You are on page 1of 5

NETWORK OPERATING SYSTEM

Network Operating System runs on a server and provides server the


capability to manage data, users, groups, security applications, and other
networking functions. The primary purpose of the network operating system is
to allow shared file and printer access among multiple computer in a network,
typically a local area network (LAN), a private network or to other networks.
Example of network operating systems are Microsoft Windows Server 2003,
Microsoft Windows Server 2008, Unix, Linux, Mac OS X, Novell Netware,
and BSD.

Advantages Disadvantages
1. Centralized servers are highly 1. High cost of buying and running a
stable. server
2. Security is server managed. 2. Dependency on a central location
for most operations.
3. Upgrade to new technologies 3. Regular maintenance and updates
and hardware can be easily are required.
integrated into the system.
4. Remote access to servers is
possible from different locations
and type of systems.

Windows Server 2008 is the most advanced Windows Server operating


system yet, designed to power the next-
generation of networks, applications, and
Web services. With Windows Server
2008, you can develop, deliver, and
manage rich user experiences and
applications, provide a highly secure
network infrastructure, and increase
technological efficiency and value within your organization.
OPERATING SYSTEM CONCERNS

Operating System are written by human programmers who makes


mistakes. Therefore, there can be an error in code even though there may be
some testing before the product is released. Some companies have better
software quality control and testing than others so may notice varying levels
of quality from operating system to operating system. Errors in operating
systems cause three main types of problems:

a. System crashes and instabilities – these can happen due to a software


bug typically in the operating system can make the system more unstable
or may even crash the system by themselves. This varies of system
freezing and becoming unresponsive which would cause the user the
need to reboot.

b. Security flaws – some software errors leave a door open for the
system to be broken by unauthorized intruders may try to use this gain
illegal access to your system. Patching these flaws often will help keep
your computer secure.

c. Sometimes errors in operating system will cause the computer not


to work correctly with some peripheral devices such as printers.

ENHANCING AN OS WITH UTILITY SOFTWARE

Utilities that enhance or extends the operating system’s capabilities, or


that simply offer new features not provided by the operating system itself. As
a new operating system is improved and updated, the functionality of popular
utilities is included with subsequent releases of the OS.
1. Back-up Utilities – Many newer
Operating System feature built-in back-
up utilities, but fewer-rich back-up
software is available from other sources.
These utilities not help you transfer file
to a back-up medium, they also help
organize files, update back-ups to disk in
case of data loss.

2. Antivirus – can examine the contents of


a disk or RAM for hidden viruses and
files that may act as host for virus code.
Effective antivirus products not only
detect viruses; they also help you recover
data that has been lost because of a virus.

3. Firewall – It keeps a check of all


incoming and outgoing connections of your computer network (usually
LANs) and based on the rules configured on the firewall, it will allow/deny
access to certain computers, or technically speaking IP addresses.

A few other things it does is it maintains a log of all incoming and


outgoing connections along with the date and time stamp, shows what
connections were blocked and why, and of course the best part, prevents
unknown people from getting into your network from the internet (hackers,
vandals, script kiddies!).

But make no mistake. A firewall is the LEAST you can do to


secure your network – that’s right. A firewall is the most basic thing to have
in place when it comes to securing your computer or an entire network.
Since you have understood what is firewall, let’s move on to
understand the types of firewalls:

a. Hardware-based Firewalls –
there are physical machines with
network ports. Commonly
installed at the entry point of
your network. These are used to
protect an entire network from
internet threats and are generally
used at offices.

b. Software-based Firewalls –
These are commonly associated
with antivirus software. You can
download it in your Windows
computer and install it yourself.
These are used to protect a single
computer from internet threats.
Generally used for personal use.
Most popular are Norton, McAfee,
Kaspersky and Comodo Firewall

4. Intrusion Detection – while a firewall offers protection from predictable


intrusion, intrusion detection software reveals the types of attacks a
firewall is thwarting, creating logs of the attempts (depending on how you
configure it) notifying you of certain intrusion attempts. In the competitive
utility software field, intrusion detection is often added as a feature to
firewall or bundle Internet security programs.
5. Screen Savers – are popular
utilities, although they serve little
purpose that to hide what would
otherwise be displayed on the
screen. Screen savers display a
moving image on the screen and
were originally displayed images
from “burning” into the monitor. A
screen saver automatically appears
when a keyboard or pointing
devices has been used for a specific
period of time. Screen savers are
available from many sources, and
you can even use your own picture
and graphic files with most screen saver program.

Reference/s:
 http://www.gcflearnfree.org/computerbasics/2/print
 Norton,Peter.Introduction to Computer, 6th Edition. Tim Mcgraw Hill,
Delhi. 2008. pp. 202-219
 http://techtrickle.com/history-of-windows/
 http://hsc.csu.edu.au/info_tech/compulsory/os4014/basic_fuctions.html
 Computer Science Servicing NC II Module 2015 (SPEED Computer
College)
 https://en.wikipedia.orgwiki/Mac_OS_X_Snow_Leopard
 https://en.wikipedia.org/wiki/Linux
 http://techluminati.com/networking-and-security/what-is-a-firewall/
 https://technet.microsoft.com/en-us/windowsserver/cc304052.aspx

You might also like