Computer Architecture - CSE4001 "Operating Principles of The Computer Architecture"
Computer Architecture - CSE4001 "Operating Principles of The Computer Architecture"
Computer Architecture - CSE4001 "Operating Principles of The Computer Architecture"
Sineth Anuhas
CL/HDCSE/CMU/119/84
FEEDBACK FORM
Student: K.G.S.Anuhas
Assessor:MS.Thilini
Marks Awarded:
Acknowledgement
I would want to thank Ms. Thilini, our computer architecture lecturer, from the bottom of my heart for helping
me through this course. I couldn't have finished the assignment effectively without her help.
I would want to sincerely thank Cardiff Metropolitan University and ICBT University for giving me the tools
I needed to study and for giving me this amazing chance.
Lastly, I want to express my gratitude to my friends and family for their inspiration and assistance. They
helped me celebrate my successes and helped me get past obstacles. Without their assistance, I would not
have succeeded.
Table of Contents
Table of Contents
a) Hexadecimal ...................................................................................................... 1
Question 1 .................................................................................................................................... 1
Question 2 .................................................................................................................................... 1
Question 1 .................................................................................................................................... 1
Question 2 .................................................................................................................................... 1
Question 1 .................................................................................................................................... 1
Question 2 .................................................................................................................................... 1
Question 1 .................................................................................................................................... 2
Question 2 .................................................................................................................................... 2
Question 1 .................................................................................................................................... 2
Question 2 .................................................................................................................................... 2
a) Question[Sum] ................................................................................................... 2
b) Question[Sum] ................................................................................................... 3
c) Question[Multiplication] ................................................................................... 3
d) Question[Multiplication] ................................................................................... 3
e) Question [Division]............................................................................................ 3
3. microprocessor ..................................................................................................................4-5
ii. 63548
= 6 3 5 4 = 110 011 101 100 = 1100 1110 1100 = C E C
b)
i. 11101110110
= (1 × 2¹⁰) + (1 × 2⁹) + (1 × 2⁸) + (0 × 2⁷) + (1 × 2⁶) + (1 × 2⁵) + (1 × 2⁴) +
(0 × 2³) + (1 × 2²) + (1 × 2¹) + (0 × 2⁰)
= 191010
111011101102 = 191010
c) i. . -79
7910 = 010011112
-79 = 10110000
ii. 127
12710 = 011111112
d)
i. 1024
102410 = 100000000002
12810 = 100000002
=000010000000
=111101111111
=111110000000
e)
i. -16384
1638410 = 1000000000000002
= 0100000000000000
=1011111111111111
=1100000000000000
ii. 8192
819210 = 100000000000002
= 0010000000000000
2) a) Sum of -9 and 25
Binary representation of 9 = 00001001
Invert the bits= 11110110
Add 1 to the inverted bits= 11110111
binary addition:
C) Multiplication of -3 by -8
3×8=24
Since both numbers are negative, the result is positive.
Result: 24
d) Multiplication of -12 by -5
12×5=60
Since both numbers are negative, the result is positive.
Result: 60
e) Division of -40 by -4
40÷4=
Since both numbers are negative, the result is positive.
Result: 10
3). a)
b)
The primary function of a microprocessor is as the central processing unit (CPU) of a computer system. It is
responsible for executing instructions, performing mathematical and logical operations and controlling the flow of
data in the computer. Below mentioned functions are the key functions of a microprocessor
➢ Execute instruction: -
Program instructions are received from the computer by the memory. The microprocessor retrieves each of these
instructions one at a time from memory locations in order to execute them.
➢ Control flow: -
By executing unconditional and conditional instructions,The microprocessor controls the flow of instructions.
Peripheral devices that can interface with the processor include mouse, keyboards, displays, and storage devices.
Data is transferred between the processor and external devices through input/output instructions.
➢ Clock Comparison: -
To coordinate its work, the microprocessor is connected to the system clock. The clock generator generates
regular pulses, each pulse corresponding to one clock cycle. The clock speed of a microprocessor determines
how quickly it can execute instructions.
c)
The ALU performs arithmetic and logical operations. Fast ALU Contributes to overall computing speed by
ensuring processor completion. Logical comparisons and mathematical calculations are faster.
