The document discusses network operating systems and provides an overview of UNIX/Linux operating systems. It covers the history and development of UNIX, differences between UNIX variants like FreeBSD and Linux, and components of operating systems like processes, memory management, and file systems. It also gives examples of process information using the ps command.
This document contains questions about various aspects of information and communication technology including definitions of units of measurement for digital storage, examples of hardware, software, operating systems, and other computer components and applications. It asks the reader to identify examples that represent different categories and provides multiple choice answers to test their knowledge of key computer science terms and concepts.
IRJET - Development of Embedded Linux System from Bare BoardIRJET Journal
The document describes how to develop an embedded Linux system from a bare board. Specifically, it discusses formatting an SD card and partitioning it into sections for the boot loader, operating system image, and root file system. It then explains downloading a NOOBs zip file to extract the image file and etch it to the memory card partitions. Once the system software is on the memory card, inserting it into the UDOO NEO board allows it to boot up with the Linux operating system.
this is a power point presentation on the topic INFORMATION TECHNOLOGY . In this presentation there are basics of IT , INFORMATION AND PROCESSING TOOLS , DEFINITION OF IT , IT APPLICATION , SOCIETAL IMPACTS OF IT. By this presentation you will know that what actually is IT.
This document provides an overview of computing for engineering. It discusses the history of computers from early mechanical devices to modern electronic computers. It also covers the characteristics, components, and classification of computers. The four main generations of computers are described based on the technology used. The components of a computer system include hardware, software, and humanware. Hardware consists of the central processing unit and various input/output and storage devices. Software includes operating systems, applications, and programming languages.
The document provides information about organizing an ESDP (Enterprise Skill Development Program) on computer hardware maintenance and networking from August 27th to October 8th 2014 in Kakinada, India. It then discusses the main hardware components of a computer including the system unit, motherboard, CPU, RAM, expansion cards, storage devices, optical drives, sound cards, and network interface cards.
The document provides information about various computer hardware and software concepts. It defines BIOS and its role in interfacing hardware components with the operating system. It lists common hardware components of desktops and laptops such as the CPU, motherboard, RAM, hard drives, etc. It describes hard disk partitions, the difference between RAM and ROM, device drivers, the Blue Screen of Death (BSOD), and more.
The system unit contains the main electronic components of a computer. It includes a metal or plastic case, motherboard, processor, memory, ports, and expansion slots. The processor fetches and executes instructions using its control unit and ALU. It relies on memory, registers, buses, and a system clock to function. Heat sinks and fans help keep components cool during operation.
This document provides information about computer components and types of software. It defines data and information, and describes the data processing cycle. It explains that a computer receives data as input, processes it, and provides results as output. The three main parts of a computer are described as the input devices, central processing unit (CPU), and output devices. Examples of input and output devices are provided. The CPU and memory are further explained. System software, application software, and language software are defined as the main types of software.
This document contains questions about various aspects of information and communication technology including definitions of units of measurement for digital storage, examples of hardware, software, operating systems, and other computer components and applications. It asks the reader to identify examples that represent different categories and provides multiple choice answers to test their knowledge of key computer science terms and concepts.
IRJET - Development of Embedded Linux System from Bare BoardIRJET Journal
The document describes how to develop an embedded Linux system from a bare board. Specifically, it discusses formatting an SD card and partitioning it into sections for the boot loader, operating system image, and root file system. It then explains downloading a NOOBs zip file to extract the image file and etch it to the memory card partitions. Once the system software is on the memory card, inserting it into the UDOO NEO board allows it to boot up with the Linux operating system.
this is a power point presentation on the topic INFORMATION TECHNOLOGY . In this presentation there are basics of IT , INFORMATION AND PROCESSING TOOLS , DEFINITION OF IT , IT APPLICATION , SOCIETAL IMPACTS OF IT. By this presentation you will know that what actually is IT.
This document provides an overview of computing for engineering. It discusses the history of computers from early mechanical devices to modern electronic computers. It also covers the characteristics, components, and classification of computers. The four main generations of computers are described based on the technology used. The components of a computer system include hardware, software, and humanware. Hardware consists of the central processing unit and various input/output and storage devices. Software includes operating systems, applications, and programming languages.
The document provides information about organizing an ESDP (Enterprise Skill Development Program) on computer hardware maintenance and networking from August 27th to October 8th 2014 in Kakinada, India. It then discusses the main hardware components of a computer including the system unit, motherboard, CPU, RAM, expansion cards, storage devices, optical drives, sound cards, and network interface cards.
The document provides information about various computer hardware and software concepts. It defines BIOS and its role in interfacing hardware components with the operating system. It lists common hardware components of desktops and laptops such as the CPU, motherboard, RAM, hard drives, etc. It describes hard disk partitions, the difference between RAM and ROM, device drivers, the Blue Screen of Death (BSOD), and more.
The system unit contains the main electronic components of a computer. It includes a metal or plastic case, motherboard, processor, memory, ports, and expansion slots. The processor fetches and executes instructions using its control unit and ALU. It relies on memory, registers, buses, and a system clock to function. Heat sinks and fans help keep components cool during operation.
This document provides information about computer components and types of software. It defines data and information, and describes the data processing cycle. It explains that a computer receives data as input, processes it, and provides results as output. The three main parts of a computer are described as the input devices, central processing unit (CPU), and output devices. Examples of input and output devices are provided. The CPU and memory are further explained. System software, application software, and language software are defined as the main types of software.
This document summarizes the specifications for the Lenovo ThinkPad X390 laptop. It includes details on the processor options which range from 8th generation Intel Core i3 to 10th generation Intel Core i7. Storage includes an M.2 SSD up to 1TB and memory is soldered ranging from 4GB to 32GB. Display options are 13.3" HD, FHD non-touch or FHD touch. Connectivity includes WiFi 6, Bluetooth 5.2, optional 4G LTE and ports including USB-C and HDMI. Security features are a fingerprint reader, optional IR camera and ThinkShutter. It is EPEAT Gold certified and passes military testing.
The document discusses the system unit and information processing (IP) cycle. The system unit contains the main components of a computer including the motherboard, processor, memory, ports, power supply, and expansion cards. The IP cycle involves input, processing, storage, and output of data as it moves through the system unit. Key components are described such as the processor, memory types, buses, graphics cards, and sound cards.
