What is an Operating System
What is an Operating System
History Of OS
Operating systems were first developed in the late 1950s to manage tape
storage
The General Motors Research Lab implemented the first OS in the early
1950s for their IBM 701
In the mid-1960s, operating systems started to use disks
In the late 1960s, the first version of the Unix OS was developed
The first OS built by Microsoft was DOS. It was built in 1981 by purchasing
the 86-DOS software from a Seattle company
The present-day popular OS Windows first came to existence in 1985 when
a GUI was created and paired with MS-DOS.
Important functions of an operating System:
1. Security –
The operating system uses password protection to protect user data and similar
other techniques. it also prevents unauthorized access to programs and user
data.
3. Job accounting –
Operating system Keeps track of time and resources used by various tasks and
users, this information can be used to track resource usage for a particular user
or group of users.
6. Memory Management –
The operating system manages the Primary Memory or Main Memory. Main
memory is made up of a large array of bytes or words where each byte or
word is assigned a certain address. Main memory is fast storage and it can be
accessed directly by the CPU. For a program to be executed, it should be first
loaded in the main memory. An Operating System performs the following
activities for memory management:
It keeps track of primary memory, i.e., which bytes of memory are used by
which user program. The memory addresses that have already been allocated
and the memory addresses of the memory that has not yet been used. In
multiprogramming, the OS decides the order in which processes are granted
access to memory, and for how long. It Allocates the memory to a process
when the process requests it and deallocates the memory when the process has
terminated or is performing an I/O operation.
7. Processor Management –
In a multi-programming environment, the OS decides the order in which
processes have access to the processor, and how much processing time each
process has. This function of OS is called process scheduling. An Operating
System performs the following activities for processor management.
8. Device Management –
An OS manages device communication via their respective drivers. It
performs the following activities for device management. Keeps track of all
devices connected to the system. designates a program responsible for every
device known as the Input/Output controller. Decides which process gets
access to a certain device and for how long. Allocates devices in an effective
and efficient way. Deallocates devices when they are no longer required.
9. File Management –
A file system is organized into directories for efficient or easy navigation and
usage. These directories may contain other directories and other files. An
Operating System carries out the following file management activities. It
keeps track of where information is stored, user access settings and status of
every file, and more… These facilities are collectively known as the file
system.
Moreover, Operating System also provides certain services to the computer
system in one form or the other.
The Operating System provides certain services to the users which can be listed
in the following manner:
1. Program Execution: The Operating System is responsible for the execution
of all types of programs whether it be user programs or system programs. The
Operating System utilizes various resources available for the efficient running
of all types of functionalities.
2. Handling Input/Output Operations: The Operating System is responsible
for handling all sorts of inputs, i.e, from the keyboard, mouse, desktop, etc.
The Operating System does all interfacing in the most appropriate manner
regarding all kinds of Inputs and Outputs.
For example, there is a difference in the nature of all types of peripheral
devices such as mice or keyboards, the Operating System is responsible for
handling data between them.
3. Manipulation of File System: The Operating System is responsible for
making decisions regarding the storage of all types of data or files, i.e, floppy
disk/hard disk/pen drive, etc. The Operating System decides how the data
should be manipulated and stored.
4. Error Detection and Handling: The Operating System is responsible for the
detection of any type of error or bugs that can occur while any task. The well-
secured OS sometimes also acts as a countermeasure for preventing any sort
of breach to the Computer System from any external source and probably
handling them.
5. Resource Allocation: The Operating System ensures the proper use of all the
resources available by deciding which resource to be used by whom for how
much time. All the decisions are taken by the Operating System.
6. Accounting: The Operating System tracks an account of all the functionalities
taking place in the computer system at a time. All the details such as the types
of errors that occurred are recorded by the Operating System.
7. Information and Resource Protection: The Operating System is responsible
for using all the information and resources available on the machine in the
most protected way. The Operating System must foil an attempt from any
external resource to hamper any sort of data or information.
