Thursday, June 25, 2009 at 3:04 AM | 0 comments  

Dual-Mode Operation

  • sharing system resources requires operating system to ensure that an incorrect program cannot cause other programs to execute incorrectly.
  • provide hardware support to differetiate between at least two modes of operations
  1. User mode - execution done on behalf od a user.
  2. Monitor Mode - (also supervisor mode or system mode) -execution done on behalf of operating system.

I/O Protection

  • All I/O isntructions are privileged instructions.
  • Must ensure that a user program could never gain control of the computer in monitor mode (i.e., a user program that, as part od its execution, stores a new address in the interrupt vector).

Memory Protection

  • Must provide memory protection at least for the interrupt vector and the interrupt service routines
  • In order to have memory protection, add two registers that determine the range of legal addresses a program may access:

- base register - holds the smallest legal physical memory address.

- limit register - contains the size of the range.

  • Memory outside the defined range is protected.

CPU Protection

  • The VRM design approachremoves cable inductance fromthe distribution and reducesboard inductance. A load-changetransient occurs when coming outof or entering a low power mode.For some CPUs this load-changetransient can be on the order of13A. These are not only quickchanges in current demand, butalso long-lasting average currentrequirements. Even during nor-mal operation the currentdemand can still change by asmuch as 7A as activity levelschange within the processorcomponent. Maintaining voltagetolerance during these changesin current requires high-densitybulk capacitors with low EffectiveSeries Resistance (ESR). Thesehigh-current immediate demandson the circuits can cause compo-nents to fail. Circuit protectionprevents the VRM from damag-ing the CPU in the event of aVRM fault. If the VRM fails, theprocessor tries to pull too muchpower. A PolySwitch device canbe placed on the input pins to theVRMs that supply power to theprocessors, therefore protectingthe processors. If there is a fail-ure, only the VRM needs to bereplaced, rather than the moreexpensive CPU.
Posted by Roger Labels:
  • Main memory -Refers to physical memory that is internal to the computer. The word main is used to distinguish it from external mass storage devices such as disk drives. Another term for main memory is RAM.
    The computer can manipulate only
    data that is in main memory. Therefore, every program you execute and every file you access must be copied from a storage device into main memory. The amount of main memory on a computer is crucial because it determines how many programs can be executed at one time and how much data can be readily available to a program.
    Because computers often have too little main memory to hold all the data they need, computer engineers invented a technique called
    swapping, in which portions of data are copied into main memory as they are needed. Swapping occurs when there is no room in memory for needed data. When one portion of data is copied into memory, an equal-sized portion is copied (swapped) out to make room.
    Now, most
    PCs come with a minimum of 32 megabytes of main memory. You can usually increase the amount of memory by inserting extra memory in the form of chips














  • Magnetic disk -A memory device, such as a floppy disk, a hard disk, or a removable cartridge, that is covered with a magnetic coating on which digital information is stored in the form of microscopically small, magnetized needles.













  • moving head disk mechanism











  • Magnetic tape -is a medium for magnetic recording generally consisting of a thin magnetizable coating on a long and narrow strip of plastic. Nearly all recording tape is of this type, whether used for recording audio or video or for computer data storage. It was originally developed in Germany, based on the concept of magnetic wire recording. Devices that record and playback audio and video using magnetic tape are generally called tape recorders and video tape recorders respectively. A device that stores computer data on magnetic tape can be called a tape drive, a tape unit, or a streamer.
    Magnetic tape revolutionized the broadcast and recording industries. In an age when all radio (and later television) was live, it allowed programming to be prerecorded. In a time when gramophone records were recorded in one take, it allowed recordings to be created in multiple stages and easily mixed and edited with a minimal loss in quality between generations. It is also one of the key enabling technologies in the development of modern computers. Magnetic tape allowed massive amounts of data to be stored in computers for long periods of time and rapidly accessed when needed.
    Today, many other technologies exist that can perform the functions of magnetic tape. In many cases these technologies are replacing tape. Despite this, innovation in the technology continues and tape is still widely used





Posted by Roger Labels:
Tuesday, June 23, 2009 at 10:03 PM | 0 comments  

  • The range of memory and storage devices within the computer system. The following list starts with the slowest devices and ends with the fastest. See storage and memory.
      VERY SLOW
 
