Unit-2 Aktu
Unit-2 Aktu
Unit-2 Aktu
An Operating System (OS) is a software that acts as an interface between computer hardware
components and the user. Every computer system must have at least one operating system to run
other programs. Applications like Browsers, MS Office, Notepad Games, etc., need some
environment to run and perform its tasks.
The OS helps you to communicate with the computer without knowing how to speak the
computer’s language. It is not possible for the user to use any computer or mobile device without
having an operating system.
An operating system is a program on which application programs are executed and acts
as a communication bridge (interface) between the user and the computer hardware.
The main task an operating system carries out is the allocation of resources and services,
such as the allocation of memory, devices, processors, and information. The operating
system also includes programs to manage these resources, such as a traffic controller, a
scheduler, memory management module, I/O programs, and a file system.
History Of OS
Operating systems were first developed in the late 1950s to manage tape
storage
The General Motors Research Lab implemented the first OS in the early
1950s for their IBM 701
In the mid-1960s, operating systems started to use disks
In the late 1960s, the first version of the Unix OS was developed
The first OS built by Microsoft was DOS. It was built in 1981 by purchasing
the 86-DOS software from a Seattle company
The present-day popular OS Windows first came to existence in 1985 when a
GUI was created and paired with MS-DOS.
Following are the Operating System examples with the latest Market Share
3. Job accounting –
Operating system Keeps track of time and resources used by various tasks and users,
this information can be used to track resource usage for a particular user or group of
users.
6. Memory Management –
The operating system manages the Primary Memory or Main Memory. Main
memory is made up of a large array of bytes or words where each byte or word is
assigned a certain address. Main memory is fast storage and it can be accessed
directly by the CPU. For a program to be executed, it should be first loaded in the
main memory. An Operating System performs the following activities for memory
management:
It keeps track of primary memory, i.e., which bytes of memory are used by which
user program. The memory addresses that have already been allocated and the
memory addresses of the memory that has not yet been used. In multiprogramming,
the OS decides the order in which processes are granted access to memory, and for
how long. It Allocates the memory to a process when the process requests it and
deallocates the memory when the process has terminated or is performing an I/O
operation.
7. Processor Management –
In a multi-programming environment, the OS decides the order in which processes
have access to the processor, and how much processing time each process has. This
function of OS is called process scheduling. An Operating System performs the
following activities for processor management.
Keeps track of the status of processes. The program which performs this task is
known as a traffic controller. Allocates the CPU that is a processor to a process. De-
allocates processor when a process is no more required.
8. Device Management –
An OS manages device communication via their respective drivers. It performs the
following activities for device management. Keeps track of all devices connected to
the system. designates a program responsible for every device known as the
Input/Output controller. Decides which process gets access to a certain device and
for how long. Allocates devices in an effective and efficient way. Deallocates devices
when they are no longer required.
9. File Management –
A file system is organized into directories for efficient or easy navigation and usage.
These directories may contain other directories and other files. An Operating
System carries out the following file management activities. It keeps track of where
information is stored, user access settings and status of every file, and more… These
facilities are collectively known as the file system.
INTERFACE:
Communication between a user and a computer is two-way. One of the jobs of the operating
system is to provide a 'user interface', so that a human can communicate with the hardware that
makes up a computer. When you buy a piece of software, it too will have a user interface, so that
you can access and use the software. A user will give data and instructions to a computer and a
computer will give information back to a user. The way that a computer and a user
communicate is known as theinterface .
In computers there are different types of interface that can be used for connection with
computers to users and their connection is responsible for data transfer.
Advantages
1. A GUI is a type of user interface that is much easier to use. Users can classify and navigate
options since data are represented as symbols, forms, and icons. Users only require to click on
them to acquiring to their functions.
2. It's also easy to manage several jobs when you use a GUI. Users may work and view multiple
programs at the same time. For instance, when a movie file is playing in the background, it is
possible to browse the internet using a web browser.
3. The use of shortcut keys is one of the most important features of a graphical user interface.
Shortcut keys are very helpful if you require to perform a job that requires a couple of actions.
4. When it comes to attractiveness, it is much attractive. It is more stylish and elegant in its design in
comparison to CLI. Users would be more engaged with their gadget if it was more attractive.
Furthermore, GUI enables users to monitor their device's health status and other network
interfaces more flexibly than viewing the same in text format.
