MAHARASHTRA STATE BOARD OF TECHNICAL EDUCATION
GURUKUL EDUCATION SOCIETY’S
INSTITUTE OF ENGINEERRING AND TECHNOLOGY, NANDGAON
MICRO PROJECT
Academic year: 2022-2023
TITLE OF PROJECT
“Various Genration of Computer
System & Operating System”
Program: OSY
Course code: CO-5I
Subject Code: 22516
Name of Guide: Prof. S.R.Jain
MAHARASHTRA STATE
BOARD OF TECHNICAL EDUCATION
Certificate
This is to certify that Mr. Afrid Pathan,Mr.Aniket Shinde,Mr.Chetan
Shelar,Mr.Chetan Jadhav Roll No. 16,26,28,17 of fifth Semester of Diploma in
computer engineering of Institute, GURUKUL POLYTECHNIC (Code: 1607)
has completed the Mini Project Satisfactorily in Subject –OSY for the
academic year 2022 as prescribed in the curriculum.
Place: Nandgaon
Date: / /2022
Project Guide Head of the Department Principal
Group Details:
Roll
No. Student Name Enrollment No. Seat No.
1 Afrid Pathan 2016070025
2 Aniket Shinde 2116070081
3 Chetan Shelar 2116070159
4 Chetan Jadhav 2016070026
INDEX
Sr No Content Page No
1 Abstract
2 Out put of project
3 Conclusion
4 Referance
ABSTRACT
A computer system consists of many resources like hardware and software, which
are useful to complete a task. The common required resources are input/output
devices, memory, file storage space, CPU etc.
The operating system acts as a manager for all the above resources and allocates
them to specific programs and users, whenever necessary to perform a particular
task. Therefore, the operating system is the resource manager that means it can
manage the resources of a computer system internally. The resources are
processor, memory, files, and I/O devices.
An operating system is the interface between the user and the machine. Before
there were operating systems, people only used computers using Analog signals
and digital signals. Along with the development of knowledge and technology,
currently there are various operating systems with their respective advantages.
1.0Rationale:
The study of Operating system provides us with an understanding of human
computer interfaceexisting in computer system and the basic concepts and its
working. The students will also get hand-on experience and good working
knowledge to work in environments. The aim is to gain proficiencyin using
operating systems after undergoing this study. While doing so, we are known to
the conceptsand principles of operating systems, its features and practical
utility.
2.0Aim /Benefits of Micro-Project:
The primary goal of windows operating system is having convenience for the
user. While the primarygoal of is efficient operation of the computer
system. The former Operating System exists because,they are supposed to make
it easier to compute them without them. This view is particularly clearwhen you
look at Operating Systems for small PCs. The latter are used for large, shared,
multi usersystems. These systems are expensive, so it is desirable to make them
as efficient as possible.
3.0 Course Outcomes achieved (COs):
a) Install operating system and configure it. b) Use operating system tools to
perform various functions.
4.0Literature Review:
Step wise work done:
1. In this microproject, first of all we have focused on selection of
appropriate topic for micro-project.2. Select the topic i.e. Genenrations of
Computer and Operating System.3. Then we started with our brief study as
well as a survey on our topic .4. Then we gathered all information based on the
topic of microproject.5. We have done analysis and study of our topic in
detail.6. Following all the above methodologies we successfully completed with
our microproject
5.2 Contribution of individual member:
01.Afrid Pathan
02.Aniket Shinde
03.Chetan Shelar
04.Chetan Jadhav
Outputs of the Micro-Project:
Computer System
A computer
is a machine that can be instructed to carry out sequences of arithmetic or
logical operations automatically via computer programming. Modern computers
have the ability to follow generalized sets of operations, called programs These
programs enable computers to perform an extremely wide range of tasks. A
"complete" computer including the hardware, the operating system (main
software), and peripheral equipment required and used for "full" operation can
be referred to as a
computer system
. This term may as well be used for a group of computers that are connected and
work together, in particular a computer network or computer cluster Computers
are used as control system for a wide variety of industrial and consumer
devices. This includes simple special purpose devices like microwave ovens and
remote controls, factory devices such as industrial robots and computer-aided
design and also general purpose devices like personal computers and mobile
devices such as smart phones The Internet is run on computers and it connects
hundreds of millions of other computers and their users. Early computers were
only conceived as calculating devices. Since ancient times, simple manual
devices like the abacus aided people in doing calculations. Early in the
Industrial Revolution, some mechanical devices were built to automate long
tedious tasks, such as guiding patterns for looms More sophisticated electrical
machines did specialized analog calculations in the early 20th century.
