SlideShare a Scribd company logo
OPERATING SYSTEM &
BASIC NETWORKS
TENORIO, JHEROME S.
TYRONNE KYLE BELEN
WILSON DOLORES LABINAY
ANGHIE ROSARIO GANNABAN
LESTER NYELI ARIBBAY
DENNYLE CALUDUCAN
OSCAR
LEILA
OPERATING SYSTEMS & APPLICATIONS
APAYAO STATE COLLEGE
PREPARED BY:
• What is a System
• What is a Network
• Operating System
• Types of Operating Systems
• Network Operating System (NOS)
• Most Widely Used NOS
• Features
• Remote Login & Example
• Remote File Transfer & Example
• Anonymous FTP Method
CONTENTS:
• Network and Operating System Security
• Novell NetWare
• Novell NetWare Protocols
• Client
• Server
• Windows Serve
• Advantages of Using
Windows
• Linux Server
• Advantages of Using
• Down Side of Linux
Server
• Types of Network Operating System
• Peer-to-Peer NOS
• Client/Server NOS
• Domain
• Workgroup
• Difference between Operating System and
Network Operating System
• Summary
• Sources
What is a system?
a set of things working together as parts of a
mechanism or an interconnecting network
Multiple meaning:
 collection of organized things
 way of organizing or planning
 whole composed relationship among
the members
Characteristics:
 have a structure that is defined by its
parts & processes
 tend to function in the same way
(involves inputs and outputs of material)
What is a Network?
 is a communication path between two or more
systems
 vary by the protocols used, the distances between
nodes, and the transport media
 TCP/IP is the most common
network protocol
Operating System
 program that manages the computer hardware
 provides a basis for application programs and
acts as an intermediary between the user and
the hardware
 offers a reasonable way to solve the problem of
creating a usable computing system
Types of Operating Systems: Windows Vista
Linux and Unix
Microsoft Windows
Mac OS X
User 1 User 2 User 3 User n
System and Application Programs
Operating System
Computer Hardware
Compiler Assembler Text editor Databases
System
........
Figure: Abstract view of the components of a computer system
Network Operating System (NOS)
 provides an environment in which users,
who are aware of multiplicity of machines,
can access Remote resources either:
• logging in to the remote machine* or
• transferring data from the remote
machine to their own machines
 mostly used with local area networks (LAN) and
wide area networks (WAN)
*Remote machine:
refers to a computer connected to the network which a user is using
MOST WIDELY USED
NETWORK OPERATING SYSTEMS
AVAILABLE TODAY
 Windows 2000 and
Windows Server 2003/2008
 Novell Netware
 UNIX
Fine Points:
Windows 2000 and Windows Server 2003 were built off Windows
NT Technologies and are the successors to Windows NT.
Features of NOS
 Provides basic operating system features;
support for processors, protocols,
automatic hardware detection, support
multi-processing of applications
 Security features; authentication,
authorization, access control
 Provides names and directory services
 Provides files, print, web services,
back-up and replication services
Features of NOS
 Supports Internetworking such as routing
and WAN ports
 User management and support for login
and logoff, remote access, system
management
 *Clustering capabilities, fault tolerant and
high availability systems
*Cluster:
group of linked computers working together closely, connected
to LAN
Remote Login
 one important function of a NOS is to
allow users to log in remotely
 The internet provides the telnet facility for
this purpose
Remote Login Example:
a user at Apayao State College (ASC) Luna wishes to compute on
“cs.ascconner.edu,” a computer that is located at ASC Conner
 The user must have a valid account on that machine to log in
remotely the user issues the command: telnet cs.ascconner.edu
The command results in the formation of a socket connection
between the local machine at ASC Luna and the "cs.ascconner.edu"
computer.
 connection has been established
 transparent, bidirectional link that all
characters entered by the user are
sent to a process "cs.ascconner.edu"
 all the output from that process is sent back
to the user in ASC Luna
ASC
LUNA
USER
cs.ascconner.edu
TELNET cs.ascconner.edu
to establish connection
All the output is sent back to ASC Luna
Remote Login Example
Remote File Transfer
 Provide a mechanism for remote file transfer from
one machine to another
 Each computer maintains its own local file system
 User: “cs.ascluna.edu” wants to access a file located
on another computer “cs.ascconner.edu” file must
be copied from the computer at Conner Campus to
the PC at Luna Campus
 Internet provides the transfer with file transfer
protocol (FTP) program
Remote File Transfer Example:
 User on "cs.ascluna.edu" -> copy Java
program
Server.java that resides on "cs.ascconner.edu"
 Invoke FTP program ftp cs.ascconner.edu
 Login name and password
 Correct information has been received, user
must connect to the file Server.java and after
copy the file by executing get Server.java
Remote File Transfer Example:
 File location is not transparent to the user
 No real file sharing
 Remember: User at ASC Luna must have
login permission on “cs.ascconner.edu”
 FTP provides a way to allow a user to copy
files remotely
 Remote copying is accomplished through
“anonymous FTP” method
Anonymous FTP Method
File to be copied (Server.java) must be
placed in a subdirectory (ftp) with the
protection set to allow the public to read the
file
User uses ftp command
Login name – “anonymous” and password
(anything)
Anonymous login is accomplished
User is allowed to access only those files that
are in the directory tree of user “anonymous”
www.trainsignaltraining.com/.../ftp_iis7_10.png
 FTP mechanism is implemented (similar to
telnet implementation)
 Daemon on remote site watches for
connection requests to system‘s FTP port
 Login authentication is accomplished ->user
can execute commands remotely
 telnet daemon executes any command for
user
 FTP daemon responds to a predefined set
of file-related commands
*Daemon:
The daemon program forwards the requests to other programs
(or processes) as appropriate.
Get: transfer a file from the remote machine
to the local machine
Put: transfer from the local machine to the
remote machine
Ls or dir: list files in the current directory on
the remote machine
Cd: change the current directory on the remote
machine
RUNAWAY
A process that enters an infinite loop & spawns new
processes. This can cause an overflow in the proc table
that causes other processes to fail with the “No more
processes:” error message.
It can cause an error that locks up the keyboard,
preventing anything that the user types from reaching the
system. Because of this, a runaway process cannot be
stopped from the invoking terminal.
Network and Operating System Security
 OS system must protect itself
 Runaway process could constitute an accidental
denial-of-service (DoS) attack
DoS Attack
A cyber-attack in which the perpetrator seeks to
make a machine or network resource unavailable to its
intended users by temporarily or indefinitely disrupting
services of a host connected to the network. DoS is
typically accomplished by flooding the targeted machine
or resource w/ superfluous requests in an attempt to
overload systems & prevent some or all legitimate
requests from being fulfilled.
Network and Operating System Security
 Query to service could reveal passwords
Collection of data from subscribed users including confidential
entities such as passwords
Network and Operating System Security
 Stack overflow could allow the launching of an
unauthorized process
Stack
• Is a programming implementation suck as arrays and link lists
• Figuratively like a stack of plates and operates in LIFE (Last in First Out)
procedure.
Two Operations in a Stack
• Push – pushes data on the stack
• Pop – Removes an item from the top
• A stack may be implemented to have a bounded capacity. If the stack
is full and does not contain enough space to accept an entity to be
pushed, the stack is then considered to be in an overflow state.The
pop operation removes an item from the top of the stack.
List of possible breaches is almost endless
Travels over private leased lines, shared lines
like the internet, wireless connections, or dial-up
lines
Intercepting these data could be harmful as
breaking into a computer
Interruption of communications could constitute
a remote denial-of-service attack, diminishing
user‘s use of & trust in the system
 Is a NOS
 Used cooperative multitasking to run several services
on a PC
 File sharing instead of disk sharing
 NDS (Novell Directory Services)
 a distributed network directory service for managing
network resources such as users, servers, & peripherals
 NDS was originally called NetWare Directory Services
Novell NetWare
Server administration
Desktop Management
Software distribution
Integrated cache - provides in-memory storage on the
NetScaler appliance and servesWeb content to users without
requiring a round trip to an origin server.
Enhanced security
Novell NetWare Protocols
Are widely used for PC LANs
Windows XP Nwlink protocol NWLink packages
data to be compatible with client/server services
on NetWare Networks
In combination with a redirector this protocol
enables a Windows XP client to connect to a
NetWare server
Some NOSs for DOS & Windows system
include Novell NetWare: Windows NT and
2000 OS/2 etc.
Client
A piece of computer hardware or software that
accesses a service made available by a
server. The server is often (but not always) on
another computer system, in which case the
client accesses the service by way of a
network.
