scholarly journals From Geiger-Counters to File Systems: Remote Hardware Access for the Operating Systems Course

2016 ◽  
Vol 12 (09) ◽  
pp. 26 ◽  
Author(s):  
James Wolfer ◽  
William J. Keeler

Operating systems interface between hardware and the user, random numbers are useful for security and simulation, and file systems form the program access to them in a modern operating system.   Blending these items into a remotely accessed infrastructure forms the basis for supporting operating systems projects.  This work describes the hardware, software, and communication infrastructure to support student projects by sharing remote hardware to acquire background radiations events with a Geiger counter, transforming those events into random numbers, and providing those numbers through a custom file system.  Collectively, the hardware and software provide an inexpensive remote laboratory experience for computing students.

Author(s):  
Premchand Ambhore ◽  
Archanam Wankhade ◽  
B.B. Meshram

Today computer systems have become integral part of our life. Its penetration in personal and organizational level has increased rapidly in last couple of years. Majority of data is now present in digital form which includes personal data like photos and videos, government documents, secrete and confidential reports of organizations, etc. This change in technology is also adopted by criminals to perform their illegal activities. Use of computers for performing crimes has increased therefore it has become necessary for investigator to collect and process evidences from suspect’s computer. Windows 7 has become mainstream operating system for users and thus its forensics investigation is becoming important. There are various places in Windows 7 which can be used in forensics analysis; some of the areas of interest are windows registry and the underlying NTFS file system. Registry contains valuable information that can be helpful for the forensics analysis. Registry contains the basic information like date when Operating System installed, owner name and the advanced information such as the software installed on system, history of recently used documents and so on, which will help the analyst to decide the way of further analysis of system depending on the its environment. The NTFS file system is native file system for Microsoft’s Windows 7 which is used to manage files present on disk. Suspect can hide data in the file system using its Alternate Data Streams feature. He/She can also remove evidence present on disk by deleting files containing evidences. It is important for forensic investigator to get back the evidences from hidden and deleted files by suspect. In this paper we have proposed and implemented tool that will be useful for performing forensics analysis of windows 7 registry, underlying NTFS file systems Alternate Data Streams and recovery of deleted files. This tool will helps in saving efforts and time of investigator in its investigation.


Author(s):  
Khushbu Goyal ◽  
Karan Raj Singh Ranawat ◽  
Nirjara Nayak

Today in a computer era there are two most used operating systems i.e. Windows and Linux. Windows is famous for its easy to use interface. Linux, on the other hand provides a ton of inbuilt functionalities to automatize task. To understand which one is superior we are going to compare them on grounds of kernel architectural differences, memory management, respective file systems and CPU scheduling task. These are standard bench-marks on which we are contrasting the internal working of an operating system. Linux and Windows vary in price, viewpoint and adaptability, with both in quest to stabilize in their present flaws.


2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Roberto Rodriguez-Zurrunero ◽  
Ramiro Utrilla ◽  
Elena Romero ◽  
Alvaro Araujo

Wireless Sensor Networks (WSNs) are a growing research area as a large of number portable devices are being developed. This fact makes operating systems (OS) useful to homogenize the development of these devices, to reduce design times, and to provide tools for developing complex applications. This work presents an operating system scheduler for resource-constraint wireless devices, which adapts the tasks scheduling in changing environments. The proposed adaptive scheduler allows dynamically delaying the execution of low priority tasks while maintaining real-time capabilities on high priority ones. Therefore, the scheduler is useful in nodes with rechargeable batteries, as it reduces its energy consumption when battery level is low, by delaying the least critical tasks. The adaptive scheduler has been implemented and tested in real nodes, and the results show that the nodes lifetime could be increased up to 70% in some scenarios at the expense of increasing latency of low priority tasks.


2012 ◽  
Vol 263-266 ◽  
pp. 1979-1986
Author(s):  
Qiang Li ◽  
Li Gu Zhu ◽  
Sai Feng Zeng

Updates discovery is the key problem of data synchronization; it has been used to generate updates operations. The traditional algorithms ignore the modify semanteme, cause the updates operations increased. A new file updating discovery algorithm that supports semantic synchronization is proposed in this paper. The algorithm takes advantage of semantic info, which preserved in file system journal, to accurately recognize users originally modify intents. We take the NTFS file system as an example to realize and test the new algorithm. By comparison, the algorithm effectively reduces synchronization requests. Experiments show that, the algorithm cans timely respond to users’ modification and support massive file changes that occurred in short time. The algorithm is designed based on the basic features of file system journal, and can be applied to other file systems.


2020 ◽  
Vol 3 (2) ◽  
pp. 163-168
Author(s):  
Ruri Ashari Dalimunthe ◽  
Riki Andri Yusda ◽  
William Ramdhan

