Secure communication 8/12/2010 19
Future scope:- Telephony Call setup Device control Text to Speech Network Gateways 8/12/2010 20
Conlcusion:- “ Inferno does have a full-blown operating system and a virtual machine and a protocol stack, and in a lot of respects is something Java would like to be when it grows up. “ - Peter Bernstein,  Inferno is a unique network operating system that adapts to whatever you plug into it -- from a high-end workstation to an inexpensive hand-held device," noted Dennis Ritchie,  One of the most significant differences between Inferno and other operating systems such as JavaOS is the way in which Inferno presents network resources to an application.  8/12/2010 21
References:- Bell Labs Technical Journal. Plugins, Vita Nuova. http://code.google.com/p/inferno-ds. www.vitanuova.com 8/12/2010 22
8/12/2010 23
QUESTIONS 8/12/2010 24

Contenu connexe

Tendances (6)

Sector Cloudcom Tutorial
Sector Cloudcom TutorialSector Cloudcom Tutorial
Sector Cloudcom Tutorial
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Glossary vp 9
Glossary vp 9Glossary vp 9
Glossary vp 9
 
Presentation1
Presentation1Presentation1
Presentation1
 
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinuxNguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
 
Presentation1
Presentation1Presentation1
Presentation1
 

En vedette

Fondamenti di prosodia latina
Fondamenti di prosodia latinaFondamenti di prosodia latina
Fondamenti di prosodia latinanapolinelquore
 
District 30 - 2011 ISAT
District 30 - 2011 ISATDistrict 30 - 2011 ISAT
District 30 - 2011 ISATAndrew Kohl
 
Generational Differences Texas Medical Association 10 3 2008
Generational Differences   Texas Medical Association   10 3 2008Generational Differences   Texas Medical Association   10 3 2008
Generational Differences Texas Medical Association 10 3 2008Bill M Wooten, PhD
 
Social Business Conference 2013 - Social Media: Become a large platform or ju...
Social Business Conference 2013 - Social Media: Become a large platform or ju...Social Business Conference 2013 - Social Media: Become a large platform or ju...
Social Business Conference 2013 - Social Media: Become a large platform or ju...HKAIM
 
Tweet to diigo
Tweet to diigoTweet to diigo
Tweet to diigoDai Barnes
 
Twitter to evernote
Twitter to evernoteTwitter to evernote
Twitter to evernoteDai Barnes
 
Sub Prime Primer
Sub Prime PrimerSub Prime Primer
Sub Prime Primerk220809
 
VietRees_Newsletter_65_Tuan2_Thang1
VietRees_Newsletter_65_Tuan2_Thang1VietRees_Newsletter_65_Tuan2_Thang1
VietRees_Newsletter_65_Tuan2_Thang1internationalvr
 
Country Report of the Thai National Committee on Memory of the World
Country Report of the Thai National Committee on Memory of the WorldCountry Report of the Thai National Committee on Memory of the World
Country Report of the Thai National Committee on Memory of the WorldRachabodin Suwannakanthi
 
Presentation on basics of Registry Editor
Presentation on basics of Registry EditorPresentation on basics of Registry Editor
Presentation on basics of Registry EditorSanjeev Kumar Jaiswal
 
3 key points for fin plan
3 key points for fin plan 3 key points for fin plan
3 key points for fin plan mariogomezprieto
 
Urban Leadership Slides
Urban Leadership SlidesUrban Leadership Slides
Urban Leadership SlidesNathan Smith
 

En vedette (20)

Fondamenti di prosodia latina
Fondamenti di prosodia latinaFondamenti di prosodia latina
Fondamenti di prosodia latina
 
District 30 - 2011 ISAT
District 30 - 2011 ISATDistrict 30 - 2011 ISAT
District 30 - 2011 ISAT
 
Sql Injection
Sql Injection Sql Injection
Sql Injection
 
Generational Differences Texas Medical Association 10 3 2008
Generational Differences   Texas Medical Association   10 3 2008Generational Differences   Texas Medical Association   10 3 2008
Generational Differences Texas Medical Association 10 3 2008
 
Wimax vsWi-fi
Wimax vsWi-fiWimax vsWi-fi
Wimax vsWi-fi
 
Social Business Conference 2013 - Social Media: Become a large platform or ju...
Social Business Conference 2013 - Social Media: Become a large platform or ju...Social Business Conference 2013 - Social Media: Become a large platform or ju...
Social Business Conference 2013 - Social Media: Become a large platform or ju...
 
