System i Architecture Part 1. Module 2
|
|
|
- Nathaniel Stokes
- 10 years ago
- Views:
Transcription
1 Module 2 Copyright IBM Corporation System i Architecture Part 1 Module 2
2 Module 2 Copyright IBM Corporation Impacts of Computer Design
3 Module 2 Copyright IBM Corporation If an instruction set architecture is to be successful, it must be designed to survive rapid changes in computer technology.* An architect must plan for technology changes that can increase the lifetime of a successful computer.* * Source: John Hennessy, David Patterson, Computer Architecture. A Quantitative Approach.
4 Hardware Dependencies High-level language Assembly language Binary machine language Compiler Assembler Hardware A + B add A, B What happens by changing technology? Recompile? Rewrite? Emulation? Program sources? Performance? Usage advantages of new technology? Costs? Module 2 Copyright IBM Corporation
5 Module 2 Copyright IBM Corporation Application Programming Interfaces Program a set of definitions of the ways in which one piece of computer software communicates with another method of achieving abstraction - Reduce hardware dependence Add A,B - Negative performance impacts API add A,B Hardware
6 Module 2 Copyright IBM Corporation Hardware Abstraction Layer of OS Applications OS - lower-level details are hidden - offers simpler models to higher level Kernel Hardware Direct access to hardware means hardware dependence!
7 Module 2 Copyright IBM Corporation Goals of the System i Architecture
8 Different Workloads - Different Requirements Engineering/scientific Computing Commercial Applications Compute-intensive workload Floating point processing Using relatively small amounts of data Many tight loops I/O s more often sequential than random Many concurrent user Primary using integer arithmetic, string comparison updates and inserts Applications perform many calls to OS for services, such as I/O s Fewer loops and more non-loop branches Data often spread over a large amount of disk space Module 2 Copyright IBM Corporation
9 Module 2 Copyright IBM Corporation i5 Forerunner Quelle: "AS/400 Blackbox geöffnet", Frank Soltis, Duke Press 1997
10 Module 2 Copyright IBM Corporation IBM Rochester (Minnesota)
11 Module 2 Copyright IBM Corporation The Secret of Success Scaleable High Compact Performance Computing Cardless Computing Advanced Architecture S/3 S/32 S/34 S/38 S/36 AS/400 iseries i5 96 Col Card Inexpensive Interactive Computing Server Consolidation New Workloads Virtualization Distributed Computing
12 Module 2 Copyright IBM Corporation The Secret of Success Scaleable High Compact Performance Computing Cardless Computing 1969 S/3 96 Col Card 1975 S/ S/34 Advanced Architecture Inexpensive Interactive Computing 1980 S/ S/ AS/ Note the secret to this success Gradual, not Radical Change iseries Server Consolidation New Workloads 2004 i5 Virtualization Distributed Computing
13 Module 2 Copyright IBM Corporation Design Requirements for System i Goal: Business Computer Ease-of-use user interfaces Ability to expand the system without an impact on business application software Optimized for running business applications IO intensive workload rather than computing intensive workload Optimized for multi-user applications High throughput (fast IO operations)
14 The Five Sacred Architecture Principles of System i Module 2 Copyright IBM Corporation Technology Independence Object-based Design Hardware Integration Software Integration Single-Level Store
15 Module 2 Copyright IBM Corporation Overview of the MI Architecture * called Machine Interface on i5 Systems
16 Module 2 Copyright IBM Corporation Programmer s View on System i Applications i5/os* Kernel SLIC Hardware Direct access to hardware is not allowed! Machine Interface (MI) - or Technology Independent Machine Interface (TIMI) - logical not physical interface System License Internal Code (SLIC) - insulate applications from underlying hardware - SLIC is hardware dependent! * Aka OS/400 on AS/400 and iseries
17 Module 2 Copyright IBM Corporation System i Hardware Interface Architecture Designed for Software Investment Protection Technology Independent Machine Interface Software remains the same while Processors change Buses change I/Os change Applications inherit advantages of new hardware enhancements Processor speed and price/performance Address space Bus and I/O technology
18 Module 2 Copyright IBM Corporation Conventional Machine Interface Instruction set (executable): OP Operands Operations Machine interface Microcode layer Hardware - Computional - Branching - Data manipulation Operands - Memory/register - Immediate data Product-supported structures: Hardware dependent Adress Space I/O Space Register Space
19 Module 2 Copyright IBM Corporation Use of Objects Applications OS/400 Objects based on MI System Objects i5/os Kernel SLIC Hardware - Objects are used for complex data structures - Examples: Database file, User profile, Program,
20 Module 2 Copyright IBM Corporation Hiding the Internals: Encapsulation Programs no longer know about precise format of the data structure any changes of data structures have no effect on application or system programs Only instructions that treat the object as entity are allowed fields in the data structure can not manipulated with bit- or byte-level instructions
21 Module 2 Copyright IBM Corporation System i Machine Interface Instruction set (non-executable): OP Operands Operations Machine interface System Licensed Internal Code (SLIC) Hardware Hardware dependent -Computional instructions on traditionel operands -Object-oriented instructions Operands - Immediate data - Objects Product-supported structures: Complex data structure Byte space Objects
22 Module 2 Copyright IBM Corporation Pro s and Con s of using OO Advantages: Technology Independance Hardware changes have no impact on applications Integrity Programs at the MI layer do the right things Security Virus resistent Disadvantage Performance OO technology reuses many small modules long instruction-path length kernel performance has impact to the overall performance Fine Tuning is important!
