Misplaced Pages

System monitor

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
#998001

57-503: A system monitor is a hardware or software component used to monitor system resources and performance in a computer system. Among the management issues regarding use of system monitoring tools are resource usage and privacy. Monitoring can track both input and output values and events of systems. Software monitors occur more commonly, sometimes as a part of a widget engine . These monitoring systems are often used to keep track of system resources, such as CPU usage and frequency, or

114-485: A hardware exception occurs that cannot be handled . Operating system crashes can also occur when internal sanity-checking logic within the operating system detects that the operating system has lost its internal self-consistency. Modern multi-tasking operating systems, such as Linux , and macOS , usually remain unharmed when an application program crashes. Some operating systems, e.g., z/OS , have facilities for Reliability, availability and serviceability (RAS) and

171-432: A monitor , mouse , keyboard , and speakers . By contrast, software is a set of written instructions that can be stored and run by hardware. Hardware derived its name from the fact it is hard or rigid with respect to changes, whereas software is soft because it is easy to change. Hardware is typically directed by the software to execute any command or instruction . A combination of hardware and software forms

228-427: A video game ) unexpectedly quits, abruptly taking the user back to the desktop . Usually, the term is applied only to crashes where no error is displayed, hence all the user sees as a result of the crash is the desktop. Many times there is no apparent action that causes a crash to desktop. During normal function, the program may freeze for a shorter period of time, and then close by itself. Also during normal function,

285-458: A GPU integrated into the motherboard. Most computers also have an external data bus to connect peripheral devices to the motherboard. Most commonly, Universal Serial Bus (USB) is used. Unlike the internal bus, the external bus is connected using a bus controller that allows the peripheral system to operate at a different speed from the CPU. Input and output devices are used to receive data from

342-476: A bug in this domain can have severe impact: an extreme case would "cause the OS to crash ". Single system: Distributed: Computer hardware Computer hardware includes the physical parts of a computer , such as the central processing unit (CPU), random access memory (RAM) , motherboard , computer data storage , graphics card , sound card , and computer case . It includes external devices such as

399-485: A centralized memory that stored both data and programs, a central processing unit (CPU) with priority of access to the memory, and input and output (I/O) units . Von Neumann used a single bus to transfer data, meaning that his solution to the storage problem by locating programs and data adjacent to each other created the Von Neumann bottleneck when the system tries to fetch both at the same time—often throttling

456-590: A commensurate increase in energy use and cooling demand. The personal computer is one of the most common types of computer due to its versatility and relatively low price. Virtual hardware is software that mimics the function of hardware; it is commonly used in infrastructure as a Service (IaaS) and platform as a Service (PaaS). Embedded systems have the most variation in their processing power and cost: from an 8-bit processor that could cost less than USD $ 0.10, to higher-end processors capable of billions of operations per second and costing over USD$ 100. Cost

513-400: A computer program such as a software application or an operating system stops functioning properly and exits . On some operating systems or individual applications, a crash reporting service will report the crash and any details relating to it (or give the user the option to do so), usually to the developer(s) of the application. If the program is a critical part of the operating system,

570-413: A cord, light or takes some kind of battery. Some companies, such as Dell and Apple , will recycle computers of their make or any other make. Otherwise, a computer can be donated to Computer Aid International which is an organization that recycles and refurbishes old computers for hospitals, schools, universities, etc. Computer crash In computing , a crash , or system crash , occurs when

627-417: A dialogue box (such as the one shown to the right) with the option to attach a debugger if one is installed. Some applications attempt to recover from the error and continue running instead of exiting . An application can also contain code to crash after detecting a severe error. Typical errors that result in application crashes include: A "crash to desktop" is said to occur when a program (commonly

SECTION 10

#1732788122999

684-749: A separate chip, often interfaced through IC or SMBus , or as part of a Super I/O solution, often interfaced through Low Pin Count (LPC). These devices make it possible to monitor temperature in the chassis , voltage supplied to the motherboard by the power supply unit and the speed of the computer fans that are connected directly to one of the fan headers on the motherboard. Many of these hardware monitors also have fan controlling capabilities. System monitoring software like SpeedFan on Windows, lm_sensors on Linux, envstat on NetBSD, and sysctl hw.sensors on OpenBSD and DragonFly can interface with these chips to relay this environmental sensor information to

