SlideShare a Scribd company logo
1 of 322
Download to read offline
Arthur D. Ollanda
Global Education Services
AMA University
11/8/2013
Principles of Operating System
2
Principles of Operating System
Preface
Many years ago, after the computer was introduced, it became the one of the most in-
demand man-made machine. The computer can use anytime, no matter how big or small the
device, as long as it is operational, the user can surf the net, do the office or home works and
even can play a game. It never runs without software, that leads the machine to do some task
and the interface of the user that can control and manage the system of the computer, and
these are all about the "Operating System".
Operating System sometimes referred as "OS", this software manages computer
hardware resources and provides common services for a computer programs. This Lecture
Manual, "Principles of Operating System" provides the concept and importance of software that
translates the human to machine language communication to execute a certain tasks. It
describes the architecture and design of the system, and it also includes the central processing
unit scheduling that shows the preemptive and non-preemptive events and style of a processor.
The main focus of this lecture manual are Configuring the Windows 7 Client and Basic
Administration, it introduces the previous and the recent Microsoft Operating System that shows
of what makes the Microsoft Windows became more popular than ever. The Windows 7
Operating System shows the differences from earlier version and the new features included
from there editions. These enhanced the ability, capability and security of the system that the
user has never been experienced before. It can explore the new interface of the net using the
Internet Explorer 8, 9, 10 and 11, improved the mobility of Windows that brought up the level of
wireless technology. And also include the explanation of some basic operations in Windows
Server 2008 R2. This lecture manual defines each modules, chapters and topics of the course
with understandable exercises and assessments that will develop the skills of a computer
student. It will serve as the references course for Microsoft Certified Technology Specialist
certification exam.
3
Principles of Operating System
Acknowledgement
The Global Education Services personnel are grateful to Almighty God to reproduce this
lecture manual about the "Principles of Operating System; Configuring Windows 7 Client"
and it is a privilege for us to provide the necessary materials through Microsoft as the additional
references of our faculty and students to explore and experience the growth of computer
technology.
We wish to express our gratitude to our Chairman, Amable R. Aguiluz V for giving us an
opportunity to be part of AMA Education System that molds us in the world of Information
Technology. To our President, Amable C. Aguiluz IX to offer his trust to face the challenge in
many competition and to become more competitive.
We are sincerely thanks the GES Head, Christopher P. Satulan for the motivation he
gave us in every task that we have been through in our academic alliances and for being a good
team leader.
In addition, a many thanks to Academic Affairs Department Head, Dr. Alma V. Dela Cruz
for allowing us to be a part of supporting and enhancing academic excellence of our institution.
We also place on record, our sense of gratitude to one and all who, directly or indirectly,
have lent their helping hand in this scheme.
Thank you
Arthur D. Ollanda
AMAES - GES
4
Principles of Operating System
Table of Contents
Preface ....................................................................................................................................2
Acknowledgement ....................................................................................................................3
Table of Contents .....................................................................................................................4
Principles of Operating System
Introduction...................................................................................................................5
Part 1: The Concepts of Operating System.................................................................................6
Functions of Operating System......................................................................................7
Types of Operating System...........................................................................................8
Operating System as User Interface...............................................................................9
I/O System Management...............................................................................................11
Assessment Part 1
Exercise 1....................................................................................................................13
The CPU Scheduling
CPU Scheduler.............................................................................................................15
First Come, First Served Scheduling..............................................................................18
Shortest-Job-First Scheduling........................................................................................19
Priority Scheduling........................................................................................................21
Round Robin Scheduling...............................................................................................21
Multi-Level Queue Scheduling........................................................................................23
Exercise 2....................................................................................................................27
Part 2: Microsoft Windows Operating System: Configuring Windows 7 Client
Background
The Early Version..............................................................................................31
Windows 9X.....................................................................................................32
Windows NT.....................................................................................................33
Windows XP.....................................................................................................33
Windows Vista 7 and 8......................................................................................34
Microsoft Windows 7
Module 1: Understanding Network Infrastructure..............................................................35
Lesson 1: Network Architecture Standards...........................................................36
Lesson 2: Local Area Network..............................................................................39
Lesson 3: Wide Area Network...............................................................................42
Lesson 4: Wireless Networking.............................................................................44
Lesson 5: Connecting to the Internet.....................................................................47
Lesson 6: Firewall ...............................................................................................48
Lesson 7: The OSI Model ....................................................................................50
Lesson 8: Understanding Adapters, Hub and Switches ..........................................51
Lesson 9: Understanding Routing .........................................................................54
Lesson 10: Understanding Media Types ................................................................57
Module 2: Windows Server Roles
Windows Server 2008 R2 ..................................................................................................62
Lesson 1: Role-Based Deployment.........................................................................63
Lesson 2: Deploying Role-Specific Servers ............................................................68
Module 3: Installing, Upgrading and Migrating to Windows 7
Overview
Lesson 1: Preparing to Install Windows 7 ................................................................71
Lesson 2: Performing a Clean Installation of Windows 7 ...........................................79
Lesson 3: Upgrading and Migrating to Windows 7 ....................................................81
Lesson 4: Performing an Image-Based Installation of Windows 7 .............................90
Lesson 5: Configuring Application Compatibility ......................................................107
Module 4: Implementing User Accounts and Groups ........................................................................113
Lesson 1: User Accounts ........................................................................................114
Lesson 2: The Domain Controller .............................................................................116
5
Principles of Operating System
Lesson 3: Managing Users, Group and Computers ....................................................118
Lesson 4: Implementing Organizational Units ...........................................................127
Lesson 5: Implementing Group Policy .....................................................................130
Module 5: Configuring Disks and Drivers
Lesson 1: Partitioning Disks in Windows 7 ..............................................................135
Lesson 2: Managing Disk Volumes .........................................................................139
Lesson 3: Maintaining Disks in Windows 7 ..............................................................145
Lesson 4: Installing and Configuring Device Drivers .................................................149
Module 6: Configuring File Access and Printers on Windows 7 Clients
Lesson 1: Overview of Authentication and Authorization ...........................................164
Lesson 2: Managing File Access in Windows 7 ........................................................168
Lesson 3: Managing Shared Folders .......................................................................176
Lesson 4: Configuring File Compression .................................................................183
Lesson 5: Managing Printing ...................................................................................189
Module 7: Configuring Network Connectivity
Lesson 1: Configuring IPv4 Network Connectivity .....................................................201
Lesson 2: Configuring IPv6 Network Connectivity .....................................................208
Lesson 3: Implementing Automatic IP Address Allocation
Lesson 4: Overview of Name Resolution
Lesson 5: Troubleshooting Network Issues
Module 8: Configuring Wireless Network Connections
Lesson 1: Overview of Wireless Network
Lesson 2: Configuring Wireless Network
Module 9: Securing Windows 7 Desktops
Lesson 1: Overview of Security Management in Windows 7
Lesson 2: Securing a Windows 7 Client Computer by Using Local Security Policy
Settings
Lesson 3: Securing Data by Using EFS and BitLocker
Lesson 4: Configuring Application Restrictions
Lesson 5: Configuring User Account Control
Lesson 6: Configuring Windows Firewall
Lesson 7: Configuring Security Settings in Internet Explorer 8
Lesson 8: Configuring Windows Defender
Module 10: Optimizing and Maintaining Windows 7 Client Computers
Lesson 1: Maintaining Performance by Using the Windows 7 Performance Tools
Lesson 2: Maintaining Reliability by Using the Windows 7 Diagnostic Tools
Lesson 3: Backing Up and Restoring Data by Using Windows Backup
Lesson 4: Restoring a Windows 7 System by Using System Restore Points
Lesson 5: Configuring Windows Update
Module 11: Configuring Mobile Computing and Remote Access in Windows 7
Lesson 1: Configuring Mobile Computer and Device Settings
Lesson 2: Configuring Remote Desktop and Remote Assistance for Remote Access
Lesson 3: Configuring DirectAccess for Remote Access
Lesson 4: Configuring BranchCache for Remote Access
6
Principles of Operating System
Principles of Operating System
Introduction
Turn on your computer, know that you are in control. There is the trusty
computer mouse, which you can move anywhere on the screen, summoning up your music
library, pictures, videos or Internet browser at the slightest whim. Although it is easy to feel like
being a director in front of your desktop and you might wondering how the machine do the
certain job, and the real one behind the curtain handling the necessary tasks is the operating
system.
An operating system act as an intermediary between the user of a computer and
computer hardware. The purpose of an operating system is to provide an environment in which
a user can execute programs in a convenient and efficient manner. It is a software that
manages the computer hardware. The hardware must provide appropriate mechanisms to
ensure the correct operation of the computer system and to prevent user programs from
interfering with the proper operation of the system.
Operating systems provide a software platform on top of which other programs,
called application programs, can run. The application programs must be written to run on top of
a particular operating system. Your choice of operating system, therefore, determines to a great
extent the applications you can run. For PCs, the most popular operating systems are
DOS, OS/2, and Windows, but others are available, such as Linux and Mac OS.
Important: We recommend that you use PowerPoint 2002 or a later version to display
the slides for this course. If you use PowerPoint Viewer or an earlier
version of PowerPoint, all the features of the slides might not be display
correctly.
Preparation tasks
To prepare for this module:
Read all of the materials for this module.
Practice performing the demonstrations and the lab exercises.
Work through the Module Review and Takeaways section, and determine how you will use this
section to reinforce student learning and promote knowledge transfer to on-the-job performance.
7
Principles of Operating System
Part 1: The Concepts of Operating System
An Operating System is a program that controls the execution of application programs
and acts as an interface between the user of a computer and the computer hardware. A more
common definition is that the operating system is the one program running at all times on the
computer (usually called the kernel), with all else being applications programs. An Operating
system is concerned with the allocation of resources and services, such as memory,
processors, devices and information.
The Operating System correspondingly includes programs to manage these resources,
such as a traffic controller, a scheduler, memory management module, I/O programs, and a file
system. The operating system is a vital component of the system software in a computer
system. Application programs usually require an operating system to function.
It is the most important software that runs on a computer. It manages the computer's
memory, processes, and all of its software and hardware. It also allows you to communicate
with the computer without knowing how to speak the computer's "language." Without an
operating system, a computer is useless.
Functions of Operating System
Operating system performs three functions:
1. Convenience: An OS makes a computer more convenient to use.
2. Efficiency: An OS allows the computer system resources to be used in
an efficient manner.
3. Ability to Evolve: An OS should be constructed in such a way as to permit
the effective development, testing and introduction of new
system functions without at the same time interfering with
service.
Types of Operating System
1. GUI
The Graphical User Interface, a GUI Operating System contains graphics and
icons and is commonly navigated by using a computer mouse. A type of user
8
Principles of Operating System
interface that allows users to interact with electronic devices using images rather than
text commands. represents the information and actions available to a user through
graphical icons and visual indicators such as secondary notation, as opposed to text-
based interfaces, typed command labels or text navigation. The actions are usually
performed through direct manipulation of the graphical elements.
2. Real-time
A real-time operating system is a multitasking operating system that aims at
executing real-time applications. An often use specialized scheduling algorithms so that
they can achieve a deterministic nature of behavior. The main objective of real-time
operating systems is their quick and predictable response to events. They have an
event-driven or time-sharing design and often aspects of both. An event-driven system
switches between tasks based on their priorities or external events while time-sharing
operating systems switch tasks based on clock interrupts.
3. Multi-user
A multi-user operating system allows multiple users to access a computer system
at the same time. Time-sharing systems and Internet servers can be classified as multi-
user systems as they enable multiple-user access to a computer through the sharing of
time. Single-user operating systems have only one user but may allow multiple programs
to run at the same time.
4. Multi-tasking
A multi-tasking operating system allows more than one program to be running at
a time, from the point of view of human time scales. Multi-tasking can be of two types,
the pre-emptive and co-operative.
a. Pre-emptive multitasking, the operating system slices the CPU time and
dedicates one slot to each of the programs. Unix-like operating systems
such as Solaris and Linux support pre-emptive multitasking.
b. Cooperative multitasking is achieved by relying on each process to give
time to the other processes in a defined manner. 16-bit versions of
Microsoft Windows used cooperative multi-tasking. 32-bit versions of both
9
Principles of Operating System
Windows NT and Win9x, used pre-emptive multi-tasking. Mac OS prior to
OS X used to support cooperative multitasking.
5. Distributed
A distributed operating system manages a group of independent computers and
makes them appear to be a single computer. The development of networked computers
that could be linked and communicate with each other gave rise to distributed
computing. Distributed computations are carried out on more than one machine. When
computers in a group work in cooperation, they make a distributed system.
6. Embedded
Embedded operating systems are designed to be used in embedded computer
systems. They are designed to operate on small machines like PDAs with less
autonomy. They are able to operate with a limited number of resources. They are very
compact and extremely efficient by design. Windows CE and Minix 3 are some
examples of embedded operating systems.
Operating System as User Interface
Every general purpose computer consists of the hardware, operating system,
system programs, application programs. The hardware consists of memory, CPU, ALU,
I/O devices, peripheral device and storage device. System program consists of
compilers, loaders, editors, OS etc. The application program consists of business
program, database program. (see Figure 1.0)
10
Principles of Operating System
Figure 1.0 Conceptual view of a computer system
Every computer must have an operating system to run other programs. The operating
system and coordinates the use of the hardware among the various system programs and
application program for a various users. It simply provides an environment within which other
programs can do useful work. The operating system is a set of special programs that run on a
computer system that allow it to work properly. It performs basic tasks such as recognizing input
from the keyboard, keeping track of files and directories on the disk, sending output to the
display screen and controlling a peripheral devices.
OS is designed to serve two basic purposes :
1. It controls the allocation and use of the computing system‘s resources among
the various user and tasks.
2. It provides an interface between the computer hardware and the programmer
that simplifies and makes feasible for coding, creation, debugging of
application programs.
The operating system must support the following tasks. The tasks are :
1. Provides the facilities to create, modification of program and data files using and editor.
2. Access to the compiler for translating the user program from high level language to
machine language.
3. Provide a loader program to move the compiled program code to the computer‘s
memory for execution.
4. Provide routines that handle the details of I/O programming.
I/O System Management
The module that keeps track of the status of devices is called the I/O traffic controller.
Each I/O device has a device handler that resides in a separate process associated with that
device.
The I/O subsystem consists of;
a. A memory management component that includes buffering, caching and spooling.
b. A general device driver interface.
11
Principles of Operating System
Drivers for specific hardware devices.
A. Assembler
Input to an assembler is an assembly language program. Output is an object
program plus information that enables the loader to prepare the object program for execution. At
one time, the computer programmer had at his disposal a basic machine that interpreted,
through hardware, certain fundamental instructions. He would program this computer by writing
a series of ones and zeros(machine language), place them into the memory of the machine.
B. Compiler
A compilers is a program that accepts a source program in a high-level language
and produces a corresponding object program. An interpreter is a program that appears to
execute a source program as if it was machine language. The same name (FORTRAN, COBOL
etc) is often used to designate both a compiler and its associated language.
C. Loader
A loader is a routine that loads an object program and prepares it for execution. There
are various loading schemes: absolute, relocating and direct-linking. In general, the loader must
load, relocate, and link the object program. Loader is a program that places programs into
memory and prepares them for execution. In a simple loading scheme, the assembler outputs
the machine language translation of a program on a secondary device and a loader is placed in
core. The loader places into memory the machine language version of the user‘s program and
transfers control to it. Since the loader program is much smaller than the assembler, it makes
more core available to user‘s program.
12
Principles of Operating System
Assessment Part 1:
Review Exercise 1:
1. It is concerned with the allocation of resources and services, such as memory, processors,
devices and information.
Answer: Operating System
2. A type operating system that aims at executing real-time applications. An often use
specialized scheduling algorithms so that they can achieve a deterministic nature of behavior.
Answer: Real-time OS
3. A program that accepts a source program in a high-level language and produces a
corresponding object program.
Answer: compilers
4. These are designed to be used in embedded computer systems.
Answer: Embedded OS
5. Give and explain the three main functions of Operating System.
6. A routine that loads an object program and prepares it for execution.
Answer: Loader
7. It manages a group of independent computers and makes them appear to be a single
computer.
Answer: Distributed OS
8. These operating system allows more than one program to be running at a time.
Answer: Multi-tasking OS
9. Output is an object program plus information that enables the loader to prepare the object
program for execution.
Answer: Assembler
10. A operating system that allows multiple users to access a computer system at the same
time.
Answer: Multi-user OS
13
Principles of Operating System
The CPU Scheduling
Basic Concept
1. Maximum CPU utilization is obtained with multiprogramming
a. Several processes are kept in memory at one time
b. Every time a running process has to wait, another process can take over
use of the CPU
2. Scheduling of the CPU is fundamental to operating system design
3. Process execution consists of a cycle of a CPU time burst and an I/O time burst.
a. Processes alternate between these two states (i.e., CPU burst and I/O
burst)
b. Eventually, the final CPU burst ends with a system request to terminate
execution
Alternating Sequence of CPU and I/O Bursts
14
Principles of Operating System
Histogram of CPU Burst
CPU bursts tend to have a frequency curve similar to the exponential curve shown
