High Throughput Dequeuing Technique in Distributed Message Queues for Iot

Total Page:16

File Type:pdf, Size:1020Kb

High Throughput Dequeuing Technique in Distributed Message Queues for Iot Journal of Information Processing Vol.25 199–208 (Feb. 2017) [DOI: 10.2197/ipsjjip.25.199] Regular Paper High Throughput Dequeuing Technique in Distributed Message Queues for IoT Masafumi Kinoshita1,2,a) Hiroaki Konoura1 Takafumi Koike1 Kenji Leibnitz2,3 Masayuki Murata2 Received: May 23, 2016, Accepted: November 1, 2016 Abstract: With the dramatic increase in Internet of Things (IoT) related messaging volume, message queue systems are highly required for both interoperability among devices, as well as for control message traffic between devices and heterogeneous back-end systems (BES). When connected BES issue several dequeue requests to the message queue and no message is available, the frequency of missed-dequeues increases, which causes a degradation of the maximum throughput. Therefore, we propose the retry dequeue-request scheduling (RDS) method that decreases the number of dequeue requests from the BES by delaying the replies to the BES when missed-dequeues occur. Simulation and ex- perimental evaluations show that the throughput of the RDS method achieves 180% of that of the conventional dequeue method. Keywords: Internet of Things (IoT), distributed messaging, message queue, key-value store (KVS) cess messages at different rates to achieve maximum throughput 1. Introduction for the individual objectives of the IoT services, such as analysis, In the Internet of Things (IoT) era, the amount of all digital data management of devices, or data visualization. Therefore, to com- in the world created by various devices and sensors is exponen- pensate for the heterogeneity in message traffic between devices tially increasing, and it is predicted to reach 40 ZB by 2020 [1]. and BES, message queue systems use buffering to handle mes- IoT service systems utilizing data from devices typically consist sage traffic from devices. This compensation is achieved through of 3 groups: field devices which send and receive data, back-end distributed message queue systems, which enables the distri- application systems (BES) in a data center/cloud, and the message bution and load-balancing of message processing on multiple queue (or message hub/message bus) systems located between the servers [9]. In the past, the specifications of field devices and BES devices and back-end systems. were defined in advance. However, today’s IoT service systems Message queue systems are widely used for interoperability as well as development and operations (DevOps) trends require and control of the huge message traffic between devices and rapid implementation and continuous modification, additionally BES [2], [3]. Especially, the control of message traffic has be- to the BES also becoming adaptable [10], [11], [12], [13]. Fur- come an important requirement as the volume of IoT messages thermore, progress of distribution platforms such as Spark [14] or has increased dramatically over the past years. There are sev- Storm [15], have dramatically improved the performance of BES. eral solutions such as Kafka [4], Amazon Kinesis [5], Azure IoT In this background, updating the processes or parameter settings Hub [6], etc., following different approaches depending on their of BES can impact the system’s performance. respective objectives. In addition, to satisfy these requirements Actually, when the number of BES connecting to the message as well as obtaining a high availability, such as a short failover queue increases, we can observe that this situation impacts the time of within one second for social infrastructure systems, we performance of our proposed message queue and degrades the proposed a high-throughput and reliable message queue sys- throughput for retrieving messages from the message queue (de- tem based on a distributed in-memory key-value store (KVS) in queue). By analyzing the factor of throughput degradation, we [7], [8], [9]. recognize a large number of missed-dequeues, which means that Here, we will address another issue of traffic control between the lack of messages in the selected queue wastes computational devices and BES for IoT services. Devices transmit messages pe- resources. riodically at their own intervals, such as the period of log collec- Therefore, in this paper, we focus on the dequeue process of tion for their service requirements. On the other hand, BES pro- distributed message queue systems and we propose a method called Retry Dequeue-request Scheduling (RDS) to solve the 1 Hitachi Ltd., Chiyoda, Tokyo 100–8280, Japan throughput degradation problem. We evaluate the RDS method 2 Osaka University, Suita, Osaka 565–0871, Japan by simulation and also prove its advantage in experimental real 3 National Institute of Information and Communications Technology, Suita, Osaka 565–0871, Japan servers. a) [email protected] c 2017 Information Processing Society of Japan 199 Journal of Information Processing Vol.25 199–208 (Feb. 2017) The rest of this paper is organized as follows. The background lect much data from devices and learn through