Chapter 5: Operating Systems - AT...

32
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Chapter 5: Operating Systems IT Essentials 5.0

Transcript of Chapter 5: Operating Systems - AT...

Page 1: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1

Chapter 5: Operating Systems

IT Essentials 5.0

Page 2: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 5 Objectives 5.1 Explain the characteristics and basic functions of

modern operating systems 5.1 Describe and compare types of operating systems

to include purpose, limitations, and compatibilities 5.1 Determine operating system based on customer

needs 5.2 Install an operating system 5.3 Navigate a GUI (Windows) 5.4 Explain the advantages of Virtualization and install

Virtual PC

Page 3: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 3 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Chapter 5 Objectives (continued)

5.5 Identify and apply common preventive maintenance techniques for operating systems 5.6 Troubleshoot operating systems

Page 4: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 4 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Operating System (OS) A computer is a hardware.

It must be run using software.

Hardware without software is useless.

Software without hardware is useless.

A computer needs an Operating System (software) as a base.

Page 5: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 5 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Operating System (OS) Examples of OS:

Windows Operating System (7, 10)

Linux

Novell

Page 6: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 6 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Basic Function of an Operating System An operating system (OS) provides an interface for

interaction between users, applications, and hardware.

The operating system boots the computer and manages the file system.

Page 7: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 7 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Basic Function of an Operating System The operating system has four main roles:

• Controls hardware access

• Managse files and folders

• Provides user interface

• Manages applications

Page 8: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 8 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Characteristics of an Operating System Multi-user mode is supported – Two or more users can

have individual accounts in one PC. This allows them to work with programs and peripheral devices at the same time.

Multitasking mode is supported – The computer is capable of operating multiple applications at the same time.

Multiprocessing is supported – The operating system can support two or more CPUs.

Multithreading is supported – A program can be broken into smaller parts that are loaded as needed by the operating system. Multithreading allows individual programs to be multitasked. This speeds up processing.

Page 9: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 9 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

OS and Processor Architecture An OS can be customised to the architecture of a processor and computer. Basically there are two architectures: 32-bit x86 Processor Architecture 64-bit x64 Processor Architecture

The 64-bit architecture allows for faster processing than the 32-bit architecture. A 64-bit OS is different from a 32-bit OS.

Page 10: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 10 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

OS and Processor Architecture 32-bit Windows Operating System and x86 Processor

Architecture • Capable of addressing a maximum of 4 GB of RAM

• x86 uses a Complex Instruction Set Computer (CISC)

• x86 processors use fewer registers than x64 processors

• Cannot run 64-bit applications

64-bit Windows Operating System and x64 Processor Architecture • Capable of addressing 128+ GB of RAM

• Offers Enhanced performance for memory management

• Offers additional security features

• x64 architecture is backward compatible with x86 (It can run all 32-bit applications)

• Process much more complex instructions at a much higher rate

Page 11: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 11 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

32-bit and 64-bit Compatibility in Windows OS

Page 12: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 12 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Types of Operating Systems

Desktop Operating System

• Supports a single user

• Runs single-user applications

• Shares files and folders

• Shares peripherals

• Used on a small network

• Supports multiple users

• Runs multi-user applications

• Robust and redundant

• Provides increased security

• Used on a network

Network Operating System

Page 13: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 13 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Types of Operating Systems

Page 14: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 14 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Types of Operating Systems Desktop operating systems:

• Microsoft Windows: Windows 7

• Macintosh: Mac OS X

• Linux

• UNIX

A desktop OS has the following characteristics: • Supports a single user

• Runs single-user applications

• Shares files and folders on a small network with limited security

Page 15: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 15 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Network Operating Systems (NOS) Common NOS include:

• Microsoft Windows Server

• Linux

• UNIX

• Mac OS X Server

NOS has the following characteristics: • Supports multiple users

• Runs multi-user applications

• Robust and redundant

• Provides increased security compared to desktop operating systems

Page 16: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 16 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Customer Requirements for an OS

To select the proper operating system for a customer, determine:

•Budget constraints •Compatibility with current hardware •Compatibility with new hardware •How the computers will be used •Compatibility with existing applications •Types of new applications to be used

Page 17: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 17 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Identify Minimum Hardware Requirements Customer may need to upgrade or purchase additional

hardware to support the required applications and OS. A cost analysis will indicate if purchasing new

equipment is a better idea than upgrading. Possible hardware upgrades:

•RAM capacity •Hard drive size •CPU •Video card memory and speed •Motherboard

Page 18: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 18 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Hardware Compatibility List (HCL) Most operating systems have an HCL. HCLs can be found on the manufacturer's website. HCL includes list of hardware that is known to work with

the operating system. Use Microsoft Compatibility Center for Windows 10,

Windows 7 and Vista. This list should be checked before purchase of

hardware. This is to avoid wasting money buying incompatible hardware.

