computer architecture ppt lecture notes
A hard disk is a metal platter coated with magnetic oxide that can be magnetized to represent data. However, only one read/write head can operate at any one time. and to perform computations on these measurements. the required results faster than human beings. WebComputer Architecture - Class notes. They are slower and less costly compared to mainframe computers but more powerful, reliable and expensive than micro computers. This gives us the rightmost digit as a starting point. This is similar to the way a CD-ROM recorder (0's and l's). It controls and monitors the running of application programs. The control unit coordinates and controls all the operations carried out by the within a computing system such as: Objectives Dividing 80 by 2 gives 40. Chapter 4 (Processor Architecture) While information retrieval is faster than from a floppy disk, it is still not as fast as from the hard drive. Flash memory is a type of EEPROM chip, which stands for Electronically Erasable Programmable Read Only Memory. computer doubling it in some cases. dj z(l6uHyB"C]Iie7tHDXWq@vd4KfqS)YZT&;"v%LqNm!ZTJ UWBD@^-1QA+'6b"V0s>x$*Y l(7`yAP. C. Interrupts; types of interrupt, interrupt priorities, interrupt handler. Our running total now stands at a[3]=0, a[2]=0, a[1]=1, and a[0]=1. They are of advanced technology i.e. Applications of 4GL's are concentrating on the daily performed tasks such as screen forms, requests for data, change data, and making hard copies. The CPU and the RAM are two main components that can be upgraded to increase a computer's speed, though doing this may require replacing the motherboard as well. Many new PCs come with Zip drives built in addition to floppy drives. Purpose of the course MCA, or the Micro Channel bus, was a competition for ISA bus. device. The object code contains information not only on the instructions given by the programmer but also instruction for the computer about memory allocation and references towards external locations and sub routines (libraries). When data is being entered, heat from the laser produces tiny spots on the disk surface. The i3 is solely a dual-core CPU; the i5 offers dual-and quad-core choices; and the i7 is split into dual-, quad-and six-core choices. generation saw the introduction of more complex ALU and CPU, the use of high It has special keys for by "flashing", this refers to reprogramming the BIOS EEPROM with a special Although the EISA bus is backwards compatible and not a proprietary bus it never became widely used and is no longer found in computers today. Optimization, Memory Assembly language is translated into machine code using an assembler before they can be executed. Four's column: Now we can subtract 1 from 81 to see what remainder we still must place (80). iii. Data are raw facts and ideas that have not been processed while Information is data that has been processed so as to be useful to the user, Software can be broadly classified into system software and application software. Electronic memory comes in a variety of forms to serve a variety of purposes. We know that: and so on. The lecture Since these programs use only '0's and '1's it will be very difficult for developing programs for complex problem solving. Here are the digits used in hexadecimal and their equivalents in binary and decimal: Let's count in hexadecimal. Compact Disk-Writable (CD-R): A CD-R is highly effective for storing a large amount of data. WebComputer Architecture PPT Instructor Prof. Laxmi N. Bhuyan ( bhuyan@cs.ucr.edu) Main Text: Patterson and Hennessy, Computer Organization and Design, Morgan Kaufman i.e., the programs were machine dependent. It can process trillions of instructions in Extended Industry Standard Architecture (EISA) also known as Extended ISA, EISA is a standard first announced in September of 1988 for IBM and IBM compatible computers to compete with the IBM MCA bus. Web6.823 is a course in the department's "Computer Systems and Architecture" concentration. We know that since it is odd, there must be a 1 in the 2^0 column (a[0]=1). Both types of RAM are volatile, meaning that they lose their contents when the power is turned off. For personal computer users, an easy and inexpensive way to back up a hard disk file is to simply copy it to a diskette whenever it is updated. This is a technology whereby stored data can be retrieved in only the order in which it is it is physically stored. Peripheral Component Interconnect (PCI)-connections for video, sound and, video capture cards, as well as network cards, Integrated Drive Electronics (IDE) -interfaces for the hard drives. The number 81 in binary would also have a 1 in the 2^0 column. memory. The drive sells for around $80-$125. Analog give the user output 10 INPUT A,B 20 LET C=A+B 30 PRINT C 40 END, To read the value of A&B A&B are added and result is stored in C Print the value of C Stop execution. This allows for smaller indentations and increased storage capacity. The tubes Examples of this are Ms. Dos, and Windows. They come highly recommended. Nederlnsk - Frysk (Visser W.), Applied Statistics and Probability for Engineers (Douglas C. Montgomery; George C. Runger), Principles of Marketing (Philip Kotler; Gary Armstrong; Valerie Trifts; Peggy H. Cunningham), Big Data, Data Mining, and Machine Learning (Jared Dean), Auditing and Assurance Services: an Applied Approach (Iris Stuart). Continue counting: 10, 11, 12, 13, 14, 15, 16, 17 18, 19, 1A, 1B, 1C, 1D, 1E, 1F. The real time clock chip is a battery-operated chip that maintains basic settings and the system time. Motherboard failures usually show up as second level problems, like "I've replaced the video card and the screen is still dead." represent and store data in discrete quantities or numbers. UNIVERSITY EXAMINATION 2010 SCHOOL OF APPLIED AND SOCIAL SCIENCES DEPARTMENT OF INFORMATION TECHNOLOGY SEMSTER I EXAMINATION FOR BACHELOR OF BUSINESS INFORMATION TECHNOLOGY COURSE CODE: BIT 1105 COURSE TITLE: COMPUTER ARCHITECTURE, As you know, computers rely on accurate data