SlideShare a Scribd company logo
1 of 19
Unit09:
Looking at Servers and
Their NOSs
Overview
• NOS
• Microsoft Windows Server
• Novell Netware
• Unix / Linux
• Apple Mac
NOS
• File and printer sharing are the two main reasons that
networks were created in the first place
• Client/server and Peer-to-peer.
• NOS has a much more secure method of authenticating
users and resources
• NOS includes utility applications that maintain and
monitor the server
• NOSs often include client applications that improve
performance and access to the resources they share
Microsoft Windows Server
• Windows NT Domains
– Windows NT uses domains as logical boundaries that
house servers, user accounts, and resources
– Trust Relationships
Windows Server
Window Server
• Single domain: This model consists of a PDC, workstations, and
users that are all members of the same domain. There might be one
or more BDCs. There are no trust relationships.
• Master domain: This model has at least two, and possibly more,
domains—a master domain, which contains user accounts, and at
least one resource domain
Windows Server
• Multiple master domain:
– This model builds on the master domain model in that it has two
or more master domains and one or more resource domains.
Each master domain contains user accounts and trusts the other
master domain(s).
Windows Server
• Complete trust domain
– Each domain can contain user accounts or resources,
or both.
Windows Server
• Organizing Users into Groups
– Windows NT domains use special groups to function between
domains
– There are two types of groups—global and local
– Windows 2000 and Active Directory
– Windows 2000 uses a much different method of managing users
and computers—the Active Directory
Windows Server
• Authentication
– The Active Directory provides a view overseeing one or more
domains
– From a DNS standpoint, domains, called domain trees, often
share a contiguous DNS namespace
Novell NetWare
• Originally developed to provide shared disk storage, NetWare grew
into a robust, high--performance network operating system
• The latest version is NetWare 6
• servers are intended to be the only systems that share services
• NetWare File System
– NetWare file system is transparent to an end user
– The NetWare file system’s features are designed to provide files
to a variety of different client operating systems
– The file system offers security for files through trustee
assignments applied to files and directories
Novell NetWare
• Client Support
– NetWare was developed to be an enterprise network
operating system that can provide services to multiple
and distinct client operating systems. These clients
include all versions of Windows, OS/2, Macintosh,
UNIX, and Linux
– NetWare is capable of providing services using
different protocol suites
Novell Directory Services
• Through NetWare version 3.x, Novell used a flat-file
database to hold user accounts and resources that were
specific to each separate server
• This database was called the Bindery. NetWare 4.x
brought about the hierarchical directory service called
Novell Directory Services (NDS).
• maintain partitions and replicas (copies of partitions) of
the database
• NDS is a single hierarchical tree consisting of an
organization (O) container that is then structured into
organizational units (OUs)
Novell Netware
NetWare Server Utilities
NetWare Utilities Used on
Client Workstations
Apple Macintosh
• Networking among Apple computers began as peer-to-peer.
• Each client could share its storage and printers with every other
Macintosh
• When Macintosh computer is dedicated to sharing files, printers, or
applications on the network, it is called an AppleShare Server
• Are located in the local zone, which is similar to a workgroup
• Given the Zone Information Protocol (ZIP) and Name Binding
Protocol (NBP) in AppleTalk, resources appear as members of the
zone regardless of their physical location
• The AppleTalk protocol provides a network address for each
computer and network segment
• The node addresses are available from 1 to 254 on each segment
UNIX/Linux
• Originally developed by Bell Laboratories
• UNIX provides a peer-to-peer networking system and
uses TCP/IP as its native protocol
• UNIX is available on mainframes, minicomputers, and
PCs
• The largest hosts provide user access through terminal
emulation
• Most popular GUI are X Windows and Motif
UNIX/Linux
• The UNIX Network File System
– NFS was created to be a networked service
– When NFS is used, it is transparent to the end user
because it’s based on Remote Procedure Calls
(RPCs )
– When a user opens a file through NFS, the UNIX
client places an RPC call to the UNIX server.

More Related Content

What's hot

Distributed file system
Distributed file systemDistributed file system
Distributed file systemNaza hamed Jan
 
Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPresentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPrakriti Dubey
 
A Project Report on Linux Server Administration
A Project Report on Linux Server AdministrationA Project Report on Linux Server Administration
A Project Report on Linux Server AdministrationAvinash Kumar
 
Operating System : Ch17 distributed file systems
Operating System : Ch17 distributed file systemsOperating System : Ch17 distributed file systems
Operating System : Ch17 distributed file systemsSyaiful Ahdan
 
4.file service architecture (1)
4.file service architecture (1)4.file service architecture (1)
4.file service architecture (1)AbDul ThaYyal
 