23 Module 2 Copyright IBM Corporation OS/400 SLIC Hardware Operating System Functional Split Machine Interface Security Database Device support Work management Control language File definition OS/400 Machine Member definition Open Data transfer Close Interface SLIC Hardware
24 Module 2 Copyright IBM Corporation Creating a System i Program Program Source Compiler Program Template Translator *PGM RPG Cobol C/C++ MI Instructions Machine Interface Binary
25 Module 2 Copyright IBM Corporation Inside a *PGM Object *PGM Header (Name, Owner,, Translator version) Debug Informations Program Template Observability Debug informations are not embedded in the code Template can be deleted Binary Instruction Stream
26 Module 2 Copyright IBM Corporation Examples Using advantages of MI
27 Module 2 Copyright IBM Corporation From CISC to RISC The way to a 64-bit Architecture
28 Instruction Set Classes Example: C = A + B Memory-memory Register-memory Register-register (load-store) Add C, A, B Load R1, A Load R1, A Add R3, R1, B Load R2, B Store R3, C Add R3, R1, R2 Store R3, C Data can be accessed directly clocks/instruction vary by operand location Source: John Hennessy, David Patterson, Computer Architecture. A Quantitative Approach. Module 2 Copyright IBM Corporation
29 Module 2 Copyright IBM Corporation CISC, RISC Complex Instruction Set Computing Includes also complex instructions which were direct representations of high level functions General goal: orthogonality of instruction set Makes assembler programming easier Reduced Instruction Set Computing Philosophy behind: Do everything in registers! "Relegate Important Stuff to Compiler"
30 Module 2 Copyright IBM Corporation Exercise: CISC vs. RISC Assume that a certain task needs P CISC instructions and 2P RISC instructions, and that one CISC instruction takes 8T ns to complete, and one RISC instruction takes 2T ns. Under this assumption, which one has the better performance? * Source: John Hennessy, David Patterson, Computer Organization and Design, Ex.1.52
31 Module 2 Copyright IBM Corporation A simple Way to 64 bit Applications Save Restore Applications OS/400 V2R3 Machine Interface OS/400 V3R7 LIC SLIC 48-bit CISC 64-bit RISC
32 Module 2 Copyright IBM Corporation How it was done? Some customers called IBM and said: I just installed the new systems, and my applications run slower. What was wrong? *PGM Header Translator V3R2 Debug Informations Program Template Binary 48-bit CISC Instruction Stream 1. Compare translator versions with currently installed one 1. Retranslate object from template 1. From now on the new code is used *PGM Header Translator V3R7 Debug Informations Program Template Binary 64-bit RISC Instruction Stream
33 Module 2 Copyright IBM Corporation The Story of the Advanced S/36
34 Module 2 Copyright IBM Corporation IBM System/36 Was a simple and popular small business computer system, First shipped in The System/36 was flexible and powerful: It allowed 36 monitors and printers to be connected together. All users could access the system's hard drive or any printer. It provided very good password security and resource security, allowing control over who was allowed to access any program or file. Devices could be as far as a mile from the system unit. Users could dial into a System/36 from anywhere in the world and get a 9600 baud connection, which was very fast in the 1980s and very quick for connections which used only screen text and no graphics. It allowed the creation of databases of very large size. It supported up to about 8 million records, and the largest 5360 with four hard drives in its extended cabinet could hold gigabytes. The S/36 was "bulletproof," able to run for six weeks or longer between restarts (IPLs).
