Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
140 views

Types of Operating System

The document discusses operating systems and their functions. It defines an operating system as software that controls hardware and allows interaction between users and applications. It then describes four main types of operating systems: real-time, single-user/single-tasking, single-user/multi-tasking, and multi-user/multi-tasking. The document also discusses operating system functions like memory management, file management, and user interfaces including graphical and command line.

Uploaded by

Joshua Fleming
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
140 views

Types of Operating System

The document discusses operating systems and their functions. It defines an operating system as software that controls hardware and allows interaction between users and applications. It then describes four main types of operating systems: real-time, single-user/single-tasking, single-user/multi-tasking, and multi-user/multi-tasking. The document also discusses operating system functions like memory management, file management, and user interfaces including graphical and command line.

Uploaded by

Joshua Fleming
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 12

Operating System:-

Operating System : -An operating system is a collection of software programs that controls the
system hardware and interact with the user and application software. The OS provides user the tools
which enables him to interact with computer. The operating system performs the following functions.
1. Displays the on screen elements with which user can interact
2. Loads programs into the computers memory for the user to use it
3. Coordinates how programs work with computers hardware and other software
4. Manages how information is stored and retrieved from disk

Types Of Operating System:

Operating systems are of four types. They are


1. Real time operating system
2. Single user/ Single tasking operating system
3. Single user/ Multi tasking operating system
4. Multi user/ Multi tasking operating system
Real Time Operating System
A real time operating system is a very fast, relatively small OS. They are built into the circuitry
of a device. A real time operating system is needed to run real time applications. It may run multitasks
or single task at a time. A real time application is an application that responds to certain inputs very
quickly. Real time systems are needed to run medical diagnostics equipment, machinery, scientific
instruments e.t.c

Single User / Single Tasking


An operating system which allows a single user to perform just one task at a time is called a single
user / single tasking operating system. Here task may be work like printing a document, creating a file,
writing a file e.tc. MS-Dos is one example of a single user single tasking OS. Palm OS is also one
example. Operating systems limited by this characteristic take up very little space in memory. So this
type of OS can run on a small computer with fewer configurations.

Single User / Multi Tasking


A single user multi tasking operating system is one that allows a single user to perform two or more
functions at once. The most commonly used OS’s are MS-Windows, Macintosh Operating system.
The multi tasking features of these OS’s have greatly increased the productivity of people in a large
variety of jobs. For example an office worker it is important to be able to send a large documents to a
printer and he must be able to do his work while printing. A disadvantage of a single user multi
tasking operating system is its increased size and complexity.

Multi User / Multi Tasking Operating System


A Multi user multi tasking operating system is an operating system which allows multiple users to use
programs that are simultaneously running on a single network server called a terminal server. When a
client computers are connected to the terminal server. A multi user OS gives each user a complete
environment called user session on the server. Hence each user run their application within their own
session on the server which is separate from all other user sessions. Examples of multi user OSs are
UNIX, VMS e.t.c

1
User Interface

The two most common types of user interfaces are graphical interface and command line interface.

Graphical User Interface


Mostly used G.U.I operating systems are Windows, Macintosh OS, OS/2, some versions of UNIX and
LINUX. Graphical user interfaces are so called because we use a mouse to work with graphical objects
such as windows, menus, icons, buttons e.t.c. one of the key advantages in

G.U.I OS is it’s free to memorize the


commands and type them. Windows is
one of the G.U.I OS. The opening screen of
a windows OS is called desk top. The
desk top consists of icons and folders on it
and a task bar at its bottom. Icon is a
graphical representation or shortcut of
a program or a file to open. A folder is a
place where we can store our files and sub
folders. The task bar is present at the
bottom of the desk top. The task bar
contains three panels. A start button, a
task bar and a data and time panel. The
start button contains shortcuts for lunching
programs and opening folders.
Different applications opened can be
minimized and kept on the task bar.
The present working application is called
active application and remaining are
present on the task bar. The user can
select any require application by clicking on it. The process of moving from one open window to
another is called switching. A running program may take up the whole screen it may appear in a
rectangular frame called a window. We can also open programs by clicking the icons in quick launch
bar. The common GUI features of windows are the title bar, menu bar, tool bar, scroll bar and
various buttons. The title bar contains the title of the document and it also contains three buttons
minimize, restore, close. The menu bar contains a list of menu and menu options in it. Tool bar
contains the graphical form of menu items. Dialog boxes are the special purpose windows that appear
when the OS or application needs to give some status and possible choices of actions are need to tell a
program what to do next. A dialog box is so named because it conducts a “dialog” with user to take the
information needed to perform a task.

