Numerical Methods
Numerical Methods
K r is TEXT BOOK on
(For B.A. and B.Sc. IIIrd year students of All Colleges affiliated to C.C.S. University in Meerut)
(w.e.f. 2013-2014)
By
(Meerut Edition)
Dedicated
to
Lord
Krishna
Authors & Publishers
P reface
This book on NUMERICAL METHODS & COMPUTER FUNDAMENTALS
has been specially written according to the latest Revised Unified Syllabus to
meet the requirements of the B.A. and B.Sc. Part-III Students of C.C.S.
University, Meerut in Uttar Pradesh.
The subject matter has been discussed in such a simple way that the students
will find no difficulty to understand it. Each chapter of this book contains
complete theory and a fairly large number of solved examples. Sufficient
Comprehensive Exercises have also been selected from various university
examination papers. At the end of each chapter an exercise containing objective
questions has been given.
We have tried our best to keep the book free from misprints. The authors
shall be grateful to the readers who point out errors and omissions which, inspite
of all care, might have been there.
The authors, in general, hope that the present book will be warmly received
by the students and teachers. We shall indeed be very thankful to our colleagues
for their recommending this book to their students.
The authors wish to express their thanks to Mr. S.K. Rastogi, M.D.,
Mr. Sugam Rastogi, Executive Director, Mrs. Kanupriya Rastogi, Director and
entire team of KRISHNA Prakashan Media (P) Ltd., Meerut for bringing
out this book in the present nice form.
The authors will feel amply rewarded if the book serves the purpose for
which it is meant. Suggestions for the improvement of the book are always
welcome.
Unit -1
Discussion of different type of Errors, Shift operator, Forward difference Backward
difference and Central difference operators and their relationships, Fundamental theorem
of difference calculus, Divided differences.
Unit -2
Interpolation, Newton–Gregory's forward and backward interpolation formulae.
Newton's divided difference formula, Lagrange's interpolation formula, Formulae based
on central differences: Gauss, Stirling's, Bessel's and Everett's interpolation formulae,
Numerical differentiation.
Unit -3
Solution of transcendental and polynomial equations by iterative methods bisection
method, Regular–falsi method and Newton–Raphson method, Successive iteration
method.
Unit -4
Basic computer organization, Computer arithmetic and Number systems: Binary, octa
and hexadecimal system, Storage devices, Operating system.
Unit -5
Computer software, Programming languages, Computer networking: LAN, WAN and
Computer network topologies.
B rief C ontents
Dedication.........................................................................(v)
Preface ...........................................................................(vi)
Syllabus ........................................................................(vii)
Brief Contents ...............................................................(viii)
Section-A Numerical Methods ................................N-01–N-190
Unit-1
Chapter- 1: The Calculus of Finite Differences......................................N-03 — N-48
Chapter- 2: Interpolation with Equal Intervals.......................................N-49 — N-78
Unit-2
Chapter- 3: Interpolation with Unequal Intervals of the
Argument....................................................................................N-79 — N-114
Chapter- 4: Central Difference Interpolation Formulae....................N-115 — N-142
Unit-3
Chapter- 5: Solution of Algebraic & Transcendental Equations......N-143 — N-172
Chapter- 6: Numerical Differentiation...................................................N-173 — N-190
Unit-4
Chapter- 1: Basic Computer Organization...............................................C-03 — C-46
Chapter- 2: Number System and Computer Arithmatic.......................C-47 — C-80
Chapter- 3: Operating System .....................................................................C-81 — C-128
Unit-5
Chapter-4: Computer Software and Programming............................C-129—C-140
Chapter- 5: Computer Networks...............................................................C-141 — C-158
A
NUMERICAL METHODS
C hapters
6. Numerical Differentiation
1
T he C alculus of F inite D ifferences
1.2 Operator E
(Rohilkhand 2010)
The operator E: Let y = f ( x) be any function of x. By operating E on f ( x) we
mean to simply give an increment to the value of x in the function f ( x). If this
N-4
∇f (a + h) = f (a + h) − f (a).
Similarly ∇f (a + 2h) = f (a + 2h) − f (a + h)
… … … … … …
∇f (a + nh) = f (a + nh) − f (a + n − 1 h).
The operator ∇ is called the backward or ascending difference operator. The
differences of first backward differences are called second backward differences
and are denoted by
∇ 2 f (a + 2h), ∇ 2 f (a + 3h) etc.
Thus ∇ 2 f (a + 2h) = ∇f (a + 2h) − ∇f (a + h)
= { f (a + 2h) − f (a + h)} − { f (a + h) − f (a)}
= f (a + 2h) − 2 f (a + h) + f (a).
In general, the first backward difference of f ( x) is defined as
∇f ( x) = f ( x) − f ( x − h).
The second backward difference of f ( x) is defined as
∇ 2 f ( x) = ∇ {∇ f ( x)} = ∇ { f ( x) − f ( x − h)}
= ∇f ( x) − ∇f ( x − h)
= { f ( x) − f ( x − h)} − { f ( x − h) − f ( x − 2h)}
= f ( x) − 2 f ( x − h) + f ( x − 2h).
Similarly the nth backward difference of f ( x) is defined as
∇ n f ( x) = ∇ {∇ n − 1 f ( x)} = ∇ n − 1 f ( x) − ∇ n − 1 f ( x − h).
⎡ f ( x) ⎤ g ( x) . Δ f ( x) − f ( x) . Δ g ( x)
Δ⎢ ⎥= ⋅
⎣ g ( x) ⎦ g ( x) . E g ( x)
⎡ f ( x) ⎤ ⎡ f ( x + h) ⎤ ⎡ f ( x) ⎤
We have Δ ⎢ ⎥=⎢ ⎥−⎢ ⎥
⎣ g ( x) ⎦ ⎣ g ( x + h) ⎦ ⎣ g ( x) ⎦
f ( x + h) . g ( x) − f ( x) . g ( x + h)
=
g ( x) . g ( x + h)
[ f ( x + h) − f ( x)] g ( x) − [ g ( x + h) − g ( x)] f ( x)
=
g ( x) . g ( x + h)
[Note]
g ( x) . Δ f ( x) − f ( x) . Δ g ( x)
= ⋅
g ( x) . Eg ( x)
N-9
= (1 + Δ) [ f ( x) − { f ( x) − f ( x − h)}]
= (1 + Δ) f ( x − h)
= E f ( x − h) [ ∵ E ≡ 1 + Δ]
= f ( x) = 1 . f ( x).
Thus (1 + Δ) (1 − ∇) f ( x) = 1 . f ( x), for any function f ( x).
∴ (1 + Δ) (1 − ∇) ≡ 1.
(f) E ≡ e hD ≡ 1 + Δ, where D is the differential operator of differential calculus.
(Kanpur 2011)
We have E f ( x) = f ( x + h)
h2
= f ( x) + hf ′ ( x) + f ′ ′ ( x) + …
2!
[By Taylor’s theorem of differential calculus]
h2
= 1. f ( x) + h Df ( x) + D2 f ( x) + …
2!
⎧ h2 D2 ⎫
= ⎨1 + hD + + …⎬ f ( x)
⎩ 2! ⎭
hD
=e f ( x).
Thus E f ( x) = e hD f ( x), for any function f ( x).
∴ E ≡ e hD .
Again we know that E ≡ 1 + Δ. Therefore
E ≡ e hD ≡ 1 + Δ.
Remark. We have e hD ≡ 1 + Δ
⎛ Δ2 Δ3 Δ4 ⎞
⇒ hD ≡ log (1 + Δ) ≡ ⎜ Δ − + − + …⎟
⎝ 2 3 4 ⎠
1 ⎛ Δ2 Δ3 Δ4 ⎞
or D= ⎜Δ − + − + …⎟ ⋅
h ⎝ 2 3 4 ⎠
Table 1
Forward Difference Table
Argument Entry First differences Second differences
x y = f ( x) Δ f ( x) Δ2 f ( x)
a f (a)
f (a + h) − f (a) = Δ f (a)
a+h f (a + h) Δ f (a + h) − Δ f (a)
= Δ2 f (a)
f (a + 2h) − f (a + h)
= Δ f (a + h)
a + 2h f (a + 2h) Δ f (a + 2h) − Δ f (a + h)
= Δ2 f (a + h)
f (a + 3h) − f (a + 2h)
= Δ f (a + 2h)
a + 3h f (a + 3h) Δ f (a + 3h)− Δ f (a + 2h)
= Δ2 f (a + 2h)
f (a + 4h) − f (a + 3h)
= Δ f (a + 3h)
a + 4h f (a + 4h)
Similarly we can calculate third and higher order differences from the table. Here
we have taken forward differences therefore this table is known as forward
difference table.
Table 2
Backward Difference Table
Argument Entry First differences Second differences
x y = f ( x) ∇ f ( x) ∇2 f ( x)
a f (a)
f (a + h) − f (a)
= ∇ f (a + h)
a+h f (a + h) ∇ f (a + 2h) − ∇ f (a + h)
= ∇ 2 f (a + 2h)
f (a + 2h) − f (a + h)
= ∇ f (a + 2h)
a + 2h f (a + 2h) ∇ f (a + 3h) − ∇ f (a + 2h)
= ∇ 2 f (a + 3h)
f (a + 3h) − f (a + 2h)
= ∇ f (a + 2h)
a + 3h f (a + 3h) ∇ f (a + 4h) − ∇ f (a + 3h)
= ∇ 2 f (a + 4h)
f (a + 4h) − f (a + 3h)
= ∇ f (a + 4h)
a + 4h f (a + 4h)
Similarly we can calculate the differences of higher order from this table.
N-12
− [ x ( x − h) … ( x − n − 1 h)]
= ( x + h) x ( x − h) … ( x − n − 2 h) − x ( x − h) … ( x − n − 2 h)
( x − n − 1 h)
= x ( x − h) … ( x − n − 2 h) [( x + h) − ( x − n − 1 h)]
= x (n − 1) [ x + h − x + nh − h] = nhx (n − 1) …(1)
N-15
Δ x (n)
or equivalently = n x (n −1) because Δ x = x + h − x = h.
Δ x
Again Δ2 x (n) = Δ Δ x (n)
= Δ { nhx (n − 1)} [From (1)]
= nh Δ x (n−1) , because nh is a constant.
Now replacing n by n − 1 in the relation (1), we have
Δ x (n − 1) = (n − 1) h x (n − 1) .
∴ Δ2 x (n) = nh . (n − 1) h x (n − 2) = n (n − 1) h2 x (n − 2) .
Proceeding in the same manner, we get
Δn − 1 x (n) = n (n − 1) … 2 . h n − 1 x.
∴ Δn x (n) = n (n − 1) … 2 . h n − 1 Δ x
= n (n − 1) … 2 . h n − 1 ( x + h − x)
= n (n − 1) … 2 . 1 . h n − 1 . h
= n ! h n. …(2)
n +1 (n) n n n
∴ Δ x = Δ (n ! h ) = n ! h − n ! h = 0.
In particular when h = 1 we get from (1) and (2)
Δ x (n) = nx (n −1) and Δn x (n) = n !. …(3)
This result leads to the following very important conclusion.
In case of factorial notation, the operator Δ is equivalent to the operator of differentiation if the
interval of differencing is unity.
II. To find Δ−1 x ( n) .
We have Δ x (2) = 2 . hx (1) [∵ Δ x (n) = nhx (n −1) ]
⎡ x (2) ⎤ (1)
or Δ⎢ ⎥= x
⎣ 2 h ⎦
x (2)
or Δ−1 x (1) = + t ( x),
2h
where t ( x) is a periodic function of period h.
x (3)
Similarly, Δ−1 x (2) = + t ( x).
3h
x (n +1)
In general, Δ−1 x (n) = + t ( x).
(n + 1) h
Note: From above we observe that the operator Δ−1 behaves on polynomials of
factorial functions in a similar way as the integration behaves on ordinary
polynomials.
N-16
1
III. To show that x ( − n) = , the interval of differencing being h.
( x + nh) ( n) (Rohilkhand 2010)
(n) (n−1)
We have x = ( x − n − 1 h) x , …(1)
when the interval of differencing is h.
In particular, for n = 0, x (0) = ( x + h) x (−1) .
But by convention we argee to write x (0) = 1.
1
∴ x (−1) = ⋅
x+h
Again from (1), for n = − 1, x (−1) = ( x + 2 h) x (−2) .
x (−1) 1
∴ x (−2 ) = = ⋅
x + 2h ( x + h) ( x + 2h)
In general, we shall get
1 1
x (− n) = = ⋅ …(2)
( x + h) ( x + 2h) … ( x + nh) ( x + nh)(n)
If the interval of differencing is unity, then we have from (2)
1 1
x (− n) = = ⋅
( x + 1) ( x + 2) … ( x + n) ( x + n)(n)
1
Thus x (− n) = …(3)
( x + n)(n)
Now Δ x (− n) = ( x + h)(− n) − x (− n)
1
=
( x + 2h)( x + 3h) … ( x + nh) ( x + n + 1 h)
1
−
( x + h)( x + 2h)( x + 3h) … ( x + nh)
1 ⎡ 1 1 ⎤
= ⎢ − ⎥
( x + 2h)( x + 3h) … ( x + nh) ⎣⎢( x + n + 1 h) x + h⎥⎦
− nh
= ⋅
( x + h)( x + 2h)( x + 3h) … ( x + nh)( x + n + 1 h)
∴ Δ x (− n) = − nhx (− n +1 )
= − nhx (− n −1) …(4)
Δ x (− n)
or equivalently = − nx (− n +1) because Δ x = x + h − x = h.
Δ x
Similarly, Δ2 x (− n) = Δ [− nhx (− n−1) ] = (− nh) Δ [ x (− n −1) ]
= (− nh) (− n − 1) hx (− n − 2)
= (−1)2 n (n + 1) h2 x (− n − 2) , …(5)
and so on.
N-17
f ( x − n − 1 h) = a [ x − (n − 1) h] + b = ax + b − nah + ah.
∴ (ax + b)(n) = (ax + b) (ax + b − ah) (ax + b − 2ah) … (ax + b − nah + ah).
⇒ 0 = 2 B + 4 − 10 ⇒ B = 3.
3
Equating the coefficients of x on both sides of (1), we get A = 2.
Putting the values of A, B, C and D in (1), we get
f ( x) = 2 x 3 − 3 x 2 + 3 x − 10
= 2 x (3) + 3 x (2) + 2 x (1) − 10.
By the rule of simple differentiation, we have
Δ f ( x) = 6 x (2) + 6 x (1) + 2
Δ2 f ( x) = 12 x (1) + 6
Δ3 f ( x) = 12.
2x − 1
x − 1 ) 2x 2 − 3x + 3
2x 2 − 2x
−x+3
− x+1
2
∴ The quotient is 2 x − 1 and the remainder is the value of C i. e., C = 2.
N-19
2
x − 2 ) 2x − 1
2x − 4
3
The quotient 2 is the value of A and the remainder 3 is B. Thus the given
polynomial when expressed in factorial notation is
2 x 3 − 3 x 2 + 3 x − 10 = 2 x (3) + 3 x (2) + 2 x − 10.
The above method can be simplified by the procedure of detached coefficients in
the following way :
Taking the coefficients of the various powers of x in the given polynomial, we have
2 −3 3 −10 = D …(a)
1
0 2 −1
2 −1 2=C …(b)
2
0 4
2 3= B …(c)
3
0
2= A
third row. Adding −1 and 4 we get 3 and we write it in the fifth row below 4
of the fourth row. This 3 is the value of B.
(iv) Now we write 3 in the left hand column of (c). Below 2 of the fifth row we
write 0 and adding 2 and 0 we get 2 which we write in the seventh row below
0 of the sixth row. This 2 is the value of A.
The quantities Δn 0 m are known as differences of zero because the leading term is
always zero.
We can calculate the values of Δn 0 m for various integral values of n and m. For
example,
if n = 1, m = 3, Δ 0 3 = 13 = 1,
n = 2, m = 3, Δ2 0 3 = 23 − 2 . 13 = 6,
n = 3, m = 3, Δ3 0 3 = 33 − 3 . 23 + 3 . 13 = 6, etc.
Recurrence relation between Δn 0 m , Δn − 1 0 m − 1 and Δn 0 m − 1 . From (1), we
have
Δn 0 m = n m − n C1 (n − 1) m + n C2 (n − 2) m − … + n Cn −1 (−1) n −1
n (n − 1)
= n m − n (n − 1) m + (n − 2) m − … + n (−1) n −1
2!
⎡ (n − 1) (n − 2) m ⎤
= n ⎢n m −1 − (n − 1) m + − … + (−1) n −1 ⎥
⎢⎣ 2! ⎥⎦
= n [n m −1 − n −1
C1 (n − 1) m −1 + n −1
C2 (n − 2) m −1 − … + (−1) n−1 ]
= n [(1 + n − 1) m −1 − n −1
C1 (1 + n − 2) m −1 + n −1
C2 (1 + n − 3) m −1
− … + (−1) n −1 ]
N-21
= n [ E n −1 (1) m −1 − n −1
C1 E n −2 (1) m −1 + n −1
C2 E n − 3 (1) m −1
− … + (−1) n −1 (1) m −1 ] [∵ (1) m −1 = 1]
= n [ E − 1] n −1 (1) m −1 = n Δn−1 (1) m −1
= n Δn −1 E (0) m −1 [ ∵ E (0) = 1]
n −1 m −1
=nΔ (1 + Δ) 0
n −1
=nΔ 0 m −1 + n Δn 0 m −1 .
This is the required recurrence relation between differences of zero for different
values of n and m.
(i) less than half a unit in the nth place, the nth digit is left unaltered;
(ii) greater than half a unit in the nth place, the nth digit is increased by unity;
(iii) exactly half a unit in the nth place, the nth digit is increased by unity if it is odd,
otherwise it is left unchanged.
Then we say that the number is correct to n significant figures. The following
numbers are rounded off to four significant figures :
1.6473 to 1.647
20.0567 to 20.06
0.753378 to 0.7534
6.14159 to 6.142
Example 1: Find the value of E2 x 2 when the values of x vary by a constant increment of 2.
Solution: We have
E2 x 2 = EEx 2 = E ( x + 2)2 [ ∵ interval of differencing is 2]
= ( x + 2 + 2)2 = ( x + 4)2
= x 2 + 8 x + 16
Example 2: Evaluate E n e x when interval of differencing is h.
Solution: We have E (e x ) = e x + h
E2 (e x ) = EEe x = Ee x + h = e x +2 h
E3 (e x ) = EE2 e x = Ee x +2 h = e x +3 h
… … … …
n x x + nh
E e =e .
Example 3: Evaluate the following :
3
(i) Δ (1 − x) (1 − 2 x) (1 − 3 x) (ii) Δn (e ax + b ),
the interval of differencing being unity.
Solution: (i) Here f ( x) = (1 − x) (1 − 2 x) (1 − 3 x)
= − 6 x 3 + 11x 2 − 6 x + 1.
The polynomial f ( x) is of degree 3.
We know that for a polynomial of nth degree, the nth difference is constant being
equal to a n h n n ! where a n is the coefficient of x n in the polynomial, h is the interval
of differencing.
N-24
Here a n = − 6, h = 1, n = 3.
∴ Δ3 f ( x) = (−6) . (1)3 . 3 ! = − 36.
(ii) Here f ( x) = e ax + b .
Now Δ f ( x) = f ( x + 1) − f ( x).
a ( x +1) + b
∴ Δ (e ax + b ) = e − e ax + b = e ax + b (e a − 1)
Δ2 (e ax + b ) = Δ (Δ e ax + b ) = Δ {e ax + b (e a − 1)}
ax + b
= (e a − 1) (Δ e )
= (e a − 1) e ax + b (e a − 1)
= (e a − 1)2 e ax + b .
Proceeding in this way, we get
Δn (e ax + b ) = (e a − 1) n e ax + b .
Example 4: Evaluate
2
(i) Δ (cos 2 x) ; (ii) Δ2 (3e x ),
the interval of differencing being h.
Solution: (i) We have Δ2 (cos 2 x) = ( E − 1)2 cos 2 x [∵ Δ ≡ E − 1]
= ( E2 − 2 E + 1) cos 2 x
= E2 cos 2 x − 2 E cos 2 x + cos 2 x
= cos {2 ( x + 2h)} − 2 cos 2 ( x + h) + cos 2 x
= cos (2 x + 4h) − 2 cos (2 x + 2h) + cos 2 x
= cos (2 x + 4h) − cos (2 x + 2 h) − cos (2 x + 2h) + cos 2 x
= 2 sin (2 x + 3h) sin (− h) + 2 sin (2 x + h) sin h
= − 2 sin h [sin (2 x + 3h) − sin (2 x + h)]
= − 2 sin h [2 cos (2 x + 2h) sin h]
= − 4 sin2 h cos (2 x + 2h).
(ii) We have Δ (3e x ) = 3 (Δ e x ) = 3 (e x + h − e x ) = 3 (e x e h − e x ) = 3e x (e h − 1).
∴ Δ2 (3e x ) = Δ (Δ 3e x ) = Δ {3e x (e h − 1)}
= 3 (e h − 1) (Δ e x ) = 3 (e h − 1) (e x + h − e x )
= 3 (e h − 1) e x (e h − 1) = 3e x (e h − 1)2 .
⎛ Δ2 ⎞ E ex
Example 5: Show that e x = ⎜ ⎟ e x ⋅ 2 x ; the interval of differencing being h.
⎝ E⎠ Δ e (Rohilkhand 2010, 11)
Solution: Let f ( x) = e x .
We know that E f ( x) = f ( x + h).
N-25
∴ E e x = e x + h.
Now Δ f ( x) = f ( x + h) − f ( x).
∴ Δ e x = e x + h − e x = e x (e h − 1),
Δ2 e x = Δ (Δ e x ) = Δ { e x (e h
− 1)}
= (e h − 1) Δ (e x ) = (e h − 1)2 e x .
⎛ Δ2 ⎞
Also ⎜ ⎟ e x = (Δ2 E −1 ) e x
= Δ2 ( E −1 e x ) = Δ2 (e x − h )
⎝ E⎠
= Δ2 (e x e − h ) = e − h Δ2 e x = e − h (e h − 1)2 e x .
⎛ Δ2 ⎞ x E e x −h e x +h
Hence, h 2 x
⎜ ⎟ e ⋅ 2 x = e (e − 1) e ⋅ h = e −h e x +h = e x .
⎝ E⎠ Δ e (e − 1)2 e x
⎛ Δ2 ⎞
Example 6: Evaluate ⎜ ⎟ x 3 .
⎝ E⎠
⎛ Δ2 ⎞ 3 ⎡( E − 1)2 ⎤ 3 ⎛ E 2 − 2 E + 1⎞ 3
Solution: We have ⎜ ⎟ x =⎢ ⎥ x = ⎜⎜ ⎟⎟ x [∵ Δ ≡ E − 1]
⎝ E⎠ ⎢⎣ E ⎥⎦ ⎝ E ⎠
= ⎛⎜ E − 2 + ⎞⎟ x 3
1
= Ex 3 − 2 x 3 + E −1 x 3
⎝ E⎠
= ( x + 1)3 − 2 x 3 + ( x − 1)3
= x 3 + 3 x 2 + 3 x + 1 − 2 x 3 + x 3 − 3 x 2 + 3 x − 1 = 6 x.
Example 7: Evaluate
(i) Δ tan −1 x (ii) Δ ( x + cos x).
−1
Solution: (i) We have Δ tan x = tan −1 ( x + h) − tan −1 x
( x + h) − x ⎡ h ⎤
= tan −1 = tan −1 ⎢ 2⎥
⋅
1 + ( x + h) x ⎢⎣1 + hx + x ⎥⎦
(ii) We have Δ ( x + cos x) = Δ x + Δ cos x
= {( x + h) − x } + {cos ( x + h) − cos x }
2x + h
sin ⎛⎜ − ⎞⎟
h
= h + 2 sin
2 ⎝ 2⎠
= h − 2 sin ⎛⎜ x + ⎞⎟ sin ⋅
h h
⎝ 2 ⎠ 2
⎧ Δ f ( x)⎫
Example 8: Show that Δ log f ( x) = log ⎨1 + ⎬⋅
⎩ f ( x) ⎭ (Kanpur 2008)
Solution: We have Δ log f ( x) = log f ( x + h) − log f ( x)
N-26
⎡ ( x + 2) − ( x + 4) ⎤ ⎡ ( x + 3) − ( x + 5) ⎤
=−2⎢ ⎥ −3 ⎢ ⎥
⎣( x + 2) ( x + 3) ( x + 4)⎦ ⎣( x + 3) ( x + 4) ( x + 5)⎦
⎡ −2 ⎤ ⎡ −2 ⎤
=−2⎢ ⎥ −3⎢ ⎥
⎣( x + 2) ( x + 3) ( x + 4)⎦ ⎣( x + 3) ( x + 4) ( x + 5)⎦
4 6
= + ⋅
( x + 2) ( x + 3) ( x + 4) ( x + 3) ( x + 4) ( x + 5)
(iii) We have Δn ⎛⎜ ⎞⎟ = Δn −1 Δ ⎛⎜ ⎞⎟ ⋅
1 1
⎝ x⎠ ⎝ x ⎠
1 x − ( x + 1) (−1)
Δ ⎛⎜ ⎞⎟ =
1 1
Now − = = ⋅
⎝ x⎠ x + 1 x x ( x + 1) x ( x + 1)
⎧ (−1) ⎫ ⎡ 1 ⎤
Δ2 ⎛⎜ ⎞⎟ = Δ Δ ⎛⎜ ⎞⎟ = Δ ⎨
1 1
⎝ x⎠ ⎝ x⎠ ⎬ = (−1) Δ ⎢ ⎥
⎩ x ( x + 1)⎭ ⎣ x ( x + 1)⎦
⎧ 1 1 ⎫
= (−1) ⎨ − ⎬
⎩ ( x + 1) ( x + 2) x ( x + 1)⎭
x − ( x + 2) (−1) (−2)
= (−1) = ⋅
x ( x + 1) ( x + 2) x ( x + 1) ( x + 2)
(−1) (−2) (−3)
Δ3 ⎛⎜ ⎞⎟ =
1
⋅
⎝ x ⎠ x ( x + 1) ( x + 2) ( x + 3)
(− 1) (− 2) (− 3) … (− n)
Δn ⎛⎜ ⎞⎟ =
1
Similarly
⎝ x ⎠ x ( x + 1) ( x + 2) … ( x + n)
(−1) n n !
= ⋅
x ( x + 1) … ( x + n)
(iv) We have Δ (ab cx ) = a Δ b cx = a { b c ( x +1) − b cx }
= a { b cx b c − b cx } = a (b c − 1) b cx .
Now Δ2 (ab cx ) = ΔΔ (ab cx ) = Δ { a (b c − 1) b cx }
= a (b c − 1) Δ b cx
= a (b c − 1)2 b cx .
Proceeding in the same way, we have
Δn (ab cx ) = a (b c − 1) n b cx .
Example 10: Show that
n −1
Σ Δ2 f k = Δ f n − Δ f 0 .
k =0
n −1 n −1
Solution: We have Σ Δ2 f k = Σ Δ (Δ f k )
k =0 k =0
n −1
= Σ (Δ f k +1 − Δ f k )
k =0 [ ∵ Interval of differencing is 1]
N-28
= (Δ f1 − Δ f 0 ) + (Δ f 2 − Δ f1 ) + (Δ f 3 − Δ f 2 )
= ( E5 − 5 E4 + 10 E3 − 10 E2 + 5 E − 1) u0
= u5 − 5u4 + 10 u3 − 10 u2 + 5u1 − u0
= 8 − 500 + 2000 − 810 + 60 − 3 = 755.
Example 18: Find f (6) given that f (0) = − 3, f (1) = 6, f (2) = 8, f (3) = 12, the
third differences being constant. (Kanpur 2010)
Solution: We construct the following difference table :
x f ( x) Δf ( x) Δ2 f ( x) Δ3 f ( x)
0 −3
9
1 6 −7
2 9
2 8 2
4
3 12
We have f (6) = f (0 + 6) = E6 f (0) = (1 + Δ)6 f (0)
= (1 + 6Δ + 15Δ2 + 20 Δ3 ) f (0)
[higher differences being zero]
= f (0) + 6 Δ f (0) + 15 Δ f (0) + 20 Δ3 f (0)
2
= − 3 + 6 × 9 + 15 × (−7) + 20 × 9
= − 3 + 54 − 105 + 180
= 126.
Example 19: Represent the function
f ( x) = x 4 − 12 x 3 + 42 x 2 − 30 x + 9
and its successive differences in factorial notation.
Solution: Let f ( x) = x 4 − 12 x 3 + 42 x 2 − 30 x + 9 ≡ Ax (4) + Bx (3)
+ Cx (2) + Dx (1) + E.
Using the method of synthetic division (method of detached coefficients), as
shown in the table ahead, we get
x 4 − 12 x 3 + 42 x 2 − 30 x + 9 ≡ x (4) − 6 x (3) + 13 x (2) + x (1) + 9.
Since in the factorial notation, the operator Δ is equivalent to differentiation, we
get
Δ f ( x) = 4 x (3) − 18 x (2) + 26 x + 1
Δ2 f ( x) = 12 x (2) − 36 x (1) + 26
Δ3 f ( x) = 24 x − 36
Δ4 f ( x) = 24.
N-32
1 1 −12 42 −30 9= E
0 1 −11 31
2 1 −11 31 1= D
0 2 −18
3 1 −9 13 = C
0 3
4 1 −6 = B
0
1= A
Note 1: While using the method of synthetic division, we should first of all see
whether the given expression is complete or not. If any power of x is missing, we
should first make the expression complete by taking its coefficient zero and then
employ the method of synthetic division.
Note 2: The reader is advised to use the direct method, viz., by taking
f ( x) = x 4 − 12 x 3 + 42 x 2 − 30 x + 9 ≡ x (4) + Ax (3) + Bx (2) + Cx (1) + 9
and calculating the coefficients A, B and C by comparing the coefficients of like
powers of x on both sides. It may be pointed out that the coefficients of the highest
power of x and the constant terms remain unchanged while transforming to
factorial notation. This point reduces calculation work to some extent.
Example 20: Find the function whose first difference is
9 x 2 + 11x + 5.
Solution: Let f ( x) be the required function.
Then Δ f ( x) = 9 x 2 + 11x + 5.
Let 9 x 2 + 11x + 5 ≡ 9 x (2) + Ax (1) + B
= 9 x ( x − 1) + Ax + B.
Putting x = 0, we get B = 5.
Putting x = 1, we get A = 20.
∴ Δ f ( x) = 9 x (2) + 20 x (1) + 5.
Integrating it, we get
x (3) x (2) x (1)
f ( x) = 9 ⋅ + 20 ⋅ +5⋅ + C , where C is a constant.
3 2 1
∴ f ( x) = 3 x (3) + 10 x (2) + 5 x (1) + C
= 3 x 3 + x 2 + x + C.
N-33
Example 21: Find the lowest degree polynomial which takes the following values :
x : 0 1 2 3 4 5
f ( x) : 0 3 8 15 24 35
x f ( x) Δ f ( x) Δ2 f ( x) Δ3 f ( x)
0 0
3
1 3 2
5 0
2 8 2
7 0
3 15 2
9 0
4 24 2
11
5 35
Putting the values of f (0), Δ f (0), Δ2 f (0), Δ3 f (0) in (2), we get
x (2)
f ( x) = 0 + 3 x (1) + 2 ⋅ + 0 = 3 x + x ( x − 1) = x 2 + 2 x.
2!
Example 22: Find the relation between α, β and γ in order that α + βx + γ x 2 may be
expressible in one term in the factorial notation. (Kanpur 2009)
2 (2)
Solution: Let f ( x) = α + βx + γ x = (a + bx) ,
where a and b are some unknown constants.
Now (a + bx)(2) = (a + bx) { a + b ( x − 1)} = (a + bx) (a − b + bx)
= (a + bx)2 − ab − b 2 x
= (a2 − ab) + (2ab − b 2 ) x + b 2 x 2 .
∴ α + βx + γ x 2 = (a2 − ab) + (2ab − b 2 ) x + b 2 x 2 .
Comparing the coefficients of various powers of x, we get
N-34
α = a2 − ab, β = 2ab − b 2 , γ = b 2 .
Eliminating a and b from these equations, we get
γ 2 + 4αγ = β 2 ,
which is the required relation between α , β and γ.
Example 23: Find the function whose first difference is e x .
Solution: We know that
Δ e x = e x + h − e x = e x (e h − 1),
where h is the interval of differencing.
1 ⎛ ex ⎞
∴ ex = h
Δ e x = Δ ⎜⎜ h ⎟⎟ ⋅
e −1 ⎝ e − 1⎠
ex
Hence the required function f ( x) is ⋅
eh − 1
Example 24: Prove that
n (n + 1)
Δn 0 n +1 = Δn 0 n .
2
Solution: Using the relation Δn 0 m = n [Δn −1 0 m −1 + Δn 0 m −1 ], we get
Δn 0 n +1 = n [Δn −1 0 n + Δn 0 n ]
Δn −1 0 n = (n − 1) [Δn − 2 0 n −1 + Δn −1 0 n −1 ]
Δn − 2 0 n −1 = (n − 2) [Δn − 3 0 n − 2 + Δn − 2 0 n − 2 ]
… … … … …
… … … … …
2 3 2 2 2
Δ 0 = 2 [Δ 0 +Δ 0 ]
Δ 0 2 = 1 [Δ0 01 + Δ1 01 ].
By back substitution of these values, we get
Δn 0 n +1 = n Δn 0 n + n (n − 1) Δn −1 0 n −1 + n (n − 1) (n − 2)
Δn − 2 0 n − 2 + …+ n (n − 1) (n − 2) … 2 . 1 Δ1 01
= nn ! + n (n − 1) (n − 1) ! + n (n − 1) (n − 2) (n − 2) ! + …
… + n (n − 1) (n − 2) … 2 . 1 . 1 !
= n ! { n + (n − 1) + (n − 2) + … + 2 + 1}
n (n + 1) n (n + 1) n n
= n !⋅ = ⋅Δ 0 . [ ∵ Δn 0 n = n !]
2 2
Example 25: Find Δ3 ( x 2 . a x ) by Leibnitz’s rule.
Solution: We have Δ3 ( x 2 . a x ) = Δ3 (a x . x 2 )
N-35
= (Δ3 a x ) . x 2 + 3
C1 (Δ2 Ea x )(Δ x 2 ) + 3
C2 (Δ E2 a x ) . (Δ2 x 2 )
3
+ C3 ( E3 a x ) . (Δ3 x 2 )
= a x (a h − 1)3 . x 2 + 3 (Δ2 a x + h ) . {( x + h)2 − x 2 }
+ 3 . (Δ a x + 2 h ) . (2h2 ) + 0
= a x (a h − 1)3 x 2 + 3a x + h (a h − 1)2 (2 xh + h2 )
+ 2h
+ 3a x (a h − 1) . (2h2 ).
Δ2 Δ2 sin ( x + h)
Example 26: Evaluate sin ( x + h) + ,
E E sin ( x + h)
h being the interval of differencing.
Solution: We have
Δ 2 Δ2 sin ( x + h)
sin ( x + h) +
E E sin ( x + h)
( E − 1)2 ( E − 1)2 sin ( x + h)
= sin ( x + h) +
E sin ( x + 2h)
( E2 − 2 E + 1) sin ( x + h)
= ( E − 2 + E −1 ) sin ( x + h) +
sin ( x + 2h)
= [sin ( x + 2h) − 2 sin ( x + h) + sin x]
⎡sin ( x + 3h) − 2 sin ( x + 2h) + sin ( x + h)⎤
+⎢ ⎥
⎣ sin ( x + 2h) ⎦
2 sin ( x + 2h) [cos h − 1]
= 2 sin ( x + h) [cos h − 1] +
sin ( x + 2h)
= 2 (cos h − 1) {sin ( x + h) + 1}.
Comprehensive Exercise 1
Δ2 x 3
(v) Δ tan ax (vi)
E x3
(vii) Δ4 ae x (viii) Δ tan −1 ax.
4. Show that
b⎞ n ⎡ ⎛ b + π⎞⎤
(i) Δn sin (a + bx) = ⎛⎜2 sin ⎟ sin ⎢a + bx + n ⎜ ⎟ ⋅
⎝ 2 ⎠ ⎣ ⎝ 2 ⎠ ⎥⎦
b n ⎡ ⎛ π + b⎞ ⎤
(ii) Δn cos (a + bx) = ⎛⎜2 sin ⎞⎟ cos ⎢a + bx + n ⎜ ⎟ ⋅
⎝ 2 ⎠ ⎣ ⎝ 2 ⎠ ⎥⎦
− sin b
(iii) Δ cot (a + bx) = ⋅
sin (a + bx) sin (a + b + bx)
n
(ii) Δn = Σ (−1) n− r ⎛⎜ ⎞⎟ E r .
n
r =0 ⎝ r⎠
14. For the function f ( x) = C x , show that
n
Δn C x = C x Σ ⎛⎜ ⎞⎟ (−1) n− r . C rh .
n
r =0 ⎝ r ⎠
22. A second degree polynomial passes through (0, 1), (1, 3), (2, 7) and (3, 13).
Find the polynomial.
23. A third degree polynomial passes through the points (0, − 1), (1, 1), (2, 1) and
(3, 2). Find the polynomial.
24. Prove that if m is a positive integer, then
N-38
( x + 1)(m) x (m) x (m − 1)
(i) = +
m! m ! (m − 1) !
25. Find the constructing the difference table, tenth term of the series
3, 14, 39, 84, 155, 258, … .
2
⎛Δ Ux ⎞ ⎛ Δ2 U ⎞
26. What is the difference between ⎜ ⎟ and ⎜ 2 x ⎟ ?
⎝ E Ux ⎠ ⎝ E Ux ⎠
Production 17 ⋅ 1 13 ⋅ 0 14 ⋅ 0 9⋅6 — 12 ⋅ 4 18 ⋅ 2
f ( x) :
(In millions)
29. (i): Find the missing term in the following table :
x : 16 18 20 22 24 26
y : 39 85 — 151 264 388
f ( x) : 7 ? 13 21 37
and explain why the value obtained is different from that obtained by
putting x = 2 in the expression 2 x + 5 ?
30. Find the successive differences of x 4 − 12 x 3 + 42 x 2 − 30 x + 9, when the
interval of differencing is unity.
