Simple batch systems, Basic Computer Science

Assignment Help:

Simple Batch Systems:

Early machines were very expensive, and therefore it was important to maximize machine utilization. To improve utilization, the concept of batch operating system was developed. It appears that the first batch operating system (and the first operating system of any kind) was developed in the mid-1950s by General Motors for use on an IBM 701. The concept was subsequently refined and implemented on the IBM 704 by a number of IBM customers.  

The central idea behind the batch processing  system was the use of a piece of software known as the monitor. With the use of this type of operating system, the user no longer had direct access to the machine. Rather, the user submitted the job on cards or tape to a computer operator, who batches the jobs together sequentially and places the entire batch on an input device, for use by the monitor.  Many important breakthroughs in operating system design occurred in the early 1960s which laid the foundation for design of modern operating system. 

 In 1963, Burroughs design of Master Control Program (MCP), which included design of many of the features of modern systems such as support for multiprocessing (with two identical CPUs) as well as multitasking capabilities. 

IBM introduces OS/360 as the operating system for its new System/360 in 1964. OD/360 provided a powerful language to expedite batch processing known as Job Control Language. It introduced a simple form of  multiprogramming  or multitasking feature that facilitated loading several jobs into main memory, so that other jobs programs could use the CPU when one job was busy with I/O. By this time, disks were also becoming available. To take its advantage the OS introduced features to cards onto disk while the CPU executed its jobs; thus, when a job completed, the OS could load another job from disk into memory, ready to run. This improved the OS scheduling capability. Multiprogramming or multitasking is the central theme of modern operating system.  


Related Discussions:- Simple batch systems

Indexing a page on internet, Indexing a page on internet: Once, the sp...

Indexing a page on internet: Once, the spiders have completed the task of finding information about Web pages, the search engine must store the information in such way that yo

Explain the working of bus connection, Question 1 Explain the working of B...

Question 1 Explain the working of Bus connection Question 2 Write a note on: Robotics and Voice Recognition Question 3 Describe the construction of CD-ROM Question 4

What is an array? explain, Question 1 . What is an array? Explain Qu...

Question 1 . What is an array? Explain Question 2 . What do you mean by optional arguments? Describe Question 3 . Describe in brief about interfaces Question 4

Digital wireless telephone networks, Mobile telephone networks started with...

Mobile telephone networks started with analog technology. Analog cellular networks were known as first generation (1G) networks. Such networks had limited capacity, and were subjec

What are the Software interruptions, Software interruptions can be thoroug...

Software interruptions can be thoroughly activated by the assembler invoking the number of the preferred interruption with the INT instruction. The use of interruptions aids us in

Android database file not loading on real device, i have an android app whi...

i have an android app which uses a database file called question db which is stored in the assets file. I have tried a database example called android application development but f

Data communication , (iv) Suppose that the TCP entity receives a 1.5 megaby...

(iv) Suppose that the TCP entity receives a 1.5 megabyte file from the application layer and that the IP layer is willing to carry blocks of maximum size 1500 bytes. Calculate the

Unix, How do I change file permissions? Every time I execute chmod commands...

How do I change file permissions? Every time I execute chmod commands it tells me permission denied.

Cryptography, Question 1 Consider the one-time pad encryption scheme to en...

Question 1 Consider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the eve

Software, Software: A computer system consists of two parts - hardware...

Software: A computer system consists of two parts - hardware and software. The first part, computer hardware, refers to all the visible components of the computer system:  key

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd