MCSE Training Guide: Windows Architecture and Memory

Size: px
Start display at page:

Download "MCSE Training Guide: Windows Architecture and Memory"

Transcription

1 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows Architecture and Memory This chapter wi hep you prepare for the exam by covering the foowing objectives: Compare and contrast the memory usage of a Microsoft MS-DOS-based appication, a 16-bit Windows-based appication, and a 32-bit Windows-based appication operating in Windows 95 You might reca the od wives tae that a bride shoud wear "something od, something new, something borrowed, something bue" to ensure a happy marriage. Windows 95 is simiar to that bride s wedding appare. It has features and capabiities of the oder versions of both DOS and Windows. Windows 95 incudes many great new features that were not present in previous versions of either DOS or Windows. Windows 95 borrows heaviy from the 32-bit architecture of Windows NT. Finay, Windows 95 wi not make you bue when you re trying to run most of your oder DOS and 16-bit Windows appications. This chapter gives you an overview of the architecture of Windows 95, and how Windows 95 manages memory. In this chapter, you wi earn about the foowing: Windows 95 System Services Windows 95 virtua machines Windows 95 virtua memory Windows 95 task scheduing and mutitasking Windows 95 interna messaging Appication memory usage comparison Understanding Ring 0 and Ring 3 Windows 95 uses an Inte 386 or better processor to support mutipe priviege eves for executabe code. Of the four eves, or "rings," in the Inte 386 protection mode, Windows 95 uses Rings 0 and 3. These rings provide different eves of protection and privieges. The ower the ring number, the higher the eves of protection and privieges. Figure 2.1 iustrates the ayout of the ring architecture for Windows 95. Components of Windows 95 are divided between Ring 0 and Ring 3 code. Each ring offers a different eve of system protection. The Ring 0 code is protected by the Inte processor architecture and consists of a the ow-eve operating System Services, such as the Fie Management subsystem and the Virtua Machine fie://i:\chapters\z\zc676.htm 3/21/01

2 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 2 of 13 Manager subsystem. The Ring 3 code is protected from other running processes by protection services provided in the operating system. The Ring 3 code runs the System Virtua Machine and any Virtua DOS Machines. FIGURE 2.1 The ring architecture of Inte 386 or better processors. Ring 0 components are protected by the processor architecture. The processor prevents the component code from writing over another existing component s code. These Ring 0 components are the core eements of Windows 95. They can run a privieged operations, incuding direct communication with the hardware components. They have access to the entire computer system. A bad component in Ring 0 can bring down the computer system; therefore, every component running in Ring 0 needs to be extremey reiabe. A of the ow-eve Windows 95 core components run in Ring 0. Ring 3 components have no processor protection; the operating system must provide protection for Ring 3 components. Ring 3 components cannot write to the hardware components. They must communicate to a Ring 0 process to write to a hardware component. A bad appication component in Ring 3 does not necessariy bring down the computer system. Usuay you can recover from any probems associated with a Ring 3 component by simpy cosing that component. Appications and non-critica System Services of Windows 95 components run on Ring 3. Windows 95 Components Understanding how the various components of an operating system, such as Windows 95, fit together can be difficut. The Windows 95 Resource Kit and the New Riders book Inside Windows 95 provide better reference materia on this subject. This section provides some perspective on Windows 95 components. Figure 2.2 contains a diagram of the Windows 95 components that run in both Ring 0 and Ring 3 of the Inte 386 protection mode. Ring 3 hosts the virtua machines (VMs) in which MS-DOS, Windows 16-bit, and Windows 32-bit appications execute. The MS-DOS appications a run in separate VMs, known as Virtua DOS Machines (VDMs). A Windows appications, whether Windows 16-bit or 32-bit, execute in the System VM. The System VM aows mutipe concurrent appications to run. Whereas a Windows 32-bit appications are isoated in private address spaces, a the active Windows 16-bit appications share a singe, common address space. These appications are managed by the Virtua Machine Manager (VMM) in Ring 0. As a resut, the Windows 16-bit appications operate much as they do under Windows 3.1, where they are cooperativey mutitasked. Windows 32-bit and MS-DOS appications are preemptivey mutitasked. (See Chapter 1, "Panning and Instaation," for a discussion of cooperative and preemptive mutitasking.) The centra components of the Windows graphica environment aso run as System Services. These incude Kerne, GDI, and User. The next section ooks at these System Services in greater detai. FIGURE 2.2 Windows 95 system architecture. Ring 0 hosts both the VMM subsystem and the Fie Management subsystem. The VMM subsystem provides the resources needed for each appication and system process running on the computer, incuding memory management and task scheduing. Virtua Device Drivers (VxDs) are 32-bit, fie://i:\chapters\z\zc676.htm 3/21/01

