Computer Hardware &Networking (EC) : Chapter 6

   OPERATING SYSTEMS

by Shivajirao Jadhav , Mumbai 

    Marks: 10 (15)

Definition: An operating system (OS) is a program, which acts an interface between the user of computer and computer hardware.

An operating system (OS) is system software. It manages computer hardware and software resources and provides common services for computer programs.


Main functions of an operating system:

  1. It boots the computer.

  2. It performs basic computer tasks e.g. managing the various peripheral devices like keyboard, mouse, printer etc.

  3. It makes the hardware convenient to use.

  4. It helps users to execute the programs.

  5. It provides security of information to users.

  6. It provides a user interface like command line interface, graphical user interface.

  7.  Handles system resources such as computer's memory and sharing of the central processing unit (CPU) time 

  8. It performs error handling


Services in OS.

The operating system provides certain services to users.  There are three major categories of services-

  1. Information management (IM)

  2. Process management (PM)

  3. Memory management (MM)


Information management (IM): 

  1. It refers to set of services used for storing, retrieving, modifying or removing the information on various devices. 

  2. These system services manage the organization of information in terms of directories and files. It allocates and de-allocates the sectors to various files.

Some of system services provides under IM are-

  • Create a file

  • Create a directory

  • Open a file

  • Close a file

  • Read data from file to buffer

  • Write  data from buffer to file

  • Move the file pointer

  • Read and return file’s status

  • Create a link

  • Change working directory

Memory Management (MM):

  1. Memory management refers to management of Primary Memory or Main Memory

  2. When a program is to be executed, the OS loads the program in main memory. 

  3. The operating system keeps a list of free memory locations. 

  4. Before program is loaded in the memory from disk,  the MM consults this free list, allocates the memory to process.

  5.  The OS keeps list of free memory locations.  

  6. The memory allocated to process depends on program size. 

  7. When program is executed completely, it removes from main memory and again modifies the list.


Processor Management (PM):

  1. In multi user system operating system, a number of users located at different terminals run the same or different programs. 

  2. A computer has only one CPU and it can execute only one instruction belonging to any one of all these programs. In such case OS has to keep track of all running programs, called processes.

  3. In multiprogramming environment, the OS decides which process gets the processor when and for how much time. 

The services provided under process management are-

  • Read process

  • Block process

  • Terminate process

  • Resume process

  • Dispatch process

  • Suspend process

  • Delay process


Graphical User Interface (GUI):

The interface which replaces cryptic commands by their graphical representation are called Graphical User Interface (GUI). It allows the use of icons or other visual indicators to interact with electronic devices. 

Windows operating system is GUI based operating system.

Advantages of GUI:

  1. GUI operating systems are much easier to learn and use.

  2. With GUI, commands are replaced by graphics. It is nor necessary to remember the commands.

  3. With GUI, user can run several programs simultaneously.

  4. User can communicate and exchange data between programs without transferring or copying files.


Windows:

In windows, different applications are shown on screen by icons. The screen is split into different partitions. Each partition can be of different size. User can run different applications in each partition of screen. Each of these partitions is called a window. User can open one or more applications at a time by clicking on windows.


Types of Operating Systems:

Linux:

Linux is rapidly evolving operating system. It is similar to UNIX system. It is also compatible with UNIX. In early days, Linux source code was available for free on internet. It is free to use. Its functionality list is quite similar to that of UNIX. It is free software. It is free in sense that people can copy it, modify it, use it in any manner they want.

Features of Linux:

  1. Linux is multiuser operating system

  2. It works on different types of hardware in same way. 

  3. Linux source code is freely available.

  4. Linux is a multiprogramming system means multiple applications can run at same time.

  5. It can run on machine having 4MB of RAM.

  6. Linux presents standard interfaces to both the programmer and user.

  7. Linux supports a wide base applications.

  8. The file system in Linux obeys UNIX semantics.


Windows 7 Operating system:

Windows 7 operating system is proprietary softer owned by Microsoft Company.

