1 / 48

Introduction to Operating Systems

This course covers programs, platforms, performance, concurrency, storage, and more. Learn about operating system architecture and the components that make up a system. Explore resources, stay updated, and ask questions on the course website.

rburkett
Download Presentation

Introduction to Operating Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CPS 110 210 310 Introduction to Operating Systems Spring 2016 Jeff Chase Duke University

  2. What is this course about? • Programs • Platforms • Performance • … User Applications Operating System Substrate / Architecture “The system is all the code your program uses that you didn’t have to write.”

  3. What is this course about? • Programs • Platforms • Sharing • Concurrency • Storage • Protection and trust • Resource management • Virtualization • Scale and performance • Abstractions User Applications Operating System Substrate / Architecture

  4. Resources to know about • Course Web • http://www.cs.duke.edu/~chase/cps310 • Or other links through CS department • All powerpoints, policies, reading, schedule, lab (project) instructions are posted there. • Piazza • Announcements • Questions from you: anonymous postings OK • Sakai • Grades, quizzes

  5. Meetings • “Lectures”: • WF 1:25 – 2:40 • ~25 lectures total • “Recitations”: • M 3:05 (same room) • TA: Max Demoulin • (But I will do some) • Two midterms • Final exam (1.5x)

  6. Course goals • Learn to think about systems holistically. • Sound mastery of structures and principles. • Reinforce with practical, concrete examples. • Reduce “unknown unknowns”. 2003

  7. Managing Complexity System Systems are built from components. Operating systems define styles of software components and how they interact. OS maps components onto the underlying machine. …and makes it all work together. Component Component Component Component System Environment

  8. Software architecture Large, long-lived software systems are like buildings. They are built by workers using standard design patterns/grammar. They depend on some underlying infrastructure. But they can evolve and are not limited by the laws of physics.

  9. A simple module (or “component”) P1() P2() P3() P4() • A set of procedures/functions/methods. • An interface (API) that defines a template for how to call/invoke the procedures. • State is just data maintained and accessed by the procedures. • A module may be a class that defines a template (type) for a data structure. A class may have multiple instances (objects) constructed from the template. The class procedures (methods) operate on a specific object. state Abstract Data Type (ADT): the module’s state is manipulated only through its API (Application Programming Interface).

  10. OS Platform: A Model Applications/services. May interact and serve one another. API Libraries/frameworks: packaged code used by multiple applications API Protection boundary OS platform: same for all applications on a system E,g,, classical OS kernel OS mediates access to shared resources. That requires protection and isolation. [RAD Lab]

  11. Isolation and Sharing Android Security Architecture [http://developer.android.com/guide/topics/security/permissions.html] “A central design point of the Android security architecture is that no application, by default, has permission to perform any operations that would adversely impact other applications, the operating system, or the user. This includes reading or writing the user's private data (such as contacts or emails), reading or writing another application's files, performing network access, keeping the device awake, and so on. Because each Android application operates in a process sandbox, applications must explicitly share resources and data. They do this by declaring the permissions they need for additional capabilities not provided by the basic sandbox. Applications statically declare the permissions they require, and the Android system prompts the user for consent at the time the application is installed. Android has no mechanism for granting permissions dynamically (at run-time) because it complicates the user experience to the detriment of security.”

  12. Platform abstractions • Platforms provide “building blocks”… • …and APIs to use them to construct software. • Instantiate/create/allocate • Manipulate/configure • Attach/detach • Combine in uniform ways • Release/destroy • Abstractions are layered. • Expose the power through APIs • Hidethe details behind APIs The choice of abstractions reflects a philosophy of how to build and organize software systems.

  13. Course prerequisites • Basic data structures and programming • Lists, stacks, queues, graphs, DAGs, trees • Abstract data types (ADTs), classes, objects • Dynamic data structures • Basic architecture (CPS 250) • CPU context: registers, control • Execution: runtime stack and frames • Memory and L1/L2/L3 caches, DMA I/O • Virtual addressing and memory layout

  14. Code: instructions in memory _p1: pushq %rbp movq %rsp, %rbp movl $1, %eax movq %rdi, -8(%rbp) popq %rbp ret These are examples of sequences of machine instructions. Details of instruction set architecture (ISA) vary by machine. load _x, R2 ; load global variable x add R2, 1, R2 ; increment: x = x + 1 store R2, _x ; store global variable x

  15. Multicore

  16. [Image: ExtremeTech: Moore’s Law is dead, long live Moore’s Law]

  17. Multithreading http://www.cse.wustl.edu/~jain/cse567-11/ftp/multcore

  18. http://steve-yegge.blogspot.com/2008/03/get-that-job-at-google.htmlhttp://steve-yegge.blogspot.com/2008/03/get-that-job-at-google.html Steve Yegge

  19. Read it on the course web

  20. Read it on the course web

  21. Performance

  22. Cumulative Distribution Function Probability that a random student’s score is X or below A* B* C* Total score X Grading: 50% exams (2M+F) 50% projects/labs Normalize to 100

  23. Cumulative Distribution Function (CDF) “Tail” of 10% of requests with response time R > x2. 80% of the requests have response time R with x1 < R < x2. 90% quantile A few requests have very long response times. What’s the mean R? 50% (median) median value 10% quantile x1 x2 Understand how the mean (average) can be misleading, e.g. if tail is heavy.

