Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference

Total Page:16

File Type:pdf, Size:1020Kb

Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference USENIX Association Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference San Antonio, Texas, USA June 9-14, 2003 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION © 2003 by The USENIX Association All Rights Reserved For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. X Window System Network Performance Keith Packard Cambridge Research Laboratory, HP Labs, HP [email protected] James Gettys Cambridge Research Laboratory, HP Labs, HP [email protected] Abstract havior (or on a local machine, context switches between the application and the X server). Performance was an important issue in the develop- One of the authors used the network visualization tool ment of X from the initial protocol design and contin- when analyzing the design of HTTP/1.1 [NGBS 97]. ues to be important in modern application and extension The methodology and tools used in that analysis in- development. That X is network transparent allows us volved passive packet level monitoring of traffic which to analyze the behavior of X from a perspective seldom allowed precise real-world measurements and compar- possible in most systems. We passively monitor network isons. The work described in this paper combines this packet flow to measure X application and server perfor- passive packet capture methodology with additional X mance. The network simulation environment, the data protocol specific analysis and visualization. Our experi- capture tool and data analysis tools will be presented. ence with this combination of the general technique with Data from this analysis are used to show the performance X specific additions was very positive and we believe impact of the Render extension, the limitations of the provides a powerful tool that could be used in the analy- LBX extension and help identify specific application and sis of other widely used protocols. toolkit performance problems. We believe this analysis With measurement tools in hand, we set about char- technique can be usefully applied to other network pro- acterizing the performance of a significant selection of tocols. X applications based on a range of toolkits and using 1 Introduction a variety of different implementation techniques. We are specifically interested in the effects of the Render The X Window System [SG92] was designed to of- extension’s [Pac01] approach to text, and whether the fer good performance over campus area networks for optimizations offered by the Low Bandwidth X (LBX) machines and applications in common use in the late extension [FK93] [Pac94] were of any use. Specific ap- 1980’s. A major part of the version 11 protocol design plication performance issues were also discovered and was to reduce the effect of network latency and band- forwarded to the relevant open source projects. width on application performance and correctness ob- served in analysis of X10 programs. Resource ID al- 2 Measuring X Performance location was moved to the client applications to elim- inate synchronous resource creation. Synchronous de- The measurements taken span a range of applications, vice grabs were added to provide correct operation of network characteristics and protocol compression tech- user interfaces when the user could manipulate input de- niques. vices faster than the applications could respond. The 2.1 Selecting Test Applications selection mechanism was added to provide a uniform cut&paste model while delaying and optimizing the un- An attempt was made to select applications representa- derlying bulk data transfer. Experience over the last 15 tive of modern X usage. Reasonably current versions of years has shown that further work in this area is possible each application were selected from the Debian Linux and desirable. distribution. One advantage of the passive monitoring There has previously never been packet level research technique is the ability to monitor several applications capturing and analyzing the actual network characteris- simultaneously and measure the performance of the col- tics of X applications. The best tools available have been lection as they interact on the network. This permits the dumps of proxy servers showing requests and responses, analysis of session startup sequences where many appli- with no direct correlation with the actual packet level re- cations are competing for resources. quests/responses and timing that determine network be- The following applications were measured in this ini- USENIX Association FREENIX Track: 2003 USENIX Annual Technical Conference 207 tial work LBX was an effort to improve performance over low- Mozilla (version 1.3); Web browser with client-side speed/high-latency links. A significant amount of that fonts, imaging the microscape synthetic web page work was focused on reducing latency