Wednesday, October 30, 2019
Ecological Footprint Reflection (Environmental Sustainability) Term Paper
Ecological Footprint Reflection (Environmental Sustainability) - Term Paper Example In practical approach oneââ¬â¢s own personal life style (related to food, mobility or waste) is selected and its ecological footprint is analyzed for four weeks and then reduction strategies (intervention) were employed for that particular life style for the next four weeks. Then a comparison was brought in to see how the reduction strategies affected oneââ¬â¢s Ecological foot print. The aim of this project was to analyze baseline food consumption based on calories and the reduction strategy was employed to reduce the calorie intake and to have a healthy diet. The 9th week, which was the first week of intervention failed miserably as that week alone had a large consumption; 1450 ml of alcoholic beverages, 1000ml of ice cream, 1.10 kg of fried chicken, 5 eggs and 4.48 kg of rice put together sums up a large intake of calorie, this high intake was associated to socializing with friends. The following weeks of intervention was more successful as both alcohol and ice cream consumption fell to 500ml each in the 2nd week to nil in the next two weeks for both. Alcohol has a high calorie content of 7 calories per gram and so reduction in alcoholic beverages can have good effect on the ecological footprint. This intervention any way had an effect on the overall alcohol consumption; 2250 ml in baseline tracking (4 weeks) compared to only 1825 ml on application of reduction strategy (4 weeks). At the same time ice-cream consumption was same for both the base line and intervention period. In the meat section the four week reduction strategy helped to reduce consumption of beef from 2.75 kg of initial four weeks (baseline) to 0.80kg and at the same time consumption of pork was reduced from 0.20 to 0.10 kg .Beef provides an enormous amount of calories on an average 250Kcal per 100gram. Pork contains high amount of non healthy fat. The intervention was not successful in reducing consumption of
Monday, October 28, 2019
Historical Background Of Foster Care In Ireland Social Work Essay
Historical Background Of Foster Care In Ireland Social Work Essay In order to fully appreciate the present situation of foster care in Ireland, an insight into the past history of foster care will be told. There has been a long tradition of fostering in Ireland. Foster care was present in the past, it was known as fosterage. It can be seen during the Brehon laws. Children from families of all classes were put into care of other families. This form of care was to lighten somewhat of the pressure for space in the home. This may have been as families were quiet large in the past and also financial difficulties. It also included children who were abandoned and needed the support and protection (Robins). The Brehon laws acted as the legal laws in Ireland and created two types of fosterage on where no remuneration was given and the other where a few is given (Shannon, 2005). Foster parents in both cases were to maintain their foster child to there rank. It was under a legal contract to keep and for the child until the period of was fosterage was not being cared for sufficiently, the chid was to be returned to there family home (O Higgins, 1996). Foundations of the present law around foster care were developed with the introduction of the Poor Law Amendment Act 1862. This provided children being boarding out to families who were not in work houses (O Higgins, 1996). The Infant Life Protection Act of 1897 presents where our recent system has originated from. This involved the appointment of females to inspect the conditions in which the children lived in, it also gave power that if not up to standards the child could be removed and placed in with families. Under the Health Act of 1953, health boards were empowered which provided for a major shift towards foster care. The arrangements that were introduced in boarding of childrens regulations in 1954, included provisions around the issue of being boarded out, placement in an approved school or if over 14 placed in employment (Task Force, 1980). Providing to be an important piece of legislation was the childrens act of 1908. It stated that a child who was neglected or abuse could be placed in the care of a fit person (O Higgins, 1996) Foster Care Foster care as previously discussed was a main expression towards the need for recognition of the rights of the child. Development in this area for acceptance that the child has needs of their own has led to the system of foster care that provides personalised family care that the workhouses and institutions could not provide. (Kelly and Gilligan, 2000, pg 7-8) Offers care in family setting Offers care in communication Offers opportunity to make attachment relationship to committed foster parents It can permit children to be attached and identify with family of origin It can include the childs family in care of child It can provide care and support into adulthood It can channel extra support from the agency for the child and carers (Kelly and Gilligan, 2000, pg 8) Modern child protection procedures are not sufficient as to make up a childs placement plan alone. It is more complex, as child care professionals now see the importance of individualisation and providing not only the physical care but the attachment and emotional needs ought to be provided for also (Kelly Gilligan, 2000). Children need to be placed in an environment where there needs are met, wishes can be supported and they can make individual choices for the future (Coakley, Cuddleback, Cox, 2007) Foster care is not a simple method of caring for a child; most children have experienced some form of trauma, may have been hurt or may have health or behaviour problems (Task Force, 1980). This calls for foster carers to be understanding and accept their emotions through being sensitive and caring. This can be a basis for the start of developing a relationship with the child (Fahlberg, 2004). The emergence of relative care in Ireland has proved beneficial to families. Keeping in with familys tradition and connection helps the development of childs identity, the surfacing of partnership as a key principle in child care (Broad, 2001). Legislation in Foster Care Firstly the researcher will examine the legislation in relation to relative foster care in Ireland. Child Care A ct 1991 There is a clear promotion for the welfare of children in the Child Care Act 1991. The health board has a statutory duty to identify children who are not receiving adequate care and protection (RWGFC). The welfare of the child is paramount and where appropriate the board is to give consideration to the wishes of the child based on their age and maturity (RWGFC). If social services are to meet the needs of children going into foster care then they must, among other things, listen to the child and include the children where possible in the decision making process (Kelly Gilligan, 2000). A plan is made which outlines aims and objectives for the placement and detailed guidelines for support to be given to the child, foster parents and natural parents (Shannon, 2005). UN Convention on the Rights of the Child The UN Convention was ratified in Ireland in 1992. It includes articles providing rights that relate to the childs life. It involves protection of the child from any form of discrimination and states the best interest of the child shall be held where possible when action is being considered which involves the child. It recognises the childs right to be protected and provided for. Foster care is mentioned in Article 20, stating that it is a substitute care provider when the parent or guardian fails to do so. This shows that foster care is a recognised as a suitable and appropriate form of care. Children Act 2001 The health board as stated in Section 23P requires at least 30 days notice for a private foster care placement to be arranged ad for an emergency foster care arrangement the health board requires notice within 14 days according to Section 23P2 (Shannon, 2005). At the time of notification, the health board has to be provided with the sufficient information around the foster placement (Shannon, 2005). It is said that the welfare of the child should be a primary concern to the foster parent. Section 23U allows for three interventions which the health board are obliged to use if the following occur. If it comes to the health boards attention that a private foster care arrangement has been arranged without notification to them or that the carers are not providing for the safety and welfare of the child then the interventions which can be implemented include a supervision order, an order to take the child and put into care or an instruction to terminate the order (Shannon, 2005). National Standards of Foster Care The national standards for foster care were devised following concerns around the quality of foster care services. These concerns were highlighted by the Report of the Working Group on Foster care, Foster Care: A child Centred Partnership (NSFC). The standards were developed by a committee who gathered information from experiences from individuals and organisations who work in the area of foster care and from a representative group of young people currently in foster care (NSFC). The National Standards for Foster Care 2003 provide guidelines on the provisions of quality foster care within the existing legislative framework (Shannon, 2005) There are 25 standards in all; the first 13 standards take into consideration the standard of care of the child including quality of response to factors around the childs needs and services required, whilst sticking to the relevant legislation (NSFC). The 2nd section involving the standards 14 to 17 are in relation to the assessment process of possible suitable foster carers and the training and support they require to provide for successful foster placements (NSFC). The final 8 standards are aimed at the duties and responsibilities of the health board. These standards provide guidelines