All these services are ensured by the Operating System for the convenience of the
users to make the programming task easier. All different kinds of Operating
systems more or less provide the same services.
Advantages of RTOS:
Maximum Consumption: Maximum utilization of devices and system, thus
more output from all the resources
Task Shifting: The time assigned for shifting tasks in these systems are very
less. For example, in older systems, it takes about 10 microseconds in shifting
one task to another, and in the latest systems, it takes 3 microseconds.
Focus on Application: Focus on running applications and less importance to
applications which are in the queue.
Real-time operating system in the embedded system: Since the size of
programs are small, RTOS can also be used in embedded systems like in
transport and others.
Error Free: These types of systems are error-free.
Memory Allocation: Memory allocation is best managed in these types of
systems.
Disadvantages of RTOS:
Limited Tasks: Very few tasks run at the same time and their concentration is
very less on few applications to avoid errors.
Use heavy system resources: Sometimes the system resources are not so
good and they are expensive as well.
Complex Algorithms: The algorithms are very complex and difficult for the
designer to write on.
Device driver and interrupt signals: It needs specific device drivers and
interrupts signals to respond earliest to interrupts.
Thread Priority: It is not good to set thread priority as these systems are very
less prone to switching tasks.
Examples of Real-Time Operating Systems are: Scientific experiments,
medical imaging systems, industrial control systems, weapon systems, robots, air
traffic control systems, etc.
Components of Operating System
Process Management :
Files Management :
Files are used for long-term storage. Files are used for both input and output.
Every operating system provides a file management service. This file
management service can also be treated as an abstraction as it hides the
information about the disks from the user. The operating system also provides a
system call for file management. The system call for file management includes –
File creation
File deletion
Read and Write operations
Files are stored in a directory. System calls provide to put a file in a directory or
to remove a file from a directory. Files in the system are protected to maintain the
privacy of the user. Below shows the Hierarchical File Structure directory.
Command Interpreter :
There are several ways for users to interface with the operating system. One of
the approaches to user interaction with the operating system is through
commands. Command interpreter provides a command-line interface. It allows
the user to enter a command on the command line prompt (cmd). The command
interpreter accepts and executes the commands entered by a user. For example, a
shell is a command interpreter under UNIX. The commands to be executed are
implemented in two ways:
The command interpreter itself contains code to be executed.
The command is implemented through a system file. The necessary system file
is loaded into memory and executed.
System Calls :
Signals :
Signals are used in the operating systems to notify a process that a particular
event has occurred. Signals are the software or hardware interrupts that suspend
the current execution of the task. Signals are also used for inter-process
communication. A signal follows the following pattern :
A signal is generated by the occurrence of a particular event it can be the
clicking of the mouse, the execution of the program successfully or an error
notifying, etc.
A generated signal is delivered to a process for further execution.
Once delivered, the signal must be handled.
A signal can be synchronous and asynchronous which is handled by a default
handler or by the user-defined handler.
The signal causes temporarily suspends the current task it was processing, saves
its registers on the stack, and starts running a special signal handling procedure,
where the signal is assigned to it.
Network Management :
In today’s digital world, the complexity of networks and services has created
modern challenges for IT professionals and users. Network management is a set
of processes and procedures that help organizations to optimize their computer
networks. Mainly, it ensures that users have the best possible experience while
using network applications and services.
Network management is a fundamental concept of computer networks. Network
Management Systems is a software application that provides network
administrators with information on components in their networks. It ensures the
quality of service and availability of network resources. It also examines the
operations of a network, reconstructs its network configuration, modifies it for
improving performance of tasks.
Security Management:
The I/O device management component is an I/O manager that hides the details
of hardware devices and manages the main memory for devices using cache and
spooling. This component provides a buffer cache and general device driver code
that allows the system to manage the main memory and the hardware devices
connected to it. It also provides and manages custom drivers for particular
hardware devices.
