Thursday, 13 October 2011

TUGASAN 1


Memory Management

Paging

§  Logical address space of a process can be noncontiguous process is allocated physical memory whenever the latter is available
§  Divide physical memory into fixed-sized blocks called frames(size is power of 2, between 512 bytes and 8,192 bytes)
§   Divide logical memory into blocks of same size called pages
§  Keep track of all free frames
§  To run a program of size pages, need to find free frames and load program
§  Set up a page table to translate logical to physical addresses
§  Internal fragmentation


Paging Hardware















Paging Example






































Segmentation
§  Memory-management scheme that supports user view of memory
§  A program is a collection of segments. A segment is a logical unit such as:
®    main program,
®    procedure,
®    function,
®    method,
®    object,
®    local variables,
®     global variables,
®    common block,
®    stack,
®    symbol table,
®     arrays


Segmentation Architecture

§  Logical address consists of a two tuple:
<segment-number, offset>,

§  Segment table – maps two-dimensional physical addresses;
each table entry has:          

§  base – contains the starting physical address where the
segments reside in memory

§  limit – specifies the length of the segment

§  Segment-table base register (STBR)points to the segment
table’s location in memory

§  Segment-table length register (STLR)indicates number of
segments used by a program;

segment number is legal if sSTLR

Protection

§  With each entry in segment table associate:
®     validation bit = 0 Þ illegal segment
®     read/write/execute privileges
§  Protection bits associated with segments code sharing occurs at segment level
§  Since segments vary in length, memory allocation is a dynamic storage-allocation problem
§   A segmentation example is shown in the following diagram

Segmentation Hardware



TUGASAN 4


Protection & Security

Introduction
File system often contain information that is highly valuable to their users.
Protecting information against unauthorized usage is therefore major concern of
all file system. In the following unit we will look at a variety of issues concerned
with security and protection.

Security policy and mechanism
      i.        The term security and protection are often used interchangeable.
    ii.        Nevertheless, it is frequently useful to make a distinction between the general problems involved in making sure that files are not read or modified by unauthorized persons, which include technical, managerial, legal and political issues on the one hand, and the specific operating system mechanism used to provide security on the other to avoid confusion, we will use the term security to refer to the overall problem, and the term protection mechanisms to refer to the specific operating system mechanisms used to safeguard information in the computer.
   iii.         The boundary between them is not well defined, however.
   iv.        A more interesting problem is what to do about intruders.
    v.         These come in two varieties.
   vi.        Passive intruders just want to read files they are not authorized o read.
  vii.        Active intruders are more malicious; they want to make unauthorized changes to data.
viii.        When designing a system to be secure against intruders, it is important to keep in the mind the kind of intruders one is trying to protect against. Some common categories are:

1)    Casual prying by non technical users. Many people have terminals to time sharing systems on their desks, and human nature being what it is, some of them will read other people’s electronic mail and other files if no barriers are placed in the way. Most UNIX systems, for example, have the default that all files are publicly readable.
2)    Snooping by insiders. Student, systems programmers, operators, and other technical personal often consider it to be a personal challenge to break the security of the local computer system. They often are highly skilled and are willing to devote a substantial amount of time to effort.

3)    Determined attempt to make money. Some bank programmers have attempted to break into a banking system to steal from the bank. Scheme have varied from changing the software to truncate rather than round interest, keeping the fraction of a cent for themselves, to siphoning off accounts not used in years, to blackmail.

4)    Commercial or military espionage. Espionage refers to serious and wellfunded attempt by a competitor or foreign country to steal programs, trade secret, patents, technology, circuit design, marketing plans, and so forth. Often this attempt will involve wiretapping or even erecting antennas directed at the computer to pick up its electromagnetic radiation.

Authentic basic concept
a.    A major security problem for operating system is the authentication problem.
b.    The protection system depends on an ability to identify the programs and processes that are executing.
c.     This ability in turn, eventually rests on our power to identify each user of the system. A user normally identifies himself.
d.    How do we determine if a user identity is authentic? Generally, authentication is base on some combination of three set of items: user possession (a key or card),user knowledge (a user identifier and password), and a user attribute ( finger print, retina pattern, or signature)
e.    The most common approach to authenticating a user identity is the use of user passwords.
f.      When the user identifies herself by user id or account name, she is asked for a password. If the user supplied password, matches the password stored in the system, the system assume that the user is legitimate.

