Chapter 2
EXAM OBJECTIVES
Identifying the primary operating system components
Describing operating system interface features
Using Remote Desktop Connection and Remote Assistance
Working with virtualization
Identifying cloud concepts
Just as the engine is the driving force behind an automobile, the operating system (OS) is the driving force behind your computer. Your choice of engine in your automobile affects the performance of its system, and also affects what you can do with your vehicle. In a similar way, you will find that the performance and functionality of your computer are different if you use MS-DOS, Windows Vista, Windows 8.1, or some other OS.
The OS is responsible for several major functions on your computer. To manage your computer, the OS relies on its major components. This chapter examines these components and how they interrelate to effectively manage the computer. By the end of this chapter, you will be able to effectively choose from Windows Vista, Windows 7, and Windows 8.1 for your system. And because the A+ Exams focus on Windows Vista, Windows 7, and Windows 8.1, this chapter focuses on these three OSes.
As you read in the preceding chapter, the OS is responsible for two major functions: managing hardware devices and providing an environment in which applications can execute. One of the major applications that needs to execute is the user interface (UI), which lets users control all other applications and their execution. In the case of Windows-based computers, this UI — the shell — is Windows Explorer. So together with hardware, this software that makes up the OS is responsible for getting things done. The hardware and software get tied together in the location where everything happens: memory.
Memory is the playing field where hardware and software mix. Memory management is the responsibility of the OS. The OS makes sure that the hardware and software components work within their own confines of memory. As memory resources are requested, the OS releases them either to the hardware device driver or to the application. The OS then takes steps to make sure that the application accesses only the memory areas allocated to that particular application. If an application attempts to access memory not allocated to it, the OS has to decide what to do with the application, which is to deny access to the memory.
As part of memory management, the OS keeps track of physical memory on the computer as well as hard drive space used as extra memory available to the computer. Access time to physical memory is measured in nanoseconds, and access time to disk drives is measured in milliseconds. These scales are widely different, and so is the access time of information from these memory locations. Both types of memory are lumped together to make up virtual memory. Sometimes the term virtual memory is applied to the hard drive space used to simulate memory, but at the OS level, the term is used to refer to all memory available for storage on the system.
As applications launch and get loaded into memory, physical memory is used. When this space becomes limited, the OS moves some data from RAM onto the hard drive. The OS records the change in the actual location so that when the application requests that information again, the information can be moved back into physical memory and accessed.
No matter which OS you use, at some point you need to know its exact version number. This is often the case when you install new software, which requires a specific version of the OS. There are many methods for retrieving this information in Windows.
The System Control Panel or System Properties lets you know which version and service pack level of the OS you are running (see Figure 2-1). You can get to the System Properties dialog in the following ways:
In Windows 8.1, use the following methods:
System Properties will show you the version name, like Windows Vista or Windows 7, but starting with Windows Vista and newer OSes you need the System Information tool to locate the version number. To see this information in the System Information tool, choose Start ⇒ All Programs ⇒ Accessories ⇒ System Tools ⇒ System Information.
The System Information tool includes the version number in the main window (see Figure 2-2). The System Information tool can be launched through the Start menu prior to Windows 8.1, but in all versions of Windows you can use the Run command and type msinfo32.exe.
Some of the version numbers you might see are listed in Table 2-1. Notice that these version numbers are continuations of Windows NT version 4.0 in version and build numbers.
TABLE 2-1 OS Version Numbers for Modern Versions of Windows
Operating System |
Version Number |
Windows NT 4.0 Workstation |
4.00.1381 Build 1381 |
Windows 2000 Professional |
5.00.2195 Build 2195 |
Windows XP Professional |
5.10.2600 Build 2600 |
Windows Server 2003 Enterprise |
5.2.3790 Build 3790 |
Windows Vista Enterprise |
6.0.6000 Build 6000.16386 |
Windows Server 2008 Enterprise |
6.0.6000 Build 6000.16386 |
Windows 7 Enterprise |
6.1.7600 Build 7600 |
Windows Server 2008 R2 Enterprise |
6.1.7600 Build 7600 |
Windows Server 2012 |
6.2.9200 Build 9200 |
Windows 8.0 |
6.2.9200 Build 9200 |
Windows Server 2012 R2 |
6.3.9600 Build 9600 |
Windows 8.1 |
6.3.9600 Build 9600 |
Windows version numbers have three parts: the version number, the build number, and the Service Pack level (although not all tools will show you the Service Pack level). The version number (6.1 for Windows 7) will not change for the lifetime of the product. As patches and upgrades become available for the OS, Microsoft releases hot fixes. Hot fixes are listed in the Programs and Features Control Panel. When a sufficient number of fixes have been released, Microsoft releases a Service Pack, which incorporates most hot fixes as well as other unreleased fixes or features.
Windows changes the build number of the OS as you apply service packs. The two major parts of the build number do not change, so for Windows Vista they will remain as 6.0; the two minor parts of the build number change, so the minor version number for Service Pack 1 is actually 6001.18000.
After you know which version of the software you are running, you can take a look at what makes up your OS.
In the following sections, you briefly examine how applications actually run on Windows computers. For a more complete description of how applications are supported, see Book 6, Chapter 2.
Windows 2000 was a complete rewrite of the Windows OS, but at a risk of causing compatibility issues. When Windows boots, it immediately enters a 32-bit protected-mode or a 64-bit long-mode state. With a 32-bit processor, the entire OS operates from this 32-bit state, and the kernel is loaded into Ring 0, which Microsoft refers to as kernel mode (see Figure 2-3). All processes running in kernel mode are protected from any processes running in Ring 3, or user mode.
The kernel is the core part of the OS that controls everything else that happens on the computer. The kernel is responsible for keeping user-mode processes separated. Each application is started in its own area. One application is not directly allowed to interact with other applications and must pass such requests through Executive Services, which operate in kernel mode. This isolation of the applications from each other and from the rest of the OS is one of the keys to the stability of the current Windows system.
