0% found this document useful (0 votes)
7 views

Notes 3

Uploaded by

Ain Asyikin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Notes 3

Uploaded by

Ain Asyikin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 102

E S

RC
U
O
R ES
E M
S T
SYHAPTE
3
R

C
LESSON OBJECTIVES
At the end of the topic, student should be able to understand:
1. How hardware interacts with the system and how software manages
hardware resources.
2. How software work in layers, with the lowest layer interfacing with
hardware, and the highest layer interfacing with the user
INTRODUCTION
• The combination of software program, the BIOS, and device drivers
are important components to make sure computer run smoothly.
• Thus, the various “players” work together: the BIOS Startup
program checks the hardware to make sure it is ready to be used:
the user provides specific instructions to the software on what to do
or the software interacts directly with the CPU which controls the
various underlying mechanisms that make computer work as
intended.
• Software has resources to control hardware, and hardware has
resources to alert software that it needs attention.
Class, do you know the
definition of system
resources?
System resource So, do you
is a tool used by know the four
either hardware categories of a
or software to system
communicate resources?
with each other
Memory
Input/
addresse
Output
s
addresses

Interrupt
Direct Request
Memory Number
Access (IRQ)
(DMA)
Channel
MEMORY ADDRESS
• Numbers are assigned to physical memory located either in RAM or
ROM chips.
• Software can then access this memory by using these addresses.
• This numbers are assigned during the boot process.
• BIOS or real-mode device drivers may only work if given a specific
group of addresses (usually in the upper memory range between
640K and 1024K).
• Shadowing ROM (aka shadow RAM) is a process whereby ROM
programming code copied into RAM to speed up system operation,
because of faster access speed of RAM
 Dr Nasir purchases a laptop that is running Windows XP
Professional, with Pentium IV and 32 MB of shared memory for
video. He notices that the laptop has a single 512 MB memory chip
installed, with a space for one additional module. Dr Nasir checks
on the motherboard manual and finds out that he can install one
more 512 MB module. After installing the additional module, how
much memory will be available for Windows?
a) 480 MB
b) 992 MB
c) 1056 MB
d) 1024 MB
• What is extended memory?
a)All memory above 1MB
b)All memory above 512KB
c)The use of virtual memory
d)Swapping process (Swap File
 How many DIMMs make a full bank in a Pentium-class computer?
a) 1
b) 2
c) 3
d) 4
I/O ADDRESS
• Number assigned to hardware devices that software used to get
devices attention and to interact with them. Each device “Listens”
for these numbers and responds to the ones assigned to it.
• I/O address lines on a bus work much like the old telephone party
line; all devices “hear” the addresses, but only one responds
