12.07.2015 Views

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Computer Networks and Security 265Chapter 7Computer NetworksAnd SecurityDur<strong>in</strong>g <strong>the</strong> early days of <strong>the</strong> computers <strong>in</strong> <strong>the</strong> mid-1960s, <strong>the</strong>computer environment consisted of large ma<strong>in</strong>frames withremote term<strong>in</strong>als connected to <strong>the</strong> ma<strong>in</strong>frame. These largecomputers required special environmentally controlled computerrooms. Both <strong>the</strong> computers and <strong>the</strong> rooms were expensive to buildand required tra<strong>in</strong>ed personnel for <strong>in</strong>put and output and ma<strong>in</strong>tenance.Later, <strong>the</strong>se large computers would grow smaller and some applicationswould be served by m<strong>in</strong>icomputers that did not need special rooms. Theremote term<strong>in</strong>al system was <strong>the</strong> ma<strong>in</strong> user-computer <strong>in</strong>terface untilaround 1980, when <strong>the</strong> first personal computers were <strong>in</strong>troduced.The early methods of comput<strong>in</strong>g had many disadvantages as wellas some advantages. The comput<strong>in</strong>g environment allowed multiple usersto access one computer. These users had access to <strong>the</strong> same applicationsand files and had some capability of transmitt<strong>in</strong>g and receiv<strong>in</strong>gmail electronically. Centralized management of <strong>the</strong> computer was possible.The management of user accounts, files and <strong>the</strong> hardware wasdone by a group of specialists. The costs of runn<strong>in</strong>g <strong>the</strong> cables for <strong>the</strong>user term<strong>in</strong>als were <strong>the</strong> second most expensive part of <strong>the</strong> computer<strong>in</strong>stallation besides <strong>the</strong> cost of <strong>the</strong> computer itself.This comput<strong>in</strong>g environment was known as centralized comput<strong>in</strong>g.If <strong>the</strong> ma<strong>in</strong>frame or m<strong>in</strong>icomputer went down, all of <strong>the</strong> users wereaffected and would rema<strong>in</strong> idle until <strong>the</strong> computer became operational.These breakdowns were common especially where <strong>the</strong> term<strong>in</strong>als wereseparated at some distance from <strong>the</strong> computer. The breakdowns werecostly s<strong>in</strong>ce <strong>the</strong> users were unproductive until <strong>the</strong> computer was operational.The user term<strong>in</strong>als were known as dumb term<strong>in</strong>als, s<strong>in</strong>ce <strong>the</strong>y hadvery little <strong>in</strong>telligence with most of <strong>the</strong> host-term<strong>in</strong>al <strong>in</strong>terface process<strong>in</strong>gdone on <strong>the</strong> ma<strong>in</strong>frame.©2001 by The Fairmont Press, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!