741-411: A small LCD panel or on series of small analog or LED numeric displays. Some hardware-based system monitors also allow direct control of fan speeds, allowing the user to quickly customize the cooling in the system. The primary function of a few very high-end models of hardware system monitor is to interface with only a specific model of motherboard . These systems directly utilize the sensors built into

798-421: A usable computing system, although other systems exist with only hardware. Early computing devices were more complicated than the ancient abacus date to the seventeenth century. French mathematician Blaise Pascal designed a gear-based device that could add and subtract, selling around 50 models. The stepped reckoner was invented by Gottfried Leibniz by 1676, which could also divide and multiply. Due to

855-400: A variety of plastics that are present in bulk in computers or other electronics can reduce the costs of constructing new systems. Components frequently contain copper , gold , tantalum , silver , platinum , palladium , and lead as well as other valuable materials suitable for reclamation. The central processing unit contains many toxic materials. It contains lead and chromium in

912-444: A very similar commodity . Profit margins have also been reduced. Even when the performance is not increasing, the cost of components has been dropping over time due to improved manufacturing techniques that have fewer components rejected at quality assurance stage. The most common instruction set architecture (ISA)—the interface between a computer's hardware and software—is based on the one devised by von Neumann in 1945. Despite

969-406: A workaround is needed, such as replacing event recording with simple counting. Another consideration is not having major impact on the CPU and storage available for useful work. While a hardware monitor will usually have less impact than a software monitor, there are data items, such as "some descriptive information, such as program names" that must involve software. A further consideration is that

1026-495: Is a growing movement to recycle old and outdated parts. Computer hardware contain dangerous chemicals such as lead, mercury, nickel, and cadmium. According to the EPA these e-wastes have a harmful effect on the environment unless they are disposed of properly. Making hardware requires energy, and recycling parts will reduce air pollution , water pollution, as well as greenhouse gas emissions. Disposing unauthorized computer equipment

1083-427: Is a particular concern with these systems, with designers often choosing the cheapest option that satisfies the performance requirements. A computer case encloses most of the components of a desktop computer system. It provides mechanical support and protection for internal elements such as the motherboard, disk drives, and power supply, and controls and directs the flow of cooling air over internal components. The case

1140-464: Is also part of the system to control electromagnetic interference radiated by the computer and protects internal parts from electrostatic discharge. Large tower cases provide space for multiple disk drives or other peripherals and usually stand on the floor, while desktop cases provide less expansion room. All-in-one style designs include a video display built into the same case. Portable and laptop computers require cases that provide impact protection for

1197-484: Is either true or false. Boolean algebra is now the basis of the circuits that model the transistors and other components of integrated circuits that make up modern computer hardware. In 1945, Turing finished the design for a computer (the Automatic Computing Engine ) that was never built. Around this time, technological advancement in relays and vacuum tubes enabled the construction of

SECTION 20

#1732788122999

1254-527: Is in fact illegal. Legislation makes it mandatory to recycle computers through the government approved facilities. Recycling a computer can be made easier by taking out certain reusable parts. For example, the RAM , DVD drive, the graphics card , hard drive or SSD , and other similar removable parts can be reused. Many materials used in computer hardware can be recovered by recycling for use in future production. Reuse of tin , silicon , iron , aluminum , and

1311-434: Is surrounded by cooling fluid) and direct-to-chip (where the cooling fluid is directed to each computer chip) can be more expensive but are also more efficient. Most computers are designed to be more powerful than their cooling system, but their sustained operations cannot exceed the capacity of the cooling system. While performance can be temporarily increased when the computer is not hot ( overclocking ), in order to protect