HP Zbook Studio G5 được đánh giá cao trong phân khúc về thiết kế lẫn hiệu năng đáp ứng về đồ họa 2D 3D. Cùng tìm hiểu chi tiết sản phẩm trước khi quyết định nhé
Nguồn: https://laptops.vn/san-pham/hp-zbook-studio-g5/
This document provides an introduction to computers and their components. It begins by defining a computer system as consisting of hardware, software, and users. It then describes the major internal components of a desktop computer, including the central processing unit (CPU), random access memory (RAM), hard drive, floppy drive, CD-ROM drive, video card, sound card, and motherboard. It explains the functions of these components, such as the CPU serving as the "brain" and the motherboard acting as the "body" that connects all other parts. The document concludes by discussing external components like the keyboard, mouse, monitor, printer, and scanner.
This document provides step-by-step instructions for disassembling a PC. It begins by explaining what disassembling entails - removing the different components from the system unit by unplugging, unscrewing, and lifting them out. It then lists 13 steps to fully disassemble a PC, including unplugging all cables, removing the outer shell and side panels, taking out the system fan, CPU fan, power supply, CD/DVD drives, expansion cards, RAM, and motherboard. The goal of disassembling is to separate all the individual parts that make up a computer system.
This document outlines the course syllabus for PC Hardware Servicing NC II. The objectives of the course are to practice occupational health and safety procedures, apply quality standards, install computer systems and networks, diagnose and troubleshoot computer systems, configure computer systems and networks, and maintain computer systems and networks. The course will cover introduction to computers and identifying major computer parts, installing and configuring major computer parts, installing and configuring different operating systems, computer networking, PC troubleshooting and preventative maintenance techniques, and data backup and recovery solutions.
This document provides instructions for creating a multiboot USB drive using Yumi and Qemu. It describes installing Windows XP and 7 ISOs using Yumi, selecting "Try an Unlisted ISO" rather than the listed Windows options. All ISOs are installed to subdirectories rather than the root. Qemu is used to test the drive before customizing the boot menu descriptions and background. Ensuring the drive boots as expected in Qemu validates the installation process before finalizing the multiboot configuration.
The document outlines the certification of completion requirements for CSS-NC II, which includes 4 competency units:
1) Installing computer systems and networks such as assembling computers, installing operating systems and software.
2) Configuring computer systems and networks like creating network cables and configuring routers.
3) Setting up a computer server including DHCP, DNS, file services and remote desktop.
4) Maintaining computer systems and networks through backups, restore points, virus scanning and defragmentation.
The certification also lists the tools needed like screwdrivers, pliers and anti-static equipment.
This document provides an overview of the key components and concepts related to personal computer hardware and software. It discusses IT certifications like CompTIA A+ and describes the basic components of a computer system, including the case, motherboard, CPU, memory, storage, ports, cables, power supply, cooling systems, and expansion cards. The roles and characteristics of these various internal and external components are explained.
The document provides steps to disassemble a computer system. The steps are:
1. Detach the power cable and any external devices from the computer case.
2. Remove screws and slide off the computer case cover.
3. Remove any adapter cards by loosening screws and gently removing the cards.
4. Remove internal components like hard drives, optical drives, and memory modules by detaching power and data cables and loosening mounting screws.
5. Remove the power supply, motherboard, CPU fan, heat sink, and processor by detaching connectors and loosening mounting hardware.
The document describes Dell's new Vostro 220 mini tower and 220s slim tower desktop computers for small businesses. Key features include customizable hardware and software configurations, reliable performance from Intel processors and graphics options, and services like remote support to simplify IT maintenance. The desktops are designed based on small business customer feedback to be durable, customizable solutions for everyday productivity needs.
The document provides step-by-step instructions for disassembling a computer. It begins by advising the reader to prepare their workspace and take safety precautions against static electricity. It then lists 25 steps to completely disassemble the computer, including removing components like the fan duct, optical drive, hard drive, power supply, front panel, memory, heat sink, CPU and motherboard. The overall process allows the reader to take the computer fully apart down to its individual parts.
USB was developed in the mid-1990s to standardize connections between computers and peripherals like keyboards, mice, cameras and drives. It has several key features including being low cost, using a single connector type, and allowing for hot plugging of devices. USB operates using a star topology with a host controller connecting devices and hubs. Communication between devices and the host occurs through pipes that associate endpoints to software. Data is transmitted using a token phase, data phase and handshake phase over differential signal lines with encoding and error checking handled by the physical layer.
This document provides guidance on reimaging Dell Latitude Ultrabook, E-Family, and Mobile Precision notebook computers. It outlines the recommended driver and application installation sequence to ensure optimal performance. Key points include:
- Supported operating systems and new hardware features between notebook generations.
- Obtaining the latest drivers from Dell's support website and installing them in the prescribed order.
- Important BIOS settings like SATA operation mode that need to match the installed storage drivers.
- Installing core drivers, utilities, and applications like graphics, chipset, networking, Dell Control Point, and more in the correct sequence.
While a lot is been speculated in the domain of IoT and Artificial Intelligence but CRM will continue to evolve and play a significant and imperative role in the domain of business. The coming year promises new opportunities as well as new competitive threats so you need to be armored to face it in the best possible way. A
The document discusses the key components of a computer system unit, including the processor, memory, and data representation. It describes how the processor contains a control unit and ALU and completes a four-step machine cycle. Memory is used to store the operating system, programs, and processed data. Data is represented digitally using bits, bytes, and coding schemes like ASCII. Expansion slots allow adding components like video and sound cards.
Với những ai đang có nhu cầu tìm kiếm một chiếc laptop để sử dụng làm máy phụ, máy chữa cháy khi cần thiết hay để dùng làm đồ họa thay máy chính, render,... thì hoàn toàn có thể cân nhắc tới huyền thoại một thời - Dell Precision M4700.
source: https://laptops.vn/san-pham/dell-precision-m4700/
The document defines and describes what a computer is, its components including hardware and software, different types of computers, and key parts and developments in computer history. A computer is an electronic device that can store, process, and retrieve data, and can be programmed with instructions. It is composed of hardware and software and exists in various sizes and configurations.