which aim to promote the quality of services provided by the foster care professionals and Health Board (NSFC). The Child Care (Placement of Children with Relatives) Regulations The Regulations where put in place in 1995 as section 39 of the Child Care Act 1991 requiring the Minister for Health and Children to make regulations in relation to foster care. These regulations are directed at children who have been placed with a relative. The health board must pay attention to the rights and duties of the parents but the board must consider and consult with the child on his or her preferences (Shannon, 2005). Certain procedures must be implemented and fulfilled prior to the placement of a child in a foster care setting (Shannon, 2005). In relation to the welfare of the child needing to be considered, being placed in a family members home can cause conflict between relative carers and the birth family, so if this conflict cannot be settled then other placement should be considered (Shannon, 2005). Once the relative carers have lawful custody of the child, Article 16 of the regulations directs that the relatives take all reasonable steps to ensure the promotion of the childs health, development and welfare. In addition to the above many other factors contribute to the regulations. A relative intending to care for the child, must in according to Article 5 give in certain information regarding their health, two referees, examine into the relatives background such as criminal charges and any other relative information to the Health Board (Shannon, 2005). According to Article 12, the Health Board has to keep records of the children in foster care, including personal details of the child, an up to date case record containing certain documents (Shannon, 2005). In addition to this, the health board may visit the child as stated in the care plan. Whatever the arrangements made, Article 17 calls that the foster placement has visitation from an authorised member of the health board at least once every three months for the first two years (Shannon, 2005). To ensure the above aims of the childs placement, it is recommended that the case should be reviewed in terms of the successive of the placement and the possibility of the childs return to their natural familys home (Shannon, 2005). A foster care arrangement will end when the child reaches 18 years. Other possible reasons are that the child returns to their family home or at the request of the relative carers (Shannon, 2005). Assessment Process in Relation to Relative Foster Carers There are certain issues around the assessment process that are a cause for concern. Certain developments and amendments need to be applied to provide the best opportunity for foster care placements to be successful. In traditional foster care the assessment process lasts for a length of nine months usually, this process has to occur before the child is placed in the foster home. In comparison relative care, this process of assessment usually occurs after the child is placed with relatives due to the rapid movement of the child (Kelly Gilligan, 2000). A decision for the child to be placed with relatives is usually in the midst of a crisis. The family can be approached by the agency or the family themselves may contact the agency. As there are different regulations for traditional foster care and relative foster care, and the placement of the children occurs at different times, then it is questionable that there should be different assessment criteria (Kelly Gilligan, 2000). In recent studies, it shows that birth families themselves had preference to relatives caring for their children rather than with a home outside the family. Depending on the route to which the child entered relative care, either by agency approaching the relatives or the relatives approaching the agency, this can cause conflicting tensions between families (OBrien in Broad, 2001). The decision to take on the care of a grandchild is not an easy one. If the birth parents are not happy with the Health Service Executives decision to place their child in care, it can become a dilemma (Climo et al, 2002). The model of assessment of relative care is the same used for traditional foster parents. This is not right for relative carers as they have a connection with the child and family, the process is different to which they become known to the agency and the fact the placement is already made (OBrien in Broad, 2001). The assessment process of placement of a child with a relative usually occurs in two stages. The first is a preliminary assessment of the relatives; if the agency is content with the outcome then they proceed with the placement of the child. When the child is residing in the relatives family home the formal assessment process occurs (Kelly Gilligan, 2000). The following issues were found in a study done by David Pitcher assessing grandparents. The grandparents felt confused when being assessed and feared giving aware giving certain answers would result in their grandchildren not being placed with them. The process needs to be explained and the grandparents informed on the reason behind it to allow the process to be carried out in an honest manner (Pitcher in Broad, 2001). As grandparents have not planned to take on the full time care of a child, the can feel unprepared. Placement of the child usually occur mid crisis so it can cause the grandparents to feel stressed as they face meeting the criteria that is expected of them (Coakley et al, 2007). Social workers need to work with the grandparents in preparing them to cope with the challenges to promote successful placement and to alleviate these pending placements (Coakley et al, 2007). If the process is not explained properly this can lead to difficulty between the social worker and the grandparents. The grandparents can feel overwhelmed by the depth their private lives are being looked into. They can find this process negative and very intrusive and also it can be a frightening experience for them (Kelly Gilligan, 2000) As the process begins the grandparent should be given a written copy of the format of the interview. The social worker needs to give an honest explanatory description to the grandparents to prepare them for the process ahead. The aim of the social worker is to get an idea of the carers personality, to look at practical issues i.e. housing schools and to discuss together the perceived length that the placement will be (Broad, 2001) It can be of some reassurance for the birth parents that the child is going to live with people they know and may trust. The child can have different feelings of moving homes as in a study by Terling, 2003; found that trauma can be reduced when the child knows the person that will care for them rather than a stranger. Although the grandparent must acknowledge that while the child does know the grandparent, it does not reduce all of the stress and trauma that the child may experience when moving into another form of care (Broad, 2001). Also, the relationship between the grandparent and child must be looked at, questions need to be asked by the social workers such as does the grandparent actually like their grandchild and is there a sense of belonging for the child (Broad, 2001). Training should be specific to the carers needs. Parenting the Family Cycle The individual life cycle takes place within the family life cycle which is the primary context of human development (Carter Goldrick, 1988, pg 4). In early adult hood it can be expected that a couple will become parents of the younger generation, this can be an exciting period in a persons life. This new role that they adopt can involve responsibility in the childs developmental process and having authority in acting out parental roles to their children (Carter Goldrick, 1988). Perspectives of the role in later life are viewed as having less responsibilities and more time to reflect and relax. An older person is thought to experience retirement, dependency of others preferably their children or younger relatives, a sense of financial insecurity, possible loss of friends through death and the difficult time when a spouse dies (Carter Goldrick, 1988). Although this is a much generalised view, these experiences do occur. Grandparenthood can offer a person a sense of being and bring joy to their life. Becoming a grandparent can create new motivation and add fulfilment to an elderly person life. It creates opportunities for them to experience a new role and to develop a special close relationship (Carter Goldrick, 1988). Grandparents have a good position in their family network because they are not the parents of the children but they have a caring and considerate interest in their grandchilds development (Brubaker, 1985, citied in Bernades, 1997). A grandparents role has no clear guidelines, they can adopt rules but in remembering that they do not have the same authority that they had with their own children. Instead, grandparents can spoil and indulge in their grandchildren (Bernades, 1997). There are different styles of grand parenting involving different characteristics. The types of relationships they hold with their grandchild can vary from being distant to authoritarian and being involved in their life with assuming responsibility but having love and care (Hammer Turner, 1990). This can have an effect when a grandparent becomes a full time carer for their grandchild. If the grandparent was distant then it can be harder to develop a bond that has been absent. In comparison if a grandparent has been involved and caring, then to gain authority and create rules it can take some time and adjustments (Hammer Turner, 1990). It involves a lot more responsibilities than previously needed. They will have to set routines, assume responsibility in daily tasks and educate the child with essential skills and attend to the needs of the child (Hammer Turner, 1990). Grandparent hood can be seen as a second chance at parenting. This can be seen for grandparents when their own child has failed at their duty of parenting, the grandparent can become the main carer due to the fact