Section 1: Operating Systems
Client System: Windows OS
Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
The main features that are provided by the Windows OS based on the client side are:
- Security– The Windows Operating System helps in providing a huge level of security within the devices for their users. Various levels of security patches are installed within the systems based on the client side. The OS helps in providing wide number of features for enhancing the security of their connected devices. The OS has an inbuilt Windows Security Center that is one of the major component of the Windows OS. This center comprises of different forms of applications such as firewall based settings, antivirus software based settings, Internet security settings and user control settings. The Security center is responsible for alerting the client system against any form of threats within their system with the help of a notification on their systems [1].
- Memory Management – The applications based within Windows OS are able to share the memory space among themselves. The Virtual Memory Manager within Windows would be helpful for controlling the allocated memory and also maintains the performance of paging functions. The memory management is responsible for operating over a wide variety of page sizes and platforms.
- Sharing of Resources – The Windows OS provides a wide range of options for their users in order to share the vast library of resources among their huge user base. The client based operating systems permits the network to perform some kinds of centralized applications and functions within some form dedicated file servers. These file servers forms the core of the OS as they help in providing the access to a huge number of resources that would be available for use within the file servers. The client OS would also support the mechanism for the purpose of integrating each of the components within the network. It also allows several users to share equal resources in a simultaneous manner irrespective of the physical locations of the user [2].
- User Management – The Windows OS helps the users by supporting them with access from a centralized located server. With the help of the high efficient user management system, each of the user would be able to perform activities. The users would be able to access the resources provided by the OS at a certain fixed time. This account would be able to perform several basic operations. The OS would be able to provide the clients with various operations such as launching of applications, creation of newer documents and moderate the configuration settings [3].
- Systems Hardware Conflicts – The Windows OS helps the client systems to provide them with a wide range of tools that would be based on troubleshooting of various kinds of applications. The hardware systems also helps the client systems by offering them with a wide range of mitigation tools. The device manager within the Windows OS allows the users for browsing each of the processes within the systems [4].
The server systems based on the LINUX OS are preferred the most within most of the operating systems. The primary features that are mainly provided by the LINUX OS are as follows:
- Security – The LINUX server helps in providing an efficient and a powerful functionality for the server systems. LINUX is based on an open source operating system. The servers of LINUX are specially built for addressing the increasing demands of the applications of business such as systems and administration within the network, services within the internet frame work and management of the database systems. These form of server systems based on LINUX systems are mostly preferred as the operating systems have a higher level of reputation based on the level of consistency, flexibility and security purposes. The LINUX servers employ high level of security for their users [5]. They make use of higher form of efficient form of firewalls. They offer higher levels of protocols based on file access systems, which are employed within the OS for avoiding any unwanted attacks within the system such as attacks based on viruses, malwares and hacker attacks.
- Memory Management – The management of memory based on the server systems of LINUX would be one of the most vital form of complex systems that would be performed by the LINUX kernel. The memory that would be configured for the virtual server would appear as a form of physical memory for the guest OS and has been recognized by LINUX as a virtual address space. The memory based on virtual server has the same level of characteristics as a form of virtual memory that would be used for the various processes within LINUX OS [6].
- Sharing of Resources – Cloud Linux is a LINUX based operating system that is basically a set of modifications based on the kernel. The distribution of LINUX is able to enable the system administrators to take fine form of control. A shared form of hosting environment is a space where several form of website accounts would be able to get hosted on a single server that would be able to share the resources in an equal manner.
- User Management – The LINUX OS supports the users based on the server systems to share the same amount of users within the same point of time. The LINUX OS classifies their users into Root, Super and Normal User. While the Root user has got the prime access to each of the files and directories, the Super user gets the permissibility for performing each of the functions. The Normal User gets the permission for reading and writing functions within the domain of the system [7].
- Stability and Efficiency – The dedicated servers within the LINUX OS are mostly robust. Hence they do not require any form of periodic based reboots within the processes of the system. These OS gets the capability for handling various number of users within the servers that would make the efficient functions within the servers.
The Android System is regarded as the most popular and global based operating system that is used by most of the users in the latest technological market. Some of the primary features that are supported by Android OS are:
- Security– The Android OS helps in providing the highest level of security for their users. The OS helps in granting various forms of permissions within the devices with the consent of the users. As the Android OS is mainly based on the Linux kernel based mobile platform, hence they are able to run on a wide number of devices. The aspect of security is a major aspect within the devices that support the Android OS. This operating system is mainly created based on an open source platform. Hence it is favorable for using by various forms of third-party applications and other cloud based services. The Android OS thus is able to offer a secure and usable mode of operating system for the mobile based platforms [9]. As the level of security within the Android based operating system are much more higher, hence the risks of hacking based on viruses and various other forms of attacks within the Android OS are of a little less of concern for the users.
