16. Computer Systems Basic Software 2


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Instruction Retry A function that automatically retries the execution of an instruction when a malfunction occurs Failure Management Program Records the failure circumstances, (if malfunction repeats) isolates location where failure occurred and reconstructs the system
  • Refer to Text Page 109 & 110 for MVS Configuration and it’s Characteristics
  • Refer to Text Page 110 & 111 for UNIX Configuration and it’s Characteristics
  • Refer to Text Page 111 & 112 for Windows Configuration and it’s Characteristics
  • Linux - a Unix-like operating system named for its author, Linus Torvalds. Linux was designed to provide personal computer users a free or very low-cost operating system comparable to traditional and usually more expensive UNIX systems. Although copyrights are held by various creators of Linux's components, Linux is distributed using the Free Software Foundation's copyleft stipulations that mean any copy is in turn freely available to others. Unlike Windows and other proprietary systems, Linux is publicly open and extendible by contributors. It is considered fast and reliable as both a Web server and a workstation and runs on many different kinds of hardware, including the Alpha, Amiga, Atari, IBM, Intel, PowerPC/Macintosh, SGI, and Sun Sparc platforms. Some vendors do sell collections, or distributions, of the Linux kernel, plus Linux drivers, applications, and utilities for a price. Linux is sometimes suggested as a possible publicly-developed alternative to the desktop predominance of Microsoft Windows. Although Linux is popular among users already familiar with UNIX, it remains far behind Windows in numbers of users.
  • NetWare, made by Novell, is the most widely-installed network server operating system . Initially very successful in installing its products in large and small office local area networks (LANs), Novell has redesigned (or at least refeatured) NetWare to work successfully as part of larger and heterogeneous networks, including the Internet. NetWare's primary competitor is the Microsoft Windows NT operating system.
  • 16. Computer Systems Basic Software 2

    1. 1. Part2: Computer Systems Chapter 2: Basic Software
    2. 2. File Management <ul><li>Helps the user to keep track of data and programs </li></ul><ul><li>Most data is stored in auxiliary storage devices, file handling plays an important role in data management </li></ul>
    3. 3. <ul><li>1. File system </li></ul><ul><ul><ul><li>An OS component that allows the user or </li></ul></ul></ul><ul><ul><ul><li>programmer to create, delete, modify, and </li></ul></ul></ul><ul><ul><ul><li>manipulate files and programs by name </li></ul></ul></ul><ul><ul><ul><li>File concept and configuration in low-end computers </li></ul></ul></ul><ul><ul><ul><ul><li>Files simple record character strings </li></ul></ul></ul></ul><ul><ul><ul><ul><li>There is no difference between data and programs </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Cluster – basic unit of disk space allocation, with one or more contiguous sectors </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Directory – list of files stored on a disk or other device. Often used to convert a file name to a physical address </li></ul></ul></ul></ul>File Management
    4. 4. File Management <ul><li>File system </li></ul><ul><ul><li>Cluster </li></ul></ul><ul><ul><ul><li>set of several sectors </li></ul></ul></ul><ul><ul><ul><li>I/O unit between auxiliary devices and RAM </li></ul></ul></ul><ul><ul><ul><li>When data cannot be filled in one cluster, an unused cluster is coupled and the remaining data written in this cluster. Not necessary for the coupled cluster to be contiguous. </li></ul></ul></ul>
    5. 5. File Management <ul><li>File system </li></ul><ul><ul><li>Directory </li></ul></ul><ul><ul><ul><li>Register where the file management information is recorded and stored </li></ul></ul></ul><ul><ul><ul><li>Hierarchical structure </li></ul></ul></ul><ul><ul><ul><li>Root, directories (folders), sub-directories (sub-folders) </li></ul></ul></ul>
    6. 6. File Concept