The document discusses the components and devices of a computer system. It describes the central processing unit, memory, motherboard, power supply, storage devices like hard drives, optical drives, and input/output devices. Specifically, it outlines the operating system, primary storage, expansion bus, adapters, and various input devices like keyboards, mice, and scanners. Output devices covered include monitors, projectors, printers, and speakers. Storage devices defined include floppy disks, CDs, DVDs, flash drives, and hard drives. The document provides details on the basic parts and peripherals that make up a computer system.
This document provides a summary of tools included in Hiren's BootCD 15.1, an all-in-one bootable CD containing various system utilities. It includes over 50 free antivirus, backup, BIOS, browser, cleaner and other tools for Windows and DOS. Some of the notable tools listed are Avira Antivirus, CloneDisk, ComboFix, DriveImage XML, GMER, Malwarebytes Anti-Malware, Partition Image and Total Commander.
Analyzing OS X Systems Performance with the USE MethodBrendan Gregg
Talk for MacIT 2014. This talk is about systems performance on OS X, and introduces the USE Method to check for common performance bottlenecks and errors. This methodology can be used by beginners and experts alike, and begins by constructing a checklist of the questions we’d like to ask of the system, before reaching for tools to answer them. The focus is resources: CPUs, GPUs, memory capacity, network interfaces, storage devices, controllers, interconnects, as well as some software resources such as mutex locks. These areas are investigated by a wide variety of tools, including vm_stat, iostat, netstat, top, latency, the DTrace scripts in /usr/bin (which were written by Brendan), custom DTrace scripts, Instruments, and more. This is a tour of the tools needed to solve our performance needs, rather than understanding tools just because they exist. This talk will make you aware of many areas of OS X that you can investigate, which will be especially useful for the time when you need to get to the bottom of a performance issue.
PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...PROIDEA
Modern CPUs have many cores and advanced instruction sets like AVX that allow performing multiple operations simultaneously. To handle 100 million packets per second, a platform needs network interfaces with speeds of at least 10 Gbps and a PCIe bus and memory fast enough to keep up. The Linux networking stack is not optimized for these speeds, so achieving line rate requires implementing the network processing in userspace using techniques like DPDK that avoid kernel overhead.
This document summarizes the specifications for the Lenovo ThinkPad X390 laptop. It includes details on the processor options which range from 8th generation Intel Core i3 to 10th generation Intel Core i7. Storage includes an M.2 SSD up to 1TB and memory is soldered ranging from 4GB to 32GB. Display options are 13.3" HD, FHD non-touch or FHD touch. Connectivity includes WiFi 6, Bluetooth 5.2, optional 4G LTE and ports including USB-C and HDMI. Security features are a fingerprint reader, optional IR camera and ThinkShutter. It is EPEAT Gold certified and passes military testing.
The document discusses the system unit and information processing (IP) cycle. The system unit contains the main components of a computer including the motherboard, processor, memory, ports, power supply, and expansion cards. The IP cycle involves input, processing, storage, and output of data as it moves through the system unit. Key components are described such as the processor, memory types, buses, graphics cards, and sound cards.
HP Zbook Studio G5 được đánh giá cao trong phân khúc về thiết kế lẫn hiệu năng đáp ứng về đồ họa 2D 3D. Cùng tìm hiểu chi tiết sản phẩm trước khi quyết định nhé
Nguồn: https://laptops.vn/san-pham/hp-zbook-studio-g5/
This document provides an introduction to computers and their components. It begins by defining a computer system as consisting of hardware, software, and users. It then describes the major internal components of a desktop computer, including the central processing unit (CPU), random access memory (RAM), hard drive, floppy drive, CD-ROM drive, video card, sound card, and motherboard. It explains the functions of these components, such as the CPU serving as the "brain" and the motherboard acting as the "body" that connects all other parts. The document concludes by discussing external components like the keyboard, mouse, monitor, printer, and scanner.
This document provides step-by-step instructions for disassembling a PC. It begins by explaining what disassembling entails - removing the different components from the system unit by unplugging, unscrewing, and lifting them out. It then lists 13 steps to fully disassemble a PC, including unplugging all cables, removing the outer shell and side panels, taking out the system fan, CPU fan, power supply, CD/DVD drives, expansion cards, RAM, and motherboard. The goal of disassembling is to separate all the individual parts that make up a computer system.
This document outlines the course syllabus for PC Hardware Servicing NC II. The objectives of the course are to practice occupational health and safety procedures, apply quality standards, install computer systems and networks, diagnose and troubleshoot computer systems, configure computer systems and networks, and maintain computer systems and networks. The course will cover introduction to computers and identifying major computer parts, installing and configuring major computer parts, installing and configuring different operating systems, computer networking, PC troubleshooting and preventative maintenance techniques, and data backup and recovery solutions.
This document provides instructions for creating a multiboot USB drive using Yumi and Qemu. It describes installing Windows XP and 7 ISOs using Yumi, selecting "Try an Unlisted ISO" rather than the listed Windows options. All ISOs are installed to subdirectories rather than the root. Qemu is used to test the drive before customizing the boot menu descriptions and background. Ensuring the drive boots as expected in Qemu validates the installation process before finalizing the multiboot configuration.
The document outlines the certification of completion requirements for CSS-NC II, which includes 4 competency units:
1) Installing computer systems and networks such as assembling computers, installing operating systems and software.
2) Configuring computer systems and networks like creating network cables and configuring routers.
3) Setting up a computer server including DHCP, DNS, file services and remote desktop.
4) Maintaining computer systems and networks through backups, restore points, virus scanning and defragmentation.
The certification also lists the tools needed like screwdrivers, pliers and anti-static equipment.
This document provides an overview of the key components and concepts related to personal computer hardware and software. It discusses IT certifications like CompTIA A+ and describes the basic components of a computer system, including the case, motherboard, CPU, memory, storage, ports, cables, power supply, cooling systems, and expansion cards. The roles and characteristics of these various internal and external components are explained.
