Types of Operating System
Types of Operating System
Operating System : -An operating system is a collection of software programs that controls the
system hardware and interact with the user and application software. The OS provides user the tools
which enables him to interact with computer. The operating system performs the following functions.
1. Displays the on screen elements with which user can interact
2. Loads programs into the computers memory for the user to use it
3. Coordinates how programs work with computers hardware and other software
4. Manages how information is stored and retrieved from disk
1
User Interface
The two most common types of user interfaces are graphical interface and command line interface.
2
Functions of an Operating System: -
The operating system is the core software component of your computer. It performs many
functions. , a computer is described as consisting of several component parts including your monitor,
keyboard, mouse, and other parts. The operating system provides an interface to these parts using
what is referred to as "drivers". an Operating System manages every activity of computer. It
manages UI[User Interface], memory, security etc.
Main-Memory Management
Primary-Memory or Main memory is a large array of words or bytes. Each word or byte has its own
address. Main-memory provides storage that can be access directly by the CPU. A program to be
executed must be in main memory. The memory manager in an OS coordinates the memories by
tracking which one is available, which is to be allocated or deallocated and how to swap between the
main memory and secondary memories. This activity, which is usually referred to as virtual memory
management. Another important part of memory management is managing virtual addresses. If
multiple processes are in memory at once, they must be prevented from interfering with each other's
memory. This is achieved by having separate address spaces. Operating system maintains tables, so-
called page tables that match virtual addresses to physical addresses. The operating system can also
write inactive memory pages to secondary storage. This process is called "paging". The operating
system tracks all memory used by each process so that when a process terminates, all memory used by
that process can be made available for other processes.
The activities of operating system in regard to memory management are:
1. keeps track of which part of memory are currently being used
2. Decides which process are loaded into memory when memory becomes available
3. Allocates and deallocates memory space needed.
File Management: -
A file is a collection of related information. We can store files in the disk (secondary storage) of a
computer for permanently storing the data. A file system normally uses directories. A directory may
contain files and other directories. Operating systems have a variety of native file systems. Linux has
a greater range of native file systems. Windows, on the other hand, has: FAT12, FAT16, FAT32, and
NTFS. The NTFS file system is the most efficient and reliable of the four Windows systems. All the
FAT systems are older than NTFS and have limitations on the partition and file size that can cause a
variety of problems.
I/ O Management: -
I/O subsystem hides the details of specific hardware devices from the user. Only the device driver
knows the details of the specific devices to which it is assigned. The operating system takes care of
utilizing the I/O devices. A device driver is a specific type of computer software developed to allow
interaction with hardware devices. Typically this constitutes an interface for communicating with
the device, through the specific computer bus or communications subsystem that the hardware is
connected to, providing commands to and/or receiving data from the device
Secondary-Storage Management: -
3
Secondary storage and cache storage are used to accommodate all data and programs. The secondary
storage in the computer also acts as the back up memory. The secondary storage is ordinarily divided
into bytes. Each location in storage has an address .the set of all address available to a program is
called an address space.
The activities of operating system in regard to Secondary storage management are
1. Managing the free space available on the secondary storage device
2. Allocation of Storage space when new files have to be written
3. Scheduling the requests for memory access.
Networking: -
A distributed system is a collection of processors that do not share memory, peripheral devices or a
clock. The processors communicate with one another through communication lines called network.
The communication network design must consider routing and connection strategies and the problems
of contention and security. Most current operating systems are capable of using the TCP/IP
networking protocols. This means that one system can appear on a network of the other and share
resources such as files, printers, and scanners using either wired or wireless connections.
Process Management: -
Every program running on a computer, be it background services or applications, is a process. Modern
operating systems[Windows, Linux etc] enable concurrent execution of many processes at once via
multitasking even with one CPU. Process Management is an operating system's way of dealing with
running multiple processes. Since most computers contain one processor with one core, multitasking is
done by simply switching processes quickly. Process management involves computing and
distributing CPU time as well as other resources. Most operating systems allow a process to be
assigned a priority which affects its allocation of CPU time.
Protection System: -
If a computer system has multiple users and allows the concurrent execution of multiple processors
then the various processes must be protected from one another activities. Protection refers to
mechanism for controlling the access of programs, processes, or users to the resources defined by a
computer systems.