3 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 3 of 13 protected-mode drivers that manage a system resource, such as a hardware device or instaed software. They aow more than one appication to use the resource at the same time. The Fie Management subsystem features an Instaabe Fie System Manager, which supports mutipe fie systems, such as VFAT, CDFS, and Network redirectors. The Instaabe Fie System Manager aso supports an open fie system architecture, so future fie systems can be added ater. The Bock I/O subsystems are responsibe for the interaction with the physica storage devices. Windows 95 System Services Much of the code within Windows 95 is either new 32-bit code or oder Windows 3.x code rewritten as 32-bit code, rather than 16-bit code. Windows 95, however, is not competey a 32-bit operating system. Windows 95 strikes a baance between three requirements: deivering compatibiity with existing appications and drivers, decreasing the size of the operating system to run on 4 MB of RAM, and offering improved system performance. To provide this baance, Windows 95 uses a combination of both 32-bit and 16-bit code. Windows 95 empoys 32-bit code wherever 32-bit code significanty improves performance without sacrificing appication compatibiity. Existing 16-bit code is retained where it is required to maintain compatibiity, or where 32-bit code woud increase memory requirements without significanty improving performance. A of the I/O subsystems and device drivers in Windows 95, such as networking and fie systems, are fuy 32 bit. A memory management and scheduing components, such as Kerne and Virtua Memory Manager, are 32 bit as we. Figure 2.3 depicts the reative distribution of 32-bit code versus 16-bit code present in each of the Windows 95 System Services. The sizes of the boxes in the figure iustrate the number of ines of code for each 16-bit and 32-bit version of the three System Services fies. Three sets of fies constitute the Windows 95 System Services: Kerne, Graphics Device Interface (GDI), and User: The Kerne (KRNL386.EXE and KERNEL32.DLL) provides base operating system functions, incuding fie I/O services, virtua memory management, appication management, and task scheduing. The GDI (GDI.EXE and GDI32.DLL) contros the graphics operations that create images on the system dispay and other devices, such as printers. The User (USER.EXE and USER32.DLL) creates and maintains windows on-screen and carries out a requests to create, move, size, or remove a window. The User aso handes requests regarding the icons and other components of the user interface. It aso directs input to the appropriate appication from the keyboard, mouse, and other input sources. FIGURE 2.3 Ring 3 System Services. As iustrated, most of the System Services provided by the operating system Kerne are provided as 32-bit code. The remaining 16-bit code consists of hand-tuned assemby anguage, deivering performance that rivas the 32-bit code. Many functions provided by the GDI have been moved to 32- bit code, incuding the spooer and printing subsystem, the font rasterizer, and the drawing operations performed by the graphics DIB engine. Roughy haf of a GDI cas are handed in the 32-bit code. The 16-bit code for GDI contains most of the drawing routines. Much of the window management fie://i:\chapters\z\zc676.htm 3/21/01

4 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 4 of 13 User code sti remains 16-bit to maintain Windows 16-bit appication compatibiity. The Thunk Layer, shown in figure 2.3, makes reference to the term thunking. This specia term describes how 16-bit code components communicate with their 32-bit code component counterparts. The thunking process transates memory addresses between 32-bit cas and 16-bit cas. A sight performance degradation occurs in the transation, athough it is hardy noticeabe. In genera, the 32-bit code is provided in Windows 95 to maximize the performance and reiabiity of the system. The 16-bit code baances the requirements for reducing the size of the operating system whie maintaining compatibiity with existing appications and drivers. Windows 95 Virtua Machines A appications and dynamic ink ibrary (DLL) programs run in Ring 3. They execute in a virtua machine (VM), which ooks ike a separate computer from the appication s perspective. A VM is an environment created by Windows 95 to simuate a compete computer, with a the resources avaiabe to a physica computer, such as hard disk controers and a timer. The VMM creates and maintains the virtua machine environments and provides each appication the system resources needed to run the system. The System VM runs the System Services as we as a Windows 32-bit and 16-bit appications. The 16-bit Windows appications a run in a shared, common address space. Each 32-bit Windows appication runs in its own private address space. Each MS-DOS appication runs in its own separate VDM. The Virtua Machine Manager, in addition to creating and maintaining these virtua machines, provides severa key services: Memory Management. Contros the 4 GB of addressabe virtua memory, paging from RAM to the hard disk, and performs memory address transation. This is discussed in the foowing section, "Windows 95 Virtua Memory." Task Scheduing and Mutitasking. Aocates system resources and time to the appications and other processes running on the computer. These are discussed in the section "Windows 95 Task Scheduing and Mutitasking" ater in this chapter. MS-DOS Mode support. For MS-DOS appications that need excusive access to system resources. This specia mode of Windows 95 operations shoud not be confused with the VDM. It is a separate and excusive MS-DOS operating environment, and is discussed further in Chapter 8, "Running Appications." Windows 95 Virtua Memory Windows 95 uses two types of memory: physica and virtua. Most users are famiiar with the amount of RAM, or physica memory, on the computer itsef. As mentioned in Chapter 1, the minimum requirement for RAM on a computer running Windows 95 is 4 MB. The recommended amount of RAM is at east 8 MB. The author even suggests 16 MB of RAM for Windows 95. With Windows 95, the operating system uses a of the avaiabe physica memory on the computer. You can overcome hardware memory imitations through the use of virtua memory. The Windows 95 operating system uses a fat memory mode, which everages off the Inte 386 or fie://i:\chapters\z\zc676.htm 3/21/01

