• Primary Memory
  • Relationship Between the Applications




    Download 6,34 Mb.
    Pdf ko'rish
    bet72/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   68   69   70   71   72   73   74   75   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    Relationship Between the Applications,
    Hardware, and Kernels
    From the diagram, we can see that the user process runs in the user mode
    whereas, the Kernel runs in the kernel- mode. That is if a code is running in
    the kernel mode can access processor (CPU) and the main memory without
    any restrictions. Although this might make you happy, this feature of the
    kernel can easily crash a whole system down.
    The user mode, therefore, restricts access directly to the processor. That is
    why when any users mistakenly go to the processor and alter the
    functioning of the CPU; it crashes the whole system. Where cases of a crash
    are not mild, then the kernel tries to clean up the messes done. Although if
    you had running programs, then they will not work as usual. When you alter
    the user-face, it may not cause severe damages compared to the kernel .
    Hardware is the physical part of the computer holding the memory of the
    machine that is the Random-Access Memory. It stores information that has
    been saved in files and also assisting the central processing unit in loading
    files faster and efficiently. All inputs and outputs of the computer run


    through the main memory. There are some memories found in the internal
    memory that you need to understand.
    Primary Memory – here we have the Random-Access Memory (RAM)
    and Read-Only Memory (ROM).
    1. 
    RAM – Data stored in this form can be easily accessed anytime
    when a user does a prompt. This type of memory is
    exceptionally
    volatile, where you can write or read. Suppose power goes off,
    then this memory cannot be traced. We have different types of
    Random-access Memory.
    ❖ 
    SRAM – This is static random-access memory. It is one of the most expensive memories
    you can ever get. There are several versions of this memory such as DDR2, DDR3, and DD4,
    all giving the user a better performance than DDR. It consists of six capacitors in each cell. 
    ❖ 
    DRAM – Dynamic random-access memory is the most commonly used type of memory in
    computers. Compared to SRAM, this kind of memory is slower with a capacitor and
    transistor in each cell.
    1. ROM – As the name suggests this type of data can only be read but unable to write. It
    is a fast kind of data for the users. Unlike random-access memory, when the power
    goes off, one can access this data later on. We can say, even when power is off the
    computer does not need software to help the CPU communicate.
    This memory has millions of transistors and capacitors. Now, when these two parts are
    combined, they form what we call a memory cell denoted by a single bit. A capacitor bucket
    stores electrons though at times the bucket may leak. The dynamic random-access memory
    helps recharge the emptied buckets before doing the disbarment. The process is repeated
    repeatedly in very many cycles to enable the processor to read and write memory back.
    This is a key point to understand since, at times during hacking our data can
    be traced if you do not understand which memory to work with. When you
    can to hack the memory of a computer, you can do stuff like Vacuums,
    game exploits, good modes and much more. In any case, if memory
    manipulation is impossible, then it will be challenging to do the
    manipulation.
    The kernel is the heartbeat of Linux. Figure 1.1 gives an overview of what
    the Linux kernel does. In the process part of it, the Kernel selects which
    process is to be allowed first before the other. In the memory, Kernel helps
    keep a record of memory like the amount of memory to allocate to a
    Download 6,34 Mb.
    1   ...   68   69   70   71   72   73   74   75   ...   203




    Download 6,34 Mb.
    Pdf ko'rish