Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Demonstrate awareness of the impact of operating systems and networks on professional practice and related legal, ethical, security and social issues

Architecture and Characteristics of Intel's Atom Processor

The project that has been chosen in context to this subject “Computer Organization and Operating Systems” is development of a confidential and ubiquitous system infrastructure for a distributed Customer Banking Service comprising of two types of transaction as in the branch and on-line banking. The system have to developed such that it is able to handle the customers’ banking transactions and additionally has to offer facilities for the customers to get information about the service to contact an adviser to get assistance and so on. The topics that are used in accordance to the project are Intel’s Atom processor for Internet based information systems.

The Intel's Atom family has 32 KB of L1 direction store, 24 KB of L1 information reserve and a L2 store of 512 KB with 1 MB in the double center processor and the sorts and limits in the processors are dictated by the chipsets and not by the processors (Kareem and Kumar 2016). The Atom has been based on an unexpected smaller scale engineering in comparison to those of the present double center ones, but then the Atom family contains a similar direction set as found in x86 processors as in the center design. The processors like the Pentium Pro, Pentium II and higher ran microinstructions not all together, while the Atom runs such guidelines all together simply like the main Pentium. This has empowered lessening in cost, since the segments compensated for sending and controlling microinstructions has been expelled from the outline (Burres et al. 2015). The processor fills in as the PC's center and cerebrum, and it is utilized to make all PC operations conceivable. Be that as it may, due to the quick changing patterns in PC innovation today, processors, working frameworks and other relating programming capacities strife with each other, hence making issues sufficiently genuine prompt a PC breakdown.

The demonstration of figuring out which handle in the prepared state ought to be moved to the running state is known as Process Scheduling. The prime point of the procedure planning framework is to keep the CPU occupied constantly and to convey least reaction time for all projects (Siri et al. 2014). For accomplishing this, the scheduler must apply suitable principles for swapping forms IN and OUT of CPU. In the working framework, memory must be allotted to client programs, and reused by different projects when it is never again required. The fundamental issue in overseeing memory is knowing when to keep the information it contains, and when to discard it with the goal that the memory can be reused. The center programming segments of a working framework are all in all known as the piece. The part has unhindered access to the greater part of the assets on the framework (Jeffers, Reinders and Sodani 2016). As working frameworks ended up plainly bigger and more perplexing, this approach was to a great extent deserted for a particular approach which assembled segments with comparable usefulness into layers to assist working framework planners with managing the multifaceted nature of the framework. In this sort of design, each layer discusses just with the layers quickly above and beneath it, and lower-level layers give administrations to more elevate amount ones utilizing an interface that shrouds their execution.

Importance of Intel's Atom Processor for Internet-Based Information Systems

The majority of the Atom family uses the capacity of utilizing the sit without moving processor time shaping a virtual second processor, which is named as "hyper threading innovation". In this, the working framework takes a gander at each of the center as double processors, regularly called two strings (Burres et al. 2014). Undoubtedly this innovation is less proficient than "double center" frameworks, yet on the other hand it gives the framework additional execution. The clock speed of Atom processors continues as before notwithstanding when sitting, and does not check down out of gear state. The Atom has been composed utilizing 45 nanometer (nm) innovation, which has made the Atom processor the littlest on the planet (Kobza, Vojtko and Krajcovic 2015). This has been conceivable with the diminishment in the kick the bucket measure since the segments going inside the semiconductor are littler.

The working frameworks fill in as transitional between all equipment's and programming's of the framework. There is no compelling reason to know any specialized dialects for utilizing working frameworks. The working framework is thought to be the stage of all projects (Zahir, Ewert and Seshadri 2013). The disseminated Customer Banking Service to be produced will likewise encourage on-line managing an account consequently the Intel's Atom processor has been picked as it bolsters portable web gadgets. A dispersed working framework is required for building up the Customer Banking administration as it is an expansion of the system working framework that backings more elevated amounts of correspondence and joining of the machines on the system.