Kernel-mode processes are separated from user-mode processes but are vulnerable to corruption by other kernel-mode processes. The processor’s architecture is all that protects kernel-mode processes from each other, and it often fails in its job. This means that Stop events (the ones that cause the infamous Blue Screen of Death), which reboot the system, are usually caused by a conflict of the processes running in kernel mode. For more on Stop events, see Book 7, Chapter 2.
Windows uses hard drive space to extend the amount of memory available to applications. The total pool of available memory is the virtual memory page pool, or just virtual memory. Virtual memory, composed of physical RAM and hard drive space, is maintained by the Virtual Memory Manager (VMM). Figure 2-4 shows how these systems relate.
The VMM is responsible for keeping track of where different kinds of information are located in memory. As applications request to have information placed in memory, the VMM places the information in an area of RAM. If RAM is getting full, some information is moved from RAM to an area on the hard drive. The location on the hard drive is a swap file (in older version of Windows) or a paging or page file (current versions of Windows). As applications request stored data, the VMM moves information so that the data is available in RAM.
You configure the paging file in the System Properties. You might want to adjust the virtual memory settings because
Follow these steps to adjust how much virtual memory your computer uses when using Windows:
Click the Performance Settings button.
The Performance Options dialog box appears.
On the Advanced tab, click the Virtual Memory Change button (refer to Figure 2-4).
In the Virtual Memory dialog box that appears, you can set an initial and a maximum size for the paging file on each logical drive.
Adjust the settings as needed.
If you reduce the size of the paging file on your boot partition below the size of the physical RAM on your system, you are warned that some of the recovery options will be disabled. The paging file is used as a storage space for the memory.dmp file that is generated during a Stop error. As long as you have not undersized your boot partition, you should not have to worry about this too much, but in some environments, such as virtual machines, it is not uncommon to have the boot partitions undersized.
Just as many companies have different systems for filing data, with Windows you have several options when choosing a file system. MS-DOS offers the File Allocation Table (FAT), which started out as FAT12 and then became FAT16 in later versions of MS-DOS. Windows 95 then added to that base file system with FAT32. In between this time, the different architecture of Windows NT offers the New Technology File System (NTFS). The latest versions of Windows support all three file systems, and you get some control over how to use them.
When using Windows, your choices include FAT, FAT32, and NTFS. Table 2-2 summarizes some of the differences between the file systems.
TABLE 2-2 Differences between the Major Windows File Systems
File System |
OS Support |
Partition Size |
Max File Size |
NTFS |
All versions of Windows NT (including Windows Vista, Windows 7, and Windows 8.1) support NTFS, but there were major changes to the file system with the release of Windows 2000. Computers running older versions of Windows NT might not be able to access the files. |
10MB up to a theoretical limit of 16EB* |
Limited only by the size of the volume |
exFAT |
Originally released with a version of Windows CE and making its desktop debut with Windows 7. This file system was developed as an extension of the FAT32 file system to be used on removable media and in places where NTFS is inappropriate or unusable. Windows XP, Window Vista, and Mac OS X 10.6.4 have support for this file system. |
64ZB (512TB recommended)* |
64ZB (512TB recommended)* |
FAT32 |
FAT32 was released with Windows 95 OSR2, and all versions of Windows 9x after that support FAT32. Windows 2000 was the first OS in the Windows NT family to support FAT32. |
Up to 2TB,* usually used for FAT volumes larger than 512MB. Windows Vista, Windows 7, and Windows 8.1 will not format partitions larger than 32GB with FAT32. |
4GB |
FAT |
Accessible by all Microsoft OSes since MS-DOS, including all Windows NT–based operating systems. It is also widely supported by other OSes. |
Up to 4GB. MS-DOS and Windows 9x allow you to create FAT partitions only up to 2GB; Windows NT–based systems can create partitions up to 4GB. |
2GB |
*One terabyte (TB) equals approximately 1,000 gigabytes. One exabyte (EB) equals approximately 1 billion gigabytes, or 1 million terabytes. One zebibyte (ZB) equals approximately 1,000 exabytes. That’s a lot of memory!
In most cases, you want to use NTFS because it
Although some older applications might have compatibility issues with NTFS, these issues are rare. For more on file systems, see Book 2, Chapter 5.
Windows uses its Registry to record settings for applications and the OS. When people first started writing applications for Microsoft-driven computers, they usually needed to record a series of per-use or per-computer settings. In most cases, they wrote these settings to a file stored on that computer. This system worked fine most of the time, but the people who needed to manage those computers and applications found that some of these configuration files were binary files and some were text files, and occasionally they would get corrupted and be unusable.
To solve some of this confusion, Microsoft came up with a file standard that appeared when Windows was introduced to the world. The new solution was the INI (“innie”) file, which is a text file that uses sections, settings, and values stored in a standardized format. Because data is written and can be retrieved using a standard format, the OS can use standard procedures to store and retrieve the data rather than relying on each application developer to write his or her own procedures. Listing 2-1 shows a portion of a sample INI file that would have been opened in notepad.exe. For all text-based configuration files, you can make changes with notepad.exe or wordpad.exe.
LISTING 2-1: A Sample INI File
[Options]
WordSel=0
Units=0
Maximized=0
FrameRect=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
PageMargin=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
DefaultFormat=5
[Text]
Layout2=CAAAAAAAAAEAAAAAAADAAAAAAAAA
LayoutAux2=CAAAAAAAAAEAAAAAAADAAAAAAAAA
Wrap=0
BarState0=0
BarState1=0
[RTF]
Layout2=CAAAAAAAAAEAAAAAAADAAAAAAAAA
LayoutAux2=CAAAAAAAAAEAAAAAAADAAAAAAAAA
Wrap=0
BarState0=0
BarState1=0
With the release of Windows 95 and Windows NT, Microsoft programmers developed a new way to deal with this issue — they created a single location in which to store all configuration information for a computer: the Registry.
