Match!

Amoeba: a distributed operating system for the 1990s

Published on May 1, 1990in IEEE Computer3.564
· DOI :10.1109/2.53354
Sape J. Mullender21
Estimated H-index: 21
,
G. van Rossum1
Estimated H-index: 1
+ 2 AuthorsH. van Staveren2
Estimated H-index: 2
(UvA: University of Amsterdam)
Sources
Abstract
A description is given of the Amoeba distributed operating system, which appears to users as a centralized system but has the speed, fault tolerance, security safeguards, and flexibility required for the 1990s. The Amoeba software is based on objects. Objects are managed by server processes and named using capabilities chosen randomly from a sparse name space. Amoeba has a unique, fast file system split into two parts: the bullet service stores immutable files contiguously on the disk; the directory service gives capabilities symbolic names and handles replication and atomicity, eliminating the need for a separate transaction management system. To bridge the gap with existing systems, Amoeba has a Unix emulation facility consisting of a library of Unix system call routines that make calls to the various Amoeba server processes. >
  • References (10)
  • Citations (397)
📖 Papers frequently viewed together
1986
874 Citations
592 Citations
438 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
References10
Newest
#1Guido van RossumH-Index: 1
AIL — an acronym for Amoeba Interface Language — is a class-oriented RPC stub generator, used with Amoeba's RPC primitives. Together with Amoeba's facilities for manipulating capabilities (bit patterns that are unforgeable references to objects maintained by servers anywhere on a network), AIL provides a completely object-oriented view of a distributed operating system.
9 CitationsSource
#1R. van Renesse (UvA: University of Amsterdam)H-Index: 1
#2H. van Staveren (UvA: University of Amsterdam)H-Index: 2
Last. A. D. Tanenbaum (VU: VU University Amsterdam)H-Index: 1
view all 3 authors...
Amoeba is a capability‐based distributed operating system designed for high‐performance interactions between clients and servers using the well‐known RPC model. The paper starts out by describing the architecture of the Amoeba system, which is typified by specialized components such as workstations, several services, a processor pool, and gateways that connect other Amoeba systems transparently over wide‐area networks. Next the RPC interface is described. The paper presents performance measureme...
49 CitationsSource
438 CitationsSource
#1Marc RozierH-Index: 8
#2Vadim AbrossimovH-Index: 4
Last. Will NeuhauserH-Index: 1
view all 11 authors...
The Cnonus technology has been designed for building o'new generations" of open, distributed, scalable Operating Systems. CHoRus has the following main characteristics:
199 Citations
#1Sape J. Mullender (CWI: Centrum Wiskunde & Informatica)H-Index: 21
#2A. S. TanenbatjmH-Index: 59
Fifth-generation computer systems will use large numbers of processors to achieve high performance. In this paper a capability-based operating system designed for this environment is discussed. Capability-based operating systems have traditionally required large, complex kernels to manage the use of capabilities. In our proposal, capability management is done entirely by user programs without giving up any of the protection aspects normally associated with capabilities. The basic idea is to use ...
176 CitationsSource
#1Michael J. Accetta (CMU: Carnegie Mellon University)H-Index: 1
#2Robert V. Baron (CMU: Carnegie Mellon University)H-Index: 9
Last. Michael Young (CMU: Carnegie Mellon University)H-Index: 5
view all 7 authors...
874 Citations
1,875 CitationsSource
Oct 10, 1983 in SOSP (Symposium on Operating Systems Principles)
#1Bruce D. Walker (UCLA: University of California, Los Angeles)H-Index: 138
#2Gerald J. Popek (UCLA: University of California, Los Angeles)H-Index: 37
Last. Greg Thiel (UCLA: University of California, Los Angeles)H-Index: 3
view all 5 authors...
LOCUS is a distributed operating system which supports transparent access to data through a network wide filesystem, permits automatic replication of storage, supports transparent distributed process execution, supplies a number of high reliability functions such as nested transactions, and is upward compatible with Unix. Partitioned operation of subnet's and their dynamic merge is also supported. The system has been operational for about two years at UCLA and extensive experience in its use has...
409 CitationsSource
#1A. J. HerbertH-Index: 1
This book has grown out of practical experience with distributed computing systems, based on fast local communications, at the Computer Laboratories at Cambridge University. The emphasis is on the provision of a system rather than simply the assembly of components; in the course of this most of the main design issues of distributed systems arise, and the book describes the solutions adopted in the context of possible alternatives.
117 Citations
#1Maurice V. WilkesH-Index: 21
147 Citations
Cited By397
Newest
#1Richard Wolski (UCSB: University of California, Santa Barbara)H-Index: 42
#2Chandra Krintz (UCSB: University of California, Santa Barbara)H-Index: 26
Last. Wei-Tsung Lin (UCSB: University of California, Santa Barbara)H-Index: 2
view all 5 authors...
In this paper, we present CSPOT, a distributed runtime system implementing a functions-as-service (FaaS) programming model for the "Internet of Things" (IoT). With FaaS, developers express arbitrary computations as simple functions that are automatically invoked and managed by a cloud platform in response to events. We extend this FaaS model so that it is suitable for use in all tiers of scale for IoT - sensors, edge devices, and cloud - to facilitate robust, portable, and low-latency IoT applic...