    7. 7. File Management <ul><ul><ul><li>File operation </li></ul></ul></ul><ul><ul><ul><ul><li>Directory is automatically setup by the OS when PCs or workstations start up </li></ul></ul></ul></ul><ul><ul><ul><ul><li>It is a root directory, user have access to it </li></ul></ul></ul></ul><ul><ul><ul><ul><li>User has to move to target directory in order to access a directory or file </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Directory </li></ul></ul></ul></ul><ul><ul><ul><ul><li>- Home directory : can be used by the user; user can create and access the sub-directories and files </li></ul></ul></ul></ul><ul><ul><ul><ul><li>- Current directory: directory in current use </li></ul></ul></ul></ul>
    8. 8. File Management <ul><ul><ul><ul><li>Path: the route along which to search for that file is specified. </li></ul></ul></ul></ul><ul><ul><ul><ul><li>- Absolute path: path to target directory or file from the </li></ul></ul></ul></ul><ul><ul><ul><ul><li>root directory </li></ul></ul></ul></ul><ul><ul><ul><ul><li>- Relative path: path to target directory or file from the </li></ul></ul></ul></ul><ul><ul><ul><ul><li>current directory </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Command </li></ul></ul></ul></ul><ul><ul><ul><ul><li>- A request to the OS for a service (DOS command) </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Extension and wild cards: </li></ul></ul></ul></ul><ul><ul><ul><ul><li>E.g. dir *.doc – show all files with extension DOC </li></ul></ul></ul></ul>
    9. 9. File Management <ul><ul><ul><ul><li>File operations in GUI environments </li></ul></ul></ul></ul>
    10. 10. File Management <ul><li>Hierarchical Structure </li></ul>. DIR 1 DIR 2 DIR N FILE 1 FILE 2 FILE N DIR 2.1 DIR 2.N FILE 2.1 FILE 2.N
    11. 11. Roles in File Management <ul><li>Roles </li></ul><ul><ul><li>Maintain File Allocation Table (FAT) </li></ul></ul><ul><ul><ul><li>Chain of clusters for each directory or file </li></ul></ul></ul><ul><ul><ul><li>Properties for each directory or file </li></ul></ul></ul><ul><ul><li>Read/Write Operations </li></ul></ul><ul><ul><ul><li>Exclusive write </li></ul></ul></ul><ul><ul><ul><li>Multiple reads </li></ul></ul></ul><ul><ul><li>Backup Operation </li></ul></ul>
    12. 12. Roles in File Management <ul><li>Roles </li></ul><ul><ul><li>Utilities </li></ul></ul><ul><ul><ul><li>List, copy, move, delete, and rename </li></ul></ul></ul><ul><ul><ul><li>Backup and recovery </li></ul></ul></ul><ul><ul><ul><li>Disk diagnose </li></ul></ul></ul><ul><ul><ul><li>Defragmentation </li></ul></ul></ul>
    13. 13. Security Management <ul><li>Protection of a computer and its resources from unauthorised access by persons, acts, or influences and that includes many sub-functions, such as creating, deleting, and controlling security services and mechanisms </li></ul>
    14. 14. Aims of Security Management <ul><li>Confidentiality </li></ul><ul><ul><li>Against illegal access (e.g. data encryption) </li></ul></ul><ul><li>Integrity </li></ul><ul><ul><li>Against unauthorized modification (e.g. security access list) </li></ul></ul><ul><li>Availability </li></ul><ul><ul><li>Prevents the obstruction of the use by a legitimate user </li></ul></ul>
    15. 15. Security Management <ul><li>OS performs security control through: </li></ul><ul><ul><li>Access control </li></ul></ul><ul><ul><ul><li>Permissions assigned to legitimate users, who have access to computer resources </li></ul></ul></ul><ul><ul><li>Flow control </li></ul></ul><ul><ul><ul><li>Prevents leakage of information to users that are not authorized as legitimate users </li></ul></ul></ul><ul><ul><li>Authentication </li></ul></ul><ul><ul><ul><li>Validating the user (login) </li></ul></ul></ul>
    16. 16. Failure Management <ul><li>Utility to manage failed processes </li></ul><ul><li>Utility to manage failed resources </li></ul>
    17. 17. Failure Management <ul><li>Concerned with impact of system failure: </li></ul><ul><ul><li>Instruction Retry </li></ul></ul><ul><ul><ul><li>Automatically retries execution of specific instructions when failure occurs </li></ul></ul></ul><ul><ul><li>Failure Management Program </li></ul></ul><ul><ul><ul><li>Failure circumstances are recorded if computer operates normally after retry </li></ul></ul></ul><ul><ul><ul><li>If failure occurs again after retries, location where failure occurred is isolated </li></ul></ul></ul><ul><ul><ul><li>Reconstruct the system </li></ul></ul></ul>