The document provides steps to disassemble a computer system. The steps are:
1. Detach the power cable and any external devices from the computer case.
2. Remove screws and slide off the computer case cover.
3. Remove any adapter cards by loosening screws and gently removing the cards.
4. Remove internal components like hard drives, optical drives, and memory modules by detaching power and data cables and loosening mounting screws.
5. Remove the power supply, motherboard, CPU fan, heat sink, and processor by detaching connectors and loosening mounting hardware.
The document describes Dell's new Vostro 220 mini tower and 220s slim tower desktop computers for small businesses. Key features include customizable hardware and software configurations, reliable performance from Intel processors and graphics options, and services like remote support to simplify IT maintenance. The desktops are designed based on small business customer feedback to be durable, customizable solutions for everyday productivity needs.
The document provides step-by-step instructions for disassembling a computer. It begins by advising the reader to prepare their workspace and take safety precautions against static electricity. It then lists 25 steps to completely disassemble the computer, including removing components like the fan duct, optical drive, hard drive, power supply, front panel, memory, heat sink, CPU and motherboard. The overall process allows the reader to take the computer fully apart down to its individual parts.
USB was developed in the mid-1990s to standardize connections between computers and peripherals like keyboards, mice, cameras and drives. It has several key features including being low cost, using a single connector type, and allowing for hot plugging of devices. USB operates using a star topology with a host controller connecting devices and hubs. Communication between devices and the host occurs through pipes that associate endpoints to software. Data is transmitted using a token phase, data phase and handshake phase over differential signal lines with encoding and error checking handled by the physical layer.
This document provides guidance on reimaging Dell Latitude Ultrabook, E-Family, and Mobile Precision notebook computers. It outlines the recommended driver and application installation sequence to ensure optimal performance. Key points include:
- Supported operating systems and new hardware features between notebook generations.
- Obtaining the latest drivers from Dell's support website and installing them in the prescribed order.
- Important BIOS settings like SATA operation mode that need to match the installed storage drivers.
- Installing core drivers, utilities, and applications like graphics, chipset, networking, Dell Control Point, and more in the correct sequence.
While a lot is been speculated in the domain of IoT and Artificial Intelligence but CRM will continue to evolve and play a significant and imperative role in the domain of business. The coming year promises new opportunities as well as new competitive threats so you need to be armored to face it in the best possible way. A
The document discusses the key components of a computer system unit, including the processor, memory, and data representation. It describes how the processor contains a control unit and ALU and completes a four-step machine cycle. Memory is used to store the operating system, programs, and processed data. Data is represented digitally using bits, bytes, and coding schemes like ASCII. Expansion slots allow adding components like video and sound cards.
Với những ai đang có nhu cầu tìm kiếm một chiếc laptop để sử dụng làm máy phụ, máy chữa cháy khi cần thiết hay để dùng làm đồ họa thay máy chính, render,... thì hoàn toàn có thể cân nhắc tới huyền thoại một thời - Dell Precision M4700.
source: https://laptops.vn/san-pham/dell-precision-m4700/
The document defines and describes what a computer is, its components including hardware and software, different types of computers, and key parts and developments in computer history. A computer is an electronic device that can store, process, and retrieve data, and can be programmed with instructions. It is composed of hardware and software and exists in various sizes and configurations.
The document discusses the components and devices of a computer system. It describes the central processing unit, memory, motherboard, power supply, storage devices like hard drives, optical drives, and input/output devices. Specifically, it outlines the operating system, primary storage, expansion bus, adapters, and various input devices like keyboards, mice, and scanners. Output devices covered include monitors, projectors, printers, and speakers. Storage devices defined include floppy disks, CDs, DVDs, flash drives, and hard drives. The document provides details on the basic parts and peripherals that make up a computer system.
This document provides a summary of tools included in Hiren's BootCD 15.1, an all-in-one bootable CD containing various system utilities. It includes over 50 free antivirus, backup, BIOS, browser, cleaner and other tools for Windows and DOS. Some of the notable tools listed are Avira Antivirus, CloneDisk, ComboFix, DriveImage XML, GMER, Malwarebytes Anti-Malware, Partition Image and Total Commander.
Analyzing OS X Systems Performance with the USE MethodBrendan Gregg
Talk for MacIT 2014. This talk is about systems performance on OS X, and introduces the USE Method to check for common performance bottlenecks and errors. This methodology can be used by beginners and experts alike, and begins by constructing a checklist of the questions we’d like to ask of the system, before reaching for tools to answer them. The focus is resources: CPUs, GPUs, memory capacity, network interfaces, storage devices, controllers, interconnects, as well as some software resources such as mutex locks. These areas are investigated by a wide variety of tools, including vm_stat, iostat, netstat, top, latency, the DTrace scripts in /usr/bin (which were written by Brendan), custom DTrace scripts, Instruments, and more. This is a tour of the tools needed to solve our performance needs, rather than understanding tools just because they exist. This talk will make you aware of many areas of OS X that you can investigate, which will be especially useful for the time when you need to get to the bottom of a performance issue.
PLNOG16: Obsługa 100M pps na platformie PC, Przemysław Frasunek, Paweł Mała...PROIDEA
Modern CPUs have many cores and advanced instruction sets like AVX that allow performing multiple operations simultaneously. To handle 100 million packets per second, a platform needs network interfaces with speeds of at least 10 Gbps and a PCIe bus and memory fast enough to keep up. The Linux networking stack is not optimized for these speeds, so achieving line rate requires implementing the network processing in userspace using techniques like DPDK that avoid kernel overhead.
The document provides an overview of a training session on clustering 101 and the Rocks cluster distribution. It discusses cluster types, components, pioneers in the field, interconnect technologies, sample applications and benchmarks, cluster software options, challenges of managing clusters, and the philosophy and approach of the Rocks distribution for easily building clusters.
This document provides information about networking and Microsoft Certified Systems Engineer (MCSE) certification. It defines what a network is and discusses the benefits of networking such as sharing resources, software, and licenses. It also describes different types of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). Additionally, it discusses networking devices like hubs, switches, routers, and network interface cards. The document also covers topics such as network topologies, IP addressing, implementing TCP/IP, and Active Directory.
The document provides information to help understand the differences between Windows XP Home and Professional editions. Key differences include:
- XP Pro includes features like backup software, dynamic disks, IIS, and encrypted file system that XP Home does not have.
