Comparison of Galaxy S III vs iPhone 4S vs HTC One X

The battle in the mobile market is sure to be a class above the more intense after the presence of Samsung Galaxy S III.

Samsung Officially Launches Galaxy S III

After a long wait, finally Samsung officially unveils Galaxy S III. Android's latest generation of South Korean vendor will soon be visited Europe and Asia followed this by the end of May 2012.

New Nokia Photo Samples from 808 PureView, Wow

For those of you who are interested to buy Nokia 808 Pureview, it's good to see the first images captured using a camera phone. This time the sample photos of the 41MP camera has been obtained through Nokia's official Flickr account.

Samsung: Planning for Windows Phone 8 Smartphone with Base Galaxy S III?

Windows Phone 8 is still not officially announced, but rumors about the smartphone vendors who are making phones with the operating system in it keeps popping up. WP-Life.com this time claiming that they heard the initial details about plans for a product Samsung Windows Phone 8.

6 Expected Features Available on the iPad Mini

Re hot news comes from a family line of iPad. Apple rumored to be making a new tablet with a 7 inch size with a price tag in the range of USD 200. This was done to compete with the Kindle Fire.

Auto FX Photo Graphic Edges 7.0 Platinum Edition

Photo/Graphic Edges 7.0 is a suite of professional software for adding edges, frames and borders to enhance your photos.??The new Platinum Edition now includes an amazing collection of Film frames, darkroom effects, grunge edges, natural media borders, and dozens of other new styles with over a thousand pieces of new creative content. An improved preview and rendering system along with an updated interface make the Platinum Edition software a breeze to use.

New Improved Interface
The new interface design includes a streamlined workflow with larger content previews, reorganized content collections, and a new favorites feature.

New Content Collections
The Platinum Edition release represents the best collection of frames, edges and borders in the world.

Hundreds upon hundreds of new creative frames, edges and borders have been added to the collections included with this amazing new release.

New Storyboards and Photo Layouts
Quickly frame and edge photos using accents, grunge overlays, blends, textures and mood lighting to create a perfect layout setting.

All New Preset Effects
Over 300 new pre-made photo layouts and instant effect presets are included with the Platinum Edition.

You can also design your own presets and save them so you can apply them to other photos later.

Combine Effects Using Effect Layers
Stack different effect layers together to make new looks - change the blending opacity and stacking order and dynamically change any setting you like.

Brush on Effects
Get exactly the look you're after with powerful brush on effects.

Photo/Graphic Edges Platinum Edition
Photo/Graphic Edges Platinum Edition gives you a huge selection of creative content and is a great value for enhancing your photos. With thousands of edges, frames, borders and the powerful new effects in this professional suite, you'll find great value in owning this software.

System Requirements:

OS: OS 10.4 and higher / PPC or Intel
Memory: 2 GB
Disk Space: 4 GB
Photoshop Support: CS, CS2, CS3, CS4 and CS5

Usefulness Version of Windows 7

Windows 7 Starter Edition:
This version is only offered pre-installed by OEMs (Original Electronic Manufacture). Therefore it will only be available through the OEM channel, on a new PC computers only certain types.

Windows 7 Home Basic:
This version will be provided only to developing countries, where consumers want a Windows version for beginners.

Windows 7 Home Premium:
Windows 7 Home Premium is one of the recommended options to consumers, as claimed Microsoft will provide full functionality. This version, according to Microsoft, providing a rich visual experience, suitable for entertainment, also allows users to make connections with other devices.

Windows 7 Professional:
This version is recommended for small-scale companies and for people who work at home but must have a business environment where security and productivity is vital. For those who have been using Windows Vista Business, according to Microsoft, should be 'moved' to this version.

Windows 7 Ultimate:
This version is for the fans of the computer (PC enthusiast) who want all the features of Windows 7, including security features like BitLocker provided by Windows 7 Enterprise Edition.

Windows 7 Enterprise:
This version is also available as an Enterprise edition, Microsoft's annual customer to be bound Software Assurance agreement. This edition will not be available in the retail market or on a new computer in the OEM channel. It includes various features to businesses such as data protection, PC management tools, and other features designed to reduce corporate costs.

Some Early Weakness Windows 7 Phone

As a new platform, Windows 7 Phone surely has some features that are less than the maximum. When tried, detikINET found some things lacking this OS that is the issue of copy paste, multitasking issues, as well as cameras.
Like the iPhone when first released, Windows 7 Phone also has problems to copy and paste feature. When typing a document via detikINET Office, the file can not be typing it in the copy-paste. Inability Copy Paste in applications that run on Windows 7 Phone this had on the mat delivered Microsoft MIX10 in Las Vegas, United States.

Copy-Paste Problem
In addition, similar to that done Apple on the iPhone, applications that run on Windows 7 Phone will be restricted within a limited scope (the sandbox). Microsoft will use an application store that enables third party developers filed their application to run on phones based on WP7.
Here are some weakness around the features of WP7 are quoted from WMExperts, Friday (26/11/2010):

    
* Third-party applications running in a sandbox, unable to access the Copy, Cut and Paste could not multitasking.
    
* Multitasking can be done by the default application, third-party applications can use the notification system.
    
* Silverlight will run on WP7 but not in Internet Explorer in the WP7.
    
* Distribution of third-party applications to go through the Marketplace, according to Microsoft's approval.

Multitasking Third Party Constraints
Well, initially WP7 about multitasking is a bit annoying. When detikINET try Twitter, Facebook or some other third party applications, live updates will be closed if the application is closed.
So for example we press the homescreen, up which we have not come back to the beginning. Things like this still happens in some applications in the Marketplace (store Windows applications).

Windows 7 Phone Camera Not Optimal
Microsoft has strict rules in terms of design, which requires all devices Windows 7 Phone has a good camera. One of the conditions, the camera must be at least 5 megapixels.
Unfortunately, the operating system (OS) software giant's latest mobile turns out to restrict camera access to a variety of applications. Thus, developers can not fully utilize the camera function.
As quoted from Cnet, on Friday (26/11/2010), although Windows 7 Phone device can record and upload videos and images, say developers can not use image sensors to do other fun things like video chat and augmented reality.
Maybe it's a bit true. When tested detikINET, users can not press the shutter button on the touch screen by the withdrawal of Android phones.
However, nothing is perfect in this world. The critics point out there are some important things that Microsoft's forgotten in this new mobile OS. Limitations on camera functions, copy-paste, and multitasking are just some things that come back to draw public attention to the presence of Windows Phone 7. I hope Microsoft fix it immediately.

