SlideShare a Scribd company logo
1 of 24
Overview : Introduction Design principles Inferno Interfaces Application  Layer Kernel Layer Hardware Layer Inferno Resources Pros & Cons Questions 8/12/2010 1
Introduction: Developed in Lucent technologies by Dennis Ritchie. but is now developed and maintained by Vita Nuova Holdings as free software. Replaces a plethora of protocols in a network by a simple unifying file service protocol (styx). Applications compute their own name spaces and consider all resources as file systems. Inferno was based on the experience gained with Plan 9  os from Bell Labs. The name of the operating system and many of its associated programs, as well as that of the current company, were inspired by Dante Alighieri'sDivine Comedy. 8/12/2010 2
Inferno's definitive strength lies in its portability and versatility across several dimensions: Portability across processors Portability across environments Minimal hardware requirements Portable applications 8/12/2010 3
Design Principles:- Inferno was first made in 1995 by members of Bell Labs' Computer .It is  a distributed operating system based on 3 basic principles drawn from Plan 9.  Resources as files:- all resources are represented as files within a hierarchical file system .The advantages of using file systems are:- File systems have simple and well understood interfaces across a wide variety of operating systems.  Naming conventions for files are well known, uniform and easily understood  8/12/2010 4
Reliance on file systems reduces the amount of interface code and keeps the Inferno system small, reliable and highly portable . Access rights and permissions to files are simple, yet can be used to ensure multiple levels of security  NAMESPACE:- the application view of the network is a single, coherent namespace that appears as a hierarchical file system but may represent physically separated (locally or remotely) resources. The Inferno Namespace is a hierarchical collection of files (i.e. resources). 8/12/2010 5
Every process accesses its resources via its own namespace can inherit from parent share with other processes Local and remote resources are bound into the namespace Standard communication protocol:a standard protocol, called Styx,is used to access all resources, both local and remote. 8/12/2010 6
Styx Message Structure:- Indicates message type: initial transmission (T-message) or reply message (R-message) Unique identifier used to track commands Unsigned integer that represents “current” file Message specific data fid Contents tag type 8/12/2010 7
History:- 8/12/2010 8
Inferno Interfaces:- 8/12/2010 9
Inferno has mainly three layers.   (i)  Application layer (ii)  Kernel layer (iii)Hardware layer  8/12/2010 10
Application Layer:- Limbo is fully type checked at compile and run time. No memory protection H/W is there. All LIMBO data and program objects are subject to a garbage collector built deeply into LIMBO run time system. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 11
DisVirtualmachine: - Limbo programs are compiled into byte-codes representing instructions for a virtual machine called Dis. Dis has 3 address machine , supplemented with few specialized operations  for handling  arrays and strings. The byte codes are expanded into a format more efficient for execution. 8/12/2010 12
Kernel Layer:- Namespace : Memory management Process management Security in Inferno  Security mechanisms  8/12/2010 13
Hardware Layer:-   Device drivers:- A device driver simplifies programming by acting as a translator between a device and the applications or operating systems that use it In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. A driver typically communicates with the device through the computer bus or communications subsystem to which the hardware is connected. 8/12/2010 14
Host os:-  Inferno can run in different host operating  system Host systems  Windows NT/2000/XP Linux MacOS Plan9os Solaris 8/12/2010 15
Inferno Resources:- 8/12/2010 16
External Environment of Inferno Applications :- The purpose of most Inferno applns is to present information n/media to user. Regardless of whether resources are local/global, a communication protocol called styx is used. The glue that connects diff parts of the resource name space together is the styx protocol. Inferno kernel implements a mount driver which transforms file operations to RPC’s  for transport over the network. 8/12/2010 17
Internal Environment of Inferno Applications:- LIMBO programs are built of modules, which are self contained units . Modules are accessed dynamically by executing a load statement. Limbo is fully type checked at compile and run time. No memory protection H/W is there. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 18
Advantages:- Cross platform integration Transparent resource access Secure communication 8/12/2010 19
Future scope:- Telephony Call setup Device control Text to Speech Network Gateways 8/12/2010 20
Conlcusion:- “ Inferno does have a full-blown operating system and a virtual machine and a protocol stack, and in a lot of respects is something Java would like to be when it grows up. “ - Peter Bernstein,  Inferno is a unique network operating system that adapts to whatever you plug into it -- from a high-end workstation to an inexpensive hand-held device," noted Dennis Ritchie,  One of the most significant differences between Inferno and other operating systems such as JavaOS is the way in which Inferno presents network resources to an application.  8/12/2010 21
References:- Bell Labs Technical Journal. Plugins, Vita Nuova. http://code.google.com/p/inferno-ds. www.vitanuova.com 8/12/2010 22
8/12/2010 23
QUESTIONS 8/12/2010 24

More Related Content

What's hot (6)

Sector Cloudcom Tutorial
Sector Cloudcom TutorialSector Cloudcom Tutorial
Sector Cloudcom Tutorial
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Glossary vp 9
Glossary vp 9Glossary vp 9
Glossary vp 9
 
Presentation1
Presentation1Presentation1
Presentation1
 
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinuxNguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
 
Presentation1
Presentation1Presentation1
Presentation1
 

Viewers also liked

Translucent optical networks the way forward
Translucent optical networks  the way forward Translucent optical networks  the way forward
Translucent optical networks the way forward Philippe Fanaro
 
Latest seminar topics
Latest seminar topicsLatest seminar topics
Latest seminar topicsPulla Surya
 
Seminar blue eye
Seminar blue eyeSeminar blue eye
Seminar blue eyeanju ann
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technologyYusuf Shaik
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry reportShruthi K Gowda
 
Deep Web
Deep WebDeep Web
Deep WebSt John
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarkajol agarwal
 
Raspberry pi : an introduction
Raspberry pi : an introductionRaspberry pi : an introduction
Raspberry pi : an introductionLTG Oxford
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technologyDivya Mohan
 
Wireless power / Wireless Electricity
Wireless power / Wireless ElectricityWireless power / Wireless Electricity
Wireless power / Wireless ElectricityMuhammad Umair Iqbal
 
Wireless transmission of electricity
Wireless transmission of electricityWireless transmission of electricity
Wireless transmission of electricitydeepak113
 
Apple's Smart Sensor Technologies -- market research report (sample)
Apple's Smart Sensor Technologies -- market research report (sample)Apple's Smart Sensor Technologies -- market research report (sample)
Apple's Smart Sensor Technologies -- market research report (sample)MEMS Journal, Inc.
 
Wireless power transmission ppt
Wireless power transmission pptWireless power transmission ppt
Wireless power transmission pptAishwary Verma
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmissionrakeshkk
 
wireless power transmission via solar power satellite
wireless power transmission via solar power satellitewireless power transmission via solar power satellite
wireless power transmission via solar power satellitechingaro
 

Viewers also liked (20)

Translucent optical networks the way forward
Translucent optical networks  the way forward Translucent optical networks  the way forward
Translucent optical networks the way forward
 
Latest seminar topics
Latest seminar topicsLatest seminar topics
Latest seminar topics
 
GENOMICS
GENOMICSGENOMICS
GENOMICS
 
Seminar blue eye
Seminar blue eyeSeminar blue eye
Seminar blue eye
 
Dna computing
Dna computingDna computing
Dna computing
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Final digital jewelry report
Final digital jewelry  reportFinal digital jewelry  report
Final digital jewelry report
 
Deep Web
Deep WebDeep Web
Deep Web
 
Blue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminarBlue eyes- The perfect presentation for a technical seminar
Blue eyes- The perfect presentation for a technical seminar
 
WiTricity
WiTricityWiTricity
WiTricity
 
Raspberry pi : an introduction
Raspberry pi : an introductionRaspberry pi : an introduction
Raspberry pi : an introduction
 
Blue eye technology
Blue eye technologyBlue eye technology
Blue eye technology
 
Witricity
WitricityWitricity
Witricity
 
Wireless power / Wireless Electricity
Wireless power / Wireless ElectricityWireless power / Wireless Electricity
Wireless power / Wireless Electricity
 
Wireless transmission of electricity
Wireless transmission of electricityWireless transmission of electricity
Wireless transmission of electricity
 
Apple's Smart Sensor Technologies -- market research report (sample)
Apple's Smart Sensor Technologies -- market research report (sample)Apple's Smart Sensor Technologies -- market research report (sample)
Apple's Smart Sensor Technologies -- market research report (sample)
 
Wireless power transmission ppt
Wireless power transmission pptWireless power transmission ppt
Wireless power transmission ppt
 
Wireless power transmission
Wireless power transmissionWireless power transmission
Wireless power transmission
 
wireless power transmission via solar power satellite
wireless power transmission via solar power satellitewireless power transmission via solar power satellite
wireless power transmission via solar power satellite
 

Similar to K2presentation

Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming ReportShivek Khurana
 
Inferno operating system
Inferno operating systemInferno operating system
Inferno operating systemSadhana28
 
Plan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemPlan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemQuentin Fennessy
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrationshaile468688
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helixJeff Carroll
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating SystemKunalKewat1
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, DockerSatrioBudi10
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure amol_chavan
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systemsAbDul ThaYyal
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesInformation Technology
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiSowmya Jyothi
 

Similar to K2presentation (20)

Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming Report
 
Inferno operating system
Inferno operating systemInferno operating system
Inferno operating system
 
Plan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemPlan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating System
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helix
 
Linux OS presentation
Linux OS presentationLinux OS presentation
Linux OS presentation
 
Linux
Linux Linux
Linux
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Linux notes
Linux notesLinux notes
Linux notes
 
Introduction to unix
Introduction to unixIntroduction to unix
Introduction to unix
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, Docker
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 
Inferno
InfernoInferno
Inferno
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
 
