Networking 1

21
7/21/2019 Networking 1 http://slidepdf.com/reader/full/networking-1-56da0ec467fce 1/21 Graduate Diploma Level 7 (Information Technology Strand) STD711 Networing and !perating Sy"tem (N!S#$""ignment) $""ignment 1 %inal &e"ult' $""e""or Signature Stude nt Name Dhiraj Pahuja Nikhil Chaithanya Pravin Kumar Stude nt ID  TIZ0000262  TIZ00001UD  TIZ00001U 8 Stude nt Signat ure $""e"" or  Tamanna Phogat

description

dd

Transcript of Networking 1

Page 1: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 1/21

Graduate Diploma

Level 7

(Information Technology Strand)

STD711 Networing and !peratingSy"tem

(N!S#$""ignment)

$""ignment 1%inal &e"ult' $""e""or

Signature

StudentName

Dhiraj Pahuja Nikhil ChaithanyaPravin

Kumar

Student ID

  TIZ0000262  TIZ00001UD TIZ00001U

8StudentSignature

$""e""or

  Tamanna Phogat

Page 2: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 2/21

Task 1. Define multi-user operating system. Describe four functional features of multi-

user operating systems from different vendors e.g. Windows, Linux, !"# and $ac %&

&olution. Multi-user operating system is a computer operating system (OS) that allows

multiple users on different computers or terminals to access a single system with one OS on

it. These programs are often quite complicated and must be able to properly manage the

necessary tasks required by the different users connected to it. The users will typically be at

terminals or computers that gie them access to the system through a network! as well as

other machines on the system such as printers. " multi-user operating system differs from a

single-user system on a network in that each user is accessing the same OS at different

machines.

'unctional 'eatures of nix

• multi-user#-more than one user can use the machine at a time

supported ia terminals (serial or network connection)

• multi-tasking#-more than one program can be run at a time

• hierarchical directory structure#- to support the organisation and maintenance of files

•  portability#- only the kernel ( $%&') written in assembler 

tools for program deelopment a wide range of support tools (debuggers! compilers)

'unctional feature of linux

• Multiuser apability# This is a capability of inu* OS where! the same computer 

resources + hard disk! memory! etc. are accessible to multiple users. Of course! not on

a single terminal! they are gien different terminals to operate from. " terminal will

consist of at least a Monitor,/! keyboard and mouse as input deices. "ll the

terminals are then connected to the main inu* Serer or 0ost Machine! whose

resources and connected peripheral deices such as printer! can be used.

• Multitasking# inu* has the ability to handle more than one 1ob at a time! say for 

e*ample you hae e*ecuted a command for sorting for a huge list and simultaneouslytyping in a notepad. This is managed by diiding the 2/ time intelligently by the

implementation of scheduling policies and the concept of conte*t switching.

• 2ortability# 2ortability was the one of the main features that made inu* so popular 

among the users! but portability doesn3t mean that it is smaller in file si4e and can be

carried on pen drie! s and memory cards. 5nstead! here portability means that

inu* OS and its application can work on different types of hardwares in the same

way. inu* kernel and application programs support their installation een on ery

least hardware configuration.

Page 3: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 3/21

• Security# Security is a ery important part of any OS! for the organi4ations,user who

is using the system for their confidential works! inu* does proide seeral security

concepts for protecting their users from unauthori4ed access of their data and system.

'unctional 'eatures of Windows(

%. 6nabling startup application programs. Thus! the operating system must hae#

- " te*t editor 

- " translator 

- "n editor of links

7. The allocation of resources needed to e*ecute programs is done by identifying# the

 programs that are running! the need for memory! peripheral deices and data protection

requirements.

8. 9acilities for data compression! sorting! mi*ing! cataloging and maintenance of libraries!

through utility programs aailable.

:. 2lan implementation works according to certain criteria! for efficient use of central

 processing unit.

;. "ssisting implementation of programs through computer-user communication system! at

 both hardware and software leel.

'eatures %f $)*(-

 &ecurity#-Mac OS < includes arious security features! serices! and "25s (including what=s

aailable on typical >ni* systems)! such as those for controlling,managing passwords!

certificates! public,priate keys! application-leel priileged operations (capabilities)! trust

 policies! etc. Mac OS < supports ?erberos! OpenSS! and 2"M as well.

root login is disabled by default! and sudo is used for administratie access. @ou can

use ,usr,bin,security from the command line to control the security framework 

+ower $anagement  #-M" OS < in con1unction with Macintosh hardware make up for 

some impressie power and thermal management. The four independently controlled thermal

4ones and the nine fans of the 2ower Mac A; hae been discussed aplenty. Mac OS <

includes driers and other logic for the 7% temperature sensors in that machine. The

2owerBooks hae sophisticated thermal management as well. @ou can =grep -i= for CthermalC

and CtemperatureC in the output of =ioreg -l=on Mac OS < for related miscellaneous

information.

Based on power,thermal feedback! processor and bus speeds can be reduced to consere

 power and control heat. "ll current "pple notebook batteries hae remaining charge

indicators. On the 2owerBooks! you can change the battery without powering-off courtesy an

Page 4: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 4/21

internal backup battery that holds charge for a few minutes. Dote that you do need to put the

machine to sleep to do this.

Devices- "pple has e*cellent support for 9ireEire deices! hardly surprising since they

inented 9ireEire. @ou can readily boot from e*ternal dries! treat a Mac to behae as if it

were an e*ternal 9ireEire drie (boot it with the T key pressed! which puts the computer 

in Target Disk Mode)! and een connect two computers together using T2,52 oer a

9ireEire cable. The iSight and the i2od use 9ireEire connections too.

"pple has also been pushing Bluetooth with their newer computers! although you can get

adapters for older models. 5n addition to using Bluetooth for communicating with phones and

2"s! "pple also uses it for their wireless keyboard and mouse! which are ery well

designed and work well with Mac OS <.

Data and "nformation $anagement(- Ehile not really /topian! Mac OS < makes a ery

good attempt at keeping arious data and information organi4ed by conte*t! rather than

haing files strewn all oer the place. System and "pplication CpreferencesC can be global

(system-wide) or per-user! and are kept organi4ed as such. The arious "25s make sure that

(if used properly)! all of a user=s data is stored deterministically.

One of the most useful features of Mac OS < is its support for  synchronization of your 

computer=s configuration! or personality! if you will. urrently this data set includes the

address book! calendar! and Safari bookmarks! although "pple should add more entities. 5f 

you are doing a new installation or clean upgrade of your system! it is a boon to hae the

following# on the ColdC installation! click a button to synchroni4e the aboe information to a

deice! which can be your i2od! or your .Mac account. On the CnewC machine! you can

reerse synchroni4e and hae this information in1ected.

Task 1.1 Describe te purpose of te following components of a multi-user operating

system

1. +rocess management

. $emory management

. +rocessor management

/. &torage management

Page 5: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 5/21

Wat ardware or0and software modules are involved wit tese

components in te computer system.

&olution 1.1.

+rocess $anagement(- 2rocess management is an integral part of any modern-day operating

system .The OS must allocate resources to processes! enable processes to share and e*change

information! protect the resources of each process from other processes and enable

synchronisation among processes. To meet these requirements! the OS must maintain a data

structure for each process! which describes the state and resource ownership of that process!

and which enables the OS to e*ert control oer each process.

$emory $anagement(- Memory management refers to management of 2rimary Memory or Main Memory. Main memory is a large array of words or bytes where each word or byte has

its own address. Main memory proides a fast storage that can be access directly by the 2/.

So for a program to be e*ecuted! it must in the main memory. Operating System does the

following actiities for memory management.

 • ?eeps tracks of primary memory i.e. what part of it are in use by whom! what part are not

in use.

 • 5n multiprogramming! OS decides which process will get memory when and how much.

• "llocates the memory when the process requests it to do so. • e-allocates the memory when the process no longer needs it or has been terminated.

+rocessor $anagement(-  5n multiprogramming enironment! OS decides which process

gets the processor when and how much time. This function is called process scheduling.

Operating System does the following actiities for processor management.

• ?eeps tracks of processor and status of process. 2rogram responsible for this task is known

as traffic controller.

• "llocates the processor (2/) to a process.

• e-allocates processor when processor is no longer required

&torage $anagement(- Memory management refers to management of 2rimary Memory or 

Main Memory. Main memory is a large array of words or bytes where each word or byte has

its own address. Main memory proides a fast storage that can be access directly by the 2/.

So for a program to be e*ecuted! it must in the main memory. Operating System does the

following actiities for memory management.

