You are on page 1of 60

LESSON OBJECTIVES

At the end of the topic, student should be able to understand:


1. How hardware interacts with the system and how software manages hardware
resources.
2. How software work in layers, with the lowest layer interfacing with hardware, and
the highest layer interfacing with the user
INTRODUCTION
• The combination of software program, the BIOS, and device drivers are important
components to make sure computer run smoothly.
• Thus, the various “players” work together: the BIOS Startup program checks the
hardware to make sure it is ready to be used: the user provides specific
instructions to the software on what to do or the software interacts directly with
the CPU which controls the various underlying mechanisms that make computer
work as intended.
• Software has resources to control hardware, and hardware has resources to alert
software that it needs attention.
Class, do you know the
definition of system
resources?
System resource is So, do you know
a tool used by either the four
hardware or categories of a
software to system
communicate with resources?
each other
Memory Input/Output
addresses addresses

Interrupt
Direct Request
Memory Number
Access (DMA) (IRQ)
Channel
MEMORY ADDRESS
• Numbers are assigned to physical memory located either in RAM or ROM chips.
• Software can then access this memory by using these addresses.
• This numbers are assigned during the boot process.
• BIOS or real-mode device drivers may only work if given a specific group of
addresses (usually in the upper memory range between 640K and 1024K).
• Shadowing ROM (aka shadow RAM) is a process whereby ROM programming code
copied into RAM to speed up system operation, because of faster access speed of
RAM
▪ Dr Nasir purchases a laptop that is running Windows XP Professional, with
Pentium IV and 32 MB of shared memory for video. He notices that the laptop
has a single 512 MB memory chip installed, with a space for one additional
module. Dr Nasir checks on the motherboard manual and finds out that he can
install one more 512 MB module. After installing the additional module, how
much memory will be available for Windows?
a) 480 MB
b) 992 MB
c) 1056 MB
d) 1024 MB
• What is extended memory?
a)All memory above 1MB
b)All memory above 512KB
c)The use of virtual memory
d)Swapping process (Swap File
I/O ADDRESS
• Number assigned to hardware devices that software used to get devices attention
and to interact with them. Each device “Listens” for these numbers and responds
to the ones assigned to it.
• I/O address lines on a bus work much like the old telephone party line; all devices
“hear” the addresses, but only one responds
• En. Ghazali is using a computer that support primary and secondary hard drive
controller. What is the maximum number of IDE drive that can be installed?
a) 2
b) 4
c) 7
d) 10
DMA CHANNEL
• A number designating a channel where by the device can pass data to memory
without involving the CPU.
• DMA channel as a shortcut for data moving to/from the device and memory.
IRQ
• A line of a system-board bus that is a hardware device can use to signal the CPU
that the device needs attention.
• Some line have a higher priority for attention them others.
• A single number identifies each IRQ line.
• When eight more IRQs were added to the system boards, IRQ2 was used to
receive all interrupt from these eight.
• IRQ9 was wired to the pin on the ISA bus previously assigned to IRQ2.
• It can be said that IRQ8-15 “cascade” to IRQ2.
C’mon Michael, tell
me about the boot
process.

Errr.. Boot
what?
THE BOOT, OR STARTUP, PROCESS
• BIOS Startup Program checks hardware to make sure it is ready to be used. User
provides specific instructions to software on what to do.
• Software interacts directly with the CPU, which controls the various underlying
mechanisms that make the computer work as intended.
• During boot process, Startup BIOS tests essential hardware components (power-
on self test [POST]).
• Then, setup information is used to configure both hardware and software.
Hardware components are assigned system resources they will later use for
communication.
• Then, OS is loaded, configured, and executed.
• Hardware devices are matched up with BIOS and device drivers that control them.
• Furthermore, some applications software may be loaded and executed during the
boot process.
In computing, booting (also known
as "booting up") is a bootstrapping
process that starts operating
systems when the user turns on a
computer system. A boot sequence
is the initial set of operations that
the computer performs when power
is switched on. The boot loader
typically loads the main operating
system for the computer.
Errors

Soft Reboot
Class, have you ever
heard about
Random REBOOTING?

