SlideShare a Scribd company logo
1 of 32
Network Operating System 
By Elena Otte 
Distributed Data Processing
Table of content: 
 System 
 Network 
 Operating System 
 Network Operating System 
 Features 
 Remote Login with an example 
 Remote file transfer (Example) 
 Anonymous FTP method 
 Network and Operating System 
Security 
 Novell NetWare and protocols 
 Linux 
 Windows XP 
 MS-DOS environment 
 Difference between OS and 
NOS 
 Summary 
 Sources
What is a system? 
• set of interacting or interdependent entities 
Multiple meaning: 
 collection of organized things 
 way of organizing or planning 
 whole composed relationship among the members 
Characteristics: 
 have a structure that is defined by its parts and 
processes 
 tend to function in the same way 
(involves inputs and outputs of material)
What is a Network? 
 is a communication path between two or more 
systems 
 vary by the protocols used, the distances between 
nodes, and the transport media 
 TCP/IP is the most common 
network protocol
Operating System 
 program that manages the computer hardware 
 provides a basis for application programs and acts 
as an 
intermediary between the user and the hardware 
 offers a reasonable way to solve the problem of 
creating a usable computing system 
Types of Operating Systems: Windows Vista 
Linux and Unix 
Microsoft Windows 
Mac OS X
User 1 User 2 User 3 User n 
Compiler Assembler Text editor Databases 
System and Application Programs 
Operating System 
Computer Hardware 
System 
........ 
Figure: Abstract view of the components of a computer system
Network Operating System 
 provides an environment in which users, who are aware of 
multiplicity of machines, can access remote resources either: 
-> logging in to the remote machine* or 
-> transferring data from the remote 
machine to their own machines 
 mostly used with local area networks and widearea networks 
*Remote machine: refers to a computer connected to the network 
which a user is using
Features 
 Provides basic operating system features; support for 
processors, protocols, automatic hardware detection, 
support multi-processing of applications 
 Security features; authentication, authorization, 
access control 
 Provides names and directory services 
 Provides files, print, web services, back-up and 
replication services
 Supports Internetworking such as routing and WAN 
ports 
 User management and support for login and logoff, 
remote access, system management 
 Clustering capabilities, fault tolerant and and high 
availability systems 
Cluster: = group of linked computers working together closely, 
connected to LAN
Remote Login with an example 
 important function of a NOS is to allow users to log in remotely 
 internet provides the telnet facility for this purpose 
 Example: a user at Westminster College wishes to compute 
on “cs.yale.edu,“ a computer that is located at Yale 
University 
-> user must have a valid account on that machine 
to log in remotely the user issues the command: 
t e lnet cs.yale.edu 
Command results in the formation of a socket connection between 
the local machine at 
Westminster College and the “cs.yale.edu“ computer
 connection has been established 
 transparent, bidirectional link that all 
characters entered by the user are sent to a 
process “cs.yale.edu“ 
 all the output from that process is sent back 
to the user
Remote File Transfer 
 Provide a mechanism for remote file transfer from 
one machine to another 
 Each computer maintains its own local file system 
 User: “cs.uvm.edu“ wants to access a file located on 
another computer “cs.yale.edu“ file must be copied 
from the computer at Yale to the PC at Uni of 
Vermont 
 Internet provides the transfer with file transfer 
protocol (FTP) program
Example: 
 User on “cs.uvm.edu“ -> copy Java program 
Server.java that resides on “cs.yale.edu“ 
 Invoke FTP program ftp cs.yale.edu 
 Login name and password 
 Correct information has been received, user must 
connect to the file Server.java and after copy the file 
by executing get Server.java
 File location is not transparent to the user 
 No real file sharing 
 Remember: User at the Uni of Vermont must have 
login permission on “cs.yale.edu“ 
 FTP provides a way to allow a user to copy files 
remotely 
 Remote copying is accomplished through 
“anonymous FTP“ method
Anonymous FTP Method 
 File to be copied (Server.java) must be placed in a 
subdirectory (ftp) with the protection set to allow the 
public to read the file 
 User uses ftp command 
