0% found this document useful (0 votes)
12 views11 pages

Lesson-11 - Notes - System Management and Administration (Note Taker Guide - Rev3)

there are notes

Uploaded by

Tisha Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views11 pages

Lesson-11 - Notes - System Management and Administration (Note Taker Guide - Rev3)

there are notes

Uploaded by

Tisha Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)

A. UNDERSTANDING OPERATING SYSTEM


a. What is an Operating System?
i. _________________________
ii. _________________________
1. _______________________________
2. Who can use the system (________________) and how system is used
(_______________)

B. EVALUATING AN OPERATING SYSTEM


a. Need to understand some design goals
i. ___________________________
ii. ___________________________
iii. ___________________________

Key: Need to account for the strengths, weaknesses, who will be using the OS,
what hardware, and for what purpose

C. COOPERATION AMONG COMPONENTS


a. Managing Subsystem Components
i. Each Manager:
1. Works closely with other managers
2. Performs a unique role
ii. Cooperation Issues (Working Together)
1. No task is performed in ______________
2. Each task is perform ________________
a. Harmoniously interacts with other ____________
i. Work must be precise and in sync
ii. Communications Networking make it more complex
(Remember Chapter 9 & 10)
b. ______________ is important

1
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)

c. ______________
i. Depends on the performance of the other
d. Money Investment: Where and How
i. Faster CPU
ii. Additional Processors
iii. More Memory
iv. More Disk Drives
v. RAID System
vi. New File Management Software
e. OS Subsystems

Bonus Understanding:

A. If buying a new system, what characteristic you’re looking


for
A. Performance
B. Efficient
B. You must do an extensive analysis
A. Understand system resources
B. Requirements
C. Managers
D. Users
C. Need to entire system performance
D. Not just individual components

D. SUBCOMPONENTS
a. Memory Manager
i. Random Access Memory (RAM: Volatile)
1. In charge of main memory, allocating/deallocating, space protection, policy
(validity/legality)
ii. Read-only memory ((ROM) non-volatile)
1. …critical component that holds the firmware (Programming Code). It loads a
piece of the OS when power is turned on

2
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)

iii. Responsibilities
1. Checking validity and legality (prevent bleed-over) of memory space request
2. Reallocating memory to make more useable space available
3. Deallocating memory to reclaim it
4. Protecting space in main memory occupied by OS

b. Processor Manager

i. Allocation of Central Processing Unit (CPU)


ii. Tracks process status
iii. Comparable to a traffic controller
iv. Saturation
1. Processing a lot of task
2. Great deal of synchronization
a. Memory Manager
b. Processor Manager
c. I/O Devices
3. Trade Offs
a. CPU Performance
i. ______________________
ii. ______________________
iii. ______________________
b. Several Problems
i. CPU reaches saturation or fully utilized, leads to higher
overhead
ii. Heavy loads requires more time to process
iii. With a heavy I/O-heavy mix, expect long queues to form at the
channels, control units, and I/O devices…CPU Idle as it waits
c. Device Manager
i. In charge of connecting with every available device
ii. Responsibilities include:

3
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)

1. Choosing most efficient resource allocation method


a. Based on scheduling policy
2. Identifying each device uniquely
3. Starting device operation (when appropriate)
4. Monitoring device progress
5. Deallocating the device
iii. Utilization
1. Buffering (__________________)
2. Blocking (___________________)
3. Rescheduling (_______________)
d. File Manager
i. In charge of tracking every file in the system
ii. Responsibilities Include:
1. Enforcing user/program resource access restrictions
2. Controlling user/program modification restrictions
3. Allocating space for a fie on secondary storage
4. Retrieving files efficiently
iii. Trade Offs
1. Defragmentation
a. ________________
b. ________________
2. _____________________
3. _____________________
e. Network Manager
i. Included in OS with networking capability
ii. Authorizes users to share resources
1. Synchronizes load among processors
2. Determines message priorities
3. Tries to select the most efficient communication paths
over multiple data communication lines

4
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)

E. INTERACTING WITH THE OPERATING SYSTEM


a. User Interface
i. Allows user to interact with the OS
ii. Issue commands to the OS
iii. Two Types
1. Graphical User Interface (GUI)
a. Mouse Point and Click
b. Menu Options, Icons on the desktop
2. Command Line Interface (CLI/CMD)
a. Type keyboards commands
b. Syntax must be accurate (commands must be correctly typed)
b. Task Management (Task Manager)
i. UNIX/Linux: System Monitor, Windows: Task Manager, iOS: Activity Monitor
1. Monitor the system’s resources continuously
2. Enforces Policies determining:
a. Who gets what, when, and how much
3. Allocate a resource (when appropriate)
4. Deallocate a resource (when appropriate)

F. MEASURING SYSTEM PERFORMANCE

a. Measurement Tool
i. Throughput:
1. ________________________
2. ________________________
3. ________________________
ii. Capacity
1. ________________________
2. Threshold or point of saturation (___________________)
3. ________________ can occur
5
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)

iii. Response Time


1. Reaction or time is takes to process a request
iv. Turnaround Time
1. Time it takes for output to return to the user
v. Resource Utilization
1. Operational Contribution
2. Percentage of the resource being in use (70% utilization)
vi. Availability
1. Is the resource ready for use
vii. Influences:
1. Mean Time Between Failures (MTBF)
a. _______________
b. Average time unit operational before break down
2. Mean Time To Repair (MTTR)
a. _______________
b. Average time needed to fix failed unit and put back in service
c. Availability (A) = MTBF /(MTBF + MTTR)
3. Reliability
a. Measures __________________unit will not fail during given time
b. Function of MTBF
c. Reliability (t) = 1 – e ^-(1/MTBF)(t)
b. Feedback Loops
i. Monitor system resource utilization for adjustments
1. Information provided to Job Scheduler
2. More time executing jobs
ii. Types
1. Negative Feedback
a. Process arrival rate ____________________when system too
congested
i. Stabilized system

6
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)

ii. Queue lengths close to estimated mean values


2. Positive Feedback
a. Arrival rate ___________________when system underutilized
i. Paged virtual memory system use this
ii. Implementation more difficult (than negative loops)
G. PATCH MANAGEMENT

a. What is Patch Management


i. Systematic updating the operating system
ii. Updating Application Software and Firmware
b. Patch
i. Programing code that replaces
ii. Changes some of the code that makes up the software
c. Patching Fundamentals
i. Patch Fundamentals
1. _______________________
2. _______________________
3. _________________________
4. _________________________
5. _________________________
ii. Patch Identification
iii. Patch Testing
1. Testing and evaluation environment
iv. Patch Deployment
1. Single Computer
2. Enterprise it’s more complex
v. Auditing the Finished System
1. All computers are patched correctly and perform fundamental task as
expected
2. No users had unexpected or unauthorized versions of software that may or
may not accept the patch
7
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)

3. No users are left out of the deployment


d. Software to Manage Deployment
i. Type
1. _____________________
2. _____________________
ii. Centralized Patch Management
1. ______________________
2. ______________________
e. Timing the Patch Cycle
i. Service Pack
1. Term used by vendors for patches to operating systems and other software
ii. Patch Tuesday
1. Second Tuesday of the month is when Microsoft releases its patches
2. Security Update Guide - Microsoft

H. SYSTEM MONITORING
a. Benchmarks
i. Used for comparison that have gone through extensive changes
1. Throughput
2. Performance
3. System Configuration
ii. Used by vendors to demonstrate a specific advantage
iii. They’re dependent of a system workload
iv. System’s design and implementation
v. Specific requirements of the application loaded onto the system

I. SYSTEMS MANAGEMENT ACTIVITIES


a. Patching
i. What is it?
1. ____________________________

8
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)

2. Three types
a. ________________________________
b. ________________________________
c. ________________________________
ii. How is it delivered
1. Direct from a vendor site
2. Configuration Manager
a. Windows Server Update Services
b. System Configuration Center Manager (SCCM)
iii. Patch Deployment
1. Patch Manage Policy “Patch Tuesday”
2. Deployment Methodology
a. ____________
b. ____________
c. ____________
d. ____________
e. ____________
f. ____________
b. Security (Protecting the Operating System)
i. ______________
ii. ______________
iii. ______________
iv. ______________
v. ______________
c. Security (Protecting the Operating System) (Continue)
v. Protect from the most to least privileged (Continue)
1. Access control is important and should be enforced at the
a. User Level
b. Supervisory (Privileged)
i. ______________

9
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)

ii. ______________
2. Types of access controls
a. Discretionary Access Control (DAC): __________________
b. Role Based Access Control (RBAC): __________________
c. Attribute Based Access Control (ABAC): _______________
d. Mandatory Access Control (MAC): ____________________
e. Rule Based Access Control (RuBAC): _________________
d. Account Management
i. Policy
i. _____________________________
ii. _____________________________
iii. _____________________________
iv. _____________________________
v. _____________________________
ii. Creation and or Provisioning
i. ______________________________
ii. ______________________________
iii. ______________________________
iii. Aging
i. ______________________________
ii. ______________________________
J. TROUBLESHOOTING

a. Identify the problem

b. Establish a theory of probable cause

c. Test the theory to determine the cause

d. Establish a plan of action to resolve the problem and implement the solution

e. Verify full system functionality and, if applicable, implement preventive measures

f. Document the findings, actions and outcomes


10
(Flynn, 2018)
LESSON-11_SYSTEM MANAGEMENT AND ADMINISTRATION (Note Take Guide)

References

Flynn, I. M. (2018). Understanding Operating Systems: 8th Edition. Boston, MA: Cengage Learning.

Shackleford, D. (2013). Virtualization Security: Protecting Virtualized Environments. Indianapolis:


John Wiley & Sons Inc.

Hussain, R. (2021, February 11). What Is Cloud Computing? Explore The Services And Deployment
Models. Retrieved from C# Corner: https://www.c-sharpcorner.com/article/what-is-cloud-computing-
explore-the-services-and-deployment-models/

11
(Flynn, 2018)

You might also like