that they feel part to blame. They may feel that in helping, they can fix the problem that they may have blame in (Hammer Turner). Another possible reason presented by Climo, 2002, seen that grandparents felt a commitment to the value of family continuity, they agreed to take care of the family. Their commitment to both generations their child and grandchild meant they felt it was their responsibility to step in (Climo, 2002). Also grandparents may not want their grandchild to be placed with strangers and fear that they may lose contact with their grandchildren (Climo, 2002). Factors Attributing to Relative Care It may be hard for the grand parent to deal with conflicting issues between themselves and the birth family so by introducing skills this can assist in managing family dynamics. This can essentially result in ensuring the best outcome for the childs welfare (Coakley et al, 2007). These include boundaries with birth parents, adopting care plan and following guidelines around maintaining a good relationship with the birth family (Coakley et al, 2007). If the grandparents allow continuous contact with the birth family, it can have a negative effect. This can be said when the reason for placement was abuse, if constant communication is occurring then the child may be put in danger. Also, the grandparents will never be able to gain responsibility, authority or develop a routine if the parents are interfering and not sticking to access plans that have been drawn up (Terling, 2001). Some argue that relative carers are not capable of meeting the childs needs (Sparr, 1993, Dubovitz, 1994 citied in Terling, 2001). There are assumptions that a child experience of parenting from their parents can be transmitted from one generation to another (Pugh De Ath, 1985). The grandparents capability needs to be questioned, looking also at their suitability of caring for their grandchildren, as they are the ones who raised the troubled parent (Gladstone Brown, 2007). Parental failure can be seen as a result of learnt behaviour from previous generations poor parenting (Davidson, 1997, citied in Climo, 2002). As characteristics run through the family, it can prove that the relative carers might have similarities in parenting to that of the birth parents. Especially in this case considering that the grandparents raised the birth parents. It can be said that if the reason for placing the child in care is due to abuse or neglect this can be a worry and should be considered (Terlin g, 2001). Implications can occur when a grandparent takes their grandchild into care. They can find it hard dealing with the childs emotional, behavioural, physical problems, issues of attachment or loss, perceived agency inadequacy, dealing with authority of the child welfare system and dealing with birth parents (Coakley et al, 2007, pg 93). A custodial role can affect the grandparents health as they need to alter their routine and plans, they can feel physical tired, have less time for themselves and have extra duties to do around the house with the addition of a new person (Gladstone Brown, 2007). As they are then busier, relationships can be affected. They have less time to interact and enjoy doing things with their friends, this can cause them to become socially isolated (Broad, 2001). Other relationships include the grandparents other grandchildren who can become jealous at the thought of their grandparent being closer to one grandchild and providing them with more attention (Jendrick, 1993, citied in Climo, 2002). Depending on the grandparents employment status, they may have to quit their job as they will be responsible for the child, this can have an affect on their financial income. They will have more to payout as an extra person, with less money to do this with (Gladstone Brown, 2007). It was found that grandparents can become to resent the situation they are in and it showed they felt they were incapable of keeping up with the child (Climo et al, 2002). Role of the Social Care Worker Relatives who foster care tend not to receive as much support, can ask for less help and it is believed that social workers feel they need less help than traditional foster care workers. The worker and grandparent need to draw up a support plan that will ensure the above do not occur (Broad, 2001). The social worker needs to assess what it was like for the grandparent when they were parenting their own children. They need to reflect on what worked for them when raising their children, try to identify possible mistakes they made and acknowledge how it will be different raising their grandchild (Broad, 2001). They need to understand it may be difficult in altering their role towards their grandchild, possibly identifying their idea of discipline as it may not be appropriate in terms of child welfare, for example corporal punishment was norm years ago but times have now changed. Also as the hope is that the child can one day return to their birth family, the parents own beliefs in raisi ng a child has to be made aware to the grandparent so they do not confuse the child (Broad, 2001). The grandparent may find parenting hard if they have to deal with social services monitoring them. It can be difficult for the grandparents as now there are many factors to be considered which put increases in the demand of them (Pugh De Ath, 1985). In comparison to parenting in the elderly persons time, the knowledge around the needs of the child in terms of physical, intellectual, social and emotional development has become more recognised. All of these will be monitored by officials in the case of relative foster care. As before a parent would not receive this type of pressure to ensure that their child is constantly receiving care and having there needs met (Pugh De Ath, 1985). Grandparents can feel inadequate under the high expectations of their role in the childs development. It can be quite a comparison as when the grandmother was parenting there was little demand to satisfy social demands. The importance was to run the household and the saying mother knows best was the pare ntal ethnic (Pugh De Ath, 1985). In comparison to traditional foster care, relative carers are said to not receive as much support as needed. Possible reasons for this are because the social care workers may have the idea that the relatives do not require the same level services (Dubowitz, Feigelman Zuravin, 1993, citied in Mc Coakley, 2007). According Schlonsky Berrick citied in Mc Coakley, social workers may be influenced by the relationship that is already present within the family. As the child is under the care of their family, the social worker may feel it is the families right to raise the child without the intrusion of them (Coakley et al, 2007). Another possibility is that the grandparents themselves either refuse or do not request support from services (Coakley et al, 2007). Grandparents may feel that asking for help or showing a need for help may be perceived as a weakness in their ability to cope. In the findings conducted by Mc Coakley 2006, it can be seen that mutual goals should be drawn up in the a ssessment process so that the best possible care for the child can be achieved. In addition to this, if the agency can show how committed they are in tailor making the families intervention and meeting the needs specific to the child and family then the family may welcome support more openly (Coakley 2007). Gladstone Brown (2007) identified the following factors which contributed to a positive relationship between the social worker and grandparent. It was found that firstly if a social worker presented as a friendly, considerate personality and the grandparents felt that they could connect and talk to them then they were more likely to open up to them. Social workers need to show an understanding to the situation, and allow the grandparents to feel appreciated for the contribution they are making (Gladstone Brown, 2007). Grandparents appreciate when a social worker responds to their needs and offers them informative advice and support on child management issues and referrals of other services that could offer support (Gladstone Brown, 2007). For a grandparent being informed can help them with their new role of parenting. As they are monitored and assessed, receiving feedback can allow them to know where they stand and how they can improve and also know what they are doing right. Also as their situation changes they need to know about entitlements that they can receive (Gladstone Brown, 2007).
Friday, October 25, 2019
Fear and Loathing on The Campaign Trail Essay -- essays research paper
Fear and Loathing On The Campaign Trail ââ¬â¢72 was a book about a writer for the Rolling Stone and his coverage of the presidential elections in 1972. These elections were between the incumbent Republican, President Richard Nixon and the Senator from South Dakota, George McGovern. The election of 1972 saw McGovern come out of the democratic National Convention over Senators Muskie and Humphrey but only to lose to the incumbent president Richard Nixon. Hunter S. Thompson writes about the Election of 1972 from December 1971, before any primaries, to December 1972 after Nixon has won the election. It is a truthful first person account of what happened during the presidential race that year with much personal, side talk about Thompsonââ¬â¢s life, experiences, and his coverage four years ago about the 1968 election. Thompson writes this book in a unique style that he has made called Gonzo Journalism. This style of writing is a deeply personal style of writing and is very opinionated. He does not give the facts on the election straight but instead gives his opinions on the people involved. It is a very subjective point of view and shows Thompsonââ¬â¢s very liberal perspective. He is a strong supporter and is an enthusiast of the democratic candidate McGovern and shows time and time again how much he despises Nixon. Along with a very opinionated, subjective narrative, Thompson talks a lot about drug use. His point of view is from t hat from the drug underculture. Thompson is a very big drug us...
