Windows
Windows
Windows
Mahesh Kumar
Assistant Professor (Adhoc)
1 Introduction
2 Users
3 Process and Disk Management
4 Services
5 Network Administration
6 Administrator Tools
7 Misc.
1. Introduction
2 History
3 Versions
9 Output of the
CHKDSK command
Windows as Operating System (3)
10 DOS applications could have a graphical interface, but the DOS system itself
provided no greater graphical functions than a simple ASCII character–based
interface.
11 DOS ASCII-based
application: the
ScanDisk application
Windows as Operating System (4)
13 Most modern OSs still use the boot sector or boot code, but this code loads
different files to start the OS.
Windows 7 system, the boot code loads the Windows Boot Manager ([Link])
file to begin the OS load
Windows as Operating System (5)
14 During the boot process, DOS systems uses two primary configuration files to
determine the drivers and settings for the machine:
It is also used to load device drivers and initial applications on the machine.
Windows as Operating System (6)
15 Several versions of DOS were released from 1981 to the final release of version
6.22 in 1994
16 DOS was the underlying OS in all versions of Windows from Windows 1.0 to
Windows ME, including the very popular Windows 95 and Windows 98
operating systems of the 1990s.
18 Many vendors released their own DOS distributions that could be used as an
alternative to MS-DOS
Dr. DOS IBM PC Dr. DOS
Novell DOS PTS DOS
Windows as Operating System (7)
3 WINDOWS 95
1 Next version of Windows based on tha DOS and Windows 3.1 systems
3 Microsoft implemented a new interface that has lasted for more than 15 years.
Even Windows 7 uses an interface very similar to the one offered by Windows 95
Windows as Operating System (10)
4 The Windows 95
Desktop and Start
Menu
Windows as Operating System (11)
5 The Windows NT–based OSs were not based on DOS, as Windows 3.1 and
Windows 95 were. Instead, these more robust OSs include their own boot
loaders and kernels.
Windows as Operating System -Version History
The features define what it can do, but those features must work on top of an
operational methodology i.e., the architecture.
3 User Applications
1 User applications are the actual applications that users execute
2 Five application types are supported in the Windows OS 16-bit applications are
Windows 32-bit and 64-bit application not supported on the
64-bit editions of
Windows 3.1 16-bit applications (on 32-bit editions of Windows 7,8) Windows.
MS-DOS 16-bit applications (on 32-bit editions of Windows 7,8)
Portable Operating System Interface (POSIX) 32-bit applications through the use of the
Subsystem for Unix-based Applications
4 Environment Subsystems
1 The environment subsystems and the subsystem dynamic link libraries (DLLs),
work together to allow different application types to function on the system
2 For example: Windows 32-bit environment subsystem allows 32-bit Windows
applications to work on a 64-bit edition of Windows 7,8,10
The Layers in Windows – Components
5 Subsystem DLLs
1 These translate application function calls into internal native system service calls
2 The subsystem DLLs communicate with the Kernel mode processes on behalf of
the applications and may communicate with the applications through the
environment subsystems as well.
6 Executive
1 This component is responsible for:
Process and thread management Security Functions
memory management Input and output (I/O)
Networking Interprocess communication
8 Kernel
1 The kernel is in charge of thread scheduling.
2 It decides which thread gets processor time and on which processor it gets time
at any moment
3 It is also responsible for synchronization when multiple processors are used
and for interrupt handling through the interrupt objects, which work in relation
to the I/O Manager.
The Layers in Windows – Components
9 Device Drivers
1 Device drivers are Kernel mode components that provide a communication
interface between the I/O Manager within the executive and the actual hardware
for which they are written
2 Device drivers place calls to the Hardware Abstraction Layer, to communicate
with the hardware
3 Device drivers may be used to communicate with specific hardware or with
filesystems, networks, and other protocols
ACPI – Advanced Configuration and Power Interface
10 Hardware Abstraction Layer (HAL) APIC – Advanced Programmable Interrupt Controller
1 it abstracts the OS from the core hardware, such as the processor architecture
2 Because of the HAL, Windows can run on systems that support 32-bit
processing (x86) or 64-bit processing (x64)
3 PCs that use the ACPI HAL are single-processor machines. PCs that use the APIC
HAL are multiple-processor machines.
The Layers in Windows – Important Files
Several files work together to provide the core functionality of the Windows OS.
These files include the following:
[Link] One of the primary Windows subsystem DLLs providing access to APIs for
Registry access, system shutdowns and restarts, and management of user accounts.
[Link] One of the primary Windows subsystem DLLs providing graphics functions.
[Link] The Hardware Abstraction Layer (HAL) DLL that allows the Windows OS to run on
different hardware platforms.
[Link] One of the primary Windows subsystem DLLs providing kernel functions.
[Link] The DLL that exposes many of the Windows native API functions to User mode
applications.
