Building a Reliable Storage Stack

Total Page:16

File Type:pdf, Size:1020Kb

Building a Reliable Storage Stack Building a Reliable Storage Stack Ph.D. Thesis David Cornelis van Moolenbroek Vrije Universiteit Amsterdam, 2016 This work was supported by the European Research Council Advanced Grant 227874. This work was carried out in the ASCI graduate school. ASCI dissertation series number 355. Copyright © 2016 by David Cornelis van Moolenbroek. ISBN 978-94-028-0240-5 Cover design by Eva Dienske. Printed by Ipskamp Printing. VRIJE UNIVERSITEIT Building a Reliable Storage Stack ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad Doctor aan de Vrije Universiteit Amsterdam, op gezag van de rector magnificus prof.dr. V. Subramaniam, in het openbaar te verdedigen ten overstaan van de promotiecommissie van de Faculteit der Exacte Wetenschappen op maandag 12 september 2016 om 11.45 uur in de aula van de universiteit, De Boelelaan 1105 door David Cornelis van Moolenbroek geboren te Amsterdam promotor: prof.dr. A.S. Tanenbaum To my parents Acknowledgments This book marks the end of both a professional and a personal journey–one that has been long but rewarding. There are several people whom I would like to thank for accompanying and helping me along the way. First and foremost, I would like to thank my promotor, Andy Tanenbaum. While I was finishing up my master project under his supervision, he casually asked me “Would you like to be my Ph.D student?” during one of our meetings. I did not have to think long about the answer. Right from the start, he warned me that I would now have to conduct original research myself; only much later did I understand the full weight of this statement. Throughout the years, Andy’s supervision has been fairly hands-off, but he has also been truly supportive especially at key moments. As a result, I learned a lot, but I was also able to see it through to the end. I am incredibly proud to have worked as a Ph.D student under Andy’s supervision, and incredibly grateful that he guided me through the process. Among Andy’s contributions, perhaps the most important one was to suggest that I collaborate with Raja Appuswamy. As a result, I had the opportunity to work with Raja on his great new idea at the time, which turned into Loris and ended up being the ground work for this thesis as well. During our collaboration, I learned so many things from Raja–ranging from the more practical side of doing good research to various aspects of Indian culture. Working with him has always been pleasant and easy, and outside work I have been lucky enough to share several memorable adventures with him. Now that it is my turn to face the guillotine, I could not wish for a better paranymph! I would also like to thank Dirk Vogt, whom I am honored to have as my other paranymph. With his inspiring enthusiasm, broad interests, challenging ideas, and a great gift for generating entropy, he has been a key figure in the later years of my Ph.D and is a major part of the reason that I miss going to the VU on a regular basis. vii viii ACKNOWLEDGMENTS During my years as a Ph.D student, I have had the fortune to share office space and time with all of the researchers in Andy’s MINIX 3 group: Jorrit Herder, Mischa Geldermans, Raja Appuswamy, Cristiano Giuffrida, Tomáš Hrubý, Lorenzo Caval- laro, Dirk Vogt, and Erik van der Kouwe. From detailed technical discussions to pizza-and-movie nights, it has always been fun. The programmers deserve mention in the same breath: Ben Gras, Philip Homburg, Kees Bot, Arun Thomas, Thomas Veerman, Gianluca Guida, Kees Jongenburger, and Lionel Sambuc. They tolerated that I regularly put on a programmers’ hat as well, making my time as Ph.D student much more enjoyable even if longer! I would like to thank several others. The various students that contributed to MINIX 3, and the Loris project in particular, including Arne Welzel, Richard van Heuven van Staereling, and Sharan Santhanam. The Dutch lesson group: Ana-Maria Oprescu, Corina Stratan, Albana Gaba, Philip Homburg, Dirk Vogt, Daniela Remenska, and later various others. I will always cherish the amazing, cultural, crazy evenings and nights I shared with these fantastic people. The larger VU computer systems group for many fun days and evenings in and around the coffee room; Kaveh Razavi and Caroline Waij in particular. Arjen van Deutekom, for always being a good listener and a welcome source of interesting discussions, good advice, and