12. Operating Systems - Part 2
12. Operating Systems - Part 2
Architecture
Infrastructure Building Blocks
and Concepts
• Example:
• The operating system takes care of all of this and just provides chunks of
memory to applications
DMA
• Swapping: Entire processes are moved between main memory and disk
• Paging is usually not a problem, but swapping should be avoided as much
as possible
Swapping makes the system extremely slow
Shells, CLIs and GUIs
• An alternative is an N to N cluster
• There is no spare idle node
• Each node has some spare
capacity
Failover clustering
• Some operating systems (like UNIX and Linux) allow tuning kernel
parameters of the operating system
Unused features (like support for IPv6 or floppy disk drives) can be switched off, leading
to a smaller kernel size
• Patches hot-fixes, and service packs are usually provided with release
notes
They describe what changes are made to the operating system
Read release notes before installing the patch!
When a patch or hot fix does not have impact on a specific deployment it can be
discarded
Hardening
• Windows, Linux and end user operating systems are vulnerable to viruses
It is good practice to install a virus scanner
• Rule sets define which type of traffic is allowed to communicate with the
operating system, based on:
Source and destination IP address
TCP or UDP port
The running process sending and/or receiving the network traffic
• Operating systems have local user accounts that can login to the operating
system
• Most operating systems also have a special super user account called
"root", "supervisor", "admin", or "administrator“
These accounts have almost unlimited power
They should be used only to provide permissions to user accounts bound to a physical
person
Under normal circumstances, these accounts should never be used
It should be possible to do all work using a user-bound account with sufficient rights
Hashed passwords