1 CitationsSource
#1Karim Sobh (The: American University in Cairo)
#2Amr El-Kadi (The: American University in Cairo)H-Index: 3
Operating system kernels are designed to manage the underlying hardware resources of an environment and avail them to applications in a unified secure way. General purpose kernels perform average over different diversified application profiles and workloads. Their policies are not designed to be a perfect-fit for Big Data applications. In this paper, we present a special purpose tickless AMP distributed kernel designed with Big Data in mind. Design goals and decisions are presented together with...
Source
Jun 8, 2019 in PLDI (Programming Language Design and Implementation)
#1Nikos Vasilakis (UPenn: University of Pennsylvania)H-Index: 4
#2Ben Karel (UPenn: University of Pennsylvania)H-Index: 4
Last. Jonathan M. Smith (UPenn: University of Pennsylvania)H-Index: 41
view all 6 authors...
Distributed systems offer notable benefits over their centralized counterparts. Reaping these benefits, however, requires burdensome developer effort to identify and rewrite bottlenecked components. Light-touch distribution is a new approach that converts a legacy system into a distributed one using automated transformations. Transformations operate at the boundaries of bottlenecked modules and are parametrizable by light distribution recipes that guide the intended semantics of the resulting di...
2 CitationsSource
Apr 29, 2019 in INFOCOM (International Conference on Computer Communications)
#1Dinuni Fernando (Binghamton University)H-Index: 2
#2Jonathan Terner (Binghamton University)
Last. Ping Yang (Binghamton University)H-Index: 12
view all 4 authors...
Post-copy is one of the two key techniques (besides pre-copy) for live migration of virtual machines in data centers. Post-copy provides deterministic total migration time and low downtime for write-intensive VMs. However, if post-copy migration fails for any reason, the migrating VM is lost because the VM’s latest consistent state is split between the source and destination nodes during migration. In this paper, we present PostCopyFT, a new approach to recover a VM after a destination or networ...
Source
Apr 4, 2019 in ASPLOS (Architectural Support for Programming Languages and Operating Systems)
#1Sebastian Österlund (VU: VU University Amsterdam)H-Index: 2
#2Koen Koning (VU: VU University Amsterdam)H-Index: 3
Last. Cristiano Giuffrida (VU: VU University Amsterdam)H-Index: 23
view all 6 authors...
Kernel information leak vulnerabilities are a major security threat to production systems. Attackers can exploit them to leak confidential information such as cryptographic keys or kernel pointers. Despite efforts by kernel developers and researchers, existing defenses for kernels such as Linux are limited in scope or incur a prohibitive performance overhead. In this paper, we present kMVX, a comprehensive defense against information leak vulnerabilities in the kernel by running multiple diversi...
2 CitationsSource
#1Leonid Azriel (Technion – Israel Institute of Technology)H-Index: 2
#2Lukas Humbel (ETH Zurich)H-Index: 2
Last. Dejan MilojicicH-Index: 6
view all 10 authors...
Byte-addressable nonvolatile memory (NVM) blends the concepts of storage and memory and can radically improve data-centric applications, from in-memory databases to graph processing. By enabling large-capacity devices to be shared across multiple computing elements, fabric-attached NVM changes the nature of rack-scale systems and enables short-latency direct memory access while retaining data persistence properties and simplifying the software stack. An adequate protection scheme is paramount wh...
Source
#1Nikos Vasilakis (UPenn: University of Pennsylvania)H-Index: 4
#2Pranjal Goel (UPenn: University of Pennsylvania)
Last. Jonathan M. Smith (UPenn: University of Pennsylvania)H-Index: 41
view all 4 authors...
Perceived as a vast, interconnected graph of content, the reality of the web is very different. Immense computational resources are used to deliver this content and associated services. An even larger pool of computing power is comprised by edge user devices. This latent potential has gone unused. Ar~frames the web as a distributed computing platform, unifying processing and storage infrastructure with a core programming model and a common set of browser-provided services. By exposing the inhere...
Source
4 CitationsSource
#1Reto Achermann (ETH Zurich)H-Index: 5
#2Chris I. Dalton (HP: Hewlett-Packard)H-Index: 13
Last. Robert N. M. Watson (University of Cambridge)H-Index: 18
view all 10 authors...
It is time to reconsider memory protection. The emergence of large non-volatile main memories, scalable interconnects, and rack-scale computers running large numbers of small "micro services" creates significant challenges for memory protection based solely on MMU mechanisms. Central to this is a tension between protection and translation: optimizing for translation performance often comes with a cost in protection flexibility. We argue that a key-based memory protection scheme, complementary to...
7 CitationsSource
#1Stefan BosseH-Index: 9
Ubiquitous computing and The Internet-of-Things (IoT) raises rapidly in today's life and is becoming part of self-organizing systems (SoS). A unified and scalable information processing and communication methodology using mobile agents is presented to merge the IoT with Mobile and Cloud environments seamless. A portable and scalable Agent Processing Platform (APP) is an enabling technology that is central for the deployment of Multi-agent Systems (MAS) in strong heterogeneous networks including ...
7 CitationsSource