Efficient Access of Remote Resources in Embedded Networked Computer Systems
نویسندگان
چکیده
Fixed networks of limited resource heterogeneous computers need to allow applications to access remote devices in order to overcome any local resource deficiencies. Current operating systems would use a file system, network stack and middleware to implement such access but the volume of functionality involved can be a barrier to performance. This paper examines the 2.4 series Linux kernel to show that networked operating systems lack flexibility and performance in this environment. It also presents a low level approach that can reduce the overheads incurred and improve performance when remote devices are accessed.
منابع مشابه
Designinga Neuro-Sliding Mode Controller for Networked Control Systems with Packet Dropout
This paper addresses control design in networked control system by considering stochastic packet dropouts in the forward path of the control loop. The packet dropouts are modelled by mutually independent stochastic variables satisfying Bernoulli binary distribution. A sliding mode controller is utilized to overcome the adverse influences of stochastic packet dropouts in networked control system...
متن کاملMRAS: A Multi-Layered Remote Authentication System
Accessing computer resources from off campus has been a continuing problem for both students and faculty, and this problem has been exacerbated by the growth of our graduate program. A multi-layered remote authentication system has been created for use by students and faculty providing the ability to telecommute and gain remote access to these resources. Security concerns have also been address...
متن کاملDesign of Observer-based H∞ Controller for Robust Stabilization of Networked Systems Using Switched Lyapunov Functions
In this paper, H∞ controller is synthesized for networked systems subject to random transmission delays with known upper bound and different occurrence probabilities in the both of feedback (sensor to controller) and forward (controller to actuator) channels. A remote observer is employed to improve the performance of the system by computing non-delayed estimates of the sates. The closed-loop s...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملNetworked Robots: from Telerobotics to Cloud Robotics
As of 2013, almost all robots have access to computer networks that offer extensive computing, memory, and other resources that can dramatically improve performance. The underlying enabling framework is the focus of this chapter: networked robots. Networked robots trace their origin to telerobots, or remotely controlled robots. Telerobots are widely used to explore undersea terrains and outer s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005