StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Performance of Computer System - Example

Cite this document
Summary
The paper "Performance of Computer System" is a wonderful example of a report on information technology. Understanding the components that form a stand-alone computer system is fundamental in understanding the requirements of the medical unit. The central processing unit is an important factor in the successful operation of a computer system since it incorporates the control unit…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful

Extract of sample "Performance of Computer System"

Computer Platforms Course Name and Code Institution Name Department Name Insert Your Name Insert Your No Tutor’s Name 13 May 2009 Table of Contents 1.0 Performance of Computer System…………………………………….3 1.1 Machine components…………………………………………...3 1.2 Memory…………………………………………………………3 1.3 Peripherals………………………………………………………5 2.0 Upgrade a computer system……………...……………………………7 3.0 Operating Systems………………………………….………………….8 3.1 Interface/ Command processor…………………………………8 3.2 File Management………………………………………………..8 3.3 Input/Output Services……………………………….…………..9 3.4 Process Control Management……………………….…………..9 3.5 Memory Management……………………….…………………10 3.6 Scheduling………………………………………….…………..10 3.7 Security and Protection Services…….…………………………11 3.8 Network and Communications Support Software…….….…….11 3.9 System Administrator Support………………………….……...12 4.0 Computer Network……………………………………………………12 4.1 Components of Network………………………….……………12 4.2 Physical Layout………………………………….……………..14 4.3 Topology of the Network………………………….…...………15 4.4 Security and Back up Strategies……………..………..………..15 5.0 Works Cited………………………………………….…….………….17 1.0 Performance of Computer System 1.1 Machine components Understanding the components that form a stand-alone computer system is fundamental in understanding the requirements of the medical unit. Central processing unit is an important factor in successful operation of a computer system since it incorporates the control unit and arithmetic logic unit. Other features that are incorporated with CPU are general and specific registers and execution capabilities. The CPU is termed as the brain of the computer because there is no computer system that can operate without a CPU. The requirements of the surgery unit are immerse which means that the CPU that is selected should be able to complete the task allocated appropriately and timely (Kizza 2005). Thus, due to the rate of development and requirements of the institution, a Pentium IV processor with more than 2.0G can fulfil the requirements of the surgery unit. Nevertheless, bus is another fundamental requirement that ensures that the computer internal components are linked. Important buses are the system and data. System bus is outside the processor and enables the communication between the different components within the computer system. On the other hand, data bus is used to transfer and receive data. To operate successful, the width of the bus is the paramount utility. Thus, the appropriate width of data and system bus are 32 bits while the speed should be 133Hz. 1.2 Memory Memory is an important requirement since it will enable the storage of information and provide easy means in accessing the stored information. The most basic means of storage are the RAM, cache and hard drive. RAM is the memory that is available at the time when an application is running or someone is using the computer (Mills 2006). RAM is important since it determines the number of applications that can be run and the speed of throughput. Hence, for the case of computer systems of the surgery unit, the size of the RAM should be 1G. Cache is the internal memory that is usually located in the device been used. Cache tries to store information before transferring it to the RAM or vice versa. Hard disk is used to store long-term information. Hard disk is different from RAM and cache, since hard disk does not require power to store information an aspect lacking in the case of cache and RAM. Due to the large amount of information that will be stored and the amount of finance that will be used, the size of the appropriate hard disk is 80 GB with 5400 rpm (Kizza 2005). However, had disk are usually vulnerable to issues such as hard disk crush, security issues and virus vulnerability hence appropriate measures should be in place that prevents this complications. Such means may include the use of backing store. Some means that allow backing up of data are the use of removable disks. Removable disk may include flash disks, compact disks, tape and hard disk. Flash disk usually utilize USB ports to store and help in transferring of data from one system to another but are vulnerable to viruses and data loss. Various sizes of flash disk exist and for the purpose of surgery unit, 2GB flash disk are economical and can store large amounts of data (Mills 2006). Currently, in the market there are external hard disks that are usually connected to the computer through the USB. These external hard disks have capacities of up to 500GB. Hence, the surgery unit may utilize the hard disks with capacity of 250GB in backing up their data. Other means of backing up information may include the use of CD (compact disks) or DVD (digital versatile disks). The compact disks and DVD comes in different varieties giving the possibilities of only storing the information, deleting some information or adding additional information. Compact disks have capacities of 650 while DVD has capacities of 4.7GB. Hence, the surgery unit may acquire some of the CDs and DVDs for backing up their data. 1.3 Peripherals Peripherals are secondary requirements for computer system to operate. These include those features that are connected to CPU so that they may operate and are connected through sockets or ports. Expansion slot are used to hold expansion cards that allows the addition of important components to the motherboards. Commonly