The Layers in Windows – Important Files
[Link] The kernel image for the Windows OS; the kernel is responsible in part for
process and memory management.
[Link] The same as [Link], but used on systems with Physical Address
Extension (PAE) support.
[Link] One of the primary Windows subsystem DLLs providing access to the keyboard
and mouse as well as window management (the actual application windows as opposed to
the OS name).
It allows users to end processes, adjust priorities, and even shut down Windows
The Windows Task Manager is a powerful tool packed with useful information, from
your system’s overall resource usage to detailed statistics about each process.
Windows Task Manager – How to Launch
1 Press Ctrl+Alt+Delete
Windows
security Screen
Windows Task Manager – How to Launch
2 Press Ctrl+Shift+Esc
While using
Remote Desktop
or working
inside a virtual
machine
Windows Task Manager – How to Launch
Power User
menu
Windows Task Manager – How to Launch
Right-click any
open space on
your taskbar
Windows Task Manager – How to Launch
Run Box
(Windows + R)
or Start Menu
Serarch box
Windows Task Manager – How to Launch
Open up File
Explorer and
navigate to the
following location:
C:\Windows\
System32
Windows Task Manager – How to Use
1 Processes
Windows Task Manager – Tabs
1 Processes
A list of running applications and background processes on your system along
with CPU, memory, disk, network, GPU, and other resource usage information.
The Processes tab shows you a comprehensive list of processes running on your
system
1 Processes
Windows Task Manager – Tabs
1 Processes
Windows Task Manager – Tabs
2 Performance
Windows Task Manager – Tabs
2 Performance
The Performance tab shows real-time graphs displaying the usage of system
resources like CPU, memory, disk, network, and GPU.
If you have multiple disks, network devices, or GPUs, you can see them all
separately.
In addition to resource information, the Performance page shows information
about your system’s hardware:
CPU
Memory
Disk
Wi-Fi or Ethernet
GPU
Windows Task Manager – Tabs
2 Performance
Windows Task Manager – Tabs
3 App History
Windows Task Manager – Tabs
3 App History
The App History tab only applies to Universal Windows Platform (UWP) apps.
At the top of the window, you’ll see the date Windows started collecting resource
usage data.
Windows Task Manager – Tabs
3 App History
CPU Time: The amount of CPU time the program has used within this time frame.
Network: The total amount of data transferred over the network by the program within this time
frame.
Metered Network: The amount of data transferred over metered networks. You can
set a network as metered to save data on it. This option is intended for networks you have limited
data on, like a mobile network to which you’re tethering.
Tile Updates: The amount of data the program has downloaded to display updated live tiles on
Windows 10’s Start menu.
Non-metered Network: The amount of data transferred over non-metered networks.
Downloads: The amount of data downloaded by the program on all networks.
Uploads: The amount of data uploaded by the program on all networks.
Windows Task Manager – Tabs
It lists all the applications that Windows automatically starts for your current user
account.
For example, programs in your Startup folder and programs set to start in the
Windows registry both appear here.
Windows Task Manager – Tabs
5 Checking on Users
Windows Task Manager – Tabs
5 Checking on Users
The Users tab displays a list of signed in users and their running processes
If you’re the only person signed into your Windows PC, you’ll see only your user
account here
If other people have signed in and then locked their sessions without signing out,
you’ll also see those—locked sessions appear as “Disconnected.”
This also shows you the CPU, memory, disk, network, and other system resources
used by processes running under each Windows user account.
5 Checking on Users
ID: Each signed in user account has its own session ID number. Session “0” is reserved for system
services, while other applications may create their own user accounts. You usually won’t need to
know this number, so it’s hidden by default.
Session: The type of session this is. For example, it will say “Console” if it’s being accessed on your
local system. This is primarily useful for server systems running remote desktops.
Client Name: The name of the remote client system accessing the session, if it’s being accessed
remotely.
Status: The status of the session—for example, if a user’s session is locked, the Status will say
“Disconnected.”
CPU: Total CPU used by the user’s processes.
Memory: Total memory used by the user’s processes.
Disk: Total disk activity associated with the user’s processes
Network: Total network activity from the user’s processes.
Windows Task Manager – Tabs
1 Set priority: Set a priority for
6 Managing Detailed Processes the process: Low, Below
normal, Normal, Above
normal, High, and Realtime.
Processes start at normal
priority. Lower priority is ideal
for background processes, and
higher priority is ideal for
desktop processes.
2 Set affinity: Set a processor
affinity - in other words, on
which processer a process
runs.
3 Analyze wait chain: View
what threads in the
processes are waiting for.
Windows Task Manager – Tabs
These are background tasks that Windows runs, even when no user account is
signed in
They’re controlled by the Windows operating system
[Link]
File Systems – File Management
The DOS indicated its primary function: providing access to disks and the data
stored on them.