Features:

  1. High speed

  2. User friendly

  3. Multiuser and multitasking

  4. Compatibility  with Vista

  5. Lower hardware required

  6. High GUI interfaces

  7. High security

  8. Easy updations in programs

  9. Supports multiple and new technologies

  10. Touch enabled


Windows 8 Operating System:

The transition from Windows 7 to Windows 8 introduced a number of new features across various aspects of the operating system. These include a greater focus on optimizing the operating system for touch screen-based devices such as tablets.

Features:

  1. Speedy boot time

  2. Innovative and dynamic desktop

  3. Improved search function

  4. Compatible with touch screen displays

  5. Windows store-user can purchase, download and install apps. The store will offer free and paid applications.

  6. Multiple monitor support

  7. Refresh and reset facility

  8. Built in antivirus with windows defender


Access and Security Aspects of O.S.:

Definition:

The system that uses specific security features to access the information only by authorized individuals to read, write, create or delete is called security system.


The  aspects/elements/ terms of security system are-

  1. Confidentiality: Ensuring that the information is not accessed in an unauthorized manner, i.e. by controlling Read operations.

  2. Integrity: Ensuring that the information is not amended or deleted in an unauthorized manner, i.e. by controlling write operations.

  3. Availability: Ensuring that the information is available to authorized users at right time i.e. by controlling read and delete operations and ensuring fault recovery

.


Security threats: 

  1. Sharing and protection are requirements of any modern computing. More sharing gives rise to more possibility of security threats. 

  2. The major threats to security can be categorized as:

  1.    Tapping: Unauthorized use of service.

  2. Disclosure: Unauthorized disclosure of information.

  3. Amendment: Unauthorized alteration or deletion of information.

  4. Fabrication: Unauthorized fabrication of information.

  5. Denial: Denial of service to authorized users.

  1. Tapping and discloses are passive threats and other are active threats.

  2.  In first two cases the information goes to third party without knowledge of other two parties. 

  3. In disclosure, source party willingly discloses information to the third party.


Attacks on Security:

The security system can be attacked in number of ways.

  1. Authentication: 

It means verification of access to system resources. Following are ways to in this regard-

  1. Guessing or stealing somebody else’s password and then use it.

  2. Use of vendor supplied password which can be used by only system administrator.

  3. Finding password by trial and error method.

  4. If user logs on and goes for tea, then intruder can use terminal 

  5. Writing dummy login program to the fool user.


  1. Browsing: 

  1. In some systems, there exist files with accesses controls, which are permissive. 

  2. One can browse through the system files to get this information, after which unprotected files/data bases could be easily accessed. 

  3. Confidential information could be read or even modified.


  1. Trap doors: 

  1. Sometime, software engineers leave some entry point to modify their programs. 

  2. These are called trap doors. They can be misused by others.


  1. Invalid parameters:

Passing invalid parameters may cause serious security violations.


  1. Line trapping: 

A special terminal is used to tap into a communication line. It causes access to confidential data.


  1. Electric data capture: 

Use of active or passive wire-taps, or mechanism to pick up the screen radiation and to recognize what is displayed on screen, is called electronic data capture.

 

  1. Waste recovery:

 By using some technique, deleted files can be recovered. Passwords may be recollected. It is waste recovery.

  1. Rouge software: 

Certain programs like worms, viruses attacks on system.

Computer worms:

  1. A computer worm is complete a program by itself. 

  2. It is written in such a way that it spreads to other computers over a network, but while doing this; it consumes the network resources to a very large extent. It can bring the network to halt.

  1. Usually, worm does not harm any other program. 

  2. It just spreads, thereby consuming large resources such as transmission capacity, disk storage and denying services to others. 

  3. The worm gets a mailing list and using this it sends copy of itself to all those addresses. 

  4. The worm is harmful to organizations operating over a network. 

  5. The worm be protected by strong security and various check points in communication system.


Computer virus:

  1. A computer virus is program segment written with a clear intention of infecting other programs. 

  2. It gets onto many useful programs. 

  3. Virus is not a complete program. It can not operate independently. 

  4. Virus causes direct harm to system. It can corrupt code and data. 

  5. There are several types of viruses:

  1. Boot Sector Infectors

  2. Memory Resident Infectors

  3. File Specific Infectors

  4. Command Processor Infectors.

  5. General Purpose Infectors


Basis of classification:

Boot sector infectors: Virus can get into system memory if the machine is booted with an infected floppy or hard disk.


