Sunday, April 7, 2019

Network Operating Systems Essay Example for Free

meshing Operating governing bodys EssayMulti businessing is when the run system seems to be per wee-weeing two or more tasks at the same duration, i.e. MS name and MS Access, however these tasks ar not re exclusively toldy running simultaneously as they atomic number 18 echtly resident in memory processor is actu exclusivelyy switching between tasks at a in truth high speed, t here(predicate)fore each consumptionr sees their own task as having priority. One disadvantage feces be that the more programs that are run by the exploiter, the more memory that is requi ruddy. Multi Tasking tail be abrupt into two categories, co-operative and pre-emptive.Co-operative is when the process currently surmountling the CPU must offer a balanced dower of the CPU to all separate processes, hence Co-operative, as all processes must co- work out for it to work properly. Subsequently an MUOS allow allow two or more delectationrs a consider of the system resources at the same time. The use of the resources must be spread evenly between the requirements of the users so that a problem with one user does not become a problem between all users. Examples of co-operative multi tasking would be Windows 3x and Macintosh.Pre-emptive is when the applications are forced to share the CPU whether they want to or not and typesetters cases of this are Windows 95, NT and UNIX.How target sharing ladders?NOS A print boniface allows multiple users gateway to a single printer. A print legion result to a fault cash in ones chips you information on the use of the printer. All print jobs are sent to a Network Printer, controlled by the emcee, where they will wait in turn to be printed. For example, you give the axeSee how many people are using the printerSet limits to the usageGive higher priority to whatsoever workstations, allowing them to print in advance otherwisesSee who is currently printing orSee when your print job is coming up.MUOS The Multi-User Operat ing trunk Linux uses a printing system called LPD, which constantly runs as a background process and acts as a spooler for files when they are required to be printed. Spooling (Simultaneous Peripheral Operations On-Line) is where all input/output of non-shareable devices is redirected to an medium shareable device. This is done, for example to stop other processes queuing for long periods of time to access a certain device. The most common form of spooling would be print spooling, where documents are printed at the printers own rate after existence loaded into an intermediate shareable area (buffer).) is where all input/output of non-shareable devices is redirected to an intermediate shareable device. This is done, for example to stop other processes queuing for long periods of time to access a certain device. The most common form of spooling would be print spooling, where documents are printed at the printers own rate after being loaded into an intermediate shareable area (buffer ). governance Failure and ruggednessOn a MUOS, data must be backed up on a fixity basis, as if the server goes down thusly all unsaved work or data on the network is lost. It is therefore necessary to make a hard copy of all- in-chief(postnominal) data. It is also important to have a recovery disc made upon installation. However, on a Network Operating arranging there is a system failure then only the unsaved data on the actual client is lost and not across the entire Network. The clients will still be almost richly operational without the server itself.A Multi-User Operating System tends to be a lot more robust than a Network Operating System. It is widely recognised that windows in particular is very unpredictable at times and is prone to fatal errors. This is not the case with the likes of Unix or Linux.Application, file sharing and file secureFile sharing is a very important part of a Network Operating System. Users will continuously need to access and share the same fil es across a network and giving them usernames and passwords so-and-so do this. However if two or more users were to try and access the same file (for example, a Word document) at the same time and both users on the Network had read and write access, then only one user would be granted access at a time and the other would be denied. This concept is cognize as File Locking. This could be looked upon as a basic profession system, if you like, where as soon as one user has access to a file then the red light is switched on. Then, when the first user has finished with the particular file, the green light shows and the second user is relieve to access the data. In a Multi User Operating System, you would find a distinct method acting known as NFS (Network File System). This is a where the server or Network executive director loafer control which users can have which type of access to different applications or files at specific times.ComparisonArchitecture ClientsA Network Operatin g System uses a Graphical User Interface, as it is part of the Microsoft Windows family, which are all GUIs. This makes the Operating System much easier to use in many ways much(prenominal) as being more user friendly and easier to learn.However a Multi-User Operating System like Unix for example would use a Command Line Interface. This has its good and bad points being that the user has greater level of control over commands the System is more stable and does not use excessive system resources. On the other hand, the users wouldhave to familiarise themselves with a lot of commands which can be time consuming. Both have the summation as the heart of the Operating System. This is the part of the in operation(p) system that loads first, and it re chief(prenominal)s in main memory and typically, is responsible for memory management, I/O system management, file system management, process and task management and scheduling, and disk management. The Kernel is intrinsicly the nucleus o f the operating system that provides basic services for all other components of the operating system. For each process, the Kernel holds a process identifier, the user identity and the size and view of the process. A Network Operating System and a Multi-User Operating System will normally operate using thickheaded and Thin clients respectivelyThin ClientNo hard disk on clientConnected to a serverApplications run on serverData stored on serverMouse, Video, Keyboard etc. through which you can access serverCan fight sound, compact disc read-only memory etc.Thick ClientClient has own hard diskClient has storage spaceClient can have own applications storedETC.Basically the opposite of Thin clientsA Network Operating System