Overview of Intranet implementation

Posted by Unknown Saturday, July 27, 2013 1 comments
The intranet should be implemented in phased. If a network is already in place, the steps essentially revolve around selecting services and software, the operating system and special tools for content creation. The existing databases and software applications may be integrated into the intranet. This calls for a proper plan to be prepared. The important step to implementation follows.

Planning: This step includes scope of services and facilities; mail, Web sites, home pages department-wise, personnel, administration of the site, layout of pages, connecting with the internet.

Subnets: If the number of services and clients is large, there may be many subnets. IP addressing plan should be worked out in detail.

Services and software: Server hardware platforms and the software that will be used on them for hosting mail and Web services need to be finalized. For intranet users, browsers and mail clients have to be standardized. A server platform, may host both mail and Web services. As the intranet load grows, this could be split into multiple-servers. Web server, mail server, print server, Domain Name Server (DNS), workflow applications etc could be implemented on different hardware systems.

Operating system: An operating system may be chosen from the following popular server operating systems: UNIX, Linux, Windows NT, NetWare, Mac OS, OS/2, and AS/400. The choice of operating system will determine the software requirements of the Web server, mail server etc. While UNIX was the operating system on RISC systems, non-Unix platforms are equally aggressive solutions now. The OS should be installed on the server, complete with the TCP/IP suite of protocols. Web services should preferably be implemented from the very beginning. IP addresses and subnet masks should be allocated. It is better to use TCP/IP addresses duly registered with InterNIC so that connection to the Internet at a future date avoids address conflicts.

Proxy Servers: If the intranet requirements include the users connected on it to share a single Internet dial-up connection on the network, a proxy server is essential. It is the proxy server that dials into the Internet connection and all the nodes access the Internet through it.

Content Creation Software: HTML editors, Web-enabled office productivity tools are essential on client machines which are equipped with browsers and email software.

Training: The users on mail and Web applications may require training for discussion group, mailing list server, converting existing documents and reports for the intranet, and making them available to all. Skills to create new contents using the office-suites, productivity tools, HTML editors etc are also required.

Existing Databases: Set up a group of programmers to study the existing databases, and to Web-enable them for intranet.

Web Publishing: The Web is like a magazine, and content creation is like Web publishing. The magazine is on the Web server, and is used by the employees of an organization who are on the intranet. The contents should be catchy, easy to access, and up-to-date. Web design and maintenance are the major issues on an intranet.

Electronic Payment Systems and Security on Internet

Posted by Unknown Friday, July 26, 2013 0 comments
Electronic funds transfer (EFT) systems constitute a major form of electronic commerce system in banking and retailing industries. EFT systems use a variety of information technologies to capture and process money and credit transfers between banks and businesses and their customers. For example, banking networks support letter terminals at bank offices and automated teller machines (ATM). Banks may also support pay-by-phone services allowing bank customers to use their telephones as terminals to electronically pay bills. Major forms of EFT systems are outlined below.
Banking and financial payments:
  • Large-scale or wholesale payments (e.g., bank-to-bank transfer)
  • Small-scale or retail payments (e.g., automated teller machines and cash dispensers)
  • Home banking (e.g., bill payment)
Retailing payments:
  • Credit cards (e.g., VISA, MasterCard etc.)
  • Private credit/debit cards (e.g., JC Penny Card)
  • Charge cards (e.g., American Express)
Online electronic commerce payments:
  • Token-based payment systems
  • Electronic cash (e.g., CyberCoin)
  • Electronic Checks (e.g., NetCheque)
  • Smart cards or debit cards (e.g., Mondex Electronic Currency Card)
  • Credit card-based systems
  • Encryped credit cards (e.g., SSL, CyberCash, or SET encryption)
  • Third-party authorization numbers (e.g., First Virtual)
Secure Electronic Payments on the Internet:
One of the most noticeable and controversial topics in the Internet commerce today is the security of Internet transactions. While the technological difficulties may be soluble, a less obvious problem is how to define standards to let all consumers and merchants do business with each other while satisfying security requirements of the financial institutions involved. 

When a user makes an online purchase on the Internet, his credit card information is vulnerable to interception by network sniffers-software that easily recognizes credit card number formats. Several basic security measures are used to solve security problems:
  • Encrypting (code and scrambling) the data passing between the customer and merchant.
  • Encrypting the data passing between the customer and the company authorizing the credit card transaction
  • Taking sensitive information offline.
Many companies use the Secure Socket Layer (SSL) security method developed by Netscape Communicator that automatically encrypts data passing between user Web browser and a merchant’s server. However, sensitive information is still vulnerable to misuse once it is decrypted (decoded and unscrambled) and stored on a merchant’s server. So a digital wallet approach, such as the Cyber Cash payment system, was developed. In this method one can add security software add-on modules to the Web browser. This enables user’s browser to encrypt credit card data in such a way that only the bank that authorizes credit card transactions for the merchant gets to see it.

Another security mechanism is Secure HyperText Transfer Protocol (SHTTP). To ensure a secure conversation between a Web client and a server, SHTTP works by negotiating the type to encryption scheme used between client and server. SHTTP and SSL can both be used for improved security.