Command Line Interface: -


These types of OS are MS-DOS and some versions of UNIX and LINUX. Here user had to type
commands to execute tasks. Users interact with this type of operating system by typing a string of
characters at a command prompt. In Dos the prompt usually includes the identification of the current
active disk drive followed by a colon, a black slash, and a greater than symbol. For example c:\>. .
Windows OS has an optional command line interface called command prompt to run non window

based applications in it.

2
Functions of an Operating System: -
The operating system is the core software component of your computer. It performs many
functions. , a computer is described as consisting of several component parts including your monitor,
keyboard, mouse, and other parts. The operating system provides an interface to these parts using
what is referred to as "drivers". an Operating System manages every activity of computer. It
manages UI[User Interface], memory, security etc.

Main-Memory Management
Primary-Memory or Main memory is a large array of words or bytes. Each word or byte has its own
address. Main-memory provides storage that can be access directly by the CPU. A program to be
executed must be in main memory. The memory manager in an OS coordinates the memories by
tracking which one is available, which is to be allocated or deallocated and how to swap between the
main memory and secondary memories. This activity, which is usually referred to as virtual memory
management. Another important part of memory management is managing virtual addresses. If
multiple processes are in memory at once, they must be prevented from interfering with each other's
memory. This is achieved by having separate address spaces. Operating system maintains tables, so-
called page tables that match virtual addresses to physical addresses. The operating system can also
write inactive memory pages to secondary storage. This process is called "paging". The operating
system tracks all memory used by each process so that when a process terminates, all memory used by
that process can be made available for other processes.
The activities of operating system in regard to memory management are:
1. keeps track of which part of memory are currently being used
2. Decides which process are loaded into memory when memory becomes available
3. Allocates and deallocates memory space needed.

File Management: -
A file is a collection of related information. We can store files in the disk (secondary storage) of a
computer for permanently storing the data. A file system normally uses directories. A directory may
contain files and other directories. Operating systems have a variety of native file systems. Linux has
a greater range of native file systems. Windows, on the other hand, has: FAT12, FAT16, FAT32, and
NTFS. The NTFS file system is the most efficient and reliable of the four Windows systems. All the
FAT systems are older than NTFS and have limitations on the partition and file size that can cause a
variety of problems.

The activities of operating system in regard to File management are:


1. The creation and deletion of files
2. The creation and deletion of directories
3. The support for manipulating files and directories
4.

I/ O Management: -
I/O subsystem hides the details of specific hardware devices from the user. Only the device driver
knows the details of the specific devices to which it is assigned. The operating system takes care of
utilizing the I/O devices. A device driver is a specific type of computer software developed to allow
interaction with hardware devices. Typically this constitutes an interface for communicating with
the device, through the specific computer bus or communications subsystem that the hardware is
connected to, providing commands to and/or receiving data from the device

Secondary-Storage Management: -

3
Secondary storage and cache storage are used to accommodate all data and programs. The secondary
storage in the computer also acts as the back up memory. The secondary storage is ordinarily divided
into bytes. Each location in storage has an address .the set of all address available to a program is
called an address space.
The activities of operating system in regard to Secondary storage management are
1. Managing the free space available on the secondary storage device
2. Allocation of Storage space when new files have to be written
3. Scheduling the requests for memory access.

Networking: -
A distributed system is a collection of processors that do not share memory, peripheral devices or a
clock. The processors communicate with one another through communication lines called network.
The communication network design must consider routing and connection strategies and the problems
of contention and security. Most current operating systems are capable of using the TCP/IP
networking protocols. This means that one system can appear on a network of the other and share
resources such as files, printers, and scanners using either wired or wireless connections.

