SlideShare una empresa de Scribd logo
1 de 24
Happy New Year
Linux vs. Windows NT
Prepared ByPrepared By:
Vimal N Patel
MCA 5th
Sem
Roll no : 04021
Linux vs. Windows NT
History
Design Principles
System Components
Kernel
Memory Management
File Systems
Security
Networking
History of Linux
 1991; self-contained kernel for 80386 processor, the first true
32-bit processor in Intel’s range of PC-compatible CPUs
 Development revolved largely around the central operating-
system kernel - that manages all system resources and that
interacts directly with the hardware
 The Kernel is an entirely original piece of software developed
from scratch by the Linux community
 The Linux system includes a multitude of components, some
written from scratch, others borrowed from other development
projects or created in collaboration with other teams
 Linux distribution includes all the standard components of the
Linux system, a set of administrative tools to simplify the initial
installation and upgrading of Linux, and to manage installation
and de-installation of other packages on the system
History of Windows NT
1988 by Microsoft; portable operating system that supported
both the OS/2 and POSIX application programming interfaces
(APIs).
NT was supposed to use the OS/2 API as its native
environment, but during the development NT was changed to
use the 32-bit Windows API for Win32 API, reflecting the
popularity of Windows 3.0
The first Version of NT were Windows NT 3.1 and Windows
NT 3.1 Advanced Server.
In Version 4.0, NT adopted the Windows 95 user interface
and incorporated Internet web-server and browser software
Design Principles of Linux
Multi-user, multitasking system with a full set of UNIX-
compatible tools
runs on a wide variety of platforms, in its early days it was
developed exclusively on PC architecture, run on a
multiprocessor machine with hundreds of megabytes of main
memory and many gigabytes of disk space, but it is still
capable of operating under 4 MB of RAM
Speed and efficiency are important design goals, but much of
the recent and current work has concentrated on
Standardization.
Supporting a wide base of applications is important for any
operating system, so implementation of standards is a major
goal for Linux development even if the implementation is not
formally certified. There is a substantial expense involved in
certifying an operating system’s compliance with most
standards.
Design Principles of NT
Extensibility, portability, reliability, compatibility, performance,
and international support
Extensibility: hopes to keep up with advancement in
computing technology
NT uses loaded drivers in the I/O system, so that new file
systems, new kinds of I/O devices, and new kinds of
networking can be added while the system is running
NT utilizes a client-server model like the Mac operating
system, and supports distributed processing by remote
procedure calls
Portable: it can be moved from one hardware architecture to
another with relatively few changes.
Design Principles of NT
Reliability: ability to handle error conditions, including the
ability of the operating system to protect itself and its users
from defective or malicious software.
NT comes with a file system, called the native NT file system
(NTFS), that recovers automatically from many kinds of file
system errors after a system crash.
Compatibility: NT can run the executable binaries for many
programs compiled for Intel X86 running MS-DOS, 32-bit
Windows, OS/2, LAN Manager, and 32-bit Windows.
Performance: communicate with one another efficiently by a
local-procedure-call facility that provides high-performance
message passing
International use: support for different locales via the national
language support API.
System Components of Linux
Kernel: responsible for maintaining all the important
abstractions of the operating system, including such things as
virtual memory and processes
System libraries: a standard set of functions through which
applications can interact with the kernel, and which implement
much of the operating system functionality that does not need
the full privileges of kernel code
System utilities: programs that perform individual, specialized
management tasks.
System Components of NT
The architecture of NT is a layered system of modules.
The main layers are the hardware, abstraction layer, the
kernel and the executive that run in protected mode, and a
large collection of subsystems that run in user mode.
Kernel of Linux
First Linux kernel was version 0.01, dated May 14th
1991.
It has no networking, ran on only 80386 compatible Intel
processors and PC hardware, and had extremely limited
device-driver support
In March 14, 1994 Linux 1.0 was released. This included
support for UNIX’s standard TCP/IP networking protocols as
well as a BSD compatible socket interface for networking
programming. Device-driver support was added for running IP
over an Ethernet or over serial lines or modems.
Kernel of Linux Cont..
In March 1995, the 1.2 kernel was released. It include support
for a much wider variety of hardware, including PCI hardware
bus architecture, support for 80386 CPU’s virtual 8086 mode,
networking stack was updated to provide support for the IPX
protocol, and a more complete IP implementation was provided
that included accounting and firewall functionality
Linux 2.0 was released in June 1996. This include support for
multiple architectures, including a fully 64-bit native Alpha port,
and support for multiprocessor architectures. Linux distributions
based on 2.0 are also available for the Motorola 68000-series