The requesting program or user in a
client/server relationship.
Server
It is a computer or computer program that
manages access to a centralized resource or
service in a network.
In computer networking, a server is a computer
designed to process requests and deliver data
to other (client) computers over a local network
or the Internet.
Server
Many types of servers exist, including web
servers, mail servers, and file servers. Each
type runs software specific to the purpose of
the server.
For example, a Web server may run Apache
HTTP Server or Microsoft IIS, which both
provide access to websites over the Internet.
Windows Server
 Windows Server is a group of operating systems designed
by Microsoft that supports enterprise-level management, data
storage, applications, and communications.
 A series of server operating systems developed by Microsoft
Corporation.
 Windows servers are more powerful versions of their desktop
operating system counterparts and are designed to more
efficiently handle corporate networking, Internet/intranet
hosting, databases, enterprise-scale messaging and similar
functions.
Windows Server
 Previous versions of Windows Server have focused on
stability, security, networking, and various improvements to
the file system.
 Other improvements also have included improvements to
deployment technologies, as well as increased hardware
support. Microsoft has also created specialized SKUs (Stock
keeping unit) of Windows Server that focus on the home and
small business markets.
 Windows Server 2012 R2 is the latest release of Windows
Server, and focuses on cloud computing.
Advantages of Windows Server
 Microsoft products are regarded as the standard option for
most businesses.
 Most IT admins are comfortable using either Windows Server
2008 and 2012.
 According to Microsoft's website, 2008's mainstream support
will end in 2015, with extended support ending in 2020.
 Cost is also an important factor; license fees are expensive.
The more employees you have, the more expensive it will
become.
Linux Server
 A Linux server is a high-powered variant of the Linux open
source operating system that's designed to handle the more
demanding needs of business applications such as network
and system administration, database management and
Web services.
 Linux servers are frequently selected over other server
operating systems for their stability, security and flexibility
advantages. Leading Linux server operating systems include
CentOS, Debian, Ubuntu Server, Slackware and Gentoo.
Advantages of Linux Server
 You can download, modify it and re-distribute it without
spending any money.
 Linux itself is not a complete operating system (it is just a
kernel) and requires an additional set of software to be
bundled with it.
 SUSE (Developer of Linux Server) is popular with the
enterprise market
 Linux is installed on over 95% of the world's best
supercomputers demonstrating that it is the fastest performing
OS with the smallest resource footprint.
Advantages of Linux Server
 Linux distributions also offer alternatives to popular Microsoft
products such as Microsoft Exchange
 If you already use Microsoft and are looking to migrate to Linux
in stages, SUSE (for example) is compatible with Active
Directory, Exchange, SharePoint and Novell GroupWise.
 Recently, SUSE partnered with Microsoft to enable Hyper-V
node management using SUSE Cloud, allowing you to run a
mixed environment where required.
 No OS is perfect; one of the major downsides of Linux is that
as it is a lesser known platform you will find it harder to
administrators with the skills to configure and support the
system in-house.
Down Side of Linux Server
Types of Network Operating System
Peer-to-peer network operating system
 users are allowed to share resources and files located on
their computers and access shared resources from others.
This system is not based with having a file server or
centralized management source. A peer-to-peer network sets
all connected computers equal; they all share the same
abilities to use resources available on the network.
Advantages
 Ease of setup
 Less hardware needed, no server needs to be purchased.
Disadvantages
 No central location for storage.
 Lack of security that a client/server type offers
Types of Network Operating System
Client/Server Network Operating Systems
 can be based on a client/server architecture in which a
server enables multiple clients to share resources.
Client/server network operating systems allow the network to
centralize functions and applications in one or more
dedicated file servers. The server is the center of the system,
allowing access to resources and instituting security.
Advantages
 Centralized servers are more stable.
 Security is provided through the server.
 New technology and hardware can be easily integrated into
the system.
 Servers are able to be accessed remotely from different
locations and types of systems.
Domain
It is a group of computers and devices on a
network that are administered as a unit with
common rules and procedures. Within the
Internet, domains are defined by the IP
address. All devices sharing a common
part of the IP address are said to be in the
same domain.