Like INI files, the Registry uses a standard format, breaking down settings into two basic categories: for computers and for users. Computer settings are stored in a section named HKEY_LOCAL_MACHINE, and user settings are stored in HKEY_CURRENT_USER. Application developers are encouraged to use this new location to store settings for their applications and have even been given a special software key to store their settings. It is up to the software developer to decide whether settings are user- or computer-based and to manage the settings appropriately.
All well-written programs should be using the Registry to store configuration information, but you may see INI files storing setup options for installer programs, or the similarly formatted INF files for drivers.
For detailed information about how to view and manage settings stored in the Registry, read Book 6, Chapter 4.
File and folder structure or paths is how you get around the disk system on your computer. Being able to get to the files you need when you need them is crucial. From the command prompt, you can work with cd (change directory) and dir (directory), which I cover at length in Book 5, Chapter 5. When you are using Windows, you can choose between Windows Explorer or File Explorer (not Internet Explorer) and Computer (or This PC in Windows 8.1). Either tool can be used for navigation, and your choice is purely preference. This section looks at these tools in a fresh (default) Windows installation using the default settings. If you have changed your settings, some windows might not be the same as I describe. When possible, I try to describe the differences among Windows Vista, Windows 7, and Windows 8.1.
Computer (or This PC for Windows 8.1) is the most common way people access files on their computers because it’s easy to find in the Start menu on Windows Vista and Windows 7. When you click Computer, a large window is displayed (as shown in Figure 2-5), listing the drives on your computer. You can then double-click your C: drive to see what files are located on that drive.
If you don’t like how the files in the Computer window are displayed, use the Views button on the toolbar to change the view from Icons to Thumbnails, Tiles, List, or Details. Thumbnails view allows you to see the contents of many files, such as graphics; Details view lists file sizes and modification dates, which is often useful when trying to locate specific files. The choice of viewing style is preference. Windows Vista and newer OSes add to your choice of views with Content and a variety of icon sizes (from small to extra large). Content will show details about the contents of your files, such as dimensions, file type, or size. The Thumbnails view has disappeared with the newer OSes, but do not fret, because for most graphic files, you can see the contents in the Content, Tiles, or larger Icons views.
In the address line near the top of the Computer window, you can type the name of the folder that you want to go to and directly switch to it. For example, you could type C:\Windows to switch to the Windows folder.
When you select an item in the Computer window, you see properties for that item at the bottom of the window in Windows. To display or hide the Preview, Navigation, or Details panes in Windows Vista or Windows 7, choose them from the Layout submenu of the Organize menu. In Windows 8.1, choose them from the View Ribbon.
To explore many of the options for displaying information in the Computer window, open the Folder Options dialog box from the Folder and Search Options from the Organize menu in Windows 7 and Windows Vista.
By the end of this section, you will see that Computer as an application does not actually exist. To open this application in Windows, choose Start ⇒ All Programs ⇒ Accessories ⇒ Windows Explorer. This opens the Windows Explorer program with the left pane — the Navigation pane or Folders Explorer Bar — enabled.
Now, you will see why a My Computer application does not really exist. If you select Computer in the Navigation pane, close the navigation pane, and change the view to Icons for both Windows, you will see that this window is the same as the Computer window. To show the Navigation pane, select Organize ⇒ Layout ⇒ Navigation Pane. The Navigation pane allows you to quickly move from one folder to another, or copy files from one folder to another without opening multiple windows. Many Windows users prefer the Explorer view to the My Computer view of their files.
In summary, both views of your files use the same program: Windows Explorer or explorer.exe.
The last way to get around on your computer is the oldest of the methods: the command line. While this may look like an old MS-DOS prompt, it is not. When you’re dealing with Windows, you are running the 32-bit or 64-bit command line application. This application can execute any command found on the system, but is most often used for commands without a Windows GUI component. Microsoft has command line tools available to perform most system management tasks from the command line, which is useful when troubleshooting or when creating scripts or batch files to perform tasks.
You access the command line in Windows Vista and Windows 7 by choosing Start ⇒ All Programs ⇒ Accessories ⇒ Command Prompt, or with Windows 8.1, by right-clicking the Start Menu and choosing Command Prompt. If you right-click it, you have the option of running it as the Administrator. Windows 7 and Windows 8.1 allow you to hold Shift while right-clicking a folder and choose Open Command Window Here instead of having to navigate to the path from a command prompt.
A computer’s configuration is very important for both cosmetic and functional reasons. In the following sections, you get a good look at the tools that you use to manage your system configuration.
Most settings for your computer are stored in the Registry, but the Registry is a place where if you make an error while making changes, it can require that you re-install your OS. To make your actions less prone to major errors, Microsoft created the Control Panel. The Control Panel contains applets that allow you to change many system settings without requiring you to make direct changes to the Registry. Control panel applets are the recommended method of changing most of your system settings. Table 2-3 provides a summary of each Control Panel applet and identifies on which OS(es) you’ll find them.
