Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sape J. Mullender is active.

Publication


Featured researches published by Sape J. Mullender.


Communications of The ACM | 1990

Experiences with the Amoeba distributed operating system

Andrew S. Tanenbaum; Robbert van Renesse; Hans van Staveren; Gregory J. Sharp; Sape J. Mullender

The Amoeba project is a research effort aimed at understanding how to connect multiple computers in a seamless way [16, 17, 26, 27, 31]. The basic idea is to provide the users with the illusion of a single powerful timesharing system, when, in fact, the system is implemented on a collection of machines, potentially distributed among several countries. This research has led to the design and implementation of the Amoeba distributed operating system, which is being used as a prototype and vehicle for further research. In this article we will describe the current state of the system (Amoeba 4.0), and show some of the lessons we have learned designing and using it over the past eight years. We will also discuss how this experience has influenced our plans for the next version, Amoeba 5.0.nAmoeba was originally designed and implemented at the Vrije Universiteit in Amsterdam, and is now being jointly developed there and at the Centrum voor Wiskunde en Informatica, also in Amsterdam. The chief goal of this work is to build a distributed system that is transparent to the users. This concept can best be illustrated by contrasting it with a network operating system, in which each machine retains its own identity. With a network operating system, each user logs into one specific machine—his home machine. When a program is started, it executes on the home machine, unless the user gives an explicit command to run it elsewhere. Similarly, files are local unless a remote file system is explicitly mounted or files are explicitly copied. In short, the user is clearly aware that multiple independent computers exist, and must deal with them explicitly.nIn contrast, users effectively log into a transparent distributed system as a whole, rather than to any specific machine. When a program is run, the system—not the user—decides upon the best place to run it. The user is not even aware of this choice. Finally, there is a single, system-wide file system. The files in a single directory may be located on different machines, possibly in different countries. There is no concept of file transfer, uploading or downloading from servers, or mounting remote file systems. A files position in the directory hierarchy has no relation to its location.nThe remainder of this article will describe Amoeba and the lessons we have learned from building it. In the next section, we will give a technical overview of Amoeba as it currently stands. Since Amoeba uses the client-server model, we will then describe some of the more important servers that have been implemented so far. This is followed by a description of how wide-area networks are handled. Then we will discuss a number of applications that run on Amoeba. Measurements have shown Amoeba to be fast, so we will present some of our data. After that, we will discuss the successes and failures we have encountered, so that others may profit from those ideas that have worked out well and avoid those that have not. Finally we conclude with a very brief comparison between Amoeba and other systems.nBefore describing the software, however, it is worth saying something about the system architecture on which Amoeba runs.


The Computer Journal | 1986

The Design of a Capability-Based Distributed Operating System

Sape J. Mullender; Andrew S. Tanenbaum

Fifth-generation computer systems will use large numbers of processors to achieve high performance. In this paper a capability-based operating system designed for this environment is discussed. Capability-based operating systems have traditionally required large, complex kernels to manage the use of capabilities. In our proposal, capability management is done entirely by user programs without giving up any of the protection aspects normally associated with capabilities. The basic idea is to use one-way functions and encryption to protect sensitive information. Various aspects of the proposed system are discussed.


Software—Practice & Experience archive | 1984

Immediate files

Sape J. Mullender; Andrew S. Tanenbaum

An efficient disk organization is proposed. The basic idea is to store the first part of the file in the index (inode) block, instead of just storing pointers there. Empirical data are presented to show that this method offers better performance under certain circumstances than traditional methods.


Operating Systems Review | 1981

An overview of the Amoeba distributed operating system

Andrew S. Tanenbaum; Sape J. Mullender

As hardware prices continue to drop rapidly, building large computer systems by interconnecting substantial numbers of microcomputers becomes increasingly attractive. Many techniques for interconnecting the hardware, such as Ethernet [Metcalfe and Boggs, 1976], ring nets [Farber and Larson, 1972], packet switching, and shared memory are well understood, but the corresponding software techniques are poorly understood. The design of general purpose distributed operating systems is one of the key research issues for the 1980s.


Computer Networks | 1984

Protection and Resource Control in Distributed Operating Systems

Sape J. Mullender; Andrew S. Tanenbaum

Local networks often consist of a cable snaking through a building with sockets in each room into which users can plug their personal computers. Using such a network for building a coherent distributed or network operating system is difficult because the system administrators have no control over the users machine ? not the applications programs, not the system kernel, not even the choice of hardware. In this paper we discuss a general method to protect such systems against malicious users without placing any restrictions on the kinds of operating systems that can be constructed. Depending on the details of the hardware, either one-way functions or public key cryptography forms the basis for the protection. As an example of our method, we show how a traditional object-oriented capability system can be implemented on top of the basic protection mechanism, and how a service for accounting and resource control can be constructed.


international conference on distributed computing systems | 1986

Using Sparse Capabilities in a Distributed Operating System

Andrew S. Tanenbaum; Sape J. Mullender; R. van Renesse


Research into Networks and Distributed Applications. European Teleinformatics Conf. - (EUTECO) | 1988

MANDIS/Amoeba: A Widely Dispersed Object-Oriented Operating System

R. van Renesse; J.M. van Staveren; J. Hall; M. Turnbull; B. Janssen; Jack Jansen; Sape J. Mullender; D. Holden; A. Bastable; Terje Fallmyr; Dag Johansen; K.S. Mullender; W. Zimmer; R. Speth


IEEE Transactions on Information Theory | 1985

Distributed match-making for processes in computer networks

Sape J. Mullender; Paul M. B. Vitányi


Archive | 1984

Connecting UNIX Systems Using a Token Ring

R. van Renesse; Andrew S. Tanenbaum; Sape J. Mullender


Proc. Conf. Local Networks & Distributed Office Systems | 1981

Amoeba - A Capability-Based Distributed Operating System

Andrew S. Tanenbaum; Sape J. Mullender

Collaboration


Dive into the Sape J. Mullender's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

G Poletiek

University of Amsterdam

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge