The document describes basic concepts related to machines, hosts, clients, servers, workstations, processes, daemons, distributed systems, and kernels. It then provides details about the boot PROM including its functions, components, configuration information storage, and commonly used commands. Finally, it outlines the boot PROM booting process and describes emergency sequences and diagnostic modes that can be accessed using stop key sequences.
The document discusses techniques for diagnosing computer systems. It outlines basic diagnostic procedures that involve following steps to determine the problem. Some key rules for computer diagnosis include knowing the facts, using common sense, focusing on replaceable parts, and properly assembling/disassembling parts. Factors that can cause failures include user errors, corrupted firmware/software, defective hardware, electrostatic discharge, and power surges. The document also provides tips for isolating problems, taking notes on error messages, and trying simple solutions to common issues.
Ict 9 module 3, lesson 3 conducting test on the installed computer systemYonel Cadapan
This document outlines steps for testing installed computer components, including:
1. Conducting tests using diagnostic tools like multimeters and loopback adapters to check circuits and systems.
2. Following test procedures with steps like gathering results, validating data, and checking specifications.
3. Performing an external visual inspection of the computer, monitor, peripherals and cables to ensure all components and connections are properly installed and undamaged.
4. Identifying any issues found during inspection and taking appropriate actions.
The document provides steps for installing the Windows XP operating system on a computer. It begins by listing the minimum system requirements for Windows XP, such as requiring at least 64MB of RAM and 4.3GB of hard disk space. It then outlines the 22 steps for installing Windows XP, which include inserting the installation CD, selecting installation options like file system and partitions, entering a product key, and completing post-installation configuration of settings like network, date, and time. The steps describe both the MS-DOS based initial portion of setup and the later graphical user interface portion.
The document provides instructions for a lesson on installing the Windows 7 operating system. It outlines the objectives, standards, and procedures to follow. The lesson will involve a PowerPoint presentation defining key terms, a video demonstration of the installation steps, and an evaluation where students create their own video explaining how to install Windows 7 and are rated on content, video quality, and procedure accuracy. Students are also assigned to research installing device drivers as homework.
This document discusses different types of printers and how to install local and network printers. It covers inkjet, laser, thermal, and impact printers. For local USB or wireless printers, Windows will usually detect them automatically, but older models may require manual installation. For network printers, you can either share a printer connected to one computer or connect the printer directly to the network as a standalone device. The installation process involves adding the printer in Devices and Printers and selecting whether it's a local, shared, or network printer.
The document provides step-by-step instructions for building a computer. It begins by having the reader prepare their workspace and install components like the motherboard, CPU, heat sink, RAM, and power supply. It then instructs on installing additional components such as the graphics card, drives, and add-in cards. The document concludes by having the reader turn the computer on and install the operating system and other software.
The document discusses Android's multimedia framework. It describes key concepts like codecs, file formats, and standards like MPEG. It outlines Android's initial OpenCORE multimedia framework and how it was later replaced by Stagefright. Both frameworks use OpenMAX to interface with codecs and leverage hardware acceleration. The frameworks handle container parsing, decoding, synchronization and output of audio and video streams.
The document discusses techniques for diagnosing computer systems. It outlines basic diagnostic procedures that involve following steps to determine the problem. Some key rules for computer diagnosis include knowing the facts, using common sense, focusing on replaceable parts, and properly assembling/disassembling parts. Factors that can cause failures include user errors, corrupted firmware/software, defective hardware, electrostatic discharge, and power surges. The document also provides tips for isolating problems, taking notes on error messages, and trying simple solutions to common issues.
Ict 9 module 3, lesson 3 conducting test on the installed computer systemYonel Cadapan
This document outlines steps for testing installed computer components, including:
1. Conducting tests using diagnostic tools like multimeters and loopback adapters to check circuits and systems.
2. Following test procedures with steps like gathering results, validating data, and checking specifications.
3. Performing an external visual inspection of the computer, monitor, peripherals and cables to ensure all components and connections are properly installed and undamaged.
4. Identifying any issues found during inspection and taking appropriate actions.
The document provides steps for installing the Windows XP operating system on a computer. It begins by listing the minimum system requirements for Windows XP, such as requiring at least 64MB of RAM and 4.3GB of hard disk space. It then outlines the 22 steps for installing Windows XP, which include inserting the installation CD, selecting installation options like file system and partitions, entering a product key, and completing post-installation configuration of settings like network, date, and time. The steps describe both the MS-DOS based initial portion of setup and the later graphical user interface portion.
The document provides instructions for a lesson on installing the Windows 7 operating system. It outlines the objectives, standards, and procedures to follow. The lesson will involve a PowerPoint presentation defining key terms, a video demonstration of the installation steps, and an evaluation where students create their own video explaining how to install Windows 7 and are rated on content, video quality, and procedure accuracy. Students are also assigned to research installing device drivers as homework.
This document discusses different types of printers and how to install local and network printers. It covers inkjet, laser, thermal, and impact printers. For local USB or wireless printers, Windows will usually detect them automatically, but older models may require manual installation. For network printers, you can either share a printer connected to one computer or connect the printer directly to the network as a standalone device. The installation process involves adding the printer in Devices and Printers and selecting whether it's a local, shared, or network printer.
The document provides step-by-step instructions for building a computer. It begins by having the reader prepare their workspace and install components like the motherboard, CPU, heat sink, RAM, and power supply. It then instructs on installing additional components such as the graphics card, drives, and add-in cards. The document concludes by having the reader turn the computer on and install the operating system and other software.
The document discusses Android's multimedia framework. It describes key concepts like codecs, file formats, and standards like MPEG. It outlines Android's initial OpenCORE multimedia framework and how it was later replaced by Stagefright. Both frameworks use OpenMAX to interface with codecs and leverage hardware acceleration. The frameworks handle container parsing, decoding, synchronization and output of audio and video streams.
This document discusses safety precautions for diagnosing computer systems errors. It describes the importance of personal protective equipment, including anti-static devices to protect against static electricity, power surge protectors to protect against power fluctuations, and other tools like screw drivers. Students are instructed to complete an activity identifying these protective devices and another activity matching the devices to their purposes. The document provides guidance on planning and preparing workspaces and tools before diagnosing computer issues.
The document discusses BIOS, UEFI, POST and the CMOS chip. It provides the following key points:
- BIOS initializes hardware at startup and finds a boot device, while UEFI is a newer standard that offers improvements over BIOS like a graphical interface.
- The POST tests hardware for errors before booting the OS. Passing yields a single beep while errors produce unique beep codes.
- Settings are stored in the CMOS chip, which needs a battery to retain them when off. The BIOS chip holds the low-level software.
There are several types of computer errors that can occur from startup to operation. These include issues with video output, booting, loading the operating system, pop-up windows, hardware installation, safe mode not working, keyboard/mouse errors causing restarts, sound issues, and applications causing restarts. Operating system errors fall into categories like system errors caused by hardware or software issues, runtime errors from corrupted files, stop errors from RAM or hard drive issues, device manager errors from drivers or hardware, POST code errors from motherboard beeps for hardware issues, application errors, and browser status codes for website access problems.
Parts of a computer crossword: Computer Sciencenicamos
The document discusses the main parts of a computer. It provides definitions for key components across and down a crossword puzzle grid. Some of the main parts identified include the central processing unit (CPU), which contains the arithmetic logic unit and control unit and acts as the "brain" of the computer. Other components discussed are the read-only memory (ROM), which stores data to load the operating system, volatile memory (RAM), and hardware parts that can be physically touched.
