Analyzing Network Operating Systems Essay

PAGES
3
WORDS
975
Cite

Network Operating Systems operate on servers, offering them the capacity of managing information, groups, users, applications, networking functions, security, etc. Network operating systems' key role is enabling sharing of printers and files among several computers within a given network (normally a LAN (local area network) or private network) (Sen, 2016, p. 5) The environment network operating systems manage, comprising of loosely interconnected machines, will be taken up for discussion in this section. The term 'loosely' linked implies these devices do not possess any memory bus -- CPU level hardware connections. Rather, they are interconnected via software-operated external interfaces. Network operating systems offer numerous facilities like information sharing, file sharing, cooperative computation, peripheral sharing, and remote execution. They are independent operating systems which support this kind of cooperation. A collection of devices constituting a network operating system's management sphere is termed as distributed system. Distributed operating systems are extensions of network operating systems, allowing much higher level machine integration and cooperation on networks (e.g., dynamic resource location, task migration, etc.). The section will also cover more details on distributed systems (Dasgupta, 1997, p. 1)

Fig. 1 (Hhecht, 2002)

Services by Network Operating Systems

Akin to usual operating systems, a network operating system offers services to programs running across operating systems. But, service type and manner of service delivery are rather different. Service implementation...

...

Explained below are the common services network operating systems deliver, which will be taken up in detail within this section:
1. Peripheral sharing -- Peripherals that are connected to a particular computer are usually shared with neighboring devices, through peripheral sharing facilities, which go by numerous names, including printer sharing, remote device access, shared disks, etc.

2. Transparent, remote file service -- This represents the most widely used and most vital network operating system service. File services enable users of a group of machines to gain access to storage objects such as files from any machine on the network.

3. Naming and Directory service -- Network Operating System-run computer networks may eventually become quite large. One issue with a large network is maintaining data on service availability and physical location. This issue is resolved by directory services or name services.

4. Remote procedure call (RPC) service -- This represents a certain mechanism for service implementing within network operating systems.

5. Brokerage and Object service -- RPC's popularity and effectiveness, together with the mid-80's object-orientation rage resulted, firstly, in Object Services development, and subsequently, Brokerage services.

6. Synchronization and Time service -- Management of time on distributed systems represents an integrally conceptually challenging task. Every machine operates on its own distinctive clock, with individual clocks drifting…

Sources Used in Documents:

References

Dasgupta, P. (1997). Network Operating System. Encyclopedia of Electrical Engineering. http://cactus.eas.asu.edu/Partha/Papers-PDF/1900-2001/nos.pdf

Hhecht. (2002). Introduction to Network Operating Systems. https://oak.ucc.nau.edu/jst/ccc/courses/Spring2005/cis135/ppt/ITE-II-ch06.ppt

Hissom, A. (2006). Operating Systems and Networking. Nedlog, Inc. Project. http://www.personal.kent.edu/~ahissom1/portfolio/Operating%20Systems%20&%20Networking.pdf

Kabachinski, J. (Sep/Oct 2010). Back to Basics: Understanding Operating Systems and Network Operating Systems. Biomedical Instrumentation & Technology, 44(5), ProQuest Central, p. 405.
Sen, P. (2016). Operating System: Fundamental OS Concepts. Tutorials Point. http://www.tutorialspoint.com/operating_system/operating_system_tutorial.pdf


Cite this Document:

"Analyzing Network Operating Systems" (2016, July 31) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/analyzing-network-operating-systems-2160645

"Analyzing Network Operating Systems" 31 July 2016. Web.25 April. 2024. <
https://www.paperdue.com/essay/analyzing-network-operating-systems-2160645>

"Analyzing Network Operating Systems", 31 July 2016, Accessed.25 April. 2024,
https://www.paperdue.com/essay/analyzing-network-operating-systems-2160645

Related Documents

The Windows operating system architecture also allows for single sign-on and also relies on user name and password verification. The authentication process for a Windows operating system at the server level can also be configured to validate the identity of the person logging in at the Windows domain and Microsoft Active Directory Service levels as well. Certificates can be assigned to specific applications, databases and processes within a Windows sever-based

Storage management, creating and maintaining a file system, and integrating them into networks also share a common set of functions that allow for programmer flexibility in terms of their use and sequencing through an application. These functions are specifically called as part of the kernel of the Linux operating system, and as a result they can be selectively updated very quickly. A full recompile of the entire operating system

Network Implementation for Davis Networks Inc. In the proposal, effort is made to develop an affordable local LAN for Davis Networks Inc. The effort involves provision of wireless Internet connection to all individuals for their desktops and laptops from the current high speed connection they have at an affordable price (800 USD -- 1000 USD). Provision of the internet to the same location costs approximately 700 USD including all other expenses

system development life cycle (SDLC) approach to the development of Information Systems and/or software is provided. An explanation of SDLC is offered, with different models applied in implementing SDLC delineated. Advantages and disadvantages associated with each of the models will be identified. System Development Life Cycle According to Walsham (1993), system development life cycle (SDLC) is an approach to developing an information system or software product that is characterized by a

Two Social Science Theoretical FrameworksThe two social science theoretical frameworks used by nurses when working with families in the communities are Systems Theory and Family Stress Theory. Systems Theory is an approach to understanding family dynamics which takes into account the interconnectedness of family members, the environments in which they operate, and how individual family members interact to produce a greater whole (Erriu et al., 2020). This framework argues that

Network Security
PAGES 25 WORDS 9364

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere