Solaris-win2000 Server Term Paper 10 pages

Solaris-win2000 Server

Solaris and Windows 2000 are both options chosen by many people as server operating systems. However, while intended to serve the same purpose, these are far from being copycat versions of the same operating system packaged and marketed by different corporations. Both systems will host various types of networks, but on Windows components interact at a very low level, while on Solaris components interact at a much higher level. With Solaris converting its licensing terms to open source, Windows remains a far more expensive and inferior choice for many reasons which will be detailed in this comparative and informative paper.


Solaris and Windows 2000 server are both popular server operating systems, however, it would be difficult for two systems to be more different. Solaris is the product of combining Berkeley Software Distribution and AT&T System V Unix. Windows 2000 is an evolved version of Windows NT, which contains technologies from DOS and OS/2, with some inspiration from VMS. Both systems are suitable for hosting various types of network services including web, print, file and database applications. Windows is a tightly integrated system which allows components to share data and interact at a very low level. Solaris is highly modular; components interact at a much higher level by passing data as plain text. Windows has several different ways of abstracting hardware configuration and system configuration. Solaris uses human-readable plain text files for configuration and represents hardware devices as files. Solaris offers support for much more powerful hardware than Windows 2000 does, as well as three major architectures instead of only one. Until recently, Windows 2000 and Solaris had similar licensing term, charging different fees based on the number of processors in the server and the number of clients that need to access it. Sun is switching Solaris to an open source license, offering the software free of charge and earning money from support contracts. Solaris support contracts are significantly less expensive than Windows 2000 licenses. Solaris offers improved data integrity relative to Windows 2000 due to the features of both of the primary filesystems available compared to NTFS. The Solaris system of text-based configuration files is also more robust and easier to back up than the Windows 2000 registry. Solaris is a technically superior operating system; Windows 2000 Server should only be used in cases where specific software that requires it is needed.

Windows 2000 and Solaris both offer the ability to provide a wide range of services to clients running on a variety of platforms. Windows 2000 is optimized for providing file, print and directory services to Windows clients. The Samba software provided with Solaris for file services to Windows clients outperforms the built-in file sharing on Windows Server by a factor of 2.5. Solaris is designed to perform well for a variety of applications, especially databases and web serving. Solaris has traditionally been the platform of choice on which to host large databases. Windows 2000 can be used to run large databases as well, but does not approach the functionality of Solaris.

Windows 2000 Server runs on servers based on personal computer technology. Intel x86 and compatible processors are the only ones supported. Up to 8 processors and 8 gigabytes of memory are supported on generally available versions of Windows 2000 Server. The limited-availability datacenter version supports up to 32 processors and 32 gigabytes of memory. Solaris ships on servers with 128 processors and 512 gigabytes of memory. In addition to Intel x86, Solaris fully supports the next-generation x86-64 architecture and Sun’s own UltraSPARC line of RISC processors.

Unix was designed from the beginning for simplicity. Everything on the system is represented as a file. Device drivers abstract hardware as files; applications interact with hardware by reading from and writing to the device files. Configuration is stored by the system and applications in plain text files. These text configuration files are readable by the administrator, allowing any application to be reconfigured manually. Unix configuration files allow internal documentation through the use of comments. Comments are lines in the file that are ignored by the program when loading it. Most default configuration files contain comments explaining how to edit the file. Administrators writing complex configuration files usually write comments explaining how and why a certain configuration is used as hints to themselves and future users for future troubleshooting. Plain text files are scriptable by nature, allowing administrators to create a general setup, then have a script automatically configure the details specific to a given environment. Configuration files for more complex software are often written in turing-complete programming languages, which means that behaviors that the software’s authors could not envision can be expressed in the configuration file. A common example is mail server software. Routing of electronic mail has become exceedingly complex; an open-ended configuration syntax is the only way to allow administrators to express the required options. For this reason, most mail servers running Microsoft Exchange, which does not use this type of configuration file are positioned behind a Unix mail gateway running Sendmail, Exim or Postfix, which do. Text configuration files are easily backed up, copied between different physical and virtual machines and restored. Corruption of configuration files by programs is rare because they are easy to check for syntactic correctness. In the rare event that a file is corrupted by a program, or the more frequent event that it is corrupted by a careless or incompetent administrator, it can be easily repaired by a competent administrator with a simple text editor.