Operating System
The earliest computers were mainframes that lacked any form of operating
system. Each user had sole use of the machine for a scheduled period of time
and would arrive at the computer with program and data, often on punched
paper cards and magnetic or paper tape. The program would be loaded into the
machine, and the machine would be set to work until the program completed or
crashed. Programs could generally be debugged via a control panel using dials,
toggle switches and panel lights. Symbolic languages, assemblers and compilers
were developed for programmers to translate symbolic program-code into
machine code that previously would have been hand-encoded. Later machines
came with libraries of support code on punched cards or magnetic tape, which
would be linked to the user's program to assist in operations such as input and
output. This was the genesis of the modern-day operating system; however,
machines still ran a single job at a time. At Cambridge University in England
the job queue was at one time a washing line from which tapes were hung with
different colored clothes-pegs to indicate job-priority. As machines became
more powerful the time to run programs diminished, and the time to hand off
the equipment to the next user became large by comparison. Accounting for and
paying for machine usage moved on from checking the wall clock to automatic
logging by the computer. Run queues evolved from a literal queue of people at
the door, to a heap of media on a jobs-waiting table, or batches of punch-cards
stacked one on top of the other in the reader, until the machine itself was able to
select and sequence which magnetic tape drives processed which tapes. Where
program developers had originally had access to run their own jobs on the
machine, they were supplanted by dedicated machine operators who looked
after the machine and were less and less concerned with implementing tasks
manually.
Generations of Computer System
Generations of Operating System
1. The First Generation ( 1945 - 1955 ): Vacuum Tubes and Plugboards
Digital computers were not constructed until the second world war. Calculating
engines with mechanical relays were built at that time. However, the
mechanical relays were very slow and were later replaced with vacuum tubes.
These machines were enormous but were still very slow. These early computers
were designed, built and maintained by a single group of people. Programming
languages were unknown and there were no operating systems so all the
programming was done in machine language. All the problems were simple
numerical calculations.
By the 1950’s punch cards were introduced and th
is improved the computer system. Instead of using plugboards, programs were
written on cards and read into the system.
2.The Second Generation ( 1955 - 1965 ): Transistors and Batch Systems
Transistors led to the development of the computer systems that could be
manufactured and sold to paying customers. These machines were known as
mainframes and were locked in air-conditioned computer rooms with staff to
operate them. The Batch System was introduced to reduce the wasted time in
the computer. A tray full of jobs was collected in the input room and read into
the magnetic tape. After that, the tape was rewound and mounted on a tape
drive. Then the batch operating system was loaded in which read the first job
from the tape and ran it. The output was written on the second tape. After the
whole batch was done, the input and output tapes were removed and the output
tape was printed.
3.The Third Generation ( 1965 - 1980 ): Integrated Circuits and
Multiprogramming
Until the 1960’s, there were two types of computer s
ystems i.e the scientific and the commercial computers. These were combined
by IBM in the System/360. This used integrated circuits and provided a major
price and performance advantage over the second generation systems. The third
generation operating systems also introduced multiprogramming. This meant
that the processor was not idle while a job was completing its I/O operation.
Another job was scheduled on the processor so that its time would not be
wasted.
4.The Fourth Generation ( 1980 - Present ): Personal Computers
Personal Computers were easy to create with the development of large-scale
integrated circuits. These were chips containing thousands of transistors on a
square centimeter of silicon. Because of these, microcomputers were much
cheaper than minicomputers and that made it possible for a single individual
own one of them. The advent of personal computers also led to the growth of
networks. This created network operating systems and distributed operating
systems. The users were aware of a network while using a network operating
system and could log in to remote machines and copy files from one machine to
another.
Digital computers were not constructed until the second world war. Calculating
engines with mechanical relays were built at that time. However, the
mechanical relays were very slow and were later replaced with vacuum tubes.
These machines were enormous but were still very slow. These early computers
were designed, built and maintained by a single group of people. Programming
languages were unknown and there were no operating systems so all the
programming was done in machine language. All the problems were simple
numerical calculations
operating system and could log in to remote machines and copy files from one
machine to another.
Applications of Micro Project:
It is supported and encouraged to 32/64 bits operation.
Multi-tasking system.
It is allowed to place the file/folder on the Desktop and work from there.
Supports long file names up to 255 characters.
Supports multiple users with their own setting such desktop icons.
Advantages:
Easy to use with a GUI
Offers an environment in which a user may execute programs/applications
The operating system must make sure that the computer system convenient to
use
It provides the computer system resources with easy to use format
Acts as an intermediator between all hardware's and software's of the system
Disadvantages
If any issue occurs in OS, you may lose all the contents which have been
stored in your system
Operating system's software is quite expensive for small size organization
which adds burden on them. Example Windows
It is never entirely secure as a threat can occur at any time
Features of Operating Systems
Provides a platform for running applications.
Handles memory management and CPU scheduling.
Provides file system abstraction.
Provides networking support.
Provides security features.
Provides user interface.
Provides utilities and system services.
Supports application development
Limitations Under the UNIX Operating System
Networks
PRO/5 expects that file access will be the same on a local system as on
a networked system.
In particular, the lockf(2), locking(2), or fcntl(2) calls should operate on a
network file in exactly the same manner as on a local file. Additionally,
as PRO/5 uses information returned by the stat(2) system call, it is
important that the format of the information remain the same and that
file uniqueness be maintained across the network.
Data Server
BASIS offers another PRO/5 product, the PRO/5 Data Server, to handle
networked files more efficiently. The Data Server is available on many
of the platforms where PRO/5 is available. It resides on one of the
networked systems, and handles requests for data from the client
PRO/5s on other networked systems. All file manipulation is identical
across the network, and network traffic is reduced because a single
request to the Data Server replaces the multiple requests required over
a transparent network filesystem. The Data Server eliminates or
minimizes most of the problems involved in handling files across
networks.
File READ vs. READ RECORD
Whenever possible, use a READ RECORD operation rather than a
READ operation. The READ RECORD command specifies a buffer and
PRO/5 will read the entire buffer in one operation. The READ command
specifies that PRO/5 is to read the input one character at a time until
the input runs out of data or a field terminator appears in the input
stream.
The READ RECORD command will almost always out perform the
READ command.
UNIX Operating System Parameters
There are several UNIX configuration parameters, which can affect your
PRO/5 installation. These deal with system limits affecting: the
maximum size of files, the maximum number of files that can be opened
at one time, the maximum number of locks that can be active at one
time, and the amount of system memory allocated to disk buffers.
These parameters must be set properly in order for your system to
function in an efficient manner. What follows is a brief discussion of
these parameters. Their names and the methods of setting them vary
from system to system. Please consult your UNIX manuals for the
correct names and procedures for your system.
ULIMIT
Determines the maximum number of blocks that can be written to a file.
On most systems this parameter can be set in your login profile. Check
with your systems administrator for the settings on your system. This
number should be set large enough to handle the largest files you
expect to write. If ULIMIT is not set high enough you could experience
PRO/5 !ERROR=2s or !ERROR=15s on writing to large files.