Thursday, October 24, 2019
Ikea Invades America
IKEA has definitely made great strides since coming to America in 1985. The case study points at many areas where idea has made huge impacts on the American furniture retail industry. Looking at Exhibit 1 you can see steady growth in sales, Exhibit 3 shows the United States as the third largest buyer of IKEAââ¬â¢s goods, Exhibit 4 shows the Unites States as having the second most number of IKEA outlets in the world and Exhibit 8 shows them as being 14 in sales in America. Looking around at my friends places there is definitely tons of things bought at IKEA.While all these statistics show a very successful movement into the United States for IKEA I feel that there could be some obstacles IKEA could encounter in the future. As it said in the case study generally IKEAââ¬â¢s products donââ¬â¢t last more than a couple of years and that normally donââ¬â¢t have the endurance to survive a move to a new apartment. With how Americanââ¬â¢s historically purchase furniture, ââ¬Å" change their spouse as often as their dining room table, about 1. 5 times in a lifetime. â⬠(Moon, 2004), this would seem at odds with the type of product that IKEA offers.The idea that you have to assemble the furniture yourself is something that would seem to turn a large percentage of Americans away from buying an IKEA product. I personally have found some of the things I have bought from IKEA to be very challenging to put together. Another aspect of IKEA is their lack of product depth; it seems that a lack of selection would hurt IKEA in the American market. Outside of these differences in what IKEA has and American tastes there is a lot that IKEA has done very well with in America. IKEA seems to have established itself as the low price leader in the minds of most consumers.As we find ourselves in a time of economic downturn and everybody seems to be trying to save a little here and there that is huge for a retailer. The childcare aspect of the retail outlets is a huge plus to get families to come shopping and buy from you. If you can drop the kids off to play and you end up getting your shopping done in half the time I would have taken if your kids were with you than is a major factor in where you decide to shop. The restaurant in the store is great and the menu items they offer are unique the setting they offer them in.I can remember my parents saying ââ¬Å"letââ¬â¢s go to IKEA and get some Swedish meatballs. â⬠Also the idea that you can walk away with what you bought that day leaves the consumer with a sense of satisfaction that next day delivery doesnââ¬â¢t achieve. Solutions to some of the problems seem to be easily attainable. When looking at the issue of durability you would say that many of their customers donââ¬â¢t go to IKEA to buy a product that lasts generations, so conveying to their customers that they shouldnââ¬â¢t expect to be buying a product that you can hand down to your children would help.The idea that consumers in this generation solve problems by just buying a new product to replace the broken one really helps externally to solve that problem. IKEA could offer an group like ââ¬Å"geek squadâ⬠to consumers, for an extra charge, that would bring the product to your home and assemble it could help to attract ââ¬Å"lazyâ⬠Americans who donââ¬â¢t want to assemble the furniture themselves. Ultimately the consumers that they market to donââ¬â¢t need any changes to what IKEA does. IKEA provides the experience of buying what is perceived to be a high quality product for an affordable price.It would seem the IKEA experience is something that people line up to do and it seems to be a very successful model for IKEA. I wouldnââ¬â¢t recommend any changes to what IKEA does. Why would you change something that is working so well? Overall IKEA seems to have done a very good job in creating a sector where they can carve out a profit. You are always going to have price conscious consum ers looking for something that looks nice and is affordable and IKEA can offer people that hands down. Ikea Invades America 1. What factors account for the success of IKEA? Three factors account for IKEAââ¬â¢s success in the furniture retailing industry: First, their Scandinavian designs are simple but unique. In the past, IKEAââ¬â¢s designs were functional at best, ugly at worst (Moon, 2004). The company had gradually but deliberately adopted a more distinct design aesthetic (Moon, 2004). Second, IKEA is cost efficient. As back as 1956, IKEA began testing flat packages. IKEA designs products so that they can be packed flat and then, customers can assemble the furniture, thus reducing costs.It also creates extra storage space and the capability of shipping more items, while labor costs are reduced and transport damages are avoided (Moon, 2004). Third, their product strategy provides IKEA with a competitive advantage. IKEA has a product strategy council that establishes product priorities and a product developer that uses ââ¬Å"the matrixâ⬠to set targets for their retail prices, that are usual ly 30-40% lower than its competitors (Moon, 2004). 2. What do you think of the companyââ¬â¢s product strategy and product range? Do you agree with the matrix approach described in Figure B of the case?What is most important about IKEAââ¬â¢s product strategy and product range is their matrix, which is simple enough, yet very useful at creating market opportunities. The matrix also creates a way of accepting or declining a product, manufacturer, or designer, thus cutting costs (Moon, 2004). 3. Despite its success, there are many downsides to shopping at IKEA. What are some of the downsides? IKEAââ¬â¢s vision statement in Figure C of the case describes how the company seeks to build a partnership with its customers. What do you think of the vision statement?Probably the most important downside is the life span of the furniture. When you shop at IKEA, you know that their furniture would not last more than a couple of years (if you are lucky). Another downside is that the custom er has to assemble the furniture themselves. IKEA does not offer an assembly service as many other furniture stores and this can be troublesome. As for their vision statement, it seems a little too far out. The company wants to create a long lasting relationship with its customers, but many of them will not come back for more. This is due, as explained above, because the ustomer has to assembly the furniture with the help of instructions that sometimes can be hard to follow for the beginner. The company should implement an assembly team, for those that may need that extra help. 4. IKEA plans to grow in the United States by 50 stores in operation by 2013 which is an indication of how optimistic the company is about the viability of its value proposition in this country. Do you think IKEA is being overly optimistic in its growth plans? How would you improve IKEAââ¬â¢s value proposition to make it even more attractive to Americans? 0 stores by 2013 do not seem to be an overly optimi stic number. By opening more stores, the company will be reaching more customers, will be closer to existing ones, and will be in the minds of more people. I would also say that Americans have a long history of purchasing products that last, so placing more attention to durability can help the company. They can also offer more services, better customer service for their stores, and easier to find merchandise (their system may say that a chair is found on section 4, when in reality, the chair is in another section). 5.To achieve the kind of growth IKEA is hoping for, should the company change its product strategy? If so, in what way (s)? What about its product rangeââ¬âare there limitations to the matrix approach? Should the company expand its product lineup to include a greater number of styles and price points? In what other ways should the company change its product lineup? I believe that their strategy has been working for a while and its core should not be changed. The produ ct matrix does not specifically state what qualifies a product as a high, medium, or low price, there can be percentages applied for the price ranges (Moon, 2004).Subcategories can be added to the matrix. The company can expand its product lineup to include a greater number of styles and price points, thus providing the company with complete reports to help them gain advantage over their competitors. 6. If you had to predict, what do you think IKEAââ¬â¢s value proposition and product lineup will look like in 10 years? In ten years, their value proposition can encompass more services to buyers after their purchases. They have to keep with new trends in the industry as well as more products for its customers. 7. Some industry observers have suggested IKEA open a umber of smaller, satellite stores across the United States in shopping malls, strip malls, etc. offering a limited range of IKEA products. These IKEA ââ¬Å"liteâ⬠stores would give the consumers who do not have acces s the full-size IKEA stores the opportunity to experience the brand. In addition, consumers who live near a full-size IKEA store could use these smaller stores to make minor purchases such as mugs or dishes as opposed to an entire living room. Do you agree with the idea? Why or why not? The idea of opening smaller or satellite stores across the US can help IKEA to reach more customers.Some customers live in areas where the closes IKEA store is miles away, and these smaller stores can be of great convenience to them and more profits for the company. Some items, as the Ticka alarm clock and clothes hangers (Moon, 2004) are items that are used daily by households and that if offered in more places, the revenues for the company should go up. Both parties will benefit from this idea. 8. Toyota, Nissan, BMW, Honda, and other automobile companies have built manufacturing plants in the United States. IKEA imports all of its furniture from sources outside the United States.Does IKEA have a r esponsibility to add the manufacturing of furniture in the United States, assuming its store expansion takes place? IKEA does not have the responsibility to add manufacturing of furniture here in the United States, but it is an idea that will benefit not only the company and its customers (by having lower prices for production and thus, for the final product) but also will generate much needed jobs. 9. People are used to buying furniture that lasts a long time. Do you think it is ethical for IKEA to sell furniture that doesnââ¬â¢t last a long time?What if the customer of IKEA is not aware of the position IKEA takes that furniture is not forever? Should they make the customer aware that their furniture is not intended to last a long time? I do not believe that it is unethical to sell lower quality products, if the price matches what you are paying for. Most consumers are aware that if they pay low prices, the quality is going to be compromised. IKEA can include on their product in structions a prediction of the life span of it, reducing the risk of being looked as cheap and of bad quality.
