Professional Documents
Culture Documents
MODULE 6
Dr. O. S. Adebayo
&
Mr. Peter Anyaora
Course Outline
Device management
• characteristics of serial and parallel devices
• abstracting device differences
• buffering strategies; direct memory access
• recovery from failures.
Security and protection
• overview of system security
• policy/mechanism separation
• security methods and devices
• encryption
• recovery management.
Serial vs Parallel devices
Serial Device:
Data is sent bit by bit from one computer to another in bi-
direction.
Each bit has its clock plus rate.
Eight bits are transferred at a time having a start and stop bit
i.e 0 and 1 respectively.
For transmitting data to a longer distance, data
cables are used.
Parallel Transmission:
Various bits are sent together simultaneously with a
single clock plus.
Fast way to transmit as it uses many input/output
liens for transferring the data.
Difference between serial and parallel devices
Serial transmission requires a single line to
communicate and transfer data
Whereas, Parallel transmission requires
multiple lines
Serial transmission used for long distance
communication
Whereas, Parallel transmission are used for
shorter distance communication.
Error and noise are least in Serial as compared
to Parallel transmission. Since one bit follows
another in serial transmission whereas, in
parallel transmission multiple bits are sent
together
Serial and Parallel Transmission
Buffering techniques
Three main I/O buffering techniques
Single buffer: when data is stored in a section
of the system memory.
Double buffer: allows for two buffers to be
used.
Circular buffering: uses a priority-based
queue for when more than two buffers are
needed.
Memory Access (Direct)
• CPU only initiates operation
• DMA controller transfers data directly to/from main
memory
• Interrupt when transfer completed
• Protocol to input data using DMA
Virtualization
Virtualization enables you to abstract software from hardware,
effectively separating the two.
The main advantage of virtualization is that it introduces a high level of
efficiency and flexibility, while providing greater security coverage.
Types of virtualization:
desktop, application, network, server, network, storage, and OS
virtualization.
Security method and Devices