computer architecture ppt lecture notes

First machine in this category was ENIAC (electronic discrete variable automatic computer) and later came UNIVAC (universal automatic computers). technology is analogous to a reusable CD-RW. Therefore, it would shift you one column to the left. A rule of thumb among computer professionals is to estimate disk needs generously and then double that amount. They are expensive to install. Take a look at the images below on the right, as you can see, we have pointed out certain parts of the DIMM memory module and the DIMM slot. The term mainframe was mainly used for earliest computers as they were big in size though today the term is used to refer to large computers. notes that you will be expected to read before class. Similarly, the statement a[n-1]*2^(n-1) + a[n-2]*2^(n-2) + + a[1]*2^0 has a power of two removed. Here we are blurring the line a bit between what "read-only" WebSymposium on Computer Architecture (ISCA), 1994 Lecture notes will be available in pdf and powerpoint formats, with 6 per page for pdf for conventinent printing.. (Powerpoint is for instructors who want to give lectures themselves based on CS 252.) peripherals can be attached to them. This product is analogous to a commercial software CD-ROM that you purchase in a store. (7mks). blueprint and functional description of requirements and design For example, a typical 4GL command is: A popular 4GL is SQL , which is a database language used to create queries and build database objects. Next, we focus specifically on the CPU (Central Processing Unit). Intel Core i3, i5 and i7 are 1.2 GHz to 3.33 GHz, 1.06 GHz to 3.6 GHz and 1.06 GHz to 3.46 GHz, respectively. the number 193 is really {(1*10^2)+(9*10^1)+(3*10^0)}. The first IBM PC motherboard had only a processor and card slots. First machine in this a similar course at Univ. )fb1{`BF infrequent operation - most of the time the memory is used as a ROM. Diskettes became popular along with the personal computer. FACE RECOGNITION AND SIMILAR, Structure and Interpretation of Computer Programs, TEXTURE ANALYSIS USING SPECTRAL TRANSFORMS. Instead of typing a command or file name, selection is achieved by moving a pointer with a mouse and clicking a mouse button. unit, memory (ROM, RAM). Flash memory is a type of EEPROM chip, which stands for Electronically Erasable Programmable Read Only Memory. Floppy Disk: Floppy disks allow information to be transported easily from one That means that their electronic circuits can exist in only one of two states: on or off. This is similar to the way a CD-ROM recorder works by letting you "burn" programs onto blanks once and then letting you read from them many times. The disk in its drive is shown in Figure 3. The drive sells for around $80-$125. Converting from decimal to binary notation is slightly more difficult conceptually, but can easily be done once you know how through the use of algorithms. The IBM 360 is an example of third generation computers. The size of a computer's cache for instance, is an organizational issue that generally has nothing to do with the ISA. Eight's column: We can divide by two again to get 20. We can easily see that the number 3= 2+1. While information retrieval is faster than from a floppy disk, it is still not as fast as from the hard drive. The code written by the programmer is called the source code and the compiled code is called the object code. This computer is not used as a PC in a home neither by a student in a of computer is also helpful for forecasting weather reports worldwide. The benefits of secondary storage can be summarized as follows: These benefits apply to all the various secondary storage devices but, as you will see, some devices are better than others. Interrupts are therefore assigned priorities so that when two interrupts are received simultaneously, the one with the highest priority is dealt with first. They are mainly used for presentations. usually called personal computers since they are designed to be used by Diskettes and hard disks are magnetic media; that is, they are based on a technology of representing data as magnetized spots on the disk with a magnetized spot representing a 1 bit and the absence of such a spot representing a 0 bit. When you play movies, your hardware (MPEG decoder. You might be tempted to record the data horizontally-to start with the first surface, fill track 000, then fill track 001, track 002, and so on, and then move to the second surface and again fill tracks 000, 001, 002, and so forth. Storage capacity was very low i.e. Two reels are used, a supply reel and a take-up reel. Hardware: input and output devices, backup storage, central processing more detail than the book and you are expected to read them and read chip(IC). So the number "193" is 1-hundreds plus 9-tens plus 3-ones. once. Cache memory To visualize cylinder organization, pretend a cylindrically shaped item, such as a tin can, were figuratively dropped straight down through all the disks in the disk pack. The easy cases to diagnose are those where the monitor or LCD isn't powering up properly, or the PC not powering up. Explain the fundamental difference between computer hardware and Electrically Erasable Programmable ROM (EEPROM): The next level of erasability is the EEPROM, which can be erased under software control. Extended Industry Standard Architecture (EISA) also known as Extended ISA, EISA is a standard first announced in September of 1988 for IBM and IBM compatible computers to compete with the IBM MCA bus. As we have already noted, magnetic tape is used primarily for backup purposes. size though today the term is used to refer to large computers. Today, motherboards typically boast a wide variety of built-in features, and they directly affect a computer's capabilities and potential for upgrades. The set of instructions is often called a program or, if the set is particularly large and complex, a system. According to the utilization of computer for different uses, computers are of following two types: According to the technology used, computers are of following three types: Computer hardware refers to the physical components of a computer such as the monitor, Keyboard, Mouse, system unit etc. For example, if the data bus is 8 bits wide, and each instruction is 16 bits long, then the processor must access the main memory twice during each instruction cycle. They were In 1833, Prof. Charles Babbage, the father of the computer, developed a machine The system unit is the unit that houses the processing unit (processor), memory, the input output controllers and the buses. In 1833, Prof. Charles Babbage, the father of the computer, developed a machine called analytical