above. It is characterized by a large number of short CPU bursts and a small number of long
CPU bursts. An I/O-bound program typically has many short CPU bursts; a CPU-bound
program might have a few long CPU bursts.
CPU Scheduler
The CPU scheduler selects from among the processes in memory that are ready to
execute and allocates the CPU to one of them.
CPU scheduling is affected by the following set of circumstances:
1. (N) A process switches from running to waiting state
2. (P) A process switches from running to ready state
3. (P) A process switches from waiting to ready state
4. (N) A processes switches from running to terminated state
Circumstances 1 and 4 are non-preemptive; they offer no schedule choice
Circumstances 2 and 3 are pre-emptive; they can be scheduled
15
Principles of Operating System
Dispatcher
The dispatcher module gives control of the CPU to the process selected by the short-
term scheduler; this involves:
• switching context
• switching to user mode
• jumping to the proper location in the user program to restart that program
The dispatcher needs to run as fast as possible, since it is invoked during process
context switch
The time it takes for the dispatcher to stop one process and start another process is
called dispatch latency
Scheduling Criteria
o Different CPU scheduling algorithms have different properties
o The choice of a particular algorithm may favor one class of processes over
another
o In choosing which algorithm to use, the properties of the various algorithms
should be considered
o Criteria for comparing CPU scheduling algorithms may include the following
• CPU utilization – percent of time that the CPU is busy executing a
process
• Throughput – number of processes that are completed per time unit
• Response time – amount of time it takes from when a request was
submitted until the first response occurs (but not the time it takes to
output the entire response)
16
Principles of Operating System
• Waiting time – the amount of time before a process starts after first
entering the ready queue (or the sum of the amount of time a process has
spent waiting in the ready queue)
• Turnaround time – amount of time to execute a particular process from
the time of submission through the time of completion
Optimization Criteria
It is desirable to
• Maximize CPU utilization
• Maximize throughput
• Minimize turnaround time
• Minimize start time
• Minimize waiting time
• Minimize response time
In most cases, we strive to optimize the average measure of each metric In other cases,
it is more important to optimize the minimum or maximum values rather than the average
Single Processor Scheduling Algorithm
o First Come, First Served (FCFS)
o Shortest Job First (SJF)
o Priority
o Round Robin (RR)
First Come, First Served Scheduling
Process Burst Time
P1 24
P2 3
P3 3
With FCFS, the process that requests the CPU first is allocated the CPU first
17
Principles of Operating System
Sample;
1. Suppose that the processes arrive in the order: P1 , P2 , P3
The Gantt Chart for the schedule is:
§ Waiting time for P1 = 0; P2 = 24; P3 = 27
§ Average waiting time: (0 + 24 + 27)/3 = 17
§ Average turn-around time: (24 + 27 + 30)/3 = 27
2. Suppose that the processes arrive in the order: P2 , P3 , P1
The Gantt chart for the schedule is:
§ Waiting time for P1 = 6; P2 = 0; P3 = 3
§ Average waiting time: (6 + 0 + 3)/3 = 3 (Much better than Case #1)
§ Average turn-around time: (3 + 6 + 30)/3 = 13
Sample 1 is an example of the convoy effect; all the other processes wait for one long-
running process to finish using the CPU
• This problem results in lower CPU and device utilization; Case #2 shows
that higher utilization might be possible if the short processes were
allowed to run first
The FCFS scheduling algorithm is non-preemptive
18
Principles of Operating System
• Once the CPU has been allocated to a process, that process keeps the
CPU until it releases it either by terminating or by requesting I/O
• It is a troublesome algorithm for time-sharing systems
Shortest-Job-First Scheduling
The SJF algorithm associates with each process the length of its next CPU burst
When the CPU becomes available, it is assigned to the process that has the smallest
next CPU burst (in the case of matching bursts, FCFS is used)
Two schemes:
1. Non-preemptive – once the CPU is given to the process, it cannot be preempted until it
completes its CPU burst.
2. Preemptive – if a new process arrives with a CPU burst length less than the remaining
time of the current executing process, preempt. This scheme is know as the Shortest-
Remaining-Time-First (SRTF).
Sample 1 : Non-Preemtive SJF (simultaneous arrival
Process Arrival Time Burst Time
P1 0.0 6
P2 0.0 4
P3 0.0 1
P4 0.0 5
SJF (non-preemptive, simultaneous arrival)
§ Average waiting time = (0 + 1 + 5 + 10)/4 = 4
§ Average turn-around time = (1 + 5 + 10 + 16)/4 = 8
19
Principles of Operating System
Sample 2: Non-Preemptive SJF (varied arrival times)
Process Arrival Time Burst Time
P1 0.0 7
P2 2.0 4
P3 4.0 1
P4 5.0 4
SJF (non-preemptive, varied arrival times)
Average waiting time:
= ( (0 – 0) + (8 – 2) + (7 – 4) + (12 – 5) )/4
= (0 + 6 + 3 + 7)/4 = 4
Average turn-around time:
= ( (7 – 0) + (12 – 2) + (8 - 4) + (16 – 5))/4
= ( 7 + 10 + 4 + 11)/4 = 8
Priority Scheduling
o The SJF algorithm is a special case of the general priority scheduling algorithm
o A priority number (integer) is associated with each process
o The CPU is allocated to the process with the highest priority (smallest integer =
highest priority)
o Priority scheduling can be either preemptive or non-preemptive
• A preemptive approach will preempt the CPU if the priority of the newly-
arrived process is higher than the priority of the currently running process
• A non-preemptive approach will simply put the new process (with the
highest priority) at the head of the ready queue
20
Principles of Operating System
SJF is a priority scheduling algorithm where priority is the predicted next CPU
burst time. The main problem with priority scheduling is starvation, that is, low priority
processes may never execute.
A solution is aging; as time progresses, the priority of a process in the ready
queue is increased.
Round Robin (RR) Scheduling
In the round robin algorithm, each process gets a small unit of CPU time (a time
quantum), usually 10-100 milliseconds. After this time has elapsed, the process is
preempted and added to the end of the ready queue. If there are n processes in the
ready queue and the time quantum is q, then each process gets 1/n of the CPU time in
chunks of at most q time units at once. No process waits more than (n-1)q time units.
Performance of the round robin algorithm
q large Þ FCFS
q small Þ q must be greater than the context switch time; otherwise, the
overhead is too high
One rule of thumb is that 80% of the CPU bursts should be shorter than the time
quantum
Sample of RR with Time Quantum = 20
Process Burst Time
P1 53
P2 17
P3 68
P4 24
The Gantt chart is:
21
Principles of Operating System
Typically, higher average turnaround than SJF, but better response time
Average waiting time
= ( [(0 – 0) + (77 - 20) + (121 – 97)] + (20 – 0) + [(37 – 0) + (97 - 57) + (134 –
117)]+[(57–0)+(117–77)])/4
=(0 + 57 + 24) + 20 + (37 + 40 + 17) + (57 + 40) ) / 4
=(81+20+94+97)/4
= 292 / 4 = 73
Average turn-around time
= 134 + 37 + 162 + 121) / 4 = 113.5
Time Quantum and Context Switches
Turnaround Time Varies with The Time Quantum
As can be seen from this graph, the average turnaround time of a set of processes does
not necessarily improve as the time quantum size increases. In general, the average
22
Principles of Operating System
turnaround time can be improved if most processes finish their next CPU burst in a single time
quantum.
Multi-Level Queue Scheduling
o Multi-level queue scheduling is used when processes can be classified into groups
o For example, foreground (interactive) processes and background (batch) processes
• The two types of processes have different response-time requirements and so
may have different scheduling needs
• Also, foreground processes may have priority (externally defined) over
background processes
o A multi-level queue scheduling algorithm partitions the ready queue into several
separate queues
o The processes are permanently assigned to one queue, generally based on some
property of the process such as memory size, process priority, or process type
o Each queue has its own scheduling algorithm
• The foreground queue might be scheduled using an RR algorithm
• The background queue might be scheduled using an FCFS algorithm
o In addition, there needs to be scheduling among the queues, which is commonly
implemented as fixed-priority pre-emptive scheduling
• The foreground queue may have absolute priority over the background queue
o One example of a multi-level queue are the five queues shown below
o Each queue has absolute priority over lower priority queues
o For example, no process in the batch queue can run unless the queues above it are
empty
o However, this can result in starvation for the processes in the lower priority queues
23
Principles of Operating System
o Another possibility is to time slice among the queues
o Each queue gets a certain portion of the CPU time, which it can then schedule among its
various processes
• The foreground queue can be given 80% of the CPU time for RR scheduling
• The background queue can be given 20% of the CPU time for FCFS scheduling
Multi-Level Feedback Queue Scheduling
o In multi-level feedback queue scheduling, a process can move between the various
queues; aging can be implemented this way
o A multilevel-feedback-queue scheduler is defined by the following parameters:
• Number of queues
• Scheduling algorithms for each queue
• Method used to determine when to promote a process
• Method used to determine when to demote a process
• Method used to determine which queue a process will enter when that process
needs service
Example of Multilevel Feedback Queue
Multi-Processor Scheduling
o If multiple CPUs are available, load sharing among them becomes possible; the
scheduling problem becomes more complex
o We concentrate in this discussion on systems in which the processors are identical
(homogeneous) in terms of their functionality
24
Principles of Operating System
• We can use any available processor to run any process in the queue
o Two approaches: Asymmetric processing and symmetric processing (see next slide)
Asymmetric multiprocessing (ASMP)
• One processor handles all scheduling decisions, I/O processing, and other
system activities
• The other processors execute only user code
• Because only one processor accesses the system data structures, the need for
data sharing is reduced
Symmetric multiprocessing (SMP)
• Each processor schedules itself
• All processes may be in a common ready queue or each processor may have its
own ready queue
• Either way, each processor examines the ready queue and selects a process to
execute
• Efficient use of the CPUs requires load balancing to keep the workload evenly
distributed
4 In a Push migration approach, a specific task regularly checks the
processor loads and redistributes the waiting processes as needed
4 In a Pull migration approach, an idle processor pulls a waiting job from
the queue of a busy processor
• Virtually all modern operating systems support SMP, including Windows XP,
Solaris, Linux, and Mac OS X
o Symmetric Multithreading
o Symmetric multiprocessing systems allow several threads to run concurrently by
providing multiple physical processors
o An alternative approach is to provide multiple logical rather than physical processors
o Such a strategy is known as symmetric multithreading (SMT)
• This is also known as hyperthreading technology
o The idea behind SMT is to create multiple logical processors on the same physical
processor
25
Principles of Operating System
• This presents a view of several logical processors to the operating system, even
on a system with a single physical processor
• Each logical processor has its own architecture state, which includes general-
purpose and machine-state registers
• Each logical processor is responsible for its own interrupt handling
• However, each logical processor shares the resources of its physical processor,
such as cache memory and buses
o SMT is a feature provided in the hardware, not the software
The hardware must provide the representation of the architecture state for each logical
processor, as well as interrupt handling
A typical SMT Architecture
Review Exercise 2:
1. Define the difference between preemptive and nonpreemptive scheduling.
2. Suppose that the following processes arrive for execution at the times indicated. Each
process will run the listed amount of time. In answering the questions, use
nonpreemptive scheduling and base all decisions on the information you have at the
time the decision must be made.
Process Arrival Time Burst Time
P1 0.0 8
P2 0.4 4
P3 1.0 1
26
Principles of Operating System
a. What is the average turnaround time for these processes with the FCFS scheduling
algorithm?
b. What is the average turnaround time for these processes with the SJF scheduling
algorithm?
c. The SJF algorithm is supposed to improve performance, but notice that we chose to run
process P1 at time 0 because we did not know that two shorter processes would arrive
soon. Compute what the average turnaround time will be if the CPU is left idle for the
first 1unit and then SJF scheduling is used. Remember that processes P1and P2 are
waiting during this idle time, so their waiting time may increase. This algorithm could be
known as future-knowledge scheduling.
3. What advantage is there in having different time-quantum sizes on different levels of a
multilevel queueing system?
4. Many CPU-scheduling algorithms are parameterized. For example, the RR algorithm
requires a parameter to indicate the time slice. Multilevel feedback queues require
parameters to define the number of queues, the scheduling algorithms for each queue,
the criteria used to move processes between queues, and so on.
These algorithms are thus really sets of algorithms (for example, the set of RR algorithms for all
time slices, and so on). One set of algorithms may include another (for example, the FCFS
algorithm is the RR algorithm with an infinite time quantum).What (if any) relation holds between
the following pairs of sets of algorithms?
a. Priority and SJF
b. Multilevel feedback queues and FCFS
c. Priority and FCFS
d. RR and SJF
27
Principles of Operating System
5. Suppose that a scheduling algorithm (at the level of short-term CPU scheduling) favors
those processes that have used the least processor time in the recent past. Why will this
algorithm favor I/O-bound programs and yet not permanently starve CPU-bound
programs?
6. Distinguish between PCS and SCS scheduling.
7. Assume an operating system maps user-level threads to the kernel usingthe many-to-
many model where the mapping is done through the useof LWPs. Furthermore, the
system allows program developers to createreal-time threads. Is it necessary to bind a
real-time thread to an LWP?
Answer:
1. Preemptive scheduling allows a process to be interrupted in the midst of its
execution, taking the CPU away and allocating it to another process.
Nonpreemptive scheduling ensures that a process relinquishes control of the
CPU only when it finishes with its
current CPU burst.
2.
a. 10.53
b. 9.53
c. 6.86
Remember that turnaround time is finishing time minus arrival time, so you
have to subtract the arrival times to compute the turnaround times. FCFS
is 11 if you forget to subtract arrival time.
3. Processes that need more frequent servicing, for instance, interactive processes
such as editors, can be in a queue with a small time quantum. Processes with no
need for frequent servicing can be in a queue with a larger quantum, requiring
fewer context switches to complete the processing, and thus making more
efficient use of the computer.
4.
28
Principles of Operating System
a. The shortest job has the highest priority.
b. The lowest level of MLFQ is FCFS.
c. FCFS gives the highest priority to the job having been in existence the
longest.
d. None.
5. It will favor the I/O-bound programs because of the relatively short CPU burst
request by them; however, the CPU-bound programs will not starve because the
I/O-bound programs will relinquish the CPU relatively often to do their I/O.
6. PCS scheduling is done local to the process. It is how the thread library
schedules threads onto available LWPs. SCS scheduling is the situation where
the operating system schedules kernel threads. On systems using either many-
to-one or many-to-many, the two scheduling models are fundamentally
different. On systems using one-to-one, PCS and SCS are the same.
7. Yes, otherwise a user thread may have to compete for an available LWP prior to
being actually scheduled. By binding the user thread to an LWP, there is no
latency while waiting for an available LWP; the real-time user thread can be
scheduled immediately
29
Principles of Operating System
PART 2: Microsoft Windows Operating System:
Configuring Windows 7 Client
Microsoft Windows is a series of graphical interface operating systems developed,
marketed, and sold by Microsoft. Introduced an operating environment named Windows on
November 20, 1985 as a graphical operating system shell for MS-DOS in response to the
growing interest in graphical user interfaces. Microsoft Windows came to dominate the
world's personal computer market with over 90% market share, overtaking Mac OS, which had
been introduced in 1984.
Background
The Early Version
The history of Windows dates back to September 1981, when Chase
Bishop, a computer scientist, designed the first model of an electronic
device and project "Interface Manager" was started. It was announced
in November 1983 under the name "Windows", but Windows 1.0 was
not released until November 1985. Windows 1.0 achieved little
popularity and was to compete with Apple's own operating system.
Windows 1.0 is not a complete operating system rather, it extends MS-
DOS. The shell of Windows 1.0 is a program known as the MS-DOS Executive. Included
components include Calculator, Calendar, Cardfile, Clipboard viewer, Clock, Control
Panel, Notepad, Paint, Reversi, Terminal and Write. Windows 1.0 does not allow overlapping
windows. Instead all windows are tiled. Only modal dialog boxes may appear over other
windows.
Windows 2.0 was released in December 1987 and was more popular than its
predecessor. It features several improvements to the user interface and memory management.
It also introduced more sophisticated keyboard shortcuts and could make use of expanded
memory.
Windows 2.03 changed the OS from tiled windows to overlapping windows. The result of
this change led to Apple Computer filing a suit against Microsoft alleging infringement on
Apple's copyrights.
30
Principles of Operating System
Windows 2.1 was released in two different versions: Windows/286 and Windows/386.
Windows/386 uses the virtual 8086 mode of Intel 80386 to multitask several DOS programs and
the paged memory model to emulate expanded memory using available extended memory.
Windows/286, in spite of its name, runs on both Intel 8086 and Intel 80286. It runs in real
mode but can make use of the high memory area.
Windows 3.0, released in 1990, improved the design, mostly because of virtual
memory and loadable virtual device drivers (VxDs) that allow Windows to share arbitrary
devices between multi-tasked DOS applications. Windows 3.0 applications can run in protected
mode, which gives them access to several megabytes of memory without the obligation to
participate in the software virtual memory scheme.
Windows 3.1, made generally available on March 1, 1992, featured a facelift. In August
1993, Windows for Workgroups, a special version with integrated peer-to-peer
networking features and a version number of 3.11, was released. It was sold along Windows
3.1. Support for Windows 3.1 ended on December 31, 2001.
Windows 9x
Windows 95, was released on August 24, 1995. While still remaining MS-DOS-based,
Windows 95 introduced support for native 32-bit applications, plug and
play hardware, preemptive multitasking, long file names of up to 255 characters, and provided
increased stability over its predecessors. Windows 95 also introduced a redesigned, object
oriented user interface, replacing the previous Program Manager with the Start menu, taskbar,
and Windows Explorer shell.
Windows 98 released on June 25, 1998, which introduced the Windows Driver Model,
support for USB composite devices, support for ACPI, hibernation, and support for multi-
monitor configurations. Windows 98 also included integration with Internet Explorer 4
through Active Desktop and other aspects of the Windows Desktop Update (a series of
enhancements to the Explorer shell which were also made available for Windows 95).
In May 1999, Microsoft released Windows 98 Second Edition, an updated version of
Windows 98. Windows 98 SE added Internet Explorer 5.0 and Windows Media Player 6.2
amongst other upgrades. Mainstream support for Windows 98 ended on June 30, 2002 and
extended support for Windows 98 ended on July 11, 2006.[13]
31
Principles of Operating System
On September 14, 2000, Microsoft released Windows ME (Millennium Edition), the last
DOS-based version of Windows. Windows ME incorporated visual interface enhancements from
its Windows NT-based counterpart Windows 2000, had faster boot times than previous
versions, expanded multimedia functionality (including Windows Media Player 7, Windows
Movie Maker, and the Windows Image Acquisition framework for retrieving images from
scanners and digital cameras), additional system utilities such as System File
Protection and System Restore, and updated home networking tools. However, Windows ME
was faced with criticism for its speed and instability, along with hardware compatibility issues
and its removal of real mode DOS support. PC World considered Windows ME to be one of the
worst operating systems Microsoft had ever released, and the 4th worst tech product of all time.
Windows NT
In November 1988, a new development team within Microsoft (which included
former Digital Equipment Corporation developers Dave Cutler and Mark Lucovsky) began work
on a revamped version of IBM and Microsoft's OS/2 operating system known as "NT OS/2". NT
OS/2 was intended to be a secure, multi-user operating system with POSIX compatibility and a
modular, portable kernel with preemptive multitasking and support for multiple processor
architectures. However, following the successful release of Windows 3.0, the NT development
team decided to rework the project to use an extended 32-bit port of the Windows API known as
Win32 instead of those of OS/2. The first release of the resulting operating system, Windows NT
3.1 (named to associate it with Windows 3.1) was released in July 1993 with versions for
desktop workstations and servers. Windows NT 3.5 was released in September 1994, focusing
on performance improvements and support for Novell's NetWare, and was followed up
by Windows NT 3.51 in May 1995, which included additional improvements and support for
the PowerPC architecture. Windows NT 4.0 was released in June 1996, introducing the
redesigned interface of Windows 95 to the NT series. On February 17, 2000, Microsoft
released Windows 2000, a successor to NT 4.0. The Windows NT name was dropped at this
point in order to put a greater focus on the Windows brand.[18]
Windows XP
The Windows XP, was released on October 25, 2001. The introduction
of Windows XP aimed to unify the consumer-oriented Windows 9x series
with the architecture introduced by Windows NT, a change which
Microsoft promised would provide better performance over its DOS-
based predecessors. Windows XP would also introduce an redesigned
32
Principles of Operating System
user interface (including an updated Start menu and a "task-oriented" Windows Explorer),
streamlined multimedia and networking features, Internet Explorer 6, integration with
Microsoft's .NET Passport services, modes to help provide compatibility with software designed
for previous versions of Windows, and Remote Assistance functionality.
At retail, Windows XP was now marketed in two main editions: the "Home" edition was targeted
towards consumers, while the "Professional" edition was targeted towards business
environments and power users, and included additional security and networking features. Home
