Unit2 FCET
Unit2 FCET
Unit2 FCET
next task.
Advantages of Time-Sharing OS:
Each task gets an equal opportunity
Fewer chances of duplication of software
CPU idle time can be reduced
Disadvantages of Time-Sharing OS:
Reliability problem
One must have to take care of the security and integrity of user programs
and data
Data communication problem
Examples of Time-Sharing OS: Multics, Unix, etc.
3. Distributed Operating System –
Various autonomous interconnected computers communicate with each other
using a shared communication network. Independent systems possess their own
memory unit and CPU. These are referred to as loosely coupled systems or
distributed systems.
“The major benefit of working with these types of the operating system is
that it is always possible that one user can access the files or software which
are not actually present on his system but some other system connected
within this network i.e., remote access is enabled within the devices connected
in that network.”
5.
Advantages of Network Operating System:
Highly stable centralized servers.
Security concerns are handled through servers.
New technologies and hardware up-gradation are easily integrated into the
system.
Server access is possible remotely from different locations and types of
systems.
Disadvantages of Network Operating System:
Servers are costly.
User has to depend on a central location for most operations.
Maintenance and updates are required regularly.
Examples of Network Operating System are: Microsoft Windows Server 2003,
Microsoft Windows Server 2008, UNIX, Linux, Mac OS X, Nov-ell Net-ware,
and BSD, etc.
5. Real-Time Operating System –These types of OSs serve real-time systems.
The time interval required to process and respond to inputs is very small. This
time interval is called response time.
Real-time systems are used when there are time requirements that are very strict
like missile systems, air traffic control systems, robots, etc,
Two types of Real-Time Operating System which are as follows:
Hard Real-Time Systems:
These OSs are meant for applications where time constraints are very strict
and even the shortest possible delay is not acceptable. These systems are built
for saving life like automatic parachutes or airbags which are required to be
readily available in case of any accident. Virtual memory is rarely found in
these systems.
Soft Real-Time Systems:
These OSs are for applications where for time-constraint is less strict.
Advantages of RTOS:
Maximum Consumption: Maximum utilization of devices and system,
thus more output from all the resources
Task Shifting: The time assigned for shifting tasks in these systems are
very less. For example, in older systems, it takes about 10 microseconds in
shifting one task to another, and in the latest systems, it takes 3 microseconds.
Focus on Application: Focus on running applications and less importance
to applications which are in the queue.
Real-time operating system in the embedded system: Since the size of
programs are small, RTOS can also be used in embedded systems like in
transport and others.
Error Free: These types of systems are error-free.
Memory Allocation: Memory allocation is best managed in these types of
systems.
Disadvantages of RTOS:
Limited Tasks: Very few tasks run at the same time and their
concentration is very less on few applications to avoid errors.
Use heavy system resources: Sometimes the system resources are not so
good and they are expensive as well.
Complex Algorithms: The algorithms are very complex and difficult for
the designer to write on.
Device driver and interrupt signals: It needs specific device drivers and
interrupts signals to respond earliest to interrupts.
Thread Priority: It is not good to set thread priority as these systems are
very less prone to switching tasks.
Functions of an operating System:
1. File Management –
A file system is organized into directories for efficient or easy navigation and
usage. These directories may contain other directories and other files. An
Operating System carries out the following file management activities. It
keeps track of where information is stored, user access settings and status of
every file, and more… These facilities are collectively known as the file
system.
2. Device Management –
An OS manages device communication via their respective drivers. It
performs the following activities for device management. Keeps track of all
devices connected to the system. designates a program responsible for every
device known as the Input/Output controller. Decides which process gets
access to a certain device and for how long. Allocates devices in an effective
and efficient way. Deallocates devices when they are no longer required.
3. Processor Management –
In a multi-programming environment, the OS decides the order in which
processes have access to the processor, and how much processing time each
process has. This function of OS is called process scheduling. An Operating
System performs the following activities for processor management.
Keeps track of the status of processes. The program which performs this task is
known as a traffic controller. Allocates the CPU that is a processor to a process.
De-allocates processor when a process is no more required.
4. Memory Management –
An Operating System performs the following activities for memory
management:
It keeps track of primary memory, i.e., which bytes of memory are used by which
user program. The memory addresses that have already been allocated and the
memory addresses of the memory that has not yet been used. In multi-
programming, the OS decides the order in which processes are granted access to
memory, and for how long. It Allocates the memory to a process when the process
requests it and de-allocates the memory when the process has terminated or is
performing an I/O operation.
5 .Security Management –
The operating system uses password protection to protect user data and similar
other techniques. it also prevents unauthorized access to programs and user data.
INTERFACE:
A user will give data and instructions to a computer and a computer will give
information back to a user. The way that a computer and a user communicate is
known as the interface.
Command Line Interface-The Command Line Interface (CLI), also known as the
command prompt or terminal, is a text-based interface used to interact with
software and operating systems. It allows users to input commands as text and
receive text-based feedback from the system.
Advantages
Controls OS or application
faster management
ability to store scripts which helps in automating regular tasks.
Troubleshoot network connection issues.
Disadvantages
The graphical user interface is used for playing games, watching videos, etc. these
are done with the help of GUI because all these applications require graphics.
Advantages of GUI
1. A GUI is a type of user interface that is much easier to use. Users can
classify and navigate options since data are represented as symbols, forms,
and icons. Users only require to click on them to acquiring to their functions.
2. The use of shortcut keys is one of the most important features of a graphical
user interface. Shortcut keys are very helpful if you require to perform a job
that requires a couple of actions.
Disadvantages of GUI-
Definition A CLI is an interface that A graphical user interface enables users to interact
allows the user to perform with the operating system or application.
tasks by issuing commands in
successive lines of text or
command lines.
Memory It needs less memory than the It needs more memory because it has various graphics
Requirement GUI. components.
Device Used It needs the only keyboard. It needs both a keyboard and a mouse.
Appearance Its appearance may not be Its appearance may be modified or changed.
modified or changed.
Errors Spelling mistakes and typing Spelling mistakes and typing errors are avoided.
errors are not avoided.
Graphics No graphics are used in the Graphics are used in the GUI.
CLI.
Menus No menus are provided in the Menus are provided in the GUI.
CLI.
Computer Network
A computer network is a group of computers linked to each other that enables the
computer to communicate with another computer and share their resources, data,
and applications.
Advantages of LAN
Disadvantages of LAN
Here are the cons/drawbacks of LAN:
LAN will indeed save cost because of shared computer resources, but the
initial cost of installing Local Area Networks is quite high.
The LAN admin can check personal data files of every LAN user, so it does
not offer good privacy.
Unauthorized users can access critical data of an organization in case LAN
admin is not able to secure centralized data repository.
Local Area Network requires a constant LAN administration as there are
issues related to software setup and hardware failures
Advantages of MAN
Here are the pros/benefits of MAN network:
You need more cable to establish MAN connection from one place to
another.
In MAN network it is tough to make the system secure from hackers.
Advantages of WAN
Here are the benefits/pros of WAN:
Disadvantages of WAN
Here are the drawbacks/cons of WAN network:
1. LAN is defined as a On the other hand, MAN is On the other hand, WAN is
computer network defined as a computer defined as the
that links the local network that links the telecommunications network
areas like schools, metropolitan areas. that covers a large geographical
universities, area.
organizations, etc.
2. The full form of the The full form of MAN is The full form of WAN is a
LAN is Local Area Metropolitan Area Wide Area Network.
Network. Network.
3. LAN is a wired The connections in MAN The network of WAN is
network, i.e., all the are connected through connected through broadband
computers and modem or cables/ wires. services, 3G or 4G internet
printers are connected services, etc.
through wires.
5. The internet speed of The sped of MAN is The speed of WAN is relatively
LAN is very high, moderate, i.e., 44-155 less than MAN and LAN, i.e.,
i.e., 1000 Mbps. Mbps. 150 Mbps.
6. The maintenance cost The maintenance cost of The maintenance cost of WAN
of LAN is easy. MAN is difficult. is difficult.
University or continent.
o
o Hospital
Data communication-
Communication channels are the medium that connects two or more workstations.