 • ?eeps tracks of primary memory i.e. what part of it are in use by whom! what part are not

in use.• 5n multiprogramming! OS decides which process will get memory when and how much.

Page 6: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 6/21

• "llocates the memory when the process requests it to do so.

• e-allocates the memory when the process no longer needs it or has been terminated.

0ardware or,and software modules are inoled with these components in the computer 

system

Device manager (-  The Device $anager is a ontrol 2anel applet in Microsoft

Eindows operating systems. 5t allows users to iew and control the hardware attached to the

computer. Ehen a piece of hardware is not working! the offending hardware is highlighted

for the user to deal with. The list of hardware can be sorted by arious criteria.

0ard isk#- " ard disk drive (DD)! ard disk ! ard drive or fixed disk  is a data storage

deice used for storing and retrieing digital information using one or more rigid (ChardC)

rapidly rotating disks ( platters) coated with magnetic material. The platters are paired

with magnetic heads arranged on a moing actuator  arm! which read and write data to the

 platter surfaces.F7G ata is accessed in a random-access manner! meaning that

indiidual blocks of data can be stored or retrieed in any order rather than sequentially.

0s retain stored data een when powered off.

  2)$(-  2andom-access memory (2)$ ,rHm,) is a form of computer data storage.  "random-access memory deice allowsdata items to be accessed (read or written) in almost the

same amount of time irrespectie of the physical location of data inside the memory. 5n

contrast! with other direct-access data storage media such as hard disks! -IEs! -

IEs and the older  drum memory! the time required to read and write data items aries

significantly depending on their physical locations on the recording medium! due to

mechanical limitations such as media rotation speeds and arm moement delays

Task - *oose two different operating systems from different vendors e.g. Windows,

Linux, !"# and $ac %&, analyse and discuss ow te following functions are

implemented in selected multi-user operating systems( process management, memory

management, processor management, and storage management.

Page 7: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 7/21

Solution#

+rocess $anagement "n Linux

There are two kinds of e*ecution conte*ts in inu*. 2rocess and lightweight processes.

0oweer! inu* makes no distinction among these forms from scheduling point of iew.

inu* uses lightweight processes to proide the features of a multithreaded application. The

inu* kernel use to store information about each process in the process descriptor. Ehich is

implemented as taskJstruct.

+rocess Descriptor(

fig %.%# 2rocess escriptor 

Page 8: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 8/21

+rocess &tate(

uring the lifecycle of a process! process can migrate into a number of states. 6ach

state describes particular properties of a process at that instant by means of some attributes.

These attributes are defined in the process descriptor. "n array of flags is used to describe the

state of a process. These states are mutually e*clusie! any process can be in one of these

states at a particular time. 6ach state is represented by a flag in the state! which is set. "ll

other flags are cleared. ifferent possible states of a process are as follows.

T"S?JI/DD5DA

" process is either running or is ready to run.

T"S?J5DT6II/2T5B6

The process is blocked on a particular eent! but it can wake up by deliering a signal to it

"n eent can be input from user! disk 5,O etc. On wake up it gets it state back toT"S?JI/DD5DA.

T"S?J/D5DT6II/2T5B6

5n this state also the process is blocked! but it cannot be interrupted by deliering a signal to

it. 5f at all it gets a signal it ignores it.

$emory management "n linux(-

The memory management subsystem is one of the most important parts of the operating

system.

Since the early days of computing! there has been a need for more memory than e*ists

 physically in a system. Strategies hae been deeloped to oercome this limitation and the

most successful of these is irtual memory. irtual memory makes the system appear to hae

more memory than it actually has by sharing it between competing processes as they need

it.irtual memory does more than 1ust make your computer=s memory go further. The

memory management subsystem proides#

Large )ddress &paces(- The operating system makes the system appear as if it has a larger 

amount of memory than it actually has. The irtual memory can be many times larger than

the physical memory in the system.6ach process in the system has its own irtual address

space. These irtual address spaces are completely separate from each other and so a process

running one application cannot affect another. "lso! the hardware irtual memory

mechanisms allow areas of memory to be protected against writing. This protects code and

data from being oerwritten by rogue applications.

Page 9: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 9/21

$emory $apping(- Memory mapping is used to map image and data files into a processes

address space. 5n memory mapping! the contents of a file are linked directly into the irtual

address space of a process.

