Académique Documents
Professionnel Documents
Culture Documents
Use the computer hardware in an efficient manner. Four Components of a Computer System
Figure 1.1
Computer System Structure Computer system can be divided into four components o Hardware provides basic computing resources CPU, memory, I/O devices o Operating system Controls and coordinates use of hardware among various applications and users.
ITSE 1202
Introduction to Operating Systems o System & application programs define the ways in which the system resources are used to solve the computing problems of the users o Users People, machines, other computers Word processors, compilers, web browsers, database systems, video games
1.2 Views of OS
OS can be viewed from the perspective of what they are. These views are diverse depending on the particular view point of a user. But some of these views are discussed below. Operating system is an Inter-mediator between Hardware and Application programs / users. An Operating System is a software program or set of programs that mediate access between physical devices (such as a keyboard, monitor, disk drive etc) and application programs (such as a Word, Web browser). Operating system is a Resource Manager An operating system (OS) is the software that manages the sharing of the resources of a computer and provides resources to users for access them. The OS directs the processor in the use of the other system resources and in the timing of its execution of other programs Operating system is a Master control program. When the computer is turned on, a small "boot program" loads the operating system. Although additional modules may be loaded, as needed, the main part, known as the "kernel" resides in memory at all times. After this, the OS will load other programs as needed.
The following is the list of different operating systems: UNIX , Linux , DOS,Windows vista, Windows XP ,Windows 2003, MacOS etc.
ITSE 1202
Operating systems can have the following property. Multi-user: Multiprocessing: Multitasking: Multithreading: Real time:
Allows two or more users at the same time. Supports running a program on more than one CPU. Allows more than one program to run concurrently. Allows different parts of a single program to run concurrently. Responds to input instantly. General-purpose operating systems, such as DOS and UNIX are not real-time.
Operating systems provide a software platform (Environment) on top of which other programs, called application programs, can run (such as Word, Internet Explorer, Games). The application programs must be written to run on top of a particular operating system. Our choice of operating system, therefore determines to a great extent the applications we can run. For PCs, the most popular operating systems are Windows, Linux, and MacOS.
1.3 Computer System Organization Computer-system operation One or more CPUs, device controllers connect through common bus providing access to shared memory. Concurrent execution of CPUs and devices competing for memory cycles
Figure 1.2
I/O devices and the CPU can execute concurrently. Each device controller is in charge of a particular device type. Each device controller has a local buffer. CPU moves data from/to main memory to/from local buffers I/O is from the device to local buffer of controller. Device controller informs CPU that it has finished its operation by causing an interrupt (via system bus).
ITSE 1202
Storage systems organized in hierarchy, based on the following parameters. Speed Cost Volatility
Caching copying information into faster storage system; main memory can be viewed as a last cache for secondary storage.
ITSE 1202 Advantages: Efficient memory utilization Throughput increases CPU is never idle, so performance increases
Advantages: More work in Less Time (Increased Throughput) Saves money by sharing Devices (Economy of Scale ) Reliability
RAM
CPU 1
CPU2
ITSE 1202
Figure 1.8 Block Diagram of a Client Server System. IBRI COLLEGE OF TECHNOLOGY 8
ITSE 1202
ITSE 1202
User Interface.
The user interacts with the OS through the user interface.
The components of the user interface are 1. The command interpreter, 2. The file system, 3. On-line help, and 4. Application integration.
shell.
In some Operating systems, Graphical user interfaces (GUI) allow us to enter commands by pointing and clicking at objects that appear on the screen. OS like Windows XP, MacOS are some example for GUI.
10
ITSE 1202
Examples:
Below is the list of some DOS operating system commands.
1. DIR [note: Directory means Folder in windows XP] This command displays files and folders in the current directory or folder. Most of the DOS commands come with various options. They are called switches in DOS. Example with switches: DIR /AD Here the switch / AD is used with DIR command to display all the sub folders in the current directory. 2. CLS This command clears the screen.
Special switch To know syntax of a particular command with all options type Command name / ? Example: To know about COPY command type
COPY /?
Commands of UNIX
11
ITSE 1202
PROCESS STATE
As a Process executes, it changes state. The state of a process is defined in which part by the current activity of that process. Each process may be in any one of the following states: New: Process being created. Running: Instructions being executed. Waiting: Process waiting for an event to occur. Ready: Process waiting for CPU. Terminated: Process has finished execution.
Figure 2.1
The above diagram explains how the process transit to various states in its lifecycle by some events.
12
ITSE 1202
2. Process gives up the CPU on expiry of its time slice and rejoins the ready queue. This will be continued until two or more programs exist in ready queue. (This is nothing but timesharing)
13
ITSE 1202
Ready queue
CPU
I/O
I/O request
I/O queue
Time slice expired Figure 2.2
1
2
Queuing diagram of process scheduling Scheduler Scheduler is a part of OS which selects processes from the ready queue for execution by the CPU. Different methods are applied for selecting processes from the ready queue. These methods are called Scheduling Algorithms. Note: Hence it is clear that CPU scheduling is the basis for Multiprogramming operating systems.