5 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 5 of 13 greater processor s capabiity to hande 32-bit addresses. This fat memory mode provides a ogica address space range of up to 4 GB. Athough current computer hardware does not yet hande up to 4 GB of physica memory, some fie servers can now run with up to 1 GB of RAM. Virtua memory bridges the gap between physica memory and ogica memory. The 4 GB of addressabe space used as virtua memory under the fat memory mode is impemented through the use of RAM and a swap fie. The Windows 95 operating system performs memory management, caed demand paging, whereby code and data are moved in 4-KB pages between physica memory and the temporary Windows 95 swap fie on the hard drive. The Virtua Memory Manager contros paging and maintains a page tabe. The page tabe tes which pages are swapped to the hard drive, which remain in RAM, and to which system process or appication they beong. Appication programs are aocated a virtua memory address space, which is the set of addresses avaiabe for use by that program. Both 32-bit Windows and MS-DOS-based programs are aocated private virtua memory address space. A 16-bit Windows-based programs share a singe, common virtua memory address space. Figure 2.4 shows how Windows 95 aocates the 4 GB of virtua memory to each address space. Each process is aocated a unique virtua address space of 4 GB. The upper 2 GB is shared with the system, whereas the ower 2 GB is private to the appication. FIGURE 2.4 Virtua memory address space aocation. The virtua memory is aocated as foows: KB. If not used for a Virtua DOS Machine (VDM), this memory is made avaiabe for any rea-mode device drivers and terminate-and-stay-resident (TSR) programs. 0-1 MB. In a VDM, this memory is used to execute MS-DOS programs. If a shared, common, 16-bit Windows VM is used, then 16-bit Windows appications operate much as they do under Windows MB. Normay this memory is unused. Windows 95 does not use this space, nor do Windows 32-bit appications. If this memory is needed by 16-bit Windows appications, it is avaiabe. 4 MB-2 GB. This memory is used by 32-bit Windows appications and some 16-bit Windows appications. Each Windows 32-bit appication has its own address space, whereas Windows 16-bit appications a share a common address space. 2-3 GB. This memory is used to run a Core System Service components, shared DLLs, and other shared objects. Those components are avaiabe to a appications. 3-4 GB. This memory is reserved for a Ring 0 components, such as the Fie Management subsystem and the VMM subsystem. Any VxDs are oaded in this address space. Virtua memory and virtua addresses enabe you to have more memory avaiabe to programs than actuay exists on the computer in physica RAM. The Windows 95 swap fie impementation is much improved over that from Windows 3.1. With Windows 3.1, you can have either a temporary or permanent swap fie. Windows 3.1 fie://i:\chapters\z\zc676.htm 3/21/01

6 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 6 of 13 recommends how much hard disk memory to aocate to the swap fie. If the hard-disk controer is compatibe with 32-bit disk access, running 32-bit disk access wi improve performance. A temporary swap fie that does not need to be on contiguous hard disk space is created when Windows 3.1 starts. This same temporary swap fie is reeased when the user exits Windows. Athough a permanent, contiguous swap fie provides better performance than a temporary swap fie, because it is a static fie, hard disk space is not freed up when the user exits Windows. In Windows 95, the swap fie configuration is much easier. The best features of temporary and permanent swap fies are combined through improved virtua memory agorithms and 32-bit access methods. By defaut, Windows 95 uses a dynamic swap fie, which shrinks and grows based on the needs of the operating system and the avaiabe hard disk space. A permanent swap fie has itte benefit in Windows 95. TIP: The best way to ensure swap fie performance is to put the swap fie on a hard disk that has ampe free space so the swap fie can shrink or grow as required. If you have mutipe hard drives, seect the one with the fastest access time as we as the most free space. Windows 95 Task Scheduing and Mutitasking Windows 95 uses a task scheduer to determine the order and priority of processes running on the computer. These processes run as threads. A thread is a unit of executabe code. Each thread has a base priority, which is the priority the thread normay wants to run. MS-DOS appications and 16-bit Windows appications usuay have a singe thread. Newer 32-bit Windows appications can take advantage of running mutipe threads to improve performance. Some tasks within the 32-bit Windows appication can be spun off as separate threads that run concurrenty. Windows 95, ike Windows NT, uses priority eves to hep schedue processes. There are 32 priority eves, ranging from the owest priority eve of 0 to the highest of 31. A thread may have its base priority atered by as much as two eves higher or ower than the origina priority eve. Appications have ow priority; critica system tasks (such as I/O) have high priority. Figure 2.5 iustrates how the two parts of the scheduer process, the primary and secondary scheduer, work. The primary scheduer evauates a thread priorities and gives the thread with the highest priority a time sice of execution time. If two or more threads have the same priority, they re stacked. Each stacked thread is granted a time sice of execution in sequence unti no threads have the same priority. The actua ength of a time sice depends on the configuration of the computer. FIGURE 2.5 Scheduing threads to run. The secondary scheduer can boost the priority of non-executing threads. This priority boost heps prevent threads that have a ower base priority from being bocked from receiving execution time. The secondary scheduer aso adjusts the priority of threads over time to smooth the execution of programs. Windows 95 adjusts threads as foows: Threads waiting for user input (in the foreground) get a priority boost, making the system more responsive. fie://i:\chapters\z\zc676.htm 3/21/01

7 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 7 of 13 Threads competing a vountary wait get a priority boost. A threads periodicay receive a priority boost to prevent them from ocking shared resources needed by higher priority threads. Compute-bound threads get a priority decrease, so that I/O operations are not bocked. The task scheduer is the Windows 95 component responsibe for providing system resources to the appications and other processes. It aso schedues processes in a way that enabes mutipe appications to run concurrenty. This method of concurrent process scheduing is caed mutitasking. Windows 95 uses cooperative mutitasking as we as preemptive mutitasking. With Windows 3.1, appications run concurrenty using cooperative mutitasking. Cooperative mutitasking requires the appication to periodicay check the message queue and cooperativey reease contro of the system to other appications that are running. Appications that do not check the message queue reguary can "hog" CPU cyces and prevent other appications from running. For backwards compatibiity, Windows 95 cooperativey mutitasks Windows 16-bit appications. For Windows 32-bit appications, Windows 95 uses preemptive mutitasking, which aows the operating system to take contro of the processes running at any time. Preemptive mutitasking is a more efficient means of mutitasking. The task scheduer decides which processes acquire contro of the system, preemptivey aocating system resources. The priority of the process itsef is used to hep the scheduer aocate enough execution time for each process. Windows 95 Interna Messaging Windows appications use a message-passing mode to hep contro programs. An event (such as a keyboard entry, mouse movement or cick, the receipt of data by a hardware buffer, and so on) generates an interrupt. Events are converted by the interrupt hander into messages. Windows appications generate messages to request the operating system to perform a function or to pass data to another Windows appication. One botteneck for Windows 3.1 is that it uses ony a singe message queue for a appications. If ony one appication fais to retrieve its messages, the system becomes unstabe and hangs because the other appications are bocked from retrieving their messages. As a resut, the computer ocks up and you must reboot your system. This botteneck does not exist in Windows 95. Athough a singe message queue exists for a Windows 16-bit appications for backwards compatibiity (that is, for appications designed for previous versions of Windows), each Windows 32-bit appication thread has its own private message queue. Figure 2.6 iustrates this new interna messaging structure. The Windows 95 operating system takes messages from the raw input queue and passes them to the appropriate Windows 32-bit appication thread or, if the message is for a Windows 16-bit appication, to the Windows 16-bit subsystem. Therefore, if one of these processes or appications hangs and no onger receives its incoming messages, the other processes are unaffected. FIGURE 2.6 Windows 95 message-passing queue structure. fie://i:\chapters\z\zc676.htm 3/21/01