- XP Pro supports up to two processors while XP Home only supports one.
- XP Pro allows systems to be domain members and supports group policies, while XP Home does not.
- Only XP Pro supports upgrades from Windows 2000/NT and will have a 64-bit version for Itanium systems.
This document provides an outline for Lecture 4 on UNIX OS networking. It discusses TCP/IP and the OSI model, IP and MAC addressing, networking commands like ping, traceroute, arp, ifconfig and route. It also gives an overview of common UNIX command line tools like cut, diff, grep, strings, tr and uniq along with examples of using each tool.
About the authors: Jerome Tollet is Distinguished Engineer working in the Cisco Chief Technical and Architecture Office (CTAO) with a specific focus on Datacenter / Container Networking, Policy and Security. Jerome is an active member of FD.io. He is leading networking-vpp project as well as other VPP related projects.
Ed Warnicke is a Distinguished Consulting Engineer in the Chief Technology and Architecture Office (CTAO) office at Cisco Systems. He has been working for over a decade in many areas of networking and Open Source. He has been a member of the OpenDaylight TSC since its inception and currently serves as a committer elected member of the OpenDaylight TSC. He is a founding TSC member at ONAP.
This document provides an overview of computer networking concepts including network types (LAN, MAN, WAN), networking devices (hubs, switches, routers), network topologies (bus, star, ring), IP addressing, and Active Directory. Some key points include:
- A network allows connected computers to share resources and communicate. Common network types include local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs).
- Networking devices like hubs, switches, and routers are used to connect computers in a network and enable communication. Hubs broadcast data to all ports while switches transmit only to the target computer. Routers connect different network types.
- Popular network top
This document provides a summary of a presentation titled "Ride the Light: A guide to the internet, telephony and computer technology in the 21st century." The presentation covers topics such as core computing values, telephony, internet technology, IP addressing, internet security and abuse. It includes details on technologies like dial-up, DSL, T1 lines, routing registries, RFCs, subnetting, internet threats and solutions, and recommended websites for further information.
This document provides information about networking concepts and Active Directory. It discusses networking components like switches, routers, and topologies. It also covers networking devices like hubs. For Active Directory, it describes logical structures like domains, trees, and forests as well as physical structures like sites and domain controllers. It provides steps for installing Active Directory on a server and promoting it to a domain controller. It also discusses additional domain controllers and Active Directory components.
- The document discusses various Linux system log files such as /var/log/messages, /var/log/secure, and /var/log/cron and provides examples of log entries.
- It also covers log rotation tools like logrotate and logwatch that are used to manage log files.
- Networking topics like IP addressing, subnet masking, routing, ARP, and tcpdump for packet sniffing are explained along with examples.
What is SDN and how to approach it with PythonJustin Park
This talk is about understanding software defined networking (SDN) and recent trends in computer networking through networking tools built in Python. We aim to provide a perspective on computer networking in the era of Internet of Things (IoT) and how to cope with changing environments as developers, programmers, and Python users. This talk requires basic knowledge equivalent of first-year-computer-science-major undergraduates. However, for the latter half of the talk, we recommend you experience the basics of Python beforehand to fully understand the contents concerning Python-based tools such as Ryu (an OpenFlow controller) and Mininet (a virtual switch environment). We hope through this talk Python users would gain a better perspective and understanding about SDN and computer networking.
본 발표는 최근 네트워킹 분야에 불고 있는 소프트웨어정의 네트워킹 (SDN)에 관한 것으로 사물인터넷의 시대에서 더욱 증가되는 네트워크의 중요성과 SDN의 의미에 대해서 바르게 이해하고 앞으로 변화할 네트워킹 환경에 개발자, 프로그래머, 파이썬 유저로써 어떻게 준비하고 대처해야할지 함께 생각해보는 기회를 제공하는데 그 목적이 있다. 본 발표를 이해하기 위해서는 컴퓨터공학 전공 1학년 수준의 컴퓨터 구조와 컴퓨터 네트워크의 지식만 있다면 충분히 이해하고 즐길수 있다. 다만 후반에 나오는 파이썬툴들에 대하여 이해하기 위해서는 파이썬의 기초를 미리 공부하기를 권장한다. 발표의 초반 20분은 컴퓨터 네트워크의 역사와 발전방향에 대하여 이야기하고 SDN이 무엇인지 발표자의 생각을 나눈다. 그리고 발표의 후반 약 20분은 SDN 환경에서 여러가지 형태로 사용되는 파이썬으로 제작된 툴 (Ryu 컨트롤러와 Mininet 가상 스위치)을 소개하고 사용하는 방법을 소개한다. 이번 발표를 통해 파이썬 사용자들의 SDN에 대한 이해가 높아지기를 기대한다.
Reference source codes
Mininet: https://github.com/mininet
Ryu: https://github.com/osrg/ryu
uCluster (micro-Cluster) is a toy computer cluster composed of 3 Raspberry Pi boards, 2 NVIDIA Jetson Nano boards and 1 NVIDIA Jetson TX2 board.
The presentation shows how to build the uCluster and focuses on few interesting technologies for further consideration when building a cluster at any scale.
The project is for educational purposes and tinkering with various technologies.
This document provides instructions on configuring basic settings on a Cisco router, including:
- Setting the hostname of the router
- Configuring login passwords for the console and VTY lines
- Enabling password encryption
The steps outlined include entering privileged mode, going into configuration mode, setting the hostname, configuring login passwords on the console and VTY lines, and enabling password encryption for increased security.
Internet of things is one of the hottest areas nowadays. It has been predicted that about 50B devices would be connected to each other by 2020. Internet of things or you can say internet of everything, i.e. connecting everything together.
You can visit http://www.youtube.com/kgptalkie for full video tutorials
NUSE (Network Stack in Userspace) at #osioHajime Tazaki
This document describes Network Stack in Userspace (NUSE), which implements a full network stack as a userspace library. NUSE aims to allow faster evolution of network stacks outside the kernel and enable network protocol personalization. It works by patching the Linux kernel to include a new architecture, implementing the network stack components as a userspace library, and hijacking POSIX socket calls to redirect them to the NUSE implementation. Performance tests show NUSE adding only small overhead compared to kernel implementations. NUSE can also integrate with the ns-3 network simulator to enable controllable and reproducible network simulations using real protocol implementations.