Process Management: -
Every program running on a computer, be it background services or applications, is a process. Modern
operating systems[Windows, Linux etc] enable concurrent execution of many processes at once via
multitasking even with one CPU. Process Management is an operating system's way of dealing with
running multiple processes. Since most computers contain one processor with one core, multitasking is
done by simply switching processes quickly. Process management involves computing and
distributing CPU time as well as other resources. Most operating systems allow a process to be
assigned a priority which affects its allocation of CPU time.

Protection System: -
If a computer system has multiple users and allows the concurrent execution of multiple processors
then the various processes must be protected from one another activities. Protection refers to
mechanism for controlling the access of programs, processes, or users to the resources defined by a
computer systems.
• The operating system provides access to a number of resources, directly or indirectly, such as files
on a local disk, privileged system calls, personal information about users, and the services offered
by the programs running on the system;
• The operating system is capable of distinguishing between some requesters of these resources who
are authorized (allowed) to access the resource, and others who are not authorized

Command interpreter System: -


A command interpreter is an interface of the operating system with the user. The user gives commands
which are executed by operating system. The main function of a command interpreter is to get and
execute the next user specified command. Today, most modern operating systems contain Graphical
User Interfaces. More modern operating systems are modular, separating the graphics subsystem
from the kernel (as is now done in Linux, and Mac OS X, and to a limited extent Windows).

GUIs tend to change with time. For example, Windows has modified its GUI every time a new major
version of Windows is released and the Mac OS GUI changed dramatically with the introduction of
Mac OS X.

4
Enhancing an OS with Utility Software:

Software developers are constantly creating new programs called utilities programs. For enhancing or
extend the capabilities of OS there are thousands of different utility programs. The most common type
of different utility programs are

Anti Virus
A virus is a program that can delete or disturb the file or replicate it self in disk. Computer viruses can
be transmitted in number of ways. while transforming data in network or downloading any files in
internet etc. An antivirus is utility software which examines the contents in a disk or RAM for hidden
viruses and files that may act as hosts for virus code. Anti virus not only detect the virus but also
removes it.

Backup Utilities:
A backup utility can help to copy large groups of files from hard disk to any medium. Many operating
systems have built in backup utilities. We can also load some rich backup utility software. These
utility not only transfers files to a backup medium but also helps to organize the files, update backups,
restore backups to disk in case of data loss.

Screen Saver: -
Screen savers are popular utilities used to hide the desk top when we are not using the computer. A
screen saver automatically appears when a keyboard or pointing device has not been used for a
specified period of time. Windows screen saver comes with the windows operating system; we can
also use our own pictures and graphic files.

Firewall: -
Firewalls are the special computers used for examining and blocking traffic coming from and going to
the internet. These are used by ISP and most corporations employs. These also require highly trained
people to manage them. WindowsXp comes with a simple firewall,

Networking

Network Topologies

Network Topologies :- Network topologies are the logical layout of the cables and devices that
connect the nodes of the network. Network designers considered several factors when deciding which
topologies or combination of topologies to use while set up a network. Different types of network
topologies they are.
(1) Bus topology
(2) Star topology
(3) Ring topology
(4) Mesh topology

Bus Topology:- A bus topology network uses one cable to connect all the nodes. Peripheral
devices are connected in a series to that cable. A special device is used at starting and ending points of
network to stop network signals. The main disadvantages in these topologies are that it uses the least
amount of the cabling, a broken connection will bring down all remaining part of the network.

5
STAR TOPOLOGY:- The star topology is the most commonly used topology. In a star network
all nodes are connected to the hub and communicate through data packets. The data packets travel
through the hub and are sent to the attached Nodes. In star topology a broken connection between a
node and the hub does not affect the rest of the network. If the hub is lost all the nodes connected to
the hub are unable to communicate.

RING TOPOLOGY:- The ring topology connects the network nodes is circle chain with each
node connected to the next the last node connect to the first completing the ring. In this topology only
one packet of data will travel through the ring at a time. If the ring is a broken the entire network is
unable to communicate.

MESH TOPOLOGY:- The mesh topology is the least used network topology and the most
expensive to implement. In a mesh environment a cable runs from every computer to every other
computer. if you have four computers we must use six cables. In this network data can never fail to
deliver. If one connection goes down there are other way to send the data to its destination.

