Week 5 Tutorial
Students are required to do research on the following questions and need to
show them to the lecturer.
1.What is the full form of RISC?
a. Reduced Integration Set Computing
b. Reduced Instruction Set Computing
c. Reduced Instruction Set Computer
d. Reduced Instruction Set Computation
2. To enhance the performance, Intel uses:
a. Hyperloop
b. Hyper-threading
c. Hyper transport
d. Hypertext
3. One billion cycles in CPU is denoted as:
a. Megahertz
b. Megabyte
c. Gigahertz
d. Gigabyte
4. The power of the CPU is denoted by?
a. Speed of the data that it can read at once
b. Speed and the amount of data that it can process
c. Speed and the amount of data that it can write at once
d. Speed and the amount of data that it can store at once
5. What are two instruction sets that the CPU uses? Explain in brief.
Ans:
An instruction set is a group of commands for a central processing unit (CPU) in machine
language. The term can refer to all possible instructions for a CPU or a subset
of instructions to enhance its performance in certain situations.
All CPUs have instruction sets that enable commands directing the CPU to switch the
relevant transistors. The instructions tell the CPU to perform tasks. Some instructions are
simple read, write and move commands that direct data to different hardware elements.
The instructions are made up of a specific number of bits.
The types of instruction sets are:
• Complex instruction set computer. CISC processors have an additional
microcode or microprogramming layer where instructions act as small programs.
Programmable instructions are stored in fast memory and can be updated. More
instructions are included in CISC instruction sets than in other types of instruction
sets. A single instruction can initiate multiple actions by the computer, such as a
single add command launching multiple memory access load and store
instructions.
• Reduced instruction set computer. RISC architecture has hard-wired control. It
does not require microcode, but has a greater base instruction set. RISC also uses
a smaller and more compact instruction set with a fixed instruction format. RISC
processors are designed to process faster and more efficiently.
6. What do you mean by Hyper-threading and Hyper transport?
Ans:
Hyper-threading is a process by which a CPU divides up its physical cores into virtual
cores that are treated as if they are actually physical cores by the operating system. These
virtual cores are also called threads. Most of Intel’s CPUs with 2 cores use this process
to create 4 threads or 4 virtual cores. Intel CPUs with 4 cores use hyper-threading to
create more power in the form of 8 virtual cores, or 8 threads.
Hyper-Transport is a scalable packet-based, high- bandwidth, and low-latency point-to-
point interconnect technology intended to interconnect processors and also link them to
I/O peripheral devices. Hyper-Transport was initially devised as an efficient replacement
for traditional system buses for on-board communications.
7. Explain the concept of RAID with its levels. Do you think following RAID will be
beneficial to a big company like Google or Microsoft?
Ans:
RAID is an acronym for "Redundant Array of Inexpensive Disks". When interpreted
literally, it means storing information across an array of relatively low-cost hard disk drives
(HDDs). It is generally considered to be "Technology that combines numbers of such
inexpensive HDDs into a single HDD."RAID is the use of multiple disks to manage HDD
data using a range of different techniques. These are typically divided into 6 levels; RAID
0, RAID 1, RAID 2, RAID 3, RAID 4, RAID 5. They all differ in terms of data deployment
and the type of redundancy offered.
RAID 0 is used to boost a server's performance. It's also known as "disk striping." With
RAID 0, data is written across multiple disks. This means the work that the computer is
doing is handled by multiple disks rather than just one, increasing performance because
multiple drives are reading and writing data, improving disk I/O. A minimum of two disks
is required. Both software and hardware RAID support RAID 0, as do most controllers.
The downside is that there is no fault tolerance. If one disk fails, then that affects the
entire array and the chances for data loss or corruption increases.
RAID 1 is a fault-tolerance configuration known as "disk mirroring." With RAID 1, data is
copied seamlessly and simultaneously, from one disk to another, creating a replica, or
mirror. If one disk gets fried, the other can keep working. It's the simplest way to
implement fault tolerance and its relatively low cost.
The downside is that RAID 1 causes a slight drag on performance. RAID 1 can be
implemented through either software or hardware. A minimum of two disks is required for
RAID 1 hardware implementations. With software RAID 1, instead of two physical disks,
data can be mirrored between volumes on a single disk. One additional point to remember
is that RAID 1 cuts total disk capacity in half: If a server with two 1TB drives is configured
with RAID 1, then total storage capacity will be 1TB not 2TB.
RAID 5 is by far the most common RAID configuration for business servers and enterprise
NAS devices. This RAID level provides better performance than mirroring as well as fault
tolerance. With RAID 5, data and parity (which is additional data used for recovery) are
striped across three or more disks. If a disk gets an error or starts to fail, data is recreated
from this distributed data and parity block— seamlessly and automatically. Essentially,
the system is still operational even when one disk kicks the bucket and until you can
replace the failed drive. Another benefit of RAID 5 is that it allows many NAS and server
drives to be "hot-swappable" meaning in case a drive in the array fails, that drive can be
swapped with a new drive without shutting down the server or NAS and without having to
interrupt users who may be accessing the server or NAS. It's a great solution for fault
tolerance because as drives fail (and they eventually will), the data can be rebuilt to new
disks as failing disks are replaced. The downside to RAID 5 is the performance hit to
servers that perform a lot of write operations. For example, with RAID 5 on a server that
has a database that many employees’ accesses in a workday, there could be noticeable
lag.