8 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 8 of 13 For study purposes, remember the foowing: Windows 32-bit appications have a message queue for each thread. Windows 16-bit appications share a common message queue. If a Windows 16-bit appication fais, messages are bocked for a running Windows 16-bit appications unti the faied program is ceared. MS-DOS appications do not use the message-passing design nor do they have a message queue. NOTE: Because WIN16 appications share a common memory address space and a common message queue, if a WIN16 process hangs whie in the foreground, a other WIN16 processes cease to receive messages from the operating system and appear hung. This is due to a fag that is set for WIN16 processes, known as the WIN16 mutex (Mutuay Excusive). Because 16-bit code is considered non-reentrant (it cannot be used by more than one process at a time), a system must be in pace to ensure that no two processes attempt to use the same piece of 16-bit code simutaneousy. Under Windows 95, this is done by enforcing the rue that ony the process that currenty owns the rights to the WIN16 mutex is abe to make requests to 16-bit API functions. When the given process is finished using the 16-bit code, it hands the mutex to the next process. You earn more about the mutex in Chapter 8, "Running Appications." Architectura Evauation This topic area has ony one exam objective. To propery address the objective, however, you need a cear understanding of the Windows 95 system architecture. Tabe 2.1 compares and contrasts the memory usage of a Microsoft MS-DOS-based appication, a 16- bit Windows-based appication, and a 32-bit Windows-based appication operating in Windows 95. Tabe 2.1 Comparing Memory Usage Appication MS-DOS Windows 16- bit Windows 32- bit Memory Usage Each runs in a private Virtua DOS Machine. No message queue. Loaded in the ower 1 MB of virtua memory. A run in a common address space and share a singe message queue. Loaded in the ower 2 GB of virtua memory. Each runs in a private address space, and each thread has its own message queue. Loaded in the 4 MB to 2 GB range of virtua memory. To see how Windows 95 runs appications, see Chapter 8. You aso might want to perform Exercise 2.1 to see how different appications affect the number of virtua machines that execute under Windows 95. fie://i:\chapters\z\zc676.htm 3/21/01

9 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 9 of 13 Exercises Exercise 2.1: Counting Virtua Machines To iustrate the point about how Windows 95 manages virtua machines, foow Exercise 2.1 to count the number of virtua machines running on your Windows 95 computer. 1. From your computer, start Windows If you instaed Windows 95 on your computer with the Typica Setup option, the System Monitor program might not be instaed, because it is an optiona component. To determine whether the System Monitor utiity program is instaed, from the Start menu, choose Programs, Access-ories, System Toos, and then System Monitor. If System Monitor is not avaiabe, you must add it to your computer by foowing these steps: a. From the Start menu, choose Settings, Contro Pane. From the Contro Pane program group, choose the Add/Remove Programs icon. b. Cick on the Windows Setup tab, doube-cick on Accessories, and add a check mark to the System Monitor check box. Press Enter or choose OK. Press Enter or choose OK again to insta the System Monitor. 3. From the Start menu, choose Programs, Accessories, System Toos, System Monitor. The System Monitor utiity program dispays key system information in either a Line Chart, Bar Chart, or Numeric Chart format. 4. Any items previousy seected are dispayed when the System Monitor utiity program starts. When you run the System Monitor utiity program for the first time, the Kerne Processor Usage (%) appears in a Line Chart. 5. You must remove a current items to run this exercise. Highight any items you want to remove, and then from the Edit menu, choose Remove Item. 6. Choose Edit, Add Item to open the Add Item diaog box. From the Category ist, cick on Kerne to dispay the ist of Kerne items. 7. Choose Virtua Machines from the Item ist. If you need an expanation of each item, choose Expain to see that this shows the number of virtua machines present in the system. Press Enter or choose OK to add the item Virtua Machines as a seection. 8. Choose View, Numeric Charts to obtain the number of virtua machines that currenty are active. Normay this vaue is 1, because the Windows 95 computer has just been started. It coud be higher. 9. Open some Windows program appications or the Windows Exporer. Has the number of virtua machines changed? The number of active virtua machines shoud not change when fie://i:\chapters\z\zc676.htm 3/21/01

