Modules 2 and 3
Operating System Architecture
Describes how operating systems interact with hardware and users, with layers including hardware, operating system, application software, and user interface.
Processor Architecture
Refers to specific architectures like X86, Itanium, and AMD, which the operating system is designed for, requiring architecture-dependent code.
Device Drivers
Software components that enable the operating system to communicate with hardware devices like managing memory and network.
Kernel
The memory-resident core of the operating system that manages processes, interacts with hardware, and supports user applications.
Privileged Levels
Hierarchical levels of privilege in an operating system, with the kernel at the highest level, followed by drivers, the shell, and application programs.
Process
The unit of work in an operating system, consisting of an executable file and associated resources, which can be further divided into threads.
Threads
Subunits of a process that can run independently but share resources with the parent process, allowing for concurrent execution on CPUs.
Process ID
A unique identifier for each process used by the operating system to track and manage processes and threads.
Multicore CPU
A CPU with multiple cores that can run threads from the same process concurrently, improving performance by utilizing multiple cores efficiently.
Multi-threaded process
Involves having multiple processes with multiple threads per thread to take advantage of multi-core CPUs.
CPU (Central Processing Unit)
The primary component of a computer responsible for actual processing, typically consisting of multiple components.
Moore's Law
A prediction by Intel's co-founder Gordon Moore that the number of transistors on a chip will double approximately every two years, leading to increased computing capacity.
Silicon
The underlying substrate material used to create CPUs and other computational units, with current manufacturing processes approaching physical limits.
Cache
Storage within a CPU where data and applications to be executed next are stored, with modern CPUs utilizing multiple layers of cache.
Intel Architecture
Common personal computer architecture also popular on the server side, known for its cost efficiency and interaction with system memory.
Multi-core architecture
Involves CPUs with multiple cores, each core acting as a "brain" with unique cache, enabling parallel processing and increased efficiency.
Multi-core processing
Utilizing multiple CPU cores with shared caches and memory subsystems for enhanced computing capability.
Cache hierarchy
Involves level one, level two, and shared level three caches across multiple CPU cores to store instructions and data for efficient processing.
Memory controller
Manages the flow of data between the CPU and memory, with DDR being the current standard for memory.
Virtualization
Understanding CPU architecture to create virtual systems, essential for building cloud infrastructure.
Chiplets
Small components assembled together to form a single device, allowing for cost-effective manufacturing and improved CPU capabilities.
Quantum computing
Utilizing qubits that can exist in multiple states simultaneously for parallel processing, potentially the future beyond silicon-based computing.
Spintronics
Representing digital bits by switching between two different states based on the spin of electrons, offering new capabilities in computing.
Operating system components
Kernel, processes, threads, and CPU cores play crucial roles in executing applications across different devices and architectures.
Network Architecture
The design and structure of a network, including components like backboard networks and virtual networks.
Backboard Networks
Networks that connect different parts of an enterprise in one physical location, facilitating communication and data transfer.
Virtual Networks
Networks independent of physical wiring, allowing for reconfiguration using software and enhancing flexibility.
TCP/IP
Transmission Control Protocol/Internet Protocol, fundamental for network communication, and OSI models, essential for network design.
Reliable Data Movement
Ensuring efficient and secure transfer of data packets from a source to a destination, complying with organizational security policies.
Types of Networks
Categorized based on geographic span into Local Area Networks (LANs), Metropolitan Area Networks (MANs), and Wide Area Networks (WANs).
Internetwork
Interconnected networks forming a larger network, exemplified by the Internet, a global network of networks.
Internet Ownership
The Internet is not collectively owned but comprises networks owned by various entities, connected by Internet Service Providers (ISPs).
Backbone Network
High-speed network connecting local area networks within an organization, facilitating communication within the enterprise and beyond.
Wide Area Networks
Networks that connect far-flung locations of an enterprise.
Third Party Service Provider
A provider that offers wide area network services, similar to an Internet service provider.
Ethernet
A dominant technology for backboard networks, capable of running at various speeds like one gigabit per second, ten gigabit per second, or 40 gigabit per second.
Fiber Optic Cable
Utilized for higher capacity networks, removing distance constraints compared to copper wiring.
Backbone Network
High-speed connectivity in data centers connecting shared systems like servers, application servers, web servers, and database servers.
