Please use this identifier to cite or link to this item:
http://arks.princeton.edu/ark:/88435/dsp019019s5438
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Levy, Amit | - |
dc.contributor.author | Galstyan, Narek | - |
dc.date.accessioned | 2020-08-12T12:37:21Z | - |
dc.date.available | 2020-08-12T12:37:21Z | - |
dc.date.created | 2020-05-01 | - |
dc.date.issued | 2020-08-12 | - |
dc.identifier.uri | http://arks.princeton.edu/ark:/88435/dsp019019s5438 | - |
dc.description.abstract | Since its first implementation in 1970s, multi-programming system abstraction provided by operating system kernels has been a crucial part of many digital systems. While the first computers had only a handful of almost always cooperative tasks to be scheduled, nowadays kernels in typical household computers schedule 100s and 1000s of processes and need to provide access and safety guarantees to each one regardless of the others' actions. This exponential growth has been possible partly due to the Moor's Law, advances in hardware protection mechanisms and partly due to more advanced scheduling algorithms. In the growing IoT world the effect of Moor's Law is minimal and hardware protection is often non-existent because of cost and resource constraints while a safe multi-programming environment is still necessary since IoT gadgets are becoming software platforms rather than single purpose devices. Tock and other embedded operating systems address many of the safety and isolation constraints through programming language level protection mechanisms. Currently, however, the Tock trusted codebase includes the scheduling algorithm inside the kernel thereby exposing the whole system to potential vulnerabilities originating from complex scheduling algorithms. The aim of this project is to explore, propose and evaluate approaches for a safe scheduler interface that will not require the scheduler implementation to be trusted by the applications. The project proposes designs for an abstract scheduler interface in the kernel that provides a safe abstraction with minimal overhead to scheduling algorithm developer. Unlike the PC world, IoT devices are quite heterogeneous thus may have wildly different hardware capabilities and scheduling goals. So the paper also presents a survey of most common scheduling algorithms used in embedded systems and designs the abstract interface to fit most of these schedulers. | en_US |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en | en_US |
dc.title | ORIGINAL | en_US |
dc.title | ORIGINAL | en_US |
dc.title | Rust Implementations and Performance of Safe and Pluggable OS Schedulers in Context of TockOS | en_US |
dc.type | Princeton University Senior Theses | - |
pu.date.classyear | 2020 | en_US |
pu.department | Computer Science | en_US |
pu.pdf.coverpage | SeniorThesisCoverPage | - |
dc.rights.accessRights | Walk-in Access. This thesis can only be viewed on computer terminals at the <a href=http://mudd.princeton.edu>Mudd Manuscript Library</a>. | - |
pu.contributor.authorid | 961191309 | - |
pu.mudd.walkin | Yes | - |
Appears in Collections: | Computer Science, 1988-2020 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
GALSTYAN-NAREK-THESIS.pdf | 381.9 kB | Adobe PDF | Request a copy |
Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.