ITSE 1202
Desirable features are having maximum CPU utilization, throughput and minimum turnaround time, waiting time and response time.
P1
0
P2
24 27 30 Figure 2.3 Gantt chart for above example
Average waiting time and average turnaround time are calculated as follows: The waiting time for process P1 = 0 msecs P2 = 24 msecs P3 = 27 msecs
= (0 + 24 + 27) / 3 = 51 / 3 = 17 msecs.
P1 completes at the end of 24 msecs, P2 at the end of 27 msecs and P3 at the end of 30 msecs. Average turnaround time = (24 + 27 + 30) / 3 = 81 / 3 = 27 msecs.
Since the algorithm is nonpreemptive in nature, it is not suited for time sharing systems. IBRI COLLEGE OF TECHNOLOGY 15
ITSE 1202
P4
0 3
P1
9
P3
16
P2
24
Figure 2.4 Gantt chart for above example Average waiting time = (0 + 3 + 9 + 16) / 4 = 28 / 4 = 7 msecs. Average turnaround time = (3 + 9 + 16 + 24) / 4 = 52 / 4 = 13 msecs.
If the above processes were scheduled using FCFS algorithm, then Average waiting time = (0 + 6 + 14 + 21) / 4 = 41 / 4 = 10.25 msecs. Average turnaround time = (6 + 14 + 21 + 24) / 4 = 65 / 4 = 16.25 msecs.
It is clear that the SJF algorithm produces the most optimal scheduling scheme. For a given set of processes, the algorithm gives the minimum average waiting and turnaround times. This is because, shorter processes are scheduled earlier than longer ones and hence waiting time for shorter processes decreases and it increases the waiting time of long processes. SJF algorithm could be either preemptive or nonpreemptive. The main disadvantage with the SJF algorithm lies in knowing the length of the next CPU burst. SJF algorithm is therefore not applicable in CPU scheduling. IBRI COLLEGE OF TECHNOLOGY
16
ITSE 1202
Process P1 P2 P3 P4 P5
Burst time 10 1 2 1 5
Priority 3 1 4 5 2
Using priority scheduling, we would schedule these processes according to the Gantt chart below: P2 0 1 P5 6 P1 P3 16 18 P4 19
Figure 2.5 Gantt chart for above example Average waiting time = (0 + 1 + 6 + 16+18) / 5 = 41 / 5 = 8.2 msecs. Average turnaround time = (1 +6 + 16 + 18+19) / 5 = 60 / 5 = 12 msecs.
Priorities can be defined either internally or externally. Internally defined priorities use measurable quantity such as time limits, memory requirements, etc. to compute the priority of a process. External priorities are set by criteria that are external to the operating system such as importance of the process, amount being paid for use of the compute, the owner of the process, and other (political) factors. Priority scheduling may be either preemptive or nonpreemptive. When a process arrives at the ready queue, its priority is compared with that of the currently running process. A preemptive priorityscheduling algorithm will preempt the CPU if the priority of the newly arrived process is higher than IBRI COLLEGE OF TECHNOLOGY
17
ITSE 1202
that of the currently running process. A nonpreemptive priority-scheduling algorithm will simply put the new process at the head of the ready queue. The major disadvantage of priority-scheduling algorithms is indefinite blocking or starvation. A situation whereby low priority processes indefinitely wait for the CPU because of a steady stream of higher- priority processes. A solution to indefinite blocking of low-priority processes is aging. Aging is a technique of gradually increasing the priority of processes that wait in the system for a long time.
Process A B C D
Let the duration of a time slice be 4 msecs, which is to say CPU switches between processes every 4 msecs in a round-robin fashion. The Gantt chart below shows the scheduling of processes.
A
0 4
B
7
C
10
D
14
A
18
D
19
A
23
A
24
Figure 2.5 Gantt chart for above example Average waiting time = [(19 8) + 4 + 7+ (18 - 4)] / 3 = 36/ 4 = 9 msecs.
The performance of the RR algorithm is very much dependent on the length of the time slice. If the duration of the time slice is indefinitely large then the RR algorithm is the same as FCFS algorithm. If the time slice is too small, then the performance of the algorithm deteriorates because of the effect of frequent context switching. IBRI COLLEGE OF TECHNOLOGY 18
Consider the following set of processes, with the length of the CPU-burst time given in milliseconds:
Process
Burst time
Priority
P1 P2 P3 P4 P5
10 4 2 6 5
2 3 1 4 5
The processes are assumed to have arrived in the order P1, P2, P3, P4, and P5 all at time 0. a. Draw four Gantt charts illustrating the execution of these processes using FCFS, SJF, a nonpreemptive priority (a smaller priority number implies a higher priority),and RR (Quantum = 1) scheduling. b. What is the turnaround time of each process for each of the scheduling algorithms in (a) above? c. What is the waiting time of each process for each of the scheduling algorithms in (a)? d. Which of the schedules in (a) results in the minimal average waiting time (over all processes)?