The purpose of the I/O system is to hide the details of hardware devices from the
application programmer. An I/O device management component allows highly
efficient resource utilization while minimizing errors and making programming
easy on the entire range of devices available in their systems.
Secondary Storage Management :
Broadly, the secondary storage area is any space, where data is stored
permanently and the user can retrieve it easily. Your computer’s hard drive is the
primary location for your files and programs. Other spaces, such as CD-
ROM/DVD drives, flash memory cards, and networked devices, also provide
secondary storage for data on the computer. The computer’s main memory
(RAM) is a volatile storage device in which all programs reside, it provides only
temporary storage space for performing tasks. Secondary storage refers to the
media devices other than RAM (e.g. CDs, DVDs, or hard disks) that provide
additional space for permanent storing of data and software programs which is
also called non-volatile storage.
Human beings are the only creatures on the earth who are able to communicate with
each other through the medium of language. But humans take this gift to another extent.
Distance, time, and physical existence of the person don’t matter in communication
these days because they build a communication system through which they can
communicate or share data like images, videos, text, files, etc with their loved ones
anytime anywhere. Communication is defined as a process in which more than one
computer transfers information, instructions to each other and for sharing resources. Or
in other words, communication is a process or act in which we can send or receive data.
A network of computers is defined as an interconnected collection of autonomous
computers. Autonomous means no computer can start, stop or control another
computer.
Therefore, there are some set of rules (protocols) that is followed by every computer
connected to the internet and they are:
TCP(Transmission Control Protocol): It is responsible for dividing messages into
packets on the source computer and reassembling the received packet at the
destination or recipient computer. It also makes sure that the packets have the
information about the source of the message data, the destination of the message
data, the sequence in which the message data should be re-assembled, and checks if
the message has been sent correctly to the specific destination.
IP(Internet Protocol): Do You ever wonder how does computer determine which
packet belongs to which device. What happens if the message you sent to your
friend is received by your father? Scary Right. Well! IP is responsible for handling
the address of the destination computer so that each packet is sent to its proper
destination.
Communication Channels
Communication channels are the medium that connects two or more workstations.
Workstations can be connected by either wired media or wireless media. It is also
known as a transmission medium. The transmission medium or channel is a link that
carries messages between two or more devices. We can group the communication
media into two categories:
Guided media transmission
Unguided media transmission
1. Guided Media: In this transmission medium, the physical link is created using wires
or cables between two or more computers or devices, and then the data is transmitted
using these cables in terms of signals. Guided media transmission of the following
types:
1. Twisted pair cable: It is the most common form of wire used in communication. In a
twisted-pair cable, two identical wires are wrapped together in a double helix. The
twisting of the wire reduces the crosstalk. It is known as the leaking of a signal from
one wire to another due to which signal can corrupt and can cause network errors. The
twisting protects the wire from internal crosstalk as well as external forms of signal
interference. Types of Twisted Pair Cable :
Unshielded Twisted Pair (UTP): It is used in computers and telephones widely. As
the name suggests, there is no external shielding so it does not protects from
external interference. It is cheaper than STP.
Shielded Twisted Pair (STP): It offers greater protection from crosstalk due to
shield. Due to shielding, it protects from external interference. It is heavier and
costlier as compare to UTP.
2. Coaxial Cable: It consists of a solid wire core that is surrounded by one or more foil
or wire shields. The inner core of the coaxial cable carries the signal and the outer
shield provides the ground. It is widely used for television signals and also used by
large corporations in building security systems. Data transmission of this cable is better
but expensive as compared to twisted pair.
3. Optical fibers: Optical fiber is an important technology. It transmits large amounts
of data at very high speeds due to which it is widely used in internet cables. It carries
data as a light that travels inside a thin glass fiber. The fiber optic cable is made up of
three pieces:
1. Core: Core is the piece through which light travels. It is generally created using
glass or plastic.