Formatting a computer involves erasing all data on the computer's hard drive and reinstalling the operating system to restore the computer to its factory defaults. This can be useful for fixing computer issues or preparing to sell or donate a computer. The document provides step-by-step instructions for formatting a Windows 7 or Mac OS X computer by backing up files, booting from installation media, deleting existing partitions, and reinstalling the operating system.
The document contains guidelines for assessing competency for the qualification of Computer Systems Servicing NC II. It includes self-assessment guides for four competency units: Install and Configure Computer Systems, Set Up Computer Networks, Set Up Computer Servers, and Maintain and Repair Computer Systems and Networks. The guides list the tasks and skills required for each unit. Candidates must check off tasks they feel competent in performing. The document also provides instructions for organizing evidence in a portfolio to demonstrate competency to assessors.
The document outlines materials, tools, equipment, and testing devices needed for computer hardware installation. It lists and describes common tools like screwdrivers, pliers, and soldering irons. It also lists equipment like LAN cards, servers, hubs, and accessories. Materials mentioned include software, network cables, and device drivers. The document provides definitions and purposes of these items to help plan and prepare for computer hardware installation. It concludes with a quiz to test understanding of the various tools, equipment, and terms discussed.
The document discusses basic computer configuration setup and installing device drivers. It explains that configuration refers to how a system is set up, including both hardware and software components. It also describes the basic input/output system (BIOS) which is software stored on the motherboard that identifies hardware and performs basic functions like booting. The BIOS can be configured through the BIOS setup utility to change settings like boot order, date and time, and hardware settings. The document provides steps for determining a device manufacturer and obtaining the correct driver from sources like the manufacturer website in order to properly install and configure devices.
This document outlines a three-day lesson plan for a 10th grade computer systems servicing class on installing and configuring operating systems and device drivers. On day one, the teacher reviews the process of making a bootable USB and explains why operating systems and drivers are installed. Students learn how to install Windows Server and drivers through a tell-show-do approach. On day two, students practice the installation process in groups and receive a group grade. Day three involves individual practice and grading of the installation of Windows Server and device drivers according to a performance criteria rubric.
This document discusses the components and functions of a motherboard. It begins by defining a motherboard as the main circuit board that forms the foundation for major computer components. The document then lists parts of an ATX motherboard including the power supply connector, CPU, AGP slot, VGA port, and audio section. It also presents true/false statements about the CMOS backup battery, PCI and AGP architectures, the CPU's role, the northbridge chipset, and uses of the parallel port. Reference materials on computer hardware servicing are also listed.
The document provides step-by-step instructions for installing the Windows 7 operating system on a personal computer. It explains that Windows 7 is one of the most widely used operating systems currently available. The installation process involves booting from the Windows 7 DVD, selecting language and time settings, agreeing to license terms, selecting a drive to install to, and going through a series of restarts until setup is complete. Upon completion, the user is prompted to create an account and set preferences for Windows updates.
The document discusses the Android Debug Bridge (ADB) tool. It describes ADB as a command line interface that allows communication with Android emulators and devices. It provides details on common ADB commands like adb shell, adb devices, adb install and adb logcat. It also covers using ADB to capture screenshots and device logs, install and uninstall apps, and run commands on an Android shell.
This PPT shares some information on what is booting process and different stages in it. Importance of BIOS and BootROM. Steps involved for loading kernel into RAM. What is the importance of init RAM disk (initrd), when 1st user space application is started and who will create init process.
This document provides instructions for creating ISO image files of installers from different media devices using Power ISO. It defines what an ISO image file is, noting that it is a disk image that contains all the data that would be written to an optical disc. It then outlines the procedures for creating ISO image files from CDs, DVDs, or Blu-ray discs using either the main Power ISO program or the shell context menu. The document concludes by providing a team responsible for developing the instructions.
CSS LO7 - PREPARING THE INSTALLER
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1. Prepare their usb bootable drive installer according to the manufacturer procedure.
2. Prepare their usb drive containing drivers and application software.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
RAM (random access memory) allows for quick reading and writing of data to run applications and is volatile, meaning its contents are lost when power is removed. ROM (read-only memory) stores the initial boot program and only allows for reading of its permanent contents that are retained without power. Common types of RAM include SRAM and DRAM, while ROM types include PROM, EPROM, and EEPROM.
The document discusses the components of a computer system unit. It describes the internal power supply, exhaust fan, speaker, motherboard, chipset, microprocessor, clock chip, RAM, ROM, bus, ports, and expansion slots. The system unit contains all the essential parts needed to run a computer and allows the various components to communicate with each other to perform processing and other functions. It is the central component that houses the primary internal parts of a computer and allows it to function.
This document outlines a module on diagnosing and troubleshooting computer systems. The module will cover four major topics: planning diagnosis of computer errors, diagnosing and configuring systems and networks, inspecting and testing configured systems and networks, and testing systems and networks. It will involve 60 hours of instruction and focus on developing skills outlined in national standards for independently diagnosing and troubleshooting computer systems. The document also includes a pre-diagnostic assessment to evaluate learners' existing knowledge on various tasks involved in the module.
This document discusses diagnosing and troubleshooting computer systems errors. It provides tips for avoiding common startup problems, including checking hardware settings and cables. Basic troubleshooting steps are outlined, such as using trial and error to check components, examining the event viewer for error messages, and taking notes on problems and solutions. Common computer problems and solutions are then detailed, including checking the POST display, load time, graphics, performing an audio test, and examining newly installed hardware or software for issues.
The document provides step-by-step instructions for installing the Windows XP operating system on a computer. It lists the minimum system requirements for Windows XP as a Pentium 233MHz processor, 64MB of RAM, 4.3GB of hard disk space, a CD-ROM drive, and a VGA or higher resolution monitor. The installation process involves inserting the Windows XP CD, selecting an installation partition on the hard drive to install Windows to, formatting and copying system files, and completing post-installation configuration steps like setting the time/date, network settings, and activating Windows.
The document discusses the boot sequence of a computer system. It examines each step including the PROM monitor, boot block, secondary boot loader, the OS kernel, and start-up scripts. The administrator should understand this boot process as well as how to modify the boot sequence, select alternate devices, and properly shut down the system.
The document discusses the boot sequence of a computer system. It examines each step including the PROM monitor, boot block, secondary boot loader, and OS kernel initialization. It also covers modifying the boot process, selecting alternate boot devices, different boot loaders, and proper system shutdown procedures.
This document discusses safety precautions for diagnosing computer systems errors. It describes the importance of personal protective equipment, including anti-static devices to protect against static electricity, power surge protectors to protect against power fluctuations, and other tools like screw drivers. Students are instructed to complete an activity identifying these protective devices and another activity matching the devices to their purposes. The document provides guidance on planning and preparing workspaces and tools before diagnosing computer issues.
The document discusses BIOS, UEFI, POST and the CMOS chip. It provides the following key points:
- BIOS initializes hardware at startup and finds a boot device, while UEFI is a newer standard that offers improvements over BIOS like a graphical interface.
- The POST tests hardware for errors before booting the OS. Passing yields a single beep while errors produce unique beep codes.
- Settings are stored in the CMOS chip, which needs a battery to retain them when off. The BIOS chip holds the low-level software.
There are several types of computer errors that can occur from startup to operation. These include issues with video output, booting, loading the operating system, pop-up windows, hardware installation, safe mode not working, keyboard/mouse errors causing restarts, sound issues, and applications causing restarts. Operating system errors fall into categories like system errors caused by hardware or software issues, runtime errors from corrupted files, stop errors from RAM or hard drive issues, device manager errors from drivers or hardware, POST code errors from motherboard beeps for hardware issues, application errors, and browser status codes for website access problems.
Parts of a computer crossword: Computer Sciencenicamos
The document discusses the main parts of a computer. It provides definitions for key components across and down a crossword puzzle grid. Some of the main parts identified include the central processing unit (CPU), which contains the arithmetic logic unit and control unit and acts as the "brain" of the computer. Other components discussed are the read-only memory (ROM), which stores data to load the operating system, volatile memory (RAM), and hardware parts that can be physically touched.
Formatting a computer involves erasing all data on the computer's hard drive and reinstalling the operating system to restore the computer to its factory defaults. This can be useful for fixing computer issues or preparing to sell or donate a computer. The document provides step-by-step instructions for formatting a Windows 7 or Mac OS X computer by backing up files, booting from installation media, deleting existing partitions, and reinstalling the operating system.
The document contains guidelines for assessing competency for the qualification of Computer Systems Servicing NC II. It includes self-assessment guides for four competency units: Install and Configure Computer Systems, Set Up Computer Networks, Set Up Computer Servers, and Maintain and Repair Computer Systems and Networks. The guides list the tasks and skills required for each unit. Candidates must check off tasks they feel competent in performing. The document also provides instructions for organizing evidence in a portfolio to demonstrate competency to assessors.
The document outlines materials, tools, equipment, and testing devices needed for computer hardware installation. It lists and describes common tools like screwdrivers, pliers, and soldering irons. It also lists equipment like LAN cards, servers, hubs, and accessories. Materials mentioned include software, network cables, and device drivers. The document provides definitions and purposes of these items to help plan and prepare for computer hardware installation. It concludes with a quiz to test understanding of the various tools, equipment, and terms discussed.
The document discusses basic computer configuration setup and installing device drivers. It explains that configuration refers to how a system is set up, including both hardware and software components. It also describes the basic input/output system (BIOS) which is software stored on the motherboard that identifies hardware and performs basic functions like booting. The BIOS can be configured through the BIOS setup utility to change settings like boot order, date and time, and hardware settings. The document provides steps for determining a device manufacturer and obtaining the correct driver from sources like the manufacturer website in order to properly install and configure devices.
This document outlines a three-day lesson plan for a 10th grade computer systems servicing class on installing and configuring operating systems and device drivers. On day one, the teacher reviews the process of making a bootable USB and explains why operating systems and drivers are installed. Students learn how to install Windows Server and drivers through a tell-show-do approach. On day two, students practice the installation process in groups and receive a group grade. Day three involves individual practice and grading of the installation of Windows Server and device drivers according to a performance criteria rubric.
This document discusses the components and functions of a motherboard. It begins by defining a motherboard as the main circuit board that forms the foundation for major computer components. The document then lists parts of an ATX motherboard including the power supply connector, CPU, AGP slot, VGA port, and audio section. It also presents true/false statements about the CMOS backup battery, PCI and AGP architectures, the CPU's role, the northbridge chipset, and uses of the parallel port. Reference materials on computer hardware servicing are also listed.
The document provides step-by-step instructions for installing the Windows 7 operating system on a personal computer. It explains that Windows 7 is one of the most widely used operating systems currently available. The installation process involves booting from the Windows 7 DVD, selecting language and time settings, agreeing to license terms, selecting a drive to install to, and going through a series of restarts until setup is complete. Upon completion, the user is prompted to create an account and set preferences for Windows updates.
The document discusses the Android Debug Bridge (ADB) tool. It describes ADB as a command line interface that allows communication with Android emulators and devices. It provides details on common ADB commands like adb shell, adb devices, adb install and adb logcat. It also covers using ADB to capture screenshots and device logs, install and uninstall apps, and run commands on an Android shell.
This PPT shares some information on what is booting process and different stages in it. Importance of BIOS and BootROM. Steps involved for loading kernel into RAM. What is the importance of init RAM disk (initrd), when 1st user space application is started and who will create init process.
This document provides instructions for creating ISO image files of installers from different media devices using Power ISO. It defines what an ISO image file is, noting that it is a disk image that contains all the data that would be written to an optical disc. It then outlines the procedures for creating ISO image files from CDs, DVDs, or Blu-ray discs using either the main Power ISO program or the shell context menu. The document concludes by providing a team responsible for developing the instructions.
CSS LO7 - PREPARING THE INSTALLER
LEARNING OUTCOME:
AT THE END OF THIS LESSON THE LEARNERS WILL BE ABLE TO . . .
1. Prepare their usb bootable drive installer according to the manufacturer procedure.
2. Prepare their usb drive containing drivers and application software.
3. Learn and experience to install Window 7 operating system.
4. Discover and prepare the basic applications needed to be installed.
RAM (random access memory) allows for quick reading and writing of data to run applications and is volatile, meaning its contents are lost when power is removed. ROM (read-only memory) stores the initial boot program and only allows for reading of its permanent contents that are retained without power. Common types of RAM include SRAM and DRAM, while ROM types include PROM, EPROM, and EEPROM.
The document discusses the components of a computer system unit. It describes the internal power supply, exhaust fan, speaker, motherboard, chipset, microprocessor, clock chip, RAM, ROM, bus, ports, and expansion slots. The system unit contains all the essential parts needed to run a computer and allows the various components to communicate with each other to perform processing and other functions. It is the central component that houses the primary internal parts of a computer and allows it to function.
This document outlines a module on diagnosing and troubleshooting computer systems. The module will cover four major topics: planning diagnosis of computer errors, diagnosing and configuring systems and networks, inspecting and testing configured systems and networks, and testing systems and networks. It will involve 60 hours of instruction and focus on developing skills outlined in national standards for independently diagnosing and troubleshooting computer systems. The document also includes a pre-diagnostic assessment to evaluate learners' existing knowledge on various tasks involved in the module.
This document discusses diagnosing and troubleshooting computer systems errors. It provides tips for avoiding common startup problems, including checking hardware settings and cables. Basic troubleshooting steps are outlined, such as using trial and error to check components, examining the event viewer for error messages, and taking notes on problems and solutions. Common computer problems and solutions are then detailed, including checking the POST display, load time, graphics, performing an audio test, and examining newly installed hardware or software for issues.
The document provides step-by-step instructions for installing the Windows XP operating system on a computer. It lists the minimum system requirements for Windows XP as a Pentium 233MHz processor, 64MB of RAM, 4.3GB of hard disk space, a CD-ROM drive, and a VGA or higher resolution monitor. The installation process involves inserting the Windows XP CD, selecting an installation partition on the hard drive to install Windows to, formatting and copying system files, and completing post-installation configuration steps like setting the time/date, network settings, and activating Windows.
The document discusses the boot sequence of a computer system. It examines each step including the PROM monitor, boot block, secondary boot loader, the OS kernel, and start-up scripts. The administrator should understand this boot process as well as how to modify the boot sequence, select alternate devices, and properly shut down the system.
The document discusses the boot sequence of a computer system. It examines each step including the PROM monitor, boot block, secondary boot loader, and OS kernel initialization. It also covers modifying the boot process, selecting alternate boot devices, different boot loaders, and proper system shutdown procedures.
1. A motherboard integrates all the hardware components and allows them to communicate through traces on its circuit boards.
2. Motherboards are classified by their form factor, chipset, and whether components are built-in or require expansion cards.
3. When a computer is turned on, the BIOS provides basic instructions to detect hardware and find an operating system to boot from.
The document provides information about the boot process on Linux systems from BIOS to kernel loading. It discusses:
- The boot sequence from BIOS performing self-test to loading the master boot record from the boot drive, then the boot loader (LILO or GRUB), and finally the kernel.
- How LILO and GRUB allow selecting operating systems and passing options to the kernel like the root filesystem.
- Common boot loader characteristics and how GRUB uses device names differently than Linux.
- How to recover from a failed boot by booting from removable media and reinstalling LILO or GRUB in the master boot record.
- Common kernel parameters and where to
marlenis del carmen duarte gonzalez tegnologioamarlenisdrt
This document provides a step-by-step guide to installing and securing the Tru64 UNIX operating system version 5.1A. It outlines pre-installation tasks such as backing up existing systems and checking for security advisories. It then details the installation process including upgrading firmware, configuring the processor, and beginning the OS installation using a graphical user interface. The guide aims to install just the base operating system and later add optional software to secure the system before connecting it to the network.
1. What is the value of requiring the OS to provide status informati.pdfudit652068
1. What is the value of requiring the OS to provide status information?
2. What is the difference between a true layered structure and the way that MS-DOS
used layering?
3. Why is an operating system thought to be a \"mandatory middleman\"?
§ be able to explain the services and value of this
4. What is a virtual machine and why is it necessary?
§ How does it work (i.e., be able to discuss and/or draw a VM structure in a
computer system)
5. Why is debugging a concern for an OS?
§ How can it be accomplished?
6. Why is a bootstrap loader needed?
Solution
Ans 1. In context switching among process before a process switched we have to store
PCB(Process control Block) by the Operating System.It consists of Process State,Program
Counter,Values of Registers,CPU Sheduling Information,Memeory Management
Information,Accounting Information and IO Status Information.
Value of Status Information is such as How much devices are allocated /occupied,Open File
Tables information etc.
Ans.2
In MS-DOS
Application Program -> Resident system Program->MS-DOS Device Drivers-
>ROM-BIOS Device Drivers
This architecture is applied. There is no well-structured architecture is defined. There is no
CPU Execution Mode (Kernel and User) So if there is error whole system is crashed.
In case of Layered approach it follows modular approach. OS is broken into the layer Bottom
Layer which is hardware and Top Layer is User. Its main advantage is simplicity of construction
and debugging. If error is found at any layer it remains same on that layer system does not crash.
Ans 3.
Operating system work as a middleman between a user and computer hardware.Its main
objective to make system convenient to use and utilitze computer hardware in efficient
manner.Variuos types of OS are there such as-INIX,MS-DOS,Windows-98/XP/Vista,Windows-
NT/2000,OS/2 and Mac OS.
It provides its service to user as well as Programs too:
To Program it provide environment to exceute .
To user provide platform to execute the program.
These are following services provided by OS:-
6.) Error Detection-
Ans 4:
Virtual Machine- It is based on computer architecture, it is an emulation of a computer system.It
also provides the functionality of physical computer Too.
It is of following type like:-
Advantage Of Virtual Machine:-
Architecture:-
Guest Operating System and Application
|
Virtual Machine
|
Virtual Server 2005
|
Windows Server 2003(Host OS)
|
Physical Computer
Ans.5
Debugging is a concern for an OS.As it made up of multi layered architecture so it is easier to
find at which layer error is prone .There is two mode for debugging User Mode and Kernal
Mode.Kernal mode debugging is very hard. Because we can not rely on crashing machine to
communicate that what happened.
There are four methods of debugging an operating system:-
Sanity Checks
Debugger
Deterministic Reply
Moving Everything to User Space
Ans 6.)Bootstrap Loader:- It is a program that is required to loads an operating system after
completion on power-on .
The operating system acts as an intermediary between the user and computer hardware. Its primary goals are to execute user programs, coordinate access to physical resources like the CPU and memory, and make the computer system convenient to use. The operating system controls and coordinates hardware use among applications and users. It manages resources like CPU time and memory allocation to ensure efficient and fair use between processes. The operating system also protects the system through dual-mode operation separating user programs from kernel programs.
Amr Chap 08 Operating Systems & Utility Programssharing notes123
System software consists of operating systems and utility programs. Operating systems control computer hardware resources and are divided into stand-alone, server, and embedded categories. The boot process starts when a computer powers on, involving the BIOS performing POST to check components, then the operating system loads files and the desktop. Utility programs allow maintenance tasks like file management, uninstalling programs, and backing up files.
Configuring startup and troubleshooting startup issueselboob2025
The document discusses configuring startup settings and troubleshooting startup issues in Windows 7. It describes the normal startup sequence, including the POST, initial startup, Windows Boot Manager, Windows Boot Loader, kernel loading, and logon phases. It also covers important startup files, how to configure startup settings using tools like the Startup and Recovery dialog box and System Configuration tool, and how to use built-in diagnostics like Reliability Monitor, Event Viewer, and Windows Memory Diagnostics to troubleshoot issues.
This document discusses principles of computer input/output (I/O) hardware and software. It covers topics like I/O devices, device controllers, buses, I/O techniques (programmed I/O, interrupt-driven I/O, and direct memory access), device drivers, layers of I/O software, file systems, and storage devices like disks. The document provides details on how operating systems manage and interface with various I/O components to facilitate data transfer and storage.
This document discusses bootloaders for embedded systems. It defines a bootloader as the first code executed after a system powers on or resets that is responsible for loading the operating system kernel. The document then describes the tasks of a bootloader like initializing hardware, loading binaries from storage, and providing a shell. It outlines the booting process differences between desktops and embedded systems. Finally, it focuses on the universal bootloader U-Boot, describing its directory structure, configuration, building process, and commands.
The document provides information about various Windows tools and computer networks. It begins by explaining how to access system tools in Windows XP, including Security Center, Disk Defragmenter, Character Map, Disk Cleanup, and System Restore. Instructions are provided for how to use each tool. It then discusses computer networks, listing the necessary hardware components and how they are connected. It also covers network software settings like naming computers and configuring IP addresses. Basic DOS commands like ping and ipconfig are demonstrated. Finally, potential issues like a slow computer and Windows Genuine Advantage notifications are described along with solutions.
Positive Hack Days. Pavlov. Network Infrastructure Security AssessmentPositive Hack Days
A participant will acquire basic skills of searching for vulnerabilities on switches and routers from various vendors. The masterclass will cover both common network vulnerabilities, and exceptive cases that can be detected in the process of security assessment of real networks.
Code4vn - Linux day - linux boot processCường Nguyễn
The Linux boot process begins with the BIOS initializing hardware and loading the boot loader from the master boot record. The boot loader then loads the GRUB boot loader which displays a menu to select the operating system. GRUB loads the Linux kernel which initializes hardware and loads drivers. The kernel then executes the init program as the parent of all processes. Init runs scripts to start essential services and enters the selected runlevel, where getty processes provide login prompts and spawn user shells.
HKG18-TR14 - Postmortem Debugging with CoresightLinaro
Session ID: HKG18-TR14
Session Name: HKG18-TR14 - Postmortem Debugging with Coresight
Speaker: Leo Yan
Track: Training
★ Session Summary ★
For most cases we can easily debug with kernel's oops dumping info, but sometimes we need to know more information for program execution flow before the issue happens. So we can rely on two tracing methods to reproduce the program execution flow, one method is using software tracing which is kernel's pstore method; another method is to rely on Coresight hardware tracing, this method also can avoid extra workload introduced by tracing itself. Coresight has provided two mechanisms for Postmortem debugging, one method is Coresight CPU debug module so we can extract CPU program counter info, this is quite straightforward to debug CPU lockup issue; Another is Coresight panic kdump, we connect kernel kdump mechanism to extract Coresight tracing data so we can reproduce the last execution flow before panic (even hang issue with some tweaking in kernel). This session wants to go through these topics and demonstrate the debugging tools on 96boards Hikey in 25 minutes session.
---------------------------------------------------
★ Resources ★
Event Page: http://connect.linaro.org/resource/hkg18/hkg18-tr14/
Presentation: http://connect.linaro.org.s3.amazonaws.com/hkg18/presentations/hkg18-tr14.pdf
Video: http://connect.linaro.org.s3.amazonaws.com/hkg18/videos/hkg18-tr14.mp4
---------------------------------------------------
★ Event Details ★
Linaro Connect Hong Kong 2018 (HKG18)
19-23 March 2018
Regal Airport Hotel Hong Kong
---------------------------------------------------
Keyword: Training
'http://www.linaro.org'
'http://connect.linaro.org'
---------------------------------------------------
Follow us on Social Media
https://www.facebook.com/LinaroOrg
https://www.youtube.com/user/linaroorg?sub_confirmation=1
https://www.linkedin.com/company/1026961
Case study on chrome os in detail.History, architecture,processskb212733
The document describes the architecture and design of the Chrome OS firmware. It discusses how the firmware is implemented to achieve fast and secure booting. The firmware removes unnecessary components to speed up booting and implements system recovery, verified boot, and fast boot functionality. It also details the key structures and data flows in the firmware, including the firmware map, boot process, and how verification extends from the kernel upward through each stage of booting.
This document discusses processes in Linux. It defines a process as a running instance of a program in memory that is allocated space for variables and instructions. All processes are descended from the systemd process. It describes process states like running, sleeping, stopped, and zombie. It also discusses process monitoring and management tools like top, ps, kill, and setting process priorities with nice and renice. Examples are provided on using ps to view specific processes by user, name, ID, parent ID, and customize the output.
The document discusses how to install, configure and uninstall Linux operating systems, covering topics such as partitioning disks, installing software packages, setting up user accounts, basic and advanced command line instructions, and configuring hardware settings during the Linux installation process. It also provides instructions for removing Linux from a system by overwriting the master boot record with zeros using DD or DEBUG commands to restore the hard drive to a virgin state.
This summary provides the high-level information about basic file commands and networking commands:
Basic file commands include cat, more, head, tail, diff, sort, uniq, wc to display, compare, and analyze file contents. Networking commands allow connecting to remote systems like telnet, ftp, ssh and checking processes with ps, prstat. Shell commands set environment and launch jobs in foreground/background.
HP OpenView Operations (HP OV) is a flexible monitoring software that helps system administrators detect and solve problems in networks, systems, and applications. It can be configured to meet the needs of any IT organization. System administrators can expand its capabilities by integrating third-party management applications. OV collects data from managed nodes and uses this to generate messages about events. It can then initiate automatic or manual actions to address problems.
This document provides a cheat sheet for common Windows command line commands and tools such as reg, wmic, tasklist, netstat, and netsh. It summarizes how to use these tools to view and manage processes, services, the registry, network configuration and connections. Specific examples are given for tasks like adding registry keys, querying process and service information, searching for files, and installing packages on Windows Vista.
The document discusses Manager of Manager (MoM) architectures for providing enterprise-wide situational awareness. A MoM architecture allows integrating data from multiple legacy and new systems through a single interface without replacing hardware or software. This provides operators with end-to-end monitoring and control of the entire enterprise. The document provides examples of MoM implementations and outlines guidelines for selecting MoM components, including supporting a wide variety of hardware, customizable interfaces, and open interfaces for integration.
HP OpenView Network Node Manager is a network management tool that provides proactive network management. It dynamically maps out and monitors a network, collecting critical device information using SNMP. NNM maintains a relational database and provides reports. It automatically discovers and maps devices on the network, and can monitor large networks using distributed collection stations. NNM allows multiple operators to simultaneously monitor the network and helps achieve technical goals like reduced downtime and performance monitoring as well as business goals like accounting and security management.
This document provides instructions for various system administration tasks on Sun Solaris systems, including:
- Installing and configuring NFS, DNS, FTP, and other network services.
- Configuring devices like SCSI disks, modems, and tape drives.
- Performing backups, installing software packages, and viewing system information.
- Troubleshooting tips, monitoring performance, and debugging syslog.
It covers topics ranging from low-level kernel configuration to high-level network administration. The document serves as a reference guide for Solaris system administrators to complete common system management and maintenance activities.
Unicenter NSM is a comprehensive management solution that allows users to discover, monitor, and analyze infrastructure elements through a centralized database and graphical interface. It includes agents to monitor different platforms, and components for event management, systems performance monitoring, discovery, and notification. Unicenter NSM provides integrated management of an enterprise infrastructure through visualization tools, a centralized database, manager applications, and monitoring agents.
The document describes the system configuration of an HP RISC server running HP-UX 11i with an Oracle 10g database. It is managed using HP OVO 8.10 and HP NNM 7.5, with 16 licenses for OVO and 1000 licenses for NNM. The document provides instructions for installing tools and agents, enabling communication protocols, adding managed nodes, and monitoring applications and system processes on the nodes.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Boot prom basics
1. Basic Concepts
1. Machine : A hardware device is called as Machine.
2. Host : If we assign any address to a machine to identify it, is called Host.
3. Client : A Host PC which is not able to do the job and sending the request to
some other PC in network to process the job.
4. Server : A PC which is processing the client's request is called "server".
5. Work Station : A Host PC which is able to perform every job by itself.
6. Process : A foreground process which is running on the system is called process.
7. Daemon : It is a background process.
8. Multitasking : Which allow you to perform a multiple task in a single system.
9. Multi User : Multiple users should be able to login to a single system.
10. Distributed system: A group of systems integrated (or interconnected) to perform a job.
11. False Tolerance : A distributed system which, if any one the system is crashed then also if your
able to perform the job successfully is called "False Tolerance".
12. Spanning: If your able to write the data in the multiple disk alternately, simultaneously or
sequentially is called Spanning.
13. Kernel : Communication between Hardware device & user. Kernel nothing but a basic
device driver.
14. Shell : It acts as a interface between the kernel & user.
Few important commands
1. # last: It will give all the information regarding booting, when you shutdown, logged in with time.
2. /etc/ntmp: This file contains record of current logged in user
3. /var/adm/wtmp: it contains record of all logins & log outs for each user
4. /var/adm/lastlog: This file contains the list of the last login records for each user.
