Lezione? Real-Time Marco Cesati Marco Cesati Lezione R13

Total Page:16

File Type:pdf, Size:1020Kb

Lezione? Real-Time Marco Cesati Marco Cesati Lezione R13 Sistemi operativi Sistemi operativi real-time Di cosa parliamo in questa lezione? real-time Marco Cesati Marco Cesati Lezione R13 Sistemi operativi real-time – II In questa lezione descriviamo brevemente alcuni dei più diffusi Schema della lezione sistemi operativi real-time Schema della lezione Caratteristiche comuni Caratteristiche comuni VxWorks VxWorks LynxOS LynxOS 1 Caratteristiche comuni degli RTOS QNX QNX Sistemi embedded e real-time 2 eCos VxWorks eCos Windows 3 LynxOS Windows Linux come RTOS Linux come RTOS 4 15 gennaio 2013 QNX Neutrino 5 eCos 6 Windows Embedded CE 7 Linux come RTOS Marco Cesati Dipartimento di Ingegneria Civile e Ingegneria Informatica Università degli Studi di Roma Tor Vergata SERT’13 R13.1 SERT’13 R13.2 Sistemi operativi Sistemi operativi Caratteristiche comuni dei principali RTOS real-time La schedulazione nei principali RTOS real-time Marco Cesati Marco Cesati Corrispondenza agli standard: generalmente le API sono Almeno 32 livelli di priorità differenti proprietarie, ma gli RTOS offrono anche compatibilità Possibilità di scelta fra FIFO e Round Robin per la (compliancy) o conformità (conformancy) allo standard gestione dei task nello stesso livello di priorità Real-Time POSIX Possibilità di cambiare la priorità a run-time Modularità e Scalabilità: il kernel ha una dimensione Schema della lezione Schema della lezione Caratteristiche comuni Caratteristiche comuni (footprint) ridotta e le sue funzionalità sono configurabili Generalmente non supportano in maniera nativa politiche VxWorks VxWorks di scheduling a priorità dinamica (es. EDF) o la possibilità Dimensione del codice: spesso basati su microkernel LynxOS LynxOS QNX di integrare server a conservazione di banda, ecc. QNX Velocità e Efficienza: basso overhead per cambi di eCos Offrono meccanismi di controllo dell’inversione di priorità: eCos contesto, latenza delle interruzioni e primitive di Windows Windows tipicamente priority inheritance, alcuni RTOS anche sincronizzazione Linux come RTOS Linux come RTOS priority ceiling Porzioni di codice non interrompibile: generalmente molto corte e di durata predicibile Risoluzione nominale di timer e orologi di un nanosecondo, ma l’accuratezza non è mai sotto a 100 ns Gestione delle interruzioni “separata”: interrupt handler a causa della latenza di gestione delle interruzioni corto e predicibile, ISR lunga e di durata variabile Gestione della memoria: possibilità di utilizzare memoria virtuale e protezione dello spazio di indirizzi kernel Alcuni meccanismi, come quelli di controllo dell’inversione di (disabilitabili); non esiste in genere la paginazione priorità, possono essere abilitati o disabilitati in fase di progetto SERT’13 R13.3 SERT’13 R13.4 Sistemi operativi Sistemi operativi Quanti sono gli RTOS? real-time Quanti sono gli RTOS? (2) real-time Marco Cesati Marco Cesati Esistono molti sistemi operativi RTOS, in particolare per il Abassi, AMOS, AMX RTOS, ARTOS (Locamation), ARTOS (Robotu), Atomthreads, AVIX, segmento embedded BeRTOS, BRTOS, CapROS, ChibiOS/RT, ChorusOS, ChronOS, CMX RTOS, cocoOS, Concurrent CP/M, Concurrent DOS, Contiki, COS, CooCox CoOS, Deos, DioneOS, DNIX, Ad esempio: GEC DOS, DrRtos, DSPnano RTOS, DSOS, eCos, eCosPro, embOS, Embox, ERIKA Schema della lezione Schema della lezione VxWorks Enterprise, EROS, Femto OS, FlexOS, FreeRTOS, FunkOS, Fusion RTOS, Helium, Caratteristiche comuni HP-1000/RTE, Hybridthreads, IBM 4680 OS, IBM 4690 OS, INTEGRITY, IntervalZero Caratteristiche comuni LynxOS VxWorks VxWorks RTX, ITRON, µITRON, ioRTOS, iRTOS, KolibriOS, LynxOS, MaRTE OS, MAX II,IV, LynxOS LynxOS QNX