Extending Mobile Computer Battery Life Through Energy-Aware Adaptation

Total Page:16

File Type:pdf, Size:1020Kb

Extending Mobile Computer Battery Life Through Energy-Aware Adaptation Extending Mobile Computer Battery Life through Energy-Aware Adaptation Jason Flinn CMU-CS-01-171 December 2001 School of Computer Science Computer Science Department Carnegie Mellon University Pittsburgh, PA Thesis Committee: M. Satyanarayanan, Chair Todd Mowry Dan Siewiorek Keith Farkas, Compaq Western Research Laboratory Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy. Copyright c 2001 Jason Flinn This research was supported by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Materiel Command (AFMC) under contracts F19628-93-C-0193 and F19628-96-C-0061, DARPA, the Space and Naval Warfare Systems Center (SPAWAR) / U.S. Navy (USN) under contract N660019928918, the National Science Foundation (NSF) under contracts CCR-9901696 and ANI-0081396, IBM Corporation, Intel Corporation, AT&T, Compaq, Hughes, and Nokia. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies or endorsements, either express or implied, of DARPA, AFMC, SPAWAR, USN, the NSF, IBM, Intel, AT&T, Compaq, Hughes, Nokia, Carnegie Mellon University, the U.S. Govern- ment, or any other entity. Keywords: Energy-aware adaptation, application-aware adaptation, power manage- ment, mobile computing, ubiquitous computing, remote execution Abstract Energy management has been a critical problem since the earliest days of mobile com- puting. The amount of work one can perform while mobile is fundamentally constrained by the limited energy supplied by one’s battery. Although a large research investment in low-power circuit design and hardware power management has led to more energy-efficient systems, there is a growing realization that more is needed—the higher levels of the system, the operating system and applications, must also contribute to energy conservation. This dissertation puts forth the claim that energy-aware adaptation, the dynamic bal- ancing of application quality and energy conservation, is an essential part of a complete en- ergy management strategy. Energy-aware applications identify possible tradeoffs between energy use and application quality, but defer decisions about which tradeoffs to make un- til runtime. The operating system uses additional information available during execution, such as resource supply and demand, to advise applications which tradeoffs are best. This dissertation first shows how one can measure the energy impact of the higher levels of the system. It describes the design and implementation of PowerScope, an energy profiling tool that maps energy consumption to specific code components. PowerScope helps developers increase the energy-efficiency of their software by focusing attention on those processes and procedures that are responsible for the bulk of energy use. PowerScope is used to perform a detailed study of energy-aware adaptation, focusing on two dimensions: reduction of data and computation quality, and relocation of execu- tion to remote machines. The results of the study show that applications can significantly extend the battery lifetimes of the systems on which they execute by modifying their behav- ior. On some platforms, quality reduction and remote execution can decrease application energy usage by up to 94%. Further, the study results show that energy-aware adaptation is complementary to existing hardware energy-management techniques. The operating system can best support energy-aware applications by using goal-directed adaptation, a feedback technique in which the system monitors energy supply and demand to select the best tradeoffs between quality and energy conservation. Users specify a de- sired battery lifetime, and the system triggers applications to modify their behavior in order to ensure that the specified goal is met. Results show that goal-directed adaptation can effectively meet battery lifetime goals that vary by as much as 30%. iii iv Acknowledgments I may perhaps be unusual in that I found the writing of my dissertation to be a very enjoy- able task. I think that this is in large part due to the tremendous people with whom I have worked during this project. My advisor, Satya, made invaluable contributions not just to this dissertation, but also to my development as a research professional. He exhibited a constant optimism in the ul- timate usefulness and success of my research that helped to sustain me as I worked through the hard problems. He was also remarkably successful in keeping an eye on the “big pic- ture” and preventing me from getting mired in the details. Perhaps his most valuable