- Memory Management – The Android OS is based on a software stack for the purpose of use within mobile devices that would also include the operating system, basic key applications and middleware applications. The Android SDK helps the users by providing a varied set of APIs and tools that would be highly necessary for developing high-end applications on the Android platform. The Android OS make use of their own virtual machine and runtime for the purpose of the management of memory. The runtime processes within Android also helps in managing the lifetimes of the processes. The OS also helps in ensuring the responsiveness of the applications by stopping certain processes and killing them in order to free resources and allocate them for performing within applications that would have higher level of priority [10].
- Sharing of Resources – The Android OS supports their users by helping them to share a wide number of resources for the purpose of granting any form of permissions to some of those applications that would be primarily based on any content [11]
- User Management – The Android OS supports the basic facility to support multiple users within their open source platform. The accounts of the users within the operating system are mainly classifies as User based accounts and Guest accounts. The registered users within the Android OS get the main accessibility to log in to their devices and gain access to the various applications that are supported within the OS. However the guest users would have to firstly register themselves on the account and then would be given the permissibility to access the OS.
- Reliability and Portability – The Android OS offers the Runtime environment that would employ the main use of Dalvik Virtual Machine. This tool would be able to design the operating system in a portable mode, which would be used for enhancing the level of performance within the various programs based within the operating system [12].
(Fig – 1 (i))
Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
(Fig – 1(ii))
(Fig – 1(iii))
(Fig – 1(iv))
(Fig – 1(v))
(Fig – II (a))
(Fig – II (b))
(Fig – II (c))
(Fig – II (d))
(Fig – II (e_1))
(Fig – II (e_2))
(Fig – II (e_3))
References
[1] Silberschatz, Abraham, Peter Baer Galvin, and Greg Gagne. Operating system concepts essentials. John Wiley & Sons, Inc., 2014.
[2] Zhang, Yaoxue, and Yuezhi Zhou. “Transparent computing: Spatio-temporal extension on von Neumann architecture for cloud services.” Tsinghua Science and Technology 18, no. 1 (2013): 10-21.
[3] Belay, Adam, George Prekas, Ana Klimovic, Samuel Grossman, Christos Kozyrakis, and Edouard Bugnion. “IX: A protected dataplane operating system for high throughput and low latency.” In Proceedings of the 11th USENIX Symposium on Operating System Design and Implementation (OSDI), no. EPFL-CONF-201671. USENIX, 2014.
[4] Liao, Hung-Jen, Chun-Hung Richard Lin, Ying-Chih Lin, and Kuang-Yuan Tung. “Intrusion detection system: A comprehensive review.” Journal of Network and Computer Applications 36, no. 1 (2013): 16-24.
[5] Bernstein, David. “Containers and cloud: From lxc to docker to kubernetes.” IEEE Cloud Computing 3 (2014): 81-84.
[6] Basu, Arkaprava, Jayneel Gandhi, Jichuan Chang, Mark D. Hill, and Michael M. Swift. “Efficient virtual memory for big memory servers.” In ACM SIGARCH Computer Architecture News, vol. 41, no. 3, pp. 237-248. ACM, 2013.
[7] Xavier, Miguel G., Marcelo V. Neves, Fabio D. Rossi, Tiago C. Ferreto, Timoteo Lange, and Cesar AF De Rose. “Performance evaluation of container-based virtualization for high performance computing environments.” In Parallel, Distributed and Network-Based Processing (PDP), 2013 21st Euromicro International Conference on, pp. 233-240. IEEE, 2013.
[8] Valentini, Giorgio Luigi, Walter Lassonde, Samee Ullah Khan, Nasro Min-Allah, Sajjad A. Madani, Juan Li, Limin Zhang et al. “An overview of energy efficiency techniques in cluster computing systems.” Cluster Computing 16, no. 1 (2013): 3-15.
[9] Faruki, Parvez, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, and Muttukrishnan Rajarajan. “Android security: a survey of issues, malware penetration, and defenses.” IEEE communications surveys & tutorials 17, no. 2 (2015): 998-1022.
[10] Gronli, Tor-Morten, Jarle Hansen, Gheorghita Ghinea, and Muhammad Younas. “Mobile application platform heterogeneity: Android vs Windows Phone vs iOS vs Firefox OS.” In Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on, pp. 635-641. IEEE, 2014.
[11] Zhang, Yuan, Min Yang, Bingquan Xu, Zhemin Yang, Guofei Gu, Peng Ning, X. Sean Wang, and Binyu Zang. “Vetting undesirable behaviors in android apps with permission use analysis.” In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 611-622. ACM, 2013.
[12] Zhuang, Tiancheng, Paul Baskett, and Yi Shang. “Managing ad hoc networks of smartphones.” International Journal of Information and Education Technology 3, no. 5 (2013): 540.
Turn in your highest-quality paper
Get a qualified writer to help you with
“ Understanding Operating Systems And Command Line Interface Administration ”
Get high-quality paper
NEW! AI matching with writer