TABLE 2-3 Control Panel Applets
Control Panel Applet |
Description |
Add Hardware (Windows Vista) |
Runs a Plug and Play hardware detection of your computer to detect new hardware devices or allows you to manually select devices to install. |
Administrative Tools |
Opens a folder that contains the Administrative Tools for Windows. These tools allow you to configure, manage, and control your Windows computer. |
Date and Time |
Changes the system date, time, and time zone. |
Device Manager |
Views and changes settings for hardware and driver software. |
Ease of Access Center |
Changes settings for accessibility features for users with physical limitations. |
Folder Options |
Changes default folder options. These options are also available through the Windows Explorer Tools ⇒ Folder Options command. |
Fonts |
Displays a list of fonts installed on your computer, allows you to see what the fonts look like, and allows you to delete fonts from or copy fonts into the folder. |
Internet Options |
Configures Internet options and connection settings; clears your Temporary Internet Files and History folders. |
Keyboard |
Changes the sensitivity settings for your keyboard and the layout for your keyboard. |
|
Configures the mail system for the computer. |
Mouse |
Configures the orientation, motion, and double-click settings for your mouse. |
Network and Sharing Center |
Configures connections to your network or other networks. |
Program and Features |
Allows you to start the installation of programs, displays a list of installed programs that can be removed, and allows you to add or remove optional OS components (such as games). |
Personalization |
Configures display options. This includes video card settings, screen resolution, color depth (number of colors), and color scheme. |
Phone and Modem |
Configures dialing rules and modem settings. |
Power Options |
Configures power management settings for your computer. |
Printers (Windows Vista) Devices and Printers (Windows 7 and Windows 8.1) |
Adds, removes, or configures printer settings and queues. |
Regional and Language Options (Windows Vista) Region and Language (Windows 7) Region (Windows 8.1) Language (Windows 8.1) |
Configures the OS to support different currency, numeric, date, and time settings for specific countries; inputs and displays languages. |
Scanners and Cameras (Windows Vista and Windows 7) |
Configures installed scanners and cameras. For Windows 8.1, this is found in Devices and Printers. |
Scheduled Tasks (Windows Vista and Windows 7) |
Adds, modifies, or deletes scheduled tasks. |
Security Center (Windows Vista and Windows 7) Action Center (Windows 8.1) |
Configures and reviews security settings for the computer, including antivirus, Windows Firewall, and automatic updates. |
Sound |
Sets sounds for system events, such as “window open” or “new mail”; configures audio or multimedia hardware. |
Speech Recognition |
Changes settings for text-to-speech systems or for voice recognition. |
System |
Configures advanced system settings for hardware and performance. These settings cover hardware profiles, found in Book 6, Chapter 1; remote settings; and system protection, found in Book 7, Chapter 3. |
Taskbar and Navigation (Windows 8.1) |
Configures settings for how items are displayed in the Taskbar and on the Start screen. |
Taskbar and Start Menu (Windows Vista and Windows 7) |
Configures settings for items displayed in the Taskbar and the Start menu. |
Troubleshooting (Windows 7 and Windows 8.1) |
Common interface for launching a number of troubleshooting wizards to fix common Windows problems. |
User Accounts |
Configures user profiles and user settings. |
Windows Defender |
Offers protection against malware, Trojans, and unwanted software. |
Windows Firewall |
Contains configuration settings for the Windows Firewall that comes with Windows XP Service Pack 2. |
Windows Update |
Configures the Automatic Update service on Windows and allows you to choose how and when your updates are installed. |
All versions of Windows support several power options:
Sleep/Suspend: Sleep is a low-power configuration that powers down most of the components of the computer, but leaves some power running through the system memory. When the computer is activated again, all devices are powered back up and the system resumes normal operations. When the system is in Sleep mode, if power is lost, the data in memory is lost.
Windows 7 supports a setting called Hybrid Sleep, which puts the computer into Sleep mode and then writes memory data to the hard drive, in the same way as if it were preparing to hibernate, so that if power is lost, the contents of memory are still available. In Hybrid Sleep mode, the computer will resume quickly as in normal Sleep mode. Windows 8.1 always uses Hybrid Sleep mode as its Sleep mode.
Windows Vista has the following new Control Panel applets:
Windows 7 has the following new Control Panel applets, which continue in Windows 8.1:
One common complaint about earlier versions of Windows was that you had to use a different management tool for every task. For example, Windows use to have separate tools for managing every aspect of the server or OS, from managing users or computers in a network domain and locally on the computer, tools for managing performance, and tools for managing disks and disk partitions. With Windows 2000, Microsoft took steps to consolidate these disparate tools with the Microsoft Management Console (MMC), and although it has been upgraded, the MMC remains the main management interface for all newer versions of Windows.
The MMC is a framework into which other tools — snap-ins — can be loaded. All items that you see in your Administrative Tools folder represent MMC sessions configured with preset snap-ins. To see the raw interface, run mmc.exe from the Run command or from the command line.
To help you keep an eye on programs running on your computer and to allow you to switch quickly between running programs, Microsoft created the Taskbar. Its default location is at the bottom of the desktop, but it is movable. The left end holds the Start menu, and the other end holds has the notification area, which was formerly called the system tray, or Systray. The space between holds tiles representing running applications.
Right-click an empty area of the Taskbar and choose Properties to modify settings for the Taskbar and the notification area, such as auto-hiding the Taskbar, displaying the Quick Launch toolbar, grouping buttons, showing the clock, and hiding inactive icons.
If all the items on your desktop were missing, you would still be able to accomplish all that you need to do via the Start menu. Windows Vista streamlined the Start menus, providing an integrated Run/Search command and removing “Start” from the menu name (displaying only the Windows logo). With the variety of Start menu customizations that are available to you, you can still make the Windows 7 Start menu operate like older versions. Windows 8 further enhanced the experience by delivering the Start experience as an entire screen. For people missing the Start button, Microsoft reintroduced it in Windows 8.1, although still linking it to the Start screen, and Windows 10 reintroduced a greatly enhanced Start menu.
The Start menu, like its name suggests, can be used to start most applications on your computer. Contrary to its name, you can also use it to shut down your computer.
There are a number of tasks that you can perform on a remote computer, such as modifying files, changing printer settings, or editing the registry; but there are times that you want to launch and run applications on that computer, and it is at these times you would use Remote Desktop Connection to connect across a network to another computer and remotely take over the desktop or console. See Figure 2-6. The technology in use is the Remote Desktop Protocol (RDP) from Microsoft, which defines how to send key strokes and mouse movements across a network from one computer to another computer, and how to have what is displayed on the screen of a computer sent to another computer. Using these mechanisms, you can remotely use another computer on your network, just as if you were sitting in front of that computer.
From a computer running Remote Desktop Connection, you can connect to a virtual desktop on a server running Windows Server, which can support hundreds of remote users simultaneously. Or, you can connect to the desktop of a Windows Vista, Windows 7, or Windows 8.1 (not Home or Core editions) computer. In either case, you can run applications on the remote computer as if you were sitting at the computer. Your computer passes mouse movements and keystrokes up the remote computer, and you see virtual screen shots of what is happening on the remote computer screen. Note: These are virtual screen shots and not really what is happening on the screen; what you are seeing does not appear on the remote computer screen.