N-39
(iv) ( E2 − 3 E + 2) (2 x / h + x)
48. Use the method of separation of symbols to prove the following identities :
(i) Δ n u x = u x + n − n C1 u x + n − 1 + n C2 u x + n − 2 + … + (− 1) n u x .
1 2 1.3 4 1.3.5
(ii) U x − Δ U x −1 + Δ Ux −2 − Δ6 U x − 3 + …
8 8.16 8.16.24
1 1
= U x + 1 /2 − ΔU x + 1 /2 + Δ2 U x + 1 /2 − …
2 4
(iii) U x = U x − 1 + ΔU x − 2 + Δ2 U x − 3 + … + Δn − 1 U x − n + ΔnU x − n .
U0 , U1 , … , U6 , prove that
1 25 (c − b) + 3 (a − c )
U 1 = c +
2 2 256
2
A nswers 1
2. a2 x + (a2 + 1)2 a4 x
x ⋅2x
3. (i) − (ii) − cosec 2 x + 1
( x + 2)!
Δ 2 Δ2 u 6 xh2 + 6h3
26. ⎛⎜ ⎞⎟ u x = 6h2 (3 x − h) and 2 x =
⎝ E⎠ E ux ( x + 2h)3
27. 2 ⋅ 0086
28. (i) 16 ⋅ 1 (ii) 6.60
29. (i) 95 ⋅ 9 (ii) 9 ⋅ 5
30. Δf ( x) = 4 x 3 − 30 x 2 + 52 x + 1, Δ2 f ( x) = 12 x 2 − 48 x + 26,
Δ3 f ( x) = 24 x − 36 and Δ4 f ( x) = 24 .
33. u x = 3 x
x (3)
35.
3
36. f ( x) = x (2) − 2 x (1) + 1 , Δf ( x) = 2 x (1) − 2, Δ2 f ( x) = 2, Δ3 f ( x) = 0
x (4) h
37. + x (3) + x (2) + t( x), where t ( x) is a periodic function of period h
4h 2
x4 5 x3 7 x2 49 x
38. (i) + − + +k
4 6 4 6
x (4) 5 x (3)
(ii) + + 4 x (2) + 12 x (1) + k
4 3
39. a x (a h − 1) n − 2 [ x 2 (a h − 1)2 + n (2hx + h) a h (a h − 1) + n (n − 1) h2 a2 h ]
1
40. [n 2 n − 1 + n (n − 1) 2 n − 2 ]
2
41. f (0 ⋅ 1) = 0 ⋅ 123, f (0 ⋅ 4) = 0 ⋅ 090
42. 0
43. u4 = 0 ⋅ 9999
44. x3 + 3 x2 + 3 x
47. (i) 5h2 + 2hx + 2h − x 2 − 2 x − 1 (ii) 5h2 + 2hx + 2h − x 2 − 2 x − 1
(iii) − h (iv) − h
52. (i) 30 (ii) 537 (iii) 688
(iv) 120 (v) 1
53. f ( x) = 2 x (3) + 3 x (2) + 2 x (1) − 10, Δ f ( x) = 6 x 2 + 2,
Δ2 f ( x) = 12 x + 6, Δ3 f ( x) = 12
54. (i) (2 x + 5) (2 x + 3) (2 x + 1)
1
(ii)
(3 x − 1) (3 x + 2)
55. 755
56. − 8
57. 9
N-43
1⎡ Δ2 Δ3 ⎤ 1⎡ Δ2 Δ3 ⎤
(a) D = ⎢Δ − + −…⎥ (b) D = ⎢Δ + + + …⎥
h⎣ 2! 3! ⎦ h⎣ 2! 3! ⎦
1 ⎡ Δ2 Δ3 ⎤ 1 ⎡ Δ2 Δ3 ⎤
(c) D = ⎢Δ + + + …⎥ (d)D = ⎢Δ − + −…⎥
h ⎣ 2 3 ⎦ h ⎣ 2 3 ⎦
(Garhwal 2010)
7. If E and Δ are operators with their usual meanings, then the relation
between them is
(a) E = 1 + Δ (b) E = 1 + Δ−1
(c) E = 1 − Δ (d) E −1 = 1 + Δ (Garhwal 2010)
n n n−1
8. The value of Δ (ax + bx ) is
(a) n ! (b) an !
(c) (n − 1) ! (d) b (n − 1) !
N-44
1
(a) E = log D (b) E = log (1 + D)
h
(c) E = e hD (d) none of these
2
18. Δ y2 is equal to :
(a) y 4 − y 2 + 1 (b) y4 − 2 y 3 + y 2
(c) y 4 − y 3 − 2 y 2 (d) y4 + 3 y 3 + 2 y 2
19. ∇x 2 is equal to (when h = 1) :
(a) 2x (b) 2 x − 1
(c) 2 x + 1 (d) none of these
20. Δ x (n) is equal to :
(a) nh x n −1 (b) nhx n +1
(c) hx (n −1) (d) hx n +1
21. If Δn − 1 f ( x) = constant and Δ n f ( x) = 0, then the degree of polynomial f ( x)
is :
(a) n (b) (n − 1)
(c) (n + 1) (d) none of these
22. Value of Δ 2 cos 2 x is :
(a) 4 sin2 h cos (2 x + 2h) (b) 4 cos 2 h cos (2 x + 2h)
(c) − 4 sin2 h cos (2 x + 2h) (d) − 4 cos 2 h cos (2 x + 2h)
23. The first forward difference of a constant function is :
(a) constant (b) 0
(c) 1 (d) none of these
24. The value of (1 + Δ)(1 − ∇) is :
(a) 1 (b) − 1
(c) 0 (d) 2
25. The value of E n f ( x) is :
(a) f ( x + h) (b) f ( x + x − 1h)
(c) f ( x + nh) (d) none of these
26. The value of Δ 2 f (a + h) is equal to :
(a) f (a + 3h) + 2 f (a + 2h) + f (a + h)
(b) f (a + 3h) − 2 f (a + 2h) + f (a + h)
(c) f (a + 3h) − 2 f (a + 2h) − f (a + h)
(d) none of these
27. The value of ∇ 2 f (a + 2h) is equal to :
(a) f (a + 2h) − 2 f (a + h) + f (a)
(b) f (a + 2h) − 2 f (a + h) − f (a)
(c) f (a + 2h) + 2 f (a + h) + f (a)
(d) f (a + 2h) + 2 f (a + h) − f (a)
N-46
⎛ Δ2 ⎞ 3
37. The value of ⎜ ⎟ x is :
⎝ E⎠
(a) 3x (b) 6x (c) −6x (d) 8x
5
38. If u0 = 3, u1 = 12, u2 = 81, u3 = 200, u4 = 100, u5 = 8 then Δ u0 is :
(a) 755 (b) 750 (c) 775 (d) 760
39. The missing term in the following table is :
x : 0 1 2 3 4
f ( x) : 1 3 9 … 81
(a) 25 (b) 41
(c) 31 (d) 35
40. If f (0) = − 3, f (1) = 6, f (2) = 8, f (3) = 12, then f (6) is :
(a) 126 (b) 120
(c) 130 (d) 135
41. Value of Δ 2 sin x is :
1 x
(a) −4 sin2 sin( x + 1) (b) −4 sin sin( x + 1)
2 2
2 1
(c) −4 sin sin x (d) none of these
2 (Meerut 2013B)
3 3
42. The value of Δ 0 is :
(a) 2 (b) 4
(c) 6 (d) 8 (Meerut 2013B)
x
43. If h = 1, then Δ 2 is equal to :
(a) 2 x (b) 2 x + 1 − 2
(c) 2 x + 1 − 2 x − 1 (d) 2 x − 1 − 2 x (Meerut 2013B)
2 3
44. ∇ x is equal to (when h = 1) :
(a) 6x (b) 6 x + 6
(c) 6 x + 3 (d) none of these
(Meerut 2013B)
45. If Δ , ∇ and I represent the forward, backward and identity operator
respectively then (I + Δ) (I − ∇) =
(a) I − Δ 2 (b) I − ∇ 2
(c) I (d) Δ ∇ − I (Meerut 2013B)
r x
46. Δ Cn is equal to :
x x
(a) Cr − n (b) Cn − r
x!
(c) (d) none of these
( x − n)! r ! (Meerut 2013B)
N-48
A nswers
Multiple Choice Questions
1. (a) 2. (a) 3. (d) 4. (d) 5. (b)
6. (d) 7. (a) 8. (b) 9. (a) 10. (b)
11. (a) 12. (b) 13. (a) 14. (b) 15. (d)
16. (c) 17. (c) 18. (b) 19. (b) 20. (a)
21. (b) 22. (c) 23. (b) 24. (a) 25. (c)
26. (b) 27. (a) 28. (b) 29. (c) 30. (a)
31. (d) 32. (a) 33. (c) 34. (a) 35. (a)
36. (c) 37. (b) 38. (a) 39. (c) 40. (a)
41. (a) 42. (c) 43. (a) 44. (d) 45. (c)
46. (a)
¨
2
I nterpolation with E qual I ntervals
2.1 Introduction
uppose we are given the values of a function f ( x), i. e., the entries, for a set of
S values of the independent variable x, i. e., the arguments.
Interpolation. The interpolation is defined as the technique of estimating the
value of f ( x) for any intermediate value of the argument.
Theile defines interpolation as “the art of reading between the lines of a table”.
Let us suppose we are given the census figures for the population of India for four
years 1931, 1941, 1951 and 1961 and we want to estimate the figure for any
intermediate year, e. g., for 1955 or 1958, etc. This can be done by applying the
technique of interpolation. The interpolation may be defined as the “technique of
obtaining the most likely estimate of a certain quantity under certain assumptions”.
If the form of the function f ( x) is known, we can find f ( x) for any value of x by
simple substitution. But in case, the form of the function is unknown or if it is quite
complicated, then the problem of determining the nature of the function or
replacing the function by a comparatively simpler one is also the problem of
parabolic or polynomial interpolation.
N-50
x x − 1911 z = ( x − 1911) / 10 y yz z2
1891 − 20 −2 46 − 92 4
1901 − 10 −1 66 − 66 1
1911 0 0 81 0 0
1921 10 1 93 93 1
1931 20 2 101 202 4
Total 0 387 137 10
Then by the method of least squares, we have to minimise
S = Σ ( y − a − bz )2 .
∂S
This gives = 0 ⇒ Σ ( y − a − bz ) = 0 …(1)
∂a
∂S
and = 0 ⇒ Σ ( y − a − bz ) z = 0 …(2)
∂b
i. e., Σ y = na + b Σ z …(3)
N-52
and Σ yz = a Σ z + b Σ z 2 . …(4)
2
Putting the values of Σ y, Σ z , Σ y z , Σ z from the table 1 and putting n = 5 in
equations (3) and (4), we get
387 = 5a + 0 or a = 77 ⋅ 4
and 137 = 0 + 10 b or b = 13 ⋅ 7.
∴ the required fitted polynomial is
y = 77 ⋅ 4 + 13 ⋅ 7 z . …(5)
Now we have to find the population for
1925 − 1911
x = 1925 i. e., for z = = 1⋅ 4.
10
Putting z = 1⋅ 4 in (5), we get
y = 77 ⋅ 4 + (13 ⋅ 7) (1⋅ 4) = 96 ⋅ 58.
Hence the population for the year 1925 is estimated to be 96 ⋅ 58 thousand.
(c) Use of the calculus of finite differences formulae: The study of the use of
finite difference calculus for the purpose of interpolation can be divided into three
cases which are as follows :
(i) The technique of interpolation with equal intervals.
(ii) The technique of interpolation with unequal intervals.
(iii) The technique of central differences.
The use of these methods, though they are approximate, have distinct advantages
over the methods of graphs and curve fitting.
Merits: (i) These methods do not assume the form of the function to be known.
(ii) These methods are less approximate than the method of graphs.
(iii) The calculations remain simple even if some additional observations are
included in the given data.
Drawbacks in the methods: There is no definite rule to verify whether the
assumptions for the application of finite difference calculus are valid for the given
set of observations.
n u (r ) r
= Σ Δ f (a),
r =0 r!
(r )
where u = u (u − 1) (u − 2) … { u − (r − 1)}.
Proof: Since we are known (n + 1) pairs of values of the argument x and the entry
f ( x), therefore f ( x) can be represented as a polynomial in x of degree n.
Let f ( x) = A0 + A1 ( x − a) + A2 ( x − a) ( x − a − h)
+ A3 ( x − a) ( x − a − h) ( x − a − 2h) + …
+ An ( x − a) ( x − a − h) … ( x − a − n − 1 h), …(1)
where A0 , A1 , A2 , … , An are constants.
To find the constants A0 , A1 , A2 , … , An we put successively the values
a, a + h, a + 2h , … , a + nh
in (1) for x. Thus, we get
f (a) = A0 ⇒ A0 = f (a),
f (a + h) − f (a) Δ f (a)
f (a + h) = A0 + A1 h ⇒ A1 = = ,
h h
f (a + 2h) = A0 + 2h A1 + 2h . hA2
f (a + 2h) − 2 [ f (a + h) − f (a)] − f (a)
⇒ A2 =
2h 2
f (a + 2h) − 2 f (a + h) + f (a) 1
= 2
= 2
Δ2 f (a).
2h 2!h
1
Similarly, A3 = Δ3 f (a),
3 ! h3
… … …
1 n
An = n
Δ f (a).
n!h
Putting the values of A0 , A1 , … , An found above in (1), we get
Δ f (a) Δ2 f (a)
f ( x) = f (a) + ( x − a) + ( x − a) ( x − a − h)
h 2 ! h2
Δ3 f (a)
+ ( x − a) ( x − a − h) ( x − a − 2h) + …
3 ! h3
Δn f (a)
+ ( x − a) ( x − a − h) ( x − a − 2h) … ( x − a − n − 1 h).
n ! hn
This is known as Newton-Gregory formula for forward interpolation.
x−a
Putting = u or x = a + hu, the formula takes the form
h
u (u − 1) 2
f (a + uh) = f (a) + u Δ f (a) + Δ f (a)
2!
N-54
u (u − 1) (u − 2) u (u − 1) (u − 2) … (u − n + 1)
+ Δ3 f (a) + … + Δn f (a) …(2)
3! n!
The result (2) can be written as
1 (2) 2
f (a + uh) = f (a) + u(1) Δ f (a) + u Δ f (a) + …
2!
1 (n) n
+ u Δ f (a)
n!
where u(n) = u (u − 1) (u − 2) … (u − n + 1).
This is the form in which Newton-Gregory formula for forward interpolation is
often written.
Note: The reason for the name “forward” interpolation formula lies in the fact
that this formula contains values of the tabulated function from f (a) onward to
the right and none to the left of this value. This formula is used mainly for
interpolating the values of y near the beginning of a set of tabulated values and for
extrapolating values of y a short distance backward (i. e., to the left) from f (a).
Alternative Proof of Newton-Gregory forward difference interpolation
formula.
We have f (a + uh) = E u f (a) = (1 + Δ) u f (a)
⎡ u (u − 1) 2 u (u − 1) … (u − n + 1) n ⎤
= ⎢1 + u Δ + Δ +…+ Δ ⎥ f (a)
⎣ 1. 2 1. 2 . 3 … . n ⎦
[ ∵ f ( x) has been assumed to be a polynomial of degree n, so Δn +1 f (a)
etc.,
will be equal to zero]
u (2) 2 u (n) n
= f (a) + u (1) Δ f (a) + Δ f (a) + … + Δ f (a).
2! n!
Remark: If the first tabulated value of the argument x is 0 and the interval of
differencing h is 1, then by Newton-Gregory forward difference interpolation
formula, we have
x ( x − 1) 2
f ( x) = f (0) + x Δ f (0) + Δ f (0) + …
2!
x ( x − 1) ( x − 2) … ( x − n + 1) n
+ Δ f (0).
n!
(ii) Newton-Gregory Formula for Backward Interpolation:
(Purvanchal 2009; Bundelkhand 11)
If a, a + h, a + 2h, … , a + nh are (n + 1) equidistant values of the argument x so that the
function y = f ( x) assumes the values f (a), f (a + h), f (a + 2h), … , f (a + nh), then
f (a + nh + uh) = f (a + nh) + u ∇ f (a + nh)
u (u + 1) 2 u (u + 1) (u + 2) 3
+ ⋅ ∇ f (a + nh) + ∇ f (a + nh) +
2! 3!
u (u + 1) (u + 2) … (u + n − 1) n
…+ ∇ f (a + nh).
n!
N-55
Proof: Since we are known (n + 1) pairs of values of the argument x and the entry
f ( x), therefore f ( x) can be represented as a polynomial in x of degree n.
Let f ( x) = A0 + A1 ( x − a − nh) + A2 ( x − a − nh) ( x − a − nh + h)
+ A3 ( x − a − nh) ( x − a − nh + h) ( x − a − nh + 2h)
+ … + An ( x − a − nh) ( x − a − nh + h) … ( x − a − h),
…(1)
where A0 , A1 , … , An are constants.
To find the constants A0 , A1 , A2 , … , An we put successively the values
a + nh, a + (n − 1) h, a + (n − 2) h, … , a + h, a
in (1) for x. Thus, we get
f (a + nh) = A0 or A0 = f (a + nh),
f (a + nh − h) = A0 + A1 (− h)
f (a + nh) − f (a + nh − h) 1
or A1 = = ∇ f (a + nh),
h h
f (a + nh − 2h) = A0 + A1 (−2h) + A2 (−2h) (− h)
− A0 + 2 A1 h + f (a + n − 2h)
or A2 =
2h 2
− f (a + nh) + 2 [ f (a + nh) − f (a + nh − h)] + f (a + n − 2h)
=
2h 2
f (a + nh) − 2 f (a + n − 1 h) + f (a + n − 2h)
=
2 h2
1
= 2
∇ 2 f (a + nh).
2!h
1 1
Similarly, A3 = ∇ 3 f (a + nh), … , An = ∇ n f (a + nh).
3 ! h3 n ! hn
Substituting the values of A0 , A1 , … , An in (1), we get
∇f (a + nh)
f ( x) = f (a + nh) + ( x − a + nh )
h
∇ 2 f (a + nh)
+ ( x − a + nh ) ( x − a + nh − h ) + …
2 ! h2
∇ n f (a + nh)
+ ( x − a + nh ) ( x − a + nh − h ) … ( x − a − h).
n ! hn
This is Newton-Gregory formula for backward interpolation.
x − (a + nh)
Putting u=
h
or x = a + nh + uh, we get
N-56
Example 1: From the following table of yearly premiums for policies maturing at
quinquennial ages, estimate the premiums for policies maturing at the age of 46 years.
Age x : 45 50 55 60 65
Premium f ( x): 2⋅871 2⋅404 2⋅083 1⋅862 1⋅712
Age x Premium Δf ( x) Δ2 f ( x) Δ3 f ( x) Δ4 f ( x)
f ( x)
45 2 ⋅ 8710
− 0 ⋅ 467
50 2⋅4040 0 ⋅ 146
− 0 ⋅ 321 − 0 ⋅ 046
60 1⋅8620 0⋅071
− 0 ⋅ 150
65 1⋅7120
Example 2: From the following table, estimate the number of students who obtained marks
between 40 and 45.
30 – 40 31
40 – 50 42
50 – 60 51
60 – 70 35
70 – 80 31
x f ( x) Δ f ( x) Δ2 f ( x) Δ3 f ( x) Δ4 f ( x)
40 31
42
50 73 9
51 −25
60 124 −16 37
35 12
70 159 −4
31
80 190
We shall find :
f (45) = number of students with marks less than 45.
Taking a + uh = 45, we get
1
40 + u × 10 = 45 ⇒ u = ⋅
2
Using Newton’s formula for forward interpolation, we get
2
1 Δ f (40)
Δf (40) + ⎛⎜ − ⎞⎟
1 1
f (45) = f (40) +
2 2 ⎝ 2⎠ 2!
3 4
1 ⎛ 1⎞ ⎛ 3⎞ Δ f (40) 1 ⎛ 1⎞ ⎛ 3⎞ ⎛ 5⎞ Δ f (40)
+ ⎜− ⎟ ⎜− ⎟ + ⎜− ⎟ ⎜− ⎟ ⎜− ⎟
2 ⎝ 2⎠ ⎝ 2⎠ 3! 2 ⎝ 2⎠ ⎝ 2⎠ ⎝ 2⎠ 4!
× 42 + ⎛⎜ − ⎞⎟ × 9 + ⎛⎜ − ⎞⎟ ⎛⎜ − ⎞⎟
1 1 1 1 1 1 3 1
= 31 + (− 25)
2 2 ⎝ ⎠
2 2! 2 ⎝ 2 ⎠ ⎝ 2⎠ 3 !
1 ⎛ 1⎞ ⎛ 3⎞ ⎛ 5⎞ 1
+ ⎜− ⎟ ⎜− ⎟ ⎜− ⎟ × 37
2 ⎝ 2⎠ ⎝ 2⎠ ⎝ 2⎠ 4 !
= 47 ⋅ 868 (on simplification).
Hence the number of students with marks less than 45 is 47 ⋅ 868 i. e., 48.
But the number of students with marks less than 40 is 31.
N-59
Population : 12 15 20 27 39 52
(in thousands)
Year Population Δy Δ2 y Δ3 y Δ4 y Δ5 y
x y
1911 12
3
1921 15 2
5 0
1931 20 2 3
7 3 −10
1941 27 5 −7
12 −4
1951 39 1
13
1961 52
45° 0 ⋅ 7071
0 ⋅ 0589
50 ° 0⋅7660 −0 ⋅ 0057
0⋅0532 −0 ⋅ 0007
55° 0⋅8192 −0 ⋅ 0064
0⋅0468
60 ° 0⋅8660
We want f (52° ) = f (a + uh), say.
7
∴ 52° = a + uh ⇒ 52° = 45° + u × 5° ⇒ u = = 1⋅ 4.
5
By Newton’s forward interpolation formula, we get
u (u − 1) 2
f (a + uh) = f (a) + u Δ f (a) + Δ f (a)
2!
u (u − 1) (u − 2)
+ Δ3 f (a).
3!
(1⋅ 4) (0 ⋅ 4)
∴ f (52° ) = f (45° ) + 1⋅ 4 Δ f (45° ) + Δ2 f (45° )
2!
(1⋅ 4) (0 ⋅ 4) (− 0 ⋅ 6)
+ Δ3 f (45° )
3!
(1⋅ 4) (0 ⋅ 4)
= 0 ⋅ 7071 + 1⋅ 4 × 0 ⋅ 0589 + (− 0 ⋅ 0057)
2!
(1⋅ 4) (0 ⋅ 4) (− 0 ⋅ 6)
+ × (− 0 ⋅ 0007)
3!
= 0 ⋅ 7071 + 0 ⋅ 08246 − 0 ⋅ 001596 + 0 ⋅ 0000392 = 0 ⋅ 7880032 .
Thus sin 52° = 0 ⋅ 7880032 = 0 ⋅ 7880 approx.
N-61
Example 5: Using Newton’s formula for interpolation, estimate the population for the year
1905 :
Year Population
1891 98752
33533
1901 132285 2258
35791 − 10435
1911 168076 − 8177 41358
27614 30923
1921 195690 22746
50360
1931 246050
x−a 1905 − 1891
Here a = 1891, u = = = 1⋅ 4.
h 10
By Newton’s interpolation formula, we have
(1⋅ 4) (0 ⋅ 4)
f (1905) = 98725 + (1⋅ 4) (33533) + (2258)
2!
(1⋅ 4) (0 ⋅ 4) (− 0 ⋅ 6) (1⋅ 4) (0 ⋅ 4) (− 0 ⋅ 6) (− 1⋅ 6)
+ (− 10435) + (41358)
3! 4!
= 98752 + 46946 ⋅ 2 + 632 ⋅ 24 + 584 ⋅ 36 + 926 ⋅ 42
= 147841 approximately.
Example 6: The area A of a circle of diameter d is given for the following values :
d: 80 85 90 95 100
A: 5026 5674 6362 7088 7854
Find approximate values for the areas of circles of diameters 82 and 91 respectively.
Solution: First we shall find the value of A corresponding to d = 82 . Let
A = f (d ).
N-62
0 46
20
1 66 −5
15 2
2 81 −3 −3
12 −1
3 93 −4
8
4 101
Since five values are given, we must assume that fourth differences are constant.
1925 − 1891
We want the entry for x = 1925, i. e., for u = = 3 ⋅ 4.
10
We have
y3⋅4 = E3⋅4 y0 = (1 + Δ)3⋅4 y0
3⋅4 × 2⋅4 2 3 ⋅ 4 × 2 ⋅ 4 × 1⋅ 4 3
= y0 + 3 ⋅ 4 Δ y0 + Δ y0 + Δ y0
1× 2 1× 2 × 3
3 ⋅ 4 × 2 ⋅ 4 × 1⋅ 4 × ⋅ 4
+ Δ4 y0
1× 2 × 3 × 4
3⋅4 × 2⋅4 3 ⋅ 4 × 2 ⋅ 4 × 1⋅ 4
= 46 + 3 ⋅ 4 × 20 + (−5) + ×2
2 6
3 ⋅ 4 × 2 ⋅ 4 × 1⋅ 4 × ⋅ 4
+ (−3)
24
= 46 + 68 − 20 ⋅ 4 + 3 ⋅ 808 − 0 ⋅ 5712 = 96 ⋅ 8368 thousand.
Hence the population for 1925 is estimated to be 96 ⋅ 84 thousand.
Example 8: If l x represents the numbers living at age x in a life table, find accurately as data
will permit, l x for values of x = 35, 42 , 47 ; given l20 = 512 , l30 = 439, l40 = 346 and
l50 = 243.
Solution: For the given values the difference table is as follows :
x l x = f ( x) Δ lx Δ2 l x Δ3 l x
20 512
− 73
30 439 − 20
− 93 10
40 346 − 10
− 103
50 243
N-64
Wages in ` Frequency
0 – 10 9
10 – 20 30
20 – 30 35
30 – 40 42
10 9
20 39
30 74
40 116
x f ( x) Δf ( x) Δ2 f ( x) Δ3 f ( x)
10 9
30
20 39 5
35 2
30 74 7
42
40 116
× 30 + ⎛⎜ − ⎞⎟ × 5 + ⎛⎜ − ⎞⎟ ⎛⎜ − ⎞⎟
1 1 1 1 1 1 3 1
=9+ ×2
2 2 ⎝ ⎠
2 2! 2 ⎝ 2 ⎠ ⎝ 2⎠ 3 !
= 9 + 15 − 0 ⋅ 625 + 0 ⋅ 125
= 23 ⋅ 5
= 24 nearly.
Therefore no. of persons getting wages between ` 10 and ` 15
= 24 − 9 = 15.
N-66
Example 10: Use Newton formula for interpolation to find the net premium at the age 25
from the table given below :
20 0⋅01427
24 0⋅01581
28 0⋅01772
32 0⋅01996
20 0 ⋅ 01427
0 ⋅ 00154
24 0⋅01581 0 ⋅ 00037
0⋅00191 −0 ⋅ 00004
28 0⋅01772 0⋅00033
0⋅00224
32 0⋅01996
We have to find f (25) = f (a + uh), (say).
5
∴ 25 = a + uh ⇒ 25 = 20 + u × 4 ⇒ u = ⋅
4
∴ u = 1⋅ 25.
By Newton’s formula, we get
u (u − 1)
f (a + uh) = f (a) + u Δf (a) + Δ2 f (a)
2!
u (u − 1) (u − 2)
+ Δ3 f (a)
3!
[Leaving higher order differences]
(1⋅ 25) (1⋅ 25 − 1) 2
∴ f (25) = f (20) + (1⋅ 25) × Δf (20) + Δ f (20)
2!
(1⋅ 25) (1⋅ 25 − 1) (1⋅ 25 − 2)
+ Δ3 f (20)
3!
(1⋅ 25) (⋅25)
= 0 ⋅ 01427 + (1⋅ 25) (0 ⋅ 00154) + (0 ⋅ 00037)
2
(1⋅ 25) (⋅25) (− 0 ⋅ 75)
+ (− 0 ⋅ 00004)
6
= 0 ⋅ 01427 + 0 ⋅ 001925 + 0 ⋅ 0000578 + 0 ⋅ 0000016
= 0 ⋅ 0162544 = 0 ⋅ 01625 approx.
N-67
Example 11: The following are the numbers of deaths in four successive ten year age groups.
Find the number of deaths at 45 – 50 and 50 – 55.
Age group : 25 – 35 35 – 45 45 – 55 55 – 65
Deaths : 13229 18139 24225 31496
(Bundelkhand 2012)
Solution: First we shall form the cumulative frequency table.
Age above 25 and below No. of deaths
x f ( x)
35 13229
45 31368
55 55593
65 87089
The difference table is as under :
x f ( x) Δf ( x) Δ2 f ( x) Δ3 f ( x)
35 13229
18139
45 31368 6086
24225 1185
55 55593 7271
31496
65 87089
First we shall find f (50) i. e., the no. of deaths above the age 25 and below 50.
x − a 50 − 35
Here u = = = 1⋅ 5.
h 10
By Newton’s formula, we get
(1⋅ 5) (1⋅ 5 − 1)
f (50) = f (35) + (1⋅ 5) Δf (35) + Δ2 f (35)
2!
(1⋅ 5) (1⋅ 5 − 1) (1⋅ 5 − 2)
+ Δ3 f (35)
3!
(1⋅ 5) (⋅5) (1⋅ 5) (⋅5) (− ⋅ 5)
= 13229 + (1⋅ 5) (18139) + × 6086 + × (1185)
2 6
= 13229 + 27208 ⋅ 5 + 2282 ⋅ 25 − 74 ⋅ 0625 = 2646 .
Hence the required number of deaths between 45 and 50
= 42646 − 31368 = 11278.
Therefore the number of deaths between 50 and 55
= 24225 − 11278 = 12947.
N-68
x f ( x) ∇f ( x) ∇2 f ( x) ∇3 f ( x)
1 1
7
2 8 12
19 6
3 27 18
37 6
4 64 24
61 6
5 125 30
91 6
6 216 36
127 6
7 343 42
169
8 512
Since ∇ 3 f ( x) is constant, so we can leave higher order differences.
By Newton’s backward interpolation formula,
u (u + 1)
f (a + nh + uh) = f (a + nh) + u ∇f (a + nh) + ∇ 2 f (a + nh)
2!
u (u + 1) (u + 2)
+ ∇ 3 f (a + nh).
3!
(− 0 ⋅ 5) (− 0 ⋅ 5 + 1)
∴ f (7 ⋅ 5) = f (8) + (− 0 ⋅ 5) ∇f (8) + ∇ 2 f (8)
2
(− 0 ⋅ 5) (− 0 ⋅ 5 + 1) (− 0 ⋅ 5 + 2)
+ ∇ 3 f (8)
6
N-69
(− 0 ⋅ 5) (0 ⋅ 5) (− 0 ⋅ 5) (0 ⋅ 5) (1⋅ 5)
= 512 + (− 0 ⋅ 5) × 169 + × 42 + ×6
2 6
= 512 − 84 ⋅ 5 − 5 ⋅ 25 − ⋅ 375 = 421⋅ 875.
Example 13: A second degree polynomial passes through (0, 1), (1, 3), (2 , 7) and (3, 13).
Find the polynomial.
Solution: The difference table is as follows :
x f ( x) Δf ( x) Δ2 f ( x) Δ3 f ( x)
0 1
2
1 3 2
4 0
2 7 2
6
3 13
u (u − 1)
We know that f (a + uh) = f (a) + u Δf (a) + Δ2 f (a),
2!
expanding upto second order differences only.
Put a = 0, h = 1, u = x, so that
x ( x − 1) x ( x − 1)
f ( x) = f (0) + x Δf (0) + Δ2 f (0) = 1 + x × 2 + ×2
2! 2!
= 1 + 2 x + x 2 − x = x 2 + x + 1.
Example 14: The following table is given :
x : 0 1 2 3 4
f ( x) : 3 6 11 18 27
What is the form of the function f ( x) ? (Rohilkhand 2002; Bundelkhand 11)
Solution: The difference table for the given data is as follows :
x f ( x) Δf ( x) Δ2 f ( x) Δ3 f ( x)
0 3
3
1 6 2
5 0
2 11 2
7 0
3 18 2
9
4 27
Here, the interval of differencing h is 1. We have
N-70
f ( x) = E x f (0) = (1 + Δ) x f (0)
⎡ x ( x − 1) 2 ⎤
= ⎢1 + xΔ + Δ ⎥ f (0)
⎣ 2! ⎦
[ ∵ Third and higher differences of f ( x) are all zero]
x ( x − 1)
= f (0) + x Δf (0) + Δ2 f (0)
2!
x ( x − 1)
=3+ x×3+ ×2
2!
= x 2 + 2 x + 3.
Example 15: Show that Newton-Gregory interpolation formula can be put in the form
u x = u0 + x Δu0 − ax Δ2 u0 + abx Δ3 u0 − abc x Δ4 u0 + …
1 1 1
where a =1− ( x + 1), b = 1 − ( x + 1), c = 1 − ( x + 1) etc.
2 3 4
1
Solution: Here, a = 1 − ( x + 1).
2
1 1
∴ − a = ( x + 1) − 1 = ( x − 1).
2 2
1 1 1
Also b = 1 − ( x + 1). ∴ − b = ( x + 1) − 1 = ( x − 2).
3 3 3
1 1
Similarly − c = ( x − 3), − d = ( x − 4), etc.
4 5
Newton-Gregory interpolation formula gives
x x ( x − 1) 2 x ( x − 1)( x − 2) 3
u x = u0 + Δu0 + Δ u0 + Δ u0
1! 2! 3!
x ( x − 1) ( x − 2) ( x − 3)
+ Δ4 u0 + …
4!
⎛ x − 1⎞ 2 ⎛ x − 1⎞ ⎛ x − 2⎞ 3
= u0 + x Δu0 + x ⎜ ⎟ Δ u0 + x ⎜ ⎟ ⎜ ⎟ Δ u0
⎝ 2 ⎠ ⎝ 2 ⎠ ⎝ 3 ⎠
⎛ x − 1⎞ ⎛ x − 2⎞ ⎛ x − 3⎞ 4
+ x⎜ ⎟ ⎜ ⎟ ⎜ ⎟ Δ u0 + …
⎝ 2 ⎠ ⎝ 3 ⎠ ⎝ 4 ⎠
= u0 + x Δu0 + x (− a) Δ2 u0 + x (− a) (− b) Δ3 u0
+ x (− a) (− b) (− c ) Δ4 u0 + …
Find u1 .
Solution: Here we are given the cumulative function, say F ( x). We are given
10 10
F (1) = Σ u x = 500426 , F (4) = Σ u x = 329240,
1 4
10
F (7) = Σ u x = 175212 , F (10) = u10 = 40365.
7
1 500426
−171186
4 329240 17158
−154028 2023
7 175212 19181
−134847
10 40365
10
Now we shall find F (2) = Σ u x .
2
1
Taking a + xh = 2 , we get 1 + 3 . x = 2 ⇒ x = ⋅
3
By Newton’s formula, we get
= 500426 +
1
(− 171186) + ⎛⎜ 1⎞⎟ ⎛⎜ − 2⎞⎟ 1 × 17158
3 ⎝ 3⎠ ⎝ 3⎠ 2 !
+ ⎛⎜ ⎞⎟ ⎛⎜ − ⎞⎟ ⎛⎜ − ⎞⎟ ⋅
1 2 5 1
× 2023
⎝ 3⎠ ⎝ 3⎠ ⎝ 3⎠ 3 !
= 441582 ⋅ 432 .
10 10
Hence u1 = Σ u x − Σ u x = F (1) − F ( 2 )
1 2
Comprehensive Exercise 1
Marks : 0 – 19 20 – 39 40 – 59 60 – 79 80 – 99
No. of candidates : 41 62 65 50 17
x : 3 5 7 9 11
y = f ( x) : 6 24 58 108 174
x : 1 ⋅ 15 1 ⋅ 16 1 ⋅ 17 1 ⋅ 18 1 ⋅ 19
x : 0 5 10 15 20 25
y : 7 11 14 18 24 32
11. The following are the marks obtained by 492 candidates in a certain
examination.
Marks : No. of candidates
0 – 40 210
40 – 45 43
45 – 50 54
50 – 55 74
55 – 60 32
60 – 65 79
Age (years) x : 10 15 20 25 30 35
Premium f ( x) : 3 ⋅ 54 3 ⋅ 22 2 ⋅ 91 2 ⋅ 60 2 ⋅ 31 2 ⋅ 04
13. Estimate the sale for 1966 using the following table :
Sale in thousands : 12 15 20 27 39 52
x : 0 ⋅1 0 ⋅2 0 ⋅3 0 ⋅4 0 ⋅5
x
e : 1 ⋅ 10517 1 ⋅ 2140 1 ⋅ 34986 1 ⋅ 49182 1 ⋅ 64872
A nswers 1
3. 30 ; r (r − 1) 4. 196
5. u15 = 19 ⋅ 75 6. 2 x 2 − 7 x + 9
8. 54 ⋅ 85 thousands 9. 0 ⋅ 92831
10. 13 approx 11. (a) 31, (b) 27
12. 3 ⋅ 41 13. 32 ⋅ 3436
14. (a) 1⋅ 2701 (b) 1⋅ 5083 15. 3 ⋅ 52829 approx
(a) x 2 + 2 x + 3 (b) x 2 + 2 x + 1
(c) x 2 + 2 x + 5 (d) x 2 + 2 x + 4. (Meerut 2013B)
1 1 n
(a) n
Δ n f ( x0 ) (b) Δ f ( x0 )
n! h n!
