StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Systems Architecture and Administration - Assignment Example

Cite this document
Summary
In the paper “Computer Systems Architecture and Administration” the writer analyzes advantages and disadvantages that solid state drives have over hard disk drives. The management of all these issues should provide a unit commonly referred to as memory manager…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Computer Systems Architecture and Administration
Read Text Preview

Extract of sample "Computer Systems Architecture and Administration"

Computer Systems Architecture and Administration a. Virtual Machine (VM) is a stratum of software that imitates the hardware of an ordinary computer system. In this regards, the A virtual-machine monitor is a suitable technique for adding functionality below ordinary operating system and application software. For instance, one class of virtual-machine monitor is commonly referred to as Type II virtual-machine monitors (VMMs) is structured on the abstractions delivered by a host operating system. Type II VMMs are sophisticated and expedient, but their performance is presently slower than that realized when running outside a virtual machine- in a standalone system. In broad terms, a virtual machine is a distinct and autonomous software order that comprises of the whole copy of an OS and application software (King, Dunlap, & Chen, 2003). Its ability to merge servers is the most fascinating benefit of VMs. For instance, a non-virtualized application server has a maximum capacity of approximately may 5% to 10% utilization; however, a virtual server hosting several VMs is easily capable of realizing a utilization of between 50% and 80%. This means that it results to lower costs linked with hardware acquisition, repairs, as well as energy and cooling system usage. Secondly, VM tools have the ability to support server management because it can allocate and regulate the computing resources used by each VM. For instance, an administrator can spare the minimum required network bandwidth amount for a VM running a transactional application. On the other hand, a virtual file or print server is not capable of such reservation. b. Briefly, Cloud computing denotes a hosting services menu typically delivered over the Internet on a metered basis, while co-currently leveraging infrastructure shared by a number of customers. As such, it has several benefits including Reduced Infrastructure Costs- it helps to reduce overhead costs such as management, IT personnel, data storage, real estate, bandwidth, and power. This is realized by its ability to absorb costs associated with software and hardware upgrades and repairs for obsolete network and security devices. Secondly, it has the ability to deploy capacity, scalability, and speed. Finally, cloud computing ensures data security and backup. Conversely, cloud-computing das several risks including loss of control over data transmitted to the cloud and network accessibility outsourced to the cloud. For example, under the traditional IT setting, firms have the ability to evaluate and adjust their systems, as such, they are compliant with applicable regulations and standards. Another risk entails aggregation risk - the cloud creates a new aggregation exposure, this is the main reason most cloud providers are unwilling to offer more favorable contracts to cloud subscribers (Merrill, 2014). c. Client/server model describes communications between computing progressions between service consumers/clients and the service providers/servers. The basic features include; clients and servers are functional modules equipped with specific interfaces, this means that they are capable of hiding internal information. Accordingly, the client and a server functions can be effected through a set of software components, hardware modules, or a combination of both. Secondly, every client/server relationship is established between two functional components. This means that the customer has the role of initiating a service request while the server elects to react to the service request. Moreover, all information exchange between clients and servers is conducted only through messages. Therefore, there is no information exchanged through other global variables. In other terms, the client/server model refers to a distributed application structure that divides tasks between the server and the client. On the other hand, a peer-to-peer network has lacked a central server and each client on this network shares files equally with the other clients. Therefore, this means that it is ideal for small enterprises, unlike the client/server architecture. The main reason being that they are cheap to install, operate and maintain. Secondly, it has no dedicated server and hence it is portable and less tasking as it is user-friendly- no security protocols needed. 2. RAID 5 system I. The concept of measuring the overall performance of a storage system, Input/output Operations per Second (IOPS) remains as the most used common metric. Accordingly, several factors should be considered when calculating the IOPS aptitude of a single storage system. The performance of a disk and IOPS is centered on three key factors: Rotational speed commonly referred to as the spindle speed. It is commonly measured on the parameters of revolutions per minute (RPM) - most disks for enterprise storage revolve at speeds of 7,200, 10,000 or 15,000 RPM. The higher the spindle speed, the higher the performance of a disk. Average latency. It denotes the time taken for the sector of the disk being retrieved to rotate into position under a read-write head. Average seek time. This is the time (in meters per seconds) it will take for the read/write head of a hard drive to position itself over the track being retracted. II. Advantages of Raid 5 Performance: In Raid 5, performance is increased from the fact that the server has more spindles that are used when reading or writing as compared to when data is retrieved from a drive. Availability: The accessibility is increased since the RAID controller is capable of re-creating lost data from parity information (a checksum of the data previously written to the disks, which is written co-currently with the original data). III. The effective capacity of the 5-drives RAID 5 system is: Capacity 4000 GB Speed gain 4x read speed, no write speed gain Fault tolerance 1-drive failure b. How a journey file system uses transaction logging to ensure data integrity during system failure while writing file to the hard disk. Using NTFS as the base, it is important not that NTFS outlooks every I/O operation that changes a system file on the NTFS volume as a transaction, and subsequently manages every one of them as an integral element. Accordingly, after initiation, either the transaction is completed or, in case the disk fails, it is rolled back. To guarantee that a transaction’s action, NTFS registers the sub-operations of a transaction in a log file prior to writing them to the disk. In case a complete transaction is registered in the log file, NTFS executes the transaction’s sub-operations on the volume cache. Consequently, after NTFS apprises the cache, it stamps the transaction by recording its completion in the log file. After this stage, NTFS certifies that the entire transaction exists on the volume, even if the disk fails. Accordingly, when recovering, NTFS recreates each committed transaction stored in the log file, locates those transactions that were not committed in the log file at the time of the system failure, and unwraps each transaction sub-operation previously recorded. c. Advantages and disadvantages that solid state drives (SSD) have over hard disk drives (HDD) Advantages The SSD requires/ consumes less power than a standard HDD, thus, they are energy efficient and saves a laptop’s battery life. The SSD drive does not have any moving parts. As such, it uses flash memory for data storage, and this ensures that it delivers better performance and reliability than the HDD. Disadvantage The cost of a solid-state drive is higher than that of an HDD. Subsequently, this may limit the storage capacity, as most users cannot afford. 