Networking Chapter 13
Networking Chapter 13Networking Chapter 13
Networking Chapter 13mlrbrown
 
11 distributed file_systems
11 distributed file_systems11 distributed file_systems
11 distributed file_systemslongly
 
file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada umardanjumamaiwada
 
Distributed File Systems
Distributed File Systems Distributed File Systems
Distributed File Systems Maurvi04
 
Dfs (Distributed computing)
Dfs (Distributed computing)Dfs (Distributed computing)
Dfs (Distributed computing)Sri Prasanna
 
Session 7 Tp 7
Session 7 Tp 7Session 7 Tp 7
Session 7 Tp 7githe26200
 
Distributed File System
Distributed File SystemDistributed File System
Distributed File SystemNtu
 
Using samba
Using sambaUsing samba
Using sambaAli Abdo
 
Introduction to distributed file systems
Introduction to distributed file systemsIntroduction to distributed file systems
Introduction to distributed file systemsViet-Trung TRAN
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsSandeep Patil
 
Unit 3.1 cs6601 Distributed File System
Unit 3.1 cs6601 Distributed File SystemUnit 3.1 cs6601 Distributed File System
Unit 3.1 cs6601 Distributed File SystemNandakumar P
 

What's hot (20)

Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
6421 b Module-10
6421 b  Module-106421 b  Module-10
6421 b Module-10
 
Presentation on nfs,afs,vfs
Presentation on nfs,afs,vfsPresentation on nfs,afs,vfs
Presentation on nfs,afs,vfs
 
A Project Report on Linux Server Administration
A Project Report on Linux Server AdministrationA Project Report on Linux Server Administration
A Project Report on Linux Server Administration
 
12. dfs
12. dfs12. dfs
12. dfs
 
Operating System : Ch17 distributed file systems
Operating System : Ch17 distributed file systemsOperating System : Ch17 distributed file systems
Operating System : Ch17 distributed file systems
 
4.file service architecture (1)
4.file service architecture (1)4.file service architecture (1)
4.file service architecture (1)
 
Mcts chapter 5
Mcts chapter 5Mcts chapter 5
Mcts chapter 5
 
Networking Chapter 13
Networking Chapter 13Networking Chapter 13
Networking Chapter 13
 
11 distributed file_systems
11 distributed file_systems11 distributed file_systems
11 distributed file_systems
 
file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada
 
Distributed File Systems
Distributed File Systems Distributed File Systems
Distributed File Systems
 
Dfs (Distributed computing)
Dfs (Distributed computing)Dfs (Distributed computing)
Dfs (Distributed computing)
 
Session 7 Tp 7
Session 7 Tp 7Session 7 Tp 7
Session 7 Tp 7
 
11. dfs
11. dfs11. dfs
11. dfs
 
Distributed File System
Distributed File SystemDistributed File System
Distributed File System
 
Using samba
Using sambaUsing samba
Using samba
 
Introduction to distributed file systems
Introduction to distributed file systemsIntroduction to distributed file systems
Introduction to distributed file systems
 
IBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for ProtocolsIBM Spectrum Scale Authentication for Protocols
IBM Spectrum Scale Authentication for Protocols
 
Unit 3.1 cs6601 Distributed File System
Unit 3.1 cs6601 Distributed File SystemUnit 3.1 cs6601 Distributed File System
Unit 3.1 cs6601 Distributed File System
 

Viewers also liked (7)

Unit10
Unit10Unit10
Unit10
 
Unit07
Unit07Unit07
Unit07
 
Unit05
Unit05Unit05
Unit05
 
Unit03
Unit03Unit03
Unit03
 
Unit11
Unit11Unit11
Unit11
 
Unit00
Unit00Unit00
Unit00
 
Unit01
Unit01Unit01
Unit01
 

Similar to Unit09

Lesson 4 intro to advanced o perating systems
Lesson 4 intro to advanced o perating systemsLesson 4 intro to advanced o perating systems
Lesson 4 intro to advanced o perating systemsJo Ko
 
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptxUNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptxLeahRachael
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxachutachut
 
Directory Services Nma Unit-1
Directory Services Nma Unit-1Directory Services Nma Unit-1
Directory Services Nma Unit-1GPAPassedStudents
 
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgEric Vanderburg
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationSam Bowne
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12mlrbrown
 
09 - Active Directory.ppt
09 - Active Directory.ppt09 - Active Directory.ppt
09 - Active Directory.pptssuserf7cd2b
 

Similar to Unit09 (20)

Lesson 4 intro to advanced o perating systems
Lesson 4 intro to advanced o perating systemsLesson 4 intro to advanced o perating systems
Lesson 4 intro to advanced o perating systems
 
itft_system admin
itft_system adminitft_system admin
itft_system admin
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptxUNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
 
