Вы находитесь на странице: 1из 13

Submitted by

Aliya Al Busaidi

Aliya Al Busaidi

|1|

Operating System Assignment: CC14-2

Table of Contents
Sln 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Content Contents QNo.1 - Case Study Muscat Properties Network operating environment QNo.2 - DOS Programming Batch file programs Pageno. 2 3 10 11

Aliya Al Busaidi

|2|

Operating System Assignment: CC14-2

QNo.1 Introduction- Case Study: Muscat Properties is a small real estate agents doing property evaluations, sales and promotion. As a part of their growth in the industry, they are planning to computerize their day to day operation. Also, they may be connected to their branch offices. First of all they are planning to run a LAN. Since they may run a web enabled service containing online property auctions, online property booking etc in futuristic services. A) Muscat Properties require a Multiuser, Time sharing, secured, and distributed operating system such as MS Windows 2003 standard Server, Red hat Linux or Solaris. Lets discuss about Windows Standard Server 2003 Operating System. Minimum Requirements: OS: Windows 2003 Server Standard Edition Processor - Pentium 133Mhz, 550+ MHz recommended, up to 4 CPUs RAM 128 MB, 256 MB recommended Drive space- 1.5 GB Drives -Runs from hard disk Video -VGA or better File systems FAT, FAT32, NTFS Advantages The following are the reasons, why the systems manager can choose the Windows 2003 server. Windows Server 2003 standard edition excel in the following main areas: Simplified branch office server management Improved identity and access management Reduced storage management costs Rich Web platform Cost effective server virtualization Seamless UNIX / Windows Interoperability The Windows 2003 server provides mutiuser , time sharing environment. The Active Directory Services and Group policy procedures in Windows 2003 server makes it as the suitable operating system in the multiuser environment. Support for file and printer sharing. More secure Internet connectivity. Centralized desktop application deployment.

Aliya Al Busaidi

|3|

Operating System Assignment: CC14-2

Distribution Features

Distributed File System (DFS): DFS allows multiple network shares to be aggregated as a virtual file system. Support for SAN and iSCSI: Computers can connect to a Storage Server over the LAN, and there is no need for a separate fibre channel network. JBOD systems: JBOD (Just a bunch of discs) systems, by using VDS, can manage a group of individual storage devices as a single unit. Software and Hardware RAID: Windows Storage Server 2003 has intrinsic support for hardware implementation of RAID. In case hardware support is not available, it can use software enabled RAID. Multi Path IO (MPIO): It provides an alternate connection to IO devices in

File systems There are three basic choices for file systems in Server 2003: FAT, FAT32, and NTFS. The following sections describe the three types. File Allocation Table (FAT) The FAT16 file system is by far the oldest and least effective of the DOS/Windows file systems. FAT32 As the name implies, FAT32 is FATbut with 32-bit numbers internally. It's not designed to operate with fewer than 64KB clusters, but it can go up to 232 clusters (about 4 billion). NTFS: The New Technology File System For most administrators, the New Technology File System (NTFS) is the way to go. Microsoft certainly pushes it. And that's with good reason. With NTFS you get filelevel encryption, better security, and user disk quotas. In short, managing a server's file usage is much easier with NTFS. Back Up Facility The system uses the Windows default backup utility for a day to day backup requirements. They are using the HP DLT backup system.

Authentication & Security features


New security features and functionalities in Windows Server 2003 provide business the ability to create solutions that meet their objectives, while protecting information assets.
Aliya Al Busaidi |4| Operating System Assignment: CC14-2

Forest Trust- Windows Server 2003 supports cross-forest trusts, which make it easy to conduct business with other companies that use the Active Directory service. Credential Manager. This provides a secure store for usernames/passwords and also stores links to certificates and keys. Protocol Transition- While intranet users commonly authenticate using Kerberosbased standard authentication mechanisms, it is less common for Internet users to do so. .NET Passport Integration with Active Directory- You can use Passport based authentication to provide your business partners and customers with a single sign-on experience to your Windowsbased applications and resources.

Access Control
Windows Server 2003 introduces new features to manage and control access at a more granular level using role-based authorization, URLbased authorization, and software restriction policy. Role-Based Access Control- A role is a named set of principals that have the same privileges with respect to security (such as a bank teller or a bank manager).

URL-Based Access Control. This access control mechanism enables businesses to control access to applications exposed through the Web by restricting user access to URLs. Software Restriction Policy (SRP). While Access Controls restrict access to resources, SRP controls the execution of an application on a system.

Audit
Auditing provides a way to monitor compliance with security policy and track potential security problems, ensures user accountability, and helps comply with increasing government regulation regarding the security of customer data, such as patient medical records and financial accounts. Operation-based Auditing. Windows Server 2003 allows granular tracking of the activities of users by recording selected types of events in the security log of a server or a workstation.