2. Cladding: It is the covering of the core and reflects the light back to the core.
3. Sheath: It is the protective covering that protects fiber cable from the environment.
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the
signal over the same network before the signal becomes too weak or corrupted to
extend the length to which the signal can be transmitted over the same network. An
important point to be noted about repeaters is that they do not amplify the signal. When
the signal becomes weak, they copy it bit by bit and regenerate it at its star topology
connectors connecting if original strength. It is a 2-port device.
2. Hub – A hub is a basically multi-port repeater. A hub connects multiple wires
coming from different branches, for example, the connector in star topology which
connects different stations. Hubs cannot filter data, so data packets are sent to all
connected devices. In other words, the collision domain of all hosts connected through
Hub remains one. Also, they do not have the intelligence to find out the best path for
data packets which leads to inefficiencies and wastage.
Types of Hub
Active Hub:- These are the hubs that have their power supply and can clean, boost,
and relay the signal along with the network. It serves both as a repeater as well as a
wiring center. These are used to extend the maximum distance between nodes.
Passive Hub:- These are the hubs that collect wiring from nodes and power supply
from the active hub. These hubs relay signals onto the network without cleaning and
boosting them and can’t be used to extend the distance between nodes.
Intelligent Hub:- It works like an active hub and includes remote management
capabilities. They also provide flexible data rates to network devices. It also enables
an administrator to monitor the traffic passing through the hub and to configure each
port in the hub.
3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add on
the functionality of filtering content by reading the MAC addresses of the source and
destination. It is also used for interconnecting two LANs working on the same protocol.
It has a single input and single output port, thus making it a 2 port device.
Types of Bridges
Transparent Bridges:- These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted
from the network, reconfiguration of the stations is unnecessary. These bridges
make use of two processes i.e. bridge forwarding and bridge learning.
Source Routing Bridges:- In these bridges, routing operation is performed by the
source station and the frame specifies which route to follow. The host can discover
the frame by sending a special frame called the discovery frame, which spreads
through the entire network using all possible paths to the destination.
4. Switch – A switch is a multiport bridge with a buffer and a design that can boost its
efficiency(a large number of ports imply less traffic) and performance. A switch is a
data link layer device. The switch can perform error checking before forwarding data,
which makes it very efficient as it does not forward packets that have errors and
forward good packets selectively to the correct port only. In other words, the switch
divides the collision domain of hosts, but the broadcast domain remains the same.
5. Routers – A router is a device like a switch that routes data packets based on their IP
addresses. The router is mainly a Network Layer device. Routers normally connect
LANs and WANs and have a dynamically updating routing table based on which they
make decisions on routing the data packets. The router divides the broadcast domains of
hosts connected through it.
Advantages of PAN
Here are the important pros/benefits of PAN network:
Disadvantages of PAN
Here are the cons/drawbacks of using PAN network:
It may establish a bad connection to other networks at the same radio bands.
Distance limits.
What is a LAN (Local Area Network)?
A Local Area Network (LAN) is a group of computer and peripheral devices which
are connected in a limited area such as school, laboratory, home, and office building.
It is a widely useful network for sharing resources like files, printers, games, and other
application. The simplest type of LAN network is to connect computers and a printer
in someone’s home or office. In general, LAN will be used as one type of
transmission medium. It is a network which consists of less than 5000 interconnected
devices across several buildings.
Advantages of LAN
Here are the pros/benefits of LAN:
Computer resources like hard-disks, DVD-ROM, and printers can share local
area networks. This significantly reduces the cost of hardware purchases.
You can use the same software over the network instead of purchasing the
licensed software for each client in the network.
Data of all network users can be stored on a single hard disk of the server
computer.
You can easily transfer data and messages over networked computers.
It will be easy to manage data at only one place, which makes data more
secure.
Local Area Network offers the facility to share a single internet connection
among all the LAN users.