effects of slow developed for the HTTP/1.1 performance work links without modifying applications. Another major Mozilla (version 1.3); Web browser with server- part of the work was in creating custom encodings of side fonts, imaging the microscape synthetic web X data to reduce the bandwidth required. The latency page developed for the HTTP/1.1 performance efforts focused on problems seen when LBX was being work designed. How well those efforts carry forward to mod- Kedit (Version 1.3) simple text editor based on the ern applications is explored in this paper. Qt toolkit More recently, network proxy support has been Nautilus (Version 2.2.2) file browser based on the added to the SSH [BS01] protocol enabling X con- GTK+ toolkit nections to be forwarded through a secure and option- KDE Session (Version 3.1) full KDE session ally compressed connection. SSH has no X-specific re- startup. encoding or compression techniques, it simply uses the Gzip [Gai93] compression technique on the datastream 2.1.1 Mozilla and Fonts when compression is enabled. Because of the rapid uptake of client-side fonts in appli- Measurements using raw X protocol as well as X run cation development, Mozilla was the only current appli- through both of these proxies show their effectiveness in cation available that supports both core and client-side improving performance. fonts in the same version. The current Debian Mozilla package provides an alternate version of the key drawing 3 Passive Network Analysis library that controls access to fonts; the only change in In the past, ethernet data monitoring required very little the Mozilla configuration required to select which style equipment; any host could trivially monitor traffic on the of fonts to use is to replace this library with the appropri- wire from any other host by placing the ethernet hard- ate version. This limits the changes as much as possible ware in promiscuous mode. Such is not the case today; which should make the resulting measurements an ac- twisted pair ethernet performance depends on switched curate representation of the difference between the two connections to provide a collision free link between the techniques. two endpoints. The easiest way to monitor the network is to capture packets on one end of the connection. While 2.1.2 KDE Session and LBX this may consume some CPU resources, the overhead is The XFree86 4.3 releases of the LBX extension and minimal given modern machine performance. Alterna- proxy are faulty, causing the KDE session to hang about tively, a “man in the middle” machine can be used to halfway through the startup process. Some modest at- capture packet traces between client and server. There tempts to discover the problem did not yield any results are also network switches which can mirror traffic from and so those values don’t appear in the resulting graphs. one port to another, but a single connection cannot reli- ably hold traffic from a full-duplex link and so packets 2.2 Network Performance Characteristics might be lost or packet ordering scrambled. For either For this study, one goal was to measure the performance host-based technique, systems are now fast enough that impact of latency vs. bandwidth, and so a set of la- it is possible to capture all packets in most applications tency and bandwidth values were used and each test without drops. We chose to capture packets on the X run with every pair of latency and bandwidth. The five client end of the network approach as the network sim- bandwidths used were 100Mb, 10Mb, 1Mb, 100Kb and ulator caused problems with capture at the router. The 10Kb. The four latencies used were 0.1ms, 1ms, 10ms passive capture configuration can be see in Figure 1. and 100ms. These latencies represent the time for a packet to traverse through the router in one direction, 3.1 Network Data Capture and so a round trip time would be at least twice that To minimize the impact of disk activity on the network value. monitoring process, the packet capture tool provides minimal information about each network event that is 2.3 X Protocol Encoding seen in the protocol trace. Each trace record is times- The X protocol was originally designed to run effi- tamped with that captured by the kernel packet logging ciently over the campus area networks available in the facility which provides kernel-level timestamping accu- late 1980’s, which ran at 10Mb/second. As modem per- rate to well under a millisecond. The capture application formance improved in the early 1990’s it became almost is run at nice -20 which has proven sufficient to avoid feasible to run X applications over dial-up links. packet loss. 208 FREENIX Track: 2003 USENIX Annual Technical Conference USENIX Association 3.2 Simulating Network Conditions X client X client X client The NISTNet package [Gro00] converts a Linux ma- chine into a network emulator capable of simulating a wide variety of network conditions.