Workgroup
In computer networking, a workgroup is a
collection of computers on a local area
network (LAN) that share common
resources and responsibilities. Workgroups
provide easy sharing of files, printers and
other network resources.
The Microsoft Windows family of operating
systems supports assigning of computers to
named workgroups.
Difference between Operating System and
Network Operating System
 OS runs the computer itself
Example: Windows
 Network OS run on a server
and can be accessed
through client machines
connected on the network
Example:
Novell Netware and
Linux run on a server and can
be used as NOS, even there
are Windows server OS‘s
which can be used by clients
connected on the network
Summary
 NOS provides features such as file sharing across the network
 Includes communication scheme
 Allows different processes on different computers to exchange
messages
 Computer running a NOS acts autonomously from all other
computers on the network
 It is aware of the network – able to communicate with other
networked computers
Sources
BOOK
 Operating System Concepts
 Basic Networking Concepts
WEB
 www.wikipedia.com
 whatis.techtarget.com/definition/anonymous-FTP-File-Transfer-Protocol
 www.trainsignaltraining.com/.../ftp_iis7_10.png
 www.answers.com/topic/network-operating-system
 http://osr507doc.xinuos.com/en/HANDBOOK/runaway_proc.html
 docs.citrix.com/en-us/netscaler/12/optimization/integrated-caching.html
 searchnetworking.techtarget.com/definitio n/network-operating-system
 www.webopedia.com/TERM/N/network_o perating_system_NOS.html
 http://www.webopedia.com/TERM/W/Windows _Server.html
 msdn.microsoft.com/enus/library/windows/desktop/dn636873%28v=vs.85%29.aspx
 http://www.webopedia.com/TERM/L/linux_serve r.html
 http://www.techradar.com/news/software/opera ting-systems/windows-vs-linux-which-os
-is-bestfor-your-business—1265775
 https://en.wikipedia.org/wiki/List_of_Microsoft_ Windows_versions
 http://www.serverwatch.com/columns/article.ph p/3900711/The-Top-10-Linux-
ServerDistributions.htm
 http://www.webopedia.com/TERM/D/domain.html
 http://compnetworking.about.com/cs/design/ g/bldef_workgroup.htm
JHEROME S.TENORIO
Your time is limited,
so don’t waste it living
Someone else’s life.
-Steve Jobs
LinkedIn:
https://www.linkedin.com/in/jherometenoriorealestateva
Facebook:
@JTenTechTorials
Youtube:
Channel Name jTen
Twitter:
@jTenTechTorials

More Related Content

PDF
Linux Presentation
PPT
Chapter08 -- network operating systems and windows server 2003-based networking
PPTX
INTRODUCTION TO NETWORK OS
DOC
A Project Report on Linux Server Administration
PPT
PPT
Presentation on nfs,afs,vfs
PPT
Coda file system
PPT
3. distributed file system requirements
Linux Presentation
Chapter08 -- network operating systems and windows server 2003-based networking
INTRODUCTION TO NETWORK OS
A Project Report on Linux Server Administration
Presentation on nfs,afs,vfs
Coda file system
3. distributed file system requirements

What's hot (20)

PPTX
Linux administration
PPT
4.file service architecture (1)
PPTX
File service architecture and network file system
PDF
PPT
Unit 3.1 cs6601 Distributed File System
KEY
Linux beginner's Workshop
PPT
Distributed File Systems
PPT
Chapter 1
PPT
Distribution File System DFS Technologies
DOCX
Linux admin interview questions
DOC
Lesson 4 intro to advanced o perating systems
PPT
Distributed file systems dfs
PPT
Chapter 9 names
PPTX
network administration directory access and remote access
PPS
Ppt linux
PPTX
Linux Administrator - The Linux Course on Eduonix
PPT
File replication
PPT
Ch18 system administration
Linux administration
4.file service architecture (1)
File service architecture and network file system
Unit 3.1 cs6601 Distributed File System
Linux beginner's Workshop
Distributed File Systems
Chapter 1
Distribution File System DFS Technologies
Linux admin interview questions
Lesson 4 intro to advanced o perating systems
Distributed file systems dfs
Chapter 9 names
network administration directory access and remote access
Ppt linux
Linux Administrator - The Linux Course on Eduonix
File replication
Ch18 system administration
Ad

Similar to Operating System and Basic Networks (20)

PPT
Network operating systems
PPTX
Remote server
PPT
lec3_10.ppt
PDF
Configure and administer server
PDF
Configure and administer server
PPTX
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
PPTX
Network Operating System (Linux and Windows Server)
PPTX
ComTech-Setting Up Computer Servers.pptx
PPT
PPTX
Server Configuration and coc3 in computer systems servicing.pptx
PPT
Chapter 8 distributed file systems
PPTX
Characteristics of a network operating system
PPT
Remote login.89 to 90
PDF
Introduction to distributed file systems
PPTX
CSS 12 - Q1 - Lesson 3.pptx
PPT
Chapter 6 - INTRODUCTION TO NETWORK OPERATING SYSTEM - 0S and NOS.ppt
PPT
PPTX
Unit 1
DOCX
Network security
PPTX
CSS12 LESSON 02.pptx
Network operating systems
Remote server
lec3_10.ppt