Of course, over the years the OS has evolved, offers many features, Disk
management is still a primary feature of all versions.
A filesystem defines the methods used to store and retrieve data using storage
devices.
The filesystem usually includes the following features or components at a minimum:
A defined structure for storing data on the storage unit
A method for referencing the location of the data on the storage unit
Constraints on factors such as file sizes, number of files, and filenames
Beyond those minimum requirements, when selecting a filesystem you must ensure
that you use one that meets your needs. For example:
if a filesystem does not support long filenames and you require them, you would not select
that filesystem
If a filesystem does not support permission management and you require this feature, you
would not select that filesystem
The Features or Components of a Filesystem
3 The set of constraints that limit file sizes, the total number of files, and the
filenames that can be used.
Some filesystems are case sensitive. For example, you can name one file [Link] and
another file [Link] while placing them in the same folder or directory. Other filesystems
do not allow this.
As for the file size limit, this is mostly related to the bit level of the filesystem. For example,
32-bit filesystems can support larger files than 16-bit filesystems, and so on.
Comparing Windows Filesystem !
Some of these filesystems are well known; others are legacy systems still used even
though many advanced support professionals are not aware of their existence.
The following filesystems are supported in Windows 7, where the number indicates
the bit level of the filesystem:
FAT12
FAT16
FAT32
NTFS
CDFS
UDFS
Comparing Windows Filesystem !
5 6 The Compact Disk Filesystem (CDFS) and Universal Disk Format System (UDFS or
simply UDF) are used on CD and DVD media. UDFS may also be used on additional
media types.
Comparing Windows Filesystem !
Comparing Windows Filesystem !
In most cases, you only have to choose the filesystem when formatting internal or
removable drives larger than a few megabytes (16 MB to be specific)
Windows 7 also introduces several new features to NTFS, including the following:
Files can now be read from a disk at the same time that data is being flushed to the disk
using the disk cache manager, which enhances overall system performance.
Short filenames can now be disabled on a volume basis, whereas earlier versions required
that they be disabled globally or not at all.
Filesystem metadata related to sparse files and the Encrypting Filesystem (EFS) can now be
defragmented.
6. Administrator Tools
6. Administrator Tools
Administrative Tools (a folder in control panel) is the collective name for several
advanced tools in Windows that are used mainly by system administrators.
The Administrative Tools suite is available in:
Windows 10 Windows Vista
Windows 8 Windows XP
Windows 7 Windows Server Operating System
In other words, Administrative Tools itself doesn't do anything. It is just a location that stores
shortcuts to related programs that are actually stored in the Windows folder.
Most of the programs available in Administrative Tools are snap-ins for the Microsoft
Management Console (MMC).
6.1 Computer Management
Many ways to open the Computer Management tool in Windows (all versions)
Use search (all Windows versions) - from Taskbar/ Start Menu / Start screen
Use the Control Panel (all Windows versions) – Control Panel>System and Security>Ad. Tool
Use Cortana (Windows 10 only) - on the right side of the search box from the taskbar, click or
tap the microphone icon to make Cortana listen to you.
Use the Run window (all Windows versions)
Use Command Prompt or PowerShell (all Windows versions)
Use Task Manager (all Windows versions) – File Menu>Run New Task
6.1 Computer Management - Uses
8 Manage Windows
services
6.2 Local Security Policy
Local Security Policy is an MMC snap-in used to manage Group Policy security
settings.
One example of using Local Security Policy would be requiring a minimum
password length for user passwords, enforcing a maximum password age, or
making sure any new password meets a certain level of complexity.
Please note that in Windows 8 and 8.1, Local Security Policy is available in Start screen
search results only if you have enabled the displaying of Administrative Tools
Windows Vista, 7 and 10 users can also type this into Start menu Search box and press
ENTER.
6.2 Local Security Policy
Local Group Policy Editor - more detailed configuration console available (2)
6.2 Local Security Policy
Minimum password age - default is "0", meaning that local users can change their
passwords whenever they like. If you set this to "1", it means that a password must be in
effect for at least 1 day (24 hours) before a user can change it again.
Password must meet complexity requirements - set to "Enabled". This means that a
password must include at least two opposite case letters, a number and a special character
(punctuation marks, for example).
Store passwords using reversible encryption - always leave to "Disabled". If you enable
this policy, all users' passwords are easy to crack.
6.2 Local Security Policy
Account lockout duration and Reset account lockout counter after settings.
How long a user account stays locked after entering a wrong password too many times
(during that time, the user cannot log on to the computer) and after which period of time the
count of wrong passwords entered will be set back to zero.
Specify the number of times a user can enter a wrong password before Windows locks the
user account.
6.3 Performance Monitor
[ Computer Management ]
[Link]
administrative-tool
[ Local Security Policy ]
[Link]