To Secure Electronic Transaction, or SET, is another ordinary for electronic payment safety. In this technique, e-commerce software encrypts a digital envelope of digital certificates specifying the payment details for each operation. SET has been agreed to by VISA, Master Card, IBM, Microsoft, Netscape, and most other commerce players. Therefore, SET is expected to become the dominant standard for secure electronic payments on the Internet.

Other electronic payment systems for example, micro-payment systems like CyberCoin and DigilatCash. These technologies create currency or digital cash, sometimes called e-cash, for making payments that are very small for credit card transactions. Authentication and the encryption techniques are used to create strings of data that can be handled like currency for making cash payments. For example, Web sites like ESPNET Sports Zone, and Rocket Science Games let users chat with superstars, Discovery Online, play various kinds of video games or download the desired video segments by using digital cash micro-payment methods.

Wide Area Network-Characteristics, Bandwidth & Switching

Posted by Unknown Thursday, July 25, 2013 0 comments
A wide area network connects computers located across a wide geographical area. For example an organization may have its offices scattered over different cities and each office needs to share data with other offices. In this case computers and LANs of different sites may be connected by public communication facility (like telephone network) or private communication network to realize a WAN. A WAN for a particular organization is called enterprise-wide network. The Internet is a popular example of WAN as it connects thousands of computers and LANs around the world.

Intermediate devices like gateways and routers and transmission facilities like telephone and data networks, fiber optic links, satellites are generally used for realizing WANs. The major features of WANs are listed below.
  • Multiple computers are connected together
  • Computers are spread over a wide geographic area
  • A WAN usually interconnects multiple LANs
  • Communication links between computers are provided by telephone networks, public data networks, satellites etc.
  • Links are of low capacity (that is low data rate)
  • Bit error rate is higher (1 in 100,000) compared to that for a LAN.
Bandwidth: Speed and capacity of computers and communication networks can be classified by bandwidth. The speed and capacity of data networks are generally measured in bits per second (bps). Low speed local communication channels are typically used for transmission rates from 300 to 56000 bps, but can now handle up to several Mbps for ADSL connections. They are usually TUP lines commonly used for voice communications, but are also for data communications by PCs, video terminals and fax machines. SPT lines can be used for speed up to 100 Mbps for short distances. High speed broadband digital channels allow transmission rates from 256,000 bps to several billion bps; typically they are microwave, satellite transmission and fiber optic cables.

Switching: Switching techniques used for WAN are circuit switching, message switching and packet switching. Normal telephone service relies on circuit switching. In circuit switching a switch establishes and maintains a link between a sender and receiver until the communication session is completed. In message switching, a complete message is transmitted in a block from one switching node to another.

In packet switching a message is subdivided into groups called packets. In X.25 packet switching, packets are 128 characters long, while they are of variable length in frame relay packet switching. Frame Relay is considerably faster than X.25 and is used by many large companies for their wide area networks. ATM (Asynchronous transfer mode) is a fast emerging high speed cell switching network technology. An ATM system, using BISDN (Broadband Integrated Service Digital Network), organizes voice, video, and other data into fixed cells of 53 bytes and send them to their next destination. ATM networks are becoming popular for the faster high-capacity multimedia services for voice, video and other high speed applications. Currently available network technology with data rates for WAN are listed below.
Network Technologies Typical Data Rate
DDN: Digital Data Network 2.4 kbps - 2 Mbps
PSN: Packet Switching Network 2.4 kbps - 64 kbps
Frame Relay Network 56/64 kbps - 2 Mbps
ISDN: Integrated Services Digital Network 64/128 kbps - 2Mbps
ATM: Asychronous Transfer Mode 25/155 Mbps - 2.4 Gbps

Internet Address and Electronic-mail

Posted by Unknown Wednesday, July 24, 2013 0 comments
The computer organizing a transaction must identify its intended destination with a unique address. Every computer on the Internet has a 4-part numeric address, called the IP (Internet Protocol) address. The IP address contains routing information that identifies destination location. Each of the four parts is a number between 0 and 255, so an IP address looks like this: 108.64.125.116.

Computers have no trouble working with such numbers, but humans are not so skilled. Therefore, computers connected to the Internet use an address system called a Domain Name System (DNS), where and address uses words instead of numbers.

DNS address have two parts: an user name, followed by a domain that identifies the type of institution that uses the address, such as .com for commercial or .edu for schools, colleges, and universities. Microsoft’s DNS address is Microsoft.com and Google’s DNS address is google.com. Within the United States, the last three letters of the domain usually tell the types of institution. The following table lists the most common types.
Domains Types of organization
.com (Business) Commercial
.edu Educatonal
.gov US Government
.mil US Military
.net Gateway or host
.org Other organization
Large institutions and big corporations may divide their domain address into smaller sub-domains. A business with many branches might have a sub-domain for each office. Sub-domains may be broken into even smaller sub-domains, like: du.bangla.net. Outside the United States, domains usually identify the county in which the system is located, such as .in for India, .jp for Japan, .ca for Canada or .fr for France. A geographic domain address may include a sub-domain. An example could be: www.telemagazine.ac.uk.

