We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 50
Network Operating Systems
Network Operating Systems and
Models NOS • Unlike operating systems, such as Windows, that are designed for single users to control one computer, network operating systems (NOS) coordinate the activities of multiple computers across a network. • The network operating system acts as a director to keep the network running smoothly. NOS Characteristics • Network operating systems (NOSs) distribute their functions over a number of networked computers. • It then adds functions that allow access to shared resources by a number of users concurrently. • NOS computers take on specialized roles to accomplish concurrent access to shared resources. • Client systems contain specialized software that allows them to request shared resources that are controlled by server systems responding to a client request. Differences Between PC and a NOS • The NOS enhances the reach of the client PC by making remote services available as extensions of the local native operating system. • Although a number of users may have accounts on a PC, only a single account is active on the system at any given time. • NOS supports multiple user accounts at the same time and enables concurrent access to shared resources by multiple clients. Multiuser, Multitasking, and Multiprocessor Systems • A NOS server is a multitasking system. Internally, the OS must be capable of executing multiple tasks or processes at the same time. • Some systems are equipped with more than one processor, called multiprocessing systems. • They are capable of executing multiple tasks in parallel by assigning each task to a different processor. • The aggregate amount of work that the server can perform in a given time is greatly enhanced in multiprocessor systems. NOS Server Hardware • NOS servers are large systems with additional memory to support multiple tasks that are all active, or resident, in memory at the same time. • Additional disk space is also required on servers to hold shared files and to function as an extension to the internal memory on the system. • Because a NOS depends on the continuous operation of its servers, the extra hardware components justify the additional expense. Choosing a NOS • The main features to consider when selecting a NOS include: – Performance – Management and monitoring tools – Security – Scalability – Robustness/fault tolerance Types of NOS • It is important to know the basics about popular NOS families. • Many networks now include more than one server type, and knowing how to get these diverse systems to interoperate is an important skill for a network administrator. • Operating systems on the network have their own language. • Different NOS vendors use the same terms in different ways. Windows Windows Terminology • Windows server-based networks that run Windows NT Server or Windows 2000 Server are based on the concept of the domain. • A domain is a group of computers and users that serves as a boundary of administrative authority. • Windows NT domains and Windows 2000 domains, although similar in function, interact with one another differently. Windows NT 4.0 • The Domain Structure of Windows NT was entirely different from the Domain Structure in Windows 2000. • Instead of Active Directory, Windows NT provides an administrative tool called the User Manager for Domains. • It is accessed from the domain controller and is used to create, manage, and remove domain user accounts. Windows NT 4.0 • Each NT domain requires one Primary Domain Controller (PDC). • This is a "master" server that contains the Security Accounts Management Database (SAM). • A domain can also have one or more Backup Domain Controllers (BDCs), each of which contains a read-only copy of the SAM. • The SAM is what controls the authentication process when a user logs onto the domain. Windows 2000 and XP Operating System • The offline folders feature enables users to copy and synchronize documents from the network to the local system so that they can be accessed when the computer is not connected to the network. • The Internet Printing Protocol (IPP) enables users to print to a URL and manage printers through a web browser interface. • Built-in disk defragmenters and other tools and utilities help users maintain and manage the operating system. • It supports Kerberos security (developing standard for authenticating network users), and the features of a Windows 2000 domain as an Active Directory client. Windows 2000 and XP Operating System XP also offers: • More extensive hardware and driver support. • More user-friendly file-sharing and network configuration for setting up home networks. • Enhanced wireless network features • Increased security • Remote Desktop control • Overall improvements to the GUI, including the welcome screen additions, start menu improvements. • Enhanced multimedia support for digital video, audio, and pictures. Windows 2000 and 2003 Family of Operating Systems • The Windows 2000 family of operating systems includes: – Windows 2000 Professional – Windows 2000 Server – Windows 2000 Advanced Server • The specific needs of the network will determine the best version of Windows 2000 for the installation. • The Windows 2003 family of operating systems includes: – Standard Edition – Enterprise Edition – Datacenter Edition – Web Edition – Small Business Server Edition • 2003 Server release is the available support for 64- bit systems in order to compete in the enterprise level server arena. Linux History of Linux • Linux is an operating system similar to UNIX. It runs on many different computers and was first released in 1991. • Linux is portable, which means versions can be found running on name brand or clone PCs. • Linux offers many features adopted from other versions of UNIX. What is UNIX? • The UNIX NOS was developed in 1969, and it has evolved into many varieties. • The source code is open, that is, available at no cost to anyone who wants to modify it. • It is written in C programming language so businesses, academic institutions, and even individuals can develop their own versions. • There are hundreds of different versions of UNIX. Linux Operating System • Linux is sometimes referred to as "UNIX Lite", and it is designed to run on Intel-compatible PCs. • However, Linux will run on other machines as well. • Linux brings the advantages of UNIX to home and small business computers. • The following are a few of the most popular types: – Red Hat Linux – Linux Mandrake – Caldera eDesktop and eServer – Debian GNU/Linux – Corel Linux – Turbo Linux Linux Clients • Windows clients can access Linux servers without client software if the UNIX servers run Samba, which is a program that uses the Server Message Block (SMB) application layer protocol. • Windows computers use SMB for file access across the network. • Samba permits them to see the Linux file system. Types of NOS • There are two major types of network operating systems: • Peer-to-peer • Client/server
• Nearly all modern networks are a combination of both.