NETWORK MEDIA

NETWORK MEDIA:- In computers, network media means the devices used to link network’s
nodes together. They are two types of network media.
Wire Based Media and Wireless Media.
There are many different types of transmission media in which the most popular are twisted pair wires
(Normal electrical wines), coaxial cables, fiber optic cables. In wireless network the atmosphere itself
acts as the media because it carries the wireless signal to communicate.

WIRE-BASED MEDIA:-The different types of wire based media are


1. Twisted-pair cable
2. Coaxial cable.
3. Fiber optic cable.

Twisted Pair Cable:- Twisted pair cable normally consists four pairs of wires. The individual
pairs have two pairs that are separately insulated in plastic. Our telephone system normally uses
this type of wires. The twisted pairs in which expect plastic nothing shields is called UTP
(unshielded twisted pair). Some twisted pair wires are enclosed in a metal sheet and therefore they
are called shielded twisted pair (STP). Networks based on present twisted pair wires can transmit
data at a speed of 1GBPS.

Coaxial Cable:- The coaxial cable as two conductors one is a single wire is the center of the cable
and other is a wire shield around the first wire with an insulator, between them. Coaxial cables can
carry more data than an old twisted pair cable. The transmission speed of coaxial cable is up to
10Mbps. It is more expensive than twisted pair. Due to the improvement of twisted pair technology
coaxial cable became less popular

Fiber Optic Cable:-A fiber optic cable is a thin standard glass that transmits beams of light rather
then electric current. Fiber optic cable can carry data at more then billion bits per second (bbps).
Present fiber optic cable data transmission rate is more than 100 Gbps. With the high speed it is
also a secured transmission medium. With the introduction of fiber optic cable Broad band services
are increased in networks.

Wireless Media:- Wireless network uses radio or infrared signals that travel through air for
transmitting data. Office LANs can use radio signals to transmit data between nodes in a building.
6
WANs often use microwave transmission to connect LANs with in the metropolitan area. WANs
that cover long distance use satellites and micro wave communication.

Types of networks
A Network is a set of topologies which includes hardware, software and media that can be used to
communicate, exchange information fast and share resources. During the last decade networking has
became the most important for every industry. Networking can be done in many ways. The different
devices in a department or a building or multiple building or a wide area such as a city or a country.
The common types of networks are LAN, WAN
1.) LAN (Local Area Network):- A local area network is a data communication system consisting of
several devices such as computers and printers. This type of network contains computers relatively
near and generally connected using wires or wireless media. Any network that exists within a single
building or even a group of adjacent building is considered as LAN. Different LANs in a large
company can be linked to communicate with in them.

2) WAN (Wide Area Network): - A wide area network is two or more LANs connected together
across a wide geographical area. For example a company may have its head quarter and
manufacturing’s plant in one city and its marketing office in another city. In order to function properly
this company has to share data between the departments. To accomplish this

communication the company can attach its devices to a WAN. Example of WAN is internet. It is the
single largest network present today.

Hybrid Networks

The hybrid networks are found between the LAN and WAN structures. The different hybrid networks
are 1. Campus area network (CAN)
2. Metropolitan area network (MAN)
3. Home area network (HAN)
!. Campus Area Network (CAN):-
A campus area network (CAN) follows the same principal as a local area network. With a CAN
different campus offices and organization can be linked together. For example in a university an exam
section office, fee section office etc. can be connected to the registrar’s office. So, all information in a
university will be transmitted to the register office system.
2. Metropolitan Area Network (MAN): -
The metropolitan area network (MAN) is a large scale network that contains multiple corporate LANs
together. MANs usually not organized by a single organization. They are maintained by a group or
single network provider. They sell its networking services to corporate customers. MANs take the role
of a high speed network for sharing of regional resources.
3. Home Area Network (HAN): -
A Home Area Network (HAN) is network contained within a user’s home that connects a person
digital devices like multiple computers, printers, telephones, VCRs, DVDs, televisions, home security
systems, etc.