    18. 18. Failure Management Normal operation Retry Malfunction System reconstruction Malfunction Normal operation Failure management program Failure management program The failure circumstances are recorded The location where the failure occurred is separated Instruction retry and failure management program
    19. 19. Supervisor <ul><li>A monitoring program functioning as the central part of OS </li></ul><ul><li>Contains a command processor or shell, an I/O control system (IOCS), a file system, and interrupt handler routines </li></ul><ul><li>Performs resource distribution and program control to implement TSS (Time sharing system), multi-programming, etc. </li></ul>
    20. 20. Where to Get More Information <ul><li>Deitel, H.M., 1990, Operating Systems . (Second Edition). Addison Wesley. </li></ul><ul><li>Silberschatz, A. and Galvin, P.B., 1994, Operating System Concepts . Addison Wesley. </li></ul><ul><li>Tanenbaum, A., 1995, Distributed Operating Systems . Prentice Hall. </li></ul><ul><li>Davis Rajkumar, 2001, Operating Systems A systematic View (Fifth Edition), Addison Wesley </li></ul>
    21. 21. Operating System System disk Printer System constants and parameters Interrupt handler routines Command processor I/O Control system File system Transient area The components of a typical microcomputer operating system Resident operating system
    22. 22. OS Categories <ul><li>Real-time OS </li></ul><ul><li>Single-user, single-task OS </li></ul><ul><li>Single-user, multi-task OS </li></ul><ul><li>Network OS </li></ul><ul><li>Multi-user OS </li></ul>
    23. 23. Real-time OS <ul><li>To control machinery, scientific instruments and industrial systems </li></ul><ul><li>Usually a &quot;sealed box&quot; </li></ul><ul><ul><li>Very little user-interface capability </li></ul></ul><ul><li>Manage resources such that each operation executes in precise amount of time </li></ul>
    24. 24. Single-user, Single-task OS <ul><li>No user differentiation </li></ul><ul><li>Only one task can execute at anytime </li></ul><ul><li>Example Palm OS </li></ul>
    25. 25. Single-user, Multi-task OS <ul><li>No user differentiation </li></ul><ul><li>Multiple tasks can execute at anytime </li></ul><ul><li>Example: Windows 95 </li></ul>
    26. 26. Network OS <ul><li>User differentiation </li></ul><ul><ul><li>Separate software and hardware profiles </li></ul></ul><ul><ul><li>Only one user can operate at anytime </li></ul></ul><ul><li>Resources are shared simultaneously </li></ul><ul><li>Example: Windows 2000/XP </li></ul>
    27. 27. Multi-user OS <ul><li>User differentiation </li></ul><ul><ul><li>Separate working segment </li></ul></ul><ul><ul><li>Separate software and hardware profiles </li></ul></ul><ul><li>Resources are shared simultaneously </li></ul><ul><li>Example Unix </li></ul>
    28. 28. Types of OS <ul><li>Multiple Virtual Storage (MVS) </li></ul><ul><li>UNIX </li></ul><ul><li>Windows </li></ul><ul><li>MacOS </li></ul><ul><li>Linux </li></ul>
    29. 29. Multiple Virtual Storage (MVS) <ul><li>An old IBM mainframe operating system that continues to be used for some systems. </li></ul><ul><li>The most commonly-used operating system used on IBM mainframes; other operating systems are VM and DOS/VSE. </li></ul><ul><li>http://search390.techtarget.com/sDefinition/0,,sid10_gci212618,00.html </li></ul>
    30. 30. MVS Configuration
    31. 31. Multiple Virtual Storage (MVS) <ul><li>Characteristics: </li></ul><ul><ul><li>OS for high-end general-purpose computers </li></ul></ul><ul><ul><li>Provides multi-user function, which enables simultaneous MVS use by multiple users </li></ul></ul><ul><ul><li>Provides multi-task function, which enables simultaneous processing of multiple tasks </li></ul></ul><ul><ul><li>Adopts approach of multiple address space </li></ul></ul><ul><ul><li>One logical address space reaches up to 2GB </li></ul></ul><ul><ul><li>Contains all file organization functions </li></ul></ul>
    32. 32. UNIX <ul><li>An interactive time-sharing operating system invented in 1969 by Ken Thompson after Bell Labs left the Multics project, originally so he could play games on his scavenged PDP-7. </li></ul><ul><li>Dennis Ritchie, the inventor of C, is considered a co-author of the system. </li></ul><ul><li>http://whatis.techtarget.com/definition/0,289893,sid9_gci213253,00.html </li></ul>
