SlideShare a Scribd company logo
1 of 91
Download to read offline
CS8493 OPERATING SYSTEMS
UNIT – V
Dr.A.Kathirvel, Professor &Head, Computer Science & Engg.
M N M Jain Engineering College, Chennai
1
Unit - V
CASE STUDY
Linux System – Design Principles, Kernel Modules, Process
Management, Scheduling, Memory Management, Input-Output
Management, File System, Inter-process Communication; Mobile
OS – iOS and Android – Architecture and SDK Framework, Media
Layer, Services Layer, Core OS Layer, File System.
Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System
Concepts”, 9 th Edition, John Wiley and Sons Inc., 2012.
2
The Linux System
Linux History
Design Principles
Kernel Modules
Process Management
Scheduling
Memory Management
File Systems
Input and Output
Interprocess Communication
Network Structure
Security
3
Objectives
To explore the history of the UNIX operating
system from which Linux is derived and the
principles upon which Linux’s design is based
To examine the Linux process model and illustrate
how Linux schedules processes and provides
interprocess communication
To look at memory management in Linux
To explore how Linux implements file systems and
manages I/O devices
4
History
 Linux is a modern, free operating system based on UNIX standards
 First developed as a small but self-contained kernel in 1991 by Linus
Torvalds, with the major design goal of UNIX compatibility, released
as open source
 Its history has been one of collaboration by many users from all
around the world, corresponding almost exclusively over the
Internet
 It has been designed to run efficiently and reliably on common PC
hardware, but also runs on a variety of other platforms
 The core Linux operating system kernel is entirely original, but it can
run much existing free UNIX software, resulting in an entire UNIX-
compatible operating system free from proprietary code
 Linux system has many, varying Linux distributions including the
kernel, applications, and management tools
5
The Linux Kernel
 Version 0.01 (May 1991) had no networking, ran only on 80386-
compatible Intel processors and on PC hardware, had extremely
limited device-drive support, and supported only the Minix file
system
 Linux 1.0 (March 1994) included these new features:
Support for UNIX’s standard TCP/IP networking protocols
BSD-compatible socket interface for networking programming
Device-driver support for running IP over an Ethernet
Enhanced file system
Support for a range of SCSI controllers for
high-performance disk access
Extra hardware support
 Version 1.2 (March 1995) was the final PC-only Linux kernel
 Kernels with odd version numbers are development kernels,
those with even numbers are production kernels
6
Linux 2.0
 Released in June 1996, 2.0 added two major new capabilities:
Support for multiple architectures, including a fully 64-bit native Alpha
port
Support for multiprocessor architectures
 Other new features included:
Improved memory-management code
Improved TCP/IP performance
Support for internal kernel threads, for handling dependencies between
loadable modules, and for automatic loading of modules on demand
Standardized configuration interface
 Available for Motorola 68000-series processors, Sun Sparc systems, and for
PC and PowerMac systems
 2.4 and 2.6 increased SMP support, added journaling file system,
preemptive kernel, 64-bit memory support
 3.0 released in 2011, 20th anniversary of Linux, improved virtualization
support, new page write-back facility, improved memory management, new
Completely Fair Scheduler
7
The Linux System
 Linux uses many tools developed as part of Berkeley’s BSD operating
system, MIT’s X Window System, and the Free Software Foundation's
GNU project
 The main system libraries were started by the GNU project, with
improvements provided by the Linux community
 Linux networking-administration tools were derived from 4.3BSD code;
recent BSD derivatives such as Free BSD have borrowed code from Linux in
return
 The Linux system is maintained by a loose network of developers
collaborating over the Internet, with a small number of public ftp sites
acting as de facto standard repositories
 File System Hierarchy Standard document maintained by the Linux
community to ensure compatibility across the various system components
Specifies overall layout of a standard Linux file system, determines
under which directory names configuration files, libraries, system
binaries, and run-time data files should be stored
8
Linux Distributions
 Standard, precompiled sets of packages, or distributions, include
the basic Linux system, system installation and management
utilities, and ready-to-install packages of common UNIX tools
 The first distributions managed these packages by simply providing
a means of unpacking all the files into the appropriate places;
modern distributions include advanced package management
 Early distributions included SLS and Slackware
Red Hat and Debian are popular distributions from commercial
and noncommercial sources, respectively, others include
Canonical and SuSE
 The RPM Package file format permits compatibility among the
various Linux distributions
9
Linux Licensing
The Linux kernel is distributed under the GNU General
Public License (GPL), the terms of which are set out by
the Free Software Foundation
Not public domain, in that not all rights are waived
Anyone using Linux, or creating their own derivative of
Linux, may not make the derived product proprietary;
software released under the GPL may not be
redistributed as a binary-only product
Can sell distributions, but must offer the source code
too
10
Design Principles
 Linux is a multiuser, multitasking system with a full set of UNIX-
compatible tools
 Its file system adheres to traditional UNIX semantics, and it fully
implements the standard UNIX networking model
 Main design goals are speed, efficiency, and standardization
 Linux is designed to be compliant with the relevant POSIX
documents; at least two Linux distributions have achieved official
POSIX certification
Supports Pthreads and a subset of POSIX real-time process
control
 The Linux programming interface adheres to the SVR4 UNIX
semantics, rather than to BSD behavior
11
Components of a Linux System
 Like most UNIX implementations, Linux is composed of three main
bodies of code; the most important distinction between the kernel and
all other components.
 The kernel is responsible for maintaining the important abstractions of
the operating system
Kernel code executes in kernel mode with full access to all the
physical resources of the computer
All kernel code and data structures are kept in the same single
address space
12
Components of a Linux System
 The system libraries define a standard set of functions through which
applications interact with the kernel, and which implement much of
the operating-system functionality that does not need the full
privileges of kernel code
 The system utilities perform individual specialized management tasks
 User-mode programs rich and varied, including multiple shells like
the bourne-again (bash)
Kernel Modules
Sections of kernel code that can be compiled, loaded, and unloaded
independent of the rest of the kernel.
A kernel module may typically implement a device driver, a file
system, or a networking protocol
The module interface allows third parties to write and distribute, on
their own terms, device drivers or file systems that could not be
distributed under the GPL. 13
 Kernel modules allow a Linux system to be set up with a standard,
minimal kernel, without any extra device drivers built in.
 Four components to Linux module support:
 module-management system
 module loader and unloader
 driver-registration system
 conflict-resolution mechanism
Kernel Modules
Module Management
 Supports loading modules into memory & letting them talk to the rest of the kernel
 Module loading is split into two separate sections:
 Managing sections of module code in kernel memory
 Handling symbols that modules are allowed to reference
 The module requestor manages loading requested, but currently unloaded,
modules; it also regularly queries the kernel to see whether a dynamically loaded
module is still in use, and will unload it when it is no longer actively needed
14
Driver Registration
Allows modules to tell the rest of the kernel that a new
driver has become available
The kernel maintains dynamic tables of all known drivers,
and provides a set of routines to allow drivers to be added
to or removed from these tables at any time
Registration tables include the following items:
Device drivers
File systems
Network protocols
Binary format
15
 A mechanism that allows different device drivers to reserve
hardware resources and to protect those resources from
accidental use by another driver.
 The conflict resolution module aims to:
Prevent modules from clashing over access to hardware
resources
Prevent autoprobes from interfering with existing device
drivers
Resolve conflicts with multiple drivers trying to access the
same hardware:
Kernel maintains list of allocated HW resources
Driver reserves resources with kernel database first
Reservation request rejected if resource not available
Conflict Resolution
16
Process Management
UNIX process management separates the creation of
processes and the running of a new program into two
distinct operations.
The fork() system call creates a new process
A new program is run after a call to exec()
Under UNIX, a process encompasses all the information
that the operating system must maintain to track the
context of a single execution of a single program
Under Linux, process properties fall into three groups: the
process’s identity, environment, and context
17
Process Identity
 Process ID (PID) - The unique identifier for the process; used to
specify processes to the operating system when an application
makes a system call to signal, modify, or wait for another process
 Credentials - Each process must have an associated user ID and
one or more group IDs that determine the process’s rights to
access system resources and files
 Personality - Not traditionally found on UNIX systems, but under
Linux each process has an associated personality identifier that can
slightly modify the semantics of certain system calls
Used primarily by emulation libraries to request that system
calls be compatible with certain specific flavors of UNIX
 Namespace – Specific view of file system hierarchy
Most processes share common namespace and operate on a
shared file-system hierarchy
But each can have unique file-system hierarchy with its own root
directory and set of mounted file systems
18
Process Environment
 The process’s environment is inherited from its parent, and is
composed of two null-terminated vectors:
The argument vector lists the command-line arguments used to
invoke the running program; conventionally starts with the name
of the program itself.
The environment vector is a list of “NAME=VALUE” pairs that
associates named environment variables with arbitrary textual
values.
 Passing environment variables among processes and inheriting
variables by a process’s children are flexible means of passing
information to components of the user-mode system software.
 The environment-variable mechanism provides a customization of
the operating system that can be set on a per-process basis, rather
than being configured for the system as a whole.
19
Process Context
 The (constantly changing) state of a running program at any point in time
 The scheduling context is the most important part of the process context; it is the
information that the scheduler needs to suspend and restart the process
 The kernel maintains accounting information about the resources currently being
consumed by each process, and the total resources consumed by the process in its
lifetime so far
 The file table is an array of pointers to kernel file structures
 When making file I/O system calls, processes refer to files by their index into
this table, the file descriptor (fd)
 Whereas the file table lists the existing open files, the
file-system context applies to requests to open new files
 The current root and default directories to be used for new file searches are
stored here
 The signal-handler table defines the routine in the process’s address space to be
called when specific signals arrive
 The virtual-memory context of a process describes the full contents of the its
private address space
20
Processes and Threads
 Linux uses the same internal representation for processes and threads; a thread
is simply a new process that happens to share the same address space as its
parent
 Both are called tasks by Linux
 A distinction is only made when a new thread is created by the clone()
system call
 fork() creates a new task with its own entirely new task context
 clone() creates a new task with its own identity, but that is allowed to
share the data structures of its parent
 Using clone() gives an application fine-grained control over exactly what is
shared between two threads
21
Scheduling
 The job of allocating CPU time to different tasks within an operating
system
 While scheduling is normally thought of as the running and
interrupting of processes, in Linux, scheduling also includes the
running of the various kernel tasks
 Running kernel tasks encompasses both tasks that are requested by
a running process and tasks that execute internally on behalf of a
device driver
 As of 2.5, new scheduling algorithm – preemptive, priority-based,
known as O(1)
Real-time range
nice value
Had challenges with interactive performance
 2.6 introduced Completely Fair Scheduler (CFS)
22
CFS
 Eliminates traditional, common idea of time slice
 Instead all tasks allocated portion of processor’s time
 CFS calculates how long a process should run as a function of total number
of tasks
 N runnable tasks means each gets 1/N of processor’s time
 Then weights each task with its nice value
Smaller nice value -> higher weight (higher priority)
 Then each task run with for time proportional to task’s weight divided by
total weight of all runnable tasks
 Configurable variable target latency is desired interval during which each
task should run at least once
Consider simple case of 2 runnable tasks with equal weight and target
latency of 10ms – each then runs for 5ms
If 10 runnable tasks, each runs for 1ms
Minimum granularity ensures each run has reasonable amount of
time (which actually violates fairness idea) 23
Kernel Synchronization
 A request for kernel-mode execution can occur in two ways:
A running program may request an operating system service, either
explicitly via a system call, or implicitly, for example, when a page fault
occurs
A device driver may deliver a hardware interrupt that causes the CPU
to start executing a kernel-defined handler for that interrupt
 Kernel synchronization requires a framework that will allow the kernel’s
critical sections to run without interruption by another critical section
 Linux uses two techniques to protect critical sections:
1. Normal kernel code is nonpreemptible – when a time interrupt is
received while a process is
executing a kernel system service routine, the kernel ’ s
need_resched flag is set so that the scheduler will run
once the system call has completed and control is
about to be returned to user mode
24
Kernel Synchronization
2. The second technique applies to critical sections that occur in an interrupt service
routines
 By using the processor’s interrupt control hardware to disable interrupts during a
critical section, the kernel guarantees that it can proceed without the risk of
concurrent access of shared data structures
 Provides spin locks, semaphores, and reader-writer versions of both
 Behavior modified if on single processor or multi:
 To avoid performance penalties, Linux’s kernel uses a synchronization architecture that
allows long critical sections to run without having interrupts disabled for the critical
section’s entire duration
 Interrupt service routines are separated into a top half and a bottom half
 The top half is a normal interrupt service routine, and runs with recursive interrupts
disabled
 The bottom half is run, with all interrupts enabled, by a miniature scheduler that
ensures that bottom halves never interrupt themselves
 Architecture is completed by a mechanism for disabling selected bottom halves
while executing normal, foreground kernel code
25
Interrupt Protection Levels
Each level may be interrupted by code running at a higher
level, but will never be interrupted by code running at the
same or a lower level
User processes can always be preempted by another
process when a time-sharing scheduling interrupt occurs
Symmetric Multiprocessing
Linux 2.0 was the first Linux kernel to support SMP
hardware; separate processes or threads can execute in
parallel on separate processors
Until version 2.2, to preserve the kernel’s nonpreemptible
synchronization requirements, SMP imposes the restriction,
via a single kernel spinlock, that only one processor at a
time may execute kernel-mode code
Later releases implement more scalability by splitting single
spinlock into multiple locks, each protecting a small subset
of kernel data structures
Version 3.0 adds even more fine-grained locking, processor
affinity, and load-balancing
27
Memory Management
Linux ’ s physical memory-management system
deals with allocating and freeing pages, groups of
pages, and small blocks of memory
It has additional mechanisms for handling virtual
memory, memory mapped into the address space
of running processes
Splits memory into four different zones due to
hardware characteristics
Architecture specific, for example on x86:
28
Managing Physical Memory
 The page allocator allocates and frees all physical pages; it can
allocate ranges of physically-contiguous pages on request
 The allocator uses a buddy-heap algorithm to keep track of available
physical pages
Each allocatable memory region is paired with an adjacent partner
Whenever two allocated partner regions are both freed up they
are combined to form a larger region
If a small memory request cannot be satisfied by allocating an
existing small free region, then a larger free region will be
subdivided into two partners to satisfy the request
 Memory allocations in the Linux kernel occur either statically (drivers
reserve a contiguous area of memory during system boot time) or
dynamically (via the page allocator)
 Also uses slab allocator for kernel memory
29
Managing Physical Memory
 Page cache and virtual memory system also manage physical
memory
Page cache is kernel’s main cache for files and main mechanism
for I/O to block devices
Page cache stores entire pages of file contents for local and
network file I/O
Splitting of Memory in a Buddy Heap
30
Slab Allocator in Linux
31
Virtual Memory
 The VM system maintains the address space visible to each process: It
creates pages of virtual memory on demand, and manages the loading of
those pages from disk or their swapping back out to disk as required.
 The VM manager maintains two separate views of a process’s address
space:
A logical view describing instructions concerning the layout of the
address space
The address space consists of a set of non-overlapping regions, each
representing a continuous, page-aligned subset of the address space
A physical view of each address space which is stored in the hardware
page tables for the process
 Virtual memory regions are characterized by:
The backing store, which describes from where the pages for a region
come; regions are usually backed by a file or by nothing (demand-zero
memory)
The region’s reaction to writes (page sharing or copy-on-write
32
Virtual Memory
 The kernel creates a new virtual address space
1.When a process runs a new program with the exec() system call
2. Upon creation of a new process by the fork() system call
 On executing a new program, the process is given a new,
completely empty virtual-address space; the program-loading
routines populate the address space with virtual-memory regions
 Creating a new process with fork() involves creating a complete
copy of the existing process’s virtual address space
The kernel copies the parent process’s VMA descriptors, then
creates a new set of page tables for the child
The parent’s page tables are copied directly into the child’s,
with the reference count of each page covered being
incremented
After the fork, the parent and child share the same physical
pages of memory in their address spaces
33
Swapping and Paging
 The VM paging system relocates pages of memory from physical
memory out to disk when the memory is needed for something
else
 The VM paging system can be divided into two sections:
The pageout-policy algorithm decides which pages to write out
to disk, and when
The paging mechanism actually carries out the transfer, and
pages data back into physical memory as needed
Can page out to either swap device or normal files
Bitmap used to track used blocks in swap space kept in physical
memory
Allocator uses next-fit algorithm to try to write contiguous runs
34
Kernel Virtual Memory
The Linux kernel reserves a constant, architecture-
dependent region of the virtual address space of every
process for its own internal use
This kernel virtual-memory area contains two regions:
A static area that contains page table references to
every available physical page of memory in the system,
so that there is a simple translation from physical to
virtual addresses when running kernel code
The reminder of the reserved section is not reserved for
any specific purpose; its page-table entries can be
modified to point to any other areas of memory
35
Executing and Loading User Programs
 Linux maintains a table of functions for loading
programs; it gives each function the opportunity to
try loading the given file when an exec system call is
made
 The registration of multiple loader routines allows
Linux to support both the ELF and a.out binary
formats
 Initially, binary-file pages are mapped into virtual
memory
 Only when a program tries to access a given page
will a page fault result in that page being loaded
into physical memory
 An ELF-format binary file consists of a header
followed by several page-aligned sections
 The ELF loader works by reading the header and
mapping the sections of the file into separate
regions of virtual memory
Memory Layout for
ELF Programs
36
Static and Dynamic Linking
 A program whose necessary library functions are embedded directly in the
program’s executable binary file is statically linked to its libraries
 The main disadvantage of static linkage is that every program generated must
contain copies of exactly the same common system library functions
 Dynamic linking is more efficient in terms of both physical memory and disk-
space usage because it loads the system libraries into memory only once
 Linux implements dynamic linking in user mode through special linker library
 Every dynamically linked program contains small statically linked function
called when process starts
 Maps the link library into memory
 Link library determines dynamic libraries required by process and names of
variables and functions needed
 Maps libraries into middle of virtual memory and resolves references to
symbols contained in the libraries
 Shared libraries compiled to be position-independent code (PIC) so can be
loaded anywhere
37
File Systems
 To the user, Linux’s file system appears as a hierarchical directory tree obeying UNIX
semantics
 Internally, the kernel hides implementation details and manages the multiple different file
systems via an abstraction layer, that is, the virtual file system (VFS)
 The Linux VFS is designed around object-oriented principles and is composed of four
components:
 A set of definitions that define what a file object is allowed to look like
The inode object structure represent an individual file
The file object represents an open file
The superblock object represents an entire file system
A dentry object represents an individual directory entry
 To the user, Linux’s file system appears as a hierarchical directory tree obeying UNIX
semantics
 Internally, the kernel hides implementation details and manages the multiple different file
systems via an abstraction layer, that is, the virtual file system (VFS)
 The Linux VFS is designed around object-oriented principles and layer of software to
manipulate those objects with a set of operations on the objects
 For example for the file object operations include (from struct file_operations in
/usr/include/linux/fs.h 1. int open(. . .) - Open a file 2. ssize t read(. . .) -Read from a file
3. ssize t write(. . .) — Write to a file 4. int mmap(. . .) — Memory-map a file
38
The Linux ext3 File System
 ext3 is standard on disk file system for Linux
Uses a mechanism similar to that of BSD Fast File System (FFS) for
locating data blocks belonging to a specific file
Supersedes older extfs, ext2 file systems
Work underway on ext4 adding features like extents
Of course, many other file system choices with Linux distros
Ext2fs Block-Allocation Policies
39
The Linux ext3 File System
 The main differences between ext2fs and FFS concern their disk
allocation policies
In ffs, the disk is allocated to files in blocks of 8Kb, with blocks being
subdivided into fragments of 1Kb to store small files or partially filled
blocks at the end of a file
ext3 does not use fragments; it performs its allocations in smaller
units
The default block size on ext3 varies as a function of total size of
file system with support for 1, 2, 4 and 8 KB blocks
ext3 uses cluster allocation policies designed to place logically
adjacent blocks of a file into physically adjacent blocks on disk, so
that it can submit an I/O request for several disk blocks as a single
operation on a block group
Maintains bit map of free blocks in a block group, searches for free
byte to allocate at least 8 blocks at a time
40
Journaling
 ext3 implements journaling, with file system updates first
written to a log file in the form of transactions
Once in log file, considered committed
Over time, log file transactions replayed over file system to
put changes in place
 On system crash, some transactions might be in journal but not
yet placed into file system
Must be completed once system recovers
No other consistency checking is needed after a crash
(much faster than older methods)
 Improves write performance on hard disks by turning random
I/O into sequential I/O
41
The Linux Proc File System
The proc file system does not store data, rather, its contents
are computed on demand according to user file I/O requests