19
ITSE 1202
System Model Resource types R1, R2 .Rm (CPU cycles, memory space, I/O devices) Each resource type Ri has Wi instances.(More than One Instances) Each process utilizes a resource as follows: Request Use Release
20
ITSE 1202 3.3 Methods for Handling Deadlocks Ensure that the system will never enter a deadlock state.
Allow the system to enter a deadlock state and then recover. Ignore the problem and pretend that deadlocks never occur in the system; used by most operating systems, including UNIX.
21
Impose a total ordering of all resource types, and require that each process requests resources in an increasing order of enumeration.
22
ITSE 1202
ITSE 1202
An algorithm to detect a cycle in a graph requires an order of n2 operations, where n is the number of vertices in the graph.
Figure 3.2
Available: A vector of length m indicates the number of available resources of each type. Allocation: An n x m matrix defines the number of resources of each type currently allocated to each process. Request: An n x m matrix indicates the current request of each process. If Request [ij] = k, then process Pi is requesting k, more instances of resource type Rj.
24
ITSE 1202 How many processes will need to be terminated? Is process interactive or batch?
Resource Preemption To elimination deadlocks using resource preemption, we successfully preempt some resources from processes and give these resources to other processes until the deadlock cycle is broken. If preemption is required to deal with deadlocks, then three issues need to be addressed: Selecting a victim minimize cost. Rollback return to some safe state, restart process from that state. Starvation same process may always be picked as victim, include number of rollback in cost factor.
25
ITSE 1202
request
request
process 1 ----------------> Kernel ---------------> Process 2 System call It is easy to implement this method but very expensive since kernel is involved. Shared memory
In this method two or more processes can use a common memory area to pass message among them. It is inexpensive compare to previous method but need protection mechanism for memory. RPC
In this method two processes in different computers in a network can pass message. It provides automatic data conversion and communications with other operating systems.
4.2 The following IPC mechanisms are supported by Windows: ( reference : http://msdn.microsoft.com/en-us/library/ ) Clipboard COM File Mapping Using a Mailslot for IPC Pipes RPC
26
ITSE 1202
The clipboard acts as a central store for data sharing among applications. When a user performs a cut or copy operation in an application, the application puts the selected data on the clipboard in standard format. Using COM for IPC This enables an application to include embedded or linked data that, when chosen, automatically starts another application for data editing. Using a File Mapping for IPC File mapping enables a process to treat the contents of a file as if they were a block of memory in the process's address space. File mapping is an efficient way for two or more processes on the same computer to share data, but user must provide synchronization between the processes. Using a Mail slot for IPC Mail slots offer an easy way for applications to send and receive short messages. They also provide the ability to broadcast messages across all computers in a network domain. Using Pipes for IPC Anonymous pipes provide an efficient way to redirect standard input or output to child processes on the same computer. Named pipes provide a simple programming interface for transferring data between two processes, whether they reside on the same computer or over a network. (Shared memory) Using RPC for IPC RPC enables applications to call functions remotely. Therefore, RPC makes IPC as easy as calling a function. RPC operates between processes on a single computer or on different computers on a network.
27
ITSE 1202
Chapter - V
MEMORY MANAGEMENT
5.1 Need for Memory management Subdividing memory to accommodate multiple processes Memory needs to be allocated to ensure a reasonable supply of ready processes to consume available processor time. The three major activities of an operating system in regard to memory management. Keep track of which parts of memory are currently being used and by whom. Decide which processes are to be loaded into memory when memory space becomes available. Allocate and deallocate memory space as needed.
OS manages memory in lot of ways. Virtual memory is the best example to understand the memory management in OS. 5.2 Virtual Memory: It is a temporary storage used by a computer to run programs that need more memory than the computer has.
If computer lacks the RAM space needed to run a program or operation, OS uses virtual memory to compensate. Virtual memory combines computers RAM with temporary space on hard disk. When RAM runs low, OS moves some data from RAM to a place in a disk called a paging file to create free space in RAM.
Role of OS
Selecting portion of RAM and moving data to and from the paging file is the service of OS. Different OS apply different method in selecting portion of RAM for swapping.
Note:
1. Moving data to and from the paging file, which is in hard disk, is called Swapping.
2. Each process/program is divided in to small fixed parts called Pages and loaded into memory (need not be contiguous).
28
ITSE 1202
Figure 5.1
Figure 5.2
29
ITSE 1202
Figure 5.3
Figure 5.4
30
ITSE 1202
Page fault:
A page fault occurs when a memory reference is made to a page that is not in memory. If it occur then swap in should be needed. So more time wasted for I/O operation with Disk devices.
