Thursday, June 25, 2009


STORAGE STRUCTURE


Main memory

The Main Memory of the computer is also known as RAM, standing for Random Access Memory. It is constructed from integrated circuits and needs to have electrical power in order to maintain its information. When power is lost, the information is lost too! It can be directly accessed by the CPU. The access time to read or write any particular byte are independent of whereabouts in the memory that byte is, and currently is approximately 50 nanoseconds (a thousand millionth of a second). This is broadly comparable with the speed at which the CPU will need to access data. Main memory is expensive compared to external memory so it has limited capacity. The capacity available for a given price is increasing all the time. For example many home Personal Computers now have a capacity of 16 megabytes (million bytes), while 64 megabytes is commonplace on commercial workstations. The CPU will normally transfer data to and from the main memory in groups of two, four or eight bytes, even if the operation it is undertaking only requires a single byte.





MAGNETIC DISK a memory device, such as a floppy disk, a hard disk, or a removable cartridge, that is covered with a magnetic coating on which digital information is stored in the form of microscopically small, magnetized needles.






MAGNETIC TAPE has been used for data storage for over 50 years. In this time, many advances in tape formulation, packaging, and data density have been made. Modern magnetic tape is most commonly packaged in cartridges and cassettes. The device that performs actual writing or reading of data is a tape drive. Autoloaders and tape libraries are frequently used to automate cartridge handling.
When storing large amounts of data, tape can be substantially less expensive than disk or other data storage options. Tape storage has always been used with large computer systems. Modern usage is primarily as a high capacity medium for
backups and archives. As of 2008, the highest capacity tape cartridges (Sun StorageTek T10000B, IBM TS1130) can store 1 TB of data without using compression.



HARDWARE PROTECTION

Dual-Mode Operation

-Sharing system resources requires operating system to ensure
that an incorrect program cannot cause other programs to
execute incorrectly.

-Provide hardware support to differentiate between at least two
modes of operations.
1. User mode – execution done on behalf of a user.
2. Monitor mode (also supervisor mode or system mode) –
execution done on behalf of operating system.

-Mode bit added to computer hardware to indicate the current
mode: monitor (0) or user (1).

-When an interrupt or fault occurs hardware switches to monitor mode.

interrupt/fault

monitor user

set user mode

-Privileged instructions can be issued only in monitor mode.


I/O Protection

-All I/Oinstructions are privileged instructions.

-Must ensure that a user program could never gain control of
the computer in monitor mode (i.e., a user program that, as
part of its execution, stores a new address in the interrupt
vector).




Tuesday, June 23, 2009

1.)BOOTSTRAPT PROGRAM

Bootstrap program
In computing, booting is a bootstrapping process that starts operating systems when the user turns on a computer system.
Most
computer systems can only execute code found in the memory (ROM or RAM); modern operating systems are mostly stored on hard disk drives, LiveCDs and USB flash drive. Just after a computer has been turned on, it doesn't have an operating system in memory. The computer's hardware alone cannot perform complicated actions of the operating system, such as loading a program from disk on its own; so a seemingly irresolvable paradox is created: to load the operating system into memory, one appears to need to have an operating system already installed.

2.)Difference of INTERRUPT and TRAP and their uses.

Trap is actually a software generated interrupt caused either by an error (for example division by zero, invalid memory access etc.), or by an specific request by an operating system service generated by a user program. Trap is sometimes called Exception. The hardware or software can generate these interrupts.

Interrupt or trap occurs, the hardware therefore, transfer control to the operating system which first preserves the current state of the system by saving the current CPU registers contents and program counter's value. after this, the focus shifts to the determination of which type of interrupt has occured. For each type of interrupt, separate segmants of code in the operating system determine w
hat action should be taken and thus the system keeps on functioning by executing coputational instruction, I/O instruction, torage instruction etc.