Intranet
An intranet is a corporate network that uses the same protocols as the internet, but it belongs
particularly to a corporation, school or some other organization. The intranet is accessible only to the
organization workers. If the intranet is connected to the internet then it is secured by a special device
called a firewall. The firewall prevents unauthorized external users from gaining access to it

7
Extranet
An extranet is an intranet that can be accessed by authorized outside users over the internet. To get
entrance to the extranet resources an external user must log on to the network by providing a username
and a password.

Intranet and Extranets are popular because


1. They use the same protocol as the internet, they are simple and less expensive to install than
many other kinds of networks
2. They enable users to work in standard web browsers, they provide a consistent, friendly
interfaces
3. They function with standard security technologies they provide excellent security against
unauthorized access

How Networks are Structured

Networks can be categorized by the roles the servers and PCs play in terms of hierarchical and security
interaction.
Servers-Based Networks: -
In server based network node is a processing location that can be a PC or some other device such as a
networked printer. Usually server based networks include many nodes and one or more servers. These
servers control user access to the network’s resources.
A file server network is an example of nodes and server network. One way to identify a server based
network is the point at which network such as files are made available to the user. In this environment
user gain access to files, printers, and other network-based objects by obtaining rights and permissions
from the centrally controlled server or group of servers.

Client Server Network: -


One popular type of server-based network is the client/server network. In this network individual
computers share the processing and storage workload with a central server. Client/server software can
be used on LANs or WANs. The most common example of client/server computing involves a
database which can be accessed by many different computers on the network. The database is stored
on the network server and a DBMS (data base management system). The user’s computer stores and
runs the client portion of the DBMS to find the information in the database.

Peer to Peer Services


Peer to Peer (P2P) services are distributed networks that do not require a central server to manage
files. Instead of using special software this type of services directly allows an individual computer to
communicate with another individual computer. He can access file or information on that computer.
Instant messaging, file sharing service are examples of P2P service. Peer to peer services are popular
because they allow people to share files of all types directly.
In a peer to peer network all nodes on the network have equal relationships to all other. All other have
similar types of software that support the sharing of resources. Many client operating systems such as
Windows9x, Windows 2000 professional, Windows Me, Windows XP, and Macintosh OS have built-
in support for peer to peer networking.

The uses of a network

A network is a set of technologies including hardware, software, and media which can be used to
connect computers together enabling them to communicate, exchange information, and share resources

8
in real time. Networks allow many users to access shared data and programs almost instantly. Network
reduces the need for programs on their own computers.

1. Simultaneous Access: -
In business some times several workers may need to use the same data at the same time. Without a
network, workers must keep separate copies of data stored on different disks. When the data is
modified on one computer, data on the other computer becomes outdated. It becomes difficult to
determine which copy of the data is the most current.
Companies can solve this problem by storing commonly used data at a central location usually on a
network server. A network server is a central computer with a large storage device and other resources
that all users can share. If one user makes a change to the file other users will see the change when
they use the file.

2. Shared peripheral devices


The ability to share peripheral devices is one of the best reasons for small business to set up a network.
Instead of buying multiple peripheral devices by using networking several people can share a device in
a network becoming less expensive and easier to manage.
There are two ways to share a device. One way is to connect directly to the network and other way is
to connect to a server (computer).

3. 4.Personal communications:-
One of the most important applications of data communications is electronic mail (e-mail). E-mail is a
system for exchanging written messages through a network. Many companies connect their private
networks to the internet so workers can send messages to and receive messages across the internet
from the people outside the company’s network. in addition to e-mail, teleconferencing is becoming
popular technology in networks. A teleconference is a kind of multi way communication carried out in
real time using telecommunications or computer networks and equipment. Subcategories of
teleconferencing are

Videoconferencing: -
Videoconferencing makes real time communication over a distance by allowing people at two or more
sites to communicate with each other by seeing video pictures of the people at the other sites. Each site
has one or more cameras, microphones, loudspeakers, and monitors. It creates a sense of a person at a
distant site appearing to be there in the same room.

Audio conferencing: -
Audio conferencing enables communication between groups of participants. Audio-conferencing
provides an audio link similar to that of a usual telephone, except that it offers much higher quality
audio and enables more than two sites to be linked together. Using hands-free audio units with
sensitive microphones.

