Wednesday, September 24, 2008

Assigment # 1

1.)Explain the cirumstances under which a token-ring netwrok is more effective than an Ethernet network.

In a Token Ring network, each computer is constantly in direct contact with the next node in the ring but a Token Ring network cannot communicate within itself if any one of the rings is broken.
The token ring network architecture was developed by IBM and later standardized as the IEEE 802.5 standard and is the second most widely-used protocol on local area networks after Ethernet.

Token ring is more effective under high sustained load, and each slot may be used to carry a message, providing highthroughput.

2.) Although security issues were not mentioned in this chapter, every network owner must consider them. Knowing that open networks all data to pass to every node, describe the posssible security concerns of open network achitectures. include the implicatiions of passing logon procedures, user IDs, and passwords openly on the network.

Active networks are an exciting development in networking services in which the infrastructure provides customizable network services to packets. These custom network services can be deployed by the user inside the packets themselves. Furthermore, the custom network services require that the infrastructure performs much more sophisticated operations on packets than the traditional forwarding. Consequently, there are heightened concerns from users and network operators about security. We discuss security requirements and issues in active networks with respect to authentication and authorization in a node. We describe our prototype implementation of a solution to those issues. We go on to describe a security architecture derived from our experience and relate our prototype to the architecture.

3.) Remembering the discussion of deadlocks, if you were designing a networked system, how would you manage the treat of deadlocks in your network? Consider all of the following: prevention, detection, avoidance, and recovery.
Prevention => A common scheme for preventing deadlock in networks is the virtual channel method of Dally and Seitz [DS87]. Due to the nature of this scheme, an otherwise completely uniform network will have non-uniformities introduced into it. The variations introduce several effects, ranging from limitations on overall network performance to differences in observed network characteristics from node to node and from message to message.

Detection and Recovery => Deadlock detection and recovery-based routing protocols in wormhole networks have gained attraction because they do not restrict routing adaptability unlike deadlock avoidance-based protocols. Network performance largely relies on the accuracy of deadlock detection. The lower the number of packets presumed as deadlocked by a protocol, the better the network performs, since the network rarely enters into deadlock state in reality and those packets presumed as deadlocked are usually killed or recovered according to a recovery procedure, causing extra overhead to the network. This paper proposes a deadlock detection protocol based on the turn model. It declares only one packet per simple cycle of blocked packets as deadlocked in most cases, thus considerably reducing the number of false deadlock detections over previous protocols. This results in less number of unnecessary recoveries to resolve deadlock. This achievement is made with lower hardware complexity than a most sophisticated previous protocol. The simulation study shows that our protocol outperforms previous protocols in the number of deadlock detections.

Avoidance => A feasible solution to cope with such unpredictable situations is to introduce an automated manufacturing system characterized by high flexibility, autonomy and cooperation. Much research has been done on negotiation-based scheduling and control under the distributed control architecture due to its operational flexibility and scalability. Despite many advantages, the probability of the system stalling at a deadlock state is high. Specifically, it is difficult to detect impending part flow deadlocks within the system. A system request network model is defined here to analyse various deadlock situations. Request cycles are then identified by a virtual part flow control mechanism. No request cycle in the system request network represents 'no system deadlock'. For any request cycle, a deadlock analysis is performed. If any request cycle exists that represents either a part flow deadlock or an impending part flow deadlock, then the system will be deadlocked. The proposed model can analyse all types of impending part flow deadlocks. Furthermore, it is more efficient through the reduction of search space, is applicable to various configurations and is less restrictive in dynamic shop floor control.

4.) Assuming you had sufficient funds to upgrade only one component for a system with which you are familiar, explain which component you would choose to upgrade to improve overall performance, and why?

Computer workstations are now an indispensable component of every office. Faculty, staff, and administrators use their workstations in every aspect of their duties. Since computers on campus are connected in a network, it is essential that each workstation represent current technology and be able to run the essential applications that define the University's business environment. It is also essential that each departmental file server be upgraded on a regular basis so that the network can function effectively. This plan describes an orderly approach to upgrading or replacing all computer workstations and large file servers on a regular basis, and it enables budget authorities to project the costs of such upgrades. This proposal does not affect computers used for special instrumentation purposes in University research laboratories.

