" Lifemusic puts the ‘hum’ into ‘human’! "

Tuesday, December 28, 2010

CASE STUDY 3

In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems. Name at least two of these problems. Can we ensure the same degree of security in a time-share machine as we have in a dedicated machine?

First and foremost, let me define the meaning of multiprogramming as well as time-sharing. Multiprogramming refers to the allocation of a computer system and its resources to more than one concurrent application, job or user (“program” in this nomenclature). Initially, this technology was sought in order to optimize use of a computer system, since time and processing resources were often wasted when a single job waited for human interaction or other data input/output operations. Its capability was developed as a future of operating system the late 1950s and came into common use in mainframe computing in the mid-to late 1960s. This followed the development of hardware systems that processed the requisite circuit logic and instruction sets to facilitate the transfer of control between the operating system and one more independent applications, users or job streams. The use of multiprogramming was enhanced by the arrival of virtual memory and virtual machine technology, which enabled individual programs to make use of memory and operating system resources as if other concurrently running programs were, for all practical purpose, non-existent and invisible to them. Multiprogramming should be differentiated from multi-tasking since not all multiprogramming entails—or has the capability for—“true” multi-tasking. This is the case even thought the use of multi-tasking generally implies the use of some multiprogramming methods. In this context, the root word “program” does not necessarily refer to a compiled application, rather, any set of commands submitted for execution by a user or operator. Such could include a script or job control stream and any included calls to macro-instructions, systems utilities or application program modules. An entire, interactive, logged in user session can be thought for as a “program” in this sense.
On the other hand, time-sharing means the sharing of computer resource among many users by means of multiprogramming and multi-tasking. By allowing a large number of users to interact concurrently with a single computer, time-sharing dramatically lowered the cost of providing computing capability, made it possible for individuals and organizations to use a computer without owning one, and promoted the interactive use of computers and the development of new interactive applications. In time-sharing systems, the running task is required to relinquish the CPU, either, voluntarily or by an external event such as a hardware interrupt. Time sharing systems are designed to allow several programs to execute apparently simultaneously. The expression ‘time sharing’ was usually used to designate computers shared by interactive users at terminals, such as IBM’s TSO, and VM/CMS.

After I have define what multiprogramming and time-sharing is, now my turn to answer what are the possible security problems that may occur during this situation. A program generally comprises numerous tasks, a task being a relatively small group of processor instruction of a continuous-running application program. A task frequently ends with some request requiring the moving of data, a convenient opportunity to allow another program to have system resources, particularly CPU time.
My first answer will be, there will have an increasing possibility of hacking a certain files of the certain user as well as being prone and may lead to uncertain doing such as having a copyright to a certain files that supposedly and restrictedly to be copied or maybe opening of uncertain and private documents of the user. So it is not really safe to have this sharing the system simultaneously aside from this, it will lower the execution of the programs and different jobs. Another one is there will be a big possibility that the files of the user will be interchange because of the time-sharing method or resource usage may not be completely controlled. There are huge chances of losing your files or maybe there comes the time that your files have unknown documents and sometimes as what I have observed it is the way where viruses attack. They will disguise as a new file but surprisingly it is already a virus. To a great extent, the ability of a system to share its resources equitably—or according to a certain priorities—is dependent upon the design of the programs being handled and how frequently they may be interrupted.

Lastly, my answer for the question, “Can we ensure the same degree of security in a time-share machine as we have in a dedicated machine?”, my response will be probably not, since any protection scheme devised by a human can also be broken—and the more complex the scheme is, the more difficult it is to be confident of its correct implementation. Moreover, when multiple programs are present in memory, an ill-behaved program may (inadvertently or deliberately) overwrite memory belonging to another program, or even to the operating system itself. So we cannot really ensure the same degree of security in a time-sharing machine.

CASE STUDY 2

Put forward a theory about how that person might use a hand held computer in their work.