3. a. The serial transmission stresses that one bit must follow another. This ensures that only one communication channel is needed rather than n to convey data between two collaborative devices. The main advantage of serial over the parallel transmission is that due to its one communication channel feature, it is capable of reducing the cost of transmission by roughly a factor of n when compared to parallel transmission. The serial transmission occurs in one of two ways; synchronous or asynchronous. The asynchronous transmission is advantageous in that it is cheap and effective, and this make it attractive low-speed communication choices (Burd, 2011). Further, the synchronous transmission has speed. This is ensured by the fact that there are no extra bits or gaps required to introduce at the sending end and remove at the receiving end (n.a. ). b. There are three mechanisms to the performance of processing interrupts. The leading element is the amount of time taken between when the processor receives an interrupt request and when the processor takes action to initiate processing the interrupt service routine. This interruption is referred to as interrupt latency. The second element of interrupt is the interrupt processing time. It denotes the amount of time that the processor spends when practically saving the machine state of the interrupted task and diverting the interrupt service routine execution. Usually the amount of machine state saved is minimal, on the presumption that the interrupt service. The last element of interrupt service performance is the state saving overhead. This underlines the amount of time consumed when saving machine registers, but which must be saved so that the interrupt service routine to do its job. c. Caching is beneficial in several ways including: latency is abridged for active data resulting in higher application performance levels. Further, the I/O operations to external storage are minimized because most the I/O is diverted to cache. Subsequently this leads to lower levels of SAN traffic and disagreement. Q 4. a. For a program to be executed it is required that it be first stored in main memory. Subsequently, after the program is loaded in the memory, a program execution starts through the delivery its start address to the CPU, which then sends instruction address to the memory unit. The management of all these issues, an operating system, should provide a unit commonly referred to as memory manager. The managing memory is obligated to request associated rights from the end users request for the execution of the program, up until its termination. b. The advantages of virtual memory management include: Paged Memory Allocation- the benefit is that it allows tasks to be allocated in non-contiguous memory locations. As such, the memory is used more efficiently. Demand Paging: under this benefit, tasks are no longer restricted by the size of physical memory. Accordingly, the memory is utilized more efficiently than the conventional schemes Segmented/Demand Paged Memory Allocation: As such, this ensures large virtual memory and the segment loaded on demand. (Sabido, 2014) c. The implementation of integrated time-driven scheduler The implementation of integrated time-driven scheduler (ITDS) for Real-Time Mach scheduler must satisfy some requirements. The lead requirement is that this scheduler must be supportive of numerous scheduling policies because there are no universal scheduling policies that fit all applications. As such, the scheduler crossing point should support the scheduling policies changing interface vigorously. The second requirement demands that ITDS scheduler in Real-Time Mach ought to support multiprocessors. In this case, the scheduler must support both single processors and multiprocessors. The final requirement relates on how to implement multifaceted scheduling policies ( Nakajima & Tokuda, 2009). In summary, these include Process creation; Process execution; Page fault time and the Process termination time. d. Advantages of threads switching over processes switching Context Switching: Threads are relatively cheap to create and destroy, as well as to represent. For instance, they require some storage space, the PC, SP, and the all-purpose registers. Nonetheless, they do not need any space to share memory information. Surprisingly, even with the little framework, it is relatively faster to shift between threads. Therefore, this means that it is moderately easier for a framework switch using threads. Sharing: It is beneficial from the fact that treads allow the sharing of many resources that cannot be shared in the process. Such resources include; sharing code section, data section, and OS resources in the same manner to open files. References Burd, S. D. (2011). Systems architecture: Hardware and software in business information systems. Boston, MA: Course Technology, Cengage Learning. Nakajima , T., & Tokuda, H. (2009). Design and Implementation of Real-Time Scheduler in Real-Time Mach. Pittsburgh, Pennsylvania: Carnegie Mel lon University. King, S., Dunlap, G., & Chen, P. (2003). Operating System Support for Virtual Machines. Proceedings of the 2003 USENIX Technical Conference (pp. 72-82). Michigan: University of Michigan. Merrill, T. (2014, April). Cloud Computing: Is your Company Weighing both Benefits and Risks. Retrieved from Acegroup: http://www.acegroup.com/us-en/assets/privacy-network-security-cloud-computing-is-your-company-weighing-both-benefits-risks.pdf Sabido, M. (2014). Advantages and Disadvantages of Virtual Memory Management Schemes. Scrib. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Systems Architecture and Administration Assignment”, n.d.)
Retrieved from https://studentshare.org/engineering-and-construction/1700607-computer-systems-architecture-and-administration
(Computer Systems Architecture and Administration Assignment)
https://studentshare.org/engineering-and-construction/1700607-computer-systems-architecture-and-administration.
“Computer Systems Architecture and Administration Assignment”, n.d. https://studentshare.org/engineering-and-construction/1700607-computer-systems-architecture-and-administration.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Systems Architecture and Administration