Best Algorithm:
It is the one, which gives less number of page faults.
31
ITSE 1202
Figure 6.1
32
ITSE 1202
Firewall settings 1. On (recommended) This setting is selected by default. When Windows Firewall is on, most programs are blocked from communicating through the firewall. If user want to allow a program, user can add it to the Exceptions list (on the Exceptions tab). For example, user might not be able to send photos in an instant message until user add the instant messaging program to the Exceptions list.. 2. Block all incoming connections This setting blocks all unsolicited attempts to connect to user computer. Use this setting when user need maximum protection for user computer, such as when user connect to a public network in a hotel or airport, or when a computer worm is spreading over the Internet. With this setting, user are not notified when Windows Firewall blocks programs, and programs on the Exceptions list are ignored. When user select Block all incoming connections, user can still view most WebPages, send and receive e-mail. 3. Notify me when Windows Firewall blocks a new program If you select this check box, Windows Firewall will inform you when it blocks a new program and give you the option of unblocking that program. 4. Off (not recommended) Avoid using this setting unless users have another firewall running on user computer. Turning off Windows Firewall might make user computer more vulnerable to damage from hackers and malicious software (such as worms).
33
ITSE 1202
6.2 User Accounts & Groups in Windows Local and Domain User Accounts
Windows XP supports two kinds of users: local users and domain users. A computer that is running Windows XP Professional has the ability to store its own user accounts database. The users stored at the local computer are known as local user accounts. Active Directory is a directory service that is available with the Windows Server 2003 and Windows 2000 Server. It stores information in a central database that allows users to have a single user account for the network. The users stored in Active Directorys central database are called domain user accounts.
Built-in Accounts
By default, a computer that is installed with Windows XP Professional in a workgroup has five user accounts: Administrator: The Administrator account is a special account that has full control over the computer. User provide a password for this account during XP installation. The Administrator account can perform all tasks, such as creating users and groups, managing the file system, and setting up printing. Guest: The Guest account allows users to access the computer even if they do not have a unique username and password. Because of the inherent security risks associated with this type of user, the Guest account is disabled by default. When this account is enabled, it is usually given very limited privileges. Initial user: The initial user account uses the name of the registered user. This account is created only if the computer is installed as a member of a workgroup, rather than as part of a domain. By default, the initial user is a member of the Administrators group.
34
The Help Assistant account is used in conjunction with the Remote Desktop Help Assistance feature. Support_xxxxxxx: Microsoft uses the Support_xxxxxxx account for the Help and Support Service. This account is disabled by default
Example 1: User might disable an account because a user will not be using it for a period of time, perhaps because that employee is going on vacation or taking a leave of absence. Another reason to disable an account is that userre planning to put another user in that same function. For example, suppose that Rick, the engineering manager, quits. If user disable his account, when user company hires a new engineering manager, user can simply rename Ricks user account (to the usernamefor the new manager) and enable that account. This ensures that the user who takes over Ricks position will have all the same user properties and own all the same resources. Example 2: Disabling accounts also provides a security mechanism for special situations. For example, if user company were laying off a group of people, a security measure would be to disable their accounts at the same time the layoff notices were given out. This prevents those users from inflicting any damage to the companys files on their way out.
35
ITSE 1202
6.3 Properties of User Account: User profile User profiles contain information about the Windows XP environment for a specific user. For example, profile settings include the Desktop arrangement, program groups, and screen colors that users see when they log on. The first time users log on, they receive a default user profile. A folder that matches the users logon name is created for the user in the Documents and Settings folder. Logon script Logon scripts are files that run every time a user logs on to the network. They are usually batch files, but they can be any type of executable file.
User might use logon scripts to set up drive mappings or to run a specific executable file each time a user logs on to the computer Home folder Users normally store their personal files and information in a private folder called a home folder. In the Profile tab of the user Properties dialog box, user can specify the location of a home folder as a local folder or a network folder.