 Login name – “anonymous“ and password 
 Anonymous login is accomplished 
 User is allowed to access only those files that are in 
the directory tree of user “anonymous“
www.trainsignaltraining.com/.../ftp_iis7_10.png
 FTP mechanism is implemented (similar to telnet 
implementation) 
 Daemon on remote site -> watches for connection 
requests to system‘s FTP port 
 Login authentication is accomplished ->user can 
execute commands remotely 
 telnet daemon executes any command for user 
 FTP daemon responds to a predefined set of file-related 
commands
 Get: transfer a file from the remote machine to the 
local machine 
 Put: transfer from the local machine to the remote 
machine 
 Ls or dir: list files in the current directory on the 
remote machine 
 Cd: change the current directory on the remote 
machine
Network and Operating System Security 
 OS: system must protect itself 
 Runway process could constitute an accidental 
denial-of-service attack 
 Query to service could reveal passwords 
 Stack overflow could allow the launching of an 
unauthorized process 
 List of possible breaches is almost endless
 Travels over private leased lines, shared lines like the 
internet, wireless connections, or dial-up lines 
 Intercepting these data could be harmful as breaking 
into a computer 
 Interruption of communications could constitute a 
remote denial-of-service attack, 
diminishing user‘s use of 
and trust in the system
Novell NetWare 
 Is a NOS 
 Used cooperative multitasking to run several services 
on a PC 
 File sharing instead of disk sharing 
 NDS (Novell Directory Services) 
 Server administration 
 Desktop Management 
 Software distribution 
 Integrated cache 
 Enhanced security
Novell NetWare Protocols 
 Are widely used for PC LANs 
 Windows XP Nwlink protocol connects the NetBIOs 
to NetWare networks 
 In combination with a redirector this protocol enables 
a Windows XP client to connect to a NetWare server 
 Some NOSs for DOS and Windows system include 
Novell NetWare: Windows NT and 2000 OS/2 etc.
Linux 
 Free OS based on Unix standards 
 Provides a programming interface and user interface 
 Core Linux OS kernel is original, but allows much existing free 
Unix software to run 
 Multiuser system, providing protection between processes and 
running multiple processes according to a time-sharing (or 
multitasking) scheduler 
 Multiple networking protocols can be accessed simultaneously 
through socket interface
 Uses an abstraction layer to manage multiple file 
systems 
 Device-oriented, networked, and virtual file systems 
are supported 
 Network devices are dealt with differently from block 
and character devices 
 Users cannot directly transfer data to network 
devices-instead- must communicate indirectly by 
opening a connection to the kernel‘s networking 
subsystem
Windows XP 
 Was designed to be an extensible, portable OS 
 Supports multiple operating environments and 
symmetric multiprocessing 
 32-bit and 64-bit processors 
 Use of kernel objects to provide basic services 
 Network device interface specification (NDIS) and 
transport driver interface (TDI) 
 NDIS interface seperates network adapters from 
transport protocols 
 TDI supports both connection-based and 
connectionless transport, function to send any type of 
data
MS-DOS Environment 
 No complexity of other Windows XP subsystems 
 Provided by Win32 API application (VDM) 
 Windows XP command shell is a program that 
creates a window-looks like MS-DOS 
 Can run 16-bit and 32-bit executables 
 Some MS-DOS access the disk hardware directly -> 
fail to operate under Windows XP
Difference between Operating System and 
Network Operating System 
 OS runs the computer itself 
Example: Windows 
 Network OS run on a server 
and can be accessed 
through client machines 
connected on the network 
Example: Novell Netware and 
Linux run on a server and 
can be used as NOS, even 
there are Windows server 
OS‘s which can be used by 
clients connected on the 
network
Summary 
 NOS provides features such as file sharing across the network 
 Includes communication scheme 
 Allows different processes on different computers to exchange 
messages 
 Computer running a NOS acts autonomously from all other 
computers on the network 
 It is aware of the network – able to communicate with other 
networked computers
Sources 
 Book: “Operating System Concepts“ 
 www.answers.com/topic/network-operating-system 
 www.wikipedia.com 
 www.trainsignaltraining.com/.../ftp_iis7_10.png
Thank you for attention!!