con- tribution, though, lies in teaching me how to express my ideas through both the spoken and written word. I am indebted to the other members of my thesis committee, Keith Farkas, Todd Mowry, and Dan Siewiorek, for helping me select interesting research directions to explore. Their input led to the development of Spectra, which turned out to be one of the more fun projects in the dissertation. I have built upon the work of the many members of the Odyssey group. Brian Noble not only laid the foundation for this work by developing Odyssey; he also served as a role model during my first years at CMU. Dushyanth Narayanan, Eric Tilton, and Kip Walker were my brothers-in-arms in the coding trenches—we spent many late nights running experiments, getting demos to run, and building a working system. The newer students in our group, Rajesh Balan and SoYoung Park, have helped me refine my ideas and evaluate my work. It is always a pleasure when one can work with such a talented group of people. My former 8208 officemates, Hugo Patterson, David Petrou, and Sanjay Rao, served as sounding-boards for many crazy ideas. Bob Baron and Jan Harkes provided a tremendous amount of technical advice about kernel internals and the Coda file system. Eyal de Lara provided a great deal of help with the Puppeteer system. I’d like to especially thank my father for encouraging me to go back to graduate school, and my mother for reminding me of the importance of having fun. My friends from Penn, Ben Matelson, John Mayne, Patrick O’Donnell, Ted Restelli, and Geoff Taubman, have provided a support network that has withstood the test of time. I’d also like to thank the many new friends I have made here at CMU, including, but not limited to: Rajesh Balan, Angela and Joe Brown, Chris Colohan, Charlie Garrod, Chris Palmer, Carrie Sparks, Greg Steffan, Kip Walker, and Ted Wong. v vi Contents 1 Introduction 1 1.1 Energy management in mobile computing . 1 1.2 Energy-aware adaptation . 2 1.3 The thesis . 3 1.4 Road map for the dissertation . 3 2 Background 5 2.1 Energy metrics . 5 2.2 Hardware platform characteristics . 6 2.2.1 The IBM 560X laptop computer . 7 2.2.2 The Itsy pocket computer . 8 2.2.3 Comparison of platform characteristics . 9 2.3 The Odyssey platform for mobile computing . 10 2.4 Summary . 13 3 PowerScope: Profiling application energy usage 15 3.1 Design considerations . 16 3.2 Implementation . 17 3.2.1 Overview . 17 3.2.2 The System Monitor . 18 3.2.3 The Energy Monitor . 19 3.2.4 The Energy Analyzer . 21 3.3 Validation . 23 3.3.1 Accuracy . 23 3.3.2 Overhead . 26 3.4 Summary . 29 4 Energy-aware adaptation 31 4.1 Goals of the study . 31 4.2 Methodology . 32 4.3 Experimental setup . 33 4.4 Video player . 34 4.4.1 Description . 34 4.4.2 Results . 34 vii viii CONTENTS 4.5 Speech recognizer . 37 4.5.1 Description . 37 4.5.2 Results . 39 4.5.3 Results for Itsy v1.5 . 40 4.6 Map viewer . 43 4.6.1 Description . 43 4.6.2 Results . 43 4.7 Web browser . 47 4.7.1 Description . 47 4.7.2 Results . 48 4.8 Effect of concurrency . 50 4.9 Summary . 53 5 A proxy approach for closed-source environments 57 5.1 Overview . 57 5.2 Puppeteer . 58 5.3 Measurement methodology . 59 5.4 Benefits of PowerPoint adaptation . 60 5.4.1 Loading presentations . 60 5.4.2 Editing presentations . 63 5.4.3 Background activities . 65 5.4.4 Autosave . 66 5.5 Summary . 67 6 System support for energy-aware adaptation 69 6.1 Goal-directed adaptation . 69 6.1.1 Design considerations . 70 6.1.2 Implementation . 70 6.1.3 Basic validation . 74 6.1.4 Sensitivity to half-life . 78 6.1.5 Validation with longer duration experiments . 78 6.1.6 Overhead . 79 6.2 Use of application resource history . 80 6.2.1 Benefits of application resource history . 81 6.2.2 Recording application resource history . 81 6.2.3 Learning from application resource history . 84 6.2.4 Using application resource history to evaluate utility . 84 6.2.5 Using application resource history to improve agility . 88 6.2.6 Validation . 92 6.3 Summary . 98 CONTENTS ix 7 Remote execution 99 7.1 Target environment . 99 7.2 Design considerations . 100 7.2.1 Competing goals for functionality placement . 101 7.2.2 Variation in resource availability . 101 7.2.3 Self-tuning operation . 101 7.2.4 Modification to application source code . 102 7.2.5 Granularity of remote execution . 103 7.2.6 Support for remote file access . 103 7.3 Implementation . 104 7.3.1 Overview . 104 7.3.2 Application interface . 105 7.3.3 Architecture . 106 7.3.4 Resource monitors . 108 7.3.5 Predicting resource demand . 111 7.3.6 Ensuring data consistency . 112 7.3.7 Selecting the best option . 113 7.3.8 Applications . 114 7.4 Validation . 116 7.4.1 Speech recognition . 116.