input in order to provide reliable outputs. called analytical engine which was the vase for the modern digital computer. vdu controller. The system clock generates a continuous sequence of clock pulses to step the control unit through its operation. This is inflexible and so regular ROMs are only used generally for programs that are static (not changing often) and mass-produced. Almost all the computers used nowadays are digital computers and we will The mechanism for reading or writing data on a disk is an access arm; it moves a read/write head into position over a particular track. Also it will be very difficult for a person to understand a machine language program written by another person. Thus, we would put a 1 in the 2^6 column, and subtract 64 from 75, giving us 11. interoperate in order to implement the ISA. To provide an in-depth presentation of computer hardware and software with more emphasis on the more technical aspects of computing such as troubleshooting and upgrading computers. For example, if the data bus is 8 bits wide, and each instruction is 16 bits long, then the processor must access the main memory twice during each instruction cycle. Today, motherboards typically boast a wide variety of built-in features, and they directly affect a computer's capabilities and potential for upgrades. 1 Lecture 21: Software Architectures 21-architecture.ppt Author: Steve Easterbrook Created Date: links that I will post to other websites. IV. Try converting these numbers from binary to decimal: | | | 1 | 0 | | 1 | 1 | 1 1 | 0 | 1 | 0 | 1 1 | 1 | 1 | 1 | 0. the number 193 is really {(1*10^2)+(9*10^1)+(3*10^0)}. This computer is not used as a PC in a home neither by a student in a college. o Scanner allows you to scan documents, pictures, or graphics and view They are used to control the computer and develop and run application programs examples of jobs done by the system software are management of computer resources, defragmentation etc. video into a computer. In order to synchronise the various steps carried out during the fetch-execute cycle, all the processors have an internal clock which generates regularly timed pulses. Two's column: Dividing 162 by 2 gives 81. The normal number system we use is called the decimal or the denary number system. The first calculating device, which was used 2000 years ago was called abacus and the improvements in the calculating device in that age were slow. Then, replace each block of four digits with its corresponding hexadecimal digit. This is mostly hard drives and removable media such as floppy disks, optical media (CD ROM) etc. Two reels are used, a supply reel and a take-up reel. Personal computer users find accessing files on a hard disk is significantly faster and thus more convenient than accessing files on a diskette. When you store a file on tape, the 125th record cannot be read until the 124 records in front of it are read. digital computers. The term mainframe was mainly used for earliest computers as they were big in size though today the term is used to refer to large computers. Since 00110101 has eight digits, it can be divided into two blocks of four digits, 0011 and 0101. This is sometimes referred to as direct overwriting and can be repeated several thousand times per disc. The Explain the different hardware units of a computer system such as input, Computer architecture comprises at least three main subcategories: Instruction set architecture, or ISA, is the abstract image of a computing technology is analogous to a reusable CD-RW. But the DVD will undoubtedly gain a place as the successor to the CD ROM and is playing an important role in the blending of computers and entertainment centers. Next, we focus specifically on the CPU (Central Processing Unit). next change came after about 1600 years. They are more susceptible to physical damage and viruses than the hard Video failure can also be due to motherboard failure or to external interference, when it comes to poor image quality. http://www.math.grin.edu/~rebelsky/Courses/152/97F/Readings/student-, L.N.Gumilyov Eurasian National University, Jomo Kenyatta University of Agriculture and Technology, Kwame Nkrumah University of Science and Technology, Introduction to Entrepreneurship (Introduction to Entr), Human Resource, Organizational Behavior, (HR, OB), Bachelor of science in accountancy (150062), FOUNDAMENTALS OF NURSING SCIENCE (NRSG 212), Geometrical Optics and Mechanics (PHY112), Avar Kamps,Makine Mhendislii (46000), Power distribution and utilization (EE-312). They can be linked to smaller They are used to enter The records are read in sequence. Computer software I. BUSES.. INTERRUPTS. ANOTHER ALGORITHM FOR CONVERTING DECIMAL TO BINARY, System interconnects such as computer buses and switches, CPU off-load mechanisms such as direct memory access (DMA), The second generation of computers used It is designed to perform a specific function and cannot be changed. Many disk devices, however, do not record data on the top of the top platter or on the bottom of the bottom platter. They are smaller than the main frame but bigger than microcomputers. very low i. They made use of vacuum tubes to store and process information. ntz0_u.E5Yo!& Programmable ROM (PROM): This is a type of ROM that can be programmed using special equipment (a PROM programmer. They are very large in size and use multiple processors and superior technology. The processor and main memory of a PC are commonly held on a single board called a mother board. Let's look at how this can help us convert from decimal to binary. AxgyL@0#jE:3tBP20zivoKJ]2w\$wkNIkyDXQwsACvc; hq W j Now we need to do the remaining digits. I. High level language permits the user to use understandable codes using the language structure. level languages and provision of system software with the computer. retrieve, and process data", What different types of computers are there? All the processor activities, such as fetching an instruction, reading data into the memory register etc. based on algorithms stored in its memory, to process data fed to it and produce usually called personal computers since they are designed to be used by When you hear reference to a "flash BIOS" or doing a BIOS upgrade When a read/write head does accidentally touch the disk surface, this is called a head crash and all data is destroyed. Furthermore, as we will see, disk data can be accessed directly, as opposed to data on tape, which can be accessed only by passing by all the data ahead of it on the tape. When you hear reference to a "flash BIOS" or doing a BIOS upgrade by "flashing", this refers to reprogramming the BIOS EEPROM with a special software program. Control lines are used to ensure that access to and use of the data and address buses by the different components of the system does not lead to conflict. 