MenuetOS, Micrium µC/OS-II, Micrium µC/OS-III, Milos, Microsoft Invisible Computing QNX QNX (MMLite), MP/M, MERT, Multiuser DOS, Nano-RK, Neutrino, Nokia OS, Nucleus OS, Windows CE eCos eCos Linux Windows NuttX, On Time RTOS-32, OS20, OS21, OS4000, OPENRTOS, OSA, OSE, OS-9, OSEK, Windows Linux come RTOS Phar Lap ETS, PaulOS, PICOS18, picoOS, Phoenix-RTOS, PikeOS, Portos,POK, Linux come RTOS eCos PowerTV, Prex, Protothreads, pSOS, QNX, Q-Kernel, QP, RDOS, REAL/32, Real-time PikeOS Linux (CONFIG_RT_PREEMPT), REX OS, RSX-11, RT-11, RTAI, RTEMS, rt-kernel, ThreadX RTLinux, RT-Thread, RTXC Quadros, SafeRTOS, Salvo, SCIOPTA, scmRTOS, SDPOS, RTEMS SHaRK, SimpleAVROS, SINTRAN III, Sirius RTOS, SMX RTOS, SOOS Project, Symbian OS, SYS/BIOS, Talon DSP RTOS, TargetOS, T-Kernel, THEOS, ThreadX, Trampoline Operating System Embedded Operating System (OSEK and AUTOSAR), TNKernel, Transaction Processing Facility, OS-9 TRON project, TUD:OS, Unison RTOS, UNIX-RTR, µTasker, u-velOSity, VRTX, Windows Nucleus OS CE, Xenomai, xPC Target, Y@SOS, MontaVista Linux, µnOS, uOS SERT’13 R13.5 SERT’13 R13.6 Sistemi operativi Sistemi operativi VxWorks real-time Gestione delle interruzioni in VxWorks real-time Marco Cesati Marco Cesati VxWorks è un RTOS commerciale prodotto dalla WindRiver (www.windriver.com) Le Interrupt Service Routine (ISR) eseguono in un Installato su oltre 500 milioni di dispositivi contesto differente rispetto a quello di tutti i task ed a priorità più elevata di quelle dei task Basato sul microkernel Wind Schema della lezione Schema della lezione Caratteristiche comuni È possibile aggiustare la priorità di interruzioni provenienti Caratteristiche comuni È utilizzato in sistemi ad elevata affidabilità con VxWorks da particolari periferiche VxWorks certificazione DO-178B livello A, Arinc 653, IEC 61508 LynxOS LynxOS QNX Ciascuna ISR può essere interrotta da una ISR di priorità QNX Ha un ambiente di sviluppo basato su Eclipse eCos eCos superiore (WorkBench) Windows Windows Linux come RTOS Linux come RTOS Supporta lo sviluppo cross-platform e semplifica la Le ISR condividono un unico stack (che deve essere creazione delle toolchain di compilazione e collegamento abbastanza grande in rapporto al massimo livello di annidamento di interruzioni richiesto dal progetto) Adatto sia per sistemi embedded che per sistemi con molte risorse Le interruzioni possono essere disabilitate o abilitate mediante le API proprietarie intLock() ed Le API (interfaccie per le applicazioni) sono proprietarie intUnLock() Fornisce anche un’interfaccia di compatibilità per le API POSIX Real-Time SERT’13 R13.7 SERT’13 R13.8 Sistemi operativi Sistemi operativi Schedulazione in VxWorks real-time Gestione della memoria e comunicazione in VxWorks real-time Marco Cesati Marco Cesati Se presente, può utilizzare un dispositivo MMU (Memory I task del sistema sono in generale interrompibili Management Unit) Lo scheduler è a priorità fissa a livello di task per realizzare memoria virtuale Schema della lezione Schema della lezione Task di pari priorità possono essere gestiti con politiche Caratteristiche comuni per proteggere lo spazio di indirizzamento Caratteristiche comuni FIFO oppure Round Robin VxWorks VxWorks LynxOS sono comunque meccanismi disabilitabili LynxOS È possibile disabilitare l’interrompibilità di un task QNX QNX (API proprietarie taskLock() e taskUnLock()) eCos eCos Windows Supporta i principali meccanismi di comunicazione fra task: Windows Supporta il meccanismo di priority inheritance Linux come RTOS Linux come RTOS Memoria condivisa Supporta architetture SMP (multiprocessore simmetrico) ed architetture AMP (multiprocessore asimmetrico) Semafori e mutex Consente di specificare la CPU preferenziale di Code di messaggi e pipe esecuzione di