DNS and IP address identify individual computers. A single computer might have many users, each of whom must have an account. Some of the largest domains may have huge number of different user names. When a message is sent to a person that person’s user name is the address identifies the recipient. The standard format is: the user name first, “at” symbol @, and finally the DNS address. Therefore, Imran’s e-mail address might be: Imran@titas.com.

Electronic-mail:
The most common use of the Internet is for the e-mail. Anyone with an e-mail account can send messages to other users of the Internet. Most e-mail programs also permit users to attach data files and program files to messages. E-mail is not a live connection between the sender of a message and its recipient. There is always a delay between the sending time of a message and its arrival time at the distention. Sometimes that delay is just a few seconds, but it is always there.

When a message is sent the computer presses it to a post office server, which identifies the destination address and passes it through the Internet to a mail server, where the message is stored in a mailbox until the recipient looks for it. The sender computer creates the message and sends it to a local post office server. The post office server passes the message through the Internet to the recipient’s mail server which passes it to the recipient’s computer. E-mail programs generally combine the following features.
  • A text editor for writing and editing messages.
  • Arrangements for storing names and e-mail addresses.
  • Ability to send messages to a post office server.
  • Ability to get messages from a mail server.
  • A manager that organizes and stores the sent and received messages.
There is an e-mail program included in Windows 98 and many others are available separately. One of the most popular e-mail programs is Eudora, which exists in versions for both Windows and Macintosh operating systems. Besides one-to-one, Internet e-mail is also used for one-to-many, in which the same message goes to a list of names.

The World Wide Web

Posted by Unknown 0 comments
The World Wide Web (the Web or WWW) was created in 1989 at the European Particle Physics Laboratory in Geneva, Switzerland. Originally it was created as a method for incorporating footnotes, figures, and cross-references into online hypertext documents in which a reader can click on a word or phrase in a document, and immediately jump to another file. The second file may be located on the same computer or anywhere else on the internet. The WWW organizes widely scattered resources into a seamless whole.

The Web browsers have changed the way people use the Internet. Web pages are now used to distribute news, interactive educational services, product information and catalogs, highways traffic reports, live audio and video, among many other things. Interactive Web pages permit users to consult databases, order products and information, and submit payment with a credit card or other account number.

The latest Web browsers, including Google Chrome, Mozilla Firefox, Netscape Navigator and Microsoft’s Internet Explorer, can open file viewers and other application programs automatically when they receive graphic images, audio, video, and other files. Users also can import live, interactive data (such as financial information that changes frequently) and executable programs from the World Wide Web.

The organization of the World Wide Web is built on a set of rules called HyperText Transfer Protocol (HTTP) and a page description language called HyperText Markup Language (HTML). HTTP uses Internet addresses in a special format called a Uniform Resource Locator, or URL. The format or URLs is: type: //address/path

Here type specifies the type of server in which the file is located. The address part is the address of the server, and finally the path is the location within the file structure of the server. As an example the URL for the IEEE membership renewal is: http://www.ieee.org/renewal

A document that uses HTTP is known as a Web page. A Web page contains information about a particular subject with links to related Web pages. Many Web sites contain a top-level home page that has pointers to additional pages with more information. For example, a university might have a home page with links to a campus guide, Telnet access to the library, and separate pages for individual departments and offices.

Thousand of new Web pages appear every day, but they are not always easy to find. The World Wide Web does not provide a basic structure for locating resources. To fill this gap, search tools are available online. One of them is Google, Whose URL is https://www.google.com. Google is an extensively directory with menu that lists millions of web sites, organized by topic and a search engine that looks for specified words in titles and addresses of the Web sites in the directories. Other popular search tools include InfoSeek, Lycos, Magellan, and Excite, to name a few.

Types of Computer Networks, Characteristics & Terminologies

Posted by Unknown 0 comments
A computer network is a system of interconnected computers. The computers of a network communicate with one another and share applications, data, voice and videos, and hardware components. There are three main types of computer networks, they are:
  • Local Area Network (LAN)
  • Wide Area Network (WAN)
  • Metropolitan Area Network (MAN)
LAN: It provides high speed communication between computers situated in a limited area, normally within a building or a small area like a college/university campus. LANs are typically owned and managed by a single organization.

WAN: This network spreads over a large geographical region and may attach computers within a country or cover many countries. WANs may be provided by telegraph and telephone organizations, they may be private to a single association or they may be controlled by a group of organizations. Usually, WANs have been implemented using packet switching and circuit switching technologies. A WAN can link a number of LANs. The internet is a popular example of WAN.

MAN: These networks cover an area of a typical city or town. They offer a trouble-free and fast way to connection different sites of a society for exchange of information. Mans use technologies similar to LAN technologies.