Presentation for IoT workshop at Sinhagad University (Feb 4, 2016) - 2/2Bhavin Chandarana
This is the second part of the presentation used for the workshop I conducted at Sinhagad University on Thursday 4th Feb, 2016. A lot of the content has been taken from freely available existing sources and these slides are just for reference for those who attended the workshop
This document describes an exercise using USB in-system programming (ISP) on an LPC1343 LPCXpresso board without using host software. The key points are:
1. The LPC1343 board plugs into an NGX baseboard and the bootloader code executes on power-up or reset to either run the ISP command handler, user application, or obtain a boot image from a USB mass storage device.
2. Holding the PIO0_1 pin low during reset triggers the ISP command handler or USB device enumeration without checking for valid user code.
3. The state of the PIO0_1 pin determines whether the bootloader runs the
Data Acquisition and Control System for Real Time Applicationsijsrd.com
This paper proposes an Embedded Ethernet which is nothing but a processor that is capable to communicate with the network. This helps in data acquisition and status monitoring with the help of standard LAN. Currently device with processor is widely used in industrial field. The Embedded Ethernet provides web access to distributed measurement/control systems and provides optimization for instrumentation, educational laboratories and home automation. However, a large number of devices don't have the network interface and the data from them cannot be transmitted in network. A design of ARM Processor based Embedded Ethernet interface is presented. In this design, data can be transmitted transparently through Ethernet interface unit to remote end desktop computer. By typing the IP address of LAN on the ARM9 board, the user gets sensor values on the PC screen at remote station. This provides the status of the devices at remote field. The user can also control the devices interfaced to the ARM9 Board by pressing the button displayed on the GUI of the remote Desktop PC.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against developing mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
The document discusses the results of a study on the effects of a new drug on memory and cognitive function in older adults. The double-blind study involved 100 participants aged 65-80 who were given either the drug or a placebo daily for 6 months. Researchers found that those who received the drug performed significantly better on memory and problem-solving tests at the end of the study compared to those who received the placebo.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise stimulates the production of endorphins in the brain which elevate mood and reduce stress levels.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise boosts blood flow and levels of serotonin and endorphins which elevate mood and may help prevent mental illness.
Top 1000 Java Interview Questions Includes Spring, Hibernate, Microservices, ...Ankit Kumar
This document provides an overview and table of contents for a book titled "Top 1000 Java Interview Questions & Answers" by Knowledge Powerhouse. It includes the copyright information, a dedication, and lists chapter titles covering topics like Java basics, OOP principles, inheritance, static methods, method overloading and overriding, polymorphism, abstraction, final keywords, packages, internationalization, serialization, reflection, garbage collection, inner classes, strings, exception handling, multi-threading, and collections. The document gives a high-level outline of the technical concepts and questions that will be covered in the book.
The document describes five experiments performed using an 8085 microprocessor kit to understand various arithmetic operations. Experiment 1 adds two 8-bit numbers and stores the 8-bit sum. Experiment 2 adds two 8-bit numbers and stores the 16-bit sum. Experiment 3 adds two 16-bit numbers and stores the 16-bit sum. Experiment 4 performs decimal addition of two 8-bit numbers and stores the 8-bit sum. Experiment 5 finds the one's complement of an 8-bit number.
Ethernet uses different cabling standards depending on the technology. 10BASE5 uses thick coaxial cable allowing distances of 500 meters, while 10BASE2 uses thinner coaxial cable allowing 185 meters. 10BASE-T networks used hubs, creating a shared media where only one station could transmit at a time (half-duplex). Newer technologies like 100BASE-TX use switches to isolate each port and allow full-duplex communication. Ethernet standards also use different encoding schemes like Manchester encoding for 10BASE-T and 4B/5B encoding for Fast Ethernet.
This document compares and contrasts IPv4 and IPv6. It notes that IPv4 uses 32-bit addresses which limits the number of available addresses, while IPv6 uses 128-bit addresses providing vastly more unique addresses to meet future network growth. It describes several new features of IPv6 including separate options fields to speed routing, additional security options like encryption, and quality of service controls. IPv6 was designed to support greater Internet usage, high-speed transmission of audio/video, and next generation networking needs.
This document discusses remote procedure calls and data conversion when communicating between computers with different architectures. It describes Abstract Syntax Notation and External Data Representation as two available methods for data conversion. Remote procedure calls allow a client to call a procedure on a remote server as if it were a local procedure call. The client stub marshals parameters and sends them to the server stub, which unmarshals the parameters and calls the server procedure before returning any results.
The document discusses various ways to classify signals. Signals can be classified based on parameters such as the independent variable (e.g. continuous time vs. discrete time signals), dependent variable (e.g. analog vs. digital signals), number of independent variables (e.g. one-dimensional, two-dimensional, multi-dimensional signals), periodicity (e.g. periodic vs. aperiodic signals), determinism (e.g. deterministic vs. random signals), causality (e.g. causal, anti-causal, non-causal signals), and energy content (e.g. energy signals, power signals). Continuous time signals have values defined over a continuum of time, while discrete time signals
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
The document provides a lab manual for computer graphics experiments in C language. It includes experiments on digital differential analyzer algorithm, Bresenham's line drawing algorithm, midpoint circle generation algorithm, ellipse generation algorithm, text and shape creation, 2D and 3D transformations, curve generation, and basic animations. It outlines the hardware and software requirements to run the experiments and provides background, algorithms, sample programs and outputs for each experiment.
Training completion certificate of b.s.n.lAnkit Kumar
This certificate certifies that Ankush (14152011), a final year ECE student, successfully completed summer training as required for their B.Tech degree from the university. The training took place during the 2009-2010 academic year and this report documents the authentic work completed by the student during that period.
Training completion certificate of b.s.n.l (2)Ankit Kumar
BSNL is an Indian state-owned telecommunications company that was incorporated in 2000 and took over telecom services from government departments, making it the largest provider of fixed telephony and broadband in India with over 60% market share. However, BSNL has faced heavy losses in recent years due to intense competition. It is India's oldest communication service provider and had over 93 million customers as of 2015, present throughout India except for Mumbai and New Delhi.