Per User Selective Auditing. Using new functionality in Windows Server 2003, you can set audit policy for an individual user in addition to systemlevel audit policy. Enhanced Logon/Logoff and Account Management Auditing. Logon/Logoff and Account Management auditing for Windows Server 2003 have also been enhanced. Microsoft Audit Collection System (MACS). This client-server application takes advantage of audit feature improvements and collects
|5| Operating System Assignment: CC14-2

Aliya Al Busaidi

security events in real time and stores them in a SQL database for ready analysis.

Public Key Infrastructure


A public key infrastructure (PKI) is a system of digital certificates, Certificate Authorities (CAs), and other registration authorities (RAs) that verify and authenticate the validity of each party that is involved in an electronic transaction through the use of public key cryptography. Innovation in Windows Server 2003 makes public key infrastructure (PKI) and associated technologies like smart cards more manageable and easy to deploy and operate. PKI Also provides following support: CrossCertification Support Delta Certificate Revocation Lists (CRL) Key Archival Auto-enrollment

Network Security
Windows Server 2003 helps to secure both wireless and wired communications. To improve security of wireless communications, Windows Server 2003 supports 802.1x and introduces support for PEAP. To improve the wired communication, Windows Server 2003 has Certain N/W Security features as follows:

Quarantine 802.1x Built-in support for the IEEE 802.1x (Wi-Fi) authentication protocol PEAP Improvements in Internet Protocol security (IPSec) Disadvantages / Pitfalls using Windows Server 2003

Unlike UNIX, Windows Server requires more system resource. You need a

powerful machine to run Windows Server. The Windows Server does not have a good reputation in term of server stability. The Windows Server needs reboot more frequent than UNIX. If you are using Windows Server hosting services, you may find yourself investing a lot of money in the development tools. Most of them are Microsoft products. The costs of applications that can run on your web site are usually higher than that of UNIX. Cost Windows Server 2003 R2 Standard Edition 32-bit edition Costs you about US$ 999/- approximately.

Aliya Al Busaidi

|6|

Operating System Assignment: CC14-2

Memory requirement 2GB DDR2 RAM is sufficient for running the RedHat Linux Server.

Aliya Al Busaidi

|7|

Operating System Assignment: CC14-2

Our Second Choice is the RedHat Enterprise Linux OS. Lets examine features of RedHat Enterprise Linux. Red Hat Enterprise Linux server provides fully-virtualized guest support for Red Hat Enterprise Linux 3, 4, and 5. Fully-virtualized guest support requires hardware features provided by Intel Virtualization Technology and AMD-V processors. Para-virtualized guests can be configured on any 32-bit x86 (with PAE support), 64-bit x86, or Itanium2 system. Benefits: Virtualization systems provide many attractive capabilities, including:

Reduced costs through server consolidation, coupled with savings in power, cooling, maintenance and third party software. Improved application availability and response due to flexible resource management.

Virtualization management Comprehensive including:


management

capabilities

for

virtualization

are

provided,

libvirt: a programmable management library that provides hypervisor independence virsh: a scriptable command shell Red Hat Network enhancements that manage guest entitlements virt-manager: a graphical interface for virtualization functions (create, start, stop, suspend, resume, monitor, etc.) Red Hat Enterprise Linux Advanced Platform includes Conga, a new management utility that provides web-based control of storage, applications, and servers in small and large multi-cluster environments.

Supported architectures and environments Red Hat Enterprise Linux supports the following system architectures and Supported Architectures

Intel and AMD x86/x86-64 Intel Itanium2 IBM POWER IBM System z and S/390

Aliya Al Busaidi

|8|

Operating System Assignment: CC14-2

Common deployments Benefits Provides file and print serving services to Microsoft File/Print server Windows clients, with Active Directory integration and new support for nested groups. The Red Hat Enterprise Linux Apache-based http server Web server provides high performance, excellent security, and a comprehensive set of optional plug-ins. Apache Tomcat servlet container, included in Red Hat Application server Enterprise Linux, is the reference implementation, powering large-scale, mission critical web applications. Choose from the MySQL and PostgreSQL open source databases included in Red Hat Enterprise Linux or a third Database server party product from vendors such as Ingres, Sybase, or Oracle. Red Hat Enterprise Linux provides a full complement of Network infrastructure network services applications, including DHCP, DNS, server firewall, etc. Hardware / Software Requirements for Red Hat Enterprise Linux 5.0 on x86 Operating Version Patches System Red Hat Enterprise Linux Server release 5 (Tikanga), kernel and 2.6.18-8.el5 glibc-2.5-12 and later updates and errata levels Note: Red Hat Enterprise Linux 5.0 WS is supported for the design, development, and verification of applications; it is not supported for production server deployment. Example Applications

Chip Architecture x86 (400 MHz) and Minimum Processor Speed JDK JRockit 6.0 (R27.6.0-50) JDK (32-bit) and all later 6.0 releases of JRockit Sun Java 2 JDK 6.0 with the Java HotSpotTM Client and Server VMs (32-bit) and all later service packs of 6.0 (version 1.6.0_5) RAM Performance Pack Product Support 1 GB minimum, 2 GB recommended server/native/linux/i686/libmuxer.so