You can find Remote Desktop Connection in the Start menu under All Programs ⇒ Accessories ⇒ Communications, or you can launch it from the Run command by typing mstsc.exe.
To configure access to your computer from a remote computer, either by a Remote Desktop connection or a Remote Assistance connection, you will use the Remote Settings tab of the System Control Panel applet. To open these settings on Windows Vista or Windows 7, choose Start, right-click Computer, choose Properties, and choose Remote Settings. This dialog box allows you to have Remote Assistance sessions, as well as allows the ability to have Remote Desktop session connections to your computer. The Remote Desktop session can also be restricted to the newer and more secure version of the Remote Desktop Connection client software.
Remote Assistance allows you to ask for or provide help to another person using a distant computer by watching what that user is doing, or by taking control of that computer and having the user watch you.
Remote Assistance uses RDP just like Remote Desktop Connection, but the implementation is very different. As a CompTIA A+ Certified Professional, you will often be asked to help a remote user perform a series of tasks. Many users just need a bit of extra guidance to complete a task, or have a question about something onscreen. After being involved in many telephone conversions with remote users, I can honestly say that a picture is worth a thousand words — sometimes even two thousand. Having the user show you exactly what is happening — or being able to show the user exactly what to do — can save a great deal of time.
Here’s how Remote Assistance works:
With Windows Vista, you see a link for Windows Remote Assistance; and in Windows 7, click More Support Options to see a link for Windows Remote Assistance, for Windows 8.1, Step 1 brings you to this point. When the user chooses this and invites you to help, the user has the option of sending an invitation through Windows Messenger or email, or by saving the invitation to a file. Windows 7 adds a key-based Easy Connect, where you simply need to provide the helper with your key.
Regardless of the send-message method used, an invitation file is generated, and this invitation is key to the Remote Assistance system.
The Remote Assistance application also provides a chat section as well as a section where you can see and/or control the remote system, as shown in Figure 2-7. Unlike Remote Desktop Connection, with Remote Assistance, both the local and remote user can see what is going on with the problem computer and can communicate with a built-in Chat application.
File structure and path knowledge is important when using a computer. This section looks at these from a Windows perspective. Many types of files are stored on your Windows computer, and most of these files have standard locations where you can expect to find them. This section looks at the major types of files.
Since Windows NT 4.0 was released, all user-related files have been placed in C:\Documents and Settings, with each user having a folder in that directory. This location holds all files related to or that are personal to that user. This user-specific folder is called the user profile, and it includes the following folders (some of which are hidden by default):
Windows Vista and newer OSes have the same basic structure, but they store all this data in the C:\Users folder.
In addition to a number of user useful programs, the Windows OS has certain files required to make the computer operate. The files that are required to make the computer operate are found primarily in the Windows directory. Without these files, the OS would not function. For several generations of Windows, these files have been stored in the folder named C:\Windows. Two main sub-directories, named System and System32, hold critical files for the OS, such as DLLs. 64-bit computers have an additional folder, called SysWow64, to hold DLLs and OS files. These sets of system files allow 32-bit Windows to run both 32-bit and 16-bit applications, while on 64-bit Windows, you are able to run 64-bit and 32-bit applications, allowing for some level of backward compatibility.
Each font or typeface in use in the OS has its information stored in a file in C:\Windows\Fonts. There is one file for each version of each typeface. Font files typically have one of two file extensions: .ttf or .fon.
Temporary files are stored separately for each user within his or her user profile directory. This allows for security to be placed on each user’s temporary files, allowing these temporary files to be kept private and any sensitive data to be kept secure.
As I mention in the preceding section on System files, some files that ship as part of the OS are critical to the functioning of the OS, but other files that ship as part of the OS are not. For example, Wordpad.exe and MSHearts.exe are part of the OS (and are useful and fun), but the OS would continue to function without issue if these files were missing. The majority of these noncritical files are stored in the Program files directory, which is C:\Program Files, but if you are using a 64-bit version of Windows, you will find these files in either C:\Program Files or C:\Program Files (x86), depending on whether the application is 32-bit or 64-bit.
When accessing files on a shared folder of another computer over a network, Windows can sync these files automatically to your hard drive. When this happens, the files are put into a folder, but you can still refer to them using their original path, such as \\<Server>\<Share>\<Synced File>. These files are stored in a cache, which has a finite size. As total storage reaches the limit of the cache, the oldest nonchanging files are flushed to make room for new files.
You will find many new features and functions with Windows Vista, Windows 7, and now Windows 8.1. The following sections introduce you to some of the features that are most important.
Windows Vista introduced the world to the Aero Desktop, which allows visual effects such as animations, transparent windows, custom tints, and thumbnail previews, Aero Snap, to list just a few.
Windows Vista introduced the Sidebar and Gadgets, which allow small applications to display various types of information in an area on the side of your screen. These applications include calendars, resource monitors, weather apps, slide shows, and currency converters. Windows 7 takes this a step further by not limiting the gadget area to the Sidebar. Windows 8.1 removes the Sidebar and Gadgets due to a security risk in their privileged status. You find more coverage on the Sidebar and Gadgets in Book 5, Chapter 1.
To increase security and reduce the risk of accidental changes happening on your computer, Microsoft has introduced User Account Control (UAC). Many of the changes you make on your computer can have serious implications to the overall system stability. When UAC is enabled, all major system changes require acknowledgment before committing to changes. When configuration applications are launched, or when changes are detected, UAC presents a confirmation dialog box. To find out more about UAC, review Chapter 2 of Book 9.
Windows 7 Ultimate and Enterprise editions include BitLocker Drive Encryption, which is a low-level hard drive encryption component that can encrypt the entire contents of a disk volume. After you enable this feature, all files that you save to your hard drive volume are automatically encrypted. While you can access these files without additional effort, others will need to enter your password to gain access to the files. Not only are you able to encrypt volumes on your internal drive, but BitLocker-To-Go also allows you to encrypt a removable flash drive.
