2001 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Dr. Kalpakis CMSC 621, Advanced Operating Systems. Fall 2003 URL: Distributed System Architectures.
International Academy Design and Technology Technology Classes.
Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
SUMMARY OF INTER-PROCESS COMMUNICATION Chenguang Kong.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Homework 3.2 Clients Hub What’s wrong with this picture? Clients Using 100TX.
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
Learning Objectives Understanding the difference between processes and threads. Understanding process migration and load distribution. Understanding Process.
CENG334 Introduction to Operating Systems Erol Sahin Dept of Computer Eng. Middle East Technical University Ankara, TURKEY URL:
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
F2032 Fundamental of OS Chapter 1 Introduction to Operating System Part 4.
Understanding Networks I. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Survey of Network Operating Systems (NOS) Introduction Novell Operating Systems Microsoft Network Operating Systems Other Network Operating Systems NOS.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Lesson 17. Domains and Active Directory. Objectives At the end of this Presentation, you will be able to:
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Chapter 8 Windows Outline Programming Windows 2000 System structure Processes and threads in Windows 2000 Memory management The Windows 2000 file.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Chapter 9 Message Passing Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Operating Systems, by Dhananjay Dhamdhere2 Introduction.
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
TCP/SYN Attack – use ACL to allow traffic from TCP connections that were established from the internal network and block packets from an external network.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Choosing NOS can be a complex and a difficult decision. Every popular NOS has its strengths and weaknesses. NOS may cost thousands of dollars depending.
1 Chapter Overview Routing Principles Building Routing Tables.
Group 1 Members: SMU CSE 8343 Wael Faheem Professor:Dr.M.KHALIL. Hazem Morsy Date: Poramate Ongsakorn Payal H Patel Samatha Devi Malka.
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
DCE (distributed computing environment) DCE (distributed computing environment)
Module 11: Remote Access Fundamentals
2001 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
Cli/Serv.: Dist. Prog./21 Client/Server Distributed Systems v Objectives –explain the general meaning of distributed programming beyond client/server.
4P13 Week 1 Talking Points. Kernel Organization Basic kernel facilities: timer and system-clock handling, descriptor management, and process Management.
Windows 2000 Course Summary Computing Department, Lancaster University, UK.
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
CCNA 4 Module 6 Introduction to network Administration.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
30 October Agenda for Today Introduction and purpose of the course Introduction and purpose of the course Organization of a computer system Organization.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
1 Linux Networking and Security Chapter 5. 2 Configuring File Sharing Services Configure an FTP server for anonymous or regular users Set up NFS file.
2001 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 4.
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 4.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
NETWORK INFRASTRUCTURE SECURITY Domain 5. Computer Security “in short, the average computer is about as secure as a wet paper bag, and it is one of the.
2001 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
2002 Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3.
MICROSOFT WINDOWS 2000 NT ADVANCED SERVER Esra Tanrisever&Ozgur Topcu.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Damian Gordon.  This module will serve as an introduction to Operating Systems.  It provides an overview of the major components of a computer system.
Introduction Contain two or more CPU share common memory and peripherals. Provide greater system throughput. Multiple processor executing simultaneous.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 2 Single-Area OSPF.
1 Network Operating Systems Network operating systems  Initially, merely communications software packages or additions to standalone operating systems.
CCNA 3 Chapter 3 Single-Area OSPF
© 2002, Cisco Systems, Inc. All rights reserved.
Cisco Want to Pass CCNA Cisco Certified Network Associate Exam
Operating Systems Lecture 1.
Outline Operating System Organization Operating System Examples
Chapter 3 – Operating Systems
Operating System Concepts
Chapter 6 – Distributed Processing and File Systems
Hash Function Requirements
Presentation transcript:

Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3. Distributed processing 4. Distributed file systems 5. Routing protocols 6. Routers 7. Encryption 8. NT, UNIX and NetWare

Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3. Distributed processing 4. Distributed file systems 5. Routing protocols 6. Routers 7. Encryption 8. NT, UNIX and NetWare 1.1Introduction 1.2Multitasking and threading 1.3Example operating system components 1.4Exercises 1.5Example operating systems Objectives: To define some of the basic terminology of operating systems. To define the main components of a network operating system. To define the differences in operating systems. To outline the history of some of the most used operating systems.

Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3. Distributed processing 4. Distributed file systems 5. Routing protocols 6. Routers 7. Encryption 8. NT, UNIX and NetWare 2.1Introduction 2.2Scheduling 2.3Higher-level primitives 2.4Signals, pipes and task switching 2.5Messages 2.6Microsoft Windows scheduling 2.7UNIX process control 2.8Finite-state machines Objectives: To define the main parameters used in scheduling. To define some of the main scheduling technique and be able to contrast them. To briefly define the usage of parallel processing. To outline the usage of high-level primitives, such as signals, pipes and task-switching. To give examples of practical process control.

Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3. Distributed processing 4. Distributed file systems 5. Routing protocols 6. Routers 7. Encryption 8. NT, UNIX and NetWare 3.1Introduction 3.2Interprocess communication 3.3Flags and semaphores 3.4RPC 3.5Multi-processor systems 3.6Exercises Objectives: To define the concept of distributed processing, and contrast centralized systems against distributed ones. To define mechanisms of interprocess control, such as pipes, semaphores, flags, and message queues. To define, in detail, how semaphores are used, and how the can prevent deadlock. To define the conditions for deadlock. To outline algorithms to prevent deadlock, such as the Banker ’ s Algorithm. To outline practical interprocess control protocols, especially RPC.

Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3. Distributed processing 4. Distributed file systems 5. Routing protocols 6. Routers 7. Encryption 8. NT, UNIX and NetWare 4.1Distributed File Systems 4.2Active Directories 4.3Exercises 4.4Sample exam question Objectives: To discuss the advantages of a distributed file system. To outline the different methods of mounting remote file systems onto a file system structure. To outline practical implementations of a distributed file systems, especially NFS. To show how domains can be created and managed, especially using standard protocols, such as NIS.

Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3. Distributed processing 4. Distributed file systems 5. Routing protocols 6. Routers 7. Encryption 8. NT, UNIX and NetWare 5.1Introduction 5.2Routing fundamentals 5.3Routing protocol techniques 5.4RIP 5.5OSPF 5.6IGRP 5.7EGP/BGP Objectives: To outline the fundamental techniques using in routing protocols. To define the main problem in routing protocol techniques, such as routing loops, and count-to-infinity, and how the may be overcome. To outline practical protocols, especially RIP and IGRP, and reflex on their strengths and weaknesses.

Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3. Distributed processing 4. Distributed file systems 5. Routing protocols 6. Routers 7. Encryption 8. NT, UNIX and NetWare 6.1Introduction 6.2Router configuration and startup 6.3Router commands 6.4Access Control Lists (ACLs) 6.5Cisco discovery protocol 6.6Exercises 6.7Cisco router commands Objectives: To outline the main elements of a router. To be able to understand the main elements in the programming of a router. To be able to program a router for a given specification. To understand the operation of firewalls, and how these are implemented on a firewall.

Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3. Distributed processing 4. Distributed file systems 5. Routing protocols 6. Routers 7. Encryption 8. NT, UNIX and NetWare 7.1Introduction 7.2Encryption and the OSI model 7.3Cryptography 7.4Government pressure 7.5Cracking the code 7.6Letter probabilities 7.7Basic encryption principles 7.8Message hash 7.9Private-key 7.10Public-key 7.11Authentication Objectives: To outline the operation of public-key and private-key methods. To outline basic techniques for encryption, such as bit operations, message hash, and so on. To define methods which can be used to decryption messages, based on methods such as probabilities. To define the usage of Authentication, and its importance.

Networking Operating Systems (CO32010) 1. Operating Systems 2. Processes and scheduling 3. Distributed processing 4. Distributed file systems 5. Routing protocols 6. Routers 7. Encryption 8. NT, UNIX and NetWare 8.1Introduction 8.2Microsoft Windows 8.3UNIX 8.4Novell NetWare 8.5NDS Objectives: To outline the usage of the three main NOS ’ s: NT/2000, UNIX and Netware. To define the usage of object properties in each of the NOS ’ s. To define how distributed files systems are created in the three main NOS ’ s (UNIX – NFS, Active Directories – NT/2000 and NDS – NetWare)