Page 19: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 19 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Hardware Compatibility List (HCL)

Page 20: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 20 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Operating System Upgrades Operating systems must be upgraded periodically,

• To remain compatible with the latest hardware and software. • To guard against support for older OS being withdrawn.

Ensure that the new OS is compatible with the computer. • Use Microsoft Upgrade Advisor to scan the system for incompatibility

issues before upgrading. Upgrade Advisor is free and downloadable from the Microsoft Windows website.

Backup all data prior to beginning the upgrade.

Page 21: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 21 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Installing Operating System Reasons to perform a clean installation of an OS:

•When a computer is passed from one employee to another. •When the operating system is corrupted. •When the primary hard drive is replaced in a computer .

Before performing a clean installation: •Back up all data first. •Explain to the customer that existing data will be erased. •Confirm that all needed data has been successfully transferred.

Page 22: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 22 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Hard Drive Setup Procedures Operating system setup methods:

•Install an OS over a network from a server. •Install from OS files stored on CDs or DVDs.

Partitioning and Formatting: •Hard drive must be logically divided (partitioned). •File system must be created on the hard drive. •During the installation phase, most operating systems will automatically partition and format the hard drive.

Page 23: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 23 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Install the Operating System When a computer boots up with the Windows installation CD, the

Win7/Win10 installation process starts with three options: • Install now - Sets up and installs the Windows OS. • What to know before installing Windows - Opens Help. • Repair your computer - Opens the System Recovery Options.

Under Install now, three options are available: • Upgrade - Upgrades Windows but keeps your current files, settings, and programs. You can use this option to repair an installation.

• Custom (advanced) - Installs a clean copy of Windows in your choice of location and allows you to change disks and partitions. It is also known as a clean installation.

• Quit - Exits Setup.

Page 24: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 24 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Hard Drive Formatting The first portion of the installation process deals with

formatting and partitioning the hard drive. The second portion prepares the disk to accept the file

system. The file system provides the directory structure that

organizes the user's operating system, application, configuration, and data files. Examples of file systems:

•The New Technology File System (NTFS) - Supports partition sizes up to 16 exabytes

•The FAT32 file system - Supports partition sizes up to 2 TB. Used by Windows XP and earlier OS versions.

Page 25: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 25 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Data Migration from old to new OS Once a new OS is installed, data must be transferred or

migrated from the older OS. One of the following tools can be used to migrate data and settings:

User State Migration Tool migrates all user files and settings to the new OS. Windows Easy Transfer migrates personal files and

settings when switching from an old computer to new. Note: Windows Easy Transfer replaced the Windows

XP File and Settings Transfer Wizard.

Page 26: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 26 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Complete the Installation When Windows 7 installation

completes: •Computer will reboot •Prompts to create user account •Register Windows 7 and verify that you are using a legal copy of the OS

•Verification enables you to download patches and service packs

Use Microsoft Update Manager to scan for new software.

Page 27: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 27 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Account Creation Windows 7 has three types of user accounts:

Administrator, Standard, and Guest.

The Administrator Account must be created when Windows 7 is installed.

To create or remove a user account in Windows 7 use the following path :

Start > Control Panel > User Accounts > Add or remove user accounts

Page 28: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 28 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Custom Installation Options – Disk Cloning

Follow these steps for disk cloning: 1. Create a master installation on one computer. 2. Run Sysprep. 3. Create a disk image of the configured computer using third-

party disk-cloning software. 4. Copy the disk image onto a server.

When the destination computer is booted: • A shortened version of the Windows setup program runs. • Setup installs drivers, creates user accounts, and

configures network settings.

With Microsoft System Preparation

Page 29: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 29 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Custom Installation Options Windows 7 has several different types of custom

installations. •Network Installation - Requires all setup files to be copied to a network server.

•Preboot Execution Environment (PXE) Installation - Uses a PXE boot program and a client’s network card to access the setup files.

•Unattended Installation - Uses a network distribution point that uses an answer file.

• Image-based Installation - Uses Sysprep and a disk-imaging program, that copies an image of the OS directly to the hard drive with no user intervention.

•Remote Installation - Downloads the installation across the network.

Page 30: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 30 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

System Recovery Options The OS can get corrupted after some time of use, if it

gets infected with viruses. There are a few ways of system recovery.

Page 31: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 31 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

System Recovery Options Repair Disc- For Windows 7. Use the system repair disc to

boot the computer System Image Recovery – For Windows 7. It allows users

to back up the contents of their hard drive, including personal files and settings. Factory Recovery Partition – Some computers with

Windows 7 preinstalled from the factory contain a hidden recovery partition with an image of the bootable partition.

Automated System Recovery (Windows XP Professional only) – The ASR is a backup of the system state, services, and OS components. Used with Windows installation disc to recover computer.

Page 32: Chapter 5: Operating Systems - AT shareatshare.weebly.com/uploads/1/0/8/9/10891690/ite_50_chapter5a_-_os_new.pdf · Follow these steps for disk cloning: 1. Create a master installation

Presentation_ID 32 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

PART B