proc must implement a directory structure, and the file
contents within; it must then define a unique and persistent
inode number for each directory and files it contains
It uses this inode number to identify just what operation
is required when a user tries to read from a particular file
inode or perform a lookup in a particular directory inode
When data is read from one of these files, proc collects
the appropriate information, formats it into text form and
places it into the requesting process’s read buffer
42
Input and Output
 The Linux device-oriented file system accesses disk storage
through two caches:
Data is cached in the page cache, which is unified with the
virtual memory system
Metadata is cached in the buffer cache, a separate cache
indexed by the physical disk block
 Linux splits all devices into three classes:
block devices allow random access to completely
independent, fixed size blocks of data
character devices include most other devices; they don’t
need to support the functionality of regular files
network devices are interfaced via the kernel’s networking
subsystem
43
Block Devices
 Provide the main interface to all disk devices in a system
 The block buffer cache serves two main purposes:
it acts as a pool of buffers for active I/O
it serves as a cache for completed I/O
 The request manager manages the reading and writing of buffer
contents to and from a block device driver
 Kernel 2.6 introduced Completely Fair Queueing (CFQ)
Now the default scheduler
Fundamentally different from elevator algorithms
Maintains set of lists, one for each process by default
Uses C-SCAN algorithm, with round robin between all outstanding
I/O from all processes
Four blocks from each process put on at once
44
Device-Driver Block Structure
 A device driver which does not offer random access to fixed blocks of data
 A character device driver must register a set of functions which implement
the driver’s various file I/O operations
 The kernel performs almost no preprocessing of a file read or write request
to a character device, but simply passes on the request to the device
 The main exception to this rule is the special subset of character device
drivers which implement terminal devices, for which the kernel maintains a
standard interface
45
Character Devices
 Line discipline is an interpreter for the information from the
terminal device
The most common line discipline is tty discipline, which glues
the terminal’s data stream onto standard input and output
streams of user’s running processes, allowing processes to
communicate directly with the user’s terminal
Several processes may be running simultaneously, tty line
discipline responsible for attaching and detaching terminal’s
input and output from various processes connected to it as
processes are suspended or awakened by user
Other line disciplines also are implemented have nothing to
do with I/O to user process – i.e. PPP and SLIP networking
protocols
46
Interprocess Communication
 Like UNIX, Linux informs processes that an event has occurred via
signals
 There is a limited number of signals, and they cannot carry
information: Only the fact that a signal occurred is available to a
process
 The Linux kernel does not use signals to communicate with
processes with are running in kernel mode, rather, communication
within the kernel is accomplished via scheduling states and
wait_queue structures
 Also implements System V Unix semaphores
Process can wait for a signal or a semaphore
Semaphores scale better
Operations on multiple semaphores can be atomic
47
Passing Data Between Processes
 The pipe mechanism allows a child process to inherit a
communication channel to its parent, data written to one end
of the pipe can be read a the other
 Shared memory offers an extremely fast way of
communicating; any data written by one process to a shared
memory region can be read immediately by any other process
that has mapped that region into its address space
 To obtain synchronization, however, shared memory must be
used in conjunction with another Interprocess-communication
mechanism
48
 Networking is a key area of functionality for Linux
 It supports the standard Internet protocols for UNIX to UNIX
communications
 It also implements protocols native to non-UNIX operating systems, in
particular, protocols used on PC networks, such as Appletalk and IPX
 Internally, networking in the Linux kernel is implemented by three layers of
software:
 The socket interface
 Protocol drivers
 Network device drivers
 Most important set of protocols in the Linux networking system is the internet
protocol suite
 It implements routing between different hosts anywhere on the network
 On top of the routing protocol are built the UDP, TCP and ICMP protocols
 Packets also pass to firewall management for filtering based on firewall chains
of rules
Network Structure
49
Security
 The pluggable authentication modules (PAM) system is available under Linux
 PAM is based on a shared library that can be used by any system component
that needs to authenticate users
 Access control under UNIX systems, including Linux, is performed through the
use of unique numeric identifiers (uid and gid)
 Access control is performed by assigning objects a protections mask, which
specifies which access modes—read, write, or execute—are to be granted to
processes with owner, group, or world access
 Linux augments the standard UNIX setuid mechanism in two ways:
 It implements the POSIX specification’s saved user-id mechanism, which
allows a process to repeatedly drop and reacquire its effective uid
 It has added a process characteristic that grants just a subset of the rights
of the effective uid
 Linux provides another mechanism that allows a client to selectively pass
access to a single file to some server process without granting it any other
privileges
50
Mobile Handsets:A Panoramic Overview
Introduction
Handset Architecture
Handset Operating Systems
Networking
Applications
Security Risks and Mitigation Strategies
51
What Is A Mobile Handset?
A mobile handset (handset) is
an electronic device that
provides services to users,
e.g.:
Managing address book
Scheduling calendar
Cellular telephony
Accessing Internet, email
Handsets include
smartphones and PDAs
Example handsets:
Apple iPhone, BlackBerry Storm, Palm
TreoPro
52
Handsets: Your Next Computer?
Handsets’ small form factor, mobility have yielded
meteoric sales [1]
3.3 billion mobile phone subscriptions as of Jan. 2008
(how about 2013 or 2014?)
2.7 billion subscriptions correspond to one person;
some people have multiple phones!
Rapid replacement rate: young adults replace phones
every 6 months in South Korea
These statistics are just for phones
Your handset: your next computer?
53
Handset Architecture
 Handsets use several hardware components:
Microprocessor ROM
Digital signal processor RAM
Microphone and speaker Radio module
Hardware interfaces LCD display
 Handsets store system data in electronically-erasable
programmable read-only memory (EEPROM)
Service providers can reprogram phones without requiring
physical access to memory chips
 OS is stored in ROM (nonvolatile memory)
 Most handsets also include subscriber identity module (SIM) cards
54
Handset Microprocessors
 Handsets use embedded processors
 Intel, ARM architectures dominate market.
Examples include:
BlackBerry 8700, uses Intel PXA901
chip
iPhone, uses Samsung ARM 1100 chip
 Low power use and code size are crucial
 Microprocessor vendors often package all
the chip’s functionality in a single chip
(package-on-package) for maximum
flexibility
 Example: The iPhone’s CPU
 The iPhone: a real-world mobile handset
 Runs on Samsung S3C6400 chip, supports
ARMv6 architecture
Very few details are known about the “ARM Core”, esp. given Apple’s secrecy
Highly modular architecture
Similar to Apple’s iPod Touch, which lacks telephony capability
55
SIM Cards
 They include their own microprocessor and 16 KB – 4 MB EEPROM
 They come in two sizes
 Their versatility arises from portability of information
SIM card identifies subscriber to network
Stores personal information, address books, messages, service-
related information
Other Memory Cards
 Some handsets include other peripheral memory cards:
Compact Flash
Multimedia Card
Secure Digital
 Handsets synchronize with a computer
 Nowadays, computers include slots of various sizes to hold these
memory cards
Handset Operating Systems
 Currently, handsets run several OSes:
Symbian OS Windows Mobile
iPhone OS (an embedded version of OS X) BlackBerry OS
Google Android Platform (based on Linux)
 With the exceptions of Symbian and Android, these OS’s are
proprietary
 Telecom carriers frequently “lock down” handset firmware, OSes to
prevent user modifications
Handset OS Usage
 According to British analysis firm Canalys, handset OS usage in 3Q 2008 had the
following ranking (most to least)
 Symbian OS iPhone OS BlackBerry OS
 Windows Mobile Linux (Android, etc.) Others
 iPhone OS surged ahead of BlackBerry OS, but with new BlackBerries and
Android phones, this ranking may easily change in the future
57
Symbian OS
 Dominant OS in the mobile handset market
 Runs exclusively on ARM processors
 Owned by British firm Symbian Ltd.
 Descendant of Psion EPOC OS (dev. in 1990s)
 Sony Ericsson, Nokia, et al. bought shares in the firm until Nokia bought
Symbian in 2008, formed Symbian Foundation to further future open
handset development
 Nokia plans to open-source the OS by 2009
Design of Symbian OS
 Based on Psion EPOC; desktop OS features include:
“Bare-bones” microkernel (nanokernel)
Pre-emptive multitasking
Memory protection
 Handset-centric design, can operate several months without reboot
 Supports multiple UIs based on smartphone form factor e.g.320 × 24058
Symbian OS Devices
 Numerous handsets use Symbian OS; UIs largely based on manufacturer & device
 Nokia S60: includes J2ME, std. UI (mostly Nokia phones)
 Nokia S80: QWERTY keyboard, Web browser, enterprise office-doc. support
 Nokia S90: used only on Nokia 7710
 UIQ: Sony Ericsson/Motorola GUI platform used primarily on those companies’
handsets
 FOMA platform: closed-dev. software platform used by handsets on NTT
DoCoMo’s network (Japan)
Symbian OS Development
 Native language is C++
 Nokia provides free Eclipse-based Carbide.c++ development tools, Carbide.vs
Visual Studio plugin
 Mac & Linux development is possible
 Can program in many other languages: C, Java, Ruby, Python, Perl, OPL, Visual
Basic, Simkin
 Applications needing any capabilities beyond bare minimum must be
cryptographically signed (see http://www.symbiansigned.com)
 Can also program in Adobe Flash Lite (mobile version of Flash)
59
Symbian OS v9 Architecture
60
iPhone OS
 Runs on both the iPhone and iPod Touch
 Variation of Mach microkernel-based OS X that fits in 512 MB flash memory, runs
on ARM architecture
 Four abstraction layers: Core OS, Core Services, Media, Cocoa Touch
 Core Animation and PowerVR MBX 3D hardware provide interface animations
 320 × 480 LCD display that supports multi-touch gestures
iPhone Developer Program
 iPhone Developer Program provides dev. tools, iPhone emulator, means to
upload to App Store (SDK)
 To download SDK, you must apply to be a member, pay fees
 Standard Developer: $99
 Enterprise Developer: $299
 Exception: Apple’s free iPhone Developer University Program for higher-ed.
institutions
 SDK only runs on Mac OS X Leopard on Intel-based Macs
61
iPhone Web App Development
 You can develop Web apps for iPhone – so long as they run on Safari
 Safari features:
Auto-resizes Web pages to fit browser size
Multi-touch functionality
XHTML 1.1, CSS 2.1, JavaScript, W3C DOM Level 2, AJAX
technology, cookies, …
 Does not support Flash or Java
 iPhone Web apps should:
Minimize user awareness of browser experience
Reproduce control style, layout, behavior of iPhone apps
Integrate with built-in iPhone features & services
62
BlackBerry OS
 BlackBerry OS is Research in Motion’s (RIM’s) proprietary OS for its
BlackBerry handsets
 Provides multitasking, heavily uses BlackBerry input devices, e.g.,
thumbwheel
 Current OS 4 provides a subset of Java’s Mobile Information Device Profile
(MIDP) 2.0
 Developers can use these APIs, proprietary APIs to write software
 All applications must be digitally signed so to “link” an app with the
developer
BlackBerry Wireless Platform
 RIM provides standards-based platform and developer tools to develop and
deploy custom wireless applications
HTML Web browser
Java Mobile Edition development tools
.NET applications
 BlackBerry handsets support standard networking protocols and connect to
any type of server application
63
BlackBerry Software
 Email from BlackBerry service, MS Exchange, Domino, Yahoo, etc. can be “pushed”
to the handset
 Can view PDF, MS Word, Excel, PowerPoint attachments
 BlackBerry Browser (only supports JavaScript)
 Other online apps include: BlackBerry Maps, Facebook services & Yahoo
Messenger, Google Talk
 Calendar, Address Book, and PIM Sync via USB
 GPS
BlackBerry Internet Services BlackBerry Internet Service leverages centrally-hosted wireless gateways, allowing
users to access up to 10 supported email accounts, browse Internet
64
BlackBerry Mobile Data System
 BlackBerry Mobile Data System (MDS) supports MS Exchange, Lotus Domino,
Novell GroupWire, and RIM’s own MDS systems for messaging applications