• En. Ghazali is using a computer that support primary and
secondary hard drive controller. What is the maximum
number of IDE drive that can be installed?
a) 2
b) 4
c) 7
d) 10
DMA CHANNEL
• A number designating a channel where by the device can pass data
to memory without involving the CPU.
• DMA channel as a shortcut for data moving to/from the device and
memory.
IRQ
• A line of a system-board bus that is a hardware device can use to
signal the CPU that the device needs attention.
• Some line have a higher priority for attention them others.
• A single number identifies each IRQ line.
• When eight more IRQs were added to the system boards, IRQ2 was
used to receive all interrupt from these eight.
• IRQ9 was wired to the pin on the ISA bus previously assigned to
IRQ2.
• It can be said that IRQ8-15 “cascade” to IRQ2.
• En Zulkharnain is planning to install a graphic card on a
Pentium computer that used both hard drive controllers,
and a PS/2 mouse. Which IRQ is available?
a) IRQ 12
b) IRQ 11
c) IRQ 7
d) IRQ 1
 Which of the following combination is valid?
a) COM 1 & COM 2
b) COM 1 & COM 3
c) COM 2 & COM 4
d) COM 4 & COM 5
• En Azhan is using a computer that used printer on LPT2,
Secondary IDE controller, a serial mouse and a graphic card.
What is the possible IRQ for each component?
a) IRQ3,IRQ5,IRQ8,IRQ14
b) IRQ1,IRQ7,IRQ14,IRQ9
c) IRQ5,IRQ3,IRQ10,IRQ15
d) IRQ4, IRQ7,IRQ11,IRQ10
 You are installing a color printer as the second printer on your
computer. You do not want it to conflict with the black and white
printer already installed on LPT2. What is the default IRQ used for
LPT1?
a) IRQ4
b) IRQ5
c) IRQ7
d) IRQ3
• What is the parity bit for the data stream 10110110 if
the RAM is set to use the even parity?
a) 0
b) 1
c) 2
d) 3
Which IRQ that we MUST used to allows access to IRQs above 7.
a) 0
b) 1
c) 2
d) 3
INTERRUPT PRIORITY
• The PC processes device interrupts according to their priority level. This is
a function of which interrupt line they use to enter the interrupt controller.
• For this reason, the priority levels are directly tied to the interrupt number:
• On an old PC/XT, the priority of the interrupts is 0, 1, 2, 3, 4, 5, 6, 7 while
on a modern machine, it's slightly more complicated.
• Recall that the second set of eight interrupts is piped through the IRQ2
channel on the first interrupt controller. This means that the first controller
views any of these interrupts as being at the priority level of its "IRQ2".
• The result of this is that the priorities become 0, 1, (8, 9, 10, 11, 12, 13, 14,
15), 3, 4, 5, 6, 7. IRQs 8 to 15 take the place of IRQ2. In any event, the
priority level of the IRQs doesn't make much of a difference in the
performance of the machine, so it isn't something you're going to want to
worry about too much.
• If you are a real performance freak, higher-priority IRQs may improve the
performance of the devices that use them slightly.
SS
CE
R O
P
T
O
BO
H E 3
ER
T HA P T
C
C’mon Michael,
tell me about
the boot
process.