This document provides a table of contents for chapters in a book or document on telecommunications networks. It includes chapters on BSNL (Bharat Sanchar Nigam Limited), basic telecom networks, leased lines, intranets, corporate networks, Wi-Fi, WiMAX, GSM, and optical fiber transmission. The table of contents lists topics like call setup, electronic exchanges, carrier rooms, main distribution frames, power plants, managed leased line networks, intranet applications, and features of corporate networks. It also includes figures and tables related to the topics.
This is a summer training report submitted by a student to Mrs. at Guru Jambeshwar University of Science & Technology in Hisar, Haryana, India. The report provides information from a summer training conducted by the student at the university.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
2. Theme of my lecture today
• Technology based on the Internet
environment
– Computer Technology
– Network technology
• Computers and network operating
systems
– Introduction to UNIX operating system
• Let’s install and configure FreeBSD
5. What is Napster?
• Peer to Peer File
sharing application
– Audio files
– Videos
– Misc. files
• Final court denies
continuation of the
service
Sega and PS Emulator for PC bleem!
Deceased Nov. 2001
6. Contents and copyrights
• Digital House appliances Forum, 2002
• Digital information are easy to copy
– Network enables sharing of the information
• Digital copyright protection
– CSS (Contents scramble system)
– AEA (Advanced Encryption standard)
– CPPM (Content Protection for Prerecorded Media)
– CPRM (Content Protection for Recordable Media)
– DTCP (Digital Transmission Content Protection)
– DDCP (High-bandwidth Digital Content Protection )
7. Lawsuits in Florida
• AT&T Broadband is providing 100%
broadband service to white residents while
African American citizen residents applies
only 1%. Federal Communications Act in
1934, and Telecommunications Act in
1996 prohibits discrimination of any kind in
ways of communication servicing.
• As of Sept. 1st 2002
8. What is an Operating system?
• 2 kinds of a software
– Application Software
• Word processors, database manager, compiler,
web browser
– System Software
• Operating system itself
• Bridges between the hardware and users
9. Computer, OS, and
user applications
Web
Browser
Excel
Word
Application
Operating System
Hardware
10. Resource management
• Memory management
• Device management
– Printer
– Hard drive
– display
• Process management
• Processor management
Memory
System application?
Windows application?
Mail application?
11. Many kinds of
Operating system
• Single User, Single
Task
• MS-DOS, Mac-OS,
CPM/86
• Single User, Multiple
Task
• OS/2, Windows 95
• Multiple User, Multiple
Task
• Windows NT, UNIX,
Windows 2000,
Windows XP
13. Why OS was born?
• Batch processing
– Resident Monitor, JCL, IOCS
Resident Monitor
User Program Area Single job
Single program
Minimum controlling mechanism
Fortran Job Card
$JOB
$FORTRAN
$LOAD
$RUN
$END
14. Batch Process
CPUJob 3 Job 2 Job 1
Courses in Restaurants
Eat one dish at a time
AppetizersSoupMain dish
15. Multi Programming
• Multi programming system
– THE system
– MFT/MVT/TSO/CMTS
Operating System
Job 1
Job 2
Job 3
18. Memory space
• Enlargement of memory spaces
16 Bit address space 65536Byte = 64KByte
24 Bit address space 16777216Byte = 16MByte
32 Bit address space 4294967296Byte = 4GByte
48 Bit address space 2814749710656Byte=256TByte
20. History of UNIX
• Development of TSS @ Multix
– TSS development :AT&T, GE, MIT
• 1976 Bell Lab. UNIX Version 6
– Mini Computer
– DEC: PDP-9(16bit, 256K)
– Small TSS
– Free source code for the Software
– Abstraction based on the file system
21. UC. Berkeley
• PDP 2BSD, VAX 3BSD, 4BSD
• New functions
– Virtual memory system
– Network (TCP/IP, Socket interface)
– Full Screen capability (termcap)
– csh, vi
22. Sun Microsystems
• Project from Berkeley
– Target: Workstation
– Windows System(Xwindowsは,MIT)
– NFS, NIS…..
25. Some Unix distributions
• Sun:
– SunOS:
BSD(Solaris1.x)
– Solaris 2.x: SystemV
• DEC:
– Ultrix: OSF/1
• HP:
– HP-UX: System V
• BSDi
– BSD/OS: BSD
• FreeBSD
• NetBSD
• Linux
• OpenBSD
• Mach 2.x: BSD
• Mach 3.x: Micro
kernel + Unix Server
26. Definition of UNIX
Hardware
(CPU, memory, disks, terminals, NIC)
UNIX Operating system
(Process management, Memory management, file systems, networks…)
Standard library
application
users
System calls
27. Difference between FreeBSD
and Linux
• Distribution process
– Based on Minix = Linux
• Linus Torvalds first developed Linux back in August of 1991
• No Network capability
• Many distribution package
– Red Hat, Debian, Kondora, Vine, SuSE, Caldera, Mandrake,
Alpha…
• Many supported processors, machines, environments
– Intel, PPC, Nomad, Playstation 1, 2, 68000…
– From PDA to Mainframes
• http://www.linux.org
– Based on Berkeley distribution (BSD4.4)
• One of the distribution tree based on BSD
• FreeBSD
• x86 compatible, DEC Alpha, and PC-98 architectures
• http://www.freebsd.org
28. Difference between
Windows and UNIX
• Bill Gates technology
= Windows ( a.k.a Windoze )
• Based on End users
– Fancy windows, user interface
• UNIX
– Truly network aware operating system
• For network management
• Distribute computing and management
– Character base user interface
– All we care is a running code!