'air +ysical $emory )llocation(-The memory management subsystem allows each

running process in the system a fair share of the physical memory of the system! Shared

irtual Memory

"lthough irtual memory allows processes to hae separate (irtual) address spaces! there are

times when you need processes to share memory. 9or e*ample there could be seeral

 processes

in the system running the bash command shell. Iather than hae seeral copies of bash! one

in

each processes irtual address space! it is better to hae only one copy in physical memory

and all of the processes running bash share it. ynamic libraries are another common

e*ample of 

e*ecuting code shared between seeral processes.Shared memory can also be used as an 5nter 

2rocess ommunication (52) mechanism! with two or more processes e*changing

information ia memory common to all of them. inu* supports the /ni* TM System

shared memory 52.

&torage $anagement "n Linux(- Storage management system deals with allocating and

freeing pages! groups of pages! and small blocks of memory.  ν 5t has additional mechanisms

for handling irtual memory! memory mapped into the address space of running processes.  ν

Splits memory into 8 different 4ones due to hardware characteristics

+rocess management in windows

+rocess management is an integral part of any modern-day operating system (OS). The OS

must allocate resources to processes! enable processes to share and e*change information!

 protect the resources of each process from other processes and enable synchronisation among

 processes. To meet these requirements! the OS must maintain a data structure for each

 process! which describes the state and resource ownership of that process! and which enables

the OS to e*ert control oer each process.

$emory management "n windows

Memory management is the functionality of an operating system which handles or manages

 primary memory. Memory management keeps track of each and eery memory location

either it is allocated to some process or it is free. 5t checks how much memory is to be

Page 10: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 10/21

allocated to processes. 5t decides which process will get memory at what time. 5t tracks

wheneer some memory gets freed or unallocated and correspondingly it updates the status.

Memory management proides protection by using two registers! a base register and a limit

register. The base register holds the smallest legal physical memory address and the limit

register specifies the si4e of the range. 9or e*ample! if the base register holds 8&&&&& and

the limit register is %7&K&&&! then the program can legally access all addresses from 8&&&&&

through :%%KKK.

5nstructions and data to memory addresses can be done in following ways

• *ompile time -- Ehen it is known at compile time where the process will reside!

compile time binding is used to generate the absolute code.

• Load time -- Ehen it is not known at compile time where the process will reside in

memory! then the compiler generates re-locatable code.

• 3xecution time -- 5f the process can be moed during its e*ecution from one

memory segment to another! then binding must be delayed to be done at run time

Page 11: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 11/21

&torage management in windows

Storage management is ery closely related to Storage Iesource Management (SIM). SIM

often refers particularly to software used to manage storage networks and deices. By

contrast! the term Cstorage managementC can refer to deices and processes! as well as actual

software. 5n addition! SIM usually refers specifically to software for allocating storage

capacity based on company policies and ongoing eents. 5t may include asset management!

charge back! capacity management! configuration management! data and media migration!

eent management! performance and aailability management! policy management! quota

management! and media management capabilities. 5n short! SIM is a subset of storage

managementL howeer! the two terms are sometimes used interchangeably.

+rocessor management in windows

The heart of managing the processor comes down to two related issues#

• 6nsuring that each process and application receies enough of the processor=s time to

function properly

/sing as many processor cycles as possible for real work 

The basic unit of software that the operating system deals with in scheduling the work done

 by the processor  is either a process or a tread! depending on the operating system.

5t=s tempting to think of a process as an application! but that gies an incomplete picture of 

how processes relate to the operating system and hardware. The application you see (word

 processor! spreadsheet or game) is! indeed! a process! but that application may cause seeral

other processes to begin! for tasks like communications with other deices or other 

computers. There are also numerous processes that run without giing you direct eidence

that they eer e*ist. 9or e*ample! Eindows <2 and /D5< can hae do4ens of background

 processes running to handle the network! memory management! disk anagement!irus checks

and so on.

Page 12: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 12/21

Task . "dentify and describe te arcitecture of selected multi-user %& weter it is

monolitic, micro-kernel, layered, modular, or a ybrid.

Solution#-inu* is one of popular ersion of /D5< operating System. 5t is open source as its

source code is freely aailable. 5t is free to use. inu* was designed considering /D5<

compatibility. 5t=s functionality list is quite similar to that of /D5<.

)rcitecture %f linux

inu* System "rchitecture is consists of following layers

• ardware layer - 0ardware consists of all peripheral deices (I"M, 0, 2/

etc).