can support many hundreds of clients across a Local Area Network as can a Multi User Operating System.Protocols and InternetworkingIn order for a Network Operating System to transport or receive data, the data must be broken down into packets by a method called a protocol. Windows NT uses the IPX/SPX, NetBEUI, and transmission control protocol/IP protocols for network communication. Netware uses IPX/SPX. UNIX, Linux, and the Internet all use transmission control protocol/IP. While different protocols usually cannot talk directly with each other, most Network Operating Software can perceive more than one protocol. This also adds the possibility of Internetworking for most Network operating Systems as they can run freely over different Networks unlike MUOS.Both types of operating system (NOS and MUOS) have built-in transmission control protocol/IP networking, for communications across all forms of networks, and between all forms of computers. Other Protocols and the respective layers of the OSI models at which they operate are shown here Application Telnet, HTMLPresentation SMB, NCPSession NETBIOS (NETBEUI)Transport TCPNetwork IP. TCP/IP, IPX/SPXData Link EthernetPhysical RadioScalabilityMulti User Operating Systems are far more scalab le because they can run on literally every hardware platform, from the slowest hardware to the worlds fastest. Additionally, most UNIX operating systems support more than one processor, so a machine configured with 4 processors can support many more users than a machine with one processor of the same type.SecuritySecurity measures are very important on any Operating System. On a Network operating System such as Win 2000 server it would be fairly promiscuous to install some sort out of security software (Firewall) such as one of the Norton Internet Security packages. Anti-virus software is also right away available and very widely used. With a Multi-User Operating System such as Unix, there are a number of security tools available to download as throw overboardware that perform a vast legions of different tasks relating to security.Hardware requirements the Typical Hardware requirements for installing two different Operating Systems (Linux and windows 2000 server) are shown here below (minimum and recommended)MUOS (Linux)Minimum Requirements200 MHZ Processor required32MB RAM650MB Hard DriveCD-ROMNetwork instrument panelNOS (Windows 2000 Server)Minimum RequirementsPentium compatible 133MHZ or faster128MB RAM2GB Hard Drive1GB FreeRecommended RequirementsPentium II 200MHZ256 MB RAM9GB Hard Drive2GB FreeCD RomNetwork CardCostsFinancially, Multi-User a Operating System would be much more viable than a Network Operating System due to the fact that the MUOS can use dumb Terminals, which basically means that the mass of the hardware and more importantly software is on the actual server i.e. the clients (workstations) have only the essential components needed to operate. These would includeKeyboard, Mouse, monitor etc. however in the event of having a very larger Network this could in effect end up equally as costly as a Network Operating System.Role of Network AdministratorThe role of a network administrator in large companies and consulting firms may be only m anaging network servers, adding users, and adding printers. However, most network administrators also do some desktop support as well as controlling network addresses, protocols used, and the network interfaces because these are all obviously network components. The network administrator will also control routing, name resolution, and assignment of TCP and UDP socket numbers because, again, these are all pretty clearly network specific components. In small companies, periodic network administration is often not a full time job and is assigned as a part-time task to someone in the office. To troubleshoot a network you must understand things, such as how individual PCs work, general networking concepts, and product specific features.A network administrator is a carriage not of people but of computing resources. A network administrator is creating and managing user accounts, installing and maintaining print services, ensuring that the network is running smoothly and that the computer s are running efficiently, maintaining the integrity of the network, handling user complaints, and so forth. Users would be allowed access to system resources by means of a user account, which would be set up and then users would be allocated a username and password(s). This would allow the Network Administrator to set different security levels for different clients and users. For example, at bottom a company or Business, you would have different levels of access for different levels of staff members with management having access to more resources and data than perhaps an office junior etc.A network administrator should be able to manage resources by doing the followingCreating, managing and utilizing Windows 2000 shared folders victimisation the Distributed File System to provide easy access to network resourcesUsing the Windows 2000 events logs to monitor system and application activitiesUsing the Task Manager to respect and monitor resourcesUsing the System Monitor in the Perfo rmance tool to optimize performanceUsing security policies to protect data and system integrityUsing auditing to track security eventsThe Network Administrator is also responsible for budgeting decisions regarding the Network itself. This would involve very closely monitoring each and every client, reservation decisions on whether new hardware or software is required and when. Any Firewalls or Antivirus software would also have to be updated continuously.Bibliographyhttp//www.north.ecasd.k12.wi.us/Departments/TCS/Web%20Pages/Powerpoints/IT%20Essentials%202%20NOS%20chpt%206%203-03.ppthttp//www.pctechguide.com/29network.htmClient-Serverhttp//www.webopedia.com/TERM/N/network.htmlhttp//www.microsoft.com/windows2000/server/default.asphttp//www.k12.hi.us/tethree/95-96/landesign/G02/WHAT.htmlhttp//compnetworking.about.com/cs/networknos/index.htmhttp//suned.sun.com/US/catalog/courses/EC-425.htmlhttp//www.microsoft.com/windows2000/server/evaluation/business/overview/scalable/default.asphttp //www.devdaily.com/unix/edu/UnixSysAdmin/node2.shtmlhttp//www.linksys.com/edu/nos.asphttp//www-personal.umd.umich.edu/salmadra/common.htmhttp//linux.oreillynet.com/pub/a/linux/2000/07/20/LinuxAdmin.htmlhttp//www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/introint.htmxtocid2http//www.cert.org/tech_tips/unix_security_checklist2.0.htmlhttp//www.cert.org/tech_tips/usc20_full.htmlA13Dick, David (2002) The P.C. Support Handbook. Kirkintilloch Dumbreck make

No comments:

Post a Comment