comic relief. The moo team, for being somewhat of a home to me, even if virtual. Especially Oliver [Redacted] and Loren Segal, for enduring all my stories about work frustra- tion, helping me out with a few important issues, and providing many distractions. My talented sister, Eva Dienske, who always pushes me to get the most out of myself, and whose work I am proud to have on the cover of this thesis. My parents, Jaap van Moolenbroek and Joke Putters, for their undying support, encouragement, understanding, and love. Finally, I would like to thank the members of my reading committee: Herbert Bos, Cristiano Giuffrida, Jorrit Herder, Spyros Voulgaris, and Carsten Weinhold, who have taken the time to read my thesis and provide valuable feedback. David van Moolenbroek Hilversum, The Netherlands, June 2016 Contents Acknowledgments vii Contents ix 1 General Introduction 1 1.1 Problems . 3 1.2 Research approach and questions . 5 1.3 Research overview . 7 1.3.1 Loris: a new storage stack arrangement . 7 1.3.2 The platform . 9 1.3.3 Improving the reliability of Loris . 10 1.4 Contributions and thesis outline . 12 2 Loris - A Dependable, Modular, File-Based Storage Stack 15 2.1 Introduction . 16 2.2 Problems with the Traditional Storage Stack . 17 2.2.1 Reliability . 17 2.2.2 Flexibility . 19 2.2.3 Heterogeneity Issues . 20 2.3 Solutions Proposed in the Literature . 20 2.4 The Design of Loris . 21 2.4.1 The Physical Layer . 22 2.4.2 The Logical Layer . 25 2.4.3 The Cache Layer . 26 2.4.4 The Naming Layer . 27 2.5 The Advantages of Loris . 28 ix x CONTENTS 2.5.1 Reliability . 28 2.5.2 Flexibility . 29 2.5.3 Heterogeneity . 30 2.6 Evaluation . 30 2.6.1 Test Setup . 31 2.6.2 Evaluating Reliability and Availability . 31 2.6.3 Performance Evaluation . 35 2.7 Conclusion . 37 3 Integrated System and Process Crash Recovery in the Loris Storage Stack 39 3.1 Introduction . 40 3.2 Background: the Loris storage stack . 41 3.2.1 Layers of the stack . 42 3.3 The case for integrated recovery . 43 3.3.1 Recovering from system crashes . 43 3.3.2 Recovering from process crashes . 45 3.3.3 Integrated recovery . 45 3.4 Checkpointing . 46 3.4.1 The TwinFS file store . 46 3.4.2 General consistency scheme requirements . 48 3.4.3 Taking and reloading checkpoints . 49 3.5 Data resynchronization . 49 3.5.1 Limiting the areas to scan . 50 3.5.2 Verifying data . 50 3.5.3 The TwinFS resynchronization log . 51 3.5.4 Resynchronization procedure . 51 3.6 In-memory roll-forward logging . 52 3.6.1 Interaction with checkpointing . 52 3.6.2 Logging and replay . 53 3.6.3 Assumptions and guarantees . 55 3.7 Evaluation . 55 3.7.1 Performance evaluation . 55 3.7.2 Reliability evaluation . 57 3.8 Related work . 58 3.8.1 System crash recovery . 58 3.8.2 Process crash recovery . 59 3.9 Conclusion and future work . 60 4 Battling Bad Bits with Checksums in the Loris Page Cache 61 4.1 Introduction . 62 4.2 Background: the Loris stack . 63 4.3 The case for checksumming in the cache . 64 CONTENTS xi 4.3.1 Memory errors . 64 4.3.2 Software bugs . 66 4.4 Dealing with memory errors . 67 4.4.1 Suitability of on-disk checksums . 67 4.4.2 Propagation of checksums . 68 4.4.3 Verification strategies . 68 4.4.4 Other memory . 69 4.5 Dealing with software bugs . 70 4.5.1 Assumptions . 71 4.5.2 The Dirty State Store . 71 4.5.3 Checksumming dirty pages . 72 4.5.4 Recovery procedure . 73 4.5.5 Consequences for memory errors . 73 4.6 Implementation . 74 4.7 Evaluation . 74 4.7.1 Microbenchmarks . 74 4.7.2 Macrobenchmarks . 75 4.7.3 Fault injection . 79 4.8 Related work . 80 4.8.1 Memory errors . 80 4.8.2 Software bugs . 80 4.9 Conclusion . 81 5 Transaction-based Process Crash Recovery of File System Namespace Modules 83 5.1 Introduction . 84 5.2 Motivation . 85 5.2.1 Namespace modules as an emerging concept . 85 5.2.2 The reliability problem . 88 5.3 Design . 89 5.3.1 Assumptions . 89 5.3.2 Transactions and recovery . 90 5.3.3 Support in the object storage layer . 91 5.3.4 Support in the VFS layer . 92 5.3.5 Requirements for namespace modules . 92 5.4 Implementation . 93 5.4.1 Background: the Loris storage stack . 93 5.4.2 Infrastructure changes . 95 5.4.3 Case study: the POSIX namespace module . 95 5.4.4 Case study: the HDF5 namespace module . 97 5.5 Evaluation . 98 5.5.1 Performance . 98 5.5.2 Reliability . 101 xii CONTENTS 5.6 Related work . 102 5.7 Conclusion and future work . 103 6 Towards a Flexible, Lightweight Virtualization Alternative 105 6.1 Introduction . ..