    33. 33. UNIX Configuration
    34. 34. UNIX <ul><li>An OS that can be used by multiple users, which each user can simultaneously perform multiple job processing </li></ul><ul><li>Contains control program called Kernel: </li></ul><ul><ul><li>Controls the system resources </li></ul></ul><ul><ul><li>Performs process management </li></ul></ul><ul><li>Shells and commands: </li></ul><ul><ul><li>Interprets commands input by the users and calls the kernel function </li></ul></ul><ul><ul><li>Execute a program called shell script (which combines commands) </li></ul></ul>
    35. 35. UNIX <ul><li>Characteristics </li></ul><ul><ul><li>Distributed processing is presupposed </li></ul></ul><ul><ul><li>Developed assuming that would be used in workstations </li></ul></ul><ul><ul><li>Provide multi-user functions </li></ul></ul><ul><ul><ul><li>Procedure called log-in: receive service; log-out: report completion </li></ul></ul></ul><ul><ul><li>Multiprocessing function (multi-programming) </li></ul></ul><ul><ul><li>Communication protocol TCP/IP used to connect computers of different manufacturers </li></ul></ul><ul><ul><li>Use of commands in an interactive mode </li></ul></ul><ul><ul><li>Instruction rights in interactive mode – human interface e.g. X-Window </li></ul></ul><ul><ul><li>Program development tools are abundant </li></ul></ul>
    36. 36. Unix Family Tree UNICS (Uniplexed Operating and Computing System) 7 th Edition [1978] BSD (Berkeley Software Distribution) [1969] 5 th Edition [1973] 6 th Edition [1976] SVR5 (System V) [1979] [1983] Sun OS 5.x/Solaris HP HP-UX IBM AIX SGI IRIX DEC Digital UNIX (formerly OSF/1) Sun OS 4.x DEC Ultrix Canon NextStep Apple OS X
    37. 37. Why UNIX? <ul><li>Universally used for high-end number crunching applications (e.g. CAD/CAM and scientific visualisation) </li></ul><ul><li>Preferred OS platform for running internet services such as WWW, DNS, DHCP, NetNews, Mail, etc. due to networking being in the kernel for a long time now </li></ul><ul><li>Easy access to the core of the OS (the kernel) via C, C++, Perl, etc. </li></ul><ul><li>Stable operating environment </li></ul><ul><li>The availability of a network extensible window system </li></ul><ul><li>The open system philosophy </li></ul>
    38. 38. Unix Cold Boot Power-On Self Test (POST) Probing the bus for boot device ROM Reading the boot program Read in the boot kernel Initialize the system Start dummy system processes Start init Execute startup scripts
    39. 39. Unix Shut Down <ul><li>All logged on users are warned about the impending shutdown and given a chance to close files and to log out. </li></ul><ul><li>Further login may be blocked. </li></ul><ul><li>init is asked to change the run level from the multiuser state to either a single user or a safe-to-power-off state. </li></ul><ul><li>All running processes are notified that the system is going down (this allows a number of programs to save vital information to disk). </li></ul><ul><li>The system goes through the appropriate shutdown scripts to shut down running services and daemons. </li></ul><ul><li>The file systems on disks are synchronized; that is, unwritten buffers are committed to disk. </li></ul><ul><li>Machine may be powered off. </li></ul>
    40. 40. Unix Security Management <ul><li>System Level </li></ul><ul><ul><li>Login/logout </li></ul></ul><ul><ul><li>Supervisor versus user </li></ul></ul><ul><ul><li>Auditing </li></ul></ul><ul><li>File Level </li></ul><ul><ul><li>Permission modes (read, write, execute) for owner and group association for a file </li></ul></ul>
    41. 41. Unix Job Management <ul><li>Job control is basically an explicit interaction with processes via shell command </li></ul><ul><li>Three types of shell </li></ul><ul><ul><li>Bourne shell – input and output control </li></ul></ul><ul><ul><li>C shell – good for C programming </li></ul></ul><ul><ul><li>Korn shell – combining Bourne and C shell </li></ul></ul>
    42. 42. Unix Job Management <ul><li>Kernel </li></ul><ul><ul><li>Core of the operating system </li></ul></ul><ul><ul><li>Manages hardware resources like CPU, memory, input/output devices, etc. </li></ul></ul>Unix commands Interpret requests Execute requests User Shell Kernel
