Technical Issues of Real-Time Network Simulation in Linux

Total Page:16

File Type:pdf, Size:1020Kb

Technical Issues of Real-Time Network Simulation in Linux FDPW Volume Technical Issues of RealTime Network Simulation in Linux Andrei V Gurtov Department of Computer Science University of Helsinki Department of Computer Science UniversityofPetrozavo dsk POBoxTeollisuuskatu FIN University of Helsinki Finland Email gurtovcshelsinkifi Abstract Realtime network simulation requires dealing with miscella neous technical problems to achieve a correct and timely execution Ignoring those issues can render a valid mo del useless b ecause its implementation would pro duce erroneous results This pap er iden ties and discusses the problems sp ecic for a Linux op erating sys tem on the x architecture A problem of accurate eventschedul ing in a simulation pro cess without disturbing other pro cesses is the most imp ortant and is considered in detail Several solutions to this problem are evaluated by measurements The results show that no single solution ts all criteria but the most appropriate metho d can b e selected according to the goals of a simulation study c Andrei V Gurtov Andrei V Gurtov If youre trying to solve realtime sort of problems you aredealing with some fairly thorny technical issues B Gallmeister a vicechar of POSIX Intro duction Studying the b ehavior of Internet proto cols over a real data link or net work is often costly or if a system is only in a development stage imp os sible An alternativeway is to build a mo del that emulates the network of interest and then using this mo del to measure the p erformance of real networking applications An understandable desire 100 of any mo deler is to concen trate the eort on developing 80 a conceptual mo del of the system under study and to the computer as a p er treat 60 fect implementation to ol that accurately follows the event 40 schedule Unfortunately this Actual line rate (kbps) do es not work as most othe p ersonal computers and shelf 20 UNIXlike op erating systems not designed for realtime are 0 0 20 40 60 80 100 use have coarse timer resolu Requested line rate (kbps) tion and are prone to delays Figure Actual versus requested caused by the hardware a disk line rate Measured with WINES or network access and by the simulator using byte packets op erating system Esp ecially Sleeps are p erformed using a stan in amultipro cess environment dard Linux system call keeping a realtime schedule can be hard b ecause a simu lation pro cess has to comp ete with other pro cesses for system resources Consider Figure for example It presents p erformance results from the rst version of the Wireless Network Simulator Wines a to ol for studying the b ehavior of network proto cols over GSM develop ed at the Department of Computer Science University of Helsinki Wines emulates RealTime Network Simulation in Linux a slow wireless link by delaying data packets and the actual line rate maintained by the simulator is exp ected to b e the same as requested in a conguration le In practice as can b e seen from the gure the actual line rate is lower than the requested line rate The error is pro duced b ecause the simulator relies on a standard Linux system call to p erform accurate delays Appropriate services of an op erating system for realtime applications is an active research area An imp ortant landmark is POSIX sp eci cations for p ortable realtime programming However many related issues are highly sp ecic for a particular hardware and op erating system In this pap er we discuss technical issues of realtime network simula tion on a Linux op erating system run on a PC A problem of accurate event scheduling in a simulation pro cess without disturbing other pro cesses is the most imp ortant and is considered in detail Most related work is concentrated only on achieving the highest p ossible accuracy but ignoring practical factors that are sometimes decisive for the usage of a metho d In this pap er we take into consideration such issues as the amount of mo dications needed in the Linux kernel and transparency of a metho d for applications Several solutions to the problem of accurate delay are evaluated by measurements The results show that no single solution ts all criteria but the most appropriate metho d can b e selected according to the goals of a simulation study Other problems are outlined and p ossible solutions to them are suggested but an extensiveevaluation is the sub ject of future work Details not presentin this pap er due to the lackof space can be found in Seawind realtime simulator A Software Emulator for Analyzing Wireless Network Data transfers Sea wind is develop ed as a to ol for exploring the behavior of real Internet proto cols mostly TCP over wireless datalink services provided by GSM GPRS and HSCSD It may be classied as a realtime distributed functional simulator The simulation system consists of