Recommended publications
  • Proceedings of the Linux Symposium
    Proceedings of the Linux Symposium Volume One June 27th–30th, 2007 Ottawa, Ontario Canada Contents The Price of Safety: Evaluating IOMMU Performance 9 Ben-Yehuda, Xenidis, Mostrows, Rister, Bruemmer, Van Doorn Linux on Cell Broadband Engine status update 21 Arnd Bergmann Linux Kernel Debugging on Google-sized clusters 29 M. Bligh, M. Desnoyers, & R. Schultz Ltrace Internals 41 Rodrigo Rubira Branco Evaluating effects of cache memory compression on embedded systems 53 Anderson Briglia, Allan Bezerra, Leonid Moiseichuk, & Nitin Gupta ACPI in Linux – Myths vs. Reality 65 Len Brown Cool Hand Linux – Handheld Thermal Extensions 75 Len Brown Asynchronous System Calls 81 Zach Brown Frysk 1, Kernel 0? 87 Andrew Cagney Keeping Kernel Performance from Regressions 93 T. Chen, L. Ananiev, and A. Tikhonov Breaking the Chains—Using LinuxBIOS to Liberate Embedded x86 Processors 103 J. Crouse, M. Jones, & R. Minnich GANESHA, a multi-usage with large cache NFSv4 server 113 P. Deniel, T. Leibovici, & J.-C. Lafoucrière Why Virtualization Fragmentation Sucks 125 Justin M. Forbes A New Network File System is Born: Comparison of SMB2, CIFS, and NFS 131 Steven French Supporting the Allocation of Large Contiguous Regions of Memory 141 Mel Gorman Kernel Scalability—Expanding the Horizon Beyond Fine Grain Locks 153 Corey Gough, Suresh Siddha, & Ken Chen Kdump: Smarter, Easier, Trustier 167 Vivek Goyal Using KVM to run Xen guests without Xen 179 R.A. Harper, A.N. Aliguori & M.D. Day Djprobe—Kernel probing with the smallest overhead 189 M. Hiramatsu and S. Oshima Desktop integration of Bluetooth 201 Marcel Holtmann How virtualization makes power management different 205 Yu Ke Ptrace, Utrace, Uprobes: Lightweight, Dynamic Tracing of User Apps 215 J.
