SlideShare una empresa de Scribd logo
1 de 24
Overview : Introduction Design principles Inferno Interfaces Application  Layer Kernel Layer Hardware Layer Inferno Resources Pros & Cons Questions 8/12/2010 1
Introduction: Developed in Lucent technologies by Dennis Ritchie. but is now developed and maintained by Vita Nuova Holdings as free software. Replaces a plethora of protocols in a network by a simple unifying file service protocol (styx). Applications compute their own name spaces and consider all resources as file systems. Inferno was based on the experience gained with Plan 9  os from Bell Labs. The name of the operating system and many of its associated programs, as well as that of the current company, were inspired by Dante Alighieri'sDivine Comedy. 8/12/2010 2
Inferno's definitive strength lies in its portability and versatility across several dimensions: Portability across processors Portability across environments Minimal hardware requirements Portable applications 8/12/2010 3
Design Principles:- Inferno was first made in 1995 by members of Bell Labs' Computer .It is  a distributed operating system based on 3 basic principles drawn from Plan 9.  Resources as files:- all resources are represented as files within a hierarchical file system .The advantages of using file systems are:- File systems have simple and well understood interfaces across a wide variety of operating systems.  Naming conventions for files are well known, uniform and easily understood  8/12/2010 4
Reliance on file systems reduces the amount of interface code and keeps the Inferno system small, reliable and highly portable . Access rights and permissions to files are simple, yet can be used to ensure multiple levels of security  NAMESPACE:- the application view of the network is a single, coherent namespace that appears as a hierarchical file system but may represent physically separated (locally or remotely) resources. The Inferno Namespace is a hierarchical collection of files (i.e. resources). 8/12/2010 5
Every process accesses its resources via its own namespace can inherit from parent share with other processes Local and remote resources are bound into the namespace Standard communication protocol:a standard protocol, called Styx,is used to access all resources, both local and remote. 8/12/2010 6
Styx Message Structure:- Indicates message type: initial transmission (T-message) or reply message (R-message) Unique identifier used to track commands Unsigned integer that represents “current” file Message specific data fid Contents tag type 8/12/2010 7
History:- 8/12/2010 8
Inferno Interfaces:- 8/12/2010 9
Inferno has mainly three layers.   (i)  Application layer (ii)  Kernel layer (iii)Hardware layer  8/12/2010 10
Application Layer:- Limbo is fully type checked at compile and run time. No memory protection H/W is there. All LIMBO data and program objects are subject to a garbage collector built deeply into LIMBO run time system. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 11
DisVirtualmachine: - Limbo programs are compiled into byte-codes representing instructions for a virtual machine called Dis. Dis has 3 address machine , supplemented with few specialized operations  for handling  arrays and strings. The byte codes are expanded into a format more efficient for execution. 8/12/2010 12
Kernel Layer:- Namespace : Memory management Process management Security in Inferno  Security mechanisms  8/12/2010 13
Hardware Layer:-   Device drivers:- A device driver simplifies programming by acting as a translator between a device and the applications or operating systems that use it In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. A driver typically communicates with the device through the computer bus or communications subsystem to which the hardware is connected. 8/12/2010 14
Host os:-  Inferno can run in different host operating  system Host systems  Windows NT/2000/XP Linux MacOS Plan9os Solaris 8/12/2010 15
Inferno Resources:- 8/12/2010 16
External Environment of Inferno Applications :- The purpose of most Inferno applns is to present information n/media to user. Regardless of whether resources are local/global, a communication protocol called styx is used. The glue that connects diff parts of the resource name space together is the styx protocol. Inferno kernel implements a mount driver which transforms file operations to RPC’s  for transport over the network. 8/12/2010 17
Internal Environment of Inferno Applications:- LIMBO programs are built of modules, which are self contained units . Modules are accessed dynamically by executing a load statement. Limbo is fully type checked at compile and run time. No memory protection H/W is there. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 18
Advantages:- Cross platform integration Transparent resource access Secure communication 8/12/2010 19
Future scope:- Telephony Call setup Device control Text to Speech Network Gateways 8/12/2010 20
Conlcusion:- “ Inferno does have a full-blown operating system and a virtual machine and a protocol stack, and in a lot of respects is something Java would like to be when it grows up. “ - Peter Bernstein,  Inferno is a unique network operating system that adapts to whatever you plug into it -- from a high-end workstation to an inexpensive hand-held device," noted Dennis Ritchie,  One of the most significant differences between Inferno and other operating systems such as JavaOS is the way in which Inferno presents network resources to an application.  8/12/2010 21
References:- Bell Labs Technical Journal. Plugins, Vita Nuova. http://code.google.com/p/inferno-ds. www.vitanuova.com 8/12/2010 22
8/12/2010 23
QUESTIONS 8/12/2010 24