11. The cubic polynomial which takes the following values y(0)=1, y(1)=0,
y(2)=1 and y(3)=10 is given by :
(a) x 3 − 2 x 2 + 1 (b) x 3 − 2 x 2 − 1
(c) x 3 + 2 x 2 + 1 (d) x 3 + 2 x 2 − 1
13. The number of men getting wages between ` 10 and ` 15 from the
following table are :
Wages in ` : 0 − 10 10 − 20 20 − 30 30 − 40
Frequency : 9 30 35 42
(a) 15 (b) 24
(c) 20 (d) 18
15. The following are the numbers of deaths in four successive ten year age
groups
Age group : 25 – 35 35 – 45 45 – 55 55 – 65
Deaths : 13229 18139 24225 31496
The number of deaths at 45 – 50 is :
(a) 12270 (b) 11278
(c) 11272 (d) 13275
16. If f (3) = 3, f (4) = 6 .6, f (5) = 15, f (6) = 2, f (7) = 37, then f (3 .5) is :
18. If x : 1 2 3 4
f ( x) : 1 8 27 64
then f(2.25) is :
(a) 13.630 (b) 14.620
(c) 15.625 (d) 16.600
19. For finding a tabulated value near the beginning of the data for equal
intervals, we prefer to use :
(a) Newton's backward interpolation formula
(b) Newton's forward interpolation formula
(c) Divided difference formula
(d) Lagrange's interpolation formula (Meerut 2013B)
20. For finding a tabulated value near the end of the data for equal intervals, we
prefer to use :
(a) Newton's backward interpolation formula
(b) Newton's forward interpolation formula
(c) Divided difference formula
(d) Lagrange's interpolation formula
N-78
A nswers
¨
3
I nterpolation with U nequal
I ntervals of the A rgument
3.1 Introduction
he interpolation formulae derived in the preceding chapter are applicable
T only when the values of the function are given at equidistant intervals of the
independent variable or argument. It is sometimes inconvenient, or even
impossible, to obtain values of a function at equidistant values of its argument,
and in such cases it is desirable to have interpolation formulae which are
applicable when the functional values are given at unequal intervals of the
argument. Two such formulae are Newton’s formula for unequal intervals of the
argument and Lagrange’s formula. The former employs differences, but the latter
does not. The differences used in the Newton formula are called divided differences
which are differences obtained in the usual manner and then divided by certain
differences of the values of the argument. Hence the name.
equal, i. e., not necessarily equally spaced. Then the first divided difference of f ( x) for
the arguments x0 , x1 is defined as
f ( x1 ) − f ( x0 ) f ( x0 ) − f ( x1 )
or
x1 − x0 x0 − x1
and is denoted by f ( x0 , x1 ) or by Δ| f ( x0 ).
x1
Similarly the other first divided differences of f ( x) for the arguments
x1 , x2 ; x2 , x3 ; … , x n −1 , x n are
f ( x2 ) − f ( x1 )
f ( x1 , x2 ) = = Δ| f ( x1 )
x2 − x1 x2
f ( x3 ) − f ( x2 )
f ( x2 , x3 ) = = Δ| f ( x2 )
x3 − x2 x3
… … … …
f ( x n ) − f ( x n −1 )
f ( x n −1 , x n) = = Δ| f ( x n−1 ).
x n − x n −1 xn
f ( x1) − f ( x0 )
=
x1 − x0 f ( x0 , x1, x2 )
f ( x1 , x2 ) − f ( x0 , x1)
=
x2 − x0
x1 f ( x1) f ( x1, x2 ) f ( x0 , x1, x2 , x3 )
f ( x3 ) − f ( x2 ) f ( x2 , x3 , x4 ) − f ( x1, x2 , x3 )
= =
x3 − x2 f ( x2 , x3 , x4 ) x4 − x1
f ( x3 , x4 ) − f ( x2 , x3 )
=
x4 − x2
x3 f ( x3 ) f ( x3 , x4 )
f ( x4 ) − f ( x3 )
=
x4 − x3
f ( x0 ) f ( x1 ) [( x1 − x0 ) − ( x1 − x2 )] f ( x2 )
= + +
( x0 − x1 ) ( x0 − x2 ) ( x2 − x0 ) ( x1 − x2 ) ( x1 − x0 ) ( x2 − x0 ) ( x2 − x1 )
f ( x0 ) f ( x1 ) f ( x2 )
= + +
( x0 − x1 )( x0 − x2 ) ( x1 − x0 )( x1 − x2 ) ( x2 − x0 )( x2 − x1 )
f ( x0 )
or f ( x0 , x1 , x2 ) = Σ ,
( x0 − x1 )( x0 − x2 )
showing that f ( x0 , x1 , x2 ) is symmetrical in x0 , x1 , x2 .
Let us assume similar symmetrical expressions for the (n − 1th ) divided differences
i. e., let us assume that
f ( x0 )
f ( x0 , x1 , … , x n−1 ) =
( x0 − x1 ) … ( x0 − x n −1 )
f ( x1 )
+
( x1 − x0 ) ( x1 − x2 ) … ( x1 − x n−1 )
f ( x n −1 )
+…+
( x n −1 − x0 ) ( x n −1 − x1 ) … ( x n −1 − x n − 2 )
f ( x0 )
=Σ ,
( x0 − x1 ) … ( x0 − x n −1 )
1 ⎡⎧⎪ f ( x0 ) f ( x1 )
= ⎢⎨ + +…
( x0 − x n ) ⎢⎣⎪⎩ 0
( x − x1 ) … ( x 0 − x n −1 ) ( x1 − x 0 … ( x1 − x n−1 )
)
f ( x n−1 ) ⎪⎫
+ ⎬
( x n −1 − x0 ) … ( x n −1 − x n − 2 )⎪
⎭
⎧ f ( x1 ) f ( x2 )
−⎨ + +…
⎩ ( x1 − x2 ) … ( x1 − x n ) ( x2 − x1 ) … ( x2 − x n )
f (x n) ⎫⎪ ⎤
+ ⎬⎥
( x n − x1 ) … ( x n − x n −1 )⎪ ⎥
⎭⎦
f ( x0 ) f ( x1 )
= + +…
( x0 − x1 ) … ( x0 − x n ) ( x1 − x0 ) … ( x1 − x n )
f (x n) f ( x0 )
+ =Σ ,
( x n − x0 ) … ( x n − x n −1 ) ( x0 − x1 ) … ( x0 − x n )
Thus we see that a divided difference is a symmetrical function of all the arguments
involved and it follows that for any function f ( x) the value of a divided difference
remains unaltered when any of the arguments involved are interchanged, i. e., the
value of a divided difference depends only on the values of the arguments involved
and not on the order in which they are taken. Thus
f ( x0 , x1 ) = f ( x1 , x0 ), f ( x0 , x1 , x2 ) = f ( x1 , x0 , x2 )
= f ( x2 , x1 , x0 ) = … , and so on.
Theorem 2: The nth divided differences of a polynomial of the nth degree are constant.
(Garhwal 2010; Bundelkhand 11)
Proof: First consider the function f ( x) = x n . The first divided differences of this
function are given by
n
f ( x r +1 ) − f ( x r ) x r +1 − x r n
f ( x r , x r +1 ) = =
x r +1 − x r x r +1 − x r
n −1 n−2
= x r +1 + x r x r +1 + … + x r n − 2 x r +1 + x r n −1 ,
Hence if f ( x) = a0 x n
+ a1 x n −1 + … + a n −1 x + a n be a polynomial of degree n, then
the nth divided differences of all the terms except a0 x n will be zero and so the nth
divided difference of the whole polynomial will be constant.
Theorem 3: The nth divided difference can be expressed as the quotient of two
determinants each of order n + 1.
Proof : Let us consider the third divided difference.
f ( x0 )
We have f ( x0 , x1 , x2 , x3 ) = Σ
( x0 − x1 ) ( x0 − x2 ) ( x0 − x3 )
Σ [ f ( x0 ) ⋅ (difference - product of x1 , x2 , x3 )
=
difference - product of x0 , x1 , x2 , x3
By the theorem of determinants due to Vander-Monde,
⏐ x12 x2 2 x3 2 ⏐
the difference product of x1 , x2 , x3 = ⏐ x1 x2 x3 ⏐⋅
⏐ ⏐
⏐ 1 1 1 ⏐
Therefore,
⏐ f ( x0 ) f ( x1 ) f ( x2 ) f ( x3 )⏐
⏐ x 2 x1 2
x2 2 x3 2 ⏐
or f ( x0 , x1 , x2 , x3 ) = ⏐ 0 ⏐
⏐ x x1 x2 x3 ⏐
⏐ 0 ⏐
⏐ 1 1 1 1 ⏐
x03 x13 x23 x33
x 2 x12 x22 x32
÷ 0
x0 x1 x2 x3
1 1 1 1
Thus the third divided difference has been expressed as the quotient of two
determinants each of order 4.
Proceeding the same way, we can express the higher order differences as the
quotient of two determinants each of order one more than the order of the
difference.
Theorem 4: The divided differences can be expressed as the product of multiple integrals
i. e.,
1 t1 t2 tn − 2 n −1
f ( x1 , x2 , … , x n ) = ∫0 dt1 ∫0 dt2 ∫0 dt3 … ∫
0
f (un ) dt n−1
N-85
1
⎡ f {(1 − t1 ) x1 + t1 x2 } ⎤
=⎢ ⎥
⎣ x2 − x1 ⎦0
f ( x2 ) − f ( x1 )
= = f ( x1 , x2 )
x2 − x1
= the L.H.S.
Again for n = 3,
1 t1
the R.H.S. = ∫0 dt1 ∫0 f ′ ′ (u3 ) dt2
1 1
= ∫0 dt1 ∫0 f ′ ′ {(1 − t1 ) x1 + (t1 − t2 ) x2 + t2 x3 } dt2
1 t
= ∫0 dt1 [ f ′ {(1 − t1 ) x1 + (t1 − t2 ) x2 + t2 x3 }]01 / ( x3 − x2 )
1 ⎡ f ′ {(1 − t1 ) x1 + t1 x2 } dt1 ⎤
1 1
=
x3 − x2 ⎢⎣ ∫0 f ′ {(1 − t1 ) x1 + t1 x3 } dt1 − ∫0 ⎥⎦
1 1
= [ f ( x3 ) − f ( x1 )] −
( x3 − x2 ) ( x3 − x1 ) ( x3 − x2 ) ( x2 − x1 )
[ f ( x2 ) − f ( x1 )]
f ( x1 ) f ( x2 ) f ( x3 )
= + +
( x1 − x2 ) ( x1 − x3 ) ( x2 − x1 ) ( x2 − x3 ) ( x3 − x1 ) ( x3 − x2 )
= f ( x1 , x2 , x3 )
= the L.H.S.
Thus the result is true for n = 2 and n = 3.
Now let the result be true for n arguments. We shall show that it is also true for
(n + 1) arguments.
tn − 1
∫0
n
We have f (un +1 ) dt n
tn − 1
∫0
n
= f {(1 − t1 ) x1 + (t1 − t2 ) x2 + … + (t n −1 − t n ) x n + t n x n+1 } dt n
1 n −1
= [f { (1 − t1 ) x1 + (t1 − t2 ) x2 + … + (t n −1 − t n ) x n
x n +1 − x n
t
+ t n x n +1 }]0n − 1
N-86
1 n −1
= [f { (1 − t1 ) x1 + … + (t n − 2 − t n −1 ) x n −1 + t n −1 x n }
x n − x n +1
n −1
− f { (1 − t1 ) x1 + … + (t n − 2 − t n −1 ) x n −1 + t n −1 x n +1 }] ⋅
1 t1 tn − 1
∫0 ∫0 dt2 … ∫ n
∴ dt1 f (un +1 ) dt n
0
f ( x1 , x2 , … , x n ) − f ( x1 , x2 , … , x n−1 , x n+1 )
=
x n − x n +1
f ( x n , x2 , … , x1 ) − f ( x n , x2 , … , x n−1 , x n+1 )
=
x1 − x n +1
[interchanging x1 and x n ]
f ( x1 , x2 , … , x n ) − f ( x2 , x3 , … , x n , x n +1 )
= = f ( x1 , x2 , … , x n +1 ).
x1 − x n +1
Thus the result is true for (n + 1) arguments. We have already shown that the result
is true for 2 and 3 arguments. Hence by mathematical induction the result is true
for n arguments where n is any +ive integer.
f ( x, x0 , x1 , … , x n−1 ) = f ( x0 , x1 , … , x n ) + ( x − x n ) f ( x, x0 , x1 , … , x n ) …(4)
Multiplying the equation (2) by ( x − x0 ), (3) by ( x − x0 ) ( x − x1 ) and so on and
finally the equation (4) by ( x − x0 ) ( x − x1 ) … ( x − x n −1 ) and adding to the
equation (1), we have
f ( x) = f ( x0 ) + ( x − x0 ) f ( x0 , x1 ) + ( x − x0 ) ( x − x1 ) f ( x0 , x1 , x2 )
+ …+ ( x − x0 ) ( x − x1 ) … ( x − x n−1 ) f ( x0 , x1 , … , x n ) + Rn ,
N-87
1
Similarly f ( x0 , x1 , … , x n ) = Δn f ( x0 ).
n ! hn
Substituting these values of the divided differences in Newton’s formula i. e., the
equation (5) of article 3.4, we get
uh uh (uh − h) 2
f ( x0 + uh) = f ( x0 ) + Δ f ( x0 ) + Δ f ( x0 ) + …
1! h 2 ! h2
+ ( x − x0 ) ( x − x1 ) … ( x − x n−1 ) Δ| n f ( x0 ) …(1)
x1 , …, x n
In (1), put
x − x0 = X 0 , x − x1 = X1 , … , x − x n −1 = X n −1 .
Then, we have
f ( x) = f ( x0 ) + X 0 Δ| f ( x0 ) + X 0 X1 Δ| 2 f ( x0 )
x1 x1 , x2
+ … + X 0 … X n−1 Δ| n f ( x0 ) …(2)
x1 , …, x n
In the R.H.S. of (2) we observe that the coefficients of various terms are written in
capital letters X 0 , X1 , … , etc. and the suffixes of the operator and the operand are
given in small letters x0 , x1 etc. In the first term of R.H.S. of (2), the coefficient of
f ( x0 ) is one and the suffix of the operand is x0 . In the second term, the coefficient
is X 0 and there are two suffixes x0 and x1 in the operator and the operand. In the
third term the coefficient consists of two letters X 0 , X1 and there are three suffixes
x0 , x1 and x2 in the operator and operand and so on. We conclude from this that
small letters in each term of R.H.S. of (2) are one more in number than the number
of capital letters. Now we give the small and capital letters term by term.
Small letters : x0 x0 x1 x0 x1 x2 … x0 x1 … xn−1 xn
Capital letters : 1 X0 X0 X1 … X0 X1 … X n−1.
This characteristic of Newton’s divided difference formula has given rise to a rule
which is called Sheppard’s rule or Zigzag rule, and is as follows :
(i) Start with any initial term.
(ii) In order to get the second term take any first order difference, either moving
upwards or downwards in the divided difference table, which contains the
suffix of the initial term and multiply this first order difference by the term
obtained by subtracting from x the value of the suffix of the initial term.
(iii) In the same way find the third term, keeping in mind the suffixes of second
term. In this way complete the formula.
The rule will be clear from the following example.
N-89
x0 f ( x0 )
Δ| f ( x0 )
x1
x1 f ( x1) Δ| 2 f ( x0 )
x1 x2
Δ| f ( x1) Δ| 3 f ( x0 )
x2 x1 x2 x3
x2 f ( x2 ) Δ| 2 f ( x1) Δ| 4 f ( x0 )
x2 x3 x1 x2 x3 x4
Δ| f ( x2 ) Δ| 3 f ( x1)
x3 x2 x3 x4 Δ| 5 f ( x0 )
x1 x2 x3 x4 x5
x3 f ( x3 ) Δ| 2 f ( x2 ) Δ| 4 f ( x1)
x3 x4 x2 x3 x4 x5
3
Δ| f ( x3 ) Δ| f ( x2 )
x4 x3 x4 x5
x4 f ( x4 ) Δ| 2 f ( x3 )
x4 x5
Δ| f ( x4 )
x5
x5 f ( x5 )
Beginning with f ( x2 ) as the initial term and moving one step upwards and one
step downwards alternately in the difference table, applying Sheppard’s Rule, we
get
f ( x) = f ( x2 ) + X 2 Δ| f ( x1 ) + X 2 X1 Δ| 2 f ( x1 )
x2 x2 x3
+ X 3 X 2 X1 Δ| 3 f ( x0 ) + X 3 X 2 X1 X 0 Δ| 4 f ( x0 )
x1 x2 x3 x1 x2 x3 x4
+ X 4 X 3 X 2 X1 X 0 Δ| 5 f ( x0 ) + …
x1 x2 x3 x4 x5
= f ( x2 ) + ( x − x2 ) Δ| f ( x1 ) + ( x − x2 ) ( x − x1 ) Δ| 2 f ( x1 )
x2 x2 x3
+ ( x − x3 ) ( x − x2 ) ( x − x1 ) Δ| 3 f ( x0 ) + …
x1 x2 x3
If we take our first step in downward direction of the difference table, the formula
will be
f ( x) = f ( x2 ) + X 2 Δ| f ( x2 ) + X 2 X 3 Δ| 2 f ( x1 )
x3 x2 x3
+ X1 X 2 X 3 Δ| 3 f ( x1 ) + X1 X 2 X 3 X 4 Δ| 4 f ( x0 ) + …
x2 x3 x4 x1 x2 x3 x4
= f ( x2 ) + ( x − x2 ) Δ| f ( x2 ) + ( x − x2 ) ( x − x3 ) Δ| 2 f ( x1 )
x3 x2 x3
+ ( x − x1 ) ( x − x2 ) ( x − x3 ) Δ| 3 f ( x1 ) + …
x2 x3 x4
f ( x0 )
or A0 = ⋅
( x0 − x1 ) ( x0 − x2 ) … ( x0 − x n )
f ( x1 )
A1 = and so on.
( x1 − x0 ) ( x1 − x2 ) … ( x1 − x n )
f (x n)
Thus An = ⋅
( x n − x0 ) ( x n − x1 ) … ( x n − x n−1 )
Substituting these values of A0 , A1 , A2 , … , An in (1), we get
( x − x1 ) ( x − x2 ) … ( x − x n )
f ( x) = f ( x0 )
( x0 − x1 ) ( x0 − x2 ) … ( x0 − x n )
( x − x0 ) ( x − x2 )…( x − x n )
+ f ( x1 ) +…
( x1 − x0 ) ( x1 − x2 )…( x1 − x n )
( x − x0 ) ( x − x1 ) … ( x − x n−1 )
…+ f ( x n ).
( x n − x0 ) ( x n − x1 ) … ( x n − x n−1 )
This is Lagrange’s interpolation formula and can be used for both equal and
unequal intervals.
Here, we have (2n + 2) conditions and we note that a polynomial of degree (2n + 1)
has (2n + 2) coefficients to be determined.
n n
We write φ2 n+1 ( x) = Σ ui ( x) y i + Σ vi ( x) y i ′ , …(2)
i =0 i =0
where ui ( x) and vi ( x) are polynomials in x of degree (2n + 1). Using the conditions
(1), we get
ui ( x j ) = 1 if i = j, vi ( x j ) = 0 ; ⎫
⎪⎪
= 0 if i ≠ j ; vi ′ ( x j ) = 1 if i = j ⎬ …(3)
⎪
ui ′ ( x j ) = 0 = 0 if i ≠ j ⎪
⎭
We therefore choose
ui ( x) = a i ( x) [li ( x)]2 ⎫⎪
⎬ …(4)
and vi ( x) = b i ( x) [li ( x)]2 , ⎭⎪
where li ( x) is defined as
( x − x0 ) ( x − x1 ) … ( x − x i−1 ) ( x − x i +1 ) … ( x − x n )
li ( x) = ⋅
( x i − x0 ) ( x i − x1 ) … ( x i − x i−1 ) ( x i − x i +1 ) … ( x i − x n )
ai ( x i ) = 1 ; bi (x i ) = 0 ; ⎫
⎬ …(5)
a i ′ ( x i ) = − 2l i ′ ( x i ) ; bi ′ (x i ) = 1 ⎭
a i ( x) = 1 − 2li ′ ( x i ) ( x − x i )
and b i ( x) = x − x i .
n
+ Σ [( x − x i ) {li ( x)}2 y i ′ ], …(6)
i =0
Example 3: By means of Newton’s divided difference formula, find the values of f (8) and
f (15) from the following table :
x : 4 5 7 10 11 13
f ( x) : 48 100 294 900 1210 2028
(Kanpur 2008)
Solution: The divided difference table is :
x f ( x) Δ| f ( x) Δ| 2 f ( x) Δ| 3 f ( x) Δ| 4 f ( x)
4 48
100 − 48
= 52
5−4
5 100 97 − 52
= 15
7−4
294 − 100 21 − 15
= 97 =1
7−5 10 − 4
7 294 202 − 97 0
= 21
10 − 5
900 − 294 27 − 21
= 202 =1
10 − 7 11 − 5
13 2028
Using Newton’s interpolation formula for unequal intervals i. e., Newton’s divided
difference formula, we get
f (8) = 48 + (8 − 4) × 52 + (8 − 4) (8 − 5) × 15 + (8 − 4) (8 − 5) (8 − 7) × 1
= 448,
= 3150.
N-96
1
Example 4: If f ( x) = , find the divided differences f (a, b), f (a, b, c ) and
x2
f (a, b, c , d ).
1 1
−
f (b) − f (a) 2
a2
Solution: We have f (a, b) = = b
b−a b−a
(b 2 − a2 ) b+a
=− 2 2
=− ⋅ …(1)
(b − a) b a a2 b 2
f (b, c ) − f (a, b)
Again f (a, b, c ) =
c −a
1 ⎡ b+c a + b⎤
= ⎢⎣− b 2 c 2 + a2 b 2 ⎥⎦, using (1)
c −a
1 ⎡b + c a + b⎤
=− − 2 2⎥
(c − a) ⎢⎣ b 2 c 2 a b ⎦
1 ⎡ a2 (b + c ) − c 2 (a + b)⎤
=− ⎢ ⎥
(c − a) ⎢⎣ a2 b 2 c 2 ⎥⎦
⎡ b (a2 − c 2 ) + ac (a − c )⎤ (a − c ) {b (a + c ) + ac }
=−⎢ 2 2 2 ⎥ =−
⎢⎣ (c − a) a b c ⎥⎦ (c − a) a2 b 2 c 2
ab + bc + ca
= ⋅ …(2)
a2 b 2 c 2
f (b, c , d ) − f (a, b, c )
Now f (a, b, c , d ) =
d−a
1 ⎡ bc + cd + db ab + bc + ca⎤
= − [Using (2)]
(d − a) ⎢⎣ b 2 c 2 d2 a2 b 2 c 2 ⎥⎦
x f ( x) Δ| f ( x) Δ| 2 f ( x) Δ| 3 f ( x)
1
a a
1 1
−
b a =− 1
b−a ab
1 1 1
b −
b (−1) bc ab
c−a
1 1 1
= (−1)2 −
1 1 2 bcd abc
− abc (−1)
c b =− 1 d−a
c−b bc 3 1
= (−1)
abcd
1 1 1
c −
c (−1) dc bc
d−b
1
1 1 = (−1)2
− bcd
d c =− 1
d−c dc
1
d d
1 1 1
Hence, Δ| 3 = (−1)3 =− ⋅
bcd a abcd abcd
Example 6: Show that Δ| 2 x 3 = x + y + z .
yz (Purvanchal 2008)
Solution: We construct the following divided difference table :
Argument Entry First divided differences Second divided differences
x x3
y3 − x3
= y2 + x2 + xy
y−x
(z 2 + y2 + zy) − ( y2 + x2 + yx)
y y3
z−x
(z 2 − x2 ) + y (z − x)
=
z 3 − y3 z−x
= z 2 + y2 + zy
z− y =x+ y+z
z z3
N-98
Example 7: Find the polynomial of the lowest possible degree which assumes the values
3, 12 , 15, − 21 when x has the values 3, 2 , 1, − 1 respectively. (Kanpur 2008)
Solution: For the given data the divided difference table is as given below :
x f ( x) Δ| f ( x) Δ| 2 f ( x) Δ| 3 f ( x)
−1 −21
15 + 21
= 18
1+ 1
1 15 − 3 − 18
= −7
2 +1
−3+7
12 − 15 =1
= −3 3 +1
2 −1
2 12 −9+3
= −3
3 −1
3 − 12
= −9
3−2
3 3
Hence f ( x) = f ( x0 ) + ( x − x0 ) Δ| f ( x0 ) + ( x − x0 ) ( x − x1 ) Δ| 2 f ( x0 )
+ ( x − x0 ) ( x − x1 ) ( x − x2 ) Δ| 3 f ( x0 )
= 168 + ( x − 3) (− 12) + ( x − 3) ( x − 7) (−2) + ( x − 3) ( x − 7) ( x − 9) (1)
= x 3 − 21 x 2 + 119 x − 27.
When x = 6, the estimate of the function is given by
f (6) = 63 − 21 . 62 + 119 . 6 − 27
= 147.
Example 9: Given the values :
x: 4 5 7 10 11 13
ux : 48 100 294 900 1210 2028
Form the table of divided differences and extend it to include the values x = 2 and x = 15.
Solution: The divided difference table is as follows :
x ux Δ| u x Δ| 2 u x Δ| 3 u x Δ| 4 u x Δ| 5 u x
2 4
22
4 48 10
52 1
5 100 15 0
97 1 0
7 294 21 0
202 1 0
10 900 27 0
310 1 0
11 1210 33 0
409 1
13 2028 38
561
15 3150
N-100
∴ u x = 48 + 52 ( x − 4) + 15 ( x − 4) ( x − 5) + 1 . ( x − 4) ( x − 5) ( x − 7)
= 48 + 52 ( x − 4) + 15 ( x 2 − 9 x + 20) + ( x 3 − 16 x 2 + 83 x − 140)
= x 3 − x 2 = x 2 ( x − 1).
∴ u2 = 23 − 22 = 4
and u15 = 153 − 152 = 3150.
The original divided difference table is for the argument values 4 to 13, leaving 2
and 15 and the figures in antique.
The complete table, with arguments 2 and 15 and the figures in antique, gives the
original divided difference table extended to include the values x = 2 and x = 15.
Example 10: Find a polynomial satisfied by (−4, 1245), (−1, 33), (0, 5), (2 , 9) and
(5, 1335), by the use of Newton’s interpolation formula with divided differences.
Or
Find the polynomial of the lowest possible degree which assumes the values1245, 33, 5, 9 and
1335 at x = − 4, − 1, 0, 2 and 5 respectively. Also find the value of the polynomial at the
abscissa 1.
Solution: For the given values the divided difference table is as follows :
x f ( x) Δ| f ( x) Δ| 2 f ( x) Δ| 3 f ( x) Δ| 4 f ( x)
−4 1245
33 − 1245
= − 404
−1 + 4
−1 33 − 28 + 404
= 94
0 +4
5 − 33 10 − 94
= − 28 = − 14
0 +1 2+4
0 5 2 + 28 14 + 13
= 10 =3
2 +1 5+4
9−5 88 − 10
=2 = 13
2−0 5 +1
2 9 442 − 2
= 88
5−0
335 − 9
= 442
5−2
5 1335
Using the values from above table in Newton’s divided difference formula, we have
f ( x) = 1245 + ( x + 4) . (− 404) + ( x + 4) ( x + 1) . (94)
+ ( x + 4) ( x + 1) ( x) . (− 14) + ( x + 4) ( x + 1) ( x) ( x − 2) . 3
N-101
= 3 x 4 − 5 x 3 + 6 x 2 − 14 x + 5.
For abscissa x = 1, we have
f (1) = 3 − 5 + 6 − 14 + 5 = − 5.
Example 11: Given log10 654 = 2 ⋅ 8156, log10 658 = 2 ⋅ 8182 ,
log10 659 = 2 ⋅ 8189, log10 661 = 2 ⋅ 8202 ; find log10 656.
Solution: For the values x0 , x1 , x2 , x3 , Lagrange’s formula is
( x − x1 ) ( x − x2 ) ( x − x3 )
f ( x) = f ( x0 )
( x0 − x1 ) ( x0 − x2 ) ( x0 − x3 )
( x − x0 ) ( x − x2 ) ( x − x 3 ) ( x − x0 ) ( x − x1 ) ( x − x3 )
+ f ( x1 ) + f ( x2 )
( x1 − x0 ) ( x1 − x2 ) ( x1 − x3 ) ( x2 − x0 ) ( x2 − x1 ) ( x2 − x3 )
( x − x0 ) ( x − x1 ) ( x − x2 )
+ f ( x3 ).
( x3 − x0 ) ( x3 − x1 ) ( x3 − x2 )
Here x0 = 654, x1 = 658, x2 = 659, x3 = 661, x = 656.
Substituting these values in Lagrange’s formula, we get
(656 − 658) (656 − 659) (656 − 661)
log 10 656 = × 2 ⋅ 8156
(654 − 658) (654 − 659) (654 − 661)
(656 − 654) (656 − 659) (656 − 661)
+ × 2 ⋅ 8182
(658 − 654) (658 − 659) (658 − 661)
(656 − 654) (656 − 658) (656 − 661)
+ × 2 ⋅ 8189
(659 − 654) (659 − 658) (659 − 661)
(656 − 654) (656 − 658) (656 − 659)
+ × 2 ⋅ 8202 .
(661 − 654) (661 − 658) (661 − 659)
(−2) (−3) (−5) (2) (−3) (−5)
∴ log 10 656 = × 2 ⋅ 8156 + × 2 ⋅ 8182
(−4) (−5) (−7) (4) (−1) (−3)
(2) (−2) (−5) (2) (−2) (−3)
+ × 2 ⋅ 8189 + × 2 ⋅ 8202
(5) (1)(−2) (7) (3) (2)
3 × 2 ⋅ 8156 5 × 2 ⋅ 8182 2 × 2 ⋅ 8189 2 × 2 ⋅ 8202
= + − +
14 2 1 7
= 0 ⋅ 6033 + 7 ⋅ 0455 − 5 ⋅ 6378 + 0 ⋅ 8058 = 2 ⋅ 8168.
Hence the estimated value of log 10 656 = 2 ⋅ 8168.
( x − 1) ( x − 2) ( x − 5) ( x − 0) ( x − 2) ( x − 5)
f ( x) = ×2+ ×3
(0 − 1) (0 − 2) (0 − 5) (1 − 0) (1 − 2) (1 − 5)
( x − 0) ( x − 1) ( x − 5) ( x − 0) ( x − 1) ( x − 2)
+ × 12 + × 147
(2 − 0) (2 − 1) (2 − 5) (5 − 0) (5 − 1) (5 − 2)
f ( x) 1 3 2 49
or =− + − +
x ( x − 1) ( x − 2) ( x − 5) 5 x 4 ( x − 1) x − 2 20 ( x − 5)
20 x 3 + 20 x 2 − 20 x + 40
=
20 x ( x − 1) ( x − 2) ( x − 5)
3 2
⇒ f ( x) = x + x − x +2.
Example 14: The following table is given :
x: 0 1 2 3 4
f ( x) : 3 6 11 18 27
What is the form of the function f ( x) ?
N-103
( x − 8 ⋅ 9) ( x − 9)
+ × 0 ⋅ 25
(9 ⋅ 3 − 8 ⋅ 9) (9 ⋅ 3 − 9)
25 2 453 ⋅ 5 2052 ⋅ 3
=− x + x− ⋅
12 12 12
This is the form of the frequency density.
Now f ( x) will be maximum for that value of x for which f ′ ( x) = 0 and f ′ ′ ( x) is
negative.
50 453 ⋅ 5
We have f ′ ( x) = 0 ⇒ − x+ =0
12 12
5
⇒ − (10 x − 90 ⋅ 7) = 0 ⇒ x = 9 ⋅ 07.
12
50 25
Also f ′ ′ ( x) = − =− which is negative.
12 6
Hence the mode of the frequency curve
y = f ( x) is 9 ⋅ 07.
N-104
Example 16: Four equidistant values u−1 , u0 , u1 and u2 being given, a value is
interpolated by Lagrange’s formula. Show that it may be written in the form
( y 2 − 1) x ( x 2 − 1)
u x = yu0 + xu1 + y Δ2 u−1 + Δ2 u0 ,
3! 3!
where x + y = 1. (Rohilkhand 2011)
2 2 2
Solution: We have Δ u−1 = ( E − 1) u−1 = ( E − 2 E + 1) u−1
= u1 − 2u0 + u−1 .
2 2
Similarly, Δ u0 = ( E − 2 E + 1) u0 = u2 − 2u1 + u0 .
Now the R.H.S.
y ( y 2 − 1) x ( x 2 − 1)
= yu0 + xu1 + Δ2 u−1 + Δ2 u0
3! 3!
(1 − x) x ( x − 2)
= (1 − x) u0 + xu1 + (u1 − 2u0 + u−1 )
3!
x ( x + 1) ( x − 1)
+ (u2 − 2u1 + u0 )
3!
x ( x − 1) ( x − 2) ⎡ x ( x − 1) ( x − 2) ( x − 1) x ( x + 1)⎤
=− u−1 + ⎢− ( x − 1) + + ⎥⎦ u0
6 ⎣ 3 6
⎡ x ( x − 1) ( x − 2) ( x − 1) x ( x + 1)⎤ ( x − 1) x ( x + 1)
+ ⎢x − − ⎥ u1 + u2
⎣ 6 3 ⎦ 6
x ( x − 1) ( x − 2) ( x − 2) ( x − 1) ( x + 1)
=− u −1 + u0
6 2
( x − 2) x ( x + 1) ( x − 1) x ( x + 1)
− u1 + u2 . …(1)
2 6
For u−1 , u0 , u1 , u2 as known values, by Lagrange’s formula, we have
( x − 0) ( x − 1) ( x − 2) ( x + 1) ( x − 1) ( x − 2)
ux = u −1 + u0
(−1 − 0) (−1 − 1) (−1 − 2) (0 + 1) (0 − 1) (0 − 2)
( x + 1) ( x − 0) ( x − 2) ( x + 1) ( x − 0) ( x − 1)
+ u1 + u2
(1 + 1) (1 − 0) (1 − 2) (2 + 1) (2 − 0) (2 − 1)
x ( x − 1) ( x − 2) ( x + 1)( x − 1) ( x − 2)
=− u −1 + u0
6 2
( x + 1) x ( x − 2) ( x + 1) x ( x − 1)
− u1 + u2 . …(2)
2 6
From (1) and (2), we have
y ( y 2 − 1) x ( x 2 − 1)
u x = y u0 + xu1 + Δ2 u−1 + Δ2 u0 .
3! 3!
N-105
(1 + 3) (1 − 3) (1 − 5) (1 + 5) (1 − 3) (1 − 5)
y1 = y −5 + y −3
(−5 + 3) (−5 − 3) (−5 − 5) (−3 + 5) (−3 − 3) (−3 − 5)
(1 + 5) (1 + 3) (1 − 5) (1 + 5) (1 + 3)(1 − 3)
+ y3 + y5
(3 + 5) (3 + 3) (3 − 5) (5 + 5) (5 + 3) (5 − 3)
1 1
∴ f (6) = [−62 + 9 . 6 + 16] = [−36 + 54 + 16]
6 6
1
= × 34 = 5 ⋅ 66.
6
Again for maximum or minimum of f ( x), we have
f ′ ( x) = 0 i. e., − 2 x + 9 = 0 or x = 4 ⋅ 5.
1
Since f ′ ′ ( x) = × (−2) which is < 0, therefore f ( x) is maximum at the point
6
x = 4 ⋅ 5.
Example 19: Prove that the Lagrange’s formula can be put in the form
n φ ( x) f ( x r )
Pn ( x) = Σ
r = 0 ( x − x r ) φ′ ( x r )
n
where φ ( x) = Π ( x − x r ).
r =0 (Rohilkhand 2011)
Solution: We can write Lagrange’s formula as
n ( x − x0 ) ( x − x1 ) … ( x − x n )
Pn ( x) = Σ f (x r )
r =0 ( x r − x0 ) ( x r − x1 ) … ( x r − x n )
n ⎡ φ ( x) f ( x r )⎤ ⎡ 1 ⎤
= Σ ⎢ ⎥ ⎢ ⎥⋅
r =0
⎣ (x − x r ) ⎦ (
⎣ rx − x 0 ) ( x r − x1 ) … ( x r − x )
n ⎦
n
Now φ ( x) = Π ( x − x r ).
r =0
∴ φ′ ( x r ) = [φ′ ( x)] x = xr
= ( x r − x0 ) ( x r − x1 ) … ( x r − x r −1 )
( x r − x r +1 ) … ( x r − x n ).
n φ ( x) f ( x r )
∴ Pn ( x) = Σ ⋅
r =0 ( x − x r ) φ′ ( x r )
Example 20: If y0 , y1 , y2 , … , y6 are the consecutive terms of a series, then using
Lagrange’s formula prove that
y3 = 0 ⋅ 05 ( y0 + y6 ) − 0 ⋅ 3 ( y1 + y5 ) + 0 ⋅ 75 ( y2 + y4 ).
( x − x0 ) ( x − x2 ) … ( x − x n )
+ f ( x1 )
( x1 − x0 ) ( x1 − x2 ) … ( x1 − x n )
( x − x0 ) ( x − x1 ) … ( x − x n−1 )
+…+ f (x n)
( x n − x0 ) ( x n − x1 ) … ( x n − x n−1 )
N-107
f ( x)
or
( x − x0 ) ( x − x1 ) … ( x − x n )
1
= f ( x0 )
( x − x0 ) ( x0 − x1 ) ( x0 − x2 ) … ( x0 − x n )
1
+ f ( x1 ) + …
( x − x1 ) ( x1 − x0 ) ( x1 − x2 ) … ( x1 − x n )
1
+ f ( x n ).
( x − x n ) ( x n − x0 ) ( x n − x1 ) … ( x n − x n−1 )
Putting x = 3, f ( x) = y3 ; x0 = 0, f ( x0 ) = y0 ; x1 = 1, f ( x1 ) = y1 ; x2 = 2,
f ( x2 ) = y2 ; x3 = 4, f ( x3 ) = y4 ; x4 = 5, f ( x4 ) = y5 ; and x5 = 6, f ( x5 ) = y6 ,
we get
y3
(3 − 0) (3 − 1) (3 − 2) (3 − 4) (3 − 5) (3 − 6)
y0 y1
= +
(3 − 0) (−1) (−2) (−4) (−5) (−6) (3 − 1) (1) (−1) (−3) (−4) (−5)
y2 y4
+ +
(3 − 2) (2) (1) (−2) (−3) (−4) (3 − 4) (4) (3) (2) (−1) (−2)
y5 y6
+ +
(3 − 5) (5) (4) (3) (1) (−1) (3 − 6) (6) (5) (4) (2) (1)
y3 y0 y1 y2
or − =− + −
3 . 2 .1.1. 2 . 3 1. 2 . 3 . 4 . 5 . 6 2 . 3 . 4 . 5 1. 2 .1. 2 . 3 . 4
y4 y5 y6
− + −
2 .1. 2 . 3 . 4 1. 2 . 3 . 4 . 5 1. 2 . 3 . 4 . 5 . 6
y0 + y6 y1 + y5 y2 + y4
=− + −
1. 2 . 3 . 4 . 5 . 6 1. 2 . 3 . 4 . 5 2 .1. 2 . 3 . 4
6 ( y0 + y6 ) 6 ( y1 + y5 ) 6 ( y2 + y4 )
or y3 = − +
4 .5 .6 4 .5 2 .4
= 0 ⋅ 05 ( y0 + y6 ) − 0 ⋅ 3 ( y1 + y5 ) + 0 ⋅ 75 ( y2 + y4 ).