35 Module 2 Copyright IBM Corporation Advanced S/36 IBM introduced the AS/400 Advanced/36 with PowerPC technology in 1994 OS/400 Applications S/36 Applications MI OS OS/400 Kernel SLIC Hardware SSP Virt.S/36 System Support Program (S/36 Operating system) - was available for all RISC Models with OS/400 V3R6 to V4R5 - not included in i5/os
36 Module 2 Copyright IBM Corporation Java Implementation
37 Module 2 Copyright IBM Corporation Java Implementation Typical iseries Java Applications JVM OS JVMI MI Java Applications OS/400 SLIC JVM Hardware iseries Introduced with OS/400 V4R2 New C++ implementation
38 Module 2 Copyright IBM Corporation AIX Runtime (without LPAR) Portable Application Solution Environment
39 Module 2 Copyright IBM Corporation An integrated i5/os 7 runtime for porting selected UNIX applications Supports AIX 5L 32/64-bit application model Exploits PowerPC's ability to switch runtime modes Applications Integrated with iseries file systems and work management Can call DB2/400 7, Java TM and ILE programs Exploit all aspects of iseries operations environment iseries Application Portable Application Solution Environment (PASE) i5/os i5/os Services Technology Independent Machine Interface i5/os SLIC Kernel PowerPC AS 64-bit System i PASE Application AIX Shared Libraries Syscall PowerPC 64/32-bit
40 Module 2 Copyright IBM Corporation MI Programming Example
41 Module 2 Copyright IBM Corporation Program Models Programs come in two flavors original program model (OPM) Integrated Language Environment (ILE) MI programs can be created only for the OPM environment! If you require ILE support use ILE C and its built-in MI support For OPM use Create Program QPRCRTPG API
42 Example: Return the larger of two packed arguments /* Program Name: MI01 */ Module 2 Copyright IBM Corporation ENTRY * (PARM_LIST) EXT; DCL SPCPTR ARG1@ PARM; DCL SPCPTR ARG2@ PARM; DCL SPCPTR RESULT@ PARM; DCL OL PARM_LIST (ARG1@, ARG2@, RESULT@) PARM EXT; DCL DD ARG1 PKD(15,5) BAS(ARG1@); DCL DD ARG2 PKD(15,5) BAS(ARG2@); DCL DD RESULT PKD(15,5) BAS(RESULT@); CMPNV(B) ARG1,ARG2 / LO(ITS2); CPYNV RESULT,ARG1; B RETURN; ITS2: CPYNV RESULT,ARG2; RETURN: RTX *; PEND;
43 Module 2 Copyright IBM Corporation Define an Entry Point /* Program Name: MI01 */ ENTRY * (PARM_LIST) EXT; DCL SPCPTR ARG1@ PARM; DCL SPCPTR ARG2@ PARM; DCL SPCPTR RESULT@ PARM; First the program needs an ENTRY directive statement to designate its external entry point. The following directive declares an unnamed (the *) external (the EXT) entry point, which is called with a parameter list corresponding to PARM_LIST (defined later in the source code). DCL OL PARM_LIST (ARG1@, ARG2@, RESULT@) PARM EXT; DCL DD ARG1 PKD(15,5) BAS(ARG1@); DCL DD ARG2 PKD(15,5) BAS(ARG2@); DCL DD RESULT PKD(15,5) BAS(RESULT@); CMPNV(B) ARG1,ARG2 / LO(ITS2); CPYNV RESULT,ARG1; B RETURN; ITS2: CPYNV RESULT,ARG2; RETURN: RTX *; PEND;
44 Module 2 Copyright IBM Corporation Entry Directive Statement
45 Module 2 Copyright IBM Corporation /* Program Name: MI01 */ ENTRY * (PARM_LIST) EXT; DCL SPCPTR ARG1@ PARM; DCL SPCPTR ARG2@ PARM; DCL SPCPTR RESULT@ PARM; Declare Arguments DCL OL PARM_LIST (ARG1@, ARG2@, RESULT@) PARM EXT; DCL DD ARG1 PKD(15,5) BAS(ARG1@); DCL DD ARG2 PKD(15,5) BAS(ARG2@); DCL DD RESULT PKD(15,5) BAS(RESULT@); CMPNV(B) ARG1,ARG2 / LO(ITS2); CPYNV RESULT,ARG1; B RETURN; ITS2: CPYNV RESULT,ARG2; RETURN: RTX *; PEND; OS/400 programs typically pass parameters by reference as part of the high-level language (HLL) calling convention. Because OS/400 programs pass by reference (that is, address and not value), the program also needs to define three space pointers (how storage is referenced) to represent the three parameters being passed. To associate these three space pointers with the parameters being passed to the program, the following operand list (OL) is declared
46 Module 2 Copyright IBM Corporation Declare Paramater Types /* Program Name: MI01 */ ENTRY * (PARM_LIST) EXT; DCL SPCPTR ARG1@ PARM; DCL SPCPTR ARG2@ PARM; DCL SPCPTR RESULT@ PARM; DCL OL PARM_LIST (ARG1@, ARG2@, RESULT@) PARM EXT; DCL DD ARG1 PKD(15,5) BAS(ARG1@); DCL DD ARG2 PKD(15,5) BAS(ARG2@); DCL DD RESULT PKD(15,5) BAS(RESULT@); CMPNV(B) ARG1,ARG2 / LO(ITS2); CPYNV RESULT,ARG1; B RETURN; ITS2: CPYNV RESULT,ARG2; RETURN: RTX *; PEND;
47 Module 2 Copyright IBM Corporation Instruction Stream /* Program Name: MI01 */ ENTRY * (PARM_LIST) EXT; DCL SPCPTR ARG1@ PARM; DCL SPCPTR ARG2@ PARM; DCL SPCPTR RESULT@ PARM; DCL OL PARM_LIST (ARG1@, ARG2@, RESULT@) PARM EXT; DCL DD ARG1 PKD(15,5) BAS(ARG1@); DCL DD ARG2 PKD(15,5) BAS(ARG2@); DCL DD RESULT PKD(15,5) BAS(RESULT@); CMPNV(B) ARG1,ARG2 / LO(ITS2); CPYNV RESULT,ARG1; B RETURN; ITS2: CPYNV RESULT,ARG2; RETURN: RTX *; PEND; The program then branches (the (B) extender to CMPNV) to label ITS2 if ARG1 is less than ARG2 (the /LO branch target). Other target keywords could be LO, HI, EQ, If ARG2 was greater than ARG1, the CPYNV instruction at label ITS2 is run, setting RESULT to the value of ARG2.