Errr.. Boot
what?
THE BOOT, OR STARTUP, PROCESS
• BIOS Startup Program checks hardware to make sure it is ready to be
used. User provides specific instructions to software on what to do.
• Software interacts directly with the CPU, which controls the various
underlying mechanisms that make the computer work as intended.
• During boot process, Startup BIOS tests essential hardware
components (power-on self test [POST]).
• Then, setup information is used to configure both hardware and
software. Hardware components are assigned system resources they
will later use for communication.
• Then, OS is loaded, configured, and executed.
• Hardware devices are matched up with BIOS and device drivers that
control them.
• Furthermore, some applications software may be loaded and executed
during the boot process.
In computing, booting (also
known as "booting up") is a
bootstrapping process that
starts operating systems
when the user turns on a
computer system. A boot
sequence is the initial set of
operations that the computer
performs when power is
switched on. The boot loader
typically loads the main
operating system for the
computer.
Errors
Soft
Class, have you
Reboot ever heard
about
Random REBOOTING?
Reboot

Rebooting
automatic
ally

Hard
Reboot
4 STEPS INVOLVED IN THE BOOT
PROCESS
POST
• The ROM BIOS startup program surveys hardware resources and
needs, and assigns system resources to meet those needs.
• It Begins by reading configuration information stored in DIP
switches, jumpers, and the CMOS chip and comparing that
information to the hardware present
• The routines are part of a device's pre-boot sequence. Once POST
completes successfully, bootstrapping code is invoked.
POST (CONT)
• Routines included during POST include routines to set an initial
value for internal and output signals and to execute internal tests,
as determined by the device maker.
• These initial conditions are also referred to as the device's state.
• They may be stored in firmware or included as hardware, either as
part of the design itself, or they may be part of semiconductor
substrate either by virtue of being part of a device mask, or after
being burned into a device such as a programmable logic array
(PLA).
• POST protects the bootstrapped code from being interrupted by
faulty hardware
POST (CONT)
• The principal duties of the main BIOS during POST are as follows:
• Verify the integrity of the BIOS code itself
• Find, size, and verify system main memory
• Discover, initialize, and catalog all system buses and devices
• Pass control to other specialized BIOSes (if and when required)
• Provide a user interface for system's configuration
• Identify, organize, and select which devices are available for
booting
• Construct whatever system environment that is required by the
target OS
THE ROM BIOS STARTUP PROGRAM
SEARCHES FOR AND LOADS AN OS
• Most often the OS is loaded from logical drive C on the hard drive.
• Configuration information on the CMOS chip tells startup BIOS
where to look for the OS.
• BIOS turns to that device, reads the beginning files of the OS, copies
them into memory, then turns control over to the OS
• A hard drive might contain more than one logical drive; the partition
table at the beginning of the drive contains information about the
location of each logical drive, indicates which drive is the boot drive,
and holds the master boot record that begins the boot process for
the operating system
THE OS CONFIGURES THE SYSTEM
AND COMPLETES IT OWN LOADING
• The OS checks some of the same things that startup BIOS checked
(e.g., available memory and whether memory is reliable).
• The OS loads software to control the mouse, a CDROM, a scanner,
and other peripheral devices (generally have device drivers)
THE USER EXECUTES APPLICATIONS
SOFTWARE
• The OS finds the applications software (on a secondary storage
device) copies software into memory, and turns control over to it.
• User commands the applications software, which makes requests to
the OS, which uses the system resources, system BIOS, and device
drivers to interface with and control the hardware
COMPLETION OF BOOT PROCESS
• Boot process is completed after AUTOEXEC.BAT has finished
executing.
• In Windows 3.x, it is common to include in AUTOEXEC.BAT the
following command to execute Windows each time the computer is
booted: C:\WINDOWS\WIN
E
R S
A PT
W U
D R
R R
A E
H T R3
INHAPTE
C
E S
R T
A P
T W U
F RR
O
S TER 3
INHAPTE
C
TA D
A E
D R
N TO
IO S
AT IS
R IT
U
I G W
F O
N H
O
C NDR 3
A HAPTE
C
CONFIGURATION INFORMATION
• Configuration information is also called setup information. Its
provide information about the computer’s hardware. This
information is stored in one of these devices:
• DIP Switches
• Jumper
• CMOS setup chip
PASSWORDS STORED ON CMOS
• Startup password is required by computer during boot process to
gain access to the PC.
• Its also called power-on password. Sometimes user might forgotten
their startup password. The best method to reset a BIOS password
depends on what BIOS the computer has. Common BIOS's include
AMI, Award, IBM and Phoenix.
• Some BIOS's allow you to require a password be entered before the
system will boot.
• Some BIOS's allow you to require a password to be entered before
the BIOS setup may be accessed
PASSWORDS STORED ON CMOS
R E
,
A W A
AT D
D A R
N G H
T I &
C R E
TE A
R O T W
P OF R 3
S HAPTE
C
Two common utility software
programs for backing up setup
information to a disk to be used to
recover lost setup information are
Nuts & Bolts and Norton Utilities.

A rescue disk is essential for Keep hardware and


every computer and allows software
you to boot a computer. documentation well
labeled in a safe place