several simu We use the term PC to refer to any p ersonal computer based on i and its successors Andrei V Gurtov lation pro cesses connected in a pip eline so that every simulation pro cess corresp onds to some subsystem of the mo deled network Simulation pro cesses can be distributed on several computers and exchange messages using unmo died TCP or UDP proto cols The simulation pro cess is designed based on the Mowser library that among other to ols includes a generic event dispatcher mev A Mowser client can register event handlers for a numb er of sp ecic events a descriptor is ready for writing or reading an alarm go es o a pro cess receives a signal etc Unfortunately mev was not initially designed to b e a realtime scheduler and was never used in this way Exp erience with Seawind will show the existing problems and appropriate enhancements could b e made to mev in the future Several simulation pro cesses are managed with a control to ol via a graphical user interface The client and the server are normal Internet hosts that run a networking application over the Seawind system that tunnels packets p ossibly delaying mo difying or dropping them The back ground load can b e emulated either articially or explicitly with external load generators The conguration of the simulation pro cess is read b efore starting a test and is not a problem but logging may happ en during an exp eriment run and can cause undesired delays Two factors imply that it is not wise to demand the usage of a mo died Linux kernel for all exp eriments First as a rule every simulation pro cess should b e run on a separate PC Second the Seawind simulator is used in several organizations and they may not have resources to install a mo died Linux system In this pap er we outline the cases in whichthe kernel mo dication is a must and cases where the required accuracy can be achieved by suggested metho ds in the user software The problem of an accurate sleep time Denition of the problem The standard Linux kernel on PC provides a pro cess sleep time resolution of ms with a minimum of approximately ms As a rule the actual sleep time is ms more than requested In the later sections we will see reasons for such coarse b ehavior but rst we consider the implications of these facts to our realtime network simulator RealTime Network Simulation in Linux 200 Figure shows the 25−byte packets y per packet to dela 180 200−byte packets 1000−byte packet emulate a slow link of a 160 given line rate The de 140 lay value is determined 120 by the line rate and 100 by the packet size To limitations demonstrate 80 of the standard Linux Slow down delay per packet (ms) 60 sleep metho d let us 40 consider mo deling a 20 GPRS data link Con 0 three main ceptually 0 20 40 60 80 100 120 140 160 180 200 Line rate (kbps) levels of mo del granu larity can be identied Figure The computed delay per packet the IP packet layer versus requested line rate typical packet size of bytes LLC typical packet size of bytes and RLC typical packet size of bytes Taking into account the accuracy of sleeps and observing Figure we see that in standard Linux mo deling of RLC is out of question LLC can b e mo deled with meaningful results up to kbps and only the IPlevel seems to b e manageable for higher line rates In practice even IPlevel mo deling would give inaccurate results b ecause sleeps are always greater than requested and the accumulated delaywould result in the line rate of the emulated link to b e lower than requested In mo deling a data link some amountofvariation of delay p er packet is acceptable and sometimes even natural b ecause it is also presentonthe real link However the errors in individual sleeps should not accumulate or otherwise the results would b e biased Events for downlink and uplink channels of the Seawind simulation pro cess are scheduled concurrently Because of this an average sleep re quest would b e half of that is given in Figure Note also that it only accounts for slow down sleeps so if a pro cess is interrupted during the sleep to pro cess some event for example background load packet arrival and then go es to sleep again the error maybemuch larger We assume kbps is bps but Kbyte is bytes Andrei V Gurtov Formalization of the problem In this section wegivea numberofnumerical parameters that can b e used in the comparison of dierent metho ds of accurate sleep All sleep requests can b e roughly divided into two groups The rst group consists of one o ccurrence sleeps that are not dep endentoneach other An example is a random delay mo deling the eect of some rare event for instance a cell change The accuracy of such sleeps is more dicult to improve but on the other hand such sleeps tend to be rare and large in value thus the relative error for such
Recommended publications
  • Washington, Wednesday, January 25, 1950
