• Title/Summary/Keyword: Linux kernel

Search Result 301, Processing Time 0.031 seconds

Design and Implementation of a Protocol for Solving Priority Inversion Problems in Real-time OS (실시간 운영체제의 우선순위 역전현상 해결을 위한 프로토콜 설계 및 구현)

  • Kang, Seong-Goo;Gyeong, Gye-Hyeon;Ko, Kwang-Sun;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.13A no.5 s.102
    • /
    • pp.405-412
    • /
    • 2006
  • Real-time operating systems have been used in various computing environments, where a job must be completed in its deadline, with various conditions, such as effective scheduling policies, the minimum of an interrupt delay, and the solutions of priority inversion problems, that should be perfectly satisfied to design and develop optimal real-time operating systems. Up to now, in order to solve priority inversion problems among several those conditions. There have been two representative protocols: basic priority inheritance protocol and priority ceiling emulation protocol. However, these protocols cannot solve complicated priority inversion problems. In this paper, we design a protocol, called recursive priority inheritance (RPI), protocol that effectively solves the complicated priority inversion problems. Our proposed protocol is also implemented in the Linux kernel and is compared with other existing protocols in the aspect of qualitative analysis.

VirtAV: an Agentless Runtime Antivirus System for Virtual Machines

  • Tang, Hongwei;Feng, Shengzhong;Zhao, Xiaofang;Jin, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5642-5670
    • /
    • 2017
  • Antivirus is an important issue to the security of virtual machine (VM). According to where the antivirus system resides, the existing approaches can be categorized into three classes: internal approach, external approach and hybrid approach. However, for the internal approach, it is susceptible to attacks and may cause antivirus storm and rollback vulnerability problems. On the other hand, for the external approach, the antivirus systems built upon virtual machine introspection (VMI) technology cannot find and prohibit viruses promptly. Although the hybrid approach performs virus scanning out of the virtual machine, it is still vulnerable to attacks since it completely depends on the agent and hooks to deliver events in the guest operating system. To solve the aforementioned problems, based on in-memory signature scanning, we propose an agentless runtime antivirus system VirtAV, which scans each piece of binary codes to execute in guest VMs on the VMM side to detect and prevent viruses. As an external approach, VirtAV does not rely on any hooks or agents in the guest OS, and exposes no attack surface to the outside world, so it guarantees the security of itself to the greatest extent. In addition, it solves the antivirus storm problem and the rollback vulnerability problem in virtualization environment. We implemented a prototype based on Qemu/KVM hypervisor and ClamAV antivirus engine. Experimental results demonstrate that VirtAV is able to detect both user-level and kernel-level virus programs inside Windows and Linux guest, no matter whether they are packed or not. From the performance aspect, the overhead of VirtAV on guest performance is acceptable. Especially, VirtAV has little impact on the performance of common desktop applications, such as video playing, web browsing and Microsoft Office series.

Design and Implementation of Multi-rate Broadcast based Link Quality Measurement for WLAN Mesh Network (다중 전송률을 반영한 무선랜 매쉬 링크 품질 측정방법의 설계 및 구현)

  • Lee, Duck-Hwan;Yang, Seung-Chur;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.9A
    • /
    • pp.801-808
    • /
    • 2011
  • We propose MBAP(Multi-rate Broadcast Active Probing) technique to get the right measurements for link quality in Wireless Mesh Network (WMN). Most routing protocols for WMN make use of link quality-aware routing metrics, such as ETX(Expected Transmission Count) and ETT(Expected Transmission Time), while the hop count is usually used in MANET (Mobile Ad-hoc NETwork). A broadcast based active proving technique is adopted in the previous studies to get the ETX or ETT of a link. However this technique does not reflect the multi-rate feature of WLAN because it uses a single fixed transmission rate for broadcast which usually differs from the actual rate used in data transmissions. MBAP overcomes this shortage by exploiting various rate broadcast frames for probing. We implement MBAP on linux system by modifying WLAN driver and related kernel sub-systems. Experimental results show that MBAP can capture link quality more accurately than the existing techniques.

Efficient CPU Resource Utilization Mechanism on Android Platforms for Conserving Energy (안드로이드 환경에서의 에너지 절약을 위한 효율적인 CPU 자원 활용 기법)

  • Ryu, Jun-han;Kwon, Young-ho;Rhee, Byung-ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.526-529
    • /
    • 2015
  • as the smartphone industry developed, the smartphone's internal hardware devices have become high-end devices and it requires more power consumption than the previous one. therefore a battery of high capacity needed, but there is a limit in order to equip a large battery on account of smartphone minimization. The Linux Kernel provides the DVFS Mechanism to compensate for these limitations by software techniques. DVFS is dynamically adjust the frequency of the CPU to reduce the power consumption of the CPU. ondemand governor, the default policy in DVFS, apply the maximum frequency of the CPU whenever exceeding the up_threshold. so it result in a waste of CPU resources. by paying attention to this point, this paper propose the mechanism that maintain a high CPU utilization in proportion to the current frequency of the cpu to prevent the waste of CPU resources and conserve energy.

  • PDF

Performance Improvement of TCP Vegas Using Estimation of End-to-End Forward/Backward Delay Variation (종단간 순방향/역방향 전송지연 측정을 이용한 TCP Vegas의 성능 향상)

  • Shin Young-Suk;Kim Eun-Gi
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.353-358
    • /
    • 2006
  • Unlike TCP Reno, TCP Vegas recognizes network congestion through the measuring of RTT (Round Trip Time) and decides the main congestion control parameters, such as Windows size. But, congestion avoidance scheme of Vegas poorly reflects asymmetric characteristics of packet path because TCP Vegas uses the measuring of RTT that reflects forward/backward packet transmission delay as a forward delay. The RTT can't infer the forward/backward transmission delay variation because it only measures the packet's turn around time. In this paper, We have designed and implemented a new Vegas congestion control algorithm that can distinguish forward/backward network congestion. We have modified the source codes of TCP Vegas in Linux 2.6 kernel and verified their performance.