Uses of Computer Networks:Computer networks provide many benefits. Major uses of computer networks are:
  • Simultaneous access to programs and data.
  • Sharing peripheral devices like printers, scanners etc.
  • Personal communications using e-mail
  • Aiding communication by teleconferencing and video-conferencing.
  • Protecting information by account name and password.
Some Network Terminologies: Network Topology: Topology of a network describes the way the computers and the nodes of the network are interconnected. There are a number of possible topologies:
  • Bus topology
  • Star topology
  • Tree topology
  • Ring topology
  • Mesh topology.
Links: The physical connections that connect the nodes are known as links. A link may be through a pair of wires, a coaxial cable, and an optical fiber or through a satellite. The data transmission rates of the links are expressed by kbps (kilo bits per second), Mbps (Mega bits per second), Gbps (Giga bits per second) or Tbps (Tera bits per second). Examples are 64 kbps, 2 Mbps and 2.4 Gbps etc.

Media: The most commonly used media for computer networks are twisted pair, co-axial cable and optical fibre. Wireless techniques include broad-cast radio waves, microwaves and infrared.

Network Protocols: Computers of a network must obey some rules when communicating with each other. This set of rules forms the protocol for a computer network. The structural set of modules that implements the communication functions is called protocol architecture. An example of common protocol architecture is the TCP/IP protocol suite.

Network Software

Posted by Unknown Tuesday, July 23, 2013 0 comments
Software controls the operations of computer networks. The software that manages the resources of the network is often called the network operating system. Services in LANS rely on network operating systems, such as Novell Netware, IBM OS/2 Warp Server, or Microsoft Windows NT Server. A server network operating system must meet stringent set of requirements than a client operating system such as Windows 98 or Mac Operating system. A variety of communication software packages are available for microcomputers, especially for Internet Web browsing, like Microsoft Explorer, Netscape Navigator, Microsoft Outlook etc. Several functions are commonly provided by communication software packages, examples are: access control, transmission control, network management, error control, security management etc.

Access control: it is responsible for establishing the connection between terminals and computers in a network. Access control activities include connecting links through modems, establishing communication parameters such as speed, mode and direction, automatic telephone dialing and redialing, logging on and off with appropriate account numbers.

Transmission control: This function allows computer and terminals to send and receive commands, messages, data and programs. Data and programs are usually transmitted in the form of files and thus this activity is also called file transfer.

Error control: Error control function involves detection and correction of errors. Communication software and processors detect errors in transmission by different methods, including parity checking and cyclic redundancy checks (CRC). Most error correction methods involve retransmission, in which a signal is sent back to the computer to retransmit the previous message which has been received with error.

Network management function: This function manages communication in a computer network. It also monitors network activity and the use of network resources by end users. Security management is required to protect a computer network from unauthorized access. Network operating systems, or other security programs, restrict access to the data files and other computing resources in networks. Data transmissions can also be protected encryption and authentication technique.

Utility programs of Operating Systems

Posted by Unknown 0 comments
In addition to a file manager, operating systems also include utility programs that one can use to manage disks and files. The list of such programs is almost endless.

Disk Formatting: Disk formatting utility makes the disk ready to store data. Formatting creates a directory of the locations of each file called a file allocation table (FAT). When a user saves a file, the operating system stores it in a group of sectors, called cluster, the smallest storage unit the computer can address. To do so, it looks in the file allocation table for empty clusters and then stores the file in one of those locations. The address of the clusters where the file begins and the one where it ends are then listed in the file allocation table. When a user opens the file, the operating system uses those addresses to locate he clusters and open the file stored in them.

Fragmenting: When a user first uses a disk, data are laid down in a linear fashion. Each part of a file is stored in adjacent clusters. However, as a user begins to delete old files and add new ones, things begin to become less orderly, because fragments of files are scattered in clusters located in different areas on the disk. This file fragmentation shows the computer down because it takes longer for the drive to locate, save, and retrieve the fragmented files. To fix this problem, a user needs to regularly defragment or defrag the disk. This procedure is often overlooked by computer users, who then wonder why their system gets slower and slower as time goes by. In many eased, the system will even begin to misbehave; programs crash or files do not open. Often these problems can be fixed just by defragging the disk.

Disk scanning: A newly manufactured disk is not always perfect. Some areas of the disk may not be usable. The manufacturer scans the disk and electronically marks bad areas as unusable so that no data are stored there. As the user uses the disk, other areas may become bad. For this reason, a utility program is used to scan the disk at regular intervals to locate and mark any bad sectors. If this is not done, the operating system may store parts of a file in them and then the user will not be able to retrieve that part of the file. In addition, scanning finds and fixes problems with files. For example, when systems crash, parts of files may be left scattered on the disk and become lost. The disk scanning program locates these lost clusters and stores them together in a separate file. In some cases, a user can open these files and recover lost work.

File deletion and recycle bin: Many of the files created by users on a computer eventually become outdated and no longer needed. To remove these files from the disk, users delete them. On many newer operating systems, the procedure does not actually delete them from the disk. Instead, it moves them to a separate area of the disk called a recycle bin or trash can. If user decides later that she/he wants to recover the file, can open the recycle bin and restore it to the disk. When absolutely certain that the user will never need the files in the recycle bin; the user can make it empty. However, if a user ever deletes files, provided any subsequent commands did not place new files in the place on the disk where they are stored.

