Sunday, March 27, 2011

MEMORY MANAGEMENT

Relocation


In a multiprogramming system, the available main memory is
generally shared among a number of processes. Typically it is not possible
for programmer to know in advance which are the programs that will
reside in the memory during the execution time of a program. In addition
we would like to be able to swap active processes in and out of main
memory to maximize processors usage by providing a large pool of ready
processes to execute. 
Each process should be protected against unwanted interference by
other processes, whether accidental or intentional. Thus, programs in
other processes should not be able to reference memory locations in a
process, for reading and writing purposes without permission
Virtual memory can also work in a multiprogramming system. For example
eight 1M programs can each be allocated a 256K partition in a 2M memory,
which each program operating as though it had its own, private 256K machine.
In fact virtual memory multiprogramming fit together very well. While a
program is waiting for part of itself to be swapped in, it is waiting for I/O and
cannot run so the CPU can be given to another process. 
The main problem of contagious allocation is external
fragmentation. This is overcome in the present scheme. Here a process is
allocated the physical memory where ever it is available, and this scheme
is call as paging scheme.
In the basic method physical memory is broken into fix size block
call frame. The logical memory also broken into block of the same size
called pages.

Every address generate by the CPU is divided into parts: a page
number (P) and a page offset (d). The page number p is use as an index
into a page table. The page table contains the base address of each page
lying in physical memory. The base address read from page table is
combining with page offset (d) to generate the physical memory address.
Before we consider ways of dealing with the shortcomings of partitioning,
we must clear up one loose end, which relates to the placement of processes in
memory. When the fix partition scheme is used, we can expect that a process
will always be a sign to the same partition. That is, the partition that is selected 
when a new process is loaded will always be used to swapped the process back
into memory after it has been swapped up. When the process is first loaded all
relative memory references in the code are replaced by absolute main memory
addresess determine by the base address of the loaded process. 
Now, consider that a process in memory include instructions plus data.
The instructions will contain memory references of the following two types;

some arithmetics and logical instructions.
Addresses of data items, used in load and store instructions and 

instructions.Addresses of instructions, used for branching and called

Friday, March 25, 2011

ISNTALL WINDOW

 MY PREFERRED OS
1st STEP:
Booting Up and First Installation Steps
-Steps from here are pretty straight forward. Read the descriptions in each pages before clicking the Next button to avoid any disasters. IF there is options to choose in these steps you may find them with each images.









2nd STEP:

You may choose your Language options by selecting the dropdowns 'Language to install', 'Time and Currency format' and 'Keyboard or input method' here. I decided to leave everything to 'US' but it would be better for selecting the correct settings here for non-english users.


3rd STEP:

This screen is where the installation wizard begins. The install now options will leads to the advanced install options. For repairing a corrupt installation the 'Repair your computer' button located at the bottom-left can be used. For fresh installs just click the Install now button.




Tick the 'I accept the license terms' checkbox and click 'Next' to proceed.


Which type of installation do you want?

This screen provides two options, Upgrade and Custom (advanced). The upgrade option is for those who wish to upgrade an existing installation of older version of Windows to Windows 7. It is confirmed that Windows Vista can be upgraded to Windows 7 with out any issues.


4th STEP:
Where do you want to install Windows?

Clicking on the 'Custom' button brings the install location selection screen. In the test machine we have an un-partitioned empty disk. But in the case of a normal installation all your hard drive partitions (e.g. C:\ , D:\ etc.) will be listed here. Choose the drive as you like (a 15 GB size is recommended). Make sure the drive don't have any important data or the Windows 7 installation will wipe-out the contents of that partition. You can backup the data to another partition (e.g. for installing in D:\ drive move important files from there to say E:\ drive or to an external usb drive) for safe keeping.


Partitioning /Creating or Modifying Partitions 

Click the Drive options (advanced) for advanced partition management options like 'Delete', 'Format', 'New' and 'Extend'. To create a new partition click the New button. But if you have list of partitions in the previous screen, choose the one where you are planning to install windows 7 and click Format. Then click 'Next' to proceed.



The 'New' option provides a text box to enter the size of the partition you wish to create in MBs. A 15 GB (15*1024 = 15360 MB) is recommended. In this case I opted for the full size of my virtual drive, i.e. 9216 MB. Click the Apply button to continue. You may be greeted with a message To ensure that all Windows features work correctly, windows might create additional partitions for system files. . This is a new feature in Windows 7 to have a small boot partition for system files. Click Okto continue.



A new primary partition of 8.8 GB is created along with a System type partition of 200 MB. Select the partition you just created and click Next to continue.


5th STEP:

we are all set. The Windows 7 installation begins. time to grab a cup of coffee for and wait for 15 - 30 minutes for the all new OS!

FILE SYSTEM MANAGEMENT

FILE SYSTEM MANAGEMENT


 Also referred to as simply a file system or file system.

• The system that an operating system or program uses to organize and keep track of files.
• For example, a hierarchical file system is one that uses directories to organize files into a tree structure.
• Although the operating system provides its own file management system, you can buy separate file management systems.
• These systems interact smoothly with the operating system but provide more features, such as improved backup procedures and stricter file protection.