Wednesday, October 23, 2019
Memory Organization
Memory Basics Memory is the workspace for the computers processor. It is a temporary storage area where the programs and data being operated on by the processor must reside. Memory storage is considered temporary because the data and programs will remain there only as long as the computer has electrical power or is not reset. Before being shut down or reset, any data that has been changed should be saved to a more permanent storage device of some type (usually a hard disk) so it can be reloaded into memory again in the future. We often call memory RAM, for Random Access Memory.Main memory is called RAM because you can randomly (and quickly) access any location in memory. When we talk about a computers memory, we usually mean the RAM in the system, meaning primarily the memory chips or modules that make up the primary active program and data storage used by the processor. This is often confused with the term storage, which should be used when referring to things such as disk and tape drives (although some people do consider them a form of memory). 2Types of Memory To better understand physical memory in a system, it is necessary to see where and how it fits into the system.Three main types of physical memory used in modern PCs are â⬠¢ ROM: Read Only Memory â⬠¢ DRAM: Dynamic Random Access Memory â⬠¢ SRAM: Static RAM 2. 1ROM Read Only Memory, or ROM, is a type of memory that can permanently or semipermanently hold data. It is called read-only because it is either impossible or difficult to write to. ROM is also often referred to as non-volatile memory because any data stored in ROM will remain, even if the power is turned off. As such, ROM is an ideal place to put the PCs startup instructionsthat is, the software that boots the system.Note that ROM and RAM are not opposites, as some people seem to believe. In fact, ROM is technically a subset of the systems RAM. In other words, a portion of the systems Random Access Memory address space is mapped into one or more ROM chips. This is necessary to contain the software that enables the PC to boot up; otherwise, the proces- sor would have no program in memory to execute when it was powered on. For example, when a PC is turned on, the processor automatically jumps to address FFFF0h, expecting to find instructions to tell the processor what to do.This location is exactly 16 bytes from the end of the first megabyte of RAM space, and the end of the ROM. If this location was mapped into regular memory 1 chips, any data stored there would have disappeared when the power was turned off previously, and the processor would subsequently find no instructions to run the next time power was turned on. By placing a ROM chip at this address, a system startup program can be permanently loaded into the ROM and will be available every time the system is turned on. The motherboard ROM normally contains four main programs, including the following in most systems: â⬠¢ POST: Power-On Self Test.A series of test routines that ensure the system components are operating properly. â⬠¢ CMOS Setup: A menu-driven application that allows the user to set sys- tem configuration parameters, options, security settings, and preferences. â⬠¢ Bootstrap Loader: The routine that first scans the floppy drive and then the hard disk, looking for an operating system to load. â⬠¢ BIOS: Basic Input/Output System. A series of device driver programs designed to present a standard interface to the basic system hardware, especially hardware that must be active during the boot process. Four different types of ROM chips are ROM. Read Only Memory â⬠¢ PROM. Programmable ROM â⬠¢ EPROM. Erasable PROM â⬠¢ EEPROM. Electrically Erasable PROM, also called a flash ROM No matter which type of ROM you use, the data stored in a ROM chip is non- volatile and will remain indefinitely unless intentionally erased or overwritten. 2. 1. 1PROM PROMs are a type of ROM that is blank when new and must be pr ogrammed with whatever data you want 2. 1. 2EPROM One variation of the PROM that has been very popular is the EPROM. An EPROM is a PROM that is erasable. EPROM is erased by exposure to intense UV light. 2. 1. 3 EEPROM/Flash ROMA newer type of ROM is the EEPROM, which stands for Electrically Erasable PROM. These chips are also called flash ROMs, and are characterized by their capability to be erased and reprogrammed directly in the circuit board in which they are installed, with no special equipment required. 2 2. 2DRAM Dynamic RAM is the type of memory chip used for most of the main memory in a modern PC. The main advantages of DRAM is that it is very dense, meaning you can pack a lot of bits into a very small chip, and it is very inexpensive, which makes it affordable for large amounts of memory.The memory cells in a DRAM chip are tiny capacitors that retain a charge to indicate a bit. The problem with DRAM is that it is dynamic, and because of the design must be constantly refresh ed or the electrical charges in the individual memory capacitors will drain and the data will be lost. Refresh occurs when the system memory controller takes a tiny break and accesses all the rows of data in the memory chips. DRAMs use only one transistor and capacitor pair per bit, which makes them very dense, offering a lot of memory capacity per chip than other types of memory. 2. 3 Cache MemorySRAMThere is another distinctly different type of memory that is significantly faster than most types of DRAM. SRAM stands for Static RAM, which is so named because it does not need the periodic refresh rates like DRAM (Dynamic RAM). Due to the design of SRAM, not only are refresh rates unnecessary, but SRAM is much faster than DRAM and is fully able to keep pace with modern processors. SRAM memory is available in access times of 2ns or less, which means it can keep pace with processors running 500MHz or faster! This is due to the SRAM design, which calls for a cluster of six transistors f or each bit of storage.The use of transistors but no capacitors means that refresh rates are not necessary because there are no capacitors to lose their charges over time. As long as there is power, SRAM will remember what is stored. Compared to DRAM, SRAM is much faster, but also much lower in density and much more expensive. The lower density means that SRAM chips are physically larger and store many less bits overall. The high number of transistors and the clustered design means that SRAM chips are both physically larger and much more expensive to produce than DRAM chips.Even though SRAM is too expensive for PC use as main memory, PC designers have found a way to use SRAM to dramatically improve PC performance. Rather than spend the money for all RAM to be SRAM memory, which can run fast enough to match the CPU, it is much more cost-effective to design in a small amount of high-speed SRAM memory, called cache memory. The cache runs at speeds close to or even equal to the processo r, and is the memory from which the processor normally directly reads from and writes to. During read operations, the data in the high-speed cache memory is resupplied from the lower-speed main memory or DRAM in advance. 3Memory Packaging Memory is made from tiny semiconductor chips and must be packaged into something less fragile and tiny in order to be integrated with the rest of the system Different types of memory paclages are â⬠¢ Dual Inline Packages (DIPs) and Memory Modules â⬠¢ Single Inline Memory Modules (SIMMs) â⬠¢ Dual Inline Memory Modules (DIMMs) 3. 1DIPS Most memory chips are packaged into small plastic or ceramic packages called dual inline packages or DIPs. A DIP is a rectangular package with rows of pins running along its two longer edges These are the small black boxes you see on SIMMs, DIMMs or other larger packaging styles . 2SIMMs SIMMs are available in two flavors: 30 pin and 72 pin. 30-pin SIMMs are the older standard, and were popular on third and fourth generation motherboards. 72-pin SIMMs are used on fourth, fifth and sixth generation PCs. SIMMs are placed into special sockets on the motherboard created to hold them. The sockets are specifically designed to ensure that once inserted, the SIMM will be held in place tightly 3. 