un task (taskCpuAffinitySet()) Segnali SERT’13 R13.9 SERT’13 R13.10 Sistemi operativi Sistemi operativi LynxOS real-time Gestione delle interruzioni in LynxOS real-time Marco Cesati Marco Cesati LynxOS è una linea di RTOS commerciali prodotti dalla LynuxWorks (www.lynuxworks.com) La gestione delle interruzioni è di tipo “separata”: Esistono diverse versioni, tra le quali: LynxOS RTOS: per sistemi embedded Schema della lezione La prima parte della gestione è effettuata a priorità più Schema della lezione LynxOS-SE RTOS: per sistemi partizionati con Caratteristiche comuni elevata rispetto a quella dei task Caratteristiche comuni applicazioni POSIX, Linux e conformi a Arinc 653 VxWorks VxWorks LynxOS Nel caso la prima parte non completi la gestione LynxOS LynxOS-178 RTOS: per sistemi safety-critical, certificabili QNX dell’interruzione, viene impostata una interruzione QNX DO-178B livello A e Arinc 653 eCos (software) asincrona per interrompere il kernel eCos Windows Windows Il cuore di tutti questi SO è LynxOS RTOS: Linux come RTOS Non appena il kernel è in esecuzione in modalità Linux come RTOS interrompibile, viene schedulato un thread per la gestione Utilizzato in milioni di dispositivi secondaria dell’interruzione Compatibile con l’ABI (Application Binary Interface) di Il thread esegue alla priorità del task che ha effettuato Linux l’“apertura” del device che ha generato l’interruzione Utilizza un kernel monolitico L’ambiente di sviluppo è tipicamente “cross-platform” e basato su Eclipse SERT’13 R13.11 SERT’13 R13.12 Sistemi operativi Sistemi operativi Lo scheduler di LynxOS real-time Altri dettagli su LynxOS real-time Marco Cesati Marco Cesati I task di LynxOS sono in generale interrompibili Schema della lezione Ha supporto completo (ma disabilitabile) per i meccanismi Schema della lezione Caratteristiche comuni di memoria virtuale e protezione della memoria Caratteristiche comuni Lo scheduler è a priorità fissa, con 256 livelli di priorità VxWorks VxWorks LynxOS Ha supporto per il meccanismo di allocazione della LynxOS Task di uguale priorità sono gestiti come FIFO o Round QNX memoria “su richiesta” (demand paging) QNX Robin eCos eCos Windows Supporta architetture SMP Windows
Recommended publications
  • Beyond BIOS Developing with the Unified Extensible Firmware Interface
    Digital Edition Digital Editions of selected Intel Press books are in addition to and complement the printed books. Click the icon to access information on other essential books for Developers and IT Professionals Visit our website at www.intel.com/intelpress Beyond BIOS Developing with the Unified Extensible Firmware Interface Second Edition Vincent Zimmer Michael Rothman Suresh Marisetty Copyright © 2010 Intel Corporation. All rights reserved. ISBN 13 978-1-934053-29-4 This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in professional services. If professional advice or other expert assistance is required, the services of a competent professional person should be sought. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel may make changes to specifications, product descriptions, and plans at any time, without notice. Fictitious names of companies, products, people, characters, and/or data mentioned herein are not intended to represent any real individual, company, product, or event. Intel products are not intended for use in medical, life saving, life sustaining, critical control or safety systems, or in nuclear facility applications. Intel, the Intel logo, Celeron, Intel Centrino, Intel NetBurst, Intel Xeon, Itanium, Pentium, MMX, and VTune are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
    [Show full text]
  • Cisco Telepresence TC Software Licensing Information (TC4.1)