Mobile Voice System
 With this service, there’s only one business number BlackBerry users must
remember
 Calls are routed to a BlackBerry handset, regardless of whether the call is directed
to an office or mobile phone
 Provides security and authentication through BlackBerry Enterprise Servers
 IT administrators can lock down handsets, route calls through their telecom
infrastructure, etc.
65
BlackBerry Developer Tools
 RIM provides several development tools:
BlackBerry MDS Studio
Developers can quickly create rich client apps using
component-based drag-and-drop approach
Tool requires MDS runtime
BlackBerry plugin for MS Visual Studio (development on MDS
platform)
BlackBerry Java Development Environment (JDE)
Provides IDE, simulation tools for Java ME app for Java-based
BlackBerry so developers can create standalone or client-
server apps
66
Windows Mobile
Windows Mobile is powered by Microsoft’s Windows CE
embedded OS; Windows CE runs on x86, MIPS, ARM,
Hitachi SuperH processors
Latest version, 6.1, includes Windows Live services,
Exchange 2007 mail access
Designed to closely mimic desktop Windows:
Windows Mobile 6.1 includes mobile versions of Office
applications, Outlook (w/HTML email), Internet Explorer, Windows
Media Player
SQL Server 2005 included in ROM
.NET Compact Framework 2.0 included
67
Windows Mobile Development
 Compiled to MS Intermediate Language
(MSIL) that all the languages share
 At execution time, MSIL is compiled “just in
time” to native object code
 Contrast with Java:
 Java code is compiled to Java bytecode
 Java interpreter interprets bytecode,
dynamically compiles frequently-accessed
bytecode into native object code (HotSpot)
 Windows Mobile development tools include:
 Plugins for MS Visual Studio 2005,2008, etc.
 SDKs for Windows Mobile-based handsets
 Microsoft gives away Visual Studio to
students for free with its DreamSpark
program .NET Framework in Context. Source
Native code is developed with MS Visual C++
Microsoft strongly recommends development with managed code
Managed code is written in one of the .NET framework object-oriented lang.
68
What is Android?
Operating System optimized for Mobile Devices
Open Source
Maintained by Google
Based on the Linux kernel
History
Android Inc. founded 2003
 Purchased by Google from initial dveloper in 2005
 Version 2.0 released 2009
 Starts to take hold in the Smartphone Market
Version 3.0 released 2011
 Predominantly used in Tablets
69
Android Mobile Handset Platform
 Android is a software development platform
for mobile handsets that is based on Linux
 Developed by Google and Open Handset
Alliance (OHA) for different handset
manufacturers
The Alliance includes T-Mobile, Sprint
Nextel, Google, Intel, Samsung, Wind River
Systems, et al.
Its purpose is to build a fully free and open
mobile handset platform to facilitate
development of handsets, software,
services
 First Android-based handset is T-Mobile G1
70
Relevant Devices
Phones:
HTC Thunderbolt
Motorola Droid/2/X
HTC Evo
Samsung Nexus S
+Many More
Tablets:
Motorola Xoom
Samsung Galaxy Tab 4G
Dell Streak
Asus Eee-Pad Transformer
+More
71
Android Architecture
 Android SDK provides required
tools and APIs to develop apps on
Android platform using Java
Android is licensed under the
Apache open-source license
The Android Development
Tools (ADT) Eclipse plugin
eases development
Download the Android SDK at
http://code.google.com/androi
d/
the Eclipse plugin at https://dl-
ssl.google.com/android/eclipse
72
Android Features and Software
 Features
3D: OpenGL ES 1.0
SQLite: Database engine
WebKit: Web browser
Dalvik: Register-based
VM similar to Java VM
FreeType: Bitmap and
vector font rendering
Connectivity: Bluetooth,
802.11, GPS
 Core Applications
 Email client, SMS program,
calendar, Google Maps (and Apps),
browser, etc.
 Written in Java
 App Framework
 Full access to same framework APIs
 Architecture designed for
component reuse
 Runtime
 Core C++ library
 Multiple Dalvik VMs run in a
process, rely on Linux kernel for
process isolation
73
A Quick Summary on Handset OSes
iOS Android Windows
Phone
BlackBerry
OS
Symbian OS
Company Apple Open Handset
Alliance, Google
Microsoft Research in
Motion
Accenture on
behalf of Nokia
Open Source? No Yes No No Yes
OS Family Darwin Linux Windows NT QNX Psion’s EPOC
Supported
CPU
Architecture
ARM, ARM64 ARM, x86, MIPS,
64-bit variants of
each
ARM ARM ARM, x86
Programming
Language
C, C++,
Objective-C,
Swift
C, C++, Java C# (.NET),
VB.NET, C, C++,
DirectX
C, C++,
HTML5,
JavaScript, Java
ME
C, C++, Java ME,
Python
Development
Cost
$0 (univ.),
$99/yr.
(person),
$299/yr. (corp.)
$0 $0 $0 $0
App Store
Publishing cost
Included in
dev. cost
$25 one-time $0 (1 yr., student)
$19/yr. (person),
$99/yr. (corp.)
$0 $0
74
Hardware& I/O:Device Requirements
Chipset: ARM-based (32-bit Advanced reduced instruction set
computer architecture machine). Dalvik VM graphics processing, currently
assume an ARM architecture.
Memory: 128 MB RAM; 256 MB Flash External. Android can boot and
run in configurations with less memory, but it isn't recommended.
Storage: Mini or Micro SD. Not necessary for basic bring up, but
recommended.
Primary Display: QVGA (320×240) TFT LCD or larger, 16-bit color or
better.
Touch screen interface no smaller than 2.8 inches in size.
Navigation Keys: 5-way navigation with 5 application keys, power,
camera and volume controls.
Camera: Must have a resolution of at least 2 megapixels, but not
required.
USB: Standard mini-B USB . For flashing the device system images and
debugging.
Bluetooth: 1.2 or 2.0, but not required.
75
Android Kernel
 Derived from the Linux 2.6 kernel, with added enhancements not
found in Linux
 Kernel mode and user mode are used the same as in the Linux kernel
Ashmem
Anonymous Shared Memory
Ashmem uses virtual memory
The kernel is allowed to free this shared memory
More viable for low memory devices, because it can discard shared
memory units
Pmem
Process memory allocator
Similar to ashmem, but uses physically contiguous memory as
opposed to virtual memory
Manages large, contiguous regions of memory shared between user
space and the kernel drivers
76
Binder
A tool for inter-process communication
Binder driver manages synchronization between processes
Facilitated using different states
 Receive blocked Ready
 Send blocked Reply blocked
Logger
System logging, separate from the Linux kernel’s own logging system
Stores logs from applications, events, and the system
Write path is optimized to avoid overhead from open(), write(), and
close()
Android Power Management
Wake locks are used to hold the machine awake until a wake lock is
released
Wake locks issued in user space, handled by kernel
Power management can shut CPU down if there are no active wake
locks 77
Multithreading and Multitasking
Expensive operations are done in a background service
Slow work is done in a background thread
Ensure the UI is responsive to the user
Processes are not killed when the user closes an application,
instead they remain in the background
Removal From Linux Kernel
Android code removed from Linux kernel as of December, 2009
Kernel development has been removed from the Linux kernel tree
Android kernel includes features that would need to be integrated
into Linux kernel to merge it into main kernel tree
78
Software Architecture
System Libraries
libc for C and C++
 Why not glibc?
libpthread
 not 100% POSIX compliant
Isn't Android programmed in Java?
SDK vs NDK
More Libraries
SSL
SQLite
WebKit (and LibWebCore for embeddable webpages)
 Audio Manager
Media Framework - MediaPlayer
79
Graphics Libraries
Scalable Graphics Library (SGL- for 2D)
OpenGL for Embedded Devices (for 3D)
 FreeType (vector and bitmap fonts)
 Surface Manager
 Composes 2D and 3D windows, widgets, apps, toolbars and more
using Surface Flinger
 Uses Binder IPC to get buffers from apps to put into frames
Hardware Abstraction Libraries
GPS, Radio, Camera, Bluetooth, other I/O
Hardware drivers must implement in order for applicationss to use
them
Applications interact with the abstraction libraries, not the driver
Promotes variety in hardware without breaking applications
Gives OS tighter control over devices
80
Android vs Linux Software Architecture
No native window library
Does not support full set of GNU libraries
Difficult to port Linux applications to Android, but possible if
working within libc constraints
Reboot Bug (2008)
Android allowed a remote device to be controlled over serial port
If device not attached, phone would execute ALL text input as
shell commands
Typing “reboot” in an email/browser/anywhere would result in
phone rebooting
Architecture and Components at fault! Promptly fixed, but
jeopardized Android’s reputation.
81
Programming on Android
Application Development
Most Android applications written in Java
However, no Java Virtual Machine in the platform
Java classes compiled into Dalvik virtual machine
Dalvik - a specialized virtual machine designed specifically for Android
Android Software Development Kit(SDK)
The SDK includes a comprehensive set of development tools.
Includes a debugger, libraries, documentation, sample code
These tools are accessed through an Eclipse plugin called ADT
(Android Development Tools) or from command line
Developing with Eclipse is preferred (but not required)
82
Steps for Developing Applications
1. Install Eclipse or own IDE
2. Install ADT plugin, or an editor of your choice
3. Set up Android Virtual Devices or hardware devices on which you will
install your applications
4. Create an Android project
o Contains all source code and resource files for your application.
Built into an .apk package that you can install on Android devices.
5. Build and run your application
6. Debug your application with the SDK debugging tools
o Involves using a JDWP-compliant debugger along with the
tools provided with Android SDK.
7.Test your application with the Testing and
Instrumentation framework
o The Android SDK provides a testing and instrumentation
framework to help set up and run tests
83
Support for Additional Languages
In 2009, Google announced the Android Native Development Kit
(NDK)
 Allows developers to build Android software components with C
and C++
 Comes with limitations, however
 Intended to be used alongside Java to code individual parts of
programs, not as a full alternative
Google also launched the Android Scripting Environment (ASE) -
allows developers to build apps with Python and Lua
New Language
July, 2009, Google released language called Simple, designed
specifically for Android apps
Simple - based on BASIC
Easy to learn and use language
Gives both amateur and professional programmers a quick and easy
way to write Android apps
84
Application Components: Android
 Four types: Activities -
Services - Content Providers -
Broadcast Receivers
 Part of the building blocks
of applications
 Each component type performs
its own unique
action
Component - Activity
 Activities can be thought of as a single view
that provides a user interface
 Each activity is it's own entity but all activities
work together to form the application.
85
Component - Services
Services are tasks that run in the background
 Run on the main process thread unless
otherwise specified
Examples include playing music while using
other
applications, handling network transactions, etc
Content Providers allow for cross application
communication
Applications must have necessary permission
levels to communicate
For example allows applications to select
an image from the phones library, select a
contacts info from the contacts list, etc
Content Provider
86
Component - Broadcast Receiver
 Broadcast are system wide notifications
 Broadcast Receivers allow applications to receive those
notifications and act accordingly
For example releasing allocation memory on a
low memory warning.
87
Growth: Android predicted to grow in market share
38.6% tablet OSes by 2015
48.8% phone OSes by 2015
Reasons for Growth
 Open Source
 Many handset / tablet makers utilize this free OS (HTC, Motorola, Samsung)
Saturates the market with Android hardware on multiple carriers
 Free to develop on -- no overhead charge for developing apps (iOS)
 Strong fan base
 Alternative to iOS-based devices
 It's Google
 With Great Growth Comes Great Responsibility
Fragmentation
 Different screen sizes, hardware features, user interfaces and carrier-decided OS
updates cause inconsistent Android experience
 After selling a device, manufacturer has little incentive to offer updates
Security
 More users = more attractive to malware writers
 "Open" market means it's customer's responsibility to stay away from malicious
software
 Smartphone use in business world poses risk
Android's Future
88
Mobile Growth Visualized
Merger With Chrome OS
Eric Schmidt (ex-CEO):
 The two efforts [Android and Chrome OS] will ultimately converge.
 "We're working overtime to get these technologies merged in the
right way.“
What does this mean for Android?
Merger With Chrome OS
Chrome OS heavily utilizes the cloud.
 A small hard drive is only needed for the OS itself.
The merger may bring more cloud services to Android, possibly
eliminating the need for internal storage.
 Pictures, songs, videos, etc. may not need to be stored on the
devices themselves -- instead pulled from the cloud when requested.
90
Questions?
91