Getting to know Windows 7 Phone - Microsoft Ecosystem IN HAND

Windows 7 Phone is designed to unify all of Microsoft's ecosystem is in a grip. We can type via Office, send an email via Outlook, enjoy multimedia content with the Zune, play games via Xbox Live and so on. In addition, Microsoft by default uses the Internet Explorer browser and search mesing Bing.
The first is Microsoft Office that comes with a fresh design. WP7 mobile office is indeed still a major constraint regarding the issue of copy-paste.
Users are already accustomed to using Microsoft Office would not take long to adapt. In the hub of Office, users can directly access Word, Excel, Power Point and One Note in a screen that is responsive. So also with Outlook, users will be able to synchronize their Outlook.
Both are about the Zune. For those not familiar, the Zune is a multimedia entertainment portals, like Apple's iTunes. Zune can be accessed either from within the handset WP7, or from a PC via synchronization with installing the Zune software first.
In the Zune, users can select options: music, videos, podcasts, radio, and the marketplace. Music and Video contains the personal collection of songs and videos that have been stored into the phone. Just like other products, while a song is played, the phone will automatically search for the artist's image to be used as background. For those who love to shop online music, come up to the Marketplace, downloaded songs will automatically stored in our Zune.
The latter is the closet game called Xbox Live. Xbox Live contains a collection of games that have been downloaded on our cell phones. The application also provides a pretty funny avatar gadgets, as well as Xbox Live Extras that allow us to interact with other Xbox users.
One important point to note in Xbox Live, Microsoft seems very serious in bringing this gaming platforms to their mobile phone. Evidently some games that simply demand is a paid version. Even most games in Xbox Live is not like the paid version of Android.
DetkINET chance to try out some games are quite popular such as: Need For Speed Undercover, futuristic RPG action game The Harvest, The Sims 3, Earthworm Jim HD, and Guitar Hero 5. All games that have graphics tegolong class 'heavy', and is a serious game (not a light game like Angry Bird) that make users feel at home for long in front of the HTC 7 Mozart. And Mozart seems to handle well all game.
Unfortunately, all of them are trial versions for Xbox Live payments system has not been support for the Indonesian state. Hopefully Microsoft Indonesia immediately fix it in the future.

PlayStation phone Launched in February 2011?

News about the presence of the PlayStation phone increasingly loud sound. Now the mobile phone designed to play games is reportedly slated for release in February 2011 in accordance with the invitation of the press conference that Sony distributed.
In the invitation received one of the sites mentioned that French technology, Sony has prepared a new product launch event. It is said that this is the most awaited event during the last 10 years.
The same thing also written by Mobile Crunch is quoted on Friday (11/26/2010). PlayStation phone reportedly will carry the display technology used Bravia series.
PlayStation phone, always a hot gossip among the enthusiast and gaming gadget. Previously, the product was also mentioned going to show up on the event Mobile World Congress (MWC) 2011, held in Barcelona, Spain.
Photos that allegedly as a form of mobile phone that also had circulated freely on the internet. But unfortunately, Sony quickly responded by saying the photos are fake

Pursue Android & iPhone, Microsoft Attract 15 Thousand Developer

Smartphone without the application now is like vegetables without salt. No wonder if the vendors try to strengthen themselves in the matter of the application, not least Microsoft is trying hard to promote Windows Phone 7 (WP 7).
Microsoft claims, now or in the early stages, there were 15 thousand developers who create a variety of applications for the WP7. While the number of applications already available in Windows 7 Phone Marketplace reach about 3,000 species.
According to Microsoft, an increasing number of developers as much as 80% have occurred since early September 2010. Inevitably, this makes the giant software vendors are proud of this achievement.
"We saw a 80% increase in registered developers since September, with more than 15 thousand developers interested in providing compelling content on the Windows Phone. We're warming up," according to developer blogs written in WP7.
Indeed, Microsoft needs to act fast. Their opponent really heavy. Apple's application store, the App Store, now it has about 300 thousand applications and the Android MarketPlace around 100 thousand. Still like the earth and sky.
Quoted from detikNeT, Friday (26/11/2010), one of Microsoft's effort to attract developers is the lure of prize phone. It is reported that if the developers buy one phone WP7, they get a free 1 phone

Google Nexus S Using Android Gingerbread

It is widely heard that Google would be holding the handset to create the successor to the Samsung Nexus. Last leaks circulating in cyberspace show, named Nexus S handsets running the Android OS was found to Gingerbread.
As quoted from DetikINET, Friday (11/26/2010), Xda Developers tech site claims to have got the exclusive pictures reveal the Nexus S adopt the Gingerbread. Some of the photos that they show the show is also a form of Nexus S.
"Thanks to the source who chooses to remain anonymous, we got exclusive photos Gingerbread (at Nexus S). We also got some pictures Samsung Nexus S," claims the website.
Honestly, the picture tends to blur even shown a little more show website claims it can be accounted for. Quite clearly visible on the screen handset that used the Android version is 2.3, aka Gingerbread.
Estimates for the Nexus S specification including dual core processors ARMv7 CPU, 512MB or 328MB of RAM and Super AMOLED screen. There has been no confirmation either from Google or Samsung about this handset so that consumers must be looking forward to the truth

Getting to Know Windows 7 Phone

Windows Phone 7 (WP7) have been present at the end of this year. For those who want to buy mobile phones WP7, it's good to listen to these reviews, what is consistent with the character of each user.
The first product that tested detikINET WP7 is HTC 7 Mozart. However, this time we will not discuss about the product, but a new flavor of Windows mobile.
Judging from the initial view, WP7 very different from the Windows Mobile 6.5. There was no impression of WP7 is a mini PC, with Windows XP-style display that can be taken anywhere such as on Windows Mobile earlier.
If we previously had to use Windows Mobile, must have been very surprised with the new look of Windows Phone 7. Logo and design like a mini-PC Windows on Windows mobile phone handset is not encountered again. Instead, the display is made to be very simple with only carry two tab pages.
All primary color display in WP7 Microsoft designed with black colors. Indirectly it will conserve battery power. Users also can change the background display with white color as well.
Actually, Microsoft wants to change the handset in an office attached to Windows Mobile earlier. As a result the look of Windows 7 Phone has mixed in such a way as to have a taste of the new handset as consumer classes, in hopes its new Windows mobile phone embedded in all walks of life.
A bit boring initially. The first page is a homescreen menu, and a second page filled with phone menus. Both are designed extends downward.
When tested detikINET, movement and transition icons Windows 7 Phone IOS is not lost with the iPhone's display. Very smooth and fast, no lag at all. All changes WP7 view this as Microsoft did confirm that suit the needs and current market trends

Windows Phone 7 support for 3000 Applications

Windows 7 Phone which is the Microsoft Mobile operating system version are enjoying the benefits of application developers worldwide. Unmitigated, mobile operating system from Microsoft that has the support of 15 thousand developers who showed interest in building applications for the platform. Windows 7 Phone is slowly taking steps to increase the availability of applications for the platform. The software giant is melaporan about 3,000 applications available today for mobile platforms. The amount is nearly three times the software listed in the Windows Phone Marketplace when first launched last October 21, 2010.
  

 "We're heading into 'shopping week' largest this year and quickly we will offer around 3,000 applications and games on this weekend," writes Todd Brix via its official blog on Windows Phone Developer Blog. He also revealed that the operating system Windows 7 Phone has increased 80% the number of developers who registered since September with more than 15,000 developers who have signaled their intention to bring compelling content to your Windows Phone 7.
In addition, Microsoft also provides details about the different ways in which developers can make their applications more visible. Thus, users will not only find a Windows application phone 7 via Bing, Bing Visual Search Phone Gallery or Windows Marketplace, but they also get the application through the Xbox 360 in Windowsphone.com. Developers can also perform certain steps toward promotion of their applications by adding deep links to their official website. This move will certainly make it easy for users as well as advantages for application developers.