Reboot

Rebooting
automatically

Hard Reboot
A hard reboot (also known as a cold reboot, cold boot or
cold start) is when power to a computer is turned off

This starts the computer without first performing any


shut-down procedure

It may be caused by power failure, be done by accident,


or be done deliberately as a last resort to forcibly retrieve
the system from instances of a system freeze, critical
error or virus-inflicted DoS attack. It can also be used by
intruders to access cryptographic keys from RAM, in
which case it is called a cold boot attack
A soft reboot (also known as a warm reboot) is
restarting a computer under software control,
without removing power or (directly) triggering a
reset line

It usually, though not always, refers to an orderly


shutdown and restarting of the machine

The Control-Alt-Delete key combination on the


original PC from Sphere 1 was designed to allow a
soft reboot reducing wear on the hardware. This
kind of reboot will not usually reset the hard disks,
so that they have time to update their write cache
to permanent storage
Random reboot is a non-technical term referring to an
unintended (and often undesired) reboot for which the cause
is not immediately evident to the user

Such reboots may occur due to a multitude of software and


hardware problems, such as triple faults.

As Windows XP/Vista has an option to skip its Blue Screen of


Death (BSOD) (Blue Screens of Death in Windows XP/Vista
offer no option of pressing any key and seeing if the
computer continues functioning) and immediately restarts
the computer in the event of a fatal error, users can be
mistaken in thinking a Windows XP/Vista computer suffers
from random rebooting.
Systems may reboot automatically at a
scheduled time, after a power failure, or
kernel panic

A kernel panic is an action taken by an


operating system upon detecting an
internal fatal error from which it cannot
safely recover

The method by which this is done varies


depending whether the reboot can be
handled in software, or must be handled
at the firmware or hardware level.
In Windows, when an error occurs in the boot
process, a Blue Screen of Death or a Black
Screen of Death may occur. On Unix and Unix-
like operating systems, such as Linux and Mac
OS X, a fatal error in the boot process may
cause a kernel panic.
4 STEPS INVOLVED IN THE BOOT PROCESS

The OS
configures the
system and
Power On Self completes it
Test own loading

The ROM BIOS The user


startup program executes
searches for applications
and loads an software
OS
POST
• The ROM BIOS startup program surveys hardware resources and needs, and
assigns system resources to meet those needs.
• It Begins by reading configuration information stored in DIP switches, jumpers,
and the CMOS chip and comparing that information to the hardware present
• The routines are part of a device's pre-boot sequence. Once POST completes
successfully, bootstrapping code is invoked.
THE ROM BIOS STARTUP PROGRAM SEARCHES
FOR AND LOADS AN OS
• Most often the OS is loaded from logical drive C on the hard drive.
• Configuration information on the CMOS chip tells startup BIOS where to look for
the OS.
• BIOS turns to that device, reads the beginning files of the OS, copies them into
memory, then turns control over to the OS
• A hard drive might contain more than one logical drive; the partition table at the
beginning of the drive contains information about the location of each logical
drive, indicates which drive is the boot drive, and holds the master boot record
that begins the boot process for the operating system
THE OS CONFIGURES THE SYSTEM AND
COMPLETES IT OWN LOADING
• The OS checks some of the same things that startup BIOS checked (e.g.,
available memory and whether memory is reliable).
• The OS loads software to control the mouse, a CDROM, a scanner, and other
peripheral devices (generally have device drivers)
THE USER EXECUTES APPLICATIONS SOFTWARE
• The OS finds the applications software (on a secondary storage device) copies
software into memory, and turns control over to it.
• User commands the applications software, which makes requests to the OS,
which uses the system resources, system BIOS, and device drivers to interface
with and control the hardware
PASSWORDS STORED ON CMOS
• Startup password is required by computer during boot process to gain access to
the PC.
• Its also called power-on password. Sometimes user might forgotten their startup
password. The best method to reset a BIOS password depends on what BIOS the
computer has. Common BIOS's include AMI, Award, IBM and Phoenix.
• Some BIOS's allow you to require a password be entered before the system will
boot.
• Some BIOS's allow you to require a password to be entered before the BIOS setup
may be accessed
PASSWORDS STORED ON CMOS

Using a
Backdoor BIOS
Password

Take out the Resetting the


CMOS battery BIOS Password
for a while using Software

Reset
Clear CMOS
CMOS Vendor
Specific
Solutions for
(Using Jumper)
resetting the
BIOS Password

Resetting the
BIOS Password
using
Hardware
Two common utility software programs for
Saving and backing up setup information to a disk to
restoring setup
information in be used to recover lost setup information
CMOS are Nuts & Bolts and Norton Utilities.