10 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 10 of 13 Windows programs are started. 10. Start an MS-DOS command prompt by choosing Start, Run to open the Run diaog box, or choose Start, Programs, then MS-DOS Prompt. Has the number of virtua machines changed? It shoud change, because each MS-DOS appication wi start another virtua machine. 11. Start another MS-DOS command prompt, and then a third. What happens to the count of virtua machines after you start each new MS-DOS command prompt? Each time another MS- DOS command prompt is started, the number of virtua machines shoud increase by a count of 1. If the initia count was 1, then starting three MS-DOS command prompts increases the number to Cose a three MS-DOS command prompts. How many virtua machines are currenty active? The count of virtua machines shoud be back down to 1, or the starting number in step 8. Based on what you know about virtua machines, expain why the count changes during the exercise. A of the Windows 16-bit and 32-bit appications run in a singe system virtua machine. But each MS-DOS appication runs in its own Virtua DOS Machine. Opening a new MS-DOS command prompt causes the virtua machine count to increase by one. 13. When you finish viewing the System Monitor utiity information, cose the System Monitor. Review Questions The foowing questions wi test your knowedge of the information in this chapter. For additiona questions, see MCP Endeavor and the Microsoft Roadmap/Assessment Exam on the CD-ROM that accompanies this book. 1. The ring architecture of Inte 386 processes provide different eves of protection and privieges. Windows 95 executes in which two of the foowing rings of the Inte 386 protection mode? Seect the two best answers: A. Ring 0 B. Ring 1 C. Ring 2 D. Ring 3 E. Ring 4 2. Windows 95 is an advanced operating system that takes advantage of the Inte ring architecture. To understand how Windows 95 uses the ring architecture, you need to understand the rings themseves. Which one of the foowing rings of the Inte 386 protection mode offers the most privieges, incuding direct communication with the hardware components? fie://i:\chapters\z\zc676.htm 3/21/01

11 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 11 of 13 A. Ring 0 B. Ring 1 C. Ring 2 D. Ring 3 E. Ring 4 3. You are asked to present an overview of the Windows 95 system architecture, incuding rings. You draw a diagram that points out each ring and its protection eve. Which of the foowing rings of the Inte 386 protection mode offers no processor protection, but instead needs the operating system to provide processor protection? A. Ring 0 B. Ring 1 C. Ring 2 D. Ring 3 E. Ring 4 4. On the diagram you create for the presentation in Question 3, you need to point out where appications run. In which of the foowing rings of the Inte 386 protection mode do the MS- DOS, Windows 16-bit, and Windows 32-bit appications run? A. Ring 0 B. Ring 1 C. Ring 2 D. Ring 3 E. Ring 4 5. Within its System Services, Windows 95 uses a combination of 32-bit and 16-bit code to run appications. In which of the foowing rings of the Inte 386 protection mode do the System Services run? A. Ring 0 B. Ring 1 C. Ring 2 D. Ring 3 E. Ring 4 6. Windows 95 runs appications in Virtua Machine. The Virtua Machine Manager is used to manage these appications. In which of the foowing rings of the Inte 386 protection mode does the Virtua Machine Manager run? A. Ring 0 B. Ring 1 C. Ring 2 D. Ring 3 E. Ring 4 fie://i:\chapters\z\zc676.htm 3/21/01

12 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 12 of Which of the foowing components make up System Services? Seect the three best answers: A. User B. Thunk C. GDI D. GUI E. Kerne 8. John runs severa appications at once on his Windows 95 computer. Which of the foowing appications do not run in separate, private, virtua machines? A. Windows 32-bit B. Windows 16-bit C. MS-DOS D. A of the above E. None of the above 9. The Virtua Machine Manager provides severa services, incuding memory management, task scheduing, and DOS mode support. Every time you open an MS-DOS appication, the count of the number of virtua machines running under Windows 95. A. decreases by two B. decreases by one C. stays the same D. increases by one E. increases by two 10. Windows 95 uses two types of memory: physica and virtua. Virtua memory is comprised of which two of the foowing components? Seect the two best answers: A. ROM B. RAM C. VMM D. A swap fie E. A page tabe 11. For what is the 16-bit Windows mutex used? A. It protects a non-reentrant area of code from being preempted by a 16-bit process at potentiay disastrous points. B. It provides a ayer between the virtua memory space and between MS-DOS and 16- bit appications. C. It provides system resources for the appications and other processes. D. It hosts the virtua machines in which MS-DOS, Windows 16-bit, and Windows 32- bit appications run. fie://i:\chapters\z\zc676.htm 3/21/01

13 MCSE Training Guide: Windows Ch 2 -- Architecture and Memory Page 13 of 13 Review Answers 1. A D 2. A C E 3. D 4. D 5. D 6. A 7. A 8. B 9. D 10. B D 11. A fie://i:\chapters\z\zc676.htm 3/21/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Bridge Talk Release Notes for Meeting Exchange 5.0

Bridge Talk Release Notes for Meeting Exchange 5.0 Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief

More information

CSE120 Principles of Operating Systems. Architecture Support for OS

CSE120 Principles of Operating Systems. Architecture Support for OS CSE120 Principes of Operating Systems Architecture Support for OS Why are you sti here? You shoud run away from my CSE120! 2 CSE 120 Architectura Support Announcement Have you visited the web page? http://cseweb.ucsd.edu/casses/fa18/cse120-a/

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that

More information

Insert the power cord into the AC input socket of your projector, as shown in Figure 1. Connect the other end of the power cord to an AC outlet.

Insert the power cord into the AC input socket of your projector, as shown in Figure 1. Connect the other end of the power cord to an AC outlet. Getting Started This chapter wi expain the set-up and connection procedures for your projector, incuding information pertaining to basic adjustments and interfacing with periphera equipment. Powering Up

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

Chapter 3: Introduction to the Flash Workspace

Chapter 3: Introduction to the Flash Workspace Chapter 3: Introduction to the Fash Workspace Page 1 of 10 Chapter 3: Introduction to the Fash Workspace In This Chapter Features and Functionaity of the Timeine Features and Functionaity of the Stage

More information

Infinity Connect Web App Customization Guide

Infinity Connect Web App Customization Guide Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded

More information

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing

More information

Quick Start Instructions

Quick Start Instructions Eaton Power Xpert Gateway Minisot (PXGMS) UPS Card Quick Start Instructions Ethernet 10/100 Status DHCP EMP + - CMN 100 Act Ident Power PXGMS UPS Restart TX Setup RX Package Contents Power Xpert Gateway

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

NCH Software Express Delegate

NCH Software Express Delegate NCH Software Express Deegate This user guide has been created for use with Express Deegate Version 4.xx NCH Software Technica Support If you have difficuties using Express Deegate pease read the appicabe

More information

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies.