The networking design can be considered independent of the servers and workstations that will share it. • Peer-to-peer • Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on other computers. However, they do not have a file server or a centralized management source Peer-to-peer • In a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources available on the network. • Peer-to-peer networks are designed primarily for small to medium local area networks. • Nearly all modern desktop operating systems, such as Macintosh OSX, Linux, and Windows, can function as peer-to-peer network operating systems. Advantages of a peer-to-peer network: • Less initial expense - No need for a dedicated server. • Setup - An operating system (such as Windows XP) already in place may only need to be reconfigured for peer-to-peer operations. Disadvantages of a peer-to-peer network:
• Decentralized - No central repository for files
and applications. • Security - Does not provide the security available on a client/server network Client/Server • Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers • The file servers become the heart of the system, providing access to resources and providing security. • Individual workstations (clients) have access to the resources available on the file servers. • The network operating system provides the mechanism to integrate all the components of the network and allow multiple users to simultaneously share the same resources irrespective of physical location. • UNIX/Linux and the Microsoft family of Windows Servers are examples of client/server network operating systems. Advantages of a client/server network: • Centralized - Resources and data security are controlled through the server. • Scalability - Any or all elements can be replaced individually as needs increase. • Flexibility - New technology can be easily integrated into system. • Interoperability - All components (client/network/server) work together. • Accessibility - Server can be accessed remotely and across multiple platforms. Disadvantages of a client/server network: • Expense - Requires initial investment in dedicated server. • Maintenance - Large networks will require a large staff to ensure efficient operation. • Dependence - When server goes down, operations will cease across the network. Servers • A server is a device with a particular set of programs or protocols that provide various services, which other machines or clients request, to perform certain tasks. • Together, a server and its clients form a client/server network, which provides routing systems and centralized access to information, resources, stored data, etc. • At the most ground level, one can consider it as a technology solution that serves files, data, print, fax resources and multiple computers. • The advanced server versions, enable the user to handle the accounts and passwords, allow or limit the access to shared resources, automatically support the data and access the information remotely. Types of servers • A server has many functions, and they come in different types to facilitate different uses.
The multiple types of servers or types of
network servers are as follows: • 1. Server Platform: Server platform is the fundamental hardware or software for a system which acts as an engine that drives the server. It is often used synonymously with an operating system.
• 2. Application Server: Also known as a type of
middleware, it occupies a substantial amount of computing region between database servers and the end user, and is commonly used to connect the two. • 3. Audio/Video Server: It provides multimedia capabilities to websites by helping the user to broadcast streaming multimedia content.
• 4. Chat Server: It serves the users to exchange data
in an environment similar to Internet newsgroup which provides real-time discussion capabilities.
• 5. Fax Server: It is a good option for organizations
that seek minimum incoming and outgoing telephone resources, but require to fax actual documents. • 6. FTP Server: It works on one of the oldest of the Internet services, the file transfer protocol. It provides a secure file transfer between computers while ensuring file security and transfer control.
• 7. Groupware Server: It is a software designed
that enables the users to work together, irrespective of the location, through the Internet or a corporate intranet and to function together in a virtual atmosphere. • 8. IRC Server: It is an ideal option for those looking for real-time discussion capabilities. Internet Relay Chat comprises different network servers that enable the users to connect to each other through an IRC network.
• 9. List Server: It provides a better way of
managing mailing lists. The server can be either open interactive discussion for the people or a one-way list that provides announcements, newsletters or advertising. • 10. Mail Server: It transfers and stores mails over corporate networks through LANs, WANs and across the Internet.
• 11. News Server: It serves as a distribution and delivery
source for many public news groups, approachable over the USENET news network.
• 12. Proxy Server: It acts as a mediator between a client
program and an external server to filter requests, improve performance and share connections. • 13. Web Server: It provides static content to a web browser by loading a file from a disk and transferring it across the network to the user's web browser. This exchange is intermediated by the browser and the server, communicating using HTTP.