Recommended publications
  • Free Software Philosophy, History and Practice
    Introduction (and some quick reminders) History and philosophy Legal aspects Free Software Philosophy, history and practice Luca Saiu [email protected] http://ageinghacker.net GNU Project Screencast version Paris, October 2014 Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Introducing myself I’m a computer scientist living and working somewhere around Paris... ...and a GNU maintainer. I’m also an associate member of the Free Software Foundation, a fellow of the Free Software Foundation Europe and an April adherent. So I’m not an impartial observer. Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Contents 1 Introduction (and some quick reminders) 2 History and philosophy The hacker community The GNU Project and the Free Software movement Linux and the Open Source movement 3 Legal aspects Copyright Free Software licenses Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Introduction (and some quick reminders) History and philosophy Legal aspects Reminders about software — source code vs. machine code Source code vs. machine code Quick demo Luca Saiu <[email protected]> Free Software — Philosophy, history and practice Programs are linked to libraries static libraries shared libraries Libraries (or programs) request services to the kernel Programs invoke with other programs Programs communicate with other programs... ...on the same machine ...over the network We’re gonna see that this has legal implications. Introduction (and some quick reminders) History and philosophy Legal aspects Reminders about software — linking In practice, programs don’t exist in isolation.
    [Show full text]
  • The Flask Security Architecture: System Support for Diverse Security Policies
    The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David Andersen, Jay Lepreau University of Utah http://www.cs.utah.edu/flux/flask/ Abstract and even many types of policies [1, 43, 48]. To be gen- erally acceptable, any computer security solution must Operating systems must be flexible in their support be flexible enough to support this wide range of security for security policies, providing sufficient mechanisms for policies. Even in the distributed environments of today, supporting the wide variety of real-world security poli- this policy flexibility must be supported by the security cies. Such flexibility requires controlling the propaga- mechanisms of the operating system [32]. tion of access rights, enforcing fine-grained access rights and supporting the revocation of previously granted ac- Supporting policy flexibility in the operating system is cess rights. Previous systems are lacking in at least one a hard problem that goes beyond just supporting multi- of these areas. In this paper we present an operating ple policies. The system must be capable of supporting system security architecture that solves these problems. fine-grained access controls on low-level objects used to Control over propagation is provided by ensuring that perform higher-level functions controlled by the secu- the security policy is consulted for every security deci- rity policy. Additionally, the system must ensure that sion. This control is achieved without significant perfor- the propagation of access rights is in accordance with mance degradation through the use of a security decision the security policy.