• The operating system provides access to a number of resources, directly or indirectly, such as files
on a local disk, privileged system calls, personal information about users, and the services offered
by the programs running on the system;
• The operating system is capable of distinguishing between some requesters of these resources who
are authorized (allowed) to access the resource, and others who are not authorized
GUIs tend to change with time. For example, Windows has modified its GUI every time a new major
version of Windows is released and the Mac OS GUI changed dramatically with the introduction of
Mac OS X.
4
Enhancing an OS with Utility Software:
Software developers are constantly creating new programs called utilities programs. For enhancing or
extend the capabilities of OS there are thousands of different utility programs. The most common type
of different utility programs are
Anti Virus
A virus is a program that can delete or disturb the file or replicate it self in disk. Computer viruses can
be transmitted in number of ways. while transforming data in network or downloading any files in
internet etc. An antivirus is utility software which examines the contents in a disk or RAM for hidden
viruses and files that may act as hosts for virus code. Anti virus not only detect the virus but also
removes it.
Backup Utilities:
A backup utility can help to copy large groups of files from hard disk to any medium. Many operating
systems have built in backup utilities. We can also load some rich backup utility software. These
utility not only transfers files to a backup medium but also helps to organize the files, update backups,
restore backups to disk in case of data loss.
Screen Saver: -
Screen savers are popular utilities used to hide the desk top when we are not using the computer. A
screen saver automatically appears when a keyboard or pointing device has not been used for a
specified period of time. Windows screen saver comes with the windows operating system; we can
also use our own pictures and graphic files.
Firewall: -
Firewalls are the special computers used for examining and blocking traffic coming from and going to
the internet. These are used by ISP and most corporations employs. These also require highly trained
people to manage them. WindowsXp comes with a simple firewall,
Networking
Network Topologies
Network Topologies :- Network topologies are the logical layout of the cables and devices that
connect the nodes of the network. Network designers considered several factors when deciding which
topologies or combination of topologies to use while set up a network. Different types of network
topologies they are.
(1) Bus topology
(2) Star topology
(3) Ring topology
(4) Mesh topology
Bus Topology:- A bus topology network uses one cable to connect all the nodes. Peripheral
devices are connected in a series to that cable. A special device is used at starting and ending points of
network to stop network signals. The main disadvantages in these topologies are that it uses the least
amount of the cabling, a broken connection will bring down all remaining part of the network.
5
STAR TOPOLOGY:- The star topology is the most commonly used topology. In a star network
all nodes are connected to the hub and communicate through data packets. The data packets travel
through the hub and are sent to the attached Nodes. In star topology a broken connection between a
node and the hub does not affect the rest of the network. If the hub is lost all the nodes connected to
the hub are unable to communicate.
RING TOPOLOGY:- The ring topology connects the network nodes is circle chain with each
node connected to the next the last node connect to the first completing the ring. In this topology only
one packet of data will travel through the ring at a time. If the ring is a broken the entire network is
unable to communicate.
MESH TOPOLOGY:- The mesh topology is the least used network topology and the most
expensive to implement. In a mesh environment a cable runs from every computer to every other
computer. if you have four computers we must use six cables. In this network data can never fail to
deliver. If one connection goes down there are other way to send the data to its destination.
NETWORK MEDIA
NETWORK MEDIA:- In computers, network media means the devices used to link network’s
nodes together. They are two types of network media.
Wire Based Media and Wireless Media.
There are many different types of transmission media in which the most popular are twisted pair wires
(Normal electrical wines), coaxial cables, fiber optic cables. In wireless network the atmosphere itself
acts as the media because it carries the wireless signal to communicate.
Twisted Pair Cable:- Twisted pair cable normally consists four pairs of wires. The individual
pairs have two pairs that are separately insulated in plastic. Our telephone system normally uses
this type of wires. The twisted pairs in which expect plastic nothing shields is called UTP
(unshielded twisted pair). Some twisted pair wires are enclosed in a metal sheet and therefore they
are called shielded twisted pair (STP). Networks based on present twisted pair wires can transmit
data at a speed of 1GBPS.