    43. 43. Unix Structure Shell File System Kernel Device Drivers Process Memory
    44. 44. Unix Commands UNIX DOS REMARKS tar1 backup tape archive cd cd change directory fsck chkdsk file system check clear cls clear screen cmp compare compare files cp copy copy a file date date set/show date and time rm del remove a file ls dir list directory grep find global regular expression print format format format disk mkdir md make directory more more show file page at a time lp print line printer rmdir rd remove directory set set show/set environment variables sort sort sort a file cat type concatenate a file
    45. 45. Unix File Management <ul><li>Hierarchical File System </li></ul><ul><li>Each user has his own workspace </li></ul>/ var lib dev bin usr
    46. 46. Unix Process Management <ul><li>For each new process, the kernel sets up an address space (in memory) consisting of the following logical segments: </li></ul>text data bss user stack kernel stack program's instructions initialized program's variables uninitialized program's variables variables allocated locally and parameters passed to functions in the program
    47. 47. Unix Process Management <ul><li>Mode switching </li></ul><ul><ul><li>Kernel-mode – those processes carrying out kernel instructions </li></ul></ul><ul><ul><li>User-mode – those processes, created directly by the users, whose instructions are currently executing in the CPU </li></ul></ul><ul><ul><li>At any given time, a process can be in user-mode, kernel-mode, sleeping, waiting on I/O, and so on </li></ul></ul>
    48. 48. Unix Process Management <ul><li>The process scheduling subsystem within the kernel uses a time slice of typically 20ms to rotate among currently running processes. </li></ul><ul><li>Each process is given its share of the CPU for 20ms, then left to sleep until its turn again at the CPU. </li></ul><ul><li>This process of moving processes in and out of the CPU is called context switching. </li></ul><ul><li>The kernel makes the operating system appear to be multi-tasking (i.e. running processes concurrently) via the use of efficient context-switching. </li></ul>
    49. 49. Unix Process Management <ul><li>Process States </li></ul><ul><ul><li>Resident – currently on the run queue </li></ul></ul><ul><ul><li>Sleeping – waiting on a pipe, completion of I/O, terminal input, memory </li></ul></ul><ul><ul><li>Zombie – a process with no swappable image but a structure in memory </li></ul></ul><ul><ul><li>Stop </li></ul></ul>
    50. 50. Unix Memory Management <ul><li>Virtual memory (VM) </li></ul><ul><ul><li>VM = Physical RAM + Swap space (disk space) </li></ul></ul><ul><li>Pages </li></ul><ul><ul><li>The Memory is divided into manageable chunks called pages (usually 4KB or 8KB per page) </li></ul></ul>
    51. 51. Unix Memory Management <ul><li>Caching </li></ul><ul><ul><li>When the kernel loads a page from RAM for use by the CPU, it also prefetches a number of adjacent pages and stores them in the cache. </li></ul></ul><ul><ul><li>Since programs typically use sequential memory access, the next page needed by the CPU can now be supplied very rapidly from the cache. </li></ul></ul>
    52. 52. Unix Memory Management <ul><li>Cache Memory </li></ul><ul><ul><li>The RAM cache is simply a small amount of very fast (and thus expensive) memory which is placed between the CPU and the (slower) RAM </li></ul></ul><ul><ul><ul><li>L1 cache – on-chip cache is small but fast (being on-chip) </li></ul></ul></ul><ul><ul><ul><li>L2 cache – not on-chip (thus a bit slower) and can be quite large, sometimes as big as 16MB for high-end CPUs </li></ul></ul></ul>
    53. 53. Unix Memory Management <ul><li>Demand Paging </li></ul><ul><ul><li>When a process starts in Unix, only few and not all its memory pages are read into RAM from the disk at once. </li></ul></ul><ul><ul><li>After the CPU digested the pages in RAM, a page fault occurs; signaling the kernel to load the next few pages from disk into RAM. This is called demand paging. </li></ul></ul>