10100011=(1*2^0)+(1*2^1)+(1*2^5)+(1*2^7)=1+2+32+128= 163. WebECE/CS 752 Advanced Computer Architecture I: Last modified Monday, 25-Nov-2019 16:12:44 CST. Here we are blurring the line a bit between what "read-only" This is, mostly hard drives and removable media such as floppy disks, optical media. using special equipment (a PROM programmer. i. In a command based interface the user enters commands through an interactive terminal. Used to put printed pictures and text into a computer. This is also true when reading punched cards or paper tape. They support concurrent users. The data in that memory location is then returned to the CPU on via the data bus. The two components (hardware, software) will be discussed later in other chapters. A monitor, printer, and speakers are examples of output devices. Making this algorithm a bit more formal gives us: This algorithm is a bit awkward. Reduce the bandwidth required of the large memory Processor Memory III. x[r+&YU@lJSvB%d#QTD[/\{g\\S It is also easy to see that multiplying and dividing by 2 shifts everything by one column: two in binary is 10, or (1*2^1). DVD disks are read by a laser beam of shorter wave-length than used by the CD ROM drives. Microarchitecture, also known as Computer organization is a lower level, Electrically Alterable Read-Only Memory(EAROMs) can be modified a bit at a The input and output devices are discussed in details in chapter 2 of the module. humans. Input unit A bit is used to represent information in the computer. computer can process Super computers are biggest in size, the most expensive in price than any other is Software is simply set of instructions that cause a computer to perform one or more tasks. Ultraviolet light of a specific frequency can be shined through this window for a specified period of time, which will erase the EPROM and allow it to be reprogrammed again. o Speakers Used to output sound Cache memory is a type of very fast memory that is used to improve the speed of a computer doubling it in some cases. notes posted are a superset of what I will go over during We also know that it equals 162+1. State three types of computer buses. hardware components to create computers that meet functional, performance Computer Organization and Architecture lecture notes include computer organization and architecture handwritten notes, computer organization and architecture book, computer organization and architecture courses, computer organization and architecture syllabus, computer organization and architecture multiple processor system with parallel processing. Starting from zero, we count 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F. At this point there are no more digits, so we add another column. Neumann Architecture Model and An output device displays information on a screen, creates printed copies or generates sound. must match the DVD region. As in other magnetic media, data is stored as extremely small magnetic spots. Hard disk capacity for personal computers has soared in recent years; capacities of hundreds of megabytes are common and gigabytes are not unusual. As you know, the decimal system uses the digits 0-9 to represent numbers. This computer is commonly used in big hospitals, air line reservations of Maryland. 6.823 is a study of the evolution of computer architecture and the factors influencing the High Performance Communication Korea Embedded Computing MS Program, Image Processing -2 Lectures on Image Processing, Introduction to Automata Theory Languages and Computation, Introduction to Computers and Engineering Problem Solving, Introduction to Computers and Information Technology, Introduction to Natural Language Processing, Introduction to Probability and Statistics, Introduction to Probability and Statistics 1, Introduction to the Theory of Computation, Languages and Compilers for Embedded Systems, Operating System Concepts Eight Edition Notes PPT, Ordinary and Partial Differential Equations, Probability Random Variables and Stochastic Processes, Probability Statistics and Numerical Methods, Probability Theory and Stochastic Processes, Program Optimization for Multicore Architectures, Semiconductor Device and Process Simulation, Social and Economic Networks Models and Applications, SOFTWARE FOR COMPUTER VISION. The CPU of a microcomputer is called a microprocessor. EISA is the second most commonly used interface for disk drives. The following are the different types of interrupt that could occur; There is a special register in the CPU called the interrupt register. This is inflexible and so regular ROMs are only used generally for (a) Name the two major components of the Central Processing Unit and briefly describe what each does. They are very large in size and use multiple processors and superior technology. Typical processors can have 8-, 16-, 32-, 64-or even larger word sizes. scan. the 0s and 1s with 0 representing an OFF state and 1 representing an ON state. This translates into putting a "1" in the 2^1 column and a "1" in the 2^0 column, to get "11". The methods we will consider here are the sector method and the cylinder method. It is a blueprint and functional description of requirements and design implementations for the various parts of a computer, focusing largely on the way (