New iOS 4.2 Announced

iOS 4 has been referred to as the "world's most advanced mobile operating system" and Apple is now improving on a system that was thought to be perfect. Their chief executive, Steve Jobs, demonstrated the new operating system at the company's iPod event earlier this year (September).

iPhone, iPad and iPod Touch users will be excited to hear that the software giant has announced the launch of the new iOS 4.2 in two days time (12 November). In the meantime, they have released a teaser for the operating system to iPad and iPhone users.

The excitement surrounding this release is not unfounded - the new iOS 4.2 offers a lot to Apple users; over 100 new "features and innovations" to be more precise. These new features, while specifically targeting iPad customers, will likely benefit all Apple users.

Some of the new features include multitasking capabilities, folders and printing, and much more. The company elaborated on some of these functions:

Multitasking: You'll be able to run all your favourite apps simultaneously and be able to switch between them instantly. This feature won't slow down the performance of the fore-running app or run down the battery unnecessarily.

Folders: You can drag-and-drop your apps into different folders thus making organisational methods much easier. In this way you can access your favourite apps faster while browsing and managing thousands of other apps.

AirPrint: Print your photos, mail, web pages and more. You can send them directly to the printer using a wireless network. There is a rumour flitting around the web that this function has in fact been dropped but it hasn't been confirmed by Apple.

AirPlay: This function allows you to stream photos, videos and music from your iPad to the new Apple TV. You can also stream music to AirPlay receivers or speakers, including AirPort Express.

Some additional key benefits include Game Center which is Apple's social gaming platform for all iOS devices. There is also the updated Mail app which uses a unified inbox, the ability to search and find text in the Safari web browser, enhanced enterprise support, enhanced accessibility, keyboard and dictionary enhancements and more.

The new iOS 4.2 will soon be available not only to iPad users but for iPhone and iPod Touch users worldwide as well.

Ipad education applications, ipad application development

The popular iPad has made education now more fun and an easy learning process. Many people say iPad to be the best platform to promote interactive learning experience and it seems so. There are various custom iPad education applications, which help the teachers to teach the subject in a better way and enable children to learn effectively. Some of the popular educational applications of iPad are ABC Animals, Alphabet Animals, abc pocket phonics, etextbooks, ICDL books for Children, iMotherGoose-Bugs, Kindle for iPhones, See Read Say, Stanza, StoryKit, The Cat in the Hat, weesay ABC, Dragon Dictionary, iWriteWords, Dragon Search, and much more. You might be thinking that may be iPad education application is more suitable for kids. But it is not so. iPad is also used by students in elementary school, high school, colleges, and universities.

The students can easily create presentations, spreadsheets, and even competent documents for their projects/ thesis. The key for iPad education applications, which make iPad a preferred gadget for use in students and teachers, are:

Pages - This is a great word processor with various layout tools. Students can design their document on their own as per their likes. They can create templates for letters, brochures, reports, thesis, etc. To the document, students can use fonts, colors, and textures, add shadows, mask, reflections, beautiful picture frames, align the margin, and add text, pictures, graphics, and tables as well. If they want to take some references from an already existing mail on MobileMe, WebDav, or iDisk, then they can simply do so. Once the document is ready, then students can easily view the document and rectify them to make necessary changes, on the large screen of iPad.

• Keynote - Learners are curious and full of new ideas. They always look forward to tools that can help in actualizing their ideas. By using the keynote application they can create brilliant presentations by including animated charts and good visual effects. By doing so you can learn and have fun. Sounds interesting, right! • Numbers - This "number" application assists the students to do the calculations on tips. By using this application they can play with numbers and make graphs, tables and charts. It will also help in building a spreadsheet, and give them the back - up to say their point strongly.

In addition to this, for iPad over the web applications, there are umpteen e-book applications available. Amongst them Kobo and eBooks are the best. These sites are known for their functionality, features and easy usability. iPad even has Glutenberg Project Catalog (popular digital online library with more than 30,000 free books).

With the help of iPad one gets an access to great learning and presentation center. Easily learners, can now track their assignments, take notes, and even study for their final term paper with much ease. Even they will be in constant touch with their teachers. Teachers/ Mentors can also give necessary instructions, and monitor the progress of their students.

Presently, there are more than 15,000 iPad Education Applications available on the net and from time to time iPad keeps adding more. For regular updates on iPad education applications, contact us at info@softwebsolutions.com.
About the Author

Softweb Solutions a Microsoft Gold Certified Partner and Global IT Solutions Provider having strong performance record in Custom Software Development and expertise in Technology, Financial, Healthcare media sectors offers services like Custom Application Development, website development, software testing and quality assurance with industry-specific software expertise in Technology, Financial, Healthcare media sectors.

Apple Laptops and Its Great Accessories

A laptop is a personal computer that designed for mobile use. It is small and light enough. The laptop integrates most of the typical components of desktop computer including keyboard, display, pointing device or touchpad and speakers. It is powered by main electricity via AC adapter and it can be used away by using a rechargeable battery. This battery stores enough energy to run laptop for 3 to 5 hours.

It depends on the computer usage, power management and configuration settings. Apple Laptop is one of the best recognized laptop in the world. This apple laptop is more popular and it comes with high end hardware and user friendly interface. The Apple Company is more associated with computers and they have been working in the field for long time. The first laptop got released in the year of 1989 which was called Macintosh Portable. Later this came up with more inventions such as the MacBook Pro.

Apple currently offers three products which include MacBook Pro, MacBook Air and standard MacBook. All three products are used for different purpose. The general usage laptop from Apple is the MacBook. This product offers high performance with 2GB memory and a dual core processor from Intel. The latest sports and Nvidia G force model coupled with 256 megabytes of memory. The higher end Apple product line is MacBook Pro and these laptops are extremely powerful. This has sporting 17 inch screens, 4GB memory, desktop replacement quality graphics cards and dual core processors.

The latest models are desktop replacements boasting 512 megabyte G force graphic cards, 17 inch screens, 2.5 GHz dual core processors, 320 GB hard disk and 4 GB of Memory. The common feature of the apple laptop is full protection to all kind of anti virus software. Even the most skilled hackers could not destroy the security of Apple laptops and computer products.

There are quite an impressive number of advantages offered by this Apple computer. Many people are concerned about their compatibility issues. If they move from PC to Macintosh, then they are not able to run most of their old software. Nowadays, it is possible to run windows in a virtual machine with Macintosh. Moreover, the software supplied with Macintosh is extremely user friendly. Apple offers the free laptop accessories often. This offers many accessories like apple power book universal screw driver tool set and Apple iBook universal lens cleaning pen. All these free laptop accessories are very handy to the laptop users and increase the functionality of the laptop.

Good Configuration Dell Vostro 1014 Laptop

Imagine a life without laptop is like imagining it without work. The modern era going advanced; hence the need of advanced gadgets is rising at a faster pace. There is a no doubt to the fact that the computer markets can dish out a lot many choices with respect to laptops and technology gadgets. Today everyone needs to have the best and the most sophisticated gadgets to work upon.

Breaking the bars of competition here comes the new and striking addition to the list of laptop models which is the new and innovative Dell Vostro 1014 Laptop. Simply not an exception to the existing Dell laptops, this new laptop model has emerged as a choice of millions. It is an affordable solution given by Dell featuring good connectivity options and a super fast processor. This gadget is assured to deliver high tech support to the users. Further, talking about its technical specification, it is a system that runs on Intel Core 2 Duo processors. Also, it is set equipped with Wi-Fi that enables easy Internet access.