processors and for Sun’s Sparc systems. It also included much
improved TCP/IP performance, and a number of new
networking and ISDN support.
Kernel of Windows NT
The kernel of NT provides the foundation for the executive
and the subsystems. It has four main responsibilities: thread
scheduling, interrupt and exception handling, low-level
processor synchronization, and recovery after a power failure.
The kernel is object-oriented. An object type in NT is a
system-defined data type that has a set of attributes and a set
of methods. The kernel uses two sets of objects. The first set
of objects is the dispatcher objects. These control dispatching
and synchronization in the system. The second set of kernel
objects comprises the control objects. These objects include
asynchronous procedure calls, interrupts, power notify, power
status, process, and profile objects
Memory Management of Linux
1. Two components to memory management:
a. First: Physical memory-management system deals with allocating
and freeing pages, groups of pages, and small blocks of
memory.
b. Second: Handles virtual memory, which is memory mapped into
the address space of running processes.
Memory Management of NT
The Win32 API provides several ways for an application to
use memory: virtual memory, memory-mapped files, heaps,
and thread-local storages.
One way to use memory is by memory mapping a file into its
address space. Memory mapping is also a convenient way for
two processes to share memory – both processes map the
same file into their virtual memory. Memory mapping is a
multistage process
File Systems of Linux
Linux kernel handles various different types of file by hiding
the implementation details of any single file type behind a
layer of software, the virtual file system (VFS)
File Systems of Windows NT
Historically, MS-DOS systems have used the file-allocation table
(FAT) file system. The 16-bit FAT file system has several
shortcomings, including internal fragmentation, a size limitation
of 2 GB, and a lack of access protection for files. The 32-bit FAT
file system has solved the size and fragmentation problems, but
the performance and features are still weak by comparison with
modern file systems. The NTFS is much better. It was designed
with many features in mind, including data recovery, security,
fault tolerance, large files and file systems, multiple data
streams, UNICODE names, and file compression.
Security of Linux
1. It’s security model can be classified in two groups:
a. Authentication: Making sure that nobody can access the
system without first providing that she has entry rights
b. Access control: Providing a mechanism for checking
whether a user has the right to access a certain object,
and preventing access to objects as required
Security of Windows NT
1. Security of an NTFS volume is derived from the NT object
model. Each file object has a security descriptor attribute
stored in its MFT record. This attribute contains the access
token of the owner of the file, and an access-control list that
states the access privileges that are granted to each user that
has access to the file.
Networking in Linux
supports number of protocols native to other, non-UNIX
operating systems such as Apple-Talk and IPX.
The important set of protocols in the Linux networking system
is the Internet Protocol (IP) suite. This suite comprises a
number of separate protocols. The IP implements routing
between different hosts anywhere on the network. On top of
the routing protocol are built the UDP, TCP, and ICMP
protocols. The UDP protocol carries arbitrary individual
datagrams between hosts, whereas TCP implements reliable
connections between hosts with guaranteed in-order delivery
of packets and automatic retransmission of lost data. ICMP is
used to carry various error and status messages between
hosts.
Internally, networking in the Linux kernel is implemented by
three layers of software:
a. The socket interface
b. Protocol drivers
c. Network device drivers
Networking in Windows NT
NT supports both peer-to-peer and client-server networking
The networking components in NT provide data transport,
inter-process communication, file sharing across a network,
and the ability to send print jobs to remote printers.
NT comes with several networking protocols
 Server message-block protocol is used to send I/O requests over
the network.
 Network Basic Input/Output System (NetBIOS) is a hardware-
abstraction interface for networks, which is used to establish
logical names on the network, to establish logical connections or
sessions between two logical names on the network, and to
support reliable data transfer for a session via either NetBIOS or
SMB requests
Networking in Windows NT
a. The NetBIOS Extended User Interface (NetBEUI) was introduced
by IBM in 1985 as a simple, efficient networking protocol for up to
254 machines. It is the default protocol for Windows 95 peer
networking and for Windows for Workgroups.
b. The point-to-point tunneling protocol (PPTP) is a new protocol
provided by Windows NT 4.0 to communicate between remote-
access server modules running on NT machines that are
connected over the Internet.
 The data-link control (DLC) protocol is used to access IBM
mainframes and HP printer that are connected directly to the
network.
 The AppleTalk protocol was designed as a low-cost connection
by Apple so that Macintosh computers could share files. NT
systems can share files and printers with Macintosh computers
via AppleTalk if an NT server on the network is running the
Windows NT Services for Macintosh package.
References
www.whatis.com
www.ask.com
Linux vs windows

