Resource sharing in a network of personal computers

Abstract : As networks of personal computers are developed to replace centralized time-shared systems, the need for sharing resources will remain, but the solutions developed for time-sharing will no longer be adequate. In particular, the sharing of network resources is complicated by issues of security and autonomy, since a network of personal computers may be composed of nodes that are completely controlled by their owners. To facilitate sharing in this sort of environment, an operating system component called the Butler is proposed. As a host, the Butler is responsible for administering a sharing policy on its local machine. This includes authenticating sharers, granting rights in accordance with a locally established policy, and creating execution environments for guests. As an agent, the Butler negotiates with hosts on remote machines to obtain resources requested by a client, and performs authentication to discourage a remote host from exploiting the client. A number of applications for the Butler are described: these fall into the categories of information exchange, load distribution, and computational parallelism. A prototype Butler has been constructed and used in a real application demonstrating computational parallelism, and the prototype has also demonstrated the deportation of processes.

[1]  George G. Robertson,et al.  Accent: A communication oriented network operating system kernel , 1981, SOSP.

[2]  Robert H. Thomas,et al.  An operational system for computer resource sharing , 1975, SOSP.

[3]  Gerald J. Popek,et al.  Encryption and Secure Computer Networks , 1979, CSUR.

[4]  Richard C. Holt,et al.  Project SUE as a learning experience , 1972, AFIPS '72 (Fall, part I).

[5]  Bruce Jay Nelson Remote procedure call , 1981 .

[6]  Forest Baskett,et al.  Task communication in DEMOS , 1977, SOSP '77.

[7]  Barbara Liskov,et al.  Guardians and Actions: Linguistic Support for Robust, Distributed Programs , 1983, TOPL.

[8]  Peter Homan,et al.  CICS/VS and its Role in Systems Network Architecture , 1977, IBM Syst. J..

[9]  David Lorge Parnas,et al.  Use of the concept of transparency in the design of hierarchically structured systems , 1975, CACM.

[10]  Lee Wendell Cooprider The representation of families of software systems. , 1978 .

[11]  Mandayam K. Srivas,et al.  Expressiveness of the operation set of a data abstraction , 1980, POPL '80.

[12]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[13]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[14]  Samuel B. Williams,et al.  ASSOCIATION FOR COMPUTING MACHINERY , 2000 .

[15]  J.A. Moorer,et al.  Signal processing aspects of computer music: A survey , 1977, Proceedings of the IEEE.

[16]  Mahadev Satyanarayanan,et al.  The Design of a Network-Based Central File System , 1980 .

[17]  Richard R. Linde,et al.  Operating system penetration , 1975, AFIPS '75.

[18]  Robert H. Thomas,et al.  Operating Systems for Computer Networks , 1978, Computer.

[19]  Robert E. Millstein The National Software Works: A distributed processing system , 1977, ACM '77.