3DIMMs DIMMs are 168 pins in size, and provide memory 64 bits in width. They are a newer form factor and are becoming the de facto standard for new PCs; they are not used on older motherboards motherboards.SIMMs have contacts on either side of the circuit board but they are tied together. So a 30-pin SIMM has 30 contacts on each side of the circuit board, but each pair is connected. DIMMs however have different connections on each side of the circuit board 4Memory Banks Memory chips (DIPs, SIMMs, SIPPs, and DIMMs) are organized in banks on motherboards and memory cards. The banks usually correspond to the data bus capacity of the systemââ¬â¢s microprocessor. The number of bits for each bank can be made up of single chips, SIMMs, or DIMMs. 4 5Memory ReliabilityA part of the nature of memory is that it will inevitably fail. These failures are usually classified as two basic types: hard fails and soft errors. The most well understood are hard fails, in which the chip is working and then, due to some flaw, physical damage, or other event, becomes damaged and experiences a permanent failure. Fixing this type of failure normally requires replacement of some part of the memory hardware, such as the chip, SIMM, or DIMM. Hard error rates are known as HERs. The other more insidious type of failure is the soft error.A soft error is a nonpermanent failure that may never reoccur, or occur at infrequent intervals. (Soft fails are effectively ââ¬Å"fixedâ⬠by powering the system off and back on. ) Soft error rates are known as SERs. There are basically three levels and techniques for fault tolerance used in modern PCs: â⬠¢ Non-parity â⬠¢ Parity â⬠¢ ECC (Error Correcting Co de) Non-parity systems have no fault tolerance at all. The reason they are even used is because they have the lowest inherent cost. No additional memory is necessary as is the case with parity or ECC techniques. 6ParityTne standard IBM set for the industry is that the memory chips in a bank of nine each handle one bit of data: eight bits per character plus one extra bit called the parity bit. As the eight individual bits in a byte are stored in memory, a parity genera- tor/checker, which is either part of the CPU or located in a special chip on the motherboard, evaluates the data bits by counting the number of 1s in the byte. If an even number of 1s is in the byte, the parity generator/checker creates a 1 and stores it as the ninth bit (parity bit) in the parity memory chip.That makes the total sum for all nine bits an odd number. If the original sum of the eight data bits is an odd number, the parity bit created is 0, keeping the 9-bit sum an odd number. The value of the parity bit is always chosen so that the sum of all nine bits (eight data bits plus one parity bit) is an odd number. The following examples may make it easier to understand: Data bit number: 0 1 2 3 4 5 6 7 Data bit value:10110011 Parity bit:0 5 In this example, because the total number of data bits with a value of 1 is an odd number (5), the parity bit must have a value of 0 to ensure an odd sum for all nine bits.The following is another example: Data bit number: 0 1 2 3 4 5 6 7 Data bit value :00110011 Parity bit: 1 In this example, because the total number of data bits with a value of 1 is an even number (4), the parity bit must have a value of 1 to create an odd sum for all nine bits. When the system reads memory back from storage, it checks the parity information. If a (9-bit) byte has an even number of bits with a parity bit value of 1, that byte must have an error. The system cannot tell which bit has changed, or if only a single bit has changed.If three bits changed, for example, the byte still flags a parity-check error; if two bits changed, however, the bad byte may pass unnoticed. The following examples show parity-check messages for three types of systems: For the IBM PC: PARITY CHECK x For the IBM XT: PARITY CHECK x yyyyy (z) For the IBM AT and late model XT: PARITY CHECK x yyyyy Where x is 1 or 2: 1=Erroroccurredonthemotherboard 2=Erroroccurredinanexpansionslot yyyyy represents a number from 00000 through FFFFF that indicates, in hexadecimal notation, the byte in which the error has occurred. Where (z) is (S) or (E ): S) = Parity error occurred in the system unit (E ) = Parity error occurred in the expansion chassis When a parity-check error is detected, the motherboard parity-checking cir- cuits generate a non-maskable interrupt (NMI), which halts processing and di- 6 verts the systems attention to the error. The NMI causes a routine in the ROM to be executed. The routine clears the screen and then displays a message in the upper-left corner of the screen . The message differs depending on the type of computer system. 7 ECC (Error Correcting Code) ECC goes a big step beyond simple parity error detection.Rather than just detecting an error, ECC allows a single bit error to be corrected, which means the system can continue on without interruption and without corrupting data. ECC as implemented in most PCs can only detect and not correct double-bit errors. Because studies have indicated that approximately 98 percent of memory errors are single- bit variety, the most commonly used type of ECC is one in which the attendant memory controller detects and corrects single-bit errors in an accessed data word (double-bit errors can be detected, but not corrected).This type of ECC is known as SEC-DED and requires an additional seven check bits over 32 bits in a 4-byte system and eight check bits in an 8-byte system. ECC in a 4-byte system obviously costs more than non-parity or parity, but in an 8-byte system, ECC and parity costs are equal. ECC entails the memory controller calculating the check bits on a memory- write operation, performing a compare between the read and calculated check- bits on a read operation and, if necessary, correcting bad bit(s).The additional ECC logic in the memory controller is not very significant in this age of inex- pensive, high-performance VLSI logic, but ECC actually affects memory perfor- mance on writes. This is because the operation must be timed to wait for the calculation of check bits and, when the system waits for corrected data, reads. On a partial-word write, the entire word must first be read, the affected byte(s) rewritten, and then new check bits calculated. This turns partial-word write operations into slower read-modify writes. Most memory errors are of a single-bit nature, which are correctable by ECC.Incorporating this fault-tolerant technique provides high system reliability and attendant availability. An ECC-based system is a good choice for servers, workstations, or mis sion-critical applications in which the cost of a potential memory error outweighs the additional memory and system cost to correct it, along with ensuring that it does not detract from system reliability. 8 The System Logical Memory Layout The original PC had a total of 1M of addressable memory, and the top 384K of that was reserved for use by the system.Placing this reserved space at the top (between 640K and 1024K instead of at the bottom, between 0K and 640K) led to what today is often called the conventional memory barrier. The constant pressures on system and peripheral manufacturers to maintain compatibility by never breaking from the original memory scheme of the first PC has resulted in 7 a system memory structure that is (to put it kindly) a mess. Logical memory sections are given below â⬠¢ Conventional (Base) memory â⬠¢ Upper Memory Area (UMA) â⬠¢ High Memory Area (HMA) â⬠¢ Extended memory (XMS) â⬠¢ Expanded memory (obsolete) Video RAM memory (part of UMA) â⬠¢ Adapter ROM and Special Purpose RAM (part of UMA) â⬠¢ Motherboard ROM BIOS (part of UMA) 8. 1 Conventional (Base) Memory The original PC/XT-type system was designed to use 1M of memory workspace, sometimes called RAM (random access memory). This 1M of RAM is divided into several sections, some of which have special uses. DOS can read and write to the entire megabyte, but can manage the loading of programs only in the portion of RAM space called conventional memory, which was 512K at the time the first PC was introduced.The other 512K was reserved for use by the system, including the motherboard and adapter boards plugged into the system slots. After introducing the system, IBM decided that only 384K was needed for these reserved uses, and the company began marketing PCs with 640K of user memory. Thus, 640K became the standard for memory that can be used by DOS for running programs, and is often termed the 640K memory barrier. The remaining memory after 640K was rese rved for use by the graphics boards, other adapters, and the motherboard ROM BIOS.This barrier largely affects 16-bit software such as DOS and Windows 3. 