Configure and administer server
Configure and administer server
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
Network Operating System (Linux and Windows Server)
ComTech-Setting Up Computer Servers.pptx
Server Configuration and coc3 in computer systems servicing.pptx
Chapter 8 distributed file systems
Characteristics of a network operating system
Remote login.89 to 90
Introduction to distributed file systems
CSS 12 - Q1 - Lesson 3.pptx
Chapter 6 - INTRODUCTION TO NETWORK OPERATING SYSTEM - 0S and NOS.ppt
Unit 1
Network security
CSS12 LESSON 02.pptx
Ad

Recently uploaded (20)

PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
Autodesk AutoCAD Crack Free Download 2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
history of c programming in notes for students .pptx
PDF
iTop VPN Crack Latest Version Full Key 2025
PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Nekopoi APK 2025 free lastest update
PPTX
assetexplorer- product-overview - presentation
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PDF
Website Design Services for Small Businesses.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PDF
Download FL Studio Crack Latest version 2025 ?
PDF
Salesforce Agentforce AI Implementation.pdf
PPTX
Monitoring Stack: Grafana, Loki & Promtail
Advanced SystemCare Ultimate Crack + Portable (2025)
Autodesk AutoCAD Crack Free Download 2025
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Design an Analysis of Algorithms I-SECS-1021-03
history of c programming in notes for students .pptx
iTop VPN Crack Latest Version Full Key 2025
Digital Systems & Binary Numbers (comprehensive )
Design an Analysis of Algorithms II-SECS-1021-03
Nekopoi APK 2025 free lastest update
assetexplorer- product-overview - presentation
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Navsoft: AI-Powered Business Solutions & Custom Software Development
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
Website Design Services for Small Businesses.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Download FL Studio Crack Latest version 2025 ?
Salesforce Agentforce AI Implementation.pdf
Monitoring Stack: Grafana, Loki & Promtail

Operating System and Basic Networks

  • 1. OPERATING SYSTEM & BASIC NETWORKS TENORIO, JHEROME S. TYRONNE KYLE BELEN WILSON DOLORES LABINAY ANGHIE ROSARIO GANNABAN LESTER NYELI ARIBBAY DENNYLE CALUDUCAN OSCAR LEILA OPERATING SYSTEMS & APPLICATIONS APAYAO STATE COLLEGE PREPARED BY: • What is a System • What is a Network • Operating System • Types of Operating Systems • Network Operating System (NOS) • Most Widely Used NOS • Features • Remote Login & Example • Remote File Transfer & Example • Anonymous FTP Method CONTENTS: • Network and Operating System Security • Novell NetWare • Novell NetWare Protocols • Client • Server • Windows Serve • Advantages of Using Windows • Linux Server • Advantages of Using • Down Side of Linux Server • Types of Network Operating System • Peer-to-Peer NOS • Client/Server NOS • Domain • Workgroup • Difference between Operating System and Network Operating System • Summary • Sources
  • 2. What is a system? a set of things working together as parts of a mechanism or an interconnecting network Multiple meaning:  collection of organized things  way of organizing or planning  whole composed relationship among the members Characteristics:  have a structure that is defined by its parts & processes  tend to function in the same way (involves inputs and outputs of material)
  • 3. What is a Network?  is a communication path between two or more systems  vary by the protocols used, the distances between nodes, and the transport media  TCP/IP is the most common network protocol
  • 4. Operating System  program that manages the computer hardware  provides a basis for application programs and acts as an intermediary between the user and the hardware  offers a reasonable way to solve the problem of creating a usable computing system Types of Operating Systems: Windows Vista Linux and Unix Microsoft Windows Mac OS X
  • 5. User 1 User 2 User 3 User n System and Application Programs Operating System Computer Hardware Compiler Assembler Text editor Databases System ........ Figure: Abstract view of the components of a computer system
  • 6. Network Operating System (NOS)  provides an environment in which users, who are aware of multiplicity of machines, can access Remote resources either: • logging in to the remote machine* or • transferring data from the remote machine to their own machines  mostly used with local area networks (LAN) and wide area networks (WAN) *Remote machine: refers to a computer connected to the network which a user is using
  • 7. MOST WIDELY USED NETWORK OPERATING SYSTEMS AVAILABLE TODAY  Windows 2000 and Windows Server 2003/2008  Novell Netware  UNIX Fine Points: Windows 2000 and Windows Server 2003 were built off Windows NT Technologies and are the successors to Windows NT.
