PENDAHULUAN
CHAPTER 1
A. Background
An Operations System is a collection of programs (software / software) that helps users komputr to communicate with the computer. Can be analogue as "An Organizational Governance" in the collection of communities existing in our computer (eg hard disk, mouse, VGA card, CPU, etc.),
where the Main program notify the other programs and what they would do to provide the services they need. A computer may be possible to have more of an operating system, but only one computer operating system that can run on one point. When the computer was first switched on or run the operating system was known as the boot process on the computer. Linux operating system is one example of an operating system model has advantages over other operating systems.
B. Problem formulation
Formulation of the problem to be discussed in this paper is:
1. What is Linux,
2. When Linux was first created,
3. Who is the founder of Linux,
4. Why should Linux,
5. Where to get Linux,
6. Bagaimanan way to work in Linux.
C. Goal
The goal of the paper is as follows:
1. To increase student knowledge about operating systems, particularly Linux operating system,
2. In order to have the ability to run Linux, and implement them in everyday life.
CHAPTER II
ISI
A. What is Linux
The word "Linux" for the time being already familiar to Internet users and the community of students who have a hobby to try out new software. Technically and short can be said, Linux is an operating system is multi user and multi-tasking, which can run on multiple platforms including the Intel 386 processor or higher. This operating system implements the POSIX standard. Linux is well interoperable with other operating systems, including Apple, Microsoft and Novell. Linux actually refers to a complete set of software which, together with the kernel to compile a complete operating system. This operating system environment includes hundreds of programs, including compilers, interpreters, editors and utilities.
Toolkit that supports connectivity, ethernet, SLIP and PPP, and interoperability. Software products are reliable (reliable), including the latest development version. Group of developers spread around the world who have worked and make Linux portable to a new platform, it also supports user communities have different needs and users can also participate and act as their own developer team.
B. When Linux was first created
In 1969, Ken Thompson and Dennis Ritchie (also the developer of the C language), researchers at AT & T Bell Laboratium America, making the UNIX operating system, the precursor of Lnux. UNIX great attention because it is the first operating system created not by the hardware maker. In addition, since all the source code created in C, so as to obtain brbagai Its Movement into the platform.
In a short time UNIX has rapidly evolved and split into two streams: UNIX developed by Berkeley University and developed by AT & T. Tired that as companies get involved, and there was competition involving many companies to hold control in the field of operating systems. Persangan This causes the need for standardization.
From here was born POSIX project led by the IEEE (The Institute of Electrical and Electronics Engineers), which aims to set the UNIX standard specifications. However, this standardization does not alleviate the competition. Since then, appear various types of UNIX. Among these was made by A. MINIX S. Tanenbaum for educational purposes. From Linux MINIX is created.
C. Who first made Linux
MINIX source code is what Linus Torvalds, a student at the University of Helsinki at the time, would serve as a reference to create a new operating system which is free and the source code accessible to the public. The operating system is then given the name Linux. In a build of Linux, Linus uses tools from the Free Software Foundation's GNU licensed. Then to make Linux an operating system is intact, he entered the programs that are also licensed GNU.
From the result of this work was born Linux version 0.01, which is actually still not be called an operating system. After experiencing improvements, jadlah Linux version 0.02, which incidentally is the first official Linux diumumkah in public. Linus announces Linux source code on October 5, 1991. At that time Linux has been able to run bash shell, compiler gcc, GNU make, GNU sed, compress, etc. Linux project is getting attention from programmers worldwide who later participated build Linux. Linux development went very fast today.
D. Why use Linux
Many of the benefits we get from Linux, some of which are:
Free and legal
Cheap and efficient
Relatively stable and secure
Complete and functional
Support pleasant communication and culture
A lot of documentation and information easily available
Development of rapid and high quality
Avoiding dependence on one or more software vendors
The opportunity and potential for developing more
What we expect from software? So that our work is finished? Maybe it was one of them. Use Linux, because with this software is available from all the work for typing the Office Suite, graphics applications, multimedia, up to high-level computing. So why do we have wasted more money using the software proprietary / closed-source? Greater dependence on vendors and concerns in working for wearing the products are not legally be part of a common problem. Especially about the volatile security and fewer growth opportunities.