Linux Vulnerabilities
Linux VulnerabilitiesLinux Vulnerabilities
Linux Vulnerabilities
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
 
Final
FinalFinal
Final
 

Recently uploaded

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 

K2presentation

  • 1. Overview : Introduction Design principles Inferno Interfaces Application Layer Kernel Layer Hardware Layer Inferno Resources Pros & Cons Questions 8/12/2010 1
  • 2. Introduction: Developed in Lucent technologies by Dennis Ritchie. but is now developed and maintained by Vita Nuova Holdings as free software. Replaces a plethora of protocols in a network by a simple unifying file service protocol (styx). Applications compute their own name spaces and consider all resources as file systems. Inferno was based on the experience gained with Plan 9 os from Bell Labs. The name of the operating system and many of its associated programs, as well as that of the current company, were inspired by Dante Alighieri'sDivine Comedy. 8/12/2010 2
  • 3. Inferno's definitive strength lies in its portability and versatility across several dimensions: Portability across processors Portability across environments Minimal hardware requirements Portable applications 8/12/2010 3
  • 4. Design Principles:- Inferno was first made in 1995 by members of Bell Labs' Computer .It is a distributed operating system based on 3 basic principles drawn from Plan 9. Resources as files:- all resources are represented as files within a hierarchical file system .The advantages of using file systems are:- File systems have simple and well understood interfaces across a wide variety of operating systems. Naming conventions for files are well known, uniform and easily understood 8/12/2010 4
  • 5. Reliance on file systems reduces the amount of interface code and keeps the Inferno system small, reliable and highly portable . Access rights and permissions to files are simple, yet can be used to ensure multiple levels of security NAMESPACE:- the application view of the network is a single, coherent namespace that appears as a hierarchical file system but may represent physically separated (locally or remotely) resources. The Inferno Namespace is a hierarchical collection of files (i.e. resources). 8/12/2010 5
  • 6. Every process accesses its resources via its own namespace can inherit from parent share with other processes Local and remote resources are bound into the namespace Standard communication protocol:a standard protocol, called Styx,is used to access all resources, both local and remote. 8/12/2010 6
  • 7. Styx Message Structure:- Indicates message type: initial transmission (T-message) or reply message (R-message) Unique identifier used to track commands Unsigned integer that represents “current” file Message specific data fid Contents tag type 8/12/2010 7
  • 10. Inferno has mainly three layers. (i) Application layer (ii) Kernel layer (iii)Hardware layer 8/12/2010 10
  • 11. Application Layer:- Limbo is fully type checked at compile and run time. No memory protection H/W is there. All LIMBO data and program objects are subject to a garbage collector built deeply into LIMBO run time system. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 11
  • 12. DisVirtualmachine: - Limbo programs are compiled into byte-codes representing instructions for a virtual machine called Dis. Dis has 3 address machine , supplemented with few specialized operations for handling arrays and strings. The byte codes are expanded into a format more efficient for execution. 8/12/2010 12
  • 13. Kernel Layer:- Namespace : Memory management Process management Security in Inferno Security mechanisms 8/12/2010 13
  • 14. Hardware Layer:- Device drivers:- A device driver simplifies programming by acting as a translator between a device and the applications or operating systems that use it In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. A driver typically communicates with the device through the computer bus or communications subsystem to which the hardware is connected. 8/12/2010 14
  • 15. Host os:- Inferno can run in different host operating system Host systems Windows NT/2000/XP Linux MacOS Plan9os Solaris 8/12/2010 15
  • 17. External Environment of Inferno Applications :- The purpose of most Inferno applns is to present information n/media to user. Regardless of whether resources are local/global, a communication protocol called styx is used. The glue that connects diff parts of the resource name space together is the styx protocol. Inferno kernel implements a mount driver which transforms file operations to RPC’s for transport over the network. 8/12/2010 17
  • 18. Internal Environment of Inferno Applications:- LIMBO programs are built of modules, which are self contained units . Modules are accessed dynamically by executing a load statement. Limbo is fully type checked at compile and run time. No memory protection H/W is there. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 18
  • 19. Advantages:- Cross platform integration Transparent resource access Secure communication 8/12/2010 19
  • 20. Future scope:- Telephony Call setup Device control Text to Speech Network Gateways 8/12/2010 20
  • 21. Conlcusion:- “ Inferno does have a full-blown operating system and a virtual machine and a protocol stack, and in a lot of respects is something Java would like to be when it grows up. “ - Peter Bernstein, Inferno is a unique network operating system that adapts to whatever you plug into it -- from a high-end workstation to an inexpensive hand-held device," noted Dennis Ritchie, One of the most significant differences between Inferno and other operating systems such as JavaOS is the way in which Inferno presents network resources to an application. 8/12/2010 21
  • 22. References:- Bell Labs Technical Journal. Plugins, Vita Nuova. http://code.google.com/p/inferno-ds. www.vitanuova.com 8/12/2010 22