File Sharing

• Sharing of files on multi-user systems is desirable
• Sharing may be done through a protection scheme
• On distributed systems, files may be shared across a network
• Network File System (NFS) is a common distributed file-sharing method

Directory Structure

• A collection of nodes containing information about all files.
• Both the directory structure and the files reside on disk.
• Backups of these two structures are kept on tapes

File Mapping
• File mapping is the association of a file's contents with a portion of the virtual address space of a process.
• The system creates a file mapping object (also known as a section object) to maintain this association.
• A file view is the portion of virtual address space that a process uses to access the file's contents.
• File mapping allows the process to use both random input and output (I/O) and sequential I/O.
• It also allows the process to work efficiently with a large data file, such as a database, without having to map the whole file into memory.
• Multiple processes can also use memory-mapped files to share data.
• Processes read from and write to the file view using pointers, just as they would with dynamically allocated memory.
• The use of file mapping improves efficiency because the file resides on disk, but the file view resides in memory.
• Processes can also manipulate the file view with the Virtual Protect function.

SECURITY AND PROTECTION

Present about operating system protection and security. Explain and recognize security policy and mechanism, authentic basic also protection concept and access control.
Recognize security policy and mechanism.


  • In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies. A simple definition of a security policy is "to set who may use what information in a computer system.
  • mechanism for controlling the access of programs, processes, or users the resources defined by the computer system. the protentation mechanism ensures the enforcement of a certain policy.

 Elaborate authentic basic.

Password

  •  A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access.



Artifact

  •  In natural science and signal processing, an artifact is any error in the perception or representation of any visual or aural information introduced by the involved equipment or technique(s).
  • In computer science, digital artifacts are anomalies introduced into digital signals as a result of digital processing.
  •   In microscopy, artifacts are sometimes introduced during the processing of samples into slide form. See Artifact (microscopy)






Biometric

  • Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.

Elaborate protection concept and access control.


  •   For your PC security suite is now available a variety of programs that promise more often than full protection from malware, with acontrol virus and malware, but also with some research andcomplex in real time. 
  •   Major challenge for all manufacturers areoffering solutions that are effective yet easy to use, and if you do not require excessive resources to the system.
  • At the time all the leading m
Present about operating system protection and security. Explain and recognize security policy and mechanism, authentic basic also protection concept and access control.
Recognize security policy and mechanism.

·                      In computer science, protection mechanisms are built into a computer architecture to support the enforcement of security policies. A simple definition of a security policy is "to set who may use what information in a computer system.
·                     mechanism for controlling the access of programs, processes, or users the resources defined by the computer system. the protentation mechanism ensures the enforcement of a certain policy.

 Elaborate authentic basic.

Password
·                     A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access.



Artifact
·                     In natural science and signal processing, an artifact is any error in the perception or representation of any visual or aural information introduced by the involved equipment or technique(s).
·                     In computer science, digital artifacts are anomalies introduced into digital signals as a result of digital processing.
·                     In microscopy, artifacts are sometimes introduced during the processing of samples into slide form. See Artifact (microscopy)






Biometric
-Biometrics consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.

Elaborate protection concept and access control.


  •   For your PC security suite is now available a variety of programs that promise more often than full protection from malware, with acontrol virus and malware, but also with some research andcomplex in real time. 
  •  Major challenge for all manufacturers areoffering solutions that are effective yet easy to use, and if you do not require excessive resources to the system.
  •   At the time all the leading manufacturers of security software suite that provides a guide as well as the traditional functions of malwaredetection and protect your PC also features accessories forprotection of data and optimization of the operating system. 
  •   The concept of security was also extended to the area where this malware is not in the strict sense. But, in a sense, a proper backup data fall within the concept of security.anufacturers of security software suite that provides a guide as well as the traditional functions of malwaredetection and protect your PC also features accessories forprotection of data and optimization of the operating system. 
  • The concept of security was also extended to the area where this malware is not in the strict sense. But, in a sense, a proper backup data fall within the concept of security.

INPUT OUTPUT MANAGEMENT

Input and output management: 
  • So far we have studied how resources like processor and main memory are managed. We shall now examine the I/O management. Humans interact with machines by providing information through IO devices. Also, much of whatever a computer system provides as on-line services is essentially made available through specialized devices such as screen displays, printers, keyboards, mouse, etc. Clearly, management of all these devices can affect the throughput of a system. For this reason, input output management also becomes one of the primary responsibilities of an operating system.  In this chapter we shall examine the role of operating systems in managing IO devices. In particular, we shall examine how the end use of the devices determines the way they are regulated for communication with either humans or with systems.


Buffering concept:
  • Single buffer: The device first fills out a buffer. Next the device driver hands in its control to the kernel to input the data in the buffer. Once the buffer has been used up, the device fills it up again for input.

  • Double buffer: In this case there are two buffers. The device fills up one of the two buffers, say buffer-0. The device driver hands in buffer-0 to the kernel to be emptied and the device starts filling up buffer-1 while  kernel is using up buffer-0. The roles are switched when the buffer-1 is filled up.

  • Circular buffer: One can say that the double buffer is a circular queue of size two. We can extend this notion to have several buffers in the circular queue. These buffers are filled up in sequence. The kernel accesses the filled up buffers in the same sequence as these are filled up. The buffers  are organized as a circular queue data structure, i.e. in case of output, the buffer is filled up from the CPU(or memory) end and used up by the output device, i.e. buffer n = buffer 0.


Spooling techniques:
  • Spooling: Suppose we have a printer connected to a machine. Many users may seek to use the printer. To avoid print clashes, it is important to be able to queue up all the print requests. This is achieved by spooling. The OS maintains all print requests and schedules each users' print requests. In other words, all output commands to print are intercepted by the OS kernel. An area is used to spool the output so that a users' job does not have to wait for the printer to be available. One can examine a print queue status by using lpq and lpstat commands in Unix