Tuesday, September 16, 2008

:: Tutorial Lima ::

Magnetic disk:

Description:

Consists of one or more flat, circular platters made of glass, metal or plastic and coated with a magnetic substance. There is an electromagnet that can detect the direction of polarization that had been recorded. Electromagnetic read/write heads are used for this purpose.
There are two types of heads, the removable and fixed head.There are also two types of magnetic disk which are hard disks and floppy disks. Generally both store data by using constant angular velocity, (CAV) format.

Example:
Hard drive.

Advantage:
The mechanical differences between operation of floppy disks and hard disks have important effects on overall capacity, speed, data transfer rate and their reliability.
For hard disks, the disk is allowed to rotate at high speed, thus the tracks can be locate very close together. So the disk can store large amounts of data and retrieves data quickly.For floppy disks is soft and flexible, it is a must to support the disk surface as the data being read and written. The advantage of floppy disks is the flexibility of it, but because of it also that it have much lower capacity that hard disk of the same size.
Optical disk:

Description:

Capable of packing a large amount of data into a small area. Optical storage is intended for archiving and referencing. The data storage is similar to magnetic disk; the data is stored in blocks of the disk. DVD technology quite similar to CD, in term of size and format.But different manufacturing technique in DVD allows the use of both sides of DVD-ROM. So DVD-ROM can store more data than CD-ROM.


Example:
CD-ROM, DVD-ROM,CD-RW.

Advantages:
Large data storage capacity and nonexistent or limited writing ability.

Flash memory:

Description:
Can be erased and reprogrammed. It is used in memory cards and USB flash drives for general storage and transfer of data between computers and other digital products.
- stores information in an array of memory cells made from floating-gate transistors
-in single-level cell devices, each cell stores only one bit of bit of information.
- in multi-level cell devices, can store more than one bit.
Example:
Thumb drive.

Advantages:
- no power is needed to maintain the information stored in the chip
- flash memory offers fast read access times
- better kinetic shock resistance than hard disks
- durable, being able to withstand intense pressure, extremes of temperature, and even immersion in water
Disadvantage:
- has a limited life. A USB flash drive can store a limited amount of photographic data in its memory or flashes, and after that, it can lead to data corruption.
- Another pitfall of flash memory is that though it retrieves the data fast, it’s too slow in writing
-Block erasure: as the information is kept in block, it must be erase one block at a time.- Memory wear: has a limited number of erase-write process. Same like has been discussed above, this mean that once it achieve the limit, the drives might be corrupted.

Magneto-optical disk:

Description:
Combine optical and magnetic properties.
Also known as erasable optical disks.store data on sectored tracks using the CAV method.

Example:
Magneto-optical drive.

Advantages:
Share the advantages of optical disk technology: capacity, reasonable cost, and removability.
And also have the read/write capability of magnetic disks.
It may also be stored near magnets without concern that the data may lost.

Disadvantage:
Have much longer seek time and a slower transfer time than magnetic disk.



























Monday, September 1, 2008

tutorial 4

UNIX
Aspect of difference
Windows
The virtual memory handler attempts to preserve a pool of free RAM continuously.
The precise algorithm varies between variants and versions, but in expansive
terms the handler uses three variables to control it's activity;

1) lotsfree: When the free memory pool is above lotsfree the VM handler
is idle. If it drops below the handler will begin scanning for unused pages
to place on the Free List.

2) Desfree: 'Desirable Free'. Below this point the handler will start work
in earnest applying various criteria to reclaim in use pages that (say)
have not be accessed for some time. The effort and priority of this work
increases as the free memory pool drops.

3) Minfree: Things are getting desperate if the Free memory pool reaches
this point. The system may begin thrashing and if the situation is not cleared
desperation swapping.
Implementing virtual memory
All the systems processes use virtual memory addresses which are automatically
translated to real (RAM) addresses by the hardware. Only core parts of the
operating system kernel bypass this address translation and use real memory
addresses directly. All processes running under 32 bit Windows gets virtual
memory addresses (a Virtual Address Space) going from 0 to 4,294,967,295
(2*32-1 = 4 GB), regardless of how much RAM is actually installed on the
computer.

Generally, applications use only a small fraction of the memory allocated
of private address space. The operating system only assigns RAM page frames
to virtual memory pages that are in use.

The translation between the 32 bit virtual memory address used by the code
running in a process and the 36 bit RAM address is handled routinely and
transparently by the computer hardware according to translation tables maintained
by the operating system. Any virtual memory page (32 bit address) can be
associated with any physical RAM page (36 bit address).

