Computer Networks: I/O Hardware, External Storage, Cloud Computing OS

Verified

Added on  2023/04/04

|16
|4321
|231
Report
AI Summary
This report discusses the role of hardware input/output (I/O) devices, external storage solutions, and cloud computing within computer networks, particularly in the context of customer relationship management (CRM). It highlights the evolution from traditional I/O methods to modern haptic sensors and the shift from physical storage devices to cloud-based solutions. The report details the advantages of cloud computing, such as centralized data management and reduced costs, alongside disadvantages like security concerns and reduced user control. It also addresses legal and ethical issues related to data privacy and pricing. The report concludes that while cloud computing and advanced hardware offer significant benefits, careful planning and robust security measures are crucial to mitigate risks and ensure ethical practices. The accompanying poster and portfolio further illustrate the integration of hardware and software in computer systems and emphasize the need for ongoing improvements in system efficiency and security.
Document Page
Computer Networks
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
TABLE OF CONTENTS
ABSTRACT ....................................................................................................................................3
BACKGROUND ............................................................................................................................4
ADVANTAGES .............................................................................................................................5
DISADVANTAGES .......................................................................................................................6
LEGAL AND ETHICAL ISSUES..................................................................................................6
CONCLUSIONS .............................................................................................................................6
POSTER ..........................................................................................................................................7
PORTFOLIO ...................................................................................................................................7
REFERENCES................................................................................................................................9
ABSTRACT ..................................................................................................................................10
BACKGROUND ..........................................................................................................................11
ADVANTAGES ...........................................................................................................................12
DISADVANTAGES .....................................................................................................................12
LEGAL AND ETHICAL ISSUES ...............................................................................................13
CONCLUSION .............................................................................................................................13
POSTER ........................................................................................................................................14
PORTFOLIO .................................................................................................................................14
REFERENCES..............................................................................................................................16
2
Document Page
Title 1: Hardware I/O and external storage, Cloud computing at OS aspects
ABSTRACT
Computer optimisation is a process which was initiated right from the invention of this
device. Information became an existing entity and very significant for those working with large
volumes of the same. Customer relationship management business is completely based on
operations like storage, transferring and managing information related with consumers and
customers. Cloud computing and strong hardware have enabled businesses to gain more control
over their operations through effective data management and customer relations. The expansion
of storage facilities from physical devices to clouds has changed the functionality of operating
systems. Hardware input and output was traditionally performed through mouse, keyboards and
printers. Currently Haptic sensors are used for the input i.e. through touch or sensitive
connection with the human body.
A great transition has taken place in the external storage capabilities of the computer with
help of internet and cloud computing. The legal and ethical issues related with privacy and
sharing of data are always considered as a point of risk for the businesses. Loss of privacy
indicates that misuse of information can take place which further leads to exploitation. Apart
from various advantages, there is a significant drawback of security threat when cloud computing
operating systems are considered. Furthermore, the control and flexibility for users is reduced as
the architecture or design infrastructure has certain limitations. It can be said that with effective
use of cloud computing technologies, customer relationship management operations can be
effectively executed.
3
Document Page
BACKGROUND
Computers have certain components which together help in processing the inputs and
outputs provided by users. Operating systems and hardware devices are integral part of this
computer system irrespective of the mode of operation. Operating system (OS) is like an
administrator that handles hardware and software applications and also contributes to common
services associated with computers. Few years back, individuals just used to dream of having a
system which could be operated with bare hands i.e. without the use of any peripheral device
(Arora, Parashar and Transforming, 2013). Nowadays, this dream is reality. From smartphones
to desktops and every computer systems, everything is manageable by Haptic sensors.
Furthermore, the smart technology has also led to developments in the ways in which data or
information can be stored. The external devices that are prominently used include hard drives
and pen drives with different storage capabilities. Apart from these storage devices, internet
based platforms have also emerged recently. Amongst these cloud computing is the renowned
when it comes to computer based sharing of information (Jadeja and Modi, 2012).