Data-conferencing: -
Data-conferencing enables participants at two or more sites to have a shared workspace on their
computer desktops. In data conferencing different computers share a ‘white board’ to draw, write,
import, manipulate etc. in real time. Or a piece of software can be run and controlled by all the users.
Data conferencing is used when users at different sites want to work together on same documents.

Another developing area of integrated communication is Voice over internet protocol (VoIP).
VoIP systems bypass the need for cost of regular telephone service by using the company’s internal
network to send and receive phone calls. VoIP transmits the sound of user voice over a computer
network using the internet protocol (IP).
9
4. Easier Data Backup: -
In business data is extremely valuable, so it is important to employees to back up their data. Often the
network manager makes regular backups of the data on the storage device. Managers also can use
special software to back up files stored on employee’s hard drives from central location.

Network Hardware

As data moves between PCs, it should be guided properly to reach its destination.

Network Interface Cards (NICs): -


Each computer on the network needs a hardware component to control the flow of data. The device
that performs this function is the network interface card (NIC). It is also known as network adapter
card or network card. It is a circuit board fitted into the computers expansion slots. The network cable
is attached to this port. In case of a wireless NIC there will be no port, an antenna will be showing or a
light will indicate that an internal antenna is activated.

Network Linking Devices:-


To create a network some type of linking mechanism is needed to interconnect at least two computers.
These linking devices are connected together using category 5 cables. The various linking devices
available are: -
1. Hubs: - A hub is a connection point for different types of devices on a network. It transmits the
packets to all the nodes attached to its ports. Due to the significant reduction in the cost of switches
this technology is slowly becoming outdated

2. Switches: - A switch is device used to connect different devices in a network using IP address. This
a very popular device used to connect a LAN. A switch significantly reduces the amount of broadcast
traffic and is currently the most popular network linking device. Modern switches can even function as
routers allowing multiple LANs to be interconnected by linking each LANs switches together. This is
called an uplink.

3. Bridges: - A bridge is a device that connects two LANs or two segments of the same LAN. A
bridge looks at the information in each packet header and forward data, which is traveling from one
LAN to another. Bridges are becoming outdated because they are using older method for determining
which nodes are sending and receiving data.

4. Routers: - A router is a complex device that stores the routing information for networks. A router
looks at each packet’s header to determine where the packet should go and then determines the best
route for the packet to take towards its destination. A packet must be addressed to a specifically
identified destination to pass through the router. A router is connected to at least two networks,
commonly two LANs or WANs (or) LANs and its ISP’s network.

Gateway: -
A gateway is node on a network that servers as an entrance to another network. a gateway acts as a
junction between different networks. Usually a gateway is a computer placed at the starting of a
network to route the data came from a local PC to an outside network, such as internet. Packets from
different types of networks have different kinds of information in their headers and the information
can be in various formats. The gateway will take a packet from one type of network and read its
header and then add a second header that is understood by the second network.

10
Cabling Equipment:-
In network communications the quality of media refers to the distance and speed data can travel. For
example a category 5 cable, a popular type of twisted pair wiring which contains four twisted pairs can
carry data 100 meters without decrease in speed. Sometimes network media are compared by the
amount of data they can carry. Commonly referred as ‘Bandwidth’. The higher bandwidth the more
data it can transmit at any given time. Bandwidth is expressed in cycles per second (Hertz) or in bits
per second. Even thou the data are transmitted by cable very fast the equipment used at the end of the
cable is important to transmit or receive data from the computer. The most common types of network
technologies are.
1. Ethernet: - This is the most common network technology in use. The original implementation
of Ethernet used coaxial cable and was called 10Base-5 and 10Base-2. The most popular
implementation of Ethernet called 10Base-T uses a star topology and twisted-pair wires and
can achieve transmission speeds up to 10Mbps. With Ethernet if two nodes transmit data at the
same instant, the collision is detected and the nodes retransmit one at a time.
2. Fast Ethernet: - Fast Ethernet (also called 100Base-T) is available using the same media and
topology as Ethernet, but NICs are used to achieve speeds up to 100 Mbps.
3. Gigabit Ethernet:- Gigabit Ethernet is a version of Ethernet technology that support data
transfer rates of one gigabit per second. It is capable of transferring 10Gbps. Also called
1000Base-T or 1Gbps. Gigabit Ethernet can carry approximately 900 video signals at once at
about 1.5 Mbps of digital video.
4. Token Ring: - The controlling hardware in a Token Ring network transmits an electronic
token. A token is a small set of data. A computer can copy data into the token and set the
address where the data should be sent. The token then continues around the ring and each
computer along the way looks at the address until the token reaches the computer with the
address that was recorded in the token. The receiving computer then copies the contents of the
token and sends an acknowledgement to the sending computer. When the sending computer
receives from the receiving computer it resets the token status to “empty” and transmits it to
next computer in the ring.