    Cisco TelePresence TC Software License information guide TC Software FEBRUARY 2011 Legal information and third party copyright and licenses For Cisco TelePresence products using TC software D14767.02 License Information for products using TC Software, TC4 February 2011. 1 © 2010-2011 Cisco Systems, Inc. All rights reserved. www.cisco.com Cisco TelePresence TC Software License information guide ipcalc-1.3, ipcalc-license ...................................................................................... 16 TA - ToC - Hidden Table of Contents iproute-2.6.26, GPLv2 .......................................................................................16 What’stext anchor in iptables-1.4.28, GPLv2......................................................................................16 About this guide ..............................................................................................................4 iputils-s20071127, iputils-bsd-license .................................................... 16 The products covered by this guide: .....................................................4 jpeg lib, jpeg-license ................................................................................................ 17 this guide? User documentation .............................................................................................4 Kmod-*, GPLv2 ........................................................................................................19 Software download ................................................................................................4
    [Show full text]
  • Validated Products List, 1995 No. 3: Programming Languages, Database
    NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 QC 100 NIST .056 NO. 5693 1995 NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 (Supersedes April 1995 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors for programming languages COBOL, Fortran, Ada, Pascal, C, M[UMPS], and database language SQL; computer graphic implementations for GKS, COM, PHIGS, and Raster Graphics; operating system implementations for POSIX; Open Systems Interconnection implementations; and computer security implementations for DES, MAC and Key Management.
    [Show full text]
  • AMNESIA 33: How TCP/IP Stacks Breed Critical Vulnerabilities in Iot
    AMNESIA:33 | RESEARCH REPORT How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices Published by Forescout Research Labs Written by Daniel dos Santos, Stanislav Dashevskyi, Jos Wetzels and Amine Amri RESEARCH REPORT | AMNESIA:33 Contents 1. Executive summary 4 2. About Project Memoria 5 3. AMNESIA:33 – a security analysis of open source TCP/IP stacks 7 3.1. Why focus on open source TCP/IP stacks? 7 3.2. Which open source stacks, exactly? 7 3.3. 33 new findings 9 4. A comparison with similar studies 14 4.1. Which components are typically flawed? 16 4.2. What are the most common vulnerability types? 17 4.3. Common anti-patterns 22 4.4. What about exploitability? 29 4.5. What is the actual danger? 32 5. Estimating the reach of AMNESIA:33 34 5.1. Where you can see AMNESIA:33 – the modern supply chain 34 5.2. The challenge – identifying and patching affected devices 36 5.3. Facing the challenge – estimating numbers 37 5.3.1. How many vendors 39 5.3.2. What device types 39 5.3.3. How many device units 40 6. An attack scenario 41 6.1. Other possible attack scenarios 44 7. Effective IoT risk mitigation 45 8. Conclusion 46 FORESCOUT RESEARCH LABS RESEARCH REPORT | AMNESIA:33 A note on vulnerability disclosure We would like to thank the CERT Coordination Center, the ICS-CERT, the German Federal Office for Information Security (BSI) and the JPCERT Coordination Center for their help in coordinating the disclosure of the AMNESIA:33 vulnerabilities.
    [Show full text]
  • Sistemi Operativi Real-Time Marco Cesati Lezione R13 Sistemi Operativi Real-Time – II Schema Della Lezione
    Sistemi operativi real-time Marco Cesati Lezione R13 Sistemi operativi real-time – II Schema della lezione Caratteristiche comuni VxWorks LynxOS Sistemi embedded e real-time QNX eCos Windows Linux come RTOS 15 gennaio 2013 Marco Cesati Dipartimento di Ingegneria Civile e Ingegneria Informatica Università degli Studi di Roma Tor Vergata SERT’13 R13.1 Sistemi operativi Di cosa parliamo in questa lezione? real-time Marco Cesati In questa lezione descriviamo brevemente alcuni dei più diffusi sistemi operativi real-time Schema della lezione Caratteristiche comuni VxWorks LynxOS 1 Caratteristiche comuni degli RTOS QNX 2 VxWorks eCos 3 LynxOS Windows Linux come RTOS 4 QNX Neutrino 5 eCos 6 Windows Embedded CE 7 Linux come RTOS SERT’13 R13.2 Sistemi operativi Caratteristiche comuni dei principali RTOS real-time Marco Cesati Corrispondenza agli standard: generalmente le API sono proprietarie, ma gli RTOS offrono anche compatibilità (compliancy) o conformità (conformancy) allo standard Real-Time POSIX Modularità e Scalabilità: il kernel ha una dimensione Schema della lezione Caratteristiche comuni (footprint) ridotta e le sue funzionalità sono configurabili VxWorks Dimensione del codice: spesso basati su microkernel LynxOS QNX Velocità e Efficienza: basso overhead per cambi di eCos contesto, latenza delle interruzioni e primitive di Windows sincronizzazione Linux come RTOS Porzioni di codice non interrompibile: generalmente molto corte e di durata predicibile Gestione delle interruzioni “separata”: interrupt handler corto e predicibile, ISR lunga
    [Show full text]
  • Ebook - Informations About Operating Systems Version: August 15, 2006 | Download
    eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org AIX Internet: AIX AmigaOS Internet: AmigaOS AtheOS Internet: AtheOS BeIA Internet: BeIA BeOS Internet: BeOS BSDi Internet: BSDi CP/M Internet: CP/M Darwin Internet: Darwin EPOC Internet: EPOC FreeBSD Internet: FreeBSD HP-UX Internet: HP-UX Hurd Internet: Hurd Inferno Internet: Inferno IRIX Internet: IRIX JavaOS Internet: JavaOS LFS Internet: LFS Linspire Internet: Linspire Linux Internet: Linux MacOS Internet: MacOS Minix Internet: Minix MorphOS Internet: MorphOS MS-DOS Internet: MS-DOS MVS Internet: MVS NetBSD Internet: NetBSD NetWare Internet: NetWare Newdeal Internet: Newdeal NEXTSTEP Internet: NEXTSTEP OpenBSD Internet: OpenBSD OS/2 Internet: OS/2 Further operating systems Internet: Further operating systems PalmOS Internet: PalmOS Plan9 Internet: Plan9 QNX Internet: QNX RiscOS Internet: RiscOS Solaris Internet: Solaris SuSE Linux Internet: SuSE Linux Unicos Internet: Unicos Unix Internet: Unix Unixware Internet: Unixware Windows 2000 Internet: Windows 2000 Windows 3.11 Internet: Windows 3.11 Windows 95 Internet: Windows 95 Windows 98 Internet: Windows 98 Windows CE Internet: Windows CE Windows Family Internet: Windows Family Windows ME Internet: Windows ME Seite 1 von 138 eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org Windows NT 3.1 Internet: Windows NT 3.1 Windows NT 4.0 Internet: Windows NT 4.0 Windows Server 2003 Internet: Windows Server 2003 Windows Vista Internet: Windows Vista Windows XP Internet: Windows XP Apple - Company Internet: Apple - Company AT&T - Company Internet: AT&T - Company Be Inc. - Company Internet: Be Inc. - Company BSD Family Internet: BSD Family Cray Inc.
    [Show full text]
  • RT-ROS: a Real-Time ROS Architecture on Multi-Core Processors
    Future Generation Computer Systems 56 (2016) 171–178 Contents lists available at ScienceDirect Future Generation Computer Systems journal homepage: www.elsevier.com/locate/fgcs RT-ROS: A real-time ROS architecture on multi-core processors Hongxing Wei a,1, Zhenzhou Shao b, Zhen Huang a, Renhai Chen d, Yong Guan b, Jindong Tan c,1, Zili Shao d,∗,1 a School of Mechanical Engineering and Automation, Beihang University, Beijing, 100191, PR China b College of Information Engineering, Capital Normal University, Beijing, 100048, PR China c Department of Mechanical, Aerospace, and Biomedical Engineering, The University of Tennessee, Knoxville, TN, 37996-2110, USA d Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China article info a b s t r a c t Article history: ROS, an open-source robot operating system, is widely used and rapidly developed in the robotics Received 6 February 2015 community. However, running on Linux, ROS does not provide real-time guarantees, while real-time tasks Received in revised form are required in many robot applications such as robot motion control. This paper for the first time presents 20 April 2015 a real-time ROS architecture called RT-RTOS on multi-core processors. RT-ROS provides an integrated Accepted 12 May 2015 real-time/non-real-time task execution environment so real-time and non-real-time ROS nodes can be Available online 9 June 2015 separately run on a real-time OS and Linux, respectively, with different processor cores. In such a way, real-time tasks can be supported by real-time ROS nodes on a real-time OS, while non-real-time ROS nodes Keywords: Real-time operating systems on Linux can provide other functions of ROS.