Users are highly impressed by its 14-inch WLED screen which is energy efficient and adds extra battery life to this gadget. Running on the Genuine Windows® 7 Starter operating system, it has managed to stand leaps and bounds ahead other similar offerings. It is equipped with 2GB Dual-channel DDR2 SDRAM and provides support upto 4 GB. Further this dell laptop has got to feature a 14.0 inch Wide Display HD (1366 x 768) along with anti-glare that ensures its prolonged and safe usage for the users.

This pick from dell laptops is instilled with 250GB 5400RPM SATA Hard Drive along with an optical device of 8X max DVD+/-RW Drive boasting DVD+R double layer write capability. Moreover, users get hold of a Mobile Intel® Graphics Media Accelerator X4500MHD that facilitates its advanced and convenient usage. It is absolutely portable with sleek dimension of 13.4″ / 340mm x 0.98-1.4″ / 25.0-35.6mm x 9.6″ / 242.5 having a mass of 4.61lbs/2.1kg.

Its lightweight makes it good for mobile use and its good looks make it an enviable possession for one. Further, this device has a cordless free environment along with optional bluetooth keyboard and mouse. This laptop model is equipped with 5-in-1 media card reader and bluetooth connectivity for wireless keyboard, mouse and a headset. The dell laptop price is set reasonable and gives you what it is meant for. Overall it can be said that it pays back good value for money.

CMIP vs. SNMP : Network Management

Imagine yourself as a network administrator, responsible for a 2000 user network. This network reaches from California to New York, and some branches over seas. In this situation, anything can, and usually does go wrong, but it would be your job as a system administrator to resolve the problem with it arises as quickly as possible. The last thing you would want is for your boss to call you up, asking why you haven't done anything to fix the 2 major systems that have been down for several hours. How do you explain to him that you didn't even know about it? Would you even want to tell him that? So now, picture yourself in the same situation, only this time, you were using a network monitoring program. Sitting in front of a large screen displaying a map of the world, leaning back gently in your chair. A gentle warning tone sounds, and looking at your display, you see that California is now glowing a soft red in color, in place of the green glow just moments before. You select the state of California, and it zooms in for a closer look. You see a network diagram overview of all the computers your company has within California. Two systems are flashing, with an X on top of them indicating that they are experiencing problems. Tagging the two systems, you press enter, and with a flash, the screen displays all the statitics of the two systems, including anything they might have in common causing the problem. Seeing that both systems are linked to the same card of a network switch, you pick up the phone and give that branch office a call, notifying them not only that they have a problem, but how to fix it as well. Early in the days of computers, a central computer (called a mainframe) was connected to a bunch of dumb terminals using a standard copper wire. Not much thought was put into how this was done because there was only one way to do it: they were either connected, or they weren't. Figure 1 shows a diagram of these early systems. If something went wrong with this type of system, it was fairly easy to troubleshoot, the blame almost always fell on the mainframe system. Shortly after the introduction of Personal Computers (PC), came Local Area Networks (LANS), forever changing the way in which we look at networked systems. LANS originally consisted of just PC's connected into groups of computers, but soon after, there came a need to connect those individual LANS together forming what is known as a Wide Area Network, or WAN, the result was a complex connection of computers joined together using various types of interfaces and protocols. Figure 2 shows a modern day WAN. Last year, a survey of Fortune 500 companies showed that 15% of their total computer budget, 1.6 Million dollars, was spent on network management (Rose, 115). Because of this, much attention has focused on two families of network management protocols: The Simple Network Management Protocol (SNMP), which comes from a de facto standards based background of TCP/IP communication, and the Common Management Information Protocol (CMIP), which derives from a de jure standards-based background associated with the Open Systems Interconnection (OSI) (Fisher, 183).


In this report I will cover advantages and disadvantages of both Common Management Information Protocol (CMIP) and Simple Network Management Protocol (SNMP)., as well as discuss a new protocol for the future. I will also give some good reasons supporting why I believe that SNMP is a protocol that all network administrators should use. SNMP is a protocol that enables a management station to configure, monitor, and receive trap (alarm) messages from network devices. (Feit, 12). It is formally specified in a series of related Request for Comment (RFC) documents, listed here. RFC 1089 - SNMP over Ethernet RFC 1140 - IAB Official Protocol Standards RFC 1147 - Tools for Monitoring and Debugging TCP/IP Internets and Interconnected Devices [superceded by RFC 1470] RFC 1155 - Structure and Identification of Management Information for TCP/IP based internets. RFC 1156 - Management Information Base Network Management of TCP/IP based internets RFC 1157 - A Simple Network Management Protocol RFC 1158 - Management Information Base Network Management of TCP/IP based internets: MIB-II RFC 1161 - SNMP over OSI RFC 1212 - Concise MIB Definitions RFC 1213 - Management Information Base for Network Management of TCP/IP-based internets: MIB-II RFC 1215 - A Convention for Defining Traps for use with the SNMP RFC 1298 - SNMP over IPX (SNMP, Part 1 of 2, I.1.) The first protocol developed was the Simple Network Management Protocol (SNMP). It was commonly considered to be a quickly designed "band-aid" solution to internetwork management difficulties while other, larger and better protocols were being designed. (Miller, 46). However, no better choice became available, and SNMP soon became the network management protocol of choice. It works very simply (as the name suggests): it exchanges network packets through messages (known as protocol data units (PDU)).