    [Show full text]
  • Bushnell Family Genealogy, 1945
    BUSHNELL FAMILY GENEALOGY Ancestry and Posterity of FRANCIS BUSHNELL (1580 - 1646) of Horsham, England And Guilford, Connecticut Including Genealogical Notes of other Bushnell Families, whose connections with this branch of the family tree have not been determined. Compiled and written by George Eleazer Bushnell Nashville, Tennessee 1945 Bushnell Genealogy 1 The sudden and untimely death of the family historian, George Eleazer Bushnell, of Nashville, Tennessee, who devoted so many years to the completion of this work, necessitated a complete change in its publication plans and we were required to start anew without familiarity with his painstaking work and vast acquaintance amongst the members of the family. His manuscript, while well arranged, was not yet ready for printing. It has therefore been copied, recopied and edited, However, despite every effort, prepublication funds have not been secured to produce the kind of a book we desire and which Mr. Bushnell's painstaking work deserves. His material is too valuable to be lost in some library's manuscript collection. It is a faithful record of the Bushnell family, more complete than anyone could have anticipated. Time is running out and we have reluctantly decided to make the best use of available funds by producing the "book" by a process of photographic reproduction of the typewritten pages of the revised and edited manuscript. The only deviation from the original consists in slight rearrangement, minor corrections, additional indexing and numbering. We are proud to thus assist in the compiler's labor of love. We are most grateful to those prepublication subscribers listed below, whose faith and patience helped make George Eleazer Bushnell's book thus available to the Bushnell Family.
    [Show full text]
  • AHS 02 02 Content 20140102
    Advances in Historical Studies, 2013, 2, 19-104 Published Online June 2013 in SciRes (http://www.scirp.org/journal/ahs/) TABLE OF CONTENTS Volume 2 Number 2 June 2013 Letter from Chief-Managing Editorial Staff ARTICLES The Roots of the Theoretical Models of the Nanotechnoscience in the Electric Circuit Theory V. Gorokhov……………………………………………………………..…………………………………………………………………………19 Reflections on the Scientific Conceptual Streams in Leonardo da Vinci and His Relationship with Luca Pacioli R. Pisano……………………………………………………………………………………………………………………………………………32 Reclaiming Realism for the Left: Gar Alperovitz and the Decision to Use the Atomic Bomb P. N. Kirstein……………………………………………………………………………………………………………………….………………46 MISCELLANEA Megalithism and Tribal Ritualism: A Passage through the Kurumbas of Attappadi M. Poyil…………………………………………………………………………………………………………………………………….………54 Temple as the Site of Struggle: Social Reform, Religious Symbols and the Politics of Nationalism in Kerala M. R. Manmathan……………………………………………………………………………………………………………..……………………57 Communities Inferred from the Books of Samuel in the Old Testament of the Bible W. Hu………………………………………………………………………………………………………………………………………………70 Les Châteaux de Landiras et de Montferrand and Their Seigneurial Families D. A. Bailey………………………………………………………………………………………………………...………………………………81 ESSAY REVIEW Borderland Theory as a Conceptual Framework for Comparative Local US and Canadian History C. Parham…………………………………………………………………………………………………………………………..………………94 Jacket: L’histoire comme images d’autres mondes [The history as images
    [Show full text]
  • The Flask Security Architecture: System Support for Diverse Security Policies
    The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David Andersen, Jay Lepreau University of Utah http://www.cs.utah.edu/flux/flask/ Abstract and even many types of policies [1, 43, 48]. To be gen­ erally acceptable, any computer security solution must Operating systems must be flexible in their support be flexible enough to support this wide range of security for security policies, providing sufficient mechanisms for policies. Even in the distributed environments of today, supporting the wide variety of real-world security poli­ this policy flexibility must be supported by the security cies. Such flexibility requires controlling the propaga­ mechanisms of the operating system [32]. tion of access rights, enforcing fine-grained access rights and supporting the revocation of previously granted ac­ Supporting policy flexibility in the operating system is cess rights. Previous systems are lacking in at least one a hard problem that goes beyond just supporting multi­ of these areas. In this paper we present an operating ple policies. The system must be capable of supporting system security architecture that solves these problems. fine-grained access controls on low-level objects used to Control over propagation is provided by ensuring that perform higher-level functions controlled by the secu­ the security policy is consulted for every security deci­ rity policy. Additionally, the system must ensure that sion. This control is achieved without significant perfor­ the propagation of access rights is in accordance with mance degradation through the use of a security decision the security policy.