Recommended publications
  • X Window System Network Performance
    X Window System Network Performance Keith Packard Cambridge Research Laboratory, HP Labs, HP [email protected] James Gettys Cambridge Research Laboratory, HP Labs, HP [email protected] Abstract havior (or on a local machine, context switches between the application and the X server). Performance was an important issue in the develop- One of the authors used the network visualization tool ment of X from the initial protocol design and contin- when analyzing the design of HTTP/1.1 [NGBS 97]. ues to be important in modern application and extension The methodology and tools used in that analysis in- development. That X is network transparent allows us volved passive packet level monitoring of traffic which to analyze the behavior of X from a perspective seldom allowed precise real-world measurements and compar- possible in most systems. We passively monitor network isons. The work described in this paper combines this packet flow to measure X application and server perfor- passive packet capture methodology with additional X mance. The network simulation environment, the data protocol specific analysis and visualization. Our experi- capture tool and data analysis tools will be presented. ence with this combination of the general technique with Data from this analysis are used to show the performance X specific additions was very positive and we believe impact of the Render extension, the limitations of the provides a powerful tool that could be used in the analy- LBX extension and help identify specific application and sis of other widely used protocols. toolkit performance problems. We believe this analysis With measurement tools in hand, we set about char- technique can be usefully applied to other network pro- acterizing the performance of a significant selection of tocols.
    [Show full text]
  • Setting up Horizon 7 for Linux Desktops
    Setting Up Horizon 7 for Linux Desktops SEP 2019 VMware Horizon 7 7.10 Setting Up Horizon 7 for Linux Desktops You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to [email protected] VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2016-2019 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Setting Up Horizon 7 for Linux Desktops 6 1 Features and System Requirements 7 Features of Horizon Linux Desktops 7 Overview of Configuration Steps for Horizon 7 for Linux Desktops 13 System Requirements For Horizon 7 for Linux 14 Virtual Machine Settings for 2D Graphics 23 Configuring Session Collaboration on Linux Desktops 23 2 Preparing a Linux Virtual Machine for Desktop Deployment 26 Create a Virtual Machine and Install Linux 26 Prepare a Linux Machine for Remote Desktop Deployment 27 Install Dependency Packages for Horizon Agent 29 3 Setting Up Active Directory Integration for Linux Desktops 31 Integrating Linux with Active Directory 31 Use the OpenLDAP Server Pass-Through Authentication 32 Set Up SSSD LDAP Authentication Against the Microsoft Active Directory 32 Use the Winbind Domain Join Solution 32 Configure PowerBroker Identity Services Open (PBISO) Authentication 33 Configure the Samba Offline Domain Join 34 Use the Realmd Join Solution for RHEL 8 36 Setting Up Single Sign-On 37 Setting Up Smart Card Redirection 38 Integrate a RHEL 8 Desktop
    [Show full text]
  • ULTRIX and UWS Version 4.3
    ULTRIX and UWS Version 4.3 Release Notes Part Number: AA-ME85H-TE ULTRIX and UWS Version 4.3 Release Notes Order Number: AA-ME85H-TE August 1992 Product Version: ULTRIX and ULTRIX Worksystem Software (UWS) Version 4.3 This manual lists new features and changes to the ULTRIX and UWS products. It also discusses product software and documentation problems. digital equipment corporation Maynard, Massachusetts Restricted Rights: Use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013. © Digital Equipment Corporation 1992 All rights reserved. Portions of the information herein are derived from copyrighted material as permitted under license agreements with AT&T and the Regents of the University of California. © AT&T 1979, 1984. All Rights Reserved. Portions of the information herein are derived from copyrighted material as permitted under a license agreement with Sun MicroSystems, Inc. © Sun MicroSystems, Inc, 1985. All Rights Reserved. Portions of this document © Massachusetts Institute of Technology, Cambridge, Massachusetts, 1984, 1985, 1986, 1988. The information in this document is subject to change without notice and should not be construed as a commitment by Digital Equipment Corporation. Digital Equipment Corporation assumes no responsibility for any errors that may appear in this document. The software described in this document is furnished under a license and may be used or copied only in accordance with the terms of such license. No responsibility is assumed for the use or reliability of software on equipment that is not supplied by Digital or its affiliated companies.