The ReadyBoost feature is an example of a little going a long way. On a computer with a standard hard drive, there is a penalty every time you read data from the drive, due to the rotational nature of the drive, which means the heads of the drive need to wait for the data that you are looking for to be present under the drive heads. This is called seek time. SSD (Solid State Drives) do not have this problem as data is stored in flash memory rather than on disk platters. Drive manufacturers use small amounts of fast cache memory to offset the issue through a system of read-ahead caching, where the drive guesses what data you want next by using a formula or algorithm.
ReadyBoost take read-ahead caching a step further by allowing you to attach flash media to your computer (in the form of USB flash drives, SD cards, or CompactFlash), and then using that media as additional fast cache memory. By increasing the amount of cache you have available, Windows 7 increases the effectiveness of read-ahead caching.
To enable or disable ReadyBoost on your flash media, use the Ready Boost tab from the media Properties dialog. To open the Properties dialog, right-click the drive in Computer and select Properties.
Shadow Copy is a feature introduced in Windows XP and sometimes referred to as the Volume Shadow Copy Server (VSS). VSS is an application programming interface (API) that supports copying data at a low level of the file system. It offers the benefit of being able to copy files that are open and being accessed, which it does by temporarily placing the files in a locked state. The magic of VSS is how it instantaneously locks the drive, but then creates a copy of any files to which a write or commit data operation is issued. When the write operation is requested for a file, VSS then creates a copy of the file in the VSS cache before actually performing the write operation to the file on the disk. This action is called copy on write.
In addition to the core API, VSS copies of drives can be scheduled, which causes any new file writes to be committed to a new copy of the files. This is managed on the fly at the file system level.
Windows client operating systems have a system of restore points that are created automatically or manually to manage system files, the user’s files are not touched in this process. Automatic restore points are created when major events happen, such as application installations, driver installations, or other similar events. Users can manually trigger the creation of a restore point by using the System Protection tab of the Advanced System Settings of the System Control Panel.
This restore point process is tied to VSS, which is the service that is used to create the backup files. The process of reverting to a restore point is called System Restore. Full coverage of recovery points and the System Restore process is found in Book 7, Chapter 3.
With each new version of Windows that arrives on the market, some applications do not operate in the new OS. To assist with getting these applications to work, Microsoft offers a series tweaks that can be enabled for the application through its Properties dialog box. These options have been growing since Windows Vista.
Compatibility Mode, as the name suggests, is about making the OS more compatible with the application. As the Windows OS evolves, changes are made in how it manages the display resolutions and with many internal system processes. These changes sometimes cause older software to not run quiet correctly — like changes in car models from one year to another that may cause old accessories to not fit properly in the newer models. The best solution is to upgrade to the latest version of the software, but when that is not an option, you can use Compatibility Mode to try to continue do things in the older version of the software that does not work with the newer OS. More on Compatibility Mode can be found in Book 6, Chapter 2.
Taking application compatibility further, Windows 7 offers the addition of the Microsoft Virtual PC (Microsoft’s desktop virtualization hypervisor) with a copy of Windows XP installed. This Virtual PC is used to run Windows XP–compatible applications in a seamless window on a Windows 7 computer. You can read more about XP Mode in Book 6, Chapter 2.
Upgrading to a new computer can be a large pain. Windows Vista had the File and Settings Transfer Wizard, which has been dramatically improved with Windows 7 and Windows 8.1. The new version makes it easy for you to transfer your files, email, pictures, and settings from your old computer to your new computer. While this tool comes with Windows 7, you can download components for older versions of Windows, such as Windows Vista, allowing you to transfer your information to your new Windows 8.1 computer. Easy Transfer adds a friendly front end to the User State Migration Tool (USMT), which is used in large enterprises to migrate user settings.
When you have programs you run frequently, it can become a pain to constantly locate these applications in the nested Start menu or Start screen. Many people used to take the applications they use on a regular basis and put shortcuts on the desktop, but to access them users still had to minimize the open windows to get to the desktop. Windows Vista and Windows 7 maintain a dynamic list of recently used applications in the Start menu, but there are a limited number of items that are kept in the list. To solve this, Windows Vista enables you to pin items to the Start menu so that they are always available right on top of the menu.
This feature is also available in Windows 7 and Windows 8.1 (where you pin to the Start screen). Windows 7 and Windows 8.1 give you the added option to pin application shortcuts to the Taskbar, making them even more easily available to you — no window minimizing at all.
As part of the Microsoft tool consolidation process, the Security Center represents Windows Vista’s one-stop security shop. By opening the Security Center, or by paying attention to the warnings in your system tray when you have a problem, the Security Center attempts to keep your computer safe. If any of the four security categories is not functioning correctly, a red shield icon shows up in the system tray. The four categories of security items are as follows:
Windows 7 and Windows 8.1 provide all this information in the Action Center under a Security category, with the same data broken down in the categories of Network Firewall, Windows Update, Virus Protection, Spyware and unwanted software protection, Internet security settings, and User Account Control.
Many components of the Windows OS log information when certain events happen. The events may be informational, warnings, or critical items. Windows logs them to one of three logs: System, Security, or Application. These logs can be viewed with the Event Viewer, which is found in the Administrative Tools folder and is discussed in depth in Book 6, Chapter 4.
All versions of Windows based on the NT base have included Administrative Tools, which is a folder (now located in the Control Panels folder) that contains the main tools for administrating a Windows computer. In addition to the Event Viewer, many administrative tools are covered throughout this book. These tools include Component Services, Computer Management, ODBC Data Sources, Event Viewer, iSCSI Initiator, Local Security Policy, Performance Monitor, Print Management, Services, System Configuration, Task Scheduler, Windows Firewall, and Windows PowerShell.