trial and error of and issues of message queues are introduced in Section 2. Sec- data analysis. This approach requires a large data volume for var- tion 3 presents our proposed method and its design. Section 4 ious analyses. Therefore, traffic volume from devices generating shows its performance evaluation by simulation, followed by Sec- periodical message data has become enormous in IoT service sys- tion 5 where we present the experimental evaluation. Section 6 tems. The transmitted data sizes of sensors highly depend on their describes related work and Section 7 concludes this paper. service requirements and protocols, such as MQTT, REST, and Transport Layer Security (TLS) [24], etc. From our past experi- 2. Background ences with specific use cases, such as monitoring or optimization 2.1 Outline of IoT Service System services, we assume in this paper that the data size is 1 KB, which 2.1.1 Message Queue in IoT Service System can be widely applied to IoT services. Figure 1 outlines an example of the system structure in IoT On the other hand, BES collect data for various IoT objectives, services. Message queues are widely used for a large variety such as monitoring and optimization and retrieve messages from of services, e.g., monitoring/optimization of services in indus- the queue at their own timing, which is non-periodic and process- try, smart meter services in electricity companies, connected ve- dependent. These processing times differ by context of message, hicle services, or services of a telecom company collecting data message size, and other related data. To achieve higher through- from smart devices. Message queues are required for the inter- put by fully utilizing computational resources, the BES retrieves operability and abstraction (absorption)ofmessagetrafficofde- messages from the queue with a pull-based method [4]. We de- vices. By supporting IoT protocols, e.g., MQ Telemetry Trans- scribe further details in Section 6. In addition, progress in dis- port (MQTT) [16], Representational State Transfer (REST) [17], tribution platforms, such as Spark, leads to a dramatic change in or Constrained Application Protocol (CoAP) [18], and by making processing time of the BES. devices and BES become loosely coupled (independent), mes- Here it can be seen that while devices send massive amounts of sage queues enable the developer to interoperate between them periodical messages, BES process messages at their own timing rapidly. Message queues buffer messages into a queue on a per- in IoT. Therefore, the control function of the massive and hetero- sistent storage (enqueue) and enable the BES to retrieve the mes- geneous message traffic in the message queue becomes a crucial sages from the queue at their own timing. Under the condi- issue in IoT. In this paper, we are targeting these heterogeneous tion that the message queue has both, sufficient performance to environments in the IoT service system. process messaging traffic from devices and scalability in perfor- mance and storage, the message queue enables the developers of 2.2 Conventional Approach using Distributed Message the BES to design their system without considering the entire vol- Queues ume of the messaging traffic. 2.2.1 Architecture for High Scalability and Availability 2.1.2 Heterogeneity in IoT Message Traffic In our previous work, we proposed a high-throughput and re- It is generally agreed that IoT services require information liable message queue system based on a distributed in-memory from historical or real-time data for their own objectives, such key-value store (KVS) for social infrastructure systems [7], [8], as monitoring and optimization [19], [20], [21], [22], [23]. In [9] (Fig. 2). The proposed messaging system adopts a fabric ar- Refs. [19], [20], [22], IoT service systems are required to man- chitecture with connected full-meshed servers for high scalabil- age the massive volume of data generated by sensors in various ity and availability. The proposed messaging system consists of fields, such as smart grids, connected vehicles, and heavy equip- 3parts:theenqueue controller (E-Ctrl) for receiving and stor- ment, etc. In Ref. [21], optimization at the enterprise level in ing messages in a queue, the distributed queue to the KVS server smart manufacturing results in requiring only periodically col- as persistent storage, and the dequeue controller (D-Ctrl) for re- lected data. In Ref. [23], general smart sensors are organized in ceiving dequeue requests from BES and retrieving the messages simple packages, i.e., they may consist of single chips and gener- from queues. This structure enables eliminating a single point of ate simple periodical data. failure and enhances the horizontal scalability of each part. The general approach in IoT to find values in data is to col- Fig. 2 Overview of distributed message queue system. E-Ctrl and D-Ctrl Fig. 1 Structure of IoT service system. denote enqueue controller and dequeue controller, respectively. c 2017 Information Processing Society of Japan 200 Journal of Information Processing Vol.25 199–208 (Feb. 2017) 2.2.2 Transparency in Distributed Message Queues the expected message traffic volume.