    [Show full text]
  • Container-Based Virtualization for Byte-Addressable NVM Data Storage
    2016 IEEE International Conference on Big Data (Big Data) Container-Based Virtualization for Byte-Addressable NVM Data Storage Ellis R. Giles Rice University Houston, Texas [email protected] Abstract—Container based virtualization is rapidly growing Storage Class Memory, or SCM, is an exciting new in popularity for cloud deployments and applications as a memory technology with the potential of replacing hard virtualization alternative due to the ease of deployment cou- drives and SSDs as it offers high-speed, byte-addressable pled with high-performance. Emerging byte-addressable, non- volatile memories, commonly called Storage Class Memory or persistence on the main memory bus. Several technologies SCM, technologies are promising both byte-addressability and are currently under research and development, each with dif- persistence near DRAM speeds operating on the main memory ferent performance, durability, and capacity characteristics. bus. These new memory alternatives open up a new realm of These include a ReRAM by Micron and Sony, a slower, but applications that no longer have to rely on slow, block-based very large capacity Phase Change Memory or PCM by Mi- persistence, but can rather operate directly on persistent data using ordinary loads and stores through the cache hierarchy cron and others, and a fast, smaller spin-torque ST-MRAM coupled with transaction techniques. by Everspin. High-speed, byte-addressable persistence will However, SCM presents a new challenge for container-based give rise to new applications that no longer have to rely on applications, which typically access persistent data through slow, block based storage devices and to serialize data for layers of block based file isolation.
    [Show full text]
  • P Palmtop Aper
    u.s. $7.95 Publisher's Message ................................ , Letters to the Editor .................................. ~ - E New Third Party Ln Products and Services ............................ .E ..... =Q) HP Palmtop Users Groups ...................... J E :::J User to User ............................................ 1( :z Hal reports on the excitement at the HP Handheld - P Palmtop User's Conference, a new book by David Packard "<t" describing the history of HP, our new 200LXI1000CX Q) loaner p'rogram for developers, the 1995/1996 E Subscnbers PowerDisk and some good software :::J that didn't make it into thePowerDisk, but is on this o issue's ON DISK and CompuServe. > aper PalmtoD Wisdom .................................... 2< Know ~here you stand with your finances; Keep impqrtant information with you, and keep it secure; The best quotes may not tie in the quotes books. Built·in Apps on Vacation: To Africa and Back with the HP Palmtop ....................................... 1E acafTen/ The HP 200LX lielps a couple from Maryland prepare for their dream vacation to Africa. Built·in Apps on Vacation: Editor on Vacation .................................. 2( Even on vacation, Rich Hall, managing editor for The HP Palmtop Paper, finds the Palmtop to be an indispensable companion. AP~ointment Book: ~n ~~l~epP~~'~~~~~~.~~.~~...................... 2~ Appointment Book provides basic prol'ect management already built into the HP Pa mtop. DataBase: Print Your Database in the Format You Want .......................... 3( Create a custom database and print Hout in the for­ mat you want using the built-in DataBase program and Smart Clip. Lotus 1·2·3 Column: Basic Training for 1-2-3 Users ............... 3~ Attention first-time Lotus users, or those needing a bH of a refresher - get out your HP Palmtop and fonow along with this review of the basics.
    [Show full text]
  • Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
    Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment Marciano da Rocha1 a, Dalton Cezane´ Gomes Valadares2;4 b, Angelo Perkusich3 c, Kyller Costa Gorgonio4 d, Rodrigo Tomaz Pagno1 e and Newton Carlos Will1 f 1Department of Computer Science, Federal University of Technology, Parana,´ Dois Vizinhos, Brazil 2Department of Mechanical Engineering, Federal Institute of Pernambuco, Caruaru, Brazil 3Department of Electrical Engineering, Federal University of Campina Grande, Campina Grande, Brazil 4Department of Computer Science, Federal University of Campina Grande, Campina Grande, Brazil Keywords: Intel SGX, Data Sealing, File Encryption, Confidentiality, Integrity, Secure Storage, Cloud Storage. Abstract: With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users. Currently, with devices always connected to the Internet, the use of cloud data storage services has become practical and common, allowing quick access to such data wherever the user is. Such practicality brings with it a concern, precisely the confidentiality of the data which is delivered to third parties for storage. In the home environment, disk encryption tools have gained special attention from users, being used on personal computers and also having native options in some smartphone operating systems. The present work uses the data sealing, feature provided by the Intel Software Guard Extensions (Intel SGX) technology, for file encryption. A virtual file system is created in which applications can store their data, keeping the security guarantees provided by the Intel SGX technology, before send the data to a storage provider.