More Related Content

What's hot

History of Windows Server
History of Windows ServerHistory of Windows Server
History of Windows Serversundas Shabbir
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server modelBharath Nair
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer serverAbenezer Abiti
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
INTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OSINTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OSkinish kumar
 
Network Operating System
Network Operating SystemNetwork Operating System
Network Operating Systemisma ishak
 
17 roles of window server 2008 r2
17 roles of window server 2008 r217 roles of window server 2008 r2
17 roles of window server 2008 r2IGZ Software house
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configurationVon Alvarez
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate serverGera Paulos
 
Linux command ppt
Linux command pptLinux command ppt
Linux command pptkalyanineve
 
System Administration DCU
System Administration DCUSystem Administration DCU
System Administration DCUKhalid Rehan
 
Testing and troubleshooting networks
Testing and troubleshooting networksTesting and troubleshooting networks
Testing and troubleshooting networksOnline
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Cardsourabh4u07
 
Setting up a network
Setting up a networkSetting up a network
Setting up a networkRachel Espino
 

What's hot (20)

History of Windows Server
History of Windows ServerHistory of Windows Server
History of Windows Server
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Configure and administer server
Configure and administer serverConfigure and administer server
Configure and administer server
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Networking tools
Networking toolsNetworking tools
Networking tools
 
Windows server
Windows serverWindows server
Windows server
 
INTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OSINTRODUCTION TO NETWORK OS
INTRODUCTION TO NETWORK OS
 
Network Operating System
Network Operating SystemNetwork Operating System
Network Operating System
 
17 roles of window server 2008 r2
17 roles of window server 2008 r217 roles of window server 2008 r2
17 roles of window server 2008 r2
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
 
System Administration DCU
System Administration DCUSystem Administration DCU
System Administration DCU
 
Testing and troubleshooting networks
Testing and troubleshooting networksTesting and troubleshooting networks
Testing and troubleshooting networks
 
Network Cabling
Network CablingNetwork Cabling
Network Cabling
 
Network Interface Card
Network Interface CardNetwork Interface Card
Network Interface Card
 
Setting up a network
Setting up a networkSetting up a network
Setting up a network
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Peer to-peer networks
Peer to-peer networksPeer to-peer networks
Peer to-peer networks
 

Viewers also liked

Network operating system
Network operating systemNetwork operating system
Network operating systemMuhammad Shahid
 
Characteristics of a network operating system
Characteristics of a network operating systemCharacteristics of a network operating system
Characteristics of a network operating systemRon McGary
 
Ryu: network operating system
Ryu: network operating systemRyu: network operating system
Ryu: network operating systemIsaku Yamahata
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating SystemSayam Asjad
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsSai praveen Seva
 
Linux ppt
Linux pptLinux ppt
Linux pptlincy21
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
Operating and network operating systems
Operating and network operating systemsOperating and network operating systems
Operating and network operating systemsMalvika Shukla
 
Operating system presentation
Operating system  presentationOperating system  presentation
Operating system presentationDescon
 
Neha 4g wireless network
Neha 4g wireless networkNeha 4g wireless network
Neha 4g wireless networkpankaj143neha
 
Top 5 Server Operating Systems
Top 5 Server Operating SystemsTop 5 Server Operating Systems
Top 5 Server Operating SystemsSinbad Konick
 
Android Operating System
Android Operating System Android Operating System
Android Operating System Sunil Maurya
 
Final.Laptop Vs. Desktop
Final.Laptop Vs. DesktopFinal.Laptop Vs. Desktop
Final.Laptop Vs. Desktopkewlgroup
 
2.3.1 sistem pengoperasian
2.3.1 sistem pengoperasian2.3.1 sistem pengoperasian
2.3.1 sistem pengoperasianSuriyana Ahmad
 

Viewers also liked (20)

Network operating system
Network operating systemNetwork operating system
Network operating system
 
Characteristics of a network operating system
Characteristics of a network operating systemCharacteristics of a network operating system
Characteristics of a network operating system
 