Coaxial Cable:- The coaxial cable as two conductors one is a single wire is the center of the cable
and other is a wire shield around the first wire with an insulator, between them. Coaxial cables can
carry more data than an old twisted pair cable. The transmission speed of coaxial cable is up to
10Mbps. It is more expensive than twisted pair. Due to the improvement of twisted pair technology
coaxial cable became less popular
Fiber Optic Cable:-A fiber optic cable is a thin standard glass that transmits beams of light rather
then electric current. Fiber optic cable can carry data at more then billion bits per second (bbps).
Present fiber optic cable data transmission rate is more than 100 Gbps. With the high speed it is
also a secured transmission medium. With the introduction of fiber optic cable Broad band services
are increased in networks.
Wireless Media:- Wireless network uses radio or infrared signals that travel through air for
transmitting data. Office LANs can use radio signals to transmit data between nodes in a building.
6
WANs often use microwave transmission to connect LANs with in the metropolitan area. WANs
that cover long distance use satellites and micro wave communication.
Types of networks
A Network is a set of topologies which includes hardware, software and media that can be used to
communicate, exchange information fast and share resources. During the last decade networking has
became the most important for every industry. Networking can be done in many ways. The different
devices in a department or a building or multiple building or a wide area such as a city or a country.
The common types of networks are LAN, WAN
1.) LAN (Local Area Network):- A local area network is a data communication system consisting of
several devices such as computers and printers. This type of network contains computers relatively
near and generally connected using wires or wireless media. Any network that exists within a single
building or even a group of adjacent building is considered as LAN. Different LANs in a large
company can be linked to communicate with in them.
2) WAN (Wide Area Network): - A wide area network is two or more LANs connected together
across a wide geographical area. For example a company may have its head quarter and
manufacturing’s plant in one city and its marketing office in another city. In order to function properly
this company has to share data between the departments. To accomplish this
communication the company can attach its devices to a WAN. Example of WAN is internet. It is the
single largest network present today.
Hybrid Networks
The hybrid networks are found between the LAN and WAN structures. The different hybrid networks
are 1. Campus area network (CAN)
2. Metropolitan area network (MAN)
3. Home area network (HAN)
!. Campus Area Network (CAN):-
A campus area network (CAN) follows the same principal as a local area network. With a CAN
different campus offices and organization can be linked together. For example in a university an exam
section office, fee section office etc. can be connected to the registrar’s office. So, all information in a
university will be transmitted to the register office system.
2. Metropolitan Area Network (MAN): -
The metropolitan area network (MAN) is a large scale network that contains multiple corporate LANs
together. MANs usually not organized by a single organization. They are maintained by a group or
single network provider. They sell its networking services to corporate customers. MANs take the role
of a high speed network for sharing of regional resources.
3. Home Area Network (HAN): -
A Home Area Network (HAN) is network contained within a user’s home that connects a person
digital devices like multiple computers, printers, telephones, VCRs, DVDs, televisions, home security
systems, etc.
Intranet
An intranet is a corporate network that uses the same protocols as the internet, but it belongs
particularly to a corporation, school or some other organization. The intranet is accessible only to the
organization workers. If the intranet is connected to the internet then it is secured by a special device
called a firewall. The firewall prevents unauthorized external users from gaining access to it
7
Extranet
An extranet is an intranet that can be accessed by authorized outside users over the internet. To get
entrance to the extranet resources an external user must log on to the network by providing a username
and a password.
Networks can be categorized by the roles the servers and PCs play in terms of hierarchical and security
interaction.
Servers-Based Networks: -
In server based network node is a processing location that can be a PC or some other device such as a
networked printer. Usually server based networks include many nodes and one or more servers. These
servers control user access to the network’s resources.
A file server network is an example of nodes and server network. One way to identify a server based
network is the point at which network such as files are made available to the user. In this environment
user gain access to files, printers, and other network-based objects by obtaining rights and permissions
from the centrally controlled server or group of servers.
A network is a set of technologies including hardware, software, and media which can be used to
connect computers together enabling them to communicate, exchange information, and share resources
8
in real time. Networks allow many users to access shared data and programs almost instantly. Network
reduces the need for programs on their own computers.
1. Simultaneous Access: -
In business some times several workers may need to use the same data at the same time. Without a
network, workers must keep separate copies of data stored on different disks. When the data is
modified on one computer, data on the other computer becomes outdated. It becomes difficult to
determine which copy of the data is the most current.
Companies can solve this problem by storing commonly used data at a central location usually on a
network server. A network server is a central computer with a large storage device and other resources
that all users can share. If one user makes a change to the file other users will see the change when
they use the file.