I/O hardware or devices require human beings as the operator. They are not automated
and are completely based on manual functioning. The computer receives and interprets the
information which is fed through these devices. Modem, SD Card, USB Thumb drives, digital
cameras, etc. are some other I/O devices which enable both storage of information and effective
communication with the computerised system. The operating system is made compatible with
these devices by using device drivers (Zissis and Lekkas, 2012). These are software based
programs that have codes which enable smooth functioning of every external device that is being
in-tact with the computer. Operating system aspects of cloud computing include the
compatibility and accessibility for the users in different operational areas.
The basic models of cloud computing include three types of services i.e. SaaS, PaasS and
IaaS with expanded forms as Software as a Service, Platform as a Service and Infrastructure as a
Service. Web browsers, application development programs and languages and the resources
which are applied for build up of these services are quite important for the developer. From the
past 5-6 years, there is a sudden growth or emergence in the adaption of cloud computing aspects
by business organisations (Wei and et. al., 2014). The ease and convenience which is gained by
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
institution when considering the transfer of information and data handling has led to greater
inclination towards cloud computing.
Hardware and external device manufacturing cost has reduced significantly because of
these infrastructural features. The I/O devices or peripherals which are implemented in the
computing systems transmit the information from user's end to computer processor. It interprets
this command or information in terms of computer based language. The output of the command
is witnessed in the form of display on the monitor or the respective screen. The operating system
of this computer system has to be compatible with cloud computing so that in case of quick
transfer of information, the input can be transferred from through these particular devices (Jadeja
and Modi, 2012). Touchpad or trackpad is also a pointing device which transmits or interprets
the information from user to computer.
ADVANTAGES
The operating system acts as the administrator of resources, memory or the input/output
devices. The hardware devices and external storage are like complementary devices which
enhance the basic operations of the system. Common individuals cannot input the commands and
instructions which are required for initiating a process. This ease of communication has been
achieved with help of I/O devices. On the other hand, cloud computing has enabled the vision of
storing large volumes of information at just one place without actually acquiring physical spaces.
The centralised host server brings in more administration and efficient management (Arora,
Parashar and Transforming, 2013). Especially multinationals and large scale enterprises have
experienced great benefits after the adoption of cloud computing systems.
External storage devices like pen drives, hard drives, etc. are portable. Users have the
facility of taking their stored information in the form of these devices to different places without
gathering resources or worrying about the maintenance costs. Cloud computing and
compatibility with different operating systems has helped reducing the costs which are involved
in purchase of external storage devices (Jadeja and Modi, 2012). The information stored or
uploaded over a crowd is directly accessed by the individual irrespective of their place or mode
of operation. Being an internet based application, there are no risks involved in transportation of
cloud or the information in physical form.
5
Document Page
DISADVANTAGES
The computer is completely based on the central processing unit and its dimensions. I/O
devices which are considered in hardware category have to be linked or associated with this unit
so that respective information can be easily transferred or communicated. The need of efficient
peripherals was recognised when there is no medium to communicate or transfer the commands
by user. The computer has to be provided some sort of instruction in a particular medium. Be it
touch or through keyboard or mouse (Ren, Wang and Wang, 2012). This instruction is further
interpreted to get the coded message. This often creates a delay in getting output and hence there
is a drawback assessed. The hardware or I/O devices have to be made efficient enough in
reducing the operational run time.
Cloud computing systems also have some disadvantages which have been depicted as
follows:
ï‚· Security and privacy is hindered when the platform undergoes downtime or outage.
ï‚· Resources and links which are associated with the cloud are like gateways for hackers
and breachers to get desired information after hacking security walls.
ï‚· The cloud computing services are addressing lack of control and flexibility when it
comes to extended functionality.
LEGAL AND ETHICAL ISSUES
There are different legal frameworks that have been devised by the government for
gaining control over the unethical practises that undergo on online or internet based platforms.
Information technology sector is subjected to vulnerability from hackers and breachers with their
agenda of performing online thefts. Furthermore, the companies have increased their dependency
over cloud computing services (Zissis and Lekkas, 2012). If improper or non-standardised
pricing is adapted by the companies in providing specific platforms then ethical issues arise.
Henceforth, use of cloud computing and external devices must be planned pre-cautiously so that
probability of unethical practises is reduced.
CONCLUSIONS
This report depicts the functioning of I/O devices or hardware and external storage when
it comes to customer relationship management. There has to be effectiveness in every business
6
Document Page
function so that stakeholders do not suffer any sort of negations. The report depicts advantages
and disadvantages of the hardware devices and operating system aspects of cloud computing. It
can be inferred that there is a requirement of more safety features on these platforms so that any
sort of loop hole or drawback is not assessed by the users.