A special program, pro5run, is supplied with PRO/5 for most UNIX
operating systems. This program will attempt to set ULIMIT to a very
large value for your system before overlaying itself with PRO/5. This
may be necessary on some systems where the ULIMIT is not easily
changed by a user. ULIMIT can be set as a system parameter in most
systems. It can usually be set as well by an individual process.
NFILES
Sets the total number of file handles that can be OPENed at any one
time on the system. This should be set to at least the average number
of files used per task, times the number of tasks you are running. If you
are using FCBCACHE, this number should be increased to reflect the
number of active files as well as the number of cached files. If this
number is set too low, PRO/5 !ERROR=16s may occur on the system.
If it is set too high, system performance can suffer because system
memory is being tied up for files tables that are not being used. NFILES
is usually set as a system parameter.
LOCKS
Sets the total number of locks that can be active at anyone time. PRO/5
uses locks to arbitrate record usage. A rule of thumb to follow in setting
this parameter is to allow one lock per open PRO/5 file plus one per
PRO/5 task, plus any other locks required by other tasks. If a PRO/5
task requests a lock and none are available, an !ERROR=0 could be
generated. In some cases that task requesting the lock can hang. In
most cases, system performance will be noticeably affected.
NBUF
Sets the number of memory blocks allocated to disk buffers. System
performance is greatly dependent on this parameter. If it is set too low,
the system has to access the disk more often, slowing the system
down. If it is set too high, time could be wasted searching in memory for
disk blocks that have not been read. A rule of thumb is to allow
approximately 25% of the system memory for buffers.
Terminations
A hangup signal in the UNIX operating system (SIGHUP) will cause an
orderly shutdown of PRO/5. Pending terminal output and pending
terminal reset operations are terminated. An illegal instruction signal
(SIGILL) will be treated the same as an interrupt character (SIGINT)
and (SET ESCAPE), even when PRO/5 is not running on a terminal.
User Limits and User Numbers
PRO/5 products are licensed on the basis of the number of foreground
users they will support. A foreground user is any process started
executing PRO/5, whether attached to a terminal or not.
PRO/5 may, however, start a process not attached to a terminal using
the BACKGROUND or SELECT commands. These are referred to as
"background users." Each PRO/5 and PRO/5 Data Server product will
support eight times as many background users as foreground users.
For example, an 8-user PRO/5 will simultaneously accommodate up to
8 foreground users and 64 background users.
PRO/5 does this by maintaining two pools of user "slots". Each time a
foreground or background user requires the services of the PRO/5
product, a slot is used. When all the slots are used, the next request is
denied until a slot becomes available. PRO/5 will print an error and
refuse to start; the PRO/5 Data Server will refuse a connection.
These slots are not only important in counting users. They are an
essential element in the PRO/5 file and record locking scheme.
Because each user has a unique slot, the number of that slot is used to
lock part or all of a file. Other processes acknowledge that they do not
own the lock, because their slot number is different. This provides a
simple and quick method of locking files and records.
In some network environments, this method is not foolproof. Processes
on different machines may happen to share the same slot number
because the slots are from different pools. To allow for these cases, a
"Network Lock" scheme can be enabled via the SETOPTS verb, which
is described in the Commands Manual section of the documentation.
With the INFO() function, it is possible to determine the total number of
each type of slot that a given PRO/5 can support, as well as the number
of remaining free slots.
The slot pools are implemented using the UNIX operating system IPC
(Interprocess Communication) mechanisms, requiring one semaphore
vector and one shared memory segment. Removing or tampering with
these IPC's is likely to cause locking conflicts, and will also have more
serious side effects.
CONCLUSION.
An Operating System is an interface that helps a user connect and
communicate with computer hardware. It is an essential part of
computing devices like mobiles, laptops, cameras, and other appliances.
Even some washing machines and refrigerators have them.
REFERENCES
1.https://www.tutorialspoint.com/operating-system-grneretions
2.https://en.wikipedia.org/wiki/opareting_system
3.https://en.wikipidia.org/wiki/computer