Más contenido relacionado

La actualidad más candente

Unix memory management
Unix memory managementUnix memory management
Unix memory managementTech_MX
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux SystemWayne Jones Jnr
 
Thread scheduling in Operating Systems
Thread scheduling in Operating SystemsThread scheduling in Operating Systems
Thread scheduling in Operating SystemsNitish Gulati
 
3. CPU virtualization and scheduling
3. CPU virtualization and scheduling3. CPU virtualization and scheduling
3. CPU virtualization and schedulingHwanju Kim
 
6 multiprogramming & time sharing
6 multiprogramming & time sharing6 multiprogramming & time sharing
6 multiprogramming & time sharingmyrajendra
 
Operating System a Case Study
Operating System a Case StudyOperating System a Case Study
Operating System a Case Studyijtsrd
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture shortAvirot Mitamura
 
Operating system services 9
Operating system services 9Operating system services 9
Operating system services 9myrajendra
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its TypesHTS Hosting
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systemsvampugani
 
Intermediate Operating Systems
Intermediate Operating SystemsIntermediate Operating Systems
Intermediate Operating SystemsJohn Cutajar
 
Distributed Operating Systems
Distributed Operating SystemsDistributed Operating Systems
Distributed Operating SystemsUmmiya Mohammedi
 
Operating system architecture
Operating system architectureOperating system architecture
Operating system architectureSabin dumre
 
Memory Management
Memory ManagementMemory Management
Memory ManagementSanthiNivas
 
Presentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsPresentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsKuber Chandra
 
Operating Systems
Operating SystemsOperating Systems
Operating Systemsvampugani
 
File system Os
File system OsFile system Os
File system OsNehal Naik
 

La actualidad más candente (20)

Unix memory management
Unix memory managementUnix memory management
Unix memory management
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux System
 
Thread scheduling in Operating Systems
Thread scheduling in Operating SystemsThread scheduling in Operating Systems
Thread scheduling in Operating Systems
 
3. CPU virtualization and scheduling
3. CPU virtualization and scheduling3. CPU virtualization and scheduling
3. CPU virtualization and scheduling
 
Kernel (computing)
Kernel (computing)Kernel (computing)
Kernel (computing)
 
Linux
LinuxLinux
Linux
 
6 multiprogramming & time sharing
6 multiprogramming & time sharing6 multiprogramming & time sharing
6 multiprogramming & time sharing
 
Priority scheduling algorithms
Priority scheduling algorithmsPriority scheduling algorithms
Priority scheduling algorithms
 
Operating System a Case Study
Operating System a Case StudyOperating System a Case Study
Operating System a Case Study
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
Operating system services 9
Operating system services 9Operating system services 9
Operating system services 9
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
Intermediate Operating Systems
Intermediate Operating SystemsIntermediate Operating Systems
Intermediate Operating Systems
 
Distributed Operating Systems
Distributed Operating SystemsDistributed Operating Systems
Distributed Operating Systems
 
Operating system architecture
Operating system architectureOperating system architecture
Operating system architecture
 
Memory Management
Memory ManagementMemory Management
Memory Management
 
Presentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) BasicsPresentation On RAID(Redundant Array Of Independent Disks) Basics
Presentation On RAID(Redundant Array Of Independent Disks) Basics
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
File system Os
File system OsFile system Os
File system Os
 

Destacado

Destacado (20)

Linux intro to advance
Linux intro to advanceLinux intro to advance
Linux intro to advance
 