When the memory in use by all the presented processes exceeds the amount
of RAM available, the operating system will move pages (4 KB pieces) of
one or more virtual address spaces to the computer’s hard disk, thus
freeing that RAM frame for other purposes. In Windows systems, these “paged
out” pages are stored in one or more files called pagefile.sys in
the root of a partition
To determine the page size at run time, use the system function sysconf().


Support up to eight different page sizes, from 4kB up to 256MB.
Page sizes
To determine the page size at run time, use the system function GetSystemInfo()
from kernel32.dll.
Use signals, such as SIGSEGV, to report these error conditions to programs.
It will typically report these conditions to the user with error messages.
Page fault
Windows uses structured exception handling to report page fault-based
invalid accesses as access violation exceptions. It would report such problems
with less technical error messages.

Resources:
1) http://216.147.18.102/unixfaq/explain_vm.shtml
2) http://en.wikipedia.org/wiki/Page_fault
3) http://www.aumha.org/win5/a/xpvm.php
4) http://support.microsoft.com/kb/555223
5) http://www.aumha.org/win5/a/xpvm.php

Monday, August 4, 2008

tutorial 3-20 core functions of an operating systems

Operating systems
20 core functions of an operating systems:

: 1 : To handle the details of the operation of the hardware. This can help application program in managing the details and easier in the process of writing an application.

: 2 : Operating systems software functions as a mediator and intermediary between the user and a computer. Its like an interface between the computer and the outside world.

: 3 : Operating systems software acts as a mediator and intermediary between the user and the computer. It is a set of functions which programs may use to perform specific tasks, relating in interfacing with the components of a computer systems.

: 4 : It also provides the function to monitor computer performance, debug problems, or maintain parts of the systems. This can be done by the applications provided such as disk check, and debugger.

: 5 : One of the basic tasks of an operating system is directing and distributing the limited memory of a computer to the different processes that requires completion. Since the memory is limited, operating system needs to choose which process need to be completed first.

: 6 : Help in data flow between many computers in large organizations and make it possible to connect between computers and the related computer devices.

: 7 : It is also the responsiblity of an operating systems to manage files and folders of information in a computer systems. This means it also maintaining the file systems.

: 8 : Provides supports to load and execute other software or programs.

: 9 : Supervise the computer's resources, such as the central processing unit, memory, disk drives, and printers.

: 10 : Execute and provide services for applications software. However, this task usually is hidden from the user.

: 11 : Carried out all input and output operations done by user or by the application software,such as an antivirus programs.

: 12 : Enable virtual memory operations for application programs, this allows flexible use of memory and enforces security.

: 13 : The operating system directs the traffic inside the computer, deciding what resources will be used and for how long.

: 14 : To hide details of hardware by creating abstraction. An abstraction is software that hides lower level details and provides a set of higher-level functions. An operating system transforms the physical world of devices, instructions, memory, and time into virtual world that is the result of abstractions built by the operating system.

: 15 : Provide a pleasant and effective user interface. The user interacts with the operating systems through the user interface.

: 16 : Offer the facilities for data compression, organizing and stocking libraries.

: 17 : Control and command programs, with a coordinating role and control all the operating system's functions, like execution's interruptions and hardware-user communication.

: 18 : Allocation table for program execution. This happens by identifying the programs to be executed, the needed amount of memory, the preferred devices, and the concerning requests.

: 19 : Helps programmers and users interact with a computer to carry out their intended tasks.

: 20 : When a computer is turned on, the operating system boot up and load the memory.

Tuesday, July 15, 2008

Tutorial Two

1) Application software is a set of interrelated programs that are used together for a particular purpose or application. Example is like Microsoft Word.

2) Communications device is a terminal used to send voice, video or text. Mobile phones, wireless PDAs and personal computers equipped with microphones, speakers and cameras are all considered communications device.

3) Computer is also called processor. It is an electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed and display the result of these operations.

4) Desktop computer is a personal computer in a form intended for regular use at a single location.

5) Embedded computer is the most commonly found and
used computer. It is a computer with a specific function and can be found in microwaves, mp3s, and even traffic lights.


6) Graphical user interface is software interface designed to standardize and simplify the use of computer programs. The mouse is use to manipulate text and images on a display screen featuring icons, windows and menus.

7) Hardware is the physical part of a computer.

8) Internet is a vast computer network linking small
computer networks worldwide.
The Internet includes educational, commercials and other networkss, all of which use the same set of communication protocols.

9) Installing is to connect a software and prepare it
for use.


10) Network is a system of computer interconnected by
telephone wires in order to share information.