+ All Categories
Home > Documents > Week 1: IT System Components Operating Systems File Systems Processes and Job Control Devices and...

Week 1: IT System Components Operating Systems File Systems Processes and Job Control Devices and...

Date post: 29-Dec-2015
Category:
Upload: allan-jefferson
View: 214 times
Download: 0 times
Share this document with a friend
26
www.infotech.monash.edu Week 1: IT System Components Operating Systems File Systems Processes and Job Control Devices and Controllers Readings Burgess, Chapter 2 Mikalsen, Chapter 1
Transcript

www.infotech.monash.edu

Week 1: IT System Components

Operating Systems

File Systems

Processes and Job Control

Devices and Controllers

ReadingsBurgess, Chapter 2Mikalsen, Chapter 1

www.infotech.monash.edu

2

Operating Systems

• Software which shares and controls hardware resources of a computer

• Shields user from low-level details• Provides simple access to frequently needed facilities

– Technical layer (kernel & drivers)– File I/O– User Interface

www.infotech.monash.edu

4

Operating Systems

OS Users Tasks CPUsMS/PC DOS S S 1Windows 3X S NonPre-M 1

Mac System7 S NonPre-M 1Windows 9X S M- 1AmigaDOS S M- 1

MTS M M 1Unix-like M M n

VMS M M 1NT/2000/XP S/M M n

Unix-Like OS Manufacturer TypeBSD Univ.California Berkeley BSD

SunOS (Solaris 1) Sun Microsystems BSD/Sys5Solaris (2) Sun Microsystems Sys5/BSD

Ultrix DEC/Compaq BSDOSF1/Digital Unix DEC/Compaq BSD/Sys5

HPUX Hewlett-Packard Sys5AIX IBM Sys5/BSDIRIX Silicon Graphics Sys5

GNU/Linux GPL Free Software Posix (SysV/BSD)Unixware Novell Sys5

www.infotech.monash.edu

5

Operating Systems

• Multi-programming (Processes/Threads) allows logical concurrency: multi-user and EventDriven systems, which yields Client/Server architecture!

• User Interfaces– Shell, CLI, GUI

• Logfiles, Audit trails, Policies: accounting, security, reliability, performance

• Supervisor, Superuser, root user

www.infotech.monash.edu

6

Comparing UNIX & Windows

• Compare Shell Commands– See Table 2.1 in Burgess (Pg22)

• Compare Directory/File structure– See Table 2.2 in Burgess (Pg23)

• Compare Software concepts– See Table 2.3 in Burgess (Pg24)

www.infotech.monash.edu

7

UNIX-like OS

chmod

chown

chgrp

emacs

kill

ifconfig

lpq

lpr

mkfs/newfs

mount

netstat

nslookup

ps

route

setenv

su

tar

traceroute

Windows

CACLS

CACLS

No direct equivalent

Wordpad or emacs (in GNU tools)

kill (in resource kit)

ipconfig

lpq

lpr

format & label

net use

netstat

nslookup

pstat (in resource kit)

route

set

su (in resource kit)

tar (in Cygwin tools)

tracert

Table 2.1

Comparison of UNIX and Windows Shell commands

Burgess Pg 22

Comparing UNIX & Windows

www.infotech.monash.edu

8

UNIX-like OS

/usr

/bin or /usr/bin

/dev

/etc

/etc/fstab

/etc/group

/etc/passwd

/etc/resolv.conf

/tmp

/var/spool

Windows

%SystemRoot% usually points to C:\WINNT

%SystemRoot%\System32

%SystemRoot%\System32\Drivers

%SystemRoot%\System32\Config

No equivalent

%SystemRoot%\System32\Config\SAM* (binary)

%SystemRoot%\%\System32\Config\SAM* (binary)

%SystemRoot%\System32\DNS\*

C:\Temp

%SystemRoot%\System32\Spool

Table 2.2: Comparison of Unix and Windows directories and files, Burgess Pg 23

Comparing UNIX & Windows

www.infotech.monash.edu

9

Unix-like OS

Standard libraries

Unix libraries

Symbolic/hard Links

Processes

Threads

Long filenames

Mount disk on directory

endl is LF

UID (User ID)

groups

ACLS (non standard)

Permission bits

Shared libraries

Environment variables

Daemons/services/init

Windows

WIN32 API

Posix compatibility library

Hard links (short cuts)

Processes

Threads

Long filenames on NTFS

Mount drive A: B: etc

endl is CR LF

SID (Subject ID)

groups

ACLs

(Only in ACLs or with Cygwin)

DLL's

Environment variables

Service control manager

Table 2.3 Comparison of UNIX and Windows software Concepts (Pg 24)

Comparing UNIX & Windows

www.infotech.monash.edu

10

Unix-like OS

DNS/DHCP/bootp (free)

X windows

Various window managers

System Admin GUI (non-standard)

cfengine

Any client-server model

rsh

Free Software

Perl

Scripts

Shells

Primitive security

Dot files for configuration

Pipes with comm1 I comm2 Configuration by text/ascii files

Windows

DNS/DHCP (NT server)