Ryu: network operating system
Ryu: network operating systemRyu: network operating system
Ryu: network operating system
 
Types of Operating System
Types of Operating SystemTypes of Operating System
Types of Operating System
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systems
 
Linux ppt
Linux pptLinux ppt
Linux ppt
 
Windows operating system presentation
Windows operating system presentationWindows operating system presentation
Windows operating system presentation
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Operating and network operating systems
Operating and network operating systemsOperating and network operating systems
Operating and network operating systems
 
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 2) - N10 006
 
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
PACE-IT: Introduction_to Routing Concepts (part 1) - N10 006
 
Operating system presentation
Operating system  presentationOperating system  presentation
Operating system presentation
 
Computer network
Computer networkComputer network
Computer network
 
Neha 4g wireless network
Neha 4g wireless networkNeha 4g wireless network
Neha 4g wireless network
 
Apple mac os
Apple mac osApple mac os
Apple mac os
 
Network operating system
Network operating systemNetwork operating system
Network operating system
 
Top 5 Server Operating Systems
Top 5 Server Operating SystemsTop 5 Server Operating Systems
Top 5 Server Operating Systems
 
Android Operating System
Android Operating System Android Operating System
Android Operating System
 
Final.Laptop Vs. Desktop
Final.Laptop Vs. DesktopFinal.Laptop Vs. Desktop
Final.Laptop Vs. Desktop
 
2.3.1 sistem pengoperasian
2.3.1 sistem pengoperasian2.3.1 sistem pengoperasian
2.3.1 sistem pengoperasian
 

Similar to Network Operating System Guide

Network operating systems1
Network operating systems1Network operating systems1
Network operating systems1Abu Sayed Adhar
 
Operating System and Basic Networks
Operating System and Basic NetworksOperating System and Basic Networks
Operating System and Basic NetworksJherome Tenorio
 
Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming ReportShivek Khurana
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, DockerSatrioBudi10
 
Web server administration
Web server administrationWeb server administration
Web server administrationsawsan slii
 
Cs556 section1
Cs556 section1Cs556 section1
Cs556 section1farshad33
 
Client server component
Client server componentClient server component
Client server componentSatya P. Joshi
 
Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...andega
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networkingRaja Waseem Akhtar
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Hasibul Islam Nirob
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating systemMoeez Ahmad
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptxDeepVala5
 
Remote server
Remote serverRemote server
Remote serverRijosh vk
 

Similar to Network Operating System Guide (20)

Network operating systems1
Network operating systems1Network operating systems1
Network operating systems1
 
Operating System and Basic Networks
Operating System and Basic NetworksOperating System and Basic Networks
Operating System and Basic Networks
 
Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming Report
 
Jaringan, Linux, Docker
Jaringan, Linux, DockerJaringan, Linux, Docker
Jaringan, Linux, Docker
 
Web server administration
Web server administrationWeb server administration
Web server administration
 
Cs556 section1
Cs556 section1Cs556 section1
Cs556 section1
 
Client server component
Client server componentClient server component
Client server component
 
os - Copy
os - Copyos - Copy
os - Copy
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...Introduction to Networking | Linux-Unix and System Administration | Docker an...
Introduction to Networking | Linux-Unix and System Administration | Docker an...
 
CSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptxCSS 12 - Q1 - Lesson 3.pptx
CSS 12 - Q1 - Lesson 3.pptx
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
Linux io
Linux ioLinux io
Linux io
 
App A
App AApp A
App A
 
Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1Computer Networking Theory Assignment 1
Computer Networking Theory Assignment 1
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
6 networking
6 networking6 networking
6 networking
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
Remote server
Remote serverRemote server
Remote server
 
Chapter#4
Chapter#4Chapter#4
Chapter#4
 

More from rahmanitayulia

More from rahmanitayulia (10)

7 file-sharing-nfs-samba
7 file-sharing-nfs-samba7 file-sharing-nfs-samba
7 file-sharing-nfs-samba
 
Perangkat keras-jaringan-komputer2
Perangkat keras-jaringan-komputer2Perangkat keras-jaringan-komputer2
Perangkat keras-jaringan-komputer2
 