Windows 2000 stores most of its configuration information in a binary database called the registry. Values are generally put in to the registry by graphical configuration screens within Windows and third-party software. Manual editing of the registry is possible, but generally difficult for several reasons. First, there is no provision for comments or any other type of internal documentation; information about registry keys must be in an external source of documentation, which frequently does not exist or is not made available to the public. Second, registry keys usually have fewer contextual hints as to their meaning than configuration files. Third, the registry requires specialized software to edit; generic tools like text editors cannot be used. Windows 2000 does provide options for backing up the registry, however it does not make backing up specific sections easy. A complete registry cannot be transferred to another machine unless the hardware and software environment is identical. Despite the fact that such copying is technically possible under the ideal circumstance of identical servers, it can create legal problems with licensing. Windows, and many third-party programs store license information in the registry, and provide no standard way to enter separate licenses for each machine when the registry has been copied. It is generally possible to manually edit the registry on each server and enter unique license codes, however, the location of the keys containing the license information for each application is unlikely to be well documented. It is possible to script any registry change that can be made manually, however, determining what changes to make with a script has all the problems that making manual changes does. The registry is prone to corruption, and once corrupt is difficult or impossible to repair. Even Microsoft believes that the registry is suboptimal; Unix-like text-based configuration files are planned for the next version of Windows.

Solaris is made up of multiple components, most of which are optional. Most servers, for example do not require a graphical user interface, and Solaris does not require the administrator to install one. Windows 2000 does not allow users a choice about the installation of most components. Not only is a graphical interface required, but a web browser and a media player are tied to the system. No serious system administrator would surf the web and watch videos on a server. To make matters worse, Internet Explorer and Windows Media Player are a constant source of security holes in Windows. No software sufficiently complex to be useful is free of bugs, so having any unnecessary software installed on a server reduces its security and reliability. Solaris allows unnecessary software such as web browsers and media players to be left out during installation, or easily removed. Of course, such software is available for Solaris workstations or dual-role machines. Many of the components of Windows 2000 Server are tightly integrated; they share data space in memory or communicate using low-level application programming interfaces. A bug in one component can cause undesired behavior, including security breaches in other components. Components of Solaris communicate by passing simple streams of text through pipes, sockets and temporary files. In general, a flaw in one component will be isolated from others, limiting the potential for damage. The large storage capacity of modern servers means that the disk space used by the operating system is of limited concern, however, the amount of RAM and processor time used by an unnecessary component in a heavily loaded server is a serious concern.

Though Solaris does not require the installation of a graphical user interface, several are available for it. The traditional Unix Common Desktop Environment should satisfy long-time Unix users, though most people are likely to find it to be crude and dated. The GNU Network Object Model Environment is a modern desktop environment that strives for simplicity, similar to Mac OS. Gnome has all the features modern users expect in a desktop, though experts may be disappointed by the fact that many decisions are left out of the hands of the user. Experts are more likely to prefer the K. Desktop Environment, which provides a configuration switch for nearly everything that could be done in more than one way. KDE is the most popular desktop environment for Unix.

Windows 2000 offers only the default Windows user interface. The Windows shell is dated in comparison to Gnome or KDE. Though consistency and familiarity are beneficial, Windows lacks user-interface features like multiple window focus models and virtual desktops that are common to almost all Unix graphical environments. The Windows interface does offer several different color schemes and animated mouse cursors.

Windows and Solaris both offer similar technologies to assist physically impaired users in accessing and using the system. Such technologies include adjustable styles in the user interface, screen readers and magnifiers. Solaris comes with better built-in support for software-based assistive technologies, including on-screen keyboards and screen readers than Windows 2000 Server does.