   Punch cards (obsolete)
   Punched paper tape (obsolete)
 
      FASTER
 
   Bubble memory
   Floppy disks
 
      MUCH FASTER
 
   Magnetic tape
   Optical discs (CD-ROM, DVD-ROM, MO, etc.)
   Magnetic disks with movable heads
   Magnetic disks with fixed heads (obsolete)
   Low-speed bulk memory
 
      FASTEST
 
   Flash memory
   Main memory
   Cache memory
   Microcode
   Registers
  • Coherency – In computing, cache coherence (also cache coherency) refers to the integrity of data stored in local caches of a shared resource. Cache coherence is a special case of memory coherence.
    When clients in a system maintain
    caches of a common memory resource, problems may arise with inconsistent data. This is particularly true of CPUs in a multiprocessing system. Referring to the "Multiple Caches of Shared Resource" figure, if the top client has a copy of a memory block from a previous read and the bottom client changes that memory block, the top client could be left with an invalid cache of memory without any notification of the change. Cache coherence is intended to manage such conflicts and maintain consistency between cache and memory.

Posted by Roger Labels:
A memory device, such as a floppy disk, a hard disk, or a removable cartridge, that is covered with a magnetic coating on which digital information is stored in the form of microscopically small, magnetized needles.
Posted by Roger Labels:

Refers to physical memory that is internal to the computer. The word main is used to distinguish it from external mass storage devices such as disk drives. Another term for main memory is RAM.

The computer can manipulate only data that is in main memory. Therefore, every program you execute and every file you access must be copied from a storage device into main memory. The amount of main memory on a computer is crucial because it determines how many programs can be executed at one time and how much data can be readily available to a program.

Because computers often have too little main memory to hold all the data they need, computer engineers invented a technique called swapping, in which portions of data are copied into main memory as they are needed. Swapping occurs when there is no room in memory for needed data. When one portion of data is copied into memory, an equal-sized portion is copied (swapped) out to make room.

Now, most PCs come with a minimum of 32 megabytes of main memory. You can usually increase the amount of memory by inserting extra memory in the form of chips.