WebLogic Server 10.3 WebLogic Portal 10.3 (Supports JRockit only) Workshop for WebLogic 10.3 (Runtime)

Aliya Al Busaidi

|9|

Operating System Assignment: CC14-2

Benefits: Improved performance and scalability across the board - memory, CPUs, I/O, networking. Security
Security Enhanced Linux (SELinux) provides support for MLS (Multi Level

Security) policies. Red Hat Enterprise Linux 5 services are provided with targeted policies enabled by default. Significant ease-of-use enhancements are provided with the inclusion of the SELinux Troubleshooter, a GUI-based analyzer which guides system administrators on appropriate actions to take in the event of a security alert. The distribution is built using the fortify-source compiler flag which provides more stringent run-time buffer bounds checking, thereby adding to overall system security. File systems and storage (virtualization) To simplify system growth and virtualization adoption, Red Hat Enterprise Linux 5 includes single system/guest versions of three distributed system technologies:

Logical Volume Manager (LVM): for creating and managing pools of virtual storage devices Global File System (GFS): a high performance, scalable, POSIX compliant file system. GFS provides support for file systems with up to 8EB theoretical capacity. Distributed Lock Manager (DLM): a sophisticated application synchronization

UNIX interoperability New AutoFS and NFSv4 capabilities for UNIX interoperability include:

Direct Map Support - providing compatibility with UNIX environments. Lazy-mount and unmount Maps can be shared with Sun Solaris, HP/UX, IBM AIX, and other UNIX systems. Authenticated binds with LDAP servers using Kerberos, Digest-MD5, etc. Significant NFSv4 enhancements in performance, stability and, with SecureNFS, security, and server-side delegation.

Aliya Al Busaidi

|10|

Operating System Assignment: CC14-2

Microsoft Windows interoperability Samba provides interoperability with Microsoft Windows file and print (CIFS) systems. New features include improved integration with Microsoft Active Directory. Compatibility Red Hat Enterprise Linux 5 includes compatibility libraries that enable applications built on the versions 3 and 4 to run without recompilation. Benefits: User mode applications do not need rebuilding. The benefits of choosing Red Hat A huge ecosystem of hardware and software partners, offering both services and certified solutions, makes Red Hat the industry leader. This powerful combination provides: Thousands of certified applications from Independent Software Vendors (ISVs) Hundreds of certified hardware systems and peripherals from leading OEM vendors, spanning multiple processor architectures A range of partner programs Comprehensive service offerings, up to 24x7 support with 1-hour response, available from Red Hat and selected ISV/OEM partners Excellent performance, security, scalability, and availability, with audited industry benchmarks Open source technologies rigorously tested and matured through the Red Hat sponsored Fedora project Backup and Restore Tools The backup and restore tools are simple Perl scripts; most Perl programmers should find no difficulty in customizing or extending them. Read this chapter to familiarize yourself with how the scripts work as well as their capabilities and limitations. The Perl scripts that perform the backup or restore are called from shell scripts installed in the <server_root>/cert-<instance_id>/ directory of every CS instance: CSbackup[.bat] copies all of the pertinent data and configuration files for a CS instance, the local Administration Server, and local Red Hat Directory Servers that the instance uses into an compressed archive (a zip file).

Aliya Al Busaidi

|11|

Operating System Assignment: CC14-2

CSrestore[.bat] opens a named archive, extracts the data, and uses it to

restore the configuration of a CS instance. You have the option to restore everything or to select a subset of the archived data.

Usage of Cache Cache is a high-speed access area that can be either a reserved section of main memory or a storage device. Database Cache Entry Cache Import Cache File System Cache Memory requirement 1GB DDR2 RAM is sufficient for running the RedHat Linux Server. Cost Windows Server 2003 R2 Standard Edition 32-bit edition Costs you about US$ 349/- approximately. QNo.2 (MS- DOS Batch file programming) REm to delete files and directories @echo off CD\ MD M:\MyDir COPY *.* M:\MyDir Dir/p M:\MyDir Del *.* M:\MyDir RD MyDir CD.. EXIT MKDIR.BAT

c) REM to Display the message using a parameter & Loop Structure @echo off FOR %%b in (A,B,C,D,E) DO IF %1==(Majan) echo Majan is a university college Exit Bibliography and References:
Learning Red Hat LINUX: Guide to Red Hat LINUX for New Users (Paperback)by Bill McCarty

Aliya Al Busaidi

|12|

Operating System Assignment: CC14-2

Learning Windows Server 2003 By Jonathan Hassell www.microsoft.com/windowsserver2003 Advanced MS-DOS Batch File Programming (Paperback) by Dan Gookin

Aliya Al Busaidi

|13|

Operating System Assignment: CC14-2

Вам также может понравиться