Windows 2000 Server is licensed based on the number of processors and the number of users accessing the system at once. Additional processors or users result in additional fees. Solaris is now being offered free of charge. There are per-processor subscription fees for service and support, which are significantly lower than a Windows 2000 Server license. Standard and premium support packages include telephone support, for which Microsoft charges additional fees. Standard support for Windows 2000 Server products ends on June 30, 2005.

Sun currently provides support for six versions of Solaris, with full support available on three and no end of life date yet announced for two. Major components of Solaris are expected to be released under an open-source license, allowing users to modify the system. Merely viewing Windows source code legally is nearly impossible, and making changes is strictly forbidden.

The clear separation of components of Solaris gives it an inherent security advantage over Windows 2000 Server. Specific features further separate the two operating systems in the field of security. Access control lists in Windows 2000 allow administrators to express sophisticated permissions for access to files, but file permissions cannot express a complete security policy on a Windows server since many Windows APIs are not based on the use of files as an abstraction layer

Solaris supports similar access control lists, which provide for a more complete security policy on a system where nearly all operations are performed through file access. Solaris also supports role-based access controls, which allow for permissions based not only on the user account a process is running under, but also on what task, or role the user is currently performing. Role-based access controls allow the administrator to restrict potential damage from a security breach to the areas to which a given service requires access. For additional security, Solaris containers allow processes to run inside sealed areas of the system, with a network interface being the only way to communicate with the rest of the system. A process running inside a container is no more dangerous than if it were running on a different physical machine connected by a network. When containers are properly used, attacking one service to gain access to another becomes ineffectual.

Virus and worm outbreaks have affected Windows users for years, but self-spreading malware is rare in the Unix world. The SQL Slammer worm of 2003 crashed systems ranging from automatic teller machines to control systems is nuclear power plants. Microsoft likes to pretend that the proliferation of malware is due to the popularity of Windows, not anything having to do with its design. Worms, including the highly disruptive Nimda and Code Red have consistently plagued users of Microsoft’s Internet Information Server, which has just over 20% of the web server market. Apache, which has nearly 70% has been relatively free of malware and has never had an outbreak on the scale of Nimda or Code Red. Malware authors may prefer to code for the most popular software, but only do so as long as it is convenient. The inherent security of a platform is the primary factor that determines the likelihood of a damaging malware outbreak. Solaris is inherently so much more secure than Windows that a major outbreak of malware will probably never occur, regardless of any changes in market share.

Windows has a well-deserved reputation for unreliability. Every experienced Windows administrator has seen the infamous blue screen of death that indicates the system has come to a grinding halt. Most Solaris administrators never have to reboot their servers. Windows was designed for single user personal computers; having to restart the computer was never considered a serious problem.

Unix was designed for multiple users. Restarting a system with a large number of users working on a variety of tasks at once is a serious problem, and Solaris goes to great lengths to avoid it. While such trivial things as a web browser update require a full restart on a Windows server, Solaris only requires a reboot when the kernel is upgraded. Rebooting a server that is providing mission-critical services to a business can have a significant financial impact.

Windows 2000 offers only NTFS and the antiquated FAT filesystems for storage. FAT is not worthy of consideration for use on a modern server. It lacks even rudimentary access controls and has nothing to prevent corruption in the event that a filesystem operation is interrupted. NTFS has access controls and journaling to protect against corruption if a filesystem operation is interrupted, however, it is both slow and prone to data loss. UFS with logging on Solaris is fast and reliable. ZFS, introduced in Solaris 10 offers even more reliability with the addition of atomic operations. An atomic operation occurs either completely or not at all, making it impossible for the filesystem to be left in an inconsistent state. ZFS also provides checksumming of all files within the filesystem, allowing corrupted files to be detected and repaired automatically.

With the latest improvements to Solaris, there are even more advantages to this system than ever. According to Michael Singer of “Developer,” Solaris 10 is well worth the wait that loyal users of the system, as well as those curious to try another approach, have endured. The past year has been filled with sneak peaks of the new features Sun Systems has been developing, and many revisions have been implemented based on the trial runs and feedback from the widely circulating beta versions, before the official free download release which will be released some time in early 2005. What are the improvements made to Solaris that gives it an even sharper edge for business solutions?