    [Show full text]
  • Detecting Exploit Code Execution in Loadable Kernel Modules
    Detecting Exploit Code Execution in Loadable Kernel Modules HaizhiXu WenliangDu SteveJ.Chapin Systems Assurance Institute Syracuse University 3-114 CST, 111 College Place, Syracuse, NY 13210, USA g fhxu02, wedu, chapin @syr.edu Abstract and pointer checks can lead to kernel-level exploits, which can jeopardize the integrity of the running kernel. Inside the In current extensible monolithic operating systems, load- kernel, exploitcode has the privilegeto interceptsystem ser- able kernel modules (LKM) have unrestricted access to vice routines, to modify interrupt handlers, and to overwrite all portions of kernel memory and I/O space. As a result, kernel data. In such cases, the behavior of the entire sys- kernel-module exploitation can jeopardize the integrity of tem may become suspect. the entire system. In this paper, we analyze the threat that Kernel-level protection is different from user space pro- comes from the implicit trust relationship between the oper- tection. Not every application-level protection mechanism ating system kernel and loadable kernel modules. We then can be applied directly to kernel code, because privileges present a specification-directed access monitoring tool— of the kernel environment is different from that of the user HECK, that detects kernel modules for malicious code ex- space. For example, non-executableuser page [21] and non- ecution. Inside the module, HECK prevents code execution executable user stack [29] use virtual memory mapping sup- on the kernel stack and the data sections; on the bound- port for pages and segments, but inside the kernel, a page ary, HECK restricts the module’s access to only those kernel or segment fault can lead to kernel panic.
    [Show full text]
  • DM-Relay - Safe Laptop Mode Via Linux Device Mapper
    ' $ DM-Relay - Safe Laptop Mode via Linux Device Mapper Study Thesis by cand. inform. Fabian Franz at the Faculty of Informatics Supervisor: Prof. Dr. Frank Bellosa Supervising Research Assistant: Dipl.-Inform. Konrad Miller Day of completion: 04/05/2010 &KIT – Universitat¨ des Landes Baden-Wurttemberg¨ und nationales Forschungszentrum in der Helmholtz-Gemeinschaft www.kit.edu % I hereby declare that this thesis is my own original work which I created without illegitimate help by others, that I have not used any other sources or resources than the ones indicated and that due acknowledgment is given where reference is made to the work of others. Karlsruhe, April 5th, 2010 Contents Deutsche Zusammenfassung xi 1 Introduction 1 1.1 Problem Definition . .1 1.2 Objectives . .1 1.3 Methodology . .1 1.4 Contribution . .2 1.5 Thesis Outline . .2 2 Background 3 2.1 Problems of Disk Power Management . .3 2.2 State of the Art . .4 2.3 Summary of this chapter . .8 3 Analysis 9 3.1 Pro and Contra . .9 3.2 A new approach . 13 3.3 Analysis of Proposal . 15 3.4 Summary of this chapter . 17 4 Design 19 4.1 Common problems . 19 4.2 System-Design . 21 4.3 Summary of this chapter . 21 5 Implementation of a dm-module for the Linux kernel 23 5.1 System-Architecture . 24 5.2 Log suitable for Flash-Storage . 28 5.3 Using dm-relay in practice . 31 5.4 Summary of this chapter . 31 vi Contents 6 Evaluation 33 6.1 Methodology . 33 6.2 Benchmarking setup .
    [Show full text]
  • Vnios Deployment on KVM January 2019
    Deployment Guide vNIOS deployment on KVM January 2019 TABLE OF CONTENTS Overview .............................................................................................................................................. 3 Introduction ........................................................................................................................................ 3 vNIOS for KVM ................................................................................................................................... 3 vNIOS deployment on KVM ................................................................................................................ 3 Preparing the environment ................................................................................................................. 3 Installing KVM and Bridge utilities ...................................................................................................... 3 Creating various types networks ........................................................................................................ 5 Downloading vNIOS QCOW2 image ................................................................................................. 8 Copying vNIOS qcow2 image .......................................................................................................... 10 Deploying vNIOS with Bridge Networking........................................................................................ 11 Deploying vNIOS through xml file with Bridge Networking .............................................................