= f ′ ( x0 ), if f ( x) is differentiable. …(1)
N-108
1
Similarly f ( x0 , x0 , x0 ) = f ′ ′ ( x0 ). …(2)
2!
… … … …
1 n
In general f ( x0 , x0(n + 1) arguments , … , x0 ) = f ( x0 ). …(3)
n!
Comprehensive Exercise 1
1. (a) Given that f (0) = 8, f (1) = 68, f (5) = 123, construct a divided
difference table, using the table determine the value of f (2).
(b) If f (0) = 2 , f (1) = 3, f (2) = 12 , f (5) = 147, prepare Newton’s
divided difference table to find f (4).
2. If log 2 = 0 ⋅ 30103, log 3 = 0 ⋅ 47712 , log 5 = 0 ⋅ 62897, log 7 = 0 ⋅ 84510,
find the value of log 4 ⋅ 7 to four places of decimal.
3. Show that nth order divided difference f ( x0 , x1 , x2 , … , x n ) for the function
1 (− 1) n
ux = is equal to .
x x0 x1 x2 … x n
4. From the following table find f ( x) in powers of ( x − 3):
x : 5 11 27 34 42
f ( x) : 23 899 17315 35606 68510
5. The following table gives the normal weights of babies during the first
twelve months of life :
Age in months ( x) : 0 2 5 8 10 12
Weight in lbs f ( x) : 1 1
7 10 15 16 18 21
2 4
Estimate the weight of the baby at the age of 7 months.
6. Determine by Lagrange’s formula the percentage number of criminals
under 35 years :
Age % numbers of criminals
Under 25 years 52
Under 30 years 67⋅3
x : 3 2 1 −1
f ( x) : 3 12 15 −21
(Kanpur 2008)
9. By means of Lagrange’s formula, prove that approximately
y0 = ( y1 − y −1 ) − ⎡ ( y3 − y1 ) − ( y −1 − y −3 )⎤ ⋅
1 1 1 1
2 8 ⎣⎢2 2 ⎦⎥
(Rohilkhand 2002, 09)
10. Find approximately the real root of the equation
y3 − 2 y − 5 = 0
11. If y35⋅0 = 1175, y35⋅5 = 1280, y39⋅5 = 2180, y40⋅5 = 2420, find y40 by
divided differences.
12. Apply Lagrange’s formula to find f (1⋅ 50), using the following values of the
function f ( x) :
x : 1 ⋅ 00 1 ⋅ 20 1 ⋅ 40 1 ⋅ 60 1 ⋅ 80 2 ⋅ 00
f ( x) : 0 ⋅ 2420 0 ⋅ 1942 0 ⋅ 1497 0 ⋅ 1109 0 ⋅ 0790 0 ⋅ 0540
13. Apply Lagrange’s formula to find the cubic polynomial which includes the
following values of x and y x :
x : 0 1 4 6
yx : 1 −1 1 −1
A nswers 1
1. (a) 109 ⋅ 50 (b) 78 2. 0 ⋅ 611812 approx
4. − 13 + 2 ( x − 3) + 6 ( x − 3) + ( x − 3)3
2
5. 15 ⋅ 67 Ibs 6. 77%
3 2
7. x − x + 3x + 8 8. x 3 − 9 x 2 + 17 x + 6
10. 2 ⋅ 09455 11. 2299.25
12. 0 ⋅ 12693
−17 x 2 29 x 2 207 x 5
13. + + +
120 24 120 4
14. f ( x) = 194 + 98 ( x − 5) + 17 ( x − 5)2 + ( x − 5)3
Also, f ′ (5) = 98, f ′ ′ (5) = 34, f ′ ′ ′ (5) = 6
15. ( x − 3)3 + 6 ( x − 3)2 + 2 ( x − 3) − 13
16. 24 ⋅ 80 17. 32 ⋅ 93
(a) x 2 + y 2 + xy (b) x 2 − y 2 + xy
(c) x 2 − y 2 − xy (d) x 2 + y 2 − xy
N-113
24. If x : 5 6 9 11
f ( x) : 12 13 14 16
then f (10) =
(a) 13.80 (b) 14.66
(c) 15.75 (d) 16.70
25. For the following table the form of the function f ( x) is :
x : 0 1 2 5
f ( x) : 2 3 12 147
(a) x 3 + x 2 − x + 2 (b) x 3 − x 2 − x + 2
3 2
(c) x + x + x + 2 (d) x 3 + x 2 − x − 2
26. For the following data the form of the function f ( x) is :
x : 0 1 4 5
f ( x) : 8 11 68 123
(a) x 3 + x 2 + 3 x + 8 (b) x 3 − x 2 + 3 x + 8
(c) x 3 − x 2 − 3 x − 8 (d) x 3 − x 2 − 3 x + 8
N-114
27. If f (1) = 4, f (2) = 5, f (7) = 5, f (8) = 4, then form of the function is given by :
1 1
(a) [− x 2 + 9 x + 16] (b) [ x 2 + 9 x + 16]
6 6
1 2 1
(c) [ x − 9 x + 16] (d) [ x 2 − 9 x − 16]
6 6
28. The cubic polynomial for the following data :
x : 3 2 1 –1
f ( x) : 3 12 15 –21
is given by
(a) x 3 + 9 x 2 + 17 x + 6 (b) x 3 − 9 x 2 + 17 x + 6
(c) x 3 − 9 x 2 − 17 x + 6 (d) x 3 + 9 x 2 − 17 x + 6
29. If f (0) = 2 , f (1) = 3 and f (3) = 6 then the value of f (0 , 1) is :
(a) 3 / 2 (b) 1
(c) 3 (d) 1/ 2 (Meerut 2013B)
30. By interchanging the suffixes of the operator and the operand, the value of
the divided difference :
(a) changes its sign (b) remains unchanged
(c) becomes zero (d) none of these
(Meerut 2013B)
A nswers
¨
4
C entral D ifference I nterpolation
F ormulae
4.1 Introduction
arlier we have obtained Newton’s and Lagrange’s interpolation formulae.
E Lagrange’s formula is not easy to apply. There is a great deal of computational
work in its application and it does not give accurate results if the values of the
independent variable are quite apart. Newton’s formulae are fundamental and are
applicable to almost all cases of interpolation, but in general they do not converge
as rapidly as central difference formulae.
In particular the central difference formulae are used for interpolating values of the
function near the middle of a tabulated set. Before we derive various central
difference formulae, we introduce some operators besides Δ, E and ∇.
The operator δ, called the central difference operator, is defined by the operator
equation
δ = E 1 /2 − E −1 /2 .
The first central difference δf ( x) of f ( x) is given by
N-116
δf ( x) = f ⎛⎜ x + h⎞⎟ − f ⎛⎜ x − h⎞⎟
1 1
⎝ 2 ⎠ ⎝ 2 ⎠
= E 1 /2 f ( x) − E −1 /2 f ( x), where E ≡1+ Δ
= ( E 1 /2 − E −1 /2 ) f ( x).
Thus δ = E 1 /2 − E −1 /2 = E −1 /2 ( E − 1) = E −1 /2 Δ. …(1)
−1
The relation connecting E and ∇ is ∇ ≡ 1 − E .
∴ δ = E 1 /2 − E −1 /2 ⇒ δ = E 1 /2 (1 − E −1 ) = E 1 /2 ∇. …(2)
From (1) and (2), we get
δ = E −1 /2 Δ = E 1 /2 ∇. …(3)
The nth power of the operator δ applied to y x gives
δ n y x = Δn E − n / 2 y x = ∇ n E n / 2 y x
or δ n y x = Δn y x −(n /2) = ∇ n y x +(n /2) .
The operator μ, called the mean or average operator, is defined by the operator
equation
1 1 /2
μ= (E + E −1 /2 ).
2
1
∴ μ f ( x) = ( E 1 /2 + E −1 /2 ) f ( x).
2
1 1 /2 1
Also 2
μ f ( x) = ( E + E −1 /2 )2 f ( x) = [( E 1 /2 − E −1 /2 )2 + 4] f ( x)
4 4
1 2 ⎛ δ2 ⎞
= (δ + 4) f ( x) = ⎜1 + ⎟ f ( x).
4 ⎝ 4⎠
δ2
∴ μ2 ≡ 1 + ⋅ …(4)
4
Let y x be a function of x. Then
δy x = ( E 1 /2 − E −1 /2 ) y x = y x +(1 /2) − y x −(1 /2)
1 1 /2 1
and μy x = (E + E −1 /2 ) y x = ( y x +(1 /2) + y x −(1 /2) ).
2 2
∴ 2μy x + δy x = 2 y x +(1 /2)
⇒ (2μ + δ) y x = 2 E 1 /2 y x
1
⇒ 2μ + δ ≡ 2 E 1 /2 ⇒ μ+ δ ≡ E 1 /2 . …(5)
2
hD
We have E≡e = e U , where U = hD.
∴ δ = E 1 /2 − E −1 /2 = e U /2 − e −U /2 = 2 sinh
U ⎤
2 ⎥
⎥ …(6)
1 e U /2 + e −U /2 U ⎥
and μ = ( E 1 /2 + E −1 /2 ) = = cosh
2 2 2 ⎥⎦
N-117
σ f ( x) = σ f ( x − h) + f ⎛⎜ x − h⎞⎟
1
⎝ 2 ⎠
or (σ − σE −1 ) f ( x) = E −1 /2 f ( x)
or σ − σE −1 ≡ E −1 /2 or σ (1 − E −1 ) ≡ E −1 /2
E −1 / 2 E 1 /2
or σ≡ −1
≡ ⋅ …(7)
1− E E −1
1 E −1 1
We have = 1 /2 = E 1 /2 − E −1 /2 = δ. ∴ σ= ⋅
σ E δ
Thus the operator σ is inverse to the operator δ.
But, we have
Δ y0 Δ2 y −1
f ( x0 , x0 + h) = , f ( x0 − h, x0 , x0 + h) = ,
h 2 ! h2
Δ3 y −1
f ( x0 − h, x0 , x0 + h, x0 + 2h) = ,
3 ! h3
Δ4 y −2
f ( x0 − 2h, x0 − h, x0 , x0 + h, x0 + 2h) = ,
4 ! h4
Δ5 y −2
f ( x0 − 2h, x0 − h, x0 , x0 + h, x0 + 2h, x0 + 3h) = , etc.
5 ! h5
Substituting these values in (2), we get
Δ y0 Δ2 y −1 Δ3 y −1
y = y0 + hu + h2 u (u − 1) + h3 u (u − 1) (u + 1)
h 2 ! h2 3 ! h3
Δ4 y −2
+ h4 u (u − 1) (u + 1) (u − 2)
4 ! h4
Δ5 y −2
+ h5 u (u − 1)(u + 1) (u − 2) (u + 2) +…
5 ! h5
Δ2 y −1 Δ3 y −1
or y = y0 + u Δ y0 + u (u − 1) + u (u2 − 1)
2! 3!
Δ4 y −2 Δ5 y −2
+ u (u2 − 1) (u − 2) + u (u2 − 1) (u2 − 22 ) +… …(3)
4! 5!
This result is known as Gauss’s forward formula for equal intervals.
The formula (3) may also be written as
u+1 u+1
y = y0 + u C1 Δy0 + u C2 Δ2 y −1 + C3 Δ3 y −1 + C4 Δ4 y −2
u+2
+ C5 Δ5 y −2 + … .
(b) Gauss’s backward formula. Substituting
x0 = x0 , x1 = x0 − h, x2 = x0 + h, x3 = x0 − 2h,
x4 = x0 + 2h, x5 = x0 − 3h, x6 = x0 + 3h etc.
in the general Newton formula (1), we get
y = y0 + ( x − x0 ) f ( x0 , x0 − h) + ( x − x0 ) ( x − x0 + h)
f ( x0 , x0 − h, x0 + h) + ( x − x0 ) ( x − x0 + h) ( x − x0 − h)
f ( x0 , x0 − h, x0 + h, x0 − 2h)
+ ( x − x0 ) ( x − x0 + h) ( x − x0 − h) ( x − x0 + 2h)
f ( x0 , x0 − h, x0 + h, x0 − 2h, x0 + 2h)
+ ( x − x0 ) ( x − x0 + h) ( x − x0 − h) ( x − x0 + 2h) ( x − x0 − 2h)
× f ( x0 , x0 − h, x0 + h, x0 − 2h, x0 + 2h, x0 − 3h) + …
N-119
x − x0
Now put u = i. e., x − x0 = uh.
h
Then we get
y = y0 + hu f ( x0 − h, x0 ) + hu (hu + h) f ( x0 − h, x0 , x0 + h)
+ hu (hu + h) (hu − h) f ( x0 − 2h, x0 − h, x0 , x0 + h)
+ hu (hu + h) (hu − h) (hu + 2h) f ( x0 − 2h, x0 − h, x0 , x0 + h, x0 + 2h)
+ hu (hu + h) (hu − h) (hu + 2h) (hu − 2h)
× f ( x0 − 3h, x0 − 2h, x0 − h, x0 , x0 + h, x0 + 2h) + … …(4)
But, we know that
Δ y −1 Δ2 y −1
f ( x0 − h, x0 ) = , f ( x0 − h, x0 , x0 + h) = ,
h 2 ! h2
Δ3 y −2
f ( x0 − 2h, x0 − h, x0 , x0 + h) = ,
3 ! h3
Δ4 y −2
f ( x0 − 2h, x0 − h, x0 , x0 + h, x0 + 2h) = ,
4 ! h4
Δ5 y −3
f ( x0 − 3h, x0 − 2h, x0 − h, x0 , x0 + h, x0 + 2h) = , etc.
5 ! h5
Substituting these in (4), we get
Δ2 y −1 Δ3 y −2
y = y0 + u Δ y −1 + u (u + 1) + u (u2 − 1)
2! 3!
4 5
Δ y −2 Δ y −3
+ u (u2 − 1) (u + 2) + u (u2 − 1) (u2 − 22 ) +… …(5)
4! 5!
This result is known as Gauss’s backward formula.
The formula (5) may also be written as
u +1 u +1
y = y0 + u C1 Δy −1 + C2 Δ2 y −1 + C3 Δ3 y −2
u +2 u +2
+ C4 Δ4 y −2 + C5 Δ5 y −3 + … .
(c) Third formula due to Gauss. It is a formula which starts with y1 and runs
parallel to the backward formula (5).
x − x0 x − xk x − ( x0 + kh)
We have u = ⋅ ∴ = = u − k.
h h h
To derive this third formula we increase the subscripts of x and y in (5) by one unit
and change the u’s by putting k = 1 in the formula
x − xk
u−k = ⋅
h
We get x − x1 = hu − h i. e., we have to replace u by u − 1.
These changes reduce (5) to
N-120
Δ2 y0 Δ3 y −1
y = y1 + (u − 1) Δy0 + u (u − 1) + u (u − 1) (u − 2)
2! 3!
Δ4 y −1 Δ5
y −2
+ u (u2 − 1) (u − 2) + u (u2 − 1) (u − 2) (u − 3) + … …(6)
4! 5!
This result is known as third formula due to Gauss.
In the following difference table the paths of the three Gauss formulae have been
shown. The designations A, B, C are corresponding to the formulae (5), (3) and (6)
respectively.
x y Δ y Δ2 y Δ3 y Δ4 y Δ5 y Δ6 y
x−6 y−6
Δ y−6
x−5 y−5 Δ2 y−6
Δ y−5 Δ3 y−6
x−4 y−4 Δ2 y−5 Δ4 y−6
Δ y−4 Δ3 y−5 Δ5 y−6
x−3 y−3 Δ2 y−4 Δ4 y−5 Δ6 y−6
Δ y−3 Δ3 y−4 Δ5 y−5
x−2 y−2 Δ2 y−3 Δ4 y−4 Δ6 y−5
Δ y−2 Δ3 y−3 Δ5 y−4
x−1 y−1 Δ2 y−2 Δ4 y−3 Δ6 y−4
Δ y−1 Δ3 y−2 Δ5 y−3
A
x0 y0 Δ2 y−1 Δ4 y−2 Δ6 y−3
Δ y0 Δ3 y−1 Δ5 y−2 B
2 4 6
x1 y1 Δ y0 Δ y −1 Δ y −2
3 5 C
Δ y1 Δ y0 Δ y −1
x2 y2 Δ2 y1 Δ4 y0 Δ6 y−1
Δ y2 Δ3 y1 Δ5 y0
x3 y3 Δ2 y2 Δ4 y1 Δ6 y0
Δ y3 Δ3 y2 Δ5 y1
x4 y4 Δ2 y3 Δ4 y2
Δ y4 Δ3 y3
x5 y5 Δ2 y4
Δ y5
x6 y6
N-121
u ⎛⎜ u − ⎞⎟ (u − 1)
1
⎝ 2⎠ u (u2 − 1) (u − 2) (Δ4 y −2 + Δ4 y −1 )
+ Δ3 y −1 + ⋅
3! 4! 2
⎛ 1⎞ 2
u ⎜ u − ⎟ (u − 1) (u − 2)
⎝ 2⎠
+ Δ5 y −2 + … …(8)
5!
This is Bessel’s formula. It can be written in a slightly different form by
transforming the first two terms to y0 + u Δ y0 because Δ y0 = y1 − y0 . Then
(8) becomes
N-122
u ⎛⎜ u − ⎞⎟ (u − 1)
1
u (u − 1) (Δ2 y −1 + Δ2 y0 ) ⎝ 2⎠
y = y0 + u Δ y0 + ⋅ + Δ3 y −1
2 2 3!
u (u2 − 1) (u − 2) (Δ4 y −2 + Δ4 y −1 )
+ ⋅ +… …(9)
4! 2
The more general form of Bessel’s formula is
⎛⎜ u − 1⎞
⎟ u (u − 1)
u (u − 1) (Δ2 y −1 + Δ2 y0 ) ⎝ 2⎠
y = y0 + u Δ y0 + ⋅ + Δ3 y −1
2 2 3!
u ⎛⎜ u − ⎞⎟ (u2 − 1) (u − 2)
1
(u + 1) u (u − 1) (u − 2) (Δ4 y −1 + Δ4 y −2 ) ⎝ 2⎠
+ ⋅ + Δ5 y −2
4! 2 5!
u (u2 − 1) (u2 − 4) (u − 3) (Δ6 y −5 + Δ6 y −2 )
+ ⋅ +…
6! 2
u (u2 − 1) (u2 − 4) … (u − n) (u + n − 1) (Δ2 n y − n + Δ2 n y − n+1 )
+ ⋅
(2n) ! 2
u ⎛⎜ u − ⎞⎟ (u2 − 1) (u2 − 4) … (u − n) (u + n − 1)
1
⎝ 2⎠
+ Δ2 n + 1 y − n …(10)
(2n + 1) !
1
Putting u = in (10), we get
2
2 2 4 4
y0 + y1 1 Δ y − 1 + Δ y0 3 Δ y −2 + Δ y −1
y= − +
2 8 2 128 2
6 6
5 Δ y −3 + Δ y −2 [1 . 3 . 5 … (2 n − 1)]2
− + …+ (−1) n ⋅
1024 2 22 n (2 n) !
Δ2 n y − n + Δ2 n y − n +1
…(11)
2
This is the special case of Bessel’s formula. It is called the formula for interpolating
to halves. It is used for computing values of the function mid-way between any two
given values.
1 1
Putting u − = v or u = v + in (10), we get a more symmetrical and convenient
2 2
form of Bessel’s formula :
⎛⎜ v2 − 1⎞⎟ v ⎛⎜ v2 − ⎟⎞
1
2 2
y0 + y1 ⎝ 4 ⎠ Δ y − 1 + Δ y0 ⎝ 4⎠ 3
y= + v Δ y0 + ⋅ + Δ y −1
2 2 2 3!
⎛⎜ v2 − 1⎞⎟ ⎛⎜ v2 − 9⎞⎟ v ⎛⎜ v2 − ⎟⎞ ⎛⎜ v2 − ⎞⎟
1 9
4 4
⎝ 4⎠ ⎝ 4 ⎠ Δ y −2 + Δ y −1 ⎝ 4⎠ ⎝ 4⎠ 5
+ ⋅ + Δ y −2
4! 2 5!
N-123
⎝ ⎨ ⎬
4⎠ ⎝ 4⎠ ⎪⎩ 4 ⎪⎭ Δ2 n y − n + Δ2 n y − n+1
+…+ ⋅
(2n) ! 2
⎧⎪ (2n − 1)2 ⎫⎪
v ⎛⎜ v2 − ⎞⎟ ⎛⎜ v2 − ⎞⎟ … ⎨ v2 −
1 9
⎝ ⎬
4⎠ ⎝ 4⎠ ⎩⎪ 4 ⎭⎪
+ Δ2 n + 1 y − n .
(2n + 1)!
The following table shows the quantities which occur in this formula.
y0 Δ2 y−1 Δ4 y−2 Δ6 y−3 Δ8 y−4
Δ y0 Δ3 y−1 Δ5 y−2 Δ7 y−3
y1 Δ2 y0 Δ4 y−1 Δ6 y−2 Δ8 y−3
⎪⎧ (u + k − 1)
(2 k)
(u + k)(2 k +1) ⎪⎫ 2 k
+⎨ − ⎬ Δ y −k
⎪⎩ (2k) ! (2k + 1) ! ⎪⎭
(u + k)(2 k +1)
+ Δ2 k y1− k + … …(14)
(2k + 1) !
N-124
( E 1 /2 − E −1 /2 )2 ⎧⎪ ( E 1 /2 − E −1 /2 )2 ⎪⎫
= + ( E 1 /2 − E −1 /2 ) ⎨1 + ⎬
2 ⎪⎩ 4 ⎪⎭
[ ∵ δ ≡ E 1 /2 − E −1 /2 ]
( E 1 /2 − E −1 /2 )2 ⎧⎪ 4 + ( E 1 /2 − E −1 /2 )2 ⎪⎫
= + ( E 1 /2 − E −1 /2 ) ⎨ ⎬
2 ⎩⎪ 4 ⎭⎪
N-125
( E + E −1 − 2) ( E 1 /2 − E −1 /2 ) ( E 1 /2 + E −1 /2 )
= +
2 2
E + E −1 ( E − E −1 )
= −1+ = E − 1 = Δ = L.H. S.
2 2
(ii) We have L.H.S. = δ 3 y1 /2 = (Δ E −1 /2 )3 y1 /2 [ ∵ δ ≡ ΔE −1 /2 ]
= Δ3 E −3 /2 E 1 /2 y0 = Δ3 E −1 y0 = ( E − 1)3 E −1 y0 [ ∵ Δ ≡ E − 1]
3 2 −1 2 −1
= ( E − 3 E + 3 E − 1) E y0 = ( E − 3 E + 3 − E ) y0
= y2 − 3 y1 + 3 y0 − y −1 = R.H. S.
(iii) We have Δ∇ = (δE 1 /2 ) (δE −1 /2 ) = δ 2 , ∇ Δ = (δE −1 /2 ) (δE 1 /2 ) = δ 2 ,
and Δ − ∇ = δE 1 / 2 − δE − 1 / 2 = δ ( E 1 / 2 − E − 1 / 2 ) = δ δ = δ 2 .
Thus Δ ∇ ≡ ∇Δ ≡ Δ − ∇ ≡ δ 2 .
(iv) We have
δ n y x = (Δ E −1 /2 ) n y x = (Δn E − n /2 ) y x = Δn ( E − n /2 y x ) = Δn y x −(n /2) .
Example 2: Use Gauss’s forward formula to find the value of y when x = 3 ⋅ 75, given the
following table :
x : 2.5 3.0 3.5 4.0 4.5 5.0
yx : 24.145 22.043 20.225 18.644 17.262 16.047
x u yu Δ yu Δ2 yu Δ3 yu Δ4 yu Δ5 yu
2 ⋅5 −2 24 ⋅ 145
−2 ⋅ 102
3 ⋅0 −1 22 ⋅ 043 ⋅284
−1 ⋅ 818 − ⋅ 047
4 ⋅5 2 17 ⋅ 262 ⋅167
−1 ⋅ 215
5 ⋅0 3 16 ⋅ 047
N-126
x u yu Δ yu Δ2 yu Δ3 yu Δ4 yu
21 −2 18 ⋅ 4708
−0 ⋅ 6564
25 −1 17 ⋅ 8144 −0 ⋅ 0510
−0 ⋅ 7074 −0 ⋅ 0054
29 0 17 ⋅ 1070 −0 ⋅ 0564 −0 ⋅ 0022
−0 ⋅ 7638 −0 ⋅ 0076
33 1 16 ⋅ 3432 −0 ⋅ 0640
−0 ⋅ 8278
37 2 15 ⋅ 5154
Gauss’s forward formula gives
(− 0 ⋅ 0564)
y0⋅25 = 17 ⋅ 1070 + (0 ⋅ 25) (− 0 ⋅ 7638) + (0 ⋅ 25) (⋅25 − 1)
2
(⋅25 + 1) (⋅25) (⋅25 − 1)
+ (− 0 ⋅ 0076)
6
(⋅25 + 1) (⋅25) (⋅25 − 1) (⋅25 − 2)
+ (− 0 ⋅ 0022)
24
N-127
1 −2 1
−2
2 −1 −1 4
2 −8
3 0 1 −4 16
−2 8
4 1 −1 4
2
5 2 1
1
= [2 ( x − 3)4 − 8 ( x − 3)2 + 3]
3
1
∴ f ( x) = [2 ( x − 3)4 − 8 ( x − 3)2 + 3]
3
Example 5: Interpolate by means of Gauss’s backward formula the population for the year
1936, given the following table :
Year : 1901 1911 1921 1931 1941 1951
Population : 12 15 20 27 39 52
(in thousands)
Solution: Take 1931 as the origin and 10 years as the unit, then the population is
to be estimated for
1936 − 1931
u= = 0 ⋅ 5.
10
The difference table is given below :
x u yu Δ yu Δ2 yu Δ3 yu Δ4 yu Δ5 yu
1901 −3 12
3
1911 −2 15 2
5 0
1921 −1 20 2 3
7 3 −10
1931 0 27 5 −7
12 −4
1941 1 39 1
13
1951 2 52
Now Gauss’s backward formula is
(u + 1) u 2 (u + 1) u (u − 1) 3
y u = y0 + u Δ y − 1 + Δ y −1 + Δ y −2
2 6
(u + 2) (u + 1) u (u − 1) 4 (u + 2) (u + 1) u (u − 1) (u − 2) 5
+ Δ y −2 + Δ y −3 + …
24 120
(⋅5 + 1) (⋅5) (⋅5 + 1) (⋅5) (⋅5 − 1)
∴ y⋅5 = 27 + (⋅5) × 7 + ×5+ ×3
2 6
(⋅5 + 2) (⋅5 + 1) (⋅5) (⋅5 − 1)
+ × (−7)
24
(⋅5 + 2) (⋅5 + 1) (⋅5) (⋅5 − 1) (⋅5 − 2)
+ × (−10)
120
= 27 + 3 ⋅ 5 + 1⋅ 875 − 0 ⋅ 1875 + 0 ⋅ 2734 − 0 ⋅ 1172
= 32 ⋅ 3437 thousand.
Thus the estimated population for 1936 is 32 ⋅ 3437 thousand.
N-129
x u yu Δ yu Δ2 yu Δ3 yu
20 −1 512
−73
30 0 439 −20
−93 10
40 1 346 −10
−103
50 2 243
Stirling’s formula is
Δ y0 + Δ y − 1 u2 2 u (u2 − 12 ) (Δ3 y −2 + Δ3 y −1 )
y u = y0 + u + Δ y −1 + +…
2 2! 3! 2
(−93 − 73) (⋅5)2
∴ y⋅5 = 439 + (⋅5) + (− 20)
2 2
= 439 − 41⋅ 5 − 2 ⋅ 5 = 395.
Hence the estimated value of y35 is 395.
Example 7: Use Stirling’s formula to find y28 , given
y20 = 49225, y25 = 48316, y30 = 47236, y35 = 45926 , y40 = 44306.
(Kanpur 2011; Garhwal 10)
Solution: Take x = 30 as the origin and h = 5 as the unit, the value of y required
will be for
28 − 30
u= = − 0 ⋅ 4.
5
The difference table is given below :
x u yu Δ yu Δ2 yu Δ3 yu Δ4 yu
20 −2 49225
−909
25 −1 48316 −171
−1080 −59
30 0 47236 −230 −21
−1310 −80
35 1 45926 −310
−1620
40 2 44306
N-130
x u yu Δ yu Δ2 yu Δ3 yu
20 −1 2854
308
24 0 3162 74
382 −8
28 1 3544 66
448
32 2 3992
Bessel’s formula is
u (u − 1) (Δ2 y −1 + Δ2 y0 )
( y0 + y1 ) + ⎛⎜ u − ⎞⎟ Δy0 +
1 1
yu = ⋅
2 ⎝ 2⎠ 2! 2
⎛⎜ u − 1⎞⎟ u (u − 1)
⎝ 2⎠
+ Δ3 y − 1 + …
6
∴ y0⋅25 =
1
(3162 + 3544) + ⎛⎜ 1 − 1⎞⎟ × 382 + 1 ⎛⎜ 1 − 1⎞⎟ ⋅ (74 + 66)
2 ⎝ 4 2⎠ 4 ⎝4 ⎠ 4
(−8)
+ ⎛⎜ − ⎞⎟ ⋅ ⋅ ⎛⎜ − 1⎞⎟ ⋅
1 1 1 1
⎝ 4 2⎠ 4 ⎝ 4 ⎠ 6
x u yu Δ yu Δ2 yu Δ3 yu
20 −1 24
8
24 0 32 −5
3 7
28 1 35 2
5
32 2 40
Bessel’s formula is
u (u − 1) (Δ2 y −1 + Δ2 y0 )
( y0 + y1 ) + ⎛⎜ u −
1 1⎞
yu = ⎟ Δ y0 + ⋅
2 ⎝ 2⎠ 2! 2
⎛⎜ u − 1⎞⎟ u(u − 1)
⎝ 2⎠
+ ⋅ Δ3 y −1 + …
6
(−5 + 2)
(35 + 32) + ⎛⎜ − ⎞⎟ × 3 + ⎛⎜ − 1⎞⎟
1 1 1 1 1
∴ y0⋅25 = ⋅
2 ⎝ 4 2⎠ 4 ⎝4 ⎠ 4
+ ⎛⎜ − ⎞⎟ ⋅ ⋅ ⎛⎜ − 1⎞⎟ ⋅
1 1 1 1 7
⎝ 4 2⎠ 4 ⎝ 4 ⎠ 6
= 33 ⋅ 5 − ⋅ 75 + 0 ⋅ 140625 + 0 ⋅ 0546875 = 32 ⋅ 945313.
Thus the estimated value of y25 is 32 ⋅ 945313.
Example 10: Given the table :
x log x
310 2 ⋅ 4913617
320 2 ⋅ 5051500
330 2 ⋅ 5185139
340 2 ⋅ 5314789
350 2 ⋅ 5440680
360 2 ⋅ 5563025
x u yu Δ yu Δ2 yu Δ3 yu Δ4 yu Δ5 yu
310 −2 2 ⋅ 4913617
⋅0137883
360 3 2 ⋅ 5563025
1
Laplace-Everett’s formula where v = 1 − u = is
4
v (v2 − 1) (v2 − 1) (v2 − 4)
y u = vy0 + Δ2 y −1 + Δ4 y −2 + …
3! 5!
u (u2 − 1) u (u2 − 1) (u2 − 4)
+ uy1 + Δ2 y0 + Δ4 y −1 + …
3! 5!
(2 ⋅ 5185139 ) + ⎛⎜ −
1 5 ⎞
∴ y⋅75 = ⎟ (− ⋅ 0003989)
4 ⎝ 128⎠
63 3
+ (− ⋅ 0000025) + (2 ⋅ 5314789)
8192 4
+ ⎛⎜ − ⎞⎟ (− ⋅ 0003759) + 77 (− ⋅ 0000017)
7
⎝ 128⎠ 8192
= ⋅ 6296284 + ⋅ 0000156 + 1⋅ 8986092 + ⋅ 0000206
= 2 ⋅ 5282738 approx.
∴ log 337 ⋅ 5 = 2 ⋅ 5282738.
Example 11: Apply Everett’s formula to find y25 , given
y20 = 2854, y24 = 3162 , y28 = 3544, y32 = 3992 .
Solution: Take x = 24 as the origin and h = 4 as the unit.
25 − 24 1
We are to find the value of y for u = = ⋅
4 4
N-133
1 3
Now v = 1 − u = 1 − = ⋅
4 4
Using the difference table of Ex. 8, and putting the values in Everett’s formula, we
get
θ u yu Δyu Δ2 yu Δ3 yu Δ4 yu Δ5 yu Δ6 yu
0° −3 0 ⋅ 0000
⋅0875
5° −2 0 ⋅ 0875 ⋅0013
⋅0888 ⋅0015
10° −1 0 ⋅ 1763 ⋅0028 ⋅0002
⋅0916 ⋅0017 − ⋅ 0002
15° 0 0 ⋅ 2679 ⋅0045 ⋅0000 ⋅0011
⋅0961 ⋅0017 ⋅0009
20° 1 0 ⋅ 3640 ⋅0062 ⋅0009
⋅1023 ⋅0026
25° 2 0 ⋅ 4663 ⋅0088
⋅1111
30° 3 0 ⋅ 5774
Stirling’s formula is
1 u2 2
y u = y0 + u . [Δy0 + Δy −1 ] + Δ y −1
2 2
u (u2 − 1) 1 3 u2 (u2 − 1) 4
+ [Δ y −1 + Δ3 y −2 ] + Δ y −2
3! 2 4!
u (u2 − 1) (u2 − 4) 1 5 u2 (u2 − 1) (u2 − 4) 6
+ [Δ y −2 + Δ5 y −3 ] + Δ y −3 .
5! 2 6!
N-134
⋅2 (⋅2)2
∴ y⋅2 = 0 ⋅ 2679 + [⋅0961 + ⋅ 0916] + (⋅0045)
2 2
(⋅2) (⋅04 − 1) [⋅0017 + ⋅ 0017] (⋅04) (⋅04 − 1)
+ + (⋅0000)
6 2 24
(⋅2) (⋅04 − 1) (⋅04 − 4) (− ⋅ 0002 + ⋅ 0009)
+ ⋅
120 2
(⋅04) (⋅04 − 1) (⋅04 − 4)
+ (⋅0011)
720
= 0 ⋅ 2679 + ⋅ 01877 + ⋅ 00009 + negligible quantities
= 0 ⋅ 28676.
Thus the estimated value of tan 16° = 0 ⋅ 28676.
Example 13: If third differences are constant, prove that
1 1 2
y x + (1 /2) = ( y x + y x +1 ) − (Δ y x −1 + Δ2 y x ).
2 16
(Bundelkhand 2011, 12)
Solution: Bessel’s formula is
y0 + y1 x ( x − 1) Δ2 y −1 + Δ2 y0
+ ⎛⎜ x − ⎞⎟ Δy0 +
1
yx = ⋅
2 ⎝ 2⎠ 2! 2
⎛⎜ x − 1⎞⎟ x ( x − 1)
⎝ 2⎠
+ Δ3 y −1 . …(1)
3!
Here we have taken terms upto third differences since third differences are given to
be constant.
1
Putting x = in (1), we get
2
2 2
y0 + y1 1 ⎛ 1 ⎞ Δ y − 1 + Δ y0
y1 /2 = + ⎜ − 1⎟ …(2)
2 2 ⎝2 ⎠ 4
Changing the origin to − x, the equation (2) becomes
y x + y x +1 1 2
y x + (1 /2) = − (Δ y x −1 + Δ2 y x ).
2 16
The central differences formulae are more appropriate when the value of the
argument for unknown entry lies somewhere in the middle of the difference table.
The basic reason is that the central difference formulae are likely to converge more
rapidly.
Among these Gauss’s forward or backward formulae are suitable when the
interpolated value lies near to the right or left of the central value in the table.
Stirling’s formula is appropriate in the situation when the value of u in the
expression x = a + uh is very near to zero. Bessel’s formula will give a more accurate
result when interpolating near the middle of an interval.
Comprehensive Exercise 1
1. Prove that
(i) δ = Δ E −1 /2 = ∇ E1 /2
1 2
(ii) μ 2 = 1 + δ
4 (Rohilkhand 2011; Bundelkhand 11; Purvanchal 12)
1
(iii) E 1 /2 = μ + δ
2
1
(iv) E −1 /2 = μ − δ
2 (Rohilkhand 2011)
1
(v) √ (1 + δ 2 μ 2 ) = 1 + δ 2 . (vi) δ 2 y0 = y1 − 2 y0 + y −1
2
n
n
k n!
(vii) δ y x = Σ (−1) y x +(n /2)− k .
k =0 k ! (n − k) !
2. Establish the following relations :
1 1 1
(i) μδ = (∇ + Δ) = Δ E −1 + Δ
2 2 2 (Rohilkhand 2011)
(ii) Δ + ∇ = Δ / ∇ − ∇ / Δ.
3. If D, E, δ and μ be the operators with usual meanings and if hD = U, where h
is the interval of differencing , prove that
(i) E = eU
(ii) e − U = 1 − ∇
(iii) δ = 2 sinh (U / 2)
(iv) μ = cosh(U / 2)
(v) ( E + 1) δ = 2 μ ( E − 1).
4. Given y2 = 10, y1 = 8, y0 = 5, y −1 = 10, find y1 /2 by Gauss for ward
formula.