Cisco packettracer overview_20jul09
Cisco packettracer overview_20jul09Cisco packettracer overview_20jul09
Cisco packettracer overview_20jul09
 
Client
ClientClient
Client
 
Topologi jaringan
Topologi jaringanTopologi jaringan
Topologi jaringan
 
Subnetting
SubnettingSubnetting
Subnetting
 
Hardware
HardwareHardware
Hardware
 
Pengertian k3
Pengertian k3Pengertian k3
Pengertian k3
 
Pengertian k3
Pengertian k3Pengertian k3
Pengertian k3
 
Pengertian k3
Pengertian k3Pengertian k3
Pengertian k3
 

Recently uploaded

The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 

Recently uploaded (20)

The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 

Network Operating System Guide

  • 1. Network Operating System By Elena Otte Distributed Data Processing
  • 2. Table of content:  System  Network  Operating System  Network Operating System  Features  Remote Login with an example  Remote file transfer (Example)  Anonymous FTP method  Network and Operating System Security  Novell NetWare and protocols  Linux  Windows XP  MS-DOS environment  Difference between OS and NOS  Summary  Sources
  • 3. What is a system? • set of interacting or interdependent entities Multiple meaning:  collection of organized things  way of organizing or planning  whole composed relationship among the members Characteristics:  have a structure that is defined by its parts and processes  tend to function in the same way (involves inputs and outputs of material)
  • 4. What is a Network?  is a communication path between two or more systems  vary by the protocols used, the distances between nodes, and the transport media  TCP/IP is the most common network protocol
  • 5. Operating System  program that manages the computer hardware  provides a basis for application programs and acts as an intermediary between the user and the hardware  offers a reasonable way to solve the problem of creating a usable computing system Types of Operating Systems: Windows Vista Linux and Unix Microsoft Windows Mac OS X
  • 6. User 1 User 2 User 3 User n Compiler Assembler Text editor Databases System and Application Programs Operating System Computer Hardware System ........ Figure: Abstract view of the components of a computer system
  • 7. Network Operating System  provides an environment in which users, who are aware of multiplicity of machines, can access remote resources either: -> logging in to the remote machine* or -> transferring data from the remote machine to their own machines  mostly used with local area networks and widearea networks *Remote machine: refers to a computer connected to the network which a user is using
  • 8. Features  Provides basic operating system features; support for processors, protocols, automatic hardware detection, support multi-processing of applications  Security features; authentication, authorization, access control  Provides names and directory services  Provides files, print, web services, back-up and replication services
  • 9.  Supports Internetworking such as routing and WAN ports  User management and support for login and logoff, remote access, system management  Clustering capabilities, fault tolerant and and high availability systems Cluster: = group of linked computers working together closely, connected to LAN
  • 10. Remote Login with an example  important function of a NOS is to allow users to log in remotely  internet provides the telnet facility for this purpose  Example: a user at Westminster College wishes to compute on “cs.yale.edu,“ a computer that is located at Yale University -> user must have a valid account on that machine to log in remotely the user issues the command: t e lnet cs.yale.edu Command results in the formation of a socket connection between the local machine at Westminster College and the “cs.yale.edu“ computer
  • 11.  connection has been established  transparent, bidirectional link that all characters entered by the user are sent to a process “cs.yale.edu“  all the output from that process is sent back to the user
  • 12. Remote File Transfer  Provide a mechanism for remote file transfer from one machine to another  Each computer maintains its own local file system  User: “cs.uvm.edu“ wants to access a file located on another computer “cs.yale.edu“ file must be copied from the computer at Yale to the PC at Uni of Vermont  Internet provides the transfer with file transfer protocol (FTP) program
  • 13. Example:  User on “cs.uvm.edu“ -> copy Java program Server.java that resides on “cs.yale.edu“  Invoke FTP program ftp cs.yale.edu  Login name and password  Correct information has been received, user must connect to the file Server.java and after copy the file by executing get Server.java
