Chapter 3: Services of Network Operating Systems Maysoon AlDuwais.

Slides:



Advertisements
Similar presentations
Categories of I/O Devices
Advertisements

How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
The Internet Useful Definitions and Concepts About the Internet.
Layer 7- Application Layer
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Web Design Terms and Concepts Ms. Scales. Q. What is a Server? A. A server is a computer that stores information many people can access. It runs special.
1.  The Linux system of permissions is much more difficult than that of Windows  System administrators are given more control with the use of three.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Forensic and Investigative Accounting
Chapter 7: Using Windows Servers to Share Information.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Internet-Based Client Access
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Layer 4 of the TCP/IP protocol stack: Application level Services: TELNET, FTP, SMTP, HTTP, DNS, RIP, NFS Hierarchy of protocols and services.
Chapter 9.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
1 Version 3.0 Module 11 TCP Application and Transport.
TCP/IP fundamentals Unit objectives Discuss the evolution of TCP/IP Discuss TCP/IP fundamentals.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Internet Research Tips Daniel Fack. Internet Research Tips The internet is a self publishing medium. It must be be analyzed for appropriateness of research.
Overview Web Session 3 Matakuliah: Web Database Tahun: 2008.
Data Networking Fundamentals Chapter 7. Objectives In this chapter, you will learn to: Discuss basic networking concepts, including the elements common.
World Wide Web “WWW”, "Web" or "W3". World Wide Web “WWW”, "Web" or "W3"
TCP/IP (Transmission Control Protocol / Internet Protocol)
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Cisco – Chapter 15 Application Layer closest to you as an end-user, when you are interacting with software.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
CPT 499 Internet Skills for Educators Overview of the Internet Session One.
Internet Basics. Books TEXT BOOKS: Web Enabled Commercial Application Development Using HTML, DHTML, JavaScript, By: Bayros BPB publications OTHER READINGS:
17 Establishing Dial-up Connection to the Internet Using Windows 9x 1.Install and configure the modem 2.Configure Dial-Up Adapter 3.Configure Dial-Up Networking.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
COM: 111 Introduction to Computer Applications Department of Information & Communication Technology Panayiotis Christodoulou.
Lecture2: Services of Network Operating Systems Maysoon AlDuwais.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Application layer tcp/ip
Lecture2: Services of Network Operating Systems
Chapter 2: System Structures
Protocols and networks in the TCP/IP model initially.
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Data Networking Fundamentals
Chapter 10: Application Layer
Chapter 3: Windows7 Part 4.
Topic 5: Communication and the Internet
Internet Protocols IP: Internet Protocol
Protocols 2 Key Revision Points.
Protocol Application TCP/IP Layer Model
Chapter 7 Network Applications
Presentation transcript:

Chapter 3: Services of Network Operating Systems Maysoon AlDuwais

Services for Network Operating Systems (NOSs)  NOSs Services are functions provided by the OS and forms a base used by applications in the network.  Service is provided by a server and accessed by clients.  Client: is any process making a request to a server process  Server: is a process or task that continuously monitors incoming service requests.  Tempnorary Client: when a server obtain services from another server. 2 client Server Request a service Process Request & provide service

Services in regular OS Versus Services in NOSs Regular OSs  Defines a set of static, predefined services, or system calls  For example, operating system services include process creation file manipulation facilities. NOSs  Provide a set of static, predefined services, or system calls.  In addition provides a much larger, richer set of dynamically creatable and configurable services.  Additional services are added to the NOS by the use of server processes and associated libraries. 3

NOSs Services  For each server, there is a well-defined protocol defining the requests that can be made to that server and the responses that are expected.  Services provided by a network operating system includes: 1. Peripheral Sharing Service 2. File service 3. Directory or Name Service 4. Group Communication Service 5. Time, Memory and Locking Services 6. Mail Services 7. User Services 8. Publishing services 4

Peripheral Sharing Service  This service is the most basic service provided by a network operating system.  Peripherals (hardware) connected to one computer are often shared by other computers on the network by the peripheral sharing services.  This service is some times called Remote device access, printer sharing, shared disks and so on. 5

File Services  The most common service that a network operating system provides is file service.  File services allow users to access files and other storage object from any computer connected to the network.  The files are stored in one or more machines called the file server(s). The machines that use these 6

Example of File Service  There are many file service protocols such as:  Sun Network File System (Sun-NFS)  Appleshare for Macintosh computers  The SMB protocol for Windows 95/NT  DFS protocol used in the Andrew file system  The first implementation of a file service system was done by Sun Microsystems and is called the Sun Network File System (Sun-NFS).  Sun-NFS has become an industry standard network file system for computers running the Unix operating system.  Sun-NFS can also be used in computers running Windows OSs and MacOS but with some limitations. 7

Sun Network File System (Sun- NFS)  In Sun-NFS a machine on a network can export a file system tree (i.e. a directory and all its contents and subdirectories).  A machine that exports one of more directories is called a file server.  After a directory has been exported, any machine connected to the file server can import, or mount that file tree.  Mounting is a process, where the exported directory & all its contents subdirectories appear to be a local directory on the machine that mounted it.  The mounting of one exported directory from one machine to a local directory on another machine via Sun-NFS is alled remote mounting. 8

Directory Subdirectorie s 9

Directory or Name Service  Imagine if a client needs access to a database in the network. How would the client know whether the database is available, and on what server?  Directory services, address this problems.  Directory services are the mainstay of large network operating systems.  The directory server is responsible for knowing the current locations and availability of all servers and inform the client of the network address of the server 10

How Diretory Service works?  When a client application needs to access server A  It contacts the directory server and requests the address of the server A.  The directory server identifies the server by its name.  Then the directory server informs the client of the address of the server. 11

Group Communication Service  Group communication is an extension of multicasting for communicating process groups.  When the recipient of a message is a set of processes the message is called a multicast message.  a single recipient message – unicast.  All processes are recipients – broadcast.  A process group is a set of processes whose membership may change over time. 12

Group Communication Service  Multicasting Types:  Reliable Multicast: The multicast is send to all processes and then retransmitted to processes that did not get the message, until all processes get the multicast.  Reliable multicasts may not deliver all messages if some network problems arise.  Atomic Multicast: Similar to the reliable multicast, but guarantees that all processes will receive the message.  If it is not possible for all processes to receive the message, then no process will receive it.  Totally Ordered Multicast: All the multicasts are ordered strictly, that is all the receivers get all the messages in exactly the same order.  Totally ordered multicasting is expensive to implement and is not necessary 13

Time, Memory and Locking Services  Time servers provide a notion of time to any program interested in time, based on one of many clock algorithms  Time services have two functions: 1. provide consistent time information to all processes on the system 2. provide a clock synchronization method that ensures all clocks on all systems be synchronized.  Memory services provide a logically shared memory segment to processes not running on the same machine. 14

Time, Memory and Locking Services  Locking service is typically a single server process that tracks all locked resources.  When a process asks for a lock on a resource:  The server grants the lock if that lock is currently not in use  Else it makes the requesting process wait till the lock is released. 15

Mail Services  Mail services: These include:  SMTP (Simple Mail Transfer Protocol)  Is an Internet standard for electronic mail ( ) transmission  Mail servers use SMTP to send and receive mail messages  Client mail applications use SMTP only for sending messages to a mail server.  For receiving messages, client applications usually use either POP3 or IMAP.  Webmail systems (such as Outlook.com, Gmail and Yahoo! Mail) use their own non-standard protocols to access mail box accounts on their own mail servers, all use SMTP when sending or receiving from outside their own systems. 16

Mail Services  POP (Post Office Protocol)  Is an application-layer Internet standard protocol used by local clients to retrieve from a remote server over a TCP/IP connection.  It is one of the most popular Internet standard protocols for retrieval  IMAP (Internet Message Access Protocol).  is an Internet standard protocol used by clients to retrieve e- mail messages from a mail server over a TCP/IP connection. 17

User Service  User Services: These include the folloing protocols: 1. Finger Protocol  Enable a user to view another user’s information when that user used that same computer system or was logged on in the same network.  The program can determine user identity though an address and determine whether that user is currently logged in, as well as the status of their log sessions. 2. Rwho Protocol  The "rwho" protocol provides a simple method for listing UNIX machines on the network, and who is logged onto those machines.  Each UNIX host keeps a list of active machines and logged on users.  This presents a security risk for network managers, because it exposes machine names as well as user names.  The 'rwhod' service should be disabled on secure machines. 18

User Services 3. RSH protocol  RSH has a dual channel architecture.  The client establishes a connection to the RSH daemon/Server (rshd) and sends a user name and a command to execute.  This channel becomes the standard input and output of the executed command.  An optional second channel is initiated by the daemon to transfer standard error messages. 4. FTP protocol  is a standard network protocol used to transfer computer files from one host to another host over a TCP-based network, such as the Internet. 19

Publishing Services  Publishing services: These include:  HTTP (Hyper Text Transfer Protocol)  It is an application protocol for distributed, collaborative, hypermedia information systems.  HTTP is the foundation of data communication for the World Wide Web (WWW).  Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.  HTTP is the protocol to exchange or transfer hypertext.  NNTP (Network News Transfer Protocol)  The Network News Transfer Protocol (NNTP) is an application protocol used for transporting Usenet news articles (netnews) between news servers and for reading and posting articles by end user client applications. 20

Publishing Services  Gopher  is a TCP/IP application layer protocol designed for distributing, searching, and retrieving documents over the Internet.  WAIS  It is an Internet system in which databases are created at multiple server locations, kept track of by a directory of servers at one location, and made accessible for searching by users with WAIS client programs.  The user enters a search argument for a selected database and the client then accesses all the servers on which the database is distributed. 21