More Related Content

What's hot (20)

System calls
System callsSystem calls
System calls
 
Design issues of dos
Design issues of dosDesign issues of dos
Design issues of dos
 
Case Study - SUN NFS
Case Study - SUN NFSCase Study - SUN NFS
Case Study - SUN NFS
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
distributed Computing system model
distributed Computing system modeldistributed Computing system model
distributed Computing system model
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
Input output in linux
Input output in linuxInput output in linux
Input output in linux
 
Mca ii os u-1 introduction to os
Mca  ii  os u-1 introduction to osMca  ii  os u-1 introduction to os
Mca ii os u-1 introduction to os
 
Handheld operting system
Handheld operting systemHandheld operting system
Handheld operting system
 
Processes and threads
Processes and threadsProcesses and threads
Processes and threads
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
 
Advanced Operating System- Introduction
Advanced Operating System- IntroductionAdvanced Operating System- Introduction
Advanced Operating System- Introduction
 
Distributed System ppt
Distributed System pptDistributed System ppt
Distributed System ppt
 
Content addressable network(can)
Content addressable network(can)Content addressable network(can)
Content addressable network(can)
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 
Text compression
Text compressionText compression
Text compression
 
Unix.system.calls
Unix.system.callsUnix.system.calls
Unix.system.calls
 
Web Security
Web SecurityWeb Security
Web Security
 

Similar to Linux OS Design, Kernel Modules, Process Management

Similar to Linux OS Design, Kernel Modules, Process Management (20)

OS_Ch20
OS_Ch20OS_Ch20
OS_Ch20
 
OSCh20
OSCh20OSCh20
OSCh20
 
Ch20 OS
Ch20 OSCh20 OS
Ch20 OS
 
Ch22
Ch22Ch22
Ch22
 
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinuxNguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
 
OS(ch16)-LinuxSystem.pptx
OS(ch16)-LinuxSystem.pptxOS(ch16)-LinuxSystem.pptx
OS(ch16)-LinuxSystem.pptx
 
ch20.ppt
ch20.pptch20.ppt
ch20.ppt
 
Operating System
Operating SystemOperating System
Operating System
 
Mca ii os u-5 unix linux file system
Mca  ii  os u-5 unix linux file systemMca  ii  os u-5 unix linux file system
Mca ii os u-5 unix linux file system
 
The linux system
The linux systemThe linux system
The linux system
 
Ch20 the linux systems
Ch20 the linux systemsCh20 the linux systems
Ch20 the linux systems
 
Assignment On Linux Unix Life Cycle And Its Commands Course Title System Pro...
Assignment On Linux Unix Life Cycle And Its Commands Course Title  System Pro...Assignment On Linux Unix Life Cycle And Its Commands Course Title  System Pro...
Assignment On Linux Unix Life Cycle And Its Commands Course Title System Pro...
 
Linux Introduction
Linux IntroductionLinux Introduction
Linux Introduction
 
Case study linux
Case study linuxCase study linux
Case study linux
 
3CS LSP UNIT 1-1.pdf
3CS LSP UNIT 1-1.pdf3CS LSP UNIT 1-1.pdf
3CS LSP UNIT 1-1.pdf
 
Studies
StudiesStudies
Studies
 
Linux
LinuxLinux
Linux
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
 
Linux Operating System. UOG MARGHAZAR Campus
 Linux Operating System. UOG MARGHAZAR Campus Linux Operating System. UOG MARGHAZAR Campus
Linux Operating System. UOG MARGHAZAR Campus
 
linux software architecture
linux software architecture linux software architecture
linux software architecture
 

More from Kathirvel Ayyaswamy

22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTUREKathirvel Ayyaswamy
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2Kathirvel Ayyaswamy
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy
 

More from Kathirvel Ayyaswamy (20)

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 

Recently uploaded

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Linux OS Design, Kernel Modules, Process Management