Ch06
Ch06Ch06
Ch06
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Active directoryfinal
Active directoryfinalActive directoryfinal
Active directoryfinal
 
Directory Services Nma Unit-1
Directory Services Nma Unit-1Directory Services Nma Unit-1
Directory Services Nma Unit-1
 
CSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptxCSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptx
 
Chap2
Chap2Chap2
Chap2
 
Nfs
NfsNfs
Nfs
 
Presentation1
Presentation1Presentation1
Presentation1
 
9781111306366 ppt ch2
9781111306366 ppt ch29781111306366 ppt ch2
9781111306366 ppt ch2
 
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: Enumeration
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
 
09 - Active Directory.ppt
09 - Active Directory.ppt09 - Active Directory.ppt
09 - Active Directory.ppt
 
Linux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating SystemLinux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating System
 
Linux basics
Linux basicsLinux basics
Linux basics
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Unit09

  • 1. Unit09: Looking at Servers and Their NOSs
  • 2. Overview • NOS • Microsoft Windows Server • Novell Netware • Unix / Linux • Apple Mac
  • 3. NOS • File and printer sharing are the two main reasons that networks were created in the first place • Client/server and Peer-to-peer. • NOS has a much more secure method of authenticating users and resources • NOS includes utility applications that maintain and monitor the server • NOSs often include client applications that improve performance and access to the resources they share
  • 4. Microsoft Windows Server • Windows NT Domains – Windows NT uses domains as logical boundaries that house servers, user accounts, and resources – Trust Relationships
  • 6. Window Server • Single domain: This model consists of a PDC, workstations, and users that are all members of the same domain. There might be one or more BDCs. There are no trust relationships. • Master domain: This model has at least two, and possibly more, domains—a master domain, which contains user accounts, and at least one resource domain
  • 7. Windows Server • Multiple master domain: – This model builds on the master domain model in that it has two or more master domains and one or more resource domains. Each master domain contains user accounts and trusts the other master domain(s).
  • 8. Windows Server • Complete trust domain – Each domain can contain user accounts or resources, or both.
  • 9. Windows Server • Organizing Users into Groups – Windows NT domains use special groups to function between domains – There are two types of groups—global and local – Windows 2000 and Active Directory – Windows 2000 uses a much different method of managing users and computers—the Active Directory
  • 10. Windows Server • Authentication – The Active Directory provides a view overseeing one or more domains – From a DNS standpoint, domains, called domain trees, often share a contiguous DNS namespace
  • 11. Novell NetWare • Originally developed to provide shared disk storage, NetWare grew into a robust, high--performance network operating system • The latest version is NetWare 6 • servers are intended to be the only systems that share services • NetWare File System – NetWare file system is transparent to an end user – The NetWare file system’s features are designed to provide files to a variety of different client operating systems – The file system offers security for files through trustee assignments applied to files and directories
  • 12. Novell NetWare • Client Support – NetWare was developed to be an enterprise network operating system that can provide services to multiple and distinct client operating systems. These clients include all versions of Windows, OS/2, Macintosh, UNIX, and Linux – NetWare is capable of providing services using different protocol suites
  • 13. Novell Directory Services • Through NetWare version 3.x, Novell used a flat-file database to hold user accounts and resources that were specific to each separate server • This database was called the Bindery. NetWare 4.x brought about the hierarchical directory service called Novell Directory Services (NDS). • maintain partitions and replicas (copies of partitions) of the database • NDS is a single hierarchical tree consisting of an organization (O) container that is then structured into organizational units (OUs)
  • 16. NetWare Utilities Used on Client Workstations
  • 17. Apple Macintosh • Networking among Apple computers began as peer-to-peer. • Each client could share its storage and printers with every other Macintosh • When Macintosh computer is dedicated to sharing files, printers, or applications on the network, it is called an AppleShare Server • Are located in the local zone, which is similar to a workgroup • Given the Zone Information Protocol (ZIP) and Name Binding Protocol (NBP) in AppleTalk, resources appear as members of the zone regardless of their physical location • The AppleTalk protocol provides a network address for each computer and network segment • The node addresses are available from 1 to 254 on each segment
  • 18. UNIX/Linux • Originally developed by Bell Laboratories • UNIX provides a peer-to-peer networking system and uses TCP/IP as its native protocol • UNIX is available on mainframes, minicomputers, and PCs • The largest hosts provide user access through terminal emulation • Most popular GUI are X Windows and Motif
  • 19. UNIX/Linux • The UNIX Network File System – NFS was created to be a networked service – When NFS is used, it is transparent to the end user because it’s based on Remote Procedure Calls (RPCs ) – When a user opens a file through NFS, the UNIX client places an RPC call to the UNIX server.