3.)Monitor mode

Monitor mode, or RFMON (Radio Frequency Monitor) mode, allows a computer with a wireless network interface card (NIC) to monitor all traffic received from the wireless network. Unlike promiscuous mode, which is also used for packet sniffing, monitor mode allows packets to be captured without having to associate with an access point or ad-hoc network first. Monitor mode only applies to wireless networks, while promiscuous mode can be used on both wired and wireless networks. Monitor mode is one of the six modes that 802.11 wireless cards can operate in: Master (acting as an access point), Managed (client, also known as station), Ad-hoc, Mesh, Repeater, and Monitor mode.

4.)USER MODE

USER MODE contains the userhelper program, which can be used to allow configured programs to be run with superuser privileges by ordinary users, and several graphical tools for users.

5.)DEVICE STATUS TABLE

DEVICE STATUS TABLE contains entry for each I/O deviceindicating its type, address, and state.

6.)Direct Memory Access

Direct Memory Access (DMA) is a feature of modern computers and microprocessors that allows certain hardware subsystems within the computer to access system memory for reading and/or writing independently of the central processing unit. Many hardware systems use DMA including disk drive controllers, graphics cards, network cards and sound cards. DMA is also used for intra-chip data transfer in multi-core processors, especially in multiprocessor system-on-chips, where its processing element is equipped with a local memory (often called scratchpad memory) and DMA is used for transferring data between the local memory and the main memory. Computers that have DMA channels can transfer data to and from devices with much less CPU overhead than computers without a DMA channel. Similarly a processing element inside a multi-core processor can transfer data to and from its local memory without occupying its processor time and allowing computation and data transfer concurrency.
Without DMA, using
programmed input/output (PIO) mode for communication with peripheral devices, or load/store instructions in the case of multicore chips, the CPU is typically fully occupied for the entire duration of the read or write operation, and is thus unavailable to perform other work. With DMA, the CPU would initiate the transfer, do other operations while the transfer is in progress, and receive an interrupt from the DMA controller once the operation has been done. This is especially useful in real-time computing applications where not stalling behind concurrent operations is critical. Another and related application area is various forms of stream processing where it is essential to have data processing and transfer in parallel, in order to achieve sufficient throughput.

7.)Difference of RAM and DRAM


RAM (Random Access Memory) is a generic name for any sort of read/write memory that can be, well, randomly accessed. All computer memory functions as arrays of stored bits, "0" and "1", kept as some kind of electrical state. Some sorts support random access, others (such as the flash memory used in MP3 players and digital cameras) has a serial nature to it. A CPU normally runs through a short sequence of memory locations for instructions, then jumps to another routine, jumps around for data, etc. So CPUs depend on dynamic RAM for their primary memory, since there's little or no penalty for jumping all around in such memory. There are many different kinds of RAM.

DRAM is one such sort, Dynamic RAM. This refers to a sort of memory that stores data very efficiently, circuit-wise. A single transistor (an electronic switch) and a capacitor (charge storage device) store each "1" or "0". An alternate sort is called Static RAM, which usually has six transistors used to store each bit. The advantage of the DRAM is that each bit can be very small, physically. The disadvantage is that the stored charge doesn't last really long, so it has to be "refreshed" perodically. All modern DRAM types have on-board electronics that makes the refresh process pretty simple and efficient, but it is one additional bit of complexity. There are various sorts of DRAM around: plain (asynchronous) DRAM, SDRAM (synchronous, meaning all interactions are synchronized by a clock signal), DDR (double-data rate... data goes to/from the memory at twice the rate of the clock), etc. These differences are significant to hardware designers, but not usually a big worry for end-users... other than ensuring you buy the right kind of DRAM, if you plan to upgrade you system.


8.)MAIN MEMORY

Main memory
The main memory of the computer is also known as RAM, standing for Random Access Memory. It is constructed from integrated circuits and needs to have electrical power in order to maintain its information. When power is lost, the information is lost too! It can be directly accessed by the CPU. The access time to read or write any particular byte are independent of whereabouts in the memory that byte is, and currently is approximately 50 nanoseconds (a thousand millionth of a second). This is broadly comparable with the speed at which the CPU will need to access data. Main memory is expensive compared to external memory so it has limited capacity. The capacity available for a given price is increasing all the time. For example many home Personal Computers now have a capacity of 16 megabytes (million bytes), while 64 megabytes is commonplace on commercial workstations. The CPU will normally transfer data to and from the main memory in groups of two, four or eight bytes, even if the operation it is undertaking only requires a single byte.