    [Show full text]
  • Unix and Linux System Administration and Shell Programming
    Unix and Linux System Administration and Shell Programming Unix and Linux System Administration and Shell Programming version 56 of August 12, 2014 Copyright © 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2009, 2010, 2011, 2012, 2013, 2014 Milo This book includes material from the http://www.osdata.com/ website and the text book on computer programming. Distributed on the honor system. Print and read free for personal, non-profit, and/or educational purposes. If you like the book, you are encouraged to send a donation (U.S dollars) to Milo, PO Box 5237, Balboa Island, California, USA 92662. This is a work in progress. For the most up to date version, visit the website http://www.osdata.com/ and http://www.osdata.com/programming/shell/unixbook.pdf — Please add links from your website or Facebook page. Professors and Teachers: Feel free to take a copy of this PDF and make it available to your class (possibly through your academic website). This way everyone in your class will have the same copy (with the same page numbers) despite my continual updates. Please try to avoid posting it to the public internet (to avoid old copies confusing things) and take it down when the class ends. You can post the same or a newer version for each succeeding class. Please remove old copies after the class ends to prevent confusing the search engines. You can contact me with a specific version number and class end date and I will put it on my website. version 56 page 1 Unix and Linux System Administration and Shell Programming Unix and Linux Administration and Shell Programming chapter 0 This book looks at Unix (and Linux) shell programming and system administration.
    [Show full text]
  • Wearable Technology for Enhanced Security
    Communications on Applied Electronics (CAE) – ISSN : 2394-4714 Foundation of Computer Science FCS, New York, USA Volume 5 – No.10, September 2016 – www.caeaccess.org Wearable Technology for Enhanced Security Agbaje M. Olugbenga, PhD Babcock University Department of Computer Science Ogun State, Nigeria ABSTRACT Sproutling. Watches like the Apple Watch, and jewelry such Wearable's comprise of sensors and have computational as Cuff and Ringly. ability. Gadgets such as wristwatches, pens, and glasses with Taking a look at the history of computer generations up to the installed cameras are now available at cheap prices for user to present, we could divide it into three main types: mainframe purchase to monitor or securing themselves. Nigerian faced computing, personal computing, and ubiquitous or pervasive with several kidnapping in schools, homes and abduction for computing[4]. The various divisions is based on the number ransomed collection and other unlawful acts necessitate these of computers per users. The mainframe computing describes reviews. The success of the wearable technology in medical one large computer connected to many users and the second, uses prompted the research into application into security uses. personal computing, as one computer per person while the The method of research is the use of case studies and literature term ubiquitous computing however, was used in 1991 by search. This paper takes a look at the possible applications of Paul Weiser. Weiser depicted a world full of embedded the wearable technology to combat the cases of abduction and sensing technologies to streamline and improve life [5]. kidnapping in Nigeria. Nigeria faced with several kidnapping in schools and homes General Terms are in dire need for solution.
    [Show full text]
  • Scheme of Work 2021-22 Computer Class
    Scheme of Work 2021-22 Rev. No: 01 Computer Class: III Date: 9 February 2021 Book: Computer 3 Term: I Periods of week: 2 Total teaching minutes per week: 80 minutes Duration of 1 period: 40 minutes Total Weeks: 17 weeks Week Content Week Content 1st Types of computers 9th Inside the system unit nd th 2 Types of computers 10 Inside the system unit rd th 3 Types of computers 11 Inside the system unit th th 4 Types of computers 12 Inside the system unit 5th Revision 13th Practical: Inside the system unit th th 6 Revision 14 Revision th th 7 Revision 15 Revision 16th 8th Quarterly Test First Term Exam 17th Page 1 of 5 This is a CONTROLLED & CONFIDENTIAL document of “Dr. A. Q. Khan School System”. Its unauthorized disclosure or reproduction shall be liable for prosecution under the copyright act and any other law Daily Lesson Plan (DLP) Session 2021-22 Subject: Computer Term – I Topic: Types of computer Class: III Week: 01 Learning Plan (Methodology) Time Resources Assessment Objectives By the end of this Introduction: Teacher should ask some question related to 40 Book Teacher should Lesson Students computer. min Board assess students by should be able to: Development: computer asking of: After reading the lesson teacher should tell them about four different Tell or explain main types of computer. questions about 1. Micro computer: These are most smallest and common computer computers. It is also called personal computer. These are types used in homes, school and colleges etc. these computers are divided into three types.