A local group is a group that is stored on the local computers accounts database. These are the groups user can add users to and can manage directly on a Windows XP Professional computer. By default, the following local groups are created on Windows XP Professional computers:
The Administrators Group The Administrators group has full permissions and privileges. Its members can grant themselves any permission they do not have by default, to manage all the objects on the computer. (Objects include the file system, printers, and account management.) By default, the Administrator and initial user account are members of the Administrators local group. The Backup Operators Group Members of the Backup Operators group have permissions to back up and restore the file system, even if the file system is NTFS and they have not been assigned permissions to access the file system. However, the members of Backup Operators can access the file system only through the Backup utility. To access the file system directly, Backup Operators must have explicit permissions assigned. There are no default members of the Backup Operators local group. The Guests Group The Guests group has limited access to the computer. This group is provided so that user can allow people who are not regular users to access specific network resources. As a general rule, most administrators do not allow Guest access because it poses a potential security risk. By default, the Guest user account is a member of the Guests local group. The Network Configuration Operators Group Members of the Network Configuration Operators group have some administrative rights to manage the computers network configuration, for example editing the computers TCP/IP settings. The Power Users Group The Power Users group has fewer rights than the Administrators group but more rights than the Users group. There are no default members of the Power Users local group. The Remote Desktop Users Group The Remote Desktop Users group allows members of the group to log on remotely for the purpose of using the Remote Desktop service. The Replicator Group IBRI COLLEGE OF TECHNOLOGY
37
ITSE 1202
The Replicator group is intended to support directory replication, which is a feature used by domain servers. Only domain users who will start the replication service should be assigned to this group. The Replicator local group has no default members.
The Users Group The Users group is intended for end users who should have very limited system access. If user have installed a fresh copy of Windows XP Professional, the default settings for the Users group prohibit its members from compromising the operating system or program files. By default, all users who have been created on the computer, except Guest, are members of the Users local group The Help Services Group The HelpServicesGroup group has special permissions needed to support the computer through Microsoft Help Services.
38
List the contents of a folder and read the data in a folders files. See a files or folders attributes. Change a files or folders attributes. Create new files and write data to the files. Create new folders and append data to the files. Delete files. Read & Execute This permission allows the following rights: Traverse folders and execute files in the folders. List the contents of a folder and read the data in a folders files. See a file or folders attributes. List Folder Contents This permission allows the following rights: Traverse folders. List the contents of a folder. See a file or folders attributes. Read This permission allows the following rights: List the contents of a folder and read the data in a folders files. See a files or folders attributes. View ownership. Write This permission allows the following rights: Overwrite a file. View files ownership and permissions. Change a files or folders attributes. Create new files and write data to the files. Create new folders and append data to the files. Simplicity Simplicity doesn't mean that the OS is weak or that it provides few abstractions. What it means is that each abstraction is simple and components of the OS have simple sets of abstractions. Using different storage devices like hard drive, flash drive, CD drive etc. is more or less same (Simple). IBRI COLLEGE OF TECHNOLOGY
39
A system (network or service, for example) is called resilient if it can bounce back from partial or complete failures, attacks, and sabotage. It is closely associated with graceful degradation and a necessary component of survivability, though resilience doesn't imply continuous service through the duration of the attack.
Resilience of the Operating System would be its ability to restore service (or be restored to service) if broken or attacked. Example: Resiliency in Windows Installer Robustness Robustness of system means it is resistance to failure from outside stimuli. In other words, no amount of user-generated or environmentally-generated input can cause the system to fail. Robust means it's hard to break. Resilient means that it bounces back quickly when it breaks (either it self-repairs or is simply easy to fix). Uniformity Components should obey the same syntax; have the same meta-interface. Distribution Sharing of resources among users or processes. Example : Folder sharing, Printer sharing, internet connection sharing etc.
40
ITSE 1202
Different Types of I/O (How I/O performed?) Programmed I/O Under direct control of CPU CPU issues a command on behalf of a process to an I/O module CPU then waits for the operation to be completed before proceeding IBRI COLLEGE OF TECHNOLOGY 41
CPU issues a command on behalf of a process to an I/O module If the I/O instruction is nonblocking, CPU continues to execute next instruction[s] from the same process If the I/O instruction is blocking, OS takes over, suspends the current process, and assigns CPU to another process Direct memory access (DMA)
DMA module controls exchange of data between memory and an I/O module CPU sends a request to transfer a block of data to the DMA module and is interrupted only after the entire block has been transferred DMA module takes over control of system bus to perform the transfer CPU initiates the I/O by sending the following information to DMA module
I/O scheduler It is a part of OS -like CPU scheduler .It schedules I/O jobs in a computer system. It decides the order of I/O jobs that will be submitted to the disk subsystem. Best disk scheduler is the one which take less average access time for set of I/O jobs. Access time is calculated by Access time = seek time + latency time
Seek time
Time needed to place the read write head from the current track to required track. Latency time
Time needed to place the read write head from the current sector to required sector. 7.3 Managing hardware devices in OS. Most of the modern operating system provides tool to manage devices in computer. This tool is called device manager in windows operating system. The specific actions that can be taken through Device Manager include the following: Viewing a list of all hardware that is installed on user computer Determining which device driver is installed for each device Updating device drivers Changing hardware settings Disabling, enabling, and uninstalling devices IBRI COLLEGE OF TECHNOLOGY 42
ITSE 1202
Using driver rollback to roll back to a previous version of a driver Troubleshooting device problems Printing a summary of all devices that are installed on user computer
7.4 Device Driver A device driver is software that allows a specific device to communicate with the Operating system. A device driver essentially converts the more general input/output instructions of the operating system to messages that the device type can understand.