Linux / UNIX provide some special process in which terminals, printers and other hardware devices can be accessed like us to access files stored on hard disk or floppy disk. _ When the program starts, the program is run from the hard disk into RAM, and after the run will be named as a process. Linux / UNIX provides a service for creating, modifying programs, processes and files. Linux / UNIX support file structure is hierarchical. Linux / UNIX operating system is one that belongs to the class operating system that can do multitasking. Multitasking itself is a state where an operating system can do many jobs at once.
In addition to multitasking, Linux / UNIX can also support multiuser. Namely the operating system at the same time can be used by more than one user is entered into the system. Even for Linux also supports
to multiconsole where at the same time at the computer directly without passing through the network and allows more than one user into the system dakam.
E. Where to get Linux
Linux can be found in a variety of distribution (often called distributions). Distro is a bundle of the Linux kernel, along with basic linux system, the installation program, basic tools, and other programs useful in accordance with the purpose of making distributions. There are so many Linux distros, including:
RedHat, the most popular distributions, at least in Indonesia. RedHat is the first distribution of the installation and operation easy.
Debian distribution, which prioritizes stability and reliability, although sacrificing convenience and Currency aspect of the program. Debian uses. Deb file in the package installation program.
Slackware, the distribution of ever dominate the world of Linux. Almost all of the documentation prepared based on Slackware Linux. Two important things than Slackware is that all of its contents (the kernel, library or application) is proven. So maybe a bit old but it was stable. The second was because he advocated for installing from source so any programs installed optimized by our system. This is the reason he did not want to use the binary RPM and up to Slackware 4.0, it still uses libc5 glibc2 not like the others.
SuSE distribution, which is very popular with YaST (Yet another Setup Tools) to configure the system. SuSE is the first distribution in which the installation can use the Indonesian language.
Mandrake, RedHat distro is a variant optimized for Pentium. If we use a pentium computer up, Linux is generally able to walk faster with Mandrake.
WinLinux, distributions that are designed to be installed on top of DOS partitions (Windows). So to run it could be a click from Windows. WinLinux made as if it is an application program under Windows. And many other distros that are already available or that will emerge. Anton, Africa, and Wisesa Open Source Campus Agreement
F. How do I work in Linux
The most important part is the operating system kernel, the heart of the system
operation.
The kernel provides a tool where all services provided by computer systems.
Kernel prevent access to the application process to access the hardware directly, forcing the process of using the tools provided.
Kernel give protection to users of other user interference
Kernel tool used by system calls (system calls). Programsistem using kernel tool for implementation of various services. Program system and all other programs running on the kernel. User programs run in different modes with the kernel, called user mode.
Kernel contains several important parts, namely:
Management process
Memory Management
hardware drivers
file system drivers
Network Management
And a variety of other subsystems
Here is the architecture of the Linux operating system:
PROCESS
The process is a single program running on a virtual address, it means that every thing is a process running under Linux. This process goes through perintahperintah contained in the shell. One line of command in the shell are sometimes able to affect more than one process, especially if there are pipes commands. Example:
ps.1 nroff-man | grep kill | more
This command does three processes, one process for each command.
These types of processes in Linux:
There are several types of processes in Linux. Each process has its own specific characteristics and attributes.:
Interactive processes: The process that begins (and controlled by) a shell. Can look beyond the (foreground) or only in the (background).
Batch processes : Processes that are not associated with the terminal but waiting for execution in a sequent.
Daemon processes: The process started when Linux boots and runs in the background.
The easiest way to find out what processes are running on the system is using the ps command (process status). Ps command has several options and arguments, are available for all users and root, although of course the results will differ depending on your login. If you login as a normal user (not root), if written in the ps command would look something like:
$ Ps
PID TTY STAT TIME COMMAND
41 v01 S 0:00-bash
134 v01 R 0:00 ps
Results from the ps command is always arranged in a column. The first column labeled PID (Process Identification Number); is numbering from Linux to mark a process, starting from zero and increased by one for each process to the highest numbers. If Linux reaches the highest number, the numbering will start again from the lowest number with the passing numbers that are in use active processes. Usually the lowest numbers used by the kernel and the daemon process that starts when booting up to Linux running.
To manipulate the process we can use the PID. TTY column
indicate the terminal which is used when the process begins. STAT column indicates the current state of the process, the most numerous entries are S for sleeping and R for running. TIME column shows the CPU time used by the process. NAME column shows the names of processes running, usually the name of the command is entered. Some commands are used to launch another command, this process is known as the child process. There are many versions of the Linux ps command depending on version used. Most of the admin (if logged in as root) using the ps command below to display the entire information system:
ps-ef
ps-le
The process is locked in a terminal and can not do anything referred to hang. Sometimes unisex berahir a process that is not perfect. This process is called Runaway. To overcome this problem and restore system to normal use the kill command. To use this command we need to access another console, if the terminal was locked we had to login again. As a regular user can only mengkill process itself and the user can not affect another user in the system. As root you have full authority to use the kill command. PID is necessary to know the processes running so it can mengkillnya.
Memory
Organization and memory management greatly affect computer performance. Memory management is important and complex tasks related to:
main memory as a resource to be allocated and shared among a number of active processes. To be able to utilize the facility to process and input / output efficiently, then the desired memory which can hold as much as possible the process.
Efforts to programmers or process is not limited capacity of physical memory in a computer system.
Linux take advantage of virtual memory to support system performance. As a multiprogramming operating system, virtual memory can improve the efficiency of the system. While the process of waiting for the parts swapped into memory, waiting for the completion of the operation input / output and process diblocked. Allowable processing time can be assigned to other processes.
Linux memory management provides:
1. Large address space
Address space can be greater than the available physical memory
2. Protection
Each process in the system has its own virtual address space. Virtual address spaces were completely separate. Processes running in one application can not interfere with other processes.
3. Memory Mapping
The mapping between virtual memory to physical memory available.
4. Virtual shared memory (shared virtual memory) shared virtual memory is to save memory space, such as libraries dinamisbagi some processes.
Because of less physical memory than virtual memory, the system load is only a virtual page-page when it is being used in the process. Linux virtual page to load so necessary. This technique is called demand paging. When processors try to access a virtual address that is not in physical memory, processors can not find the page table entries in cyberspace. Issuing processor page fault.
If the virtual address is not valid target (ie the process of trying to access a virtual address that is not allowed), then the operating system to end the process to protect other processes.
If the target virtual address is valid but not currently in physical memory, the operating system must bring pages into memory from disk. Accessing the disk takes a long time. If there is another process that can run, then choose the operating system to run another process. The process begins again at the instruction where the page fault occurs. Processors can map the virtual memory to physical memory when done on virtual memory accesses, so the process continues to run. If there is no free memory, operating system should make room for pages that will be entered by removing another page of memory.
If the page has been modified (dirty-page), the operating system should maintain the contents page. When removed from the memory, stored in a special space (swap space).
If the page has not been dumped in a page then page is not writeable
need to be written to disk. The following program code memory of his manager:
# Ifndef _MEMORY_H
# Define _MEMORY_H
# Include
# Ifndef _STRING_H
# Include
# Endif
# Endif
# Ifndef _LINUX_MM_H
# Define _LINUX_MM_H
# Include
# Include
# Ifdef __KERNEL__
# Include
# Include
# Include
# Include
# Include
# Include
extern unsigned long max_mapnr;
extern unsigned long num_physpages;
extern void * high_memory;
extern int page_cluster;
extern struct list_head active_list;
extern struct list_head inactive_list;
# Include
# Include
# Include
struct vm_area_struct (
struct mm_struct * vm_mm;
unsigned long vm_start;
unsigned long vm_end;
within vm_mm.
* Vm_flags ..
