Thursday, June 6, 2019
Network Operating Systems Essay Example for Free
meshing operate dodgings EssayMulti tasking is when the operating dodging seems to be playing two or more tasks at the alike time, i.e. MS Word and MS Access, however these tasks are not actu on the wholey running simultaneously as they are actually resident in memory mathematical processor is actually switching between tasks at a very high speed, therefore individually practice sessionr sees their own task as having priority. One disadvantage kindle be that the more programs that are run by the drug user, the more memory that is required. Multi Tasking can be split into two categories, co-operative and pre-emptive.Co-operative is when the process currently controlling the CPU must offer a balanced share of the CPU to all separate processes, hence Co-operative, as all processes must co-operate for it to work properly. Subsequently an MUOS will allow two or more users a share of the system resources at the same time. The use of the resources must be spread evenly b etween the requirements of the users so that a problem with one user does not become a problem between all users. Examples of co-operative multi tasking would be Windows 3x and Macintosh.Pre-emptive is when the applications are forced to share the CPU whether they want to or not and examples of this are Windows 95, NT and UNIX.How print communion operates?NOS A print server allows multiple users introduction to a single printer. A print server will also give you information on the use of the printer. All print personal credit lines are sent to a Network Printer, controlled by the server, where they will wait in turn to be printed. For example, you canSee how umpteen people are using the printerSet limits to the usageGive higher priority to some workstations, allowing them to print before othersSee who is currently stamp orSee when your print job is coming up.MUOS The Multi-User operating(a) agreement Linux uses a printing system called LPD, which constantly runs as a backgrou nd process and acts as a spooler for files when they are required to be printed. Spooling (Simultaneous Peripheral Operations On-Line) is where all input/output of non-shareable devices is redirected to an intermediate shareable device. This is done, for example to stop other processes queuing for grand periods of time to plan of attack a definite device. The most common form of spooling would be print spooling, where documents are printed at the printers own rate after be loaded into an intermediate shareable area (buffer).) is where all input/output of non-shareable devices is redirected to an intermediate shareable device. This is done, for example to stop other processes queuing for long periods of time to access a certain device. The most common form of spooling would be print spooling, where documents are printed at the printers own rate after being loaded into an intermediate shareable area (buffer). frame Failure and RobustnessOn a MUOS, data must be backed up on a regul ar basis, as if the server goes shine then all unsaved work or data on the meshwork is lost. It is therefore necessary to make a hard copy of of the essence(predicate) data. It is also important to have a recovery disc made upon prepareation. However, on a Network direct System there is a system failure then only the unsaved data on the actual client is lost and not across the entire Network. The clients will still be almost fully operational without the server itself.A Multi-User Operating System tends to be a lot more robust than a Network Operating System. It is wide recognised that windows in donationicular is very unpredictable at times and is prone to fatal errors. This is not the case with the likes of Unix or Linux.Application, file sharing and file lockingFile sharing is a very important part of a Network Operating System. Users will continuously need to access and share the same files across a network and giving them usernames and passwords can do this. However if t wo or more users were to try and access the same file (for example, a Word document) at the same time and both users on the Network had read and write access, then only one user would be granted access at a time and the other would be denied. This concept is known as File Locking. This could be looked upon as a basic traffic system, if you like, where as soon as one user has access to a file then the red light is switched on. Then, when the first user has finished with the particular file, the green light shows and the second user is free to access the data. In a Multi User Operating System, you would find a variant method known as NFS (Network File System). This is a where the server or Network Administrator can control which users can have which type of access to different applications or files at specific times.ComparisonArchitecture ClientsA Network Operating System uses a Graphical User Interface, as it is part of the Microsoft Windows family, which are all GUIs. This makes t he Operating System much easier to use in many ways such as being more user social and easier to learn.However a Multi-User Operating System like Unix for example would use a Command Line Interface. This has its good and bad points being that the user has great level of control over commands the System is more stable and does not use excessive system resources. On the other hand, the users wouldhave to familiarise themselves with a lot of commands which can be time consuming. Both have the subject matter as the heart of the Operating System. This is the part of the operating system that loads first, and it clay in main memory and typically, is responsible for memory management, I/O system management, file system management, process and task management and scheduling, and disk management. The Kernel is essentially the nucleus of the operating system that provides basic services for all other components of the operating system. For each process, the Kernel holds a process identifi er, the user identicalness and the size and location of the process. A Network Operating System and a Multi-User Operating System will normally operate using Thick and minute clients respectivelyThin ClientNo hard disk on clientConnected to a serverApplications run on server entropy stored on serverMouse, Video, Keyboard etc. through which you can access serverCan support sound, CD-ROM etc.Thick ClientClient has own hard diskClient has storage spaceClient can have own applications storedETC.Basically the opposite of Thin clientsA Network Operating System can support many hundreds of clients across a