Abstract: Community service activities entitled "Installation of Operating Systems Based on Windows 10" aims to provide information to students from MAN Asahan about Installing Windows Operating Systems. The method used in this activity is a direct observation of the MAN Asahan school by watching and analyzing the problems or troubleshooting that occurs at the Computer Lab at MAN Asahan. In addition, information on problems in the computer Labs of the school was also carried out by a team of lecturers as the perpetrators of this community service by way of direct interviews with the Teachers and employees who served in the Computer Lab of the MAN Asahan school. The end result of this dedication is how students can repair computers, as well as troubleshooting that occurs on school computers and computers at home, can be overcome alone without having to use computer repair services.Keywords: installation; operating system; Windows 10 Abstrak: Kegiatan pengabdian kepada masyarakat yang diberi judul “Instalasi Sistem Operasi Berbasis Windows 10” bertujuan untuk memberikan informasi kepada siswa dan siswi MAN Asahan tentang Instalasi Sistem Operasi Windows. Metode yang digunakan dalam kegiatan ini adalah observasi langsung ke sekolah MAN Asahan dengan melihat serta menganalisa permasalahan ataupun troubleshooting yang terjadi pada Laboratorium Komputer disekolah MAN Asahan. Selain itu, Informasi permasalahan pada komputer Lab sekolah juga dilakukan tim dosen selaku pelaku kegiatan pengabdian ini dengan cara wawancara langsung kepada Guru dan pegawai yang bertugas di Lab Komputer sekolah MAN Asahan. Hasil akhir dari pengabdian ini adalah bagaimana siswa dan siswi dapat memperbaiki komputer serta troubleshooting yang terjadi pada komputer sekolah maupun komputer dirumah dapat teratasi sendiri tanpa harus memakai jasa perbaikan komputer. Kata kunci: instalasi; sistem operasi;  windows 10


2021 ◽  
Vol 17 (3) ◽  
pp. 1-25
Author(s):  
Bohong Zhu ◽  
Youmin Chen ◽  
Qing Wang ◽  
Youyou Lu ◽  
Jiwu Shu

Non-volatile memory and remote direct memory access (RDMA) provide extremely high performance in storage and network hardware. However, existing distributed file systems strictly isolate file system and network layers, and the heavy layered software designs leave high-speed hardware under-exploited. In this article, we propose an RDMA-enabled distributed persistent memory file system, Octopus + , to redesign file system internal mechanisms by closely coupling non-volatile memory and RDMA features. For data operations, Octopus + directly accesses a shared persistent memory pool to reduce memory copying overhead, and actively fetches and pushes data all in clients to rebalance the load between the server and network. For metadata operations, Octopus + introduces self-identified remote procedure calls for immediate notification between file systems and networking, and an efficient distributed transaction mechanism for consistency. Octopus + is enabled with replication feature to provide better availability. Evaluations on Intel Optane DC Persistent Memory Modules show that Octopus + achieves nearly the raw bandwidth for large I/Os and orders of magnitude better performance than existing distributed file systems.


Author(s):  
Adnan Hajar

The use of traditional approaches to teach Operating Systems usually lacks the visual aspect. The following research investigates the novel use of DEVS (Discrete Even Visualization and Simulation) in simulating the operation of an operating system. Cd boost++ was the framework of choice for this project. The simulation successfully mimicked the work of an operating system by simulating multiple cycles of program requests. This simulation is capable of further enhance the explanation of how an operating system works. The cases studied in this work include: 1- two processes running concurrently doing multiple IO’s, 2-four processes running concurrently based on a first come first serve scheduling algorithm, and 3- 20 processes running concurrently using highest priority scheduling algorithm. Output observation of the last case show promising results of successful use of DEVS and cd boost++ as a framework to build an operating system.


Author(s):  
Ritu Sharma

Technology is being used and improved by human beings over a long period of time now and Smartphones is one of them. Smart Phones contain touch screen, built in keyboard, high resolution camera, front side camera for video conferencing, etc. They are used for making and receiving calls, sending and receiving messages, accessing the Internet, digital media, incorporating audio/video recording etc. Different smart phones have different operating systems and mobile applications are developed for each operating system in smart phones, tablet or mobile phones, in order to serve the needs of the user. These apps are either preinstalled or downloadable from online app market that can do almost everything. Apps make a mobile be like a portable computer having multi core processors, gigabytes of memory and a real operating system. Originally mobile apps were made available for only calling, messaging and informational purposes like calendar, weather forecast, e- mail, etc. With improvement in technology and increase in user demands, developers started making apps for other purposes like games, banking, video chats etc. Some apps are also used to present data in the same format as on a computer website and also allow you to download content that you can use when there is no Internet. There are many apps available in market today for different Operating Systems in which Android is having the maximum market share these days.


2019 ◽  
Vol 3 (9) ◽  
pp. 283-289
Author(s):  
Shuchi Sukul ◽  
Goldy Rathee ◽  
Parimal Anand ◽  
Sakshi Kataria ◽  
Pratibha Taneja

OBJECTIVES: The present research was conducted to assess incidences of root microcracks caused by hand and rotary file system at different lengths MATERIAL AND METHODS: This in-vitro study was undertaken to assess incidence of root microcracks caused by hand and rotary file system at different lengths In total, 100 the mandibular premolar with straight roots determined with intact, fully formed apices were taken. Samples were randomly distributed into 5 groups based on the file system used: a) Group A: Control, b) Group B: Reciproc, c) Group C: WaveOne, d) Group D: One Shape and e) Group E: ProTaper. Pearson Chi-square test was used to determine the differences between groups. The dentinal defects were expressed as percentage of samples with microcracks in each group. Level of statistical significance was set at p-value less than 0.05. RESULTS: The chi square test was used to compare the Distribution of the number of teeth in which cracks were observed on the horizontal sections. It was found to be significant with group ProTaper showing maximum cracks at 3,6,9 mm level as compared to other file systemCONCLUSION: Nickel-titanium instruments causes cracks on the apical root surface or in the root canal wall. ProTaper causes maximum dentinal cracks as compared to other file systems


2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


Sign in / Sign up

Export Citation Format

Share Document