Disadvantages
1. There are various moving parts in a graphical user interface. As a result, it is much slower than a
CLI.
2. GUI implementation is not an as easy process as it looks while using it. The programmer must be
aware of properly creating functions so that users may use this interface more easily. A single
error on the part of the coder can render all of their efforts in vain.
3. Even though graphical user interfaces are simple to use, they are not the same when they are
created. GUIs have a lot of textual interpretations that take a lot of time and energy to create.
The programmer must create, link, and then assign specific functions to the image, which will
take a long time.
4. The design of the graphical user interface makes development more complex and expensive.
Additionally, a GUI must be linked with additional hardware, which may increase overall costs.
5. It usually uses high power and computer memory than other interfaces due to all graphical
representations. It is not resource-efficient. As a result, it will use a huge amount of computer
resources.
Features CLI GUI
Definition A CLI is an A graphical user interface enables users to interact with the operating system or
interface that application.
allows the user
to perform
tasks by issuing
commands in
successive lines
of text or
command lines.
Memory It needs less It needs more memory because it has various graphics components.
Requirement memory than
the GUI.
Data The In a GUI, information can be viewed or presented to the user in several ways,
Presentation information including simple text, videos, graphics, etc.
can be viewed
to the user in
plain text and
files in the CLI.
Errors Spelling Spelling mistakes and typing errors are avoided.
mistakes and
typing errors
are not
avoided.
A computer network can be categorized by their size. A computer network is mainly of four
types:
Characteristics of LAN
Here are the important characteristics of a LAN network:
Advantages of LAN
Here are the pros/benefits of LAN:
Computer resources like hard-disks, DVD-ROM, and printers can share local
area networks. This significantly reduces the cost of hardware purchases.
You can use the same software over the network instead of purchasing the
licensed software for each client in the network.
Data of all network users can be stored on a single hard disk of the server
computer.
You can easily transfer data and messages over networked computers.
It will be easy to manage data at only one place, which makes data more secure.
Local Area Network offers the facility to share a single internet connection
among all the LAN users.
Disadvantages of LAN
Here are the cons/drawbacks of LAN:
LAN will indeed save cost because of shared computer resources, but the initial
cost of installing Local Area Networks is quite high.
The LAN admin can check personal data files of every LAN user, so it does not
offer good privacy.
Unauthorized users can access critical data of an organization in case LAN
admin is not able to secure centralized data repository.
Local Area Network requires a constant LAN administration as there are issues
related to software setup and hardware failures
Wireless Personal Area Network: Wireless Personal Area Network is developed by simply using
wireless technologies such as WiFi, Bluetooth. It is a low range network.
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
. Characteristics of PAN
Below are the main characteristics of PAN:
Disadvantages of PAN
Here are the cons/drawbacks of using PAN network:
It may establish a bad connection to other networks at the same radio bands.
Distance limits.
Characteristics of MAN
Here are important characteristics of the MAN network:
Advantages of MAN
Here are the pros/benefits of MAN network:
It offers fast communication using high-speed carriers, like fiber optic cables.
It provides excellent support for an extensive size network and greater access to
WANs.
The dual bus in MAN network provides support to transmit data in both
directions concurrently.
A MAN network mostly includes some areas of a city or an entire city.
Disadvantages of MAN
Here are drawbacks/cons of using the MAN network:
You need more cable to establish MAN connection from one place to another.
In MAN network it is tough to make the system secure from hackers
Characteristics of WAN
Below are the characteristics of WAN:
The software files will be shared among all the users; therefore, all can access to
the latest files.
Any organization can form its global integrated network using WAN.
Advantages of WAN
Here are the benefits/pros of WAN:
WAN helps you to cover a larger geographical area. Therefore business offices
situated at longer distances can easily communicate.
Contains devices like mobile phones, laptop, tablet, computers, gaming
consoles, etc.
WLAN connections work using radio transmitters and receivers built into client
devices.
Disadvantages of WAN
Here are the drawbacks/cons of WAN network:
1. LAN is defined as a On the other hand, MAN is On the other hand, WAN is
computer network defined as a computer defined as the
that links the local network that links the telecommunications network
areas like schools, metropolitan areas. that covers a large geographical
universities, area.
organizations, etc.
2. The full form of the The full form of MAN is The full form of WAN is a
LAN is Local Area Metropolitan Area Wide Area Network.