    [Show full text]
  • Skripsi Perbandingan General Public License Pada Linux Menurut Ketentuan Undang
    SKRIPSI PERBANDINGAN GENERAL PUBLIC LICENSE PADA LINUX MENURUT KETENTUAN UNDANG – UNDANG HAK CIPTA INDONESIA DAN AMERIKA SERIKAT THE LEGAL COMPARISON OF GENERAL PUBLIC LICENSE TERMS IN LINUX ACCORDING TO INDONESIA AND UNITED STATES OF AMERICA COPYRIGHT ACT DIKA BIMANSTARA NIM. 080710101062 KEMENTERIAN PENDIDIKAN DAN KEBUDAYAAN UNIVERSITAS JEMBER FAKULTAS HUKUM 2013 i SKRIPSI PERBANDINGAN GENERAL PUBLIC LICENSE PADA LINUX MENURUT KETENTUAN UNDANG – UNDANG HAK CIPTA INDONESIA DAN AMERIKA SERIKAT THE LEGAL COMPARISON OF GENERAL PUBLIC LICENSE TERMS IN LINUX ACCORDING TO INDONESIA AND UNITED STATES OF AMERICA COPYRIGHT ACT DIKA BIMANSTARA NIM. 080710101062 KEMENTERIAN PENDIDIKAN DAN KEBUDAYAAN UNIVERSITAS JEMBER FAKULTAS HUKUM 2013 ii MOTTO SCIENTIA EST LUX LUCIS ILMU PENGETAHUAN ADALAH PENCERAHAN (LEONARDO DA VINCI) iii PERSEMBAHAN Skripsi ini Penulis persembahkan kepada : 1. Ayahanda Budi Suwardi dan Ibunda Septiani tercinta, yang telah membesarkan penulis dengan penuh rasa kasih sayang, serta tiada hentinya selalu memberikan semangat dan mendo’akan penulis untuk bisa menyelesaikan Skripsi ini. 2. Alma Mater tercinta Fakultas Hukum Universitas Jember yang selalu saya banggakan. 3. Bapak dan Ibu Guru sejak penulis duduk dibangku TK sampai dengan SMA, serta Bapak dan Ibu Dosen yang telah memberikan ilmu dan bimbingan dengan penuh kesabaran. 4. Kedua adik penulis, Banu Tito Raharjo, dan Adik Tri Egy Yudho Yunantoro yang saya sayangi, yang telah menyertai, memberi saya semangat, dukungan, dan hari-hari yang penuh warna saat-saat kita berkumpul bersama dirumah. iv PERBANDINGAN GENERAL PUBLIC LICENSE PADA LINUX MENURUT KETENTUAN UNDANG – UNDANG HAK CIPTA INDONESIA DAN AMERIKA SERIKAT THE LEGAL COMPARISON OF GENERAL PUBLIC LICENSE TERMS IN LINUX ACCORDING TO INDONESIA AND UNITED STATES OF AMERICA COPYRIGHT ACT SKRIPSI Diajukan sebagai salah satu syarat memperoleh gelar Sarjana Hukum pada Fakultas Hukum Universitas Jember DIKA BIMANSTARA NIM.
    [Show full text]
  • The GNU Hurd
    The GNU Hurd [Extended Abstract] Gael¨ Le Mignot ABSTRACT speak of, say, storage devices, there are IDE disks, This is an abstract of the talk given at LSM 2005, about the SCSI disks, floppy disks, tapes, USB devices, FireWire GNU Hurd, its goals, its design, its features and its relation- devices, parallel port devices, ... should every program ship with the GNU project. This is a general presentation know how to put into motion the floppy disk engine ? of the GNU Hurd, mostly on technical aspects. Providing an hardware abstraction layer is one of the major goals of operating systems. 1. INTRODUCTION Resource sharing. Resources on a computer are limited. 1.1 What is an operating system ? Be it main memory, CPU power, hard disk storage, 1.1.1 Historical point of view screen area, networking connection, or sound output, The first computers were so expensive that only one existed those resources must be controlled by a supervisor pro- for a whole university or research department; and so slow gram, allowing each of the programs to access to a part that it was unthinkable to interact with it in real time. This of it as needed. was the era of batch processing, when programmers cre- ated self-running programs called “batch”. Those programs Security infrastructure. All modern operating systems usually took several hours to run, printing huge listing as can enforce several kinds of security. Security can be output. Programs were run one after the other. used to prevent a user from accessing confidential or private data of another user, to prevent accidental re- Then, computers became more efficient.