Tuned
TunedTuned
Tuned
 
System performance monitoring pcp + vector
System performance monitoring   pcp + vectorSystem performance monitoring   pcp + vector
System performance monitoring pcp + vector
 
Bsd presentation
Bsd presentationBsd presentation
Bsd presentation
 
bsd
bsdbsd
bsd
 
Intro to linux
Intro to linuxIntro to linux
Intro to linux
 
Studies
StudiesStudies
Studies
 
Lecture windows xp 3
Lecture windows xp 3Lecture windows xp 3
Lecture windows xp 3
 
Mac history
Mac historyMac history
Mac history
 
Berkely unix
Berkely unixBerkely unix
Berkely unix
 
Solaris
SolarisSolaris
Solaris
 
Solaris OS
Solaris OSSolaris OS
Solaris OS
 
Introduction To Windows Xp Class 1
Introduction To Windows Xp   Class 1Introduction To Windows Xp   Class 1
Introduction To Windows Xp Class 1
 
Windows 2000
Windows 2000Windows 2000
Windows 2000
 
Windows 2000
Windows 2000Windows 2000
Windows 2000
 
Windows 2000
Windows 2000Windows 2000
Windows 2000
 
What is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virusWhat is Operating System, Utility program,virus and anti_virus
What is Operating System, Utility program,virus and anti_virus
 
slideshow about windows xp and features
slideshow about windows xp and featuresslideshow about windows xp and features
slideshow about windows xp and features
 
Chapter 22 - Windows XP
Chapter 22 - Windows XPChapter 22 - Windows XP
Chapter 22 - Windows XP
 
Windows 2000 Presentation
Windows 2000 PresentationWindows 2000 Presentation
Windows 2000 Presentation
 

Similar a Linux vs windows (20)

Assignment On Linux Unix Life Cycle And Its Commands Course Title System Pro...
Assignment On Linux Unix Life Cycle And Its Commands Course Title  System Pro...Assignment On Linux Unix Life Cycle And Its Commands Course Title  System Pro...
Assignment On Linux Unix Life Cycle And Its Commands Course Title System Pro...
 
Linux kernel
Linux kernelLinux kernel
Linux kernel
 
Linux kernel
Linux kernelLinux kernel
Linux kernel
 
Ch22
Ch22Ch22
Ch22
 
OS_Ch20
OS_Ch20OS_Ch20
OS_Ch20
 
OSCh20
OSCh20OSCh20
OSCh20
 
Ch20 OS
Ch20 OSCh20 OS
Ch20 OS
 
CS8493-OS-Unit-5.pdf
CS8493-OS-Unit-5.pdfCS8493-OS-Unit-5.pdf
CS8493-OS-Unit-5.pdf
 
Cs8493 unit 5
Cs8493 unit 5Cs8493 unit 5
Cs8493 unit 5
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
The Linux System
The Linux SystemThe Linux System
The Linux System
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment ppt
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
 
introduction.pdf
introduction.pdfintroduction.pdf
introduction.pdf
 
linux kernel overview 2013
linux kernel overview 2013linux kernel overview 2013
linux kernel overview 2013
 
Ubuntu OS Presentation
Ubuntu OS PresentationUbuntu OS Presentation
Ubuntu OS Presentation
 
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinuxNguyen lyhedieuhanh 14-15_hedieuhanhlinux
Nguyen lyhedieuhanh 14-15_hedieuhanhlinux
 
Linux OS presentation
Linux OS presentationLinux OS presentation
Linux OS presentation
 
history_of_linux lec 7.pptx
history_of_linux lec 7.pptxhistory_of_linux lec 7.pptx
history_of_linux lec 7.pptx
 
L2(1).PPT
L2(1).PPTL2(1).PPT
L2(1).PPT
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Linux vs windows