and Professional were later accompanied by the "Media Center" edition (designed for home
theater PCs, with an emphasis on support for DVD playback, TV tuner cards, DVR functionality,
and remote controls), and the "Tablet PC" edition (designed for mobile devices meeting
its specifications for a tablet computer, with support for stylus pen input and additional pen-
enabled applications). Mainstream support for Windows XP ended on April 14, 2009. Extended
support will continue until April 8, 2014.
Windows Vista, 7 and 8
Windows Vista was released on November 30, 2006 for volume
licensing and January 30, 2007 for consumers. It contained a number
of new features, from a redesigned shell and user interface to
significant technical changes, with a particular focus on security
features. It was available in a number of different editions, and has
been subject to some criticism. Vista's server counterpart, Windows
Server 2008 was released in early 2008.
On July 22, 2009, Windows 7 and Windows Server 2008 R2 were released as RTM
(release to manufacturing) while the former was released to the public 3 months later on
October 22, 2009. Unlike its predecessor, Windows Vista, which introduced a large number of
new features, Windows 7 was intended to be a more focused, incremental upgrade to the
Windows line, with the goal of being compatible with applications and hardware with which
Windows Vista was already compatible.[24]
Windows 7 has multi-touch support, a
redesigned Windows shell with an updated taskbar, a home networking system called
HomeGroup and performance improvements.
Windows 8, the successor to Windows 7, was released generally on
October 28, 2012. A number of significant changes were made on
Windows 8, including the introduction of a user interface based around
33
Principles of Operating System
Microsoft's Metro design language with optimizations for touch-based devices such
as tablets and all-in-one PCs. These changes include the Start screen, which uses large tiles
that are more convenient for touch interactions and allow for the display of continually updated
information, and a new class of apps which are designed primarily for use on touch-based
devices. Other changes include increased integration with cloud services and other online
platforms (such as social networks and Microsoft's own SkyDrive and Xbox Live services),
the Windows Store service for software distribution, and a new variant known as Windows
RT for use on devices that utilize the ARM architecture.
The Microsoft Windows 7 Operating System
Module 1: Understanding Network Infrastructure
•Describe physical network topologies and standards.
•Define local area networks (LANs).
•Define wide area networks (WANs).
•Describe wireless networking technologies.
•Explain how to connect a network to the Internet.
•Describe how technologies connect remote access
Important: We recommend that you use PowerPoint 2002 or a later version to display the slides
for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the
features of the slides might not be display correctly.
Preparation tasks
To prepare for this module:
Read all of the materials for this module.
Practice performing the demonstrations and the lab exercises.
Work through the Module Review and Takeaways section, and determine how you will use this
section to reinforce student learning and promote knowledge transfer to on-the-job performance.
This module will provide a foundation for concepts and terminology related to network
infrastructure. The purpose is to introduce students to general definitions and explanations, but
34
Principles of Operating System
not to go too in depth on any specific topic. More information specific to almost every topic will
be provided in Modules 2 and 3.
This topic introduces the student to basic networking concepts and terminology. Provide general
definitions, but do not spend too much time on any individual topic as they will be covered later
in this module and again with more detail in Modules 2 and 3.
Discuss with students the various aspects of a network and items they may have heard of or be
familiar with.
Lesson 1: Network Architecture Standard
Network architecture is the design of a communications network. It is a framework for
the specification of a network's physical components and their functional organization and
configuration, its operational principles and procedures, as well as data formats used in its
operation.
Network is a combination of computer hardware, cabling, network devices, and
computer software used together to allow computers to communicate with each other. A
network is basically all of the components (hardware and software) involved in connecting
computers across small and large distances. Networks are used to provide easy access to
information, thus increasing productivity for users.
Network Component play a major role in designing and maintaining network.
Network Components and Terminology
• Data are values of qualitative or quantitative variables, belonging to a set of items. Data
in computing (or data processing) are represented in a structure, often tabular
(represented by rows and columns), a tree (a set of nodes with parent-children
relationship) or a graph structure (a set of interconnected nodes).
• Node is a connection point, either a redistribution point or a communication
endpoint (some terminal equipment). The definition of a node depends on the network
and protocol layer referred to.
• Client is a piece of computer hardware or software that accesses a service made
available by a server.
35
Principles of Operating System
• Server is a system (software and suitable computer hardware) that responds to requests
across a computer network to provide, or help to provide, a network service. Servers can
be run on a dedicated computer, which is also often referred to as "the server", but many
networked computers are capable of hosting servers. In many cases, a computer can
provide several services and have several servers running.
• Peer is a group of functional units in the same layer of a network, by analogy with peer
group.
• Network Adapter / Network interface controller (NIC) (also known as a network
interface card, LAN adapter and by similar terms) is a computer hardware component
that connects a computer to a computer network.
• Hub is a networking device that allows one to connect multiple PCs to a single network.
Hubs may be based on Ethernet, Firewire, or USB connections.
• Switch is a control unit that turns the flow of electricity on or data of in a circuit. It may
also be used to route information patterns in streaming electronic data sent over
networks. In the context of a network, a switch is a computer networking device that
connects network segments.
• Router is a device that forwards data packets between computer networks, creating an
overlay internetwork. A router is connected to two or more data lines from different
networks. When a data packet comes in one of the lines, the router reads the address
information in the packet to determine its ultimate destination. Then, using information in
its routing table or routing policy, it directs the packet to the next network on its journey.
Routers perform the "traffic directing" functions on the Internet.
• Media / Medium This is how the devices are connected together
• Transport protocols occupy layer 4 of the OSI protocol model. The protocols at this
level provide connection-oriented sessions and reliable data delivery services. The
transport layer sits on top of layer 3 networking services.
• Bandwidth is a measurement of bit-rate of available or consumed data communication
resources expressed in bits per second or multiples of it (bit/s, kbit/s, Mbit/s, Gbit/s, etc.).
Network Architecture
Most common network architecture types:
• Ethernet is a family of computer networking technologies for local area
networks (LANs). The Ethernet standards comprise several wiring and signaling variants
of the OSI physical layer in use with Ethernet.
36
Principles of Operating System
• FDDI (Fiber Distributed Data Interface) provides a 100 Mbit/s optical standard for data
transmission in local area network that can extend in range up to 200 kilometers
(120 mi).
• Token ring local area network (LAN) technology is a protocol which resides at the data
link layer (DLL) of the OSI model. It uses a special three-byte frame called a token that
travels around the ring. Token-possession grants the possessor permission to transmit
on the medium. Token ring frames travel completely around the loop.
This topic is intended to introduce the students to the IEEE and the 802 set of standards and
how the standards are defined and labeled. Don’t spend too much time defining or explaining
individual standards.
Institute of Electrical and Electronics Engineers 802
IEEE 802 refers to a family of IEEE standards dealing with local area
networks and metropolitan area networks. the IEEE 802 standards are restricted to
networks carrying variable-size packets.
IEEE 802.3 - Ethernet Networks
A working group and a collection of IEEE standards produced by the working
group defining the physical layer and data link layer's media access control (MAC) of
wired Ethernet. This is generally a local area network technology with some wide area
network applications. Physical connections are made between nodes and/or
infrastructure devices (hubs, switches, routers) by various types of copper or fiber cable.
IEEE 802.5 - Token Ring Networks
Token ring local area network (LAN) technology is a protocol which resides at
the data link layer (DLL) of the OSI model. It uses a special three-byte frame called a
token that travels around the ring. Token-possession grants the possessor permission to
transmit on the medium. Token ring frames travel completely around the loop.
IEEE 802.11 - Local Wireless Networks
IEEE 802.11 is a set of standards for implementing wireless local area
network (WLAN) computer communication in the 2.4, 3.6, 5 and 60 GHz frequency
bands. They are created and maintained by the IEEE LAN/MAN Standards Committee
37
Principles of Operating System
(IEEE 802). The base version of the standard was released in 1997 and has had
subsequent amendments. These standards provide the basis for wireless network
products using the Wi-Fi brand.
IEEE 802.16 - Broadband Wireless Networks
IEEE 802.16 is a series of Wireless Broadband standards written by the Institute
of Electrical and Electronics Engineers (IEEE). The IEEE Standards Board established a
working group in 1999 to develop standards for broadband for Wireless Metropolitan
Area Networks. The Workgroup is a unit of the IEEE 802 local area
network and metropolitan area network standards committee.
This topic is intended to introduce the LAN as a conceptual entity, rather than a strictly defined
set of standards or parameters. The line between LANs and WANs is becoming less defined as
network technologies and bandwidth capability evolves. Ensure to stress this growing blur to
students and emphasize the LANs ability to provide network resources to all clients on the LAN.
Lesson 2: Local Area Network
Local Area Network is a computer network that interconnects computers in a limited area such
as a home, school, computer laboratory, or office building using network media and the most
common form of computer network.
Introduce the components as listed, focusing on their role in a LAN rather than detailed
specifications of each component. More detail will be provided on these components as they are
addressed in Modules 2 and 3.
• Network Adapter / Network interface controller (NIC) (also known as a network
interface card, LAN adapter and by similar terms) is a computer hardware component
that connects a computer to a computer network.
• Wiring / Cabling
Wiring is done for less sophisticated systems and general household gadgets
are connected to electrical line through wiring.
Cabling is done to carry the data in the form of electrical pulses from continents
to continents. The biggest advantage of cabling is that cables are capable of carrying
electrical pulses at lightning speed without incurring any losses during the process.
38
Principles of Operating System
• Hub is a networking device that allows one to connect multiple PCs to a single network.
Hubs may be based on Ethernet, Firewire, or USB connections.
• Switch is a control unit that turns the flow of electricity on or data of in a circuit. It may
also be used to route information patterns in streaming electronic data sent over
networks. In the context of a network, a switch is a computer networking device that
connects network segments.
• Termination Point is the connection of all physical and there technical access
specifications which form part of the public telecommunications network and are
necessary for access to and efficient communication through that public network.
• Wiring cabinet is a small room commonly found in institutional buildings, such as
schools and offices, where data / electrical connections are made. While they are used
for many purposes, their most common use is for computer networking.
Introduce physical topology, emphasizing the “physical” component of the term. Re-enforce with
the students that these terms are based on the actual physical layout and connection of the
devices on a LAN. This distinction will be critical to defining logical topologies and differentiating
the two in the next topic.
39
Principles of Operating System
Review the definition and common usage for each topology. Use the question to initiate
discussion regarding possible implementations and combinations of physical topologies.
Question: What topology configuration might you recommend for a new Ethernet LAN being
built to connect computers located in several buildings together on a school
campus?
Answer: The most common configuration would be a hybrid topology using star
topology to connect computers together in each building and bus topology to
connect the individual buildings to each other. Students may also mention the
use of a mesh topology to provide a fault tolerant configuration between
buildings.
LAN Physical Topologies
Bus topology is a network architecture in which a set of clients are connected via a
shared communications line/cables, called a bus. There are several common instances of the
bus architecture, including one in the motherboard of most computers.
Ring Topology is a network topology in which each node connects to exactly two other
nodes, forming a single continuous pathway for signals through each node - a ring. Data travels
from node to node, with each node along the way handling every packet.
40
Principles of Operating System
Star Topology are one of the most common computer network topologies. In its
simplest form, a star network consists of one central switch, hub or computer, which acts as a
conduit to transmit messages.
Hybrid Topology is created that is referred to as a physical hierarchical star topology,
although some texts make no distinction between the two topologies.
Mesh Topology is a type of networking where each node must not only capture and
disseminate its own data, but also serve as a relay for other nodes, that is, it must collaborate to
propagate the data in the network.
Introduce the basic concept of a WAN. Contrast general WAN technology with LAN technology,
acknowledging that the differences separating the two terms are becoming fewer as networking
and computing technology evolves.
Lesson 3: Wide Area Network
A Wide Area Network is a network that covers a broad area using private
or public network transports. (example; any telecommunications network that links across
metropolitan, regional, or national boundaries)
Introduce the concepts in the context of a WAN. Keep concepts basic and ensure students are
aware of how these components link LANs together to form a WAN.
Physical WAN Components
Bridge
A Bridge device filters data traffic at a network boundary. Bridges reduce the amount of
traffic on a LAN/WAN by dividing it into two segments. Bridges serve a similar function as
switches, that also operate at Layer 2.
Leased Line
A Leased Line is a service contract between a provider and a customer, whereby the
provider agrees to deliver a symmetric telecommunications line connecting two or more
locations in exchange for a monthly rent (hence the term lease).
41
Principles of Operating System
Backbone
The Internet backbone refers to the principal data routes between large, strategically
interconnected networks and core routers on the Internet. These data routes are hosted by
commercial, government, academic and other high-capacity network centers, the Internet
exchange points and network access points, that interchange Internet traffic between the
countries, continents and across the oceans of the world.
WAN Standards
T-Carrier
T-carrier refers to one of several digital transmission systems developed by Bell Labs. T-
carriers are used in North America, South Korea, and Kyoto. In digital telecommunications,
where a single physical wire pair can be used to carry many simultaneous voice conversations
by time-division multiplexing, worldwide standards have been created and deployed.
E-Carrier
The E-carrier system revised and improved the earlier American T-carrier technology,
and this has now been adopted by the International Telecommunication
Union Telecommunication Standardization Sector (ITU-T). This is now widely used in almost all
countries outside the US, Canada, and Japan. The European Conference of Postal and
Telecommunications Administrations (CEPT) originally standardized E-carrier.
Optical Carrier (OC-X)
A set of signaling rates designed for transmission over Synchronous Optical Network
(SONET) networks. It levels also apply to Asynchronous Transfer Mode (ATM) networks. The
term “optical carrier” indicates that SONET runs over fiber-optic cabling.
Integrated Services Digital Network
Integrated Services Digital Network (ISDN) is a set of communication standards for
simultaneous digital transmission of voice, video, data, and other network services over the
traditional circuits of the public switched telephone network.
42
Principles of Operating System
Lesson 4: Wireless Network
Wireless network refers to any type of computer network that uses wireless for network
connections. A wireless network uses radio waves to connect devices such as laptops to the
Internet and to your business network and its applications.
Introduce wireless network in general, followed by each individual component/term. Use the
Give examples for typical implementations of ad-hoc and infrastructure networks.
Wireless Networking Components
Wireless Network Adapter
A wireless network interface controller (WNIC) is a network interface controller which
connects to a radio-based computer network rather than a wire-based network such as Token
Ring or Ethernet. A WNIC, just like other NICs, works on the Layer 1 and Layer 2 of the OSI
Model.
43
Principles of Operating System
Access Point
A wireless access point (AP) is a device that allows wireless devices to connect to a
wired network using Wi-Fi, or related standards. The AP usually connects to a router(via a wired
network) if it's a standalone device, or is part of a router itself.
Ad Hoc Network
Ad Hoc a Latin phrase "for this", a wireless ad hoc network is a decentralized type
of wireless network.[1]
The network is ad hoc because it does not rely on a preexisting
infrastructure, such as routers in wired networks or access points in managed (infrastructure)
wireless networks. Instead, each node participates in routing by forwarding data for other nodes,
so the determination of which nodes forward data is made dynamically on the basis of network
connectivity. In addition to the classic routing, ad hoc networks can use flooding for forwarding
the data.
Infrastructure Network
Infrastructure mode wireless networking bridges (joins) a wireless network to a
wired Ethernet network. Infrastructure mode wireless also supports central connection points
for WLAN clients.
Service Set ID
SSID is a case sensitive, 32 alphanumeric character unique identifier attached to
the header of packets sent over a wireless local-area network (WLAN) that acts as a password
when a mobile device tries to connect to the basic service set. (BSS is a component of the IEEE
802.11 WLAN architecture.)
Wireless Standards and Protocols
IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN)
computer communication in the 2.4, 3.6, 5 and 60 GHz frequency bands.
IEEE 802.16 is a series of Wireless Broadband standards written by the Institute of
Electrical and Electronics Engineers (IEEE). The IEEE Standards Board established a working
group in 1999 to develop standards for broadband for Wireless Metropolitan Area Networks.
The Workgroup is a unit of the IEEE 802 local area network and metropolitan area
network standards committee.
44
Principles of Operating System
Wireless LAN Standards
Common versions:
802.11a
802.11a-1999 or 802.11a was an amendment to the IEEE 802.11 wireless local network
specifications that defined requirements for an orthogonal frequency division multiplexing
(OFDM) communication system.
802.11b
802.11b-1999 or 802.11b, is an amendment to the IEEE 802.11 wireless
networking specification that extends throughput up to 11 Mbit/s using the same 2.4GHz band.
802.11g
802.11g-2003 or 802.11g is an amendment to the IEEE 802.11 specification that
extended throughput to up to 54 Mbit/s using the same 2.4 GHz band as 802.11b.
802.11n
802.11n-2009 (802.11n *lite) is an amendment to the IEEE 802.11-2007 wireless
networking standard. Improvement of network throughput over the two previous standards
802.11a and 802.11g with a significant increase in the maximum net data rate from 54 Mbit/s to
600 Mbit/s with the use of four spatial streams at a channel width of 40 MHz.
Lesson 5: Connecting to the Internet
Introduce the Internet as defined in the handbook. Explain the vastness and evolving
physical structure of the Internet to the students. The purpose of this lesson is not to specifically
define the Internet and its services and functionality, but rather to introduce it as a medium for
intermediary corporate network connections. Use the cloud analogy to explain how, in corporate
LAN/WAN structure, the Internet is typically referred to as a single physical entity for the
purpose of access and its use as an intermediary for secured communications between two
nodes. Re-enforce its generally non-secure nature.
The Internet
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. It is a network of
45
Principles of Operating System
networks that consists of millions of private, public, academic, business, and government
networks, of local to global scope, that are linked by a broad array of electronic, wireless and
optical networking technologies. It is also carries an extensive range of information resources
and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and
the infrastructure to support email.
Intranet and Extranet
Again, these terms are introduced not to specifically define and qualify each term, but to
allow the user to understand them in the context of a network multiple connection possibilities
and the basic methods to best combine and utilize these possibilities. Introduce each concept in
general terms, emphasizing the intranets private nature and the combined benefits/drawbacks
of extranets (allows shared info with partners and customers, exposes an organization’s data to
greater risk for loss, theft or malicious intent).
Intranet
An Intranet is the generic term for a collection of private computer networks within an
organization. A group of services on a network and internet-like service provision.
Extranet
An Extranet is a computer network that allows controlled access from the outside for
specific business or educational purposes and similar to intranets services. Intranets and
extranets are communication tools designed to enable easy information sharing within
workgroups.
Lesson 6: Firewall
46
Principles of Operating System
Introduce the concept of a firewall, illustrating its functionality and position within a
typical perimeter network. Re-enforce the concept of single point of entry and the importance of
a firewall’s role in ensuring the integrity of data both entering and leaving the network.
In computing, a firewall is software or hardware-based network security system that
controls the incoming and outgoing network traffic by analyzing the data packets and