    54. 54. Unix Memory Management <ul><li>Swapping </li></ul><ul><ul><li>This occurs when there is not enough physical RAM to accommodate all the processes. </li></ul></ul><ul><ul><li>It makes use of the available virtual memory by a process known as swapping. </li></ul></ul><ul><ul><li>It selects the least busy process and moves it to disk. </li></ul></ul><ul><ul><li>As more RAM becomes available, it swaps the process back in from disk into RAM. </li></ul></ul>
    55. 55. Windows <ul><li>More than half of PCs around the world is Windows </li></ul><ul><ul><li>Windows </li></ul></ul><ul><ul><li>Windows 95/98//ME </li></ul></ul><ul><ul><li>Windows NT/2000/XP (http://www.microsoft.com/windowsxp/default.asp) </li></ul></ul><ul><li>http://www.microsoft.com/ms.htm </li></ul><ul><li>http://www.mactech.com/macintosh-c/chap04-1.html </li></ul>
    56. 56. Win2K
    57. 57. Win9x configuration
    58. 58. Windows <ul><li>GUI characteristics </li></ul><ul><ul><li>Desktop approach </li></ul></ul><ul><ul><li>Multitask function </li></ul></ul><ul><ul><li>Mouse pull down menu / dialog box manipulation </li></ul></ul><ul><li>WinXP </li></ul><ul><ul><li>Strengths of security, manageability and reliability of WinNT </li></ul></ul><ul><ul><li>GUI features of Win9x and WinME </li></ul></ul><ul><ul><li>Plug-and-play </li></ul></ul><ul><ul><li>Different versions to suit different users (cost) </li></ul></ul>
    59. 59. Windows .Net Boot-up Power On Bootstrap Loader Load OS & Device drivers Launch startup Power-On Self Test Reset Initialize hardware
    60. 60. Windows .Net Security Management <ul><li>System Level </li></ul><ul><ul><li>Login/logout </li></ul></ul><ul><ul><li>Enterprise administrator, local administrator, backup operator, user </li></ul></ul><ul><ul><li>User account and computer account </li></ul></ul><ul><ul><li>Security policy and group policy </li></ul></ul><ul><ul><li>Auditing </li></ul></ul><ul><ul><li>Hibernation </li></ul></ul>
    61. 61. Windows .Net Security Management <ul><li>System Level </li></ul><ul><ul><li>RAID 0, RAID 1, and RAID 5 </li></ul></ul><ul><li>File Level </li></ul><ul><ul><li>Permission modes </li></ul></ul><ul><ul><li>Data encryption </li></ul></ul><ul><li>Printer Level </li></ul><ul><ul><li>Permission modes </li></ul></ul>
    62. 62. Windows .Net Job Management <ul><li>Two interfaces </li></ul><ul><ul><li>Command interface </li></ul></ul><ul><ul><li>Graphical interface </li></ul></ul><ul><li>Startup versus scheduled </li></ul>
    63. 63. Windows .Net File Management <ul><li>Hierarchical file system </li></ul><ul><li>Windows explorer interface </li></ul><ul><li>Virtual file system </li></ul><ul><li>Compression </li></ul>
    64. 64. Windows .Net Disk Management <ul><li>Enhanced check disk utility </li></ul><ul><li>Volume shadow copies and shadow copy restore </li></ul><ul><li>Virtual disk services </li></ul><ul><li>Area network (SAN) participation </li></ul>
    65. 65. Windows .Net Process Management <ul><li>64-bit operating system </li></ul><ul><li>Pre-emptive and prioritized multi-tasking </li></ul><ul><li>Symmetric multi-processing (SMP) </li></ul>
    66. 66. Windows .Net Memory Management <ul><li>Up to 256GB RAM </li></ul><ul><li>Dynamic virtual memory </li></ul><ul><li>Memory mirroring </li></ul><ul><li>Hot-add memory support </li></ul><ul><li>Non-uniform memory access </li></ul>
    67. 67. Windows .Net Failure Management <ul><li>Update service patches and hot fixes without restart </li></ul><ul><li>Automated system recovery </li></ul>
    68. 68. MacOS <ul><li>Developed by Apple Computer for Macintosh </li></ul><ul><li>http://www.apple.com/ </li></ul>
    69. 69. MacOS <ul><li>Almost all operations can be performed with the mouse </li></ul><ul><li>Consistent GUI </li></ul><ul><li>GUI elements are abundant, hence claims to be “easy” for beginners </li></ul><ul><li>Different versions for different types of users </li></ul><ul><ul><li>Mac OS X </li></ul></ul><ul><ul><li>Mac OS X Server </li></ul></ul><ul><ul><li>Rhapsody </li></ul></ul><ul><li>Latest Mac OS X 10.1.1 provides improved USB, FireWire, and Networking support </li></ul>
    70. 70. OS X Interface
    71. 71. OS X <ul><li>Features </li></ul><ul><ul><li>Multi-user </li></ul></ul><ul><ul><li>Virtual file system </li></ul></ul><ul><ul><li>Symmetric multi-processing (SMP) </li></ul></ul><ul><ul><li>Basic threading packages </li></ul></ul><ul><ul><li>Pre-emptive multi-tasking </li></ul></ul><ul><ul><li>Virtual memory with memory protection and dynamic memory allocation </li></ul></ul>