Disadvantages of LAN
Here are the cons/drawbacks of LAN:
LAN will indeed save cost because of shared computer resources, but the initial
cost of installing Local Area Networks is quite high.
The LAN admin can check personal data files of every LAN user, so it does not
offer good privacy.
Unauthorized users can access critical data of an organization in case LAN
admin is not able to secure centralized data repository.
Local Area Network requires a constant LAN administration as there are issues
related to software setup and hardware failures
The software files will be shared among all the users; therefore, all can access
to the latest files.
Any organization can form its global integrated network using WAN.
Advantages of WAN
Here are the benefits/pros of WAN:
WAN helps you to cover a larger geographical area. Therefore business offices
situated at longer distances can easily communicate.
Contains devices like mobile phones, laptop, tablet, computers, gaming
consoles, etc.
WLAN connections work using radio transmitters and receivers built into client
devices.
Disadvantages of WAN
Here are the drawbacks/cons of WAN network:
Advantages of MAN
Here are the pros/benefits of MAN network:
It offers fast communication using high-speed carriers, like fiber optic cables.
It provides excellent support for an extensive size network and greater access to
WANs.
The dual bus in MAN network provides support to transmit data in both
directions concurrently.
A MAN network mostly includes some areas of a city or an entire city.
Disadvantages of MAN
Here are drawbacks/cons of using the MAN network:
You need more cable to establish MAN connection from one place to another.
In MAN network it is tough to make the system secure from hackers
Other Types of Computer Networks
Apart from above mentioned computer networks, here are some other important types
of networks:
1) WLAN
WLAN (Wireless Local Area Network) helps you to link single or multiple devices
using wireless communication within a limited area like home, school, or office
building. It gives users an ability to move around within a local coverage area which
may be connected to the network. Today most modern day’s WLAN systems are
based on IEEE 802.11 standards.
3) System-Area Network
System Area Network is used for a local network. It offers high-speed connection in
server-to-server and processor-to-processor applications. The computers connected on
a SAN network operate as a single system at quite high speed.
Function A web browser sends request Web server sees and approves those
to server for web based requests made by web browsers and
documents and services. sends the document in response
Process Web browsers send HTTP Web servers receive HTTP Request
Request and receive HTTP and send HTTP Response.
Response
Data Storage Web browsers stores user data Web servers provide an area to store
in cookies in local machine. the website.
Acts as Web browser acts as an Web servers act as the sender of web
interface between the web resources like web pages.
server and client.
WHAT IS INTERNET:
Internet is the foremost important tool and the prominent resource that is being
used by almost every person across the globe. It connects millions of computers,
webpages, websites, and servers. Using the internet we can send emails, photos,
videos, messages to our loved ones. Or in other words, the internet is a widespread
interconnected network of computers and electronics devices(that support internet).
It creates a communication medium to share and get information online. If your
device is connected to the Internet then only you will be able to access all the
applications, websites, social media apps, and many more services. Internet
nowadays is considered as the fastest medium for sending and receiving
information.
Origin Of Internet: The internet came in the year 1960 with the creation of the
first working model called ARPANET (Advanced Research Projects Agency). It
allowed multiple computers to work on a single network that was their biggest
achievement at that time. ARPANET use packet switching to communicate
multiple computer systems under a single network. In October 1969, using
ARPANET first message was transferred from one computer to another. After that
technology continues to grow.
The difference between the world wide web and the internet are:
All the web pages and web documents are stored there on the World wide
web and to find all that stuff you will have a specific URL for each website.
Whereas the internet is a global network of computers that is accessed by the
World wide web.
World wide web is a service whereas the internet is an infrastructure.
World wide web is a subset of the internet whereas the internet is the
superset of the world wide web.
World wide web is software-oriented whereas the internet is hardware-
oriented.
World wide web uses HTTP whereas the internet uses IP addresses.
The Internet can be considered as a Library whereas all the kinds of stuff
like books from different topics present over there can be considered as
World wide web.