Network. Network.
5. The internet speed of The sped of MAN is The speed of WAN is relatively
LAN is very high, i.e., moderate, i.e., 44-155 less than MAN and LAN, i.e.,
1000 Mbps. Mbps. 150 Mbps.
6. The maintenance The maintenance cost of The maintenance cost of WAN
cost of LAN is easy. MAN is difficult. is difficult.
o University
o Hospital
Data Communication:
Data communication refers to the exchange of data between a source and a receiver via form of
transmission media such as a wire cable. Data communication is said to be local if
communicating devices are in the same building or a similarly restricted geographical area.
The meanings of source and receiver are very simple. The device that transmits the data is
known as source and the device that receives the transmitted data is known as receiver. Data
communication aims at the transfer of data and maintenance of the data during the process but
not the actual generation of the information at the source and receiver.
5. Error control. These rules are designed to detect errors in messages and to ensure
transmission of correct messages. The most common method is to retransmit erroneous
message block. In such a case, a block having error is discarded by the receiver and is
retransmitted by the sender.
6. Precedence and order of transmission. These rules ensure that all the nodes get a chance to
use the communication lines and other resources of the network based on the priorities assigned
to them.
7. Connection establishment and termination. These rules define how connections are
established, maintained and terminated when two nodes of a network want to communicate
with each other.
Data security. Providing data security and privacy is also built into most communication
software packages. It prevents access of data by unauthorized users.
9. Log information. Several communication software are designed to develop log information,
which consists of all jobs and data communications tasks that have taken place. Such
information may be used for charging the users of the network based on their usage of the
network resources.
The effectiveness depends on fundamental characteristics of data communications
1. Delivery: The data must be deliver in correct order with correct destination.
2. Accuracy: The data must be deliver accurately.
3. Timeliness: The data must be deliver in a timely manner.late delivered Data useless.
Type of data communication
Communication Channels
Communication channels are the medium that connects two or more workstations.
Workstations can be connected by either wired media or wireless media. It is also
known as a transmission medium. The transmission medium or channel is a link that
carries messages between two or more devices. We can group the communication
media into two categories:
Guided media transmission
Unguided media transmission
1. of the core and reflects the light back to the core.
2. Sheath: It is the protective covering that protects fiber cable from the environment.
Guided Media
In Guided media, signals are transmitted through a physical path. The features of guide
media are high speed and security. Guided media also known
as Wired or Bounded transmission media.
There are three types of Guided media:
1. Twisted pair
2. Coaxial cable
3. Optical fiber cable
1. Twisted Pair
Twisted pair cable is made up of two insulated wires twisted with each other. One wire
carries the signal from source to destination and the other wire is for ground
reference. Twisting is done to avoid the exterior electromagnetic interference. It is the
most widely used transmission media.
Installation is easy
Lightweight cable
High speed
Can carry both analog and digital data
Cheaper than other transmission media
If some part of twisted pair cable is damaged, it does not affect the entire network
Poor security
Not durable, easy to break
Attenuation is high
Supports only lower bandwidth.
In telephone lines.
Local area networks such as small office and data centres.
Category 1 UTP: Mostly used in telephone lines as it supports only low-speed data.
Category 2 UTP: It supports upto 4Mbps.
Category 3 UTP: It supports upto 16Mbps.
Category 4 UTP: It supports upto 20Mbps. It can also be used for long-distance
communications/
Category 5 UTP: It supports upto 200Mbps.
1. Bandwidth is limited.
2. Noise reduction is not possible
3. Not ideal for longer distance communications due to the attenuation.
The inner conductor is made up of copper and the outer conductor is made up of copper
mesh. These two conductors are separated by insulating cover.
The inner centre conductor is used for data transfer while the outer copper mesh
conductor protects against the noise (Electromagnetic interference).
3. Fiber-Optic Cable
Fiber-Optic Cable is also known as optical-fiber cable. It is made of glass and the
transmission of data is based on the concept of reflection of light through glass.
In fiber optic cable, the optical fibers are coated in plastic. These optical fibers send the
data by pulses of light.
The plastic coating protects the cable from temperature, electromagnetic inference and
other types of wiring issues.
Core: The core of the fiber optic cable contains optical fibers and is responsible for data
transmission in form of light pulses.
Cladding: The core is enclosed in a layer of glass and this layer is called cladding. The
main use of cladding is to reflect the light so that the light can be transmitted from source
to the destination through reflection.