The PDU contains variables that have both titles and values. There are five types of PDU's which SNMP uses to monitor a network: two deal with reading terminal data, two with setting terminal data, and one called the trap, used for monitoring network events, such as terminal start-ups or shut-downs. By far the largest advantage of SNMP over CMIP is that its design is simple, so it is as easy to use on a small network as well as on a large one, with ease of setup, and lack of stress on system resources. Also, the simple design makes it simple for the user to program system variables that they would like to monitor. Another major advantage to SNMP is that is in wide use today around the world. Because of it's development during a time when no other protocol of this type existed, it became very popular, and is a built in protocol supported by most major vendors of networking hardware, such as hubs, bridges, and routers, as well as majoring operating systems. It has even been put to use inside the Coca-Cola machines at Stanford University, in Palo Alto, California (Borsook, 48). Because of SNMP's smaller size, it has even been implemented in such devices as toasters, compact disc players, and battery-operated barking dogs. In the 1990 Interop show, John Romkey, vice president of engineering for Epilogue, demonstrated that through an SNMP program running on a PC, you could control a standard toaster through a network (Miller, 57). SNMP is by no means a perfect network manager. But because of it's simple design, these flaws can be fixed. The first problem realized by most companies is that there are some rather large security problems related with SNMP. Any decent hacker can easily access SNMP information, giving them any information about the network, and also the ability to potentially shut down systems on the network. The latest version of SNMP, called SNMPv2, has added some security measures that were left out of SNMP, to combat the 3 largest problems plaguing SNMP: Privacy of Data (to prevent intruders from gaining access to information carried along the network), authentication (to prevent intruders from sending false data across the network), and access control (which restricts access of particular variables to certain users, thus removing the possibility of a user accidentally crashing the network). (Stallings, 213) The largest problem with SNMP, ironically enough, is the same thing that made it great; it's simple design. Because it is so simple, the information it deals with is neither detailed, nor well organized enough to deal with the growing networks of the 1990's. This is mainly due to the quick creation of SNMP, because it was never designed to be the network management protocol of the 1990's. Like the previous flaw, this one too has been corrected with the new version, SNMPv2. This new version allows for more in-detail specification of variables, including the use of the table data structure for easier data retrieval. Also added are two new PDU's that are used to manipulate the tabled objects. In fact, so many new features have been added that the formal specifications for SNMP have expanded from 36 pages (with v1) to 416 pages with SNMPv2. (Stallings, 153) Some people might say that SNMPv2 has lost the simplicity, but the truth is that the changes were necessary, and could not have been avoided. A management station relies on the agent at a device to retrieve or update the information at the device. The information is viewed as a logical database, called a Management Information Base, or MIB. MIB modules describe MIB variables for a large variety of device types, computer hardware, and software components. The original MIB for Managing a TCP/IP internet (now called MIB-I) was defined in RFC 1066 in August of 1988. It was updated in RFC 1156 in May of 1990. The MIB-II version published in RFC 1213 in May of 1991, contained some improvements, and has proved that it can do a good job of meeting basic TCP/IP management needs. MIB-II added many useful variables missing from MIB-I (Feit, 85). MIB files are common variables used not only by SNMP, but CMIP as well. In the late 1980's a project began, funded by governments, and large corporations. Common Management Information Protocol (CMIP) was born. Many thought that because of it's nearly infinite development budget, that it would quickly become in widespread use, and overthrow SNMP from it's throne. Unfortunately, problems with its implementation have delayed its use, and it is now only available in limited form from developers themselves. (SNMP, Part 2 of 2, III.40.) CMIP was designed to be better than SNMP in every way by repairing all flaws, and expanding on what was good about it, making it a bigger and more detailed network manager. It's design is similar to SNMP, where PDU's are used as variables to monitor the network. CMIP however contains 11 types of PDU's (compared to SNMP's 5). In CMIP, the variables are seen as very complex and sophisticated data structures with three attributes. These include: 1) Variable attributes: which represent the variables characteristics (its data type, whether it is writable) 2) variable behaviors: what actions of that variable can be triggered. 3) Notifications: the variable generates an event report whenever a specified event occurs (eg. A terminal shutdown would cause a variable notification event) (Comer, 82) As a comparison, SNMP only employs variable properties from one and three above. The biggest feature of the CMIP protocol is that its variables not only relay information to and from the terminal (as in SNMP) , but they can also be used to perform tasks that would be impossible under SNMP. For instance, if a terminal on a network cannot reach the fileserver a pre-determined amount of times, then CMIP can notify appropriate personnel of the event. With SNMP however, a user would have to specifically tell it to keep track of unsuccessful attempts to reach the server, and then what to do when that variable reaches a limit. CMIP therefore results in a more efficient management system, and less work is required from the user to keep updated on the status of the network. CMIP also contains the security measures left out by SNMP. Because of the large development budget, when it becomes available, CMIP will be widely used by the government, and the corporations that funded it. After reading the above paragraph, you might wonder why, if CMIP is this wonderful, is it not being used already? (after all, it had been in development for nearly 10 years) The answer is that possibly CMIP's only major disadvantage, is enough in my opinion to render it useless. CMIP requires about ten times the system resources that are needed for SNMP. In other words, very few systems in the world would able to handle a full implementation on CMIP without undergoing massive network modifications. This disadvantage has no inexpensive fix to it. For that reason, many believe CMIP is doomed to fail. The other flaw in CMIP is that it is very difficult to program. Its complex nature requires so many different variables that only a few skilled programmers are able to use it to it's full potential. Considering the above information, one can see that both management systems have their advantages and disadvantages. However the deciding factor between the two, lies with their implementation, for now, it is almost impossible to find a system with the necessary resources to support the CMIP model, even though it is superior to SNMP (v1 and v2) in both design and operation. Many people believe that the growing power of modern systems will soon fit well with CMIP model, and might result in it's widespread use, but I believe by the time that day comes, SNMP could very well have adapted itself to become what CMIP currently offers, and more. As we've seen with other products, once a technology achieves critical mass, and a substantial installed base, it's quite difficult to convince users to rip it out and start fresh with an new and unproven technology (Borsook, 48). It is then recommend that SNMP be used in a situation where minimial security is needed, and SNMPv2 be used where security is a high priority.

Manage Power Settings in Windows 7

To learn windows 7 has always been very exciting and enjoyable. It acts as a tutor for the users. Detail instructions have been provided by it regarding the improper functioning of the system. Whenever the system gets messed up, windows 7 is there to conduct you.
In order to manage and handle the power settings, user has to type power settings in the start menu search box. After this, screen will show the three options named by balanced, power saver and high performance. User has to select one of them. He can modify the settings by changing the password of the system, sleeping mode, any kind of update etc. suppose the users wants to get back to the normal position, then he can just pick out the option restore default settings. Result will be immediate and instant.
If the user wants to generate and produce custom power plan, there is a simple criteria that can be followed by the users. For this, he has to select create a power plan option from the section of power options. Then the user is going to set up the plan and allocate it a particular name. After this step, user picks up the sleep and display settings that are going to be utilized. Right after this action, plan is going to get prepared and system will show this plan in the recommended and suggested record of plans.
Hence, windows 7 direct and control the power settings efficiently and effectively. Suppose the system of the user is not working properly, or gets shut down abruptly or similar kind of situations, then windows 7 helps and guide the users to over come the situation without any trouble. Windows 7 is going to notify the user that what kind of steps can be taken to solve these hurdles. The entire scheme works quite efficiently and effectively. By installation and typing the particular code, user will be able to control the file extensions. It does not take a lot of time. It will also not make the system to get messed or clutter up. You can recommend and suggest to any one.