File Management in Operating Systems

Posted by Unknown 0 comments
When files are saved, they are assigned file names so that users can identity them later. Filenames have two parts: A name, and an extension. One may think of them as first and last name. The name is chosen to identity the file later. For DOS, a user has to use limited number of characters for the file name. However, a user can use long, descriptive filename in newer operating systems.

The extension is separated from the name by a period. Its purpose is to identify the file format or the application that created it. For example, a .DBR extension means the file is a database and .doc often means a word processing document.

Folders: A folder contains related document together. A well planned file cabinet uses hanging folders to group associated documents. It a further breakdown is needed, manila folders are place in the hanging folders. It is simple then to locate and pull out the documents needed. The same is true of hard drives. To master computing, one needs to know the concept of folders and their use for grouping together related files. A folder is also known as directory.

Drives: Most of the computer systems have more than one drive. Drives are assigned letters for identification. For example, a drive into which user can insert a floppy disk may be drive A or B. A computer looks to hard drive called C when user turns it on. Additional drives might be D and E. As the member and type of drives vary from system to system, so does the letter or name of each.
Floppy drive A & B
Hard drive C
CD-ROM drive D
Zip drive E
Trees: A tree is one of the ways to illustrate the organization of folders on a drive. In this view, all folders branch off from the drive. If a folder contains other folders, those folders are shown as a second branch from the first.

When using a tree, one can expand and collapse the entire tree or any branch. This allows a user to alternate between a summary or the drive’s contents, and details of each file. On windows, the plus sign indicates that a branch has been collapsed and it contains hidden folders. The minus sign indicates that the branch has been expanded.

Paths: A user has to follow a "path" to get files stored in folders on a disk. For example, if a file named varsity.doc name Letters or drive C, the path to that folder is C:\Letters\ varsity.doc. If varsity.doc is in a folder named Imran, the path is C:\Imran\ varsity.doc. The drive specification in a path is C: and the folder’s name is separated from it by a backlash.

Path to a file in a folder: The backlash is also used when a user has folders within folders. If the Letters folder contained a folder names Delowar, the path to it would then be C:\Letters\Delowar\ varsity.doc.

Path to a file in a subfolder: In most cases, a user does not need to type paths. Most new programs and operating systems let users to use a mouse to open folders to find a file.

File managers: Operating systems include a separate program that a user can use to explore drives, folders, and files. There are a variety of these but they all allow users to display the folders on a drive arranged like a tree. Clicking any of the folders displays a list of its contents.

When browsers and search engines were first developed for the Web, people soon discovered they could locate and get to a document anywhere in the world more easily than they could locate and get to one on their own system. As a result, browser technology is now being put to use in file management. Microsoft’s Active Internet Platform technology allows users to browse documents as well as the Web. In fact, a document on a local hard drive looks the same as a page anywhere on the Web.

Search engines on the Web keep track of millions of documents by searching them out and listing words they contain in an index. When a user searches a word, the search engine looks it up in the index and lists the name and address of every document in which it can be found. A user can go to the document just by clicking its name. The search engines make looking for documents so easy that personal versions are available for users own system.

Different Types of Operating Systems (OS)

Posted by Unknown 0 comments
Operating Systems that run on desktop computers are the least powerful and least secure operating system. They are also the most familiar. Most of the people like to use Windows in their computer. They are very popular and easy to use. Three common types of operating systems are:
  • Windows
  • Apple’s System 8, or
  • Rapidly fading DOS.
Operating System for Servers: Currently, computers in networks are connected to one another not directly but through powerful computers called services that provide security to the networks and route traffic from one network to another. These complicated tasks require special operating systems. These powerful operating systems are also used for tasks (such as engineering design, order processing, and payroll) critical to a company’s continued existence, called mission critical applications. Such tasks were previously run only on target mainframe computers. These powerful 32- or 64-bit operating systems are secure, multitasking, multithreading, and open. All now processes graphical user interfaces developed for then. All but OS/2 are portable in that they run on more than one type of microprocessor.

  • Windows NT (NT stands for New Technology) is the fasted-growing server operating system. The upgraded version of NT is called Windows 2000.
  • OS/2 (Operating System/2) competes with windows and is a powerful operating system but has had trouble catching on.
  • UNIX a powerful operating system for server was originally developed at AT&T’s Bell Labs in 1973.
Operating Systems for Mainfarame: In the early days of computer, mainframe and minicomputers dominated the computing world, and each computer company developed its own operating system. For example, some IBM mainframe computers use an operating system called open VMS and Digital Equipment Corporation minicomputers use one called VMS. These companies developed not just their own operating systems but also the applications that ran on top of them. These are called proprietary system because they are all owned by a single proprietor. Because there were so many competing operating systems, it was hard to make computers talk to one another. Although costly, these operating systems are both powerful and secure and capable of handling a variety of tasks.

Handheld operating systems: Windows CE, visually similar to Windows 95, uses a small keyboard and a touch-sensitive screen.

Embedded operating systems: Generally, a microprocessor is used inside a small device such as a watch, and it needs an operating system. Such an operating system is stored in a memory chip instead of a hard drive and turns on instantly when the device is turned on.

