logo

Computer Organization and Network Analysis

   

Added on  2022-09-02

27 Pages5085 Words18 Views
 | 
 | 
 | 
Running head: COMPUTER ORGANIZATION AND NETWORK ANALYSIS
Computer Organization and Network Analysis
Name of the Student
Name of the University
Author Note
Computer Organization and Network Analysis_1

COMPUTER ORGANIZATION AND NETWORK ANALYSIS1
Executive Summary
Over the last two decades computing has come a long way. Today’s processors can easily
process virtualization workloads as they continue to become more powerful and virtualization
instruction sets like AVX keep evolving. The report takes a look at the core architecture
based on which these processors are made. Then the respective advantages and disadvantages
of these architecture types and virtualization offered by Linux operating systems is to be
discussed. Then the report is to go through the ethical and legal issues that can arise among
computers and networks powered by these processors. The architecture of the processors are
found to be the Harvard and Von Neumann architectures. The layout of CPUs based on each
architecture type gets discussed by the report in the background section. The report
investigates the different networking protocols being used and how secure a network these
protocols can provide. These are mostly the TCP/IP, HTTP, FTP and SMTP protocols.
Detailed study of TCP/IP, HTTP and FTP are to be provided in the background section along
with a thorough analysis of intrusion prevention. Network security is mostly ensured by the
networking protocols and the security solutions offered by third party vendors. To provide
additional security, intrusion prevention systems can be implemented. These systems monitor
the entire network traffic and detects malicious attacks that other security solutions cannot.
After this the report ends with concluding notes.
Computer Organization and Network Analysis_2

COMPUTER ORGANIZATION AND NETWORK ANALYSIS2
Table of Contents
Introduction................................................................................................................................4
Evaluation 1...............................................................................................................................4
Background............................................................................................................................4
Advantages.............................................................................................................................5
Harvard Architecture..........................................................................................................5
Von Neumann Architecture...............................................................................................5
Virtualization......................................................................................................................6
Disadvantages........................................................................................................................6
Harvard Architecture..........................................................................................................6
Von Neumann Architecture...............................................................................................7
Virtualization......................................................................................................................7
Ethical and Legal Issues.............................................................................................................8
Computers as targets..............................................................................................................8
Computers as storage devices................................................................................................8
Computers as communication tools.......................................................................................8
Law Enforcement...................................................................................................................8
Practical......................................................................................................................................9
Half Adder..............................................................................................................................9
Full Adder............................................................................................................................10
Virtual Machines..................................................................................................................12
Evaluation 2.............................................................................................................................13
Computer Organization and Network Analysis_3

COMPUTER ORGANIZATION AND NETWORK ANALYSIS3
Background..........................................................................................................................13
Advantages...........................................................................................................................15
Internet protocols.............................................................................................................15
Intrusion Prevention.........................................................................................................16
Disadvantages......................................................................................................................16
Internet protocols.............................................................................................................16
Intrusion Prevention.........................................................................................................17
Legal and Ethical Issues.......................................................................................................17
Practical....................................................................................................................................18
Router Configuration...........................................................................................................18
Internet Tools & Protocols...................................................................................................20
Conclusion................................................................................................................................21
Bibliography.............................................................................................................................23
Computer Organization and Network Analysis_4

COMPUTER ORGANIZATION AND NETWORK ANALYSIS4
Introduction
The following report provides a study of the architectures based on which these
processors are designed. The associated advantages and disadvantages of these architecture
types and that of virtualization offered by alternate operating systems then get discussed.
Then the report is to go through the ethical and legal issues that computers and networks
powered by these processors can face. After that the report ends with concluding notes.
Evaluation 1
Background
The digital computer organization or computer architecture provides design and
description of computer systems. This serves as the art and science of selection and
interconnection of computing hardware that is required in the creation of computer systems
such that they meet the desired performance and functionalities within the allocated cost. The
two main methods by which computer architectures are being designed today are the Harvard
architecture and the Von Neumann architecture (Parhami 2019). CPUs based on these
architecture also have a specific set of instruction that enables systems to conduct
virtualization by hosting hypervisor-based virtual machines.
As per Hernandez Zavala et al. 2015, the Harvard architecture comprises separate
program memory and data memory with independent bus connection. On top of this
architectural techniques like pipelining and parallelism are applied to improve compute
performance.
According to Fu et al. 2016, the quantum plane of the processor is divided to specific
sections for processing, communication as also for storing quantum states. When applying the
Von Neumann architecture, in computing systems, various challenges can be introduced
Computer Organization and Network Analysis_5

COMPUTER ORGANIZATION AND NETWORK ANALYSIS5
because of parallelization. One of the major issue is the memory wall issue which quite
difficult to solve through conventional methods.
Based on the study of Li and Kanso 2015, the two main ways of achieving
virtualization can be the hypervisor-based or container-based virtualization. The hypervisor-
based virtualization includes virtual machines like the ones made available by Microsoft
Hyper-V, VMware or Citrix XenServer while container-based virtualizations can be the OS
level virtualizations of Linux systems like LXC or Linux Containers. Linux is the alternate
family of operating systems available for computer users. There exist several branches of
Linux based operating systems. Among them, Ubuntu is the most user friendly OS for the
mainstream users while Kali Linux can be used by attackers and system administrators.
Unlike hypervisor-based VMs, Container-based virtualization do not emulate entire hardware
environments.
Advantages
Harvard Architecture
The Harvard architecture based processor architectures contain very efficient pipelining
where it is possible for overlapping the instruction fetch and the operand fetch.
The CPUs based on the Harvard architecture contain different independent buses for
instructions and data of programs.
These kind of CPUs are fine tuned to process the FPGA specific workloads.
The architecture layout enables the CPU to execute the programs much faster. The actual
execution time is directly proportional to the complexity of the hardware.
Computer Organization and Network Analysis_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Impact of Computer Organization and Operating System, Networking and Internet Security on IT Company
|19
|3716
|376

Networking and Internet Security Assignment
|1
|287
|18

Classification of Network Protocols
|6
|2727
|25

Transmission Control Protocol/Internet Protocol PDF
|88
|24971
|186

Physical Security: ARPANET, TCP/IP Protocol, Process Control Networks, LAN, WAN and VPN
|7
|1580
|359

Assignment | Cyber Security
|23
|2174
|14