3. 4.Personal communications:-
One of the most important applications of data communications is electronic mail (e-mail). E-mail is a
system for exchanging written messages through a network. Many companies connect their private
networks to the internet so workers can send messages to and receive messages across the internet
from the people outside the company’s network. in addition to e-mail, teleconferencing is becoming
popular technology in networks. A teleconference is a kind of multi way communication carried out in
real time using telecommunications or computer networks and equipment. Subcategories of
teleconferencing are
Videoconferencing: -
Videoconferencing makes real time communication over a distance by allowing people at two or more
sites to communicate with each other by seeing video pictures of the people at the other sites. Each site
has one or more cameras, microphones, loudspeakers, and monitors. It creates a sense of a person at a
distant site appearing to be there in the same room.
Audio conferencing: -
Audio conferencing enables communication between groups of participants. Audio-conferencing
provides an audio link similar to that of a usual telephone, except that it offers much higher quality
audio and enables more than two sites to be linked together. Using hands-free audio units with
sensitive microphones.
Data-conferencing: -
Data-conferencing enables participants at two or more sites to have a shared workspace on their
computer desktops. In data conferencing different computers share a ‘white board’ to draw, write,
import, manipulate etc. in real time. Or a piece of software can be run and controlled by all the users.
Data conferencing is used when users at different sites want to work together on same documents.
Another developing area of integrated communication is Voice over internet protocol (VoIP).
VoIP systems bypass the need for cost of regular telephone service by using the company’s internal
network to send and receive phone calls. VoIP transmits the sound of user voice over a computer
network using the internet protocol (IP).
9
4. Easier Data Backup: -
In business data is extremely valuable, so it is important to employees to back up their data. Often the
network manager makes regular backups of the data on the storage device. Managers also can use
special software to back up files stored on employee’s hard drives from central location.
Network Hardware
As data moves between PCs, it should be guided properly to reach its destination.
2. Switches: - A switch is device used to connect different devices in a network using IP address. This
a very popular device used to connect a LAN. A switch significantly reduces the amount of broadcast
traffic and is currently the most popular network linking device. Modern switches can even function as
routers allowing multiple LANs to be interconnected by linking each LANs switches together. This is
called an uplink.
3. Bridges: - A bridge is a device that connects two LANs or two segments of the same LAN. A
bridge looks at the information in each packet header and forward data, which is traveling from one
LAN to another. Bridges are becoming outdated because they are using older method for determining
which nodes are sending and receiving data.
4. Routers: - A router is a complex device that stores the routing information for networks. A router
looks at each packet’s header to determine where the packet should go and then determines the best
route for the packet to take towards its destination. A packet must be addressed to a specifically
identified destination to pass through the router. A router is connected to at least two networks,
commonly two LANs or WANs (or) LANs and its ISP’s network.
Gateway: -
A gateway is node on a network that servers as an entrance to another network. a gateway acts as a
junction between different networks. Usually a gateway is a computer placed at the starting of a
network to route the data came from a local PC to an outside network, such as internet. Packets from
different types of networks have different kinds of information in their headers and the information
can be in various formats. The gateway will take a packet from one type of network and read its
header and then add a second header that is understood by the second network.
10
Cabling Equipment:-
In network communications the quality of media refers to the distance and speed data can travel. For
example a category 5 cable, a popular type of twisted pair wiring which contains four twisted pairs can
carry data 100 meters without decrease in speed. Sometimes network media are compared by the
amount of data they can carry. Commonly referred as ‘Bandwidth’. The higher bandwidth the more
data it can transmit at any given time. Bandwidth is expressed in cycles per second (Hertz) or in bits
per second. Even thou the data are transmitted by cable very fast the equipment used at the end of the
cable is important to transmit or receive data from the computer. The most common types of network
technologies are.
1. Ethernet: - This is the most common network technology in use. The original implementation
of Ethernet used coaxial cable and was called 10Base-5 and 10Base-2. The most popular
implementation of Ethernet called 10Base-T uses a star topology and twisted-pair wires and
can achieve transmission speeds up to 10Mbps. With Ethernet if two nodes transmit data at the
same instant, the collision is detected and the nodes retransmit one at a time.