Local Area Network as can a Multi User Operating System.Protocols and InternetworkingIn order for a Network Operating System to send or receive data, the data must be broken down into packets by a method called a protocol. Windows NT uses the IPX/SPX, NetBEUI, and transmission control protocol/IP protocols for network communication. Netware uses IPX/SPX. UNIX, Linux, and the Internet all use TCP/IP. While different protocols usually cannot talk this instant with each other, most Network Operating Software can understand more than one protocol. This also adds the possibility of Internetworking for most Network operating Systems as they can communicate freely over different Networks unlike MUOS.Both types of operating system (NOS and MUOS) have built-in TCP/IP networking, for communications across all forms of networks, and between all forms of computers. Other Protocols and the respective layers of the OSI models at which they operate are shown here Application Telnet, HTMLPresentation SMB, NCPSession NETBIOS (NETBEUI)Transport TCPNetwork IP. TCP/IP, IPX/SPXData Link EthernetPhysical RadioScalabilityMulti User Operating Systems are far more scalable because they can run on literally every ironware platform, from the slowest hardware to the worlds fastest. Additionally, most UNIX operating systems support more than one processor, so a machine configured w ith 4 processors can support many more users than a machine with one processor of the same type.SecuritySecurity measures are very important on any Operating System. On a Network operating System such as Win cc0 server it would be fairly easy to install some sort of credentials software (Firewall) such as one of the Norton Internet Security packages. Anti-virus software is also readily available and very widely used. With a Multi-User Operating System such as Unix, there are a number of guarantor tools available to download as Freeware that perform a vast array of different tasks relating to security. aphonicware requirements the Typical Hardware requirements for installing two different Operating Systems (Linux and windows 2000 server) are shown here below (minimum and recommended)MUOS (Linux)Minimum Requirements200 MHZ Processor required32MB RAM650MB Hard DriveCD-ROMNetwork CardNOS (Windows 2000 Server)Minimum RequirementsPentium compatible 133MHZ or faster128MB RAM2GB Hard Driv e1GB FreeRecommended RequirementsPentium II 200MHZ256 MB RAM9GB Hard Drive2GB FreeCD RomNetwork CardCostsFinancially, Multi-User a Operating System would be much more viable than a Network Operating System due to the fact that the MUOS can use dumb Terminals, which essentially means that the majority of the hardware and more importantly software is on the actual server i.e. the clients (workstations) have only the essential components needed to operate. These would includeKeyboard, Mouse, superintend etc. however in the event of having a very large Network this could in effect end up equally as dear(p) as a Network Operating System.Role of Network AdministratorThe role of a network administrator in large companies and consulting firms may be only managing network servers, adding users, and adding printers. However, most network administrators also do some desktop support as well as controlling network addresses, protocols used, and the network interfaces because these are all obv iously network components. The network administrator will also control routing, name resolution, and assignment of TCP and UDP socket numbers because, again, these are all pretty clearly network specific components. In small companies, day-to-day network administration is often not a full time job and is assigned as a part-time task to someone in the office. To troubleshoot a network you must understand things, such as how individual PCs work, oecumenical networking concepts, and product specific features.A network administrator is a manager not of people but of computing resources. A network administrator is creating and managing user accounts, installing and maintaining print services, ensuring that the network is running smoothly and that the computers are running efficiently, maintaining the integrity of the network, handling user complaints, and so forth. Users would be allowed access to system resources by means of a user account, which would be set up and then users would be allocated a username and password(s). This would allow the Network Administrator to set different security levels for different clients and users. For example, within a company or Business, you would have different levels of access for different levels of staff members with management having access to more resources and data than peradventure an office junior etc.A network administrator should be able to manage resources by doing the followingCreating, managing and utilizing Windows 2000 shared foldersUsing the Distributed File System to provide easy access to network resourcesUsing the Windows 2000 events logs to monitor system and application activitiesUsing the Task Manager to observe and monitor resourcesUsing the System Monitor in the Performance tool to optimize performanceUsing security policies to protect data and system integrityUsing auditing to track security eventsThe Network Administrator is also responsible for budgeting decisions regarding the Network itself. This w ould involve very closely monitoring each and every client, making decisions on whether new hardware or software is required and when. Any Firewalls or Antivirus software would also have to be updated continuously.Bibliographyhttp//www.north.ecasd.k12.wi.us/Departments/TCS/Web%20Pages/Powerpoints/IT%20Essentials%202%20NOS%20chpt%206%203-03.ppthttp//www.pctechguide.com/29network.htmClient-Serverhttp//www.webopedia.com/TERM/N/network.htmlhttp//www.microsoft.com/windows2000/server/default.asphttp//www.k12.hi.us/tethree/95-96/landesign/G02/WHAT.htmlhttp//compnetworking.about.com/cs/networknos/index.htmhttp//suned.sun.com/US/catalog/courses/EC-425.htmlhttp//www.microsoft.com/windows2000/server/evaluation/business/overview/scalable/default.asphttp//www.devdaily.com/unix/edu/UnixSysAdmin/node2.shtmlhttp//www.linksys.com/edu/nos.asphttp//www-personal.umd.umich.edu/salmadra/common.htmhttp//linux.oreillynet.com/pub/a/linux/2000/07/20/LinuxAdmin.htmlhttp//www.cisco.com/univercd/cc/td/doc/cisin twk/ito_doc/introint.htmxtocid2http//www.cert.org/tech_tips/unix_security_checklist2.0.htmlhttp//www.cert.org/tech_tips/usc20_full.htmlA13Dick, David (2002) The P.C. Support Handbook. Kirkintilloch Dumbreck Publishing
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.