X windows

Windows GUI

System Adrnin GUI (Standard)

cfengine as of 1.5.0

Central server model

limited implementation in server

Some free software

Perl + WIN32 module

Scripts

DOS Command window

Primitive security

System registry

Combinations comm1 l comm2

Config by binary database

Table 2.3 Comparison of UNIX and Windows software Concepts (Pg 24)

Comparing UNIX & Windows

www.infotech.monash.edu

11

File Systems

Most OS’s now have hierarchical file systems (Directories and Links)

• Unix File Hierarchy• File Names• File structure related to function• Link files• File Access Control

– Owner, Group, Other method (permission list)– ACL method – user1 rwx, user2 rwx,…

www.infotech.monash.edu

12

File Permission Checking

• User OPEN(“filename”,mode) system callmode = Create, Read, Write, Append, etc..

• System searches directory: locates “filename”

• Compares users name (UID) of program with Owner of file. If not same, repeat for Group (GID). Else use Other.

• Compares “mode” with files permBits: Error if “mode” exceeds files allowed permissions.eg. When mode=Read and permBits=rwx,-,- (700) and UID not = Owner

www.infotech.monash.edu

13

Access Control List checking

• Instead of permBits, directory entries for files have ACLs• ACLs are of the form:

User1:permBits,User2:permBits,… (with wildcards!)

• ACLs may be inherited from parent directory• Checking involves a search of the file’s ACL to match the

name of the user/group running the program, with the user/group in the ACL

• If matched, the permission settings from the list are applied

www.infotech.monash.edu

14

Network File Systems

For sharing file systems between hosts. Methods include:

• Drive redirection– NET USE in DOS/Windows– MAP in Novell

• Directory redirection– mount in UNIX

• Share & Subscribe, Export & Mount

• Configured mount or automount• Distributed Directory systems

www.infotech.monash.edu

15

Network File Systems

• Windows– LAN Manager, Workgroups (SMB)

• Unix NFS (originally by SUN)• DFS (part of OSI DCE)• Common Internet File System (CIFS) “samba”

• Andrew File System• Netware NDS by Novell• Windows Advanced File System

www.infotech.monash.edu

Multiprogramming…

www.infotech.monash.edu

17

Processes

• Each process is a collection of resources:Instance of a running program in RAM, current directory, open files

with current position, user and group ID, space and time limits, etc…

• Processes are “time-sliced” by OS scheduler– Various policies and queues of waiting processes

• A process may also contain concurrent paths of execution called Threads

• To see process hierarchyUnix: ps – ef or topsWindows: taskmanager

www.infotech.monash.edu

18

Processes

• Unix Process Hierarchy– New processes are replicas of existing ones

– Parent process may wait for child processes to exit before proceeding (Synchronous model)

– When “parent” does not wait, “child” is said to be “running in the background”

– Processes may send termination status message to parent process

www.infotech.monash.edu

19

Processes

Windows/NT Process model– Very similar to the Novell NLM model

– Background processes are detached from foreground session

– Background jobs continue after logout

– Any console user may shutdown

– Shutdown terminates all processes

– Easier to manage concurrent functions as threads within an existing program (not different objects)

www.infotech.monash.edu

20

Process Environment

• Chains of processes share environment• Environment may be implied or explicit• Environment Variables are text strings• Variables usually set by user or script• Environment is inherited by new processes.

This is how command parameters are passed from parent to child. But changes made in local environment are not returned back to parent process environment.

www.infotech.monash.edu

21

Things of Special interest to SysAdmins

• Logs and Audit Trails– A detailed list of actions recorded by OS

– File system Logs used to reinstate data

– Usage Logs used for billing

– Auditing used for security> Trace source of activity> Provide non-repudiation

www.infotech.monash.edu

22

Things of Special interest to SysAdmins

• Privileged Accounts– A user with power to configure/maintain

> root, Administrator, SysOp, etc..– Can access or do anything !!– Is actually very dangerous– Should not be used as everyday login. . . .

use only when required– Trusted host concept in TCP/IP can now be easily circumvented

because everyone has superuser access on their own PC !!

www.infotech.monash.edu

23

Things of Special interest to SysAdmins

• Knowing how to care for your hardware– Read the instructions!– Understand interfaces & connectors– Know capabilities and limitations of devices

> Speeds> Capacities> Compatibilities

– Know how to handle components> Avoid damage due to Static Discharge> Packaging and transport> Assembly

www.infotech.monash.edu

24

Things of Special interest to SysAdmins

• Types of disk drives– ATA - IDE

– SCSI

– Serial ATA

• Types of Memory devices– Fast Page, EDO, SDRAM, ECC, etc…

• BIOS and NVRAM settings

www.infotech.monash.edu

25

Things of Special interest to SysAdmins

• Easy Systems Integration– System built from identical parts

– Applies to hardware and software

www.infotech.monash.edu

IT System Components

(end)


Recommended