The Tasks of an Operating System

Posted by Unknown Monday, July 22, 2013 0 comments
The most important task of an operating system is to process commands and to provide coordination between different processing tasks. Here are details about multitasking, processing commands, multithreading, multiprocessor and miscellaneous tasks of an Operating System (OS).

Processing Commands: The operating system interprets instructions entered through the keyboard. When one uses an application program, the program’s commands are interpreted by the operating system. For example, one might open a document by clicking a button on the program’s toolbar. At another time the user might do so by dragging the file onto the application’s icon and dropping it. The operating system interprets these commands and copies the document on the disk of the computer.

Multitasking: Modern operating systems allow multitasking, that is to perform multitasks, at the same time with different programs. For example, one could download a large file from the Internet with one program, while editing a document with another. Older operating systems could run only one program at a time. Since most systems have only one microprocessor, they allow multiple programs to run by quickly switching back and forth between them. Although only one program is actually active at a time; the processor switches so fast that they all appear to be active. This process is called time-slicing or task-switching because it slices up the CPU’s time as it switches between the running applications. Today’s system use a form of multitasking called preemptive multitasking. In this type of multitasking access to the microprocessor is controlled so that one application cannot seize it and hold it for long a period. One application can “preempt” another application to get a fair share of the processor’s time.
Multitasking of an Operating System
Multithreading: Most applications process data and commands sequentially, i.e. when one task is finished they begin another. The application therefore follows a single thread from the beginning of a session to the end and individual operations are strung like beads on a necklace. A multithreaded operating system on the other hand lets application programs start and run two or more threads simultaneously. It is similar to multitasking within a single program. For example, one thread in a word processing program can be reading the pressed keys while a second thread displays data on the screen and a thread prints the document.

Multi-user Support: Some operating systems are designed so that many users can be connected to the system at the same time. Multi-user operating systems are also multitasking because the multiple users run their programs at the same time.

Multiprocessor Support: Some applications need huge processing power. For example, anyone doing forecasting, modeling, simulating, or computer aided design needs enormous computing power. Some operating systems support multiple processors – in some cases hundreds or even more.

Miscellaneous Tasks: In addition to the processing tasks discussed, an operating system also performs the following tasks:
  • The operating system continually monitors the system and if it detects something wrong, it outputs an error message.
  • The operating system ménages the use of memory and runs each program in its own protected space to that a problem with one program will not affect others.
  • The operating system allocates peripheral devices for different tasks.
  • To conserve power, power management cuts power at those times when it is not needed.
  • Manages file stored on disks.

Testing, Debugging and Diagnostic Programs

Posted by Unknown 0 comments
In system software we need to test, debug and diagnose various programs. Programs created by us are prone to error. It is not realistic to expect a newly created program to run correctly the first time. Before a program can be put into productive use it must be debugged. A bug is a defect or imperfection in a program. In the context of programming it is an error in a program that is responsible for undesirable results. Testing or a program involves validation of program design. Thus testing involves data that are intentionally used to reflect the worst-case situations.

In order to assist the programmer in locating and rectifying errors or bugs in programs, several tools are available. These tools could be hardware aids such as logic analyzers or software aids such as debug programs. A debug program is loaded into the memory with the object program that is to be debugged. If errors occur during run, the debug program is activated to identify, locate, and correct the error. A debug program generally includes several features that aid the programmer in debugging tasks. Some of the common features are described below.

Display Register Contents: This feature allows the programmer to check contents of certain registers of the CPU during the execution of a program. The contents of the registers can be printed or displayed on appropriate devices. It is also possible to modify the contents of some registers if necessary.

Display/Replace memory Contents: The programmer can access the contents of a memory location and display it. The contents can then be modified if necessary.

Memory Dump: This feature makes it possible to print the contents of a group of memory locations. Thus a programmer can view the contents of desired memory location and determine accuracy of data.

Output Memory Content: The contents of a memory are transferred and stored in some other mass storage devices such as disks or magnetic tapes.

Breakpoints: Breakpoints are interrupts in the object program. They are used to examine the current status of certain critical CPU registers, memory locations, or I/O ports. When the execution of the object program reaches a breakpoint; its execution is temporarily halted. The debug program then allows the programmer to examine and alter the contents of the selected register, memory locations, or I/O ports to correct errors.

Disassembly: This is the servers of the assembly process. The operation consists of reading out the contents of the program memory into assembly language.

Enable dot net for all version of Windows 8 X86 and X64

Posted by Unknown 0 comments
It is actually good news for all windows 8 users. You can enable the Dot net for all version of Windows 8 X86 and X64 OS. We made a file to perform this task easily. We have tested this file on 16 windows 8 operating system. We uploaded this file on "amonshare". Download it from there. Click on the free link to get it without any cost.