• 4ernel  - ore component of Operating System! interacts directly with hardware!

 proides low leel serices to upper layer components.

• &ell - "n interface to kernel! hiding comple*ity of kernel=s functions from users.

Takes commands from user and e*ecutes kernel=s functions.

• tilities  - /tility programs giing user most of the functionalities of an operating

systems.

Page 13: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 13/21

inu* is a a monolithic kernel where all serices (file system! 9S! deice driers!

etc) as well as core functionality (scheduling! memory allocation! etc.) are a tight knit

group sharing the same space. This directly opposes a microkernel . " microkernel

 prefers an approach where core functionality is isolated from system serices and

deice driers (which are basically 1ust system serices). 9or instance! 9S (irtual

file system) and block deice file systems (i.e. mini*fs) are separate processes that run

outside of the kernel=s space! using 52 to communicate with the kernel! other 

serices and user processes. 5n short! if it=s amodule  in inu*! it=s a service in a

microkernel! indicating an isolated process.

)rcitecture of Windows(-

ardware )bstraction Layer#-The hardware abstraction layer (0") is located directly

aboe the hardware on which E5DOES operates. 0" actually represents a software

module deeloped by hardware manufacturers that is bundled into E5DOES to allow it to

Page 14: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 14/21

operate on a specific hardware platform! such as 5ntel <N! 6 "lpha! or 5BM 2ower2.

0" hides the specifics of the hardware platform from the rest of the operating system and

represents the lowest leel of E5DOES. Thus! 0" proides true hardware platform

independence for the operating system. /sing 0"! software deelopers can create new

software without a lot of knowledge about the hardware platform. This allows software

deelopers to proide enhanced performance capabilities! such as additional deice dries.

0ardware endors can proide the interface between the operating system and the specific

hardware. ?ernel The kernel represents the core of the E5DOES operating system. "ll

operating systems hae a kernel. The key difference between the E5DOES kernel and

those found in other operating systems is the tasks managed. 2reious screen The

E5DOES kernel manages thread dispatching. (" threadP is a basic item that can be

scheduled by the kernel.) The kernel is also responsible for scheduling and processor 

synchroni4ation when the hardware platform has multiple processors. To perform scheduling!

the E5DOES kernel attempts to dispatch threads for e*ecution in a way that promotes the

most efficient use of the processors in the hardware platform. The actual dispatching of 

threads is based on their priority! with E5DOES supporting 87 priority leels to ma*imi4e

 processor use. The kernel always resides in real memory within the hardware platform=s

I"M and is nonpayable to disk. Ehen DT controls a multiprocessor platform! the kernel will

run on all processors at the same time and communicate with each other to goern the

distribution of threads. The DT 6*ecutie The DT 6*ecutie can be considered a common

serice proider because it is responsible for proiding a set of serices to all other operating

system components. The E5DOES 6*ecutie is the highest leel within the kernel mode

of the operating system. "s indicated in 6*hibit %! the 6*ecutie consists of si* core modules

that proide an interface between users and computers (represented by irtual OS Machines

and 6nironment Subsystems) and the kernel. irtual OS Machines support OS or %N-bit

Eindows 8.< applications. E5DOES proides support by creating irtual machines and

then implementing the required enironment within such a machine! resulting in the term

irtual OS machines.P 5n comparison! enironment subsystemsP are enironments that

may be required to operate on top of E5DOES. 6*amples of currently supported

enironment subsystems include OS,7! 2OS5<! and Ein87 (the E5DOES subsystem).

Ob1ect Manager The ob1ect manager names! retains! and proides security for ob1ects used by

the operating system. 5n a E5DOES enironment! an ob1ect represents physical items as

well as the occurrence of defined situations. Thus! an ob1ect can represent directories! files!

 physical hardware ports! semaphores! eents! and threads. "n ob1ect-oriented approach is