Thursday, January 17, 2008

Form Factors in Motherboard

ATX Motherboard


ATX was developed as an evolution of the Baby-AT form factor and was defined to address ease of use, support for current and future I/O, support for current and future processor technology, and reduced total system cost.


ATX Specification v2.2 Revision 2.2 - [432 KB] Key changes for the ATX Specification Version 2.2 include Main Power Connector changed from 20 pin to 24 pin ( 2 x12) to support PCI-Express* requirements and removed Aux Power Connector Recommendation if using a power supply designed using ATX12V Power Supply Design Guide Rev 2.0 or greater. Also updated the +3.3 V tolerance.


MicroATX Motherboard



The microATX form factor was developed as a natural evolution of the ATX form factor to address new market trends and PC technologies. While offering the same benefits of the ATX form factor specification, the microATX form factor improves upon the previous specification in several key areas. Current trends in the industry indicate that users require a lower-cost solution for their PC needs. Without sacrificing the benefits of ATX, this form factor addresses the cost requirement by reducing the size of the motherboard. The smaller motherboard is made possible by reducing the number of I/O slots supported on the board. The overall effect of these size changes reduces the costs associated with the entire system design. The expected effect of these reductions is to lower the total system cost to the end user.


Through careful designing of a microATX motherboard, an OEM can capitalize on the benefits of a reduction in total system costs. These cost savings come from a reduced-output power supply (see the separate document SFX Power Supply Design Guide), reduced chassis costs, and minimal redesign of existing ATX compliant chassis for backward-compatibility.


microATX benefits also include those found with the current ATX form factor: more I/O space at the rear and reduced emissions from using integrated I/O connectors.


microATX Motherboard Interface Specification v 1.2 Revision 1.2 - [278 KB] Key changes for the microATX Motherboard Interface Specification Version 1.2 include Main Power Connector changed from 20 pin to 24 pin ( 2 x12) to support PCI-Express* requirements

FlexATX Motherboard


FlexATX offers the opportunity for system developers to create many new personal computer designs.

Balanced Technology Extended (BTX) Form Factor


The BTX form factor specification gives developers options to balance thermal management, acoustics, system performance, and size in the system form factors and stylish designs that are desired in today's products. The BTX form factor is a clear break from previous ATX form factor layouts and was developed with emerging technologies such as Serial ATA, USB 2.0, and PCI Express*.

Thermal improvements come primarily from taking advantage of in-line airflow. The BTX defined in-line airflow layout allows many of the main board components (i.e.: processor, chipset, and graphics controller) to utilize the same primary fan airflow, thereby reducing the need for, and noise from, additional system fans. In some cases this also allows fewer and/or less expensive heat sinks to be used when compared to ATX solutions. The system level acoustics are also improved by the reduced air turbulence within the in-line airflow system. The BTX layout supports better component placement for back panel I/O controllers – important as the signal speed of external devices continues to increase. In addition to smaller than microATX system sizes, BTX was designed to scale up to tower size systems using the same core layout by increasing the number of system slots included.




Balanced Technology Extended (BTX) Interface Specification Revision 1.0b - [305 KB]


LPX

White ATX is the most well-known and used form factor, there is also a non-standard proprietary form factor which falls under the name of LPX, and Mini-LPX. The LPX form factor is found in low-profile cases (desktop model as opposed to a tower or mini-tower) with a riser card arrangement for expansion cards where expansion boards run parallel to the motherboard. While this allows for smaller cases it also limits the number of expansion slots available. Most LPX motherboards have sound and video integrated onto the motherboard. While this can make for a low-cost and space saving product they are generally difficult to repair due to a lack of space and overall non-standardization. The LPX form factor is not suited to upgrading and offer poor cooling.


NLX

Boards based on the NLX form factor hit the market in the late 1990's. This "updated LPX" form factor offered support for larger memory modules, tower cases, AGP video support and reduced cable length. In addition, motherboards are easier to remove. The NLX form factor, unlike LPX is an actual standard which means there is more component options for upgrading and repair.
Many systems that were formerly designed to fit the LPX form factor are moving over to NLX. The NLX form factor is well-suited to mass-market retail PCs.