used expansion slots are PCI and AGP. PCI are usually used to connect components such as hard disk hence been a peripheral component connector. Hence, the use of PCI slots will increase the operations in the surgery unit because of high clock speed, plug and play capability and is processor independent (Mills 2006). Hence, for the case of the surgery unit, the appropriate PCI that can be used should have bus width of 32 bits and burst DTR of 133MB/s. Another important requirement is the use of USB2, which allows computer peripherals to be attached to the outside part of the computer (Ogletree & Muller 2002). USB2 is better because it has speeds of up to 480 Mb/s and can be used in any computer without introduction of any software. Cables are useful since they are used to connect more than one entity to each other and are able to communicate. In most cases, the cables are constructed of several wires that are encased together. Different varieties of the cables will be required to accomplish different requirements of the surgery unit. These cables range from those used to connect the peripherals e.g. printers to those used in networking the computer systems (Kizza 2005). Other important peripherals are the cameras, printers and scanners. The scanners are used to scan source materials and change them into digitized representation. In this case, the appropriate scanner should have optical resolution of 1600-3200 ppi (Mills 2006). Cameras are important feature in hospital setting because it allows capturing of actual images and helps in teleconferencing and video conferencing. The surgery unit should acquire a web cam that has resolution of 1,280*960 (Mills 2006). Nevertheless, a printer forms a basic requirement in every office. A printer is used to print documents and other information from the computer onto a paper. Printers come in different varieties with different qualities. The surgery hospital should use a laser printer since it supports high capacity of work and produces quality work. Moreover, other benefits that are associated with laser printer include its cheaper to operate and are environmentally friendly. The negative side of laser printers are they are expensive to acquire and repair (maintain). Displays or commonly referred to as monitors are used as means of out-putting information. The most suitable display unit is that wilt resolutions of 1280*1024. Liquid crystal display (LCD) is the most preferred because of its benefits and flexibility when compared to other display units such as cathode ray tube (CRT) (Mills 2006). A 17” LCD will accomplish all the tasks in the surgery. Even though the LCD is expensive, they are usually economical when it comes to space and consumption of power. Keyboard and mouse are other important input devices that are frequently used. A mouse is used to click and drag information on the screen while the keyboard is used to input and edit information (Ogletree & Muller 2002). The standard type of key boards and mouse will accomplish tasks in the surgery. Other features that are important especially in the case of networked computers are the routers, hub, server, cables, connectors and USPs. 2.0 Upgrade a computer system Upgrading a computer or building a special one requires better understanding of available resources, usage of the system and future developments in that sector. Understanding and carefully analyzing the shortcomings of the proposed system that should be upgraded is the foundation of exhaustively solving the problem. The computers that have been bought may not suite the requirements and obligations that the system should accomplish. One of the commonly nuisance that should be avoided is the size of the case. The smaller the case the more the problems since it allows limited upgrade ability (Kizza 2005). Thus, it is paramount that the case should be large and can support additional internal components such as expansion cards or hard drive. Motherboard is a crucial component in determining the success and quality of the computer system. For example, the computers that have been presented in the case study are single processor but development in information technology has resulted in dual core motherboards. However, the tasks that the computer should accomplish should determine the type of motherboard that should be used. Thus, understanding the form factor of the motherboard ensures that the appropriate motherboard is used and it conforms to the design of the motherboard and ability of adding peripherals. Nevertheless, new devices that are added to the motherboard should be compatible with future purchases (Mills 2006). Thus, the motherboard should be compatible with the CPU, understand the requirements of the bus speed and the number of PCI slots that it can support. Other features that should be known in advance before purchasing the motherboard are the chipsets, cache and heat dissipation. Cache is usually an important factor in speeding up memory access and forms the foundation of improving the effectiveness of the computer system. Moreover, the chipset that is chosen should conform to the requirements of the motherboard and reduces the chance of complexities occurring. Video card is another device that is connected to the motherboard and defines the quality of graphics and refresh rate. In the case of office-based accomplishments, normal video cards can accomplish the tasks that they are supposed to complete. Storage devices are easy to upgrade and it is easy to know the appropriate moment that it is supposed to be upgraded (Ogletree & Muller 2002). The types of memories that can easily be upgraded and forms the basic of computer system are the RAM and hard disk. It is easy to upgrade a RAM from say 256Mb to 516Mb since it is removing the RAM from the motherboard and replacing it. This applies in the case of the hard disk since the increase of information will require bigger storage capabilities. It includes the removing of the hard disk, transferring information and operation continues as usual (Mills 2006). 