    [Show full text]
  • Instant OS Updates Via Userspace Checkpoint-And
    Instant OS Updates via Userspace Checkpoint-and-Restart Sanidhya Kashyap, Changwoo Min, Byoungyoung Lee, and Taesoo Kim, Georgia Institute of Technology; Pavel Emelyanov, CRIU and Odin, Inc. https://www.usenix.org/conference/atc16/technical-sessions/presentation/kashyap This paper is included in the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC ’16). June 22–24, 2016 • Denver, CO, USA 978-1-931971-30-0 Open access to the Proceedings of the 2016 USENIX Annual Technical Conference (USENIX ATC ’16) is sponsored by USENIX. Instant OS Updates via Userspace Checkpoint-and-Restart Sanidhya Kashyap Changwoo Min Byoungyoung Lee Taesoo Kim Pavel Emelyanov† Georgia Institute of Technology †CRIU & Odin, Inc. # errors # lines Abstract 50 1000K 40 100K In recent years, operating systems have become increas- 10K 30 1K 20 ingly complex and thus more prone to security and per- 100 formance issues. Accordingly, system updates to address 10 10 these issues have become more frequently available and 0 1 increasingly important. To complete such updates, users 3.13.0-x 3.16.0-x 3.19.0-x May 2014 must reboot their systems, resulting in unavoidable down- build/diff errors #layout errors Jun 2015 time and further loss of the states of running applications. #static local errors #num lines++ We present KUP, a practical OS update mechanism that Figure 1: Limitation of dynamic kernel hot-patching using employs a userspace checkpoint-and-restart mechanism, kpatch. Only two successful updates (3.13.0.32 34 and → which uses an optimized data structure for checkpoint- 3.19.0.20 21) out of 23 Ubuntu kernel package releases.
    [Show full text]
  • Classification of Computer
    Department Of Business Administration Dr. Rakesh Ranjan BBA Sem -2 Classification of Computer Generally, computers can be divided into 3 types. 1. Analog Computers 2. Digital Computers 3. Hybrid Computers ANALOG COMPUTERS : In this type of computers, numerical magnitudes are represented by physical quantities such as electric current, voltage, or resistance, mechanical movements, etc. These are machines which are designed to perform arithmetical functions upon numbers where the numbers are represented by physical quantity. Analog computers are widely used in manufacturing units where temperatures, pressure or flow of liquids are to be monitored continuously. It is also used at petrol pump where petrol pump contains an analog processor that connects fuel flow measurements into quantity and price values. Among the various drawbacks of using Analog computers are: They do not have the ability to store data in large quantities; They do not have the logical facilities; They can perform only arithmetical functions but are more costlier. DIGITAL COMPUTERS : A digital computer operates on data in the form of digits, rather than the physical quantities used in analog computers. That is, its input must be discrete rather than continuous and may consist of combinations of numbers, characters and special symbols, written in appropriate programming language. Digital computers can be classified into two parts: General Purpose Digital Computers They are also known as all purpose digital computers. Theoretically they can be used for any type of applications, e.g., computers that are used for payroll, graphs, analysis, etc. Special Purpose Digital Computers A digital computer is 'designed to solve problems of a restricted type.
    [Show full text]