30. How application runs under UNIX?
Device driver
Memory
Process Management
Network managementFile systems
Process 1 Process 2 Process 3
Editor acrobat Web Browser
System calls
31. Interrupts
• When you…
– Type your keyboard
– Move your mouse
– Access hard drive
• Interrupts from software
32. Input Output system
Disk driver
Buffer cache
Filesystem
Terminal driver
Line Disciplines
Read / Write files
/dev/tty
Terminal interface
User land
Kernel
land
33. dmesg command
cpu0: SUNW,UltraSPARC-II (upaid 0 impl 0x11 ver 0x20 clock 296 MHz)
SunOS Release 5.6 Version Generic_105181-08 [UNIX(R) System V Release 4.0]
Copyright (c) 1983-1997, Sun Microsystems, Inc.
mem = 655360K (0x28000000)
avail mem = 647847936
root nexus = Sun Ultra 30 UPA/PCI (UltraSPARC-II 296MHz)
glm0: Rev. 3 Symbios 53c875 found.
PCI-device: scsi@3, glm #0
glm0 is /pci@1f,4000/scsi@3
sd0 at glm0: target 0 lun 0
sd0 is /pci@1f,4000/scsi@3/sd@0,0
<SUN4.2G cyl 3880 alt 2 hd 16 sec 135>
root on /pci@1f,4000/scsi@3/disk@0,0:a fstype ufs
PCI-device: ebus@1, ebus #0
keyboard is </pci@1f,4000/ebus@1/su@14,3083f8> major <37> minor <0>
mouse is </pci@1f,4000/ebus@1/su@14,3062f8> major <37> minor <1>
stdin is </pci@1f,4000/ebus@1/su@14,3083f8> major <37> minor <0>
SUNW,ffb0 at root: UPA 0x1e 0x0
SUNW,ffb0 is /SUNW,ffb@1e,0
stdout is </SUNW,ffb@1e,0> major <34> minor <0>
NOTICE: alt1: Alteon PCI NIC found
NOTICE: alt1: Using system MAC address 8:0:20:91:b5:87
PCI-device: ethernet@2, alt #1
pci12ae,11 is /pci@1f,4000/ethernet@2
NOTICE: alt1: Gigabit Ethernet link is up
dump on /dev/dsk/c0t0d0s1 size 524832K
34. Process?
• Job = application = command = program
• Running the applications
–Run program as a process
• Dish to put foods in
Dish: Process
application
36. Construction of a process
Process
1
Process
2
Process
3
Process descriptor
Process control block
Process table or process descriptor
1) Process ID
2) Program counter
3) Stack pointer
4) register
5) Process state
6) Memory information
7) File information
37. Fork
main()
{
……
……
if ( fork() == 0 ) {
/* Child Process */
child_process();
}
/* Parent Process */
wait(0);
……
……
}
parent
fork() makes a clone of
itself
Same programs will run in
parallel
child
39. How PC Boots up?
• Tie up your own boot
• POST
– Power On Self Test
• When you power on the computer
• Clears the CPU memory register
• Sets the CPU program counter to F000
• Reads the program fixed in f000 from the BIOS
• Which is the check program for basic systems
• Checks system bus
• Checks its own memory
43. signal
SIGNALS ACTION Definition
SIGHUP terminate process terminal line hangup
SIGINT terminate process interrupt program
SIGQUIT create core image quit program
SIGILL create core image illegal instruction
SIGTRAP create core image trace trap
SIGABRT create core image abort(2) call
SIGFPE create core image floating-point exception
SIGKILL terminate process kill program
SIGBUS create core image bus error
SIGSEGV create core image segmentation violation
SIGSYS create core image system call given invalid argument
SIGPIPE terminate process write on a pipe with no reader
SIGALRM terminate process real-time timer expired
SIGTERM terminate process software termination signal
SIGURG discard signal urgent condition present on socket
SIGSTOP stop process stop (cannot be caught or ignored)
SIGTSTP stop process stop signal generated from keyboard
SIGCONT discard signal continue after stop
SIGCHLD discard signal child status has changed
SIGTTIN stop process background read attempted from control term.
SIGTTOU stop process background write attempted to control term.
SIGWINCH discard signal Window size change
SIGINFO discard signal status request from keyboard
SIGUSR1 terminate process User defined signal 1
SIGUSR2 terminate process User defined signal 2
44. File and file systems
Abstract in recording
Records in a block.
Information of
1) Names
2) Places
3) Amounts
4) Security
5) Information
45. File system in UNIX
I node Data block
Boot block
Super block
46. File system
• Abstraction based on files
root directory
/dev
/home
jun
sd0a
Plain Files
Directory
Special Files
47. Index node
60 .
2
98
150
..
jun
uhyo
I node number
98 .
60
100
105
..
secret
appointment
100 .
98
160
203
..
Licence.c
Oops.c
105 .
98
178
205
..
Presentation.ppt
Girlfriend.jpg
48. UNIX file system
st_mode Protection bit matrix
st_ino I node number
st_dev I node device
st_nlink Number of hard links
st_uid User ID
st_gid Group ID
st_size File size in bytes
st_atime Last access time
st_mtime Last modified time
st_ctime Last fie status changed time
49. Installing FreeBSD
• Requirements of PC
– Processor: Intel 386 Architecture
• 80386 and higher
• FPU ( Floating point processor 80387 ) may
– Memory: 16MByte and higher
• 8Mbyte and higher recommended
• With X Windows, 32MB and higher is
recommended
– Storage
• More than 100MB
50. Installation medium
• Floppy drive
– 2 floppy
• Kernel floppy ( boot floppy )
• MFSroot floppy ( file system floppy )
• CD-ROM
– Bootable CD with standard archives
– Application CD for additional software
52. File systems
• FDISK Partition and BSD Partition
Windows XP FreeBSD
The entire hard drive capacity
root
File system
Swap
File system
/var
File system
/usr
File system
The entire FreeBSD Partition
55. Installation via network
• Network interface to connect to the
network
• IP address, netmask, Default router
• Destination distribution server
56. Post installation configuration
• Pre packaged software installation
• Password and user configuration
• Time zone configuration
• X window configuration
• Start up service configuration
57. Important files and commands
• /etc/rc.conf
• /etc/defaults directory
• /etc/inetd.conf and /etc/services
• /etc/X11/XF86Config
• .cshrc files
• /usr/src/sys files
61. What’s for the next lecture
• We will discuss about the network and
computer infrastructure in USP
• The importance of configuring the better
infrastructure for USP and
• Collaboration of some of our projects in
Japan and USP