Jacket: The jacket is the outer layer of fiber optic cable which is made up of plastic and
the whole purpose of jacket is to protect the cable.
Multimode: Multiple light sources moves through different paths inside coaxial cable.
Multiple data transmission simultaneously.
1. High bandwidth: The fiber optic cable supports high bandwidth compared to the
copper cables. Thus, it transfers more data compared to the copper cables.
2. High speed: Since the data is transmitted in form of light, the transmission speed is
very high.
3. Longer range: unlike copper wires cable, the fiber optic cable can be used for larger
distance data transmission.
4. Reliable: It is more reliable than copper cables as the core is protected against the
temperature and electromagnetic disturbances.
5. Durable
6. Light weight
Unguided Media
Unguided media does not use physical medium to transmit the data from source to
destination. We already know that the Guided media uses physical medium such as
cables and wires to transfer the data from source to destination. However unlike guided
media, the Unguide media uses air as a transmission medium to transfer the data. Thus,
it is called wireless transmission media.
The unguided media uses an antenna for transmitting and receiving the data in form
of electromagnetic waves.
1. Microwave transmission
In microwave transmission, the range of frequency of electromagnetic waves lies
somewhere between 1-300GHz. Microwave transmission is of two types:
2. Radio Transmission
Radio waves are very low frequency electromagnetic waves that are transmitted in
all directions within the range.
Radio transmission frequency ranges from 3KHz to 1GHz.
In radio transmissions, the antennas need not be in aligned nor required to be set in
a particular manner to send and receive signals.
Since radio waves are omnidirectional (all directions), it is not possible to isolate the
communication inside a building.
1. Radio waves are mainly used for Wide Area Networks (WAN) for example: Mobile
networks.
2. Suitable for longer distance communications.
3. Signals can penetrate walls.
4. Higher data transmission rate compared to other transmission mediums.
3. Infrared Transmission
1. Infrared waves are highest frequency waves, frequency ranges from 300GHz to 400
THz.
2. Suitable for short distance communication.
3. Bandwidth is high so data transmit rate is high compared to other mediums.
4. These waves cannot penetrate walls, thus they are ideal for isolated
communications.
1. Secure
2. High speed
3. High frequency signals
4. High data transfer rate
5. low interference
1. Sun rays interfere with the infrared rays so not ideal for outdoor communication.
2. Suitable for short distance communication only.
3. Cannot penetrate walls so difficult to establish a communication between two
different rooms.
BASIS FOR
GUIDED MEDIA UNGUIDED MEDIA
COMPARISON
water.
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Physical layer
o The main functionality of the physical layer is to transmit the individual bits from one node to
another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface specifications.
o Line Configuration: It defines the way how two or more devices can be connected physically.
o Data Transmission: It defines the transmission mode whether it is simplex, half-duplex or full-
duplex mode between the two devices on the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the information.
Data-Link Layer
o Physical Addressing: The Data link layer adds a header to the frame that contains a destination
address. The frame is transmitted to the destination address mentioned in the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It is the technique
through which the constant data rate is maintained on both the sides so that no data get
corrupted. It ensures that the transmitting station such as a server with higher processing speed
does not exceed the receiving station, with lower processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC (Cyclic Redundancy
Check) that is placed to the Data link layer's trailer which is added to the message frame before it
is sent to the physical layer. If any error seems to occurr, then the receiver sends the
acknowledgment for the retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same communication channel,
then the data link layer protocols are used to determine which device has control over the link at
a given time.
Network Layer
o It is a layer 3 that manages device addressing, tracks the location of devices on the network.
o It determines the best path to move data from source to the destination based on the network
conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to provide the routing
services within an internetwork.
o The protocols used to route the network traffic are known as Network layer protocols. Examples
of protocols are IP and Ipv6.
Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the order in which they
are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-point connection
between source and destination to deliver the data reliably.
o Service-point addressing: Computers run several programs simultaneously due to this reason, the
transmission of data from source to the destination not only from one computer to another
computer but also from one process to another process. The transport layer adds the header that
contains the address known as a service-point address or port address. The responsibility of the
network layer is to transmit the data from one computer to another computer and the
responsibility of the transport layer is to transmit the message to the correct process.
o Segmentation and reassembly: When the transport layer receives the message from the upper
layer, it divides the message into multiple segments, and each segment is assigned with a
sequence number that uniquely identifies each segment. When the message has arrived at the
destination, then the transport layer reassembles the message based on their sequence numbers.
o Connection control: Transport layer provides two services Connection-oriented service and
connectionless service. A connectionless service treats each segment as an individual packet, and
they all travel in different routes to reach the destination. A connection-oriented service makes a
connection with the transport layer at the destination machine before delivering the packets. In
connection-oriented service, all the packets travel in the single route.
o Flow control: The transport layer also responsible for flow control but it is performed end-to-end
rather than across a single link.
o Error control: The transport layer is also responsible for Error control. Error control is
performed end-to-end rather than across the single link. The sender transport layer ensures that
message reach at the destination without any error.
Session Layer
o Dialog control: Session layer acts as a dialog controller that creates a dialog between two
processes or we can say that it allows the communication between two processes which can be
either half-duplex or full-duplex.
o Synchronization: Session layer adds some checkpoints when transmitting the data in a sequence.
If some error occurs in the middle of the transmission of data, then the transmission will take
place again from the checkpoint. This process is known as Synchronization and recovery.
Presentation Layer
o A Presentation layer is mainly concerned with the syntax and semantics of the information
exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one presentation format to
another format.
o The Presentation layer is also known as the syntax layer.
o Translation: The processes in two systems exchange the information in the form of character
strings, numbers and so on. Different computers use different encoding methods, the presentation
layer handles the interoperability between the different encoding methods. It converts the data
from sender-dependent format into a common format and changes the common format into
receiver-dependent format at the receiving end.
o Encryption: Encryption is needed to maintain privacy. Encryption is a process of converting the
sender-transmitted information into another form and sends the resulting message over the
network.
o Compression: Data compression is a process of compressing the data, i.e., it reduces the number
of bits to be transmitted. Data compression is very important in multimedia such as text, audio,
video.
Application Layer
o An application layer serves as a window for users and application processes to access network
service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application layer functions.
o This layer provides the network services to the end-users.
o File transfer, access, and management (FTAM): An application layer allows a user to access the
files in a remote computer, to retrieve the files from a computer and to manage the files in a
remote computer.
o Mail services: An application layer provides the facility for email forwarding and storage.
o Directory services: An application provides the distributed database sources and is used to
provide that global information about various objects.
BUS Topology
Bus topology is a network type in which every computer and network device
is connected to single cable. When it has exactly two endpoints, then it is
called Linear Bus topology.
Features of Bus Topology
1. It is cost effective.
4. It is easy to understand.
1. A number of repeaters are used for Ring topology with large number of
nodes, because if someone wants to send some data to the last node in
the ring topology with 100 nodes, then the data will have to pass
through 99 nodes to reach the 100th node. Hence to prevent data loss
repeaters are used in the network.
3. In Dual Ring Topology, two ring networks are formed, and data flow is
in opposite direction in them. Also, if one ring fails, the second ring can
act as a backup, to keep the network up.
STAR Topology
In this type of topology all the computers are connected to a single hub
through a cable. This hub is the central node and all others nodes are
connected to the central node.
Features of Star Topology
3. Easy to troubleshoot.
5. Only that node is affected which has failed, rest of the nodes can work
smoothly.
Disadvantages of Star Topology
3. If the hub fails then the whole network is stopped because all the nodes
depend on the hub.
MESH Topology
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
In routing, the nodes have a routing logic, as per the network requirements.
Like routing logic to direct the data to reach the destination using the shortest
distance. Or, routing logic which has information about the broken links, and
it avoids those node etc. We can even have routing logic, to re-configure the
failed nodes.
In flooding, the same data is transmitted to all the network nodes, hence no
routing logic is required. The network is robust, and the its very unlikely to
lose the data. But it leads to unwanted load over the network.
Types of Mesh Topology
2. Full Mesh Topology : Each and every nodes or devices are connected
to each other.
Features of Mesh Topology
1. Fully connected.
2. Robust.
3. Not flexible.
Advantages of Mesh Topology
2. It is robust.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy.
It is also called hierarchical topology. It should at least have three levels to
the hierarchy.
1. Heavily cabled.
2. Costly.
HYBRID Topology
2. Effective.
4. Flexible.
Disadvantages of Hybrid Topology
1. Complex in design.
2. Costly.