    72. 72. Linux <ul><li>UNIX-based OS launched in 1991 by Linus Torvalds </li></ul><ul><li>The software is free: source code released to public </li></ul><ul><li>Copyright is protected by GPL (GNU Public License) </li></ul>
    73. 73. Network OS <ul><li>OS used to construct LANs </li></ul><ul><li>SNMP functions </li></ul><ul><li>Netware </li></ul><ul><ul><li>Developed by Novell </li></ul></ul><ul><ul><li>File sharing / printer sharing functions </li></ul></ul><ul><li>LAN Manager </li></ul><ul><ul><li>Distributed file system developed and supported by Microsoft </li></ul></ul>
    74. 74. Middleware <ul><li>A class of software that helps with the translation of messages and communications between client and servers </li></ul><ul><li>Any set of routines or functions that allow two dissimilar programs to interoperate </li></ul><ul><ul><li>Database Management System (DBMS) </li></ul></ul><ul><ul><li>Communication Management System </li></ul></ul><ul><ul><li>Software Development Support Tool </li></ul></ul><ul><ul><li>Operation Management Tool </li></ul></ul><ul><ul><li>Object Request Broker (ORB) </li></ul></ul>
    75. 75. Database Management System <ul><li>Aimed at efficient database creation/maintenance/operation </li></ul><ul><li>3 main characteristics </li></ul><ul><ul><li>Integrity: prevents generation of data inconsistently </li></ul></ul><ul><ul><li>Security: protect data secrecy by setting database access rights </li></ul></ul><ul><ul><li>Failure recovery: failure and recovery plan to recover database promptly in the event that database fails </li></ul></ul>
    76. 76. Communication Management System <ul><li>Aimed at supporting computer network construction/operation </li></ul><ul><li>3 main characteristics </li></ul><ul><ul><li>Network Independence </li></ul></ul><ul><ul><li>Network Flexibility: provides flexibility to devices and network mechanism; construction of network systems with high expandability is enabled </li></ul></ul><ul><ul><li>Network Transparency </li></ul></ul>
    77. 77. Software Development Support Tool <ul><li>Supports computer-aided software development </li></ul><ul><li>Aimed at achieving development labour savings and software quality improvements </li></ul><ul><li>CASE tools </li></ul><ul><ul><li>Upstream CASE tools: support high-end process (e.g. analysis, design, etc) of software development </li></ul></ul><ul><ul><li>Downstream CASE tools: support lower-end process (e.g. programming, testing, etc)of software development </li></ul></ul><ul><ul><li>Maintenance CASE tools: support operation and maintenance of developed software </li></ul></ul><ul><ul><li>Integrated CASE tools: support overall functions from upstream to maintenance CASE tools </li></ul></ul>
    78. 78. Operation Management Tool <ul><li>Aimed at supporting the operation duties of system operation </li></ul><ul><li>Characteristics </li></ul><ul><ul><li>Multiplicity optimization of multi-programming </li></ul></ul><ul><ul><li>Allocation of system resources to reduce response time at peak periods </li></ul></ul><ul><ul><li>Grasp of operating conditions of system resources </li></ul></ul><ul><ul><li>Recording of a ccounting information and creation of summaries </li></ul></ul><ul><ul><li>Logging of operation records </li></ul></ul>
    79. 79. Object Request Broker <ul><li>It is the programming technique that acts as a &quot;broker&quot; between a client request for a service from a distributed object or component and the completion of that request </li></ul><ul><li>Having ORB support in a network means a client program can request a service without having to understand where the server is in a distributed network or exactly what the interface to the server program looks like </li></ul><ul><li>Components can find out about each other and exchange interface information as they are running </li></ul><ul><li>An ORB uses the CORBA Interface Repository to find out how to locate and communicate with a requested component </li></ul><ul><li>http://searchmiddleware.techtarget.com/sDefinition/0,,sid26_gci214209,00.html </li></ul>