    [Show full text]
  • A Contemporary Exploration of Canadian Political Poetry in English
    POETS ON THE HILL POETS ON THE HILL: A CONTEMPORARY EXPLORATION OF CANADIAN POLITICAL POETRY IN ENGLISH By NICOLAS DESROCHES, HONOURS B.A. A Thesis Submitted to the School of Graduate Studies in Partial Fulfilment of the Requirements for the Degree Master of Arts McMaster University © Copyright by Nicolas DesRoches, September 2013 McMaster University MASTER OF ARTS (2013) Hamilton, Ontario (English) TITLE: Poets on the Hill: A Contemporary Exploration of Canadian Political Poetry in English AUTHOR: Nicolas DesRoches, Honours B.A. (York University) SUPERVISOR: Professor Jeffery Donaldson NUMBER OF PAGES: vii, 124 ii Abstract In this thesis, I investigate Canadian poetry that is explicitly about the political (politicians, political parties, or political policies) written in English. As no research of this type has occurred previously, I begin by defining political poetry and its aims in Canada and then progress through an examination of three collections of poetry and one poem: The Blasted Pine ; Howl Too, Eh?; and Rogue Stimulus . This allows for a comprehensive look at how political poetry has evolved in Canada from a pointed and critical genre that aims to mock and argue to a more subtle, playful genre that utilizes parody and wit. It also demonstrates the evolution and complication of voice in political poetry, given that each poem contains not only the voice of the poet and the speaker, but also the public and the political. I argue that political poetry in Canada is not poetry as dissent, protest, or witness, but rather poetry as inquiry/commission (in the political sense). This definition relies on the fact that Canadian political poetry seeks to ascribe accountability for political actions and decisions and utilizes the poet as spokesperson, speaking for the public to the political (and the public in turn).
    [Show full text]
  • End of the First-Wave Free Software Movement
    End of the first-wave free software movement. Camille Akmut September 20, 2019 Abstract A contemporaneous account. 1 Many movements have gone through the events that free software is currently going through : feminism (I’m not entirely sure what wave we’re currently in, that is to say they have been many), Marxism (Marx and Engels, followed by Lenin…), etc. Usually these transitions happen with the death - physical or symbolic - of their founders or leaders. But, in none of these cases this meant the end of these movements. New leaders emerged soon. This was not always for the best… At times their ideas were re-invigorated, at others corrupted. And, we have known one too many philosophers who published strange books, such as to show that “Socialism and capitalism” (an actual title of a book) could be reconciled… Already, some of these self-proclaimed thought leaders have in fact emerged in the case of free software : already they want to convince us that free software and the corporate ideology of “open source” are fully compatible and finally ready to be merged. Like Matt Lee, who will know here is hour of glory and who has been furiously at work on social media these last days. 20 years in the orbit of a superior though singular intellect broke him : he can’t be blamed and he should be allowed to live out his anger a little longer… But, is this really the first-wave, or is the current one already the second or third? Hard to say — so close to the events.
    [Show full text]
  • Projects on the Move
    Free Software Projects COMMUNITY An up-to-date overview of free software and its makers Projects on the Move Free software covers such a diverse range of utilities, applications and other assorted projects, that it can be hard to find the perfect tool from all that programming effort.We pick the best of the bunch for you. In this issue:The Windows NT clone ReactOS, Software in the Public Ro Interest and trouble at GNU Hurd. nald Raefle, visipix.com BY MARTIN LOSCHWITZ his issue looks at the ReactOS developers aim to provide a large range concentrate on a Windows NT clone. operating system which looks set of interfaces for various APIs. For exam- FreeWin95 became ReactOS. They also Tto become a major desktop con- ple, there are moves to support the direct reached another fundamental decision: tender. We will also be looking into execution of Java programs. In addition, to concentrate on creating working code, “Software in the Public Interest” and subsystems for OS/2 and DOS programs rather than those endless discussions. reporting on the ousting of the Hurd are planned. After this, ReactOS went quiet for a maintainer, Thomas Bushnell. The ReactOS project now has a tar whole year. Not because the team mem- archive with the operating system kernel bers had broken their resolutions, but ReactOS sources, and ISO images, on its website, because they were all heavily involved in Linux users occasionally need to run but it hasn’t been easy going. The pro- creating a kernel and a set of major dri- Windows programs on Linux.
