Thursday, March 24, 2011

TUGASAN 1 (MEMORY MANAGEMENT)

Memory Management
This is the module of the Operating System that manages memory in a system by deciding when to allocate and de-allocate memory to a process, how much to allocate and the scheduling of these processes.  The following section lists the major concepts and terminologies that are related to Memory Management.


Virtual Memory
Virtual Memory refers to the concept whereby a process with a larger size than available memory can be loaded and executed by loading the process in parts.  The program memory is divided into pages and the available physical memory into frames.  The page size is always equal to the frame size.  The page size is generally in a power of 2 to avoid the calculation involved to get the page number and the offset from the CPU generated address.  The virtual address contains a page number and an offset.  This is mapped to the physical address by a technique of address resolution after searching the Page Map Table.

Paging
In Virtual Memory Systems, a program in execution or a process is divided into equal sized logical blocks called pages that are loaded into frames in the main memory.  The size of a page is always in a power of 2 and is equal to the frame size.  Dividing the process into pages allows non-contiguous allocation in these systems.

Segmentation
Segmentation is a memory management technique that supports Virtual Memory.  The available memory is divided into segments and consists of two components- a base address that denotes the address of the base of that segment and a displacement value that refers to the length of an address location from the base of that segment.  The effective physical address is the sum of the base address value and the length of the displacement value.







Memory Location Policy
The relocation policy specifies the thresholds of the overall system-supported metrics as well as policy window which is the time window to be used for metric history collected by the WPAR Manager agent, and agent polling time which states how long the agent should wake up to analyze policy violations.

Location Of Outdoor System

The output from these devices is input for the computer. Similarly, printers and monitors take as input signals that a computer outputs. They then convert these signals into representations that human users can see or read. For a human user the process of reading or seeing these representations is receiving input. These interactions between computers and humans is studied in a field called human–computer interaction.

RELOCATION OF PAGING SYSTEM
If your PC's hard drive is divided into partitions, moving your paging file may enable you to achieve better system performance. The paging file is an area of your hard drive that Windows uses as RAM in what is called "virtual memory." Follow these steps to relocate the paging file to a different partition than the one containing your Windows system files.

TUGASAN 2 (INPUT AND OUTPUT MANAGEMENT)

Input and Output Management

• Managing input & output in Windows XP involves many operating system componets.

• User-mode processes interact with an enviroment subsystem and not directly with kernel-mode componets.

• The enviroment subsystem pass input & output request to the input & output manager,which interacts with devices drivers to handle such request.

• Sereval device drivers,organized into a driver stack,cooperate to fulfill an input & output request.

• The plug and play manager dynamicaly recognizes when new devices are added to the system and allocates and deallocates resources,such as input & output ports or DMA channels, to them.

• The power manger administers the operating system’s power mangement policy.

• The power policy detemines whether to power down devices to conserve energy or keep them fully powered for high responsiveness.


















Elaborate the concept of buffering
• Buffer overflow weakness is one of the many disadvantages of this type of security computer

• Buffer overflow attacks occur when the excessive Attacker provide input on the plan on the run

• Buffee overflow results from the weakness of the programming language c, c + +, fortran, and assembly, which does not automatically check the limit input when the program is executed

• The program is so complex, sehinnga programmers themselves do not know the weaknesses of the program

• Relies on external data to control the program

• Buffer is provided at the memory allocation, such as arrays or pointers in C. in the language C and C + +, there is no automatic restrictions on buffernya, where users can write through the input buffer. For example:

int main () {

int buffer [10];

buffer [20] = 10;

}

• Program in C above is a valid program, and each compiler to compile without error

• A process is a program in execution.










Recognize spooling technique

• In computer science, spooling refers to a process of transferring data by placing it in a temporary working area where another program may access it for processing at a later point in time.
• The normal English verb "spool" can refer to the action of a storage device that incorporates a physical spool or reel, such as a tape drive.
• Spooling refers to copying files in parallel with other work.