  • 14.  File location is not transparent to the user  No real file sharing  Remember: User at the Uni of Vermont must have login permission on “cs.yale.edu“  FTP provides a way to allow a user to copy files remotely  Remote copying is accomplished through “anonymous FTP“ method
  • 15. Anonymous FTP Method  File to be copied (Server.java) must be placed in a subdirectory (ftp) with the protection set to allow the public to read the file  User uses ftp command  Login name – “anonymous“ and password  Anonymous login is accomplished  User is allowed to access only those files that are in the directory tree of user “anonymous“
  • 17.  FTP mechanism is implemented (similar to telnet implementation)  Daemon on remote site -> watches for connection requests to system‘s FTP port  Login authentication is accomplished ->user can execute commands remotely  telnet daemon executes any command for user  FTP daemon responds to a predefined set of file-related commands
  • 18.  Get: transfer a file from the remote machine to the local machine  Put: transfer from the local machine to the remote machine  Ls or dir: list files in the current directory on the remote machine  Cd: change the current directory on the remote machine
  • 19. Network and Operating System Security  OS: system must protect itself  Runway process could constitute an accidental denial-of-service attack  Query to service could reveal passwords  Stack overflow could allow the launching of an unauthorized process  List of possible breaches is almost endless
  • 20.  Travels over private leased lines, shared lines like the internet, wireless connections, or dial-up lines  Intercepting these data could be harmful as breaking into a computer  Interruption of communications could constitute a remote denial-of-service attack, diminishing user‘s use of and trust in the system
  • 21. Novell NetWare  Is a NOS  Used cooperative multitasking to run several services on a PC  File sharing instead of disk sharing  NDS (Novell Directory Services)  Server administration  Desktop Management  Software distribution  Integrated cache  Enhanced security
  • 22. Novell NetWare Protocols  Are widely used for PC LANs  Windows XP Nwlink protocol connects the NetBIOs to NetWare networks  In combination with a redirector this protocol enables a Windows XP client to connect to a NetWare server  Some NOSs for DOS and Windows system include Novell NetWare: Windows NT and 2000 OS/2 etc.
  • 23.
  • 24. Linux  Free OS based on Unix standards  Provides a programming interface and user interface  Core Linux OS kernel is original, but allows much existing free Unix software to run  Multiuser system, providing protection between processes and running multiple processes according to a time-sharing (or multitasking) scheduler  Multiple networking protocols can be accessed simultaneously through socket interface
  • 25.
  • 26.  Uses an abstraction layer to manage multiple file systems  Device-oriented, networked, and virtual file systems are supported  Network devices are dealt with differently from block and character devices  Users cannot directly transfer data to network devices-instead- must communicate indirectly by opening a connection to the kernel‘s networking subsystem
  • 27. Windows XP  Was designed to be an extensible, portable OS  Supports multiple operating environments and symmetric multiprocessing  32-bit and 64-bit processors  Use of kernel objects to provide basic services  Network device interface specification (NDIS) and transport driver interface (TDI)  NDIS interface seperates network adapters from transport protocols  TDI supports both connection-based and connectionless transport, function to send any type of data
  • 28. MS-DOS Environment  No complexity of other Windows XP subsystems  Provided by Win32 API application (VDM)  Windows XP command shell is a program that creates a window-looks like MS-DOS  Can run 16-bit and 32-bit executables  Some MS-DOS access the disk hardware directly -> fail to operate under Windows XP
  • 29. Difference between Operating System and Network Operating System  OS runs the computer itself Example: Windows  Network OS run on a server and can be accessed through client machines connected on the network Example: Novell Netware and Linux run on a server and can be used as NOS, even there are Windows server OS‘s which can be used by clients connected on the network
  • 30. Summary  NOS provides features such as file sharing across the network  Includes communication scheme  Allows different processes on different computers to exchange messages  Computer running a NOS acts autonomously from all other computers on the network  It is aware of the network – able to communicate with other networked computers
  • 31. Sources  Book: “Operating System Concepts“  www.answers.com/topic/network-operating-system  www.wikipedia.com  www.trainsignaltraining.com/.../ftp_iis7_10.png
  • 32. Thank you for attention!!