Without exact driver software, the hardware user connectfor example, a video card or a printer will not work properly or will not work at all. In most cases driver software for the devices on the OSs Hardware Compatibility List (HCL) are included in OS itself.
Note: HCL is a list of devices compatible to an operating system. This list varies from OS to OS.
43
ITSE 1202
Managing device drivers: It involves Updating them when necessary Device manufacturers periodically update device drivers to add functionality or enhance driver performance. The updated drivers are typically posted on the manufacturers website. Deciding how to handle drivers that may not have been properly tested. In the past, poorly written device drivers have caused problems in OS. Now OS has mechanism called driver signing * as a way of ensuring that drivers are properly tested before they are released to the public. * Note: A signed driver is device driver software that includes a digital signature. A digital signature is an electronic security mark that can indicate the publisher of the software. 7.5 Service: A system service is a program or process that performs a specific function within the operating system. In general, a program or process that runs in the background and provides support to other programs are called service. Examples for standard services in Windows ServiceName Automatic Updates Background Intelligent Service Computer Browser This maintained list of resources (computers) is displayed in Network Neighborhood and Server Manager. If disabled user can still map drives, but can't browse the whole network. IBRI COLLEGE OF TECHNOLOGY 44 Transfer Description Enable the download and installation of critical Windows updates. Transfer files using idle network bandwidth; maintain file transfers through network disconnections and computer restarts.
ITSE 1202 Error Service Event Log Fax Service Human Interface Reporting
Record system, Security and Application Events. Send and receive faxes Support for extra keyboard 'hot buttons' and other multimedia input devices. CD-Rom Burning
COM Service MS Software Shadow CopyProvider Service Plug and Play Server Plug and play .Do not disable this service. Support for peer-to peer file sharing, print sharing, and named pipe sharing via SMB services. Shell Detection System Service Task Scheduler or This service is required to schedule background tasks (run at a specific date & Time) Allows a remote user to log on to the system and run console programs using the command line. Required for Fast User Switching, Remote Desktop and Remote Assistance Volume Copy Shadow MS Backup - A volume shadow copy is a picture of the volume at a particular moment in time. That means a computer can be backed up while files are open and applications running. Windows Audio Note that disabling the sound driver won't stop sounds from playing - user IBRI COLLEGE OF TECHNOLOGY Restore Creates system snap shots [ RESOURCE HOG] Hardware CD Auto play Microsoft Backup Utility
45
Network address translation, addressing, and name resolution services for all computers on user home network through a dial-up connection.
Windows Time
Update the computer clock by reference to an internet time source Table 7.2
User operations on system services: User can do following operations in most of the services. Stop Start Startup type o Disable o Automatic o Manual Dependencies in services Some services are depending on other services. Example Computer browser is dependent on Server service. When user disable Server service then computer browser service will not work Sharing a printer If user have a printer attached to user computer, user can share it with anyone on the same network. It doesn't matter what type of printer it is, as long as the printer is installed on user computer and directly attached with a universal serial bus (USB) cable or other type of printer cable. Whoever user choose to share the printer with will be able to use it to print, provided they can locate user computer on the network. Note Printers that are directly connected to a network rather than attached to a computer are available to anyone on the same network. Such printers must have a network port or wireless connection that allows them to connect directly to the network. Configuring a Modem Dial-up networking allows remote users (for example, a person working from home or someone with a laptop on a business trip) to dial into a corporate network or the Internet. The most common method for remote network access is using a modem Configuring Modem Properties IBRI COLLEGE OF TECHNOLOGY 46
a) The Speaker Volume is used to troubleshoot a modem that was not working properly b) The Maximum Port Speed (specified in bits per second), which should be left at the default value c) Dial Control, to wait for a dial tone before dialing, so that dialing is not initiated prior to confirming that a valid dial tone exists
Running Modem Diagnostics We can query the modem. This process can be used in troubleshooting to ensure that the modem is properly responding to requests. A Device Manager will test the modem by issuing a series of modem commands. These commands and the responses sent back from the modem are listed in the Command/Response section of the Diagnostics tab dialog box. The View Log button is used to view the log file that records all of the commands sent to the modem by communication programs or the operating system.
47
ITSE 1202
Functions / Operations that can be performed on files Create, Delete, Open , Close, Read, Write
8.2 File Management System Set of system software(part of OS) that provides services to users and applications in the use of files The file system is actually the interface between operating system and storage devices. When the user software, such as MS Word, asks to read a file from the hard disk, the operating system asks the file system to open the file:
48
ITSE 1202
When a disk is formatted, it receives a file system .And it becomes organized and prepared to receive data. Formatting will remove all the information from the disk.
Note: OS cannot read data from a disk which uses an supported File System.