Recommended publications
  • D-Bus, the Message Bus System Training Material
    Maemo Diablo D-Bus, The Message Bus System Training Material February 9, 2009 Contents 1 D-Bus, The Message Bus System 2 1.1 Introduction to D-Bus ......................... 2 1.2 D-Bus architecture and terminology ................ 3 1.3 Addressing and names in D-Bus .................. 4 1.4 Role of D-Bus in maemo ....................... 6 1.5 Programming directly with libdbus ................. 9 1 Chapter 1 D-Bus, The Message Bus System 1.1 Introduction to D-Bus D-Bus (the D originally stood for "Desktop") is a relatively new inter process communication (IPC) mechanism designed to be used as a unified middleware layer in free desktop environments. Some example projects where D-Bus is used are GNOME and Hildon. Compared to other middleware layers for IPC, D-Bus lacks many of the more refined (and complicated) features and for that reason, is faster and simpler. D-Bus does not directly compete with low level IPC mechanisms like sock- ets, shared memory or message queues. Each of these mechanisms have their uses, which normally do not overlap the ones in D-Bus. Instead, D-Bus aims to provide higher level functionality, like: Structured name spaces • Architecture independent data formatting • Support for the most common data elements in messages • A generic remote call interface with support for exceptions (errors) • A generic signalling interface to support "broadcast" type communication • Clear separation of per-user and system-wide scopes, which is important • when dealing with multi-user systems Not bound to any specific programming language (while providing a • design that readily maps to most higher level languages, via language specific bindings) The design of D-Bus benefits from the long experience of using other mid- dleware IPC solutions in the desktop arena and this has allowed the design to be optimised.
    [Show full text]
  • Beej's Guide to Unix IPC
    Beej's Guide to Unix IPC Brian “Beej Jorgensen” Hall [email protected] Version 1.1.3 December 1, 2015 Copyright © 2015 Brian “Beej Jorgensen” Hall This guide is written in XML using the vim editor on a Slackware Linux box loaded with GNU tools. The cover “art” and diagrams are produced with Inkscape. The XML is converted into HTML and XSL-FO by custom Python scripts. The XSL-FO output is then munged by Apache FOP to produce PDF documents, using Liberation fonts. The toolchain is composed of 100% Free and Open Source Software. Unless otherwise mutually agreed by the parties in writing, the author offers the work as-is and makes no representations or warranties of any kind concerning the work, express, implied, statutory or otherwise, including, without limitation, warranties of title, merchantibility, fitness for a particular purpose, noninfringement, or the absence of latent or other defects, accuracy, or the presence of absence of errors, whether or not discoverable. Except to the extent required by applicable law, in no event will the author be liable to you on any legal theory for any special, incidental, consequential, punitive or exemplary damages arising out of the use of the work, even if the author has been advised of the possibility of such damages. This document is freely distributable under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. See the Copyright and Distribution section for details. Copyright © 2015 Brian “Beej Jorgensen” Hall Contents 1. Intro................................................................................................................................................................1 1.1. Audience 1 1.2. Platform and Compiler 1 1.3.
    [Show full text]
  • An Introduction to Linux IPC
    An introduction to Linux IPC Michael Kerrisk © 2013 linux.conf.au 2013 http://man7.org/ Canberra, Australia [email protected] 2013-01-30 http://lwn.net/ [email protected] man7 .org 1 Goal ● Limited time! ● Get a flavor of main IPC methods man7 .org 2 Me ● Programming on UNIX & Linux since 1987 ● Linux man-pages maintainer ● http://www.kernel.org/doc/man-pages/ ● Kernel + glibc API ● Author of: Further info: http://man7.org/tlpi/ man7 .org 3 You ● Can read a bit of C ● Have a passing familiarity with common syscalls ● fork(), open(), read(), write() man7 .org 4 There’s a lot of IPC ● Pipes ● Shared memory mappings ● FIFOs ● File vs Anonymous ● Cross-memory attach ● Pseudoterminals ● proc_vm_readv() / proc_vm_writev() ● Sockets ● Signals ● Stream vs Datagram (vs Seq. packet) ● Standard, Realtime ● UNIX vs Internet domain ● Eventfd ● POSIX message queues ● Futexes ● POSIX shared memory ● Record locks ● ● POSIX semaphores File locks ● ● Named, Unnamed Mutexes ● System V message queues ● Condition variables ● System V shared memory ● Barriers ● ● System V semaphores Read-write locks man7 .org 5 It helps to classify ● Pipes ● Shared memory mappings ● FIFOs ● File vs Anonymous ● Cross-memory attach ● Pseudoterminals ● proc_vm_readv() / proc_vm_writev() ● Sockets ● Signals ● Stream vs Datagram (vs Seq. packet) ● Standard, Realtime ● UNIX vs Internet domain ● Eventfd ● POSIX message queues ● Futexes ● POSIX shared memory ● Record locks ● ● POSIX semaphores File locks ● ● Named, Unnamed Mutexes ● System V message queues ● Condition variables ● System V shared memory ● Barriers ● ● System V semaphores Read-write locks man7 .org 6 It helps to classify ● Pipes ● Shared memory mappings ● FIFOs ● File vs Anonymous ● Cross-memoryn attach ● Pseudoterminals tio a ● proc_vm_readv() / proc_vm_writev() ● Sockets ic n ● Signals ● Stream vs Datagram (vs uSeq.