9.)MAGNETIC DISK

Magnetic Disk
The primary computer storage device. Like tape, it is magnetically recorded and can be re-recorded over and over. Disks are rotating platters with a mechanical arm that moves a read/write head between the outer and inner edges of the platter's surface. It can take as long as one second to find a location on a floppy disk to as little as a couple of milliseconds on a fast hard disk.

10.)STORAGE HIERARCHY

Storage Hierarchy
The range of memory and storage devices within the computer system. The following list starts with the slowest devices and ends with the fastest. See storage and memory.
VERY SLOW
Punch cards (obsolete)
Punched paper tape (obsolete)
FASTER
Bubble memory
Floppy disks
MUCH FASTER
Magnetic tape
Optical discs (CD-ROM, DVD-ROM, MO, etc.)
Magnetic disks with movable heads
Magnetic disks with fixed heads (obsolete)
Low-speed bulk memory
FASTEST
Flash memory
Main memory
Cache memory
Microcode
Registers


COHERENCY AND CONSISTENCY

COHERENCY AND CONSISTENCY define the action of the processors to maintain coherence. More precisely, coherency defines what value is returned on a read, and consistency defines when it is available.


CACHING

The cache, a high-speed buffer establishing a storage hierarchy in the
Model 85, is discussed in depth in this part, since it represents the
bask organizational departure from other system/360 computers.
Discussed are organization and operation of the cache, including (he-
mechanisms used to locate and retrieve data needed by (he processor.
The internal performance studies that led to use of (he cache are de-
scribed, and simulated performance of the chosen configuration is
compared with that of a: theoretical system having an entire SO^nanq-
second main storage. Finally, the effects of varying cache parameters
are discussed and tabulated.








Thursday, June 18, 2009

1.) What is the difference of OS in terms of users view and system view?
Answer:

User view

The user view of the computer varies by the interface being used. Most computer users sit in front of a PC, consisting of a monitor, keyboard, mouse and system unit. Such a system is designed for one user to monopolize its resources, to maximize the work that the user is performing. In this case,the operating system is designed mostly for ease of use, with some attention paid to performance, and none paid to resource utilization.

System View

We can view an operating system as a resource allocator. A computer system has many resources - hardware and software - that may be required to solve a problem. The operating system acts as the manager of these resources.
An operating system can also be viewed as a control program that manages the execution of user programs to prevent errors and improper use of the computer. It is especially concerned with the operation and control of I/O devices.

2.)Explain the goals of OS?
Answer:
An operating system is the framework that allows you to communicate with computer hardware in an interactive way. Without this, you would not be able to tell the computer to do anything and it would have any instructions to follow. This is why it is important for a computer to have an operating system .In early days without OS so much problems where faced like acessing or getting output it takes two days. To make it much more efficient OS is used. In the simplest terms, the purpose of an operating system is to allow a user to utilize various types of software to perform various tasks.
3.)What is the difference between batch systems,multiprogrammed systems and time-sharing systems?
Answer:
A batch system is one in which jobs are bundled together with the instructions necessary to allow them to be processed without intervention

As machines with more and more memory became available, it was possible to extend the idea of multiprogramming (or multiprocessing) as used in spooling batch systems to create systems that would load several jobs into memory at once and cycle through them in some order, working on each one for a specified period of time