Functions of File system Identify and locate a selected file Use a directory to describe the location of all files and their attributes Allocate files to free blocks. Manage & organize the free storage. On shared system describe user access control
8.3 Directory / Folder In OS directory it self is a special file. It contains the information about the files in the directory. For each file in a directory, OS stores it file name file type and following information.
49
8.4 Windows File System If user are installing a new hard disk, user need to partition and format it using a file system before user can begin storing data or programs. In Windows, the three file system options user have to choose from are NTFS, FAT32, and the older and rarely used FAT (also known as FAT16). NTFS NTFS is the preferred file system for this version of Windows. It has many benefits over the earlier FAT32 file system, including:
The capability to recover from some disk-related errors automatically, which FAT32 cannot. Improved support for larger hard disks. Better security because user can use permissions and encryption to restrict access to specific files to approved users.
FAT32 FAT32, and the lesser-used FAT, were used in earlier versions of Windows operating systems, including Windows 95, Windows 98, and Windows Millennium Edition. FAT32 does not have the security that NTFS provides, so if users have a FAT32 partition or volume on user computer, any user who has access to user computer can read any file on it. FAT32 also has size limitations. It cannot have partition greater than 32GB, and it cannot store a file larger than 4GB. The main reason to use FAT32 is to have a computer that will sometimes run Windows 98 or Windows ME and at other times run Windows XP, known as a multiboot configuration. Linux File system: ext2, ext3 (EXTENDED FILE SYSTEM) Max file size ax number of files Max filename size 16 TiB Set at filesystem creation Volume size
50
ITSE 1202 Max volume size Allowed characters 1024 PiB = 1 EiB All bytes except NUL and '/'
in filenames Dates recorded modification ,attribute modification, access date etc. Compression Encryption Table 8.2 1MB (megabyte) = 1024KB (kilobytes) 1GB (gigabyte) = 1024MB 1TB (terabyte) = 1024GB 1PB (petabyte) = 1024TB 1EB (exabyte) = 1024PB , Available
8.5 Partitioning: Disk partitioning is the act of taking the physical hard drive and creating logical partitions. For example, if user have a 5GB hard drive, user might partition it into two logical drives: a C: drive, which might be 2GB, and a D: drive, which might be 3GB.
51
ITSE 1202
Installation Method User can install Windows XP Professional either from bootable CD or through a network Note Installation of Windows XP Professional is possible as an unattended process. It is called, Automating the Windows XP Installation. Installation Process
52
ITSE 1202
The steps in the following sections assume that the disk drive is clean and that user are starting the installation using the Windows XP Professional CD. There are four main steps in the Windows XP Professional installation process: Collecting information Hardware details will be collected Number of partitions, size, and file system information will be collected. Preparing the installation All the files required by the Setup program will be copied to the hard drive. Installing Windows Setup will gather information about user locale, computer name, and product key, Workgroup or Computer Domain. Finalizing the installation Specifying how the computer will connect to the Internet. Activating Windows Deciding whether user want to set up Internet access at the present time. Providing the name(s) of the user(s) who will use the computer. Dual-booting: Dual-booting or multi-booting allows user computer to boot multiple operating systems. Reason for dual-booting : It is to test various systems. If user have a limited number of computers in user test lab, and user want to be able to test multiple configurations, user dual-boot. It is for software backward compatibility. For example, user may have an application that works with Windows 98/2000 but not under Windows XP Professional. Here are some keys to successful dual-boot configurations: Make sure user have plenty of disk space. Each operating system on a separate partition is recommended. Put the simplest operating systems on first advanced OS next. (e.g Windows 98 then XP) If user will dual-boot with Windows NT, user must turn off disk compression or Windows XP will not be able to read the drive properly. 9.2 Automated Installation IBRI COLLEGE OF TECHNOLOGY
53
ITSE 1202
If user needs to install Windows XP Professional on multiple computers, automatic deployment will make user job easier and more cost effective. The three options for automated installation are Unattended installation In this method user use a distribution server to install Windows on a target computer. User can also use a Windows XP CD with an answer file on a floppy disk. The answer files can be used to provide installation instructions like additional language support, service packs, and device driver. Remote Installation Services (RIS) -It allows user to remotely install Windows which requires Windows 2000 Server The RIS server must have the RIS server software installed and configured. RIS clients are computers that have a Pre-boot execution Environment (PXE) network adapter. System Preparation Tool -This is used to create disk imaging or cloning. User can use disk images to install Windows on several computers that have the same configuration. To create a disk image, user install Windows on the source computer with the configuration, applications that user want to copy. After userve created the disk image, user can copy the image to destination computers through third-party software or through hardware disk duplication. PXE is a technology that is used to boot to the network when no operating system or has been installed on a client computer. Answer files are automated installation scripts used to answer the questions that appear during a normal Windowsinstallation
ITSE 1202
The Windows installation process is designed to be as simple as possible. The chances for installation errors are greatly minimized through the use of wizards and the step-by-step process. However, it is possible that errors may occur. Identifying Common Installation Problems As most of user is aware, installations seldom go off without a hitch. Following table lists some possible installation errors user might encounter.
