Академический Документы
Профессиональный Документы
Культура Документы
SOFTWARE
Software - comprises of computer programs, support modules, and data modules
- provides a computer with the instructions and data to carry out a specific type of task.
Support Module - provides an auxiliary set of instructions used in conjunction with the main software program
- not designed to be run by the computer user
Types of Software
1. Systems software or System programs
2. Application software or Application programs
Basic Function of an OS
• Process Management – handles multiprograms that are simultaneously running.
• Memory Management – manage memory between processes and data according to priority.
• Storage Management – Managing the permanent Storage of data on disks or other media
• I/O Management – Manage and schedule the input and output operations
• Device / Resource Management – Managing devices and resources and allowing the users to share the
resources
• Security and Protection – Securing the system against possible unauthorized access to data or any other
entity. Protecting the parts of the system against damage.
• Booting the System and getting it ready to work.
• Data communications – Providing interface to connect to other computers or allowing others to connect.
OS as an Interface
OS Services
• Program Development – variety of services and utilities such as Editors and debuggers. They are usually
referred to as application program development tools.
• Program Execution – involves a number of steps, such as loading Instruction and data in the main
memory, initialization of I/O devices and files, and other resources to be allocated. OS handles the
scheduling.
• Access to I/O devices – Each I/O device has its own set of Instructions and control signals. O.S. hides these
details to provide a common interface to the user/programmer.
• Controlled access to files- nature of I/O device (disk drive, tape drive) and structure of the data stored in
the files in the storage medium. In the case of multiple users accessing the processor concurrently, proper
protection mechanisms have to be used.
• System access- For shared or public systems, the O.S. controls access to the system as a whole and to
specific system resources. Access system provides protection of resources, and data from unauthorized
users, and resolves resource conflicts
• Error detection and response – Variety of errors may occur in computer system. Responses may range
from program termination, retrial of the same operation, or reporting error to the application.
• Accounting – collecting usage statistics, CPU usages, monitor performance, etc.
• User – The system representation of the human operator who requests for services.
• Application Software – Special software to help the user do his task (E.g.. MS Word)
• Shell – The program that interprets the commands or requests given by the user and gets the job done by
the kernel.
• Kernel – The core of the operating system. It uses the hardware to do the jobs required by the user or the
system. It coordinates among the hardware and interfaces it with the above layers.
• System Software – Software that can access the hardware directly and generally provides various system
services. (E.g.. The kernel itself, device drivers etc.).
• Hardware – The set of electronic devices that work together to ultimately do the job required by all the
upper levels
Software Copyright
a form of legal protection that grants the author of an original ”work”
an exclusive right to copy, distribute, sell, and edit that work, except under special circumstances
described by copyright laws
Exceptions
Purchaser
can make a backup or extra copy of the software for erased or damaged original copy
allowed to copy and distribute parts of a software program for reviews and teaching
has the right to copy software from a distribution disk or Web site for installation
License Agreement
a legal contract that defines the way in which a computer program may be used
PRINCIPLES OF NETWORKING
Computer Network
It is a bunch of computers linked together.
It is cost efficient and reliable.
It serves as a good communication medium.
Communication Channels
a pathway over which information can be transferred
information sent over a channel has a source (transmitter), from which the
information originates, and destination (receiver), to which the information is
delivered
1. Bus topology is used, each machine is connected to a single cable. Each computer or server is connected
to the single bus cable through some kind of connector. A terminator is required at each end of the bus
cable to prevent the signal from bouncing back and forth on the bus cable.
2. Star topology - each network host (PC) is connected to a central hub with a point-to-point connection.
All traffic on the network passes through the central hub.
3. Ring topology - A network topology that is set up in a circular fashion in which data travels around the
ring in one direction and each device incorporates a receiver for the incoming signal and a transmitter to
send the data on to the next device in the ring.
4. Tree topology - (a.k.a. hierarchical topology) can be viewed as a collection of star networks arranged in
a hierarchy. This tree has individual peripheral nodes (e.g. leaves) which are required to transmit to and
receive from one other node only and are not required to act as repeaters or regenerators. Unlike the star
network, the functionality of the central node may be distributed.
5. Mesh topology - The fully connected mesh topology is generally too costly and complex for practical
networks. It has been used on networks with only a small number of nodes. n most practical networks that
are based upon the partially connected mesh topology, all of the data that is transmitted between nodes in
the network takes the shortest path between nodes.
6. Hybrid networks use a combination of any two or more topologies in such a way that the resulting
network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.). For example, a tree
network connected to a tree network is still a tree network, but two star networks connected together
exhibit a hybrid network topology. A hybrid topology is always produced when two different basic network
topologies are connected.
Daisy chain- Except for star-based networks, the easiest way to add more computers into a network is
by daisy-chaining, or connecting each computer in series to the next. If a message is intended for a
computer partway down the line, each system bounces it along in sequence until it reaches the
destination. A daisy-chained network can take two basic forms: linear and ring.
Distributed System
Centralized Data Processing (CDP)
-The conventional way of doing all the processing and control on centralized computers.
Client/Server
-an extension of distributed data processing wherein it provides the best of both centralized
and distributed data processing
Types of Network
1, Local Area Network (LAN)
connects network devices over relatively short distances
usually owned by an individual or corporation, 10-100Mbps
2. Metropolitan Area Network (MAN)
connects computers that are in specific geographical area like cable television
5-10 Mbps, slower than LAN and smaller than WAN.
3. Wide Area Network (WAN)
spans a large physical distance (geographically-dispersed collections of LANs)
not owned by any one organization but rather exist under collective or distributed
ownership and management; 256Kbps-2Mbps
4. Personal Area Network (PAN)
a network arranged within an individual person, typically within a range of 10 meters.
Personal computer devices that are used to develop the personal area network are the
laptop, mobile phones, media player and play stations.