➢ Registers
Registers are small, fast storages within the processor that temporarily store data during execution. Having
enough registers reduces the slow memory access. Efficient use of registers minimizes data transfer between
different storage tiers, increasing overall processing speed.
➢ I/O Unit
The I/O Unit is the section of a computer system that manages communications between external components,
including the CPU, peripherals, and storage devices. To enhance user experience and system performance, the
I/O module is necessary. Though important, experience is not directly related to processing speed. Consequently,
the I/O module aids in increasing the computer's speed.
➢ Clock Speed
Clock speed is the speed at which the microprocessor executes instructions and is measured in hertz (Hz) or
gigahertz (GHz). A higher clock Hz means the processor can do more instructions in a given of time. Increasing
the clock Hz usually results in speedest calculations and improved overall performance.
4.a)
A software application known as an operating system (OS) is bridge between computer hardware it’s users. It
offers an interface and a range of services to make managing hardware resources and running application
software easier. It acts as a translator, converting instructions from human to a language that computers can
understand. Because the OS is essential to the entire operation of the system.
b)
There are many different kinds of operating systems out there. These are a few different types of operating
systems.
Batch OS
This type of operating system and the computer are not directly related. The batch operating system is based on
the first-come, first-served principle.
Network OS
This operating system is also known as a tightly paired system. since users of different network operating
systems are conversant with one other's network topologies. Run on servers, this operating system regulates
network activities.
Mobile OS
As its name implies, this operating system is designed for tablets and smartphones. This operating system allows
a mobile device to run a wide range of applications.
Multitasking OS
Operating system for time sharing. This is another application for operations. Multitasking system. Because there
is a limited time to complete each task. All of them are gradually being completed. Access to this operating
system is possible for more users. Tasks completed by a particular user.
c) The operating system's hardware security mechanisms are designed to ensure the security of the computer's
hardware components. These mechanisms prevent unauthorized access, interference, or misuse of hardware
resources by various processes or users.
Here are the main hardware security features
CPU protection
CPU Protection Detecting the CPU does more than just prevent it from being monitored. But this prevents other
processes from running. The processor is controlled by the time it takes to execute these instructions, not by their
duration. To solve this problem, CPU processing time is limited to 1 minute. A signal indicating that the whole
thing is stopping, so the processor cannot be held for any time.
Memory protection
Modern operating systems use memory segmentation to divide a program's address space into different
components such as code, data, and stack. To prevent unwanted access and modification of storage areas, each
partition has unique read, write, and execute permissions.
I/O protection
Operating system I/O security ensures secure and efficient communication with hardware devices. Data transfer
is optimized through buffering and caching, and system security is enhanced by techniques such as port access
control and well-designed device drivers. I/O security protects against both unauthorized access and tampering
with input and output operations in general.
Hardware security is critical to the overall security and stability of the operating system. They form the basis for
providing access control, process isolation, and preventing unintentional interference with critical system
resources. Operating systems use these hardware-level features to implement effective security policies and
ensure the reliability of the computing environment.
5.
a)
Cooling – Y
Dehumidifier U
Lighting – L
Irrigation – I
A B C D Y U L I
0 0 0 0 0 0 0 0
0 0 0 1 0 1 1 0
0 0 1 0 0 0 0 1
0 0 1 1 1 1 0 1
0 1 0 0 0 0 0 0
0 1 0 1 1 1 1 0
0 1 1 0 0 0 0 1
0 1 1 1 1 1 0 1
1 0 0 0 0 0 0 0
1 0 0 1 0 1 1 0
1 0 1 0 0 0 0 1
1 0 1 1 1 1 0 1
1 1 0 0 0 0 0 0
1 1 0 1 1 1 1 0
1 1 1 0 0 0 0 1
1 1 1 1 1 1 0 1
Part 2
•Laptop:
• CPU: Intel Core i5 or
i7
• GPU: Integrated
graphics
• Storage: 512GB SSD
• Memory: 16GB
RAM
Recommendation
PC
a. Dell OptiPlex 7000 Series
i. CPU: Intel Core i5 or
i7
ii. GPU: Integrated
graphics
iii. Storage: 256GB SSD
iv. Memory: 8GB RAM
Laptop
a.Dell XPS 13 or XPS 15
i. CPU: Intel Core i5 or
i7
ii. GPU: Integrated
graphics
iii. Storage: 512GB SSD
iv. Memory: 16GB
Recommendation
• HP EliteDesk 800 G6
• CPU: AMD Ryzen 5
or Intel Core i5
• GPU: Integrated
graphics
• Storage: 512GB SSD
• Memory: 16GB
Justification: Lecturers may need a slightly
more powerful system for tasks like
preparing presentations and handling
documents.