Más contenido relacionado

La actualidad más candente

La actualidad más candente (6)

Sector Cloudcom Tutorial
Sector Cloudcom TutorialSector Cloudcom Tutorial
Sector Cloudcom Tutorial
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Glossary vp 9
Glossary vp 9Glossary vp 9
Glossary vp 9
 
Presentation1
Presentation1Presentation1
Presentation1
 
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinuxNguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
 
Presentation1
Presentation1Presentation1
Presentation1
 

Destacado

Fondamenti di prosodia latina
Fondamenti di prosodia latinaFondamenti di prosodia latina
Fondamenti di prosodia latinanapolinelquore
 
District 30 - 2011 ISAT
District 30 - 2011 ISATDistrict 30 - 2011 ISAT
District 30 - 2011 ISATAndrew Kohl
 
Generational Differences Texas Medical Association 10 3 2008
Generational Differences   Texas Medical Association   10 3 2008Generational Differences   Texas Medical Association   10 3 2008
Generational Differences Texas Medical Association 10 3 2008Bill M Wooten, PhD
 
Social Business Conference 2013 - Social Media: Become a large platform or ju...
Social Business Conference 2013 - Social Media: Become a large platform or ju...Social Business Conference 2013 - Social Media: Become a large platform or ju...
Social Business Conference 2013 - Social Media: Become a large platform or ju...HKAIM
 
Tweet to diigo
Tweet to diigoTweet to diigo
Tweet to diigoDai Barnes
 
Twitter to evernote
Twitter to evernoteTwitter to evernote
Twitter to evernoteDai Barnes
 
Sub Prime Primer
Sub Prime PrimerSub Prime Primer
Sub Prime Primerk220809
 
VietRees_Newsletter_65_Tuan2_Thang1
VietRees_Newsletter_65_Tuan2_Thang1VietRees_Newsletter_65_Tuan2_Thang1
VietRees_Newsletter_65_Tuan2_Thang1internationalvr
 
Country Report of the Thai National Committee on Memory of the World
Country Report of the Thai National Committee on Memory of the WorldCountry Report of the Thai National Committee on Memory of the World
Country Report of the Thai National Committee on Memory of the WorldRachabodin Suwannakanthi
 
Presentation on basics of Registry Editor
Presentation on basics of Registry EditorPresentation on basics of Registry Editor
Presentation on basics of Registry EditorSanjeev Kumar Jaiswal
 
3 key points for fin plan
3 key points for fin plan 3 key points for fin plan
3 key points for fin plan mariogomezprieto
 
Urban Leadership Slides
Urban Leadership SlidesUrban Leadership Slides
Urban Leadership SlidesNathan Smith
 

Destacado (20)

Fondamenti di prosodia latina
Fondamenti di prosodia latinaFondamenti di prosodia latina
Fondamenti di prosodia latina
 
District 30 - 2011 ISAT
District 30 - 2011 ISATDistrict 30 - 2011 ISAT
District 30 - 2011 ISAT
 
Sql Injection
Sql Injection Sql Injection
Sql Injection
 
Generational Differences Texas Medical Association 10 3 2008
Generational Differences   Texas Medical Association   10 3 2008Generational Differences   Texas Medical Association   10 3 2008
Generational Differences Texas Medical Association 10 3 2008
 
Wimax vsWi-fi
Wimax vsWi-fiWimax vsWi-fi
Wimax vsWi-fi
 
Social Business Conference 2013 - Social Media: Become a large platform or ju...
Social Business Conference 2013 - Social Media: Become a large platform or ju...Social Business Conference 2013 - Social Media: Become a large platform or ju...
Social Business Conference 2013 - Social Media: Become a large platform or ju...
 