  • 8. Features of NOS  Provides basic operating system features; support for processors, protocols, automatic hardware detection, support multi-processing of applications  Security features; authentication, authorization, access control  Provides names and directory services  Provides files, print, web services, back-up and replication services
  • 9. Features of NOS  Supports Internetworking such as routing and WAN ports  User management and support for login and logoff, remote access, system management  *Clustering capabilities, fault tolerant and high availability systems *Cluster: group of linked computers working together closely, connected to LAN
  • 10. Remote Login  one important function of a NOS is to allow users to log in remotely  The internet provides the telnet facility for this purpose Remote Login Example: a user at Apayao State College (ASC) Luna wishes to compute on “cs.ascconner.edu,” a computer that is located at ASC Conner  The user must have a valid account on that machine to log in remotely the user issues the command: telnet cs.ascconner.edu The command results in the formation of a socket connection between the local machine at ASC Luna and the "cs.ascconner.edu" computer.
  • 11.  connection has been established  transparent, bidirectional link that all characters entered by the user are sent to a process "cs.ascconner.edu"  all the output from that process is sent back to the user in ASC Luna ASC LUNA USER cs.ascconner.edu TELNET cs.ascconner.edu to establish connection All the output is sent back to ASC Luna Remote Login Example
  • 12. Remote File Transfer  Provide a mechanism for remote file transfer from one machine to another  Each computer maintains its own local file system  User: “cs.ascluna.edu” wants to access a file located on another computer “cs.ascconner.edu” file must be copied from the computer at Conner Campus to the PC at Luna Campus  Internet provides the transfer with file transfer protocol (FTP) program
  • 13. Remote File Transfer Example:  User on "cs.ascluna.edu" -> copy Java program Server.java that resides on "cs.ascconner.edu"  Invoke FTP program ftp cs.ascconner.edu  Login name and password  Correct information has been received, user must connect to the file Server.java and after copy the file by executing get Server.java
  • 14. Remote File Transfer Example:  File location is not transparent to the user  No real file sharing  Remember: User at ASC Luna must have login permission on “cs.ascconner.edu”  FTP provides a way to allow a user to copy files remotely  Remote copying is accomplished through “anonymous FTP” method
  • 15. Anonymous FTP Method File to be copied (Server.java) must be placed in a subdirectory (ftp) with the protection set to allow the public to read the file User uses ftp command Login name – “anonymous” and password (anything) Anonymous login is accomplished User is allowed to access only those files that are in the directory tree of user “anonymous”
  • 17.  FTP mechanism is implemented (similar to telnet implementation)  Daemon on remote site watches for connection requests to system‘s FTP port  Login authentication is accomplished ->user can execute commands remotely  telnet daemon executes any command for user  FTP daemon responds to a predefined set of file-related commands *Daemon: The daemon program forwards the requests to other programs (or processes) as appropriate.