The upgrade includes more than 600 improvements. The so-called “Big Five” additions to Solaris 10 include a partitioning technology (N1 Grid Containers); a diagnostic tool for system administrators (DTrace), Predictive Self Healing, Crypto Infrastructure based on the PKCS#11 standard and ZFS (short for Zettabyte File System), which gets its roots from the classic POSIX-compliant Unix file-system.

Solaris 10 also includes technology from the “government-grade” Trusted Solaris operating system as well as a Linux Application Environment (code-named Project Janus), which allows the OS to run Solaris and native Linux binaries.” (Singer)

Additionally, Solaris has improved the software licensing pricing structure to make it more accessible to the public that demands it. Windows 2000 continues to be suboptimal while Solaris continues to improve performance, leaving Windows in the dust.

Solaris is clearly superior to Windows 2000 server, though the two systems are intended for similar uses. Windows 2000 Server is tightly integrated and inflexible, while Solaris is modular and flexible. This modularity also provides greater stability than is possible with Windows. Configuration information on Solaris is stored in simple files that are robust, simple to back up, edit and copy between servers. Windows uses a binary database that is fragile, difficult to back up and nearly impossible to edit or copy between servers. Solaris supports far more powerful hardware than is available with Windows 2000, and offers a choice of architectures. Solaris with a support package is significantly less expensive than Windows 2000, or free without support. Source code is available with Solaris, allowing for modifications, but not Windows 2000. Solaris offers an escape for Windows administrators who are plagued by security flaws and a lack of means to contain the breaches by providing high level security features not available in Windows. Solaris is also a more reliable system on which to store data due to its robust filesystem options. Solaris is so technically superior that an outside requirement is the only reason to use Windows 2000 Server.


Singer, Michael. “Sun Sets Solaris 10 Free.” Developer. 15 November 2004.

Get Professional Assignment Help Cheaply

Buy Custom Essay

Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?

Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.

Why Choose Our Academic Writing Service?

  • Plagiarism free papers
  • Timely delivery
  • Any deadline
  • Skilled, Experienced Native English Writers
  • Subject-relevant academic writer
  • Adherence to paper instructions
  • Ability to tackle bulk assignments
  • Reasonable prices
  • 24/7 Customer Support
  • Get superb grades consistently

Online Academic Help With Different Subjects


Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.


Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.

Computer science

Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!


While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.


Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.


In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.


Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.


We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!


We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.


Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.

What discipline/subjects do you deal in?

We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.

Are your writers competent enough to handle my paper?

Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.

What if I don’t like the paper?

There is a very low likelihood that you won’t like the paper.

Reasons being:

  • When assigning your order, we match the paper’s discipline with the writer’s field/specialization. Since all our writers are graduates, we match the paper’s subject with the field the writer studied. For instance, if it’s a nursing paper, only a nursing graduate and writer will handle it. Furthermore, all our writers have academic writing experience and top-notch research skills.
  • We have a quality assurance that reviews the paper before it gets to you. As such, we ensure that you get a paper that meets the required standard and will most definitely make the grade.

In the event that you don’t like your paper:

  • The writer will revise the paper up to your pleasing. You have unlimited revisions. You simply need to highlight what specifically you don’t like about the paper, and the writer will make the amendments. The paper will be revised until you are satisfied. Revisions are free of charge
  • We will have a different writer write the paper from scratch.
  • Last resort, if the above does not work, we will refund your money.

Will the professor find out I didn’t write the paper myself?

Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.

What if the paper is plagiarized?

We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.

When will I get my paper?

You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.

Will anyone find out that I used your services?

We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.

How our Assignment  Help Service Works

1.      Place an order

You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.

2.      Pay for the order

Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.

3.      Track the progress

You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.

4.      Download the paper

The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.

smile and order essaysmile and order essay PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!

order custom essay paper