• The most common use is in reading files used by a job into or writing them from a buffer on a magnetic tape or a disk.

• Spooling is useful because devices access data at different rates. The buffer provides a waiting station where data can rest while the slower device catches up.
• This temporary working area would normally be a file or storage device.
• The most common spooling application is print spooling: documents formatted for printing are stored onto a buffer (usually an area on a disk) by a fast processor and retrieved and printed by a relatively slower printer at its own rate.

• Spooler or print management software may allow priorities to be assigned to jobs, notify users when they have printed, distribute jobs among several printers, allow stationery to be changed or select it automatically, generate banner pages to identify and separate print jobs, etc.

• The temporary storage area to which E-mail is delivered by a Mail Transfer Agent and in which it waits to be picked up by a Mail User Agent is sometimes called a mail spool


TUGASAN 3 (FILE SYSTEM MANAGEMENT)

File Sharing
• The system that an operating system or program uses to organize and keep track of files.
• For example, a hierarchical file system is one that uses directories to organize files into a tree structure.
• Although the operating system provides its own file management system, you can buy separate file management systems.
• These systems interact smoothly with the operating system but provide more features, such as improved backup procedures and stricter file protection.

File Sharing

• Sharing of files on multi-user systems is desirable
• Sharing may be done through a protection scheme
• On distributed systems, files may be shared across a network
• Network File System (NFS) is a common distributed file-sharing method

Directory Structure
• A collection of nodes containing information about all files.
• Both the directory structure and the files reside on disk.
• Backups of these two structures are kept on tapes

File Mapping

• File mapping is the association of a file's contents with a portion of the virtual address space of a process.
• The system creates a file mapping object (also known as a section object) to maintain this association.
• A file view is the portion of virtual address space that a process uses to access the file's contents.
• File mapping allows the process to use both random input and output (I/O) and sequential I/O.
• It also allows the process to work efficiently with a large data file, such as a database, without having to map the whole file into memory.
• Multiple processes can also use memory-mapped files to share data.
• Processes read from and write to the file view using pointers, just as they would with dynamically allocated memory.
• The use of file mapping improves efficiency because the file resides on disk, but the file view resides in memory.
• Processes can also manipulate the file view with the Virtual Protect function.

TUGASAN 4 (PROTECTION AND SECURITY)

Recognize security policy and mechanism.

   In computer science, protection mechanisms are built into a computer architecture to        support the enforcement of security policies. A simple definition of a security policy 
   set who may use what information in a computer system.Mechanism for controlling the   
   access of programs, processes, or users the resources defined by the computer
   system. the protentation mechanism ensures the enforcement of a certain policy.

 Elaborate authentic basic.

Password
*        A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password should be kept secret from those not allowed access.

Artifact

*     In natural science and signal processing, an artifact is any error in the perception or  representation of any visual or aural information introduced by the involved equipment or technique(s).
*         In computer science, digital artifacts are anomalies introduced into digital signals as a    
            result of digital processing.
*         In microscopy, artifacts are sometimes introduced during the processing of samples into   
            slide form. See Artifact (microscopy)

Biometric

*       Biometrics consists of methods for uniquely recognizing humans based upon one or more
          intrinsic physical or behavioral traits. In computer science, in particular, biometrics is
          used as a form of identity access management and access control. It is also used to
          identify individuals in groups that are under surveillance.





Elaborate protection concept and access control.

·         For your PC security suite is now available a variety of programs that promise more often than full protection from malware, with acontrol virus and malware, but also with some research andcomplex in real time. 
·        Major challenge for all manufacturers areoffering solutions that are effective yet easy to use, and if you do not require excessive resources to the system.
·         At the time all the leading manufacturers of security software suite that provides a guide as well as the traditional functions of malwaredetection and protect your PC also features accessories forprotection of data and optimization of the operating system. 
·         The concept of security was also extended to the area where this malware is not in the strict sense. But, in a sense, a proper backup data fall within the concept of security.