The first involved timesharing or timeslicing. The idea of multiprogramming was extended to allow for multiple terminals to be connected to the computer, with each in-use terminal being associated with one or more jobs on the computer. The operating system is responsible for switching between the jobs, now often called processes, in such a way that favored user interaction. If the context-switches occurred quickly enough, the user had the impression that he or she had direct access to the computer.
4.)Advantages of Parallel Systems.
Answer:
In terms of disproportionality, Parallel systems usually give results which fall somewhere between pure plurality/majority and pure PR systems. One advantage is that, when there are enough PR seats, small minority parties which have been unsuccessful in the plurality/majority elections can still be rewarded for their votes by winning seats in the proportional allocation. In addition, a Parallel system should, in theory, fragment the party system less than a pure PR electoral system.
5.)Differentiate Symmetric multiprocessing and Asymmetric multiprocessing.
Answer:
Asymmetric multiprocessing - In asymmetric multiprocessing (ASMP), the operating system typically sets aside one or more processors for its exclusive use. The remainder of the processors run user applications. As a result, the single processor running the operating system can fall behind the processors running user applications. This forces the applications to wait while the operating system catches up, which reduces the overall throughput of the system. In the ASMP model, if the processor that fails is an operating system processor, the whole computer can go down. Symmetric mMultiprocessing - Symmetric multiprocessing (SMP) technology is used to get higher levels of performance. In symmetric multiprocessing, any processor can run any type of thread. The processors communicate with each other through shared memory.
6.)Differentiate Client-server systems and Peer-to-Peer systems.
Answer:
Client/server describes the relationship between two computer programs in which one program , the client, makes a service request from another system, the server, which fulfills the request. In a network, the client/server model provides a convenient way to efficiently interconnect programs that are distributed across different locations Another structure for a distributes system is the peer - to peer (P2P)system model. In this model, clients and servers are not distinguished from one another; instead, all nodes within the system may act as either client or a server, depending on whether it is requesting or prividing a service. In client server system , the server is a bottle neck; but in a peer-to peer system, services can be provided by several nodes throughout the network.
7.)Differentiate the design issues of OS between a stand-alone PC and a worksheet connected to a network.
Answer:
The difference between the two is that a Stand Alone PC practice a none to resource utilization, it imposes monopolization and implies no sharing of resources (like information, file, data, etc.). While a Workstation connected to a network is designed to maximize resource utilization where you can exchange information with a others via internet.

or

A stand-alone PC works on its own. While in a workstation connected to a network, you can freely share your files and databases to other PC.A desktop or laptop computer that is used on its own without requiring a connection to a local area network (LAN) or wide area network (WAN). Although it may be connected to a network, it is still a stand-alone PC as long as the network connection is not mandatory for its general use.In offices throughout the 1990s, millions of stand-alone PCs were hooked up to the local network for file sharing and mainframe access. Today, computers are commonly networked in the home so that family members can share an Internet connection as well as printers, scanners and other peripherals. When the computer is running local applications without Internet access, the machine is technically a stand-alone PC. A workstation is a high-end microcomputer designed for technical or scientific applications. Intended primarily to be used by one person at a time, they are commonly connected to a local area network and run multi-user operating systems. The term workstation has also been used to refer to a mainframe computer terminal or a PC connected to a network.
8.)Define the essential properties of the following types of OS:
a. Batch
b.Time Sharing
c.Real Time
d.Network
e.Distributed
f.Handheld
a. Batch. Jobs with similar needs are batched together and run through the computer as a group by an operator or automatic job sequencer. Performance is increased by attempting to keep CPU and I/O devices busy at all times through buffering, off-line operation, spooling, and multiprogramming. Batch is good for executing large jobs that need little interaction; it can be submitted and picked up later.Answers to
b. Time sharing. Uses CPU scheduling and multiprogramming to provide economical interactive use of a system. The CPU switches rapidly from one user to another. Instead of having a job defined by spooled card images, each program reads its next control card from the terminal, and output is normally printed immediately to the screen.
c. Real time. Often used in a dedicated application. The system reads information from sensors and must respond within a fixed amount of time to ensure correct performance.
d. Network. networked systems consist of multiple computers that are networked together, usually with a common operating system and shared resources. Users, however, are aware of the different computers that make up the system.
e. Distributed. Distributes computation among several physical processors. The processors do not share memory or a clock. Instead, each processor has its own local memory. They communicate with each other through various communication lines,
such as a high-speed bus or telephone line.
f. Handheld. designed to provide an environm,ent in which a user easily interface with the computer to execute programs.