SlideShare a Scribd company logo
1 of 15
Download to read offline
SINGULARITY OVERVIEW
an Opensource OS by Microsoft Research




                                         By
                                          Sattvik Chakravarthy
                                          Microsoft Student Partner
                                          RNS Institute of Technology
AGENDA
 Compile Singularity
 Architectural Foundation

 Singularity Kernel

 Run Singularity in a VirtualPC
THE WORLD HAS CHANGED
 Fast computers are affordable and memory has become
  cheap
 Malicious environment – worms, viruses, etc

 Few users understand about computer or software
KEYWORDS
 Operating System
 Kernel

 Microkernel

 Safe Programming Language

 Sealed Process Architecture
CENTERS OF GRAVITY
 Abstract Instruction Set
 Unified Extension Mechanism

 Strong Process Isolation Architecture

 Ubiquitous Metadata Infrastructure
SYSTEM ARCHITECTURE


                                                             Guest
                                                             Code




                     Kernel/Runtime
       Scheduler         IPC Manager        I/O Manager      Virtual PC
                                                             Additions
   GC & Memory Mgr    Metadata Manager   Security Manager

         HAL              Native HAL     VM Manager         VPC VMM

                      Processor and other hardware
ARCHITECTURAL FOUNDATION
   Software-Isolated Processes
       Information Hiding and Failure Isolation
       Message Passing
       Cannot share writable memory
       Sealed code spaces
       Lesser Overhead
ARCHITECTURAL FOUNDATION (CONTD.)
                contract NicDevice {
                out message DeviceInfo(...);
   Contract-Based Channels
                in message RegisterForEvents(NicEvents.Exp:READY c);
                in message SetParameters(...);
                out message InvalidParameters(...);
       All communications through Contract Based Channels
                out message Success();
                in message StartIO();
       Ends of channel are not symmetric
                in message ConfigureIO();
                in message PacketForReceive(byte[] in ExHeap p);
                out message BadPacketSize(byte[] in ExHeap p, int m);
                in message GetReceivedPacket();
                out message ReceivedPacket(Packet * in ExHeap p);
                out message NoPacket();
                state START: one {
                  DeviceInfo! → IO_CONFIGURE_BEGIN;
                }
                state IO_CONFIGURE_BEGIN: one {
                  RegisterForEvents? →
                  SetParameters? → IO_CONFIGURE_ACK;
                }
                state IO_CONFIGURE_ACK: one {
                  InvalidParameters! → IO_CONFIGURE_BEGIN;
                  Success! → IO_CONFIGURED;
                }
                state IO_CONFIGURED: one {
                  StartIO? → IO_RUNNING;
                  ConfigureIO? → IO_CONFIGURE_BEGIN;
                }
                state IO_RUNNING: one {
                  PacketForReceive? → (Success! or BadPacketSize!) → IO_RUNNING;
                  GetReceivedPacket? → (ReceivedPacket! or NoPacket!) → IO_RUNNING;
                   ...
                }
                }
ARCHITECTURAL FOUNDATION (CONTD.)
   Manifest-Based Programs
       MBP is a program defined by a static manifest
       Describes code resources, system resources, capabilities and
        dependencies
       Supports Code Verifiability
SINGULARITY KERNEL
   Application Binary Interface (ABI)
       Primitive Kernel Facilities
       Privileged Code
       Handle Table
SINGULARITY KERNEL (CONTD.)
   Memory Management
       Obtain memory via ABI Calls
       Exchange Heap



                          Process




                           Exchange Heap
SINGULARITY KERNEL (CONTD.)
   Threads
       Linked Stacks
       Scheduler
   Garbage Collection
USEFUL LINKS
   http://research.microsoft.com/os/Singularity/
   http://en.wikipedia.org/wiki/Singularity_(operating_system)
   http://www.codeplex.com/singularity
QUESTIONS?
   Website
       http://sattvik.info
   Email
       sattvik@student-partners.com
   BDotnetStudent
       http://groups.msn.com/bdotnetstudent
THANK YOU

More Related Content

Similar to Singularity

9 Ways to Hack a Web App
9 Ways to Hack a Web App9 Ways to Hack a Web App
9 Ways to Hack a Web App
elliando dias
 
Loadays managing my sql with percona toolkit
Loadays managing my sql with percona toolkitLoadays managing my sql with percona toolkit
Loadays managing my sql with percona toolkit
Frederic Descamps
 
PHP Performance with APC + Memcached
PHP Performance with APC + MemcachedPHP Performance with APC + Memcached
PHP Performance with APC + Memcached
Ford AntiTrust
 
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergence
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI ConvergenceDAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergence
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergence
inside-BigData.com
 
Ajax Tutorial
Ajax TutorialAjax Tutorial
Ajax Tutorial
oscon2007
 

Similar to Singularity (20)

How many ways to monitor oracle golden gate-Collaborate 14
How many ways to monitor oracle golden gate-Collaborate 14How many ways to monitor oracle golden gate-Collaborate 14
How many ways to monitor oracle golden gate-Collaborate 14
 
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
 
"JavaME + Android in action" CCT-CEJUG Dezembro 2008
"JavaME + Android in action" CCT-CEJUG Dezembro 2008"JavaME + Android in action" CCT-CEJUG Dezembro 2008
"JavaME + Android in action" CCT-CEJUG Dezembro 2008
 
ACRN vMeet-Up EU 2021 - installation and configuration introduction
ACRN vMeet-Up EU 2021 - installation and configuration introductionACRN vMeet-Up EU 2021 - installation and configuration introduction
ACRN vMeet-Up EU 2021 - installation and configuration introduction
 