  • 2. Linux vs. Windows NT Prepared ByPrepared By: Vimal N Patel MCA 5th Sem Roll no : 04021
  • 3. Linux vs. Windows NT History Design Principles System Components Kernel Memory Management File Systems Security Networking
  • 4. History of Linux  1991; self-contained kernel for 80386 processor, the first true 32-bit processor in Intel’s range of PC-compatible CPUs  Development revolved largely around the central operating- system kernel - that manages all system resources and that interacts directly with the hardware  The Kernel is an entirely original piece of software developed from scratch by the Linux community  The Linux system includes a multitude of components, some written from scratch, others borrowed from other development projects or created in collaboration with other teams  Linux distribution includes all the standard components of the Linux system, a set of administrative tools to simplify the initial installation and upgrading of Linux, and to manage installation and de-installation of other packages on the system
  • 5. History of Windows NT 1988 by Microsoft; portable operating system that supported both the OS/2 and POSIX application programming interfaces (APIs). NT was supposed to use the OS/2 API as its native environment, but during the development NT was changed to use the 32-bit Windows API for Win32 API, reflecting the popularity of Windows 3.0 The first Version of NT were Windows NT 3.1 and Windows NT 3.1 Advanced Server. In Version 4.0, NT adopted the Windows 95 user interface and incorporated Internet web-server and browser software
  • 6. Design Principles of Linux Multi-user, multitasking system with a full set of UNIX- compatible tools runs on a wide variety of platforms, in its early days it was developed exclusively on PC architecture, run on a multiprocessor machine with hundreds of megabytes of main memory and many gigabytes of disk space, but it is still capable of operating under 4 MB of RAM Speed and efficiency are important design goals, but much of the recent and current work has concentrated on Standardization. Supporting a wide base of applications is important for any operating system, so implementation of standards is a major goal for Linux development even if the implementation is not formally certified. There is a substantial expense involved in certifying an operating system’s compliance with most standards.
  • 7. Design Principles of NT Extensibility, portability, reliability, compatibility, performance, and international support Extensibility: hopes to keep up with advancement in computing technology NT uses loaded drivers in the I/O system, so that new file systems, new kinds of I/O devices, and new kinds of networking can be added while the system is running NT utilizes a client-server model like the Mac operating system, and supports distributed processing by remote procedure calls Portable: it can be moved from one hardware architecture to another with relatively few changes.
  • 8. Design Principles of NT Reliability: ability to handle error conditions, including the ability of the operating system to protect itself and its users from defective or malicious software. NT comes with a file system, called the native NT file system (NTFS), that recovers automatically from many kinds of file system errors after a system crash. Compatibility: NT can run the executable binaries for many programs compiled for Intel X86 running MS-DOS, 32-bit Windows, OS/2, LAN Manager, and 32-bit Windows. Performance: communicate with one another efficiently by a local-procedure-call facility that provides high-performance message passing International use: support for different locales via the national language support API.
  • 9. System Components of Linux Kernel: responsible for maintaining all the important abstractions of the operating system, including such things as virtual memory and processes System libraries: a standard set of functions through which applications can interact with the kernel, and which implement much of the operating system functionality that does not need the full privileges of kernel code System utilities: programs that perform individual, specialized management tasks.
  • 10. System Components of NT The architecture of NT is a layered system of modules. The main layers are the hardware, abstraction layer, the kernel and the executive that run in protected mode, and a large collection of subsystems that run in user mode.
  • 11. Kernel of Linux First Linux kernel was version 0.01, dated May 14th 1991. It has no networking, ran on only 80386 compatible Intel processors and PC hardware, and had extremely limited device-driver support In March 14, 1994 Linux 1.0 was released. This included support for UNIX’s standard TCP/IP networking protocols as well as a BSD compatible socket interface for networking programming. Device-driver support was added for running IP over an Ethernet or over serial lines or modems.
  • 12. Kernel of Linux Cont.. In March 1995, the 1.2 kernel was released. It include support for a much wider variety of hardware, including PCI hardware bus architecture, support for 80386 CPU’s virtual 8086 mode, networking stack was updated to provide support for the IPX protocol, and a more complete IP implementation was provided that included accounting and firewall functionality Linux 2.0 was released in June 1996. This include support for multiple architectures, including a fully 64-bit native Alpha port, and support for multiprocessor architectures. Linux distributions based on 2.0 are also available for the Motorola 68000-series processors and for Sun’s Sparc systems. It also included much improved TCP/IP performance, and a number of new networking and ISDN support.
  • 13. Kernel of Windows NT The kernel of NT provides the foundation for the executive and the subsystems. It has four main responsibilities: thread scheduling, interrupt and exception handling, low-level processor synchronization, and recovery after a power failure. The kernel is object-oriented. An object type in NT is a system-defined data type that has a set of attributes and a set of methods. The kernel uses two sets of objects. The first set of objects is the dispatcher objects. These control dispatching and synchronization in the system. The second set of kernel objects comprises the control objects. These objects include asynchronous procedure calls, interrupts, power notify, power status, process, and profile objects
  • 14. Memory Management of Linux 1. Two components to memory management: a. First: Physical memory-management system deals with allocating and freeing pages, groups of pages, and small blocks of memory. b. Second: Handles virtual memory, which is memory mapped into the address space of running processes.
  • 15. Memory Management of NT The Win32 API provides several ways for an application to use memory: virtual memory, memory-mapped files, heaps, and thread-local storages. One way to use memory is by memory mapping a file into its address space. Memory mapping is also a convenient way for two processes to share memory – both processes map the same file into their virtual memory. Memory mapping is a multistage process
  • 16. File Systems of Linux Linux kernel handles various different types of file by hiding the implementation details of any single file type behind a layer of software, the virtual file system (VFS)
  • 17. File Systems of Windows NT Historically, MS-DOS systems have used the file-allocation table (FAT) file system. The 16-bit FAT file system has several shortcomings, including internal fragmentation, a size limitation of 2 GB, and a lack of access protection for files. The 32-bit FAT file system has solved the size and fragmentation problems, but the performance and features are still weak by comparison with modern file systems. The NTFS is much better. It was designed with many features in mind, including data recovery, security, fault tolerance, large files and file systems, multiple data streams, UNICODE names, and file compression.
  • 18. Security of Linux 1. It’s security model can be classified in two groups: a. Authentication: Making sure that nobody can access the system without first providing that she has entry rights b. Access control: Providing a mechanism for checking whether a user has the right to access a certain object, and preventing access to objects as required
  • 19. Security of Windows NT 1. Security of an NTFS volume is derived from the NT object model. Each file object has a security descriptor attribute stored in its MFT record. This attribute contains the access token of the owner of the file, and an access-control list that states the access privileges that are granted to each user that has access to the file.
  • 20. Networking in Linux supports number of protocols native to other, non-UNIX operating systems such as Apple-Talk and IPX. The important set of protocols in the Linux networking system is the Internet Protocol (IP) suite. This suite comprises a number of separate protocols. The IP implements routing between different hosts anywhere on the network. On top of the routing protocol are built the UDP, TCP, and ICMP protocols. The UDP protocol carries arbitrary individual datagrams between hosts, whereas TCP implements reliable connections between hosts with guaranteed in-order delivery of packets and automatic retransmission of lost data. ICMP is used to carry various error and status messages between hosts. Internally, networking in the Linux kernel is implemented by three layers of software: a. The socket interface b. Protocol drivers c. Network device drivers
  • 21. Networking in Windows NT NT supports both peer-to-peer and client-server networking The networking components in NT provide data transport, inter-process communication, file sharing across a network, and the ability to send print jobs to remote printers. NT comes with several networking protocols  Server message-block protocol is used to send I/O requests over the network.  Network Basic Input/Output System (NetBIOS) is a hardware- abstraction interface for networks, which is used to establish logical names on the network, to establish logical connections or sessions between two logical names on the network, and to support reliable data transfer for a session via either NetBIOS or SMB requests
  • 22. Networking in Windows NT a. The NetBIOS Extended User Interface (NetBEUI) was introduced by IBM in 1985 as a simple, efficient networking protocol for up to 254 machines. It is the default protocol for Windows 95 peer networking and for Windows for Workgroups. b. The point-to-point tunneling protocol (PPTP) is a new protocol provided by Windows NT 4.0 to communicate between remote- access server modules running on NT machines that are connected over the Internet.  The data-link control (DLC) protocol is used to access IBM mainframes and HP printer that are connected directly to the network.  The AppleTalk protocol was designed as a low-cost connection by Apple so that Macintosh computers could share files. NT systems can share files and printers with Macintosh computers via AppleTalk if an NT server on the network is running the Windows NT Services for Macintosh package.