We are here with you hands in hands to facilitate your learning & don't appreciate the idea of copying or replicating solutions. Read More>>
|Graded Discussion Board Announcement||Dated: Feb 11, 14|
Graded Discussion Board for the course “System Programming (CS609)” will be open on Thursday 20th Feb, 2014 and it will be closed on Friday 21th Feb, 2014.
"The methods of DMA mode transfer are limited to protected mode programs." Support or contradict this statement with solid reason.
Read the instructions carefully before sending your comments:
+ Click Here To Join also Our facebook study Group...How to Join Subject Study Groups & Get Helping Material?..
.+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)
+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)+ Click Here to Search (Looking For something at vustudents.ning.com?)
Please Discuss here about this GDB.Thanks
Our main purpose here discussion not just Solution
We are here with you hands in hands to facilitate your learning and do not appreciate the idea of copying or replicating solutions.
It is hard to run an open-source project following a more traditional software development method like the waterfall model, because in these traditional methods it is not allowed to go back to a previous phase. In open-source software development requirements are rarely gathered before the start of the project; instead they are based on early releases of the software product, as Robbins describes. Besides requirements, often volunteer staff is attracted to help develop the software product based on the early releases of the software. This networking effect is essential according to Abrahamsson et al.: “if the introduced prototype gathers enough attention, it will gradually start to attract more and more developers”. However, Abrahamsson et al. also point out that the community is very harsh, much like the business world of closed-source software: “if you find the customers you survive, but without customers you die”.
Alfonso Fuggetta mentions that “rapid prototyping, incremental and evolutionary development, spiral lifecycle, rapid application development, and, recently, extreme programming and the agile software process can be equally applied to proprietary and open source software”. One open-source development method mentioned by Fuggetta is an agile method called Extreme Programming. All the Agile methods are in essence applicable to open-source software development, because of their iterative and incremental character. Another Agile method, Internet-Speed Development, is also suitable for open-source software development in particular because of the distributed development principle it adopts. Internet-Speed Development used geographically distributed teams to ‘work around the clock’. This method is mostly adopted by large closed-source firms like Microsoft, because only big software firms are able to create distributed development centers in different time zones. Of course if software is developed by a large group of volunteers in different countries, this is being achieved naturally and without the investment needed like with closed-source software development.
Rizwan Hussain bro, this cs609 system programming GDB discussion , you r posting CS605 software engineering GDB material in the wrong discussion,
discuss here about CS609 System programming GDB,
hahahahah, dimag kam karna chor gaya ha, exam ki tensen se.
no one here to discus before time????????????????
The process for performing DMA transfers in the protected mode Windows environment should be similiar to the process for performing DMA transfers in the real mode MS-DOS environment. In both environments, you must initialize the DMA controller with the starting base address, page address, transfer count, and mode. In both environments, you would usually install a hardware interrupt handler to handle terminal count interrupts when a DMA transfer is complete.
Yes, The process for performing DMA transfers in the protected mode Windows environment should be similiar to the process for performing DMA transfers in the real mode MS-DOS environment. In both environments, you must initialize the DMA controller with the starting base address, page address, transfer count, and modeIf the DMA region specified by the virtual base address and transfer count maps to physical memory that is physically contiguous and does not cross a 64K boundary on byte channels or a 128K boundary on word channels, the VDMAD will physically program the DMA controller with the physical base
khurrrrrr khurrrrrrr, sub so rahe hen????????????????
i thnk abdual raouf sir we are the only who need GDB SOL.
No, agar process of performing DMA transfer in protected & real are similar then how is it limited to only Procted mode...
I strongly contradict this statement.
Main iss statament ki shadeed muzmat krta houn aur tashveesh ka izhaar bi krta houn...
i am also agree with Raja ahmed bhai
contradict of the statement is true
lakin abhi tak reasoning nahi mili siwa jo wafa gi na yahan per pehly he paste ki hoi hai...