Windows NT vs Unix as an operating system

Evolution & Development History In the late 1960s a combined project between researchers at MIT, Bell Labs and General Electric led to the design of a third generation of computer operating system known as MULTICS (MULTiplexed Information and Computing Service). It was envisaged as a computer utility, a machine that would support hundreds of simultaneous timesharing users. They envisaged one huge machine providing computing power for everyone in Boston. The idea that machines as powerful as their GE-645 would be sold as personal computers costing only a few thousand dollars only 20 years later would have seemed like science fiction to them. However MULTICS proved more difficult than imagined to implement and Bell Labs withdrew from the project in 1969 as did General Electric, dropping out of the computer business altogether. One of the Bell Labs researchers (Ken Thompson) then decided to rewrite a stripped down version of MULTICS, initially as a hobby. He used a PDP-7 minicomputer that no was using and wrote the code in assembly. It was initially a stripped down, single user version of MULTICS but Thompson actually got the system to work and one of his colleagues jokingly called it UNICS (UNiplexed Information and Computing Service). The name stuck but the spelling was later changed to UNIX. Soon Thompson was joined on the project by Dennis Richie and later by his entire department. UNIX was moved from the now obsolete PDP-7 to the much more modern PDP-11/20 and then later to the PDP-11/45 and PDP-11/70. These two latter computers had large memories as well as memory protection hardware, making it possible to support multiple users at the same time. Thompson then decided to rewrite UNIX in a high-level language called B. Unfortunately this attempt was not successful and Richie designed a successor to B called C. Together, Thompson and Richie rewrote UNIX in C and subsequently C has dominated system programming ever since. In 1974, Thompson and Richie published a paper about UNIX and this publication stimulated many universities to ask Bell Labs for a copy of UNIX. As it happened the PDP-11 was the computer of choice at nearly all university computer science departments and the operating systems that came with this computer was widely regarded as being dreadful and hence UNIX quickly came to replace them. The version that first became the standard in universities was Version 6 and within a few years this was replaced by Version 7. By the mid 1980s, UNIX was in widespread use on minicomputers and engineering workstations from a variety of vendors. In 1984, AT&T released the first commercial version of UNIX, System III, based on Version 7. Over a number of years this was improved and upgraded to System V. Meanwhile the University of California at Berkeley modified the original Version 6 substantially. They called their version 1BSD (First Berkeley Software Distribution). This was modified over time to 4BSD and improvements were made such as the use of paging, file names longer than 14 characters and a new networking protocol, TCP/IP. Some computer vendors like DEC and Sun Microsystems based their version of UNIX on Berkeley's rather than AT&T's. There was a few attempts to standardise UNIX in the late 1980s, but only the POSIX committee had any real success, and this was limited. During the 1980s, most computing environments became much more heterogeneous, and customers began to ask for greater application portability and interoperability from systems and software vendors. Many customers turned to UNIX to help address those concerns and systems vendors gradually began to offer commercial UNIX-based systems. UNIX was a portable operating system whose source could easily be licensed, and it had already established a reputation and a small but loyal customer base among R&D organisations and universities. Most vendors licensed source bases from either the University of California at Berkeley or AT&T(r) (two completely different source bases). Licensees extensively modified the source and tightly coupled them to their own systems architectures to produce as many as 100 proprietary UNIX variants. Most of these systems were (and still are) neither source nor binary compatible with one another, and most are hardware specific. With the emergence of RISC technology and the breakup of AT&T, the UNIX systems category began to grow significantly during the 1980s. The term "open systems" was coined. Customers began demanding better portability and interoperability between the many incompatible UNIX variants. Over the years, a variety of coalitions (e.g. UNIX International) were formed to try to gain control over and consolidate the UNIX systems category, but their success was always limited. Gradually, the industry turned to standards as a way of achieving the portability and interoperability benefits that customers wanted. However, UNIX standards and standards organisations proliferated (just as vendor coalitions had), resulting in more confusion and aggravation for UNIX customers. The UNIX systems category is primarily an application-driven systems category, not an operating systems category. Customers choose an application first-for example, a high-end CAD package-then find out which different systems it runs on, and select one. The final selection involves a variety of criteria, such as price/performance, service, and support. Customers generally don't choose UNIX itself, or which UNIX variant they want. UNIX just comes with the package when they buy a system to run their chosen applications. The UNIX category can be divided into technical and business markets: 87% of technical UNIX systems purchased are RISC workstations purchased to run specific technical applications; 74% of business UNIX systems sold are multiuser/server/midrange systems, primarily for running line-of-business or vertical market applications. The UNIX systems category is extremely fragmented. Only two vendors have more than a 10% share of UNIX variant license shipments (Sun(r) and SCO); 12 of the top 15 vendors have shares of 5% or less (based on actual 1991 unit shipments, source: IDC). This fragmentation reflects the fact that most customers who end up buying UNIX are not actually choosing UNIX itself, so most UNIX variants have small and not very committed customer bases.

Operating System Architecture Windows NT was designed with the goal of maintaining compatibility with applications written for MS-DOS, Windows for MS-DOS, OS/2, and POSIX. This was an ambitious goal, because it meant that Windows NT would have to provide the applications with the application programming interfaces (API) and the execution environments that their native operating systems would normally provide. The Windows NT developers accomplished their compatibility goal by implementing a suite of operating system environment emulators, called environment subsystems. The emulators form an intermediate layer between user applications and the underlying NT operating system core. User applications and environment subsystems work together in a client/server relationship. Each environment subsystem acts as a server that supports the application programming interfaces of a different operating system . Each user application acts as the client of an environment subsystem because it uses the application programming interface provided by the subsystem. Client applications and environment subsystem servers communicate with each other using a message-based protocol. At the core of the Windows NT operating system is a collection of operating system components called the NT Executive. The executive's components work together to form a highly sophisticated, general purpose operating system. They provide mechanisms for: Interprocess communication. Pre-emptive multitasking. Symmetric multiprocessing. Virtual memory management. Device Input/Output. Security. Each component of the executive provides a set of functions, commonly referred to as native services or executive services. Collectively, these services form the application programming interface (API) of the NT executive. Environment subsystems are applications that call NT executive services. Each one emulates a different operating system environment. For example, the OS/2 environment subsystem supports all of the application programming interface functions used by OS/2 character mode applications. It provides these applications with an execution environment that looks and acts like a native OS/2 system. Internally, environment subsystems call NT executive services to do most of their work. The NT executive services provide general-purpose mechanisms for doing most operating system tasks. However the subsystems must implement any features that are unique to the their operating system environments. User applications, like environment subsystems, are run on the NT Executive. Unlike environment subsystems, user applications do not directly call executive services. Instead, they call application programming interfaces provided by the environment subsystems. The subsystems then call executive services as needed to implement their application programming interface functions. Windows NT presents users with an interface that looks like that of Windows 3.1. This user interface is provided by Windows NT's 32-bit Windows subsystem (Win32). The Win32 subsystem has exclusive responsibility for displaying output on the system's monitor and managing user input. Architecturally, this means that the other environment subsystems must call Win32 subsystem functions to produce output on the display. It also means that the Win32 subsystem must pass user input actions to the other environment subsystems when the user interacts with their windows. Windows NT does not maintain compatibility with device drivers written for MS-DOS or Windows for MS-DOS. Instead, it adopts a new layered device-driver architecture that provides many advantages in terms of flexibility, maintainability, and portability. Windows NT's device driver architecture requires that new drivers be written before Windows NT can be compatible with existing hardware. While writing new drivers involves a lot of development effort on the part of Microsoft and independent hardware vendors (IHV), most of the hardware devices supported by Windows for MS-DOS will be supported by new drivers shipped with the final Windows NT product. The device driver architecture is modular in design. It allows big (monolithic) device drivers to be broken up into layers of smaller independent device drivers. A driver that provides common functionality must only be written once. Drivers in adjacent layers can then simply call the common device driver to get their work done. Adding support for new devices is easier under Windows NT than most operating systems because only the hardware-specific drivers need to be rewritten. Windows NT's new device driver architecture provides a structure on top of which compatibility with existing installable file systems (for example, FAT and HPFS) and existing networks (for example, Novell and Banyan Vines) was relatively easy to achieve. File systems and network redirectors are implemented as layered drivers that plug easily into the new Windows NT device driver architecture. In any Windows NT multiprocessor platform, the following conditions must hold: All CPUs are identical, and either all have identical coprocessors or none has a coprocessor. All CPUs share memory and have uniform access to memory. In a symmetric platform, every CPU can access memory, take an interrupt, and access I/O control registers. In an asymmetric platform, one CPU takes all interrupts for a set of slave CPUs. Windows NT is designed to run unchanged on uniprocessor and symmetric multiprocessor platforms A UNIX system can be regarded as hierarchical in nature. At the highest level is the physical hardware, consisting of the CPU or CPUs, memory and disk storage, terminals and other devices. On the next layer is the UNIX operating system itself. The function of the operating system is to allow access to and control the hardware and provide an interface that other software can use to access the hardware resources within the machine, without having to have complete knowledge of what the machine contains. These system calls allow user programs to create and manage processes, files and other resources. Programs make system calls by loading arguments into memory registers and then issuing trap instructions to switch from user mode to kernel mode to start up UNIX. Since there is no way to trap instructions in C, a standard library is provided on top of the operating system, with one procedure per system call. The next layer consists of the standard utility programs, such as the shell, editors, compilers, etc., and it is these programs that a user at a terminal invokes. They use the operating system to access the hardware to perform their functions and generally are able to run on different hardware configurations without specific knowledge of them. There are two main parts to the UNIX kernel which are more or less distinguishable. At the lowest level is the machine dependent kernel. This is a piece of code which consists of the interrupt handlers, the low-level I/O system device drivers and some of the memory management software. As with most of the Unix operating system it is mostly written in C, but since it interacts directly with the machine and processor specific hardware, it has to be rewritten from scratch whenever UNIX is ported to a new machine. This kernel uses the lowest level machine instructions for the processor which is why it must be changed for each different processor. In contrast, the machine independent kernel runs the same on all machine types because it is not as closely reliant on any specific piece of hardware it is running on. The machine independent code includes system call handling, process management, scheduling, pipes, signals, memory paging and memory swapping functions, the file system and the higher level part of the I/O system. The machine independent part of the kernel is by far the larger of the two sections, which is why it UNIX can be ported to new hardware with relative ease. Unix does not use the DOS and Windows idea of independently loaded device drivers for each additional hardware item that is not under BIOS control in the machine which is why it must be recompiled whenever hardware is added or removed, the kernel needing to be updated with the new information. This is the equivalent of adding a device driver to a configuration file in DOS or Windows and then rebooting the machine. It is however a longer process to undertake.