Follow the instructions:
  • Go to the D drive of your computer/laptop
  • Make a folder and named it as 'sources'
  • Make another folder 'sxs' in 'sources' folder
  • Extract this file in 'sxs' folder. Follow the picture.
  • Go to the Strat menu and type cmd
  • Click Right button on cmd
  • Then click on the run as administrator
  • Copy the below command and paste it in cmd 
dism.exe /online /enable-feature /featurename:NetFX3 /Source:D:\sources\sxs 
  • Press enter key
  • Wait for a while 
  • You will see the program as like as the below picture.
You have done successfully. Just enjoy…

How to enable/disable windows 8 automatic Startup programs?

Posted by Unknown 0 comments
If you are using windows 8 operating system and want to turn off the programs which are automatically opening on starting the windows 8, you can follow this procedure. Windows 8 is actually a popular operation system (OS). But to run this operating system you need to have a quality PC. Or it takes more time to open or shut down your computer. You can disable or turn off the unnecessary programs from the Startup option of your machine. It helps to run or open your PC quickly. Generally avast antivirus page, MSDN home page, IDM (Internet Download Manager) are the automatic opening programs in the Startup option of windows 8. You may try many ways to find a setting related option to perform this task but couldn't find it till easily. You can use several methods to do this task.
Method one:
  • This method can be applied for win XP also.
  • Open run command of your computer (keyboard shortcut Windows Key + R)
  • Type >> msconfig
  • A dialogue box will be opened with tabs services>>Startup etc.
  • Now you should select the Startup tab
  • Under that tab place your programs like MSDN home page, IDM, avast antivirus homepage etc.
  • After that unchecked the check box.
  • Click apply>> than OK
  • Just restart your system and enjoy.
Method two:
Open the task manger using a right click in the left side of your computer. Look at the picture
Or you can go directly to Task Manager, use the keyboard shortcut Windows Key + R and type: taskmgr.exe and hit Enter or click OK. 
  • After coming the task manager click on the More details option.
  • Click on the Startup tab
  • Here you can see all of your windows 8 start up programs.
  • Just disable the programs which you do not like to keep in the Startup option
  • And enable the program checking the box. Follow the below picture.
The above two process is very easy and popular to all. You can also try the first process. It is easier and comfortable.

System Software - BIOS, Language translator, Compiler & Interpreter

Posted by Unknown Sunday, July 21, 2013 0 comments
Systems software refers to programs that assist the users to generate, debug, test, modify application programs, and then to executive them. These programs are generally written y computer manufacturers or software developers. The system programs can be used by different users and different application programs. The programs of system software can be grouped into:
  • Operating system
  • Language translators
  • Utiltiy programs
The most important component of system program is the operating system. It is a collection of program modules. Collectively they manage all the hardware, provides user - interface and some other user facilities. Other system programs include language translators (i.e. assembler, compiler, and interpreter), text editors and some utility programs

An operating system is a software system. It acts as an interface between a user of a computer and the computer hardware. The operating system provides an environment in which a user may execute programs. The goals of an operating system are to:
  • Make the computer system convenient for user
  • Make efficient use of the computer hardware.
The operating system controls and coordinates the use of the hardware for different application programs. The basic resourced of a computer system are provided by its hardware, software and data. The operating system provides the means for the proper use of these resources in the operation of the computer system.

An operating system is an important part of a computer system. A computer system can be viewed to have four components:
  • Hardware (CPU, memory, I/O devices etc.)
  • Operating system
  • Applications programs (compilers, database systems, video games, business programs etc.)
  • Users (People, machines or other computers)
The role of BIOS: 
When starts, the computer system has no idea what drives it has and cannot even load its operating system. To solve this problem, a computer users the Basic Input/Output System (BIOS) to turn it on. This small program is permanently stored in a read-only memory (ROM) chip. Science it is a small program embedded in a chip, it occupies a place between the software and hardware. For this reason it is often called firmware. BIOS performs a number of important functions. It interprets key strokes, displays characters on the screen, handles communication through the computer’s ports, and tests the system while turning it on.

When a computer is turned on, the CPU hands over control to the BIOS, and the BIOS runs the power on self test or POST makes sure that all chips on the system board works well. Results of such tests are shown on the monitor at the time of turning on. Finally when the BIOS finds the operating system, in hard disk or floppy disk, it hands over control to the operating system.

Language Translators:
Machine language: The machine language is written in words comprising of 1s and 0s. Computers execute commands on instructions in machine language; programming in machine language has the following disadvantages:
  • The program must be written in machine language
  • Entering machine language program is a tedious process
  • Error detection and correction is tedious and consumes much time
  • Programs written in machine language for a specific machine cannot be used for another type of machine.
Assembler: Programming in assembly language is easier than programming in machine language. The programmer is required to write a source code for each instruction in the program and the assembler translates it to machine language. The programmer maintains total control of the computer operation. Assembly language offers the greatest degree of efficiently in operation and execution of programs.

Many shortcomings of machine language programming are overcome by programming in assembly language. Assembly instructions of a computer have mnemonics associated with them. The assembly program is written using these mnemonics. Assemblers are programs that translate assembly level codes into equivalent machine codes. For programming in assembly language, it is not necessary to write programs in absolute binary, octal or hexadecimal notations.