A newspaper reporter
Under the direction of an editor, NEWSPAPER REPORTERS are capable of gathering and analysing facts about current events through interviews, investigations, or observations and write stories describing the events, background, meaning, and effects. A job of a newspaper reporter has a significant role in the society because in their work they are the one who makes the people become more aware of what’s happening to society. They are assigned breaking news developments such as disasters, crime, and human interest. They take notes or use a tape recorder while covering a story. They check reference materials such as books, news files, and public records including criminal and civil court files for additional relevant facts. Basic tasks of reporters involve viewing events objectively, reporting, them accurately, and explaining their significance. Reporters may be on a general assignment, special assignment, or have a regular “beat”. Beat Reporters are responsible for news originating from local sources such as municipal offices, hospitals, and police departments. Feature Reporters are assigned to cover news in special fields such as medicine, foreign affairs, consumer affairs, fashion, art, education, labour, or social events. Reporters who are expert in certain fields may specialize in one type of story including stories involving sports, politics, or financial affairs. Reporters may also form their own concept for a future story and news paper pictures. They may carry their own camera and obtain photographic coverage or they may request a photographer. Reporters often work unscheduled overtime, and must have a high energy level to keep up with the fast pace of this occupation. They must also be prepared to work under stressful situations such as earthquakes, fires, floods, shoot-outs, and other dangerous conditions. Reporters work both indoors and outdoors, dealing with all kinds of people. They may work for long periods on unproductive leads. Editors have the option of revising, shortening or deleting their stories from the newspaper. A newspaper reporter usually uses Kindle 2. The Kindle 2 has updated firmware that extends its battery life by 85 percent. Sometimes an interesting product captures a lot of attention in spite of its glaring flaws. And sometimes, an updated version of that same gadget does a much better job fulfilling the original product’s promise. And so it is with the Kindle 2, a fine-tuned edition of Amazon’s much-touted portable electronic reader.

A doctor (general practitioner)
A doctor has a great distribution in our society especially they are the one who knows what are the do’s and do not’s in our life specifically in our health. Doctor’s guide has on how we live our life in a healthy and secure way. Doctors also practice the ancient profession of medicine, which is concerned with maintaining or restoring human health through the study, diagnosis, and treatment of disease or injury. This properly requires both a detailed knowledge of the academic disciplines (such as anatomy and physiology) underlying diseases and their treatment—the science of medicine—and also a decent competence in its applied practice—the arts of craft of medicine. The doctors uses a Epocrates, iPhone version as a downloadble, installable application. This means that they no longer need internet access to use Epocrates on the iPhone. Epocrates Rx allows for instant access to drug Information, pill ID, drug Interaction and reference formulary Information – all without the need for Internet connectivity. Through this, it is easier for doctors to access information about what drug or medicines should be used in healing various illness or diseases.

Wednesday, December 1, 2010

CASE STUDY 1: Types of Systems in OS

· Batch Systems

Ex:
IBM 7090/94 IBSYS - IBSYS was the tape based operating system that IBM supplied with its IBM 7090 and IBM 7094 computers. A similar operating system (but with several significant differences), also called IBSYS, was provided with IBM 7040 and IBM 7044 computers. IBSYS was based on FORTRAN Monitor System (FMS) and SHARE Operating System.


IBSYS itself was really a basic monitor program, that read control card images placed between the decks of program and data cards of individual jobs. An IBSYS control card began with a "quot; in column 1, immediately followed by a Control Name that selected the various IBSYS utility programs needed to set up and run the job. These card deck images were read from magnetic tapes, prepared offline, not usually directly from the punched card reader.


· Interactive Systems

Ex:
Mac OS X (pronounced /ˈmæk ˌoʊ ˌɛs ˈtɛn/ mak oh es ten) - is a series of Unix-based operating systems and graphical user interfaces developed, marketed, and sold by Apple Inc. Since 2002, Mac OS X has been included with all new Macintosh computer systems. It is the successor to Mac OS 9, released in 1999, the final release of the "classic" Mac OS, which had been Apple's primary operating system since 1984.


Mac OS X, whose X is the Roman numeral for 10 and is a prominent part of its brand identity, is a Unix-based graphical operating system, built on technologies developed at NeXT between the second half of the 1980s and Apple's purchase of the company in late 1996. From its sixth release Mac OS X v10.5 "Leopard" and onwards, every release of Mac OS X gained UNIX 03 certification while running on Intel processor.


The first version released was Mac OS X Server 1.0 in 1999, and a desktop-oriented version, Mac OS X v10.0 "Cheetah" followed on March 24, 2001. Releases of Mac OS X are named after big cats: for example, Mac OS X v10.6 is usually referred to by Apple and users as "Snow Leopard". The server edition, Mac OS X Server, is architecturally identical to its desktop counterpart, and includes tools to facilitate management of workgroups of Mac OS X machines, and to provide access to network services. These tools include a mail transfer agent, a Samba server, an LDAP server, a domain name server, and others. It is pre-loaded on Apple's Xserveserver hardware, but can be run on almost all of Apple's current selling computer models.


Apple also produces specialized versions of Mac OS X for use on its consumer devices. iOS, which is based off Mac OS X, runs on the iPhone, iPod Touch,iPad, and the 2nd generation Apple TV. An unnamed variant of Mac OS X powered the 1st generation Apple TV.