Password
Passwords are often used to protect object in the computer system,
in the absence of more complete protection scheme. They can be considered a
special case of either keys or capabilities. For instance, a password could be
associate with each resource such as file. Whenever a request is made to use the
resource, the password must be given. If the password is correct, access is granted. Different passwords may be associated with different access rights. For
example, different password may be used for reading, appending and updating a
file.

Artifact
A completely different approach to authorization is to check to see
if the user has some item, normally a plastic card with a magnetic stripe on it.
The card is inserted into the terminal, which then checks to see whose card it is.
This method can be combined with a password, so a user can only log in if he
1. has the card
2. knows the password
Automated cash dispensing machine usually work this way.

Another technique is signature analysis. The user sign his name with a special
pen connected to the terminal and the computer compares it to a known
specimen stored online. Even better is not to compare the signature, but compare
the pen motion made while writing it. A good forger may be able to copy the
signature, but will not have a clue as to the exact order in which the stroke were
made.


Biometric Technique
Yet another approach is to measure physical characteristic that are
hard to forge. For example a finger print or a voiceprint reader in the
terminal could verify the users identity (it make the search go faster if the
user tells the computer who he is, rather then making the computer
compare the given fingerprint to the entire database)
Finger length analysis is surprisingly practical. When this is used
each terminal has a device. The user inserts his hand into it and the length
of all his finger is measured and check against the database.

TUGASAN 5


My Preffered Os

1. Turn on your computer.

2. Press the F2 key (on some computers,you must press the DELETE button) tolaunch the BIOS.

3. In the Phoenix BIOS, select AdvancedBIOS Features.



4. Select Boot Sequence.


 5. In the Boot Sequence sequence, setthe CD-ROM is at the top

 6. Press F10 to save settings and restartyour computer


Format Hard Disk

1. First, you'll see a screen with themessage "Press any key to boot from CD...". Press any button here so that the computer will start reading from theWindows XP CD.





 2. Consider first the message out, "PressF6 if you need to install a third partySCSI or RAID driver or. " This message isimportant if you install Windows XP onSATA hard disk. If yes, press F6 and insert the SATA disk that came with yourmotherboard. If not, ignore this messageand proceed to Step 3. (Note: If you want to install Windows XP on SATA hard diskbut no disk, follow these steps




3. "Welcome to Setup" is displayed. PressENTER to start to install Windows XP.





4. If you see the screen "Setup did notfind any hard disk" is most likely that you are using SATA hard disk. Return to Step2, or follow these steps.






5. "Windows XP Licensing Agreement. "Press F8 to proceed


6. If you have a hard hisk Windows XP,Setup will ask if you want to repair the oldtu Windows XP. Press the ESC becauseyou want to install a new Windows XP.





7. If your hard disk:
 are new and have not had any partition, followsteps 7 to 8.
 but if it has no partition in it, proceed to step 9.




8. Create a partition by pressing C





9. Determine the size of your partition andpress ENTER.




10. Choose a partition C: to installWindows XP. Note: If you have anyimportant files and documents in thepartition C:, create a backup of the datatransfer to the partition D: or to theexternal hard drive.






11. Press button C to agree





12. Choose NTFS as the file system andpress ENTER.






13. Press F to format Hard Disk.




14. Setup will start formatting your harddisk and prepare files for the Windows XPinstall. Once this process is complete, your computer will restart itself.




Install Windows XP

1. Windows XP install process begins. Clickthe Next button.




2. Enter your name and click the Nextbutton.




3. Enter the serial number for Windows XPand click the Next button.




4. Enter a password for the Administratorand click the Next button.




5. In the Time Zone field, select the Kuala Lumpurand click the Next button





6. Setup process has begun. Wait untilfinished



7. If you have a Network Card, Setup will ask you to make choices about theNetwork. Just click on the Next buttontwice.


8. Wait until the entire Windows XP installprocess is complete, and the computer willrestart again.


Start Using Windows XP


1. The first time Windows XP started, yourscreen resolution be amended as appropriate. Click on the OK button.




2. "Welcome to Microsoft Windows" is displayed. Click the Next button.


3. Select "Not right now" and press the Next button. You can re-enable AutomaticUpdates in the future.



4. Windows will attempt to detect your Internet connection. You may omit thisstep by clicking Skip.



5. Select "No, not at this time" so you do not need to register with Microsoft. Press the Next button.



6. Enter your name and click Next.




7. Click the Finish button.




8. Now, Windows XP was installed andready you can already start using it.