An extra copy of a file


or files made to a
different location or
storage media
Group Discussion
• Time allocation: 20 minutes
• Person/Group: 2-3 students
• Presentation: 5-10 minutes
• Topic:
Discuss five (5) importance of the system resources in your
computer system and six (6) methods to protect your data,
software & hardware.
N
IO
AT
M R
E
T IG U
YS F
S ONR 3
C HAPTE
C
SYSTEM CONFIGURATION
• System configuration is the process of setting up hardware devices and
assigning resources to them so that they work together without problems.
• A properly-configured system will allow you to avoid nasty resource
conflict problems, and make it easier for you to upgrade your system with
new equipment in the future.
• An improperly-configured system will lead to strange errors and problems,
and make upgrading a nightmare.
• Knowing Your System’s. Configuration is the key to a well-tuned, trouble-
free system.
• In order to accomplish this you must start by understanding its
configuration.
• User can use diagnostic utilities to assist them diagnosing the potential
problem.
E S
RC
U
SO
R E
N G
N I
I G
SS R
3
A PTE
A
CH
ASSIGNING RESOURCES TO DEVICES
• Many devices have fixed resource assignments that cannot be
changed. Most system devices are like this. In addition, it is
generally best not to change (or try to change) the resource settings
for standard devices like IDE hard disk controllers unless you both
really know what you are doing and there is a compelling reason to
change them.
• The following devices usually have hard-coded resource settings
that cannot be changed:
• System devices,
• Keyboard,
• PS/2 mouse,
• Floppy disk controller,
• Primary IDE controller,
• Video card.
RESOURCES SETTING
• Hardware setting
• Resource assignments on some cards, especially older ones, are done
by hardware on the device itself. This involves changing the settings
of jumpers and switches, usually on the circuit board of the device, to
tell it what resources to use.
• Software configuration program
• Many newer cards are configured using special software configure
programs that come with them. You run the program and select the
resources you want to use, and the program writes the information
into a special rewriteable EEPROM placed on the device for that
purpose.
• Plug n Play
• Newer devices that subscribe to the Plug and Play standards can be
automatically configured under certain conditions when used in a
machine that supports Plug and Play, with an operating system that
supports it. Plug and Play is an attempt to eliminate the large amount
of work in assigning resources to devices and resolving conflicts.
When it works properly, resources are dynamically and automatically
assigned and reassigned and you don't have to worry about making
everything work together.
PROBLEMS WITH CHANGING
DEFAULT RESOURCE ASSIGNMENTS
• In theory, any device should be able to work at any of the resource
settings it supports. Unfortunately in the real world, this isn't always the
case.
• One of the main reasons is that software sometimes makes
assumptions that it really shouldn't. Sometimes, one of these
assumptions is that a device will use the resource settings it defaults
to. If you change the settings, the software will not function correctly
• Sometimes these programs cut corners by only supporting devices in
their default location
• Another problem with changing default resource settings has to do
with software testing. Software should be tested with a variety of
different hardware using a variety of different settings. Programmers
often are incomplete in their testing work. If the testing is not
thorough, the unusual resource settings--the things they "never
thought anyone would try"--are where the strange bugs occur
RESOURCE CONFLICTS AND
CONFLICT RESOLUTION
• When more than one device attempts to use the same resource, the
result is a resource conflict.
• Resource conflicts can manifest themselves in several different
ways.
• Some conflicts can be very easy to recognize; others can be
extremely difficult to find and correct, because they manifest
themselves indirectly, or through symptoms that may not seem to
have anything to do with the device causing the problem.
RESOURCE CONFLICT SYMPTOMS
RESOURCE CONFLICT RESOLUTION
D Y
N A
A L
Y
A D - P
L
P N
D -A
N G
A U
G PL
LU -
P ONR 3
N HAPTE
C
PLUG AND PLAY AND NON-PLUG-
AND-PLAY
• The Plug and Play (also called PnP) specification
was developed by Microsoft with cooperation
from Intel and many other hardware
manufacturers.
• The goal of Plug and Play is to create a computer
whose hardware and software work together to
automatically configure devices and assign
resources, to allow for hardware changes and
additions without the need for large-scale
resource assignment tweaking.
• A form of Plug and Play was actually first made
available on the EISA and MCA buses many years
ago.
PLUG AND PLAY AND NON-PLUG-
AND-PLAY
• Devices that do not support the PnP standard can be used
in a PnP system, but they present special problems.
• These are called legacy devices, which is geek speak for
"old hardware we have to keep using even though it
doesn't have the capabilities we wish it.
• They make resource assignment much more difficult
because they cannot be automatically configured by the
BIOS.
• Generally, the BIOS deal with non-PnP devices by ignoring
them.
• It simply considers them as "part of the scenery" and