0x00000800 # define VM_DENYWRITE
0x00001000 # define VM_EXECUTABLE
0x00002000 # define VM_LOCKED
0x00004000 # define VM_IO
0x00008000 # define VM_SEQ_READ
0x00010000 # define VM_RAND_READ
0x00020000 # define VM_DONTCOPY
# Define VM_DONTEXPAND 0x00040000
0x00080000 # define VM_RESERVED
# If defined (CONFIG_GRKERNSEC_PAX) | | Defined
(CONFIG_GRKERNSEC_PAX_RANDMMAP)
0x00000133 # define VM_STACK_FLAGS
# Else
0x00000177 # define VM_STACK_FLAGS
# Endif
# Define VM_READHINTMASK (VM_SEQ_READ | VM_RAND_READ)
# Define VM_ClearReadHint (v) (v) -> vm_flags & = ~ VM_READHINTMASK
# Define VM_NormalReadHint (v) (! ((V) -> vm_flags &
VM_READHINTMASK))
# Define VM_SequentialReadHint (v) ((v) -> vm_flags & VM_SEQ_READ)
# Define VM_RandomReadHint (v) ((v) -> vm_flags & VM_RAND_READ)
extern int vm_min_readahead;
extern int vm_max_readahead;
extern pgprot_t protection_map [16];
vm_operations_struct struct (
void (* open) (struct vm_area_struct * area);
void (* close) (struct vm_area_struct * area);
struct page * (* nopage) (struct vm_area_struct * area, unsigned
long address, int unused);
);
typedefs struct page (
struct list_head list;
address_space struct * mapping;
unsigned long index;
struct page * next_hash;
atomic_t count;
wait_queue_head_t wait;
struct page ** pprev_hash;
void * virtual;
struct zone_struct * zone;
Mem_map_t);
# Ifndef _MEMORY_H
# Define _MEMORY_H
# Include
# Ifndef _STRING_H
# Include
# Endif
# Endif
# Ifndef _LINUX_MM_H
# Define _LINUX_MM_H
# Include
# Include
# Ifdef __KERNEL__
# Include
# Include
# Include
# Include
# Include
# Include
extern unsigned long max_mapnr;
extern unsigned long num_physpages;
extern void * high_memory;
extern int page_cluster;
extern struct list_head active_list;
extern struct list_head inactive_list;
# Include
# Include
# Include
struct vm_area_struct (
struct mm_struct * vm_mm;
unsigned long vm_start;
unsigned long vm_end;
within vm_mm.
* Vm_flags ..
0x00000800 # define VM_DENYWRITE
0x00001000 # define VM_EXECUTABLE
0x00002000 # define VM_LOCKED
0x00004000 # define VM_IO
0x00008000 # define VM_SEQ_READ
0x00010000 # define VM_RAND_READ
0x00020000 # define VM_DONTCOPY
# Define VM_DONTEXPAND 0x00040000
0x00080000 # define VM_RESERVED
# If defined (CONFIG_GRKERNSEC_PAX) | | Defined
(CONFIG_GRKERNSEC_PAX_RANDMMAP)
0x00000133 # define VM_STACK_FLAGS
# Else
0x00000177 # define VM_STACK_FLAGS
# Endif
# Define VM_READHINTMASK (VM_SEQ_READ | VM_RAND_READ)
# Define VM_ClearReadHint (v) (v) -> vm_flags & = ~ VM_READHINTMASK
# Define VM_NormalReadHint (v) (! ((V) -> vm_flags &
VM_READHINTMASK))
# Define VM_SequentialReadHint (v) ((v) -> vm_flags & VM_SEQ_READ)
# Define VM_RandomReadHint (v) ((v) -> vm_flags & VM_RAND_READ)
extern int vm_min_readahead;
extern int vm_max_readahead;
extern pgprot_t protection_map [16];
vm_operations_struct struct (
void (* open) (struct vm_area_struct * area);
void (* close) (struct vm_area_struct * area);
struct page * (* nopage) (struct vm_area_struct * area, unsigned
long address, int unused);
);
typedefs struct page (
struct list_head list;
address_space struct * mapping;
unsigned long index;
struct page * next_hash;
atomic_t count;
wait_queue_head_t wait;
struct page ** pprev_hash;
void * virtual;
struct zone_struct * zone;
Mem_map_t);
# Ifndef _MEMORY_H
# Define _MEMORY_H
# Include
# Ifndef _STRING_H
# Include
# Endif
# Endif
# Ifndef _LINUX_MM_H
# Define _LINUX_MM_H
# Include
# Include
# Ifdef __KERNEL__
# Include
# Include
# Include
# Include
# Include
# Include
extern unsigned long max_mapnr;
extern unsigned long num_physpages;
extern void * high_memory;
extern int page_cluster;
extern struct list_head active_list;
extern struct list_head inactive_list;
# Include
# Include
# Include
struct vm_area_struct (
struct mm_struct * vm_mm;
unsigned long vm_start;
unsigned long vm_end;
within vm_mm.
* Vm_flags ..