1368-537: Is the main component of a computer. It is a board with integrated circuitry that connects the other parts of the computer including the CPU , the RAM , the disk drives ( CD , DVD , hard disk , or any others) as well as any peripherals connected via the ports or the expansion slots . The integrated circuit (IC) chips in a computer typically contain billions of tiny metal–oxide–semiconductor field-effect transistors (MOSFETs). Components directly attached to or to part of

1425-442: Is typically considered to be the cause of the crash, which is discovered through the process of debugging . The original bug can be far removed from the code that actually triggered the crash. In early personal computers, attempting to write data to hardware addresses outside the system's main memory could cause hardware damage. Some crashes are exploitable and let a malicious program or hacker execute arbitrary code , allowing

1482-401: The operating system to map virtual memory to different areas of the finite physical memory. Computer processors generate heat, and excessive heat impacts their performance and can harm the components. Many computer chips will automatically throttle their performance to avoid overheating. Computers also typically have mechanisms for dissipating excessive heat, such as air or liquid coolers for

1539-403: The CPU and GPU and heatsinks for other components, such as the RAM . Computer cases are also often ventilated to help dissipate heat from the computer. Data centers typically use more sophisticated cooling solutions to keep the operating temperature of the entire center safe. Air-cooled systems are more common in smaller or older data centers, while liquid-cooled immersion (where each computer

1596-484: The German word " Abend " meaning "evening". Depending on the application, the crash may contain the user's sensitive and private information . Moreover, many software bugs which cause crashes are also exploitable for arbitrary code execution and other types of privilege escalation . For example, a stack buffer overflow can overwrite the return address of a subroutine with an invalid value, which will cause, e.g.,

1653-528: The Internet, such as abend.org . This usage derives from the ABEND macro on IBM OS/360 , ..., z/OS operating systems. Usually capitalized, but may appear as "abend". Some common ABEND codes are System ABEND 0C7 (data exception) and System ABEND 0CB ( division by zero ). Abends can be "soft" (allowing automatic recovery) or "hard" (terminating the activity). The term is jocularly claimed to be derived from

1710-490: The OS can recover from the crash of a critical component, whether due to hardware failure, e.g., uncorrectable ECC error, or to software failure, e.g., a reference to an unassigned page. An Abnormal end or ABEND is an abnormal termination of software , or a program crash. Errors or crashes on the Novell NetWare network operating system are usually called ABENDs. Communities of NetWare administrators sprung up around

1767-415: The amount of free RAM . They are also used to display items such as free space on one or more hard drives, the temperature of the CPU and other important components, and networking information including the system IP address and current rates of upload and download. Other possible displays may include the date and time, system uptime , computer name, username, hard drive S.M.A.R.T. data, fan speeds, and

System monitor - Misplaced Pages Continue

1824-548: The annual rate of improvement in hardware performance exceeded 50 percent, enabling the development of new computing devices such as tablets and mobiles. Alongside the density of transistors, DRAM memory as well as flash and magnetic disk storage also became exponentially more compact and cheaper. The rate of improvement slackened off in the twenty-first century. In the twenty-first century, increases in performance have been driven by increasing exploitation of parallelism . Applications are often parallelizable in two ways: either

1881-650: The atmosphere, landfill or waterways. While electronics consist a small fraction of total waste generated, they are far more dangerous. There is stringent legislation designed to enforce and encourage the sustainable disposal of appliances, the most notable being the Waste Electrical and Electronic Equipment Directive of the European Union and the United States National Computer Recycling Act. E-cycling ,

1938-443: The design of the CPU, memory, and memory interconnect . Memory hierarchy ensures that the memory quicker to access (and more expensive) is located closer to the CPU, while slower, cheaper memory for large-volume storage is located further away. Memory is typically segregated to separate programs from data and limit an attacker's ability to alter programs. Most computers use virtual memory to simplify addressing for programs, using

1995-440: The design was incorporated into the earliest computers: punch cards for input and output, memory , an arithmetic unit analogous to central processing units , and even a primitive programming language similar to assembly language . In 1936, Alan Turing developed the universal Turing machine to model any type of computer, proving that no computer would be able to solve the decision problem . The universal Turing machine