  24. Reading • Course notes and slides • External sources on every topic • OS in Three Easy Pieces • A few academic papers and web readings • Yes, even a “comic book” • We’ll look at these with varying levels of scrutiny. • [Google Chrome Comics]

  25. No text, but these may be useful. $70 http://csapp.cs.cmu.edu a classic Saltzer/Kaashoek Very MIT Do not buy kindle edition. A good intro to web-scale systems: Web/SaaS/cloud http://saasbook.info

  26. Workload: projects • Dynamic heap memory (malloc/free) • Threads and concurrent programming • Black hat lab (“buggyserver”) • Distributed consensus (“Raft”)

  27. Collaboration • OK among groups: • General discussion of course concepts, programming environment, problems, pitfalls. • “What does this part of the handout mean?” • Not OK among groups • “Substantive” code sharing • “How do I do this part of the handout?” • Definitely not OK: • Using code from a previous semester. • (Or from any unattributed source) • Read the syllabus. If in doubt, ask me.

  28. Thoughts on cheating Cheating is a form of laziness. Cheating happens at those other schools. Duke students work hard and don’t cut corners. Your work is your own: if in doubt, ask. Listen to what shame tells you. Cheating is a response to fear, but it just creates more fear.

  29. gitlab.oit.duke.edu • We will use the git version control system. • Repositories are hosted on gitlab.oit service. • Your group’s repository is private to your group and to us (and to the auto-grader). • You will use the git command to clone your repository in a local directory/folder. • Use git to commit/push/checkin and pull/fetch updates. • The git command runs as a local program/process that talks to gitlab.oit over the network. • Q: how does gitlab.oit know who you are? • A1: Login to gitlab.oitwith your NetID using Shibboleth. • A2: register a public key with gitlab.oit.

  30. AuthZ 101 service subject action object subj/obj attributes reference monitor applies guard policy policy rules Authenticated by PKI / SSL / MAC “subject says action” checker Alice credentials guard request object identity requester authorizer (subject)

  31. Cryptography for Busy People • Standard crypto functions parameterized by keys. • Key is a fixed-width “random” value (width matters!) • Symmetric (DES): fast, requires shared key: K = K1 = K2 • Asymmetric (RSA): slow, uses two keys: a keypair{K1, K2} • “Believed to be computationally infeasible” to break E D {M}K1 Encrypted version of M (ciphertext) M Message (plaintext) Encrypt K1 Decrypt K2 M [Image: Landon Cox]

  32. Asymmetric (public key) crypto • Each subject/principal possesses a keypair. • Decrypt(K, Encrypt(K-1, M)) = M • Keep one key private; the other is public. • Either key can be used to encrypt/decrypt. If we know one another’s public keys then we can communicate securely. Anyone can mint a keypair.

  33. Asymmetric crypto works both ways Crypt E D A’s private key or A’s public key Crypt A’s public key or A’s private key [Landon Cox]

  34. How to use asymmetric crypto? • A can send a message to B, encrypted with A’s private key. • B can send a message to A, encrypted with A’s public key. • Benefits? Other possibilities?

  35. Spelling it out • Do encrypt message M with yourprivate key to authenticate it, i.e., to convince the recipient that M really came from you. • Better yet, digitally sign M: that’s faster (next). • Do encrypt M with the recipient’spublic key to keep it secret: only the intended recipient can decrypt it. • Don’t encrypt M with your public key: it’s just weird and pointless, since nobody else can read the encrypted message. Bob probably blew his chances with Alice. • Don’t encrypt M with the recipient’s private key: if you know someone’s private key then you should not use it! Forget it and don’t tell anyone.

  36. Extra slides The point of the remaining slides is: • We take a broad view of “operating systems” encompassing a variety of application platforms. • We start with Unix, a canonical/classical OS. • Unix has continuing relevance: it continues to thrive deep inside the rich platforms we use today: knowing about the Unix kernel helps to understand how they work. • Hardware and application demands change rapidly. Operating system kernels evolve slowly, but we often add more code around them to adapt to change. • You’ll see these slides again.

  37. What is this course about? • “Greater Unix” • Classical OS abstractions and structure • Systems programming with C and Unix • Networked systems • Sockets and servers, smartphones to clouds • Elementary cryptosystems • Distributed systems topics • Managing concurrency • Threads, multi-threaded Java • Managing storage and data • Files, caches, disks, recovery, content delivery

  38. Platforms are layered/nested

  39. End-to-end application delivery Where is your application? Where is your data? Where is your OS? Cloud and Software-as-a-Service (SaaS) Rapid evolution, no user upgrade, no user data management. Agile/elastic deployment on virtual infrastructure.

  40. SaaS platform elements container browser “Classical OS” [wiki.eeng.dcu.ie]

  41. OpenStack, the Cloud Operating System Management Layer That Adds Automation & Control [Anthony Young @ Rackspace]

  42. EC2 The canonical public cloud Virtual Appliance Image

  43. Drivers of Change Exponential growth Increasing diversity User Applications Operating System Substrate / Architecture Backward compatibility Aggregation Composition Orchestration Broad view: smartphones to servers, web, and cloud.

  44. “Software Architecture” User Applications Software architecture Operating System(s) Physics stops here. Computer architecture Substrate / Architecture • Comparative architecture: what works • Reusable / recurring design patterns • Used in OS • Supported by OS

  45. But Java programs are interpretedThey run on an “abstract machine” (e.g., JVM) implemented in software(e.g., a C program). ”bytecode” http://www.media-art-online.org/java/help/how-it-works.html

  46. Virtual Machine (JVM) “Classical OS” Reloaded. [http://www.android.com]

More Related