    [Show full text]
  • Open Message Queue Technical Overview Release 5.0
    Open Message Queue Technical Overview Release 5.0 May 2013 This book provides an introduction to the technology, concepts, architecture, capabilities, and features of the Message Queue messaging service. Open Message Queue Technical Overview, Release 5.0 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • Multiprocess Communication and Control Software for Humanoid Robots Neil T
    IEEE Robotics and Automation Magazine Multiprocess Communication and Control Software for Humanoid Robots Neil T. Dantam∗ Daniel M. Lofaroy Ayonga Hereidx Paul Y. Ohz Aaron D. Amesx Mike Stilman∗ I. Introduction orrect real-time software is vital for robots in safety-critical roles such as service and disaster response. These systems depend on software for Clocomotion, navigation, manipulation, and even seemingly innocuous tasks such as safely regulating battery voltage. A multi-process software design increases robustness by isolating errors to a single process, allowing the rest of the system to continue operating. This approach also assists with modularity and concurrency. For real-time tasks such as dynamic balance and force control of manipulators, it is critical to communicate the latest data sample with minimum latency. There are many communication approaches intended for both general purpose and real-time needs [19], [17], [13], [9], [15]. Typical methods focus on reliable communication or network-transparency and accept a trade-off of increased mes- sage latency or the potential to discard newer data. By focusing instead on the specific case of real-time communication on a single host, we reduce communication latency and guarantee access to the latest sample. We present a new Interprocess Communication (IPC) library, Ach,1 which addresses this need, and discuss its application for real-time, multiprocess control on three humanoid robots (Fig. 1). There are several design decisions that influenced this robot software and motivated development of the Ach library. First, to utilize decades of prior development and engineering, we implement our real-time system on top of a POSIX-like Operating System (OS)2.
    [Show full text]
  • Sarath Singapati Inter Process Communication in Android Master of Science Thesis
    SARATH SINGAPATI INTER PROCESS COMMUNICATION IN ANDROID MASTER OF SCIENCE THESIS Examiner: Professor Tommi Mikkonen Examiner and thesis subject approved by The Faculty of Computing and Electrical Engineering on 7th March 2012 II ABSTRACT TAMPERE UNIVERSITY OF TECHNOLOGY Master’s Degree Programme in Information Technology SARATH SINGAPATI INTER PROCESS COMMUNICATION IN ANDROID Master of Science Thesis, 45 pages, 4 Appendix pages June 2012 Major: Software Systems Examiner: Professor Tommi Mikkonen Keywords: Android, Google, mobile applications, Process, IPC Google's Android mobile phone software platform is currently the big opportunity for application software developers. Android has the potential for removing the barriers to success in the development and sale of a new generation of mobile phone application software. Just as the standardized PC and Macintosh platforms created markets for desktop and server software, Android, by providing a standard mobile phone application environment, creates a market for mobile applications and the opportunity for applica- tions developers to profit from those applications. One of the main intentions of Android platform is to eliminate the duplication of functionality in different applications to allow functionality to be discovered and in- voked on the fly, and to let users replace applications with others that offer similar func- tionality. The main problem here is how to develop applications that must have as few dependencies as possible, and must be able to provide services to other applications. This thesis studies the Android mobile operating system, its capabilities in develop- ing applications that communicate with each other and provide services to other applica- tions. As part of the study, a sample application called “Event Planner”, has been devel- oped to experiment how Inter Process Communication works in Android platform, ex- plains how to implement, and use Inter Process Communication (IPC).
