The Functions of Operating Systems Network Operating Systems (NOS)

Slides:



Advertisements
Similar presentations
Operating-System Structures
Advertisements

GCSE ICT Networks & Security..
Operating System Structures
Networks By the end of this session, you will:
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Lesson 1-Introducing Basic Network Concepts
By Rashid Khan Lesson 7-Preparing for Output: Printer Configuration and Management.
9.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 9: Installing and Configuring.
Cs238 Lecture 3 Operating System Structures Dr. Alan R. Davis.
Window NT Workstation and Server. Windows NT refers to two products workstation server can act as both a client and server in a network environment.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Software Engineering Chapter 6 Software requirements
Part two. 3.2 operating system architecture  Software have two categories  Application software  System software  Application software: consists of.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
Computer Networks IGCSE ICT Section 4.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Operating system Part two Introduction to computer, 2nd semester, 2010/2011 Mr.Nael Aburas Faculty of Information.
CSCI 1101 Intro to Computers 6. Local Area Networks.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
Operating Systems  By the end of this session, you will know: What an Operating System is. The functions it performs.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
B.Ramamurthy9/19/20151 Operating Systems u Bina Ramamurthy CS421.
1 Managing Printers (Week 12, Monday 3/26/2007) © Abdou Illia, Spring 2007.
NETWORK SERVERS Oliver Topping (with a little help from my Mum)
Software.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Chapter Two Defining Network Objects. Chapter Objectives Describe how a workstation communicates with the network, and list the software components required.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
COMP3122 Network Management Richard Henson March 2011.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
COMP3122 Network Management Richard Henson March 2011.
1 Web Servers (Chapter 21 – Pages( ) Outline 21.1 Introduction 21.2 HTTP Request Types 21.3 System Architecture.
Network Security & Accounting
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
Why do we need a database?
Software AS Module Heathcote Ch.20. Importance of Information  Information technology is fundamental to the success of any business  The information.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Enterprise Network Systems Client/ Server Mark Clements.
1 3 Computing System Fundamentals 3.3 Computer Systems.
BABCA Software Operating Systems (OS) aka Systems Software A set of instructions that coordinate all the activities among computer hardware resources.
Presented By: Asst. Prof. Navjeet Kaur Computer Department Govt College Ropar.
Software Engineering Chapter 6 Software requirements Ku-Yaw Chang Assistant Professor Department of Computer Science and Information.
Networks. Learning Objectives: By the end of this lesson you should be able to:
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Ch 26 & 27 Operating Systems.  Understand the purpose of an operating system  Be able to describe the tasks performed by an operating system.
1 Lesson 14 Sharing Documents Computer Literacy BASICS: A Comprehensive Guide to IC 3, 4 th Edition Morrison / Wells.
Introduction to Operating System. 1.1 What is Operating System? An operating system is a program that manages the computer hardware. It also provides.
Systems Software. Systems software Applications software such as word processing, spreadsheet or graphics packages Operating systems software to control.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
Chapter 12: Architecture
Types and Characteristics of Requirements
2. OPERATING SYSTEM 2.1 Operating System Function
Chapter 2: System Structures
Operating System Structure
Introduction to Operating System (OS)
Chapter 3: Windows7 Part 4.
Chapter 2: System Structures
Tiers vs. Layers.
Chapter 12: Physical Architecture Layer Design
Types of Software.
Operating Systems Tasks 17/02/2019.
Database (DB) and Database Management System (DBMS)
Operating Systems Tasks 04/04/2019.
LO3 – Understand Business IT Systems
Networks By the end of this session, you will:
Operating Systems Tasks 05/08/2019.
Presentation transcript:

The Functions of Operating Systems Network Operating Systems (NOS)

Learning Objectives Describe the main components of a network operating system.

Facilities Provided by a NOS Directory Services Accounting Software sharing Hardware sharing (including print spooling) SecurityCommunications The user interface

Directory Services Allow users to manage access to their own files. i.e. Normal file manipulation of a stand alone computer. i.e. Normal file manipulation of a stand alone computer. E.g. search, delete… E.g. search, delete… Prevent access to a user’s files by other unauthorised users. Maintain a directory of software / services available to specified users. Allow a set amount of storage to be allocated to users of the network. Allow storage space to be partitioned into many logical areas which can be given different access rights. E.g. E.g. Personal user storage only. Shared User Storage (by all or a selected list). Read / Write access to some users and read only to others.

Accounting Keep details of who has used the network, when and for how long, for what purpose and which files each user has accessed. Users could be charged for printing, amount of time spent on the network and files storage. Users could be charged for printing, amount of time spent on the network and files storage. Restrict a users' storage, the amount of paper used for printing and so on. The network manager can print out details of usage so that charges may be made.

Software Sharing Some applications are not installed on clients either due to lack of space or rare use. NOS must share the use of these applications. NOS must share the use of these applications. So when a user requests an application, the NOS must send a copy of that application to the user's station. So when a user requests an application, the NOS must send a copy of that application to the user's station.

Sharing Hardware E.g. Printers. When a user sends a file for printing, the file is split into packets. When a user sends a file for printing, the file is split into packets. As many users may wish to use a printer, the packets from different users will arrive at the print server and will have to be sorted so that the data from different users are kept separate. As many users may wish to use a printer, the packets from different users will arrive at the print server and will have to be sorted so that the data from different users are kept separate. The NOS receives these packets and stores the data in different files for different users. The NOS receives these packets and stores the data in different files for different users. When a particular file is complete, it can be added to the print queue (spooling – described earlier). When a particular file is complete, it can be added to the print queue (spooling – described earlier).

Security Maintain security of files by restricting access by giving different users or user types different access rights. Enforce the use of passwords and IDs to establish identities. Maintain file of users, their log ins and their rights. Allow many users to use files at the same time by allowing only one user at a time to have write access to a file and any other users only read access. Avoids corruption and inconsistency. Avoids corruption and inconsistency. Protect system files by making them read only, hiding them from users and not allowing ordinary users to change these attributes.

Communications The NOS will have to handle communications between stations and servers. So NOS is in each station and the other is in the server/s. These two parts must be able to communicate with one another so that messages and data can be sent around the network. There will consequently be a need for rules to govern this communication.

User Interface NOS must provide one between the hardware, software and user. NOS has to offer different users different interfaces. When a user logs onto a network, the NOS looks up the needs of the user and displays the appropriate icons and menus for that user, no matter which station the user uses. The NOS must also allow users to define their own interfaces within the restrictions laid down by the network manager.

Transparency The whole system is said to be transparent to the user if when they use it, they feel as if it were acting solely for their own use. i.e. Users are unaware of the hardware and software actions or communications. i.e. Users are unaware of the hardware and software actions or communications. A good user interface has a high level of transparency and this should be true of all operating systems.

Plenary Name and describe the main components of a network operating system.