The main disadvantage of the Intel’s Atom processor is that it is not intense and will have the capacity to do things like play new 3D diversions or alter recordings and conceivably not run programming like Photoshop. With the assistance of this Intel Atom processor will have the capacity to go on the web, visit on texting and Voice over IP and additionally webcam (Rong and Shi 2015). The utilization of Intel Atom processors will compose records utilizing an office suite and things like that without issues. Working frameworks frequently require longer memory get to times because of page table query anyway it can be enhanced utilizing TLB and protected page tables. There are likewise regularly modified page tables and the memory prerequisites is one section for every VM page (Tu 2015). The execution of working framework can be enhanced utilizing multilevel page tables and variable page sizes (super-pages). The monitored page tables restricts the usefulness of working frameworks. The working frameworks are frequently open to infections and assaults. The working framework does not offer an easy to understand approach to work with the PC anyway it is a stage which enables developers to make programming that makes utilization of PC assets. From a client's purpose of a view, a working framework is pointless.

Issues with Operating Systems and Their Role in Supporting the System

Lakdawala et al. (2013), depicted morals as the guideline of good and bad that people, going about as free good specialists, use to settle on decisions to control their practices. Data frameworks bring up new moral issues for both people and society since they make open doors for extreme social change, and this debilitate existing conveyances of energy, assets, rights and commitments. Much the same as different advances, for example, steam motors, power, the phone and radios, data framework can be utilized to accomplish social advance, however can likewise be utilized to carry out violations and debilitate loved social esteems (Stallings 2014). The advancement of data frameworks will create benefits for some and cost for others. 

From the evaluation on the topics for this subject area it has been identified that Intel’s Atom processor has an important functionality to support the development of system infrastructure for a distributed Customer Banking Service. This is because of the way that the clock speed of Atom processors continues as before notwithstanding when sitting, and does not check down out of gear state. The Atom has been outlined utilizing 45 nanometer (nm) innovation, which has made the Atom processor the littlest on the planet. This has been conceivable with the diminishment in the bite the dust estimate since the segments going inside the semiconductor are littler. The operating systems is also essential for the system to be operated in branch. The machines in the branch have to be installed with latest operating systems or that can be protected from virus and other attacks. The operating system is considered to be the platform of all programs. The distributed Customer Banking Service to be developed will also facilitate on-line banking hence the Intel’s Atom processor has been chosen as it supports mobile internet devices. The performance of operating system can be improved using multilevel page tables and variable page sizes (super-pages). The guarded page tables limits the functionality of operating systems.

The project that has been chosen in context to this subject “Computer Organization and Operating Systems” is development of a confidential and ubiquitous system infrastructure for a distributed Customer Banking Service comprising of two types of transaction as in the branch and on-line banking. The system have to developed such that it is able to handle the customers’ banking transactions and additionally has to offer facilities for the customers to get information about the service to contact an adviser to get assistance and so on. The architecture, characteristics of Intel’s Atom processor have been analyzed along with the design features and applications to review the importance of these processors for internet based information systems. Further, the issues with operating systems have been taken into consideration to enable successful development of the distributed Customer Banking Service system.

The Need for Distributed Customer Banking Service System

The greater part of the Atom family uses the capacity of utilizing the idle processor time framing a virtual second processor, which is named as "hyper threading innovation". In this, the working framework takes a gander at each of the center as double processors, frequently called two strings. Undoubtedly this innovation is less productive than "double center" frameworks, yet on the other hand it furnishes the framework with additional execution. The clock speed of Atom processors continues as before notwithstanding when sitting, and does not check down out of gear state. The operating systems serve as intermediate between all hardware’s and software’s of the system. There is no need to know any technical languages for using operating systems. The operating system is considered to be the platform of all programs. The distributed Customer Banking Service to be developed will also facilitate on-line banking hence the Intel’s Atom processor has been chosen as it supports mobile internet devices. 