Tweet to diigo
Tweet to diigoTweet to diigo
Tweet to diigo
 
Twitter to evernote
Twitter to evernoteTwitter to evernote
Twitter to evernote
 
Presentaci ã³n4 (1) (1)
Presentaci ã³n4 (1) (1)Presentaci ã³n4 (1) (1)
Presentaci ã³n4 (1) (1)
 
Sub Prime Primer
Sub Prime PrimerSub Prime Primer
Sub Prime Primer
 
VietRees_Newsletter_65_Tuan2_Thang1
VietRees_Newsletter_65_Tuan2_Thang1VietRees_Newsletter_65_Tuan2_Thang1
VietRees_Newsletter_65_Tuan2_Thang1
 
Country Report of the Thai National Committee on Memory of the World
Country Report of the Thai National Committee on Memory of the WorldCountry Report of the Thai National Committee on Memory of the World
Country Report of the Thai National Committee on Memory of the World
 
Presentation on basics of Registry Editor
Presentation on basics of Registry EditorPresentation on basics of Registry Editor
Presentation on basics of Registry Editor
 
Morphological Image Processing
Morphological Image ProcessingMorphological Image Processing
Morphological Image Processing
 
3 key points for fin plan
3 key points for fin plan 3 key points for fin plan
3 key points for fin plan
 
Presentación lazytech
Presentación lazytechPresentación lazytech
Presentación lazytech
 
Tele Immersion
Tele ImmersionTele Immersion
Tele Immersion
 
Moral Psychology
Moral PsychologyMoral Psychology
Moral Psychology
 
Urban Leadership Slides
Urban Leadership SlidesUrban Leadership Slides
Urban Leadership Slides
 
Night Vision
Night VisionNight Vision
Night Vision
 

Similaire à Inferno O.S.

Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming ReportShivek Khurana
 
Inferno operating system
Inferno operating systemInferno operating system
Inferno operating systemSadhana28
 
Plan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemPlan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemQuentin Fennessy
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrationshaile468688
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helixJeff Carroll
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating SystemKunalKewat1
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, DockerSatrioBudi10
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure amol_chavan
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systemsAbDul ThaYyal
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesInformation Technology
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiSowmya Jyothi
 

Similaire à Inferno O.S. (20)

Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming Report
 
Inferno operating system
Inferno operating systemInferno operating system
Inferno operating system
 
Plan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemPlan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating System
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helix
 
Linux OS presentation
Linux OS presentationLinux OS presentation
Linux OS presentation
 
Linux
Linux Linux
Linux
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Linux notes
Linux notesLinux notes
Linux notes
 
Introduction to unix
Introduction to unixIntroduction to unix
Introduction to unix
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, Docker
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 
Inferno
InfernoInferno
Inferno
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
 
Linux Vulnerabilities
Linux VulnerabilitiesLinux Vulnerabilities
Linux Vulnerabilities
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
 
Final
FinalFinal
Final
 

Dernier

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Inferno O.S.