2052-534: The entire system may crash or hang, often resulting in a kernel panic or fatal system error . Most crashes are the result of a software bug . Typical causes include accessing invalid memory addresses, incorrect address values in the program counter , buffer overflow , overwriting a portion of the affected program code due to an earlier bug, executing invalid machine instructions (an illegal or unauthorized opcode), or triggering an unhandled exception . The original software bug that started this chain of events

2109-466: The error in a separate window when the user has returned to the desktop. The software running the web server behind a website may crash, rendering it inaccessible entirely or providing only an error message instead of normal content. For example: if a site is using an SQL database (such as MySQL ) for a script (such as PHP ) and that SQL database server crashes, then PHP will display a connection error. An operating system crash commonly occurs when

2166-575: The external world or write data respectively. Common examples include keyboards and mice (input) and displays and printers (output). Network interface controllers are used to access the Internet . USB ports also allow power to connected devices—a standard USB supplies power at 5 volts and up to 500 milliamps (2.5 watts ), while powered USB ports with additional pins may allow the delivery of more power—up to 6 amps at 24v. Global revenue from computer hardware in 2023 reached $ 705.17 billion. Because computer parts contain hazardous materials, there

2223-608: The first computers. Building on Babbage's design, relay computers were built by George Stibitz at Bell Laboratories and Harvard University 's Howard Aiken , who engineered the MARK I . Also in 1945, mathematician John von Neumann —working on the ENIAC project at the University of Pennsylvania —devised the underlying von Neumann architecture that has served as the template for most modern computers. Von Neumann's design featured

2280-461: The hardware from excessive heat, the system will automatically reduce performance or shut down the processor if necessary. Processors also will shut off or enter a low power mode when inactive to reduce heat. Power delivery as well as heat dissipation are the most challenging aspects of hardware design, and have been the limiting factor to the development of smaller and faster chips since the early twenty-first century. Increases in performance require

2337-413: The limitations of contemporary fabrication and design flaws, Leibniz' reckoner was not very functional, but similar devices ( Leibniz wheel ) remained in use into the 1970s. In the 19th century, Englishman Charles Babbage invented the difference engine , a mechanical device to calculate polynomials for astronomical purposes. Babbage also designed a general-purpose computer that was never built. Much of

System monitor - Misplaced Pages Continue

2394-525: The lungs, liver, and kidneys. Computer components contain many toxic substances, like dioxins , polychlorinated biphenyls (PCBs), cadmium , chromium , radioactive isotopes and mercury . Circuit boards contain considerable quantities of lead-tin solders that are more likely to leach into groundwater or create air pollution due to incineration. Recycling of computer hardware is considered environmentally friendly because it prevents hazardous waste , including heavy metals and carcinogens, from entering

2451-506: The metal plates. Resistors, semiconductors, infrared detectors, stabilizers, cables, and wires contain cadmium. The circuit boards in a computer contain mercury, and chromium. When these types of materials, and chemicals are disposed improperly will become hazardous for the environment. When e-waste byproducts leach into groundwater, are burned, or get mishandled during recycling, it causes harm. Health problems associated with such toxins include impaired mental development, cancer, and damage to

2508-443: The motherboard include: An expansion card in computing is a printed circuit board that can be inserted into an expansion slot of a computer motherboard or backplane to add functionality to a computer system via the expansion bus. Expansion cards can be used to obtain or expand on features not offered by the motherboard. Using expansion cards for a video processor used to be common, but modern computers are more likely to instead have

2565-509: The number of instructions the machines need to use. Based on a recognition that only a few instructions are commonly used, RISC shrinks the instruction set for added simplicity, which also enables the inclusion of more registers . After the invention of RISC in the 1980s, RISC based architectures that used pipelining and caching to increase performance displaced CISC architectures, particularly in applications with restrictions on power usage or space (such as mobile phones ). From 1986 to 2003,

2622-441: The program may become a black screen and repeatedly play the last few seconds of sound (depending on the size of the audio buffer ) that was being played before it crashes to desktop. Other times it may appear to be triggered by a certain action, such as loading an area. Crash to desktop bugs are considered particularly problematic for users. Since they frequently display no error message, it can be very difficult to track down