Compiler and Interpreter: High level languages are widely used. They have been developed to enable the users to program the machines in a language similar to the language of the users. For example BASIC, Pascal, C and Java use scientific notations and subroutines in programming formats that are similar to mathematical formulas and equations. On the other hand, COBAL contains business jargons widely used in business.

A Compiler is a program that translates programs written in high level language into machine language. A programs written by a programmer in a high level language, is called a source program. The source program when converted into machine language by a compiler is referred to as an object program. Unlike the assembler, the compiler generates several machine language instructions for each source statement. A compiler can be made to interface with several different computers. It is not written for any specific computer. A user can write programs that can be adapted to several computing systems. Thus, the user can formulate problems efficiently without precise knowledge of computer architecture. Compilers are complex programs compared to assemblers and they require more storage space than assemblers. An assemblers or a compiler produces the object program, which is loaded into the computer memory before execution.

An interpreter is a translator program that differs from the assembler or the compiler on several significant points. The interpreter does not prepare an object program. It translates and immediately executes each instruction of the source program. Thus an interpretive language is also an interactive language; it enables the user to load one instruction into the computer at a time and have it translated and executed. This process allows the programmer to check the results immediately. The interpreter is also a debugging tool and is useful during the program development stage. In the interpretive mode the execution time of the program is extended, but the program developmental effort and the program development time are decreased.

Comparison of Compiler and Interpreter:
Compiler Interpreter
Compiler prepares an object program from source program Interpreter translates and immediately executes each instruction of the source program
Debugging is complex and time consuming It is a debugging tool and is useful during program developing stage
Lower execution time Higher execution time
Requires higher program development effort and time Requires less program development effort and time
Text Editor: While developing a program, it is often necessary to edit it. Editing involves making corrections or modifications to instructions, deletions and additions of instructions, re-sequencing instructions etc. A special program called editor greatly simplifies the editing tasks. An editor enables the user to retain the program in the memory and modify it as required. A portion of the memory, called buffer, is reserved for editing. Lines of instruction are entered from an external I/O device and stored in the buffer for editing by the editor. The edited text can be printed by a printer or recorded on suitable I/O devices.

How to change the screen resolution of Android/Tabled ?

Posted by Unknown 0 comments
You may change the screen resolution of your computer for any requirement. Did you change the screen resolution of your Android/Tabled? There is a difference between two of them. If anybody increases the resolution of his computer then the text, icon, app etc become smaller. But after increasing the density of Android/Tabled the icon, text, app etc become larger.

For the Screen Resolution of Android/Tabled the density setting is needed to change. Simply we can say that the DPI (dots per inch) is changed. It is known to all that the default DPI of Android/Tabled varies according to the different devices. For example: 120, 240, 320, 480…

When you decrease the DPI then the text, icon, app, widget etc. become smaller and after increase the DPI these look larger than before. Most of the user wants to change the screen resolution of their Android/Tabled. Because it increases the screen performance of the device. To make enough space in the home screen during the time of playing video games it is needed to increase the resolution. At that time high resolution is needed.

The accurate value of DPI (dots per inch) could not be measured. It depends on your device. The display setting which perfectly fit for your Android/Tabled is the accurate DPI of your device. You may try 2-3 setting. Somebody change the DPI from 120 to 90/100, 240 to 120/180/190, 320 to 240/180. But remember that if you do not set it accurately some app may be crashed. 
Image of decreasing DPI
How to change density: You can use two processes to change the density of the device.

With app: It is a simply process. We use here the LCD Density Changer app. At first you need to download it. Then install this app in your device. Now change the density value and click the change button. After restarting the device you will see the changed screen. This process is very helpful for the new user. Just remove the battery to get default setting if any problems occurred.
Change DPI with app and build.prop edit
With build.prop edit: It is also a easy process. Just download it from here. Install in your device. Then alter the density value of qemu.sf.lcd_density. Save and restart your device.

Remove Junk files from Windows-7 without any software

Posted by Unknown 0 comments
Today I am going to write how to delete all Junk files and make faster your Windows 7 operating system without using any software. Generally we use various software to make faster and speedy of our computer. Low speed of computer is really boring to operate it. The user of Windows-7 operating system can increase the speed of his PC without using any software. You may know that junk files reduce the speed of your PC. So it is better to remove all of these files time to time. Here is a full procedure to delete junk file from Windows-7 operating system without installing any third party software in your computer. 
  • At first go your Desktop screen and using Right Click create a Text Document
  • Type the below code in this folder. You can copy the code from here and past in the text document

  • In the above code you can see a word "IMRAN". Just replace it with your computer name. To see the name go to the start bar option of your computer.
  • Now save the file as a name " speed_up.bat". [file->save as->speed_up.bat]
  • You can keep this file in the Desktop or any other folder in your computer.
  • The use of this program is very easy. Just Double click the file and delete the entire JUNK file from your computer.
If you want to use any software to perform this task you can do it. But it takes the space in your hard drive and all of the software does not work properly. I follow this process. Just make a speed_up.bat file and use it to increase the speed of your PC. It is very helpful and does not take space in RAM CPU.
Related Posts Plugin for WordPress, Blogger...