  • 1. CS8493 OPERATING SYSTEMS UNIT – V Dr.A.Kathirvel, Professor &Head, Computer Science & Engg. M N M Jain Engineering College, Chennai 1
  • 2. Unit - V CASE STUDY Linux System – Design Principles, Kernel Modules, Process Management, Scheduling, Memory Management, Input-Output Management, File System, Inter-process Communication; Mobile OS – iOS and Android – Architecture and SDK Framework, Media Layer, Services Layer, Core OS Layer, File System. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne, “Operating System Concepts”, 9 th Edition, John Wiley and Sons Inc., 2012. 2
  • 3. The Linux System Linux History Design Principles Kernel Modules Process Management Scheduling Memory Management File Systems Input and Output Interprocess Communication Network Structure Security 3
  • 4. Objectives To explore the history of the UNIX operating system from which Linux is derived and the principles upon which Linux’s design is based To examine the Linux process model and illustrate how Linux schedules processes and provides interprocess communication To look at memory management in Linux To explore how Linux implements file systems and manages I/O devices 4
  • 5. History  Linux is a modern, free operating system based on UNIX standards  First developed as a small but self-contained kernel in 1991 by Linus Torvalds, with the major design goal of UNIX compatibility, released as open source  Its history has been one of collaboration by many users from all around the world, corresponding almost exclusively over the Internet  It has been designed to run efficiently and reliably on common PC hardware, but also runs on a variety of other platforms  The core Linux operating system kernel is entirely original, but it can run much existing free UNIX software, resulting in an entire UNIX- compatible operating system free from proprietary code  Linux system has many, varying Linux distributions including the kernel, applications, and management tools 5
  • 6. The Linux Kernel  Version 0.01 (May 1991) had no networking, ran only on 80386- compatible Intel processors and on PC hardware, had extremely limited device-drive support, and supported only the Minix file system  Linux 1.0 (March 1994) included these new features: Support for UNIX’s standard TCP/IP networking protocols BSD-compatible socket interface for networking programming Device-driver support for running IP over an Ethernet Enhanced file system Support for a range of SCSI controllers for high-performance disk access Extra hardware support  Version 1.2 (March 1995) was the final PC-only Linux kernel  Kernels with odd version numbers are development kernels, those with even numbers are production kernels 6
  • 7. Linux 2.0  Released in June 1996, 2.0 added two major new capabilities: Support for multiple architectures, including a fully 64-bit native Alpha port Support for multiprocessor architectures  Other new features included: Improved memory-management code Improved TCP/IP performance Support for internal kernel threads, for handling dependencies between loadable modules, and for automatic loading of modules on demand Standardized configuration interface  Available for Motorola 68000-series processors, Sun Sparc systems, and for PC and PowerMac systems  2.4 and 2.6 increased SMP support, added journaling file system, preemptive kernel, 64-bit memory support  3.0 released in 2011, 20th anniversary of Linux, improved virtualization support, new page write-back facility, improved memory management, new Completely Fair Scheduler 7
  • 8. The Linux System  Linux uses many tools developed as part of Berkeley’s BSD operating system, MIT’s X Window System, and the Free Software Foundation's GNU project  The main system libraries were started by the GNU project, with improvements provided by the Linux community  Linux networking-administration tools were derived from 4.3BSD code; recent BSD derivatives such as Free BSD have borrowed code from Linux in return  The Linux system is maintained by a loose network of developers collaborating over the Internet, with a small number of public ftp sites acting as de facto standard repositories  File System Hierarchy Standard document maintained by the Linux community to ensure compatibility across the various system components Specifies overall layout of a standard Linux file system, determines under which directory names configuration files, libraries, system binaries, and run-time data files should be stored 8
  • 9. Linux Distributions  Standard, precompiled sets of packages, or distributions, include the basic Linux system, system installation and management utilities, and ready-to-install packages of common UNIX tools  The first distributions managed these packages by simply providing a means of unpacking all the files into the appropriate places; modern distributions include advanced package management  Early distributions included SLS and Slackware Red Hat and Debian are popular distributions from commercial and noncommercial sources, respectively, others include Canonical and SuSE  The RPM Package file format permits compatibility among the various Linux distributions 9
  • 10. Linux Licensing The Linux kernel is distributed under the GNU General Public License (GPL), the terms of which are set out by the Free Software Foundation Not public domain, in that not all rights are waived Anyone using Linux, or creating their own derivative of Linux, may not make the derived product proprietary; software released under the GPL may not be redistributed as a binary-only product Can sell distributions, but must offer the source code too 10
  • 11. Design Principles  Linux is a multiuser, multitasking system with a full set of UNIX- compatible tools  Its file system adheres to traditional UNIX semantics, and it fully implements the standard UNIX networking model  Main design goals are speed, efficiency, and standardization  Linux is designed to be compliant with the relevant POSIX documents; at least two Linux distributions have achieved official POSIX certification Supports Pthreads and a subset of POSIX real-time process control  The Linux programming interface adheres to the SVR4 UNIX semantics, rather than to BSD behavior 11
  • 12. Components of a Linux System  Like most UNIX implementations, Linux is composed of three main bodies of code; the most important distinction between the kernel and all other components.  The kernel is responsible for maintaining the important abstractions of the operating system Kernel code executes in kernel mode with full access to all the physical resources of the computer All kernel code and data structures are kept in the same single address space 12
  • 13. Components of a Linux System  The system libraries define a standard set of functions through which applications interact with the kernel, and which implement much of the operating-system functionality that does not need the full privileges of kernel code  The system utilities perform individual specialized management tasks  User-mode programs rich and varied, including multiple shells like the bourne-again (bash) Kernel Modules Sections of kernel code that can be compiled, loaded, and unloaded independent of the rest of the kernel. A kernel module may typically implement a device driver, a file system, or a networking protocol The module interface allows third parties to write and distribute, on their own terms, device drivers or file systems that could not be distributed under the GPL. 13
  • 14.  Kernel modules allow a Linux system to be set up with a standard, minimal kernel, without any extra device drivers built in.  Four components to Linux module support:  module-management system  module loader and unloader  driver-registration system  conflict-resolution mechanism Kernel Modules Module Management  Supports loading modules into memory & letting them talk to the rest of the kernel  Module loading is split into two separate sections:  Managing sections of module code in kernel memory  Handling symbols that modules are allowed to reference  The module requestor manages loading requested, but currently unloaded, modules; it also regularly queries the kernel to see whether a dynamically loaded module is still in use, and will unload it when it is no longer actively needed 14
  • 15. Driver Registration Allows modules to tell the rest of the kernel that a new driver has become available The kernel maintains dynamic tables of all known drivers, and provides a set of routines to allow drivers to be added to or removed from these tables at any time Registration tables include the following items: Device drivers File systems Network protocols Binary format 15
  • 16.  A mechanism that allows different device drivers to reserve hardware resources and to protect those resources from accidental use by another driver.  The conflict resolution module aims to: Prevent modules from clashing over access to hardware resources Prevent autoprobes from interfering with existing device drivers Resolve conflicts with multiple drivers trying to access the same hardware: Kernel maintains list of allocated HW resources Driver reserves resources with kernel database first Reservation request rejected if resource not available Conflict Resolution 16
  • 17. Process Management UNIX process management separates the creation of processes and the running of a new program into two distinct operations. The fork() system call creates a new process A new program is run after a call to exec() Under UNIX, a process encompasses all the information that the operating system must maintain to track the context of a single execution of a single program Under Linux, process properties fall into three groups: the process’s identity, environment, and context 17
  • 18. Process Identity  Process ID (PID) - The unique identifier for the process; used to specify processes to the operating system when an application makes a system call to signal, modify, or wait for another process  Credentials - Each process must have an associated user ID and one or more group IDs that determine the process’s rights to access system resources and files  Personality - Not traditionally found on UNIX systems, but under Linux each process has an associated personality identifier that can slightly modify the semantics of certain system calls Used primarily by emulation libraries to request that system calls be compatible with certain specific flavors of UNIX  Namespace – Specific view of file system hierarchy Most processes share common namespace and operate on a shared file-system hierarchy But each can have unique file-system hierarchy with its own root directory and set of mounted file systems 18
  • 19. Process Environment  The process’s environment is inherited from its parent, and is composed of two null-terminated vectors: The argument vector lists the command-line arguments used to invoke the running program; conventionally starts with the name of the program itself. The environment vector is a list of “NAME=VALUE” pairs that associates named environment variables with arbitrary textual values.  Passing environment variables among processes and inheriting variables by a process’s children are flexible means of passing information to components of the user-mode system software.  The environment-variable mechanism provides a customization of the operating system that can be set on a per-process basis, rather than being configured for the system as a whole. 19
  • 20. Process Context  The (constantly changing) state of a running program at any point in time  The scheduling context is the most important part of the process context; it is the information that the scheduler needs to suspend and restart the process  The kernel maintains accounting information about the resources currently being consumed by each process, and the total resources consumed by the process in its lifetime so far  The file table is an array of pointers to kernel file structures  When making file I/O system calls, processes refer to files by their index into this table, the file descriptor (fd)  Whereas the file table lists the existing open files, the file-system context applies to requests to open new files  The current root and default directories to be used for new file searches are stored here  The signal-handler table defines the routine in the process’s address space to be called when specific signals arrive  The virtual-memory context of a process describes the full contents of the its private address space 20
  • 21. Processes and Threads  Linux uses the same internal representation for processes and threads; a thread is simply a new process that happens to share the same address space as its parent  Both are called tasks by Linux  A distinction is only made when a new thread is created by the clone() system call  fork() creates a new task with its own entirely new task context  clone() creates a new task with its own identity, but that is allowed to share the data structures of its parent  Using clone() gives an application fine-grained control over exactly what is shared between two threads 21
  • 22. Scheduling  The job of allocating CPU time to different tasks within an operating system  While scheduling is normally thought of as the running and interrupting of processes, in Linux, scheduling also includes the running of the various kernel tasks  Running kernel tasks encompasses both tasks that are requested by a running process and tasks that execute internally on behalf of a device driver  As of 2.5, new scheduling algorithm – preemptive, priority-based, known as O(1) Real-time range nice value Had challenges with interactive performance  2.6 introduced Completely Fair Scheduler (CFS) 22
  • 23. CFS  Eliminates traditional, common idea of time slice  Instead all tasks allocated portion of processor’s time  CFS calculates how long a process should run as a function of total number of tasks  N runnable tasks means each gets 1/N of processor’s time  Then weights each task with its nice value Smaller nice value -> higher weight (higher priority)  Then each task run with for time proportional to task’s weight divided by total weight of all runnable tasks  Configurable variable target latency is desired interval during which each task should run at least once Consider simple case of 2 runnable tasks with equal weight and target latency of 10ms – each then runs for 5ms If 10 runnable tasks, each runs for 1ms Minimum granularity ensures each run has reasonable amount of time (which actually violates fairness idea) 23
  • 24. Kernel Synchronization  A request for kernel-mode execution can occur in two ways: A running program may request an operating system service, either explicitly via a system call, or implicitly, for example, when a page fault occurs A device driver may deliver a hardware interrupt that causes the CPU to start executing a kernel-defined handler for that interrupt  Kernel synchronization requires a framework that will allow the kernel’s critical sections to run without interruption by another critical section  Linux uses two techniques to protect critical sections: 1. Normal kernel code is nonpreemptible – when a time interrupt is received while a process is executing a kernel system service routine, the kernel ’ s need_resched flag is set so that the scheduler will run once the system call has completed and control is about to be returned to user mode 24
  • 25. Kernel Synchronization 2. The second technique applies to critical sections that occur in an interrupt service routines  By using the processor’s interrupt control hardware to disable interrupts during a critical section, the kernel guarantees that it can proceed without the risk of concurrent access of shared data structures  Provides spin locks, semaphores, and reader-writer versions of both  Behavior modified if on single processor or multi:  To avoid performance penalties, Linux’s kernel uses a synchronization architecture that allows long critical sections to run without having interrupts disabled for the critical section’s entire duration  Interrupt service routines are separated into a top half and a bottom half  The top half is a normal interrupt service routine, and runs with recursive interrupts disabled  The bottom half is run, with all interrupts enabled, by a miniature scheduler that ensures that bottom halves never interrupt themselves  Architecture is completed by a mechanism for disabling selected bottom halves while executing normal, foreground kernel code 25
  • 26. Interrupt Protection Levels Each level may be interrupted by code running at a higher level, but will never be interrupted by code running at the same or a lower level User processes can always be preempted by another process when a time-sharing scheduling interrupt occurs
  • 27. Symmetric Multiprocessing Linux 2.0 was the first Linux kernel to support SMP hardware; separate processes or threads can execute in parallel on separate processors Until version 2.2, to preserve the kernel’s nonpreemptible synchronization requirements, SMP imposes the restriction, via a single kernel spinlock, that only one processor at a time may execute kernel-mode code Later releases implement more scalability by splitting single spinlock into multiple locks, each protecting a small subset of kernel data structures Version 3.0 adds even more fine-grained locking, processor affinity, and load-balancing 27
  • 28. Memory Management Linux ’ s physical memory-management system deals with allocating and freeing pages, groups of pages, and small blocks of memory It has additional mechanisms for handling virtual memory, memory mapped into the address space of running processes Splits memory into four different zones due to hardware characteristics Architecture specific, for example on x86: 28