2679-552: The recycling of computer hardware, refers to the donation, reuse, shredding and general collection of used electronics. Generically, the term refers to the process of collecting, brokering, disassembling, repairing and recycling the components or metals contained in used or discarded electronic equipment, otherwise known as electronic waste (e-waste). E-cyclable items include, but are not limited to: televisions, computers, microwave ovens, vacuum cleaners, telephones and cellular phones, stereos, and VCRs and DVDs just about anything that has

2736-425: The replication of viruses or the acquisition of data which would normally be inaccessible. An application typically crashes when it performs an operation that is not allowed by the operating system. The operating system then triggers an exception or signal in the application. Unix applications traditionally responded to the signal by dumping core . Most Windows and Unix GUI applications respond by displaying

2793-646: The same function is running across multiple areas of data ( data parallelism ) or different tasks can be performed simultaneously with limited interaction ( task parallelism ). These forms of parallelism are accommodated by various hardware strategies, including instruction-level parallelism (such as instruction pipelining ), vector architectures and graphical processing units (GPUs) that are able to implement data parallelism, thread-level parallelism and request-level parallelism (both implementing task-level parallelism). Microarchitecture , also known as computer organization, refers to high-level hardware questions such as

2850-454: The separation of the computing unit and the I/O system in many diagrams, typically the hardware is shared, with a bit in the computing unit indicating whether it is in computation or I/O mode. Common types of ISAs include CISC ( complex instruction set computer ), RISC ( reduced instruction set computer ), vector operations , and hybrid modes. CISC involves using a larger expression set to minimize

2907-545: The source of the problem, especially if the times they occur and the actions taking place right before the crash do not appear to have any pattern or common ground. One way to track down the source of the problem for games is to run them in windowed-mode. Windows Vista has a feature that can help track down the cause of a CTD problem when it occurs on any program. Windows XP included a similar feature as well. Some computer programs, such as StepMania and BBC's Bamzooki , also crash to desktop if in full-screen, but display

SECTION 50

#1732788122999

2964-445: The system's performance. Computer architecture requires prioritizing between different goals, such as cost, speed, availability, and energy efficiency. The designer must have a good grasp of the hardware requirements and many different aspects of computing, from compilers to integrated circuit design. Cost has also become a significant constraint for manufacturers seeking to sell their products for less money than competitors offering

3021-468: The system, providing more detailed and accurate information than less-expensive monitoring systems customarily provide. Software monitoring tools operate within the device they're monitoring. Unlike software monitoring tools, hardware measurement tools can either located within the device being measure, or they can be attached and operate from an external location. A hardware monitor is a common component of modern motherboards , which can either come as

3078-449: The unit. Hobbyists may decorate the cases with colored lights, paint, or other features, in an activity called case modding . Most personal computer power supply units meet the ATX standard and convert from alternating current (AC) at between 120 and 277 volts provided from a power outlet to direct current (DC) at a much lower voltage: typically 12, 5, or 3.3 volts. The motherboard

3135-425: The user. When an individual user is measuring the performance of a single-user system , whether it is a standalone box or a virtual machine on a multi-user system , access does not impede the privacy of others. Privacy becomes an issue when someone other than the end-user, such as a system manager , has legitimate need to access data about other users. When events occur faster than a monitor can record them,

3192-408: The voltages being provided by the power supply. Less common are hardware-based systems monitoring similar information. Customarily these occupy one or more drive bays on the front of the computer case , and either interface directly with the system hardware or connect to a software data-collection system via USB . With either approach to gathering data, the monitoring system displays information on

3249-451: Was a type of stored-program computer capable of mimicking the operations of any Turing machine (computer model) based on the software instructions passed to it. The storage of computer programs is key to the operation of modern computers and is the connection between computer hardware and software. Even prior to this, in the mid-19th century mathematician George Boole invented Boolean algebra —a system of logic where each proposition

#998001