48 Module 2 Copyright IBM Corporation Program End /* Program Name: MI01 */ ENTRY * (PARM_LIST) EXT; DCL SPCPTR ARG1@ PARM; DCL SPCPTR ARG2@ PARM; DCL SPCPTR RESULT@ PARM; DCL OL PARM_LIST (ARG1@, ARG2@, RESULT@) PARM EXT; DCL DD ARG1 PKD(15,5) BAS(ARG1@); DCL DD ARG2 PKD(15,5) BAS(ARG2@); DCL DD RESULT PKD(15,5) BAS(RESULT@); CMPNV(B) ARG1,ARG2 / LO(ITS2); CPYNV RESULT,ARG1; B RETURN; ITS2: CPYNV RESULT,ARG2; RETURN: RTX *; PEND; The program has now finished processing and ends. The previous return external (RTX) instruction is not needed because it is implied by the PEND directive. The RTX instruction is included to add clarity to the program flow.
49 Module 2 Copyright IBM Corporation Lx86
50 Module 2 Copyright IBM Corporation PowerVM Lx86 for x86 Linux applications Transforming x86 Linux applications without porting Helps enable x86 Linux apps to just run on servers with Linux OS Supports installation and running of most existing 32-bit x86 Linux applications 1 Creates an x86 Linux application environment running on Linux for System p Extends values of IBM Power Systems platforms to x86 Linux applications Dynamic binary translation x86 Linux Applications Linux for POWER Operating system call mapping (1) System p Application Virtual Environment ("System p AVE") runs most x86 Linux applications, but System p AVE cannot run applications that: Directly access hardware (for example, 3D graphics adapters); Require nonstandard kernel module access or use kernel modules not provided by the Linux for POWER operating system distribution; Do not use only the Intel IA-32 instruction set architecture as defined by the 1997 Intel Architecture Software Developer's Manual consisting of Basic Architecture (Order Number ), Instruction Set Reference Manual (Order Number ) and the System Programming Guide (Order Number ) ll dated 1997; Are Linux/x86 specific system administration or configuration tools; Require x86 real-mode. Visit ibm.com/systems/p/linux/qual.html for detailed qualifications.
51 Module 2 Copyright IBM Corporation What does PowerVM Lx86 do? Native Linux for POWER Binary x86 Linux Applications ISV Binaries PowerVM Lx86 Front End Optimizer Back End POWER Processor platform User Binaries Linux OS (Red Hat or Novell SUSE) Dynamically translates and maps x86 Linux instructions to POWER Translation process Translates blocks of code into intermediate representation Performs optimizations Stores optimized, frequently used blocks of code in cache Handles Linux OS call mapping Encodes binary for target POWER processor platform Best for certain applications and usage scenarios Power architecture can provide many advantages But these make our architecture very different from x86 architecture Translation can be resource intensive
Introduction to Virtual Machines
Introduction to Virtual Machines Introduction Abstraction and interfaces Virtualization Computer system architecture Process virtual machines System virtual machines 1 Abstraction Mechanism to manage complexity
Instruction Set Architecture (ISA)
Instruction Set Architecture (ISA) * Instruction set architecture of a machine fills the semantic gap between the user and the machine. * ISA serves as the starting point for the design of a new machine
Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system
Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems
Building Applications Using Micro Focus COBOL
Building Applications Using Micro Focus COBOL Abstract If you look through the Micro Focus COBOL documentation, you will see many different executable file types referenced: int, gnt, exe, dll and others.