55
ITSE 1202
If the text-based portion of the installation completes successfully, but the GUI-based portion of the installation fails, the error may be caused by a device driver that is failing to load properly. If user suspect that this is causing the installation error, user can edit a file called Boot.ini to list the drivers that are being loaded during the boot process. The Boot.ini file is located in the root of the system partition.
In order to cause the device drivers to be listed during the boot process, user need to edit the Boot.ini file to include the /sos switch, as shown: [Operating systems] multi(0)disk(0)rdisk(0)partition(1)\WINDOWS = "Microsoft Windows XP Professional" /sos
Installing Non-Supported Hard Drives If user computer is using a hard disk that does not have a driver included on the Windows CD, user will receive an error message stating that the hard drive cannot be found. User should verify that the hard drive is properly connected and functional. User will need to obtain a disk driver from the manufacturer for Windows XP and then specify that user are using a manufacturer-supplied driver (by pressing the F6 key when prompted) during the text-mode portion of the installation process.
Troubleshooting with Installation Log Files When user installs Windows XP Professional, the Setup program creates several log files. User can view these logs to check for any problems during the installation process. Two log files are particularly useful for troubleshooting: The action log includes all of the actions that were performed during the setup process and a description of each action. These actions are listed in chronological order. The action log is stored as \Windows\setupact.log.
The error log includes any errors that occurred during the installation. For each error, there is a description and an indication of the severity of the error. This error log is stored as \Windows\setuperr.log. If user cannot start Windows XP Professional, several options and utilities can be used to identify and resolve Windows errors. The following is a broad list of Troubleshooting options: If user have recently made a change to user computers configuration by installing a new device driver or application and Windows will not load properly, user can use the Last Known Good Configuration, roll back the driver, or use System Restore to restore a previous system configuration. IBRI COLLEGE OF TECHNOLOGY
56
ITSE 1202
If user can boot user computer to Safe Mode, and user suspect that user have a system conflict, user can temporarily disable an application or processes, troubleshoot services, or uninstall software. Use the Recovery Console to replace corrupted files or perform other recovery options manually. For example, user should verify that the BOOT.INI settings are correct. If necessary, user can use the Backup utility to restore operating and data files from Back up media. User can also use the Automated System Recovery Wizard in conjunction with the Backup utility to reformat the system partition and restore operating system files from backup media user previously created.
9.4 Windows utilities and options that can be used to assist in performing system recovery. Recovery Technique When to Use Event Viewer If the Windows can be loaded through Normal or Safe Mode, one of the first places to look for hints about the problem is Event Viewer. Event Viewer displays System, Security, and Application logs. Safe Mode This is generally user starting point for system recovery. Safe Mode loads the minimum of services and drivers that are needed to boot Windows. If user can load Safe Mode, user may be able to troubleshoot devices or services that keep Windows from loading normally. Last Known Good Configuration This option can help if user made changes to user computer and are now having problems. Last Known Good Configuration is an Advanced Options menu item that user can select during startup. It loads the configuration that was used the last time the computer booted successfully. This option will not help if user has hardware errors. Driver Rollback: It is used to restore a driver to a previous version that has been saved. This option is used when user updates a driver and it is not functioning properly. System Restore: It is used to create known checkpoints of user systems configuration. In the event that user system becomes misconfigured, user can restore the system configuration to one of the known good checkpoints. Backup: User should use this utility to safeguard user computer. Through the Backup utility, user can back up the system or parts of the system and restore data from backups that user have made. Use this if none of the above techniques is not helping. Recovery Console User can use this option if none of the other options or utilities works. The Recovery Console starts Windows without the graphical interface and allows the administrator limited capabilities, such as adding or replacing files and enabling/disabling services. IBRI COLLEGE OF TECHNOLOGY
57
ITSE 1202
Malware: Entities that cause malicious effect to software in general. Worms: A computer program which is self replicating in nature and which can spread itself across computers. Virus: A code that is written with the malicious intention of causing damage to the system Security: Refers to a set of measures taken to guard against theft, attack etc. Audit Log: A record of important events that occur in the computer system. Encryption: Process of coding of information in order to keep it secret. Decryption: Recovering the original message from encrypted data. Spyware is any technology, such as tracking software that aids in gathering information about a person or organization without their knowledge. Trojan horse, or simply trojan, is a piece of software which appears to perform a certain action but in fact performs another such as transmitting a computer virus.
Threats: Refers to an entity that posses hard challenge to the system, with a aim of damaging
system resources.
58