Memory Resident Infector: It loads upon execution of an infected file. Subsequently, whenever a non infected file is executed, the virus infects it


File specific Infectors: Infection occurs when an infected file is executed. The virus then load it’s at viral code into memory. In addition to infecting, the virus also reboots the system.


General purpose Infector: General purpose infector can infect exe file.


Command processor Infector: Infection occurs when infected file is executed. It infects com files as they are accessed.


Mode of Operation of virus:

  1. Virus works in number of ways. Developer of virus is a bright person who knows the operating system. 

  2. Typically viruses are developed under MS-DOS. 

  3. Viruses spread with games, unauthorized software and they are distributed to people free of charge.



Virus detection:

  1. Virus detection programs checks for integrity of binary files. 

  2. The program maintains a checksum on each file. A mismatch in it indicate virus. 

  3. Some program reside in memory and continuously monitor memory and I/O operation.


Virus removal:

  1. For some viruses bit pattern code can be predicted. 

  2. The virus removal program scans disk for pattern of known viruses.  On detection it removes them. The data recovery is impossible, if the virus has already damaged data.

  3. A generalizes virus removal program is very difficult to imagine due to the multiplicity of the viruses and the creativity with which they are constructed.


Virus prevention:

  1. Prevention is best measure as user cannot recover after virus infection.

  2. The safest way is to buy official, legal copies of software from reliable sources.  

  3. Free, unreliable software should not be used. 

  4. Frequent back up and running of monitoring programs also helps prevention.


Difference between computer worm and computer virus:

Computer Worm

Computer Virus

  1. Computer worm is complete program

  1. Computer  virus is part of program

  1. It can act independently

  1. It cannot act independently

  1. It does not cause direct harm to computer system

  1. It causes direct harm to computer system

  1. It goes on spreading on to network and consumes network resources.

  1. Computer virus corrupts code and data






Questions

Marks wise Questions: 1M(2), 3M(1), 4M(1), 6M(1)

1. Fill in the blanks with given alternatives.

  1. Operating system is ------------.

(i) Hardware (ii) Software (iii) Input device (iv) Output device

  1. Linux is -------- software

(i) Public domain (ii) Free (iii) Paid (iv) private

  1. Windows 98 is ------------ operating system.

(i) Single user multitasking (ii) Multiuser (iii) Time sharing (iv) Muitithreading

  1. -------- is not an operating system.

(i) UNIX (ii) LINUX (iii) MS-DOS (iv) C

  1. ----------- spreads more rapidly but causes less damage to computer networks

(i) Virus (ii) Worms (iii) Threat (iv) None

  1. ------- was first operating system used in computers.

(i) LINUX (ii) Windows 7 (iii) Windows 8 (iv) UNIX

2. State true or false.

  1. Windows 7 is Microsoft operating system

  2. Operating system is interface between computer user and computer hardware.

  3. LINUX is UNIX base operating system.

3. Match the following.

A B

(1) UNIX (a) Operating system

(b) Operating system (b) Software

4. Answer the following.

  1. What is an operating system of computer?

  2. Write functions of operating system.

  3. Write the names of services in operating system.

  4. What is information management? Write its service calls.

  5. What is memory management?

  6. What are the services provides under processor management?

  7. What is Graphical User Interface? Write its advantages.

  8. Write the features of LINUX operating system.

  9. Write the features of Windows 7 operating system.

  10. Write the features of Windows 8 operating system.

  11. Define Security regarding the operating system. 

  12. What are the different security aspects of operating system?

  13. What are the major threats to security of computing system?

  14. In what ways the security system can be attacked?

  15. Write a note on computer worms.

  16. What is computer virus? Write its types.

  17. Explain mode of operation of computer virus.

  18. Explain virus detection, removal and prevention.

  19. Differentiate between computer worm and computer virus.

डॉ. आर व्ही शेजवळ ,  प्राचार्य , लाल बहादूर शास्त्री महाविद्यालय , सातारा  सहसचिव (प्रशासन ) श्री स्वामी विवेकानंद शिक्षण संस्था , कोल्हापूर...