N-136
5. Given that :
√ (12500) = 111⋅ 803399 ; √ (12510) = 111⋅ 848111 ;
√ (12520) = 111⋅ 892806 ; √ (12530) = 111⋅ 937483.
Show by Gauss backward formula that
√ (12516) = 111⋅ 874930 . (Kanpur 2009)
6. Apply (a) Stirling’s formula, (b) Bessel’s formula (c) Gauss for ward
formula, (d) Laplace-Everett’s formula to find the value of f (1⋅ 22) from the
1 2
1 t − t
following table which gives the values of f (t) =
√ (2π) ∫0 e 2 dt at
intervals of t = 0 ⋅ 5 from t = 0 to t = 3 :
t f (t)
0 ⋅ 00 0 ⋅ 000
0 ⋅ 50 0 ⋅ 191
1 ⋅ 00 0 ⋅ 341
1 ⋅ 50 0 ⋅ 433
2 ⋅ 00 0 ⋅ 477
2 ⋅ 50 0 ⋅ 494
3 ⋅ 00 0 ⋅ 499
−x
7. The values of e for certain equidistant values of x are given in the
following table. Find the value of e − x when x = 1.7489 by Bessel’s as well as
Stirling formula.
x e− x
1.72 0.1790661479
1.73 0.1772844100
1.74 0.1755204006
1.75 0.1737739435
1.76 0.1720448638
1.77 0.1703329888
1.78 0.1686381473
8. Use Gauss interpolation formula to find y41 with the help of the following
data :
y30 = 3678 ⋅ 2, y35 = 2995 ⋅ 1, y40 = 2400 ⋅ 1,
y45 = 1876 ⋅ 2, y50 = 1416 ⋅ 3.
N-137
x f ( x)
⋅51 ⋅529244
⋅52 ⋅537895
⋅53 ⋅546464
⋅54 ⋅554939
⋅55 ⋅563323
⋅56 ⋅571616
⋅57 ⋅579816
11. Define the operators δ and μ and prove that
δ [ f ( x) g ( x)] = μf ( x) δg ( x) + μg ( x) δf ( x).
12. Apply Bessel’s formula to find a polynomial of degree three or less which
takes the following values of the function u x :
x : 4 6 8 10
f ( x) : 1 3 8 20
A nswers 1
4. 6
6. (a) 0 ⋅ 3886, (b) 0 ⋅ 388, (c) 0 ⋅ 389, (d) 0 ⋅ 389
7. 0 ⋅ 1739652000, 0 ⋅ 1739652000 8. y41 = 2290 ⋅ 0
9. 0 ⋅ 3165 10. 0 ⋅ 558052
19. The central difference formulae are more appropriate when the value of the
argument for unknown entry lies somewhere in the …… of the difference
table :
(a) beginning (b) end
(c) middle (d) none of these
20. Value of Δ − ∇ is equal to :
(a) Δ∇ (b) δ 2
(c) ∇Δ (d) All correct
Δ ∇
21. Value of − is equal to :
∇ Δ
(a) Δ + ∇ (b) Δ − ∇
Δ
(c) (d) none of these
∇
22. Value of δ is equal to :
(a) ΔE −1 /2 (b) ∇E 1 /2
(c) both (a) and (b) (d) none of these
23. Value of E −1 /2 is equal to :
1 1
(a) μ − δ (b) μ + δ
2 2
μ δ
(c) (d)
2δ 2μ
1
24. Value of 1 + δ 2 is equal to :
2
δ2 δ2
(a) 1+ (b) 1+
μ2 μ2
(c) 1+ μ 2 δ 2 (d) 1+ μ 2 δ 2
25. Value of E1 /2 is equal to :
1 1
(a) μ + δ (b) μ − δ
2 2
1 1
(c) δ + μ (d) δ − μ
2 2
26. The value of Δ∇ is equal to :
(a) Δ∇
(b) δ 2
(c) both (a) and (b)
(d) none of these
27. Value of δ n y x is equal to :
(a) Δ n y x − (n 2) (b) Δ n+1 y x − (n 2)
(c) Δ n − 1 y x − (n 2) (d) Δn y x + (n 2)
N-141
28. If y20 = 512, y30 = 439, y40 = 346, y50 = 243, then y35 =
(a) 390 (b) 385
(c) 380 (d) 395
29. If y20 = 24, y24 = 32, y28 = 35, y32 = 40,then y25 =
(a) 32.950 (b) 32.940
(c) 32.945 (d) 32.955
30. If y2 = 10, y1 = 8, y0 = 5, y −1 = 10,then y1 2 =
(a) 8 (b) 6
(c) 5 (d) 4
x − x0
31. If u = , then Gauss forward interpolation formula is y =
h
u(u + 1) u(u2 − 1)
(a) y0 + uΔy0 + Δ 2 y −1 + Δ3 y −1 + …
2! 3!
u(u − 1) u(u2 − 1)
(b) y0 + uΔy0 + Δ 2 y −1 + Δ3 y −1 + …
2! 3!
u(u − 1) u(u − 1)(u − 2) 3
(c) y0 + uΔy0 + Δ 2 y −1 + Δ y −1 + …
2! 3!
(d) none of these (Meerut 2013B)
32. If the values of the argument are equally spaced and we require to find the
derivative of the function at a point near the beginning of a set of tabular
values, we use :
(a) Newton-Gregory forward formula
(b) Newton-Gregory backward formula
(c) Central difference formula
(d) Newton’s divided difference formula
33. If the values of the argument are equally spaced and we require to find the
derivative of the function at a point near the end of a set of tabular values,
we use :
(a) Newton-Gregory forward formula
(b) Newton-Gregory backward formula
(c) Central difference formula
(d) Newton’s divided difference formula
34. If the values of the argument are equally spaced then to find the derivative
at a point near the middle of the table, we should use :
(a) Newton-Gregory forward formula
(b) Newton-Gregory backward formula
(c) Central difference formula
(d) Newton’s divided difference formula
N-142
A nswers
¨
5
S olution of A lgebraic and
T ranscendental E quations
5.1 Introduction
n applied mathematics, the most frequently occurring problem is to find the
I roots of equations of the form
f ( x) = 0. …(1)
The equation f ( x) = 0 is called Algebraic or Transcendental according as f ( x) is
purely a polynomial in x or contains some other functions such as logarithmic,
exponential and trigonometric functions etc., e. g.,
1 + cos x − 5 x, x tan x − cosh x, e − x − sin x, etc.
A polynomial in x of degree n is an expression of the form
f ( x) = a0 x n + a1 x n −1 + … + a n −1 x + a n ,
where a’s are constants and n is a positive integer. The zeros or the roots of the
polynomial f ( x) are those values of x for which f ( x) is zero. Geometrically, if the
graph of f ( x) crosses the x-axis at the point x = a then x = a is a root of the equation
f ( x) = 0. We conclude that a is a root of the equation f ( x) = 0 if and only if
f (a) = 0.
N-144
a a0 a1 a2 a3 …… an−1 an
ab0 ab1 ab2 …… abn−2 abn−1
b0 b1 b2 b3 …… bn−1 R
Rule for synthetic division: First we make the polynomial f ( x) complete (if it
is not so) by supplying the missing terms with zero coefficients.
In the first row we write the successive coefficients a0 , a1 , a2 , … , a n of the
polynomial f ( x).
If we are to divide the polynomial by x − a, we write a in the corner as shown above.
In the third row write b0 below a0 (note that b0 = a0 ). The first term in the second
row is obtained by multiplying b0 (or a0 ) by a. The product ab0 is written under a1 .
Adding ab0 to a1 , we get b1 , which is the second term in the third row. Multiplying
b1 by a the product ab1 is written under a2 . Adding ab1 to a2 we get b2 , which is the
third term in the third row. We continue this process. The last term in the third row
is the value of the remainder R while the last but one term in the third row is the
value of b n−1 .
Note: In case R = 0, we can say that a is a root of the equation f ( x) = 0 and the
equation f ( x) = 0 can be depressed by one dimension.
In case R is not equal to zero, we get R = f (a) by remainder theorem.
If y (1) and y2 are of opposite signs, then second approximation can be obtained by
using the method of false position to the interval ( x (1) , x2 ). Continuing this process
we can obtain the root to the desired degree of accuracy.
(iv) The Secant Method: This method is similar to that of Regula-Falsi
method except the condition that f ( x1 ) . f ( x2 ) < 0. In this method the graph of
the function y = f ( x) in the neighbourhood of the root is approximated by a
secant line (chord). Here it is not necessary that the interval at each iteration
should contain the root. Let x1 and x2 be the limits of interval initially, then the
first approximation is given by
( x − x1 ) f ( x2 )
x3 = x2 + 2 ⋅
f ( x1 ) − f ( x2 )
The formula for successive approximations in general form is given by
( x − x n−1 ) . f ( x n )
x n +1 = x n + n ,n≥2.
{ f ( x n−1 ) − f ( x n )}
If at any iteration we have f ( x n ) = f ( x n−1 ), then the secant method fails. Hence
the method does not converge always while the Regula-Falsi method converges
surely. But if the secant method converges then it converges more rapidly than the
Regula-Falsi method.
(v) Successive Iteration Method: In this method for finding the roots of the
equation f ( x) = 0 it is expressed in the form x = φ ( x).
Let x0 be an initial approximation to the solution of x = φ ( x).Substituting it in φ ( x)
the next approximation x1 is given by x1 = φ ( x0 ).Again, substituting x = x1 in φ ( x),
we get the next approximation as x2 = φ ( x1 ).
Continuing in this way, we get
x n = φ ( x n−1 ) or x n+1 = φ ( x n ).
Thus we get a sequence of successive approximations which may converge to the
desired root.
For using this method, the equation f ( x) = 0 can be put as x = φ ( x) in many
different ways.
Let f ( x) = x 2 − x − 1 = 0. It can be written as
(i) x = x 2 − 1,
(ii) x 2 = x + 1 or x = √ ( x + 1),
2
(iii) x = x + 1 or x = 1 + (1 / x),
2
(iv) x = x − ( x − x − 1) or x = 2 x − x 2 + 1.
There can be other arrangements also of this equation.
In order to find the root of f ( x) = 0, i. e., x = φ ( x), we are to find the abscissa of
the point of intersection of the line y = x and the curve y = φ ( x). These two may or
may not intersect. If these two curves do not intersect, then the equation
N-148
tangent intersects the x-axis at a point T2 which lies between T1 and S. We continue
this process. Let the curvature of the graph do not change sign between P and S.
Then the points T , T1 , T2 , …will approach the point S as a limit or in other words
the intercepts OT , OT1 , OT2 , … will tend to the intercept OS as a limit. But OS
denotes the real root of the equation f ( x) = 0. So OT , OT1 , OT2 , … denote
successive approximations to the desired root.
From this figure we derive the fundamental formula. Let MT = h1 and TT1 = h2 ,
etc.
f ( x0 )
We have PM = f ( x0 ), slope at P = tan ∠ XTP = − ⋅
h1
Also the slope of the graph at P is f ′ ( x0 ).
f ( x0 ) f ( x0 )
Thus we get f ′ ( x0 ) = − ⇒ h1 = − ⋅
h1 f ′ ( x0 )
Similarly, we find from the Δ P1 TT1 that
f ( x1 )
h2 = − ⋅
f ′ ( x1 )
From this discussion we conclude that in this method we replace the graph of the
given function by a tangent at each successive step in the approximation process.
It can be used for solving both algebraic and transcendental equations and it can
also be used when the roots are complex.
Newton’s iterative formula for obtaining inverse, square root, cube root etc.
1. Inverse. The quantity a −1 can be considered as a root of the equation
(1 / x) − a = 0.
Here f ( x) = x −1 − a.
∴ f ′ ( x) = − 1 / x 2 .
Hence by Newton’s formula, we get the simple recursion formula
(1 / x n ) − a
x n +1 = x n +
1 / x n2
or x n +1 = x n (2 − ax n ).
2. Square root: The quantity √ a can be considered as a root of the equation
x 2 − a = 0. From this we get the recursion formula
1⎛ a⎞
x n +1 = ⎜ xn + ⎟⋅
2⎝ xn ⎠
3. Inverse Square root: The inverse square root of a is the root of the equation
1
− a = 0. From this we get the iterative formula
x2
1
x n +1 = x n (3 − ax n2 ).
2
4. Formula of p th root and reciprocal p th root: For computing p th root of
p
a we can solve the equation x − a = 0.
N-150
p p −1
Here f ( x) = x − a. ∴ f ′ ( x) = px .
Hence by Newton’s formula, we obtain the recursion formula
( x p − a) ( p − 1) x n p + a
x n+1 = x n − n p −1 = ⋅
px n px n p −1
1
The reciprocal of pth root of a can be obtained by solving the equation p
−a=0
x
by Newton’s method. We get the iterative formula
( p + 1 − ax n p )
x n +1 = x n ⋅
p
(vii) Graeffe’s root squaring method: This is a method which does not
require any prior information of the roots such as approximate value of the root
etc. But this method is applicable to polynomial equations only. Sometimes it
gives all the roots of the polynomial equation.
We consider the equation x n + a1 x n−1 + … + a n = 0. …(1)
For the sake of simplicity we assume all roots to be real and different from each
other. Keeping all even terms on one side and all odd terms on the other, we have
( x n + a2 x n − 2 + a4 x n − 4 + …)2 = (a1 x n−1
+ a3 x n−3
+ a5 x n − 5 + …)2 .
Putting x 2 = y, we get the new equation
y n + b1 y n −1 + b2 y n−2
+ … + b n = 0, …(2)
b1 = − a1 + 2a2 2 ⎫
where ⎪
b2 = a2 2 − 2a1 a3 + 2a4 ⎪
⎪
b3 = − a3 2 + 2a2 a4 − 2a1 a5 + 2a6 ⎬
… … … … … …⎪
⎪
b n = (−1) n a n2 ⎪
⎭
or (−1) r b r = a r 2 − 2 a r −1 a r +1 + 2 a r −2 a r +2 − … …(3)
The roots of the equation (2) are the squares of the roots of the equation (1).
Suppose that, after m squarings, we have obtained the equation
z n + λ 1 z n−1 + … + λ n = 0, …(4)
with the roots q1 , q2 , … , q n , while the roots of the original equation are
p1 , p2 , … , pn .
m
Then q i = pi2 , i = 1, 2 , … , n. Also, we assume that
| p1| > | p2| > … > | pn||q1| >>|q2| >>… >>|q n|,
and
| q2 | q
where the symbol >> indicates “much greater than”. Hence = 2 etc. can be
|q1| q1
neglected in comparison with unity. Since q i is an even power of pi so it is always
positive.
N-151
From the theory of equations the relations between the roots α1 , α 2 , … , α n and
the coefficients a1 , a2 , … , a n of the equation
x n + a1 x n −1 + a2 x n − 2 + …+ a n −1 x + a n = 0 are
Σ α1 = − a1 = (−1) a1
Σ α1α 2 = (−1)2 a2 , Σα1α 2 α 3 = (−1)3 a3
… … … …
n
α1α 2 … α n = (−1) a n .
Hence from the equation (4), we get
Σ q1 = q1 + q2 + … + q n = (−1)1 λ 1 ⎫
⎪
Σ q1 q2 = q1 q2 + q2 q3 + … = (−1)2 λ 2 ⎪
⎪
Σ q1 q2 q3 = q1 q2 q3 + q1 q2 q4 + … = (−1)3 λ 3 ⎬
… … … … … … ⎪
⎪
n
q1 q2 q3 … q n = (−1) λ n ⎪
⎭
⎛ q ⎞
or λ 1 = − (q1 + q2 + … + q n ) = − q1 ⎜1 + 2 + …⎟
⎝ q1 ⎠
⎛ q ⎞
λ 2 = (q1 q2 + q2 q3 + …) = q1 q2 ⎜1 + 3 + …⎟
⎝ q1 ⎠
⎛ q ⎞
λ 3 = − (q1 q2 q3 + q1 q2 q4 + …) = − q1 q2 q3 ⎜1 + 4 + …⎟
⎝ q3 ⎠
… … … … …
n
λ n = (−1) q1 q2 … q n .
Since the quantities q2 / q1 etc. are negligible in comparison with unity, so we get
λ 1 − q1 ⎫
⎪
λ 2 q1 q2 ⎪
⎪
λ 3 − q1 q2 q3 ⎬ …(5)
… … … ⎪
⎪
λ n (−1) q1 q2 … q n ⎪⎭
n
ε n2 ε 3
f (a) + ε n f ′ (a) + f ′ ′ (a) + n f ′ ′ ′ (a) + …
2! 3!
= εn −
ε n2 ε 3 iv
f ′ (a) + ε n f ′ ′ (a) + f ′ ′ ′ (a) + n f (a) + …
2! 3!
ε n2 ε 3
f ′ ′ (a) + n f ′ ′ ′ (a) + …
2! 3!
= εn −
ε n2
ε n f ′ ′ (a) + f ′ ′ ′ (a) + …
2! [ ∵ f (a) = 0 = f ′ (a)]
1 ε
f ′ ′ (a) + n f ′ ′ ′ (a)
= εn − εn 2 6 , neglecting higher powers
εn
f ′ ′ (a) + f ′ ′ ′ (a)
2
1 ε
f ′ ′ (a) + n f ′ ′ ′ (a)
2 3 1 f ′ ′ (a)
= εn = εn ⋅
ε 2 f ′ ′ (a)
f ′ ′ (a) + n f ′ ′ ′ (a)
2
1 2 −1
= εn = εn .
2 2
This implies that the convergence is linear. In general we can prove that if x = a is a
root of multiplicity m, where m > 1 then the speed of convergence is given by
m −1
ε n +1 ≈ ε n , which is also linear.
m
Y
Example 1: Find the approximate value of the root of
x − sin x − 1 = 0. y=x–1
Solution: Since the L.H.S. of the equation is the
1 x
difference of two functions, we can put it in the form sin
=
x − 1 = sin x. y
O
Then we plot separately on the same set of coordinate 1 2 3 Xx
axes the two equations
–1
y1 = x − 1 and y2 = sin x.
The abscissa of the point of intersection of the graphs
of these equations is seen to be about 1⋅ 9 in the diagram. Hence the approximate
value of the root is 1⋅ 9.
Example 2: Find the approximate value of the smallest real root of e − x = sin x.
Solution: We plot separately on the same set of axes the two equations y1 = e − x
and y2 = sin x as shown in the adjoining diagram.
N-155
The abscissa of the point of intersection of the graphs of these equations is seen to
be about 0 ⋅ 6. Hence the approximate value of the root is 0 ⋅ 6.
Y
·8 ·9 ·1
x
sin
y=
·1 ·2 ·3 ·4 ·5 ·6 ·7
y= e –x
O X
·1 ·2 ·3 ·4 ·5 ·6 ·7 ·8 ·9 ·1
1 3
Hence we take x0 = (1 + 2) = ⋅
2 2
Then f ( x0 ) = (27 / 8) − (3 / 2) − 1 = 7 / 8, which is positive. Since f (1) and f (1⋅ 5)
are of opposite signs so the root lies between 1 and 1⋅ 5 and we get
1 + 1⋅ 5
x1 = = 1⋅ 25.
2
19
We have f ( x1 ) = − , which is negative. Hence we conclude that the root lies
64
between 1⋅ 25 and 1⋅ 5. It gives that
1⋅ 25 + 1⋅ 5
x2 = = 1⋅ 375.
2
Repeating the procedure, we obtain the successive approximations as
x3 = 1⋅ 3125, x4 = 1⋅ 34375, x5 = 1⋅ 328125, etc.
Example 5: Compute the real root of x log10 x − 1⋅ 2 = 0 correct to five decimal places.
(Purvanchal 2011)
Solution: Let f ( x) = x log 10 x − 1⋅ 2 .
We have f (2) = − 0 ⋅ 60 and f (3) = 0 ⋅ 23.
It shows that the root lies between 2 and 3 and it is nearer to 3. The following table
shows successive approximations where corrections are computed by
( x2 − x1 )| y1|
h= ⋅
| y1| + | y2|
x y
1 × 0⋅ 6
First 2 − 0⋅6 h1 = = 0⋅ 72
approx. 0⋅ 83
3 + 0 ⋅ 23
x (1) = 2 + 0⋅ 72 = 2⋅ 72 .
Diff. 1 0 ⋅ 83
0⋅ 1 × 0⋅ 04
Second 2⋅ 7 − 0 ⋅ 04 h2 = = 0⋅ 044
approx. 0⋅ 09
2⋅ 8 0 ⋅ 05
x ( 2) = 2⋅ 7 + 0⋅ 044 = 2⋅ 744.
0⋅ 1 0 ⋅ 09
0⋅ 01 × 0⋅ 0006
Third 2⋅ 74 − 0 ⋅ 0006 h3 = = 0⋅ 0007
approx. 0⋅ 0087
2⋅ 75 + 0 ⋅ 0081 ( 3)
x = 2⋅ 74 + 0⋅ 0007 = 2⋅ 7407.
0⋅ 01 0 ⋅ 0087
0⋅ 0001 × 0⋅ 000039
Fourth 2⋅ 7406 − 0 ⋅ 000039 h4 =
approx. 0⋅ 000084
2⋅ 7407 + 0 ⋅ 000045 = 0⋅ 000046
0⋅ 0001 0 ⋅ 000084
N-157
( 4)
x = 2⋅ 7406 + 0⋅ 000046
= 2⋅ 74065.
Hence the required value of the root is 2 ⋅ 74065.
Example 6: The equation x 6 − x 4 − x 3 − 1 = 0 has one real root between 1⋅ 4 and 1⋅ 5.
Find the root to four decimals by false position method.
Solution: The successive approximations are given below :
x y
⋅1 × ⋅ 056064
First 1 ⋅ 4 − ⋅ 056064 h1 = = ⋅ 003
approx. 2⋅ 009189
1⋅ 5 1 ⋅ 953125 (1)
x = 1⋅ 4 + ⋅ 003 = 1⋅ 403
Diff. ⋅1 2 ⋅ 009189
⋅001 × ⋅ 0167
Second 1 ⋅ 403 − ⋅ 0167 h2 = = ⋅ 0007
approx. ⋅0223
1 ⋅ 404 0 ⋅ 0056 ( 2)
x = 1⋅ 403 + ⋅ 0007 = 1⋅ 4037.
⋅001 ⋅0223
⋅0001 × ⋅ 0001
Third 1 ⋅ 4036 − ⋅ 0001 h3 = = ⋅ 00002
⋅0005
approx.
1 ⋅ 4037 ⋅0004 ( 3)
x = 1⋅ 4036 + ⋅ 00002 = 1⋅ 4036.
⋅0001 ⋅0005
Hence the value of the root is 1⋅ 4036.
Example 7: Use Newton’s method to find a root of the equation x 3 − 3 x − 5 = 0.
(Kanpur 2012)
3 2
Solution: Here we have f ( x) = x − 3 x − 5 ⇒ f ′ ( x) = 3 x − 3.
Also f (2) = − 3 and f (3) = 13.
Hence a root lies between 2 and 3.
We take x0 = 3 and obtain successive approximations using the formula
f (x n)
x n +1 = x n − ⋅
f ′ (x n)
x n3 − 3 x n − 5
It gives x n +1 = x n − ⋅
3 x n2 − 3
x0 3 − 3 x0 − 5 13
∴ x1 = x0 − =3− = 2 ⋅ 46, x2 = 2 ⋅ 295,
3 x0 2 − 3 24
x3 = 2 ⋅ 279, x4 = 2 ⋅ 279.
Hence the value of the required root is 2 ⋅ 279.
N-158
Example 8: Find the real root of the equation x 2 + 4 sin x = 0 correct to four places of
decimals by using Newton-Raphson method.
Solution: Since the term x 2 is positive for all real values of x so it is obvious that
the equation will be satisfied only by a negative value of x. By the graph we observe
that an approximate value of the root is −1⋅ 9.
Here f ( x) = x 2 + 4 sin x.
∴ f ′ ( x) = 2 x + 4 cos x.
f (x n)
We have x n +1 = x n − , n = 0, 1, 2 , …
f ′ (x n)
x n2 + 4 sin x n
⇒ x n +1 = x n − , n = 0, 1, 2 ,… …(1)
2 x n + 4 cos x n
Taking x0 = − 1⋅ 9, the relation (1) gives
x0 2 + 4 sin x0 (−1⋅ 9)2 + 4 sin (−1⋅ 9)
x1 = x0 − = − 1⋅ 9 −
2 x0 + 4 cos x0 2 (− 1⋅ 9) + 4 cos (−1⋅ 9)
3 ⋅ 61 − 3 ⋅ 78
= − 1⋅ 9 − = − 1⋅ 93.
− 3 ⋅ 8 − 1⋅ 293
The second approximation
x12 + 4 sin x1 (− 1⋅ 93)2 + 4 sin (− 1⋅ 93)
x2 = x1 − = − 1⋅ 93 −
2 x1 + 4 cos x1 2 (− 1⋅ 93) + 4 cos (− 1⋅ 93)
0 ⋅ 0198
= − 1⋅ 93 − = − 1⋅ 93 − 0 ⋅ 0038 = − 1⋅ 9338.
5 ⋅ 266
Hence the value of the root is − 1⋅ 9338.
Example 9: Find 12 to five places of decimal by Newton-Raphson method.
⎡ε 2 ⎤
2 ⎢ n f ′ ′ (a) + …⎥
⎣2! ⎦
ε n +1 = ε n −
⎡ ε n2 ⎤
⎢ε n f ′ ′ (a) + f ′ ′ ′ (a) + …⎥
⎣ 2! ⎦
N-163
1 ⎡
f ′ ′ (a) + ε n f ′ ′ ′ (a) + …⎤
1
2 . ε n2
2 ! ⎣⎢ 3 ⎦⎥
= εn −
⎡ ε ⎤
ε n ⎢ f ′ ′ ′ (a) + n f ′ ′ ′ (a) + …⎥
⎣ 2! ⎦
ε n ⎡ f ′ ′ (a) + ε n f ′ ′ ′ (a)⎤
1
⎢⎣ 3 ⎥⎦
εn −
⎡ εn ⎤
⎢ f ′ ′ (a) + f ′ ′ ′ (a)⎥
⎣ 2 ! ⎦
1 2 f ′ ′ ′ (a) 1 f ′ ′ ′ (a)
εn ε n2
6 ⎡ ε n f ′ ′ ′ (a)⎤ 6 f ′ ′ (a)
⎢ f ′ ′ (a) + ⎥
⎣ 2! ⎦
which shows that ε n +1 ∝ ε n2 and so the convergence is quadratic.
Example 16: (i) Show that the following two sequences, both have convergence of the second
order with the same limit √ a.
1 ⎛ a ⎞ 1 ⎛ x 2⎞
x n +1 = x n ⎜1 + 2 ⎟ and x n +1 = x n ⎜3 − n ⎟ ⋅
2 ⎝ xn ⎠ 2 ⎝ a ⎠
(Rohilkhand 2011)
(ii) If x n is suitable close approximation to √ a, show that error in the first formula for x n+1 is
about one-third in the second formula and deduce that
x n +1 = ( x n / 8) [6 + (3a / x n2 ) − ( x n2 / a)],
gives a sequence with third order convergence.
1 ⎛ a ⎞
Solution: (i) We have x n +1 = x n ⎜1 + 2 ⎟
2 ⎝ xn ⎠
1 ⎛ a ⎞
⇒ x n +1 − √ a = x n ⎜1 + 2 ⎟ − √ a
2 ⎝ xn ⎠
2
1⎛ a ⎞ 1⎛ √a ⎞ 1
= ⎜ xn + − 2 √ a⎟ = ⎜ √ x n − ⎟ = ( x n − √ a)2
2⎝ xn ⎠ 2⎝ √ xn ⎠ 2 xn
1
⇒ ε n +1 = ε n2 , …(1)
2 xn
which shows the quadratic convergence.
Similarly for the second sequence, we have
1 ⎛ x 2⎞
x n +1 − √ a = x n ⎜3 − n ⎟ − √ a
2 ⎝ a ⎠
1 ⎛ x 2⎞
= x n ⎜1 − n ⎟ + ( x n − √ a)
2 ⎝ a ⎠
N-164
⎡ x ⎤
= ( x n − √ a) 1 − n ( x n + √ a)
⎣⎢ 2a ⎥⎦
( x n − √ a)
= {2a − x n2 − √ a x n}
2a
( x n − √ a)
= {(a − x n2 ) + (a − √ a x n )}
2a
( x n − √ a)
=− ( x n − √ a) ( x n + 2 √ a)
2a
( x n + 2 √ a)
=− ( x n − √ a)2 .
2a
( x n + 2 √ a)
Thus ε n +1 = − ε n2 , …(2)
2a
which shows that the convergence is quadratic.
(ii) Since x n is very close to √ a, from (2) we have
x + 2 xn 2 3
ε n+1 − n 2
εn = − ε n2 . …(3)
2 xn 2 xn
If we look at the equations (1) and (3), we conclude that the error in the first
formula for x n+1 is about one-third of that in the second formula.
Now we shall find the rate of convergence of the third formula.
We have
1 ⎛ 3a x 2⎞
x n+1 − √ a = x n ⎜6 + 2 − n ⎟ − √ a
8 ⎝ xn a ⎠
x n (6 x n2 a + 3a2 − x n4 ) 6 x n2 a + 3a2 − x n4 − 8 x n a √ a
= − √a =
8 x n2 a 8 xn a
(x n + 3 √ a) ( x n3 − 3 x n2 √ a + 3xn a − a √ a
=−
8 xn a
( x n − √ a)3
= − ( x n + 3 √ a) ⋅
8 xn a
( x n + 3 √ a)
Thus ε n +1 = − ε n3 ,
8 xn a
which shows that the convergence is of third order.
Example 17: Find a real root of the equation f ( x) = x 3 + x 2 − 1 = 0, by using iteration
method.
Solution: Here f (0) = − 1and f (1) = 1, so a root lies between 0 and 1. To find this
root, we put the equation in the form x = φ ( x).
1
∴ x3 + x2 − 1 = 0 ⇒ x = ,
√ (1 + x)
N-165
1 1
so that φ ( x) = , φ′ ( x) = − ⋅
√ (1 + x) 2 (1 + x)3 /2
We have |φ′ ( x)| < 1, for x < 1.
Hence the iterative method can be applied.
Taking x0 = 0 ⋅ 5, we get
1 1
x1 = φ ( x0 ) = = ⋅ 81649, x2 = φ ( x1 ) = = ⋅ 74196,
√ (1⋅ 5) √ (1⋅ 81649)
1
x3 = φ ( x2 ) = = ⋅ 75767.
√ (1⋅ 74196)
Similarly we get other approximations as
x4 = ⋅ 75427, x5 = ⋅ 75500, x6 = ⋅ 75485,
x7 = ⋅ 75488 , x8 = ⋅ 75487, etc.
Example 18: Find the root of the equation 2 x = cos x + 3 correct to three decimal places by
using iteration method.
The given equation can be put in the form
Solution:
1
x = (cos x + 3).
2
1
Here φ ( x) = (cos x + 3).
2
1
∴ φ′ ( x) = (− sin x).
2
⏐sin x⏐
⏐ < 1.
We have |φ′ ( x)| = ⏐
⏐ 2 ⏐
π
Hence the iterative method is applicable and starting with x0 = , we obtain
2
successive approximations as follows :
x1 = 1⋅ 5, x2 = 1⋅ 535, x3 = 1⋅ 518, x4 = 1⋅ 526,
x5 = 1⋅ 522 , x6 = 1⋅ 524, x7 = 1⋅ 523, x8 = 1⋅ 524.
Hence we take the value of the root as 1⋅ 524 correct to three decimal places.
Example 19: Starting with x = ⋅12 , solve x = ⋅ 21 sin (⋅5 + x) by using iteration method.
Solution: The given equation is x = ⋅ 21 sin (⋅5 + x) so that
φ ( x) = ⋅ 21 sin (⋅5 + x) and |φ′ ( x)| < 1.
Hence the iterative method is applicable.
First approximation
x1 = ⋅ 21 sin (⋅5 + ⋅ 12) = ⋅ 21 sin (⋅62) = ⋅ 21 × ⋅ 58104 = ⋅ 1220.
Second approximation
x2 = ⋅ 21 sin (⋅5 + ⋅ 122) = ⋅ 21 sin (⋅622) = ⋅ 21 × ⋅ 58267 = ⋅ 1224.
Third approximation
x3 = ⋅ 21 sin (⋅5 + ⋅ 1224) = ⋅ 21 sin (⋅6224) = ⋅ 21 × ⋅ 58299 = ⋅ 12243.
N-166
Fourth approximation
x4 = ⋅ 21 sin (⋅5 + ⋅ 12243) = ⋅ 21 sin (⋅62243) = ⋅ 21 × ⋅ 58301 = ⋅ 12243.
Since x3 = x4 , the required root is ⋅12243.
Example 20: Solve x 3 − 8 x 2 + 17 x − 10 = 0 by Graeffe’s method, squaring three times.
(Rohilkhand 2002)
Solution: The given equation is
x 3 − 8 x 2 + 17 x − 10 = 0 …(1)
Let the roots of (1) be p1 , p2 , p3 .
The equation (1) can be written as
x 3 + 17 x = 8 x 2 + 10 or x ( x 2 + 17) = 8 x 2 + 10.
Squaring, we get x 2 ( x 2 + 17)2 = (8 x 2 + 10)2 .
Putting x 2 = y, we have
y ( y + 17)2 = (8 y + 10)2
or y 3 − 30 y 2 + 129 y − 100 = 0 …(2)
The roots of (2) are the squares of the roots of the given equation (1).
Again from (2) bringing terms containing odd powers of y on one side and even
powers of y on the other side, we get
y ( y 2 + 129) = 30 y 2 + 100.
Squaring, we get
y 2 ( y 2 + 129)2 = (30 y 2 + 100)2 .
Putting y 2 = z , we have
z (z + 129)2 = (30 z + 100)2
or z 3 − 642 z 2 + 10641 z − 10 4 = 0. …(3)
2 2
From (3), z (z + 10641) = 642 z + 10000
2 2
or z (z + 10641) = (642 z 2 + 10000)2
2
10 8
| p3|8 = q3 ⋅
100390881
Taking square roots 3 times, we get
| p1| = (390882)1 /8 = 5 ⋅ 00041
| p2| = (100390881 / 390882)1 /8 = 2 ⋅ 00081
| p3| = (10 8 / 100390881)1 /8 = 0 ⋅ 999512 .
Now | p1| = 5 ⋅ 00041 ⇒ p1 = ± 5 ⋅ 00041.
By actually substituting in (1), we see that p1 = 5 ⋅ 00041 satisfies (1) while
p1 = − 5 ⋅ 00041 does not satisfy (1). So, p1 = 5 ⋅ 00041.
Similarly, we see that the admissible values of p2 , p3 are
p2 = 2 ⋅ 00081, p3 = 0 ⋅ 999512 .
Hence, the required roots of the given equation (1) are
5 ⋅ 00041, 2 ⋅ 00081, 0 ⋅ 999512 .
We see that the exact values of the roots of (1) are 5, 2 , 1. The approximate values of
the roots given by Graeffe’s root square method are sufficiently close to them.
Comprehensive Exercise 1
A nswers 1
A nswers
Multiple Choice Questions
1. (a) 2. (a) 3. (b) 4. (b) 5. (a)
6. (b) 7. (b) 8. (a) 9. (d) 10. (a)
11. (b) 12. (b) 13. (c) 14. (a) 15. (c)
16. (b) 17. (a) 18. (b) 19. (c) 20. (c)
21. (a) 22. (a) 23. (a) 24. (a) 25. (b)
26. (c) 27. (b) 28. (a) 29. (b) 30. (c)
31. (a) 32. (b) 33. (a) 34. (d) 35. (c)
36. (b) 37. (c) 38. (c)
¨
6
N umerical D ifferentiation
6.1 Introduction
he process of finding the derivative or derivatives of a function at some value of
T the independent variable, when we know the values of the function corresponding
to the given values of the independent variable, is called numerical differentiation.
The problem of differentiation is solved by the principle “Fit up an interpolation
polynomial to the given set of values of the function and then differentiate it as many
times as desired”. In case the values of the argument are equally spaced, we represent
the function by Newton-Gregory formula. If it is required to find the derivative of the
function at a point near the beginning (end) of a set of tabular values, we use
Newton-Gregory forward (backward) formula. To find the derivative at a point near
the middle of the table, we should use one of central difference formulae. If the values
of the argument are unequally spaced, Newton’s divided difference formula should be
used to represent the function.
To find the maximum or minimum value of a tabulated function we compute the
necessary differences from the given table, and substitute them in some suitable
interpolation formula. Then we put the first derivative of the function obtained
from this formula equal to zero and solve for u. The required value of x is obtained
from the relation x = x0 + hu.
N-174
Example 1: Find the first, second and third derivatives of the function tabulated below, at
the point x = 1⋅ 5
x : 1⋅ 5 2 ⋅0 2 ⋅5 3 ⋅0 3 ⋅5 4 ⋅0
y = f ( x) : 3 ⋅ 375 7 ⋅ 000 13 ⋅ 625 24 ⋅ 000 38 ⋅ 875 59 ⋅ 000
Solution: Since the derivatives are required at x = 1⋅ 5, which is near the beginning
of the table, therefore we shall use Newton’s forward formula. The difference table
is given below :
x y Δy Δ2 y Δ3 y Δ4 y
1⋅ 5 3 ⋅ 375
3 ⋅ 625
2 ⋅0 7 ⋅ 000 3 ⋅ 000
6 ⋅ 625 ⋅750
2 ⋅5 13 ⋅ 625 3 ⋅ 750 0
10 ⋅ 375 ⋅750
3 ⋅0 24 ⋅ 000 4 ⋅ 500 0
14 ⋅ 875 ⋅750
3 ⋅5 38 ⋅ 875 5 ⋅ 250
20 ⋅ 125
4 ⋅0 59 ⋅ 000
Newton’s forward formula is
f (a + xh) = f (a) + x
C1 Δf (a) + x
C2 Δ2 f (a) + x
C3 Δ3 f (a),
upto third differences
x ( x − 1) x ( x − 1) ( x − 2) 3
= f (a) + xΔf (a) + Δ2 f (a) + Δ f (a).
2! 3!
Differentiating w.r.t. x thrice and then putting x = 0 in the equations obtained, we
get
1 1
hf ′ (a) = Δf (a) − Δ2 f (a) + Δ3 f (a),
2 3
h2 f ′ ′ (a) = Δ2 f (a) − Δ3 f (a), h3 f ′ ′ ′ (a) = Δ3 f (a).