avoids any resources they are using.
• There is usually no problem using these devices with PnP,
but using too many non-PnP devices can make it more
difficult for PnP to work, due to the large number of
resources that it is not allowed to touch.
REQUIREMENTS FOR PLUG AND
PLAY
SYSTEM HARDWARE 1
• For system hardware, the hardware on your system, through the
system chipset and system bus controllers, must be capable of
handling PnP devices.
• For modern PCI-based systems this is built in, as PCI was designed
with PnP in mind.
• Most PCI-based systems also support PnP on their ISA bus, with
special circuitry to link the two together and share resource
information.
• Older PCs with ISA only or VL-bus system buses generally do not
support Plug and Play
PERIPHERAL HARDWARE 2
• The devices that you are adding into the system must themselves
be PnP compatible.
• PnP is now supported for a wide variety of devices, from modems
and network cards inside the box to printers and even monitors
outside it.
• These devices must be PnP-aware so that they are capable of
identifying themselves when requested, and able to accept resource
assignments from the system when they are made
SYSTEM BIOS 3
• Routines built into the BIOS perform the actual work of collecting
information about the different devices and determining what
should use which resources.
• The BIOS also communicates this information to the operating
system, which uses it to configure its drivers and other software to
make the devices work correctly.
• In many cases older PCs that have outdated BIOS but otherwise
have support for PnP in hardware (PCI-based Pentiums produced
between 1993 and 1995 are the prime candidates) can be made
PnP-compliant through a BIOS upgrade
OPERATING SYSTEM 4
• The operating system must be designed to work with the BIOS (and
thus indirectly, with the hardware as well).
• The operating system sets up any low-level software (such as
device drivers) that are necessary for the device to be used by
applications.
• It also communicates with the user, notifying him or her of changes
to the configuration, and allows changes to be made to resource
settings if necessary.
Y
LA
P
D N
N O
A I
G AT
LU R
P PE R 3
O HAPTE
C
PLUG AND PLAY OPERATION
M TA
TE A
S D
SY ION
ED RAT
D U
N
TE FIG
X
E O N )
D
C SCR 3
(EHAPTE
C
EXTENDED SYSTEM CONFIGURATION
DATA (ESCD)
• If the BIOS were to assign resources to each PnP device on every
boot, two problems would result.
• First, it would take time to do something that it has already done
before, each boot, for no purpose. After all, most people change
their system hardware relatively infrequently.
• Second more importantly, it is possible that the BIOS might not
always make the same decision when deciding how to allocate
resources, and you might find them changing even when the
hardware remains unchanged.
• ESCD is designed to overcome these problems.
• The ESCD area is a special part of your BIOS's CMOS memory,
where BIOS settings are held. This area of memory is used to hold
configuration information for the hardware in your system.
EXTENDED SYSTEM CONFIGURATION
DATA (ESCD)
• ESCD is also used as a communications link between the BIOS and the
operating system.
• Both use the ESCD area to read the current status of the hardware and
to record changes.
• Windows 95 reads the ESCD to see if hardware has been changed and
react accordingly.
• Windows 95 also allows users to override Plug and Play resource
assignments by manually changing resources in the Device Manager
• This information is recorded in the ESCD area so the BIOS know about
the change at the next boot and doesn't try to change the assignment
back again.
• The ESCD information is stored in a non-volatile CMOS memory area,
the same way that standard BIOS settings are stored
RECAPS
1. …………………………… is the device that you added into the system unit,
such as graphic card, modem, and network card.
2. A ……………………….acts like secondary storage (does not lose its data
when power is turned off), holds data electronically, provides faster
access than a hard drive, more expensive than hard drive storage and
uses EEPROM chips.
3. USB port can support up to ………………….. devices.
4. _______ protocol is used when a scanner sends a scanned image to a
computer.
5. A (an) ………………………….contains information unique to the OS and
hard drives.
6. The remaining ………………. of memory were set aside (reserved) for
ROM BIOS.
7. ________________ allows you to attach nearly any type of desktop
component to a portable computer.
That’s all for
today. C U
ALL in next
class!!
1. Explain briefly the four (4) methods to protect data, software and hardware.
2. During startup, hardware devices will be assigned to a series of important
resources. Describes all of them in short essay.
3. Computer system depends on the configuration and setup information to
perform booting and loading of windows and other devices. How can this
information be retrieved?
4. Briefly descript four (4) nature of resource conflict
5. Briefly descript the Plug and Play (PnP) Operation with the help of a diagram
6. Explain three (3) different ways to that generally used to set or change
resource settings for devices.
7. Explain briefly the term legacy devices with example
8. List down two (2) method to reset power-on password
9. Explain briefly three (3) step to resolve resource conflict
10. Explain the boot process in details.

You might also like