Recommendation
Recommendation
• HP ProDesk 400 G6
• CPU: Intel Core i5
• GPU: Integrated graphics
• Storage: 256GB SSD
• Memory: 8GB RAM
Justification: Similar to front office staff,
counselors can work efficiently with
standard office machines.
5. IT Administrators • Servers:
• CPU: Dual Intel
Xeon processors
• Motherboard: Server-
grade motherboard
• GPU: Not needed
(server environment)
• Storage: RAID-
configured HDDs or
SSDs for redundancy
(total capacity based
on needs)
• Memory: 32GB to
64GB ECC RAM
• IT Administrator PCs:
• CPU: Intel Core i7 or
AMD Ryzen 7
• Motherboard:
Compatible with the
selected CPU
• GPU: Dedicated GPU
for management tasks
• Storage: 512GB SSD
• Memory: 16GB
RAM
Recommendation
1. IT Administrators (Servers):
Dell PowerEdge R740
• CPU: Dual Intel Xeon processors
• GPU: Not applicable
• Storage: RAID-configured HDDs or
SSDs (as needed)
• Memory: 32GB to 64GB ECC RAm
2. IT Administrators (PC):
Recommendation
HP ProDesk 600 G6
• CPU: Intel Core i5
• GPU: Integrated graphics
• Storage: 256GB SSD
• Memory: 8GB RAM
Recommendation
Recommendation
Table 1.0
2.
1. Branch Manager:
Software Requirements:
• Office Suite: Microsoft Office or Google Workspace for document creation and collaboration.
2. Lecturers:
Software Requirements:
• Learning Management System (LMS): Moodle, Canvas, or Blackboard for course management.
3. Front Office:
Software Requirements:
Software Requirements:
5. IT Administrators:
Software Requirements:
• Help Desk: ServiceNow or Jira Service Desk for ticketing and support.
Software Requirements:
7. Library:
Software Requirements:
Software Requirements:
Software Requirements:
• Guest Account Management: Windows Guest Mode or similar for restricted access.
(Skidmore, n.d.)
3.
1. Branch Manager:
Hardware Requirements:
2. Lecturers:
Hardware Requirements:
• Input Devices: Multimedia presentation remote, interactive pen tablet for annotations.
3. Front Office:
Hardware Requirements:
• Input Devices: Standard keyboard, mouse, barcode scanner for efficient document handling.
4. Counselors:
Hardware Requirements:
• Other Hardware: White noise machines for privacy during in-person counseling.
5. IT Administrators:
Hardware Requirements:
• Other Hardware: Network monitoring tools, server racks for physical infrastructure.
6. Administration:
Hardware Requirements:
7. Library:
Hardware Requirements:
8. Lecture Halls:
Hardware Requirements:
Hardware Requirements:
These standards take into account input, output, and other hardware devices required for user requirements,
while also taking into account the individual needs of each functional area. The actual hardware options could
change depending on user preferences, technology developments, and financial constraints. In order to ensure
smooth operation across departments, the system design should also take software needs and integration into
account.
4.
Strengths
The design considers the unique needs of each functional area, ensuring that hardware and software align with
specific job roles.
• Efficiency and Productivity:
Hardware specifications, such as dual monitors for IT administrators and interactive boards for lecture halls,
enhance efficiency and productivity.