    [Show full text]
  • Solaris X Window System Reference Manual
    Solaris X Window System Reference Manual Sun Microsystems, Inc. 2550 Garcia Avenue Mountain View, CA 94043 U.S.A. 1995 Sun Microsystems, Inc., 2550 Garcia Avenue, Mountain View, California 94043-1100 USA. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Portions of this product may be derived from the UNIX system, licensed from UNIX System Laboratories, Inc., a wholly owned subsidiary of Novell, Inc., and from the Berkeley 4.3 BSD system, licensed from the University of California. Third- party software, including font technology in this product, is protected by copyright and licensed from Sun's Suppliers. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. The product described in this manual may be protected by one or more U.S. patents, foreign patents, or pending applications. TRADEMARKS Sun, Sun Microsystems, the Sun logo, SunSoft, the SunSoft logo, Solaris, SunOS, OpenWindows, DeskSet, ONC, ONC+, and NFS are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. OPEN LOOK is a registered trademark of Novell, Inc.
    [Show full text]
  • Securing the X Window System with Selinux Doug Kilpatrick NAI Labs [email protected]
    Securing The X Window System With SELinux Doug Kilpatrick NAI Labs [email protected] Wayne Salamon NAI Labs [email protected] Chris Vance NAI Labs [email protected] This work supported by NSA contract MDA904-01-C-0926 (SELinux) Initial: January 2003, Last revised: March 2003 NAI Labs Report #03-006 Table of Contents 1. Introduction............................................................................................................................................2 2. Overview of the X Architecture............................................................................................................3 3. Threats and Security Concerns ............................................................................................................4 3.1. Confidentiality.............................................................................................................................4 3.2. Integrity.......................................................................................................................................5 3.3. Availability..................................................................................................................................5 3.4. Assurance ....................................................................................................................................5 3.5. Covert Channels ..........................................................................................................................5 4. Requirements .........................................................................................................................................6
    [Show full text]
  • Linux Virtual Delivery Agent 7.12
    Linux Virtual Delivery Agent 7.12 Jan 25, 2017 This pdf file includes the Linux Virtual Delivery Agent 7.12 documentation. You can save a local copy of this file and use it offline. Use the built-in Search and Bookmark features to find what you need. You can create Linux virtual desktops and applicat ions based on a RedHat , CentOS, SUSE or Ubunt u distributions. Prepare your Linux virt ual machines, install the new sof tware on them, configure your Delivery Cont roller, and then use Studio to make the desktops and applicat ions available to users. https://docs.citrix.com © 1999-2017 Citrix Systems, Inc. All rights reserved. p.1 What's New Feb 06, 2017 The following new and enhanced features are part of this release of the Linux VDA. This release provides support for Xauthority. With this functionality, cookie-based access for X Window authorization is now supported by the Linux VDA. For more information, see Configure Xauthority. Tip The Xauthority file can be found in the logon user’s home directory, and is used to store credentials in cookies that are used by xauth for the authentication of X sessions. Once an X session is launched, the cookie is used to authenticate connections to that specific display. This release provides support for IPv6. With this support, the 128-bit addressing schema is now extended to the Linux VDA. For more information, see Configure IPv6. Support for secure LDAP (LDAPS) is implemented in this version of the Linux VDA. With this support, you can enable the Secure Lightweight Directory Access Protocol for your Active Directory managed domains to provide communication over SSL (Secure Socket Layer)/TLS (Transport Layer Security).