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies. Chapter 3: KDE Page 1 of 31 Chapter 3: KDE In This Chapter What Is KDE? Instaing KDE Seecting KDE Basic Desktop Eements Running Programs Stopping KDE KDE Capabiities Configuring KDE with the Contro Center

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Midterm Review

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Midterm Review CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Midterm Review Overview The midterm Architectura support for OSes OS modues, interfaces, and structures Processes Threads Synchronization Scheduing

More information

NCH Software Spin 3D Mesh Converter

NCH Software Spin 3D Mesh Converter NCH Software Spin 3D Mesh Converter This user guide has been created for use with Spin 3D Mesh Converter Version 1.xx NCH Software Technica Support If you have difficuties using Spin 3D Mesh Converter

More information

Hour 3: Linux Basics Page 1 of 16

Hour 3: Linux Basics Page 1 of 16 Hour 3: Linux Basics Page 1 of 16 Hour 3: Linux Basics Now that you ve instaed Red Hat Linux, you might wonder what to do next. Whether you re the kind of person who earns by jumping right in and starting

More information

COS 318: Operating Systems. Virtual Memory Design Issues: Paging and Caching. Jaswinder Pal Singh Computer Science Department Princeton University

COS 318: Operating Systems. Virtual Memory Design Issues: Paging and Caching. Jaswinder Pal Singh Computer Science Department Princeton University COS 318: Operating Systems Virtua Memory Design Issues: Paging and Caching Jaswinder Pa Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Virtua Memory:

More information

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0 IBC DOCUMENT SA/STA SERIES User's Guide V7.0 Page 2 New Features for Version 7.0 Mutipe Schedues This version of the SA/STA firmware supports mutipe schedues for empoyees. The mutipe schedues are impemented

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

1. INTRODUCTION 1.1 Product Introduction 1.2 Product Modes 1.3 Product Package 1.4 Network Printing Architecture 1.5 Network Printing Environment 1.6

1. INTRODUCTION 1.1 Product Introduction 1.2 Product Modes 1.3 Product Package 1.4 Network Printing Architecture 1.5 Network Printing Environment 1.6 Links for mode 504058 (1-Port UTP/BNC Parae Pocket Print Server): Downoads & inks http://www.inteinet-network.com/htm/d-pserver.htm This manua http://inteinet-network.com/mk2/manuas/502993_manua.zip Instructions

More information

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup Specia Edition Using Microsoft Office 2000 - Chapter 7 - Sharing Documents Within a.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Office 2000-7 - Sharing

More information

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5 LCD Video Controer LCD Video Controer Introduction... 3 Safety Precautions... 4 Indentifying the Components... 5 Main Board... 5 Main Board ASIC Features... 6 LVDS Transmitter... 8 Backight Inverter...

More information

User s Guide. Eaton Bypass Power Module (BPM) For use with the following: Eaton 9155 UPS (8 15 kva)

User s Guide. Eaton Bypass Power Module (BPM) For use with the following: Eaton 9155 UPS (8 15 kva) Eaton Bypass Power Modue (BPM) User s Guide For use with the foowing: Eaton 9155 UPS (8 15 kva) Eaton 9170+ UPS (3 18 kva) Eaton 9PX Spit-Phase UPS (6 10 kva) Specia Symbos The foowing are exampes of symbos

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition MCSE TestPrep SQL Server 6.5 Design & Impementation - Data Definition Page 1 of 38 [Figures are not incuded in this sampe chapter] MCSE TestPrep SQL Server 6.5 Design & Impementation - 3- Data Definition

More information

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia: OWNER S MANUAL

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia:   OWNER S MANUAL Guardian 365 Pro App Guide For more exciting new products pease visit our website: Austraia: www.uniden.com.au OWNER S MANUAL Privacy Protection Notice As the device user or data controer, you might coect

More information

Operating Avaya Aura Conferencing

Operating Avaya Aura Conferencing Operating Avaya Aura Conferencing Reease 6.0 June 2011 04-603510 Issue 1 2010 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Advanced Memory Management Advanced Functionaity Now we re going to ook at some advanced functionaity that the OS can provide appications using

More information

AgreeYa Solutions. Site Administrator for SharePoint User Guide

AgreeYa Solutions. Site Administrator for SharePoint User Guide AgreeYa Soutions Site Administrator for SharePoint 5.2.4 User Guide 2017 2017 AgreeYa Soutions Inc. A rights reserved. This product is protected by U.S. and internationa copyright and inteectua property

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Graphical User Interface Manual

Graphical User Interface Manual DALF 1; Rev F Motor Contro Board Graphica User Interface Manua Revision 1.0.0 Feb 18, 2008 Embedded Eectronics Page 1 2/19/2008 Tabe of Contents 1 GUI APPLICATION OVERVIEW...3 1.1 COMMUNICATION...3

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Basic segmentation from CT: proximal femur

Basic segmentation from CT: proximal femur Chapter 7 Basic segmentation from CT: proxima femur This tutoria wi demonstrate how to import DICOM data from a CT scan of a dry cadaveric femur and appy different fiters and segmentation toos. 7.1 What

More information

Data Management Updates

Data Management Updates Data Management Updates Jenny Darcy Data Management Aiance CRP Meeting, Thursday, November 1st, 2018 Presentation Objectives New staff Update on Ingres (JCCS) conversion project Fina IRB cosure at study

More information

Avaya one-x Mobile Pre-Installation Checklist

Avaya one-x Mobile Pre-Installation Checklist Avaya one-x Mobie 18-602133 Issue 1 November 2007 Avaya one-x Mobie November 2007 1 00A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

If your PC is connected to the Internet, you should download a current membership data file from the SKCC Web Server.