• Integration of Modern Technology:
The inclusion of RFID scanners, document cameras, and interactive boards reflects a commitment to leveraging
modern technology for improved functionality.
• Scalability:
The design allows for scalability, accommodating growth by including features like server racks and considering
the potential expansion of lecture halls.
Weaknesses
• Diversity in Hardware Brands:
The design mentions specific brands for hardware, which might limit flexibility and increase costs. Consider
diversifying hardware brands to explore cost-effective alternatives.
• Security Considerations:
Security measures for sensitive areas like the IT infrastructure and counseling offices should be explicitly
outlined. Consider implementing biometric authentication or secure access controls.
• Sustainability:
The design could benefit from a sustainability perspective. Consider energy-efficient hardware, like monitors
with low power consumption, to reduce the organization's environmental impact.
Recommendations and Enhancements:
• Standardization:
Standardize hardware components where possible to streamline maintenance and reduce compatibility issues.
This could include standardizing on a particular brand for desktops, laptops, and monitors.
• Security Enhancements:
Implement advanced security measures such as encryption for sensitive data, regular security audits, and
employee training on cybersecurity best practices.
• Remote Work Considerations:
Given the evolving work landscape, enhance the design to support remote work. This may involve cloud-based
solutions, secure VPN access, and collaboration tools that facilitate remote communication.
• Green IT Practices:
Integrate Green IT practices by selecting energy-efficient hardware, implementing power management features,
and promoting responsible e-waste disposal.
• User Training Programs:
Develop comprehensive training programs for users, especially in areas like IT administration and library
management, ensuring they maximize the potential of the implemented technologies.
• Regular Maintenance Schedule:
Establish a regular maintenance schedule for hardware and software updates. This ensures that all systems
remain secure, efficient, and compatible with the latest technologies.
• User Feedback Mechanism:
Implement a user feedback mechanism to gather insights into the effectiveness of the implemented systems. This
could inform future upgrades and adjustments based on real-world usage.
• Collaboration Platforms:
Enhance collaboration platforms for better communication across departments. This could involve integrating
instant messaging tools, collaborative document editing, and project management platforms.
• Data Backup and Recovery:
Strengthen data backup and recovery processes to ensure minimal data loss in case of hardware failures or
unforeseen events. Consider cloud-based backup solutions for added reliability.
• Accessibility Features:
Ensure that all systems are accessible to users with disabilities. Implement accessibility features in software and
consider ergonomic hardware options.
Gryffindor Institute can optimise its IT infrastructure for increased efficiency, security, and flexibility to future
technological breakthroughs by implementing these suggestions and changes. Maintaining up-to-date knowledge
of industry best practices and periodically reevaluating the state of technology can also help the organization's IT
projects succeed.
Turnitin Report
C architecture.docx
by Sineth Anuhas Kithulgoda Gamage
C architecture.docx
by Sineth Anuhas Kithulgoda Gamage
Submission date: 12-Jan-2024 07:18PM (UTC+0000)
2
1
7
10
5
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
8
1
9
C architecture.docx
ORIGINALITY REPORT
27 % 5% 1% 25%
SIMILARITY INDEX INTERNET SOURCES PUBLICATIONS STUDENT PAPERS
PRIMARY SOURCES
to
1 University
of
Su
bmit Greenwich
ted
to Student
Univ Paper
ersit
y of
Wal
es
Instit stage-edx-
5 ute,
Card
prospectus.ed
x.org
iff
Internet
Student
Source
Paper
Merton
2 Submitted to
6 Taylor
Goodrich.
Nelson and
Colne
"CONCRE College
TE
INTERPRE Student
TATIONS Paper
OF
DIRECTED
NUMBERS
",
School idoc.pub
7 Science Internet
and Source
Mathemati
cs, 1934
Publicatio
blog.infrasp
n
8 eak.com
Internet
cyberlenin Source
3 ka.org
Internet
Source
Submitted
4
23% <1%
1% <1%
<1%
<1% <1%
<1%
topdigital.agency
Internet Source
9
answersdrive.com
Internet Source
10
Exclude quotes Off Exclude bibliography Off
0|Page
1|Page