Posted by Roger Labels:
RAM is the acronym for Random Access Memory, the cheapest way to make your computer a more effective system. Adding RAM to your computer enables it operate more programs at once, speed up program launches, and avoid system crashes. When you start a program, it is loaded from the hard drive of the computer into RAM.Running a program in RAM allows it to run thousands times faster than if it were running directly from the hard drive; however, it is possible to load so many programs that the RAM or memory can no longer hold all of them. You then have to either close some of the programs or add more RAM to your computer.Upgrading your computer's memory chips is the best solution for improving your system. Upgrades, involving adding more RAM, are very convenient. Current memory prices are low enough that every computer owner should be able to do it. Installation requires little technical expertise, making the process quick and simple. Our goal at Computer Memory Chips Upgrade is to educate you on the basic facts of upgrading your computer's memory. We firmly believe an educated consumer equals a better buying experience for everyone involved. By possessing the necessary knowledge of computer memory chips, you will be able to get great computer performance at an optimal price.
Dynamic random access memory (DRAM) is the most common kind of random access memory (RAM) for personal computers and workstations. The network of electrically-charged points in which a computer stores quickly accessible data in the form of 0s and 1s is called memory. Random access means that the PC processor can access any part of the memory directly rather than having to proceed sequentially from some starting place. DRAM is dynamic in that, unlike static RAM (SRAM), it needs to have its storage cells refreshed or given a new electronic charge every few milliseconds. Static RAM does not need refreshing because it operates on the principle of moving current that is switched in one of two directions rather than a storage cell that holds a charge in place. Static RAM is generally used for cache memory, which can be accessed more quickly than DRAM.
DRAM stores each bit in a storage cell consisting of a capacitor and a transistor. Capacitors tend to lose their charge rather quickly; thus, the need for recharging. A variety of other RAM interfaces to the computer exist. These include: EDO RAM and SDRAM.
Posted by Roger Labels:
Direct memory access (DMA) is a feature of modern computers and microprocessors that allows certain hardware subsystems within the computer to access system memory for reading and/or writing independently of the central processing unit. Many hardware systems use DMA including disk drive controllers, graphics cards, network cards and sound cards. DMA is also used for intra-chip data transfer in multi-core processors, especially in multiprocessor system-on-chips, where its processing element is equipped with a local memory (often called scratchpad memory) and DMA is used for transferring data between the local memory and the main memory. Computers that have DMA channels can transfer data to and from devices with much less CPU overhead than computers without a DMA channel. Similarly a processing element inside a multi-core processor can transfer data to and from its local memory without occupying its processor time and allowing computation and data transfer concurrency.
Without DMA, using programmed input/output (PIO) mode for communication with peripheral devices, or load/store instructions in the case of multicore chips, the CPU is typically fully occupied for the entire duration of the read or write operation, and is thus unavailable to perform other work. With DMA, the CPU would initiate the transfer, do other operations while the transfer is in progress, and receive an interrupt from the DMA controller once the operation has been done. This is especially useful in real-time computing applications where not stalling behind concurrent operations is critical. Another and related application area is various forms of stream processing where it is essential to have data processing and transfer in parallel, in order to achieve sufficient throughput.
Posted by Roger Labels:
Is there a way to get any third-party devices that are regularly sending SNMP traps to CIM7 to show up in the Device Status field relating to the trap severity? I am getting plenty of major error messages from one of my switches, but the device is still showing as normal.
Posted by Roger Labels:
User-mode Linux (UML) enables multiple virtual Linux systems (known as guests) to run as an application within a normal Linux system (known as the host). As each guest is just a normal application running as a process in user space, this approach provides the user with a way of running multiple virtual Linux machines on a single piece of hardware, offering excellent security and safety without affecting the host environment's configuration or stability.
Posted by Roger Labels:
Monitor mode, or RFMON (Radio Frequency Monitor) mode, allows a computer with a wireless network interface card (NIC) to monitor all traffic received from the wireless network. Unlike promiscuous mode, which is also used for packet sniffing, monitor mode allows packets to be captured without having to associate with an access point or ad-hoc network first. Monitor mode only applies to wireless networks, while promiscuous mode can be used on both wired and wireless networks. Monitor mode is one of the six modes that 802.11 wireless cards can operate in: Master (acting as an access point), Managed (client, also known as station), Ad-hoc, Mesh, Repeater, and Monitor mode.
Monitor mode may be used for malicious purposes, such as collecting traffic for WEP cracking. It may also be used for legitimate purposes such as monitoring one's own network to ensure its terms of use are being followed. This mode also somewhat useful during design phase of wi-fi network construction to discover how many wi-fi devices already using spectrum at given area and which channels are busiest and which are unused yet in local area. This helps to plan wi-fi network better and reduce interference with other wi-fi devices by choosing least used channels for new wi-fi network.
Software such as KisMAC or Kismet in combination with protocol analyzers such as Wireshark or tcpdump provide a user interface for passive wireless network monitoring.
Posted by Roger Labels:

Bootstrapping (from an old expression "to pull oneself up by one's bootstraps") is a technique by which a simple computer program activates a more complicated system of programs. In the start up process of a computer system, a small program such as BIOS, initializes and tests that hardware, peripherals and external memory devices are connected, then loads a program from one of them and passes control to it, thus allowing loading of larger programs, such as an operating system.

A different use of the term bootstrapping is to use a compiler to compile itself, by first writing a small part of a compiler of a new programming language in an existing language to compile more programs of the new compiler written in the new language. This solves the "chicken and egg" causality dilemma.

Bootstrapping was shortened to booting, or the process of starting up any computer, which is the most common meaning for non-technical computer users. The verb "boot" is similarly derived.

A "bootstrap" most commonly refers to the simple program itself that actually begins the initialization of the computer's operating system, like GRUB, LILO or NTLDR. Modern personal computers have the ability of using their network interface card (NIC) for bootstrapping; on IA-32 (x86) and IA-64 (Itanium) this method is implemented by PXE and Etherboot.

The computer is regarded as starting in a "blank slate" condition - either its main memory is blank, or else its content is suspect due to a prior crash. Although magnetic core memory retains its state with the power off, there would still exist the problem of loading in to it the very first program. A special start program could be very large, and given the modern affordability of read-only memory chips, could constitute the entire program to be run (as in embedded systems) but such an arrangement is inflexible. The bootstrap part would be a short simple piece of code that loads the main code.