If your PC is connected to the Internet, you should download a current membership data file from the SKCC Web Server. fie:///c:/users/ron/appdata/loca/temp/~hhe084.htm Page 1 of 54 SKCCLogger, Straight Key Century Cub Inc. A Rights Reserved Version v03.00.11, 24-Oct-2018 Created by Ron Bower, AC2C SKCC #2748S SKCCLogger

More information

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4.

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4. If/ese & switch Unit 3 Sections 4.1-6, 4.8-12, 4.14-15 CS 1428 Spring 2018 Ji Seaman Straight-ine code (or IPO: Input-Process-Output) So far a of our programs have foowed this basic format: Input some

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

Oracle Data Relationship Management

Oracle Data Relationship Management Orace Data Reationship Management Orace Data Reationship Steward Orace Data Reationship Management for Orace Hyperion Enterprise Panning Suite Orace Data Reationship Management for Orace Hyperion Financia

More information

NCH Software Express Accounts Accounting Software

NCH Software Express Accounts Accounting Software NCH Software Express Accounts Accounting Software This user guide has been created for use with Express Accounts Accounting Software Version 5.xx NCH Software Technica Support If you have difficuties using

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Predator P User s Guide - 1

Predator P User s Guide - 1 Predator P09-600 User s Guide - 1 2-2017. A Rights Reserved. Desktop Computer Covers: Tower modes This revision: November 2017 V1.00 Important This manua contains proprietary information that is protected

More information

The most up-to-date drivers and manuals are available from the Oki Data Americas web site:

The most up-to-date drivers and manuals are available from the Oki Data Americas web site: PREFACE Every effort has been made to ensure that the information in this document is compete, accurate, and up-to-date. The manufacturer assumes no responsibiity for the resuts of errors beyond its contro.

More information

Avaya Aura Call Center Elite Multichannel Desktop User Guide

Avaya Aura Call Center Elite Multichannel Desktop User Guide Avaya Aura Ca Center Eite Mutichanne Desktop User Guide Reease 6.2.3/6.2.5 March 2013 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

lnput/output (I/O) AND INTERFACING

lnput/output (I/O) AND INTERFACING CHAPTER 7 NPUT/OUTPUT (I/O) AND INTERFACING INTRODUCTION The input/output section, under the contro of the CPU s contro section, aows the computer to communicate with and/or contro other computers, periphera

More information

Avaya Aura Call Center Elite Multichannel Configuration Server User Guide

Avaya Aura Call Center Elite Multichannel Configuration Server User Guide Avaya Aura Ca Center Eite Mutichanne Configuration Server User Guide Reease 6.2.3/6.2.5 March 2013 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Avaya Aura Call Center Elite Multichannel Application Management Service User Guide

Avaya Aura Call Center Elite Multichannel Application Management Service User Guide Avaya Aura Ca Center Eite Mutichanne Appication Management Service User Guide Reease 6.3 October 2013 2014 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts have been made to ensure that the

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.

More information

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Four Circuit 4 Wire Unit With Dante Network Audio Interface

Four Circuit 4 Wire Unit With Dante Network Audio Interface Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information

Adaptive 360 VR Video Streaming: Divide and Conquer!

Adaptive 360 VR Video Streaming: Divide and Conquer! Adaptive 360 VR Video Streaming: Divide and Conquer! Mohammad Hosseini *, Viswanathan Swaminathan * University of Iinois at Urbana-Champaign (UIUC) Adobe Research, San Jose, USA Emai: shossen2@iinois.edu,

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Synchronization: Semaphore

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Synchronization: Semaphore CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Synchronization: Synchronization Needs Two synchronization needs Mutua excusion Whenever mutipe threads access a shared data, you need to worry

More information

Directives & Memory Spaces. Dr. Farid Farahmand Updated: 2/18/2019

Directives & Memory Spaces. Dr. Farid Farahmand Updated: 2/18/2019 Directives & Memory Spaces Dr. Farid Farahmand Updated: 2/18/2019 Memory Types Program Memory Data Memory Stack Interna PIC18 Architecture Data Memory I/O Ports 8 wires 31 x 21 Stack Memory Timers 21 wires

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Contents. Introduction... 1 About the voice messaging system...2

Contents. Introduction... 1 About the voice messaging system...2 Contents CHAPTER.1 Introduction... 1 About the voice messaging system....2 CHAPTER-2 Panning the appication..... 5 dentifying the system manager..... 6 Deciding how to answer cas..... 8 Taioring the automated

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud 7/12/17. Compute. Instance.

Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud 7/12/17. Compute. Instance. Amazon Eastic Compute Coud Compute - The amount of computationa power required to fufi your workoad Instance - Virtua machines - Charged per hour whie running - Virtua Hardware - AMI - Software (appications,

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

B4100 user's guide PREFACE Every effort has been made to ensure that the information in this document is compete, accurate, and up-to-date. The manufacturer assumes no responsibiity for the resuts of errors

More information

ECL Portal. Standardized SCADA solution for ECL Comfort 310. Data sheet. Description

ECL Portal. Standardized SCADA solution for ECL Comfort 310. Data sheet. Description Standardized SCADA soution for ECL Comfort 310 Description The is an effective turnkey SCADA (Supervisory Contro And Data Acquisition) too for professiona users ike service personne of district energy

More information

Simba MongoDB ODBC Driver with SQL Connector. Installation and Configuration Guide. Simba Technologies Inc.