The Design & Implementation of Fieldbus Bridge for Integration of different Fieldbus networks (이기종 필드버스 통합을 위한 필드버스 게이트웨이 설계 및 구현)

  • Lee, Yeong-Min;Kim, Myung-Kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.116-120
    • /
    • 2011
  • In this paper, we have designed and implemented the integrated protocol gateway for the integration of CAN and Profibus networks. To do that, we used the Switched Ethernet as Backbone network, and each fieldbus network is connected by CAN/Ethernet or Profibus/Ethernet gateway, and each gateway perform the translation between fieldbus and Ethernet frames. Futhermore, we realized the real-time features in the environment of the Switched Ethernet by applying the distributed hard real-time scheduling algorithm among each gateways. To implement tht CAN/Ethernet and Profibus/Ethernet gateways, we used the Linux of kernel 2.6.31.12 real-time patched version(PREEMTED_RT), and we could verify successful message translation and real-time features through real implementation.

  • PDF

SSLmTCP Handshake : Embedding the SSL Handshake into the TCP 3-Way Handshake (SSLmTCP 핸드쉐이크 : SSL 핸드쉐이크를 포함하는 TCP 3-단계 핸드쉐이크)

  • Byun, Ki-Seok;Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.595-603
    • /
    • 2017
  • We propose a scheme to reduce the time for the SSL/TLS handshake by embedding it into the TCP 3-way handshake. The scheme can be selectively applied on the standard TCP for making the SSL/TCP handshake happen within the TCP handshake, rather than performing the TCP handshake and SSL/TLS handshake in sequence. We implemented a prototype of the scheme and did some experiments on its performance. Experimental results showed that, compared to the sequential handshakes of the TCP and the SSL/TLS, the time reduction achieved by the scheme varied in the range of 3.2% and 14%(when the elapsed time by the ping program from the client to the server was 11.6ms). The longer the time measured by the ping program, which would grow as the propagation and queuing delays do, the larger the reduction rate. It accords with the supposition that the reduced time due to the scheme will increase in proportion to the amount of the elapsed time measured by the ping program.

Caching and Prefetching Policies Using Program Page Reference Patterns on a File System Layer for NAND Flash Memory (NAND 플래시 메모리용 파일 시스템 계층에서 프로그램의 페이지 참조 패턴을 고려한 캐싱 및 선반입 정책)

  • Park, Sang-Oh;Kim, Kyung-San;Kim, Sung-Jo
    • The KIPS Transactions:PartA
    • /
    • v.14A no.4
    • /
    • pp.235-244
    • /
    • 2007
  • Caching and prefetching policies have been used in most of computer systems to compensate speed differences between primary memory and secondary storage devices. In this paper, we design and implement a Flash Cache Core Module(FCCM) on the YAFFS which operates on a file system layer for NAND flash memory. The FCCM is independent of the underlying kernel in order to support its stability and compatibility. Also, we implement the Dirty-Last memory replacement technique considering the characteristics of flash memory, and the waiting queue for pages to be prefetched according to page hit. The FCCM reduced the number of I/Os and the amount of prefetched pages by maximum 55%(20% on average) and maximum 55%(24% on average), respectively, comparing with caching and prefetching policies of Linux.

Design of Bandwidth Measurement based Scheduler for Improving MPTCP Performance in Bufferbloat Environment (Bufferbloat 환경에서 MPTCP 성능 개선을 위한 대역폭 측정 기반 스케줄러 설계)

  • Kim, Min Sub;Han, Ki Moon;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1508-1516
    • /
    • 2017
  • Multipath TCP (MPTCP) is a transport layer protocol that supports multipath transmission. If a bufferbloat occurs in one of the subflows of MPTCP, HoL blocking occurs at the receiver due to the difference in packet arrival time among paths. In MPTCP, HoL blocking degrades not only the performance of the path where bufferbloat occurs, but also the performance of other paths. In this paper, we propose a bandwidth measurement based scheduler to solve this problem. Bandwidth measurement based scheduler is designed to measure the bandwidth of each subflow and to perform packet scheduling based on it. In order to verify the proposed scheduler, we implemented the proposed scheduler in the Linux kernel and constructed a testbed in which bufferbloat occurs. Experimental results show that the proposed scheduler has better performance than the legacy MPTCP in bufferbloat environment.

DCCP based Congestion Control Scheme to support Mobility of Devices on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 단말의 이동성을 지원하기 위한 DCCP 기반의 혼잡 제어 정책)

  • Park Si-Yong;Kim Sung-Min;Lee Tae-Hoon;Chung Ki-Dong
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.59-75
    • /
    • 2006
  • In this paper, we propose a congestion control scheme to control the congestion due to the mobility of ubiquitous devices on ubiquitous computing environment. Especially, this congestion control scheme provides a reverse congestion avoidance state which can classify between packet error by features of wireless network and packet dropping by congestion. Also, it provides a slow stop state which can minimize bandwidth waste due to congestion control. The proposed congestion control scheme controls more adaptive than existing congestion control schemes. The proposed congestion control scheme is designed based on DCCP(Datagram Congestion Control Protocol) being proposed by IETF(Internet Engineering Task Force) and implemented on the Linux kernel. In simulation results, the proposed congestion control scheme provides good bandwidth throughput in wireless network as well as in wired network.