0x00000800 # define VM_DENYWRITE
0x00001000 # define VM_EXECUTABLE
0x00002000 # define VM_LOCKED
0x00004000 # define VM_IO
0x00008000 # define VM_SEQ_READ
0x00010000 # define VM_RAND_READ
0x00020000 # define VM_DONTCOPY
# Define VM_DONTEXPAND 0x00040000
0x00080000 # define VM_RESERVED
# If defined (CONFIG_GRKERNSEC_PAX) | | Defined
(CONFIG_GRKERNSEC_PAX_RANDMMAP)
0x00000133 # define VM_STACK_FLAGS
# Else
0x00000177 # define VM_STACK_FLAGS
# Endif
# Define VM_READHINTMASK (VM_SEQ_READ | VM_RAND_READ)
# Define VM_ClearReadHint (v) (v) -> vm_flags & = ~ VM_READHINTMASK
# Define VM_NormalReadHint (v) (! ((V) -> vm_flags &
VM_READHINTMASK))
# Define VM_SequentialReadHint (v) ((v) -> vm_flags & VM_SEQ_READ)
10
Public Lecture IlmuKomputer.Com
Copyright © 2004 IlmuKomputer.Com
# Define VM_RandomReadHint (v) ((v) -> vm_flags & VM_RAND_READ)
extern int vm_min_readahead;
extern int vm_max_readahead;
extern pgprot_t protection_map [16];
vm_operations_struct struct (
void (* open) (struct vm_area_struct * area);
void (* close) (struct vm_area_struct * area);
struct page * (* nopage) (struct vm_area_struct * area, unsigned
long address, int unused);
);
typedefs struct page (
struct list_head list;
address_space struct * mapping;
unsigned long index;
struct page * next_hash;
atomic_t count;
wait_queue_head_t wait;
struct page ** pprev_hash;
void * virtual;
struct zone_struct * zone;
Mem_map_t);
Linux puts the process in memory is divided into several partitions. This partitioning is dynamic then the quantity, location and size of the memory process can vary dynamically over time. Process that will soon be made into a memory partition as needed. Linux creates swap disk space first place, when the process is created, the swap space allocated on disk. When the process has to be removed from main memory, the process is always placed into the space that has been allocated, not to different places every time there was a swap-out. Ketikanproses ended, swap space on disk didealokasikan.
CHAPTER III
CLOSING
A. Conclusion
Linux is a clone of UNIX. Linux has a high compatibility to UNIX, even the GNU utilities have a greater ability than UNIX's. Linux is designed specifically for PC platforms. Linux is a multitasking operating system, multiuser, network support directly, protected-mode support. Linux has a hierarchical process similar to UNIX. There are several types of processes in Linux. Each process has its own specific characteristics and attributes.:
Interactive processes: The process that begins (and controlled by) a shell. Can look beyond the (foreground) or only in the (background).
Batch processes : Processes that are not associated with the terminal but waiting for execution in a sequent.
Daemon processes: The process started when Linux boots and runs in the background. Linux take advantage of virtual memory so the system can work more efficiently.
Linux memory management provides:
1. Large address space
Address space can be greater than the available physical memory
2. Protection
Each process in the system has its own virtual address space. Virtual address spaces were completely separate. Processes running in one application can not interfere with other processes.
3. Memory Mapping
The mapping between virtual memory to physical memory available.
4. Virtual shared memory (shared virtual memory) shared virtual memory is to save memory space, such as dynamic libraries for some processes.
B. Suggestion
From the results in the conclusion on the advice of the writer probably was not much and only two: first, the need for computer students are taught to use Linux both at the campus or non-campus trainingtraining mengingat the increasingly popular Linux computer so that students can prepare themselves in facing the challenges of the century 21. And second, it may be useful if the readers who still want to use the windows / other OS but are curious about Linux, it is advisable to try to run the operating system keduaduanya (do not worry I can not because Linux has the function of LILO (Linux Loader), which allows to run two operating systems at once ), the situation can change in one or two years. And if that happens you have a step further.
Please note the reader with some experience of users admitted after several weeks of using Linux computer knowledge will be increased drastically because the Linux has studied the principles of routing, nameserver, graphics rendering, etc.. Therefore encourage users to become a good programmer and at some point they will probably make the operating system itself.
History and Understanding Linuk
Profile Hapus Band
Story of the lines
Berdiri sejak 11 januari 2005, Hapus merupakan jelmaan dan reinkar nasi dari nama sebelumnya “Eup-Leu”
Secara esensional Eup-Leu memiliki kisah unik dan pengalaman yang kami rasakan sulit akan di lupakan. Namun dengan segala kerendahan hati serta kesepakatan hati masing-masing personil, kami berinisiatif untuk untuk mengubah menjdi Hapus yang sekarang kami usung.