3.0 Operating Systems 3.1 Interface/ Command processor One of the most basic OS is the interface and command processor that enables a user to communicate with the computer system. Common interface/ command processor are the graphical user interface, which relies on the use of mouse clicks and movements. The other type is the command line, which uses typed commands. This is the most basic way that users can communicate with the computer system (Miller 2007). 3.2 File Management The use of filing system in the surgery is crucial and requires supporting OS. File management OS provides the interface that users uses to utilize the benefits of real physical storage systems. Thus, the file management system lies between the application software and storage disk. Due to the large amount of files that are stored in the storage system, the file manager organizes these files into directories and forms the basis of directory entry block (Miller 2007). The directory entry has specific details concerning the file, which may include size and the date that it was modified. Some duties that are accomplished by file management includes managing the directory structure, stores specific information of each file and helps in accomplishment of tasks associated with files (Kizza 2005). For example in the case of the surgery unit, a patient letter may be written and saved into the computer storage device. The file manager will store the file specifically with relevant “tagging” and will be easier to access later. 3.3 Input/Output Services The programs that control the operation of Input/output are called I/O device drivers. I/O device drivers are required to ensure that every program that is within the computer system can accomplish assigned tasks. Each I/O device has driver that provides the services to file management and avails other useful programs to be used. Thus, the drivers perform the actual transfer of data from the hardware to a specified storage area. The common BIOS contain I/O device drivers that allow the initial use of the computer and give the possibility to improve or introduction of different software. For example, an I/O device driver allows using the keyboard. Thus without the I/O device driver the keyboard could not be operated (Mills 2006). 3.4 Process Control Management This OS controls and monitors the execution of programs within a computer system. Some of the activities that are accomplished by OS include assigning resources to memory, managing execution and allocation of I/O devices. It ensures that resources are efficiently allocated and provide means in which communication can be successful between the processes. It also determines the state e.g. running or waiting of process through maintaining tables that monitors the resources. For example, process management system determines whether the printer is free to send additional data. 3.5 Memory Management Memory management is an important aspect that ensures that the program memory requirements are adhered. It allocates each program that is being multitasked a memory space. Some duties that are performed by memory management is tracking the memory been used, specifying which programs utilizes which part of memory and control the amount of memory relative to its requirements. Thus, it prevents conflict of interest between the programs. It also systematically maintains the program that requires memory space and allocates or de-allocates the program’s memory. For example, when a word application program is opened, the memory manager allocates the appropriate amount of space as the user continues inputting information. Moreover, the memory management system compact free memories into one block (Kizza 2005). 3.6 Scheduling Scheduling is useful since it determines the way that CPU accomplishes the given tasks. At a given time, a single program is admitted to the system. Thus, the OS is responsible in ensuring that there is appropriate and effective way that the time of CPU is allocated. Usually it supports two methods of scheduling: order of specific jobs that will be admitted to the system and dispatching in which it determines the actual process that will be executed by the CPU. However, the factors that guide processes are different since there are processes that require mostly the use of CPU while others require minimal CPU processing. Thus, the surgery computer system will be able to complete the tasks depending on the process requirement. 3.7 Security and Protection Services In the use of the computer system and there is the presence of many users, prevention of unauthorized access is paramount. A strategy that is used by OS includes dividing the users into groups. However, modern systems and a methodology that applies in the case of surgery is limiting execution of instructions. This may be achieved through understanding the file system, different OS and other processes through controlling the capability of accessing/ executing programs. Moreover, other benefits that are provided by the security measures include the provision of password and login services that manages and monitors access of facilities (Kizza 2005). For example, receptionists may be limited to accessing specific details concerning surgery or the account department may be completely shield and people within the department can only access accounts records. Nevertheless, each person within the surgery unit should posse’s individual login and password that controls authorization of users. 3.8 Network and Communications Support Software There are different ways that information can be accessed through networked system. The file manager may partition the directory and allocates information depending on qualification. Another method is the use of Network File System (NFS) that utilizes client software in enabling the sharing of resources. Thus, requesting of information across the internet or from the web server is determined with security measures that are in place. 