    VOLUME 15 ■ NUMBER 16 Washington, Wednesday, January 25, 1950 TITLE 3— THE PRESIDENT in paragraph (a) last above, to the in­ CONTENTS vention is insufficient equitably to justify EXECUTIVE ORDER 10096 a requirement of assignment to the Gov­ THE PRESIDENT ernment of the entire right, title and P roviding for a U niform P atent P olicy Executive Order Pase for the G overnment W ith R espect to interest to such invention, or in any case where the Government has insufficient Inventions made by Government I nventions M ade by G overnment interest in an invention to obtain entire employees; providing, for uni­ E mployees and for the Administra­ form patent policy for Govern­ tion of Such P olicy right, title and interest therein (although the Government could obtain some under ment and for administration of WHEREAS inventive advances in paragraph (a), above), the Government such policy________________ 389 scientific and technological fields fre­ agency concerned, subject to the ap­ quently result from governmental ac­ proval of the Chairman of the Govern­ EXECUTIVE AGENCIES tivities carried on by Government ment Patents Board (provided for in Agriculture Department employees; and paragraph 3 of this order and herein­ See Commodity Credit Corpora­ WHEREAS the Government of the after referred to as the Chairman), shall tion ; Forest Service; Production United States is expending large sums leave title to such invention in the and Marketing Administration. of money annually for the conduct of employee, subject, however, to the reser­ these activities;
    [Show full text]
  • Practical Session 1, System Calls a Few Administrative Notes…
    Operating Systems, 142 Tas: Vadim Levit , Dan Brownstein, Ehud Barnea, Matan Drory and Yerry Sofer Practical Session 1, System Calls A few administrative notes… • Course homepage: http://www.cs.bgu.ac.il/~os142/ • Contact staff through the dedicated email: [email protected] (format the subject of your email according to the instructions listed in the course homepage) • Assignments: Extending xv6 (a pedagogical OS) Submission in pairs. Frontal checking: 1. Assume the grader may ask anything. 2. Must register to exactly one checking session. System Calls • A System Call is an interface between a user application and a service provided by the operating system (or kernel). • These can be roughly grouped into five major categories: 1. Process control (e.g. create/terminate process) 2. File Management (e.g. read, write) 3. Device Management (e.g. logically attach a device) 4. Information Maintenance (e.g. set time or date) 5. Communications (e.g. send messages) System Calls - motivation • A process is not supposed to access the kernel. It can’t access the kernel memory or functions. • This is strictly enforced (‘protected mode’) for good reasons: • Can jeopardize other processes running. • Cause physical damage to devices. • Alter system behavior. • The system call mechanism provides a safe mechanism to request specific kernel operations. System Calls - interface • Calls are usually made with C/C++ library functions: User Application C - Library Kernel System Call getpid() Load arguments, eax _NR_getpid, kernel mode (int 80) Call sys_getpid() Sys_Call_table[eax] syscall_exit return resume_userspace return User-Space Kernel-Space Remark: Invoking int 0x80 is common although newer techniques for “faster” control transfer are provided by both AMD’s and Intel’s architecture.
    [Show full text]
  • Philip Gibbs EVENT-SYMMETRIC SPACE-TIME
    Event-Symmetric Space-Time “The universe is made of stories, not of atoms.” Muriel Rukeyser Philip Gibbs EVENT-SYMMETRIC SPACE-TIME WEBURBIA PUBLICATION Cyberspace First published in 1998 by Weburbia Press 27 Stanley Mead Bradley Stoke Bristol BS32 0EF [email protected] http://www.weburbia.com/press/ This address is supplied for legal reasons only. Please do not send book proposals as Weburbia does not have facilities for large scale publication. © 1998 Philip Gibbs [email protected] A catalogue record for this book is available from the British Library. Distributed by Weburbia Tel 01454 617659 Electronic copies of this book are available on the world wide web at http://www.weburbia.com/press/esst.htm Philip Gibbs’s right to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved, except that permission is given that this booklet may be reproduced by photocopy or electronic duplication by individuals for personal use only, or by libraries and educational establishments for non-profit purposes only. Mass distribution of copies in any form is prohibited except with the written permission of the author. Printed copies are printed and bound in Great Britain by Weburbia. Dedicated to Alice Contents THE STORYTELLER ................................................................................... 11 Between a story and the world ............................................................. 11 Dreams of Rationalism .......................................................................