    [Show full text]
  • Free and Open Source Software
    Free and open source software Copyleft ·Events and Awards ·Free software ·Free Software Definition ·Gratis versus General Libre ·List of free and open source software packages ·Open-source software Operating system AROS ·BSD ·Darwin ·FreeDOS ·GNU ·Haiku ·Inferno ·Linux ·Mach ·MINIX ·OpenSolaris ·Sym families bian ·Plan 9 ·ReactOS Eclipse ·Free Development Pascal ·GCC ·Java ·LLVM ·Lua ·NetBeans ·Open64 ·Perl ·PHP ·Python ·ROSE ·Ruby ·Tcl History GNU ·Haiku ·Linux ·Mozilla (Application Suite ·Firefox ·Thunderbird ) Apache Software Foundation ·Blender Foundation ·Eclipse Foundation ·freedesktop.org ·Free Software Foundation (Europe ·India ·Latin America ) ·FSMI ·GNOME Foundation ·GNU Project ·Google Code ·KDE e.V. ·Linux Organizations Foundation ·Mozilla Foundation ·Open Source Geospatial Foundation ·Open Source Initiative ·SourceForge ·Symbian Foundation ·Xiph.Org Foundation ·XMPP Standards Foundation ·X.Org Foundation Apache ·Artistic ·BSD ·GNU GPL ·GNU LGPL ·ISC ·MIT ·MPL ·Ms-PL/RL ·zlib ·FSF approved Licences licenses License standards Open Source Definition ·The Free Software Definition ·Debian Free Software Guidelines Binary blob ·Digital rights management ·Graphics hardware compatibility ·License proliferation ·Mozilla software rebranding ·Proprietary software ·SCO-Linux Challenges controversies ·Security ·Software patents ·Hardware restrictions ·Trusted Computing ·Viral license Alternative terms ·Community ·Linux distribution ·Forking ·Movement ·Microsoft Open Other topics Specification Promise ·Revolution OS ·Comparison with closed
    [Show full text]
  • The X Window System
    The X Window System Version y z x James Gettys Philip L Karlton and Scott McGregor Digital Equipment Corp oration Silicon Graphics Computer Systems CRL Decemb er Abstract The X Window System has b ecome widely accepted by manymanufac turers X provides network transparent access to displayservers allowing lo cal and remote client programs to access a users display X is used on high p erformance workstation displays as well as terminals and client programs run on everything from micro to sup er computers This pap er describ es the tradeos and basic design decisions made during the design of X Version We presume familiarity with the pap er describing XVersion Keywords X Window System interactivehumancomputer interface sys tem distributed systems c Digital Equipment Corp oration and Silicon Graphics Computer Systems All rights reserved The X Window System is a Massachusetts Institute of Technology trademark This pap er will app ear in a sp ecial issue of SoftwarePractice and Experience y Digital Equipment Corp oration Cambridge ResearchLab One Kendall Square Bldg Cambridge MA USA jgcrldeccom z Silicon Graphics Computer Systems Systems Software Division N Shore line Boulevard Mountain View CA USA karltonsgicom x Formerly at Digital Equipment Corp oration now at The Santa Cruz Op eration Encinal Street PO Box Santa Cruz CA USA mcgregorscocom The X Window System Version 11 JAMES GETTYS Digital Equipment Corporation, Cambridge Research Laboratory One Kendall Square, Bld 700 Cambridge, MA 02139, U.S.A. [email protected] PHILIP L. KARLTON Silicon Graphics Computer Systems, Systems Software Division, 2011 N. Shoreline Boulevard Mountain View, CA 94039-7311, U.S.A.
    [Show full text]
  • SWM -- Simple Window Manager
    CZECH TECHNICAL UNIVERSITY IN PRAGUE Faculty of Information Technology F8 Department of Theoretical Computer Science Master’s Thesis SWM – Simple Window Manager Jan Bína May 2020 Supervisor: Ing. Filip Křikava, Ph.D. Acknowledgement / Declaration I would first like to thank my thesis I hereby declare that the presented the- supervisor, Ing. Filip Křikava, Ph.D., sis is my own work and that I have cited for the introduction to this topic and all sources of information in accordance thesis guidance. I would also like to with the Guideline for adhering to eth- thank the Czech Technical University in ical principles when elaborating an aca- Prague and the University of Helsinki demic final thesis. for providing me with a high-quality I acknowledge that my thesis is subject education. Finally, I would like to to the rights and obligations stipulat- express my very profound gratitude to ed by the Act No. 121/2000 Coll., the my parents, family, and friends for pro- Copyright Act, as amended. In accor- viding me with unfailing support and dance with Article 46 (6) of the Act, I continuous encouragement throughout hereby grant a nonexclusive authoriza- my years of study. tion (license) to utilize this thesis, in- cluding any and all computer programs incorporated therein or attached there- to and all corresponding documentation (hereinafter collectively referred to as the “Work”), to any and all persons that wish to utilize the Work. Such per- sons are entitled to use the Work in any way (including for-profit purposes) that does not detract from its value. This authorization is not limited in terms of time, location and quantity.