3.9 System Administrator Support This is the most important sector in maintaining computer system. The system administrator is responsible for maintaining the entire computer system through accomplishing activities such as monitoring security, installing software and providing secure back ups. However, due to development in the technology, there are specific administrators operating systems that aides the administrator to accomplish tasks (Oppenheimer 2004). 4.0 Computer Network 4.1 Components of Network For computers in a network to operate successfully, there are some requirements that are supposed to be assembled so that the computer system can operate successful. To ensure that the most appropriate network is in place, client/server approach will be used. This will ensure that security is championed and information and data can be resourcefully shared. Some of these components are (Oppenheimer 2004): Network Interface Card – this card is usually plugged onto the PCI slots and allows the connection of cable to the outside part of the computer. A single NIC will be required for each computer. Node or workstations – this peripherals are connected to the network. It includes the ten computers and the printer. Network Operating System – This operating system is used to manage the network resources. Each of the client machines will have NOS and the server to enable sharing of files, application and help in the utilization of resources (Mills 2006). Cables – there are used to form links between the nodes and other hardware stand-alones in the network. In the case of the surgery, Ethernet cables (Unshielded Twisted Pair) Cat5 will be used for connection while RJ-45 will be used as connector. Router – routers are important in that it allows connection of different networks e.g. it is able to connect LAN with WAN. Hence, it will be used to connect the surgery LAN with WAN to allow internet and web usage. Hubs – they usually have ports that the nodes are connected before been plugged into the port of the server. It main aim is filtering and directing appropriate data to the point that it is required. Server – This combination of software and hardware enables provision of service to clients. This can be a normal computer system. However, it should have fast processors, large storage capacity, RAID, appropriate RAM and appropriate NOS. 4.2 Physical Layout 4.3 Topology of the Network 4.4 Security and Back up Strategies Security should be maintained at the highest level possible to prevent issues such as trespassing of privacy and loss of important data. Three strategies can be used to ensure that the data and hardware are secure: physical, logical and data security (Mills 2006). Most important part is ensuring that the server is protected against any security threat. This can be achieved using CCTV and motion sensors, controlling the people accessing the computer rooms and using physical entities such as metallic doors. Other measures may include the use identity cards while the staff and personnel are within the building. This will easily reduce the chances that external people may enter the building and cause security breach (Kizza 2005). Utilization of logical or electronic approach will reduce the chances that the unauthorized persons can access information within the system. Access by unauthorized personnel may result in loss of data, manipulating recorded/ stored data or exposure of sensitive data. Thus, to prevent this complications the approach strategy that can be used including installing appropriate software such as anti-virus and firewalls. Moreover, transmitted data should be encrypted. Passwords, restricted workstation and restricting the time of access of resources reduce the chances that the data will be spoilt. Moreover, the people who are within the network and utilizing the resources of the surgery should be trained on security threats posed by unprotected data and strategies that can be used to prevent. Moreover, access to the network should be controlled by the use of administrator capabilities and allocation of resources should be clearly defined in advance. Hence, to prevent the loss of data or to reduce the amount that is stored in the server, backing up is a useful strategy. A proper schedule should be developed that will ensure all the data is backed up and a definite time. In the case of the surgery, backing up of data should automatically be done every Saturday after closure of work. This can be achieved through setting the time and defining the specific location that the data can be backed up. 5.0 Works Cited Mills, D 2006, Computer Network Time Synchronization: the Network Time Protocol, CRC Press, New York. Miller, M 2007, Absolute Beginner’s Guide to Computer Basics, 4th Ed. Que Publishing, London. Oppenheimer, P 2004, Top-down Network Design, Cisco Press, New York. Smith, C & Collins, D 2006, 3G Wireless Networks, 2nd Ed. McGraw-Hill Professional, London. Ogletree, T & Muller, S 2002, Upgrading and Repairing Networks, 3rd Ed. Que Publishing, London. Kizza, J 2005, Computer Network Security, Springer Publishers, New York. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Performance of Computer System Report Example | Topics and Well Written Essays - 3250 words, n.d.)
Performance of Computer System Report Example | Topics and Well Written Essays - 3250 words. https://studentshare.org/information-technology/2076735-computer-platforms
(Performance of Computer System Report Example | Topics and Well Written Essays - 3250 Words)
Performance of Computer System Report Example | Topics and Well Written Essays - 3250 Words. https://studentshare.org/information-technology/2076735-computer-platforms.
“Performance of Computer System Report Example | Topics and Well Written Essays - 3250 Words”. https://studentshare.org/information-technology/2076735-computer-platforms.
  • Cited: 0 times