Memory Management Windows NT provides a flat 32-bit address space, half of which is reserved for the OS, and half available to the process. This provides a separate 2 gigabytes of demand-paged virtual memory per process. This memory is accessible to the software developer through the usual malloc() and free() memory allocation and deallocation routines, as well as some advanced Windows NT-specific mechanisms. For a programmer desiring greater functionality for memory control, Windows NT also provides Virtual and Heap memory management APIs. The advantage of using the virtual memory programming interface (VirtualAlloc(), VirtualLock(), VirtualQuery(), etc.) is that the developer has much more control over whether backing store (memory committed in the paging (swap) file to handle physical memory overcommitment) is explicitly marked, and removed from the available pool of free blocks. With malloc(), every call is assumed to require the memory to be available upon return from the function call to be used. With VirtualAlloc() and related functions, the memory is reserved, but not committed, until the page on which an access occurs is touched. By allowing the application to control the commitment policy through access, less system resources are used. The trade-off is that the application must also be able to handle the condition (presumably with structured exception handling) of an actual memory access forcing commitment. Heap APIs are provided to make life easier for applications with memory-using stack discipline. Multiple heaps can be initialised, each growing/shrinking with subsequent accesses. Synchronisation of access to allocated heaps can be done either explicitly through Windows NT synchronisation objects, or by using an appropriate parameter at the creation of a heap. All access to memory in that particular heap is synchronised between threads in the process. Memory-mapped files are also provided in Windows NT. This provides a convenient way to access disk data as memory, with the Windows NT kernel managing paging. This memory may be shared between processes by using CreateFileMapping() followed by MapViewOfFile(). Windows NT provides thread local storage (TLS) to accommodate the needs of multithreaded applications. Each thread of a subprocess has its own stack, and may have its own memory to keep various information. Windows NT is the first operating system to provide a consistent multithreading API across multiple platforms. A thread is unit of execution in a process context that shares a global memory state with other threads in that context (if any). When a process is created in Windows NT, memory is allocated for it, a state is set up in the system, and a thread object is created. To start a thread in a currently executing process, the CreateThread() call is used as a function pointer is passed in through lpStartAddr; this address may be any valid procedure address in an application. Windows NT supports a number of different types of multiprocessing hardware. On these designs, it's possible for different processors to be running different threads an application simultaneously. Take care to use threads in an application to synchronise access to common resources between threads. Fortunately, Windows NT has very rich synchronisation facilities. Most UNIX developers don't use threads in their applications since support is not consistent between UNIX platforms. Handles don't have a direct mapping from UNIX; however, they're very important to Win32 applications and deserve discussion. When kernel objects (such as threads, processes, files, semaphores, mutexes, events, pipes, mailslots, and communications devices) are created or opened using the Win32 API, a HANDLE is returned. This handle is a 32-bit quantity that is an index into a handle table specific to that process. Handles have associated ACLs, or Access Control Lists, that Windows NT uses to check against the security credentials of the process. Handles can be obtained by explicitly creating them (usually when an object is created), as the result of an open operation (e.g. OpenEvent()) on a named object in the system, inherited as the result of a CreateProcess() operation (a child process inherits an open handle from its parent process if inheritance was specified when the original handle was created and if the child process was created with the "inherit handles" flag set), or "given away" by DuplicateHandle(). It is important to note that unless one of these mechanisms is used, a handle will be meaningless in the context of a process. For example, suppose process 1 calls CreateEvent() to return a handle that happens to have the ordinal value 0x1FFE. This event will be used to co-ordinate an operation between different processes. Process 2 must somehow get a handle to the event that process 1 created. If process 1 somehow "conjures" that the right value to use is 0x1FFE, it still won't have access to the event created by process 1, since that handle value means nothing in the context of process 2. If instead, process 1 calls DuplicateHandle()with the handle of process 2 (acquired through calling OpenProcess() with the integral id of process 2), a handle that can be used by process 2 is created. This handle value can be communicated back to process 1 through some IPC mechanism. Handles that are used for synchronisation (semaphores, mutexes, events) as well as those that may be involved in asynchronous I/O (named pipes, files, communications) may be used with WaitForObject() and WaitForMultipleObject(), which are functionally similar to the select() call in UNIX. Prior to 3BSD most UNIX systems were based on swapping. When more processes existed than could be kept in physical memory, some of them were swapped out to disk or drum storage. A swapped out process was always swapped out in its entirety and hence any current process was always either in memory or on disk as a complete unit. All movement between memory and disk was handled by the upper level of a split level scheduler, known as the (memory) swapper. Swapping from memory to disk was initiated when the kernel ran out of free physical memory. In order to choose a victim to evict, the swapper would first look at the processes that were being blocked by having to wait for something such as terminal input or a print job to respond. If more than one process was found, that process whose priority plus residence time was the highest was chosen as a candidate for swapping to disk. Thus a process that had consumed a large amount of CPU time recently was a good candidate, as was one that had been in memory a long time, even if it was mostly doing I/O. If no blocked process was available in memory then a ready process was chosen based on the same criteria of priority plus residence time. Starting with 3BSD, memory paging was added to the operating system to handle the ever larger programs that were being written. Both 4BSD and System V implemented demand paging in a similar fashion. The theory of demand paging is that a process need not necessarily be entirely resident in memory in order to continue execution. All that is actually required is the user structure and the page tables. If these are swapped into memory, the process is then deemed to be sufficiently in memory and can be scheduled to execute. The pages of the text, data and stack segments are brought in dynamically, one at a time, as they are referenced, thus leaving memory free for other tasks rather than filling it with tables of data which may be referenced only once. If the user structure and page table are not in memory, the process cannot be executed until the swapper swaps them into memory from disk. Paging is implemented partly by the main kernel and partly by a process called the page daemon. Like all daemons, the page daemon is started up periodically so that it can look around to see if there is any work for it to do. If it discovers that the number of free pages in memory is too low, it initiates action to free up more pages. When a process is started it may cause a page fault due to one of its pages is not being resident in memory. When a page fault occurs, the operating system takes the first page frame free on the list of page frames, removes it from the list and reads the needed page into it. If the free page frame list is empty, the process must be suspended until the page daemon has had time to free a page frame from another process. The page replacement algorithm is executed by the page daemon. At a set interval (commonly 250 millisec but varying from system to system) it is activated to see if the number of free page frames is at least equal to a system parameter known as lotsfree (typically set to 1/4 of memory). If there are insufficient page frames, the page daemon will start transferring pages from memory to disk until the lotsfree parameter value of page frames are available. Alternatively, if the page daemon discovers that more than lotsfree page frames are on the free list, it has no need to perform any function and terminates until its next call by the system. If the machine has plenty of memory and few active processes, it will be inactive for most of the time. The page daemon uses a modified version of the clock algorithm. It is a global algorithm, which means that when removing a page it does not take into account whose page is being removed. Thus the number of pages each process has assigned to it varies in time, depending both on its own requirements and other process requirements. The size of the data segment may vary depending upon what has been requested, the operating system tracking allocated and unallocated memory blocks while the memalloc function manages the content of the data segment.