· Real-time Systems

Ex:
μnOS – it was the first 32bit Unix-like real-time operating system with real-time extensions. It was developed by Jeffery Goldberg, PhD. who left Bell Labs after using UNIX and became VP of engineering for (now defunct) Charles River Data Systems (CRDS). UNOS was written to capitalize on the first 32 bit microprocessor, the Motorola 68k CPUs. CRDS sold a UNOS based 68K system, and sold porting services and licenses to other manufacturers who had embedded cpu's.


· Hybrid Systems

Ex:
Windows XP is an operating system that was produced by Microsoft for use on personal computers, including home and business desktops, laptops, and media centers. It was first released in August 2001, and is the most popular version of Windows, based on installed user base. The name "XP" is short for "eXPerience."


Windows XP was the successor to both Windows 2000 and Windows Me, and was the first consumer-oriented operating system produced by Microsoft to be built on the Windows NT kernel and architecture. Windows XP was released for retail sale on October 25, 2001, and over 400 million copies were in use in January 2006, according to an estimate in that month by an IDC analyst. It was succeeded by Windows Vista, which was released to volume license customers on November 8, 2006, and worldwide to the general public on January 30, 2007. Direct OEM and retail sales of Windows XP ceased on June 30, 2008. Microsoft continued to sell Windows XP through their System Builders (smaller OEMs who sell assembled computers) program until January 31, 2009. XP may continue to be available as these sources run through their inventory or by purchasing Windows 7 Ultimate, Windows 7 Pro, Windows Vista Ultimate or Windows Vista Business, and then downgrading to Windows XP.


The most common editions of the operating system were Windows XP Home Edition, which was targeted at home users, and Windows XP Professional, which offered additional features such as support for Windows Server domains and two physical processors, and was targeted at power users, business and enterprise clients.Windows XP Media Center Edition has additional multimedia features enhancing the ability to record and watch TV shows, view DVD movies, and listen to music.Windows XP Tablet PC Edition was designed to run stylus applications built using the Tablet PC platform.


Windows XP was eventually released for two additional architectures, Windows XP 64-bit Edition for IA-64 (Itanium) processors and Windows XP Professional x64 Edition for x86-64. There is also Windows XP Embedded, a component version of the Windows XP Professional, and editions for specific markets such as Windows XP Starter Edition. By mid 2009, a manufacturer revealed the first Windows XP powered cellular telephone.


The NT-based versions of Windows, which are programmed in C, C++, and assembly, are known for their improved stability and efficiency over the 9x versions of Microsoft Windows. Windows XP presented a significantly redesigned graphical user interface, a change Microsoft promoted as more user-friendly than previous versions of Windows. A new software management facility called Side-by-Side Assembly was introduced to ameliorate the "DLL hell" that plagues 9x versions of Windows. It is also the first version of Windows to use product activation to combat illegal copying. Windows XP had also been criticized by some users for security vulnerabilities, tight integration of applications such as Internet Explorer 6 and Windows Media Player, and for aspects of its default user interface. Later versions with Service Pack 2, Service Pack 3, and Internet Explorer 8 addressed some of these concerns.


During development, the project was codenamed "Whistler", after Whistler, British Columbia, as many Microsoft employees skied at the Whistler-Blackcomb ski resort.


According to web analytics data generated by W3Schools, as of October 2010, Windows XP is the most widely used operating system for accessing the Internet in the world with a 48.9% market share, having peaked at 76.1% in January 2007.


· Embedded Systems

Ex:
Embedded Linux - is the use of Linux in embedded computer systems such as mobile phones, personal digital assistants, media players, set-top boxes, and other consumer electronics devices, networking equipment, machine control, industrial automation, navigation equipment and medical instruments. According to survey conducted by Venture Development Corporation, Linux was used by 18% of embedded engineers.


Linux has been ported to a variety of processors not always suited for use as the processor of desktop or server computers, such as various CPUs including ARM, AVR32, Blackfin, ETRAX CRIS, FR-V, H8300, IP7000 M32R, m68k, MIPS, mn10300, PowerPC, SuperH, or Xtensa processors, as an alternative to using a proprietary operating system and toolchain.


The advantages of embedded Linux over other embedded operating systems include no royalties or licensing fees, a stable kernel, a support base that is not restricted to the employees of a single software company, and the ability to modify and redistribute the source code. The disadvantages include a comparatively larger memory footprint (kernel and root filesystem), complexities of user mode and kernel mode memory access and complex device drivers framework.