Tuesday, December 4, 2007

Procedures in Installing Windows XP

1.Insert the Windows XP CD into your computer and restart your computer.
2.If prompted to start from the CD, press SPACEBAR. If you miss the prompt (it only appears for a few seconds), restart your computer to try again.


3.Windows XP Setup begins. During this portion of setup, your mouse will not work, so you must use the keyboard. On the Welcome to Setup page, press ENTER.


4.
On the Windows XP Licensing Agreement page, read the licensing agreement. Press the PAGE DOWN key to scroll to the bottom of the agreement. Then press F8.



5.
This page enables you to select the hard disk drive on which Windows XP will be installed. Once you complete this step, all data on your hard disk drive will be removed and cannot be recovered. It is extremely important that you have a recent backup copy of your files before continuing. When you have a backup copy, press D, and then press L when prompted. This deletes your existing data.

6.
Press ENTER to select Unpartitioned space, which appears by default.




7.
Press ENTER again to select Format the partition using the NTFS file system, which appears by default.



8.
Windows XP erases your hard disk drive using a process called formatting and then copies the setup files. You can leave your computer and return in 20 to 30 minutes.



Part 2: Continue the installation

9.Windows XP restarts and then continues with the installation process. From this point forward, you can use your mouse. Eventually, the Regional and Language Options page appears. Click Next to accept the default settings. If you are multilingual or prefer a language other than English, you can change language settings after setup is complete.

10.On the Personalize Your Software page, type your name and your organization name. Some programs use this information to automatically fill in your name when required. Then, click Next.

11.On the Your Product Key page, type your product key as it appears on your Windows XP CD case. The product key is unique for every Windows XP installation. Then, click Next.


12.On the Computer Name and Administrator Password page, in the Computer name box, type a name that uniquely identifies your computer in your house, such as FAMILYROOM or TOMS. You cannot use spaces or punctuation. If you connect your computer to a network, you will use this computer name to find shared files and printers. Type a strong password that you can remember in the Administrator password box, and then retype it in the Confirm password box. Write the password down and store it in a secure place. Click Next.



13.On the Date and Time Settings page, set your computer’s clock. Then, click the Time Zone down arrow, and select your time zone. Click Next.


14.Windows XP will spend about a minute configuring your computer. On the Networking Settings page, click Next.


15.On the Workgroup or Computer Domain page, click Next.



Part 3: Complete the installation

16.Windows XP will spend 20 or 30 minutes configuring your computer and will automatically restart when finished. When the Display Settings dialog appears, click OK.



17.When the Monitor Settings dialog box appears, click OK.


18.The final stage of setup begins. On the Welcome to Microsoft Windows page, click Next.



19.On the Help protect your PC page, click Help protect my PC by turning on Automatic Updates now. Then, click Next.


20.Windows XP will then check if you are connected to the Internet:

• If you are connected to the Internet, select the choice that describes your network connection on the Will this computer connect to the Internet directly, or through a network? page. If you’re not sure, accept the default selection, and click Next.



If you use dial-up Internet access, or if Windows XP cannot connect to the Internet, you can connect to the Internet after setup is complete. On the How will this computer connect to the Internet? page, click Skip.



21.Windows XP Setup displays the Ready to activate Windows? page. If you are connected to the Internet, click Yes, and then click Next. If you are not yet connected to the Internet, click No, click Next, and then skip to step 24. After setup is complete, Windows XP will automatically remind you to activate and register your copy of Windows XP.


22.On the Ready to register with Microsoft? page, click Yes, and then click Next.


23.On the Collecting Registration Information page, complete the form. Then, click Next.


24.On the Who will use this computer? page, type the name of each person who will use the computer. You can use first names only, nicknames, or full names. Then click Next. To add users after setup is complete or to specify a password to keep your account private, read Create and customize user accounts.


25.On the Thank you! page, click Finish.


Congratulations! Windows XP setup is complete. You can log on by clicking your name on the logon screen. If you’ve installed Windows XP on a new computer or new hard disk drive, you can now use the File and Settings Transfer Wizard to copy your important data to your computer or hard disk drive.

