Thursday, January 9, 2020

Computer Systems And Networks Configuration - 1395 Words

 Assignment 1 Computer Systems and Networks Configuration Course: Bsc (Hons) Computer Science Module: CO5023 Computer Systems and Networks Laksamana College of Business Student ID: 1525584 Table of Content Part 1: Logic circuit 3 Part 2 : Research Report 13 Part 3 : Network Configuration 16 Report 16 References 17 Part 1: Logic circuit Given the following proposed circuit an are required to re-implement is functionality using the minimum umber of gates possible. Using K-maps to achieve this outcome. Figure 1 This is the original figure for part 1 Initial Logic circuit Number of input 4 input [ A , B , C , D ] Number of gate 11 gates Inverter 2 gates AND 5 gates OR 4 gates Number of output 3 output [ X , Y , Z ] Logic circuit for X Logic Circuit for X equation Logic Circuit for X truth table Truth table for X Logic circuit for Y Logic Circuit for Y equation Logic Circuit for Y truth table Truth table for Y Logic circuit for Z Logic circuit for Z equation Logic circuit for Z truth table Truth table for Z Main Truth table K Maps for X K Maps for Y K Maps for Z The re-implement logic circuit for X, Y and Z This is the equation for re-implement logic circuit: Part 2 : Research Report Short report, outlining the similarities and differences between the instruction sets used for ARM and Intel processors. This should include an explanation for the ARM processor’sShow MoreRelatedNetwork Project Report1665 Words   |  7 Pagesthrough the process of designing a network for small business, big business and for your own private or public network. Our type of this sort of the network includes four to twelve computer (laptop), one or two servers, multiple switches, two to four routers, some networked printers and access to other networks especially the internet for a user. Keywords: Local Area Networking (LAN), Router, Computer (Laptop), Data Center, Server, Switch, Wire Area Network (WAN), Firewall, VPN, Wifi, IPV4 andRead MoreDisadvantages Of Cyber Forensics1367 Words   |  6 PagesIntroduction Computer forensic specialist use different types of methods to try and exploit the required media they are trying to investigate. Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. Cyber analyst’s ability to understand the different types of networks, configurations, packets, computer attacks, MAC addresses, and sniffers is criticalRead MoreReport On Configuration Of An Intranet Based Client Server System For The Data Collection And Data Processing System925 Words   |  4 Pagesprogress report Progress of my report on configuration of an intranet based client-server system for the data collection and data processing system with strong immunity against cyber intrusion Introduction The previous progress report was aimed at configuring the intranet client-server based network that can be implemented to different organizations and institutions. I used CISCO packet tracer to network the client-server system in order to make sure that all computers are in a position to share and exchangeRead MoreThe Network Structure Is Called Learning Beyond1307 Words   |  6 PagesOrganization Description The organization we will be working for to organize and implement their network structure is called Learning Beyond. It is a small educational program that students can attend after school in place of the after-school child-care. It provides a fun educational environment for students who are in need of additional tutoring in certain subjects, or who wish to expand their knowledge beyond the school day. As of right now, it is fairly small, but we would like room forRead MoreDifferent Types Of Computer Networks915 Words   |  4 PagesThere are many different types of computer networks. The most simple and common types are LAN, MAN and WAN. Let’s start by identifying what is a simple network. By definition â€Å"a simple network is formed when two or more computers are connected to each other†. (Gtelco) The digital information from the first computer is transferred to the second via a Network Interface Card (NIC), that information is translated in to a network language. That information travels via the connection (most common connectionRead MoreWhat Are The Security Services Of Windows Network Security?1383 Words   |  6 PagesQUESTION 1. What are the security services of Windows network security? Microsoft windows expand the availability of network data, new applications and systems, so ensuring the security of the network infrastructure is become more challenging. Active Directory, Kerberos, group policy, share security, public key infrastructure technologies and IPsec are the security services provided by the windows were work together to protect the systems and networks. †¢ Active Directory: Active directory is special purposeRead MoreNetworking Technology1183 Words   |  5 Pagesassignment Tutor Comments P A S S 1. Evaluate networks and networking approaches ï  ¶ discuss the role of networks within different organizations and the resource implications of networks ï  ¶ discuss the different distributed computing approaches of peer-to-peer and client-server networks ï  ¶ explain the functions of client and server computers on a network and give at least one example of the interactions between a client and server computer ï  ¶ describe the advantages of client-server approachesRead MoreResearch Paper On Windows 101064 Words   |  5 PagesSOE is a standard means of implementation of an operating system, default but customizable configurations depending on the type of user and along with it necessary software components on a large scale of computers such as Universities labs, library computers, workstations of a company etc. (impeltec 2016) A disk image is usually used to deploy an SOE throughout due to its convenience and speed, also its capability to connect to a network to be deployed through multiple clients (Rouse 2014). ThereRead MoreEssay on Network1055 Words   |  5 Pagessafe to say that computers have become as integral to modern life as fast food, cell phones, and sport utility vehicles†. (Joe, 2004) We are living in the information-exchanged age. It has been dramatically changed since last decades. How could this happen? The answer will be network. A network can be anything fro m a simple collection of computers at one location which have been tied together using a particular connectivity medium (such as network cabling) to a giant global network, e.g. internetRead MoreIt Proposal For The Kris Coporation21702 Words   |  7 Pagesthe storage space for the company and ability to have control over disasters and its recovery system (Ciccarelli, Faulkner, 2006). The company will also be able to improve on its Virtual Desktop Infrastructure. Furthermore, the company will be able to enhance its DirectAccess without a lot of hassle factor whereby there is ease of configuration of the DA, easy control of the machines within the network by simply applying user group policies (Hernandez, 2013). The way that the company will be able

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.