    [Show full text]
  • PDF Designed for Human Modification
    Cygwin/X Frequently Asked Questions 2018-06-29 18:20 Questions and Answers 1. General Information 1.1. What is Cygwin/X? Cygwin/X is a port of the X Window System to Cygwin. Cygwin provides a UNIX-like API on the Win32 platform. 1.2. What is Cygwin? Cygwin tools are, in the words of the Cygwin FAQ (http://cygwin.com/faq.html#faq.what), “ ports of the popular GNU development tools and utilities for Microsoft Windows. They run thanks to the Cygwin library which provides the POSIX system calls and environment these programs expect. ” Cygwin provides the compiler (gcc), libraries, headers, and other utilities which build and support the operation of Cygwin/X. 1.3. What is the X Window System? [ScheiflerGettys92] The X Window System, or X, is a network-transparent window system. With X, multiple applications can run simultaneously in windows, generating text and graphics in monochrome or color on a bitmap display. Network transparency means that application programs can run on machines scattered through the network. 1.4. What is an X Server? An X Server is a program that provides display and user input services to other programs. In comparison, a file server provides other programs with access to file storage devices. File servers are typically located in a remote location and you use the services of a file server from the machine that you are located at. In contrast, an X Server is typically running on the machine that you are located at; display and user input services may be requested by programs running on your machine, as well as by programs running on remote machines.
    [Show full text]
  • Software Tools to Facilitate Research Programming A
    SOFTWARE TOOLS TO FACILITATE RESEARCH PROGRAMMING A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Philip Jia Guo May 2012 © 2012 by Philip Jia Guo. All Rights Reserved. Re-distributed by Stanford University under license with the author. This work is licensed under a Creative Commons Attribution- Noncommercial 3.0 United States License. http://creativecommons.org/licenses/by-nc/3.0/us/ This dissertation is online at: http://purl.stanford.edu/mb510fs4943 ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Dawson Engler, Primary Adviser I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Jeffrey Heer I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. Margo Seltzer Approved for the Stanford University Committee on Graduate Studies. Patricia J. Gumport, Vice Provost Graduate Education This signature page was generated electronically upon submission of this dissertation in electronic format. An original signed hard copy of the signature page is on file in University Archives. iii Abstract Research programming is a type of programming activity where the goal is to write computer programs to obtain insights from data.
    [Show full text]
  • SNAP Computing and the X Window System
    SNAP Computing and the X Window System James Gettys Hewlett-Packard Company [email protected] Abstract 1 Introduction Today’s computing mantra is “One keyboard, As much as three quarters of the cost of com- one mouse, one display, one computer, one puting in enterprise environments now goes to user, one role, one administration”; in short, system management and support; the hardware one of everything. However, if several people and software purchase cost is well under half try to use the same computer today, or cross of the total expense. In the some parts of the adminstrative boundaries, or change roles from developing world, expertise may be in shorter work to home life, chaos generally ensues. supply than computers. Personally, I now man- age three systems at home, in addition to three Several hardware technologies will soon push for work. Clearly something needs to be done. this limited model of computing beyond the breaking point. Projectors and physically large Project Athena[13], a joint project of Digital, flat panel displays have become affordable and MIT, and IBM in the mid 1980’s, had the vi- are about to take a leap in resolution[12]. Cell- sion of centrally administrated, personal com- phone-size devices can now store many giga- puting, in which mobile students and faculty bytes of information, take high resolution pho- could use whichever computer was most con- tographs, have significant computation capabil- venient or appropriate for their work. Out of ity, and are small enough to always be with you. this project was born a number of technolo- gies that we take for granted today, including Ask yourself “Why can’t we sit with friends, Kerberos[24], the X Window System[31], cen- family, or coworkers in front of a large display tral administration of configuration information with audio system, and all use it at once?” using Hesiod[18] (now mostly supplanted by LDAP), and Zephyr[17], the first instant mes- You should be able change roles or move lo- sage system.
    [Show full text]