determining whether they should be allowed through or not, based on a rule set. A network's
firewall builds a bridge between the internal network or computer it protects, upon securing that
the other network is secure and trusted, usually an external (inter)network, such as the Internet,
that is not assumed to be secure and trusted.
Introduce perimeter networks. The physical borders of perimeter networks and further security
principals will be discussed later in this lesson.
If applicable, compare and contrast perimeter networks with extranets (as discussed earlier)
Perimeter Network
47
Principles of Operating System
In computer security, a perimeter network is a physical or logical sub-network that
contains and exposes an organization's external-facing services to a larger untrusted network,
usually the Internet. The purpose of a perimeter network is to add an additional layer of security
to an organization's local area network (LAN), an external attacker only has access to
equipment in the perimeter, rather than any other part of the network. Perimeter network also
called "DMZ", the name is derived from the term "demilitarized zone", an area between nation
states in which military action is not permitted.
Lesson 7: The OSI Model
The OSI model defines the generic tasks that are performed for network communication.
The Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) is a conceptual model that
characterizes and standardizes the internal functions of a communications system by
partitioning it into abstraction layers. The model is a product of the Open Systems
Interconnection project at the International Organization for Standardization (ISO).
Application (Layer 7)
This layer supports application and end-user processes. Communication partners are
identified, quality of service is identified, user authentication and privacy are considered, and
any constraints on data syntax are identified.
Presentation (Layer 6)
This layer provides independence from differences in data representation
(e.g., encryption) by translating from application to network format, and vice versa. The
presentation layer works to transform data into the form that the application layer can accept.
This layer formats and encrypts data to be sent across a network, providing freedom from
compatibility problems. It is sometimes called the syntax layer.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The
session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues
between the applications at each end. It deals with session and connection coordination.
48
Principles of Operating System
Transport (Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Network (Layer 3)
This layer provides switching and routing technologies, creating logical paths, known
as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions
of this layer, as well as addressing, internetworking, error handling, congestion control and
packet sequencing.
Data Link (Layer 2)
At this layer, data packets are encoded and decoded into bits. It furnishes transmission
protocol knowledge and management and handles errors in the physical layer, flow control and
frame synchronization. The data link layer is divided into two sub layers: The Media Access
Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how
a computer on the network gains access to the data and permission to transmit it. The LLC layer
controls frame synchronization, flow control and error checking.
Physical (Layer 1)
This layer conveys the bit stream or electrical impulse, light or radio signal through
the network at the electrical and mechanical level. It provides the hardware means of sending
and receiving data on a carrier, including defining cables, cards and physical aspects. Fast
Ethernet, RS232, and ATM are protocols with physical layer components.
Lesson 8: Understanding Adapters, Hubs and Switches
The key focus of this lesson is:
• Describe a network adapter
• Describe transmission speed.
• Describe hubs.
• Describe switches.
• Describe the capabilities of a virtual LAN (VLAN).
49
Principles of Operating System
Network Adapter
The network adapter encapsulates the instructions it receives from the protocol
stack into a logical sequence known as a frame. Network Adapter / Network interface
controller (NIC) (also known as a network interface card, LAN adapter and by similar
terms) is a computer hardware component that connects a computer to a computer
network. Converts instructions from the network protocol stack into electrical signals and
merges these signals onto the wire .Converts electrical signals received on the wire into
meaningful instructions for the network protocol stack
Transmission Speed
Bandwidth is a measurement of bit-rate of available or consumed data communication
resources expressed in bits per second or multiples of it (bit/s, kbit/s, Mbit/s, Gbit/s, etc.). It is
often used to describe the transmission speed of a network
Hub
The Hub enables star wiring to provide a central wiring point and a networking device
that allows one to connect multiple PCs to a single network with provides for a degree of fault
isolation and extend your network. Hubs may be based on Ethernet, Firewire, or USB
connections.
A network hub is an unsophisticated device in comparison with, for example, a switch. A
hub does not examine or manage any of the traffic that comes through it: any packet entering
50
Principles of Operating System
any port is rebroadcast on all other ports.[2]
Effectively, it is barely aware of frames or packets
and mostly operates on raw bits or symbols. Consequently, due to the larger collision domains,
packet collisions are more frequent in networks connected using hubs than in networks
connected using more sophisticated devices.
Switch
Switch is a control unit that turns the flow of electricity on or data of in a circuit. It may
also be used to route information patterns in streaming electronic data sent over networks. In
the context of a network, a switch is a computer networking device that connects network
segments.
A switch is a telecommunication device that receives a message from any device
connected to it and then transmits the message only to the device for which the message was
meant. This makes the switch a more intelligent device than a hub (which receives a message
and then transmits it to all the other devices on its network). The network switch plays an
integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs
contain a number of linked managed switches. Small office/home office (SOHO) applications
typically use a single switch, or an all-purpose converged device such as a residential
gateway to access small office/home broadband services such as DSL or cable Internet. In
51
Principles of Operating System
most of these cases, the end-user device contains a router and components that interface to the
particular physical broadband technology. User devices may also include a telephone interface
for VoIP.
Virtual LAN
A single layer-2 network may be partitioned to create multiple distinct broadcast
domains, which are mutually isolated so that packets can only pass between them via one or
more routers; such a domain is referred to as a Virtual Local Area Network, Virtual
LAN or VLAN.
It enables you to manage and isolates the network traffic. The VLAN increases the
number of nodes without needing to rewire the network and dispersed it into logical LAN in a
form of physically group nodes
Lesson 9: Understanding Routing
The key focus of this lesson is:
• Describe routers.
• Describe a routing table.
• Describe both static and dynamic routing.
• Understand routing protocols.
• Select a suitable routing configuration.
Routing is the process of selecting paths in a network along which to send network
traffic. Routing is performed for many kinds of networks, including the telephone network (circuit
switching),electronic data networks (such as the Internet), and transportation networks. This
article is concerned primarily with routing in electronic data networks using packet
switching technology.
In packet switching networks, routing directs packet forwarding (the transit of logically
addressed packets from their source toward their ultimate destination) through
intermediate nodes. Intermediate nodes are typically network hardware devices such
as routers, bridges, gateways, firewalls, or switches. General-purpose computers can also
forward packets and perform routing, though they are not specialized hardware and may suffer
from limited performance. The routing process usually directs forwarding on the basis of routing
tables which maintain a record of the routes to various network destinations. Thus, constructing
52
Principles of Operating System
routing tables, which are held in the router's memory, is very important for efficient routing. Most
routing algorithms use only one network path at a time. Multipath routing techniques enable the
use of multiple alternative paths.
Router
A router is a device that manages network traffic by only forwarding packets when
required between computer networks, creating an overlay internetwork. It. A router is connected
to two or more data lines from different networks. When a data packet comes in one of the lines,
the router reads the address information in the packet to determine its ultimate destination.
Then, using information in its routing table or routing policy, it directs the packet to the next
network on its journey. Routers perform the "traffic directing" functions on the Internet. A data
packet is typically forwarded from one router to another through the networks that constitute the
internetwork until it reaches its destination node.
Key Message:
Discuss the process of the packet working its way through the network to the destination.
Ask students if they could recommend an alternative to using routing tables here. For
example, default gateway settings with each router configured with the other router’s local
interface as its default gateway.
53
Principles of Operating System
Common Routing Protocol
Routing Information Protocol
The Routing Information Protocol (RIP) is a distance-vector routing protocol, which
employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit
on the number of hops allowed in a path from the source to a destination. The maximum
number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks
that RIP can support. A hop count of 16 is considered an infinite distance and used to deprecate
inaccessible, inoperable, or otherwise undesirable routes in the selection process.
Open Shortest Path First
Open Shortest Path First (OSPF) is a link-state routing protocol for Internet Protocol (IP)
networks. It uses a link state routing algorithm and falls into the group of interior routing
protocols, operating within a single autonomous system (AS). It gathers link state information
from available routers and constructs a topology map of the network. The topology determines
the routing table presented to the Internet Layer which makes routing decisions based solely on
the destination IP address found in IP packets. OSPF was designed to support variable-length
subnet masking (VLSM) or Classless Inter-Domain Routing (CIDR) addressing models.
Border Gateway Protocol
Border Gateway Protocol (BGP) is the protocol which is used to make core routing
decisions on the Internet and it involves a table of IP networks or "prefixes" which designate
network reachable among autonomous systems (AS). BGP is a path vector protocol or a variant
of a Distance-vector routing protocol. BGP neighbors, called peers, are established by manual
configuration between routers to create a TCP session on port 179. A BGP speaker periodically
(every 30 seconds) sends 19-byte keep-alive messages to maintain the connection.[1]
Among
routing protocols, BGP is unique in using TCP as its transport protocol.
Discussion: Selecting a suitable routing protocol
Which routing protocol should you use?
Question: A subsidiary of Fabrikam has a medium-sized network consisting of around 500
nodes. These nodes are distributed across several floors in their headquarters
building. Additionally, there are about a dozen branch offices each with around ten
54
Principles of Operating System
nodes. Routers have been deployed within the network to interconnect the networks.
Would you recommend static or dynamic routing?
Answer: It depends on the number of routers involved. Static routing has the advantage of
being entirely predictable; it does not change unless you change it. However, there
might be twenty or more networks in this organization. As some are remotely connected,
there is the possibility of link-failure. A routing protocol would be useful in this respect.
Question: Is the use of a routing protocol indicated? If so, which one would you recommend?
Answer: The use of OSPF would be sensible. The network is not too large to implement RIP;
however, the presence of remote links with their potential for failure would better suit a
link-state rather than a distance-vector protocol; hence OSPF rather than RIP.
Question: Tailspin Toys has a small network consisting of around 100 nodes. Recently,
network throughput has been affected by network traffic. You decide to install routers to
help manage the network traffic. Initially, there will be three networks connected by two
routers. Would you recommend static or dynamic routing?
Answer: With a small number of routers there is no need for dynamic routing. Static routing
tables would be quick and easy to configure.
Question: How else could you configure these routers?
Answer: You could configure each router to use the other router as its default gateway. There
would then be no need for routing tables at all.
Question: Tailspin Toys implements an Internet connection by using a router. How does this
change the router configuration you have selected?
Answer: The default gateway method would no longer work; two routers in sequence is the
maximum possible. Implementation of either static routing or RIP would now be
appropriate.
Lesson 10: Understanding Media Types
The key focus of this lesson is:
• Describe coaxial cable.
• Describe twisted-pair cable.
55
Principles of Operating System
• Describe the CAT standards.
• Describe coaxial cable.
• Select a suitable cable type.
Coaxial cable
A coaxial cable is a type of cable that has an inner conductor surrounded by a tubular
insulating layer, surrounded by a tubular conducting shield. Many coaxial cables also have an
insulating outer sheath or jacket. The term coaxial comes from the inner conductor and the
outer shield sharing a geometric axis.
Coaxial cable is used as a transmission line for radio frequency signals. Its applications
include feed-lines connecting radio transmitters and receivers with their antennas, computer
network (Internet) connections, and distributing cable television signals. One advantage of coax
over other types of radio transmission line is that in an ideal coaxial cable the electromagnetic
field carrying the signal exists only in the space between the inner and outer conductors.
Coaxial cable conducts electrical signal using an inner conductor (usually a solid copper,
stranded copper or copper plated steel wire) surrounded by an insulating layer and all enclosed
by a shield.
56
Principles of Operating System
Coaxial cable design choices affect physical size, frequency performance, attenuation,
power handling capabilities, flexibility, strength, and cost. The inner conductor might be solid or
stranded; stranded is more flexible. To get better high-frequency performance, the inner
conductor may be silver-plated. Copper-plated steel wire is often used as an inner conductor for
cable used in the cable TV industry.
Twisted Pair Cable
Twisted pair cabling is a type of wiring in which two conductors of a single circuit are
twisted together for the purposes of canceling out electromagnetic interference (EMI) from
external sources and the installation is comparatively inexpensive. It is easier to find fault or
trouble due to the star wired way in which the cable is laid and supports many uses including
date and telephony.
In balanced pair operation, the two wires carry equal and opposite signals and the
destination detects the difference between the two. This is known as differential
mode transmission. Noise sources introduce signals into the wires by coupling of electric or
magnetic fields and tend to couple to both wires equally. The noise thus produces a common-
mode signal which is canceled at the receiver when the difference signal is taken.
57
Principles of Operating System
Fiber Cable
An optical fiber cable is a cable containing one or more optical fibers. The optical fiber
elements are typically individually coated with plastic layers and contained in a protective tube
suitable for the environment where the cable will be deployed.
Optical fiber consists of a core and a cladding layer, selected for total internal
reflection due to the difference in the refractive index between the two. In practical fibers, the
cladding is usually coated with a layer of acryl ate polymer or polyimide. This coating protects
the fiber from damage but does not contribute to its optical waveguide properties. Individual
coated fibers (or fibers formed into ribbons or bundles) then have a tough resin buffer layer
and/or core tube(s) extruded around them to form the cable core.
Discussion: Selecting a suitable Cabling strategy
What cabling system should you use?
Question: Fabrikam have purchased a new building to house their Research and Development
team. There are two floors, each to support around one hundred network nodes. Each
workstation is to have a telephone installed. You want to minimize future disruption, so
any cabling solution must provide for emerging standards. The nature of the work the R
58
Principles of Operating System
& D team undertakes necessitates a high bandwidth solution. What cabling system
would you recommend?
Answer: Twisted pair cabling is indicated – CAT 5e or 6 and above would be suitable for
Gigabit Ethernet.
Question: Fabrikam’s R & D center is across the private parking lot from the head offices. You
need to connect the R & D office back to the head office so that research staff has
access to corporate services. What cable would you recommend for this application?
Answer: Fiber cabling. Currently, MMF would probably do, as it is cheaper. However, 10Gbps
may not be sufficient for future applications, and it is expensive to dig up the parking lot.
SMF might be more sensible to future-proof the installation.
Review Questions
1. Why are firewalls so critical when designing and deploying networks?
Answer: Firewalls provide selective separation between networks. They allow potentially
untrusted networks to be connected to each other without posing a significant security
risk. The traffic and data that needs to travel between networks can be filtered and
monitored by the firewall to ensure the integrity of the relationship between networks.
2. What makes a wireless network more vulnerable to unauthorized access than a wired
network?
Answer: A wired network requires a node to have immediate physical access to network
hardware (an Ethernet jack for instance) to attempt to gain access to the network. On a
wireless network, however, successfully receiving the wireless signal is the only
requirement for physical access. Methods that govern access to a wired network such as
locked doors, specific office hours and security cameras do not necessarily govern
physical access to a wireless network.
Module 2: Windows Server Roles
Presentation: 60 minutes
Lab: 30 minutes
After completing this module, students will be able to:
• Describe different types of server.
59
Principles of Operating System
• Select and install server roles and features to support different types of server.
Required materials
To teach this module, you need the Microsoft® Office PowerPoint® file 6420B_06.ppt.
Important: We recommend that you use PowerPoint 2002 or a later version to display the
slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the
features of the slides might not be display correctly.
Preparation tasks
To prepare for this module:
• Read all of the materials for this module.
• Practice performing the demonstrations and the lab exercises.
• Work through the Module Review and Takeaways section, and determine how you will
use this section to reinforce student learning and promote knowledge transfer to on-the-
job performance.
Make sure that students are aware that the Course Companion CD contains additional module
information and resources.
After completing this module, students will be able to:
• Select and install server roles and features to support different types of server.
• Describe different types of server.
Windows Server 2008 R2
Windows® Server® 2008 R2 is the latest release of the Windows operating system for
Server workloads. Windows Server 2008 R2 builds upon the exceptional legacy of Windows
Server 2008. R2 is an incremental release to Windows Server 2008 – and only the second time
that Windows Client and Server releases are shipped simultaneously (Windows 2000 Server
was first). While Windows 7 is available in both 32- and 64-bit versions, R2 is the first 64-bit only
Server release.
Microsoft focused on the following key technology investment areas with Windows Server 2008
R2.
•Platform Scalability
• Virtualization
• Power Management
• Web Workloads
60
Principles of Operating System
• Enterprise Workloads
• Powerful Platform Management
Lesson 1: Role-Based Deployment
The key focus of this lesson is:
• Describe server roles.
• Describe role services.
• Describe server features.
• Use Server Manager.
• Manage server roles and features.
Ensure that the students understand why they would want to dedicate a server to a
particular role and why they would commonly see many roles installed on one server. Briefly
discuss the common roles that are available and for what they are used. Mention that the Active
Directory binaries are installed when the AD DS role is installed, but DCPromo still needs to be
run to create a domain controller.
Reference:
Windows Server 2008 R2: Edition Comparison by Server Role
http://go.microsoft.com/fwlink/?LinkID=199658
Server Roles
Server roles – servers can be configured to perform a number of roles. The applications
that the server is running specify the particular server’s role. Servers typically need services and
additional features installed to perform its specific role. When compared to workstations, servers
have more disk space and memory and faster processors. The server’s role determines the
hardware that servers require.
Active Directory Certificate Services
AD CS starting in Windows Server® 2008 provides customizable services for creating
and managing public key certificates used in software security systems that employ public key
technologies.
61
Principles of Operating System
Active Directory Domain Services
It provides secure hierarchical data storage for objects in a network such as users,
computer, printers and services
Active Directory Federation Services
It provides users with single sign-on access to system and application located across
organizational boundaries. It users a claims based access control authorization model to
maintain application security and implement federated identity.
Active Directory Lightweight Directory Services
It provides flexible support for directory enabled application without the dependencies
that are required for ADDS.
Active Directory Rights Management Services
A form of Information Right Management used on MS WIN the users encryption and a
form of selective functionality denial for limiting access to documents such as corporate e-mail,
word documents, web pages.
Application Server
It provides software application with services such as, data services, transaction
support, load balancing and management of large distributed system.
DHCP Server
A DHCP Server assigns IP addresses to client computers. This is very often used in
enterprise networks to reduce configuration efforts. All IP addresses of all computers are stored
in a database that resides on a server machine.
DNS Server
Domain Name System (DNS) is the name resolution protocol for TCP/IP networks, such
as the Internet. Client computers query a DNS server to resolve memorable, alphanumeric DNS
names to the IP addresses that computers use to communicate with each other. See more in
the DNS Server Overview for Windows Server 2008.
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf
Course Modules.pdf

