6th Edition
Objectives
Describe the major components of an OS,
including file system, processes, and the kernel
Discuss network operating systems and compare
client and server OSs
Describe the components of virtualization and
virtualization products
Plan for an OS installation and perform postinstallation tasks
10
11
12
13
- DNS client
- File-sharing client
14
DHCP Client
A computer can be assigned an IP address statically
or dynamically with DHCP
When an OS is first installed, IP address assignment
is done through DHCP by default
When a computer requests its IP address, the
following broadcast packets are involved:
DHCPDiscover: client announces to the network that it is
looking for a DHCP server
DHCPOffer: The server replies and offers an IP address
DHCPRequest: The client wants the offered IP address
DHCPPAck: The server acknowledges the transaction and
the client can now use the IP address
Copyright 2012 Cengage Learning. All rights reserved.
15
DHCP Client
When half the lease is over, the client sends a
unicast DHCP request packet to the server
The server sends a unicast DHCPAck to indicate the address
was renewed
16
DNS Client
The DNS client is responsible for communicating with a
DNS server to resolve computer and domain names to
IP addresses
Referred to as a resolver
An OS must be configured to use DNS and needs at
least one address of a DNS server that it can query
In Windows, the first DNS server configured is called
the preferred DNS server and the second one is the
alternate DNS server
17
DNS Client
18
DNS Client
DNS servers require a domain name in addition to a
computer name
In Windows, the default domain appended to DNS
lookups is called the primary DNS suffix
In this figure: If a user
attempts to contact
server1, the DNS
resolver sends the
query to the DNS
server as
server1.mydomain.local
Copyright 2012 Cengage Learning. All rights reserved.
19
HTTP Client
HTTP client software is built into programs
that use it, such as Web browsers
HTTP can be used to transfer large files and
has the ability to create secure connections
by using HTTPS
The S designates the use of Secure Sockets Layer, a
protocol that encrypts data before its transferred and
decrypts it on receipt
20
File-Sharing Client
A file-sharing client allows the computer to access files
and printers on the network
When a user requests a resource, a redirector
intercepts the request and examines it to determine
whether the resource is local (on the computer) or
remote (on the network)
With redirectors, network resources can be accessed
as though they were local
With drive mapping, shared network folders are
accessed just like a drive that is physically attached to
the system
Copyright 2012 Cengage Learning. All rights reserved.
21
File-Sharing Client
In Windows, the two most common ways to access a
shared resource are using the UNC path or mapping a
drive
UNC example:
\\server-name\sharename\subfolder\file.extension
You can use the UNC path to access shared folders/printers but
you must type the path every time or create a shortcut to it
22
File-Sharing Client
The protocol used in Windows to share files and
printers is SMB, also known as Common Internet
File System (CIFS)
Linux also supports SMB implemented as an
installation option called Samba
The native file-sharing protocol in the Linux
environment is Network File System (NFS)
23
E-mail Client
E-mail is based on its own set of protocols
Most common e-mail protocols:
Post Office Protocol version 3 (POP3): used to download or
retrieve incoming messages from an e-mail server to their local
desktops
Simple Mail Transport Protocol (SMTP): standard protocol for
sending Internet and other TCP/IP-based email
Internet Message Access Protocol (IMAP): has advanced
message controls, including the capability to manage
messages locally yet store them on a server
24
E-mail Client
After a user sends a message, the email client software
contacts an SMTP server
The SMTP server receives the message, looks up the
domain name of the destination address, and contacts an
SMTP server at the destinations domain
The destination SMTP server sends the message to the
POP3 server containing the recipients mailbox
The POP3 server deposits the message in the recipients
mailbox until the mailbox owner instructs the e-mail client
software to retrieve messages
If youre using IMAP instead of POP3, only message
headers are sent (usually sender and subject)
25
26
27
Account Management
Most OSs now incorporate account management
for the purposes of authentication and authorization
The server version of Windows OSs includes a
centralized account management, authentication,
and authorization system called Active Directory
When Active Directory is installed on a server, the
server becomes a domain controller, and users and
computers with accounts are referred to as domain
members
28
Account Management
29
30
Centralized Storage
Network storage includes:
File sharing, in which users store documents on network servers
that other users can access
Corporate e-mail
User files
Application databases
Data backups and more
31
Centralized Storage
A network-attached storage (NAS) device is a
dedicated server designed solely for providing
shared storage for network users
Storage Area Network (SAN) technology allows
multiple servers to access a large amount of
storage that appears as locally attached drives
Cloud-Based Storage allows some or all of an
organizations data to be stored on servers located
offsite and maintained by a storage hosting
company
Copyright 2012 Cengage Learning. All rights reserved.
32
Infrastructure Services
Infrastructure services are required for basic network
functionality
DHCP and DNS for example
33
Infrastructure Services
DNS is used for both Internet name resolution and local
resource name resolution
DNS servers are composed of the following elements:
DNS zones: A database of primarily hostname and IP address pairs
Cache: When a local DNS server resolves a name, it is saved in cache
Root hints: When a DNS query cannot be resolved locally, a DNS
server consults a root hints file, which contains a list of IP addresses of
Internet root servers. Root servers maintain records for the Internet
top-level domain servers.
34
35
36
37
38
Hosted Virtualization
Uses a type 2 hypervisor
Has an advantage of supporting a wider variety of
guest OSs because there are few incompatibility
problems between the guest OS and hardware
Easy and straightforward to use
Just install the software on your computer and begin creating
virtual machines
39
OS/Software Training
Application isolation
Network isolation
Software development
What-if-scenarios
Use of legacy applications
40
41
42
43
Bare-Metal Virtualization
Uses a Type 1 hypervisor
Targeted mainly for production virtualization in data
centers
Installed directly on hardware and has more
stringent host machine requirements
Offers more features for managing VMs than
hosted virtualization
A little more complicated to install and use as well
44
45
46
Installing an OS
The real work of installing an OS, particularly a
network server, involves pre-installation and postinstallation tasks
The roles a server will play on the network should
be considered when planning a Windows Server
2008 installation
A server used to support only a dozen users has
different minimum hardware requirements than a
server running Active Directory and supporting a
few hundred users
Copyright 2012 Cengage Learning. All rights reserved.
47
48
49
50
51
52
Chapter Summary
A computers OS provides a number of services that
enable users and devices to interact with the computer
File systems provide a method for storing, organizing,
and managing access to files on a storage device
A process is a program that is loaded into memory and
run by the CPU
The kernel schedules processes to run, making sure
high-priority processes are taken care of first; manages
memory; and makes sure I/O devices are accessed by
only one process at a time
Copyright 2012 Cengage Learning. All rights reserved.
53
Chapter Summary
An NOS provides all the features of a non-networked OS
plus services that provide a method to share and access
network resources
Client computers typically run a number of client software
components including file and printer sharing, DNS, DHCP,
and e-mail
Virtualization can be divided into two categories: hosted and
bare-metal virtualization
The real work of installing an OS involves pre-installation
and post-installation tasks
Some of the features to look for in a server computer include
CPU architecture, disk subsystem, and amount of memory
Copyright 2012 Cengage Learning. All rights reserved.
54