1. Time wastage: Wasting too much time on the internet surfing on social
media apps and doing nothing decreases your productivity rather than
wasting time on scrolling social media apps one should utilize that time in
doing something skillful and even more productive.
2. Bad impacts on health: Spending too much time on the internet causes bad
impacts on your health physical body needs some outdoor games exercise
and many more things. Looking at the screen for a longer duration causes
serious impacts on the eyes.
3. Cyber Crimes: Cyberbullying, spam, viruses, hacking, and stealing data are
some of the crimes which are on the verge these days. Your system which
contains all the confidential data can be easily hacked by cybercriminals.
4. Effects on children: Small children are heavily addicted to the Internet
watching movies, games all the time is not good for their overall personality
as well as social development.
5. Bullying and spreading negativity: The Internet has given a free tool in the
form of social media apps to all those people who always try to spread
negativity with very revolting and shameful messages and try to bully each
other which is wrong.
UNIT 5 DATABASE MANAGEMENT SYSTEM
Characteristics of DBMS
Advantages of DBMS
Disadvantages of DBMS
What is SQL?
SQL is the standard language for Relational Database System. All the Relational
Database Management Systems (RDMS) like MySQL, MS Access, Oracle,
Sybase, Informix, Postgres and SQL Server use SQL as their standard database
language.
Why SQL?
DATABASE ADMINISTRATOR
A database administrator (DBA) is a person or group in charge of implementing
DBMS in an organization. The DBA job requires a high degree of technical
expertise. DBA consists of a team of people rather than just one person.
Database design
Performance issues
Database accessibility
Capacity issues
Data replication
Table Maintenance
Responsibilities of DBA
System software is software that directly operates the computer hardware and
provides the basic functionality to the users as well as to the other software to
operate smoothly. Or in other words, system software basically controls a
computer’s internal functioning and also controls hardware devices such as
monitors, printers, and storage devices, etc. It is like an interface between hardware
and user applications, it helps them to communicate with each other because
hardware understands machine language(i.e. 1 or 0) whereas user applications are
work in human-readable languages like English, Hindi, German, etc. so system
software converts the human-readable language into machine language and vice
versa.
Application Software
Software that performs special functions or provides functions that are much more
than the basic operation of the computer is known as application software. Or in
other words, application software is designed to perform a specific task for end-
users. It is a product or a program that is designed only to fulfill end-users’
requirements. It includes word processors, spreadsheets, database management,
inventory, payroll programs, etc.
Now, let us discuss some difference between system software and application
software:
2. Program :
Program, as name suggests, is simply a collection of instructions or ordered
operations for computer to perform specific function or perform particular task and
achieve a specific result.
Software Program
Software’s are mainly dependent on operating Programs are mainly dependent
system. on compiler.
Various categories of software includes
There are no such categories of
application software, system software,
program.
computer programming tools, etc.
Size of program generally ranges
Size of software generally ranges from
from kilobytes (Kb) to megabytes
megabytes (Mb) to gigabytes (Gb).
(Mb).
Software’s are usually developed by people
Programs are usually developed
having expert knowledge and experience as
by person who is beginner and
well as are trained in developing software and
have no prior experience.
are also referred to as software developers.
Software’s can be a program that generally runs
Programs cannot be a software.
on computer.
If programs are not present in
If software’s are not present in computers, then computer, then also computer can
computer is useless. function well because of operating
system.
Software Program
Program cannot run on computer
Software’s can be downloaded on computer
without any software present in
using internet without any need of program.
computer.
Features of program includes
Features of software includes security, safety,
reliable, cost effectiveness,
dependability, correctness, etc.
maintainability, profitability, etc.
It requires more time to create software than It requires less time to create
program. program than software.
Examples of software includes Adobe Examples of program includes
Photoshop, Google Chrome, PowerPoint, Web browsers, word processors,
Adobe Reader, etc. video games, etc.