Security Administration
Security Administration:
1. /etc/default/passwd
2. /etc/default/login
3. /etc/default/su
4. /etc/nologin
5. /var/adm/loginlog
6. /etc/skel
1
2. To break a password
How to break a pass word
1. Insert the Solaris OS CD
2. Ok setenv boot-device cdrom
3. Ok boot cdrom -s // single user (or) maintainance mode
4. # TERM = ansi
# export TERM // RAM to kernel
# mkdir /tmp/root/abc
# mount /dev/dsk/c0t0d0s0 /tmp/root/abc
# vi /tmp/root/abc/etc/shadow
/root/xxxxxxxxxxxxxx/pwd
now remove the 13 encoded characters, save & exit
now restart
# init 6
# ok setenv boot-device disk
# ok boot disk
2
3. Boot PROM Basics
Boot PROM (programmable read only memory):
It is a firmware (also known as the monitor program) provides:
1. basic hardware testing & initialization before booting.
2. contains a user interface that provide access to many important
functions.
3. Enables the system to boot from wide range of devices.
It controls the system operation before the kernel becomes
available. It provides a user interface and firmware utility
commands known as FORTH command set. These commands include the
boot commands, the diagnostic commands & the commands for modifying
the default configuration.
Command to determine the version of the Open Boot PROM on the
system:# /usr/platform/'uname -m'/sbin/prtdiag -v
(output omitted)
System PROM revisions:
----------------------
OBP 4.16.4 2004/12/18 05:21 Sun Blade 1500 (Silver)
OBDIAG 4.16.4.2004/12/18 05:21
# prtconf -v
OBP 4.16.4 2004/12/18 05:21
Open Boot Architectures Standards:
It is based on IEEE standard #1275, according to which the open
boot architecture should provide capabilities of several system
tasks including:
1. Testing and initializing system hardware
2. Determining the system's hardware configuration
3. Enabling the use of third-party devices booting the OS
4. Providing an interactive interface for configuration, testing
and debugging
Boot PROM chip:
It is available in Sun SPARC system.
It is located on the same board as the CPU.
FPROM(Flash PROM):
It is a re-programmable boot PROM used by Ultra workstations.
It enables to load new boot program data into PROM using software.
System configuration Information:
Each Sun system has another important element known as System
Configuration Information.
This information includes the Ethernet or MAC address, the system
host identification number (ID), and the user configurable
parameters.
3
4. The user configurable parameters in System Information is called
NVRAM (Non-Volatile Random Access) Variables or EEPROM
(Electronically Erasable PROM) parameters.
Using these parameters we can Control:
1. POST (Power on self Test)
2. Specify the default boot device
3. Perform other configuration settings
Note: Depending on the system these system configuration
information is stored in NVRAM chip, a SEEPROM(Serially
Electronically Erasable PROM) or a System Configuration Card(SCC).
The older systems used NVRAM chip which is located on the main
system board and is removable. It contains Lithium Battery to
provide the battery backup for configuration information. The
battery also provides the system's time of day(TOD) function.
New systems uses a non-removable SEEPROM chip to store the system
configuration information. The chip is located on the main board
and doesn't requires battery.
In addition to NVRAM and SEEPROM chip, some systems uses a
removable SCC(System Configuration Card) to store system
configuration information. An SCC is inserted into the SCC reader.
Working of Boot PROM Firmware:
The Boot PROM firmware booting proceeds in following stages:
1. When a system is turned on, It initiates low-level POST. The low
level post code is stored in system's boot PROM. The POST code
tests the most elementary functions of the system.
2. After the low level post completes successfully, the Boot PROM
firmware takes control. It probes memory and CPU.
3. Next, Boot PROM probes bus devices and interprets their drivers
to build a device tree.
4. After the device tree is built, the boot PROM firmware installs
the console.
5. The Boot PROM displays the banner once the system initialization
is complete.
Note: The system determines how to Boot the the OS by checking the
parameter stored in the Boot PROM and NVRAM.
Stop key sequences:
It can be used to enable various diagnostics mode. The Stop Key
sequences affect the OpenBoot PROM and help to define how POST runs
when the system is powered on.
Using Stop Key Sequences:
When the system is powered on use :
1. STOP+D to switch the boot PROM to the diagnostic mode. In this
4
5. mode the variable "diag-switch?" is set true.
2. STOP+N to set NVRAM parameters to the default value. You can
release the key when the LED starts flashing on the key board.
Abort Sequences:
STOP+A puts the system into command entry mode for the Open Boot
PROM & interrupts any running program. When the OK prompt is
displayed, the system is ready to accept Open Boot PROM commands.
Disabling the Abort Sequences:
1. Edit /etc/default/kbd and comment out the statement
"KEYBOARD_ABORT=disable".
2. Run the command: #kbd -i
once the abort sequence is disabled, it can only be used during the
boot process.
Commonly used Open Boot Prompt (OBP) commands
ok>banner: It displays the system information such as the model
name, the boot PROM version, the memory, the Ethernet addresses,
and the host identification number (ID).
ok>boot: It is used to boot the system
It can be used with following options:
-s : for single user mode. Here only root user is allowed to log
in.
cdrom -s : for booting into single user mode using cdrom
-a: To boot the system in interactive mode
-r: To perform reconfiguration boot. This is used to detect and
create entry for a newly attached device.
-v: To display the detailed information on the console during the
boot process.
ok>help: It is used to list the main help categories of Open Boot
firmware. the help command can be used with specific keyword to get
the corresponding help. For example:
ok> help boot
ok> help diag
ok>printenv: To display the all the NVRAM parameters. This command
displays the default and current values of parameter. It can be
used with single parameters to display the corresponding value.
e.g. printenv auto-boot? : This command displays the value of auto-
boot variable.
e.g. printenv oem-banner? : This command displays the status of
variable oem-banner.
e.g. printenv oem-banner : This command displays customized OEM
banner information.
e.g. printenv oem-logo? : This displays the status of the variable
oem-logo.
e.g. printenv oem-logo : This displays the oem-logo.
e.g. printenv boot-device : It displays the default boot
device.setenv : It is use to assign the value to the environment
variable.
e.g. setenv auto-boot? false : This command sets the value of
5
6. variable auto-boot to false.
e.g. setenv oem-banner? true : This command sets the value of
variable oem-banner to true. By default its value is false.
e.g. setenv oem-banner <customized message> : This command sets the
customized message for the OEM banner.
e.g. setenv oem-log? true : It sets value of oem-logo? to
true/false.
e.g. setenv oem-logo <logo name> : It sets customized logo name.
e.g. setenv boot-device cdrom/disk/net : It sets the default boot
device. Emergency Open
ok>setenv: It is used for setting NVRAM parameters.
e.g. setenv autoboot? false: This command sets the autoboot?
parameter to false.
ok>reset-all: It functions similar to power cycle, and rclears all
buffers & registers, and execute a powered off/power on command.
ok>set-defaults: It is used to reset all parameter values to
factory defalut. To restore a particular parameter to its default
setting use set-default command followed by parameter name.
e.g. set-default auto-boot?
Note: The set-default command can only be used with those
parameters for which the default value is defined.
The probe commands are used to display all the peripheral devices
connected to the system.
ok> probe-ide : It displays all the disks & CD-ROMS attached to the
on-board IDE Controller.
ok> probe-scsi : It displays all peripheral devices connected to
the primary on-board SCSI controller.
ok> probe-scsi-all : It displays all peripheral devices connected
to the primary on-board SCSI controller & additional SBUS or PCI
SCSI controllers.
ok>sifting <OpenBoot PROM command>: Shifting command with an
OpenBoot PROM command as an parameter displays the the syntax of
OpenBoot PROM command.
ok>.registers: It displays the content of the OBP registers.