  • 1. Overview : Introduction Design principles Inferno Interfaces Application Layer Kernel Layer Hardware Layer Inferno Resources Pros & Cons Questions 8/12/2010 1
  • 2. Introduction: Developed in Lucent technologies by Dennis Ritchie. but is now developed and maintained by Vita Nuova Holdings as free software. Replaces a plethora of protocols in a network by a simple unifying file service protocol (styx). Applications compute their own name spaces and consider all resources as file systems. Inferno was based on the experience gained with Plan 9 os from Bell Labs. The name of the operating system and many of its associated programs, as well as that of the current company, were inspired by Dante Alighieri'sDivine Comedy. 8/12/2010 2
  • 3. Inferno's definitive strength lies in its portability and versatility across several dimensions: Portability across processors Portability across environments Minimal hardware requirements Portable applications 8/12/2010 3
  • 4. Design Principles:- Inferno was first made in 1995 by members of Bell Labs' Computer .It is a distributed operating system based on 3 basic principles drawn from Plan 9. Resources as files:- all resources are represented as files within a hierarchical file system .The advantages of using file systems are:- File systems have simple and well understood interfaces across a wide variety of operating systems. Naming conventions for files are well known, uniform and easily understood 8/12/2010 4
  • 5. Reliance on file systems reduces the amount of interface code and keeps the Inferno system small, reliable and highly portable . Access rights and permissions to files are simple, yet can be used to ensure multiple levels of security NAMESPACE:- the application view of the network is a single, coherent namespace that appears as a hierarchical file system but may represent physically separated (locally or remotely) resources. The Inferno Namespace is a hierarchical collection of files (i.e. resources). 8/12/2010 5
  • 6. Every process accesses its resources via its own namespace can inherit from parent share with other processes Local and remote resources are bound into the namespace Standard communication protocol:a standard protocol, called Styx,is used to access all resources, both local and remote. 8/12/2010 6
  • 7. Styx Message Structure:- Indicates message type: initial transmission (T-message) or reply message (R-message) Unique identifier used to track commands Unsigned integer that represents “current” file Message specific data fid Contents tag type 8/12/2010 7
  • 10. Inferno has mainly three layers. (i) Application layer (ii) Kernel layer (iii)Hardware layer 8/12/2010 10
  • 11. Application Layer:- Limbo is fully type checked at compile and run time. No memory protection H/W is there. All LIMBO data and program objects are subject to a garbage collector built deeply into LIMBO run time system. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 11
  • 12. DisVirtualmachine: - Limbo programs are compiled into byte-codes representing instructions for a virtual machine called Dis. Dis has 3 address machine , supplemented with few specialized operations for handling arrays and strings. The byte codes are expanded into a format more efficient for execution. 8/12/2010 12
  • 13. Kernel Layer:- Namespace : Memory management Process management Security in Inferno Security mechanisms 8/12/2010 13
  • 14. Hardware Layer:- Device drivers:- A device driver simplifies programming by acting as a translator between a device and the applications or operating systems that use it In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. A driver typically communicates with the device through the computer bus or communications subsystem to which the hardware is connected. 8/12/2010 14
  • 15. Host os:- Inferno can run in different host operating system Host systems Windows NT/2000/XP Linux MacOS Plan9os Solaris 8/12/2010 15
  • 17. External Environment of Inferno Applications :- The purpose of most Inferno applns is to present information n/media to user. Regardless of whether resources are local/global, a communication protocol called styx is used. The glue that connects diff parts of the resource name space together is the styx protocol. Inferno kernel implements a mount driver which transforms file operations to RPC’s for transport over the network. 8/12/2010 17
  • 18. Internal Environment of Inferno Applications:- LIMBO programs are built of modules, which are self contained units . Modules are accessed dynamically by executing a load statement. Limbo is fully type checked at compile and run time. No memory protection H/W is there. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 18
  • 19. Advantages:- Cross platform integration Transparent resource access Secure communication 8/12/2010 19
  • 20. Future scope:- Telephony Call setup Device control Text to Speech Network Gateways 8/12/2010 20
  • 21. Conlcusion:- “ Inferno does have a full-blown operating system and a virtual machine and a protocol stack, and in a lot of respects is something Java would like to be when it grows up. “ - Peter Bernstein, Inferno is a unique network operating system that adapts to whatever you plug into it -- from a high-end workstation to an inexpensive hand-held device," noted Dennis Ritchie, One of the most significant differences between Inferno and other operating systems such as JavaOS is the way in which Inferno presents network resources to an application. 8/12/2010 21
  • 22. References:- Bell Labs Technical Journal. Plugins, Vita Nuova. http://code.google.com/p/inferno-ds. www.vitanuova.com 8/12/2010 22