• 14. Telnet Server: It enables the users to log
on to a host computer and execute tasks as if they are working on a remote computer. • 15. Virtual Servers: A virtual server is just like a physical computer because it is committed to an individual customer's demands, can be individually booted and maintains privacy of a separate computer. • Basically, the distance among shared and dedicated (hosting) servers is reduced providing freedom to other customers, at a less cost. Now, it has become very present in the data center. Example HTTP http request http request
Laptop w/ http response http response
Netscape Desktop w/ Server w/ Apache Explorer
• HTTP: Hypertext Transfer Protocol
– Communication protocol between clients and servers – Application layer protocol for WWW • Client/Server model: – Client: browser that requests, receives, displays object – Server: receives requests and responds to them • Protocol consists of various operations – Few for HTTP 1.0 (RFC 1945, 1996) – Many more in HTTP 1.1 (RFC 2616, 1999) Web Servers: Implementation Erich Nahum 43 and Performance How are Requests Generated? • User clicks on something • Uniform Resource Locator (URL): – http://www.nytimes.com – https://www.paymybills.com – ftp://ftp.kernel.org – news://news.deja.com – telnet://gaia.cs.umass.edu – mailto:[email protected] • Different URL schemes map to different services • Hostname is converted from a name to a 32-bit IP address (DNS resolve) • Connection is established to server Most browser requests are HTTP requests. What Happens Then? • Client downloads HTML document <html> <head> – Sometimes called “container page” <meta name=“Author” – Typically in text format (ASCII) content=“Erich Nahum”> <title> Linux Web – Contains instructions for rendering Server Performance </title> (e.g., background color, frames) </head> – Links to other pages <body text=“#00000”> <img width=31 height=11 src=“ibmlogo.gif”> <img • Many have embedded objects: src=“images/new.gif> <h1>Hi There!</h1> – Images: GIF, JPG (logos, banner ads) Here’s lots of cool linux stuff! – Usually automatically retrieved <a href=“more.html”> Click here</a> • I.e., without user involvement for more! </body> • can control sometimes </html> (e.g. browser options, junkbusters) sample html file So What’s a Web Server Do? • Respond to client requests, typically a browser – Can be a proxy, which aggregates client requests (e.g., AOL) – Could be search engine spider or custom • May have work to do on client’s behalf: – Is the client’s cached copy still good? – Is client authorized to get this document? – Is client a proxy on someone else’s behalf? – Run an arbitrary program (e.g., stock trade) • Hundreds or thousands of simultaneous clients • Hard to predict how many will show up on some day • Many requests are in progress concurrently What do HTTP Requests Look Like? GET /images/penguin.gif HTTP/1.0 User-Agent: Mozilla/0.9.4 (Linux 2.2.19) Host: www.kernel.org Accept: text/html, image/gif, image/jpeg Accept-Encoding: gzip Accept-Language: en Accept-Charset: iso-8859-1,*,utf-8 Cookie: B=xh203jfsf; Y=3sdkfjej <cr><lf>
• Messages are in ASCII (human-readable)
• Carriage-return and line-feed indicate end of headers • Headers may communicate private information – (e.g., browser, OS, cookie information, etc.) What Kind of Requests are there? Called Methods: • GET: retrieve a file (95% of requests) • HEAD: just get meta-data (e.g., mod time) • POST: submitting a form to a server • PUT: store enclosed document as URI • DELETE: removed named resource • LINK/UNLINK: in 1.0, gone in 1.1 • TRACE: http “echo” for debugging (added in 1.1) • CONNECT: used by proxies for tunneling (1.1) • OPTIONS: request for server/proxy options (1.1) What Do Responses Look Like? HTTP/1.0 200 OK Server: Tux 2.0 Content-Type: image/gif Content-Length: 43 Last-Modified: Fri, 15 Apr 1994 02:36:21 GMT Expires: Wed, 20 Feb 2002 18:54:46 GMT Date: Mon, 12 Nov 2001 14:29:48 GMT Cache-Control: no-cache Pragma: no-cache Connection: close Set-Cookie: PA=wefj2we0-jfjf <cr><lf> <data follows…> • Similar format to requests (i.e., ASCII) What Responses are There? • 1XX: Informational (def’d in 1.0, used in 1.1) 100 Continue, 101 Switching Protocols • 2XX: Success 200 OK, 206 Partial Content • 3XX: Redirection 301 Moved Permanently, 304 Not Modified • 4XX: Client error 400 Bad Request, 403 Forbidden, 404 Not Found • 5XX: Server error 500 Internal Server Error, 503 Service Unavailable, 505 HTTP Version Not Supported