To ensure the system is not hung when probe command is used :
1. set the parameter auto-boot? to false.
ok> setenv auto-boot? false
2.Use reset-all command to clear all the buffers & registers.
3. Confirm all the values of OBP registers are set to zero using
.registers command.
Now we are ready to use any probe command without any problem.
ok>.speed: It displays the speed of the processor.
ok>.enet-addr: It displays the MAC address of the NIC
ok>.version: It displays the release and version information of
PROM chip.
6
7. ok> show-disks: It displays all the connected disks/CD-ROM
ok> page : To clear the screen
ok> watch-net: It displays the NIC status.ok> test-all : It is
nothing but performing POST i.e. self testing all the connected
devices.
ok>sync: It manually attempts to flush memory and synchronize the
file system.
ok>test: It is used to perform self test on the device specified.
Device Tree:
It is used to organize the devices attached to the system.
It is built by the OpenBoot Firmware by using the information
collected at the POST.
Node of the device tree:
1. The top most node of the device tree is the root device node.
2. Bus nexus node follows the root device node.
3. A leaf node(acts as a controller for the an attached device) is
connected to the bus nexus node.
Examples:
1. The disk device path of an Ultra workstation with a PCI IDE Bus:
/pci@1f,0/pci@,1/ide@3/dad@0,0
/ -> Root device
pci@1f,0/pci@,1/ide@3 -> Bus devices & controllers
dad@ -> Device type(IDE disk)
0 -> IDE Target address
0 -> Disk number (LUN logical Unit Number)
2. The disk device path of an Ultra workstation with a PCI SCSI
Bus:
/pci@1f,0/pci@,1/SUNW,isptwo@4/sd@3,0
/ -> Root device
pci@1f,0/pci@,1/SUNW,isptwo@4 -> Bus devices & controllers
sd -> Device type(SCSI Device)
3 -> SCSI Target address
0 -> Disk number (LUN logical Unit Number)
ok> show-devs: Displays the list of all the devices in the OpenBoot
device tree.
ok>devalias: It is used to display the list of defined device
aliases on a system.
Device aliases provides shot names for longer physical device
paths. The alias names are stored under NVRAMRC(contains registes
to store the parameters). It is part of NVRAM.
Creating an alias name for device in Solaris
1. Use the show-disks command to list all the disks connected.
Select and copy the location of the disk for which the alias need
to be created. The partial path provided in show-disks command is
7
8. completed by entering right targer & disk values.
2. Use the following command to create the alias :
nvalias <alias name> <physical path>
The physical path is the location copied in step 1. The alias name
can be anything of user choice.
ok> devalias boot-device : It displays current boot devices alias
for the system.
ok> nvunalias <alias name>: It removes device alias name.
The /usr/sbin/eeprom command:
It is used to display & change the NVRAM parameters while Solaris
OS is running.
Note: It can be only used by root user.
e.g. #eeprom -> list all the NVRAM parameters.
e.g. #eeprom boot-device -> It lists the value of parameter boot-
device
e.g. #eeprom boot-device=disk2 -> Changes the boot-device parameter
e.g. #eeprom auto-boot?=true -> Sets the parameter auto-boot?
parameter to true
e.g. #eeprom auto-boot? -> It lists the value of auto-boot?
parameter
Interrupting an Unresponsive System:
1. Kill the unresponsive process & then try to reboot unresponsive
system gracefully.
2. If the above step fails, press STOP+A.
3. use sync command at Open Boot prompt. This command creates panic
situation in the system & synchronizes the file systems.
Additionally, it creates a crash dump of memory and reboots system.
GRUB (Grand Unified Loader for x86 systems only):
1. It loads the boot archive(contains kernel modules
& configuration files) into the system's memory.
2. It has been implemented on x86 systems that are running the
Solaris OS.
Some Important Terms:
1. Boot Archive: Collection of important system file required to
boot the Solaris OS. The system maintains two boot archive:
2. Primary boot archive: It is used to boot Solaris OS on a system.
3. Secondary boot archive: Failsafe Archive is used for system
recovery in case of failure of primary boot archive. It is referred
as Solaris failsafe in the GRUB menu.
4. Boot loader: First software program executed after the system is
powered on.
5. GRUB edit Menu: Submenu of the GRUB menu.
Additional GRUB Terms:
1. GRUB main menu: It lists the OS installed on a system.
menu.lst file: It contains the OS installed on the system. The OS
8
9. displayed on the GRUB main menu is determined by menu.lst file.
2. Miniroot: It is a minimal bootable root(/) file system that is
present on the Solaris installation media. It is also used as
failsafe boot archive.
GRUB-Based Booting:
1. Power on system.
2. The BIOS intializes the CPU, the memory & the platform hardware.
3. BIOS loads the boot loader from the configured boot device. The
BIOS then gives the control of system to the boot loader.
The GRUB implementation on x86 systems in the Solaris OS is
compliant with the multiboot specification. This enables to :
1. Boot x86 systems with GRUB.
2. individually boot different OS from GRUB.
Installing OS instances:
1. The GRUB main menu is based on a configuration file.
2. The GRUB menu is automatically updated if you install or upgrade
the Solaris OS.
3. If another OS is installed, the /boot/grub/menu.lst need to be
modified.
GRUB Main Menu:
It can be used to :
1. Select a boot entry.
2. modify a boot entry.
3. load an OS kernel from the command line.
Editing the GRUB Main menu:
1. Highlight a boot entry in GRUB Main menu.
2. Press 'e' to display the GRUB edit menu.
3. Select a boot entry and press 'c'.
Working of GRUB-Based Booting:
1. When a system is booted, GRUB loads the primary boot archive &
multiboot program. The primary boot archive, called
/platform/i86pc/boot_archive, is a RAM image of the file system
that contains the Solaris kernel modules & data.
2. The GRUB transfers the primary boot archive and the multiboot
program to the memory without any interpretations.
3. System Control is transferred to the multiboot program. In this
situation, GRUB is inactive & system memory is restored.
The multiboot program is now responsible for assembling core kernel
modules into memory by reading the boot archive modules and passing
boot-related information to the kernel.
GRUB device naming conventions:
(fd0), (fd1) : First diskete, second diskette
(nd): Network device
(hd0,0),(hd0,1): First & second fdisk partition of the first bios
disk
(hd0,0,a),(hd0,0,b): SOLARIS/BSD slice 0 & 1 (a & b) on the first
fdisk partition on the first bios disk.
9
10. Functional Component of GRUB:
It has three functional components:
1. stage 1: It is installed on first sector of SOLARIS fdisk
partition
2. stage 2: It is installed in a reserved areal in SOLARIS fdisk
partition. It is the core image of GRUB.
3. menu.lst: It is a file located in /boot/grub directory. It is
read by GRUB stage2 functional component.
The GRUB Menu
1. It contains the list of all OS instances installed on the
system.
2. It contains important boot directives.
3. It requires modification of the active GRUB menu.lst file for
any change in its menu options.
Locating the GRUB Menu:
#bootadm list-menu
The location for the active GRUB menus is : /boot/grub/menu.lst
Edit the menu.lst file to add new OS entries & GRUB console
redirection information.
Edit the menu.lst file to modify system behavior.
