Lesson-11 - Notes - System Management and Administration (Note Taker Guide - Rev3)
Lesson-11 - Notes - System Management and Administration (Note Taker Guide - Rev3)
Key: Need to account for the strengths, weaknesses, who will be using the OS,
what hardware, and for what purpose
1
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)
c. ______________
i. Depends on the performance of the other
d. Money Investment: Where and How
i. Faster CPU
ii. Additional Processors
iii. More Memory
iv. More Disk Drives
v. RAID System
vi. New File Management Software
e. OS Subsystems
Bonus Understanding:
D. SUBCOMPONENTS
a. Memory Manager
i. Random Access Memory (RAM: Volatile)
1. In charge of main memory, allocating/deallocating, space protection, policy
(validity/legality)
ii. Read-only memory ((ROM) non-volatile)
1. …critical component that holds the firmware (Programming Code). It loads a
piece of the OS when power is turned on
2
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)
iii. Responsibilities
1. Checking validity and legality (prevent bleed-over) of memory space request
2. Reallocating memory to make more useable space available
3. Deallocating memory to reclaim it
4. Protecting space in main memory occupied by OS
b. Processor Manager
3
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)
4
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)
a. Measurement Tool
i. Throughput:
1. ________________________
2. ________________________
3. ________________________
ii. Capacity
1. ________________________
2. Threshold or point of saturation (___________________)
3. ________________ can occur
5
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)
6
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)
H. SYSTEM MONITORING
a. Benchmarks
i. Used for comparison that have gone through extensive changes
1. Throughput
2. Performance
3. System Configuration
ii. Used by vendors to demonstrate a specific advantage
iii. They’re dependent of a system workload
iv. System’s design and implementation
v. Specific requirements of the application loaded onto the system
8
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)
2. Three types
a. ________________________________
b. ________________________________
c. ________________________________
ii. How is it delivered
1. Direct from a vendor site
2. Configuration Manager
a. Windows Server Update Services
b. System Configuration Center Manager (SCCM)
iii. Patch Deployment
1. Patch Manage Policy “Patch Tuesday”
2. Deployment Methodology
a. ____________
b. ____________
c. ____________
d. ____________
e. ____________
f. ____________
b. Security (Protecting the Operating System)
i. ______________
ii. ______________
iii. ______________
iv. ______________
v. ______________
c. Security (Protecting the Operating System) (Continue)
v. Protect from the most to least privileged (Continue)
1. Access control is important and should be enforced at the
a. User Level
b. Supervisory (Privileged)
i. ______________
9
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)
ii. ______________
2. Types of access controls
a. Discretionary Access Control (DAC): __________________
b. Role Based Access Control (RBAC): __________________
c. Attribute Based Access Control (ABAC): _______________
d. Mandatory Access Control (MAC): ____________________
e. Rule Based Access Control (RuBAC): _________________
d. Account Management
i. Policy
i. _____________________________
ii. _____________________________
iii. _____________________________
iv. _____________________________
v. _____________________________
ii. Creation and or Provisioning
i. ______________________________
ii. ______________________________
iii. ______________________________
iii. Aging
i. ______________________________
ii. ______________________________
J. TROUBLESHOOTING
d. Establish a plan of action to resolve the problem and implement the solution
References
Flynn, I. M. (2018). Understanding Operating Systems: 8th Edition. Boston, MA: Cengage Learning.
Hussain, R. (2021, February 11). What Is Cloud Computing? Explore The Services And Deployment
Models. Retrieved from C# Corner: https://www.c-sharpcorner.com/article/what-is-cloud-computing-
explore-the-services-and-deployment-models/
11
(Flynn, 2018)