  • 18. Get: transfer a file from the remote machine to the local machine Put: transfer from the local machine to the remote machine Ls or dir: list files in the current directory on the remote machine Cd: change the current directory on the remote machine
  • 19. RUNAWAY A process that enters an infinite loop & spawns new processes. This can cause an overflow in the proc table that causes other processes to fail with the “No more processes:” error message. It can cause an error that locks up the keyboard, preventing anything that the user types from reaching the system. Because of this, a runaway process cannot be stopped from the invoking terminal. Network and Operating System Security  OS system must protect itself  Runaway process could constitute an accidental denial-of-service (DoS) attack
  • 20. DoS Attack A cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the network. DoS is typically accomplished by flooding the targeted machine or resource w/ superfluous requests in an attempt to overload systems & prevent some or all legitimate requests from being fulfilled. Network and Operating System Security  Query to service could reveal passwords Collection of data from subscribed users including confidential entities such as passwords
  • 21. Network and Operating System Security  Stack overflow could allow the launching of an unauthorized process Stack • Is a programming implementation suck as arrays and link lists • Figuratively like a stack of plates and operates in LIFE (Last in First Out) procedure. Two Operations in a Stack • Push – pushes data on the stack • Pop – Removes an item from the top • A stack may be implemented to have a bounded capacity. If the stack is full and does not contain enough space to accept an entity to be pushed, the stack is then considered to be in an overflow state.The pop operation removes an item from the top of the stack.
  • 22. List of possible breaches is almost endless Travels over private leased lines, shared lines like the internet, wireless connections, or dial-up lines Intercepting these data could be harmful as breaking into a computer Interruption of communications could constitute a remote denial-of-service attack, diminishing user‘s use of & trust in the system
  • 23.  Is a NOS  Used cooperative multitasking to run several services on a PC  File sharing instead of disk sharing  NDS (Novell Directory Services)  a distributed network directory service for managing network resources such as users, servers, & peripherals  NDS was originally called NetWare Directory Services Novell NetWare Server administration Desktop Management Software distribution Integrated cache - provides in-memory storage on the NetScaler appliance and servesWeb content to users without requiring a round trip to an origin server. Enhanced security
  • 24. Novell NetWare Protocols Are widely used for PC LANs Windows XP Nwlink protocol NWLink packages data to be compatible with client/server services on NetWare Networks In combination with a redirector this protocol enables a Windows XP client to connect to a NetWare server Some NOSs for DOS & Windows system include Novell NetWare: Windows NT and 2000 OS/2 etc.
  • 25. Client A piece of computer hardware or software that accesses a service made available by a server. The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network. The requesting program or user in a client/server relationship.
  • 26. Server It is a computer or computer program that manages access to a centralized resource or service in a network. In computer networking, a server is a computer designed to process requests and deliver data to other (client) computers over a local network or the Internet.
  • 27. Server Many types of servers exist, including web servers, mail servers, and file servers. Each type runs software specific to the purpose of the server. For example, a Web server may run Apache HTTP Server or Microsoft IIS, which both provide access to websites over the Internet.
  • 28. Windows Server  Windows Server is a group of operating systems designed by Microsoft that supports enterprise-level management, data storage, applications, and communications.  A series of server operating systems developed by Microsoft Corporation.  Windows servers are more powerful versions of their desktop operating system counterparts and are designed to more efficiently handle corporate networking, Internet/intranet hosting, databases, enterprise-scale messaging and similar functions.
  • 29. Windows Server  Previous versions of Windows Server have focused on stability, security, networking, and various improvements to the file system.  Other improvements also have included improvements to deployment technologies, as well as increased hardware support. Microsoft has also created specialized SKUs (Stock keeping unit) of Windows Server that focus on the home and small business markets.  Windows Server 2012 R2 is the latest release of Windows Server, and focuses on cloud computing.
  • 30. Advantages of Windows Server  Microsoft products are regarded as the standard option for most businesses.  Most IT admins are comfortable using either Windows Server 2008 and 2012.  According to Microsoft's website, 2008's mainstream support will end in 2015, with extended support ending in 2020.  Cost is also an important factor; license fees are expensive. The more employees you have, the more expensive it will become.
  • 31. Linux Server  A Linux server is a high-powered variant of the Linux open source operating system that's designed to handle the more demanding needs of business applications such as network and system administration, database management and Web services.  Linux servers are frequently selected over other server operating systems for their stability, security and flexibility advantages. Leading Linux server operating systems include CentOS, Debian, Ubuntu Server, Slackware and Gentoo.