Posted by Roger Labels:

An interrupt is generally initiated by an I/O device, and causes the CPU to stop what its doing, save its context, jump to the appropriate interrupt service routine, complete it, restore the context, and continue execution. For example, a serial device may assert the interrupt line and then place an interrupt vector number on the data bus. The CPU uses this to get the serial device interrupt service routine, which it then executes as above.

A trap is usually initiated by the CPU hardware. When ever the trap condition occurs (on arithmetic overflow, for example), the CPU stops what it's doing, saves the context, jumps to the appropriate trap routine, completes it, restores the context, and continues execution. For example, if overflow traps are enabled, adding two very large integers would cause the overflow bit to be set AND the overflow trap service routine to be initiated.

Posted by Roger Labels:
Thursday, June 18, 2009 at 2:18 PM | 0 comments  

-Interleave the execution of the number of processes to maximize processor utilization while providing reasonable response time

To be able to load applications, provide for multitasking either through timeslice or priority/interrupt mechanisms, you want to be able to detect a deadlock/race condition and take an appropriate action to resolve the issue, you want to have interprocess communication of some kind, you want to provide communication services for different types of hardware and logical communication consructs, you want to provide "virtual memory" for applications that are larger than physical memory, you want to be able to send a "signal" to process that are waiting for events such as serial I/O and you want to provide user security so that users can have a workspace that cannot be "hacked". Above all, you need to provide access limitations so that viruses cannot gain control. Read about UNIX/Linux. In my opinion it's about as close to a perfect OS as can be found.

Posted by Roger Labels:

Batch Processing: In batch processing Operating systems the tasks are performed in batches os waits for a batch of tasks to arrive and performs the operation on the batch.

Time Sharing: in time sharing operating systems the operating systems shares the time between the tasks i.e. if job A takes 6 minutes to complete and the predefined time to the os is 2 min it first performs the first job A for 2 minutes then takes up job B(the next one) and this way shares its time between all the jobs arriving.

Multi programming: In multiprogramming batch operating systems the multiple jobs are performed by the operating system simultaneously at a time.

Posted by Roger Labels:
Symmetric Multiprocessing- A multiprocessing architecture in which multiple CPUs, residing in one cabinet, share the same memory. SMP systems provide scalability. As business increases, additional CPUs can be added to absorb the increased transaction volume. SMP systems range from two to as many as 32 or more processors. However, if one CPU fails, the entire SMP system is down. Clusters of two or more SMP systems can be used to provide high availability (fault resilience). If one SMP system fails, the others continue to operate.
Asymmetric multiprocessing or ASMP is a type of
multiprocessing supported in DEC's VMS V.3 as well as a number of older systems including TOPS-10 and OS-360. It varies greatly from the standard processing model that we see in personal computers today. Due to the complexity and unique nature of this architecture, it was not adopted by many vendors or programmers during its brief stint between 1970 - 1980.Where as a symmetric multiprocessor or SMP treats all of the processing elements in the system identically, an ASMP system assigns certain tasks only to certain processors. In particular, only one processor may be responsible for fielding all of the interrupts in the system or perhaps even performing all of the I/O in the system. This makes the design of the I/O system much simpler, although it tends to limit the ultimate performance of the system. Graphics cards, physics cards and cryptographic accelerators which are subordinate to a CPU in modern computers can be considered a form of asymmetric multiprocessing.[citation needed] SMP is extremely common in the modern computing world, when people refer to "multi core" or "multi processing" they are most commonly referring to SMP
Posted by Roger Labels:
A. batch- file that contains a sequence, or batch, of commands. Batch files are useful for storing sets of commands that are always executed together because you can simply enter the name of the batch file instead of entering each command individually. In DOS systems, batch files end with a.BAT extension. For example, the following DOS batch file prints the date and time and sets the prompt to GO>:datetimePrompt [GO>] Whenever you boot a DOS -based computer, the system automatically executes the batch file named AUTOEXEC.BAT, if it exists. Many operating systems use the terms command file or shell script in place of batch file.
B. Time sharing- is sharing a computing resource among many users by multitasking. Its introduction in the 1960s, and emergence as the prominent model of computing in the 1970s, represents a major historical shift in the history of computing. By allowing a large number of users to interact simultaneously on a single computer, time-sharing dramatically lowered the cost of providing computing, while at the same time making the computing experience much more interactive.
C. Real time -It is a multitasking operating system that aims at executing real-time applications. Real-time operating systems often use specialized scheduling algorithms so that they can achieve a deterministic nature of behavior. The main object of real-time operating systems is their quick and predictable response to events. They either have an event-driven or a time-sharing design. An event-driven system switches between tasks based of their priorities while time-sharing operating systems switch tasks based on clock interrupts.
D. Network- a series of points or nodes interconnected by communication paths. Networks can interconnect with other networks and contain subnetworks. The most common topology or general configurations of networks include the bus, star, Token Ring, and mesh topologies. Networks can also be characterized in terms of spatial distance as local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). A given network can also be characterized by the type of data transmission technology in use on it (for example, a TCP/IP or Systems Network Architecture network); by whether it carries voice, data, or both kinds of signals; by who can use the network (public or private); by the usual nature of its connections (dial-up or switched, dedicated or nonswitched, or virtual connections); and by the types of physical links (for example, optical fiber, coaxial cable, and Unshielded Twisted Pair). Large telephone networks and networks using their infrastructure (such as the Internet) have sharing and exchange arrangements with other companies so that larger networks are created.

