You are on page 1of 6

Q5

(a) Describe two MAIN components of the 'nuts and bolts' view of the Internet. Be sure to give
the functionality of each component.

Another way is to describe the Internet in terms of communication infrastructure that


provides services to distributed systems.

Public Internet is a global network of computers, a network that connects millions of


computer devices worldwide.

Most of these computer devices are traditional desktop PCs, Unix operating systems,
and so-called “servers” that store and transmit information such as WWW pages and
email messages. Increasingly, unusual computer features such as Web TVs, laptops,
pagers and toasters are connected to the Internet. (Toys are not the only rare devices
connected to the Internet. In Internet terms, all these devices are called host or end
systems. Internet applications that most of us are unaware of, such as WWW and email,
network operating systems in such end-to-end systems
b) Why is an RFID-based system better than an infrared system when tracking
inventory in a warehouse? Explain.

RFID - or Radio Frequency Identification - is a technology controlled by radio


waves. Individual RFID tags can communicate with reading devices, even those
devices that are not within the site line. The reader can share that data with the
software, such as an inventory management system.

By using a microchip and an antenna, markers can be powered by an on-board


battery or powered by a student connection, which gives idle markers a short reading
distance, but also low cost per unit.

RFID tags do not require a line of sight:

It is possible to read data from the RFID tag remotely. This means that inventory can
be taken without the employee having to scan each item. Many can be read at once,
too, which means that the whole pallet of things can be recorded instead of someone
scanning each item.

RFID tags capture more data than barcodes:

Barcodes are basically the identifiers associated with a website, where real
information about an object is stored. RFID tags, however, hold a large amount of
data locally in the tag. They can also manage many different types of information.
Data stored on the mark can be read and used without the need to link to an
information database that may be stored elsewhere.

RFID tags can tell you when items are coming in or out of storage:

RFID readers can be installed on and off your property, which allows real-time
tracking of goods as they enter and exit your warehouse.

RFID tags can help improve your floor structure:

RFID can provide real-time data. Barcodes must be scanned. That means that with
RFID, you always have a clear picture of what items are always taken, and rarely
collected. By using this data, warehouses can also adjust the list of names to be fully
functional, and they can do so more often because the data remains current.

Key Benefits using RFID:

The rapid changes in procurement and the cleaning list of operational challenges
have created a growing need for reliable, real-time data in the warehouse.
Fortunately, RFID technology has proved to be beneficial for institutions that want
to make data collection more efficient, more consistent, and more accurate. RFID
also offers natural benefits of barcode and hand-held data collection methods such as

• No line of sight is required in most cases of use

• Ability to hold data 100 times faster than barcode

• Scale reading scales with LF, HF, and UHF tags.

• Quickly read multiple tags with a single scan

• Flexible tag shape, ready to read everything on the palette

• Working inside and outside the warehouse, even in extreme conditions.

(c)Briefly describe each of the following with an example of each:

1: Simplex transfer mode:

In Simplex mode, the connection is not directed, as in one way. Only one of the two non-relay
devices can transfer, the other can only receive. Simplex mode can use the entire channel volume
to send data to one side.
Example:
Keyboard and traditional monitors. The keyboard can only present input, the monitor can only
render output.
2: Half-Duplex transfer mode:

With half-duplex mode, each channel can transmit and receive, but not simultaneously. If one
device sends, the other can only receive, and vice versa. Half-duplex mode is used in situations
where there is no need to connect to both indicators at the same time. The entire channel capacity
can be used on each side.
Example:
Walkie-talkie where the message is sent once and the messages are sent both directions.

3: Full Duplex Transfer Mode:

In full duplex mode, both channels can transmit and receive simultaneously. In full_duplex
mode, one-sided signals share link volume and signals to another location, this sharing is
possible in two ways:
• The link must contain two different modes of transmission, one for sending and one for
receiving.
• Even volume is separated between two-way signals.

Q6
(a)

A process pl is currently running an instruction progl. It is necessary to run another


process p2 for a few seconds and then return to pl. Explain how the operating system
facilitates this. ?

The CPU creates a system that is stored as a sequence of machine language instructions for the
main memory. It does so by reading, or by memorizing instructions repeatedly, and then carrying
out, or fulfilling, that command.
The operating system helps to store all computer information such as files, folders etc. in
connection by enabling connected network devices to communicate with a computer and any
computer that needs it.

The process management part is the process of managing multiple processes that run
simultaneously in a system. Every running software program has one or more associated
processes.

(b)
How Operating System is assisted:

1: Device driver:
The driver provides a visual software interface to the hardware, allowing operating systems
and other computer systems to access computer functions without having to know the exact
details about the hardware being used.

2: Bootstrap program:
Bootstrap is a program that launches an operating system (OS) at startup. The term bootstrap
or bootstrap originated in the early 1950's. Refers to the bootstrap loading button used to
launch a robust bootstrap program, or a small program that uses a large program similar to the
OS.

3: Visual memory:

Virtual memory is a feature of the operating system that enables a computer to compensate
for the lack of virtual memory by transferring data pages from random access memory to disk
storage. This process is temporary and is designed to work as a combination of RAM and space
on the hard disk.

(c)

Describe a scenario where virtual processors can be used to enhance performance.

A virtual processor represents a portable processor in a virtual component operating


system that uses shared processors. The server firmware distributes the processing units
equally between the visible processors given the sensible partition.
This is especially helpful in cases where available support or space to support additional
computer hardware is not available. Powerful workload control is a practical concept
where a single machine and its working load can be distributed across multiple handling
systems.

A virtual machine with two or four cores will be more responsive than a single virtual
machine, as is a computer with multiple cores. If you are using an old CPU with only one
or two cores, it may be time to upgrade your virtual machine will work much faster if you
can provide it with at least two cores.

You might also like