Topics. Introduction. Java History CS 146. Introduction to Programming and Algorithms Module 1. Module Objectives
Introduction to Programming and Algorithms Module 1 CS 146 Sam Houston State University Dr. Tim McGuire Module Objectives To understand: the necessity of programming, differences between hardware and software,
How do Users and Processes interact with the Operating System? Services for Processes. OS Structure with Services. Services for the OS Itself
How do Users and Processes interact with the Operating System? Users interact indirectly through a collection of system programs that make up the operating system interface. The interface could be: A GUI,
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
Advanced Computer Architecture-CS501. Computer Systems Design and Architecture 2.1, 2.2, 3.2
Lecture Handout Computer Architecture Lecture No. 2 Reading Material Vincent P. Heuring&Harry F. Jordan Chapter 2,Chapter3 Computer Systems Design and Architecture 2.1, 2.2, 3.2 Summary 1) A taxonomy of
Introducción. Diseño de sistemas digitales.1
Introducción Adapted from: Mary Jane Irwin ( www.cse.psu.edu/~mji ) www.cse.psu.edu/~cg431 [Original from Computer Organization and Design, Patterson & Hennessy, 2005, UCB] Diseño de sistemas digitales.1
System Structures. Services Interface Structure
System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface
Characteristics of Java (Optional) Y. Daniel Liang Supplement for Introduction to Java Programming
Characteristics of Java (Optional) Y. Daniel Liang Supplement for Introduction to Java Programming Java has become enormously popular. Java s rapid rise and wide acceptance can be traced to its design
A Unified View of Virtual Machines
A Unified View of Virtual Machines First ACM/USENIX Conference on Virtual Execution Environments J. E. Smith June 2005 Introduction Why are virtual machines interesting? They allow transcending of interfaces
Operating System Overview. Otto J. Anshus
Operating System Overview Otto J. Anshus A Typical Computer CPU... CPU Memory Chipset I/O bus ROM Keyboard Network A Typical Computer System CPU. CPU Memory Application(s) Operating System ROM OS Apps
CPU Organization and Assembly Language
COS 140 Foundations of Computer Science School of Computing and Information Science University of Maine October 2, 2015 Outline 1 2 3 4 5 6 7 8 Homework and announcements Reading: Chapter 12 Homework:
picojava TM : A Hardware Implementation of the Java Virtual Machine
picojava TM : A Hardware Implementation of the Java Virtual Machine Marc Tremblay and Michael O Connor Sun Microelectronics Slide 1 The Java picojava Synergy Java s origins lie in improving the consumer
Migrate AS 400 Applications to Windows, UNIX or Linux
Migrate AS 400 Applications to Windows, UNIX or Linux INFINITE Corporation White Paper prepared for Infinite Product Group date January 2012 Abstract: This paper is a discussion of how to create platform
Overview. CISC Developments. RISC Designs. CISC Designs. VAX: Addressing Modes. Digital VAX
Overview CISC Developments Over Twenty Years Classic CISC design: Digital VAX VAXÕs RISC successor: PRISM/Alpha IntelÕs ubiquitous 80x86 architecture Ð 8086 through the Pentium Pro (P6) RJS 2/3/97 Philosophy
Cloud Computing. Up until now
Cloud Computing Lecture 11 Virtualization 2011-2012 Up until now Introduction. Definition of Cloud Computing Grid Computing Content Distribution Networks Map Reduce Cycle-Sharing 1 Process Virtual Machines
Operating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
Chapter 3 Operating-System Structures
Contents 1. Introduction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threads 6. CPU Scheduling 7. Process Synchronization 8. Deadlocks 9. Memory Management 10. Virtual
18-447 Computer Architecture Lecture 3: ISA Tradeoffs. Prof. Onur Mutlu Carnegie Mellon University Spring 2013, 1/18/2013
18-447 Computer Architecture Lecture 3: ISA Tradeoffs Prof. Onur Mutlu Carnegie Mellon University Spring 2013, 1/18/2013 Reminder: Homeworks for Next Two Weeks Homework 0 Due next Wednesday (Jan 23), right
How To Write Portable Programs In C
Writing Portable Programs COS 217 1 Goals of Today s Class Writing portable programs in C Sources of heterogeneity Data types, evaluation order, byte order, char set, Reading period and final exam Important
Chapter 3: Operating-System Structures. Common System Components
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines System Design and Implementation System Generation 3.1
Instruction Set Design
Instruction Set Design Instruction Set Architecture: to what purpose? ISA provides the level of abstraction between the software and the hardware One of the most important abstraction in CS It s narrow,
Migrate AS 400 Applications to Linux
Migrate AS 400 Applications to Linux Infinite Corporation White Paper date March 2011 Abstract: This paper is a discussion of how to create platform independence by executing i OS (AS/400) applications
Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines
Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components
Virtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
Chapter 2 System Structures