Switch
Device that connects computers into a network, commonly used in local area networks.
Router
Device that connects multiple local area networks together, used in larger networks.
Gateway
Router used to connect a network to another network owned by a different entity.
Routed Backbone
Moves data based on the network layer address (IP address) using Ethernet connectivity.
Virtual LAN (VLAN)
Assigns computers to LAN segments using software, dissociating physical layout from logical data flow.
Layer 2 Switch
Uses the data link layer or physical address to move data.
Layer 3 Switch
Uses the IP address to move data.
Triple IEEE 802.1Q
Standard for VLANs, specifying designs for single or multiple switch virtual LANs.
Port-Based VLAN
Assigns computers to LAN segments based on physical port numbers on the switch.
MAC-Based VLAN
Uses the MAC address to form virtual LANs.
IP-Based VLAN
Uses the network layer address (IP address) to form virtual LANs.
Application-Based VLAN
Combines layer four (transport) and layer five (application) for forming VLANs.
Port plus IP combination
Utilized to assign systems by grouping applications together based on ports and IP addresses for traffic control.
802.1Q
A standard that inserts a 16-byte tag into Ethernet packets for virtual LAN identification and traffic prioritization.
Access layer
The first layer in network architecture that connects devices to the network, such as laptops, servers, and application servers.
Distribution layer
Part of the backbone that links local area networks together within a building or cluster of buildings.
Core layer
Connects all distribution layers together and links the internal network to the external world, like the Internet.
Layer 2 switch
Typically used in smaller networks where individual devices connect directly to the access layer.
Layer 3 switch
Commonly used in larger networks to connect layer 2 switches and provide routing functionalities.
Backboard network
Connects multiple networks to form an enterprise network with access, distribution, and core layers for efficient data movement and security compliance.
Enterprise Network Architecture
The design and structure of a network that aims to efficiently move data while ensuring compliance with organizational security policies.
Zone Diagram
A logical network diagram that results from a secure network design process, illustrating how data moves within the network in compliance with organizational policies.
Security Zones
Logical entities containing one or more tiers that segregate and separate parts of the network, allowing for the definition and application of policies for risk mitigation at a zone level.
Tiers
Logical sets of systems collectively addressed as one, based on the function they provide, such as application servers or database clusters, designed for reliability, scalability, or redundancy.
Public Zone
A network area where corporate-owned systems available to the general public reside, lacking strict security controls and accessible externally.
Private Zone
A network area behind a firewall containing systems owned and controlled by the organization, allowing for the imposition of security standards and controls.
Host
Systems within the network, assigned to specific tiers within the private zone to facilitate the organization's control and management of its assets.
Zone Assignment
Process of assigning each tier to a specific zone based on restrictions and requirements.
Trust Level
The degree of confidence in the security and integrity of data within a specific zone.
Perimeter Zone
Area directly exposed to the public zone, containing systems like public-facing websites and communication devices.
Internal Zone
Area where internal systems and applications reside, including web applications, traditional applications, and data storage.
Core Zone
Central zone in enterprise computing, encompassing infrastructure, internet, application, and data zones.
Source Zone
Originating zone of data transmission.
Destination Zone
Receiving zone of data transmission.
Port Number
Specific numerical identifier for communication endpoints in a network.
Protocol
Set of rules governing data exchange between devices.
Transport Layer Protocol
Protocol responsible for end-to-end communication in a network.
Tiers
Different systems like Oracle, SQL, and IBM's DB categorized based on their level within the data zone.
PeopleSoft
Application used for HR services in the university.
SIS (Student Information System)
System where student records are maintained.
Quality
Financial ERP system used for managing university finances.
Laptops and Desktops
Client devices, with laptops posing security risks due to mobility.
Availability
Measure of system uptime, crucial for business continuity.
Downtime
Unplanned system unavailability, measured in a "nines" rating.
Default Deny
Security principle where only explicitly allowed traffic passes through the system.
Firewall
Device that permits permitted data and blocks unauthorized traffic.
Network Segments
Connectivity that links switches, routers, and physical systems together.
Logical Segments
Virtual lines defining network connectivity.
Physical Segments
Traditional LANs connecting physical systems.
Zone Diagramming
Logical way of creating network architectures with defined zones, tiers, and segments.
Microsoft Documentation
Basis for creating network architectures in a structured and secure manner.