Monday, 19 January 2015

Main Functions of an Operating System

A separate module of operating system software performs following functions:

  • Process Management: A process is a program in execution. During execution a process needs certain resources such as CPU time, memory space and I/O devices. At a particular instance of time, a computer system normally consists of a collection of processes. Process management module take care of creation and deletion of processes, scheduling of system resources to different processes requesting them and providing mechanisms for synchronization and communication among processes.
  • Memory Management: To execute a program, it must be loaded in main memory (at least partially) together with the data it accesses. To improve CPU utilization and to provide better response time to its users, a computer system normally keeps several programs in main memory. Memory management module takes care of allocation and de-allocation of memory space to programs in need of  this resource.
  • File Management: All computer systems store, retrieve and share information. Normally, a computer stores such information in units called files. Process read information from files and create new files for storing newly generated information. File management modules takes care of file related activities such as organization, storage, retrieval, naming, sharing and protection of files.
  • Device Management: Normally, a computer system consists of several I/O devices such as terminal printer, disk and tape. The device management module of an operating system controls all I\O devices. It keeps track of I\O requests from processes, issues commands as I\O devices and ensures correct data transmission to\from an I\O device. It also provides a simple and easy interface between the devices and rest of the system.
  • Security: Computer systems often store large amount of information, some of which are highly sensitive and valuable for its users. Users can trust a computer system and rely on it only if its various resources and information stored in it are protected against destruction and unauthorized access. Security modules protects the resources and information of a computer system against destruction and unauthorized access. It also ensures that when the system executes several disjoint processes simultaneously, one process does not interfere with others or with the operating system itself.
  • Command Interpretation: Command interpretation module interprets user commands and directs system resources to process the commands.  

Data Communication

Data communication refers to the exchange of data between a source and a receiver. Data communication is said to be local if communicating devices are in the same building or a similarly restricted geographical area.
The meanings of source and receiver are very simple. The device that transmits the data is known as source and the device that receives the transmitted data is known as receiver. Data communication aims at the transfer of data and maintenance of the data during the process but not the actual generation of the information at the source and receiver.

Datum mean the facts information statistics or the like derived by calculation or experimentation. The facts and information so gathered are processed in accordance with defined systems of procedure. Data can exist in a variety of forms such as numbers, text, bits and bytes. The Figure is an illustration of a simple data communication system.


A data communication system may collect data from remote locations through data transmission circuits, and then outputs processed results to remote locations. Figure provides a broader view of data communication networks. The different data communication techniques which are presently in widespread use evolved gradually either to improve the data communication techniques already existing or to replace the same with better options and features. Then, there are data communication jargons to contend with such as baud rate, modems, routers, LAN, WAN, TCP/IP, ISDN, during the selection of communication systems. Hence, it becomes necessary to review and understand these terms and gradual development of data communication methods.


Components of data communication system

1. Message: It is the information or data to be communicated. It can consist of text, numbers, pictures, sound or video or any combination of these.
2. Sender: It is the device/computer that generates and sends that message.
3. Receiver: It is the device or computer that receives the message. The location of receiver computer is generally different from the sender computer. The distance between sender and receiver depends upon the types of network used in between.
4. Medium: It is the channel or physical path through which the message is carried from sender to the receiver. The medium can be wired like twisted pair wire, coaxial cable, fiber optic cable or wireless like laser, radio waves, and microwaves.
5. Protocol: It is a set of rules that govern the communication between the devices. Both sender and receiver follow same protocols to communicate with each other

A protocol performs the following functions:
1. Data sequencing: It refers to breaking a long message into smaller packets of fixed size. Data sequencing rules define the method of numbering packets to detect loss or duplication of packets, and to correctly identify packets, which belong to same message.
2. Data routing: Data routing defines the most efficient path between the source and destination.
3. Data formatting: Data formatting rules define which group of bits or characters within packet constitute data, control, addressing, or other information.
4. Flow control: A communication protocol also prevents a fast sender from overwhelming a slow receiver. It ensures resource sharing and protection against traffic congestion by regulating the flow of data on communication lines.
5. Error control: These rules are designed to detect errors in messages and to ensure transmission of correct messages. The most common method is to retransmit erroneous message block. In such a case, a block having error is discarded by the receiver and is retransmitted by the sender.
6. Precedence and order of transmission: These rules ensure that all the nodes get a chance to use the communication lines and other resources of the network based on the priorities assigned to them.
7. Connection establishment and termination: These rules define how connections are established, maintained and terminated when two nodes of a network want to communicate with each other.


8. Data security: Providing data security and privacy is also built into most communication software packages. It prevents access of data by unauthorized users.
9. Log information: Several communication softwares are designed to develop log information, which consists of all jobs and data communications tasks that have taken place. Such information may be used for charging the users of the network based on their usage of the network resources.