Chapter 2 System Structures Operating-System Structures Goals: Provide a way to understand an operating systems Services Interface System Components The type of system desired is the basis for choices
The Java Virtual Machine and Mobile Devices. John Buford, Ph.D. [email protected] Oct 2003 Presented to Gordon College CS 311
The Java Virtual Machine and Mobile Devices John Buford, Ph.D. [email protected] Oct 2003 Presented to Gordon College CS 311 Objectives Review virtual machine concept Introduce stack machine architecture
Software: Systems and Application Software
Software: Systems and Application Software Computer Software Operating System Popular Operating Systems Language Translators Utility Programs Applications Programs Types of Application Software Personal
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
Exam : IBM 000-851. : Iseries Linux Soluton Sales v5r3
Exam : IBM 000-851 Title : Iseries Linux Soluton Sales v5r3 Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing
CPS221 Lecture: Operating System Structure; Virtual Machines
Objectives CPS221 Lecture: Operating System Structure; Virtual Machines 1. To discuss various ways of structuring the operating system proper 2. To discuss virtual machines Materials: 1. Projectable of
Virtualization. Jukka K. Nurminen 23.9.2015
Virtualization Jukka K. Nurminen 23.9.2015 Virtualization Virtualization refers to the act of creating a virtual (rather than actual) version of something, including virtual computer hardware platforms,
How to use PDFlib products with PHP
How to use PDFlib products with PHP Last change: July 13, 2011 Latest PDFlib version covered in this document: 8.0.3 Latest version of this document available at: www.pdflib.com/developer/technical-documentation
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
12. Introduction to Virtual Machines
12. Introduction to Virtual Machines 12. Introduction to Virtual Machines Modern Applications Challenges of Virtual Machine Monitors Historical Perspective Classification 332 / 352 12. Introduction to
Software: Systems and. Application Software. Software and Hardware. Types of Software. Software can represent 75% or more of the total cost of an IS.
C H A P T E R 4 Software: Systems and Application Software Software and Hardware Software can represent 75% or more of the total cost of an IS. Less costly hdwr. More complex sftwr. Expensive developers
Full and Para Virtualization
Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels
Jonathan Worthington Scarborough Linux User Group
Jonathan Worthington Scarborough Linux User Group Introduction What does a Virtual Machine do? Hides away the details of the hardware platform and operating system. Defines a common set of instructions.
Advantages of PML as an iseries Web Development Language
Advantages of PML as an iseries Web Development Language What is PML PML is a highly productive language created specifically to help iseries RPG programmers make the transition to web programming and
4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access
4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows
Virtualization and the U2 Databases
Virtualization and the U2 Databases Brian Kupzyk Senior Technical Support Engineer for Rocket U2 Nik Kesic Lead Technical Support for Rocket U2 Opening Procedure Orange arrow allows you to manipulate the
Data Sheet VISUAL COBOL 2.2.1 WHAT S NEW? COBOL JVM. Java Application Servers. Web Tools Platform PERFORMANCE. Web Services and JSP Tutorials
Visual COBOL is the industry leading solution for COBOL application development and deployment on Windows, Unix and Linux systems. It combines best in class development tooling within Eclipse and Visual
OPERATING SYSTEM SERVICES
OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered
Computer Architectures
Computer Architectures 2. Instruction Set Architectures 2015. február 12. Budapest Gábor Horváth associate professor BUTE Dept. of Networked Systems and Services [email protected] 2 Instruction set architectures
Processor Architectures
ECPE 170 Jeff Shafer University of the Pacific Processor Architectures 2 Schedule Exam 3 Tuesday, December 6 th Caches Virtual Memory Input / Output OperaKng Systems Compilers & Assemblers Processor Architecture
Kernel Types System Calls. Operating Systems. Autumn 2013 CS4023
Operating Systems Autumn 2013 Outline 1 2 Types of 2.4, SGG The OS Kernel The kernel is the central component of an OS It has complete control over everything that occurs in the system Kernel overview
LSN 2 Computer Processors
LSN 2 Computer Processors Department of Engineering Technology LSN 2 Computer Processors Microprocessors Design Instruction set Processor organization Processor performance Bandwidth Clock speed LSN 2
1. Overview of the Java Language
1. Overview of the Java Language What Is the Java Technology? Java technology is: A programming language A development environment An application environment A deployment environment It is similar in syntax
Java CPD (I) Frans Coenen Department of Computer Science
Java CPD (I) Frans Coenen Department of Computer Science Content Session 1, 12:45-14:30 (First Java Programme, Inheritance, Arithmetic) Session 2, 14:45-16:45 (Input and Programme Constructs) Materials