Page 15: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 15/21

used to manage ob1ects. 5f network managers are using E5DOES! they can iew the status

of eent ob1ects through the DT 6ent iewer! which is proided in the operating system as

an administratie tool. 2rocess Manager 5n a E5DOES enironment! a process represents

an address space! a group of ob1ects defined as a resource! or a set of threads. Thus! each of 

these entities is managed by the process manager. 5n doing so! the process manager combines

those entities into a irtual machine!P on which a program e*ecutes. 0ere the term irtual

machineP represents a set of resources required to proide support for the e*ecution of a

 program. E5DOES permits multiple irtual machines to be established! allowing

multiprocessing capability. irtual Memory Manager E5DOES uses a special file on the

hardware platform=s hard disk for additional memory beyond aailable I"M. That file is

referred to as a irtual memory paging or swap file and is automatically created when the

operating system is installed. 2reious screen The irtual Memory Manager manages the use

of irtual memory as a supplement to physical I"M. 9or e*ample! when one program cannot

completely fit into I"M because of its si4e or the current occupancy by other e*ecuting

 programs! the irtual Memory Manager might swap one program currently in memory to

disk to enable another program to e*ecute! or it could swap portions of the program

requesting e*ecution between I"M and the hard disk to e*ecute portions of the program in a

 predefined sequence. "lthough the operation of the irtual Memory Manager is transparent to

 programs using it! network managers can change the paging file si4e. To do so! they would

first select the System icon in the ontrol 2anel and then select the irtual Memory entry

from the resulting display. This action results in the display of a dialog bo* labeled irtual

Memory. 6*hibit 7 illustrates the irtual Memory dialog bo* with its default settings shown

for a 2entium processor.

"0% $anager(- The 5nput,Output (5,O) Manager is responsible for managing all input and

output to and from storage and the network. To perform its required functions! the 5,O

Manager uses four other lower-leel subsystemsQthe ache Manager! file system driers!

hardware deice driers! and network driers. The ache Manager proides a dynamic cache

space in I"M that increases and decreases based on aailable memory. 9ile system driers

 proide support for two file systems! the file allocation table (9"T) and the high performance

file system (029S). The 9"T file system proides backward support for OS and %N-bit

Eindows 8.<-based programs! whereas the 029S enables support of the new file system for 

E5DOES 87- bit applications.

Page 16: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 16/21

" ybrid kernel is an operating system kernel architecture that attempts to combine aspects

and benefits of  microkernel and monolithic kernel architectures used in computeroperating

systems. The traditional kernel categories are monolithic

kernels and microkernels (with nanokernels and e*okernels seen as more e*treme ersions of 

microkernels). The ChybridC category is controersial! due to the similarity of hybrid kernels

and ordinary monolithic kernelsL the term has been dismissed by inus Toralds as simple

marketing

One prominent e*ample of a hybrid kernel is the Microsoft  DT kernel that powers all

operating systems in the E5DOES family! up to and including Eindows %& and Eindows

Serer 7&%7! and powers Eindows 2hone ! Eindows 2hone .%! and <bo* One. DT-based

Eindows is classified as a hybrid kernel (or a macrokernel F7G) rather than a monolithic kernel

 because the emulation subsystems run in user-mode serer processes! rather than in kernel

mode as on a monolithic kernel! and further because of the large number of design goals

which resemble design goals of Mach (in particular the separation of OS personalities from a

general kernel design). onersely! the reason DT is not a microkernel system is because

most of the system components run in the same address space as the kernel! as would be the

case with a monolithic design (in a traditional monolithic design! there would not be a

microkernel per se! but the kernel would implement broadly similar functionality to DT=s

microkernel and kernel-mode subsystems).

The adantage to a microkernel is that any failed serice can be easily restarted! for instance!

there is no kernel halt if the root file system throws an abort.

Task . 3xplain te concept of paging as used in memory management by multiuser

operating systems. *ompare and contrast te implementations of paging in selected

$ulti-user %&.

SO/T5OD#-5n computer  operating systems! paging is one of the memory

management schemes by which a computer stores and retriees data from the secondary

storage for use in main memory.F%G 5n the paging memory-management scheme! the operating

system retriees data from secondary storage in same-si4e  blocks called pages. The main

adantage of paging oer memory segmentation is that it allows the physical address space of 

a process to be non contiguous. Before paging came into use! systems had to fit whole

 programs or their whole segments into storage contiguously!   which caused

arious storage and fragmentation problems.

Page 17: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 17/21

2aging is an important part of irtual memory implementation in most contemporary general-

 purpose operating systems! allowing them to use secondary storageFaG for data that does not fit

into physical random-access memory (I"M).

Linux +aging(- One basic concept in the inu* implementation of irtual memory is the

concept of a page. " page is a :?b area of memory and is the basic unit of memory with

which both the kernel and the 2/ deal. "lthough both can access indiidual bytes (or een

 bits)! the amount of memory that is managed is usually in pages.

