Notes of Unit - II Comp Fundamental
Notes of Unit - II Comp Fundamental
1. Security –
The operating system uses password protection to protect user data
and similar other techniques. it also prevents unauthorized access to
programs and user data.
3. Job accounting –
Operating system Keeps track of time and resources used by various
tasks and users, this information can be used to track resource usage
for a particular user or group of user.
4. Error detecting aids –
Operating system constantly monitors the system to detect errors and
avoid the malfunctioning of computer system.
6. Memory Management –
The operating system manages the Primary Memory or Main Memory.
Main memory is made up of a large array of bytes or words where each
byte or word is assigned a certain address. Main memory is a fast
storage and it can be accessed directly by the CPU. For a program to
be executed, it should be first loaded in the main memory. An Operating
System performs the following activities for memory management:
It keeps tracks of primary memory, i.e., which bytes of memory are used
by which user program. The memory addresses that have already been
allocated and the memory addresses of the memory that has not yet
been used. In multi programming, the OS decides the order in which
process are granted access to memory, and for how long. It Allocates
the memory to a process when the process requests it and deallocates
the memory when the process has terminated or is performing an I/O
operation.
7. Processor Management –
In a multi programming environment, the OS decides the order in which
processes have access to the processor, and how much processing
time each process has. This function of OS is called process
scheduling. An Operating System performs the following activities for
processor management.
Keeps tracks of the status of processes. The program which perform
this task is known as traffic controller. Allocates the CPU that is
processor to a process. De-allocates processor when a process is no
more required.
8. Device Management –
An OS manages device communication via their respective drivers. It
performs the following activities for device management. Keeps tracks
of all devices connected to system. designates a program responsible
for every device known as the Input/Output controller. Decides which
process gets access to a certain device and for how long. Allocates
devices in an effective and efficient way. Deallocates devices when they
are no longer required.
9. File Management –
A file system is organized into directories for efficient or easy navigation
and usage. These directories may contain other directories and other
files. An Operating System carries out the following file management
activities. It keeps track of where information is stored, user access
settings and status of every file and more… These facilities are
collectively known as the file system.
The Operating System provides certain services to the users which can be listed
in the following manner:
Multiple jobs are executed by the CPU by switching between them, but the switches
occur so frequently. Thus, the user can receive an immediate response. For example,
in a transaction processing, the processor executes each user program in a short burst
or quantum of computation. That is, if n users are present, then each user can get a
time quantum. When the user submits the command, the response time is in few
seconds at most.
The operating system uses CPU scheduling and multiprogramming to provide each
user with a small portion of a time. Computer systems that were designed primarily as
batch systems have been modified to time-sharing systems.
● Problem of reliability.
● Question of security and integrity of user programs and data.
● Problem of data communication.
The processors communicate with one another through various communication lines
(such as high-speed buses or telephone lines). These are referred as loosely coupled
systems or distributed systems. Processors in a distributed system may vary in size
and function. These processors are referred as sites, nodes, computers, and so on.
● With resource sharing facility, a user at one site may be able to use the resources
available at another.
● Speedup the exchange of data with one another via electronic mail.
● If one site fails in a distributed system, the remaining sites can potentially
continue operating.
● Better service to the customers.
● Reduction of the load on the host computer.
● Reduction of delays in data processing.
Hard real-time systems guarantee that critical tasks complete on time. In hard real-time
systems, secondary storage is limited or missing and the data is stored in ROM. In
these systems, virtual memory is almost never found.
Soft real-time systems are less restrictive. A critical real-time task gets priority over
other tasks and retains the priority until it completes. Soft real-time systems have
limited utility than hard real-time systems. For example, multimedia, virtual reality,
Advanced Scientific Projects like undersea exploration and planetary rovers, etc.
Multiprogramming Systems
● In this the operating system picks up and begins to execute one of the jobs from
memory.
● Once this job needs an I/O operation operating system switches to another job
● Jobs in the memory are always less than the number of jobs on disk(Job Pool).
● If several jobs are ready to run at the same time, then the system chooses which
● In Non-multiprogrammed system, there are moments when CPU sits idle and
Time Sharing Systems are very similar to Multiprogramming batch systems. In fact time
sharing systems are an extension of multiprogramming systems.
In Time sharing systems the prime focus is on minimizing the response time, while in
multiprogramming the prime focus is to maximize the CPU usage.
comparison
visual indicators.
beginners expertise.
graphical components.
CLI. GUI
Appearance One can change the It is not possible to
customizable option.