    [Show full text]
  • POLITECNICO DI MILANO DEPARTMENT of CIVIL and ENVIRONMENTAL ENGINEERING – Environmental Section
    POLITECNICO DI MILANO DEPARTMENT OF CIVIL AND ENVIRONMENTAL ENGINEERING – Environmental Section AWARE – Assessment on Waste and Resources – Research group LITERATURE REVIEW ON THE ASSESSMENT OF THE CARBONATION POTENTIAL OF LIME IN DIFFERENT MARKETS AND BEYOND Customer: EuLA – the European Lime Association Authors: Prof. Mario Grosso (Principal Investigator) Eng. Laura Biganzoli, Francesco Pietro Campo, Sara Pantini, Camilla Tua July 2020 Report n. 845.0202.70.02 To refer to this report, please use the following reference: Grosso M., Biganzoli L., Campo F. P., Pantini S., Tua C. 2020. Literature review on the assessment of the carbonation potential of lime in different markets and beyond. Report prepared by Assessment on Waste and Resources (AWARE) Research Group at Politecnico di Milano (PoliMI), for the European Lime Association (EuLA). Pp. 333. CHAPTER AUTHORS 1 EXECUTIVE SUMMARY F. P. Campo, C. Tua, M. Grosso 2 METHODOLOGY AND SCOPE OF THE WORK F. P. Campo, M. Grosso 3 INTRODUCTION: LIME USE AND APPLICATIONS F. P. Campo, M. Grosso 3.1 USE OF LIME IN IRON AND STEEL INDUSTRY L. Biganzoli, M. Grosso 3.2.1 USE OF LIME IN SAND LIME BRICK C. Tua, M. Grosso APPLICATION 3.2.2 USE OF LIME IN LIGHT-WEIGHT LIME C. Tua, M. Grosso CONCRETE 3.2.3 USE OF LIME IN MORTARS F. P. Campo, M. Grosso 3.2.4 USE OF LIME IN HEMP LIME F. P. Campo, M. Grosso 3.2.5 USE OF LIME IN OTHER CONSTRUCTION F. P. Campo, M. Grosso MATERIALS 3.3.1 USE OF LIME IN SOIL STABILISATION F. P. Campo, C.
    [Show full text]
  • Soft Tools for Robotics and Controls Implementations
    Soft Tools for Robotics and Controls Implementations A Thesis Submitted to the Faculty of Drexel University by Robert M. Sherbert in partial fulfillment of the requirements for the degree of Master of Science in Electrical Engineering June 2011 c Copyright 2011 Robert M. Sherbert. All rights reserved. ii Dedications To the parents who placed me on my path, to the mentors who guided me along its many turns, and to the friends who made the long journey swift. iii Acknowledgments There are a number of people to whom I owe a great deal of thanks in completing this document. While the labor has been my own, the inspiration for it and the support to finish it have come from the community around me. In creating this work I have taken on the role of toolsmith and, as tools are worthless without their users, it is to these individuals that I am especially indebted. I would like to thank Dr. Oh for lending his vision of robotics testing and prototyping which inspired this work. You have taught me more than I realized there was to know about the modern practice of science. I would also like to thank Dr. Chmielewski for lending his experience, insight, and enthusiasm to the project. Having these ideas weighed against and improved by your practical knowledge has provided a very important validation for me. Above all I would like to thank my friends at DASL, without whom the entirety of this project would have been consigned to the dust bin long ago. You have given me not only critical feedback and suggestions but also the support and encouragement that has helped me carry this to completion.