It has also been realised from the findings of this report that there are certain legal and
ethical issues related with operation system compatibility of cloud computers and the hardware
devices. These include non-standard pricing and high risk of loss of information. The processing
of outcomes is also delayed in these kinds of operations (Wei and et. al., 2014). Hence, it is
important to develop a system that reduces the run-time of interpretation of inputs and execution
of outputs from hardware to software. Assembly level languages can be improvised and better
codes can be generated which will further instigate effective functioning of these cloud
computing services.
POSTER
The computer organisation is incomplete without hardware and software amalgamation.
This includes the use of I/O functions by the users as hardware and the inclusion of cloud
computing in different operating systems through software. The application of such computer
systems is much better in the corporate market structure because of ease and convenience that is
being provided by these technologies. The data handling and management of different business
functions has become easier. On the contrary, there is a need to fight the legal and ethical issues
which have been associated with this subject. No individual or customer should be exploited in
any manner with help of unethical practises in handling cloud computing.
PORTFOLIO
Introduction
The computer organisation and operating systems are considered as interlinked because
absence of any one feature can result in total disruption of entire computer system. An
architecture has to be produced before designing and implementing a code for the design.
Hardware and software are the two main components of this architecture which involves proper
specification and then designing or implementation into real time practise. I/O and external
devices are the basic components that help in transmitting the information from user to the
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
computer. The processor present in the computer interprets this command and then executes
according to programming requirements. On the other hand, operating system manages all the
resources that are employed in the entire functioning along with cloud computing. The use
internet based platform for data handling and collection is cloud computing.
Analysis
The setting up or infrastructural cost for using a cloud computing software along with
operation system enabling is very less. The advantages which are addressed by organisations or
institutions that deploy such strategic technologies are plenty. It is important to analyse these
benefits with the disadvantages so that processing of data management tools is not hindered. The
security and flexibility features of these software have to be aligned with I/O devices so that
delay or run time required for functioning is reduced. When commands are provided to the
computer with help of external device like the keyboard or mouse, there is some amount of time
required for entire processing. This time can be reduced when certain operations are advanced
through less extensions or plug-in requirements.
There is a huge risk involved with use of external storage elements. The risk or losing the
device or misplacing or getting data corrupted is very high with these kinds of devices. For
example, pen drives and hard drives if kept anywhere or connected with any sort of corrupted or
virus struck device then data stored in these would be lost. On the other hand, cloud computing
services help in reducing this risk and brining in more effectiveness in handling information. The
use of this software based technology has to be guided with security features so that data is
protected on these platforms also.
Conclusions
The use of I/O devices and external storage when interrupt driven can become more
efficient and fast in terms of speed. This brings in more effectiveness in the computer
organisation as software then can interpret correct commands. The cloud computing aspects
when collaborated with operating systems then input and output can be effectively provided to
the users. The disadvantages that often come up with cloud computing can be resolved using
ethical practises and the use of security walls and ultimate virus protection.
8
Document Page
REFERENCES
Books and Journals
Arora, R., Parashar, A. and Transforming, C. C. I., 2013. Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications. 3(4). pp.1922-1926.
Jadeja, Y. and Modi, K., 2012, March. Cloud computing-concepts, architecture and challenges.
In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International
Conference on (pp. 877-880). IEEE.
Ren, K., Wang, C. and Wang, Q., 2012. Security challenges for the public cloud. IEEE Internet
Computing. 16(1). pp.69-73.
Wei, L. and et. al., 2014. Security and privacy for storage and computation in cloud
computing. Information Sciences. 258. pp.371-386.
Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation
computer systems. 28(3). pp.583-592.
9
Document Page
Title 2: Data Communications, Cloud Computing at Services and Security
ABSTRACT
Digitalisation is the major transformation that has occurred due to changes in basic
technical operations from analog computing to digital aspects. Computerised systems are
considered as digital networks and the communication or transfer of information that takes place
between two or more computers is called data communication. There is a deep link between data
communication and cloud computing. The services that are provided over these systems include
file transfer, storage options, analysis, integration with different operation systems, etc. These
many advantages make business organisations inclined towards working with enabling of cloud
computing as the prime storage locations.