  • 29. Managing Physical Memory  The page allocator allocates and frees all physical pages; it can allocate ranges of physically-contiguous pages on request  The allocator uses a buddy-heap algorithm to keep track of available physical pages Each allocatable memory region is paired with an adjacent partner Whenever two allocated partner regions are both freed up they are combined to form a larger region If a small memory request cannot be satisfied by allocating an existing small free region, then a larger free region will be subdivided into two partners to satisfy the request  Memory allocations in the Linux kernel occur either statically (drivers reserve a contiguous area of memory during system boot time) or dynamically (via the page allocator)  Also uses slab allocator for kernel memory 29
  • 30. Managing Physical Memory  Page cache and virtual memory system also manage physical memory Page cache is kernel’s main cache for files and main mechanism for I/O to block devices Page cache stores entire pages of file contents for local and network file I/O Splitting of Memory in a Buddy Heap 30
  • 31. Slab Allocator in Linux 31
  • 32. Virtual Memory  The VM system maintains the address space visible to each process: It creates pages of virtual memory on demand, and manages the loading of those pages from disk or their swapping back out to disk as required.  The VM manager maintains two separate views of a process’s address space: A logical view describing instructions concerning the layout of the address space The address space consists of a set of non-overlapping regions, each representing a continuous, page-aligned subset of the address space A physical view of each address space which is stored in the hardware page tables for the process  Virtual memory regions are characterized by: The backing store, which describes from where the pages for a region come; regions are usually backed by a file or by nothing (demand-zero memory) The region’s reaction to writes (page sharing or copy-on-write 32
  • 33. Virtual Memory  The kernel creates a new virtual address space 1.When a process runs a new program with the exec() system call 2. Upon creation of a new process by the fork() system call  On executing a new program, the process is given a new, completely empty virtual-address space; the program-loading routines populate the address space with virtual-memory regions  Creating a new process with fork() involves creating a complete copy of the existing process’s virtual address space The kernel copies the parent process’s VMA descriptors, then creates a new set of page tables for the child The parent’s page tables are copied directly into the child’s, with the reference count of each page covered being incremented After the fork, the parent and child share the same physical pages of memory in their address spaces 33
  • 34. Swapping and Paging  The VM paging system relocates pages of memory from physical memory out to disk when the memory is needed for something else  The VM paging system can be divided into two sections: The pageout-policy algorithm decides which pages to write out to disk, and when The paging mechanism actually carries out the transfer, and pages data back into physical memory as needed Can page out to either swap device or normal files Bitmap used to track used blocks in swap space kept in physical memory Allocator uses next-fit algorithm to try to write contiguous runs 34
  • 35. Kernel Virtual Memory The Linux kernel reserves a constant, architecture- dependent region of the virtual address space of every process for its own internal use This kernel virtual-memory area contains two regions: A static area that contains page table references to every available physical page of memory in the system, so that there is a simple translation from physical to virtual addresses when running kernel code The reminder of the reserved section is not reserved for any specific purpose; its page-table entries can be modified to point to any other areas of memory 35
  • 36. Executing and Loading User Programs  Linux maintains a table of functions for loading programs; it gives each function the opportunity to try loading the given file when an exec system call is made  The registration of multiple loader routines allows Linux to support both the ELF and a.out binary formats  Initially, binary-file pages are mapped into virtual memory  Only when a program tries to access a given page will a page fault result in that page being loaded into physical memory  An ELF-format binary file consists of a header followed by several page-aligned sections  The ELF loader works by reading the header and mapping the sections of the file into separate regions of virtual memory Memory Layout for ELF Programs 36
  • 37. Static and Dynamic Linking  A program whose necessary library functions are embedded directly in the program’s executable binary file is statically linked to its libraries  The main disadvantage of static linkage is that every program generated must contain copies of exactly the same common system library functions  Dynamic linking is more efficient in terms of both physical memory and disk- space usage because it loads the system libraries into memory only once  Linux implements dynamic linking in user mode through special linker library  Every dynamically linked program contains small statically linked function called when process starts  Maps the link library into memory  Link library determines dynamic libraries required by process and names of variables and functions needed  Maps libraries into middle of virtual memory and resolves references to symbols contained in the libraries  Shared libraries compiled to be position-independent code (PIC) so can be loaded anywhere 37
  • 38. File Systems  To the user, Linux’s file system appears as a hierarchical directory tree obeying UNIX semantics  Internally, the kernel hides implementation details and manages the multiple different file systems via an abstraction layer, that is, the virtual file system (VFS)  The Linux VFS is designed around object-oriented principles and is composed of four components:  A set of definitions that define what a file object is allowed to look like The inode object structure represent an individual file The file object represents an open file The superblock object represents an entire file system A dentry object represents an individual directory entry  To the user, Linux’s file system appears as a hierarchical directory tree obeying UNIX semantics  Internally, the kernel hides implementation details and manages the multiple different file systems via an abstraction layer, that is, the virtual file system (VFS)  The Linux VFS is designed around object-oriented principles and layer of software to manipulate those objects with a set of operations on the objects  For example for the file object operations include (from struct file_operations in /usr/include/linux/fs.h 1. int open(. . .) - Open a file 2. ssize t read(. . .) -Read from a file 3. ssize t write(. . .) — Write to a file 4. int mmap(. . .) — Memory-map a file 38
  • 39. The Linux ext3 File System  ext3 is standard on disk file system for Linux Uses a mechanism similar to that of BSD Fast File System (FFS) for locating data blocks belonging to a specific file Supersedes older extfs, ext2 file systems Work underway on ext4 adding features like extents Of course, many other file system choices with Linux distros Ext2fs Block-Allocation Policies 39
  • 40. The Linux ext3 File System  The main differences between ext2fs and FFS concern their disk allocation policies In ffs, the disk is allocated to files in blocks of 8Kb, with blocks being subdivided into fragments of 1Kb to store small files or partially filled blocks at the end of a file ext3 does not use fragments; it performs its allocations in smaller units The default block size on ext3 varies as a function of total size of file system with support for 1, 2, 4 and 8 KB blocks ext3 uses cluster allocation policies designed to place logically adjacent blocks of a file into physically adjacent blocks on disk, so that it can submit an I/O request for several disk blocks as a single operation on a block group Maintains bit map of free blocks in a block group, searches for free byte to allocate at least 8 blocks at a time 40
  • 41. Journaling  ext3 implements journaling, with file system updates first written to a log file in the form of transactions Once in log file, considered committed Over time, log file transactions replayed over file system to put changes in place  On system crash, some transactions might be in journal but not yet placed into file system Must be completed once system recovers No other consistency checking is needed after a crash (much faster than older methods)  Improves write performance on hard disks by turning random I/O into sequential I/O 41
  • 42. The Linux Proc File System The proc file system does not store data, rather, its contents are computed on demand according to user file I/O requests proc must implement a directory structure, and the file contents within; it must then define a unique and persistent inode number for each directory and files it contains It uses this inode number to identify just what operation is required when a user tries to read from a particular file inode or perform a lookup in a particular directory inode When data is read from one of these files, proc collects the appropriate information, formats it into text form and places it into the requesting process’s read buffer 42
  • 43. Input and Output  The Linux device-oriented file system accesses disk storage through two caches: Data is cached in the page cache, which is unified with the virtual memory system Metadata is cached in the buffer cache, a separate cache indexed by the physical disk block  Linux splits all devices into three classes: block devices allow random access to completely independent, fixed size blocks of data character devices include most other devices; they don’t need to support the functionality of regular files network devices are interfaced via the kernel’s networking subsystem 43
  • 44. Block Devices  Provide the main interface to all disk devices in a system  The block buffer cache serves two main purposes: it acts as a pool of buffers for active I/O it serves as a cache for completed I/O  The request manager manages the reading and writing of buffer contents to and from a block device driver  Kernel 2.6 introduced Completely Fair Queueing (CFQ) Now the default scheduler Fundamentally different from elevator algorithms Maintains set of lists, one for each process by default Uses C-SCAN algorithm, with round robin between all outstanding I/O from all processes Four blocks from each process put on at once 44
  • 45. Device-Driver Block Structure  A device driver which does not offer random access to fixed blocks of data  A character device driver must register a set of functions which implement the driver’s various file I/O operations  The kernel performs almost no preprocessing of a file read or write request to a character device, but simply passes on the request to the device  The main exception to this rule is the special subset of character device drivers which implement terminal devices, for which the kernel maintains a standard interface 45
  • 46. Character Devices  Line discipline is an interpreter for the information from the terminal device The most common line discipline is tty discipline, which glues the terminal’s data stream onto standard input and output streams of user’s running processes, allowing processes to communicate directly with the user’s terminal Several processes may be running simultaneously, tty line discipline responsible for attaching and detaching terminal’s input and output from various processes connected to it as processes are suspended or awakened by user Other line disciplines also are implemented have nothing to do with I/O to user process – i.e. PPP and SLIP networking protocols 46
  • 47. Interprocess Communication  Like UNIX, Linux informs processes that an event has occurred via signals  There is a limited number of signals, and they cannot carry information: Only the fact that a signal occurred is available to a process  The Linux kernel does not use signals to communicate with processes with are running in kernel mode, rather, communication within the kernel is accomplished via scheduling states and wait_queue structures  Also implements System V Unix semaphores Process can wait for a signal or a semaphore Semaphores scale better Operations on multiple semaphores can be atomic 47
  • 48. Passing Data Between Processes  The pipe mechanism allows a child process to inherit a communication channel to its parent, data written to one end of the pipe can be read a the other  Shared memory offers an extremely fast way of communicating; any data written by one process to a shared memory region can be read immediately by any other process that has mapped that region into its address space  To obtain synchronization, however, shared memory must be used in conjunction with another Interprocess-communication mechanism 48
  • 49.  Networking is a key area of functionality for Linux  It supports the standard Internet protocols for UNIX to UNIX communications  It also implements protocols native to non-UNIX operating systems, in particular, protocols used on PC networks, such as Appletalk and IPX  Internally, networking in the Linux kernel is implemented by three layers of software:  The socket interface  Protocol drivers  Network device drivers  Most important set of protocols in the Linux networking system is the internet protocol suite  It implements routing between different hosts anywhere on the network  On top of the routing protocol are built the UDP, TCP and ICMP protocols  Packets also pass to firewall management for filtering based on firewall chains of rules Network Structure 49
  • 50. Security  The pluggable authentication modules (PAM) system is available under Linux  PAM is based on a shared library that can be used by any system component that needs to authenticate users  Access control under UNIX systems, including Linux, is performed through the use of unique numeric identifiers (uid and gid)  Access control is performed by assigning objects a protections mask, which specifies which access modes—read, write, or execute—are to be granted to processes with owner, group, or world access  Linux augments the standard UNIX setuid mechanism in two ways:  It implements the POSIX specification’s saved user-id mechanism, which allows a process to repeatedly drop and reacquire its effective uid  It has added a process characteristic that grants just a subset of the rights of the effective uid  Linux provides another mechanism that allows a client to selectively pass access to a single file to some server process without granting it any other privileges 50
  • 51. Mobile Handsets:A Panoramic Overview Introduction Handset Architecture Handset Operating Systems Networking Applications Security Risks and Mitigation Strategies 51
  • 52. What Is A Mobile Handset? A mobile handset (handset) is an electronic device that provides services to users, e.g.: Managing address book Scheduling calendar Cellular telephony Accessing Internet, email Handsets include smartphones and PDAs Example handsets: Apple iPhone, BlackBerry Storm, Palm TreoPro 52
  • 53. Handsets: Your Next Computer? Handsets’ small form factor, mobility have yielded meteoric sales [1] 3.3 billion mobile phone subscriptions as of Jan. 2008 (how about 2013 or 2014?) 2.7 billion subscriptions correspond to one person; some people have multiple phones! Rapid replacement rate: young adults replace phones every 6 months in South Korea These statistics are just for phones Your handset: your next computer? 53
  • 54. Handset Architecture  Handsets use several hardware components: Microprocessor ROM Digital signal processor RAM Microphone and speaker Radio module Hardware interfaces LCD display  Handsets store system data in electronically-erasable programmable read-only memory (EEPROM) Service providers can reprogram phones without requiring physical access to memory chips  OS is stored in ROM (nonvolatile memory)  Most handsets also include subscriber identity module (SIM) cards 54
  • 55. Handset Microprocessors  Handsets use embedded processors  Intel, ARM architectures dominate market. Examples include: BlackBerry 8700, uses Intel PXA901 chip iPhone, uses Samsung ARM 1100 chip  Low power use and code size are crucial  Microprocessor vendors often package all the chip’s functionality in a single chip (package-on-package) for maximum flexibility  Example: The iPhone’s CPU  The iPhone: a real-world mobile handset  Runs on Samsung S3C6400 chip, supports ARMv6 architecture Very few details are known about the “ARM Core”, esp. given Apple’s secrecy Highly modular architecture Similar to Apple’s iPod Touch, which lacks telephony capability 55
  • 56. SIM Cards  They include their own microprocessor and 16 KB – 4 MB EEPROM  They come in two sizes  Their versatility arises from portability of information SIM card identifies subscriber to network Stores personal information, address books, messages, service- related information Other Memory Cards  Some handsets include other peripheral memory cards: Compact Flash Multimedia Card Secure Digital  Handsets synchronize with a computer  Nowadays, computers include slots of various sizes to hold these memory cards
  • 57. Handset Operating Systems  Currently, handsets run several OSes: Symbian OS Windows Mobile iPhone OS (an embedded version of OS X) BlackBerry OS Google Android Platform (based on Linux)  With the exceptions of Symbian and Android, these OS’s are proprietary  Telecom carriers frequently “lock down” handset firmware, OSes to prevent user modifications Handset OS Usage  According to British analysis firm Canalys, handset OS usage in 3Q 2008 had the following ranking (most to least)  Symbian OS iPhone OS BlackBerry OS  Windows Mobile Linux (Android, etc.) Others  iPhone OS surged ahead of BlackBerry OS, but with new BlackBerries and Android phones, this ranking may easily change in the future 57