Putting a = 1⋅ 5, h = ⋅ 5 and the values of various differences in these equations, we
get
1 ⎡
3 ⋅ 625 − (3 ⋅ 000) + (⋅750)⎤ = 4 ⋅ 750,
1 1
f ′ (1⋅ 5) =
⋅5 ⎣⎢ 2 3 ⎦⎥
1
f ′ ′ (1⋅ 5) = [3 ⋅ 000 − (⋅750)] = 9 ⋅ 000,
⋅25
1
f ′ ′ ′ (1⋅ 5) = [⋅750] = 6 ⋅ 000.
⋅125
Note: The function tabulated in the given table of this problem is
N-175
y = x 3 − 2 x + 3.
dy d2 y d3 y
Hence = 3 x2 − 2 , = 6 x, = 6.
dx dx 2 dx 3
Putting x = 1⋅ 5, we get
⎛ dy ⎞
⎜ ⎟ = 3 × (1⋅ 5)2 − 2 = 4 ⋅ 750,
⎝ dx ⎠ 1⋅5
⎛ d2 y ⎞ ⎛ d3 y ⎞
⎜⎜ ⎟⎟ = 9 ⋅ 000, ⎜ 3 ⎟ = 6 ⋅ 000.
2
⎝ dx ⎠ x =1⋅5 ⎜ dx ⎟
⎝ ⎠ x =1⋅5
Thus we get the same values as obtained by numerical differentiation.
Example 2: Find the derivative of f ( x) at x = ⋅ 4 from the following table :
x : ⋅1 ⋅2 ⋅3 ⋅4
f ( x) : 1 ⋅ 10517 1 ⋅ 22140 1 ⋅ 34986 1 ⋅ 49182
x y ∇y ∇2 y ∇3 y
⋅1 1 ⋅ 10517
⋅11623
⋅2 1 ⋅ 22140 ⋅01223
⋅12846 ⋅00127
⋅3 1 ⋅ 34986 ⋅01350
⋅14196
⋅4 1 ⋅ 49182
Newton’s Backward formula is
x ( x + 1)
f (a + nh + xh) = f (a + nh) + x ∇f (a + nh) + ∇ 2 f (a + nh)
2!
x ( x + 1) ( x + 2) 3
+ ∇ f (a + nh), taking upto third differences only.
3!
Differentiating w.r.t. x, we get
2 x +1
hf ′ (a + nh + xh) = ∇f (a + nh) + ∇ 2 f (a + nh)
2
3 x2 + 6 x + 2 3
+ ∇ f (a + nh).
6
Putting a + nh = ⋅ 4 , h = ⋅ 1, x = 0, we get
N-176
1 2 1
(⋅1) f ′ (⋅4) = ∇f (⋅4) + ∇ f (⋅4) + ∇ 3 f (⋅4)
2 3
1 1
= ⋅ 14196 + (⋅01350) + (⋅00127) = ⋅ 14913.
2 3
∴ f ′ (⋅4) = 1⋅ 4913.
Example 3: Find f ′ (7 ⋅ 50) from the following table :
x : 7 ⋅ 47 7 ⋅ 48 7 ⋅ 49 7 ⋅ 50 7 ⋅ 51 7 ⋅ 52 7 ⋅ 53
y = f ( x): ⋅193 ⋅195 ⋅198 ⋅201 ⋅203 ⋅206 ⋅208
Solution: Here we want to find the derivative at x = 7 ⋅ 50 which lies near the
middle of the table and so we shall use one of the central difference formulae. Take
x = 7 ⋅ 50 as the origin. Then x0 = 7 ⋅ 50, h = ⋅ 01.
x − x0 x − 7 ⋅ 50
∴ u= = ⋅
h ⋅01
The Bessel’s formula with the variable u is given by
2 2
1 ⎛ 1⎞ u (u − 1) [Δ y −1 + Δ y0 ]
y u = [ y0 + y1 ] + ⎜ u − ⎟ Δy0 +
2 ⎝ 2⎠ 2! 2
⎛ 1⎞
⎜u − ⎟ u (u − 1)
⎝ 2⎠ (u + 1) u (u − 1) (u − 2) [Δ4 y−1 + Δ4 y−2 ]
+ Δ3 y−1 +
3! 4! 2
⎛⎜ u − 1⎞⎟ (u + 1) u (u − 1) (u − 2)
⎝ 2⎠
+ Δ5 y −2
5!
6 6
(u + 2) (u + 1) u (u − 1) (u − 2) (u − 3) [Δ y−3 + Δ y−2 ]
+ +…
6! 2
…(1)
The difference table is given below :
x u yu Δyu Δ2 yu Δ3 yu Δ4 yu Δ5 yu Δ6 yu
7 ⋅ 47 −3 ⋅193
⋅002
7 ⋅ 48 −2 ⋅195 ⋅001
⋅003 − ⋅ 001
7 ⋅ 49 −1 ⋅198 ⋅000 ⋅000
⋅003 − ⋅ 001 ⋅003
7 ⋅ 50 0 ⋅201 − ⋅ 001 ⋅003 − ⋅ 010
⋅002 ⋅002 − ⋅ 007
7 ⋅ 51 1 ⋅203 ⋅001 − ⋅ 004
⋅003 − ⋅ 002
7 ⋅ 52 2 ⋅206 − ⋅ 001
⋅002
7 ⋅ 53 3 ⋅208
N-177
Solution: Here we require the derivative at the point x = ⋅ 04 which lies near the
middle of the table, so we may use Gauss’s forward formula.
x − ⋅ 04
With a new variable u = , Gauss’s forward formula is
⋅01
u (u − 1) 2 u (u + 1) (u − 1) 3
f (u) = f (0) + uΔf (0) + Δ f (−1) + Δ f (−1)
2! 3!
u (u + 1) (u − 1) (u − 2) 4
+ Δ f (−2) + … …(1)
4!
The difference table is given below :
x u yu Δyu Δ2 yu Δ3 yu Δ4 yu
⋅01 −3 ⋅1023
⋅0024
⋅02 −2 ⋅1047 0
⋅0024 ⋅001
⋅03 −1 ⋅1071 ⋅0001 − ⋅ 001
⋅0025 0
⋅04 0 ⋅1096 ⋅0001 − ⋅ 001
⋅0026 − ⋅ 001
⋅05 1 ⋅1122 0
⋅0026
⋅06 2 ⋅1148
N-178
x − ⋅ 04
Since u= ,
h
du 1
∴ = ⋅
dx h
d d du 1
Hence { f ( x)} = { f ( x)} . = f ′ (u).
dx du dx h
When x = ⋅ 04 , we have u = 0.
Differentiating (1) w.r.t. u and putting u = 0, we get
1 1 1 4
f ′ (0) = Δ f (0) − Δ2 f (−1) − Δ3 f (−1) + Δ f (−2),
2 6 12
leaving higher order differences
1 1 1
= ⋅ 0026 − (⋅0001) − (0) + (− ⋅ 0001) = ⋅ 0025417.
2 6 12
⋅0025417
∴ hf ′ (⋅04) = ⋅ 0025417 ⇒ f ′ (⋅04) = = 0 ⋅ 25417.
⋅10
Example 5: For the following pairs of values of x and y find numerically the first derivative
at x = 4.
x : 1 2 4 8 10
y : 0 1 5 21 27
(Kanpur 2011)
Solution:Here the values of x are not equally spaced, therefore we shall use
Newton’s divided difference . The divided difference table is given below :
x y Δ| y Δ| 2 y Δ| 3 y Δ| 4 y
1 0
1
2 1 1
3
2 0
1
4 5 1 −
3 144
1
4 −
16
8 21 1
−
6
3
10 27
f ( x) = f ( x0 ) + ( x − x0 ) f ( x0 , x1 ) + ( x − x0 ) ( x − x1 ) f ( x0 , x1 , x2 )
+ ( x − x0 ) ( x − x1) ( x − x2 ) f ( x0 , x1, x2 , x3 )
+ ( x − x0 ) ( x − x1) ( x − x2 ) ( x − x3 ) f ( x0 , x1, x2 , x3 , x4 ),
neglecting terms of higher order differences.
N-179
f ′ ( x) = f ( x0 , x1 ) + {( x − x1 ) + ( x − x0 )} f ( x0 , x1 , x2 )
+ {( x − x1) ( x − x2 ) ( x − x3 ) + ( x − x0 ) ( x − x2 ) ( x − x3 )
Solution: Since the values of the argument are unequally spaced therefore we
shall use Newton’s divided difference formula. The divided difference table is
given below :
x f ( x) Δ| f ( x) Δ| 2 f ( x) Δ| 3 f ( x)
0 4
11
2 26 7
32 1
3 58 11
54 1
4 112 16
118 1
7 466 22
228
9 922
Newton’s divided difference formula if third differences are constant, is
f ( x) = f ( x0 ) + ( x − x0 ) f ( x0 , x1 ) + ( x − x0 ) ( x − x1 ) f ( x0 , x1 , x2 )
+ ( x − x0 ) ( x − x1) ( x − x2 ) f ( x0 , x1, x2 , x3 ).
Differentiating this w.r.t. x we get
f ′ ( x) = f ( x0 , x1 ) + {( x − x1 ) + ( x − x0 )} f ( x0 , x1 , x2 )
+ {( x − x1) ( x − x2 ) + ( x − x0 ) ( x − x2 ) + ( x − x0 ) ( x − x1)} f ( x0 , x1, x2 , x3 ).
N-180
x ⎛⎜ x + ⎞⎟ ⎛⎜ x − ⎞⎟
1 1
⎝ 2⎠ ⎝ 2⎠ 3
+ Δ y −1 + … …(2)
3!
Differentiating (2) w.r.t. x, we get
d Δ2 y −1 + Δ2 y0 ⎛ x2 1⎞ 3
( y x +1 /2 ) = Δy0 + x +⎜ − ⎟ Δ y −1 + …
dx 2 ⎝ 2 24⎠
Putting x = 0 in this, we get
d 1 3
( y1 /2 ) = Δy0 − Δ y −1 + …
dx 24
Changing the origin to − ⎛⎜ x −
1⎞
⎟ i. e., increasing each subscript by ⎛⎜ x − ⎞⎟ ,we get
1
⎝ 2⎠ ⎝ 2⎠
d 1 3
( y x ) = Δy x −(1 /2) − Δ y x −(3 /2) + …
dx 24
Differentiating (2) twice w.r.t. x, we have
d2 Δ2 y −1 + Δ2 y0
2
( y x +1 /2 ) = + x Δ3 y −1 + …
dx 2
N-181
y ′ = ⎡δy − δ y − …⎤ ⋅
1 1 3 3 5
or δ y+
h ⎣⎢ 24 640 ⎦⎥
Squaring (2), we get
D2 = 2 ⎡δ 2 − δ − …⎤
1 1 4 1 6
δ +
h ⎢⎣ 12 90 ⎥⎦
D2 y = 2 ⎡δ 2 − δ − …⎤ y, operating on y
1 1 4 1 6
⇒ δ +
h ⎢⎣ 12 90 ⎥⎦
y ′ ′ = 2 ⎡δ 2 y − δ y − …⎤ ⋅
1 1 4 1 6
⇒ δ y+
h ⎣⎢ 12 90 ⎥⎦
δ2
Solution: We know that μ 2 = 1 + ⋅
4
−1 / 2
−1 ⎛ δ2 ⎞ δ2 3 4
∴ μ = ⎜1 + ⎟ =1− + δ −…
⎝ 4⎠ 8 128
Also from the equation (2) Example 11, we have
hD δ2 3 4
=1− + δ −…
δ 24 640
hD hD −1 ⎡ δ 2 3 4 ⎤ ⎡ δ2 3 4 ⎤
Now = μ = ⎢1 − + δ − …⎥ ⎢1 − + δ − …⎥
δμ δ ⎣ 24 640 ⎦ ⎣ 8 128 ⎦
δ2 1 4
=1− + δ −…
6 30
δμ ⎡ δ 2 1 4 ⎤ μ ⎡ δ3 δ5 ⎤
or D= ⎢1 − + δ − …⎥ = ⎢δ − + − …⎥ ⋅
h ⎣ 6 30 ⎦ h ⎣ 6 30 ⎦
Operating these operators on y, we get
μ ⎡ δ3 δ5 ⎤
Dy = ⎢δ − + − …⎥ y
h ⎣ 6 30 ⎦
μ ⎡ δ3 y δ5 y ⎤
⇒ y′= ⎢δy − + − …⎥
h ⎢⎣ 6 30 ⎥⎦ …(1)
By definition, we have
1
δ = E 1 /2 − E −1 /2 and μ = ( E 1 /2 + E −1 /2 ).
2
1
∴ δμ = ( E − E −1 ) = μδ.
2
1 1
∴ (δμ) y0 = ( E − E −1 ) y0 = ( y1 − y −1 ) = μδy0 …(2)
2 2
From (1), we have
⎡
1 μδ 3 μδ 5 ⎤
y0 ′ = ⎢μδy0 − y0 + y0 − …⎥
h
⎣ 6 30 ⎦
1 ⎡
(δ y1 − δ 4 y −1 ) − …⎤ ⋅
1 1 4
= ( y1 − y −1 ) − (δ 2 y1 − δ 2 y −1 ) +
2 h ⎢⎣ 6 30 ⎦⎥
1⎛
⎜ Δy − Δ2 y + Δ3 y − Δ4 y + …⎞⎟
1 1 1
Example 11: Prove that y ′ =
h ⎝ 2 3 4 ⎠
y ′ ′ = 2 ⎛⎜∇ 2 y + ∇ 3 y + ∇ y + …⎞⎟ ⋅
1 11 4
and
h ⎝ 12 ⎠ (Garhwal 2010)
hD
Solution: We know that E = e .
hD
∴ 1+ Δ = e or hD = log (1 + Δ)
N-184
1
⇒ D= log (1 + Δ)
h
1 1⎧ Δ2 Δ3 Δ4 ⎫
⇒ Dy = log (1 + Δ) y = ⎨ Δ − + − + …⎬ y.
h h⎩ 2 3 4 ⎭
1 ⎧⎪ ⎫⎪
2 3 4
Δ y Δ y Δ y
∴ y ′ = ⎨ Δy − + − + …⎬ ⋅
h⎪ 2 3 4 ⎪⎭
⎩
Again e − hD = 1 − ∇.
1
∴ D=− log (1 − ∇).
h
2
y ′ ′ = D2 y = ⎧⎨ − log (1 − ∇)⎫⎬ y = 2 { log (1 − ∇)}2 y
1 1
Now
⎩ h ⎭ h
2
1 ⎧ 1 2 1 3 ⎫ y
= ⎨∇ + ∇ + ∇ + …⎬
h2 ⎩ 2 3 ⎭
1 ⎧ 2
∇ + …⎫⎬ y
3 11 4
= 2 ⎨∇ + ∇ +
h ⎩ 12 ⎭
1 ⎧ 2
∇ y + …⎫⎬ ⋅
3 11 4
= 2 ⎨∇ y + ∇ y +
h ⎩ 12 ⎭
Example 13: Find first and second derivatives of the function given below at the point
x = 1⋅ 2
x : 1 2 3 4 5
y : 0 1 5 6 8
Solution: Here the derivatives are required at x = 1⋅ 2 , which is near the beginning
of the table so we shall use Newton’s Forward formula.
The difference table is given below :
x y Δy Δ2 y Δ3 y Δ4 y
1 0
1
2 1 3
4 −6
3 5 −3 10
1 4
4 6 1
2
5 8
Newton’s Forward formula is
x ( x − 1) x ( x − 1) ( x − 2)
f (a + xh) = f (a) + xΔ f (a) + Δ2 f (a) + Δ3 f (a)
2! 3!
x ( x − 1) ( x − 2) ( x − 3) 4
+ Δ f (a), taking upto 4th differences only.
4!
Differentiating w.r.t. x twice, we get
(2 x − 1) 2 (3 x 2 − 6 x + 2) 3
hf ′ (a + xh) = Δf (a) + Δ f (a) + Δ f (a)
2 6
(4 x3 − 18 x2 + 22 x − 6) 4
+ Δ f (a)
24
and h2 f ′ ′ (a + xh) = Δ2 f (a) + ( x − 1) Δ3 f (a)
(12 x2 − 36 x + 22) 4
+ Δ f (a).
24
Putting a = 1, h = 1, x = ⋅ 2 and the values of various differences in these equations,
we get
1 1
f ′ (1⋅ 2) = 1 + {(2 × ⋅ 2) − 1} × 3 + {(3 × ⋅ 04) − (6 × ⋅ 2) + 2} (−6)
2 6
1
+ { (4 × ⋅ 008) − (18 × ⋅ 04) + (22 × ⋅ 2) − 6 } × 10
24
= 1 − 0 ⋅ 9 − 0 ⋅ 92 − 0 ⋅ 683 = − 1⋅ 50
1
f ′ ′ (1⋅ 2) = 3 + (⋅2 − 1) (−6) + {(12 × ⋅ 04) − (36 × ⋅ 2) + 22} × 10
24
= 3 + 4 ⋅ 8 + 6 ⋅ 366
= 14 ⋅ 16.
N-186
Comprehensive Exercise 1
dy d2 y
1. Find and at x = 1 from the following table :
dx dx 2
x : 1 2 3 4 5 6
y : 198669 295520 389418 479425 564642 644217
x : 2 4 9 13 16 21 29
f ( x) : 57 1345 66340 402052 1118209 4287844 21242820
3. Find the first three derivatives of the function tabulated below at the point
x = 2⋅5 :
x : 1⋅ 5 1⋅ 9 2 ⋅5 3 ⋅2 4 ⋅3 5 ⋅9
f ( x) : 3 ⋅ 375 6 ⋅ 059 13 ⋅ 625 29 ⋅ 368 73 ⋅ 907 196 ⋅ 579
x : 3 5 11 27 34
f ( x) : − 13 23 899 17315 35606
(Purvanchal 2008)
dy
5. Find at x = 1 from the following table :
dx
dy d2 y
7. Find and of y = x1 /3 at x = 50 from the following table :
dx dx 2
x: 50 51 52 53 54 55 56
1 /3
y=x : 3⋅6840 3⋅7084 3⋅7325 3⋅7563 3⋅7798 3⋅8030 3⋅8259
N-187
x : −2 −1 0 1 2 3 4
f ( x) : 104 17 0 −1 8 69 272
x: 0 1 3 4 5 7 9
11. Show that the expressions given below are approximations to the third
derivative of y x :
(i) Δ3 y0 + ⎛⎜ x − ⎞⎟ Δ4 y0
3
⎝ 2⎠
(ii) Δ3 y −1 + ⎛⎜ x − ⎞⎟ ⋅ (Δ3 y −2 + Δ4 y −1 )
1 1
⎝ 2⎠ 2
12. Use Stirling’s formula to find the first derivatives of the function
y = 2e x − x − 1 tabulated below at the point x − 0 .6.
x : 0.4 0.5 0.6 0.7 0.8
A nswers 1
⎛ d3 y ⎞ 1 3
(c) ⎜⎜ 3 ⎟⎟ = 3 [Δ 3 y0 + Δ 4 y0 +...]
⎝ dx ⎠ x = a h 2
A nswers
¨
B
FUNDAMENTALS OF COMPUTERS
C hapters
2.
3. Operating System
5. Computer Networks
C-3
In fact, the original objective for inventing a computer was to create a fast
calculating machine. However, more than 80% of work done by computers today
is of non-mathematical or non-numerical nature. Hence, to define a computer
merely as a calculating device is to ignore over 80% of its functions.
Thus, we can define a computer as a device that operates upon data. Data can be
anything like bio-data of applicants when computer is used for short listing
candidates for recruiting, marks obtained by students in various subjects when
used for preparing results, details (name, age, sex, etc.) of passengers when used for
making airline or railway reservations, or number of different parameters when
used for solving scientific research problems, etc.
A computer can store, process and retrieve data as and when desired. The fact that
computers process data is so fundamental that many people have started calling it
a data processor.
Technically the term computer is used to describe a device made up of a
combination of electronic and electromechanical (part electronic and part
mechanical) components. By-itself, a computer has no intelligence and is referred
to as hardware. A computer, or computer system, does not come to life and it is
connected to the other parts of its system. A computer system is a combination of
the following five elements:
(i) Hardware
(ii) Software
(iii) People or User
(iv) Procedures
(v) Data/Information
When one computer system is set to communicate with another computer system,
connectivity becomes a sixth element. In other words, the number in which the
various individual systems are connected, for example, by phone lines, microwave
transmission, or satellite, is an element of the computer system.
The purpose of a computer system is to convert data into information. Data is raw,
unevaluated facts and figures, concepts, or instructions. This raw material is
processed into useful information. In other words, information is the product of
data processing. This processing includes refining, summarizing, categorizing and
otherwise manipulating the data into a useful form for decision-making. Software
is the term used to describe the instructions that tell the hardware how to perform a
task, without software instructions, the hardware does not know what to do.
People, however, constitute the most important component of the computer
system. People operate the computer hardware, they create the computer software
instructions and respond to the procedures that those instructions present.
C-5
1.2.1 Speed
A computer is a very fast machine. Current computer systems can perform tasks in
a few seconds, which may take human being years or even his entire lifetime to do
consequently. The computer based processing goes far beyond that of seconds that
means milliseconds (10 −3 seconds), microseconds (10 −6 seconds), nanoseconds
(10 −9 seconds) and picoseconds (10 −12 seconds).
With the second as the only means of comparison, it is difficult for us to
comprehend the time scale of computers. Even the operations for personal
computers are measured in thousands of a second, or milliseconds. Operations for
larger processors are measured in microseconds, nanoseconds and picoseconds.
To classify the speeds of different computer systems, the industry has developed
the criterion of million instructions per second (MIPS).
1.2.2 Accuracy
Computers in addition to being very fast, are very accurate also. Accuracy of a
computer is consistently high and the degree of its accuracy depends upon its
design. A computer performs every calculation with the same accuracy.
Computers never mistake, it is the human, who instruct the computer and provide
data, who make mistakes. However, errors can occur in a computer. These errors
are mainly due to human rather than technological weakness.
The vast majority of these errors can be traced to a program logic error, a
procedural error or erroneous data. These are human errors. Hardware errors are
usually detected and corrected by the computer system itself.
C-6
Computers rarely make mistakes and can accurately perform all kinds of complex
computations. Just for a moment, consider the accuracy afforded by the onboard
computers used on NASA's space shuttle flights. Without them, the success of
these missions would be jeopardised.
1.2.3 Reliability
The reliability comes from the fact that we can replace many tasks performed by
human with computers. Unlike human beings, a computer is free from monotony,
tiredness and lack of concentration. It can continuously work for hours without
creating any error and without grumbling. Hence, computers score over human
beings in doing routine type of jobs that require great accuracy. If ten million
calculations have to be performed, a computer will perform the last one with
exactly the same accuracy and speed as the first one.
1.2.5 Versatility
The most wonderful thing about a computer is it versatility. One moment it is
preparing results of an examination, next moment it is busy in preparing electricity
bills, and between them it may be helping an office secretary to trace an important
letter in seconds. Computers can be used for generic as well as specialized purpose.
All that is required to change its talent is to slip in a new program into it. In brief, a
computer is capable of performing almost any task, if the task can be reduced to a
finite series of logical steps. As such, computer is a versatile machine, which is
extremely useful in many lines of work.
distinguish between varying hardware technologies but it has now been extended
to include both hardware and software that together make up a computer system.
The custom of referring to computer era in terms of generations came into wide use
only after 1964. There are totally five computer generations known till today.
Below we describe each generation along with its identifying characteristics.
Although there is a certain amount of overlap between different generations, the
approximate period shown against each are normally accepted.
− Due to low mean time between failures, these computers required constant
maintenance.
− Thousands of individual components were assembled manually by hand
into electronic circuits. Hence, commercial production of these computers
was difficult and costly.
− Since these computers were difficult to program and use, they had limited
commercial use.
− Drum was used as primary storage.
− Punched card and paper-tape were used as secondary storage.
− Vacuum tube circuit.
− Continuous maintenance required.
− Applications: Payroll and other simple applications in large companies.
− Batch processing.
− Machine and symbolic language programming.
− Different computers for scientific and business applications.
− The first computer which could perform arithmetic and logical operations
without human intervention.
− Program and data were fed through punched paper tape.
− Vacuum tubes generated considerable heat.
− Huge computers which required a lot of space and special air-conditioning.
− Poor reliability.
− Limited internal storage capacity.
− Slow input/output operation, used punched cards.
− Computers programmed with machine language.
to shutdown the system. Hence, the uptime of these systems is very high.
− Faster and larger primary and secondary storage as compared to their
predecessors.
− General purpose machines.
− Manufacturing does not require manual assembly of individual
components into electronic circuits resulting in reduced human labour and
cost involved at assembly stage. Hence, commercial production of these
systems is easier and cheaper. However, highly sophisticated technology
and expensive setup is required for manufacturing VVLSI chips.
− Use of standard high-level programming languages allows programs written
for one computer to be easily ported to and executed on another computer.
− More user-friendly interfaces with multimedia features make the systems
easier to learn and use by anyone, including children.
− Newer and more powerful applications, including multimedia applications,
make the systems more useful in every occupation.
− Explosion in the size of the internet coupled with internet-based tools and
applications have made these systems influence the life of even-common
people.
− These systems also use the concept of unbundled software and add-on
hardware allowing the users to invest only in the hardware configuration
and software of their need and value.
− With so many types of computers in all price ranges today, we have a
computer for almost any type of user whether the user is a child or a
world-fame scientist.
− Organic chips.
− Decreasing costs of software.
− Decreasing costs of hardware.
− Super and ultra personal computers.
− Increased miniaturization.
− Vast improvements in the price performance ratio.
− Artificial intelligence.
− Auto-decisions.
− Large storage facility.
− High speed.
− Multi point Input/Output.
− Non-Procedural software.
C-14
Types of Computers
calculations. In fact, super computers are used for such intense computing that
they are enclosed in frames containing liquid coolant to prevent them from melting
down.
Most super computers have two characteristics in common. One is the ability to
recover automatically from failures. Also, unlike conventional computers, which
have a single processor which processes one instruction at a time, super computers
have multiple processors that process multiple instructions at a time, this is known
as parallel processing. Some business applications to which parallel processing is
ideally suited are resource optimization, image processing, graphics and financial
portfolio analysis.
Fault-tolerant computers use a backup mechanism to automatically isolate and
reconfigure hardware which fails during system operation. Companies that require
highly reliable computer systems use fault-tolerant computers.
The primary disadvantage of super computers is their high cost. [Super computer’s
cost varies between $ 250,000 and $ 3 million, like software that runs on them is
also very expensive]. This is one reason why today there are fewer [200 super
computers in the united states]. The given table shows other applications of super
computers.
Imaging 13.7
Simulation 12.6
Business/professional 6.8
1.4.4 Workstations
Workstations lie some where between midrange computers and PCs. They can be
used by individuals or by groups. They are faster and more sophisticated than PCs
and are equipped with a number of productivity tools that increase their efficiency.
Advances in microprocessors and sophisticated software have significantly
increased the capabilities of these machines and today some workstations are
handling tasks that run on super computers and mainframes as little as 2 years ago.
Further, their low cost makes them an attractive alternative to the PC. SPARC
stations from Sun Microsystem, IBM RS/6000s, Hewlett-Packard's series 700 and
DEC's Alpha-based Model 3000 are some popular workstations.
Engineers, designers, architects and film-industry animators are heavy users of
workstations. For example, at Da Point in Wilmington, Delaware, about one in
five workstations is a high-end machine used for simulative and molecular
C-17
Hand-held Less than 1 8086-based machines that Field service person with
Computers pound contain an inexpensive data entry applications
docking station
Personal digital Less than 3 A powerful hand-held Mobile users who desire
assistants pounds communications intensive two-way com mu ni ca-
device with a focus on tions, for either business
ease of use or personal use
Sub notebooks Less than 4 A device with full PC User with non-RAM
pounds functionality but with a heavy applications
reduced keypad and screen
and no floppy drive
Pen-based drives Less than 6 A device with an input Field service person with
pounds stylus, using either the pen data entry applications
point or the pen windows
operation system
Popular mobile computing devices and applications
guides the estimator from the bumper to the grill, headlights, radiator, fan and
other parts, and helps assess the cost of the damage.
The system automatically tallies the cost of parts and assembly along with related
labour expenses, and uses the same logic that an automotive expert would use in
the estimation process.
MIPS > 1 billion >500 million >100 million > 10 million > 1 million
termed as Peripheral units and provide a communication link between the man
and the computer.
Even though the size, shape, performance, reliability and cost of computers have
been changing over the years, the basic logical structure (based on the stored
program concept), as proposed by Von Neumann, has not changed. No matter
what shape and size of computer we are talking about, all computer systems
perform the following five basic operations for converting raw input data into
useful information and presenting it to a user :
(i) Inputting
(ii) Storing
(iii) Processing
(iv) Outputting
(v) Controlling
The IPOS cycle describes the computer’s processing of data. The input-process-
output (IPO) model, also known as the IPO+S model, is a function model and
conceptual schema of a general system. An IPO chart/table identifies a program’s
inputs, its outputs, and the processing steps required to transform the inputs into
the outputs.
C-21
The IPO model has many interdisciplinary applications, and is used to convey
systems fundamentals in IT overview education and as a brainstorming,
preliminary investigation tool in systems development processes such as the
SDLC. It consists of at least three, and sometimes four, distinct components. In
contemporary information technology, it is almost always discussed as a four
component model in which the fourth is a named optional. Data has to flow into
the system in some form. Input is the data flowing into the system from outside.
The next stage in the information flow is the input data being manipulated in some
way. Processing is the action of manipulating the input into a more useful form.
The final stage in the information flow is normally to present the information in a
user-friendly way. Output is the information flowing out of the system.
The components of the IPOS model are defined as:
(i) I: Input - The information, ideas, and resources used in creating a program
(ii) P: Processing - Actions taken upon/using input or stored material
(iii) O: Output - Results of the processing that then exit the system
(iv) S: Storage - Location(s) where material inside the system is/are placed for
possible
use at a later point in time.
1.6.1 Keyboard
Most input data is entered into the computer by using a keyboard. This input
method is similar to typing on a typewriter.
Most typewriters and computer keyboards are QWERTY keyboards. The
alphabetic keys are arranged in a manner so that the upper-left row of letters begins
with the six letters QWERTY. Designers of other keyboards claim that their boards
are easier to learn than the QWERTY keyboard. The Dvorak keyboard is one
example. It is not widely accepted, however, because most people have already
learned the QWERTY keyboard.
C-22
In different parts of the world, we find different keyboards. The coding used on the
QWERTY and Dvorak keyboards works with an 8-bit code which accommodates
256 different characters. Asian languages have many more characters.
Computer keyboards also include keys that are designed to perform specific tasks
instead of entering characters only. These special keys include function keys,
directional keys and special purpose keys such as Alt, Ctrl, Enter, Ins and Esc.
These keys enable the user to perform complex tasks easily when using the
application.
Some new keyboards have even 110 keys, with three new keys designed to simplify
working with windows operating systems. Two of these keys, next to the Alt key,
bring up the start menu. The third key, next to the right Ctrl key, brings up a menu
of functions that are frequently accessed in whichever application is currently
being used.
Prolonged keyboard use can cause wrist problems, sometimes so serious as to
require surgery. To help prevent these problems, ergonomic keyboards have been
introduced in the market.
One special type of keyboard construction is the MEMBRANE-SWITCH
KEYBOARD, in which a protective film covers the keyboard. Membrane-switch
keyboards are reliable, durable and resistant to such hazards as liquids or grease.
However, membrane keys require more pressure than keys on a standard computer
keyboard. You have probably seen membrane-switch keyboards in fast-food
restaurants. Membrane-switch keyboards are ideal in situations that require little
actual keying.
A computer keyboard is a rather sophisticated electromechanical component
designed to create special standardized electronic codes when a key is pressed. The
code is transmitted along the cable that connects the keyboard to the computer
system unit or terminal where the incoming code is analyzed and converted into
the appropriate computer usable code.
Keyboards come in a variety of sizes and shapes, but most keyboards used with
computer systems have the certain number of features are common, for example,
(i) Standard typewriter keys
(ii) Function keys
(iii) Special purpose keys
(iv) Cursor-movement keys
(v) Numeric keys.
In general, the typewriter-like keys are used to type in text and other data. The
function keys, labeled F1, F2, F3 and so on are used to issue commands. Function
keys are also called programmable keys. The user's manual that comes with the
software tells you how to use the function keys. Computer keyboards also have
some special-purpose keys.
C-23
If you have used a typewriter keyboard, you should find it easy to learn to work
with a computer keyboard. However, since some of the keys are different, you may
want to experiment with some of the keyboard familiarization software programs
on the market today. These packages provide computer users with the opportunity
to become familiar with the layout of the keyboard, which may differ according to
the kind of computer you are using and to develop typing proficiency.
indicating the x-y screen co-ordinates to the computer. Light pens are frequently
used by graphics designers, illustrators and drafting engineers.
Mouse
The mouse is a hand-held device connected to the computer by a small cable. As the
mouse is rolled across the desktop, the cursor moves across the screen, when the
cursor reaches the desired location, the user usually pushes a button on the mouse
once or twice to signal a menu selection or a command to the computer. Mouse
technology is often used with graphics-oriented micro computers like the
Macintosh. With special software for graphics, the mouse can be used like a pen or
a paintbrush to create figures and patterns directly on the video display screen. The
keyboard, however must still be used to type in characters and issue some
commands depending on the software.
Working of a Mouse.
The most common type of mouse has a ball inside it that extends just below the
housing. When you slide the mouse around on a flat surface, such as the desktop or
a mouse pad, the ball rolls.
On two sides of the ball, at 90 degrees angle from each other, are two small rollers
that touch the mouse and spin when the ball rolls. A sensor detects how much each
roller spins and send this information to the computer. The computer translates
the information and changes the position of the on-screen pointer to correspond to
the position indicated by the mouse.
Like the keyboard, the mouse does not send a message directly to the program that
the computer is running. Rather, it sends an interrupt request to the CPU. The
program that is running checks regularly to see after the request of mouse.
Like all input devices, the mouse needs some connection to the host computer in
order to transmit its input. Typically, the mouse uses a thin electrical cord for this
purpose. It was most likely the combination of the tall-like cord, its size and shape,
which led the inventors of the mouse to name it as such, cordless mice use wireless
communication to transmit data via infrared, radio or bluetooth.
There are several other uses of mouse:
1. Move the mouse cursor on the computer screen.
2. We make icon on the computer monitor or screen, in any application or
software, also called as graphical user interface (GUI) this icon we can
directly open with the help of right click or double click of the mouse
button.
3. We can use the mouse for playing the computer game.
The mouse switch, called a micro switch or a cherry switch, uses a still but flexible
metal strip that is bent to actuate the switch. The bending of the metal makes a
snapping or clicking noise in the same way as the safety button does on the lids of
vacuum-packaged jars to indicate that they have been opened.
C-25
1.6.4 Touch-Screen
Limited amounts of data can be entered via a terminal or a micro computer that has
a touch screen. The user simply touches the screen at the desired locations, marked
by labeled boxes, to "point-out" choices to the computer. The software determines
the kinds of choices of the user.
1.6.5 Digitizer
An interesting method of input that is used in map making is the digitizing tablet.
The tablets, which come in different sizes are the working surface. Each is
converted by a grid of many tiny wires that is connected to the computer. Drawings
placed over this grid can be traced and entered into the computer by the use of a
special pen or mouse like device with cross hairs that opens and closes electrical
circuits in the grid and thus identifies x – y co-ordinates. Original drawings may also
be entered. As it progresses, the drawing is displayed on the screen, which can later
be stored or printed. Digitizers are also used in design and engineering business
such as those that develop circuit or computer chips.
packages being picked up. The data goes to the central computer system, is checked
and is then retrieved by the appropriate local pick-up system which sends an
employee to get your package.
Touch-Tone devices usually called Card Dialers are also used to run credit card
checks in retail stores. After appropriate keys are touched, the device sends data
over the phone lines to a central computer, which then checks the data against its
files and reports credit information back to the store.
Most specialized, monkey board input devices are used in conjunction with a
keyboard because the specialized devices cannot be used to input all types of data
and instructions. An exception may be Eyesican Communication that translates
eye movements into signals for a computer. This innovation–still being
refined–allows people who cannot speak or use keyboards to communicate using a
computer.
them for processing later. Magnetic disk is the most commonly used secondary
storage medium.
1.10.1 Monitors
When you think about viewing computer output, you probably visualize a
monitor. Monitor output is a soft copy, when you have finished viewing it, you
cannot move it. Monitor display is the most common form of soft copy.
Sometimes when watching television, you may notice that the picture looks a little
snowy. This condition occurs because the images are not solid but rather created by
configurations of dots. These dots or picture elements, combine to form the image
you see. The more are the picture elements, also known as pixels, the better is the
resolution of the image. The better the resolution the clearer is the picture.
Computer monitors are similar to television screens.
The large monitors that you see connected to desktop computers are
Cathode-Ray-Tube (CRT) monitors. Monitors that are used on laptops and
notebook computers are known as flat-panel displays. Flat-panel displays weight
less and consume less electricity than CRTs. Common type of flat-panel displays
include Liquid Crystal Displays (LCDs). Electro Luminescent (EL) displays and
Gas Plasma (GP) displays. Flat-panel display monitors are still more expensive
than CRTs, but eventually their prices are expected to decrease. Can you imagine
monitor hanging on the wall like a painting? It may be common in a few years.
Most new monitors are SVGA (Super Video Graphics Adapters), with a pixel
configuration of 800 by 600 at low resolution mode and 1024 by 768 at high
resolution mode. The first number designates the horizontal pixel, count and the
second is the vertical pixel count. The higher resolution, with more pixels, provides
a cleaner more detailed image. Each pixel displays a single colour at a time. Each
colour is represented by a numeric code. If the monitor displays only 16 colours,
the numeric code can be represented with only 4 bits. To display 256 colours
requires eight bits.
One monitor may look "sharper" than another, even though they may have the
same pixel configuration. This is due to the dot pitch, which is the distance
between pixels. A 28 dot pitch gives a crisper image than a 30 dot pitch. The 28 dot
pitch is fairly standard. You should consider dot pitch when purchasing a monitor.