With every generation of the Windows OS, the number of Control Panel items grows. To deal with this sprawl, Microsoft created Category View for the Control Panel. This view takes all the icons and places them within eight to ten categories (depending on the OS). Windows 7 and Windows 8.1 use these categories by default: System and Security; Network and Internet; Hardware and Sound; Programs; User Account and Family Safety; Appearance and Personalization; Clock, Language, and Region; and Ease of Access. All the other Control Panel applets are placed into one of these categories.
While the Category view was designed to make Windows easier to use and navigate, users familiar with the old, flat folder structure can be at a loss to find what they are looking for. Because of this, you will find an option in Windows Vista to switch to Classic View, which simply shows all the Control Panel applets by name. In Windows 7 and Windows 8.1, you find a small menu giving you the options of viewing by Category, Large Icons, or Small Icons (where the icon views are equivalent to Classic View). Old habits die hard sometimes.
Virtualization refers to the creation of one or more virtual computers to run software existing on the physical computer. The computer that plays host to these virtual computers runs a piece of software called a hypervisor. The hypervisor manages the virtual computer, which, like a physical computer, is made up of a processor, RAM, hard drive, and other peripherals, but limits exist as to what hardware can be virtualized. The hypervisor starts the virtual machine and allows the installation of an OS onto the virtual computer.
Many modern processors and motherboard BIOS/UEFI configurations now have virtualization options that must be enabled if you are going to run a hypervisor on them. In some cases, your software will not install if these options are not enabled, and when this happens, it will usually tell you in the error message that the BIOS settings must be enabled to permit installation or operation.
From a management perspective, each of these virtual computers is a full-fledged computer running an OS. But in actuality, all the running virtual computers are sharing the resources of the host computer running the hypervisor. Some common desktop hypervisors include the following:
When dealing with the large scale virtualization of your servers, your company datacenter will be filled with powerful servers, virtualizing other servers. Some common datacenter hypervisors include:
Whether on the desktop or the server, the main purpose for using virtual machines is for resource management or simulation of networks. When you run a virtual machine on a virtual server you call the virtual machine the guest, while the server is referred to as the host. When you virtualize computers, you gain the following advantages:
When planning a virtual server environment, there are a few things to remember:
By using virtual computers, you are able to create an entire test lab of servers and workstations on a single computer. While this is possible, remember that each virtual computer you start up is going to attempt to use resources of the host to perform operations. So if I have a computer with 8GB of RAM and I start up three virtual computers, each using all of an allocated 2GB of RAM, I only have 2GB of RAM for operations on my computer. Many hypervisors allow me to oversubscribe, so I could start up six computers, each with 2GB of RAM, on my 8GB computer. But as you can guess, if they all try to use all their memory, my host computer will start paging a substantial amount of data to the hard drive, slowing all of the virtual computers. This issue of resources is not only true about RAM but also CPU cycles, disk access, and network access. Oversubscribing is possible, but you should avoid it if you want good performance.
Cloud computing is the practice of using a network of remote servers over the Internet to store and access data rather than a local hard drive. The National Institute of Standards and Technology (NIST) defines cloud computing as a computing model that adheres to the following five principles:
You will find that all major providers of cloud computing solutions include these five components.
Take a look at Figure 2-8 and focus on the first column of boxes. This column represents all of the layers that make up a server (or group of servers) hosting an application. From the bottom up, resources are broken into three main layers, or categories:
These layers make up most server-based applications in a corporate environment. These applications run such business operations as production scheduling; assembly lines; budgeting, payroll, and enterprise accounting systems; customer relations and tracking systems; sales; and invoicing. These systems are typically run by the internal IT department, and the cost of purchasing and operating the equipment is either absorbed as overhead or charged back to the department using the equipment.
When you set up a method to separate department services onto different virtual servers and provide the departments easy methods of provisioning their own virtual servers, web applications, and other resources, you have created a cloud-like environment — a private cloud — inside your own private network. There is nothing too crazy about a private cloud; in fact, some companies may be providing it without using the name.
The public cloud by comparison moves the computing infrastructure outside of your private network and to a public cloud service provider, or in some cases to a smaller company that provides the hosting of your virtual infrastructure. (The following section covers the three main public cloud offerings in more detail.)
So you have seen private cloud and will see public cloud; so where does a hybrid cloud fit into the picture? If you choose to move only some of your infrastructure and services to a public cloud provider, you are in a hybrid state, with both public and private clouds supporting part of your services. For some organizations, a hybrid cloud is an end state, while for others it is a transition state between private cloud and public cloud.
The final cloud option is a community cloud, which refers to a cloud-services solution set up by a group of organizations. Unlike setting up their own private cloud solution, which may be too large for them individually, the cost of the cloud infrastructure is shared among all members of the community. Usually these organizations already have a close working relationship and common security goals or needs, which makes sharing the infrastructure easier.
Figure 2-8 shown earlier illustrates the components that make up any server-based solution, from the network to the servers to the databases to the front-end applications and their data. These components are the same whether you are managing the whole show, or whether you have someone else managing it. But there may come a time when you feel it is easier and cheaper to get someone else to manage those components. The following sections outline three public cloud offerings.
Infrastructure as a Service (IaaS) is a form of cloud computing that uses virtual machines managed by someone else, like Microsoft Azure. This means that you choose a level of virtual machine you would like, and the IaaS provider will provision or create and prepare it for you. Your virtual machine files need to be stored someplace and needs some network connectivity, so prior to choosing your machine, you should create a storage location (a few menu clicks) and set up a virtual network (a few more menu clicks). If you do not set up these items, they will be automatically created for you by your IaaS provider, but there may be some restrictions you do not want.
So in the end, you will have a virtual machine (VM) running on a Microsoft Hyper-V server hosted in a remote Microsoft datacenter. You can now use Remote Desktop Protocol (RDP) to connect to your new server and do whatever you need to have your required software to function. Microsoft takes care of the host that is running your VM and relocates the VM to a different host when the current one needs maintenance or needs to be rebooted. It also takes care of your storage and networking needs, so again you have no management responsibility. You are only responsible for what needs to be on the server console, such as patching, defragmenting the disks, and other actions you would take care of at the OS level.