5f you are reading a book! you do not need to hae all the pages spread out on a table for you

to work effectiely 1ust the page you are currently using. 5 remember many times in collegewhen 5 had the entire table top coered with open books! including my notebook. "s 5 was

studying! 5 would read a little from one book! take notes on what 5 read! and! if 5 needed more

details on that sub1ect! 5 would either go to a different page or a completely different book.

irtual memory in inu* is ery much like that. Rust as 5 only need to hae open the pages 5

am working with currently! a process needs to hae only those pages in memory with which it

is working. ike me! if the process needs a page that is not currently aailable (not in

 physical memory)! it needs to go get it (usually from the hard disk).

Windows +aging #- Ehen a process is created! it can in principle make use of the entire user 

space of 7 Abytes (minus %7 ?bytes). This space is diided into fi*ed-si4e pages! any of 

which can be brought into main memory. 5n practice! to simplify the accounting! a page can

 be in one of three states# "ailable# 2ages not currently used by this process. Iesered# "

set of contiguous pages that the irtual memory manager sets aside for a process but does not

count against the process=s memory quota until used. Ehen a process needs to write to

memory! some of the resered memory is committed to the process. ommitted# 2ages for 

which the irtual memory manager has set aside space in its paging file (e.g.! the disk file to

which it writes pages when remoing them from main memory). The distinction between

resered and committed memory is useful because it (%) minimi4es the amount of disk space

set aside for a particular process! keeping that disk space free for other processesL and (7)

enables a thread or process to declare an amount of memory that can be quickly allocated as

needed. The resident set management scheme used by Eindows is ariable allocation! local

Page 18: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 18/21

scope (see Table .:). Ehen a process is first actiated! it is assigned a certain number of 

 page frames of main memory as its working set. Ehen a process references a page not in

memory! one of the resident pages of that process is swapped out and the new page is brought

in. Eorking sets of actie processes are ad1usted using the following general conentions#

Ehen main memory is plentiful! the irtual memory manager allows the resident sets of 

actie processes to grow. To do this! when a page fault occurs! a new page is brought into

memory but no older page is swapped out! resulting in an increase of the resident set of that

 process by one page. -8%- Ehen memory becomes scarce! the irtual memory manager 

recoers memory for the system by moing less recently used pages out of the working sets

of actie processes! reducing the si4e of those resident sets.

Task Define and describe virtuali5ation. )lso discuss benefits and limitations of using

virtuali5ation.

Solution#- irtuali4ation is a combination of software and hardware engineering that creates

irtual Machines (Ms) - an abstraction of the computer hardware that allows a single

machine to act as if it where many machines.

• Eithout Ms# " single OS owns all hardware resources

• Eith Ms# Multiple OSes! each running its own irtual machine! share hardware

resources

• irtuali4ation enables multiple operating systems to run on the same physical

 platform

)dvantages of sing 6irtuali5ation(-

&erver *onsolidation(-  5t is not unusual to achiee irtual to physical machine

consolidation. This means that ten serer applications can be run on a single machine that had

required as many physical computers to proide the unique operating system and technical

specification enironments in order to operate. Serer utili4ation is optimi4ed and legacy

software can maintain old OS configurations while new applications are running in Ms with

updated platforms. "lthough a serer supporting many Ms will probably hae more

memory! 2/s! and other hardware it will use little or no more power and occupy the same

 physical space reducing utilities costs and real estate e*penditures.

Testing and development (-/se of a M enables rapid deployment by isolating the

application in a known and controlled enironment. /nknown factors such as mi*ed libraries

Page 19: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 19/21

caused by numerous installs can be eliminated. Seere crashes that required hours of 

reinstallation now take moments by simply copying a irtual image.

Dynamic Load 7alancing and Disaster 2ecovery(- "s serer workloads ary! irtuali4ation

 proides the ability for irtual machines that are oer utili4ing the resources of a serer to be

moed to underutili4ed serers. This dynamic load balancing creates efficient utili4ation of 

serer resources.

isaster recoery is a critical component for 5T! as system crashes can create huge economic

losses. irtuali4ation technology enables a irtual image on a machine to be instantly re-

imaged on another serer if a machine failure occurs.

6irtual Desktops (- Multinational fle*ibility proides seamless transitions between different

operating systems on a single machine reducing desktop footprint and hardware e*penditure.