1, and is much less of a factor with 32-bit software and operating systems such as Windows 95/98, NT, and so on. 8. 2 Upper Memory Area (UMA) The term Upper Memory Area (UMA) describes the reserved 384K at the top of the first megabyte of system memory on a PC/XT and the first megabyte on an AT-type system. This memory has the addresses from A0000 through FFFFF. The way the 384K of upper memory is used breaks down as follows: â⬠¢ The first 128K after conventional memory is called video RAM.It is re- served for use by video adapters. When text and graphics are displayed onscreen, the electronic impulses that contain their images reside in this space. Video RAM is allotted the address range from A0000-BFFFF. 8 â⬠¢ The next 128K is reserved for the adapter BIOS that resides in read-only memory chips on some adapter boards plug ged into the bus slots. Most VGA-compatible video adapters use the first 32K of this area for their onboard BIOS. The rest can be used by any other adapters installed. Many network adapters also use this area for special-purpose RAM called Shared Memory.Adapter ROM and special-purpose RAM is allotted the address range from C0000-DFFFF. â⬠¢ The last 128K of memory is reserved for motherboard BIOS (the basic input/output system, which is stored in read-only RAM chips or ROM). The POST (Power-On Self Test) and bootstrap loader, which handles your system at bootup until the operating system takes over, also reside in this space. Most systems only use the last 64K (or less) of this space, leaving the first 64K or more free for remapping with memory managers. Some systems also include the CMOS Setup program in this area.The motherboard BIOS is allotted the address range from E0000-FFFFF. 8. 3Extended Memory The memory map on a system based on the 286 or higher processor can extend bey ond the 1M boundary that exists when the processor is in real mode. On a 286 or 386SX system, the extended memory limit is 16M; on a 386DX, 486, Pentium, Pentium MMX, or Pentium Pro system, the extended memory limit is 4G (4,096M). Systems based on the Pentium II processor have a limit of 64G (65,536M). For a system to address memory beyond the first megabyte, the processor must be in protected modethe native mode of 286 and higher processors.On a 286, only programs designed to run in protected mode can take advantage of extended memory. 386 and higher processors offer another mode, called virtual real mode, which enables extended memory to be, in effect, chopped into 1M pieces (each its own real-mode session). Virtual real mode also allows for several of these sessions to be running simultaneously in protected areas of memory. The extended memory specification (XMS) was developed in 1987 by Mi- crosoft, Intel, AST Corp. , and Lotus Development to specify how programs would use exte nded memory.The XMS specification functions on systems based on the 286 or higher and allows real-mode programs (those designed to run in DOS) to use extended memory and another block of memory usually out of the reach of DOS. Before XMS, there was no way to ensure cooperation between programs that switched the processor into protected mode and used extended memory. There was also no way for one program to know what another had been doing with the extended memory because none of them could see that memory while in real mode. HIMEM.SYS becomes an arbitrator of sorts that first grabs all the extended memory for itself and then doles it out to programs that know the XMS protocols. In this manner, several programs that use XMS memory can operate together under DOS on the same system, switching the pro- cessor into 9 and out of protected mode to access the memory. Extended memory can be made to conform to the XMS specification by installing a de- vice driver in the CONFIG. SYS file. The most common XMS driver is HIMEM. SYS, which is included with Windows 3. x and later versions of DOS, starting with 4. and up. 8. 4 High Memory Area (HMA) The High Memory Area (HMA) is an area of memory 16 bytes short of 64K in size, starting at the beginning of the first megabyte of extended memory. It can be used to load device drivers and memory-resident programs to free up conventional memory for use by real-mode programs. Only one device driver or memory-resident program can be loaded into HMA at one time, no matter what its size. Originally, this could be any program, but Microsoft decided that DOS could get there first, and built capability into DOS 5 and newer versions.The HMA area is extremely important to those who use DOS 5 or higher because these DOS versions can move their own kernel (about 45K of program instructions) into this area. This is accomplished simply by first loading an XMS driver (such as HIMEM. SYS) and adding the line DOS=HIGH to your CONFIG. SYS file. Tak ing advantage of this DOS capability frees another 45K or so of conventional memory for use by real-mode programs by essentially mov- ing 45K of program code into the first segment of extended memory.Although this memory was supposed to be accessible in protected mode only, it turns out that a defect in the design of the original 286 (which, fortunately, has been propagated forward to the more recent processors as a feature) accidentally al- lows access to most of the first segment of extended memory while still in real mode. The use of the HMA is controlled by the HIMEM. SYS or equivalent driver. The origins of this memory usage are interesting because they are based on a bug in the original 286 processor carried forward through even the Pentium II. 8. 5 Expanded MemorySome older programs can use a type of memory called Expanded Memory Spec- ification or EMS memory. Unlike conventional (the first megabyte) or extended (the second through 16th or 4,096th megabytes) memory, expanded memory is not directly addressable by the processor. Instead, it can only be accessed through a 64K window and small 16K pages established in the UMA. Expanded memory is a segment or bank-switching scheme in which a custom memory adapter has a large number of 64K segments onboard, com- bined with special switching and mapping hardware. The system uses a free segment in the UMA as the home address for the EMS board.After this 64K is filled with data, the board rotates the filled segment out and a new, empty segment appears to take its place. In this fashion, you have a board that can keep on rotating in new segments to be filled with data. Because only one segment can be seen or oper- ated on at one time, EMS is very inefficient for program code and is normally 10 only used for data. 9Video Memory The video memory is such an important component of the video card, and indirectly the entire PC, that several new memory technologies have been created specifically for it.The goal: to impr ove the speed with which information can be pumped into and out of the video memory, to keep system performance high as the video system tries to do more and more. Various memory technologies now being used on video cards are explained below. 9. 1 Standard (Fast Page Mode) DRAM The oldest technology used in video card memory, fast page mode (FPM) memory is now considered ââ¬Å"standardâ⬠DRAM as it has the fewest performanceenhancing capabilities of the different types of memory on the market. FPM DRAM is a technology used primarily for main system memories (even there, it is now considered a poor performer) and is not really ell-suited for highperformance video applications. 11 FPM is the least expensive type of memory available for video, and is used today mostly on low-end or generic cards (as well as older cards of course). For many applications they can be quite satisfactory; however, they reach their limits quickly when trying to use high resolution modes, especially in true color. The limitations of standard DRAM are due to two primary effects: it is single ported (which means it can only do one access at a time) and it runs at a relatively low speed and access width. 9. 2 Extended Data Out (EDO) DRAMEDO DRAM is the same as standard FPM DRAM except for a slight modification in the access cycle that gives it a small performance boost. With EDO DRAM, one read to memory can begin before the last one has completely finished; this yields a raw speed improvement of between 5 and 20 percent, depending on whom you ask. Originally used only for main system memory, EDO DRAM is becoming more popular on video cards because it provides slightly improved performance over standard DRAM at the same cost. (At one time EDO was more expensive than FPM but due to supply and demand effects now, EDO is actually the same cost or lower).EDO is still, however, a low-cost and low-performance solution compared to other types of video memory, and is not used on high-end card s. 9. 