    [Show full text]
  • Structural Interactions Between the Α3β1 Integrin and Mmp-2: a Potential Functional Role in Cell Adhesion
    Virginia Commonwealth University VCU Scholars Compass Theses and Dissertations Graduate School 2009 STRUCTURAL INTERACTIONS BETWEEN THE Α3Β1 INTEGRIN AND MMP-2: A POTENTIAL FUNCTIONAL ROLE IN CELL ADHESION James Bowman Virginia Commonwealth University Follow this and additional works at: https://scholarscompass.vcu.edu/etd Part of the Nervous System Commons © The Author Downloaded from https://scholarscompass.vcu.edu/etd/1861 This Dissertation is brought to you for free and open access by the Graduate School at VCU Scholars Compass. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of VCU Scholars Compass. For more information, please contact [email protected]. School of Medicine Virginia Commonwealth University This is to certify that the dissertation prepared by James Russell Bowman, III entitled STRUCTURAL INTERACTIONS BETWEEN THE Α3Β1 INTEGRIN AND MMP-2: A POTENTIAL FUNCTIONAL ROLE IN CELL ADHESION has been approved by his or her committee as satisfactory completion of the dissertation requirement for the degree of Doctor of Philosophy David G. Simpson, Ph.D., School of Medicine John W. Bigbee, Ph.D., School of Medicine Robert F. Diegelmann, Ph.D School of Medicine Helen Fillmore, Ph.D., School of Medicine Babette Fuss, Ph.D., School of Medicine John T. Povlishock, Ph.D., Department Chair, Department of Anatomy and Neurobiology Jerome Strauss, M.D. Ph.D., Dean, School of Medicine Dr. F. Douglas Boudinot, Dean of the Graduate School July 16, 2009 James Russell Bowman, III, 2009 All Rights Reserved STRUCTURAL INTERACTIONS BETWEEN THE Α3Β1 INTEGRIN AND MMP-2: A POTENTIAL FUNCTIONAL ROLE IN CELL ADHESION A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at Virginia Commonwealth University.
    [Show full text]
  • GNU Hurd Workshop
    Indian GNU/Linux Users' Group, Chennai (ILUGC) presents GNU Hurd Workshop conducted by Shakthi Kannan , MS Venue Madras Institute of Technology, Chennai Introduction Free software ✔ Free software licenses ✔ Freedom from software patents ✔ User freedom Richard M Stallman “The Danger of Software Patents” (IIT-Madras) http://www.chennailug.org/meeting/info/TheDangerOfSWPatent1of2.ogg http://www.chennailug.org/meeting/info/TheDangerOfSWPatent2of2.ogg http://www.cs.iitm.ernet.in/~ramk/stallman.wav GNU Hurd Overview ➔ Multi-server ➔ POSIX compliant ➔ User extensible system framework ➔ Top of GNU Mach microkernel GNU Hurd History 1983 GNU Project started by Richard Stallman 1988 Decision made to use Mach 3.0 as the kernel 1991 Mach 3.0 is released under compatible license 1991 Thomas Bushnell, BSG, starts the Hurd project 1994 The Hurd boots the first time 1997 Version 0.2 of the Hurd is released 1998 Debian hurd-i386 archive is created 2001 Debian GNU/Hurd snapshot three CD images GNU Hurd Kernel Architectures Monolithic Microkernels ● Device drivers ● Resource management ● Network protocols ● Task management ● Process ● IPC management ● Basic hardware support ● Authentication ● File systems ● Scheduling GNU Hurd Single/Multi-server models Single-server Multi-server ● Single task ● Multiple tasks ● Comparable to ● Cooperative monolithic kernel ● Responsibilities distributed logically ● Stability ● Scalability GNU Hurd GNU Hurd allows users to: ➔ write and run their own servers ➔ replace system servers dynamically with their own implementations
    [Show full text]