Protocol: - A Protocol is a mediator between two computers for transferring data between them.
There are many standard protocols. Each has particular advantages and disadvantages. To effectively
communicate a user must have the same protocol installed on the local PC and the remote PC to make
a connection.

Impact of computers on society.

Computers are commonly used items in many areas. Almost anything you know is run or made by
computers. Cars and jets were designed on computers, traffic signals are run by computers, most
medical equipment use computers and space exploration was started with computers. Most of the jobs
today require the use of computers. These 'mechanical brains' made a huge impact on our society.
Computers changed the world a lot. It helped man step forward into the future. computers, space
exploraation came true, new designs of vehicles and other trasportaion were made, entertainment
became more entertaining, medical science made more cures for diseases, etc. . . The computers
impacted our lives in many ways.

Business : One area the computer impacted on is the business area. Business uses computers for
keeping track of accounts, money, or items that they need. You may notice business people using
computers a lot, especially the laptop computers, portable computers that can be taken to your work
area. You may see people use things like pie-charts and graphs when they present information to other

11
business people in meetings. Most of those charts were made by computers. The business field uses
the computers a lot for their companies and organizations.

Entertainment: Another area computers impacted on is the entertainment area. Most of the people
out there like science fiction or action movies, especially the ones with the neat looking effects. Well,
those graphics were mostly made by computers. Most of the movies today use computer graphics to
make things more realistic but not real. Computer graphics are mostly used on spaceships, aliens,
monsters, and special effects. To the left is a picture from the movie "Godzilla." Godzilla was created
by computer animation,

Games: Games now a days use computer graphics and animations to make the coolest games. Of
course all of you heard of the game Final Fantasy VII. It was the first Final Fantasy game to have a 3D
environment and neat computer animation. It was a big money-making seller.

Education: Education was impacted by computers as well. Computers help out students in a lot of
today's projects and essays. If a student were to do an essay on the planet Saturn, they could look in an
electronic encyclopedia in the computer or they could look up their topic on the internet. They could
also type their essays and reports on what's called a word-processing program. This program allows
you to type anything out from a school essay to business papers. You can make your paper look very
neat by adding images and neat looking text to impress your teacher. Now and days, typing out essays
and reports are mandatory, especially in High School. Computers help students in any way they need,
researching, typing, searching, etc. . . Teachers use computers as well. They use computers to keep
track of grades, type out instruction for their students, and to let students use the computer for school
purposes.

Medical field: An important field computers impacted on is the medical field. The computers helped
the hospitals out very much. In pharmacies, the pharmacists use computers to keep a record of what
medication to give to a patient and the amount they need. Most computers in the hospital are used to
keep data of patience and their status. Computers also keep track of equipment placement and status as
well. Scientists need the help of computers to find cures for diseases that need cures like cancer and
STDs. Without the computers help, cures for a lot of diseases woudn't have been found. Computer
helped the medical area a lot and we are greatful for that since they keep track of our health. Other
areas the computer impacted on is space exploration and designs of transportation.

Banking: In the 21st century, more and more people are using the computer and banking system to
manage their personal and business finances. With the computer and banking, it is simple to keep track
of various types of financial accounts. Indeed, all you need to do is log onto the computer and quickly
access the program for computer and banking.

The Internet has also increased the scope of computer and banking services that are now available on
both the personal and business level when it comes to finances. A person using internet now can
readily pay bills and undertake other financial. Introduction of ATM in banks had changed the banking
times.

12

You might also like