3 Video RAM (VRAM) The traditional, standard DRAM used for video cards typically does not have enough bandwidth to handle the demands of running a card at high resolution and color depths, with acceptable refresh rates. The main reason why is the two competing access factors for the video memory: the processor writing new information to the memory, and the RAMDAC reading it many times per second in order to send video signals to the monitor.To address this fundamental limitation, a new type of memory was created called video RAM or VRAM. As the name implies, this memory is specifically tailored for use in video systems. The fundamental difference between VRAM and standard DRAM is that VRAM is dual-ported. This means that it has two access paths, and can be written to and read from simultaneously. The advantages of this are of course enormous given what the video card does: many times per second a new screen image is calculated and written to the memory, and many times per seco nd this memory is read and sent to the monitor.Dual- porting allows these operations to occur without bumping into each other. VRAM provides substantially more bandwidth than either standard DRAM or EDO DRAM; double in many cases. It is more suited for use in systems requiring high resolution and color depth displays. The only reason that it hasnââ¬â¢t replaced standard DRAM entirely is of course: cost. VRAM is more complex and requires more silicon per bit than standard DRAM, which makes it cost more. 12 9. 4Window RAM (WRAM)Window RAM or WRAM is a modification of regular VRAM that both improves performance and reduces cost on a bit-for-bit basis. Designed specifically for use in graphics cards, WRAM is also dual-ported but has about 25% more bandwidth than VRAM, and also incorporates additional features to allow for higher performance memory transfers for commonly used graphical operations such as text drawing and block fills. Furthermore, WRAM is less expensive than VRAM to ma nufacture (although still more expensive than DRAM). 9. 5 Synchronous Graphics RAM (SGRAM)A relatively newer RAM technology, Synchronous Graphics RAM or SGRAM tackles the poor performance of regular DRAM by increasing greatly the speed at which memory transfers take place. SGRAM also incorporates specific per- formance enhancing features designed to work with acceleration features built into video cards, to greatly improve overall video processing speed. SGRAM is still single-ported, unlike VRAM or WRAM, but offers performance that is much closer to VRAM than DRAM due to its advanced design. 10 Flash Memory DevicesFlash memory has been around for several years as a main or an auxiliary storage medium for notebook computers. However, the rise of devices such as digital cameras and MP3 players and the presence of USB ports on practically all recent systems have transformed this technology from a niche product into a mainstream must-have storage technology. Flash memory is a type of no nvolatile memory that is divided into blocks rather than bytes, as with normal RAM memory modules. Flash memory, which also is used in most recent computers for BIOS chips, is changed by a process known as Fowler-Nordheim tunneling.This process removes the charge from the floating gate associated with each memory cell. Flash memory then must be erased before it can be charged with new data. The speed, low reprogramming current requirements, and compact size of recent flash memory devices have made flash memory a perfect counterpart for portable devices such as notebook computers and digital cameras, which often refer to flash memory devices as so-called ââ¬Å"digital filmâ⬠. Unlike real film, digital film can be erased and reshot.Ultra-compact, USB-based keychain drives that use flash memory are replacing both traditional floppy drives and Zip/SuperDisk drives for transporting data between systems. Diiferent types of flash memory devices are expained below. 10. 1Compact Flash CompactFlash was developed by SanDisk Corporation in 1994 and uses ATA architecture to emulate a disk drive; a CompactFlash device attached to a com- 13 puter has a disk drive letter just like your other drives. Later types of flash memory also use ATA architecture, either implemented in the device itself or in its controller. 0. 2MultiMedia Card The MultiMediaCard (MMC) was codeveloped by SanDisk and Infineon Tech- nologies AG (formerly Siemens AG) in November 1997 for use with smart phones, MP3 players, digital cameras, and camcorders. The MMC uses a simple 7-pin serial interface to devices and contains low-voltage flash memory. 10. 3Secure Digital (SD) A SecureDigital (SD) storage device is about the same size as MMC , but itââ¬â¢s a more sophisticated product. SD, which was codeveloped by Toshiba, Matsushita Electric (Panasonic), and SanDisk in 1999, gets its name from two special features.The first is encrypted storage of data for additional security, meeting current and fut ure Secure Digital Music Initiative (SDMI) standards for portable devices. The second is a mechanical write-protection switch. 10. 4Pen Drive As an alternative to floppy and Zip/SuperDisk-class removable-media drives, USB-based flash memory devices are rapidly becoming the preferred way to move data between systems. The first successful drive of this type ââ¬â Trekââ¬â¢s ThumbDrivewas ââ¬â introduced in 2000 and has spawned many imitators, in- cluding many that incorporate a keychain or pocket clip to emphasize their portability.Unlike other types of flash memory, USB keychain drives donââ¬â¢t require a separate card reader; they can be plugged in to any USB port or hub. Al- though a driver is usually required for Windows 98 and Windows 98SE, most USB keychain drives can be read immediately by newer versions of Windows, particularly Windows XP. As with other types of flash memory, USB keychain drives are assigned a drive letter when connected to the computer. Most have capacities ranging from 128MB to 1GB, with some capacities as high as 2GB or more.However, typical read/write performance of USB 1. 1-compatible drives is about 1MBps. Hi-Speed USB keychain drives are much faster, providing read speeds ranging from 5MBps to 15MBps and write speeds ranging from 5MBps to 13MBps. 11Advanced Memory Technologies 11. 1RDRAM RDRAM is a proprietary technology made by Rambus Inc. for use exclusively in certain Intel compatible motherboards 14 RDRAM stands for Rambus Dynamic Random Access Memory. It can access data anywhere on the chip; It requires power to hold its data; and it transfers data twice per clock signal.However, it uses a smaller pathway, or ââ¬Å"system bus,â⬠to send information. The Rambus system bus is 16-bits wide. Rambus transfers data at 800 megahertz (MHz) and faster. Rambus is the more expensive type of memory since its proprietary, royalty costs that manufacturers must pay to produce it tend to result in higher retail prices. Add itionally, Rambus compatible motherboards require that all of their RAM slots be occupied. Traditionally, a computer may contain anywhere from one to four ram slots. If a slot is unoccupied, the system still operates.Rambus requires that either a Rambus memory module or a kind of place holder known as a continuity module be in place to complete the memory path to the bus. 11. 2 DDR SDRAM (DDR) Double data rate (DDR) SDRAM memory is a JEDEC-created standard that is an evolutionary upgrade of standard SDRAM in which data is transferred twice as quickly. Instead of doubling the actual clock rate, DDR memory achieves the doubling in performance by transferring twice per transfer cycle: once at the leading (falling) edge and once at the trailing (rising) edge of the cycle.This effectively doubles the transfer rate, even though the same overall clock and timing signals are used. Since its inception, manufacturers have release new and faster versions of DDR. These are based on the use of p refetch buffers that access not only the memory, or ââ¬Å"dataword,â⬠requested by the processor but also the datawords adjacent to it on the chip. Thus DDR2 ââ¬Å"fetchesâ⬠four datawords per memory access, double the amount of DDR. DDR3, a more recent update, obtains eight datawords per access. 15
Subscribe to:
Posts (Atom)