  • 32. Advantages of Linux Server  You can download, modify it and re-distribute it without spending any money.  Linux itself is not a complete operating system (it is just a kernel) and requires an additional set of software to be bundled with it.  SUSE (Developer of Linux Server) is popular with the enterprise market  Linux is installed on over 95% of the world's best supercomputers demonstrating that it is the fastest performing OS with the smallest resource footprint.
  • 33. Advantages of Linux Server  Linux distributions also offer alternatives to popular Microsoft products such as Microsoft Exchange  If you already use Microsoft and are looking to migrate to Linux in stages, SUSE (for example) is compatible with Active Directory, Exchange, SharePoint and Novell GroupWise.  Recently, SUSE partnered with Microsoft to enable Hyper-V node management using SUSE Cloud, allowing you to run a mixed environment where required.  No OS is perfect; one of the major downsides of Linux is that as it is a lesser known platform you will find it harder to administrators with the skills to configure and support the system in-house. Down Side of Linux Server
  • 34. Types of Network Operating System Peer-to-peer network operating system  users are allowed to share resources and files located on their computers and access shared resources from others. This system is not based with having a file server or centralized management source. A peer-to-peer network sets all connected computers equal; they all share the same abilities to use resources available on the network. Advantages  Ease of setup  Less hardware needed, no server needs to be purchased. Disadvantages  No central location for storage.  Lack of security that a client/server type offers
  • 35. Types of Network Operating System Client/Server Network Operating Systems  can be based on a client/server architecture in which a server enables multiple clients to share resources. Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers. The server is the center of the system, allowing access to resources and instituting security. Advantages  Centralized servers are more stable.  Security is provided through the server.  New technology and hardware can be easily integrated into the system.  Servers are able to be accessed remotely from different locations and types of systems.
  • 36. Domain It is a group of computers and devices on a network that are administered as a unit with common rules and procedures. Within the Internet, domains are defined by the IP address. All devices sharing a common part of the IP address are said to be in the same domain.
  • 37. Workgroup In computer networking, a workgroup is a collection of computers on a local area network (LAN) that share common resources and responsibilities. Workgroups provide easy sharing of files, printers and other network resources. The Microsoft Windows family of operating systems supports assigning of computers to named workgroups.
  • 38. Difference between Operating System and Network Operating System  OS runs the computer itself Example: Windows  Network OS run on a server and can be accessed through client machines connected on the network Example: Novell Netware and Linux run on a server and can be used as NOS, even there are Windows server OS‘s which can be used by clients connected on the network
  • 39. Summary  NOS provides features such as file sharing across the network  Includes communication scheme  Allows different processes on different computers to exchange messages  Computer running a NOS acts autonomously from all other computers on the network  It is aware of the network – able to communicate with other networked computers
  • 40. Sources BOOK  Operating System Concepts  Basic Networking Concepts WEB  www.wikipedia.com  whatis.techtarget.com/definition/anonymous-FTP-File-Transfer-Protocol  www.trainsignaltraining.com/.../ftp_iis7_10.png  www.answers.com/topic/network-operating-system  http://osr507doc.xinuos.com/en/HANDBOOK/runaway_proc.html  docs.citrix.com/en-us/netscaler/12/optimization/integrated-caching.html  searchnetworking.techtarget.com/definitio n/network-operating-system  www.webopedia.com/TERM/N/network_o perating_system_NOS.html  http://www.webopedia.com/TERM/W/Windows _Server.html  msdn.microsoft.com/enus/library/windows/desktop/dn636873%28v=vs.85%29.aspx  http://www.webopedia.com/TERM/L/linux_serve r.html  http://www.techradar.com/news/software/opera ting-systems/windows-vs-linux-which-os -is-bestfor-your-business—1265775  https://en.wikipedia.org/wiki/List_of_Microsoft_ Windows_versions  http://www.serverwatch.com/columns/article.ph p/3900711/The-Top-10-Linux- ServerDistributions.htm  http://www.webopedia.com/TERM/D/domain.html  http://compnetworking.about.com/cs/design/ g/bldef_workgroup.htm
  • 41. JHEROME S.TENORIO Your time is limited, so don’t waste it living Someone else’s life. -Steve Jobs LinkedIn: https://www.linkedin.com/in/jherometenoriorealestateva Facebook: @JTenTechTorials Youtube: Channel Name jTen Twitter: @jTenTechTorials