Procedures in Installing Windows Vista

Installing Windows Vista Installation of vista can be done in a few ways: You can upgrade, or install a new copy. There are other ways of installation such as automaticaly installing over a network from a customized image or from a customized image on some type of media such as a dvd or external hard disk. The Installation below was done on a new pc using the Ultimate versions of Window Vista. Start off by booting up the pc with the Windows Vista CD, you may have to wait a minute until the cd loads files to take you to the setup envronment. If you have been unable to boot from the cd, you may want to access your BIOS settings (the first few screens you see as your pc loads up) which can be done usually by pressing the DEL key (Delete) or F1 however you should be able to find out the correct key as your pc starts up. Once you are in the BIOS settings just choose the bootup procedure to start by booting up with the cd-rom or dvd-rom drive and then the hard disk, this should allow you to boot up with the CD/DVD.



Now Select the language you would like to install your copy of Vista. Choose the correct Time and currency format and the keyboard or input method.



If you already have a copy of Windows Vista and want to repair it, you can choose to do this by clicking on Repair your Computer. For everyone else who wants to continue installing Windows Vista, just click on Install Now.





Enter your product code, now you don't have to add any dashes, they will automatically be added, you can choose to automatically activate Windows when you are online, or if you wish to do this at another time, uncheck the check box.



The next part below allows you to choose whether you wish to upgrade your installation, such as from Windows XP or if you would like to install a new copy of Vista onto the PC. The upgrade option below has been disabled as the copy is a beta version, however in the versions out now, you will be able to upgrade your operating systems if you choose so.



Next you will see that files are being copied, this may take a bit of time, however the Windows Vista installation should run quicker than previous versions of Windows so it should not be too long.



You should see that the installation has progressed with some green ticks.



Once this part of the installation has finished, the system will restart, just let it continue and it will continue the installation when it boots up.



You will see the following window, this should not take too long..



You should now be able to see that the installation is completing and the setup section will follow on.



You will need to type in a username and password, this is so that your computer will stay secure from anyone gaining access to your desktop, etc. Make sure the password is not a word from the dictionary or a name as these are not the most secure passwords, a combination of numbers and letters plus special characters are reccomended for passwords.



Once you have filled in this information, click Next.



You will also need to type in a computer name, this is for network identification. Choose a background as well to start off with, this can be changed easily later as described in the section on Control Panel - Appearance and Personalization.



The next section is for updating your copy of Windows to have the latest security and bug fixes as well as the latest drivers for your hardware, it is reccomended to Install the important updates at this point, however it is not nescessary - Click Use reccomended settings to install updates now as well as keep the computer up to date in the future.



Now enter your time and date settings and click Next.



Now your settings are finished, click Next to log in to Windows Vista!



You will need to wait a few more minutes for last minute installations to complete:



The screen may change a few times... until the log in screen.



Now type in your password here that you entered during set up.



You should see Windows Vista logging in..

Sunday, November 18, 2007

List of Other OS

Arthur (operating system)


Arthur is an early graphical user interface (GUI) operating system (OS) that was used on Acorn ARM-cpu-based computers from about 1987 until the much-superior RISC OS 2 was completed and made available in April 1989. It was the operating system of the earliest Archimedes ARM machines.

The desktop is very primitive. It features a colour-scheme typically described as "technicolour". Its earlier revisions were very buggy, and was only really meant to be a placeholder until RISC OS 2 (a name chosen instead of Arthur 2) was completed.

The "Arthur" name was supposedly dropped from version 2 because of the release at the time of a movie called Arthur 2: On the Rocks. Arthur is said to stand for "A Risc-based operating system by THURsday". Supposedly Arthur was put together in break-neck speed because a revolutionary operating system which Acorn had under development (ARX) wasn't going to be ready in time.

Most software made for Arthur can be run under RISC OS. A few titles will not work, however.

A/UX

A/UX (from Apple Unix) was Apple Computer's implementation of the Unix operating system for some of their Macintosh computers. The later versions of A/UX ran on the Macintosh II, Quadra and Centris series of machines. A/UX was first released in 1988, with the final version (3.1.1) released in 1995. A/UX required a 68k-based Macintosh with an FPU and a paged memory management unit (PMMU).

