StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network Operating Systems Past and Present - Essay Example

Cite this document
Summary
"Network Operating Systems Past and Present" paper looks to cover the evolution and the extent to which network operating systems are used in computer networks today. There is an emphasis and the requirement of operating systems to work on security aspects…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful

Extract of sample "Network Operating Systems Past and Present"

Network operating systems past and present Name: Number: Course: Tutor: Date: Network operating systems in the past and present With the advent of information systems and computerization in many organizations, computer technologies have been seen to get more advanced every day. With these, there has been need to have computers communicating in a network. This has called for computers to be connected together. Computer networks are getting larger every day. Organizations get their computers connected so that they get the leverage and the benefits that come with it. This has therefore led to the need to have network operating systems which will manage the networks that are growing by the day (Howard, 2004). Operating systems are getting enhanced by the day with the users demanding to have better systems which are easy to manage and diagnose. The development of free and open source operating systems has brought a cut-throat competition in this field of technology. Operating systems are that part of the computer system which manages what takes place in the computer. A network operating system is a program that is executed in server machine and also able to take care of the users, facts and figures, security, groups, applications and other networking operations. This paper will look cover the evolution and the extent in which network operating systems that are used in computer networks today (Thomas, Schantz, & Forsdick, 2008). With the growing need to have a networked environment in the workplace today, there has also been the need to have computer networks and thus the growth and popularity of operating systems that will manage these networks. It has called for developers and network implementers to implement efficient and reliable network operating systems that are used in the network. Some of the network operating systems which have been developed include Microsoft Windows NT and Windows server 2000, 2003 and 2008, the Novell Netware, the UNIX, Linux, Novell Linux, and Mac OS X Server (Hunter, 1995). The implementation and the choice of a given network operating system are determined by the architecture of the network that is in place. A network is basically made up of the client who requests for services and the server that will respond to the requested services. It is the duty of the server to ensure that a good number of clients utilize the resources. Network operating system is responsible for the storage of data and also provides this data when needed. The sole purpose of having computer networks is so that there is sharing of resources in the network. The network operating system is there to manage this sharing and create rules of how these rules will be shared. Network operating system accommodates other computers which might be in need of either the server or resources. The behavior of network elements is managed by network operating system, in case there is any update to programs and software, the network operating system disperses it to the clients. Finally it ensures that the server capabilities are used effectively and efficiency. The sections that follow will look at the network operating systems that have been developed and how they have evolved up to now (White, 2011). Microsoft Windows WINDOWS NT The Windows NT is a group of operating systems that belong to the Microsoft; its initial version came into operation in 1993. It has the ability to be used by many users and can also perform the processing of many tasks at ago. There are two major components of Microsoft Operating systems: User mode and the Kernel Mode. The user mode consists of subsystems which are able to move the requests of the inputs and the outputs to the desired kernel mode program drivers by the use of the input and output manager. Windows Server 2000 Another operating system from Microsoft is that of Windows 2000 which was released just before release of Windows XP; it got its popularity because of it was used in business systems, personal system, portable systems and servers. Later that year, other versions such as the professional, server, advanced server and the datacenter server were introduced (White, 2011). All these shared the same characteristics. Windows had an improvement that never existed with the windows 4.x that is the inclusion of the plug and play. With the introduction of the Start Menu, this operating system can be customized to suit personal likes, and consists of folders that can be enlarged and also its ability to introduce many activities without necessarily having to close the menu (White, 2011). WINDOWS SERVER 2003 The windows 2003 are a network operating system that was introduced by Microsoft on 24th April 2003. This type of operating system works more efficiently than the previous and that it has the ability to cater for the increasing amount of work in an efficient and effective manner and also gives room for expansion. The features of Windows 2003 operating system include rising improvements, provision of a temporary system to bring back those files that had previously been lost, a