AS/400 System Overview
Chapter 1 AS/400 System Overview 1.1 Major Characteristics of AS/400 1.1.1 High Level of Integration 1.1.2 Object Orientation 1.1.3 Relational and Integrated Database 1.1.4 Data and Program Independence
İSTANBUL AYDIN UNIVERSITY
İSTANBUL AYDIN UNIVERSITY FACULTY OF ENGİNEERİNG SOFTWARE ENGINEERING THE PROJECT OF THE INSTRUCTION SET COMPUTER ORGANIZATION GÖZDE ARAS B1205.090015 Instructor: Prof. Dr. HASAN HÜSEYİN BALIK DECEMBER
Virtualization. Pradipta De [email protected]
Virtualization Pradipta De [email protected] Today s Topic Virtualization Basics System Virtualization Techniques CSE506: Ext Filesystem 2 Virtualization? A virtual machine (VM) is an emulation
<Insert Picture Here> Oracle Database Support for Server Virtualization Updated December 7, 2009
Oracle Database Support for Server Virtualization Updated December 7, 2009 Support Policy Server virtualization software allows multiple operating system instances to run on the same
Java on z/os. Agenda. Java runtime environments on z/os. Java SDK 5 and 6. Java System Resource Integration. Java Backend Integration
Martina Schmidt [email protected] Agenda Java runtime environments on z/os Java SDK 5 and 6 Java System Resource Integration Java Backend Integration Java development for z/os 4 1 Java runtime
Introduction to MIPS Assembly Programming
1 / 26 Introduction to MIPS Assembly Programming January 23 25, 2013 2 / 26 Outline Overview of assembly programming MARS tutorial MIPS assembly syntax Role of pseudocode Some simple instructions Integer
KITES TECHNOLOGY COURSE MODULE (C, C++, DS)
KITES TECHNOLOGY 360 Degree Solution www.kitestechnology.com/academy.php [email protected] [email protected] Contact: - 8961334776 9433759247 9830639522.NET JAVA WEB DESIGN PHP SQL, PL/SQL
Virtualization. Clothing the Wolf in Wool. Wednesday, April 17, 13
Virtualization Clothing the Wolf in Wool Virtual Machines Began in 1960s with IBM and MIT Project MAC Also called open shop operating systems Present user with the view of a bare machine Execute most instructions
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
CHAPTER 17: File Management
CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
Virtual Machines. Adapted from J.S. Smith and R. Nair, VIRTUAL MACHINES, Morgan-Kaufmann 2005. Teodor Rus. [email protected]
Virtual Machines Adapted from J.S. Smith and R. Nair, VIRTUAL MACHINES, Morgan-Kaufmann 2005 Teodor Rus [email protected] The University of Iowa, Department of Computer Science Introduction to System Software
Lecture 1 Introduction to Android
These slides are by Dr. Jaerock Kwon at. The original URL is http://kettering.jrkwon.com/sites/default/files/2011-2/ce-491/lecture/alecture-01.pdf so please use that instead of pointing to this local copy
Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. [email protected].
Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali [email protected] 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers
Chapter 2 Logic Gates and Introduction to Computer Architecture
Chapter 2 Logic Gates and Introduction to Computer Architecture 2.1 Introduction The basic components of an Integrated Circuit (IC) is logic gates which made of transistors, in digital system there are
IBM WebSphere Enterprise Service Bus, Version 6.0.1
Powering your service oriented architecture IBM WebSphere Enterprise Service Bus, Version 6.0.1 Highlights Supports a variety of messaging Requires minimal standards including JMS, Version 1.1 programming
find model parameters, to validate models, and to develop inputs for models. c 1994 Raj Jain 7.1
Monitors Monitor: A tool used to observe the activities on a system. Usage: A system programmer may use a monitor to improve software performance. Find frequently used segments of the software. A systems
A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM
A REVIEW PAPER ON THE HADOOP DISTRIBUTED FILE SYSTEM Sneha D.Borkar 1, Prof.Chaitali S.Surtakar 2 Student of B.E., Information Technology, J.D.I.E.T, [email protected] Assistant Professor, Information
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-12: ARM 1 The ARM architecture processors popular in Mobile phone systems 2 ARM Features ARM has 32-bit architecture but supports 16 bit
THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals
THREE YEAR DEGREE (HONS.) COURSE BACHELOR OF COMPUTER APPLICATION (BCA) First Year Paper I Computer Fundamentals Full Marks 100 (Theory 75, Practical 25) Introduction to Computers :- What is Computer?
Intro to Embedded SQL Programming for ILE RPG Developers
Intro to Embedded SQL Programming for ILE RPG Developers Dan Cruikshank DB2 for i Center of Excellence 1 Agenda Reasons for using Embedded SQL Getting started with Embedded SQL Using Host Variables Using
Instruction Set Architecture (ISA) Design. Classification Categories
Instruction Set Architecture (ISA) Design Overview» Classify Instruction set architectures» Look at how applications use ISAs» Examine a modern RISC ISA (DLX)» Measurement of ISA usage in real computers
a storage location directly on the CPU, used for temporary storage of small amounts of data during processing.