The operating system was based on UNIX System V Release 2.2, with some additional features from System V Releases 3 and 4, and 4.2 and 4.3 BSD. It was POSIX and System V Interface Definition (SVID) compliant and included TCP/IP networking from version 2 onward. There were rumors of a later version using OSF/1 as its primary code base, but this system was never released to the public, if it even existed.

Mac OS X Server

Mac OS X Server is the server-oriented version of Apple's operating system, Mac OS X. Mac OS X, in both desktop and server versions, is a Unix operating system based on technology that Apple acquired from NeXT Computer.

The server version of Mac OS X includes applications that are intended to allow administrators to more easily manage features, such as internet-based services like email or site hosting, or manage networks of Macs and Windows PCs and provide services such as file and print sharing. Prior to Mac OS X, Apple's AppleShare software provided server applications such as file and printer sharing and user management.

Mac OS X Server leverages both open source technologies for provision of powerful standards-based services, and proprietary Apple applications for administration and for some additional services. Many services have aspects of both origins, such as Open Directory, which provides access to several open source (and external proprietary) technologies from one interface.

Lisa

The Lisa operating system featured cooperative (non-preemptive) multitasking[2] and virtual memory, then extremely advanced features for a personal computer. The use of virtual memory coupled with a fairly slow disk system made the system performance seem sluggish at times. Conceptually, the Lisa resembled the Xerox Star in the sense that it was envisioned as an office computing system; consequently, Lisa had two main user modes: the Lisa Office System and the Workshop. The Lisa Office System was the GUI environment for end users. The Workshop was a program development environment, and was almost entirely text-based, though it used a GUI text editor. The Lisa Office System was eventually renamed "7/7", in reference to the seven supplied application programs: LisaWrite, LisaCalc, LisaDraw, LisaGraph, LisaProject, LisaList, and LisaTerminal.

A significant impediment to third-party software on the Lisa was the fact that, when first launched, the Lisa could not be used to write programs for the Lisa: a separate development system was required, which was based on the same hardware but ran a version of the UNIX operating system. An engineer would run the two machines side by side, writing and compiling code on one machine and testing it on the other. Later, the same development system was used to develop software for the Macintosh. After a few years, Macintosh-native development system was developed. Judging from the "program development environment" reference in the previous paragraph, this deficiency was later remedied; but many software houses had by then already dismissed the Lisa as a target platform and did not reconsider it. For most of its lifetime, the Lisa never went beyond the original seven applications that Apple had deemed enough to do "everything."

RISC OS

RISC OS is a computer operating system originally created by British manufacturer Acorn Computers.

The operating system takes its name from the RISC architecture used on supported systems.

Linux

Linux (pronunciation: IPA: /ˈlɪnʊks/, lin-uks) is a Unix-like computer operating system. Linux is one of the most prominent examples of free software and open source development; its underlying source code can be freely modified, used, and redistributed by anyone.[1]

The Linux kernel was first released to the public on 17 September 1991, for the Intel x86 PC architecture. The kernel was augmented with system utilities and libraries from the GNU project to create a usable operating system, which later led to an alternate term, GNU/Linux.[2] Linux is now packaged for different uses in Linux distributions, which contain the sometimes modified kernel along with a variety of other software packages tailored to different requirements.

Predominantly known for its use in servers, Linux is supported by corporations such as Dell, Hewlett-Packard, IBM, Novell, Oracle Corporation, Red Hat, and Sun Microsystems. It is used as an operating system for a wide variety of computer hardware, including desktop computers, supercomputers,[3] video game systems such as PlayStation 2, 3, several arcade games and embedded devices such as mobile phones and routers.

In 1992, Linus Torvalds explained that he pronounces Linux as /ˈlɪnʊks/,[4] though other variations are common.

AmigaOS

AmigaOS is the default native operating system of the Amiga personal computer. It was developed first by Commodore International, and initially introduced in 1985 with the Amiga 1000. It ran on the Motorola 68k series of 32-bit microprocessors, except for AmigaOS 4 which runs on PowerPC microprocessors.

On top of a preemptive multitasking kernel called Exec, it includes an abstraction of the Amiga's unique hardware, a disk operating system called AmigaDOS, a windowing system API called Intuition and a graphical user interface called Workbench. A command line interface is also available.