GRUB Main Menu Entries:
On installing the Solaris OS, by default two GRUB menu entries are
installed on the system:
1. Solaris OS entry: It is used to boot Solaris OS on a system.
2. miniroot(failsafe) archieve: Failsafe Archive is used for system
recovery in case of failure of primary boot archive. It is referred
as Solaris failsafe in the GRUB menu.
Modifying menu.lst:
When the system boots, the GRUb menu is displayed for a specific
period of time. If the user do not select during this period, the
system boots automatically using the default boot entry.
The timeout value in the menu.lst file:
1. determines if the system will boot automatically
2. prevents the system from booting automatically if the value
specified as -1.
Modifying X86 System Boot Behavior
1. eeprom command: It assigsn a different value to a standard set
of properties. These values are equivalent to the SPARC OpenBoot
PROM NVRAM variables and are saved in /boot/solaris/bootenv.rc
2. kernel command: It is used to modify the boot behavior of a
system.
3. GRUB menu.lst:
Note:
1.The kernel command settings override the changes done by using
the eeprom command. However, these changes are only effective until
you boot the system again.
2. GRUB menu.lst is not preferred option because entries in
10
11. menu.lst file can be modified during a software upgrade & changes
made are lost.
Verifying the kernel in use:
After specifying the kernel to boot using the eeprom or kernel
commands, verify the kernel in use by following command:
#prtconf -v | grep /platform/i86pc/kernel
GRUB Boot Archives
The GRUB menu in Solaris OS uses two boot archive:
1. Primary boot archive: It shadows a root(/) file system. It
contains all the kernel modules, driver.conf files & some
configuration files. All these configuration files are placed in
/etc directory. Before mounting the root file system the kernel
reads the files from the boot archive. After the root file system
is mounted, the kernel removes the boot archive from the memory.
2. failsafe boot archieve: It is self-sufficient and can boot
without user intervention. It does not require any maintenance. By
default, the failsafe boot archive is created during installation
and stored in /boot/x86.minor-safe.
Default Location of primary boot archive:
/platform/i86pc/boot_archive
Managing the primary boot archive:
The boot archive :
1. needs to be rebuilt, whenever any file in the boot archive is
modified.
2. Should be build on system reboot.
3. Can be built using bootadm command
#bootadm update-archive -f -R /a
Options of the bootadm command:
-f: forces the boot archive to be updated
-R: enables to provide an alternative root where the boot archive
is located.
-n: enables to check the archive content in an update-archive
operation, without updating the content.
The boot archive can be rebuild by booting the system using the
failsafe archive.
Booting a system in GRUB-Based boot environment:
Booting a System to Run Level 3(Multiuser Level):
To boot a system functioning at run level 0 to 3:
1. reboot the system.
2. press the Enter key when the GRUB menu appears.
3. log in as the root & verify that the system is running at run
level 3 using :
#who -r
Booting a system to run level S (Single-User level):
1. reboot the system
2. type e at the GRUB menu prompt.
11
12. 3. from the command list select the "kernel
/platform/i86pc/multiboot" boot entry and type e to edit the entry.
4. add a space and -s option at the end of the "kernel
/platform/i86pc/multiboot -s" to boot at run level S.
5. Press enter to return the control to the GRUB Main Menu.
6. Type b to boot the system to single user level.
7. Verify the system is running at run level S:
#who -r
8. Bring the system back to muliuser state by using the Ctrl+D key
combination.
Booting a system interactively:
1. reboot the system
2. type e at the GRUB menu prompt.
3. from the command list select the "kernel
/platform/i86pc/multiboot" boot entry and type e to edit the entry.
4. add a space and -a option at the end of the "kernel
/platform/i86pc/multiboot -a" .
5. Press enter to return the control to the GRUB Main Menu.
6. Type b to boot the system interactively.
Stopping an X86 system:
1. init 0
2. init 6
3. Use reset button or power button.
Booting the failsafe archive for recovery purpose:
1. reboot the system.
2. Press space bar while while GRUB menu is displayed.
3. Select Solaris failsafe entry and press b.
4. Type y to automatically update an out-of-date boot archive.
5. Select the OS instance on which the read write mount can happen.
6. Type y to mount the selected OS instance on /a.
7. Update the primary archive using following command:
#bootadm update-archive -f -R /a
8. Change directory to root(/): #cd /
9. Reboot the system.
Interrupting an unresponsive system
1. Kill the offending process.
2. Try rebooting system gracefully.
3. Reboot the system by holding down the ctrl+alt+del key sequence
on the keyboard.
4. Press the reset button.
5. Power off the system & then power it back on.
12
13. NIS (Network Information Systems)
NIS: Centralizing the users, passwords, hosts & networks.
Issue 1: How to update the newly added users (or mapping information)
A: cd var/yp/usr/ccs/bin/make
Issue 2: When NIS user unable to login?
A: simply I check out the user, pwds
Issue 3: disable the NIS services?
A: simply start and stop the services which are related to NIS (or)
Simply update the maps.
NOTE: In my organization LDAP configuration used so very less to get the problems
- NIS information stored in ‘nis maps’
- All maps located in ‘/var/yp/domain name’ file
- Configure the maps on server
#ypint -m
File system checking
#fsck : Due to improper shutdown of the systems some times the file system gets corrupted and to
check the corrupted file system, we can use utility called "fsck" (file system checking).
• It always in raw format (rdsk)
• It is always run on unmounted file system.
• It refers "/etc/vfstab" file to check in what way the file system check has to be done. i.e. either
sequential or parallely.
Options of "fsck":
1. # fsck -m: This is to check the inconsistency of a file system.
2. # fsck -y: This option used to check and repair the inconsistency of file system.
Note: Before running "fsck" ensure that file system is permanent (i.e. in vfstab), the entry should be
in "/etc/vfstab".
File system configuration:
# df -h
# umountall
# df -h
# vi /etc/vfstab
To check the inconsistency of the file system:
# fsck -m /dev/rdsk/c0t0d0s4
// yes, it is good, ok
To corrupt the file system:
# dd if=/dev/zero of=/dev/rdsk/c0t0d0s4 bs=512 count=32
# fsck -m /dev/rdsk/c0t0d0s4
//now its corrupted
13
14. To repair file system:
# fsck -F ufs -y -o b=32 /dev/rdsk/c0t0d0s4
File checking is done in two way
1. Sequentially
2. Parellely
6 phases:
1. phase 1= check blocks & sizes
2. phase 2=check path names
3. phase 3a=check connectivity
4. phase 3b=verify shadows/ACLs
5. phase 4=check reference counts
6. phase 5=check cylinder groups
http://mysolariss.blogspot.in/
UFS Architecture
UFS (Unix File System) Architecture:
1. Volume Table of Content (VTOC):
• It always resides in the sector '0'.
• Its capacity is 512 bytes
• It contains the information about
i. Disk Label
ii. No. of assigned slices
iii. Amount of space allocated for slice
2. Primary Boot Block (PRB):
This boot block contains the boot strap program which is nothing but a bootable file and It always
resides to a sector 1 to 15.
3. Secondary Boot Blocks (SBB):
As primary boot block contains the important data, so it's backup has to be maintained. Hence
secondary boot block is used, secondary boot block contains the entire information of PBB.
4. INODE:
If you want to create an file we should definitely have an "INODE" number, where INODE block
limit of the type of file, the size of file when it is created, when it was modified and the file
permissions and it resides from sector 32.
14