    [Show full text]
  • United States District Court Southern District Of
    Case 3:11-cv-01812-JM-JMA Document 31 Filed 02/20/13 Page 1 of 10 1 2 3 4 5 6 7 8 9 UNITED STATES DISTRICT COURT 10 SOUTHERN DISTRICT OF CALIFORNIA 11 12 In re JIFFY LUBE ) Case No.: 3:11-MD-2261-JM (JMA) INTERNATIONAL, INC. TEXT ) 13 SPAM LITIGATION ) FINAL APPROVAL OF CLASS ) ACTION AND ORDER OF 14 ) DISMISSAL WITH PREJUDICE ) 15 16 Pending before the Court are Plaintiffs’ Motion for Final Approval of Class 17 Action Settlement (Dkt. 90) and Plaintiffs’ Motion for Approval of Attorneys’ Fees and 18 Expenses and Class Representative Incentive Awards (Dkt. 86) (collectively, the 19 “Motions”). The Court, having reviewed the papers filed in support of the Motions, 20 having heard argument of counsel, and finding good cause appearing therein, hereby 21 GRANTS Plaintiffs’ Motions and it is hereby ORDERED, ADJUDGED, and DECREED 22 THAT: 23 1. Terms and phrases in this Order shall have the same meaning as ascribed to 24 them in the Parties’ August 1, 2012 Class Action Settlement Agreement, as amended by 25 the First Amendment to Class Action Settlement Agreement as of September 28, 2012 26 (the “Settlement Agreement”). 27 2. This Court has jurisdiction over the subject matter of this action and over all 28 Parties to the Action, including all Settlement Class Members. 1 3:11-md-2261-JM (JMA) Case 3:11-cv-01812-JM-JMA Document 31 Filed 02/20/13 Page 2 of 10 1 3. On October 10, 2012, this Court granted Preliminary Approval of the 2 Settlement Agreement and preliminarily certified a settlement class consisting of: 3 4 All persons or entities in the United States and its Territories who in April 2011 were sent a text message from short codes 5 72345 or 41411 promoting Jiffy Lube containing language similar to the following: 6 7 JIFFY LUBE CUSTOMERS 1 TIME OFFER: REPLY Y TO JOIN OUR ECLUB FOR 45% OFF 8 A SIGNATURE SERVICE OIL CHANGE! STOP TO 9 UNSUB MSG&DATA RATES MAY APPLY T&C: JIFFYTOS.COM.
    [Show full text]
  • What Happened Before the Big Bang?
    Quarks and the Cosmos ICHEP Public Lecture II Seoul, Korea 10 July 2018 Michael S. Turner Kavli Institute for Cosmological Physics University of Chicago 100 years of General Relativity 90 years of Big Bang 50 years of Hot Big Bang 40 years of Quarks & Cosmos deep connections between the very big & the very small 100 years of QM & atoms 50 years of the “Standard Model” The Universe is very big (billions and billions of everything) and often beyond the reach of our minds and instruments Big ideas and powerful instruments have enabled revolutionary progress a very big idea connections between quarks & the cosmos big telescopes on the ground Hawaii Chile and in space: Hubble, Spitzer, Chandra, and Fermi at the South Pole basics of our Universe • 100 billion galaxies • each lit with the light of 100 billion stars • carried away from each other by expanding space from a • big bang beginning 14 billion yrs ago Hubble (1925): nebulae are “island Universes” Universe comprised of billions of galaxies Hubble Deep Field: one ten millionth of the sky, 10,000 galaxies 100 billion galaxies in the observable Universe Universe is expanding and had a beginning … Hubble, 1929 Signature of big bang beginning Einstein: Big Bang = explosion of space with galaxies carried along The big questions circa 1978 just two numbers: H0 and q0 Allan Sandage, Hubble’s “student” H0: expansion rate (slope age) q0: deceleration (“droopiness” destiny) … tens of astronomers working (alone) to figure it all out Microwave echo of the big bang Hot MichaelBig S Turner Bang
    [Show full text]
  • Interprocess Communication 1 Processes • Basic Concept to Build
    Interprocess Communication 1 Processes • Basic concept to build the OS, from old IBM mainframe OS to the most modern Windows • Used to express the requirements to be met by an OS – Interleave the execution of multiple processes, to maximize CPU utilization while providing good response time – Allocate resources to processes using a policy while avoiding deadlocks – Support interprocess communications and user creation of processes to help structuring applications • Background – Computer platform * Collection of hardware resources – CPU, memory, I/O modules, timers, storage devices – Computer applications * Developed to perform some task * Input, processing, output – Efficient to write applications for a given CPU * Common routines to access computer resources across platforms * CPU provides only limited support for multiprogramming; software manages sharing of CPU and other re- sources by multiple applications concurrently * Data and resources for multiple concurrent applications must be protected from other applications • Process – Abstraction of a running program – Unit of work in the system – Split into two abstractions in modern OS * Resource ownership (traditional process view) * Stream of instruction execution (thread) – Pseudoparallelism, or interleaved instructions – A process is traced by listing the sequence of instructions that execute for that process • Modeling sequential process/task – Program during execution – Program code – Current activity – Process stack * Function parameters * Return addresses * Temporary variables –
    [Show full text]
  • 15 Pecision System Clock Architecture
    Pecision System Clock Architecture 15 Pecision System Clock Architecture “Time iz like money, the less we hav ov it teu spare the further we make it go.” Josh Billing Encyclopedia and Proverbial Philosophy of Wit and Humor, 1874 225 Pecision System Clock Architecture Limitations of the Art Over the almost three decades that NTP has evolved, accuracy expectations have improved from 100 ms to less than 1 ms on fast LANs with multiple segments interconnected by switches and less than a few milliseconds on most campus and corporate networks with multiple subnets interconnected by routers. Today the practical expectations with a GPS receiver, PPS signal and precision kernel support are a few microseconds. In principle the ultimate expectations are limited only by the 232-ps resolution of the NTP timestamp format or about the time light travels three inches. Improving accuracy expectations below the PPS regime is proving intricate and tricky. In this chapter we turn to the most ambitious means available to minimize errors in the face of hardware and software not designed for extraordinary timekeeping. First we examine the hardware and software components for a precision system clock and evolve an optimal design. Next we survey timestamping techniques using both hardware, driver and software methods to minimize errors due to media, device and operating system latencies. Finally, we explore the IEEE 1588 Precision Time Protocol (PTP), how it is used in a high speed LAN, and how it and NTP can sail in the same boat. The parting shots section proposes a hardware assisted design which provides performance equivalent to PTP with only minimal modifications to the Unix operating system kernel.