CHECK THESE SAMPLES OF Performance of Computer System

Distributed Computer System

For instance, businesses that require e-commerce applications are more likely to achieve greater benefits using a distributed computer system.... The paper tells that the role of computer systems continues to evolve with businesses adopting it to execute various business operations.... This paper will present a critical evaluation on the reality of having a true distribute system.... A distributed system is one that is made up of independent computer systems that work together and appear to those using it as a unified system....
11 Pages (2750 words) Essay

Computer Liquid Cooling Systems

Computer Liquid Cooling systems and CPU FANS Customer Inserts his/her name Customer Inserts Abstract The paper discusses the concept of computer cooling and its significance to keep the computers in operating condition.... Computer cooling systems are often designed in sync with robust design of computer components such that these components produce as little heat as possible.... The downside, however, is that these systems are costly, primarily due to the cost of installation and technical expertise of professionals that deal with this system....
5 Pages (1250 words) Essay

Evolution of Computer Technology

This essay stresses that RISC, pipelining, cache memory and virtual memory – these are areas that determine the capabilities, performance, and, ultimately, the success of a computer system.... This paper will examine the development of computer technology – its rapid evolution – today.... As mentioned elsewhere in this paper, since the 1980s the development and design of computer systems have been technology and market driven.... Two important considerations have so far stood out in shaping the evolution of computer systems during these past twenty years – mobility and speed....
4 Pages (1000 words) Essay

Solutions problem of computer information system

Operating systemIt is set of integrated software components that aid management and control of hardware and software resources in a computer system.... Utility software – Programs that offer the maintenance and performance evaluation tools for a computer system -Loader- It is a built in computer system component that aids in loading an operating system These manage creation and maintenance of data in a COMPUTERb.... Folder and FILE-Folder-Is an icon that contains several data types and items in a single location-FILE- Is a defined memory block that contains stored information available to a computer system f....
2 Pages (500 words) Assignment

Computer Architecture: A Qualitative Approach by J.Hennesy, and D.Patterson

atterson" presents a summary of the fifth edition of computer Architecture: A Qualitative Approach.... he improvement in the cost and performance of computing devices over the past 65 years can be attributed to advances in information technology and innovations of computer design.... This book review "computer Architecture: A Qualitative Approach by J.... John Hennessy and David Patterson have vast experience in computer science and information technology....
23 Pages (5750 words) Book Report/Review

Computer Systems

For the first scenario, the system we have specified is Dell XPS 8300.... This system is more appropriate for overall working and operations performed by a student.... Additionally, their daily working and operational needs can be well matched and processed by this system.... Their everyday tasks can be effectively managed by this system since this system has the power to deal with any kind of tasks in a wonderful way....
11 Pages (2750 words) Assignment

Uses of Computer in Mathematical Study

This report "Uses of computer in Mathematical Study" explains a ten-year laborious research study that has probed the changing nature of how school teachers make use of computers in their mathematics classes, and also their awareness of limitations or problems to civilizing, or extending, such use.... The usage of computer Algebra Systems (CAS) is gaining more importance extensive in mathematics study and education.... Since the growth of computers has been mostly the effort of scientists, it is a natural thing so as to a large body of computer uses to serve up the scientist....
7 Pages (1750 words) Report

Computer-Composed Music

For a composer, the beauty of using computers in music composition and synthesis is not in recreating styles of music that are already known, but in creating new musical expressions that are a result of computer-related technological developments.... Such compositional operators may be written as closed subroutines implying that a music composer's system will be analogous to other computer languages that are used for other functions like FORTRAN, which is for mathematicians....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us