    [Show full text]
  • [MS-MQOD]: Message Queuing Protocols Overview
    [MS-MQOD]: Message Queuing Protocols Overview Intellectual Property Rights Notice for Open Specifications Documentation . Technical Documentation. Microsoft publishes Open Specifications documentation (“this documentation”) for protocols, file formats, data portability, computer languages, and standards support. Additionally, overview documents cover inter-protocol relationships and interactions. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you can make copies of it in order to develop implementations of the technologies that are described in this documentation and can distribute portions of it in your implementations that use these technologies or in your documentation as necessary to properly document the implementation. You can also distribute in your implementation, with or without modification, any schemas, IDLs, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications documentation. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that might cover your implementations of the technologies described in the Open Specifications documentation. Neither this notice nor Microsoft's delivery of this documentation grants any licenses under those patents or any other Microsoft patents. However, a given Open Specifications document might be covered by the Microsoft Open Specifications Promise or the Microsoft Community Promise. If you would prefer a written license, or if the technologies described in this documentation are not covered by the Open Specifications Promise or Community Promise, as applicable, patent licenses are available by contacting [email protected].
    [Show full text]
  • On IPC Mechanisms
    More on IPC Mechanisms Karthik Dantu and Steve Ko Administrivia • Project meetings today at 3pm, not Friday. • Assignment 2 due in two days. Today: More on IPC Mechanisms • Why? • Fundamental building blocks of the Android framework • Last time was from the user’s (i.e., programmer’s) perspective to understand other framework components. • Today’s about the internals. • Goal: Understanding the framework structure and IPC mechanisms Today: More on IPC Mechanisms • We will look at two IPC mechanisms. • Looper-handler • Binder • Resources: • AOSP • “Embedded Android” • “Deep Dive into Android IPC/Binder Framework” http://events.linuxfoundation.org/images/ stories/slides/abs2013_gargentas.pdf Looper-Handler • Looper is a per-thread message loop. • Handler processes messages. Looper Architecture Thread Looper Message Queue Message Message Message Handler Handler Handler Looper Protocol: ActivityThread.java Looper • Looper.prepare() Looper • Looper.loop() Handler Handler.sendMessage() Handler.dispatchMessage() Binder • From OpenBinder • Enables two things for IPC • Directory of available IPC calls • Communication mechanism Architecture Context Manager (servicemanager.c) Process A Process B Client IBinder AIDL Binder Proxy AIDL IBinder Stub Binder Token Binder Service Binder Driver (/dev/binder) Context Manager • A special Binder object (handle #0) • The directory of all Binder-ready processes • On Android, ServiceManager becomes this context manager for Binder. • servicemanager.c • binder_become_context_manager(): Registers itself with the kernel Binder module as the context manager. • binder_loop() starts a message loop that listens to the commands from kernel Binder module. ServiceManager Registering with Service Manager System Server Service Manager App • Runs many services, e.g., • Maintains directories for • Can use Context’s Activity Manager, Power registered remote objects getSystemService() or Manager, etc.
    [Show full text]
  • MPI: a Message-Passing Interface Standard
    The MPI Message Queue Dumping Interface Version 1.0 MPI Forum Working Group on Tools Accepted by the Message Passing Interface Forum December 12, 2013 Acknowledgments Author Anh Vo Contributing Authors John DelSignore, Kathryn Mohror, Jeff Squyres Reviewers Dong Ahn, William Gropp, Martin Schulz Contents 1 Background1 2 Overview 2 3 Definitions3 3.1 Shared Library and DLL.............................3 3.1.1 Shared Library..............................3 3.1.2 Shared Object File............................3 3.1.3 Dynamic-link Library..........................3 3.1.4 Dynamically Loaded Library......................3 3.1.5 DLL....................................3 3.2 Process and Image................................3 3.2.1 Image...................................3 3.2.2 MPI Process...............................4 3.2.3 Address Space..............................4 3.2.4 \mqs_image"...............................4 3.3 \Starter" Process.................................4 3.3.1 The MPI Process as the Starter Process................4 3.3.2 A Separate mpiexec as the Starter Process..............4 3.4 MQD Host and Target Node..........................5 4 Debugger/MPI Interaction Model6 4.1 The MQD DLL..................................6 4.2 Debugger/Debug DLL Interaction Use Case..................6 5 Interface Specifications9 5.1 MPIR_dll_name.................................9 5.2 Types for Target Independence.........................9 5.2.1 mqs_tword_t...............................9 5.2.2 mqs_taddr_t............................... 10 5.2.3 mqs_target_type_sizes.........................
    [Show full text]
  • Chapter 14: Interprocess Communication
    Chapter 14: Interprocess Communication CMPS 105: Systems Programming Prof. Scott Brandt T Th 2-3:45 Soc Sci 2, Rm. 167 Plans This week: Chapter 14 Next week: Networked IPC Other? Last week Something Review Introduction Interprocess Communication (IPC) enables processes to communicate with each other to share information Pipes (half duplex) FIFOs (named pipes) Stream pipes (full duplex) Named stream pipes Message queues Semaphores Shared Memory Sockets Streams Pipes Oldest (and perhaps simplest) form of UNIX IPC Half duplex Data flows in only one direction Only usable between processes with a common ancestor Usually parent-child Also child-child Pipes (cont.) #include <unistd.h> int pipe(int fildes[2]); fildes[0] is open for reading and fildes[1] is open for writing The output of fildes[1] is the input for fildes[0] Understanding Pipes Within a process Writes to fildes[1] can be read on fildes[0] Not very useful Between processes After a fork() Writes to fildes[1] by one process can be read on fildes[0] by the other Understanding Pipes (cont.) Even more useful: two pipes, fildes_a and fildes_b After a fork() Writes to fildes_a[1] by one process can be read on fildes_a[0] by the other, and Writes to fildes_b[1] by that process can be read on fildes_b[0] by the first process Using Pipes Usually, the unused end of the pipe is closed by the process If process A is writing and process B is reading, then process A would close fildes[0] and process B would close fildes[1] Reading from a pipe whose write
    [Show full text]
  • Shared Memory Introduction
    12 Shared Memory Introduction 12.1 Introduction Shared memory is the fastest form of IPC available. Once the memory is mapped into the address space of the processes that are sharing the memory region, no kernel involvement occurs in passing data between the processes. What is normally required, however, is some form of synchronization between the processes that are storing and fetching information to and from the shared memory region. In Part 3, we discussed various forms of synchronization: mutexes, condition variables, read–write locks, record locks, and semaphores. What we mean by ‘‘no kernel involvement’’ is that the processes do not execute any sys- tem calls into the kernel to pass the data. Obviously, the kernel must establish the mem- ory mappings that allow the processes to share the memory, and then manage this memory over time (handle page faults, and the like). Consider the normal steps involved in the client–server file copying program that we used as an example for the various types of message passing (Figure 4.1). • The server reads from the input file. The file data is read by the kernel into its memory and then copied from the kernel to the process. • The server writes this data in a message, using a pipe, FIFO, or message queue. These forms of IPC normally require the data to be copied from the process to the kernel. We use the qualifier normally because Posix message queues can be implemented using memory-mapped I/O (the mmap function that we describe in this chapter), as we showed in Section 5.8 and as we show in the solution to Exercise 12.2.
    [Show full text]
  • Interaction Between the User and Kernel Space in Linux
    1 Interaction Between the User and Kernel Space in Linux Kai Lüke, Technische Universität Berlin F Abstract—System calls based on context switches from user to kernel supported in POSIX as well as System V style. A very space are the established concept for interaction in operating systems. common principle for IPC are sockets, and pipes can be seen On top of them the Linux kernel offers various paradigms for commu- as their most simple case. Besides the popular IP family with nication and management of resources and tasks. The principles and TCP/UDP, the local Unix domain sockets play a big role basic workings of system calls, interrupts, virtual system calls, special for many applications, while Netlink sockets are specific purpose virtual filesystems, process signals, shared memory, pipes, Unix or IP sockets and other IPC methods like the POSIX or System V to the Linux kernel and are not often found in user space message queue and Netlink are are explained and related to each other applications due to portability to other operating systems. in their differences. Because Linux is not a puristic project but home for There have been attempts to bring the D-BUS IPC into many different concepts, only a mere overview is presented here with the kernel with a Netlink implementation, kdbus and then focus on system calls. Bus1, but this will not be covered here. Also comparative studies with other operating systems are out of scope. 1 INTRODUCTION 2 KERNEL AND USER SPACE ERNELS in the Unix family are normally not initiating K any actions with outside effects, but rely on requests The processes have virtualized access to the memory as well from user space to perform these actions.
    [Show full text]