lot of security unlike the other versions before it that is due to the presence of a security system of firewalls and the fact that most tasks are disabled the moment they get enabled. There are also great additions to the active directory like disabling the classes from the schema. WINDOWS SERVER 2008 Due to the increase in challenging business needs and higher operational demands along with the demanding security and compliance, there was the design of the windows 2008. This operating system was designed to assist in the expansion of control, availability and the flexibility of datacenter and the desktop infrastructure and on the other hand submerge the costs (Steinke, 1995). UNIX The UNIX is a network operating system that allows many users to work on it; in addition, the UNIX is in a position to execute several tasks at the same time. UNIX was developed in 1969 in Bell Laboratories, New Jersey. At its early stages, UNIX executed in assembly language but with time it ran successfully in the language. UNIX operating system is largely employed in systems such as the workstations, servers and other phone or mobile devices. It was produced together with the C programming language and later given to the academic institutions and governments. As a result, the movement of the operating system to a great field of machine groups was achieved as compared to any other operating systems. The design of UNIX was meant for portability purpose such that it could be carried to different places at any time, being able to undertake several tasks at a go with numerous users at the same time. Its execution is such that every task is allocated with its time to run. UNIX is characterized by features such as unencrypted text usage for data storage for future references. UNIX has a file system that follows some specific order; the fact that it can take certain devices and other types of communications that take place in bits as files, the use various programs tools, small software which can be brought as one by use of an interpreter of command line as compared to the use of one monolithic software which consists of the same functions as well. UNIX consists of an overall control system called the master control program which has various utilities, known as the Kernel. This allows for the beginning and terminations of system programs, planning of the systems view in order to prevent problems when trying to access the files in the system at the same time (White, 2011). There are benefits that are associated with the UNIX operating system to the users who use it which are its ability to be carried to many place, a rampant production due to the greater number of interfaces which are accepted internationally and the fact that it allows for creativity since there is less time taken when moving the applications associated with it. LINUX The Linux is a network operating system which is similar to UNIX safe for the fact that it consists of the Linux Kernel. It executes on a large models of system hardware that comprises of portable computers, mobile phones, and desktop computers, consoles of the video games, the mainframes, super systems and televisions. This is the pioneering server operating system that executes faster in the fastest systems in the whole universe. The Novell Linux is a type of operating system that was developed by the Novell incorporation. It first employed the universal execution of various activities in personal systems that had network protocols that were based on the Xerox network systems (Thomas, Schantz, & Forsdick, 2008). Its development came from a simplified idea that is the ability to share the files rather than the disk sharing. It consumed space in terms of volumes called the Netware volumes which was not the same as the disk operating system volumes (Steinke, S 1995). NOVELL LINUX The Netware Novell operating system is an operating system that was developed by Novell Inc. At its earlier stages, NOVELL employed a collective multitasking in order to execute many tasks on personal computers, which had sets of rules that instructed the computers on how to run on the network. This type of operating system grew and became famous and popular in the year nineteen eighty five with a corresponding emergence of NetWare version 286 2.0a and the Intel 16-bit processor. This type of processor had a new processor that gave an access to a large memory of sixteen mega bytes and an advanced method to multitask (Thomas, Schantz, & Forsdick, 2008). The combination of the two versions led to the emergence of cost effective server-based local area networks that are also reliable. The 16 MB RAM was very beneficial because it ensured that there was enough memory for the disks temporary storage in order to improve the performance. This however became the center of the operating systems’ performance as it enabled other bigger networks to be generated. Novell came up with a compact and a simple DOS client program that ensured that the DOS stations connected to a server and could be able to reach for the shared server hard drive. It further invented a new file system design that resembled the DOS volume to the work station which ensured that there was a compatibility with the other dos software that previously existed (Thomas, Schantz, & Forsdick, 2008). The versions of Netware of operating system include the Netware 286 2.X, Netware 3.X, Netware 4.X, and Netware for OS/2, Netware 5.X, Netware 6.0 and Netware 6.5 (Thomas, Schantz, & Forsdick, 2008). The connection of Netware 286 2.X was complex because its operating system was attached