The analysis is being done with the help of subject topics as Intel’s Atom processor for Internet based information systems and issues in operating systems. Both the topics played an important role to understand and gain in-depth knowledge on the concept of computer organization and operating systems required for developing the distributed Customer Banking Service system. The architecture, characteristics of Intel’s Atom processor have been analyzed along with the design features and applications to review the importance of these processors for internet based information systems. Further, the issues with operating systems have been taken into consideration to enable successful development of the distributed Customer Banking Service system. From the review on issues of operating system, it has been found that scheduling is an essential component that must be considered while determining the suitable operating system for distributed systems. The memory allocation and architecture of operating systems also has an important role as it operating system is the core component that helps the users to interact with hardware in systems. The processors like the Pentium Pro, Pentium II and higher ran microinstructions not all together, though the Atom runs such guidelines all together simply like the main Pentium. This has empowered decrease in cost, since the parts compensated for sending and controlling microinstructions has been expelled from the outline.

In this report, the discussions are carried out on a project to develop a confidential and ubiquitous system infrastructure for a distributed Customer Banking Service system that will be in the branch as well as support on-line banking. The analysis is being done with the help of subject topics as major internet protocols and technologies along with system security and protection. Both the topics played an important role to understand and gain in-depth knowledge on the concept of major internet protocols and technologies along with system security and protection required for developing the distributed Customer Banking Service system. The TCP/IP is the most common internet protocol and have been analyzed along with the design features and applications to review the importance of system security and protection. Further, the major internet protocols and technologies have been taken into consideration to enable successful development of the distributed Customer Banking Service system. From the review on the various measures for system security and protection, it has been found that encryption is an essential component that must be considered while determining the security for distributed systems. Encryption helps to protect the network and the systems that will be used for distributed Customer Banking Service. 

Facilitating Online Banking with Intel's Atom Processor

The Internet Protocol (IP) is characterized as the interchanges protocol that brings together correspondence crosswise over a wide range of system innovations in the Internet. Each PC on a system is related to an IP address, which is 32-bit arrangement of four numbers (Jorgensen 2016). Each number reaches from 0 to 255, with each number isolated by a dab in IP addresses, for example, 11.222.234.45. While TCP/IP characterizes bring down layer Internet protocols, there are additionally particular application-layer protocols for email, document exchange, directing, and different capacities that work on top of TCP/IP. One that most PC clients know about is VoIP or "voice over IP." TCP/IP has likewise empowered Internet broadcasting which in the soonest emphasess gave us webcasts and online radio stations that individuals could access from anyplace on the planet (Xiao and Mukherjee, 2014). Those applications extrapolated to give clients destinations like iHeartRadio that total music and enable audience members to make their own stations, and additionally tune in to existing channels. The same goes for YouTube which introduced the capacity to watch everything from show film to corporate-created materials to an unending number of recordings highlighting adorable pets. The Internet Protocol (IP) is the strategy or protocol by which information is sent starting with one PC then onto the next on the Internet. Every PC (known as a host) on the Internet has no less than one IP address that remarkably distinguishes it from every other PC on the Internet (Irshad et al. 2015).

At the point when information is sent or received (for instance, an email note or a Web page), the message gets separated into little lumps called parcels. Each of these parcels contains both the sender's Internet address and the collector's address. Any parcel is sent initially to an entryway PC that comprehends a little piece of the Internet (Achan et al. 2014). The portal PC peruses the goal address and advances the bundle to a contiguous passage that thusly peruses the goal address et cetera over the Internet until the point when one door perceives the parcel as having a place with a PC inside its prompt neighborhood or area. That portal then advances the bundle straightforwardly to the PC whose address is determined.

A firewall is a system security framework, either equipment or programming based, that utilizations principles to control approaching and active system movement. A firewall goes about as a boundary between a confided in organize and an untrusted arrange (Watfa et al. 2017). A firewall controls access to the assets of a system through a positive control display. This implies the main movement permitted onto the system is characterized in the firewall arrangement; all other activity is denied. The soonest firewalls worked as parcel channels, reviewing the bundles that are exchanged between PCs on the Internet. At the point when a parcel goes through a bundle channel firewall, its source and goal address, protocol, and goal port number are checked against the firewall's administer set (Khademi et al. 2017). Any bundles that are not particularly permitted onto the system are dropped (i.e., not sent to their goal). For instance, if a firewall is arranged with a manage to piece Telnet get to, at that point the firewall will drop bundles bound for TCP port number 23, the port where a Telnet server application would be tuning in.

A protocol depicts an arrangement of standards or systems that a given errand must take after. It distinguishes the traditions that work on a question, for example, how to make associations for correspondence or document exchange, or network. Here are three protocols: exchange, email and program advancement. Exchange protocols move records and information starting with one area then onto the next. Two PCs in the operation are required: one is an exchanging server and the other a getting customer (Harp et al. 2016). FTP (record exchange protocol) permits the exchange of documents. It builds up an association with a remote customer and exchanges the records until finished, and afterward it detaches. The association can be in an inward system or over the Internet. Created in 1971, this protocol filled in as one of the targets for the improvement of the Internet. Beberlein et al. (2017), states that a firewall squares insidious parcels from being allowed to achieve a place where they can do hurt. The key issue is not whether to piece hurtful bundles, but rather where to square them. The individual framework's working framework based firewall can be arranged to give a lot of security, yet a system based firewall, for example, a switch, can ensure numerous frameworks all the while.

The Internet Protocol keeps parcels of data in arrangement. On the off chance that a client goes disconnected, either by a pernicious client's plans or different means, any PCs it is as of now speaking with will close the association if a reaction without the best possible grouping number is gotten (Knapp and Langill 2014). On the off chance that a client blocks these messages he can perceive the ID number and react as the client, bringing about correspondence with the machine being captured. This can cause burglary of essential information. The Internet Protocol was intended to just permit a solitary association at any given moment and to have this association be steered to an unmistakable client. This absence of one of a kind recognizable proof makes it difficult to check a client and adds to the multifaceted nature of an application's security by evacuating trust in the personality of the client.

Bundle separating by a product firewall can debase the framework's execution, since it is a requesting assignment to analyze each parcel of information. An equipment firewall facilitates this weight. Whichever alternative is being picked, arranging and keeping up the firewall can be a troublesome support task (Pierson and DeHaan, Iovation 2015). A system firewall additionally can loan clients an incorrect conviction that all is well with the world, urging them not to keep up security at the machine level. On the off chance that the system firewall falls flat or is not designed legitimately, this could demonstrate unfortunate.

Web clients can go up against adulterated characters or utilize programming to keep up mystery on the Web. For instance, PrivacyX.com a free Internet benefit, enables clients to surf the Web unidentified. To do this, PrivacyX.com makes a computerized authentication for new clients when they enlist. The Web website benefit permits that secrecy can be kept up even in the advanced testament, which holds no individual data the client does not wish to incorporate (Chen et al. 2015). PrivacyX.com at that point utilizes the computerized authentication to restore the asked for data to the client, encoded. The P3P security approaches are XML-based applications. This framework enables the inclinations of clients to be coordinated exactly to the site's institutionalized protection conventions (Kizza 2013). It does not authorize Web destinations to maintain their own particular strategies, in the meantime as it will incite clients if the protection arrangement of a specific Web website does not coordinate the clients' given inclinations.

In this day and age there are such a large number of security hazard a PC organize can't be completely ensured. Regardless of the possibility that a firewall gives security from outside interlopers it can't shield the system from within. The investigation on organize security inferred that system to be secured, an equipment firewall ought to be utilized to review all the outbound and inbound demand and a product firewall to shield from different dangers, for example, malware, Trojans, infections, worms and so on. In this day and age there are numerous programmers who might need to hack an organization for entertainment only or for cash and there are a large number of infections rereleased to the web each day.

Dangers can assault a system of PCs from numerous points of view, for instance if the firewall enables messages to be sent and got and if a contaminated email is sent by a gatecrasher, it will go through the firewall and taint every one of the PCs in that privet arrange. A product firewall might be considered as an antivirus monitor which has a firewall, so this implies this kind of programming firewalls has a larger number of elements than simply just the firewall. It might have antivirus, spyware, interruption and program, email insurance and may have numerous different elements too.

References

Achan, K., Gillum, E., Xie, Y. and Yu, F., Microsoft Corporation, 2014. Automatically identifying dynamic internet protocol addresses. U.S. Patent 8,856,360.

Anwar, R.W., Bakhtiari, M., Zainal, A., Abdullah, A.H., Qureshi, K.N., Computing, F. and Bahru, J., 2014. Security issues and attacks in wireless sensor network. World Applied Sciences Journal, 30(10), pp.1224-1227.

Beberlein, L.T., Dias, G., Levitt, K.N., Mukherjee, B. and Wood, J., 2017. Network attacks and an Ethernet-based network security monitor.

Chen, G., Gong, Y., Xiao, P. and Chambers, J.A., 2015. Physical layer network security in the full-duplex relay system. IEEE transactions on information forensics and security, 10(3), pp.574-583.

Harp, D., Bearden, T. and Godfrey, J.M., At&T Intellectual Property I, LP, 2016. System and method of redirecting internet protocol traffic for network based parental controls. U.S. Patent Application 15/292,210.

Irshad, A., Sher, M., Rehman, E., Ch, S.A., Hassan, M.U. and Ghani, A., 2015. A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools and Applications, 74(11), p.3967.

Jorgensen, J.W., Intellectual Ventures I Llc, 2016. Method and computer program product for internet protocol (IP)—flow classification in a wireless point to multi-point (PTMP) transmission system. U.S. Patent RE46,206.

Khademi, N., Ros, D., Welzl, M., Bozakov, Z., Brunstrom, A., Fairhurst, G., Grinnemo, K.J., Hayes, D., Hurtig, P., Jones, T. and Mangiante, S., 2017. NEAT: A Platform-and Protocol-Independent Internet Transport API. IEEE Communications Magazine.

Kizza, J.M., 2013. Guide to computer network security. Springer Science & Business Media.

Knapp, E.D. and Langill, J.T., 2014. Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress.

Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.

Pierson, G. and DeHaan, J., Iovation, Inc., 2015. Network security and fraud detection system and method. U.S. Patent 9,203,837.

Watfa, M., Olvera-Hernandez, U., Aghili, B., Adjakple, P.M. and Tooher, J.P., Interdigital Patent Holdings, Inc., 2017. Method and apparatus for selected internet protocol traffic offload. U.S. Patent 9,661,564.

Xiao, L. and Mukherjee, A., Google Inc., 2014. Identifying internet protocol addresses for internet hosting entities. U.S. Patent 8,688,681.

Zhou, H., Wu, C., Jiang, M., Zhou, B., Gao, W., Pan, T. and Huang, M., 2015. Evolving defense mechanism for future network security. IEEE Communications Magazine, 53(4), pp.45-51. 

Batarseh, I., Haddad, G., Oreifej, R. and Al-Haddad, R., University Of Central Florida Research Foundation, Inc., 2013. Interactive electronic book operating systems and methods. U.S. Patent 8,352,876.

Burres, B., van de Groenendaal, J., Mosur, P., Robinson, J., Steiner, I., Liu, Y.F., Tan, S.S., McShane, E., Kuttanna, B. and Lakshmanamurthy, S., 2015. Intel Atom C2000 Processor Family: Power-Efficient Datacenter Processing. IEEE Micro, 35(2), pp.26-34.