  • 58. Symbian OS  Dominant OS in the mobile handset market  Runs exclusively on ARM processors  Owned by British firm Symbian Ltd.  Descendant of Psion EPOC OS (dev. in 1990s)  Sony Ericsson, Nokia, et al. bought shares in the firm until Nokia bought Symbian in 2008, formed Symbian Foundation to further future open handset development  Nokia plans to open-source the OS by 2009 Design of Symbian OS  Based on Psion EPOC; desktop OS features include: “Bare-bones” microkernel (nanokernel) Pre-emptive multitasking Memory protection  Handset-centric design, can operate several months without reboot  Supports multiple UIs based on smartphone form factor e.g.320 × 24058
  • 59. Symbian OS Devices  Numerous handsets use Symbian OS; UIs largely based on manufacturer & device  Nokia S60: includes J2ME, std. UI (mostly Nokia phones)  Nokia S80: QWERTY keyboard, Web browser, enterprise office-doc. support  Nokia S90: used only on Nokia 7710  UIQ: Sony Ericsson/Motorola GUI platform used primarily on those companies’ handsets  FOMA platform: closed-dev. software platform used by handsets on NTT DoCoMo’s network (Japan) Symbian OS Development  Native language is C++  Nokia provides free Eclipse-based Carbide.c++ development tools, Carbide.vs Visual Studio plugin  Mac & Linux development is possible  Can program in many other languages: C, Java, Ruby, Python, Perl, OPL, Visual Basic, Simkin  Applications needing any capabilities beyond bare minimum must be cryptographically signed (see http://www.symbiansigned.com)  Can also program in Adobe Flash Lite (mobile version of Flash) 59
  • 60. Symbian OS v9 Architecture 60
  • 61. iPhone OS  Runs on both the iPhone and iPod Touch  Variation of Mach microkernel-based OS X that fits in 512 MB flash memory, runs on ARM architecture  Four abstraction layers: Core OS, Core Services, Media, Cocoa Touch  Core Animation and PowerVR MBX 3D hardware provide interface animations  320 × 480 LCD display that supports multi-touch gestures iPhone Developer Program  iPhone Developer Program provides dev. tools, iPhone emulator, means to upload to App Store (SDK)  To download SDK, you must apply to be a member, pay fees  Standard Developer: $99  Enterprise Developer: $299  Exception: Apple’s free iPhone Developer University Program for higher-ed. institutions  SDK only runs on Mac OS X Leopard on Intel-based Macs 61
  • 62. iPhone Web App Development  You can develop Web apps for iPhone – so long as they run on Safari  Safari features: Auto-resizes Web pages to fit browser size Multi-touch functionality XHTML 1.1, CSS 2.1, JavaScript, W3C DOM Level 2, AJAX technology, cookies, …  Does not support Flash or Java  iPhone Web apps should: Minimize user awareness of browser experience Reproduce control style, layout, behavior of iPhone apps Integrate with built-in iPhone features & services 62
  • 63. BlackBerry OS  BlackBerry OS is Research in Motion’s (RIM’s) proprietary OS for its BlackBerry handsets  Provides multitasking, heavily uses BlackBerry input devices, e.g., thumbwheel  Current OS 4 provides a subset of Java’s Mobile Information Device Profile (MIDP) 2.0  Developers can use these APIs, proprietary APIs to write software  All applications must be digitally signed so to “link” an app with the developer BlackBerry Wireless Platform  RIM provides standards-based platform and developer tools to develop and deploy custom wireless applications HTML Web browser Java Mobile Edition development tools .NET applications  BlackBerry handsets support standard networking protocols and connect to any type of server application 63
  • 64. BlackBerry Software  Email from BlackBerry service, MS Exchange, Domino, Yahoo, etc. can be “pushed” to the handset  Can view PDF, MS Word, Excel, PowerPoint attachments  BlackBerry Browser (only supports JavaScript)  Other online apps include: BlackBerry Maps, Facebook services & Yahoo Messenger, Google Talk  Calendar, Address Book, and PIM Sync via USB  GPS BlackBerry Internet Services BlackBerry Internet Service leverages centrally-hosted wireless gateways, allowing users to access up to 10 supported email accounts, browse Internet 64
  • 65. BlackBerry Mobile Data System  BlackBerry Mobile Data System (MDS) supports MS Exchange, Lotus Domino, Novell GroupWire, and RIM’s own MDS systems for messaging applications Mobile Voice System  With this service, there’s only one business number BlackBerry users must remember  Calls are routed to a BlackBerry handset, regardless of whether the call is directed to an office or mobile phone  Provides security and authentication through BlackBerry Enterprise Servers  IT administrators can lock down handsets, route calls through their telecom infrastructure, etc. 65
  • 66. BlackBerry Developer Tools  RIM provides several development tools: BlackBerry MDS Studio Developers can quickly create rich client apps using component-based drag-and-drop approach Tool requires MDS runtime BlackBerry plugin for MS Visual Studio (development on MDS platform) BlackBerry Java Development Environment (JDE) Provides IDE, simulation tools for Java ME app for Java-based BlackBerry so developers can create standalone or client- server apps 66
  • 67. Windows Mobile Windows Mobile is powered by Microsoft’s Windows CE embedded OS; Windows CE runs on x86, MIPS, ARM, Hitachi SuperH processors Latest version, 6.1, includes Windows Live services, Exchange 2007 mail access Designed to closely mimic desktop Windows: Windows Mobile 6.1 includes mobile versions of Office applications, Outlook (w/HTML email), Internet Explorer, Windows Media Player SQL Server 2005 included in ROM .NET Compact Framework 2.0 included 67
  • 68. Windows Mobile Development  Compiled to MS Intermediate Language (MSIL) that all the languages share  At execution time, MSIL is compiled “just in time” to native object code  Contrast with Java:  Java code is compiled to Java bytecode  Java interpreter interprets bytecode, dynamically compiles frequently-accessed bytecode into native object code (HotSpot)  Windows Mobile development tools include:  Plugins for MS Visual Studio 2005,2008, etc.  SDKs for Windows Mobile-based handsets  Microsoft gives away Visual Studio to students for free with its DreamSpark program .NET Framework in Context. Source Native code is developed with MS Visual C++ Microsoft strongly recommends development with managed code Managed code is written in one of the .NET framework object-oriented lang. 68
  • 69. What is Android? Operating System optimized for Mobile Devices Open Source Maintained by Google Based on the Linux kernel History Android Inc. founded 2003  Purchased by Google from initial dveloper in 2005  Version 2.0 released 2009  Starts to take hold in the Smartphone Market Version 3.0 released 2011  Predominantly used in Tablets 69
  • 70. Android Mobile Handset Platform  Android is a software development platform for mobile handsets that is based on Linux  Developed by Google and Open Handset Alliance (OHA) for different handset manufacturers The Alliance includes T-Mobile, Sprint Nextel, Google, Intel, Samsung, Wind River Systems, et al. Its purpose is to build a fully free and open mobile handset platform to facilitate development of handsets, software, services  First Android-based handset is T-Mobile G1 70
  • 71. Relevant Devices Phones: HTC Thunderbolt Motorola Droid/2/X HTC Evo Samsung Nexus S +Many More Tablets: Motorola Xoom Samsung Galaxy Tab 4G Dell Streak Asus Eee-Pad Transformer +More 71
  • 72. Android Architecture  Android SDK provides required tools and APIs to develop apps on Android platform using Java Android is licensed under the Apache open-source license The Android Development Tools (ADT) Eclipse plugin eases development Download the Android SDK at http://code.google.com/androi d/ the Eclipse plugin at https://dl- ssl.google.com/android/eclipse 72
  • 73. Android Features and Software  Features 3D: OpenGL ES 1.0 SQLite: Database engine WebKit: Web browser Dalvik: Register-based VM similar to Java VM FreeType: Bitmap and vector font rendering Connectivity: Bluetooth, 802.11, GPS  Core Applications  Email client, SMS program, calendar, Google Maps (and Apps), browser, etc.  Written in Java  App Framework  Full access to same framework APIs  Architecture designed for component reuse  Runtime  Core C++ library  Multiple Dalvik VMs run in a process, rely on Linux kernel for process isolation 73
  • 74. A Quick Summary on Handset OSes iOS Android Windows Phone BlackBerry OS Symbian OS Company Apple Open Handset Alliance, Google Microsoft Research in Motion Accenture on behalf of Nokia Open Source? No Yes No No Yes OS Family Darwin Linux Windows NT QNX Psion’s EPOC Supported CPU Architecture ARM, ARM64 ARM, x86, MIPS, 64-bit variants of each ARM ARM ARM, x86 Programming Language C, C++, Objective-C, Swift C, C++, Java C# (.NET), VB.NET, C, C++, DirectX C, C++, HTML5, JavaScript, Java ME C, C++, Java ME, Python Development Cost $0 (univ.), $99/yr. (person), $299/yr. (corp.) $0 $0 $0 $0 App Store Publishing cost Included in dev. cost $25 one-time $0 (1 yr., student) $19/yr. (person), $99/yr. (corp.) $0 $0 74
  • 75. Hardware& I/O:Device Requirements Chipset: ARM-based (32-bit Advanced reduced instruction set computer architecture machine). Dalvik VM graphics processing, currently assume an ARM architecture. Memory: 128 MB RAM; 256 MB Flash External. Android can boot and run in configurations with less memory, but it isn't recommended. Storage: Mini or Micro SD. Not necessary for basic bring up, but recommended. Primary Display: QVGA (320×240) TFT LCD or larger, 16-bit color or better. Touch screen interface no smaller than 2.8 inches in size. Navigation Keys: 5-way navigation with 5 application keys, power, camera and volume controls. Camera: Must have a resolution of at least 2 megapixels, but not required. USB: Standard mini-B USB . For flashing the device system images and debugging. Bluetooth: 1.2 or 2.0, but not required. 75
  • 76. Android Kernel  Derived from the Linux 2.6 kernel, with added enhancements not found in Linux  Kernel mode and user mode are used the same as in the Linux kernel Ashmem Anonymous Shared Memory Ashmem uses virtual memory The kernel is allowed to free this shared memory More viable for low memory devices, because it can discard shared memory units Pmem Process memory allocator Similar to ashmem, but uses physically contiguous memory as opposed to virtual memory Manages large, contiguous regions of memory shared between user space and the kernel drivers 76
  • 77. Binder A tool for inter-process communication Binder driver manages synchronization between processes Facilitated using different states  Receive blocked Ready  Send blocked Reply blocked Logger System logging, separate from the Linux kernel’s own logging system Stores logs from applications, events, and the system Write path is optimized to avoid overhead from open(), write(), and close() Android Power Management Wake locks are used to hold the machine awake until a wake lock is released Wake locks issued in user space, handled by kernel Power management can shut CPU down if there are no active wake locks 77
  • 78. Multithreading and Multitasking Expensive operations are done in a background service Slow work is done in a background thread Ensure the UI is responsive to the user Processes are not killed when the user closes an application, instead they remain in the background Removal From Linux Kernel Android code removed from Linux kernel as of December, 2009 Kernel development has been removed from the Linux kernel tree Android kernel includes features that would need to be integrated into Linux kernel to merge it into main kernel tree 78
  • 79. Software Architecture System Libraries libc for C and C++  Why not glibc? libpthread  not 100% POSIX compliant Isn't Android programmed in Java? SDK vs NDK More Libraries SSL SQLite WebKit (and LibWebCore for embeddable webpages)  Audio Manager Media Framework - MediaPlayer 79
  • 80. Graphics Libraries Scalable Graphics Library (SGL- for 2D) OpenGL for Embedded Devices (for 3D)  FreeType (vector and bitmap fonts)  Surface Manager  Composes 2D and 3D windows, widgets, apps, toolbars and more using Surface Flinger  Uses Binder IPC to get buffers from apps to put into frames Hardware Abstraction Libraries GPS, Radio, Camera, Bluetooth, other I/O Hardware drivers must implement in order for applicationss to use them Applications interact with the abstraction libraries, not the driver Promotes variety in hardware without breaking applications Gives OS tighter control over devices 80
  • 81. Android vs Linux Software Architecture No native window library Does not support full set of GNU libraries Difficult to port Linux applications to Android, but possible if working within libc constraints Reboot Bug (2008) Android allowed a remote device to be controlled over serial port If device not attached, phone would execute ALL text input as shell commands Typing “reboot” in an email/browser/anywhere would result in phone rebooting Architecture and Components at fault! Promptly fixed, but jeopardized Android’s reputation. 81
  • 82. Programming on Android Application Development Most Android applications written in Java However, no Java Virtual Machine in the platform Java classes compiled into Dalvik virtual machine Dalvik - a specialized virtual machine designed specifically for Android Android Software Development Kit(SDK) The SDK includes a comprehensive set of development tools. Includes a debugger, libraries, documentation, sample code These tools are accessed through an Eclipse plugin called ADT (Android Development Tools) or from command line Developing with Eclipse is preferred (but not required) 82
  • 83. Steps for Developing Applications 1. Install Eclipse or own IDE 2. Install ADT plugin, or an editor of your choice 3. Set up Android Virtual Devices or hardware devices on which you will install your applications 4. Create an Android project o Contains all source code and resource files for your application. Built into an .apk package that you can install on Android devices. 5. Build and run your application 6. Debug your application with the SDK debugging tools o Involves using a JDWP-compliant debugger along with the tools provided with Android SDK. 7.Test your application with the Testing and Instrumentation framework o The Android SDK provides a testing and instrumentation framework to help set up and run tests 83
  • 84. Support for Additional Languages In 2009, Google announced the Android Native Development Kit (NDK)  Allows developers to build Android software components with C and C++  Comes with limitations, however  Intended to be used alongside Java to code individual parts of programs, not as a full alternative Google also launched the Android Scripting Environment (ASE) - allows developers to build apps with Python and Lua New Language July, 2009, Google released language called Simple, designed specifically for Android apps Simple - based on BASIC Easy to learn and use language Gives both amateur and professional programmers a quick and easy way to write Android apps 84
  • 85. Application Components: Android  Four types: Activities - Services - Content Providers - Broadcast Receivers  Part of the building blocks of applications  Each component type performs its own unique action Component - Activity  Activities can be thought of as a single view that provides a user interface  Each activity is it's own entity but all activities work together to form the application. 85
  • 86. Component - Services Services are tasks that run in the background  Run on the main process thread unless otherwise specified Examples include playing music while using other applications, handling network transactions, etc Content Providers allow for cross application communication Applications must have necessary permission levels to communicate For example allows applications to select an image from the phones library, select a contacts info from the contacts list, etc Content Provider 86
  • 87. Component - Broadcast Receiver  Broadcast are system wide notifications  Broadcast Receivers allow applications to receive those notifications and act accordingly For example releasing allocation memory on a low memory warning. 87
  • 88. Growth: Android predicted to grow in market share 38.6% tablet OSes by 2015 48.8% phone OSes by 2015 Reasons for Growth  Open Source  Many handset / tablet makers utilize this free OS (HTC, Motorola, Samsung) Saturates the market with Android hardware on multiple carriers  Free to develop on -- no overhead charge for developing apps (iOS)  Strong fan base  Alternative to iOS-based devices  It's Google  With Great Growth Comes Great Responsibility Fragmentation  Different screen sizes, hardware features, user interfaces and carrier-decided OS updates cause inconsistent Android experience  After selling a device, manufacturer has little incentive to offer updates Security  More users = more attractive to malware writers  "Open" market means it's customer's responsibility to stay away from malicious software  Smartphone use in business world poses risk Android's Future 88
  • 90. Merger With Chrome OS Eric Schmidt (ex-CEO):  The two efforts [Android and Chrome OS] will ultimately converge.  "We're working overtime to get these technologies merged in the right way.“ What does this mean for Android? Merger With Chrome OS Chrome OS heavily utilizes the cloud.  A small hard drive is only needed for the OS itself. The merger may bring more cloud services to Android, possibly eliminating the need for internal storage.  Pictures, songs, videos, etc. may not need to be stored on the devices themselves -- instead pulled from the cloud when requested. 90