with collection of object modules that needed connections and configurations. This made it very slow on running and also unreliable since any change to the operating system ensured that you first had to do the linking again and restart the computer. This was achieved through the use of diskettes at least twenty of them. This led to the introduction of the next version of Netware 3.X, which contained 32-bit unlike the Netware 286 2.X that used a memory of 16 MB RAM. It enabled large hard drives to be supported in that it temporarily stored both the whole file allocation table and directory entry table in to the memory a factor that greatly ensured that there was an improved performance (Thomas, Schantz, & Forsdick, 2008). The Netware 4.X version replaced the previous version. It had the ability to allow the introduction of other new object types. This type had a number of important characteristics and tools that comprise of network security techniques like the public and private encryption and the compression of files at systems level. It also had a feature that enabled the systems in the network to share a number of devices like the modems (Thomas, Schantz, & Forsdick, 2008). The next version was the Netware for OS/2 followed by the Netware 4.1 XS which was introduced in the year 1996. This had many improvements that enabled the operating system to easily install, operate, and efficiently execute instructions. Furthermore, it constituted 32-bit client for workstations working with Microsoft windows. The Netware 5.X was released in the year 1998 and employed the TCP/IP as it aimed at meeting the needs of the customers. It has the following characters as the new file system which replaced the traditional system, the java virtual machine for NetWare, an enabled directory for the domain name systems and the dynamic host configuration system and the distributed print services. Another version is the Netware 6.0 that was introduced in the year 2001 after the Netware 5.X. This version had licensing for its users that is simple, which enables wide connections for each user. Finally, there was the introduction of the Netware 6.5 in 2003 and has the domain controller functionality, a password that is global, USB storage devices and encrypted volumes. The current service pack for this Netware is the SP8 which was introduced in 2008. MAC OS X The Mac OS X Server on the other hand is a type of network operating system that emanated from the UNIX system the difference being that with the Mac OS X server operating system, it includes a work group of management and administrative program tools which give an access to crucial tasks of the network which is not difficult. It also encompasses many incremented tasks and tools that help in controlling them which include software servers as the chat servers, web servers, wiki servers, the calendar servers and other various servers. This type of operating system belongs to the X server computers and the server computers that are produced by the Apple (Thomas, Schantz, & Forsdick, 2008). It is used for those systems of Macintosh that qualify for its needs. The versions of this type of operating system include Mac OS X Server 1.0 otherwise called the Rhapsody, Mac OS X 10.0 also known as the cheetah server, Mac OS X Server 10.1 called the puma server, Mac OS X 10.2 also called the jaguar server released in 23th, 2002, up to Mac OS X Server 10.7 which is the latest and is also known as the Lion server which emerged in July 20th, 2011. Conclusion With the advent high rate of network adoption in many organizations, there is the increase and emphasis on having network operating systems. There is large emphasis on having operating systems which are robust and reliable. Security is becoming a key issue in the world today. There is therefore the emphasis and the requirement of operating systems to work on security aspects. There is the need to ensure that the network operating system does not have bugs that will act as the source of threats into the network. Current operating systems not only are they required to manage wired computers but also wireless networks. References Howard, N 2004, Network +Training Guide, Prentice Hall, New York. Hunter, P 1995, Network operating systems, Pearson Prentice Hall, London. Hunter, P 1995, Network operating systems: Making the right choices, Addison-Wesley, New York. Steinke, S 1995, Guide to managing PC networks, Prentice Hall, London. Thomas, R, Schantz, R, & Forsdick, H 2008, Network operating systems, Defense Technical Information Center, Chicago White, C 2011, Data communications and computer networks, Cengage Learning, New York. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Network Operating Systems Past And Present Example | Topics and Well Written Essays - 2557 words, n.d.)
Network Operating Systems Past And Present Example | Topics and Well Written Essays - 2557 words. https://studentshare.org/logic-programming/2046892-network-operating-systems-past-and-present
(Network Operating Systems Past And Present Example | Topics and Well Written Essays - 2557 Words)
Network Operating Systems Past And Present Example | Topics and Well Written Essays - 2557 Words. https://studentshare.org/logic-programming/2046892-network-operating-systems-past-and-present.
“Network Operating Systems Past And Present Example | Topics and Well Written Essays - 2557 Words”. https://studentshare.org/logic-programming/2046892-network-operating-systems-past-and-present.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network Operating Systems Past and Present

Network Security

Therefore, network security can be defined as the safety of interlinked systems.... Therefore, network security can be defined as the safety of interlinked systems.... Synchronous network systems are made up of switches, which makes them immune to malicious attacks.... However, data network systems contain routers that are computer based, making them susceptible to all kinds of malicious attacks.... There is need to protect the data and information that companies, institutions and individuals need protected by designing fool-proof network security systems....
7 Pages (1750 words) Term Paper

Network Intrusion Detection and Forensics

Over the past decade, open source NIDS systems have come to define the NIDS landscape.... This report contains details of research of two open source Network Intrusion Detection systems (NIDS), Snort and Bro, and compares then in terms of performance, strength and features to determine which of them offers superior service in intrusion detection.... This article is a research-based project that aims to compare two or more open source Network Intrusion Detection systems, in terms of their operation, methods of detection, capabilities, and performance....
26 Pages (6500 words) Dissertation

Fault tolerance and system/network survivability

This report considers a range of security issues involving survivability of distributed network systems and fault-tolerance of computer networks.... The security of these computer network systems are required to be established to support the new development of a Computer Forensic division called SCORP Forensics.... s the facilities security consultant of SCORP Forensics, it is important to set-up safety measures in terms of survivability of system networks and fault tolerance of computer storage systems....
13 Pages (3250 words) Essay

Information and Network Centric Operations

This book is intended to describe with analytical rigor the concept of distributed networked operations, which is a refinement of what have popularly been called "network centric operations.... To reach its full potential, network Centric Warfare must be deeply rooted in operational art.... his book aims at the network Centric Warfare concept; to explain how it embodies the characteristics of the Information Age; to identify the challenges in transforming this concept into a real operational capability; and to suggest a prudent approach to meeting these challenges....
13 Pages (3250 words) Essay

The Mobile Operating System

I would take up the latest versions of the preferred operating systems on today's mobile phones.... Other operating systems that may be available including phones that use a lower version of the upgraded ones as on date and less used operating systems have not been included as either they have already been improved upon or their use will be phased out, thus rendering their analysis insignificant in the quest for a better operating system.... The paper 'the Mobile operating System' seeks to explore the mobile industry, the fastest evolving segment both technologically and economically....
8 Pages (2000 words) Dissertation

Network Security-Intrusion Detection System

Less technical ability is required for the novice attacker, because of proven past methods are easily accessed through the Web by the attacker.... The essay "Network Security-Intrusion Detection System" will try to look at the two processes Host-based and Network-based Intrusion Detection systems, how effective these two approaches for the Intrusion Detection system for any organization and will also cover various guidelines for Intrusion Detection systems deployment, operation, and maintenance....
16 Pages (4000 words) Essay

Building a Business Network

omputers and Information Technology has notably changed the face of the present business world.... In past time, bringing a file from the fifth floor to ground floor performed manually, whereas in present time it all done through networks.... This essay discusses a computer network, which is simply a system of interconnected computers.... This essay analyzes that a computer network is a collection of autonomous computers interconnected by a single technology, plus peripherals (printers, CD-ROM drives, scanners, and so on) so that all computers can communicate and share resources with each other....
16 Pages (4000 words) Essay

Fundamentals of Network Security

The World Wide Web one of the largest networks at present is growing in terms of its importance for business operations as well as providing technical support to the economy.... The risk of overlooking information is minimized through the use of complex and diverse computer forensic techniques, not relying on just one of them as depicted by the article published in the Journal of Information systems Security (1997).... The paper "Fundamentals of network Security" discusses that a combination approach towards computer forensics is proposed to comprehensively as well as effectively gather facts for processing of information regarding the allegation of the employee for a possible crime....
15 Pages (3750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us