There is a cost for this service, which will vary depending on whom you use for your cloud provider. Microsoft will charge you a little bit for the memory and process cycles you are using when your VM is running, a little bit for the amount of storage you are using, a little bit for any data you transfer out of the server (but not into the server), and a little bit for any licensed software it provides. For example, if you choose a Microsoft SQL server from the catalog of pre-built VMs, you will pay a usage fee for the Windows OS and for the Microsoft SQL server, but if you choose an empty VM and install your own licensed Windows OS and Microsoft SQL server software, your usage costs will be less.
Now I like food, so to put this in food terms, if I am going to make a turkey dinner, I can go buy the turkey, carrots, potatoes, and so on, and bring it all home and cook it. One year my stove stopped working so I brought my ingredients to my sister-in-law’s house to use her stove — her infrastructure with my food. After cooking on her infrastructure, I was able to take my meal home and eat at my table. The end result was I still got turkey dinner at Thanksgiving, but I did not have to worry about electricity, repairs to the stove, and eventual replacement of the stove. This is IaaS: the use of someone else’s infrastructure to support your server.
IaaS is one area where you will see a lot of Hybrid Cloud implementation, as you are able to create synced copy of your Active Directory user accounts in the cloud, or you may want to create a site-to-site Virtual Private Network (VPN) to your cloud based servers, making them an extension of your corporate network.
Another public cloud offering is Platform as a Service (PaaS). With PaaS, you take this movement of responsibility one step further than IaaS: You give up detailed access to the OS and its management. Now you could create a server using IaaS, install IIS, .Net, a simple database to store user settings, and install your web-based application or service on top of that, but if you are primarily a web-developer or an overworked IT administrator, that takes time and requires ongoing maintenance. PaaS is the solution. When you go to your cloud provider, perhaps Microsoft Azure, you can choose to create an App Service or Cloud Service, both of which are web-based applications. By choosing this option, you have now removed the server administration work from maintaining this application. You no longer need to patch the server, manage the drives, or perform other mundane tasks; you only need to worry about your application. Your costs again vary by the size or power of the server that hosts your web application, but you no longer need to worry about the details of server management.
In terms of my turkey dinner, with PaaS, I choose to buy a prepared and already stuffed turkey and premade salad, potatoes, and vegetables. I return to my sister-in-law’s house to heat the meal, so I still do not have to worry about the infrastructure. In the end, I return to my house to eat and clean my dishes.
The third public cloud offering is Software as a Service (SaaS), which takes software and server management, or lack of management, one step further. SaaS is a software licensing and delivery model. With SaaS you are only concerned with what the software can do for you, and not how it does it.
One example of SaaS in action is using external email through Microsoft Office 365 or Google Apps. In this case, I can still use my email client or a web interface to get my mail. I don’t have to worry about Microsoft Exchange servers, managing and patching the server OS, high-availability options, hardware replacement, or anything else involved in managing a Microsoft Exchange server farm. Another example is using a contact management solution through SalesForce, which involves no infrastructure on your end. Simply by filling out a few web pages you can be running a contact management server completely managed by someone else in the cloud.
To continue the food example, I now choose a nice restaurant and go out for turkey dinner with all the fixings. It is not exactly like the dinner I would cook, but I did not have to buy and prepare the food, buy an oven to cook it in and plates to serve it on, or clean everything up after the fact.
This chapter takes a look at the major functions of a Windows OS. To be prepared for the A+ Exams, you should remember the following:
1. Phil is using a Windows 7 computer and has run into a problem. He has called you on the phone and has asked for you to open a Remote Assistance connection to his computer to walk him through the solution. What is the first step that you must take?
(A) Open the Remote Desktop Connections program.
(B) Ask Phil to choose Help and Support from the Start menu.
(C) Ask Phil to run geninvite.exe from Start ⇒ Run.
(D) Open the Remote Assistance program on your computer, File ⇒ Connect to computer, and choose Phil’s computer.
2. You have been asked to explain virtual memory to an executive in your company. You tell him that virtual memory is composed of which of the following? (Choose all that apply.)
(A) Physical memory
(B) Extended memory
(C) Hard drive space
(D) Compressed memory
3. Bill is looking to see whether he has Service Pack 1 installed for Windows 7. He went to the System Information Tool located at Start ⇒ All Programs ⇒ Accessories ⇒ System Tools. Is there a quicker way he could have found out this information?
(A) He could have used the Run command to run systemtool.exe.
(B) He could have right-clicked My Computer on the desktop, or from the Start menu, and chosen Properties.
(C) He could have used the command line tool ver from any command prompt.
(D) There are no other locations in the OS where this information can be displayed.
4. Your computer has just suffered from a Stop event (also known as the Blue Screen of Death). You are trying to decide what has caused the error. What is the most likely possibility?
(A) A multimedia application
(B) A background application
(C) A network error
(D) A system device driver
5. Bill is setting up a computer that will be used to boot into several different operating systems. He would like to have one partition used for sharing or transferring data between the OSes. What file system should he use?
(A) FAT
(B) FAT32
(C) NTFS
(D) Reiser FS
6. What tool combines all Windows configuration and management tools into one place?
(A) Computer Management
(B) Administrative Tools
(C) Microsoft Management Console
(D) Administrative Command Interface
7. What is the main protocol that is used by both Remote Desktop Connection and Remote Assistance?
(A) Dec/Net
(B) 802.11g
(C) SNMP
(D) RDP
8. You have been asked to evaluate virtualization solutions to be deployed in your corporate datacenter. Which one of the following is a solution you may consider?
(A) Citrix XenApp
(B) Microsoft Hyper-V
(C) VMWare Workstation
(D) Microsoft Remote Desktop Connection
9. The options on the left are the available components in an IaaS solution. Fill in the components in their correct location in the IaaS server model. Each choice will be used only once.