The dot pitch is built in by the manufacturer and cannot be changed.
C-29
With user increasingly viewing video clips, animated objects and complex
graphics, monitors have taken on a new importance. Users now must decide how
large a monitor they need. Fourteen inch to seventeen inch monitors are
commonly used with desktop micro-computer systems. Larger monitors are
available, but are expensive.
Monitors are of two types:
1. Black and White
2. Colour
Monochrome monitors are rapidly becoming a thing of the past, as most
applications today require colour. In fact, a display of 256 colour is usually
necessary for working with information CD-ROMs and clip-art collections.
In order to connect a monitor to a micro computer, you must have a graphics adapter
board. Each types of monitor requires a different type of board. The graphics board
plugs into an expansion slot inside the computer and the monitor plugs into the
board.
In order to run today's graphics intensive programs properly and quickly most
graphic boards come with some memory capability, known as vide memory. It is
important to realize that video RAM (VRAM) must meet higher performance
specifications than regular RAM. It is recommended that instead of using RAM on
a video card the user should place VRAM or dynamic RAM (DRAM), which is
slightly slower than VRAM on a video card.
The refresh rate of a monitor is also important and is affected by the video card.
Even a steady image is constantly regenerated or refresh from top to bottom. A
slow refresh rate of 60 times per seconds (60 Hz) can cause headache, 70 Hz is a
reasonable minimum. Some monitors known as interlaced monitors, refresh every
other line, non-interlaced monitors are easier on the eyes. The Motion Picture
Expert Groups (MPEG) has developed standards for video compression that
improve the quality of the video on the monitor. MPEG drivers are available as
software or as hardware.
Monitors are the most popular output devices used today for producing soft-copy
output. They display the generated output on a television like screen. A monitor is
associated usually with a keyboard and together they form a video display terminal
(VDT). A VDT is the most popular Input/Output device used with today's
computers. It serves as both an input and output device. The keyboard is used for
input to a computer and the monitor is used to display the output from the
computer. The name "terminal" comes from the fact that a terminal is at the
terminus or end of a communication path.
Two basic types of monitors used today are
(i) Cathode Ray Tube (CRT)
(ii) Liquid Crystal Display (LCD)
C-30
CRT monitors work much like a television screen and are used with non-portable
computer systems. On the other hand, LCD flat-panel monitors are thinner,
lighter and are used commonly with portable computer system like notebook
computers with gradual reduction in price of LCD flat-panel monitors, they are
used increasingly with non-portable desktop computer system also. They are also
preferred because they occupy less table space.
1.10.2 Printers
The second most common form of computer output is the printed document.
Although a computer can operate perfectly well without a printer, it is certainly
helpful for the user to have one. Because you can hold printed output it is
considered a form of hard copy.
Printers can be categorized by whether anything mechanical touches the paper
whether they do or do not produce a solid character or how many pages or a line, or
a character they produce at a time.
When a part of the printer passes the paper to form the character the printer is
considered an impact printer. Impact printers can produce carbon copies and are
fairly loud although covers are available to muffle the noise. In contrast,
non-impact printers are quiet. However because nothing presses on the page, a
non-impact printer can not produce carbon copy. This fact is usually not a problem
because it is easy to produce multiple-originals, but sometimes carbons are
required for legal purpose.
Printers are most popular output devices used today for producing hard copy
output. Different types of printers are described below.
Dot-Matrix Printers
Dot matrix printers are character printers that print one character at a time. They
form characters and all kinds of images as patterns of dots. A dot-matrix printer has
a print head that moves horizontally across the paper. Print head contains an array
of pins that can be activated independent of each other to extend and strike against
an inked ribbon to form patterns of dots on the paper. To print a character, the
printer activates the appropriate set of pins as the print head moves horizontally.
For faster printing many dot matrix printers print both ways– while the print head
moves from left to right and while it moves from right to left on return. Such
method is called a bidirectional printing.
Since dot-matrix printers produce printed output as patterns of dots, they can
print any shape of character that a program can describe. They, therefore, can print
many special characters in different sizes and also have the ability to print graphics
such as charts and graphs.
Dot-matrix printers are impact printers because they print by hammering the pins
on the inked ribbon to leave ink impressions on a paper. Hence, they can be used to
produce multiple copies by using carbon paper or its equivalent. Due to impact
printing dot-matrix printers are noisy as compared to non-impact printers.
C-31
Dot-matrix printers are normally slow with printing speeds ranging from 30 to 600
characters per second. However, they are cheap in terms of both initial cost and
cost of operation. Hence, they are preferred by individuals and organizations for
generating printed outputs if the speed and quality of printing are not important
factors. They are also used for applications requiring multi-copy output such as
shipping forms and invoices that rely on impact printing for generating multiple
copies.
Inkjet Printers
Inkjet printers are character printers that form characters and all kinds of images
by spraying small drops of ink on a paper. The print head of an inkjet printer
contains up to 64 tiny nozzles that can be heated up selectively in a few
microseconds by an integrated circuit resistor. When the resistor heats up the ink
near it vaporizes and is ejected through the nozzle making a dot on the paper
placed in front of the print head. To print a character the printer selectively heats
the appropriate set of nozzles as the print head moves horizontally.
Inkjet printers produce higher quality output than dot-matrix printers do because
they form characters by very tiny ink dots. A high-resolution inkjet printers has as
many as 64 nozzles within a height of 7mm providing print resolution of around
360 dots per inch.
Since inkjet printers produce printed output as patterns of tiny dots, they can print
any shape of characters that a program can describe. This allows the printer to print
many special characters in different sizes and the ability to print graphics such as
charts and graphs.
Inkjet printers are non-impact printers because they print by spraying ink on the
paper. Hence, they are quieter in operation. Being of non-impact type they can not
be used to produce multiple copies of a document in a single printing.
A colour inkjet printer usually comes with two ink cartridges: black and tri-colour.
The tri-colour cartridge contains red, blue and yellow colours in a package that can
mix appropriate amount of these colours with black front the other cartridge to get
any desired colour with saturation. This makes it possible to get multicoloured and
photo-quality output from inkjet printers.
Inkjet printers are slower than dot-matrix printers are with printing speeds ranging
from 40 to 300 characters per second. Typically, an inkjet printer is more
expensive than a dot-matrix printer. They are preferred if speed of printing is not
an important factor.
Drum Printers
Drum printers are line printers that print an entire line at a time. Recall that dot
matrix and inkjet printers print one character at a time. It consists of a solid
cylindrical drum with characters embossed on its surface in the form of circular
bands. Each band consists of all the printing characters supported by the printer in
its character set. Total number of bands is equal to the maximum number of
characters that can be printed on a line. Hence, a drum printer with 132 characters
pen line and supporting a character set of 96 characters will have altogether 12,
672 (132 × 96) characters embossed on its surface.
C-32
In addition to the drum, the printers has a set of hammers mounted in front of the
drum in a manner that an inkjet ribbon and paper can be placed between the
hammers and the drum. The total number of hammers is equal to the total number
of bands on the drum, which is also equal to the total print positions per line.
The drum rotates at a high speed. A character is printed at a desired print position
by activating the appropriate hammer when the character embossed on the band at
the print position passes below it. Hence, the drum would have to complete one
full revolution to print each line of output. This means that not all characters on a
line are printed at exactly the same time, but the time required to print an entire
line is so that it appears as if one line is printed at a time.
The drum of a drum printer is expensive and cannot be changed often. Hence,
drum printers can print a predefined set of characters only in a predefined style
embossed on the drum. Drum printers, therefore, do not have the ability to print
any shape of characters, different sizes of print and graphics such as charts and
graphs.
Drum printers are impact printers because they print by hammering on a paper
and inked ribbon against the characters embossed on the drum. Hence, they can be
used to produce multiple copies by using carbon paper or its equivalent. Due to
impact printing, drum printers are noisy in operation and often use a cover to
reduce the noise level.
Printing speeds of drum printers are in the range of 300 to 2000 lines per minute.
Chain/Band Printers
Chain/Band printers are line printers that print one line at a time. It consists of a
metallic chain/band on which all characters of the character set supported by the
printer are embossed. A standard character set may have 48, 64 or 96 characters. In
order to enhance printing speed, the characters in the character set are embossed
several times on the chain/band. For example, the chain/band of a 64 character set
printer may have four sets of 64 characters each embossed on it. In this case, the
chain/band will have altogether 256 (64 × 4) character embossed on it.
The printer has a set of hammers mounted in front of the chain/band in a manner
that an inked ribbon and paper can be placed between the hammers and chain/band.
The total number of hammers is equal to the total number of print positions.
Therefore, a printer supporting 132 print position will have 132 hammers.
The chain/band rotates at a high speed. A character is printed at a desired print
position by activating the appropriate hammer when the character embossed on
the chain/band passes below it. Since the character set is repeated several times on
the chain/band, it is not necessary to wait for the chain/band to make a complete
revolution to position the desired character in the correct print position.
Unlike the drum of a drum printer, the chain/band of a chain/band printer can be
changed easily. This allows use of different fonts and different scripts to be used
C-33
with the same printer. Like drum printers, chain/band printers, therefore, do not
have the ability to print any shape of characters, different sizes of print and
graphics such as charts and graphs.
Chain/band printers are impact printers because they print by hammering on a
paper and inked ribbon against the characters embossed on the chain/band.
Hence, they can be used to produce multiple copies by using carbon paper or its
equivalent. Due to impact printing, chain/band printers are noisy in operation and
often use a cover to reduce the noise level. Printing speeds of chain/band printers
are in the range of 400 to 3000 lines per minute.
Laser Printers
Laser printers are page printers that print one page at a time. Main components of a
laser printer are a laser beam source a multi-sided mirror a photoconductive drum
and toner. To print a page of output the laser beam is focused on the electro
statically charged drum by the spinning multi-sided mirror. The mirror focuses the
laser beam on the surface of the drum in a manner to create the patterns of
characters/images to be printed on the page. Since the drum is photoconductive, a
difference in electric charge is created on those parts of the drum surface that are
exposed to the laser beam. As a result, the toner composed of oppositely charged
ink particles, sticks to the drum in the places where the laser beam has charged the
drum's surface. The toner is then fused permanently on the paper with heat and
pressure to generate the printed output. The drum is then rotated and cleaned with
a rubber blade to remove the toner sticking to its surface to prepare the drum for
next page printing.
Laser printers produce very high quality output because they form characters by
very tiny ink particles. The most common laser printers have resolution of 600 dpi
(dots per inch), whereas some high end laser printers have resolution of 1200 dpi.
Due to their high resolution, these printers give excellent graphics art quality.
Since laser printers produce printed output as patterns generated by the laser beam
they can print any shape of characters that a program can describe. They,
therefore, can print many special characters, different sizes of print and also have
the ability to print graphics such as charts and graphs.
Laser printers are non-impact printers. Hence, they are very quiet in operation.
Being of non-impact type, they cannot be used to produce multiple copies of a
document in a single printing.
Mostly laser printers can print in black colour only because they also have a single
toner-drum arrangement but colour laser printers are available at affordable price.
A colour laser printer like colour inkjet printer contains four colour toners each
with a drum of its own. The usage of drums and toners are same as earlier but each
drum is charged in such a way that together they produce the desired colour
output.
Laser printers are faster in printing speed than other printers. Low speed laser
printers can print 4 to 12 pages per minute. High speed laser printers are also
C-34
available in the market. Owning to their better print quality and printing speed,
laser printers are more expensive than other types of printers.
1.10.3 Plotters
We learnt earlier that dot matrix, inkjet and laser printers are capable of producing
graphics output. However, many engineering design applications like architectural
plan of a building, design of mechanical components of an aircraft or a car etc.
often require high quality, perfectly-proportioned graphic output on large sheets.
The various types of printers discussed above are not suitable for meeting this
output requirement of such applications. A special type of output device called
plotters, is used for this purpose. Plotters are an ideal output device for architects,
engineers, city planners and others who need to routinely generate high-precision,
hard-copy, graphic output of widely varying sizes. Two commonly used types of
plotters are drum plotters and flatbed plotter. They are described below:
Drum Plotters
In a drum plotter, the paper on which the design is to be made is placed over a drum
that can rotate in both clockwise and anti-clockwise directions to produce vertical
motion. The mechanism also consists of one or more pen holders mounted
perpendicular to the drum's surface. The pen(s) clamped in the holders(s) can
move left to right or right to left to produce horizontal motion. A graph-plotting
program controls the movements of the drum and pen(s). That is, under computer
control the drum and pen(s) move simultaneously to draw designs and graphs on
the sheet placed on the drum. The plotter can also annotate the designs and graphs
so drawn by using the pen to draw characters of various sizes. Since each pen is
program selectable, pens having ink of different colours can be mounted in
different holders to produce multi-coloured designs.
Flatbed Plotter
A flatbed plotter plot a design or graph on a sheet of paper spread and fixed over a
rectangular flatbed table. In this type of plotter, normally the paper does not move
the pen holding mechanism provides all types of motions necessary to draw
complex designs and graphs. That is, under computer control the pen(s) move in
the required manner to draw designs and graphs on the sheet placed on the flatbed
table. The plotter can also annotate the designs and graphs so drawn by using the
pen to draw characters of various sizes. Provision is also there to mount more than
one pen in the pen(s) holding mechanism. Since each pen is program selectable,
pens having ink of different colours can be mounted in different holders to produce
multi-coloured designs. The plot size is restricted by the area of the bed. Some may
be as small as A4 size while some very large beds used in the design of cars, ships, air
crafts, buildings, highways etc. can be up to 20 ft. by 50 ft. Some plotters can also
plot on plastic or metal plates. In this case, the plastic or metal sheet is spread on
the bed and the drawing pen has a sharp edged needle.
C-35
Voice reproduction systems are very useful in a wide range of applications. Their
uses include:
(1) Audio help for guiding how to operate a system. For example, banking, industry
uses voice reproduction systems in automatic teller machines to provide
systematic guidance to customers on how to transfer with the bank by using an
ATM.
(2) Automatic answering machines.
(3) Video games are made exciting and interesting by playing an event-based sound
from a set of prerecorded sounds.
(4) Talking alarm clocks.
(5) Talking toys and home appliances also use a voice reproduction system.
(6) Often personal computers with audio facility are used for automated
multimedia presentations during exhibitions.
Speech Synthesizer
A speech synthesizer converts next information into spoken sentences. To produce
speech, these devices combine basic sound units called phonemes. From a given
text information sequence of words are combined into phonemes, amplified and
output through a speaker attached to the system. Speech synthesizers are still in
their infancy because they can produce only limited unique sounds with only
limited vocal inflections and phrasing. Hence, they are very useful in a wide range
of applications. Their uses include:
(1) For reading our text information to blind person.
(2) For allowing those persons who cannot speak to communicate effectively.
(3) For translation systems that convert an entered text into spoken words in a
selected language.
programmed, the PROM becomes a ROM. That is, the information recorded in it
can only be read. PROM is also non-volatile storage, i.e., the stored information
remain intact–even if power is switched off or interrupted.
EPROM
In ROM chip or in a PROM chip the information stored cannot be changed.
However, we can outcome this difficulty by using EPROM which is Erasable
Programmable Read Only Memory. In EPROM chip, we can erase the
information stored and chip can be reprogrammed to store new information using
a special PROM programmer facility. EPROM information is erased by exposing
the chip for some time to ultraviolet light. When an EPROM is in use, information
can only be read and the information remains on the chip until it is erased. EPROM
chips are of two types– one in which the stored information is erased by exposing
the chip for some time to ultraviolet light and the other one in which the stored
information is erased by using high voltage electric pulses. The former is known as
Ultra Violet EPROM and the later's known as Electrically-EPROM. It is easier to
alter information stored in an EEPROM chip as compared to an UV EPROM chip.
EEPROM is also known as flash memory because of the ease with which programs
stored in it can be altered. Flash memory is used in many new input/output and
storage devices like USB pen drive and MP3 music player.
Comprehensive Exercise
31. Integrated circuits signified the beginning of the ____ generation of computers.
36. System software enables the computer to perform which of the following
functions?
(a) read (b) write
(c) both (a) and (b) (d) none of these
37. ……… is a programmable machine :
(a) Monitor (b) Keyboard
(c) CPU (d) Computer
38. Computer can execute prerecorded list of instructions called :
(a) input (b) signal
(c) program (d) none of these
39. ……… is the component of computer that executes the information :
(a) Monitor (b) CPU
(c) Plotters (d) all of the above
40. The name of the first digital computer is :
(a) ATLAS (b) NCR 395
(c) ENIAC (d) none of these
41. Computers are ……… machines.
(a) versatile (b) non-versatile
(c) programmable (d) both (a) and (c)
42. ……… introduced the first personal computer.
(a) IBM (b) NCR
(c) both (a) and (b) (d) none of these
43. You can write data into ……… and read data from the ……… .
(a) RAM, ROM (b) RAM, RAM
(c) ROM, RAM (d) ROM, ROM
44. ROM is ……… memory.
(a) temporary (b) permanent
(c) fixed (d) none of these
45. RAM is ……… memory.
(a) permanent (b) fixed
(c) temporary (d) both (a) and (b)
46. Machine languages are called ……… generation language.
(a) third (b) second
(c) first (d) fourth
47. ……… languages are machine dependent.
(a) machine (b) assembly
(c) both (a) and (b) (d) none of these
C-46
A nswers
¨
C-47
2
N umber S ystem and
C omputer A rithmatic
5 1 101 5 × 101 = 50
9 2 10 2 9 × 10 2 = 900
3 3 10 3 3 × 10 3 = 3000
3958
1 1 21 1 × 21 = 2
2 2 22 1 × 22 = 4
3 3 23 0 × 23 = 0
4 4 24 1 × 24 = 16
5 5 25 1 × 25 = 32
6 6 26 0 × 26 = 0
7 7 27 1 × 27 = 128
8 8 28 1 × 28 = 256
(438)10
1 0 80 1 × 80 = 1
5 1 81 5 × 81 = 40
6 2 82 6 × 82 = 384
7 3 83 7 × 83 = 3584
(4009)10
C-51
2 0 160 2 × 160 = 2
(39618)10
+ a1 × 20 + a 0 × 2−1 + a −1 × 2− 2 + a − 2 × 2− 3 + a − 3 × 2− 4 + . . . . .
Method 3:
2n − 1 ..... 25 24 23 22 21 20
2n − 1 ..... 32 16 8 4 2 1
Example 1: Convert the binary number (1100010110)2 to its equivalent decimal
number.
Solution:
Method 1: (1100010110)2
= 1 × 29 + 1 × 28 + 0 × 27 + 0 × 26 + 0 × 25 + 1 × 24 + 0 × 23 + 1 × 22
+ 1 × 21 + 0 × 20
= 1 × 512 + 1 × 216 + 0 + 0 + 0 + 1 × 16 + 0 + 1 × 4 + 1 × 2 + 0
= 512 + 256 + 0 + 0 + 0 + 16 + 0 + 4 + 2 + 0
= (790 )10
Method 2:
29 28 27 26 25 24 23 22 21 20
512 256 128 64 32 16 8 4 2 1
1 1 0 0 0 1 0 1 1 0
= 512 + 256 + 16 + 4 + 2
= (790 )10
C-53
+ 1 × 2 −3 + 0 × 2 −4
1 1
= 1 × 16 + 1 × 8 + 0 + 1 × 2 + 0 + 0 + + +0
4 8
= 16 + 8 + 0 + 2 + 0 + 0 + 0 .25 + 0 .125 + 0
= (26 .375)10
Example 3: Convert the binary number (110101110)2 to its decimal equivalent.
Solution:
Method 1: (110101110)2
= 1 × 28 + 1 × 27 + 0 × 26 + 1 × 25 + 0 × 24 + 1 × 23
+ 1 × 22 + 1 × 21 + 0 × 20
= 1 × 256 + 1 × 128 + 0 + 1 × 32 + 0 + 1 × 8 + 1 × 4 + 1 × 2 + 0
= 256 + 128 + 0 + 32 + 0 + 8 + 4 + 2 + 0
= (430 )10
Method 2:
28 27 26 25 24 23 22 21 20
256 128 64 32 16 8 4 2 1
1 1 0 1 0 1 1 1 0
= 256 + 128 + 32 + 8 + 4 + 2
= (430 )10
Example 4: Convert the fractional binary number (110101101
. )2 to its equivalent decimal
number.
Solution: Method 1: For real part
(1101)2
= 1 × 23 + 1 × 22 + 0 × 21 + 1 × 20
= 1× 8 + 1× 4 + 0 + 1× 1
= 8 + 4 + 0 +1
= (13)10
For fractional part
(0 .01101)2
= 0 × 2 −1 + 1 × 2 −2 + 1 × 2 −3 + 0 × 2 −4 + 1 × 2 −5
C-54
1 1 1
=0 + + +0 +
4 8 32
= 0 + 0 .25 + 0 .125 + 0 + 0 .03125
= (0 .40625)10
Decimal number is = (13 .40625)10
Method 2:
(1101.01101)2
= 1 × 23 + 1 × 22 + 0 × 21 + 1 × 20 + 0 × 2 −1 + 1 × 2 −2 + 1 × 2 −3
+ 0 × 2 −4 + 1 × 2 −5
1 1 1
= 1× 8 + 1× 4 + 0 + 1× 1+ 0 + + +0 +
4 8 32
= 8 + 4 + 0 + 1 + 0 + 0 .25 + 0 .125 + 0 + 0 .03125
= (13 .40625)10
25 24 23 22 21 20
32 16 8 4 2 1
1 0 1 1 0 1
= (101101)2
C-55
Method 2:
2 45
2 22 1 LSB (Least Significant Bit)
2 11 0
2 5 1
2 2 1
2 1 0
0 1 MSB
(Most Significant Bit)
= (101101)2
Example 6: Convert the decimal number (60 .40) to binary number.
Solution: Method 1:
= (111100 )2
Method 2:
25 24 23 22 21 20
32 16 8 4 2 1
1 1 1 1 0 0
= (111100 )2
For fraction part
0 .80 × 2 = 0 .60 1
0 .60 × 2 = 0 .20 1
0 .20 × 2 = 0 .40 0
0 .40 × 2 = 0 .80 0
-----------------------------
-----------------------------
24 23 22 21 20
16 8 4 2 1
1 0 0 0 1
= (10001)2
Method 2:
= (10001)2
Example 8: Convert decimal number (89)10 to its equivalent binary number.
Solution: Method 1:
2 89
2 44 1 LSB (Least Significant Bit)
2 22 0
2 11 0
2 5 1
2 2 1
2 1 0
0 1 MSB (Most Significant Bit)
= (1011001)2
C-57
Method 2:
26 25 24 23 22 21 20
64 32 16 8 4 2 1
1 0 1 1 0 0 1
= (1011001)2
Example 9: Convert the decimal number (0 .8125)10 into its equivalent fractional binary
number.
Solution:
= (10000 )2
Method 2:
24 23 22 21 20
16 8 4 2 1
1 0 0 0 0
= (10000 )10
C-58
-------------------------------------
-------------------------------------
= (101001)2
Method 2:
25 24 23 22 21 20
32 16 8 4 2 1
1 0 1 0 0 1
Example 12: Convert the decimal number (73)10 to its equivalent binary number.
Solution:
Method 1: (73)10
2 73
2 36 1 LSB (Least Significant Bit)
2 18 0
2 9 0
2 4 1
2 2 0
2 1 0
0 1 MSB (Most Significant Bit)
= (1001001)2
Method 2:
26 25 24 23 22 21 20
64 32 16 8 4 2 1
1 0 0 1 0 0 1
= (1001001)2
Example 13: Convert decimal number (153)10 to binary number:
Solution:
Method 1:
27 26 25 24 23 22 21 20
128 64 32 16 8 4 2 1
1 0 0 1 1 0 0 1
Binary Number is → (10011001)2
Method 2:
2 153
2 76 1 LSB (Least Significant Bit)
2 38 0
2 19 0
2 9 1
2 4 1
2 2 0
2 1 0
0 1 MSB (Most Significant Bit)
C-60
= (10011001)2
2 1 4 2 1 4 2 1
1 0 0 1 0 1 1 0
2 2 6
= (226)8
Example 15: Convert the binary number
(1101010110110110
. )2 into octal number.
Solution: (1101010110110110
. )2
4 2 1 4 2 1 4 2 1 4 2 1 4 2 1 4
1 1 0 1 0 1 0 1 1 ⋅ 0 1 1 0 1 1 0
6 5 3 3 3 0
= (653 .330 )8
Example 16: Convert binary number (110101110)2 into its octal number.
Solution: (110101110)2
4 2 1 4 2 1 4 2 1
1 1 0 1 0 1 1 1 0
6 5 6
= (656)8
Example 17: Convert binary number (100111010010111010
. )2 to its octal number.
Solution: (100111010010111010
. )2
C-61
2 1 4 2 1 4 2 1 4 2 1 4 2 1 4 2 1 4
1 0 0 1 1 1 0 1 0 0 1⋅ 0 1 1 1 0 1 0
2 3 5 1 3 5 0
= (2351.350 )8
23 22 21 20
8 4 2 1
2 1 8 4 2 1 8 4 2 1
1 1 0 1 1 0 0 0 1 1
3 6 3
= (363)16
Example 19: Convert the binary number (110110111110)2 into hexadecimal number.
Solution: (110110111110)2
8 4 2 1 8 4 2 1 8 4 2 1
1 1 0 1 1 0 1 1 1 1 1 0
D B E
= (D B E)16
Example 20: Convert the binary number (1101011101101110 .10100111)2 into
hexadecimal number.
Solution: (1101011101101110 .10100111)2
C-62
8 4 2 1 8 4 2 1 8 4 2 1 8 4 2 1 8 4 2 1 8 4 2 1
1 1 0 1 0 1 1 1 0 1 1 0 1 1 1 0 • 1 0 1 0 0 1 1 1
D 7 6 E A 7
= (D 7 6 E . A 7)16
= 1 × 64 + 6 × 8 + 2 × 1
= 64 + 48 + 2
= (114)10
Example 24: Convert the octal number (177 .670)8 to its equivalent decimal number.
Solution: (177 .670)8
= 1 × 82 + 7 × 81 + 7 × 80 + 6 × 8 −1 + 7 × 8 −2 + 0 × 8 −3
6 7
= 1 × 64 + 7 × 8 + 7 × 1 + + +0
8 64
= 64 + 56 + 7 + 0 .75 + 0 .109375
= (127 .85938)10
C-63
= 10 × 4096 + 9 × 256 + 13 × 16 + 8 × 1
= 40960 + 2304 + 208 + 8
= (43480 )10
Example 26: Convert the hexadecimal number (9AC6.27A)16 to its equivalent decimal
number.
Solution: (9AC6.27A)16
= 9 × 163 + A × 162 + C × 161 + 6 × 160 + 2 × 16 −1 + 7 × 16 −2 + A × 16− 3
2 7 10
= 9 × 4096 + 10 × 256 + 12 × 16 + 6 × 1 + + +
16 256 4096
= 36864 + 2560 + 192 + 6 + 0 .175 + 0 .0273438 + 0 .0024414
= (39622 .205)10
Example 27: Convert the hexadecimal number (A 9 D)16 to its equivalent decimal number.
Solution: (A 9 D)16
= 10 × 256 + 9 × 16 + 13 × 1
8 961
8 120 1 LSB (Least Significant Bit)
8 15 0
8 1 7
0 1 MSB (Most Significant Bit)
= (1701)8
Example 31: Convert (506 .61)10 to its octal number.
Solution:
8 506 LSB (Least Significant Bit)
8 63 2
8 7 7
0 7 MSB (Most Significant Bit)
= (772)8
for fractional part
0 .61 × 8 = 0 .88 4
0 .88 × 8 = 0 .04 7
0 .04 × 8 = 0 .32 0
0 .32 × 8 = 0 .56 2
0 .56 + 8 = 0 .48 4
-----------------------------
-----------------------------
-----------------------------
-----------------------------
= (772 .47024 .....)8
C-65
Example 32: Convert the decimal number (27)10 to its equivalent octal number.
Solution: (27)10
8 27
8 3 3 LSB (Least Significant Bit)
0 3 MSB (Most Significant Bit)
= (33)8
Example 33: Convert the decimal number (17 .821)10 to its equivalent octal number.
8 17
8 2 1 LSB (Least Significant Bit)
0 2 MSB (Most Significant Bit)
= (21)8
For fractional part
------------------------------------------------
------------------------------------------------
Solution: (961)10
16 961
16 60 1 LSB (Least Significant Bit)
16 3 C
0 3 MSB (Most Significant Bit)
= (3C1)16
Example 35: Convert (961.12)10 to its hexadecimal number.
Solution: For real part
16 961
16 60 1 LSB (Least Significant Bit)
16 3 C
0 3 MSB (Most Significant Bit)
= (3C1)16
For fractional part
0 .12 × 16 = 0 .92 1
0 .92 × 16 = 0 .72 E
0 .72 × 16 = 0 .52 B
-----------------------------
-----------------------------
-----------------------------
-----------------------------
= (3C1.1EB ....)16
Example 36: Convert the decimal number (87)10 to its hexadecimal number.
Solution:
16 87
16 5 7 LSB (Least Significant Bit)
0 5 MSB (Most Significant Bit)
= (57)16
Example 37: Convert the decimal number (140)10 to its equivalent hexadecimal number.
Solution:
16 140
16 8 C LSB (Least Significant Bit)
0 8 MSB (Most Significant Bit)
= (8C)16
C-67
Example 38: Convert the decimal number (97 .76)10 to its equivalent hexadecimal number.
Solution: For real part
16 97
16 6 1 LSB (Least Significant Bit)
0 6 MSB (Most Significant Bit)
= (61)16
For fraction part
Solution: (671.54)8
4 2 1 4 2 1 4 2 1 4 2 1 4 2 1
1 1 0 1 1 1 0 0 1 • 1 0 1 1 0 0
6 7 1 5 4
Example 40: Convert the octal number (765 .727)8 into its binary number.
4 2 1 4 2 1 4 2 1 4 2 1 4 2 1 4 2 1
1 1 1 1 1 0 1 0 1 • 1 1 1 0 1 0 1 1 1
7 6 5 7 2 7
Binary number is → (111110101111010111
. )2
8 4 2 1 8 4 2 1 8 4 2 1
1 0 1 0 0 0 1 0 1 0 1 1
A 2 B
Binary number is → (101000101011)2
Example 42: Convert the hexadecimal number (2CB. AD)16 into the Binary number.
Solution: (2CB. AD)16
8 4 2 1 8 4 2 1 8 4 2 1 8421 8 4 2 1
0 0 1 0 1 1 0 0 1 0 11 • 1010 1 1 0 1
2 C B A D
0 0000 0 0
1 0001 1 1
2 0010 2 2
3 0011 3 3
4 0100 4 4
C-69
5 0101 5 5
6 0110 6 6
7 0111 7 7
8 1000 10 8
9 1001 11 9
10 1010 12 A
11 1011 13 B
12 1100 14 C
13 1101 15 D
14 1110 16 E
15 1111 17 F
16 10000 20 10
17 10001 21 11
18 10010 22 12
19 10011 23 13
20 10100 24 14
21 10101 25 15
22 10110 26 16
23 10111 27 17
24 11000 30 18
25 11001 31 19
26 11010 32 1A
27 11011 33 1B
28 11100 34 1C
29 11101 35 1D
30 11110 36 1E
31 11111 37 1F
2.21 EBCDIC
EBCDIC stands for Extended Binary Coded Decimal Interchange Code. It is
the standard character code for large computers. It is an 8-bit code without parity.
A 9'th bit can be used for parity with 8 bits up to 256 characters can be coded.
Hence, BCD code was extended from a 6 bit code to an 8-bit code. The added two
bits are used as additional zone bits, expanding the zone to four bits. The resulting
code is called the Extended Binary Coded Decimal Interchange Code. In this code,
it is possible to represent 256 different characters instead of 64. In addition to the
various character requirements mentioned above this also allows a large variety of
printable characters and several non-printable control characters. The control
characters are used to control such activities as printer vertical spacing, movement
of cursor on terminal screen etc. All of the 256 combinations have not yet been
assigned characters. Hence, the code can still grow as new requirements develop.
This code was originated by IBM.
The EBCDIC uses eight bits which represent each character. Its concept is similar
to the ASCII, however, the specific bit pattern are different. To translate ASCII to
EBCDIC, the integrated circuits are available so that two incompatible computers
or terminals can be connected to each other.
A 1100 0001
B 1100 0010
C 1100 0011
D 1100 0100
E 1100 0101
F 1100 0110
G 1100 0111
H 1100 1000
I 1101 1001
J 1101 0001
K 1101 0010
L 1101 0011
M 1101 0100
N 1101 0101
O 1101 0110
P 1101 0111
C-72
Q 1101 1000
R 1101 1001
S 1110 0010
T 1110 0011
U 1110 0100
V 1110 0101
W 1110 0110
X 1110 0111
Y 1110 1000
Z 1110 1001
0 1111 0000
1 1111 0001
2 11110010
3 1111 0011
4 1111 0100
5 1111 0101
6 1111 0110
7 1111 0111
8 1111 1000
9 1111 1001
2.22 ASCII
ASCII code stands for American Standard Code for Information Interchange.
Several American computer manufactures have adopted ASCII as their computers
internal code. This code popular in data communications is used almost
exclusively to represent data internally in microcomputers and is frequently found
is larger computers produced by some vendors.
American National Standards Institute (ANSI) published ASCII standard in
1963. However, the standard lacked lowercase letters and ANSI subsequently
revised ASCII in 1967. Later revisions in 1968, 1977 and finally in 1986 brought it
in its present form. Today, ASCII is one of the most popular and widely supported
character encoding standards.
ASCII is of two types:
(1) ASCII-7
(2) ASCII-8
C-73
ASCII-7 is a 7-bit code that can represent 128 different characters. Computer
using 8-bit (byte a group of 8-bits) and the 7-bit ASCII either set the 8'th bit of each
byte as zero or use it as a parity bit. ASCII-8 is an extended version of ASCII-7. It is
an 8-bit code that can represent 256 different characters. The additional bit is
added to the left of the 7'th bit of ASCII-7 codes.
Characters ASCII
0 48
1 49
2 50
3 51
4 52
5 53
6 54
7 55
8 56
9 57
: 58
; 59
< 60
= 61
> 62
! 63
@ 64
A 65
B 66
C 67
D 68
E 69
C-74
F 70
G 71
H 72
I 73
J 74
K 75
L 76
M 77
N 78
O 79
P 80
Q 81
R 82
S 83
T 84
U 85
V 86
W 87
X 88
Y 89
Z 90
a 97
b 98
c 99
d 100
e 101
f 102
C-75
g 103
h 104
i 105
j 106
k 107
l 108
m 109
n 110
o 111
p 112
q 113
r 114
s 115
t 116
u 117
v 118
w 119
x 120
y 121
z 122
C-76
Comprehensive Exercise
1. What is meant by the base of a number system? Write bases of binary, octal,
hexadecimal and decimal number system.
2. Convert the following decimal numbers to their binary, octal and hexadecimal
(a) (49)10 (b) (317)10
(c) (760 .375)10 (d) (674 .8125)10
(e) (119 .28)10 (f) (260 )10
3. Find out the octal, decimal and hexadecimal numbers of the following binary
number
(a) (110111001.0100111)2 (b) (11101011.010010001)2
(c) (11101.000100111)2 (d) (1110110001.0111100 )2
(e) (101110 .001011)2 (f) (10111.01101101)2
4. Find out decimal number, hexadecimal and binary number into following octal
number
(a) (127)8 (b) (576)8
(c) (756 .671)8 (d) (367 .6)8
(e) (675 .23)8 (f) (256 .71)8
5. Convert the following hexadecimal number into binary, octal and decimal
number system
(a) (A28)16 (b) (B2C .10)16
(c) (A6D. E9)16 (d) (29A . B9)16
(e) (965. A5)16 (f) (3B9. AD)16
6. How many digits are used in binary number systems?
7. How many digits are used in hexadecimal number system?
8. Write all basic digits of octal number system.
9. Convert (55)10 into hexadecimal and octal number system.
10. Convert (11)10 into equivalent decimal number.
11. What is number system?
12. Name the type of ASCII code.
13 Discuss various number system.
14. Differentiate between ASCII and EBCDIC code.
C-77
A nswers
¨
C-81
O perating S ystem
Operating systems vary in complexity from those that support single user
microcomputers to those that handle multi-user mainframes. Their complexity
depends on the computer system's size and scope together with the type of
performance provided to its users. A single stand−alone microcomputer will have a
relatively simple operating system, whereas a mainframe that supports hundred of
users accessing the system simultaneously, will have one that is far more complex.
C:\>
This prompt indicates that the operating system is ready to accept a command
from the user.
C-85
Routines to Operate
System Devices
Diagnostic Testing
Boot Program
Screen Memory
Available Memory
Operating System
Executive
The op er at ing sys tem read ing an ap pli ca tions pro gram into RAM in
response to a user's com mand
C-86
attributes in the directory for example, a file may be declared read only, it can be
read but cannot be altered. A file may be declared read/write, it can be both read
and altered. Some operating systems allow hidden files to be created. These do not
show up in the directory and can never be erased. Hidden files are often used for
very important files associated with the operating system. Since the computer
needs such files to operate, they should never be erased from the disk. Hiding them
prevents this from happening.
The operating system provides the utility programs that manage the files. Some
utility programs create the files and the directory and allow the user to copy, erase
and rename files. Other utility programs display the contents of the directory or of
a particular file on the video display. Still others transfer the content of a file to an
output device, such as a printer.
(5) Operating in Batch Mode
Most operating systems allow for operating in batch mode. Batch processing
handles input data items in batches rather than one at a time. Batch mode is
similar, except that it refers to programs rather than data items. In batch mode, the
user can instruct the operating system to execute a list of programs one after the
other. The list of programs is given in a file. The user instructs the operating system
either to perform the commands without further user intervention or to request
certain data as each task is started. Batch mode can greatly simplify execution of
long or complex lists of programs, especially if the same list is run repeatedly.
(6) Providing Services
An operating system provides services that the programmer can use to control the
computer system.
(7) Job Management
Job management software manages the jobs waiting to be processed. It recognizes
the jobs, identifies their priorities, determines whether the appropriate main
memory and secondary storage capability they require is available and schedules
and finally runs each job at the appropriate moment.