Simba MongoDB ODBC Driver with SQL Connector. Installation and Configuration Guide. Simba Technologies Inc. Simba MongoDB ODBC Driver with SQL Instaation and Configuration Guide Simba Technoogies Inc. Version 2.0.1 February 16, 2016 Instaation and Configuration Guide Copyright 2016 Simba Technoogies Inc. A Rights

More information

Hands-free system (for cellular phone)

Hands-free system (for cellular phone) Hands-free system (for ceuar phone) With navigation system Owners of modes equipped with a navigation system shoud refer to the Navigation System Owner s Manua. Without navigation system This system supports

More information

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events DMS PDMG-RH Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Automatic PD faut cassification High resoution Seectabe UHF fiters and

More information

mobile telephone HD Voice Mobile Telephone GSM Highlights MKII Fully Updated Re-Design HD Voice 7kHz Bandwidth Dante / AES67 Option Highlights GSM

mobile telephone HD Voice Mobile Telephone GSM Highlights MKII Fully Updated Re-Design HD Voice 7kHz Bandwidth Dante / AES67 Option Highlights GSM GS-MPI005HD MKII Broadcaster s Mobie Phone Highights HD Voice 7kHz Bandwidth MKII Fuy Updated Re-Design Coour Touchscreen Handset Interface For Ca Screening Dante / AES67 Option Highights UMTS (3G) Highights

More information

Lecture 3. Jamshaid Yousaf Department of Computer Sciences Cristian college of Business, Arts and Technology Gujranwala.

Lecture 3. Jamshaid Yousaf Department of Computer Sciences Cristian college of Business, Arts and Technology Gujranwala. Lecture 3 Jamshaid Yousaf jamshaid.yousaf@ccbat.com.pk Department of Computer Sciences Cristian coege of Business, Arts and Technoogy Gujranwaa. Overview Importance of text in a mutimedia presentation.

More information

understood as processors that match AST patterns of the source language and translate them into patterns in the target language.

understood as processors that match AST patterns of the source language and translate them into patterns in the target language. A Basic Compier At a fundamenta eve compiers can be understood as processors that match AST patterns of the source anguage and transate them into patterns in the target anguage. Here we wi ook at a basic

More information

Eaton 9315/9390/9395/9395P Fixed Master Sync Control Installation and Operation Manual

Eaton 9315/9390/9395/9395P Fixed Master Sync Control Installation and Operation Manual Eaton 9315/9390/9395/9395P Fixed Master Sync Contro Instaation and Operation Manua Eaton 9315/9390/9395/9395P Fixed Master Sync Contro Instaation and Operation Manua IMPORTANT SAFETY INSTRUCTIONS SAVE

More information

Administering Avaya Web Conferencing

Administering Avaya Web Conferencing Administering Avaya Web Conferencing Reease 5.2 Service Pack 2 October 31, 2012 04-603434 Issue 1 2012 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts have been made to ensure that the information

More information

Computers and processors

Computers and processors T224 Computers and processors Reference manua Author: Mirabee Waker This pubication forms part of an Open University course T224, Computers and Processors. Detais of this and other Open University courses

More information

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7 Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a

More information

Exabyte Tape Drives: Mammoth Technology

Exabyte Tape Drives: Mammoth Technology Exabyte Tape Drives: Mammoth Technoogy January 19, 1999 THIC Meeting at the SEATAC Marriott Seatte WA Key Scharf Exabyte Corp. 1685 38th Street Bouder CO 80301 +1-303-417-7205 emai: key@exabyte.com Mammoth

More information

Distributed Hierarchical Control for Parallel Processing

Distributed Hierarchical Control for Parallel Processing Distributed Hierarchica Contro for Parae Processing Dror G. Feiteson and Larry Rudoph Hebrew University of Jerusaem T he deveopment of operating systems for parae computers has cosey foowed that for seria

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

CylanceOPTICS. Frequently Asked Questions

CylanceOPTICS. Frequently Asked Questions CyanceOPTICS Frequenty Asked Questions Question What is CyanceOPTICS? CyanceOPTICS is an AI driven endpoint detection and response component providing consistent visibiity, root cause anaysis, scaabe threat

More information

User Manual TL-DA18-HD2. 1x8 HDMI 4K Splitter with HDCP 2.2. All Rights Reserved. Version: TL-DA18-HD2_161031

User Manual TL-DA18-HD2. 1x8 HDMI 4K Splitter with HDCP 2.2. All Rights Reserved. Version: TL-DA18-HD2_161031 User Manua TL-DA18-HD2 1x8 HDMI 4K Spitter with HDCP 2.2 A Rights Reserved Version: TL-DA18-HD2_161031 Preface Read this user manua carefuy before using this product. Pictures shown in this manua are for

More information

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006 ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos

More information

Computer Graphics (CS 543) Lecture 9b: Shadows and Shadow Maps. Prof Emmanuel Agu. Computer Science Dept. Worcester Polytechnic Institute (WPI)

Computer Graphics (CS 543) Lecture 9b: Shadows and Shadow Maps. Prof Emmanuel Agu. Computer Science Dept. Worcester Polytechnic Institute (WPI) Computer Graphics (CS 543) Lecture 9b: Shadows and Shadow Maps Prof Emmanue Agu Computer Science Dept. Worcester Poytechnic Institute (WPI) Introduction to Shadows Shadows give information on reative positions

More information