E. Distributed-An operating system that manages a group of independent computers and makes them appear to be a single computer is known as a distributed operating system. The development of networked computers that could be linked and communicate with each other, gave rise to distributed computing. Distributed computations are carried out on more than one machine. When computers in a group work in cooperation, they make a distributed system.
F. Handheld- A handheld computer is a computer that can conveniently be stored in a pocket (of sufficient size) and used while you're holding it. Today's handheld computers, which are also called personal digital assistants (PDAs), can be divided into those that accept handwriting as input and those with small keyboards. The original handheld that accepted handwriting was Apple's Newton, which was later withdrawn from the market. Today, the most popular handheld that accepts handwritten input is the PalmPilot from 3Com. Philips, Casio, NEC, Compaq, and other companies make handhelds with small keyboards. Windows CE and EPOC are two of the most widely used operating systems in handheld computers. Handheld computers are typically used for personal information manager (PIM) types of applications: maintaining schedules, keeping names and phone numbers, doing simple calculations, taking notes, and, with a modem, exchanging e-mail and getting information from the Web. Keyboards have tiny keys that take getting used to. Those that handle handwriting also impose constraints and require some learning. Nevertheless, this class of computer is widely sold and appreciated by many users. Hewlett-Packard has recently
Posted by Roger Labels:
In terms of disproportionality, Parallel systems usually give results which fall somewhere between pure plurality/majority and pure PR systems. One advantage is that, when there are enough PR seats, small minority parties which have been unsuccessful in the plurality/majority elections can still be rewarded for their votes by winning seats in the proportional allocation. In addition, a Parallel system should, in theory, fragment the party system less than a pure PR electoral system.
Posted by Roger Labels:
Client-server -computing (often abbreviated to client/server), applications store data on a network server (sometimes called the 'back-end'), but execute the business logic on a client device (the 'front-end'). This two-tier model is primarily associated with Windows computing, since it gained popularity as a result of the emergence of desktop PCs and workstations, along with high-speed local area networking (LAN) technologies. Because of the resource overhead of installing the entire application logic on every single client, clent/server is being superseded by multi-tiered models that take advantage of Internet technologies to distribute application logic more efficiently across the network.
Peer-to-peer (P2P) networking is a method of delivering computer network services in which the participants share a portion of their own resources, such as processing power, disk storage, network bandwidth, printing facilities. Such resources are provided directly to other participants without intermediary network hosts or servers.[1] Peer-to-peer network participants are providers and consumers of network services simultaneously, which contrasts with other service models, such as traditional client-server computing.
Posted by Roger Labels:
Visit the Site
MARVEL and SPIDER-MAN: TM & 2007 Marvel Characters, Inc. Motion Picture © 2007 Columbia Pictures Industries, Inc. All Rights Reserved. 2007 Sony Pictures Digital Inc. All rights reserved. blogger templates