TUGASAN 5 (My Preffered OS)

 Install or Format Windows 7

1) First, insert your Windows 7 Boot Disk into your dvd drive and reboot your PC.
While the PC is rebooting, you will be prompted ” Press any key to boot from CD…” Just press any key here.


2) Install Windows 7 - Press any key.
After you press a key, windows will load installation files.
Install Windows 7 - Windows is loading files.
Windows 7 setup will start.
3) Install Windows 7 - Starting Windows Setup.
Select your language, time and currency format and keyboard input (US).
4) Install Windows 7 - First Setup Screen, input language, time and currency format and keyboard input method.
Click Install Now to proceed.
5) Install Windows 7 - Install Now Screen.
Setup will load for a min or two.
6) Install Windows 7 - Setup is starting.
If you do, select I accept the license terms and click Next.
7) Install Windows 7 - License Terms.
If you are upgrading from Windows Vista select Upgrade, if you had Windows XP you have to select Custom (Advanced). Upgrade from Windows XP to Windows 7 is not available. Click Custom (Advanced).
8) Install Windows 7 - Custom Install.
Select the Partition where you want to install Windows 7 and click Next. You will need at least 5716mb free space.
9) Install Windows 7 - Where do you want to install windows.
If you don’t have enough free space to Install Windows 7, you will receive the following warning.
10) Install Windows 7 - Not enough disk space warning message will appear
If that’s the case, you will need to format the partition where you previously had Operating System installed. WARNING: Formatting a partition will erase all existing data on the partition, proceed only if you have backed up all your files!
If you want to format the partition, go to Drive options.
11) Install Windows 7 - Drive Options.
and format the partition where you want to install windows 7. Again, do this only if you have backed up your documents/files!
click format and then yes.
12) Install Windows 7 - Format Windows 7 Install Partition.
After you press Next, Windows 7 Installation will begin. Approximately takes about 30 min to 1 hour to finish, depending on your computer speed.
13) Install Windows 7 - Setup running.
After half an hour, setup is complete and windows 7 installation is almost finished. Few more minutes.
14) Install Windows 7 - Setup Complete.
Now your computer will reboot, since the Windows 7 DVD boot disk is still in the drive, the message press any key to boot from DVD will appear. We already did that, so this time DO NOT press anything. Just wait 5 sec and your PC will continue booting and finish installing your operating system.
15) Install Windows 7 - Setup Restarts.
16) Install Windows 7 - Dont press anything this time.
Windows will continue booting and installing.
17) Install Windows 7 - Windows starts to load.
18) Install Windows 7 - loading...
19) Install Windows 7 - Completing Installation.
20) Install Windows 7 - Setup is preparing your computer for first use.
      Insert your name (this will be your windows username).
21) Install Windows 7 - Type a username.
      If you want to, insert password for your computer. 
22) Install Windows 7 - Type your windows product key.
      Select use recommended settings.
23) Install Windows 7 - Use Recommended Settings.
      It’s time for Time zone, select yours from the drop down menu.
24) Install Windows 7 - Review your time and date settings.
      Depending on your location, select the appropriate network location.
25) Install Windows 7 - Computer location select network.
      If you have more than 1 computer, type homegroup password for sharing
      files.Make sure to remember it.
26) Install Windows 7 - Type homegroup password.
      Windows is finalizing your settings.
27) Install Windows 7 - Windows is finalizing your settings.
28) Install Windows 7 - Welcome screen.
      That’s it. Now insert your computer manufacturer drivers CD and
      install  drivers. Also FYI, Windows 7 has great driver support, go to
      Start –>    Control Panel –> Select View By = Small Icons –> Click 
      Windows Update.
29) Install Windows 7 - Windows Update.
      Check for updates and click on optional updates, to see which drivers 
     windows 7 found for your computer automatically.

     Finish.