Process Management, Inter-process Communication and Control The Windows NT process model differs from that of UNIX in a number of aspects, including process groups, terminal groups, setuid, memory layout, etc. For some programs, such as shells, a re-architecture of certain portions of the code is inevitable. Fortunately, most applications don't inherently rely on the specific semantics of UNIX processes, since even this differs between UNIX versions. Quoting from the online help provided with the Windows NT SDK: Win32 exposes processes and threads of execution within a process as objects. Functions exist to create, manipulate, and delete these objects. A process object represents a virtual address space, a security profile, a set of threads that execute in the address space of the process, and a set of resources or objects visible to all threads executing in the process. A thread object is the agent that executes program code (and has its own stack and machine state). Each thread is associated with a process object which specifies the virtual address space mapping for the thread. Several thread objects can be associated with a single process object which enables concurrent execution of multiple threads in a single address space (possible simultaneous execution in a multiprocessor system running Windows NT). On multiprocessor systems running Windows NT, multiple threads may execute at the same time but on different processors. In order to support the process structure of Windows NT, APIs include:
* Support for process and thread creation and manipulation.
* Support for synchronisation between threads within a process and synchronisation objects that can be shared by multiple processes to allow synchronisation between threads whose processes have access to the synchronisation objects.
* A uniform sharing mechanism that provides security features that limit/control the sharing of objects between processes. Windows NT provides the ability to create new processes (CreateProcess) and threads (CreateThread). Rather than "inherit" everything always, as is done in UNIX with the fork call, CreateProcess accepts explicit arguments that control aspects of process creation such as file handle inheritance, security attributes, debugging of the child process, environment, default directory, etc. It is through the explicit creation of a thread or process with appropriate security descriptors that credentials are granted to the created entity. Win32 does not provide the capability to "clone" a running process (and it's associated in-memory contents); this is not such a hardship, since most UNIX code forks and then immediately calls exec. Applications that depend on the cloning semantics of fork may have to be rearchitected a bit to use threads (especially where large amounts of data sharing between parent and child occurs), or in some cases, to use IPC mechanisms to copy the relevant data between two distinct processes after the CreateProcess call is executed. If a child process is to inherit the handles of the creator process, the bInherit flag of the CreateProcess call can be set. In this case, the child's handle table is filled in with handles valid in the context of the child process. If this flag is not specified, handles must be given away by using the DuplicateHandlecall. Windows NT was not designed to support "dumb terminals" as a primary emphasis, so the concept of terminal process groups and associated semantics are not implemented. Applications making assumptions about groups of applications (for example, killing the parent process kills all child processes), will have to investigate the GenerateConsoleCtrlEvent API, which provides a mechanism to signal groups of applications controlled by a parent process using the CREATE_NEW_PROCESS_GROUP flag in the CreateProcess API. Programs making assumptions about the layout of processes in memory (GNU EMACS, for example, which executes, then "dumps" the image of variables in memory to disk, which is subsequently "overlayed" on start-up to reduce initialisation time), especially the relationship of code segments to data and stack, will likely require modification. Generally, practices such as these are used to get around some operating system limitation or restriction. At this level, a rethinking of the structure of that part of the application is generally in order, to examine supported alternatives to the "hack" that was used (perhaps memory mapped files for particular cases like this). For those who must deal with an application's pages on this level, there is a mechanism by which a process may be opened (OpenProcess), and individual memory pages, threads, and stacks examined or modified. There is no direct equivalent of the UNIX setuid. There are, however, a number of Windows NT alternatives to use depending on the task to be accomplished. If the task at hand is a daemon that runs with a fixed user context, it would be best to use a Windows NT service (again, the online help is invaluable for this information). A Windows NT service is equivalent to a "daemon" running with fixed user credentials, with the added benefit of being administrable locally or remotely through standard Windows NT administration facilities. For instances when a process must "impersonate" a particular user, it's suggested that a server program be written that communicates thr

11/21 100 vista tips and tricks

     
    100 vista tips and tricks    
   
Windows Vista Running on a New Aluminum Macbook
November 20, 2010 at 7:11 PM
 


Website: www.jon4lakers.com Follow me on Twitter www.twitter.com Inside My Mind: www.youtube.com

[Ask] [blinklist] [del.icio.us] [Digg] [Facebook] [Google] [MySpace] [OnlyWire] [Propeller] [Reddit] [StumbleUpon] [Technorati] [Twitter] [Windows Live] [Yahoo!] [Email]
   
     
 
This email was sent to scrolllock9@gmail.com.
Delivered by Feed My Inbox
PO Box 682532 Franklin, TN 37068
Create Account
Unsubscribe Here Feed My Inbox
 
     

11/20 100 vista tips and tricks

     
    100 vista tips and tricks    
   
How to Install Remotejoy on Windows Vista/7 64-Bit
November 18, 2010 at 7:12 PM
 


This is a video on how to get remotejoy to work on windows 7 or vista running 64-bit :) Remotejoy files: www.megaupload.com

[Ask] [blinklist] [del.icio.us] [Digg] [Facebook] [Google] [MySpace] [OnlyWire] [Propeller] [Reddit] [StumbleUpon] [Technorati] [Twitter] [Windows Live] [Yahoo!] [Email]
   
     
 
This email was sent to scrolllock9@gmail.com.
Delivered by Feed My Inbox
PO Box 682532 Franklin, TN 37068
Create Account
Unsubscribe Here Feed My Inbox