(8) Batch Processing
System software is available to support the different methods of processing a job.
With batch processing, the most basic method, data are accumulated and
processed in groups. Payroll applications for example, are often processed this way.
Once in every week, hourly records are grouped and the payroll software is run.
(9) On-line Processing
In on-line processing, data are processed instantaneously.
(10) Data Management
In the process of managing the resources of the computer system, operating system
software also manages the storage and retrieval of data. The system software
handles many of the details associated with this process rather such details are not
a primary concern for users or programmers writing application programs.
C-88
The very earliest computers, provided little in the way of support for their users,
switches and lights were the first input and output devices. Programs were entered
by using a set of switches to define a memory address value, then using another set
of switches to specify an instruction word which was then entered into the memory
location. This was repeated for each word of the program. The program was started
by setting the program counter to the first instruction word and pressing a start
button. The first step towards improving and simplifying computer use was to
address the problem of loading the program. Reducing the human involvement in
this process implied preparing the program in some offline form, then transferring
this into the computer memory via an input device such as a card or paper tape
reader.
In order to read from a card or paper tape reader, a loader program had to be
established in the computer memory. In the first place, which prompts the
question− how do you load the loader ! One solution, of course, is simply to enter
the loader manually, as before. However the idea was born of building into the
computer a facility whereby, on startup, the computer automatically read a
primitive loader program written on, for example, a single card. This basic loader
then executed and read in a larger, more extensive, loader program, which could
then load any user program. This arrangement was referred to as boot strapping,
derived from the idea of pulling oneself up by the bootstraps; the technique and the
term survive to the present day, although boot strapping is generally reduced
now-a-days to booting.
In the 1950s, computers were very expensive, certainly in relation to their
throughput measure in today's terms. The early pre-occupation, therefore, was to
get as much use out of them as possible. This drive towards 100% utilization of the
processor has not entirely disappeared today but is now much less important than
usability and peak processing power.
As the hardware steadily improved, the execution time of programs fell. This trend
had very critical consequences, which were to span on rapid development of early
operating systems.
The set up time - i.e. the time between jobs spent loading the next program and data
become disproportionate to the run time of the job.
The input/output devices were seen to be much slower than the processor speed.
The processor spent most of its time idle, waiting for a card to be reader punched or
a character to be printed.
Around 1960, a revolutionary new computer called ATLAS, was designed by a
term from Manchester University and the Ferrants company. This is reputedly the
first computer to be designed with the requirements of an operating system in
mind. Atlas introduced many more features including interrupts and a virtual
memory system. While the idea of virtual memory took some time to make a broad
impart, the interrupt mechanism made an immediate impression in computer and
C-90
operating system design, since it made the job of managing several programs and
peripheral devices simultaneously much easier. It made it possible for the
operating system to oversee the progress of several programs and Input/Output
activities simultaneously. In 1964, IBM produced the system 360 series of
computers, which consequently evolved into system 370 and then the 303 X
machines in use today.
This range of computers has probably been the most significant in computing
history, not so much from a technological point of view, but because it provided a
wide range of computing facilities within a compatible series of machines,
supported by the manufacturer through many revisions and enhancements.
Operating systems have evolved through a number of distinct phases or
generations which corresponds roughly to the decades.
(1) The 1940s - First Generation
The earliest electronic digital computers had no operating systems. Machines of
the time were so primitive that programs were often entered one bit at time on rows
of mechanical switches. Programming languages were unknown. The term
operating systems were unheard in this generation. There were some control
routines defined, known as control programs which provided some functions of
operating system.
(2) 1950's - Second Generation
By the early 1950s the routine had improved somewhat with the introduction of
punch cards. The General Motors Research Laboratories implemented the first
operating systems in early 1950's for their IBM 701.
The system of the 50's generally ran one job at a time. These were called
single-stream batch processing systems because program and data were submitted
in groups or batches. Job Control Language were used to define the statement to
control the execution of jobs as well as to provide instructions to the monitor :
• What compiler to use.
• What data to use.
During this decade Fortran a high level language developed and first generation
control program were written in this language. Fortran Monitor System (FMS) is
considered as a first operating system designed in High level language.
Second generation can be characterized as:
• Punch cards
• Fortran or assembler
• Batch system
• Programs read in from tape
• Two applications
— Scientific
— Data processing
C-91
Suppose a system with no multiprogramming, when the recent job paused to wait
for other I/O operation to complete, the CPU simply sat idle until the I/O finished.
The solution for this problem, that evolved was to partition memory into several
pieces, with a different job in each partition. While one-job was waiting for I/O to
complete another job could be using the CPU.
Another major feature in third-generation operating-system was the technique
called spooling.
In Spooling
1. a high speed device "like a disk" interposed with a running program.
2. a low speed device involved with the program in I/O.
Instead of writing we can get output directly with the help of printer.
So in a glance in third generation following developments took place
• ICs and Multiprogramming
• System 360 and S/370 family of computers
• Spooling
• Time sharing
• On-line storage for
— System programs
— User programs and data
— Program libraries
• Virtual memory
• Multiprocessor configuration
C-92
time operating system has well defined, fixed time constraints. Processing must be
done within defined constraint or the system will fail.
Real time system is considered to function correctly only if it is returns results
within any time constraints. While in time sharing system it is desirable to respond
quickly but not mandatory.
There are two kinds of real systems:
(a) Hard real system
(b) Soft real system
(a) Hard real system
This system guarantees that critical tasks complete on time. This goal says that all
delays in the system must be bounded. Such time constraints dictate the facilities
that are available in hard real time system.
Most other advanced operating system features are also absent, since they separate
user from hardware and this separation results in uncertainty about the amount of
time an operation will take.
(b) Soft real system
In this system, a critical real time task gets priority, over other tasks and retain that
priority until it completes. Soft real system or time is an achievable goal that is
amenable to mixing with other types of systems. However, soft real time have more
limited utility than hard real time. Given that lack of deadline support, they are
risky to use for industrial control and robotics. Areas where soft real time can be
used are multimedia, virtual reality and advanced scientific projects. Soft real
system need a advanced operating system. Features can not be supported by hard
real time system, because the soft real system used a expanded form of advanced
operating system.
An hardware and software was developed to create monitors, simple and spooling
batch systems and finally multiprogrammed systems. The separation between the
user and the computer became more and more pronounced.
operating system is responsible for switching between the jobs now often called
processes in such a way that favored user interaction. If the context-switches
occurred quickly enough, the user had the impression that he or she had direct
access to the computer.
Interactive processes are given a higher priority so that when Input/Output is
requested the associated process is quickly given control of the CPU so that it can
process it. This is usually done through the use of an interrupt that causes the
computer to realize that an Input/Output event has occurred.
It should be mentioned that there are several different types of time sharing
systems. One type is represented by computers like our VAX/VMS computers and
UNIX workstations. In these computers entire processes are in memory and the
computer switches between executing code in each of them. In other types of
systems, such as airline reservation systems a single application may actually do
much of the time sharing between terminals. This way there does not need to be a
different running program associated with each terminal.
In a non-interactive computing environment a user has no contact with his
program during its execution. In such an environment it is natural to use the batch
processing or multiprogramming paradigm. Both these systems provide poor user
service. However, this is inevitable due to the nature of Input/Output devices in
use.
In an interactive computing environment, a user can provide inputs to a program
from the key board and examine its output on the monitor screen. A different
operating system paradigm is used in such environments to provide quick service
to user requests, it creates an illusion that each user has a computer system at his
sole disposal. This paradigm is called time sharing.
3.7.2 Scheduling
User service in a time sharing system is characterized by response times to user
requests, so the time sharing kernel must provide good response times to all users.
To realize this goal all users must get an equal opportunity to present their
computational requests and have them serviced. Each user must also receive
reasonable service. Two provisions are made to ensure this:
(1) Programs are not assigned priorities because assignment of priorities may deny
operating system attention to low priority programs. Instead, programs are
executed by turn.
(2) A program is prevented from consuming unreasonable amounts of CPU time
when scheduled to execute. This provision ensures that every request will
receive operating system attention without unreasonable delays.
and also controls other devices. DOS also controls the saving and retrieving of
information on the disk by giving a directory of the files on a disk and we never
need to know the physical location of the data on the disk.
As MS-DOS operations are based on disk, let us start to learn about diskettes, a file,
directories and how to use them. The diskette or the floppy as it is more commonly
called, is the most widely used type of disk storage with microcomputers. It is a
round disk enclosed in a protective covering called the jacket. DOS allows
1 1
information storage on a variety of media, including fixed disks 3 " and 5 "
2 4
floppy disks.
In the history of IBM PC and MS-DOS, the floppy disks have changed
considerably, resulting in a variety of, sometimes incompatible disk FORMATS. A
FORMAT defines the physical layout of the information on a disk. To avoid the
risk of getting too mixed up with bytes and sectors, it is more important to
understand the various disk formats.
UNIX operating systems have more or less same set of procedures and commands.
However, UNIX is more appropriate for bigger machines like large mainframe
systems as compared to other operating system. The UNIX operating system is a
powerful system of programs that allows you to accomplish a full spectrum of tasks
from developing high level assembly language programs to creating, editing and
typesetting documents. The powerful UNIX system requires careful control of its
operations and a regular schedule of maintenance for its smooth running. Today,
the UNIX system is distributed with over two hundred commands and programs.
The UNIX system can be run on a multitude of computer systems, ranging from
small personal computers to large mainframe systems. The number of different
computers that support the UNIX system is very impressive. A programmer or user
can expect the same programming tools and environment on any system that runs
UNIX and can write programs to run without modification on any computer
running UNIX system. A programmer/user can learn one set of procedures and
commands that can be used on any UNIX system.
The UNIX operating system can be divided in three parts:
(a) File System
(b) Scheduler
(c) Shell
3.10.2 Scheduler
The scheduler is a program that allows more than one user to use the computer at
the same time. It shares the computer resources among all the users, allowing each
a small slice of the computer's processor. This concept is known as time sharing.
3.10.3 Shell
The shell is the UNIX system's command interpreter. It is a program that reads the
lines you type in at the terminal and performs various operations depending on
what you type in. When users log into UNIX system, they communicate with one
of several interpreters. Each invocation of this interpreter is called a shell and each
shell has one function to read and execute commands from its standard input.
Because the shell gives the user a high level language to communicate with the
operating system, UNIX can perform tasks unheard in less sophisticated operating
systems. Commands that would normally have to be written in a traditional
programming language can be written with just a few lines in a shell procedure.
programs that are small and most useful are made a resident part of DOS. It means
that they are in memory all the time once DOS has been read off the disk and
started up. These are called the INTERNAL/RESIDENT commands. All other
command programs are called EXTERNAL and they are kept in the disk until they
are required.
There is a standard format for asking DOS to carry out commands. The basic
format of a command is :
d : COMMAND-NAME Parameters (if any) Switches (if any)
• d : indicate the device name
• COMMAND-NAME indicate what is to be done
• PARAMETERS indicate what command is to be performed on
• SWITCHES indicate how it is to be done.
directory of c: \ >
dem . bat
Readme . doc
long . dat
short . com
Format
C :\> vol ↵
(f) VER: This reports the version number of MS-DOS
Format C:\> ver ↵
(g) REN or RENAME: This command is used to rename a file.
Format
C :\> ren old name new file name ↵
Example:
C :\> ren Ankur.bat Manu.bast
(h) Type: It types the entered file. This command is used for listing a file on the
VDV.
Format
C :\> type File name ↵
C :\> type Ankur.doc ↵
(i) Copy: This is a tool to make copies of disk files. It can also duplicate files from
one disk to another. At the same time we can copy several files using wild cards. It
can also copy a file with a different file name.
Format
C :\> copy ↵
Example:
C :\> copy C : This file B : ↵
C :\ copy B : *. com ↵
C :\ copy B : *. * ↵
C :\ copy B : This File
( j) DEL or DELETE: This is one command but with two different names. DEL for
delete and ERA for erase. Under either name, it will throw a file away. We can also
erase one or more files at a time using wild cards. But one has to be very careful
while using wilds because it will erase all the files as mentioned in the specification.
Example:
C :\> del *. * ↵
dos immediately replies with
ARE YOU SURE (Y/N) ?
and won't delete any file unless we type in a reply Y (yes). But all other file deletion
commands proceed without any waiting.
Example:
B :\ erase command.com ↵
Although DOS does not give any command to recover files that have been erased,
the data from erased files will be still available on the disk which can be recovered
by special utility programs like Personal Computer Tools or Nortons Utilities.
C-103
(7) Insert DOS diskette in drive A and press any key to continue OR insert
COMMAND.COM in drive A and strike any key when ready.
(14) Target diskette write protected, correct and strike any key.
In technical terms, each room is called a sub-directory and the main hall is called the
root-directory. Each sub-directory can be further divided into sub-sub-directory.
The directory structure is like a tree but viewed upside down i.e., the root is at the
top and the branches point downwards. It can be compared to the following figure:
Rules for running a directory are the same as for files, but as a convention the
directories are not given the extension.
The md (making directory) command is used to make a directory or a
sub-directory. Type md followed by a space and then the full path where you wish
to create the directory, followed by the directory name. However, you need not
specify the path if it has to be created under the current directory. Let's try to make
the directory structure as shown in above figure.
(1) As per above figure, there are two sub-directories under the root directory
namely, SALARY and BILLS. To create the first sub-directory, i.e. SALARY
sub-directory, type the following command at the DOS prompt (c : \)
c:\> md SALARY ↵
To create the second sub-directory under the root directory (c:\) type the following
command at the Dos prompt (c:\)
c:\> md BILLS ↵
The \(back slash) in both the commands tells DOS that it has to create the
sub-directory under the root-directory.
(2) Now type DIR command and press Enter key of your keyboard.
(3) Let us now make two sub-sub-directories, viz, OFFICERS sub-sub-directory
and CLERKS sub-sub directory under the SALARY sub-directory.
C-106
Step 2:
c:\ SALARY >
Step 3:
c :\ SALARY > cd ↵
Step 4:
c:\>
(3) Now that you are outside the directory, which is to be deleted, follow the
second step at the DOS prompt:
c:\ BILLS \ NORTH > rd CASH ↵
This step removes the CASH sub-sub-sub-directory.
Workout: Write the steps to delete the CLERKS sub-sub-directory, assuming that
you are in the Root directory.
Solution: c :\> cd \ SALARY \ CLERKS ↵
c:\SALARY \ CLERKS > del * . * ↵
c :\ SALARY \ CLERKS > cd.. ↵
c :\ SALARY \ rd CLERKS ↵
The first character tells you which disk drive is currently active. DOS normally
refers to the hard disk drive as drive c.
The drive letter is followed by a slash (\) and then a "greater than" character (>). A
cursor flashes after this prompt.
Sometimes your prompt may look different from the above. If you are working in
DOS directory, then prompt will be as follows :
c :\DOS>
If you are working in the floppy drive A, then the prompt would appear as follows:
A:\>
− Windows has another important feature called outlook express. With outlook
express, you can send and receive electronic mail messages. Outlook express
also provides facility for managing these messages.
− Windows provided internet collaboration through its yet another feature called
Net-Meeting. It helps you in working together, sharing information and
exchanging files and documents during conference using data, audio and video.
− Windows provides with security zones feature. This feature helps you to assign
security option to websites. Your approval would be a must before opening a file
or running a programme from the internet. This feature restricts you to explore
different sites by selecting the desired security level.
(A) Click on Details button. It provides you with details of the selected component.
You can add or remove individual sub-components contained in the selected
component group.
(B) Click on Next button to install the component.
Through windows you can also use the Date/Time option from control panel to
identify when files are created or modified. It also helps to find or sort files on
that basis. You can also change the current date and time from here :
(3) Click on Apply button to apply the changes you have made.
(4) Click on Ok button to continue.
3.20.6 Background
Desktop wallpapers do exactly what your room wallpaper does – decorates your
surrounding and adds more colour and fun to your life. Use this option to modify
and apply different pictures and images as your desktop wallpapers. You can also
use repetitive designs called patterns to get a woven fabric or block printed look on
your desktop.
C-117
(a) Most of them are interesting and provide fun and entertainment.
(b) When the same static image stays on a screen for a long period of time it can
burn the delicate phosphors on the inside surface of the picture of your
monitor. This can leave a permanent ghost of the image on the screen, thereby
damaging your monitor.
(c) Many newer computers have inbuilt power saving option build into them
which powers down the monitor as soon as the screen saver comes into effect,
thereby saving on your electricity bills.
(d) The screen saver also has an optional security feature. Through this option you
can define a password. Once the screen saver is activated, it requires the user
typing in the correct password before you can resume working. This makes sure
that nobody peeps and messes with your computer file while you are away from
your desk.
To choose a screen saver :
(1) Choose Display Option from Control Panel. Click on screen saver folio/tab.
The screen saver lists the available screen savers. A screen saver displays moving
images, which starts automatically if your computer is idle for the specified
amount of time.
(2) Click on the screen saver roll-down list and choose the screen saver that you
want to apply.
(3) Click on the Settings button to change the settings.
(4) Click on the Preview button to preview the screen saver before applying it.
(5) Click here to increase or decrease the time after which the screen saver would
appear.
(6) Click on Apply button to apply the changes made.
(7) Click on Ok button to continue.
3.20.8 Fonts
Fonts are like having different handwritings available on your computer. Fonts are type
faces that you can use to pep up your work and change the appearance of characters on
your screen and on the printed paper. Fonts help you to express your message more
clearly and emphatically. Broadly, there are two types of fonts, serif and sauserif. A serif
is a short stroke at the end of or at an angle to the latter form. An example of serif is
Times New Roman font and sauserif is Arial font. Windows comes bundled with a large
number of fonts, which are automatically installed during the windows setup
installation. You can install additional fonts from other software as and when required.
(A) Choose fonts option from Control Panel.
(B) A list of all the available fonts would be displayed. To look at a sample of a font
double-click the icon for the font.
C-120
C-121
3.20.9 Modem
A modem, short form for Modulator/Demodulator is an electronic device that
allows you to send and receive any kind of digital data through the normal
telephone line. Since your computer stores data in digital format and your
telephone line transmits only analog data, a modem converts any kind of digital
data into analog data and vice-versa.
You can use the Modem option from control panel to install new modems or to
check the performance and settings of pre-installed modems.
To choose phone and modem options from Control Panel :
3.20.10 Mouse
As explained earlier, a mouse is a small hand held device through which you can
quickly and easily navigate the different parts of the screen. You can customise the
various aspects of mouse to make them work the way, you prefer. You can control
the mouse pointer speed, shape, button configuration, double click speed etc. You
can even swap the left and right buttons. If you frequently loose track of where your
mouse pointer is, you can choose to have a mouse trail effect, which will make the
mouse pointer more visible.
Button Configuration:
To customize button configuration follow the following steps :
(1) Click on the Buttons folio/tab.
(2) Click on Right handed radio button of the Button configuration option to
convert your left mouse button into right button and vice-versa.
(3) Drag this button to increase or decrease the clicking speed of the mouse.
(4) Click on Apply button to apply the changes that you have made.
(5) Click on Ok button to continue.
C-123
Pointer Configuration:
To customize pointer configuration follow the following steps as given below :
(1) Click on Pointers folio/tab.
(2) Click on the pull-down list to choose the scheme that you want to apply.
(3) You can choose a scheme from another location by clicking on the Browse
button.
(4) Click on Apply button to apply the chosen scheme.
(5) Click on the Ok button to continue.
Motion Configuration:
To customize motion configuration follow the following steps as listed below:
(1) Click on the Motion folio/tab.
(2) Click on this button to increase or decrease the pointer speed.
(3) You can also click on the pointer trails radio buttons to make them look long or
short.
(4) Click on Apply button to apply the changes you have made.
(5) Click on Ok button to continue.
C-124
Comprehensive Exercise
9. What do you understand by Real time system ? Describe hard real system and
soft real system in detail.
10. What is an operating system ? What are the functions of an operating system ?
How does windows differ from DOS ?
A nswers
¨
C-129
4
C omputer S oftware and
P rogramming
A computer requires both hardware and software for its proper functioning,
without software computers are just a box full of electronic components capable of
doing nothing. So in order to utilize all the hardware provided inside the computer
we need to use a system which assign job to each component so that the overall task
could be achieved. This can be done through a collection of programs which are
nothing but the instruction sets called as software. So we can say that the software
is a collection of programs, whose aim is to enhance the capabilities of the hardware
machine.
Application Software
Graphics Personal
Databases Assistance
System Software Education
Spreadsheets
Translators Entertainment
Word Operating
Systems Hardware Utility
Processors Programs Communication
CPU, Disks, Mouse,
Printer, etc.
Types of Software
gas exploration, design of complex structures like aircrafts, ships, bridges, sky-rise
buildings etc. With so many applications available, it is not possible to categorize
them all and to cover them here. Some commonly known application softwares
are:
(1) Word-Processing Software
Word-processing software enables us to make use of a computer for creating,
editing, viewing, formatting, storing, retrieving and printing documents.
(2) Spreadsheet Software
Spreadsheet software is a numeric-data-analysis tool that allows us to create a kind
of computerized ledger. A manual ledger is a book having rows and columns that
accountants use for keeping a record of financial transactions and for preparing
financial statements.
(3) Database Software
A database is a collection of related data stored and treated as a unit for
information retrieval purposes. A database software is a set of programs that
enables us to create a database, maintain it, organize its data in desired fashion,
selectively retrieve useful information from it.
(4) Graphics Software
Graphics software enables us to use a computer system for creating, viewing,
storing, retrieving and printing of designs, drawings, pictures, graphs etc.
(5) Personal Assistance Software
Personal assistance software allows us to use personal computers for storage and
retrieval of our personal information as well as for planning and management of
our schedules, contacts, finances and inventory of important items.
(6) Education Software
Education software allows a computer to be used as a teaching and learning tool. A
few examples of such software include those which are used for teaching
mathematics, grammar or any other subject.
(7) Entertainment Software
Entertainment software allows a computer to be used as an entertaining tool.
Computer video games belong to this category of software.
(8) Communication Software
In a network environment, communication software enables transfer of data and
programs from one computer system to another.
The earliest programming languages preceded for invention of the computer, and
were used to direct the behaviour of machines such as Jacquard looms and player
pianos. Thousands of different programming languages have been created, mainly
in the computer field, and still many are being created every year. Many
programming languages require computation to be specified in an imperative form
(i.e., as a sequence of operations to perform), while other languages utilize other
forms of program specification such as a the declarative form (i.e., the desired
result is specified not how to achieve it).
A program is a set of instructions which are executed by a computer. A
programming language consists of all the symbols, characters and usage rules, that
permit people to communicate with computer programming languages and are
said to be lower or higher depending upon whether they are closer to the language
which the computer itself uses or to the languages that people use.
Machine Language
It contains the strings of binary number (0’s and 1’s) and is machine dependent. It
means that the machine language for every processor is different. An instruction
prepared in any machine language has two parts of format, as shown below:
The first part is the operation which tells the computer which function to perform.
Every computer has an operation code or opcode for each of its functions.
The second part of the instruction is the operand and it tells the computer where to
find or store the data or other instructions that are to be manipulated. Thus, each
instruction guides the CPU what to do and the length and the location of the data
fields that are involved in the operation.
Advantages
(i) Very efficient.
(ii) Requires less storage space.
(iii) The processor can execute without any transaction.
Disadvantages
(i) Machine dependent.
(ii) Programming is difficult.
(iii) Error Prone.
(iv) Cost is high.
(v) Writing a program in machine language is very difficult as for every task the
machine language codes are to be searched and remembered.
Assembly Language
In this type of language, we replace the strings of binary numbers with short
acronyms corresponding to the fundamental functions that the computer
processor is able to perform. Each mnemonic of assembly language has a unique
machine code.
Advantages
(i) They are time saving and reduce details.
(ii) Fewer errors are made which are easier to find.
(iii) Assembly language programs are easier to modify than the machine language.
(iv) Easier to understand and use.
Disadvantages
(i) The coding of assembly language is time consuming.
(ii) It is also machine oriented as the code for one machine cannot be used by the
other one.
First Generation Programming Language
First-generation programming language is a machine-level programming language.
Originally, no translator was used to compile or assemble the first-generation
language. The first-generation programming instructions were entered through
the front panel switches of the computer system.
A first generation (programming) language (1GL) is a group of programming
languages, machine level languages, that are used to program first-generation
computers. The instructions were given through the front panel switches of these
computers directly to the CPU. There was originally no compiler or assembler to
process the instructions in 1GL.
The instructions in 1GL are made of binary numbers, represented by 1’s and 0’s.
This makes the language suitable for the understanding of the machine but very
much more difficult to interpret and learn by the human programmer.
The main advantage of programming in 1GL is that the code can run very fast and
very efficiently, precisely because the instructions are executed directly by the
CPU. One of the main disadvantages of programming in a low level language is that
when an error occurs, the code is not as easy to fix.
First generation languages are very much adapted to a specific computer and CPU,
and code portability is therefore significantly reduced in comparison to higher
level languages.
Modern day programmers still occasionally use machine level code, especially
when programming lower level functions of the system, such as drivers, interfaces
with firmware and hardware devices. Modern tools, such as native-code compilers
are used to produce machine level language from a higher-level language.
Second Generation Programming Language (2GL)
Second-generation programming language is a generational way to categorize
assembly languages. The term was coined to provide a distinction between higher
level third-generation programing languages (3GL) such as COBOL and earlier
machine code languages. Second-generation programming languages have the
following properties:
C-136
The code can be read and written by a programmer. To run on a computer it must
be converted into a machine readable form, by a process called assembly.
The language is specific to a particular processor family and environment.
Second-generation languages are sometimes used in kernels and device drivers
(though C is generally employed for this in modern kernels), but more often find
their use in extremely intensive processing such as games, video editing, graphic
manipulation/rendering.
One method for creating such code is by allowing a compiler to generate a
machine-optimized assembly language version of a particular function. This code
is then hand-tuned, gaining both the brute-force insight of the machine optimizing
algorithm and the intuitive abilities of the human optimizer.
The first high-level programming languages were designed in the 1950s. Examples
of early high level languages are ALGOL, COBOL, FORTRAN and Ada. These
programs could run on different machines so they were machine-independent. As
new, more abstract languages have been developed, however, the concept of high
and low level languages have become rather relative. Many of the early “high level”
languages are now considered relatively low level in comparison to languages such
as Python, Ruby, and Common Lisp.
“High-level language” refers to the higher level of abstraction from the machine
language. Rather than dealing with registers, memory addresses and call stacks,
high-level languages deal with variables, arrays, objects, complex arithmetic or
boolean expressions, subroutines and functions, loops, threads, locks, and other
abstract computer science concepts, with a focus on usability over optimal
program efficiency. Unlike low-level assembly languages, high-level languages
have few, if any, language elements that translate directly into a machine’s native
opcodes. Other features, such as string handling routines, object-oriented
language features, and file input/output, may also be present.
Advantages
(i) These are easier to learn than Low Level Language.
(ii) It requires less time to write.
(iii) They provide better documentation.
(iv) Easier to maintain.
(v) They are not machine oriented.
Third Generation Programming Language (3GL)
Third-generation programming language (3GL) is a refinement of a
second-generation programming language. The second generation of
programming languages brought logical structure to software. The third
generation brought refinements to make the languages more
programmer-friendly. This includes features like improved support for aggregate
data types, and expressing concepts in a way that favors the programmer, not the
computer (e.g. no longer need to state the length of multi-character (string) literals
in Fortran). A third generation language improves over a second generation
language, by having the computer take care of non-essential details, not the
programmer. Third Generation Languages feature more abstraction than previous
implementations of those languages, and thus can be considered higher level
languages then their first and second generation counterparts.
First introduced in the late 1950s, Fortran, ALGOL and COBOL are early
examples of this sort of language.
Most popular general-purpose languages today such as C, C++, C#, Java, BASIC
and Pascal are also third-generation languages. Although C++, Java and C#
follow a completely different path as they are object-oriented in nature. Third
C-138
generation focused on structured and had no meaning for the object encapsulation
concepts.
Most 3GLs support structured programming.
1. These are eas ily Less understandable than high Programs are less
understandable. level language but more than understandable.
machine language.
Comprehensive Exercise
2. The ____ is a sequence of instructions that tells the computer how to process
the data.
(a) data (b) program
(c) controls (d) instructions
3. How are software packages categorized?
(a) hardware and software
(b) word processing and spreadsheets
(c) system software and application software
(d) none of the above
4. The software can be divided into:
(a) system software and application software
(b) general purpose software and special purpose software
(c) operating system and application software
(d) none of the above
C-140
A nswers
¨
C-141
C omputer N etworks
electronic mail system has a "mailbox" located in the memory of his or her own
computer. The electronic mail system distributes messages by storing them in
the appropriate mail boxes. The user can check the mail box for messages. If
there is a message, it is displayed on the screen. The user can then use the
electronic mail system to send a response.
(4) It allows for decentralization of various data processing functions. As micro
computer use spreads throughout an organization, some data processing and
analysis functions that had been performed by the data processing department
become decentralized and are performed locally within other departments. To
perform these functions it is crucial that the local computers have access to data
from the mainframe computer. A network can provide such access.
(5) It allows for communication between organizations. Various organizations
cooperating in performing certain tasks can link their computers in a network in
order to share information. This allows for sharing of data and software and for
rapid communication among the various network members.
A network can be defined as the interconnection of two or more systems. The
minimum number of systems required to make a network is two. Computer
systems connected in a network can exchange information between themselves
and share the use of hardware devices connected such as the printer etc.
A system with one main controlling unit known as the master and many slave
terminals is not a network.
Computer networks are of three types:
(1) Local Area Network (LAN)
(2) Metropolitan Area Network (MAN)
(3) Wide Area Network (WAN)
Suppose information has to be passed from terminal 3 to 1, it will use Bus-A and if a
reply has to be sent back it will use Bus B.
other via several intermediate routers. The point to point type network may be
separated into two parts– the hosts and the subnet. The machines between which
communication is to be established are called hosts. The hosts are connected to
each other by what is known as the subnet. The subnet consists of the transmission
lines and the intermediate switching elements are also called "routers". The main
function of a router is to receive the transmitted data and then select an
appropriate-channel to forward it to the destination host or to another router.
When a data packet arrives at a router it is stored in the router until the output
transmission line is free and is then transmitted or forwarded to destination host.
The broadcast type wide area network use a satellite or ground radio system. All or
some routers have antennas through which they can receive the incoming signals
from the satellite. When a ground radio system is being used the routers can
communicate between each other. It may also be possible that in a network, while
some routers receive their outputs through their antennas, others are point to
point type.
C-145
5.5 Internet
Internet is the name for a vast, worldwide system consisting of people information
and computers. It is so huge and complex that it is beyond the comprehension of a
single human being.
The roots of the internet lie in a project called the ARPANET, which was sponsored
by the united states department of defence–Advanced Research Project Agency
(ARPA). The department of defence was interested in building a network that
could maintain itself under adverse conditions.
The project was started in 1968 and soon evolved into a more general goal of
developing techniques to build a large scale network. ARPANET continued for
years and was gradually phased out after having been officially declared
completed. By then the technology to connect computers reliably and
economically had been developed and today the ARPANET's spiritual
descendants form the global backbone of what we call, INTERNET.
Internet is a computer network formed by connecting millions of computers
together. These computers are interconnected by using phone lines, fibre optics
cables and satellite transmission. With the help of web browser it became possible
for even the common man to use the internet. Web browser is a tool to view the large
information contents stored on different computers worldwide. Its use has enabled
the gathering of information about any topic on the internet. No one pays for
internet usage but one thing must be remembered that nothing comes free of cost.
Users pay to internet service providers for getting an access to the internet and they
also pay for using the phone line.
Internet provides various types of services such as web pages, e-mail, conferencing
etc. There are many characteristics of internet. Some of them are:
• Hyper linking from one server to another.
• Point-to-point communication.
• Ability to search large amount of data.
• Instant and interactive.
There are many Indian networks connected to the internet are :
• INDONET
• NICNET
• ERNET
• SOFTNET
• GIAS
C-146
5.5.6 E-mail
It is the off line way of communication between different internet users. It is the
most important reason to use the internet. E-mail allows to send a message to a
specific person or group of persons at a time. A message typed into the computer
travels instantly over the network to the recipient of the message. Service providers
deliver e-mail connectivity by linking together all those who wish to send or
exchange messages.
How to Send and Receive E-mail :
You may send and receive e-mail by using outlook express. Outlook express
organise the mail items into different folders such as inbox, outbox, sent item,
deleted items and drafts. It is user friendly.
communication. They can only communicate via the central computer. In case the
central computer breaks down, the network becomes redundant.
One very important advantage of this type of network topology is that in case any
one node is faulty or is having problems, it can be isolated from the network
without affecting any other terminal.
The star topology is the most commonly used network topology in data
communication today. The performance of the system is good for moderate load.
However, when traffic is high, the system may have some problems.
A disadvantage of star topology is that two terminals can't interact directly i.e. they
have to go via the central computer. This leads to no privacy in the network.
Another disadvantage is the network's dependence on the main computer. If the
central computer breaks down the entire network stops functioning.
The star topology requires that each and every terminal be connected using a
different cable. This leads to a somewhat increased cost for the cable as well as the
installation of the cables.
Bi-directional Uni-directional
Ring Topology
In the ring topology, the different computers are connected to each other forming a
closed loop. The data is passed from one computer to the other in series until it
reaches its desired destination.
There is no concept of the central computer in this case. The data is divided into
packets when transmitted and each packet contains the address of the node that it
is destined for. Unlike the star topology, this type of network requires lesser
amount of cable and there are not much of installation problems either.
The biggest disadvantage of this type of topology is that the failure of one node may
lead to the failure of the entire network. Since data from the source node passes
through a series of nodes before reaching the destined node, the failure of even one
node may lead to the network failure. However, the use of a bidirectional ring
topology can temporarily solve this problem by choosing a path that does not
contain the faulty node. Unlike the star topology, it is relatively difficult to
diagnose the faulty node in the ring network.
If the star topology provides less privacy, the ring topology provides zero privacy.
However, the ring topology provides a better performance under heavy traffic as
well.
It is also easy to add or remove terminals in a ring network which is not as easy in
the case of a star network as only a certain specified terminals can be inserted into
the central computer.
Data transfer using mesh topology is faster than the earlier discussed topologies.
Mesh networks are also quite fault resistant. If a particular path fails, data can be
routed via alternate paths.
To save on the cost of inter connections and to reduce the complexity of the
system, we can make use of the hybrid mesh network. In this type of network, some
of the main or more frequently used networks are connected to each other like a
mesh topology. The computer terminals are attached to these main terminals.
The tree network like the star network is dependent on the main computer. Hence,
the failure of the main computer shall lead to the failure of the entire network.
C-152
The tree network is very flexible as any number of nodes can be added or removed
easily.
5.7 Intranet
An intranet is a private computer network that uses internet technologies to
securely share any part of an organization's information or operational systems
with its employees. Sometimes the term refers only to the organization's internal
website, but often it is a more extensive part of the organization's computer
infrastructure and private websites are an important component and focal point of
internal communication and collaboration.
An intranet is built from the same concepts and technologies used for the internet,
such as client-server computing and the internet protocol suite. Any of the well
known internet protocols may be found in an intranet, such as HTTP, SMTP and
FTP. Internet technologies are often deployed to provide modern interfaces to
legacy information systems hosting corporate data.
Intranets are also being used as corporate culture-change platforms. Intranet user
editorial and technology teams work together to produce inhouse sites. Most
commonly, intranets are managed by the communications, HR or CIO
departments of large organizations or some combination of these.
5.8 Internetworking
Interconnecting two more networks to form a single network is called
internetworking, and resulting network is called an internet work. Therefore, a
WAN of multiple LANs is an internetwork.
Internetworks are often heterogeneous networks composed of several segments
that may differ in topology and protocol. For example, let an internetwork have
multiple LANs. Some of these LANs may have multi-access bus topology while
others may have ring topology. Some of them may be using Ethernet technology
while others may be using token ring technology. Some segments of the network
may be using the IP suite while others may be using IBM's SNA protocol suite.
Internetworking allows these relatively unrelated networks to evolve into a single
working network. That is, the goal of internetworking is to interconnect different
physical networks and to hide their details, enabling the internetwork to function
as a single co-ordinated unit.
A collection of different networks connected together or a collection of hosts
connected together by a subnet is called an internetwork. The hosts may be further
connected to other terminals through a LAN or a WAN. An internetwork can be as
large as you can imagine.
Internetwork
The internet is a very large internetwork that is available world-wide. The internet
is the largest network in the world. It provides the worldwide web service
implement.
The internetworking tools commonly used to interconnect two or more networks to
form a single network are:
(i) Bridges (ii) Repeaters (iii) Routers
C-154
5.8.1 Bridges
Bridges operate at the bottom two layers of the OSI model (physical and data link).
Therefore, they are used to connect networks using the same communication
protocols above datalink layer, but may or may not use the same protocols at
physical and data-link layers.
A bridge is a device that is used to connect two networks so that they are able to
perform as one. A bridge can also be used to connect two networks that use the
same topology, such as the Ethernet network and the Token Ring network. One of
the main functions of the bridge is to partition one large network into two networks
which subsequently increases the performance of the network.
5.8.2 Repeater
A repeater receives the incoming signal, repeats it or amplifies it and retransmits
the transformed signal. After certain distances the signal experiences a loss of
power hence a repeater is required to boost the power of the signal. By using
repeaters the network can be extended but only finite extension is possible due to
physical constraints such as noise. As the signal travels a certain distance, some
form of disturbance is added to it. When the repeater amplifies the signal the noise
also gets amplified, hence over a large distance it may be possible that the signal
becomes unrecognizable.
5.8.3 Routers
Routers operate at network layer of the OSI model. Therefore, routers do not care
what topologies or access-level protocols the interconnected network segments
use. Since routers use the bottom three layers of the OSI model, they are used
usually to interconnect those networks that use same high-level protocols above
network layer.
Unlike bridges, routers do not view an internet work from end to end. That is,
bridges know the ultimate destination of a data, but routers only know which is the
next router for a data being transferred on a network. However, routers are smarter
than bridges because they not only copy a data from one network segment to
another, but they also choose the best route for the data by using information in a
routing table to make this decision. That is, managing traffic congestion is a big
plus of routers, they employ a flow control mechanism to direct traffic on to
alternative less congested paths.
C-155
Comprehensive Exercise
A nswers