    [Show full text]
  • RTI Data Distribution Service Platform Notes
    RTI Data Distribution Service The Real-Time Publish-Subscribe Middleware Platform Notes Version 4.5c © 2004-2010 Real-Time Innovations, Inc. All rights reserved. Printed in U.S.A. First printing. June 2010. Trademarks Real-Time Innovations and RTI are registered trademarks of Real-Time Innovations, Inc. All other trademarks used in this document are the property of their respective owners. Copy and Use Restrictions No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form (including electronic, mechanical, photocopy, and facsimile) without the prior written permission of Real- Time Innovations, Inc. The software described in this document is furnished under and subject to the RTI software license agreement. The software may be used or copied only under the terms of the license agreement. Technical Support Real-Time Innovations, Inc. 385 Moffett Park Drive Sunnyvale, CA 94089 Phone: (408) 990-7444 Email: [email protected] Website: http://www.rti.com/support Contents 1 Supported Platforms.........................................................................................................................1 2 AIX Platforms.....................................................................................................................................3 2.1 Changing Thread Priority.......................................................................................................3 2.2 Multicast Support ....................................................................................................................3
    [Show full text]
  • Access Control and Operating System
    Outline (may not finish in one lecture) Access Control and Operating Access Control Concepts Secure OS System Security • Matrix, ACL, Capabilities • Methods for resisting • Multi-level security (MLS) stronger attacks OS Mechanisms Assurance • Multics • Orange Book, TCSEC John Mitchell – Ring structure • Common Criteria • Amoeba • Windows 2000 – Distributed, capabilities certification • Unix Some Limitations – File system, Setuid • Information flow • Windows • Covert channels – File system, Tokens, EFS • SE Linux – Role-based, Domain type enforcement Access control Access control matrix [Lampson] Common Assumption Objects • System knows who the user is File 1 File 2 File 3 … File n – User has entered a name and password, or other info • Access requests pass through gatekeeper User 1 read write - - read – OS must be designed monitor cannot be bypassed User 2 write write write - - Reference Subjects monitor User 3 - - - read read User process ? Resource … User m read write read write read Decide whether user can apply operation to resource Two implementation concepts Capabilities Access control list (ACL) File 1 File 2 … Operating system concept • “… of the future and always will be …” • Store column of matrix User 1 read write - Examples with the resource User 2 write write - • Dennis and van Horn, MIT PDP-1 Timesharing Capability User 3 - - read • Hydra, StarOS, Intel iAPX 432, Eros, … • User holds a “ticket” for … • Amoeba: distributed, unforgeable tickets each resource User m read write write • Two variations References – store
    [Show full text]
  • Research Purpose Operating Systems – a Wide Survey
    GESJ: Computer Science and Telecommunications 2010|No.3(26) ISSN 1512-1232 RESEARCH PURPOSE OPERATING SYSTEMS – A WIDE SURVEY Pinaki Chakraborty School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi – 110067, India. E-mail: [email protected] Abstract Operating systems constitute a class of vital software. A plethora of operating systems, of different types and developed by different manufacturers over the years, are available now. This paper concentrates on research purpose operating systems because many of them have high technological significance and they have been vividly documented in the research literature. Thirty-four academic and research purpose operating systems have been briefly reviewed in this paper. It was observed that the microkernel based architecture is being used widely to design research purpose operating systems. It was also noticed that object oriented operating systems are emerging as a promising option. Hence, the paper concludes by suggesting a study of the scope of microkernel based object oriented operating systems. Keywords: Operating system, research purpose operating system, object oriented operating system, microkernel 1. Introduction An operating system is a software that manages all the resources of a computer, both hardware and software, and provides an environment in which a user can execute programs in a convenient and efficient manner [1]. However, the principles and concepts used in the operating systems were not standardized in a day. In fact, operating systems have been evolving through the years [2]. There were no operating systems in the early computers. In those systems, every program required full hardware specification to execute correctly and perform each trivial task, and its own drivers for peripheral devices like card readers and line printers.
    [Show full text]