Tweet to diigo
Tweet to diigoTweet to diigo
Tweet to diigo
 
Twitter to evernote
Twitter to evernoteTwitter to evernote
Twitter to evernote
 
Presentaci ã³n4 (1) (1)
Presentaci ã³n4 (1) (1)Presentaci ã³n4 (1) (1)
Presentaci ã³n4 (1) (1)
 
Sub Prime Primer
Sub Prime PrimerSub Prime Primer
Sub Prime Primer
 
VietRees_Newsletter_65_Tuan2_Thang1
VietRees_Newsletter_65_Tuan2_Thang1VietRees_Newsletter_65_Tuan2_Thang1
VietRees_Newsletter_65_Tuan2_Thang1
 
Country Report of the Thai National Committee on Memory of the World
Country Report of the Thai National Committee on Memory of the WorldCountry Report of the Thai National Committee on Memory of the World
Country Report of the Thai National Committee on Memory of the World
 
Presentation on basics of Registry Editor
Presentation on basics of Registry EditorPresentation on basics of Registry Editor
Presentation on basics of Registry Editor
 
Morphological Image Processing
Morphological Image ProcessingMorphological Image Processing
Morphological Image Processing
 
3 key points for fin plan
3 key points for fin plan 3 key points for fin plan
3 key points for fin plan
 
Presentación lazytech
Presentación lazytechPresentación lazytech
Presentación lazytech
 
Tele Immersion
Tele ImmersionTele Immersion
Tele Immersion
 
Moral Psychology
Moral PsychologyMoral Psychology
Moral Psychology
 
Urban Leadership Slides
Urban Leadership SlidesUrban Leadership Slides
Urban Leadership Slides
 
Night Vision
Night VisionNight Vision
Night Vision
 

Similar a Inferno O.S.

Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming ReportShivek Khurana
 
Inferno operating system
Inferno operating systemInferno operating system
Inferno operating systemSadhana28
 
Plan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemPlan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemQuentin Fennessy
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrationshaile468688
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helixJeff Carroll
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating SystemKunalKewat1
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, DockerSatrioBudi10
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure amol_chavan
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systemsAbDul ThaYyal
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesInformation Technology
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiSowmya Jyothi
 

Similar a Inferno O.S. (20)

Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming Report
 
Inferno operating system
Inferno operating systemInferno operating system
Inferno operating system
 
Plan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating SystemPlan9: Bad Movie, Good Operating System
Plan9: Bad Movie, Good Operating System
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
 
Group project linux helix
Group project linux helixGroup project linux helix
Group project linux helix
 
Linux OS presentation
Linux OS presentationLinux OS presentation
Linux OS presentation
 
Linux
Linux Linux
Linux
 
Linux vs windows
Linux vs windowsLinux vs windows
Linux vs windows
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
Linux notes
Linux notesLinux notes
Linux notes
 
Introduction to unix
Introduction to unixIntroduction to unix
Introduction to unix
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, Docker
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 
Inferno
InfernoInferno
Inferno
 
Chapter 8 distributed file systems
Chapter 8 distributed file systemsChapter 8 distributed file systems
Chapter 8 distributed file systems
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
 
Linux Vulnerabilities
Linux VulnerabilitiesLinux Vulnerabilities
Linux Vulnerabilities
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
 
Final
FinalFinal
Final
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Inferno O.S.