    [Show full text]
  • Detecting Temperature Through Clock Skew
    Detecting temperature through clock skew Steven J. Murdoch (aka 253802) www.cl.cam.ac.uk/users/sjm217 OpenNet Initiative Computer Laboratory www.opennet.net 23rd Chaos Communication Congress, Berlin, Germany, 27–30 December 2006 This presentation introduces clock skew and how it can introduce security vulnerabilities 0.0 De−noised ●● 26.4 ● ● ● ● 26.3 −0.5 Non−linear offset ● ● ●●Temperature C) ° ● ● ●●● 26.2 −1.0 ●● ●●● ● ●●●●●●●● 26.1 ●●●●●●● ●●●● ● ●● ●●●● −1.5 ●● ● ●● ● ●● ●● 26.0 Temperature ( ● Clock skew, its link to temperature, and measurement ●●● ●●●●●●●●● ● ●●●●● 25.9 Non−linear offset component (ms) ●●●●●●●●●●●●●●●● −−2.0 Variable skew ● 25.8 Fri 11:00 Fri 21:00 Sat 07:00 Sat 17:00 Time Service Publication Connection Setup Data Transfer Hidden Service 1 6 * RP 7 Introduction Point (IP) IP Rendevous 2 Point (RP) Tor and hidden services 5 RP 8 Directory data Server 4 IP Client 3 Measurer Attacking Tor with clock skew Attacker Tor Network Hidden Server Other applications of clock skew Computers have multiple clocks which are constructed from hardware and software components A clock consists of an: • Oscillator, controlled by a crystal, ticks at an nominal frequency • Counter, counts the number of ticks produce by the oscillator On Linux there are several clocks available (other OS are similar): • Jiffy counter: An uncorrected clock used internally to the OS • System clock: A clock corrected by NTP (used by applications) • BIOS clock (also known as CMOS clock): runs even when PC is off and initialises the system clock Computers
    [Show full text]
  • Jiffy Steamer Owner's Manual
    Worldwide Leader in Steaming Equipment Since 1940 Esteam® and J-Series OWNER’S MANUAL Congratulations and Thank You! Thank you for purchasing your Jiffy® Steamer from the world’s leading manufacturer of steaming equipment since 1940. We strive to engineer and manufacture the very best steamer available backed by superior customer service. With proper maintenance and cleaning, your Jiffy® Steamer will last through years of demanding use. Thank you again and we sincerely appreciate your business. Warmest regards, Jiffy® Steamer Company, LLC Made in the USA Since 1940 Table of Contents Safety Instructions .....................................................................3 How to Steam..............................................................................4 Esteam® Hand Held Steamer .................................................5-8 Rod Set Assembly.......................................................................9 Model J-1, J-2 & J-200 Jiffy® Steamers............................10-15 Model J-2000 Jiffy® Steamer..............................................16-21 Model J-4000 Jiffy® Steamer..............................................22-27 Model J-1, J-2, J-200 & J-2000 Jiffy® Steamers Cleaning Instructions...............................................................28 Model J-4000 Jiffy® Steamer Cleaning Instructions.............29 Jiffy® Steamer Maintenance....................................................30 Jiffy® Steamer Accessories.......................................................31 Jiffy® Steamer Steam Head
    [Show full text]
  • Burkina Faso
    [NAME] [FIRM] [ADDRESS] [PHONE NUMBER] [FAX NUMBER] UNITED STATES DEPARTMENT OF JUSTICE EXECUTIVE OFFICE FOR IMMIGRATION REVIEW IMMIGRATION COURT [CITY, STATE] __________________________________________ ) In the Matter of: ) ) File No.: A __________ __________ ) ) In removal proceedings ) __________________________________________) INDEX TO DOCUMENTATION OF COUNTRY CONDITIONS REGARDING PERSECUTION OF LGBTQ PERSONS IN BURKINA FASO TAB SUMMARY GOVERNMENTAL SOURCES 1. Overseas Security Advisory Council, Bureau of Diplomatic Security, U.S. Dep’t of State, Burkina Faso 2020 Crime & Safety Report (May 12, 2020), available at https://www.osac.gov/Content/Report/81726191-31e9-4ceb-9adb-18aa5a5de155 • “Members of the LGBTI+ community find life in Burkina Faso extremely difficult and, at worst, dangerous. Societal discrimination based on sexual orientation and gender identity remains an issue; religious/traditional beliefs do not tolerate homosexuality.” (p. 