"mproved &ystem 2eliability and &ecurity(-irtuali4ation of systems helps preent system

crashes due to memory corruption caused by software like deice driers. T-d for irected

5,O "rchitecture proides methods to better control system deices by defining the

architecture for M" and interrupt remapping to ensure improed isolation of 5,O resources

for greater reliability! security! and aailability.

LIIT!TI"N# "$ %I&TU!LIZ!TI"N

"n' major (o)n*i(' that you n''( to +' a)ar' o, +',or' you o-t ,or

virtuali.ation involv'* th' variou* limitation* that '/i*t Not all *'rv'r* ar'

a--liation* ar' *-'ially ('*ign'( to +' virtuali.ation3,ri'n(ly Thi* m'an*

that *om' a*-'t* o, your om-ut'r t'hnology )ithin your +u*in'** might not

l'av' you )ith th' availa+l' o-tion o, virtuali.ation

"nstant )ccess to Data(-

Since data is essential to your business it is essential that you only choose irtuali4ation

options that offer adequate data protection. Dot owning your own serers can put your data at

risk and this is not ideal. @ou do not want your data to be ulnerable.

Task . Discuss different levels or areas of virtuali5ation.

1. ardware 6irtuali5ation. &erver 6irtuali5ation

Page 20: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 20/21

. !etwork 6irtuali5ation

/. Desktop 6irtuali5ation

8. &torage virtuali5ation

Solution 8.7

ardware virtuali5ation  #-0ardware irtuali4ation is the abstraction of computing

resources from the software that uses those resources.

0ardware irtuali4ation installs a hyperisor  or irtual machine manager (MM)! which

creates an abstraction layer between the software and the underlying hardware. Once a

hyperisor is in place! software relies upon irtual representations of the computing

components such as irtual processors (2/s) rather than physical processors. 2opular hyperisors include Mware=s Sphere (6S<i) and Microsoft=s 0yper-.

irtuali4ed computing resources are proisioned into isolated instances called irtual

machines (Ms) where operating systems and applications can be installed. irtuali4ed

systems can host multiple Ms simultaneously! but eery M is logically isolated from eery

other M. This means a malware attack or crash of one M will not affect the other Ms.

Support for multiple Ms astly increase the system=s utili4ation and efficiency. 9or e*ample!

rather than buying %& separate serers to host %& physical applications! a single irtuali4ed

serer could potentially host those same %& applications installed into %& Ms on the same

system. This improed hardware utili4ation is a ma1or benefit of irtuali4ation and supports

enormous potential for system consolidation -- reducing the number of serers and power use

in enterprise data centers.

&erver virtuali5ation #-Serer irtuali4ation is the masking of serer resources (including the

number and identity of indiidual physical serers! processors! and operating systems) from

serer users. The intention is to spare the user from haing to understand and manage

complicated details of serer resources while increasing resource sharing and utili4ation and

maintaining the capacity to e*pand later.

!etwork virtuali5ation  #-Detwork irtuali4ation is a method of combining the aailable

resources in a network by splitting up the aailable bandwidth into channels! each of which is

independent from the others! and each of which can be assigned (or reassigned) to a particular 

serer or deice in real time. The idea is that irtuali4ation disguises the true comple*ity of 

Page 21: Networking 1

7/21/2019 Networking 1

http://slidepdf.com/reader/full/networking-1-56da0ec467fce 21/21

the network by separating it into manageable parts! much like your partitioned hard drie

makes it easier to manage your files.

Desktop 6irtuali5ation #-esktop irtuali4ation  remoes the need for a 2/ at each

computer station. 6ach user will still hae a monitor and mouse! but will hae their desktop

2/ irtually stored on a local serer. Benefits of desktop irtuali4ation include#

• irtual esktops can run on multiple types of hardware such as# workstations! Thin

lients! laptops and some smart phones.

• entrali4ing the irtuali4ed 2/sP of desktops proides increased stability through

 better administration of workstations and increased security because the host system

keeps all workstations up to date with patches and hot fi*es.

• irtual esktops can be quickly created after an initial originalP irtual machine has

 been producedQanytime a new desktop computer is needed! copy the original! gie it

a name and it is ready for immediate use.

&torage virtuali5ation  is the pooling of physical storage from multiple network storage

deices into what appears to be a single storage deice that is managed from a central

console. Storage irtuali4ation is commonly used in storage area networks (S"Ds).