More Related Content

Similar to Course Modules.pdf

Mj example case_study_layout_intro_completedq
Mj example case_study_layout_intro_completedqMj example case_study_layout_intro_completedq
Mj example case_study_layout_intro_completedq
hccit
 
Cloud Computing Technology
Cloud Computing TechnologyCloud Computing Technology
Cloud Computing Technology
Ahmed Al Salih
 
Report final
Report finalReport final
Report final
Jim Kats
 
RAPA Project Documentaion
RAPA Project DocumentaionRAPA Project Documentaion
RAPA Project Documentaion
Khaled El Sawy
 
Computer basics
Computer basicsComputer basics
Computer basics
thinkict
 
Assignments on adopting information technology in traditional organisations
Assignments on adopting information technology in traditional organisationsAssignments on adopting information technology in traditional organisations
Assignments on adopting information technology in traditional organisations
Mukalele Rogers
 

Similar to Course Modules.pdf (19)

Mj example case_study_layout_intro_completedq
Mj example case_study_layout_intro_completedqMj example case_study_layout_intro_completedq
Mj example case_study_layout_intro_completedq
 
Cloud Computing Technology
Cloud Computing TechnologyCloud Computing Technology
Cloud Computing Technology
 
Operating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdfOperating_System_Concepts_8th_EditionA4.pdf
Operating_System_Concepts_8th_EditionA4.pdf
 
Report final
Report finalReport final
Report final
 
EMC Proven Professional Knowledge Sharing 2008 Book of Abstracts
EMC Proven Professional Knowledge Sharing 2008 Book of  AbstractsEMC Proven Professional Knowledge Sharing 2008 Book of  Abstracts
EMC Proven Professional Knowledge Sharing 2008 Book of Abstracts
 
Revant Rastogi
Revant Rastogi Revant Rastogi
Revant Rastogi
 
WeWebU OpenWorkdesk / OpenECM-Framework
WeWebU OpenWorkdesk / OpenECM-FrameworkWeWebU OpenWorkdesk / OpenECM-Framework
WeWebU OpenWorkdesk / OpenECM-Framework
 
KHAN_FAHAD_FL14
KHAN_FAHAD_FL14KHAN_FAHAD_FL14
KHAN_FAHAD_FL14
 
Adf and data quality
Adf and data qualityAdf and data quality
Adf and data quality
 
RAPA Project Documentaion
RAPA Project DocumentaionRAPA Project Documentaion
RAPA Project Documentaion
 
thesis
thesisthesis
thesis
 
Lecture7(CS372-AI&KnowledgeBaseSystems)
Lecture7(CS372-AI&KnowledgeBaseSystems)Lecture7(CS372-AI&KnowledgeBaseSystems)
Lecture7(CS372-AI&KnowledgeBaseSystems)
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Software architecture for developers
Software architecture for developersSoftware architecture for developers
Software architecture for developers
 
Computer science basics for nonit students
Computer science basics for nonit studentsComputer science basics for nonit students
Computer science basics for nonit students
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Kto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicingKto12 tle ict computer hardware servicing
Kto12 tle ict computer hardware servicing
 
Assignments on adopting information technology in traditional organisations
Assignments on adopting information technology in traditional organisationsAssignments on adopting information technology in traditional organisations
Assignments on adopting information technology in traditional organisations
 
Marta de la Cruz-Informe Final
Marta de la Cruz-Informe FinalMarta de la Cruz-Informe Final
Marta de la Cruz-Informe Final
 

More from JarellScott

Easttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdfEasttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdf
JarellScott
 
Easttom C. Computer Security Fundamentals 4ed 2020.pdf
Easttom C. Computer Security Fundamentals 4ed 2020.pdfEasttom C. Computer Security Fundamentals 4ed 2020.pdf
Easttom C. Computer Security Fundamentals 4ed 2020.pdf
JarellScott
 
Penrose R. Artificial Intelligence Versus Natural Intelligence 2022.pdf
Penrose R. Artificial Intelligence Versus Natural Intelligence 2022.pdfPenrose R. Artificial Intelligence Versus Natural Intelligence 2022.pdf
Penrose R. Artificial Intelligence Versus Natural Intelligence 2022.pdf
JarellScott
 
W1 Lesson 1 - Understanding Network Infrastructure and Components - Presentat...
W1 Lesson 1 - Understanding Network Infrastructure and Components - Presentat...W1 Lesson 1 - Understanding Network Infrastructure and Components - Presentat...
W1 Lesson 1 - Understanding Network Infrastructure and Components - Presentat...
JarellScott
 
Easttom C. Computer Security Fundamentals 3ed 2016.pdf
Easttom C. Computer Security Fundamentals 3ed 2016.pdfEasttom C. Computer Security Fundamentals 3ed 2016.pdf
Easttom C. Computer Security Fundamentals 3ed 2016.pdf
JarellScott
 
pdfcoffee.com_maricar-maquimot-philippine-popular-culture-pdf-free.pdf
pdfcoffee.com_maricar-maquimot-philippine-popular-culture-pdf-free.pdfpdfcoffee.com_maricar-maquimot-philippine-popular-culture-pdf-free.pdf
pdfcoffee.com_maricar-maquimot-philippine-popular-culture-pdf-free.pdf
JarellScott
 
W2-Presentation-Problem Solving through Flowcharts 1.pdf
W2-Presentation-Problem Solving through Flowcharts 1.pdfW2-Presentation-Problem Solving through Flowcharts 1.pdf
W2-Presentation-Problem Solving through Flowcharts 1.pdf
JarellScott
 
W1-Presentation-Introduction to Computing and Programming.pdf
W1-Presentation-Introduction to Computing and Programming.pdfW1-Presentation-Introduction to Computing and Programming.pdf
W1-Presentation-Introduction to Computing and Programming.pdf
JarellScott
 

More from JarellScott (9)

Easttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdfEasttom C. Computer Security Fundamentals 5ed 2023.pdf
Easttom C. Computer Security Fundamentals 5ed 2023.pdf
 
Virvou M. Handbook on Artificial Intelligence...Engineer. Vol 1. 2022.pdf
Virvou M. Handbook on Artificial Intelligence...Engineer. Vol 1. 2022.pdfVirvou M. Handbook on Artificial Intelligence...Engineer. Vol 1. 2022.pdf
Virvou M. Handbook on Artificial Intelligence...Engineer. Vol 1. 2022.pdf
 
Easttom C. Computer Security Fundamentals 4ed 2020.pdf
Easttom C. Computer Security Fundamentals 4ed 2020.pdfEasttom C. Computer Security Fundamentals 4ed 2020.pdf
Easttom C. Computer Security Fundamentals 4ed 2020.pdf
 
Penrose R. Artificial Intelligence Versus Natural Intelligence 2022.pdf
Penrose R. Artificial Intelligence Versus Natural Intelligence 2022.pdfPenrose R. Artificial Intelligence Versus Natural Intelligence 2022.pdf
Penrose R. Artificial Intelligence Versus Natural Intelligence 2022.pdf
 
W1 Lesson 1 - Understanding Network Infrastructure and Components - Presentat...
W1 Lesson 1 - Understanding Network Infrastructure and Components - Presentat...W1 Lesson 1 - Understanding Network Infrastructure and Components - Presentat...
W1 Lesson 1 - Understanding Network Infrastructure and Components - Presentat...
 
Easttom C. Computer Security Fundamentals 3ed 2016.pdf
Easttom C. Computer Security Fundamentals 3ed 2016.pdfEasttom C. Computer Security Fundamentals 3ed 2016.pdf
Easttom C. Computer Security Fundamentals 3ed 2016.pdf
 
pdfcoffee.com_maricar-maquimot-philippine-popular-culture-pdf-free.pdf
pdfcoffee.com_maricar-maquimot-philippine-popular-culture-pdf-free.pdfpdfcoffee.com_maricar-maquimot-philippine-popular-culture-pdf-free.pdf
pdfcoffee.com_maricar-maquimot-philippine-popular-culture-pdf-free.pdf
 
W2-Presentation-Problem Solving through Flowcharts 1.pdf
W2-Presentation-Problem Solving through Flowcharts 1.pdfW2-Presentation-Problem Solving through Flowcharts 1.pdf
W2-Presentation-Problem Solving through Flowcharts 1.pdf
 
W1-Presentation-Introduction to Computing and Programming.pdf
W1-Presentation-Introduction to Computing and Programming.pdfW1-Presentation-Introduction to Computing and Programming.pdf
W1-Presentation-Introduction to Computing and Programming.pdf
 

Recently uploaded

Recently uploaded (20)

Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service AvailableBankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Solan Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Solan Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableSolan Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Solan Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTS
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTSJHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTS
JHARSUGUDA CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JHARSUGUDA ESCORTS
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Chandrapur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Chandrapur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableChandrapur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Chandrapur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 