4) • “There are regular reports of verbal and physical abuse against members of the LGBTI+ community. LGBTI+ employees have passed partners off as relatives, even within the Embassy community, to avoid the possibility of intolerant reactions.” (p. 4) 2. Bureau of Democracy, Human Rights and Labor, U.S. Dep’t of State, 2019 Country Reports on Human Rights Practices: Burkina Faso (Mar. 2020), available at https://www.state.gov/reports/2019-country-reports-on-human-rights-practices/burkina-faso/ • “The country has no hate crime laws or other criminal justice mechanisms to aid in the investigation, prosecution, or sentencing of bias-motivated crimes against the lesbian, gay, bisexual, transgender, and intersex (LGBTI) community. NGOs reported police TAB SUMMARY occasionally arrested gay men and transgender individuals and humiliated them in detention before releasing them.” (p.
    [Show full text]
  • Second Quarter 2017 Site Investigation Data Report Former Ivy’S Jiffy Market Site Madras, Oregon ECSI No
    Second Quarter 2017 Site Investigation Data Report Former Ivy’s Jiffy Market Site Madras, Oregon ECSI No. 5845 Prepared for: Oregon Department of Environmental Quality Task Order No. 20-13-21 June 27, 2017 2103-00/Task 4 Table of Contents 1.0 INTRODUCTION ..................................................................................................................................... 1 1.1 Purpose ............................................................................................................................................... 1 1.2 Scope of Work ..................................................................................................................................... 1 2.0 BACKGROUND ....................................................................................................................................... 2 2.1 Site Location and Description .............................................................................................................. 2 2.2 Previous Investigations ........................................................................................................................ 2 2.3 Other Impacted Sites ........................................................................................................................... 4 2.4 Geology and Hydrogeology ................................................................................................................. 5 3.0 PRE-INVESTIGATION ACTIVITIES .......................................................................................................
    [Show full text]
  • Operating Systems Homework Assignment 2
    Operating Systems Homework Assignment 2 Preparation For this homework assignment, you need to get familiar with a Linux system (Ubuntu, Fedora, CentOS, etc.). There are two options to run Linux on your Desktop (or Laptop) computer: 1. Run a copy of a virtual machine freely available on-line in your own PC environment using Virtual Box. Create your own Linux virtual machine (Linux as a guest operating system) in Windows. You may consider installing MS Windows as a guest OS in Linux host. OS-X can host Linux and/or Windows as guest Operating systems by installing Virtual Box. 2. Or on any hardware system that you can control, you need to install a Linux system (Fedora, CentOS Server, Ubuntu, Ubuntu Server). Tasks to Be Performed • Write the programs listed (questions from Q1 to Q6), run the program examples, and try to answer the questions. Reference for the Assignment Some useful shell commands for process control Command Descriptions & When placed at the end of a command, execute that command in the background. Interrupt and stop the currently running process program. The program remains CTRL + "Z" stopped and waiting in the background for you to resume it. Bring a command in the background to the foreground or resume an interrupted program. fg [%jobnum] If the job number is omitted, the most recently interrupted or background job is put in the foreground. Place an interrupted command into the background. bg [%jobnum] If the job number is omitted, the most recently interrupted job is put in the background. jobs List all background jobs.
    [Show full text]