● One can memorize tasks easily as in CLI one has to type commands the
Elements of OS are
(d)Kernel
● Sharing
● Connectivity
● Increased speed
● Decreased cost
● Improved security
● Centralized software management
● Electronic mails
● Flexible access
Network Topology
Types of Topology
There are five types of topology in computer networks:
1. Mesh Topology
2. Star Topology
3. Bus Topology
4. Ring Topology
5. Hybrid Topology
Mesh Topology
In mesh topology each device is connected to every other device on the
network through a dedicated point-to-point link. When we say dedicated it
means that the link only carries data for the two connected devices only.
Lets say we have n devices in the network then each device must be
connected with (n-1) devices of the network. Number of links in a mesh
topology of n devices would be n(n-1)/2.
Star Topology
In star topology each device in the network is connected to a central device
called hub. Unlike Mesh topology, star topology doesn’t allow direct
communication between devices, a device must have to communicate
through hub. If one device wants to send data to other device, it has to first
send the data to hub and then the hub transmit that data to the designated
device.
4. Robust, if one link fails, other links will work just fine.
Bus Topology
In bus topology there is a main cable and all the devices are connected to
this main cable through drop lines. There is a device called tap that
connects the drop line to the main cable. Since all the data is transmitted
over the main cable, there is a limit of drop lines and the distance a main
cable can have.
Ring Topology
In ring topology each device is connected with the two devices on either
side of it. There are two dedicated point to point links a device has with the
devices on the either side of it. This structure forms a ring thus it is known
as ring topology. If a device wants to send data to another device then it
sends the data in one direction, each device in ring topology has a
repeater, if the received data is intended for other device then repeater
forwards this data until the intended device receives it.
Advantages of Ring Topology
1. Easy to install.
2. Installation is difficult.
Network Engineering
Networking engineering is a complicated task, which involves software, firmware, chip
level engineering, hardware, and electric pulses. To ease network engineering, the
whole networking concept is divided into multiple layers. Each layer is involved in some
particular task and is independent of all other layers. But as a whole, almost all
networking tasks depend on all of these layers. Layers share data between them and
they depend on each other only to take input and send output.
Internet
A network of networks is called an internetwork, or simply the internet. It is the largest
network in existence on this planet.The internet hugely connects all WANs and it can
have connection to LANs and Home networks. Internet uses TCP/IP protocol suite and
uses IP as its addressing protocol. Present day, Internet is widely implemented using
IPv4. Because of shortage of address spaces, it is gradually migrating from IPv4 to
IPv6.
Internet enables its users to share and access enormous amount of information
worldwide. It uses WWW, FTP, email services, audio and video streaming etc. At huge
level, internet works on Client-Server model.
Internet uses very high speed backbone of fiber optics. To inter-connect various
continents, fibers are laid under sea known to us as submarine communication cable.
Layered Tasks
In layered architecture of Network Model, one whole network process is divided into
small tasks. Each small task is then assigned to a particular layer which works
dedicatedly to process the task only. Every layer does only specific work.
In layered communication system, one layer of a host deals with the task done by or to
be done by its peer layer at the same level on the remote host. The task is either
initiated by layer at the lowest level or at the top most level. If the task is initiated by
the-top most layer, it is passed on to the layer below it for further processing. The lower
layer does the same thing, it processes the task and passes on to lower layer. If the
task is initiated by lower most layer, then the reverse path is taken.
Every layer clubs together all procedures, protocols, and methods which it requires to
execute its piece of task. All layers identify their counterparts by means of
encapsulation header and tail.
OSI Model
Open System Interconnect is an open standard for all communication systems. OSI
model is established by International Standard Organization (ISO). This model has
seven layers:
Internet Model
Internet uses TCP/IP protocol suite, also known as Internet suite. This defines Internet
Model which contains four layered architecture. OSI Model is general communication
model but Internet Model is what the internet uses for all its communication.The
internet is independent of its underlying network architecture so is its Model. This
model has the following layers:
● Application Layer: This layer defines the protocol which enables user to interact
with the network.For example, FTP, HTTP etc.
● Transport Layer: This layer defines how data should flow between hosts. Major
protocol at this layer is Transmission Control Protocol (TCP). This layer ensures
data delivered between hosts is in-order and is responsible for end-to-end
delivery.
● Internet Layer: Internet Protocol (IP) works on this layer. This layer facilitates host
addressing and recognition. This layer defines routing.
● Link Layer: This layer provides mechanism of sending and receiving actual
data.Unlike its OSI Model counterpart, this layer is independent of underlying
network architecture and hardware.