RAID 6 is also used frequently in enterprises. It's identical to RAID 5, except it's an even
more robust solution because it uses one more parity block than RAID 5. You can have
two disks die and still have a system be operational.
RAID 10 is a combination of RAID 1 and 0 and is often denoted as RAID 1+0. It combines
the mirroring of RAID 1 with the striping of RAID 0. It's the RAID level that gives the best
performance, but it is also costly, requiring twice as many disks as other RAID levels, for
a minimum of four. This is the RAID level ideal for highly utilized database servers or any
server that's performing many write operations. RAID 10 can be implemented as
hardware or software, but the general consensus is that many of the performance
advantages are lost when you use software RAID 10.
8. Define hypervisor. What are its two types?
Ans:
Hypervisor, also known as a virtual machine monitor or VMM, is software that creates
and runs virtual machines (VMs). A hypervisor allows one host computer to support
multiple guest VMs by virtually sharing its resources, such as memory and processing.
The two types of hypervisors are as follows:
Bare metal hypervisor:
The hypervisor runs directly on the underlying host system. It is also known as a “Native
Hypervisor” or “Bare metal hypervisor”. It does not require any base server operating
system. It has direct access to hardware resources. Examples of Type 1 hypervisors
include VMware ESXi, Citrix Xen Server, and Microsoft Hyper-V hypervisor.
Pros & Cons
Pros: Such kinds of hypervisors are very efficient because they have direct access to
the physical hardware resources (like CPU, Memory, Network, and Physical storage).
This causes the empowerment of the security because there is nothing any kind of the
third-party resource so that attacker couldn’t compromise with anything.
Cons: One problem with Type-1 hypervisors is that they usually need a dedicated
separate machine to perform their operation and to instruct different VMs and control
the host hardware resources.
Hosted Hypervisor:
A Host operating system runs on the underlying host system. It is also known as ‘Hosted
Hypervisor”. Such kind of hypervisors doesn’t run directly over the underlying hardware
rather they run as an application in a Host system (physical machine). Basically, the
software is installed on an operating system. Hypervisor asks the operating system to
make hardware calls. An example of a Type 2 hypervisor includes VMware Player or
Parallels Desktop. Hosted hypervisors are often found on endpoints like PCs. The type-
2 hypervisor is very useful for engineers, and security analysts (for checking malware,
or malicious source code and newly developed applications).
Pros & Cons:
Pros: Such kind of hypervisors allows quick and easy access to a guest Operating
System alongside the host machine running. These hypervisors usually come with
additional useful features for guest machines. Such tools enhance the coordination
between the host machine and the guest machine.
Cons: Here there is no direct access to the physical hardware resources so the
efficiency of these hypervisors lags in performance as compared to the type-1
hypervisors, and potential security risks are also there an attacker can compromise the
security weakness if there is access to the host operating system so he can also access
the guest operating system.
Workshop 5
Objective: The main objective of this workshop is to host static websites in guest OS
which is windows server 2022 and access it from host OS as well as from other
computer devices within the same LAN. Another objective of this workshop is to enable
remote desktop features in windows server 2022 and access it from host OS.
Let’s first host our static website in Windows Server 2022.
Step 1: Open VMware workstation Pro and select the windows server. After selecting,
right click the windows server and click on the “Settings” button.
Step 2: Now click on Network and under network select Bridged Adapter.
Now click on Ok button and run our Windows Server 2022.
Step 3: As like from last workshop place your website files in Local Disk C drive in
Windows Server 2022 as on following picture.
Step 4: Expand the server’s name and right click on “Sites” and click on the “Add Website”
option like in the last workshop.
Step 5: Now we need to add details of our website as follows:
• Under Site name give any name you desire
• Under Physical path give path to the folder where our website files are located.
• Under IP address select the given IP address from the drop-down option.
[Note: Whenever you change your network, like from home to college, your IP
address will be changed and need to change it in order to get access]
Leave other options as default and click on “Ok”.
Step 6: Now we can see our site name on the list. Now let’s browse our site by clicking
on “Browse” followed by your IP address on the right side. This will open our website in
browser.
Step 7: Type the IP address of Guest OS in the browser of Host OS and see if your
website is accessible from Host OS or not. Also open the website from your smartphone
by typing IP address of Guest OS and see if it is accessible from your phone or not.
[Note: Your phone and Server must be on same network]
Now let’s connect our windows server from Host OS a lso using remote connection.
Follow the following steps:
Step 1: Firstly, open computer management in your windows server and click on users
and right click on user which you want to access remotely and set password.
Step 2: After the password has been set. Open Remote Desktop Connection in your PC
and run as an administrator.
Now click on the enter button.
Step 4: Here, comes the dialog box for username and password where you should enter
the user’s name and password which you had set before in the windows server.
Step 5: Now click on “Yes” option.
Then the remote connection will establish successfully.