Course Modules.pdf

  • 1. Arthur D. Ollanda Global Education Services AMA University 11/8/2013 Principles of Operating System
  • 2. 2 Principles of Operating System Preface Many years ago, after the computer was introduced, it became the one of the most in- demand man-made machine. The computer can use anytime, no matter how big or small the device, as long as it is operational, the user can surf the net, do the office or home works and even can play a game. It never runs without software, that leads the machine to do some task and the interface of the user that can control and manage the system of the computer, and these are all about the "Operating System". Operating System sometimes referred as "OS", this software manages computer hardware resources and provides common services for a computer programs. This Lecture Manual, "Principles of Operating System" provides the concept and importance of software that translates the human to machine language communication to execute a certain tasks. It describes the architecture and design of the system, and it also includes the central processing unit scheduling that shows the preemptive and non-preemptive events and style of a processor. The main focus of this lecture manual are Configuring the Windows 7 Client and Basic Administration, it introduces the previous and the recent Microsoft Operating System that shows of what makes the Microsoft Windows became more popular than ever. The Windows 7 Operating System shows the differences from earlier version and the new features included from there editions. These enhanced the ability, capability and security of the system that the user has never been experienced before. It can explore the new interface of the net using the Internet Explorer 8, 9, 10 and 11, improved the mobility of Windows that brought up the level of wireless technology. And also include the explanation of some basic operations in Windows Server 2008 R2. This lecture manual defines each modules, chapters and topics of the course with understandable exercises and assessments that will develop the skills of a computer student. It will serve as the references course for Microsoft Certified Technology Specialist certification exam.
  • 3. 3 Principles of Operating System Acknowledgement The Global Education Services personnel are grateful to Almighty God to reproduce this lecture manual about the "Principles of Operating System; Configuring Windows 7 Client" and it is a privilege for us to provide the necessary materials through Microsoft as the additional references of our faculty and students to explore and experience the growth of computer technology. We wish to express our gratitude to our Chairman, Amable R. Aguiluz V for giving us an opportunity to be part of AMA Education System that molds us in the world of Information Technology. To our President, Amable C. Aguiluz IX to offer his trust to face the challenge in many competition and to become more competitive. We are sincerely thanks the GES Head, Christopher P. Satulan for the motivation he gave us in every task that we have been through in our academic alliances and for being a good team leader. In addition, a many thanks to Academic Affairs Department Head, Dr. Alma V. Dela Cruz for allowing us to be a part of supporting and enhancing academic excellence of our institution. We also place on record, our sense of gratitude to one and all who, directly or indirectly, have lent their helping hand in this scheme. Thank you Arthur D. Ollanda AMAES - GES
  • 4. 4 Principles of Operating System Table of Contents Preface ....................................................................................................................................2 Acknowledgement ....................................................................................................................3 Table of Contents .....................................................................................................................4 Principles of Operating System Introduction...................................................................................................................5 Part 1: The Concepts of Operating System.................................................................................6 Functions of Operating System......................................................................................7 Types of Operating System...........................................................................................8 Operating System as User Interface...............................................................................9 I/O System Management...............................................................................................11 Assessment Part 1 Exercise 1....................................................................................................................13 The CPU Scheduling CPU Scheduler.............................................................................................................15 First Come, First Served Scheduling..............................................................................18 Shortest-Job-First Scheduling........................................................................................19 Priority Scheduling........................................................................................................21 Round Robin Scheduling...............................................................................................21 Multi-Level Queue Scheduling........................................................................................23 Exercise 2....................................................................................................................27 Part 2: Microsoft Windows Operating System: Configuring Windows 7 Client Background The Early Version..............................................................................................31 Windows 9X.....................................................................................................32 Windows NT.....................................................................................................33 Windows XP.....................................................................................................33 Windows Vista 7 and 8......................................................................................34 Microsoft Windows 7 Module 1: Understanding Network Infrastructure..............................................................35 Lesson 1: Network Architecture Standards...........................................................36 Lesson 2: Local Area Network..............................................................................39 Lesson 3: Wide Area Network...............................................................................42 Lesson 4: Wireless Networking.............................................................................44 Lesson 5: Connecting to the Internet.....................................................................47 Lesson 6: Firewall ...............................................................................................48 Lesson 7: The OSI Model ....................................................................................50 Lesson 8: Understanding Adapters, Hub and Switches ..........................................51 Lesson 9: Understanding Routing .........................................................................54 Lesson 10: Understanding Media Types ................................................................57 Module 2: Windows Server Roles Windows Server 2008 R2 ..................................................................................................62 Lesson 1: Role-Based Deployment.........................................................................63 Lesson 2: Deploying Role-Specific Servers ............................................................68 Module 3: Installing, Upgrading and Migrating to Windows 7 Overview Lesson 1: Preparing to Install Windows 7 ................................................................71 Lesson 2: Performing a Clean Installation of Windows 7 ...........................................79 Lesson 3: Upgrading and Migrating to Windows 7 ....................................................81 Lesson 4: Performing an Image-Based Installation of Windows 7 .............................90 Lesson 5: Configuring Application Compatibility ......................................................107 Module 4: Implementing User Accounts and Groups ........................................................................113 Lesson 1: User Accounts ........................................................................................114 Lesson 2: The Domain Controller .............................................................................116
  • 5. 5 Principles of Operating System Lesson 3: Managing Users, Group and Computers ....................................................118 Lesson 4: Implementing Organizational Units ...........................................................127 Lesson 5: Implementing Group Policy .....................................................................130 Module 5: Configuring Disks and Drivers Lesson 1: Partitioning Disks in Windows 7 ..............................................................135 Lesson 2: Managing Disk Volumes .........................................................................139 Lesson 3: Maintaining Disks in Windows 7 ..............................................................145 Lesson 4: Installing and Configuring Device Drivers .................................................149 Module 6: Configuring File Access and Printers on Windows 7 Clients Lesson 1: Overview of Authentication and Authorization ...........................................164 Lesson 2: Managing File Access in Windows 7 ........................................................168 Lesson 3: Managing Shared Folders .......................................................................176 Lesson 4: Configuring File Compression .................................................................183 Lesson 5: Managing Printing ...................................................................................189 Module 7: Configuring Network Connectivity Lesson 1: Configuring IPv4 Network Connectivity .....................................................201 Lesson 2: Configuring IPv6 Network Connectivity .....................................................208 Lesson 3: Implementing Automatic IP Address Allocation Lesson 4: Overview of Name Resolution Lesson 5: Troubleshooting Network Issues Module 8: Configuring Wireless Network Connections Lesson 1: Overview of Wireless Network Lesson 2: Configuring Wireless Network Module 9: Securing Windows 7 Desktops Lesson 1: Overview of Security Management in Windows 7 Lesson 2: Securing a Windows 7 Client Computer by Using Local Security Policy Settings Lesson 3: Securing Data by Using EFS and BitLocker Lesson 4: Configuring Application Restrictions Lesson 5: Configuring User Account Control Lesson 6: Configuring Windows Firewall Lesson 7: Configuring Security Settings in Internet Explorer 8 Lesson 8: Configuring Windows Defender Module 10: Optimizing and Maintaining Windows 7 Client Computers Lesson 1: Maintaining Performance by Using the Windows 7 Performance Tools Lesson 2: Maintaining Reliability by Using the Windows 7 Diagnostic Tools Lesson 3: Backing Up and Restoring Data by Using Windows Backup Lesson 4: Restoring a Windows 7 System by Using System Restore Points Lesson 5: Configuring Windows Update Module 11: Configuring Mobile Computing and Remote Access in Windows 7 Lesson 1: Configuring Mobile Computer and Device Settings Lesson 2: Configuring Remote Desktop and Remote Assistance for Remote Access Lesson 3: Configuring DirectAccess for Remote Access Lesson 4: Configuring BranchCache for Remote Access
  • 6. 6 Principles of Operating System Principles of Operating System Introduction Turn on your computer, know that you are in control. There is the trusty computer mouse, which you can move anywhere on the screen, summoning up your music library, pictures, videos or Internet browser at the slightest whim. Although it is easy to feel like being a director in front of your desktop and you might wondering how the machine do the certain job, and the real one behind the curtain handling the necessary tasks is the operating system. An operating system act as an intermediary between the user of a computer and computer hardware. The purpose of an operating system is to provide an environment in which a user can execute programs in a convenient and efficient manner. It is a software that manages the computer hardware. The hardware must provide appropriate mechanisms to ensure the correct operation of the computer system and to prevent user programs from interfering with the proper operation of the system. Operating systems provide a software platform on top of which other programs, called application programs, can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications you can run. For PCs, the most popular operating systems are DOS, OS/2, and Windows, but others are available, such as Linux and Mac OS. Important: We recommend that you use PowerPoint 2002 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides might not be display correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance.
  • 7. 7 Principles of Operating System Part 1: The Concepts of Operating System An Operating System is a program that controls the execution of application programs and acts as an interface between the user of a computer and the computer hardware. A more common definition is that the operating system is the one program running at all times on the computer (usually called the kernel), with all else being applications programs. An Operating system is concerned with the allocation of resources and services, such as memory, processors, devices and information. The Operating System correspondingly includes programs to manage these resources, such as a traffic controller, a scheduler, memory management module, I/O programs, and a file system. The operating system is a vital component of the system software in a computer system. Application programs usually require an operating system to function. It is the most important software that runs on a computer. It manages the computer's memory, processes, and all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's "language." Without an operating system, a computer is useless. Functions of Operating System Operating system performs three functions: 1. Convenience: An OS makes a computer more convenient to use. 2. Efficiency: An OS allows the computer system resources to be used in an efficient manner. 3. Ability to Evolve: An OS should be constructed in such a way as to permit the effective development, testing and introduction of new system functions without at the same time interfering with service. Types of Operating System 1. GUI The Graphical User Interface, a GUI Operating System contains graphics and icons and is commonly navigated by using a computer mouse. A type of user
  • 8. 8 Principles of Operating System interface that allows users to interact with electronic devices using images rather than text commands. represents the information and actions available to a user through graphical icons and visual indicators such as secondary notation, as opposed to text- based interfaces, typed command labels or text navigation. The actions are usually performed through direct manipulation of the graphical elements. 2. Real-time A real-time operating system is a multitasking operating system that aims at executing real-time applications. An often use specialized scheduling algorithms so that they can achieve a deterministic nature of behavior. The main objective of real-time operating systems is their quick and predictable response to events. They have an event-driven or time-sharing design and often aspects of both. An event-driven system switches between tasks based on their priorities or external events while time-sharing operating systems switch tasks based on clock interrupts. 3. Multi-user A multi-user operating system allows multiple users to access a computer system at the same time. Time-sharing systems and Internet servers can be classified as multi- user systems as they enable multiple-user access to a computer through the sharing of time. Single-user operating systems have only one user but may allow multiple programs to run at the same time. 4. Multi-tasking A multi-tasking operating system allows more than one program to be running at a time, from the point of view of human time scales. Multi-tasking can be of two types, the pre-emptive and co-operative. a. Pre-emptive multitasking, the operating system slices the CPU time and dedicates one slot to each of the programs. Unix-like operating systems such as Solaris and Linux support pre-emptive multitasking. b. Cooperative multitasking is achieved by relying on each process to give time to the other processes in a defined manner. 16-bit versions of Microsoft Windows used cooperative multi-tasking. 32-bit versions of both
  • 9. 9 Principles of Operating System Windows NT and Win9x, used pre-emptive multi-tasking. Mac OS prior to OS X used to support cooperative multitasking. 5. Distributed A distributed operating system manages a group of independent computers and makes them appear to be a single computer. The development of networked computers that could be linked and communicate with each other gave rise to distributed computing. Distributed computations are carried out on more than one machine. When computers in a group work in cooperation, they make a distributed system. 6. Embedded Embedded operating systems are designed to be used in embedded computer systems. They are designed to operate on small machines like PDAs with less autonomy. They are able to operate with a limited number of resources. They are very compact and extremely efficient by design. Windows CE and Minix 3 are some examples of embedded operating systems. Operating System as User Interface Every general purpose computer consists of the hardware, operating system, system programs, application programs. The hardware consists of memory, CPU, ALU, I/O devices, peripheral device and storage device. System program consists of compilers, loaders, editors, OS etc. The application program consists of business program, database program. (see Figure 1.0)
  • 10. 10 Principles of Operating System Figure 1.0 Conceptual view of a computer system Every computer must have an operating system to run other programs. The operating system and coordinates the use of the hardware among the various system programs and application program for a various users. It simply provides an environment within which other programs can do useful work. The operating system is a set of special programs that run on a computer system that allow it to work properly. It performs basic tasks such as recognizing input from the keyboard, keeping track of files and directories on the disk, sending output to the display screen and controlling a peripheral devices. OS is designed to serve two basic purposes : 1. It controls the allocation and use of the computing system‘s resources among the various user and tasks. 2. It provides an interface between the computer hardware and the programmer that simplifies and makes feasible for coding, creation, debugging of application programs. The operating system must support the following tasks. The tasks are : 1. Provides the facilities to create, modification of program and data files using and editor. 2. Access to the compiler for translating the user program from high level language to machine language. 3. Provide a loader program to move the compiled program code to the computer‘s memory for execution. 4. Provide routines that handle the details of I/O programming. I/O System Management The module that keeps track of the status of devices is called the I/O traffic controller. Each I/O device has a device handler that resides in a separate process associated with that device. The I/O subsystem consists of; a. A memory management component that includes buffering, caching and spooling. b. A general device driver interface.
  • 11. 11 Principles of Operating System Drivers for specific hardware devices. A. Assembler Input to an assembler is an assembly language program. Output is an object program plus information that enables the loader to prepare the object program for execution. At one time, the computer programmer had at his disposal a basic machine that interpreted, through hardware, certain fundamental instructions. He would program this computer by writing a series of ones and zeros(machine language), place them into the memory of the machine. B. Compiler A compilers is a program that accepts a source program in a high-level language and produces a corresponding object program. An interpreter is a program that appears to execute a source program as if it was machine language. The same name (FORTRAN, COBOL etc) is often used to designate both a compiler and its associated language. C. Loader A loader is a routine that loads an object program and prepares it for execution. There are various loading schemes: absolute, relocating and direct-linking. In general, the loader must load, relocate, and link the object program. Loader is a program that places programs into memory and prepares them for execution. In a simple loading scheme, the assembler outputs the machine language translation of a program on a secondary device and a loader is placed in core. The loader places into memory the machine language version of the user‘s program and transfers control to it. Since the loader program is much smaller than the assembler, it makes more core available to user‘s program.
  • 12. 12 Principles of Operating System Assessment Part 1: Review Exercise 1: 1. It is concerned with the allocation of resources and services, such as memory, processors, devices and information. Answer: Operating System 2. A type operating system that aims at executing real-time applications. An often use specialized scheduling algorithms so that they can achieve a deterministic nature of behavior. Answer: Real-time OS 3. A program that accepts a source program in a high-level language and produces a corresponding object program. Answer: compilers 4. These are designed to be used in embedded computer systems. Answer: Embedded OS 5. Give and explain the three main functions of Operating System. 6. A routine that loads an object program and prepares it for execution. Answer: Loader 7. It manages a group of independent computers and makes them appear to be a single computer. Answer: Distributed OS 8. These operating system allows more than one program to be running at a time. Answer: Multi-tasking OS 9. Output is an object program plus information that enables the loader to prepare the object program for execution. Answer: Assembler 10. A operating system that allows multiple users to access a computer system at the same time. Answer: Multi-user OS
  • 13. 13 Principles of Operating System The CPU Scheduling Basic Concept 1. Maximum CPU utilization is obtained with multiprogramming a. Several processes are kept in memory at one time b. Every time a running process has to wait, another process can take over use of the CPU 2. Scheduling of the CPU is fundamental to operating system design 3. Process execution consists of a cycle of a CPU time burst and an I/O time burst. a. Processes alternate between these two states (i.e., CPU burst and I/O burst) b. Eventually, the final CPU burst ends with a system request to terminate execution Alternating Sequence of CPU and I/O Bursts
  • 14. 14 Principles of Operating System Histogram of CPU Burst CPU bursts tend to have a frequency curve similar to the exponential curve shown above. It is characterized by a large number of short CPU bursts and a small number of long CPU bursts. An I/O-bound program typically has many short CPU bursts; a CPU-bound program might have a few long CPU bursts. CPU Scheduler The CPU scheduler selects from among the processes in memory that are ready to execute and allocates the CPU to one of them. CPU scheduling is affected by the following set of circumstances: 1. (N) A process switches from running to waiting state 2. (P) A process switches from running to ready state 3. (P) A process switches from waiting to ready state 4. (N) A processes switches from running to terminated state Circumstances 1 and 4 are non-preemptive; they offer no schedule choice Circumstances 2 and 3 are pre-emptive; they can be scheduled
  • 15. 15 Principles of Operating System Dispatcher The dispatcher module gives control of the CPU to the process selected by the short- term scheduler; this involves: • switching context • switching to user mode • jumping to the proper location in the user program to restart that program The dispatcher needs to run as fast as possible, since it is invoked during process context switch The time it takes for the dispatcher to stop one process and start another process is called dispatch latency Scheduling Criteria o Different CPU scheduling algorithms have different properties o The choice of a particular algorithm may favor one class of processes over another o In choosing which algorithm to use, the properties of the various algorithms should be considered o Criteria for comparing CPU scheduling algorithms may include the following • CPU utilization – percent of time that the CPU is busy executing a process • Throughput – number of processes that are completed per time unit • Response time – amount of time it takes from when a request was submitted until the first response occurs (but not the time it takes to output the entire response)
  • 16. 16 Principles of Operating System • Waiting time – the amount of time before a process starts after first entering the ready queue (or the sum of the amount of time a process has spent waiting in the ready queue) • Turnaround time – amount of time to execute a particular process from the time of submission through the time of completion Optimization Criteria It is desirable to • Maximize CPU utilization • Maximize throughput • Minimize turnaround time • Minimize start time • Minimize waiting time • Minimize response time In most cases, we strive to optimize the average measure of each metric In other cases, it is more important to optimize the minimum or maximum values rather than the average Single Processor Scheduling Algorithm o First Come, First Served (FCFS) o Shortest Job First (SJF) o Priority o Round Robin (RR) First Come, First Served Scheduling Process Burst Time P1 24 P2 3 P3 3 With FCFS, the process that requests the CPU first is allocated the CPU first
  • 17. 17 Principles of Operating System Sample; 1. Suppose that the processes arrive in the order: P1 , P2 , P3 The Gantt Chart for the schedule is: § Waiting time for P1 = 0; P2 = 24; P3 = 27 § Average waiting time: (0 + 24 + 27)/3 = 17 § Average turn-around time: (24 + 27 + 30)/3 = 27 2. Suppose that the processes arrive in the order: P2 , P3 , P1 The Gantt chart for the schedule is: § Waiting time for P1 = 6; P2 = 0; P3 = 3 § Average waiting time: (6 + 0 + 3)/3 = 3 (Much better than Case #1) § Average turn-around time: (3 + 6 + 30)/3 = 13 Sample 1 is an example of the convoy effect; all the other processes wait for one long- running process to finish using the CPU • This problem results in lower CPU and device utilization; Case #2 shows that higher utilization might be possible if the short processes were allowed to run first The FCFS scheduling algorithm is non-preemptive
  • 18. 18 Principles of Operating System • Once the CPU has been allocated to a process, that process keeps the CPU until it releases it either by terminating or by requesting I/O • It is a troublesome algorithm for time-sharing systems Shortest-Job-First Scheduling The SJF algorithm associates with each process the length of its next CPU burst When the CPU becomes available, it is assigned to the process that has the smallest next CPU burst (in the case of matching bursts, FCFS is used) Two schemes: 1. Non-preemptive – once the CPU is given to the process, it cannot be preempted until it completes its CPU burst. 2. Preemptive – if a new process arrives with a CPU burst length less than the remaining time of the current executing process, preempt. This scheme is know as the Shortest- Remaining-Time-First (SRTF). Sample 1 : Non-Preemtive SJF (simultaneous arrival Process Arrival Time Burst Time P1 0.0 6 P2 0.0 4 P3 0.0 1 P4 0.0 5 SJF (non-preemptive, simultaneous arrival) § Average waiting time = (0 + 1 + 5 + 10)/4 = 4 § Average turn-around time = (1 + 5 + 10 + 16)/4 = 8
  • 19. 19 Principles of Operating System Sample 2: Non-Preemptive SJF (varied arrival times) Process Arrival Time Burst Time P1 0.0 7 P2 2.0 4 P3 4.0 1 P4 5.0 4 SJF (non-preemptive, varied arrival times) Average waiting time: = ( (0 – 0) + (8 – 2) + (7 – 4) + (12 – 5) )/4 = (0 + 6 + 3 + 7)/4 = 4 Average turn-around time: = ( (7 – 0) + (12 – 2) + (8 - 4) + (16 – 5))/4 = ( 7 + 10 + 4 + 11)/4 = 8 Priority Scheduling o The SJF algorithm is a special case of the general priority scheduling algorithm o A priority number (integer) is associated with each process o The CPU is allocated to the process with the highest priority (smallest integer = highest priority) o Priority scheduling can be either preemptive or non-preemptive • A preemptive approach will preempt the CPU if the priority of the newly- arrived process is higher than the priority of the currently running process • A non-preemptive approach will simply put the new process (with the highest priority) at the head of the ready queue
  • 20. 20 Principles of Operating System SJF is a priority scheduling algorithm where priority is the predicted next CPU burst time. The main problem with priority scheduling is starvation, that is, low priority processes may never execute. A solution is aging; as time progresses, the priority of a process in the ready queue is increased. Round Robin (RR) Scheduling In the round robin algorithm, each process gets a small unit of CPU time (a time quantum), usually 10-100 milliseconds. After this time has elapsed, the process is preempted and added to the end of the ready queue. If there are n processes in the ready queue and the time quantum is q, then each process gets 1/n of the CPU time in chunks of at most q time units at once. No process waits more than (n-1)q time units. Performance of the round robin algorithm q large Þ FCFS q small Þ q must be greater than the context switch time; otherwise, the overhead is too high One rule of thumb is that 80% of the CPU bursts should be shorter than the time quantum Sample of RR with Time Quantum = 20 Process Burst Time P1 53 P2 17 P3 68 P4 24 The Gantt chart is:
  • 21. 21 Principles of Operating System Typically, higher average turnaround than SJF, but better response time Average waiting time = ( [(0 – 0) + (77 - 20) + (121 – 97)] + (20 – 0) + [(37 – 0) + (97 - 57) + (134 – 117)]+[(57–0)+(117–77)])/4 =(0 + 57 + 24) + 20 + (37 + 40 + 17) + (57 + 40) ) / 4 =(81+20+94+97)/4 = 292 / 4 = 73 Average turn-around time = 134 + 37 + 162 + 121) / 4 = 113.5 Time Quantum and Context Switches Turnaround Time Varies with The Time Quantum As can be seen from this graph, the average turnaround time of a set of processes does not necessarily improve as the time quantum size increases. In general, the average
  • 22. 22 Principles of Operating System turnaround time can be improved if most processes finish their next CPU burst in a single time quantum. Multi-Level Queue Scheduling o Multi-level queue scheduling is used when processes can be classified into groups o For example, foreground (interactive) processes and background (batch) processes • The two types of processes have different response-time requirements and so may have different scheduling needs • Also, foreground processes may have priority (externally defined) over background processes o A multi-level queue scheduling algorithm partitions the ready queue into several separate queues o The processes are permanently assigned to one queue, generally based on some property of the process such as memory size, process priority, or process type o Each queue has its own scheduling algorithm • The foreground queue might be scheduled using an RR algorithm • The background queue might be scheduled using an FCFS algorithm o In addition, there needs to be scheduling among the queues, which is commonly implemented as fixed-priority pre-emptive scheduling • The foreground queue may have absolute priority over the background queue o One example of a multi-level queue are the five queues shown below o Each queue has absolute priority over lower priority queues o For example, no process in the batch queue can run unless the queues above it are empty o However, this can result in starvation for the processes in the lower priority queues
  • 23. 23 Principles of Operating System o Another possibility is to time slice among the queues o Each queue gets a certain portion of the CPU time, which it can then schedule among its various processes • The foreground queue can be given 80% of the CPU time for RR scheduling • The background queue can be given 20% of the CPU time for FCFS scheduling Multi-Level Feedback Queue Scheduling o In multi-level feedback queue scheduling, a process can move between the various queues; aging can be implemented this way o A multilevel-feedback-queue scheduler is defined by the following parameters: • Number of queues • Scheduling algorithms for each queue • Method used to determine when to promote a process • Method used to determine when to demote a process • Method used to determine which queue a process will enter when that process needs service Example of Multilevel Feedback Queue Multi-Processor Scheduling o If multiple CPUs are available, load sharing among them becomes possible; the scheduling problem becomes more complex o We concentrate in this discussion on systems in which the processors are identical (homogeneous) in terms of their functionality
  • 24. 24 Principles of Operating System • We can use any available processor to run any process in the queue o Two approaches: Asymmetric processing and symmetric processing (see next slide) Asymmetric multiprocessing (ASMP) • One processor handles all scheduling decisions, I/O processing, and other system activities • The other processors execute only user code • Because only one processor accesses the system data structures, the need for data sharing is reduced Symmetric multiprocessing (SMP) • Each processor schedules itself • All processes may be in a common ready queue or each processor may have its own ready queue • Either way, each processor examines the ready queue and selects a process to execute • Efficient use of the CPUs requires load balancing to keep the workload evenly distributed 4 In a Push migration approach, a specific task regularly checks the processor loads and redistributes the waiting processes as needed 4 In a Pull migration approach, an idle processor pulls a waiting job from the queue of a busy processor • Virtually all modern operating systems support SMP, including Windows XP, Solaris, Linux, and Mac OS X o Symmetric Multithreading o Symmetric multiprocessing systems allow several threads to run concurrently by providing multiple physical processors o An alternative approach is to provide multiple logical rather than physical processors o Such a strategy is known as symmetric multithreading (SMT) • This is also known as hyperthreading technology o The idea behind SMT is to create multiple logical processors on the same physical processor
  • 25. 25 Principles of Operating System • This presents a view of several logical processors to the operating system, even on a system with a single physical processor • Each logical processor has its own architecture state, which includes general- purpose and machine-state registers • Each logical processor is responsible for its own interrupt handling • However, each logical processor shares the resources of its physical processor, such as cache memory and buses o SMT is a feature provided in the hardware, not the software The hardware must provide the representation of the architecture state for each logical processor, as well as interrupt handling A typical SMT Architecture Review Exercise 2: 1. Define the difference between preemptive and nonpreemptive scheduling. 2. Suppose that the following processes arrive for execution at the times indicated. Each process will run the listed amount of time. In answering the questions, use nonpreemptive scheduling and base all decisions on the information you have at the time the decision must be made. Process Arrival Time Burst Time P1 0.0 8 P2 0.4 4 P3 1.0 1
  • 26. 26 Principles of Operating System a. What is the average turnaround time for these processes with the FCFS scheduling algorithm? b. What is the average turnaround time for these processes with the SJF scheduling algorithm? c. The SJF algorithm is supposed to improve performance, but notice that we chose to run process P1 at time 0 because we did not know that two shorter processes would arrive soon. Compute what the average turnaround time will be if the CPU is left idle for the first 1unit and then SJF scheduling is used. Remember that processes P1and P2 are waiting during this idle time, so their waiting time may increase. This algorithm could be known as future-knowledge scheduling. 3. What advantage is there in having different time-quantum sizes on different levels of a multilevel queueing system? 4. Many CPU-scheduling algorithms are parameterized. For example, the RR algorithm requires a parameter to indicate the time slice. Multilevel feedback queues require parameters to define the number of queues, the scheduling algorithms for each queue, the criteria used to move processes between queues, and so on. These algorithms are thus really sets of algorithms (for example, the set of RR algorithms for all time slices, and so on). One set of algorithms may include another (for example, the FCFS algorithm is the RR algorithm with an infinite time quantum).What (if any) relation holds between the following pairs of sets of algorithms? a. Priority and SJF b. Multilevel feedback queues and FCFS c. Priority and FCFS d. RR and SJF
  • 27. 27 Principles of Operating System 5. Suppose that a scheduling algorithm (at the level of short-term CPU scheduling) favors those processes that have used the least processor time in the recent past. Why will this algorithm favor I/O-bound programs and yet not permanently starve CPU-bound programs? 6. Distinguish between PCS and SCS scheduling. 7. Assume an operating system maps user-level threads to the kernel usingthe many-to- many model where the mapping is done through the useof LWPs. Furthermore, the system allows program developers to createreal-time threads. Is it necessary to bind a real-time thread to an LWP? Answer: 1. Preemptive scheduling allows a process to be interrupted in the midst of its execution, taking the CPU away and allocating it to another process. Nonpreemptive scheduling ensures that a process relinquishes control of the CPU only when it finishes with its current CPU burst. 2. a. 10.53 b. 9.53 c. 6.86 Remember that turnaround time is finishing time minus arrival time, so you have to subtract the arrival times to compute the turnaround times. FCFS is 11 if you forget to subtract arrival time. 3. Processes that need more frequent servicing, for instance, interactive processes such as editors, can be in a queue with a small time quantum. Processes with no need for frequent servicing can be in a queue with a larger quantum, requiring fewer context switches to complete the processing, and thus making more efficient use of the computer. 4.
  • 28. 28 Principles of Operating System a. The shortest job has the highest priority. b. The lowest level of MLFQ is FCFS. c. FCFS gives the highest priority to the job having been in existence the longest. d. None. 5. It will favor the I/O-bound programs because of the relatively short CPU burst request by them; however, the CPU-bound programs will not starve because the I/O-bound programs will relinquish the CPU relatively often to do their I/O. 6. PCS scheduling is done local to the process. It is how the thread library schedules threads onto available LWPs. SCS scheduling is the situation where the operating system schedules kernel threads. On systems using either many- to-one or many-to-many, the two scheduling models are fundamentally different. On systems using one-to-one, PCS and SCS are the same. 7. Yes, otherwise a user thread may have to compete for an available LWP prior to being actually scheduled. By binding the user thread to an LWP, there is no latency while waiting for an available LWP; the real-time user thread can be scheduled immediately
  • 29. 29 Principles of Operating System PART 2: Microsoft Windows Operating System: Configuring Windows 7 Client Microsoft Windows is a series of graphical interface operating systems developed, marketed, and sold by Microsoft. Introduced an operating environment named Windows on November 20, 1985 as a graphical operating system shell for MS-DOS in response to the growing interest in graphical user interfaces. Microsoft Windows came to dominate the world's personal computer market with over 90% market share, overtaking Mac OS, which had been introduced in 1984. Background The Early Version The history of Windows dates back to September 1981, when Chase Bishop, a computer scientist, designed the first model of an electronic device and project "Interface Manager" was started. It was announced in November 1983 under the name "Windows", but Windows 1.0 was not released until November 1985. Windows 1.0 achieved little popularity and was to compete with Apple's own operating system. Windows 1.0 is not a complete operating system rather, it extends MS- DOS. The shell of Windows 1.0 is a program known as the MS-DOS Executive. Included components include Calculator, Calendar, Cardfile, Clipboard viewer, Clock, Control Panel, Notepad, Paint, Reversi, Terminal and Write. Windows 1.0 does not allow overlapping windows. Instead all windows are tiled. Only modal dialog boxes may appear over other windows. Windows 2.0 was released in December 1987 and was more popular than its predecessor. It features several improvements to the user interface and memory management. It also introduced more sophisticated keyboard shortcuts and could make use of expanded memory. Windows 2.03 changed the OS from tiled windows to overlapping windows. The result of this change led to Apple Computer filing a suit against Microsoft alleging infringement on Apple's copyrights.
  • 30. 30 Principles of Operating System Windows 2.1 was released in two different versions: Windows/286 and Windows/386. Windows/386 uses the virtual 8086 mode of Intel 80386 to multitask several DOS programs and the paged memory model to emulate expanded memory using available extended memory. Windows/286, in spite of its name, runs on both Intel 8086 and Intel 80286. It runs in real mode but can make use of the high memory area. Windows 3.0, released in 1990, improved the design, mostly because of virtual memory and loadable virtual device drivers (VxDs) that allow Windows to share arbitrary devices between multi-tasked DOS applications. Windows 3.0 applications can run in protected mode, which gives them access to several megabytes of memory without the obligation to participate in the software virtual memory scheme. Windows 3.1, made generally available on March 1, 1992, featured a facelift. In August 1993, Windows for Workgroups, a special version with integrated peer-to-peer networking features and a version number of 3.11, was released. It was sold along Windows 3.1. Support for Windows 3.1 ended on December 31, 2001. Windows 9x Windows 95, was released on August 24, 1995. While still remaining MS-DOS-based, Windows 95 introduced support for native 32-bit applications, plug and play hardware, preemptive multitasking, long file names of up to 255 characters, and provided increased stability over its predecessors. Windows 95 also introduced a redesigned, object oriented user interface, replacing the previous Program Manager with the Start menu, taskbar, and Windows Explorer shell. Windows 98 released on June 25, 1998, which introduced the Windows Driver Model, support for USB composite devices, support for ACPI, hibernation, and support for multi- monitor configurations. Windows 98 also included integration with Internet Explorer 4 through Active Desktop and other aspects of the Windows Desktop Update (a series of enhancements to the Explorer shell which were also made available for Windows 95). In May 1999, Microsoft released Windows 98 Second Edition, an updated version of Windows 98. Windows 98 SE added Internet Explorer 5.0 and Windows Media Player 6.2 amongst other upgrades. Mainstream support for Windows 98 ended on June 30, 2002 and extended support for Windows 98 ended on July 11, 2006.[13]
  • 31. 31 Principles of Operating System On September 14, 2000, Microsoft released Windows ME (Millennium Edition), the last DOS-based version of Windows. Windows ME incorporated visual interface enhancements from its Windows NT-based counterpart Windows 2000, had faster boot times than previous versions, expanded multimedia functionality (including Windows Media Player 7, Windows Movie Maker, and the Windows Image Acquisition framework for retrieving images from scanners and digital cameras), additional system utilities such as System File Protection and System Restore, and updated home networking tools. However, Windows ME was faced with criticism for its speed and instability, along with hardware compatibility issues and its removal of real mode DOS support. PC World considered Windows ME to be one of the worst operating systems Microsoft had ever released, and the 4th worst tech product of all time. Windows NT In November 1988, a new development team within Microsoft (which included former Digital Equipment Corporation developers Dave Cutler and Mark Lucovsky) began work on a revamped version of IBM and Microsoft's OS/2 operating system known as "NT OS/2". NT OS/2 was intended to be a secure, multi-user operating system with POSIX compatibility and a modular, portable kernel with preemptive multitasking and support for multiple processor architectures. However, following the successful release of Windows 3.0, the NT development team decided to rework the project to use an extended 32-bit port of the Windows API known as Win32 instead of those of OS/2. The first release of the resulting operating system, Windows NT 3.1 (named to associate it with Windows 3.1) was released in July 1993 with versions for desktop workstations and servers. Windows NT 3.5 was released in September 1994, focusing on performance improvements and support for Novell's NetWare, and was followed up by Windows NT 3.51 in May 1995, which included additional improvements and support for the PowerPC architecture. Windows NT 4.0 was released in June 1996, introducing the redesigned interface of Windows 95 to the NT series. On February 17, 2000, Microsoft released Windows 2000, a successor to NT 4.0. The Windows NT name was dropped at this point in order to put a greater focus on the Windows brand.[18] Windows XP The Windows XP, was released on October 25, 2001. The introduction of Windows XP aimed to unify the consumer-oriented Windows 9x series with the architecture introduced by Windows NT, a change which Microsoft promised would provide better performance over its DOS- based predecessors. Windows XP would also introduce an redesigned
  • 32. 32 Principles of Operating System user interface (including an updated Start menu and a "task-oriented" Windows Explorer), streamlined multimedia and networking features, Internet Explorer 6, integration with Microsoft's .NET Passport services, modes to help provide compatibility with software designed for previous versions of Windows, and Remote Assistance functionality. At retail, Windows XP was now marketed in two main editions: the "Home" edition was targeted towards consumers, while the "Professional" edition was targeted towards business environments and power users, and included additional security and networking features. Home and Professional were later accompanied by the "Media Center" edition (designed for home theater PCs, with an emphasis on support for DVD playback, TV tuner cards, DVR functionality, and remote controls), and the "Tablet PC" edition (designed for mobile devices meeting its specifications for a tablet computer, with support for stylus pen input and additional pen- enabled applications). Mainstream support for Windows XP ended on April 14, 2009. Extended support will continue until April 8, 2014. Windows Vista, 7 and 8 Windows Vista was released on November 30, 2006 for volume licensing and January 30, 2007 for consumers. It contained a number of new features, from a redesigned shell and user interface to significant technical changes, with a particular focus on security features. It was available in a number of different editions, and has been subject to some criticism. Vista's server counterpart, Windows Server 2008 was released in early 2008. On July 22, 2009, Windows 7 and Windows Server 2008 R2 were released as RTM (release to manufacturing) while the former was released to the public 3 months later on October 22, 2009. Unlike its predecessor, Windows Vista, which introduced a large number of new features, Windows 7 was intended to be a more focused, incremental upgrade to the Windows line, with the goal of being compatible with applications and hardware with which Windows Vista was already compatible.[24] Windows 7 has multi-touch support, a redesigned Windows shell with an updated taskbar, a home networking system called HomeGroup and performance improvements. Windows 8, the successor to Windows 7, was released generally on October 28, 2012. A number of significant changes were made on Windows 8, including the introduction of a user interface based around
  • 33. 33 Principles of Operating System Microsoft's Metro design language with optimizations for touch-based devices such as tablets and all-in-one PCs. These changes include the Start screen, which uses large tiles that are more convenient for touch interactions and allow for the display of continually updated information, and a new class of apps which are designed primarily for use on touch-based devices. Other changes include increased integration with cloud services and other online platforms (such as social networks and Microsoft's own SkyDrive and Xbox Live services), the Windows Store service for software distribution, and a new variant known as Windows RT for use on devices that utilize the ARM architecture. The Microsoft Windows 7 Operating System Module 1: Understanding Network Infrastructure •Describe physical network topologies and standards. •Define local area networks (LANs). •Define wide area networks (WANs). •Describe wireless networking technologies. •Explain how to connect a network to the Internet. •Describe how technologies connect remote access Important: We recommend that you use PowerPoint 2002 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides might not be display correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. This module will provide a foundation for concepts and terminology related to network infrastructure. The purpose is to introduce students to general definitions and explanations, but
  • 34. 34 Principles of Operating System not to go too in depth on any specific topic. More information specific to almost every topic will be provided in Modules 2 and 3. This topic introduces the student to basic networking concepts and terminology. Provide general definitions, but do not spend too much time on any individual topic as they will be covered later in this module and again with more detail in Modules 2 and 3. Discuss with students the various aspects of a network and items they may have heard of or be familiar with. Lesson 1: Network Architecture Standard Network architecture is the design of a communications network. It is a framework for the specification of a network's physical components and their functional organization and configuration, its operational principles and procedures, as well as data formats used in its operation. Network is a combination of computer hardware, cabling, network devices, and computer software used together to allow computers to communicate with each other. A network is basically all of the components (hardware and software) involved in connecting computers across small and large distances. Networks are used to provide easy access to information, thus increasing productivity for users. Network Component play a major role in designing and maintaining network. Network Components and Terminology • Data are values of qualitative or quantitative variables, belonging to a set of items. Data in computing (or data processing) are represented in a structure, often tabular (represented by rows and columns), a tree (a set of nodes with parent-children relationship) or a graph structure (a set of interconnected nodes). • Node is a connection point, either a redistribution point or a communication endpoint (some terminal equipment). The definition of a node depends on the network and protocol layer referred to. • Client is a piece of computer hardware or software that accesses a service made available by a server.
  • 35. 35 Principles of Operating System • Server is a system (software and suitable computer hardware) that responds to requests across a computer network to provide, or help to provide, a network service. Servers can be run on a dedicated computer, which is also often referred to as "the server", but many networked computers are capable of hosting servers. In many cases, a computer can provide several services and have several servers running. • Peer is a group of functional units in the same layer of a network, by analogy with peer group. • Network Adapter / Network interface controller (NIC) (also known as a network interface card, LAN adapter and by similar terms) is a computer hardware component that connects a computer to a computer network. • Hub is a networking device that allows one to connect multiple PCs to a single network. Hubs may be based on Ethernet, Firewire, or USB connections. • Switch is a control unit that turns the flow of electricity on or data of in a circuit. It may also be used to route information patterns in streaming electronic data sent over networks. In the context of a network, a switch is a computer networking device that connects network segments. • Router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. • Media / Medium This is how the devices are connected together • Transport protocols occupy layer 4 of the OSI protocol model. The protocols at this level provide connection-oriented sessions and reliable data delivery services. The transport layer sits on top of layer 3 networking services. • Bandwidth is a measurement of bit-rate of available or consumed data communication resources expressed in bits per second or multiples of it (bit/s, kbit/s, Mbit/s, Gbit/s, etc.). Network Architecture Most common network architecture types: • Ethernet is a family of computer networking technologies for local area networks (LANs). The Ethernet standards comprise several wiring and signaling variants of the OSI physical layer in use with Ethernet.
  • 36. 36 Principles of Operating System • FDDI (Fiber Distributed Data Interface) provides a 100 Mbit/s optical standard for data transmission in local area network that can extend in range up to 200 kilometers (120 mi). • Token ring local area network (LAN) technology is a protocol which resides at the data link layer (DLL) of the OSI model. It uses a special three-byte frame called a token that travels around the ring. Token-possession grants the possessor permission to transmit on the medium. Token ring frames travel completely around the loop. This topic is intended to introduce the students to the IEEE and the 802 set of standards and how the standards are defined and labeled. Don’t spend too much time defining or explaining individual standards. Institute of Electrical and Electronics Engineers 802 IEEE 802 refers to a family of IEEE standards dealing with local area networks and metropolitan area networks. the IEEE 802 standards are restricted to networks carrying variable-size packets. IEEE 802.3 - Ethernet Networks A working group and a collection of IEEE standards produced by the working group defining the physical layer and data link layer's media access control (MAC) of wired Ethernet. This is generally a local area network technology with some wide area network applications. Physical connections are made between nodes and/or infrastructure devices (hubs, switches, routers) by various types of copper or fiber cable. IEEE 802.5 - Token Ring Networks Token ring local area network (LAN) technology is a protocol which resides at the data link layer (DLL) of the OSI model. It uses a special three-byte frame called a token that travels around the ring. Token-possession grants the possessor permission to transmit on the medium. Token ring frames travel completely around the loop. IEEE 802.11 - Local Wireless Networks IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5 and 60 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee
  • 37. 37 Principles of Operating System (IEEE 802). The base version of the standard was released in 1997 and has had subsequent amendments. These standards provide the basis for wireless network products using the Wi-Fi brand. IEEE 802.16 - Broadband Wireless Networks IEEE 802.16 is a series of Wireless Broadband standards written by the Institute of Electrical and Electronics Engineers (IEEE). The IEEE Standards Board established a working group in 1999 to develop standards for broadband for Wireless Metropolitan Area Networks. The Workgroup is a unit of the IEEE 802 local area network and metropolitan area network standards committee. This topic is intended to introduce the LAN as a conceptual entity, rather than a strictly defined set of standards or parameters. The line between LANs and WANs is becoming less defined as network technologies and bandwidth capability evolves. Ensure to stress this growing blur to students and emphasize the LANs ability to provide network resources to all clients on the LAN. Lesson 2: Local Area Network Local Area Network is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media and the most common form of computer network. Introduce the components as listed, focusing on their role in a LAN rather than detailed specifications of each component. More detail will be provided on these components as they are addressed in Modules 2 and 3. • Network Adapter / Network interface controller (NIC) (also known as a network interface card, LAN adapter and by similar terms) is a computer hardware component that connects a computer to a computer network. • Wiring / Cabling Wiring is done for less sophisticated systems and general household gadgets are connected to electrical line through wiring. Cabling is done to carry the data in the form of electrical pulses from continents to continents. The biggest advantage of cabling is that cables are capable of carrying electrical pulses at lightning speed without incurring any losses during the process.
  • 38. 38 Principles of Operating System • Hub is a networking device that allows one to connect multiple PCs to a single network. Hubs may be based on Ethernet, Firewire, or USB connections. • Switch is a control unit that turns the flow of electricity on or data of in a circuit. It may also be used to route information patterns in streaming electronic data sent over networks. In the context of a network, a switch is a computer networking device that connects network segments. • Termination Point is the connection of all physical and there technical access specifications which form part of the public telecommunications network and are necessary for access to and efficient communication through that public network. • Wiring cabinet is a small room commonly found in institutional buildings, such as schools and offices, where data / electrical connections are made. While they are used for many purposes, their most common use is for computer networking. Introduce physical topology, emphasizing the “physical” component of the term. Re-enforce with the students that these terms are based on the actual physical layout and connection of the devices on a LAN. This distinction will be critical to defining logical topologies and differentiating the two in the next topic.
  • 39. 39 Principles of Operating System Review the definition and common usage for each topology. Use the question to initiate discussion regarding possible implementations and combinations of physical topologies. Question: What topology configuration might you recommend for a new Ethernet LAN being built to connect computers located in several buildings together on a school campus? Answer: The most common configuration would be a hybrid topology using star topology to connect computers together in each building and bus topology to connect the individual buildings to each other. Students may also mention the use of a mesh topology to provide a fault tolerant configuration between buildings. LAN Physical Topologies Bus topology is a network architecture in which a set of clients are connected via a shared communications line/cables, called a bus. There are several common instances of the bus architecture, including one in the motherboard of most computers. Ring Topology is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring. Data travels from node to node, with each node along the way handling every packet.
  • 40. 40 Principles of Operating System Star Topology are one of the most common computer network topologies. In its simplest form, a star network consists of one central switch, hub or computer, which acts as a conduit to transmit messages. Hybrid Topology is created that is referred to as a physical hierarchical star topology, although some texts make no distinction between the two topologies. Mesh Topology is a type of networking where each node must not only capture and disseminate its own data, but also serve as a relay for other nodes, that is, it must collaborate to propagate the data in the network. Introduce the basic concept of a WAN. Contrast general WAN technology with LAN technology, acknowledging that the differences separating the two terms are becoming fewer as networking and computing technology evolves. Lesson 3: Wide Area Network A Wide Area Network is a network that covers a broad area using private or public network transports. (example; any telecommunications network that links across metropolitan, regional, or national boundaries) Introduce the concepts in the context of a WAN. Keep concepts basic and ensure students are aware of how these components link LANs together to form a WAN. Physical WAN Components Bridge A Bridge device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN/WAN by dividing it into two segments. Bridges serve a similar function as switches, that also operate at Layer 2. Leased Line A Leased Line is a service contract between a provider and a customer, whereby the provider agrees to deliver a symmetric telecommunications line connecting two or more locations in exchange for a monthly rent (hence the term lease).
  • 41. 41 Principles of Operating System Backbone The Internet backbone refers to the principal data routes between large, strategically interconnected networks and core routers on the Internet. These data routes are hosted by commercial, government, academic and other high-capacity network centers, the Internet exchange points and network access points, that interchange Internet traffic between the countries, continents and across the oceans of the world. WAN Standards T-Carrier T-carrier refers to one of several digital transmission systems developed by Bell Labs. T- carriers are used in North America, South Korea, and Kyoto. In digital telecommunications, where a single physical wire pair can be used to carry many simultaneous voice conversations by time-division multiplexing, worldwide standards have been created and deployed. E-Carrier The E-carrier system revised and improved the earlier American T-carrier technology, and this has now been adopted by the International Telecommunication Union Telecommunication Standardization Sector (ITU-T). This is now widely used in almost all countries outside the US, Canada, and Japan. The European Conference of Postal and Telecommunications Administrations (CEPT) originally standardized E-carrier. Optical Carrier (OC-X) A set of signaling rates designed for transmission over Synchronous Optical Network (SONET) networks. It levels also apply to Asynchronous Transfer Mode (ATM) networks. The term “optical carrier” indicates that SONET runs over fiber-optic cabling. Integrated Services Digital Network Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.
  • 42. 42 Principles of Operating System Lesson 4: Wireless Network Wireless network refers to any type of computer network that uses wireless for network connections. A wireless network uses radio waves to connect devices such as laptops to the Internet and to your business network and its applications. Introduce wireless network in general, followed by each individual component/term. Use the Give examples for typical implementations of ad-hoc and infrastructure networks. Wireless Networking Components Wireless Network Adapter A wireless network interface controller (WNIC) is a network interface controller which connects to a radio-based computer network rather than a wire-based network such as Token Ring or Ethernet. A WNIC, just like other NICs, works on the Layer 1 and Layer 2 of the OSI Model.
  • 43. 43 Principles of Operating System Access Point A wireless access point (AP) is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually connects to a router(via a wired network) if it's a standalone device, or is part of a router itself. Ad Hoc Network Ad Hoc a Latin phrase "for this", a wireless ad hoc network is a decentralized type of wireless network.[1] The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Instead, each node participates in routing by forwarding data for other nodes, so the determination of which nodes forward data is made dynamically on the basis of network connectivity. In addition to the classic routing, ad hoc networks can use flooding for forwarding the data. Infrastructure Network Infrastructure mode wireless networking bridges (joins) a wireless network to a wired Ethernet network. Infrastructure mode wireless also supports central connection points for WLAN clients. Service Set ID SSID is a case sensitive, 32 alphanumeric character unique identifier attached to the header of packets sent over a wireless local-area network (WLAN) that acts as a password when a mobile device tries to connect to the basic service set. (BSS is a component of the IEEE 802.11 WLAN architecture.) Wireless Standards and Protocols IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5 and 60 GHz frequency bands. IEEE 802.16 is a series of Wireless Broadband standards written by the Institute of Electrical and Electronics Engineers (IEEE). The IEEE Standards Board established a working group in 1999 to develop standards for broadband for Wireless Metropolitan Area Networks. The Workgroup is a unit of the IEEE 802 local area network and metropolitan area network standards committee.
  • 44. 44 Principles of Operating System Wireless LAN Standards Common versions: 802.11a 802.11a-1999 or 802.11a was an amendment to the IEEE 802.11 wireless local network specifications that defined requirements for an orthogonal frequency division multiplexing (OFDM) communication system. 802.11b 802.11b-1999 or 802.11b, is an amendment to the IEEE 802.11 wireless networking specification that extends throughput up to 11 Mbit/s using the same 2.4GHz band. 802.11g 802.11g-2003 or 802.11g is an amendment to the IEEE 802.11 specification that extended throughput to up to 54 Mbit/s using the same 2.4 GHz band as 802.11b. 802.11n 802.11n-2009 (802.11n *lite) is an amendment to the IEEE 802.11-2007 wireless networking standard. Improvement of network throughput over the two previous standards 802.11a and 802.11g with a significant increase in the maximum net data rate from 54 Mbit/s to 600 Mbit/s with the use of four spatial streams at a channel width of 40 MHz. Lesson 5: Connecting to the Internet Introduce the Internet as defined in the handbook. Explain the vastness and evolving physical structure of the Internet to the students. The purpose of this lesson is not to specifically define the Internet and its services and functionality, but rather to introduce it as a medium for intermediary corporate network connections. Use the cloud analogy to explain how, in corporate LAN/WAN structure, the Internet is typically referred to as a single physical entity for the purpose of access and its use as an intermediary for secured communications between two nodes. Re-enforce its generally non-secure nature. The Internet The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. It is a network of
  • 45. 45 Principles of Operating System networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. It is also carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support email. Intranet and Extranet Again, these terms are introduced not to specifically define and qualify each term, but to allow the user to understand them in the context of a network multiple connection possibilities and the basic methods to best combine and utilize these possibilities. Introduce each concept in general terms, emphasizing the intranets private nature and the combined benefits/drawbacks of extranets (allows shared info with partners and customers, exposes an organization’s data to greater risk for loss, theft or malicious intent). Intranet An Intranet is the generic term for a collection of private computer networks within an organization. A group of services on a network and internet-like service provision. Extranet An Extranet is a computer network that allows controlled access from the outside for specific business or educational purposes and similar to intranets services. Intranets and extranets are communication tools designed to enable easy information sharing within workgroups. Lesson 6: Firewall
  • 46. 46 Principles of Operating System Introduce the concept of a firewall, illustrating its functionality and position within a typical perimeter network. Re-enforce the concept of single point of entry and the importance of a firewall’s role in ensuring the integrity of data both entering and leaving the network. In computing, a firewall is software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on a rule set. A network's firewall builds a bridge between the internal network or computer it protects, upon securing that the other network is secure and trusted, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. Introduce perimeter networks. The physical borders of perimeter networks and further security principals will be discussed later in this lesson. If applicable, compare and contrast perimeter networks with extranets (as discussed earlier) Perimeter Network
  • 47. 47 Principles of Operating System In computer security, a perimeter network is a physical or logical sub-network that contains and exposes an organization's external-facing services to a larger untrusted network, usually the Internet. The purpose of a perimeter network is to add an additional layer of security to an organization's local area network (LAN), an external attacker only has access to equipment in the perimeter, rather than any other part of the network. Perimeter network also called "DMZ", the name is derived from the term "demilitarized zone", an area between nation states in which military action is not permitted. Lesson 7: The OSI Model The OSI model defines the generic tasks that are performed for network communication. The Open Systems Interconnection (OSI) model (ISO/IEC 7498-1) is a conceptual model that characterizes and standardizes the internal functions of a communications system by partitioning it into abstraction layers. The model is a product of the Open Systems Interconnection project at the International Organization for Standardization (ISO). Application (Layer 7) This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Presentation (Layer 6) This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer. Session (Layer 5) This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.
  • 48. 48 Principles of Operating System Transport (Layer 4) This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. Network (Layer 3) This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. Data Link (Layer 2) At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking. Physical (Layer 1) This layer conveys the bit stream or electrical impulse, light or radio signal through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components. Lesson 8: Understanding Adapters, Hubs and Switches The key focus of this lesson is: • Describe a network adapter • Describe transmission speed. • Describe hubs. • Describe switches. • Describe the capabilities of a virtual LAN (VLAN).
  • 49. 49 Principles of Operating System Network Adapter The network adapter encapsulates the instructions it receives from the protocol stack into a logical sequence known as a frame. Network Adapter / Network interface controller (NIC) (also known as a network interface card, LAN adapter and by similar terms) is a computer hardware component that connects a computer to a computer network. Converts instructions from the network protocol stack into electrical signals and merges these signals onto the wire .Converts electrical signals received on the wire into meaningful instructions for the network protocol stack Transmission Speed Bandwidth is a measurement of bit-rate of available or consumed data communication resources expressed in bits per second or multiples of it (bit/s, kbit/s, Mbit/s, Gbit/s, etc.). It is often used to describe the transmission speed of a network Hub The Hub enables star wiring to provide a central wiring point and a networking device that allows one to connect multiple PCs to a single network with provides for a degree of fault isolation and extend your network. Hubs may be based on Ethernet, Firewire, or USB connections. A network hub is an unsophisticated device in comparison with, for example, a switch. A hub does not examine or manage any of the traffic that comes through it: any packet entering
  • 50. 50 Principles of Operating System any port is rebroadcast on all other ports.[2] Effectively, it is barely aware of frames or packets and mostly operates on raw bits or symbols. Consequently, due to the larger collision domains, packet collisions are more frequent in networks connected using hubs than in networks connected using more sophisticated devices. Switch Switch is a control unit that turns the flow of electricity on or data of in a circuit. It may also be used to route information patterns in streaming electronic data sent over networks. In the context of a network, a switch is a computer networking device that connects network segments. A switch is a telecommunication device that receives a message from any device connected to it and then transmits the message only to the device for which the message was meant. This makes the switch a more intelligent device than a hub (which receives a message and then transmits it to all the other devices on its network). The network switch plays an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all-purpose converged device such as a residential gateway to access small office/home broadband services such as DSL or cable Internet. In
  • 51. 51 Principles of Operating System most of these cases, the end-user device contains a router and components that interface to the particular physical broadband technology. User devices may also include a telephone interface for VoIP. Virtual LAN A single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN or VLAN. It enables you to manage and isolates the network traffic. The VLAN increases the number of nodes without needing to rewire the network and dispersed it into logical LAN in a form of physically group nodes Lesson 9: Understanding Routing The key focus of this lesson is: • Describe routers. • Describe a routing table. • Describe both static and dynamic routing. • Understand routing protocols. • Select a suitable routing configuration. Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (circuit switching),electronic data networks (such as the Internet), and transportation networks. This article is concerned primarily with routing in electronic data networks using packet switching technology. In packet switching networks, routing directs packet forwarding (the transit of logically addressed packets from their source toward their ultimate destination) through intermediate nodes. Intermediate nodes are typically network hardware devices such as routers, bridges, gateways, firewalls, or switches. General-purpose computers can also forward packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus, constructing
  • 52. 52 Principles of Operating System routing tables, which are held in the router's memory, is very important for efficient routing. Most routing algorithms use only one network path at a time. Multipath routing techniques enable the use of multiple alternative paths. Router A router is a device that manages network traffic by only forwarding packets when required between computer networks, creating an overlay internetwork. It. A router is connected to two or more data lines from different networks. When a data packet comes in one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it reaches its destination node. Key Message: Discuss the process of the packet working its way through the network to the destination. Ask students if they could recommend an alternative to using routing tables here. For example, default gateway settings with each router configured with the other router’s local interface as its default gateway.
  • 53. 53 Principles of Operating System Common Routing Protocol Routing Information Protocol The Routing Information Protocol (RIP) is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and used to deprecate inaccessible, inoperable, or otherwise undesirable routes in the selection process. Open Shortest Path First Open Shortest Path First (OSPF) is a link-state routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It gathers link state information from available routers and constructs a topology map of the network. The topology determines the routing table presented to the Internet Layer which makes routing decisions based solely on the destination IP address found in IP packets. OSPF was designed to support variable-length subnet masking (VLSM) or Classless Inter-Domain Routing (CIDR) addressing models. Border Gateway Protocol Border Gateway Protocol (BGP) is the protocol which is used to make core routing decisions on the Internet and it involves a table of IP networks or "prefixes" which designate network reachable among autonomous systems (AS). BGP is a path vector protocol or a variant of a Distance-vector routing protocol. BGP neighbors, called peers, are established by manual configuration between routers to create a TCP session on port 179. A BGP speaker periodically (every 30 seconds) sends 19-byte keep-alive messages to maintain the connection.[1] Among routing protocols, BGP is unique in using TCP as its transport protocol. Discussion: Selecting a suitable routing protocol Which routing protocol should you use? Question: A subsidiary of Fabrikam has a medium-sized network consisting of around 500 nodes. These nodes are distributed across several floors in their headquarters building. Additionally, there are about a dozen branch offices each with around ten
  • 54. 54 Principles of Operating System nodes. Routers have been deployed within the network to interconnect the networks. Would you recommend static or dynamic routing? Answer: It depends on the number of routers involved. Static routing has the advantage of being entirely predictable; it does not change unless you change it. However, there might be twenty or more networks in this organization. As some are remotely connected, there is the possibility of link-failure. A routing protocol would be useful in this respect. Question: Is the use of a routing protocol indicated? If so, which one would you recommend? Answer: The use of OSPF would be sensible. The network is not too large to implement RIP; however, the presence of remote links with their potential for failure would better suit a link-state rather than a distance-vector protocol; hence OSPF rather than RIP. Question: Tailspin Toys has a small network consisting of around 100 nodes. Recently, network throughput has been affected by network traffic. You decide to install routers to help manage the network traffic. Initially, there will be three networks connected by two routers. Would you recommend static or dynamic routing? Answer: With a small number of routers there is no need for dynamic routing. Static routing tables would be quick and easy to configure. Question: How else could you configure these routers? Answer: You could configure each router to use the other router as its default gateway. There would then be no need for routing tables at all. Question: Tailspin Toys implements an Internet connection by using a router. How does this change the router configuration you have selected? Answer: The default gateway method would no longer work; two routers in sequence is the maximum possible. Implementation of either static routing or RIP would now be appropriate. Lesson 10: Understanding Media Types The key focus of this lesson is: • Describe coaxial cable. • Describe twisted-pair cable.
  • 55. 55 Principles of Operating System • Describe the CAT standards. • Describe coaxial cable. • Select a suitable cable type. Coaxial cable A coaxial cable is a type of cable that has an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield. Many coaxial cables also have an insulating outer sheath or jacket. The term coaxial comes from the inner conductor and the outer shield sharing a geometric axis. Coaxial cable is used as a transmission line for radio frequency signals. Its applications include feed-lines connecting radio transmitters and receivers with their antennas, computer network (Internet) connections, and distributing cable television signals. One advantage of coax over other types of radio transmission line is that in an ideal coaxial cable the electromagnetic field carrying the signal exists only in the space between the inner and outer conductors. Coaxial cable conducts electrical signal using an inner conductor (usually a solid copper, stranded copper or copper plated steel wire) surrounded by an insulating layer and all enclosed by a shield.
  • 56. 56 Principles of Operating System Coaxial cable design choices affect physical size, frequency performance, attenuation, power handling capabilities, flexibility, strength, and cost. The inner conductor might be solid or stranded; stranded is more flexible. To get better high-frequency performance, the inner conductor may be silver-plated. Copper-plated steel wire is often used as an inner conductor for cable used in the cable TV industry. Twisted Pair Cable Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of canceling out electromagnetic interference (EMI) from external sources and the installation is comparatively inexpensive. It is easier to find fault or trouble due to the star wired way in which the cable is laid and supports many uses including date and telephony. In balanced pair operation, the two wires carry equal and opposite signals and the destination detects the difference between the two. This is known as differential mode transmission. Noise sources introduce signals into the wires by coupling of electric or magnetic fields and tend to couple to both wires equally. The noise thus produces a common- mode signal which is canceled at the receiver when the difference signal is taken.
  • 57. 57 Principles of Operating System Fiber Cable An optical fiber cable is a cable containing one or more optical fibers. The optical fiber elements are typically individually coated with plastic layers and contained in a protective tube suitable for the environment where the cable will be deployed. Optical fiber consists of a core and a cladding layer, selected for total internal reflection due to the difference in the refractive index between the two. In practical fibers, the cladding is usually coated with a layer of acryl ate polymer or polyimide. This coating protects the fiber from damage but does not contribute to its optical waveguide properties. Individual coated fibers (or fibers formed into ribbons or bundles) then have a tough resin buffer layer and/or core tube(s) extruded around them to form the cable core. Discussion: Selecting a suitable Cabling strategy What cabling system should you use? Question: Fabrikam have purchased a new building to house their Research and Development team. There are two floors, each to support around one hundred network nodes. Each workstation is to have a telephone installed. You want to minimize future disruption, so any cabling solution must provide for emerging standards. The nature of the work the R
  • 58. 58 Principles of Operating System & D team undertakes necessitates a high bandwidth solution. What cabling system would you recommend? Answer: Twisted pair cabling is indicated – CAT 5e or 6 and above would be suitable for Gigabit Ethernet. Question: Fabrikam’s R & D center is across the private parking lot from the head offices. You need to connect the R & D office back to the head office so that research staff has access to corporate services. What cable would you recommend for this application? Answer: Fiber cabling. Currently, MMF would probably do, as it is cheaper. However, 10Gbps may not be sufficient for future applications, and it is expensive to dig up the parking lot. SMF might be more sensible to future-proof the installation. Review Questions 1. Why are firewalls so critical when designing and deploying networks? Answer: Firewalls provide selective separation between networks. They allow potentially untrusted networks to be connected to each other without posing a significant security risk. The traffic and data that needs to travel between networks can be filtered and monitored by the firewall to ensure the integrity of the relationship between networks. 2. What makes a wireless network more vulnerable to unauthorized access than a wired network? Answer: A wired network requires a node to have immediate physical access to network hardware (an Ethernet jack for instance) to attempt to gain access to the network. On a wireless network, however, successfully receiving the wireless signal is the only requirement for physical access. Methods that govern access to a wired network such as locked doors, specific office hours and security cameras do not necessarily govern physical access to a wireless network. Module 2: Windows Server Roles Presentation: 60 minutes Lab: 30 minutes After completing this module, students will be able to: • Describe different types of server.
  • 59. 59 Principles of Operating System • Select and install server roles and features to support different types of server. Required materials To teach this module, you need the Microsoft® Office PowerPoint® file 6420B_06.ppt. Important: We recommend that you use PowerPoint 2002 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides might not be display correctly. Preparation tasks To prepare for this module: • Read all of the materials for this module. • Practice performing the demonstrations and the lab exercises. • Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the- job performance. Make sure that students are aware that the Course Companion CD contains additional module information and resources. After completing this module, students will be able to: • Select and install server roles and features to support different types of server. • Describe different types of server. Windows Server 2008 R2 Windows® Server® 2008 R2 is the latest release of the Windows operating system for Server workloads. Windows Server 2008 R2 builds upon the exceptional legacy of Windows Server 2008. R2 is an incremental release to Windows Server 2008 – and only the second time that Windows Client and Server releases are shipped simultaneously (Windows 2000 Server was first). While Windows 7 is available in both 32- and 64-bit versions, R2 is the first 64-bit only Server release. Microsoft focused on the following key technology investment areas with Windows Server 2008 R2. •Platform Scalability • Virtualization • Power Management • Web Workloads
  • 60. 60 Principles of Operating System • Enterprise Workloads • Powerful Platform Management Lesson 1: Role-Based Deployment The key focus of this lesson is: • Describe server roles. • Describe role services. • Describe server features. • Use Server Manager. • Manage server roles and features. Ensure that the students understand why they would want to dedicate a server to a particular role and why they would commonly see many roles installed on one server. Briefly discuss the common roles that are available and for what they are used. Mention that the Active Directory binaries are installed when the AD DS role is installed, but DCPromo still needs to be run to create a domain controller. Reference: Windows Server 2008 R2: Edition Comparison by Server Role http://go.microsoft.com/fwlink/?LinkID=199658 Server Roles Server roles – servers can be configured to perform a number of roles. The applications that the server is running specify the particular server’s role. Servers typically need services and additional features installed to perform its specific role. When compared to workstations, servers have more disk space and memory and faster processors. The server’s role determines the hardware that servers require. Active Directory Certificate Services AD CS starting in Windows Server® 2008 provides customizable services for creating and managing public key certificates used in software security systems that employ public key technologies.
  • 61. 61 Principles of Operating System Active Directory Domain Services It provides secure hierarchical data storage for objects in a network such as users, computer, printers and services Active Directory Federation Services It provides users with single sign-on access to system and application located across organizational boundaries. It users a claims based access control authorization model to maintain application security and implement federated identity. Active Directory Lightweight Directory Services It provides flexible support for directory enabled application without the dependencies that are required for ADDS. Active Directory Rights Management Services A form of Information Right Management used on MS WIN the users encryption and a form of selective functionality denial for limiting access to documents such as corporate e-mail, word documents, web pages. Application Server It provides software application with services such as, data services, transaction support, load balancing and management of large distributed system. DHCP Server A DHCP Server assigns IP addresses to client computers. This is very often used in enterprise networks to reduce configuration efforts. All IP addresses of all computers are stored in a database that resides on a server machine. DNS Server Domain Name System (DNS) is the name resolution protocol for TCP/IP networks, such as the Internet. Client computers query a DNS server to resolve memorable, alphanumeric DNS names to the IP addresses that computers use to communicate with each other. See more in the DNS Server Overview for Windows Server 2008.