  • 1. Overview : Introduction Design principles Inferno Interfaces Application Layer Kernel Layer Hardware Layer Inferno Resources Pros & Cons Questions 8/12/2010 1
  • 2. Introduction: Developed in Lucent technologies by Dennis Ritchie. but is now developed and maintained by Vita Nuova Holdings as free software. Replaces a plethora of protocols in a network by a simple unifying file service protocol (styx). Applications compute their own name spaces and consider all resources as file systems. Inferno was based on the experience gained with Plan 9 os from Bell Labs. The name of the operating system and many of its associated programs, as well as that of the current company, were inspired by Dante Alighieri'sDivine Comedy. 8/12/2010 2
  • 3. Inferno's definitive strength lies in its portability and versatility across several dimensions: Portability across processors Portability across environments Minimal hardware requirements Portable applications 8/12/2010 3
  • 4. Design Principles:- Inferno was first made in 1995 by members of Bell Labs' Computer .It is a distributed operating system based on 3 basic principles drawn from Plan 9. Resources as files:- all resources are represented as files within a hierarchical file system .The advantages of using file systems are:- File systems have simple and well understood interfaces across a wide variety of operating systems. Naming conventions for files are well known, uniform and easily understood 8/12/2010 4
  • 5. Reliance on file systems reduces the amount of interface code and keeps the Inferno system small, reliable and highly portable . Access rights and permissions to files are simple, yet can be used to ensure multiple levels of security NAMESPACE:- the application view of the network is a single, coherent namespace that appears as a hierarchical file system but may represent physically separated (locally or remotely) resources. The Inferno Namespace is a hierarchical collection of files (i.e. resources). 8/12/2010 5
  • 6. Every process accesses its resources via its own namespace can inherit from parent share with other processes Local and remote resources are bound into the namespace Standard communication protocol:a standard protocol, called Styx,is used to access all resources, both local and remote. 8/12/2010 6
  • 7. Styx Message Structure:- Indicates message type: initial transmission (T-message) or reply message (R-message) Unique identifier used to track commands Unsigned integer that represents “current” file Message specific data fid Contents tag type 8/12/2010 7
  • 10. Inferno has mainly three layers. (i) Application layer (ii) Kernel layer (iii)Hardware layer 8/12/2010 10
  • 11. Application Layer:- Limbo is fully type checked at compile and run time. No memory protection H/W is there. All LIMBO data and program objects are subject to a garbage collector built deeply into LIMBO run time system. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 11
  • 12. DisVirtualmachine: - Limbo programs are compiled into byte-codes representing instructions for a virtual machine called Dis. Dis has 3 address machine , supplemented with few specialized operations for handling arrays and strings. The byte codes are expanded into a format more efficient for execution. 8/12/2010 12
  • 13. Kernel Layer:- Namespace : Memory management Process management Security in Inferno Security mechanisms 8/12/2010 13
  • 14. Hardware Layer:- Device drivers:- A device driver simplifies programming by acting as a translator between a device and the applications or operating systems that use it In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device. A driver typically communicates with the device through the computer bus or communications subsystem to which the hardware is connected. 8/12/2010 14
  • 15. Host os:- Inferno can run in different host operating system Host systems Windows NT/2000/XP Linux MacOS Plan9os Solaris 8/12/2010 15
  • 17. External Environment of Inferno Applications :- The purpose of most Inferno applns is to present information n/media to user. Regardless of whether resources are local/global, a communication protocol called styx is used. The glue that connects diff parts of the resource name space together is the styx protocol. Inferno kernel implements a mount driver which transforms file operations to RPC’s for transport over the network. 8/12/2010 17
  • 18. Internal Environment of Inferno Applications:- LIMBO programs are built of modules, which are self contained units . Modules are accessed dynamically by executing a load statement. Limbo is fully type checked at compile and run time. No memory protection H/W is there. All System data objects are kept track of and freed as soon as they become idle. 8/12/2010 18
  • 19. Advantages:- Cross platform integration Transparent resource access Secure communication 8/12/2010 19
  • 20. Future scope:- Telephony Call setup Device control Text to Speech Network Gateways 8/12/2010 20
  • 21. Conlcusion:- “ Inferno does have a full-blown operating system and a virtual machine and a protocol stack, and in a lot of respects is something Java would like to be when it grows up. “ - Peter Bernstein, Inferno is a unique network operating system that adapts to whatever you plug into it -- from a high-end workstation to an inexpensive hand-held device," noted Dennis Ritchie, One of the most significant differences between Inferno and other operating systems such as JavaOS is the way in which Inferno presents network resources to an application. 8/12/2010 21
  • 22. References:- Bell Labs Technical Journal. Plugins, Vita Nuova. http://code.google.com/p/inferno-ds. www.vitanuova.com 8/12/2010 22