Developing Computer Networking

Proposed client-tier architecture The application architecture that I better and promises better security is that of 3-tier architecture.... Three-tier architecture has various layers with various functions.... 3-tier architecture.... The 3-tier client/server architecture was introduced to eradicate the problems that were associated with 2-tier architecture.... With this architecture, a middleware lies between the server and the client....
4 Pages (1000 words) Essay

Case Study 1: Florida Department of Management Services, Part I

The transition process was aimed at addressing short-term security problems in the administration and communication in government agencies.... The system relied on proprietary network architecture as well as mainframe at the data centre, Tallahassee.... The system relied on proprietary network architecture as well as mainframe at the data centre, Tallahassee.... Case Study 1: Florida Department of Management Services Name Institution Analyze the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet....
3 Pages (750 words) Assignment

Network Infrastructure Planning

Network Infrastructure Planning Name Institution Date Network Infrastructure Planning Permissions are the core component of server security architecture that can be applied to manage the process of authenticating groups, users and computers to have access to files in a network (Bruce & Smith, 2011).... Active Directory employs the use of LDAP-Lightweight Directory Access Protocol (Computer architecture Association, 2011).... In a bid to reduce the cost of setting up new systems for each of the satellite branches, the company can opt to use New Technology File system (NTFS) permissions or Active Directory (AD) permissions (Abel, 2009)....
3 Pages (750 words) Research Paper

Secure Computer System

The trusted'' services which get passed all around the application gateway typically end up being in contact with the site systems.... hellip; The author states that a computer security incident can be a result of a computer virus, a system intruder, other malicious code, sabotage from an insider or an outsider.... The term may also cover to broadly describe incidents which resulted from rigorous malicious technical activity, and expert replies could produce severe damage Firewalls are the most common security measures for computer networks....
2 Pages (500 words) Essay

Design, Mobility and Mobile Computing

hellip; This paper presents results from a research project aiming at developing an architecture supporting local mobility within hospital.... The architecture is based on fieldwork and mostly on the knowledge derived from a large number of reliable sources.... This paper presents results from a research project aiming at developing an architecture supporting local mobility within hospital.... The architecture is based on fieldwork and mostly on the knowledge derived from a large number of reliable sources....
8 Pages (2000 words) Essay

SHORT written assignment

Hacking refers to gaining unauthorized access to people's private information stored in computer systems especially those, which are connected to the World Wide Web (WWW) or the internet.... Hacking is mostly used for identity theft, where personal data IT Threats Hacking refers to gaining un ized access to people's private information stored in computer systems especially those, which are connected to the World Wide Web (WWW) or the internet.... ?International Journal of Hospitality & Tourism administration, 8(1), 43-59....
1 Pages (250 words) Essay

What is System Security

The level of system security is being highlighted given the large numbers of multi-billion transactions that are conducted through those systems.... That notwithstanding, with the advancement of technology our systems are prone to a number of threats that are out to jeopardize organizational system security.... hellip; According to the research findings, it can, therefore, be said that with computing being an integral element in modern-day operations, the emphasis has turned to computer system security....
11 Pages (2750 words) Term Paper

UNIX Operating Systems

Part one selects and discusses one aspect of computer systems (UNIX operating systems).... This essay "UNIX Operating systems" focuses on UNIX systems that have brought about great impact in the world of operating systems in entirety.... nbsp;UNIX systems have existed for quite some time with many individuals remembering it being in place for the past decade.... Write a number of drivers, utility programs and operating systems are charged with the distribution of the executable versions of the given software and the versions often allow for alterations....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us