- Process Management: A process is a program in execution. During execution a process needs certain resources such as CPU time, memory space and I/O devices. At a particular instance of time, a computer system normally consists of a collection of processes. Process management module take care of creation and deletion of processes, scheduling of system resources to different processes requesting them and providing mechanisms for synchronization and communication among processes.
- Memory Management: To execute a program, it must be loaded in main memory (at least partially) together with the data it accesses. To improve CPU utilization and to provide better response time to its users, a computer system normally keeps several programs in main memory. Memory management module takes care of allocation and de-allocation of memory space to programs in need of this resource.
- File Management: All computer systems store, retrieve and share information. Normally, a computer stores such information in units called files. Process read information from files and create new files for storing newly generated information. File management modules takes care of file related activities such as organization, storage, retrieval, naming, sharing and protection of files.
- Device Management: Normally, a computer system consists of several I/O devices such as terminal printer, disk and tape. The device management module of an operating system controls all I\O devices. It keeps track of I\O requests from processes, issues commands as I\O devices and ensures correct data transmission to\from an I\O device. It also provides a simple and easy interface between the devices and rest of the system.
- Security: Computer systems often store large amount of information, some of which are highly sensitive and valuable for its users. Users can trust a computer system and rely on it only if its various resources and information stored in it are protected against destruction and unauthorized access. Security modules protects the resources and information of a computer system against destruction and unauthorized access. It also ensures that when the system executes several disjoint processes simultaneously, one process does not interfere with others or with the operating system itself.
- Command Interpretation: Command interpretation module interprets user commands and directs system resources to process the commands.
Welcome to Information Technology and Systems knowledge city. Share,suggest and learn.Comment or criticize positively. Mistakes indication is warmly welcomed!
Monday, 19 January 2015
Main Functions of an Operating System
A separate module of operating system software performs following functions:
Data Communication
Data communication refers to the exchange of data
between a source and a receiver. Data communication is said to be local if communicating
devices are in the same building or a similarly restricted geographical area.
The meanings of source and
receiver are very simple. The device that transmits the data is known as source
and the device that receives the transmitted data is known as receiver. Data
communication aims at the transfer of data and maintenance of the data during
the process but not the actual generation of the information at the source and
receiver.
Datum mean
the facts information statistics or the like derived by calculation or
experimentation. The facts and information so gathered are processed in accordance
with defined systems of procedure. Data can exist in a variety of forms such as
numbers, text, bits and bytes. The Figure is an illustration of a simple data
communication system.
A data communication system may collect data from remote
locations through data transmission circuits, and then outputs processed
results to remote locations. Figure provides a broader view of data
communication networks. The different data communication techniques which are
presently in widespread use evolved gradually either to improve the data
communication techniques already existing or to replace the same with better
options and features. Then, there are data communication jargons to contend
with such as baud rate, modems, routers, LAN, WAN, TCP/IP, ISDN, during the selection
of communication systems. Hence, it becomes necessary to review and understand
these terms and gradual development of data communication methods.
Components of data
communication system
1. Message: It
is the information or data to be communicated. It can consist of text, numbers,
pictures, sound or video or any combination of these.
2. Sender: It is the
device/computer that generates and sends that message.
3. Receiver: It is the device or
computer that receives the message. The location of receiver computer is
generally different from the sender computer. The distance between sender and
receiver depends upon the types of network used in between.
4. Medium: It is the channel or
physical path through which the message is carried from sender to the receiver.
The medium can be wired like twisted pair wire, coaxial cable, fiber optic
cable or wireless like laser, radio waves, and microwaves.
5. Protocol: It is a set of rules
that govern the communication between the devices. Both sender and receiver
follow same protocols to communicate with each other
A protocol performs the following
functions:
1. Data sequencing: It refers to
breaking a long message into smaller packets of fixed size. Data sequencing
rules define the method of numbering packets to detect loss or duplication of
packets, and to correctly identify packets, which belong to same message.
2. Data routing: Data routing
defines the most efficient path between the source and destination.
3. Data formatting: Data
formatting rules define which group of bits or characters within packet
constitute data, control, addressing, or other information.
4. Flow control: A communication
protocol also prevents a fast sender from overwhelming a slow receiver. It
ensures resource sharing and protection against traffic congestion by
regulating the flow of data on communication lines.
5. Error control: These rules are
designed to detect errors in messages and to ensure transmission of correct
messages. The most common method is to retransmit erroneous message block. In
such a case, a block having error is discarded by the receiver and is
retransmitted by the sender.
6. Precedence and order of transmission: These rules ensure that all the nodes get a chance to use the communication
lines and other resources of the network based on the priorities assigned to
them.
7. Connection establishment and termination: These rules define how connections are established, maintained and terminated
when two nodes of a network want to communicate with each other.
8. Data security: Providing data security and privacy is also built
into most communication software packages. It prevents access of data by
unauthorized users.
9. Log information: Several communication softwares are designed to
develop log information, which consists of all jobs and data communications
tasks that have taken place. Such information may be used for charging the
users of the network based on their usage of the network resources.
Subscribe to:
Posts (Atom)