2. Fast Ethernet: - Fast Ethernet (also called 100Base-T) is available using the same media and
topology as Ethernet, but NICs are used to achieve speeds up to 100 Mbps.
3. Gigabit Ethernet:- Gigabit Ethernet is a version of Ethernet technology that support data
transfer rates of one gigabit per second. It is capable of transferring 10Gbps. Also called
1000Base-T or 1Gbps. Gigabit Ethernet can carry approximately 900 video signals at once at
about 1.5 Mbps of digital video.
4. Token Ring: - The controlling hardware in a Token Ring network transmits an electronic
token. A token is a small set of data. A computer can copy data into the token and set the
address where the data should be sent. The token then continues around the ring and each
computer along the way looks at the address until the token reaches the computer with the
address that was recorded in the token. The receiving computer then copies the contents of the
token and sends an acknowledgement to the sending computer. When the sending computer
receives from the receiving computer it resets the token status to “empty” and transmits it to
next computer in the ring.
Protocol: - A Protocol is a mediator between two computers for transferring data between them.
There are many standard protocols. Each has particular advantages and disadvantages. To effectively
communicate a user must have the same protocol installed on the local PC and the remote PC to make
a connection.
Computers are commonly used items in many areas. Almost anything you know is run or made by
computers. Cars and jets were designed on computers, traffic signals are run by computers, most
medical equipment use computers and space exploration was started with computers. Most of the jobs
today require the use of computers. These 'mechanical brains' made a huge impact on our society.
Computers changed the world a lot. It helped man step forward into the future. computers, space
exploraation came true, new designs of vehicles and other trasportaion were made, entertainment
became more entertaining, medical science made more cures for diseases, etc. . . The computers
impacted our lives in many ways.
Business : One area the computer impacted on is the business area. Business uses computers for
keeping track of accounts, money, or items that they need. You may notice business people using
computers a lot, especially the laptop computers, portable computers that can be taken to your work
area. You may see people use things like pie-charts and graphs when they present information to other
11
business people in meetings. Most of those charts were made by computers. The business field uses
the computers a lot for their companies and organizations.
Entertainment: Another area computers impacted on is the entertainment area. Most of the people
out there like science fiction or action movies, especially the ones with the neat looking effects. Well,
those graphics were mostly made by computers. Most of the movies today use computer graphics to
make things more realistic but not real. Computer graphics are mostly used on spaceships, aliens,
monsters, and special effects. To the left is a picture from the movie "Godzilla." Godzilla was created
by computer animation,
Games: Games now a days use computer graphics and animations to make the coolest games. Of
course all of you heard of the game Final Fantasy VII. It was the first Final Fantasy game to have a 3D
environment and neat computer animation. It was a big money-making seller.
Education: Education was impacted by computers as well. Computers help out students in a lot of
today's projects and essays. If a student were to do an essay on the planet Saturn, they could look in an
electronic encyclopedia in the computer or they could look up their topic on the internet. They could
also type their essays and reports on what's called a word-processing program. This program allows
you to type anything out from a school essay to business papers. You can make your paper look very
neat by adding images and neat looking text to impress your teacher. Now and days, typing out essays
and reports are mandatory, especially in High School. Computers help students in any way they need,
researching, typing, searching, etc. . . Teachers use computers as well. They use computers to keep
track of grades, type out instruction for their students, and to let students use the computer for school
purposes.
Medical field: An important field computers impacted on is the medical field. The computers helped
the hospitals out very much. In pharmacies, the pharmacists use computers to keep a record of what
medication to give to a patient and the amount they need. Most computers in the hospital are used to
keep data of patience and their status. Computers also keep track of equipment placement and status as
well. Scientists need the help of computers to find cures for diseases that need cures like cancer and
STDs. Without the computers help, cures for a lot of diseases woudn't have been found. Computer
helped the medical area a lot and we are greatful for that since they keep track of our health. Other
areas the computer impacted on is space exploration and designs of transportation.
Banking: In the 21st century, more and more people are using the computer and banking system to
manage their personal and business finances. With the computer and banking, it is simple to keep track
of various types of financial accounts. Indeed, all you need to do is log onto the computer and quickly
access the program for computer and banking.
The Internet has also increased the scope of computer and banking services that are now available on
both the personal and business level when it comes to finances. A person using internet now can
readily pay bills and undertake other financial. Introduction of ATM in banks had changed the banking
times.
12