CS143 Handout 18 Summer 2008 30 July, 2008 Processor Architectures Handout written by Maggie Johnson and revised by Julie Zelenski. Architecture Vocabulary Let s review a few relevant hardware definitions:
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions. Outline. Performance oriented design
PART IV Performance oriented design, Performance testing, Performance tuning & Performance solutions Slide 1 Outline Principles for performance oriented design Performance testing Performance tuning General
Design Cycle for Microprocessors
Cycle for Microprocessors Raúl Martínez Intel Barcelona Research Center Cursos de Verano 2010 UCLM Intel Corporation, 2010 Agenda Introduction plan Architecture Microarchitecture Logic Silicon ramp Types
Virtual Machines. www.viplavkambli.com
1 Virtual Machines A virtual machine (VM) is a "completely isolated guest operating system installation within a normal host operating system". Modern virtual machines are implemented with either software
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
Raima Database Manager Version 14.0 In-memory Database Engine
+ Raima Database Manager Version 14.0 In-memory Database Engine By Jeffrey R. Parsons, Senior Engineer January 2016 Abstract Raima Database Manager (RDM) v14.0 contains an all new data storage engine optimized
High performance ETL Benchmark
High performance ETL Benchmark Author: Dhananjay Patil Organization: Evaltech, Inc. Evaltech Research Group, Data Warehousing Practice. Date: 07/02/04 Email: [email protected] Abstract: The IBM server iseries
Virtual Machines and Their Architecture
COVER FEATURE The Architecture of Virtual Machines A virtual machine can support individual processes or a complete system depending on the abstraction level where virtualization occurs. Some support flexible
An Easier Way for Cross-Platform Data Acquisition Application Development
An Easier Way for Cross-Platform Data Acquisition Application Development For industrial automation and measurement system developers, software technology continues making rapid progress. Software engineers
Introduction to RISC Processor. ni logic Pvt. Ltd., Pune
Introduction to RISC Processor ni logic Pvt. Ltd., Pune AGENDA What is RISC & its History What is meant by RISC Architecture of MIPS-R4000 Processor Difference Between RISC and CISC Pros and Cons of RISC
Arwed Tschoeke, Systems Architect [email protected] IBM Systems and Technology Group
Virtualization in a Nutshell Arwed Tschoeke, Systems Architect [email protected] and Technology Group Virtualization Say What? Virtual Resources Proxies for real resources: same interfaces/functions,
Embedded Systems. Review of ANSI C Topics. A Review of ANSI C and Considerations for Embedded C Programming. Basic features of C
Embedded Systems A Review of ANSI C and Considerations for Embedded C Programming Dr. Jeff Jackson Lecture 2-1 Review of ANSI C Topics Basic features of C C fundamentals Basic data types Expressions Selection
Instruction Set Architecture. or How to talk to computers if you aren t in Star Trek
Instruction Set Architecture or How to talk to computers if you aren t in Star Trek The Instruction Set Architecture Application Compiler Instr. Set Proc. Operating System I/O system Instruction Set Architecture
An Overview of Virtual Machine Architectures
An Overview of Virtual Machine Architectures J. E. Smith and Ravi Nair Excerpt from Virtual Machines: Architectures, Implementations and Applications, to be published by Morgan Kaufmann Publishers, 2004.
Embedded Programming in C/C++: Lesson-1: Programming Elements and Programming in C
Embedded Programming in C/C++: Lesson-1: Programming Elements and Programming in C 1 An essential part of any embedded system design Programming 2 Programming in Assembly or HLL Processor and memory-sensitive
#820 Computer Programming 1A
Computer Programming I Levels: 10-12 Units of Credit: 1.0 CIP Code: 11.0201 Core Code: 35-02-00-00-030 Prerequisites: Secondary Math I, Keyboarding Proficiency, Computer Literacy requirement Semester 1
IBM Software Group. Lotus Domino 6.5 Server Enablement
IBM Software Group Lotus Domino 6.5 Server Enablement Agenda Delivery Strategy Themes Domino 6.5 Server Domino 6.0 SmartUpgrade Questions IBM Lotus Notes/Domino Delivery Strategy 6.0.x MRs every 4 months
The Java Series. Java Essentials I What is Java? Basic Language Constructs. Java Essentials I. What is Java?. Basic Language Constructs Slide 1
The Java Series Java Essentials I What is Java? Basic Language Constructs Slide 1 What is Java? A general purpose Object Oriented programming language. Created by Sun Microsystems. It s a general purpose
The C Programming Language course syllabus associate level
TECHNOLOGIES The C Programming Language course syllabus associate level Course description The course fully covers the basics of programming in the C programming language and demonstrates fundamental programming
Chapter 1 Fundamentals of Java Programming
Chapter 1 Fundamentals of Java Programming Computers and Computer Programming Writing and Executing a Java Program Elements of a Java Program Features of Java Accessing the Classes and Class Members The
VLIW Processors. VLIW Processors
1 VLIW Processors VLIW ( very long instruction word ) processors instructions are scheduled by the compiler a fixed number of operations are formatted as one big instruction (called a bundle) usually LIW