Burres, B., van de Groenendaal, J., Robinson, J. and Steiner, I., 2014, August. Intel C2000 atom microserver power efficient processing for the data center. In Hot Chips 26 Symposium (HCS), 2014 IEEE (pp. 1-25). IEEE.

Chandra, T.B., Verma, P. and Dwivedi, A.K., 2016, March. Operating systems for internet of things: A comparative study. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (p. 47). ACM.

Jabeen, Q., Khan, F., Hayat, M.N., Khan, H., Jan, S.R. and Ullah, F., 2016. A Survey: Embedded Systems Supporting By Different Operating Systems. arXiv preprint arXiv:1610.07899.

Jeffers, J., Reinders, J. and Sodani, A., 2016. Intel Xeon Phi Processor High Performance Programming: Knights Landing Edition. Morgan Kaufmann.

Kareem, A. and Kumar, P., 2016. Designing a Novel Prototype to Assist and Monitor the Physically Handicapped People Using Intel Atom Processor. Recent Patents on Computer Science, 9(3), pp.231-234.

Kobza, L., Vojtko, M. and Krajcovic, T., 2015, August. Migration of a Modular Operating System to a Intel Atom Processor. In Engineering of Computer Based Systems (ECBS-EERC), 2015 4th Eastern European Regional Conference on the (pp. 144-145). IEEE.

Lakdawala, H., Schaecher, M., Fu, C.T., Limaye, R., Duster, J., Tan, Y., Balankutty, A., Alpman, E., Lee, C.C., Nguyen, K.M. and Lee, H.J., 2013. A 32 nm SoC with dual core ATOM processor and RF WiFi transceiver. IEEE Journal of Solid-State Circuits, 48(1), pp.91-103.

Lister, A., 2013. Fundamentals of operating systems. Springer Science & Business Media.

Rong, K. and Shi, Y., 2015. Intel Re-Enters the Mobile Computing Business Ecosystem. In Business Ecosystems (pp. 109-122). Palgrave Macmillan UK.

Siri, A., Meghana, G.R., Kishan, R. and Hegde, R., 2014, November. Comparison of two development boards for embedded system functionalities—Intel Galileo and Intel Atom board SYS9400. In Circuits, Communication, Control and Computing (I4C), 2014 International Conference on (pp. 153-155). IEEE.

Stallings, W., 2014. Operating Systems: Internals and Design Principles| Edition: 8. Pearson.

Tu, S., 2015, August. Atom™-x5/x7 series processor, codenamed Cherry Trail. In Hot Chips 27 Symposium (HCS), 2015 IEEE (pp. 1-28). IEEE.

Zahir, R., Ewert, M. and Seshadri, H., 2013. The medfield smartphone: Intel architecture in a handheld form factor. IEEE Micro, 33(6), pp.38-46.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). Development Of Confidential And Ubiquitous System Infrastructure For A Distributed Customer Banking Service Essay.. Retrieved from https://myassignmenthelp.com/free-samples/en0705-computer-networks-and-operating-systems/numerous-points.html.

"Development Of Confidential And Ubiquitous System Infrastructure For A Distributed Customer Banking Service Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/en0705-computer-networks-and-operating-systems/numerous-points.html.

My Assignment Help (2021) Development Of Confidential And Ubiquitous System Infrastructure For A Distributed Customer Banking Service Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/en0705-computer-networks-and-operating-systems/numerous-points.html
[Accessed 10 December 2024].

My Assignment Help. 'Development Of Confidential And Ubiquitous System Infrastructure For A Distributed Customer Banking Service Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/en0705-computer-networks-and-operating-systems/numerous-points.html> accessed 10 December 2024.

My Assignment Help. Development Of Confidential And Ubiquitous System Infrastructure For A Distributed Customer Banking Service Essay. [Internet]. My Assignment Help. 2021 [cited 10 December 2024]. Available from: https://myassignmenthelp.com/free-samples/en0705-computer-networks-and-operating-systems/numerous-points.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close