Mcs 22 Notes Study
Mcs 22 Notes Study
Contents
Block 1 - Operating System Fundamentals & Networking 5
Unit 1 - Graphical User Interface 5
GUI – Page 6 5
3 Common GUI – Page 7 5
3D GUI – Page 11 5
3 Components of development environment of GUI – Page 11-12 CYP2 5
X Windows – Page 24-27 CYP3 6
Unit 2 – Introduction to Operating System 7
Virtual Machine – Page 41-42 7
Difference between Virtual Machine Multiprogramming and Conventional Multiprogramming –
Page 42 7
Virtual Machine Multiprogramming – Page 42 – 43 7
Uses and Advantages of Virtual Machine – Page 43 7
Classification of Advanced OS – Page 47 7
Distributed Operating System – Page 48 8
Advantages of Distributed Systems – Pages 48-49 8
Microkernel OS – Page 52 8
Multithreading – Page 52 9
Symmetric Multiprocessing OS – Page 52 9
Difference between multithreading and symmetric multiprocessing – Pages 52-53 9
Unit 3 – Introduction to Networking Concept 10
Computer Network – Page 55 10
5 Network Topologies with Diagrams – Page 57 10
Structure of Bus Topology – Page 57 10
Structure of Star Topology – Page 58 10
Functionalities of seven layers of OSI Reference Model – Page 59 10
Definition of Protocol – Page 60 11
Difference between CSMA/CD and Token Passing access methods – Page 62-63 11
Avoiding collision on CSMA/CD network – Pages 62-63 11
Unguided Transmission Media – Page 72 11
Guided Transmission Media – Page 72 12
Optical Fiber – Page 74 12
Advantages of Optical Fiber – Page 74-75 12
lOMoARcPSD|35588227
3D GUI – Page 11
The desktop metaphor GUI is 2D because its visual elements are two-dimensional: they lie in the
xy plane, are defined in 2D coordinates, are flat and contain only planar regions (areas).
In a 3D GUI, the visual elements are genuinely three-dimensional: they are situated in xyz space,
are defined in terms of 3D coordinates, need not be flat and may contain spatial regions
(volumes).
The design considerations for a 3D GUI appear more complex than for a 2D GUI.
3D GUIs offer considerably more scope for metaphors than 2D GUIs.
There are many metaphors which could be based on our physical 3D environment, including the
obvious extension of the desktop metaphor into a 3D office metaphor.
lOMoARcPSD|35588227
Various prototypes have been developed to design the same elements in the 3D GUI as in the 2D
desktop GUI: windows, icons, menus, a cursor, etc.
Microkernel OS – Page 52
A microkernel architecture assigns only a few essential functions to the kernel, including address
space, inter-process communication (IPC), and basic scheduling services.
Other OS services are provided by processes, sometimes called servers, that run in user mode
and are treated like any other applications by the microkernel.
The microkernel approach simplifies implementation, provides flexibility, and is well suited to a
distributed environment.
Multithreading – Page 52
Multithreading is a technique in which a process executing an application is divided into threads
that can run concurrently.
A thread is a dispatchable unit of work which includes a processor context and its own data area
for a stack. It executes sequentially and is interruptible.
A process is a collection of one or more threads and associated system resources.
Multithreading is useful for applications that perform a number of essentially independent tasks
that do not need to be serialized
E.g., a database server that listens for and processes numerous client requests
o These processors share the same main memory and I/O facilities, interconnected by a
communications bus or other internal connection scheme
o All processors can perform the same functions
The OS of an SMP schedules processes or threads across all of the processors
The upper layers of the OSI model deal with the application issues and generally are
implemented only in software.
The highest layer, the application layer, is closest to the end user.
Both users and application layer processes interact with software applications that contain a
communications component.
The upper layers are:
o Application
o Presentation
o Session
The lower layers of the OSI model handle data transport issues.
The physical layer and the data link layer are implemented in hardware and software.
The lowest layer, the physical layer, is closest to the physical network medium and is responsible
for actually placing information on the medium.
The lower layers are:
o Transport
o Network
o Data link
o Physical
Difference between CSMA/CD and Token Passing access methods – Page 62-63
CSMA/CD Token Passing
1) Networks using this are Ethernet 1) Networks using this are Token Ring and
FDDI
2) In these networks, network devices content for the 2) In these networks, a special network
network media. packet called a token us passed around the
network from device to device.
3) When a device has data to send, it first listens to 3) When a device has data to send, it must
see if any other device is currently using the network. wait until it has the token and then send its
If not, it starts sending its data. data.
Repeater – Page 76
Repeaters, also called regenerators, are physical hardware devices.
They connect two network segments and broadcast packets between them, thus extending your
network beyond the maximum length of your cable segment.
They have the primary function to regenerate the electrical signal:
o Reshaping the waveform
o Amplifying the waveform
o Retiming the signal, to avoid collision on the network
lOMoARcPSD|35588227
Since signal is a factor in the maximum length of a segment, repeater can regenerate (or amplify)
the weak signals so that they can travel additional cable lengths.
A repeater has intelligence, so that it takes a weak signal from one cable segment, regenerates it
and passes it on to the next segment.
FTP employs TCP as its transport protocol which ensures a reliable transfer of data.
2 connections are established for each FTP session: Control Connection (Port 21) and Data
Connection (Port 20)
Network management system consists of two primary elements: a manager and agents
o The manager is the console through which the network administrator performs network
management functions.
o Agents are the entities that interface to the actual device being managed.
These virtual addresses are converted into physical addresses by the processor through a
mapping scheme using a set of tables maintained by the operating system.
Virtual and physical memories are divided into handy sized chunks called pages which are all of
the same size.
Each of these pages is given a unique number, the frame number (FN).
In this paged model, a virtual address comprises two parts: virtual page frame number (VPFN)
and offset within the frame.
Each time the processor encounters a virtual address, it must extract the virtual page number
and the offset.
The processor must translate the virtual page frame number into a physical one (address of
RAM) and then access the location at the correct offset into that physical page.
To do this, the processor uses page tables.
Diagram on Page 9
The directory /usr/bin contains useful and important command utilities for users.
There is no sharp distinction between the commands in /bin and here, though.
o Local groups
o System groups
Active Directory Users and Computers Snap-in are used to create a user group in a domain
Vulnerability – Page 10
Vulnerability does not cause harm until it is exploited.
lOMoARcPSD|35588227
Firewalls – Page 30
An intermediate system can be plugged between the private LAN (trusted network) and the
public network (untrusted network).
All traffic in and out of the trusted network can be enforced to pass through this intermediate
system.
This intermediate system is known as firewall.
It is a collection of hardware, software security policy
If the fragmentation of IP packet occurs, only the first fragment keeps the TCP/UDP header
information of the original packet, which is necessary to make the filtering decision.
The first Windows NT Server in the domain is configured as a primary domain controller (PDC).
The User Manager for Domain utility is used to maintain user and group information for the
domain using the domain security database on the primary controller.
In Windows 2000, you can create a workgroup for multiple machines to share resources with
one another. The workgroup is referred to as peer-to-peer networking, since every machine is
equal.
In Windows 2000, a local security database is a list of authorized user accounts and resource
access data located on each local computer.