Terlepas dari hal itu. Sejak awal hinga skarang kami mengalami begitu banyak perubahan baik dari pergantian personil atau pun warna music yang kami bawakan .
Berawal dari komposisi pertama eup-leu
* Ichal (vocal)
* Ei (bass)
* Bayoe (guitar)
* Aceng (drum)
Bertahan hingga sekitar 1 tahun yang kemudian mengalami stagnasi dan mengakibatkan Eup-Leu sedikit “BEKU” dalam mengekspresikan gayanya yang unik,lucu sekaligus aneh hingga terkesan sebagai kesatuan anak-anak bodoh. Tapi memang perlu di pahami, bahwa Eup-Leu sendiri mempunyai definisi “Laskar Bodoh”.
THE NEXT GENERATION OF EUP-LEU
Tepat dimana Eup-Leu berulang tahun pada tanggal 11 januari 2009, kami para personil sepakat untuk merubah nama band “Eup-Leu” menjadi “Hapus” di awali dengan debut pertama dengan personil baru yang lebih memberikan warna baru tetapi di kombinasikan dengan personil lama Eup-Leu yang memiliki gaya khas sejak dulu, yang akhirnya Hapus beranggotakan 4 personil (100% otodidak dalam memahami dan belajar musik)
Komposisi baru yang mengusung nama Hapus
* Ichal (vocal)
* DP (bass)
* Iwan (guitar)
* Aceng (drum)
Refrensi musik
Kami mencoba menggabungkan style music masing-masing personil yang berbeda-beda, kami juga ingin menggabungkan unsur-unsur musik yang fresh di masyarakat dunia. Dan kamipun mencoba menuangkan musik itu kedalam suatu wadah yaitu musik Hapus
Refrensi lagu
* Cinta Terakhir (Album Kompilasi)
* Janji Cinta
* Saat Aku Didekatmu(SAD)
* Takan Pernah Mengerti
* Cinta Jauh
* Cahaya cinta
Download :Cinta Terakhir (Album Kompilasi)
3D Printing – Is It The Future Of Printing.. ?
If you have a computer at home, the chances are good that you will have a printer as well, but what you won’t have is a 3D printer.
3D printing might sound like something from the future, but in actual fact it is here now – and it looks to be heading for more widespread use as well.
Major companies are currently designing machines that can be used for printing in 3D that more of us will be able to afford. Currently the only people who use these machines are those in business
. Take an architect who wants to create a small scale model of a house or building he wants to build. With this printing technique he can do just that – and all at the push of a button.
Another key area of business where 3D printing is currently being used is in product design. Designers can create whatever model they require on a computer screen and when they are happy with it they can create that model in 3D real life format.
The wonderful thing about 3D printing is that it allows you to see whatever you design right in front of you. In the past you would have been restricted to designing it on screen and printing it out on a sheet of paper. That doesn’t exactly give you the whole picture. Even if you were to create an image from every conceivable angle you couldn’t put the whole thing together very easily.
Instead you would have to create a model from scratch or have someone else do it for you. In any event it wouldn’t be as simple as pressing a button and letting a machine create your 3D model for you.
So how widespread can we expect these printers to become? Will we eventually be able to print 3D models and shapes in our own homes?
They certainly look to be heading for mainstream use somewhere down the line. At the moment professionals whose businesses can afford the price tag of one of these machines are the only people to use them on a daily basis. Soon we could expect schools to get in on the action, and as they become more widespread the cost should come down accordingly.
Once that happens we can expect 3D printing to start making its way into our homes more and more often. Just as the dot matrix printer finally gave way to the more advanced laser printer, so 3D printers look to be the next step up on the list.
Can you imagine being able to think of a shape and then print it up in 3D form? There are countless ways in which this technology will be of use – and it will be fascinating to see exactly what uses are found for it in the coming years.
What is Laser Skin Resurfacing.. ?
Laser skin resurfacing is a cosmetic procedure used to treat wrinkles and skin irregularities, typically on the face. It utilizes concentrated light beams aimed at the skin and pulsing in a short pattern to burn away the layers of skin. This procedure is sometimes called a laser peel or lasabraision.
Types of Laser Skin Resurfacing
There are two main types of laser skin resurfacing currently being used by cosmetic surgeons. CO2 laser resurfacing uses ultrapulsed, or short pulsed, light energy and scans the area to remove the skin's layers.