Workstations can be connected by either wired media or wireless media. It is also
known as a transmission medium. The transmission medium or channel is a link
that carries messages between two or more devices. We can group the
communication media into two categories:
Guided media transmission
Unguided media transmission
Guided Media
In Guided media, signals are transmitted through a physical path. The features of
guide media are high speed and security. Guided media also known
as Wired or Bounded transmission media.
1. Twisted Pair
Twisted pair cable is made up of two insulated wires twisted with each other. One
wire carries the signal from source to destination and the other wire is for ground
reference. Twisting is done to avoid the exterior electromagnetic interference. It
is the most widely used transmission media.
Installation is easy
Lightweight cable
High speed
Can carry both analog and digital data
Cheaper than other transmission media
If some part of twisted pair cable is damaged, it does not affect the entire
network
Poor security
Not durable, easy to break
Attenuation is high
Supports only lower bandwidth.
In telephone lines.
Local area networks such as small office and data centres.
Category 1 UTP: Mostly used in telephone lines as it supports only low-speed data.
Category 2 UTP: It supports upto 4Mbps.
Category 3 UTP: It supports upto 16Mbps.
Category 4 UTP: It supports upto 20Mbps. It can also be used for long-distance
communications/
Category 5 UTP: It supports upto 200Mbps.
1. Bandwidth is limited.
2. Noise reduction is not possible
3. Not ideal for longer distance communications due to the attenuation.
Shielded twisted pair cable contains the metal foil surrounding the twisted copper
wires to avoid external interference.
Coaxial cable has a centre conductor enclosed in a insulating cover, which in turn
is enclosed in a metal foil shield. The whole cable is covered in a plastic cover. The
metal foil shield protects against the noise.
The inner conductor is made up of copper and the outer conductor is made up of
copper mesh. These two conductors are separated by insulating cover.
The inner centre conductor is used for data transfer while the outer copper mesh
conductor protects against the noise (Electromagnetic interference).
3. Fiber-Optic Cable
In fiber optic cable, the optical fibers are coated in plastic. These optical fibers send
the data by pulses of light.
The plastic coating protects the cable from temperature, electromagnetic inference
and other types of wiring issues.
Cladding: The core is enclosed in a layer of glass and this layer is called cladding.
The main use of cladding is to reflect the light so that the light can be transmitted
from source to the destination through reflection.
Jacket: The jacket is the outer layer of fiber optic cable which is made up of plastic
and the whole purpose of jacket is to protect the cable.
Multimode: Multiple light sources moves through different paths inside coaxial
cable. Multiple data transmission simultaneously.
1. High bandwidth: The fiber optic cable supports high bandwidth compared
to the copper cables. Thus, it transfers more data compared to the copper
cables.
2. High speed: Since the data is transmitted in form of light, the transmission
speed is very high.
3. Longer range: unlike copper wires cable, the fiber optic cable can be used
for larger distance data transmission.
4. Reliable: It is more reliable than copper cables as the core is protected
against the temperature and electromagnetic disturbances.
5. Durable
6. Light weight
Unguided Media
Unguided media does not use physical medium to transmit the data from source to
destination. We already know that the Guided media uses physical medium such as
cables and wires to transfer the data from source to destination. However unlike
guided media, the Unguide media uses air as a transmission medium to transfer
the data. Thus, it is called wireless transmission media.
The unguided media uses an antenna for transmitting and receiving the data in form
of electromagnetic waves.
There are certain areas where it is very difficult or not possible to install the cables
and wires such as hill areas, in these areas wireless data transfer is very much
required.
Types of Unguided media
1. Microwave Transmission
2. Radio Transmission
3. Infrared Transmission
1. Microwave transmission
In this type of microwave transmission, both the sender and receiver antennas are in
direct sight with each other.
This type of communication uses the satellite antenna for communication. The
sender antenna sends the signal to the satellite antenna which is revolving around
the earth at a known height. The satellite antenna then amplifies the received signal
and sends it to the receiver antenna.
2. Radio Transmission
Radio waves are very low frequency electromagnetic waves that are
transmitted in all directions within the range.
Radio transmission frequency ranges from 3KHz to 1GHz.
In radio transmissions, the antennas need not be in aligned nor required to be
set in a particular manner to send and receive signals.
Since radio waves are omnidirectional (all directions), it is not possible to
isolate the communication inside a building.
1. Radio waves are mainly used for Wide Area Networks (WAN) for example:
Mobile networks.
2. Suitable for longer distance communications.
3. Signals can penetrate walls.
4. Higher data transmission rate compared to other transmission mediums.
3. Infrared Transmission
1. Infrared waves are highest frequency waves, frequency ranges from 300GHz
to 400 THz.
2. Suitable for short distance communication.
3. Bandwidth is high so data transmit rate is high compared to other mediums.
4. These waves cannot penetrate walls, thus they are ideal for isolated
communications.
Advantages of Infrared Transmission:
1. Secure
2. High speed
3. High frequency signals
4. High data transfer rate
5. low interference
1. Sun rays interfere with the infrared rays so not ideal for outdoor
communication.
2. Suitable for short distance communication only.
3. Cannot penetrate walls so difficult to establish a communication between
two different rooms.
Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and logical
topology.
BUS Topology
Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is
called Linear Bus topology.
Features of Bus Topology
1. It is cost effective.
4. It is easy to understand.
2. If network traffic is heavy or nodes are more the performance of the network
decreases.
RING Topology
1. A number of repeaters are used for Ring topology with large number of
nodes, because if someone wants to send some data to the last node in the
ring topology with 100 nodes, then the data will have to pass through 99
nodes to reach the 100th node. Hence to prevent data loss repeaters are used
in the network.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in
opposite direction in them. Also, if one ring fails, the second ring can act as
a backup, to keep the network up.
In this type of topology all the computers are connected to a single hub through a
cable. This hub is the central node and all others nodes are connected to the central
node.
3. Easy to troubleshoot.
5. Only that node is affected which has failed, rest of the nodes can work
smoothly.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes
depend on the hub.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
In routing, the nodes have a routing logic, as per the network requirements. Like
routing logic to direct the data to reach the destination using the shortest distance.
Or, routing logic which has information about the broken links, and it avoids those
node etc. We can even have routing logic, to re-configure the failed nodes.
In flooding, the same data is transmitted to all the network nodes, hence no routing
logic is required. The network is robust, and the its very unlikely to lose the data.
But it leads to unwanted load over the network.
Types of Mesh Topology
2. Full Mesh Topology : Each and every nodes or devices are connected to
each other.
1. Fully connected.
2. Robust.
3. Not flexible.
2. It is robust.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels to the hierarchy.
Features of Tree Topology
1. Heavily cabled.
2. Costly.
HYBRID Topology
1.
2. Effective.
4. Flexible.
1. Complex in design.
2. Costly.
OSI Model
o OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in
one computer moves through a physical medium to the software application
in another computer.
o OSI consists of seven layers, and each layer performs a particular network
function.
o OSI model was developed by the International Organization for
Standardization (ISO) in 1984, and it is now considered as an architectural
model for the inter-computer communications.
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related
issues, and they are implemented only in the software. The application layer
is closest to the end user. Both the end user and the application layer interact
with the software applications. An upper layer refers to the layer just above
another layer.
o The lower layer of the OSI model deals with the data transport issues. The
data link layer and the physical layer are implemented in hardware and
software. The physical layer is the lowest layer of the OSI model and is
closest to the physical medium. The physical layer is mainly responsible for
placing the information on the physical
medium.
Physical layer:
o The main functionality of the physical layer is to transmit the individual bits
from one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface
specifications.
Data-link layer
Network Layer:
Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the
order in which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data
completely.
o It receives the data from the upper layer and converts them into smaller units
known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-
point connection between source and destination to deliver the data reliably.
Session Layer
o It is a layer 3 in the OSI model.
o The Session layer is used to establish, maintain and synchronizes the
interaction between communicating devices.
Presentation Layer
o A Presentation layer is mainly concerned with the syntax and semantics of
the information exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one
presentation format to another format.
Application Layer
o An application layer serves as a window for users and application processes
to access network service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application
layer functions.
o This layer provides the network services to the end-users.