Protecting
Keeping OS Data, Documentation
Software &
rescue disks

Hardware
A rescue disk is essential for every Keep hardware and
computer and allows you to boot a software documentation
computer. well labeled in a safe place

Backing up the
hard drive

An extra copy of a file or files


made to a different location
or storage media
Group Discussion
• Time allocation: 20 minutes
• Person/Group: 2-3 students
• Presentation: 5-10 minutes
• Topic:
❑Discuss five (5) importance of the system resources in your computer system
and six (6) methods to protect your data, software & hardware.
SYSTEM CONFIGURATION
• System configuration is the process of setting up hardware devices and assigning
resources to them so that they work together without problems.
• A properly-configured system will allow you to avoid nasty resource conflict
problems, and make it easier for you to upgrade your system with new equipment
in the future.
• An improperly-configured system will lead to strange errors and problems, and
make upgrading a nightmare.
• Knowing Your System’s. Configuration is the key to a well-tuned, trouble-free
system.
• In order to accomplish this you must start by understanding its configuration.
• User can use diagnostic utilities to assist them diagnosing the potential problem.
RESOURCE CONFLICT SYMPTOMS
System hangs or lockups, particularly while using a peripheral device.

(Memory) parity errors on parity-enabled systems.

Noise or other problems from sound cards.

Junk being printed on your printer

The mouse pointer hanging and refusing to move, or moving in a


stuttering fashion.

Error messages from Windows 95, messages about the PC not operating
at maximum performance, or the system dropping to "Safe Mode" or
"MS-DOS Compatibility Mode".

Errors and crashes of applications for no apparent reason.


RESOURCE CONFLICT RESOLUTION

Determine what all the devices


in the system are using for
resources

Identify the conflicting devices.

Change the resource settings on


one or more of the devices so
they are no longer conflicting.
PLUG AND PLAY AND NON-PLUG- AND-PLAY
• The Plug and Play (also called PnP) specification was
developed by Microsoft with cooperation from Intel and
many other hardware manufacturers.
• The goal of Plug and Play is to create a computer whose
hardware and software work together to automatically
configure devices and assign resources, to allow for
hardware changes and additions without the need for
large-scale resource assignment tweaking.
• A form of Plug and Play was actually first made available
on the EISA and MCA buses many years ago.
PLUG AND PLAY AND NON-PLUG- AND-PLAY
• Devices that do not support the PnP standard can be used in a
PnP system, but they present special problems.
• These are called legacy devices, which is geek speak for "old
hardware we have to keep using even though it doesn't have the
capabilities we wish it.
• They make resource assignment much more difficult because
they cannot be automatically configured by the BIOS.
• Generally, the BIOS deal with non-PnP devices by ignoring them.
• It simply considers them as "part of the scenery" and avoids any
resources they are using.
• There is usually no problem using these devices with PnP, but
using too many non-PnP devices can make it more difficult for
PnP to work, due to the large number of resources that it is not
allowed to touch.
REQUIREMENTS FOR PLUG AND PLAY

System Peripheral System Operating


Hardware Hardware BIOS System
PERIPHERAL HARDWARE 2
• The devices that you are adding into the system must themselves be PnP
compatible.
• PnP is now supported for a wide variety of devices, from modems and network
cards inside the box to printers and even monitors outside it.
• These devices must be PnP-aware so that they are capable of identifying
themselves when requested, and able to accept resource assignments from the
system when they are made
That’s all for
today. C U ALL
in next class!!

You might also like