But the security and services of cloud computing and data communications are not so
efficient as is perceived by lame people. There are different types of operating systems which are
based on the type of use and the number of users engaged. The availability of options for multi-
tasking and with multiple users opens gates for hackers and breachers to track personal and
private information and then use it for their own benefits. These kinds of ethical and legal issues
often arise with data communication and cloud computing services. Often organisations that
integrate cloud computing services face the legal issue of infrastructure cost reduction. Hence, it
is important to execute a plan which will help in reducing the risks which are associated with
cloud computing services and hampering data communications.
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
BACKGROUND
Conversation or communication is initiated when there are two or more entities sharing
some thoughts or exchanging their ideas. This transfer of digital data between two or more
individuals or systems is considered as data communication. According to (AlZain and et. al.,
2012), the entire computing and use of technologies for analysing and decoding the messages is
performed in digital communications. Before implementing the cloud computing services, it is
important to understand and analyse the concept of cloud. It should be adaptable and appropriate
for the area so that future outcomes are justified. Often considered as stacks, this kind of service
is very convenient and provides on-demand access to different configurable resources.
When combining digital or data communications with cloud computing services, the term
used for this technology is cloud communications. Every individual irrespective of their purpose
of functioning is focusing on better connectivity and easier sharing of information (Dinh and et.
al., 2013). Unlike earlier times when people could share information through telegram or letters,
the current technological base has enabled transfer of information through emails, newsletters,
social media websites, etc. An internet based infrastructure is established that helps in hosting the
entire information from different sources over one server or centre.
A significant invention developed under cloud computing services is cloud telephony.
The organisation or institute that adopts to this kind of technology has its own private branch
exchange which means that all the telecommunication processes taking place in this particular
region or area shall belong to the organisation itself. Hosting this kind of a network is much more
secure and limits the interference caused by external environment (Mohamed, Abdelkader and
El-Etriby, 2012). The shift or transition of companies especially those with information
technology from software based application to cloud based platforms has reduced infrastructural
costs and also increased the facilities for concerned technologies. The nature of information that
is being transferred over the cloud computing services especially the communications branch
includes voice, data and video data. This implies that all types of information irrespective of their
characteristic can be transferred and shared over the internet through cloud computing and
communications (AlZain and et. al., 2012).
Concerns regarding security if information transfer have been arising with time. Hacking
and online thefts are two important global issues which are causing the organisations to consider
11
Document Page
cloud computing and shift from traditional businesses to that of online as threat oriented. The
demand of customers in the current scenario is to take utmost advantage of their online
operations without getting caught or infected by the online security threats.
ADVANTAGES
There are various benefits that are reaped through data communication and cloud service
quality. Cloud computing aids for streamlining IT processes that are used in business. Major
advantage for implementing this practice is that it is easy to implement and it allows businesses
to retain business processes and applications. Accessibility of data and information is made
easier and it aids for maximizing the internet cloud infrastructure. Productivity and efficiency by
ensuring your application accessible. No hardware are required for implementing this practices
in effective way (Yang and Jia, 2012).
Physical stronger centre is not required for implementing these practices and overall cost
per head is lower with cloud hosting services. It supports the management of the company for
making use of extra time and cost for making improvements in the infrastructure of the company.
The clouds in cloud computing services are easily accessible and it aids for adding or subtracting
the resources as per the needs of the business (Zissis and Lekkas, 2012). System will grow in
effective way by making use of these services. Along with this faster and more accurate
retrievals of computer application and data is made possible by making use of these services.
DISADVANTAGES
There are some disadvantages that are associated with data communication and cloud
service security. These practices are challenging to control and due to that impact is observed on
making use of these practices. It is critical that systematic and organized approach should be
used for carrying out the practices ineffective way. When these services are moved to cloud
issues related to information technology are faced (Mohamed, Abdelkader and El-Etriby, 2012).
It becomes difficult for handling the issues and due to that it is a big disadvantage for making use
of data communication and cloud service security. Some cloud services are having limited
version due to that they prove less effective as compared to other cloud computing services.
Security is the major issue that is being faced in implementing cloud computing services
and it is critical that best service standards should be used so that issues should not be faced
12
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]