9 Ways to Hack a Web App
9 Ways to Hack a Web App9 Ways to Hack a Web App
9 Ways to Hack a Web App
 
Memcached Study
Memcached StudyMemcached Study
Memcached Study
 
Loadays managing my sql with percona toolkit
Loadays managing my sql with percona toolkitLoadays managing my sql with percona toolkit
Loadays managing my sql with percona toolkit
 
All The Little Pieces
All The Little PiecesAll The Little Pieces
All The Little Pieces
 
PHP Performance with APC + Memcached
PHP Performance with APC + MemcachedPHP Performance with APC + Memcached
PHP Performance with APC + Memcached
 
Beyond simple benchmarks—a practical guide to optimizing code
Beyond simple benchmarks—a practical guide to optimizing code Beyond simple benchmarks—a practical guide to optimizing code
Beyond simple benchmarks—a practical guide to optimizing code
 
Android 4.2 Internals - Bluetooth and Network
Android 4.2 Internals - Bluetooth and NetworkAndroid 4.2 Internals - Bluetooth and Network
Android 4.2 Internals - Bluetooth and Network
 
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
 
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
 
Figaro
FigaroFigaro
Figaro
 
(phpconftw2012) PHP as a Middleware in Embedded Systems
(phpconftw2012) PHP as a Middleware in Embedded Systems(phpconftw2012) PHP as a Middleware in Embedded Systems
(phpconftw2012) PHP as a Middleware in Embedded Systems
 
Overview Of Parallel Development - Ericnel
Overview Of Parallel Development -  EricnelOverview Of Parallel Development -  Ericnel
Overview Of Parallel Development - Ericnel
 
Application Architecture Trends
Application Architecture TrendsApplication Architecture Trends
Application Architecture Trends
 
Smart Client Development
Smart Client DevelopmentSmart Client Development
Smart Client Development
 
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergence
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI ConvergenceDAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergence
DAOS - Scale-Out Software-Defined Storage for HPC/Big Data/AI Convergence
 
Ajax Tutorial
Ajax TutorialAjax Tutorial
Ajax Tutorial
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Singularity

  • 1. SINGULARITY OVERVIEW an Opensource OS by Microsoft Research By Sattvik Chakravarthy Microsoft Student Partner RNS Institute of Technology
  • 2. AGENDA  Compile Singularity  Architectural Foundation  Singularity Kernel  Run Singularity in a VirtualPC
  • 3. THE WORLD HAS CHANGED  Fast computers are affordable and memory has become cheap  Malicious environment – worms, viruses, etc  Few users understand about computer or software
  • 4. KEYWORDS  Operating System  Kernel  Microkernel  Safe Programming Language  Sealed Process Architecture
  • 5. CENTERS OF GRAVITY  Abstract Instruction Set  Unified Extension Mechanism  Strong Process Isolation Architecture  Ubiquitous Metadata Infrastructure
  • 6. SYSTEM ARCHITECTURE Guest Code Kernel/Runtime Scheduler IPC Manager I/O Manager Virtual PC Additions GC & Memory Mgr Metadata Manager Security Manager HAL Native HAL VM Manager VPC VMM Processor and other hardware
  • 7. ARCHITECTURAL FOUNDATION  Software-Isolated Processes  Information Hiding and Failure Isolation  Message Passing  Cannot share writable memory  Sealed code spaces  Lesser Overhead
  • 8. ARCHITECTURAL FOUNDATION (CONTD.) contract NicDevice { out message DeviceInfo(...);  Contract-Based Channels in message RegisterForEvents(NicEvents.Exp:READY c); in message SetParameters(...); out message InvalidParameters(...);  All communications through Contract Based Channels out message Success(); in message StartIO();  Ends of channel are not symmetric in message ConfigureIO(); in message PacketForReceive(byte[] in ExHeap p); out message BadPacketSize(byte[] in ExHeap p, int m); in message GetReceivedPacket(); out message ReceivedPacket(Packet * in ExHeap p); out message NoPacket(); state START: one { DeviceInfo! → IO_CONFIGURE_BEGIN; } state IO_CONFIGURE_BEGIN: one { RegisterForEvents? → SetParameters? → IO_CONFIGURE_ACK; } state IO_CONFIGURE_ACK: one { InvalidParameters! → IO_CONFIGURE_BEGIN; Success! → IO_CONFIGURED; } state IO_CONFIGURED: one { StartIO? → IO_RUNNING; ConfigureIO? → IO_CONFIGURE_BEGIN; } state IO_RUNNING: one { PacketForReceive? → (Success! or BadPacketSize!) → IO_RUNNING; GetReceivedPacket? → (ReceivedPacket! or NoPacket!) → IO_RUNNING; ... } }
  • 9. ARCHITECTURAL FOUNDATION (CONTD.)  Manifest-Based Programs  MBP is a program defined by a static manifest  Describes code resources, system resources, capabilities and dependencies  Supports Code Verifiability
  • 10. SINGULARITY KERNEL  Application Binary Interface (ABI)  Primitive Kernel Facilities  Privileged Code  Handle Table
  • 11. SINGULARITY KERNEL (CONTD.)  Memory Management  Obtain memory via ABI Calls  Exchange Heap Process Exchange Heap
  • 12. SINGULARITY KERNEL (CONTD.)  Threads  Linked Stacks  Scheduler  Garbage Collection
  • 13. USEFUL LINKS  http://research.microsoft.com/os/Singularity/  http://en.wikipedia.org/wiki/Singularity_(operating_system)  http://www.codeplex.com/singularity
  • 14. QUESTIONS?  Website  http://sattvik.info  Email  sattvik@student-partners.com  BDotnetStudent  http://groups.msn.com/bdotnetstudent