SlideShare a Scribd company logo
1 of 21
INFERNO Operating systemINFERNO Operating system
Presented
by
Sadhana Singh
Shri Ram Murti Smarak College of Engg. & Tech.,
Bareilly
Inferno Operating SystemsInferno Operating Systems
Developed in Lucent technologies by
Dennis Ritchie.
Replaces a plethora of protocols in a
network by a simple unifying file
service protocol (styx).
Applications compute their own
name spaces and consider all
resources as file systems.
Used in Embedded applns and small
networked devices. Eg :CATv, PDA
etc. 2Inferno OS
Interesting features of InfernoInteresting features of Inferno
Styx open communication protocol.
Concurrent Modular language
LIMBO.
Virtual machine and byte code
interp-reter with JIT compilers.
Portability and virtualization
techniques.
Automatic garbage collection.
3Inferno OS
Inferno-StrengthsInferno-Strengths
Portability across processors
Runs on Intel,SPARC, AMD, MIPS etc
Portability across environments
Can run as a standalone as well as a
user appln in Windows NT/95, Unix,
Linux, HP/UX, AIX* etc.
Distributed Design
Identical environment at client and
server.
4Inferno OS
Inferno- Strengths(cont)Inferno- Strengths(cont)
Minimal hardware requirements
Can run useful applns as a stand alone
with as little as 1 MB of memory.
Portable Applns
Inferno applns are written in type-safe
LIMBO whose binary representation is
identical for all platforms.
Dynamic adaptability
Depending on the H/W or resource
availability,applns may use diff modules
to perform a specific function. 5Inferno OS
Inferno InterfacesInferno Interfaces
The role of Inferno system is to create se-
veral standard interfaces for its applns.
 Applns use various resources which
include a virtual machine that runs
applns programs together with library
modules like string manip etc.
 Applns exist in an external env
containing resources such as data
files and objects. Devices present
themselves to the appln as files.
6Inferno OS
External env of Inferno applnsExternal env of Inferno applns
 The purpose of most Inferno applns
is to present informn/media to user.
 To the applns the user’s devices shows up
as resources for it.
 The way the resources are designed to
show up to the applns are
1.Resources - Named & accessed like files.
2.Disjoint resource hierarchies
provided by different services show
up in a single hierarchical name space.
3.Regardless of whether resources are
local/global, a communication protocol
called styx is used.
7Inferno OS
External env of Inferno applnsExternal env of Inferno applns
The glue that connects diff parts of
the resource name space together is
the styx protocol.
Inferno kernel implements a mount
driver which transforms file
operations to RPC’s for transport
over the network.
On the other side of the conxn, a
server unwraps the styx messages
and implements them using
resources local to it. 8Inferno OS
Internal env of Inferno applnsInternal env of Inferno applns
Inferno applns written in LIMBO
which supports most of the standard
data types and also addnl ones like
tuples, lists, strings etc.
A communication mechanism called
channel is present which is used to
connect diff LIMBO tasks.
Multi tasking supported by the
LIMBO language.
9Inferno OS
Internal env of Inferno applnsInternal env of Inferno applns
LIMBO programs are built of
modules, which are self contained
units having a well defined interface
containing functions,abstract data
types and constants.
Modules are accessed dynamically
by executing a load statement
naming the desired module. Then a
handle for the module is returned
and the module is accessed.
10Inferno OS
Internal env of Inferno applnsInternal env of Inferno applns
Limbo is fully type checked at
compile and run time.
No memory protection H/W is there.
All LIMBO data and program objects
are subject to a garbage collector
built deeply into LIMBO run time
system.
All System data objects are kept
track of and freed as soon as they
become idle.
11Inferno OS
Internal env of Inferno applnsInternal env of Inferno applns
Limbo programs are complied into
byte codes representing instructions
for a virtual machine called DIS.
The resulting code executes at a
speed approaching that of complied
C.
Underlying DIS is the inferno kernel
which contains the interpretor and
an on the fly complier.
12Inferno OS
Environment of the Inferno systemEnvironment of the Inferno system
Inferno creates a standard environment for
applns. Identical applns programs can run
under any instance of this environment-
even in distributed fashion and see the
same resources.
Several versions of Inferno kernel,
DIS/LIMBO interpreter and device driver
set can be used depending on the
environment within which inferno is
implemented.
13Inferno OS
Environment of the Inferno systemEnvironment of the Inferno system
When running as the native operating
system kernel includes all the low level
glue like interrupt handlers, device drivers
etc.
But when running in a hosted system like
Windows NT, Inferno runs as an ordinary
process.
Here instead of mapping its device control
functionality to real hardware, it adapts to
the resources provided by the operating
system under which it runs.
14Inferno OS
Security in InfernoSecurity in Inferno
Inferno provides security of communication, resource
control, and system integrity. Each external
communication channel may be transmitted in the
clear, accompanied by message digests to prevent
corruption, or encrypted to prevent corruption and
interception. Once communication is set up, the
encryption is transparent to the application. Key
exchange is provided through standard public-key
mechanisms; after key exchange, message digesting
and line encryption likewise use standard symmetric
mechanisms. Inferno is secure against erroneous or
malicious applications, and encourages safe
collaboration between mutually suspicious service
providers and clients.
15Inferno OS
Security mechanismsSecurity mechanisms
Authentication and digital signatures are
performed using public key cryptography.
Public keys are certified by Inferno-
basedor other certifying authorities that
sign the public keys with their own private
key.
Inferno uses encryption for:
 mutual authentication of communicating
parties;
 authentication of messages between these
parties; and
 encryption of messages between these
parties.
16Inferno OS
Line SecurityLine Security
A network conversation can be
secured against modification alone
or against both modification and
snooping. To secure against
modification, Inferno can append a
secure MD5 or SHA hash (called a
digest),
hash(secret, message, messageid)
to each message.
17Inferno OS
Random NumbersRandom Numbers
The strength of cryptographic algorithms
depends in part on strength of the random
numbers used for choosing keys, Diffie-
Hellmanparameters, initialization vectors, etc.
Inferno achieves this in two steps: a slow (100 to
200 bit per second) random bit stream comes
from sampling the low order bits of a free running
counter whenever a clock ticks. The clock must
be unsynchronized, or at least poorly
synchronized, with the counter. This generator is
then used to alter the state of a faster pseudo-
randomnumber generator. Both the slow and fast
generators were tested on a number of
architectures using self correlation, random walk,
and repeatability tests. 18Inferno OS
SummarySummary
 It supplies a rich environment for 
constructing distributed applications 
that are portable_in fact identical_even 
when running on widely divergent 
underlying hardware. Its unique 
advantage over other solutions is that it 
encompasses not only a virtual 
machine, but also a complete virtual 
operating system including network 
facilities.
 
19Inferno OS
ReferencesReferences
 1.http://www.vitannuova.com/inferno/papers/styx.ht
ml
2.Lucent Technologies Inc./Bell Labs Technical 
Journal
3.http://techupdate.cnet.com/enterprise/0-6133429-
723-3897916.html
4. R. Pike, D. Presotto, S. Dorward, B. Flandrena, K. 
Thompson, H. Trickey, and P. Winterbottom. 
‘‘Plan 9 from Bell Labs’’, J. Computing Systems
8:3, Summer 1995, pp. 221-254.
5. S. Dorward, R. Pike, and P. Winterbottom. 
‘‘Programming in Limbo’’, IEEE Compcon 97
Proceedings, 1997.
6. J. K. Ousterhout. Tcl and the Tk Toolkit, Addison-
Wesley, 1994.
20Inferno OS
Thank YouThank You
21Inferno OS

More Related Content

What's hot

CPU Architectures for Mobile Phone Devices
CPU Architectures for Mobile Phone DevicesCPU Architectures for Mobile Phone Devices
CPU Architectures for Mobile Phone Devicessagar chansaulia
 
AVR Atmega16 based Projects List - ATMega32 AVR _ Atmega16 based Projects.pdf
AVR Atmega16 based Projects List - ATMega32 AVR _ Atmega16 based Projects.pdfAVR Atmega16 based Projects List - ATMega32 AVR _ Atmega16 based Projects.pdf
AVR Atmega16 based Projects List - ATMega32 AVR _ Atmega16 based Projects.pdfIsmailkhan77481
 
Open source operating systems
Open source operating systemsOpen source operating systems
Open source operating systemsTushar B Kute
 
Arm assembly language programming
Arm assembly language programmingArm assembly language programming
Arm assembly language programmingv Kalairajan
 
Introduction to Linux Kernel
Introduction to Linux KernelIntroduction to Linux Kernel
Introduction to Linux KernelStryker King
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating systemabdullah roomi
 
OPERATING SYSTEM - SHORT NOTES
OPERATING SYSTEM - SHORT NOTESOPERATING SYSTEM - SHORT NOTES
OPERATING SYSTEM - SHORT NOTESsuthi
 
OPERATING SYSTEMS DESIGN AND IMPLEMENTATION
OPERATING SYSTEMSDESIGN AND IMPLEMENTATIONOPERATING SYSTEMSDESIGN AND IMPLEMENTATION
OPERATING SYSTEMS DESIGN AND IMPLEMENTATION sathish sak
 
Generations of computers
Generations of computersGenerations of computers
Generations of computersAajuSunariya
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System SecurityAdel Barkam
 
Architecture of operating system
Architecture of operating systemArchitecture of operating system
Architecture of operating systemSupriya Kumari
 
Device Drivers
Device DriversDevice Drivers
Device DriversSuhas S R
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating SystemTech_MX
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating Systemsubhsikha
 

What's hot (20)

CPU Architectures for Mobile Phone Devices
CPU Architectures for Mobile Phone DevicesCPU Architectures for Mobile Phone Devices
CPU Architectures for Mobile Phone Devices
 
History of OS
History of OSHistory of OS
History of OS
 
Keyboard & Mouse basics
Keyboard & Mouse basics Keyboard & Mouse basics
Keyboard & Mouse basics
 
AVR Atmega16 based Projects List - ATMega32 AVR _ Atmega16 based Projects.pdf
AVR Atmega16 based Projects List - ATMega32 AVR _ Atmega16 based Projects.pdfAVR Atmega16 based Projects List - ATMega32 AVR _ Atmega16 based Projects.pdf
AVR Atmega16 based Projects List - ATMega32 AVR _ Atmega16 based Projects.pdf
 
Open source operating systems
Open source operating systemsOpen source operating systems
Open source operating systems
 
Linux kernel architecture
Linux kernel architectureLinux kernel architecture
Linux kernel architecture
 
IoT Intro and Demo
IoT Intro and DemoIoT Intro and Demo
IoT Intro and Demo
 
Arm assembly language programming
Arm assembly language programmingArm assembly language programming
Arm assembly language programming
 
L4 Microkernel :: Design Overview
L4 Microkernel :: Design OverviewL4 Microkernel :: Design Overview
L4 Microkernel :: Design Overview
 
Introduction to Linux Kernel
Introduction to Linux KernelIntroduction to Linux Kernel
Introduction to Linux Kernel
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
OPERATING SYSTEM - SHORT NOTES
OPERATING SYSTEM - SHORT NOTESOPERATING SYSTEM - SHORT NOTES
OPERATING SYSTEM - SHORT NOTES
 
OPERATING SYSTEMS DESIGN AND IMPLEMENTATION
OPERATING SYSTEMSDESIGN AND IMPLEMENTATIONOPERATING SYSTEMSDESIGN AND IMPLEMENTATION
OPERATING SYSTEMS DESIGN AND IMPLEMENTATION
 
Generations of computers
Generations of computersGenerations of computers
Generations of computers
 
Semaphores
SemaphoresSemaphores
Semaphores
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
Architecture of operating system
Architecture of operating systemArchitecture of operating system
Architecture of operating system
 
Device Drivers
Device DriversDevice Drivers
Device Drivers
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating System
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 

Similar to Inferno operating system

Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming ReportShivek Khurana
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceMark John Lado, MIT
 
microprocesser-140306112352-phpapp01.pdf
microprocesser-140306112352-phpapp01.pdfmicroprocesser-140306112352-phpapp01.pdf
microprocesser-140306112352-phpapp01.pdfPriyankaRana171346
 
Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...andega
 
please answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdfplease answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdfarishaenterprises12
 
Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameJaime Sánchez
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrationshaile468688
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment pptRama .
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 
XMPP, HTTP and UPnP
XMPP, HTTP and UPnPXMPP, HTTP and UPnP
XMPP, HTTP and UPnPITVoyagers
 
Architecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docxArchitecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docxVivekGupta920049
 

Similar to Inferno operating system (20)

K2presentation
K2presentationK2presentation
K2presentation
 
Inferno O.S.
Inferno O.S.Inferno O.S.
Inferno O.S.
 
Inferno
InfernoInferno
Inferno
 
Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming Report
 
Inferno
InfernoInferno
Inferno
 
Assembly Language
Assembly LanguageAssembly Language
Assembly Language
 
Security Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial IntelligenceSecurity Privacy Operating System and Artificial Intelligence
Security Privacy Operating System and Artificial Intelligence
 
Ceh v5 module 18 linux hacking
Ceh v5 module 18 linux hackingCeh v5 module 18 linux hacking
Ceh v5 module 18 linux hacking
 
microprocesser-140306112352-phpapp01.pdf
microprocesser-140306112352-phpapp01.pdfmicroprocesser-140306112352-phpapp01.pdf
microprocesser-140306112352-phpapp01.pdf
 
Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...
 
please answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdfplease answer these questions number by numberSolution1) An.pdf
please answer these questions number by numberSolution1) An.pdf
 
Remote1
Remote1Remote1
Remote1
 
Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse game
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment ppt
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
XMPP, HTTP and UPnP
XMPP, HTTP and UPnPXMPP, HTTP and UPnP
XMPP, HTTP and UPnP
 
Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 
Architecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docxArchitecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docx
 

More from Sadhana28

Study of fluids
Study of fluidsStudy of fluids
Study of fluidsSadhana28
 
segmentation
segmentationsegmentation
segmentationSadhana28
 
JSP Processing
JSP ProcessingJSP Processing
JSP ProcessingSadhana28
 
Class and object_diagram
Class  and object_diagramClass  and object_diagram
Class and object_diagramSadhana28
 
Digital signature
Digital signatureDigital signature
Digital signatureSadhana28
 
Adjustment of inheritance
Adjustment of inheritanceAdjustment of inheritance
Adjustment of inheritanceSadhana28
 
Process monitoring and_audit_sadhana
Process monitoring and_audit_sadhanaProcess monitoring and_audit_sadhana
Process monitoring and_audit_sadhanaSadhana28
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhanaSadhana28
 
Quality attributes sadhana
Quality attributes sadhanaQuality attributes sadhana
Quality attributes sadhanaSadhana28
 

More from Sadhana28 (12)

Study of fluids
Study of fluidsStudy of fluids
Study of fluids
 
segmentation
segmentationsegmentation
segmentation
 
colorimage
colorimagecolorimage
colorimage
 
kerberos
kerberoskerberos
kerberos
 
JSP Processing
JSP ProcessingJSP Processing
JSP Processing
 
Class and object_diagram
Class  and object_diagramClass  and object_diagram
Class and object_diagram
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Adjustment of inheritance
Adjustment of inheritanceAdjustment of inheritance
Adjustment of inheritance
 
Process monitoring and_audit_sadhana
Process monitoring and_audit_sadhanaProcess monitoring and_audit_sadhana
Process monitoring and_audit_sadhana
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Dhtml
DhtmlDhtml
Dhtml
 
Quality attributes sadhana
Quality attributes sadhanaQuality attributes sadhana
Quality attributes sadhana
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Inferno operating system

  • 1. INFERNO Operating systemINFERNO Operating system Presented by Sadhana Singh Shri Ram Murti Smarak College of Engg. & Tech., Bareilly
  • 2. Inferno Operating SystemsInferno Operating Systems Developed in Lucent technologies by Dennis Ritchie. Replaces a plethora of protocols in a network by a simple unifying file service protocol (styx). Applications compute their own name spaces and consider all resources as file systems. Used in Embedded applns and small networked devices. Eg :CATv, PDA etc. 2Inferno OS
  • 3. Interesting features of InfernoInteresting features of Inferno Styx open communication protocol. Concurrent Modular language LIMBO. Virtual machine and byte code interp-reter with JIT compilers. Portability and virtualization techniques. Automatic garbage collection. 3Inferno OS
  • 4. Inferno-StrengthsInferno-Strengths Portability across processors Runs on Intel,SPARC, AMD, MIPS etc Portability across environments Can run as a standalone as well as a user appln in Windows NT/95, Unix, Linux, HP/UX, AIX* etc. Distributed Design Identical environment at client and server. 4Inferno OS
  • 5. Inferno- Strengths(cont)Inferno- Strengths(cont) Minimal hardware requirements Can run useful applns as a stand alone with as little as 1 MB of memory. Portable Applns Inferno applns are written in type-safe LIMBO whose binary representation is identical for all platforms. Dynamic adaptability Depending on the H/W or resource availability,applns may use diff modules to perform a specific function. 5Inferno OS
  • 6. Inferno InterfacesInferno Interfaces The role of Inferno system is to create se- veral standard interfaces for its applns.  Applns use various resources which include a virtual machine that runs applns programs together with library modules like string manip etc.  Applns exist in an external env containing resources such as data files and objects. Devices present themselves to the appln as files. 6Inferno OS
  • 7. External env of Inferno applnsExternal env of Inferno applns  The purpose of most Inferno applns is to present informn/media to user.  To the applns the user’s devices shows up as resources for it.  The way the resources are designed to show up to the applns are 1.Resources - Named & accessed like files. 2.Disjoint resource hierarchies provided by different services show up in a single hierarchical name space. 3.Regardless of whether resources are local/global, a communication protocol called styx is used. 7Inferno OS
  • 8. External env of Inferno applnsExternal env of Inferno applns The glue that connects diff parts of the resource name space together is the styx protocol. Inferno kernel implements a mount driver which transforms file operations to RPC’s for transport over the network. On the other side of the conxn, a server unwraps the styx messages and implements them using resources local to it. 8Inferno OS
  • 9. Internal env of Inferno applnsInternal env of Inferno applns Inferno applns written in LIMBO which supports most of the standard data types and also addnl ones like tuples, lists, strings etc. A communication mechanism called channel is present which is used to connect diff LIMBO tasks. Multi tasking supported by the LIMBO language. 9Inferno OS
  • 10. Internal env of Inferno applnsInternal env of Inferno applns LIMBO programs are built of modules, which are self contained units having a well defined interface containing functions,abstract data types and constants. Modules are accessed dynamically by executing a load statement naming the desired module. Then a handle for the module is returned and the module is accessed. 10Inferno OS
  • 11. Internal env of Inferno applnsInternal env of Inferno applns Limbo is fully type checked at compile and run time. No memory protection H/W is there. All LIMBO data and program objects are subject to a garbage collector built deeply into LIMBO run time system. All System data objects are kept track of and freed as soon as they become idle. 11Inferno OS
  • 12. Internal env of Inferno applnsInternal env of Inferno applns Limbo programs are complied into byte codes representing instructions for a virtual machine called DIS. The resulting code executes at a speed approaching that of complied C. Underlying DIS is the inferno kernel which contains the interpretor and an on the fly complier. 12Inferno OS
  • 13. Environment of the Inferno systemEnvironment of the Inferno system Inferno creates a standard environment for applns. Identical applns programs can run under any instance of this environment- even in distributed fashion and see the same resources. Several versions of Inferno kernel, DIS/LIMBO interpreter and device driver set can be used depending on the environment within which inferno is implemented. 13Inferno OS
  • 14. Environment of the Inferno systemEnvironment of the Inferno system When running as the native operating system kernel includes all the low level glue like interrupt handlers, device drivers etc. But when running in a hosted system like Windows NT, Inferno runs as an ordinary process. Here instead of mapping its device control functionality to real hardware, it adapts to the resources provided by the operating system under which it runs. 14Inferno OS
  • 15. Security in InfernoSecurity in Inferno Inferno provides security of communication, resource control, and system integrity. Each external communication channel may be transmitted in the clear, accompanied by message digests to prevent corruption, or encrypted to prevent corruption and interception. Once communication is set up, the encryption is transparent to the application. Key exchange is provided through standard public-key mechanisms; after key exchange, message digesting and line encryption likewise use standard symmetric mechanisms. Inferno is secure against erroneous or malicious applications, and encourages safe collaboration between mutually suspicious service providers and clients. 15Inferno OS
  • 16. Security mechanismsSecurity mechanisms Authentication and digital signatures are performed using public key cryptography. Public keys are certified by Inferno- basedor other certifying authorities that sign the public keys with their own private key. Inferno uses encryption for:  mutual authentication of communicating parties;  authentication of messages between these parties; and  encryption of messages between these parties. 16Inferno OS
  • 17. Line SecurityLine Security A network conversation can be secured against modification alone or against both modification and snooping. To secure against modification, Inferno can append a secure MD5 or SHA hash (called a digest), hash(secret, message, messageid) to each message. 17Inferno OS
  • 18. Random NumbersRandom Numbers The strength of cryptographic algorithms depends in part on strength of the random numbers used for choosing keys, Diffie- Hellmanparameters, initialization vectors, etc. Inferno achieves this in two steps: a slow (100 to 200 bit per second) random bit stream comes from sampling the low order bits of a free running counter whenever a clock ticks. The clock must be unsynchronized, or at least poorly synchronized, with the counter. This generator is then used to alter the state of a faster pseudo- randomnumber generator. Both the slow and fast generators were tested on a number of architectures using self correlation, random walk, and repeatability tests. 18Inferno OS