It can be used on most facial abnormalities, including enlarged glands, skin cancers, warts, scars, birthmarks, and wrinkles. It works best on abnormalities that are somewhat superficial.
Erbium laser resurfacing is used for deeper wrinkles on the face and other areas of the body. This technique causes fewer side effects than the CO2 laser and also has a shorter recovery time. Those treated with a CO2 laser typically have a two-week recovery time, while the erbium laser requires only one week of recovery time.
The Procedure
The procedure is typically the same no matter what type of laser is used. Laser skin resurfacing is an out patient procedure and begins with local anesthesia to block the pain. Some doctors will administer sedatives as well to keep you calm during the procedure. A full-face treatment takes between an hour and a half and two hours, while a partial procedure is done in 45 minutes or less.
The Recovery
Recovery takes between one and three weeks. Most patients are able to return to their normal activities as soon as their pain allows, but the treated area will be red and tender for a few weeks after treatment. Be prepared for the fact that the treated area will both look and feel like a moderate sunburn after treatment, complete with peeling skin, itching, and burning sensations. This is normal, and it will fade with time.
Wound Care
Laser skin resurfacing burns away the damaged skin layers, so it does create a slight wound. The area that is treated will be covered with a dressing immediately after the procedure. This will be removed within three days of the procedure in most cases. After this, patients will cleanse the area several times a day with a saline solution, and then cover it with an ointment as prescribed by the doctor. This prevents any unsightly scabs from forming. After 21 days at most, the area should be healed.
Once the wound has healed, most patients notice a slight pink color to the skin. This is temporary, but it can last as long as six months, so most patients choose to wear a concealing makeup over the area. As long as the wound is healed this is fine.
Complications
As with all medical and cosmetic procedures, there is a chance of complications with laser skin resurfacing. Some patients will experience milia, which looks like small white bumps on the healing
area. These can be gently removed with a damp towel.
Sometimes patients will have increased or decreased pigmentation in the area treated. This can be bleached or covered with makeup. If you have laser skin resurfacing near your mouth and have ever had a cold sore, it may come back. Anti viral medications can prevent this, but talk to your doctor first.
Some patients will have a bacterial infection as a result of the procedure. Some doctors will recommend a preventative antibiotic before and after treatment. This is particularly important for patients who have lowered immunities.
The treated area will swell after the procedure. If you sleep on an extra pillow, this can reduce the swelling. Ice can also be used to treat swelling. Scarring is possible, but not very common. Finding a skilled, highly qualified physician to perform the treatment will lessen the risk of scarring and other permanent side effects from the treatment.
Emo hair style
Emo isn't just a hairstyle; it is a way of life! The style was started by a group of teenager's labeled emos, or those who loved to listen to emotional music. Emos started the style by the way they dressed. The dress
was plain and the holed jeans and thick clothing was just the beginning because the style soon turned into hair.
Emo hairstyles today aren't just used or worn by fully dedicated Emos but are instead found on many individuals who just find the look stylish! The Emo hair style is mostly worn by those in their 20's but it is found in many different age categories, and it can be worn by either gender! Here are a few facts about the Emo hair style:
* Jet black is the Emo trademark. If anything captures the Emo spirit the most it is the jet black hair
that long enough to fall over the individual's right eye. The bangs must be long enough to do this so that virtually no part of the person's right side face is visible to anyone! * Emo styles come with choices. Just because the Emo style is trademarked with dark black hair color and over the face arrangements, an Emo can still have a few options with how they wear their hair. Among the options is whether they want it greasy or clean. Many Emos believe that greasy is the way to go because the band members of their favorite groups wear it this way; while others opts for the cleaner, more socially accepted Emo style. Whatever your choice you can be sure you'll be within the Emo style either way! * Emo styles can be found at many stylist locations. Many professional stylists have learned the Emo style because it has been requested so much. If you're looking to delve into the Emo hair style for the first time then it is recommended you go to a stylist who has experience with the look. A stylist can also help you decide whether highlights are right for you as well (Yes, that's right, Emo hairstyles can come equipped with highlights!). * Thin is better for Emo style! If you're wondering what type of hair looks best with the Emo style then thin is the winner! While you can pull the look off with thick hair, it will be much easier with thinner hair. If your hair is super thick then you may want to use a hair thinner to get your hair to the appropriate level.