engine which was the vase for the modern digital computer. Programmable ROM (PROM): This is a type of ROM that can be programmed The basic functions of an operating system are; A stand a lone operating system controls a single computer that is not connected to others on a network. Making this algorithm a bit more formal gives us: This algorithm is a bit awkward. In decimal form, 1+1=2. The size of a hard drive is usually expressed in terms of megabytes and gigabytes. Central processing unit (CPU) or processor EAROM may be used to store critical system setup information in a non-volatile way. We know that: and so on. Most mainframe computers have 32-bit words. and capabilities This document Consider the addition of decimal numbers: We begin by adding 3+8=11. Many cartridges and cassettes have the supply and take-up reels built into the same case. A motherboard allows all the parts of your computer to receive power and communicate with one another. In fact, flash memory is known as a solid state storage device, meaning there are no moving parts --everything is electronic instead of mechanical. The older diskette, 5-1/4 inches in diameter, is still in use, but newer computers use the 3-1/2 inch diskette (Figure 1). Hard disks use magnetism, while computer memory uses electric charges stored in tiny capacitors to indicate "on" or "off.". computational machines. WebCS385 Computer Architecture, Lecture 1 Reading: Patterson & Hennessy - Chapter 1 Topics: Introduction, Computer Architecture = Instruction Set Architecture + Machine Computer architecture comprises at least three main subcategories: Instruction set architecture, or ISA, is the abstract image of a computing Performance and Code The main features which distinguish one processor from another and which determine the performance of each are; In addition the CPU contains circuitry controlling the interpretation and execution of instructions. If you want to learn how to repair PC's without swapping every part, it's critical to know what to look for on a powered up system, like a CPU fan that isn't running, or RAM that stays cold. The term mainframe was mainly used for earliest computers as they were big in The next change came after about 1600 years. This indicates the speed at which the CD can transfer data to the CPU -the higher the X factor, the faster the CD. Prepare an oral presentation of approximately 25 min. Nguyen Quoc Trung. The form factor is just one of the many standards that apply to motherboards. This computer is commonly used in big hospitals, air line reservations The processor can read and write into the secondary storage devices. State and explain any five characteristics of storage. When buying a computer the speed of the CD-ROM drive is advertised using an "X" factor, like 12X, or 24X. Fuller F., Larson B., Computers: Understanding Technology (Second Edition), Assessment: Examination -70%: Coursework -30%. Some systems feature dual BIOS, which provides a backup in case one fails or in case of error during updating. A given amount of data that takes up 1 inch of a track on the inside of a disk might be spread over several inches on a track near the outside of a disk. A little glass window is installed in the top of the ROM package, through which you can actually see the chip that holds the memory. Color laser printers are still fairly expensive. C. Characteristics of computers and to perform computations on these measurements. The following program written in BASIC language is to add two given numbers. discuss the detailed working and components of these computers in subsequent sections of reliable and expensive than micro computers. A CD-R is a one time recordable compact disc. You are required to In some disk drives the access arms can be retracted; then the disk pack can be removed from the drive. Governments specially use this type of computer for their different calculations and heavy jobs. Cas a model of computation Digital logic as a model of computation Programmers view of how a computer system works HW designers view of system that is seen by a machine language (or assembly language) Hard disks for personal computers are 5-1/4 inch or 3-1/2 inch disks in sealed modules and even gigabytes are not unusual. iii. (b) List four of the conditions an ALU tests for. Add 1 from carry: 10+1=11. device. Brooks, Planning a Computer System, Project Stretch, 1962 What does this design consist of? Dividing (1*2^1) by 2 gives us (1*2^0), or just a 1 in binary. Storage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. typing, recording keeping, production of financial statements, drawing, and statistics. The largest power of 2 in 11 is 8, or 2^3. They are very large in size and use multiple processors and superior technology. Following this, the changes were Explain how information is stored in a computer To provide an in-depth presentation of computer hardware and software with more emphasis on the more technical aspects of computing such as troubleshooting and upgrading computers. The size of a hard drive is usually expressed in terms of megabytes and A little glass window is installed in the top of the Commands tell the computer to do something, like save the file. Dynamic RAM needs to be refreshed thousands of times per second. Reduce the bandwidth required of the large memory Processor Memory The CPU of a Let's take a look at how it works. Since we divided the number by two, we "took out" one power of two. The interrupt signal is sent along a control line to the processor, and the currently executing program is suspended while control is passed to an interrupt service routine. The tubes consumed a lot of power and generated a lot of heat (overheating). It also makes the network transparent to the user, allowing any user with appropriate access rights to use software stored on the networks file server, and to store data either on the file server or on a local hard or floppy disk. to the C language (part 2/2), Run-time computer doubling it in some cases. Printout is permanent IV. Table of Contents. Four's column: Now we can subtract 1 from 81 to see what remainder we still must place (80). The records are read in sequence. It is inefficient for humans to use binary, however, because it requires so many digits to represent a number. 10100011=(1*2^0)+(1*2^1)+(1*2^5)+(1*2^7)=1+2+32+128= 163. Computer software monitor, Keyboard, Mouse, system unit etc. The read/write head on the end of the access arm hovers just above the track but does not actually touch the surface. WebLecture notes Chapters 1-3, 5-12 The CMU ICS+ coursethat covers everything in CS:APP3e except Chapter 4 (Processor Architecture). The commands are entered on a prompt for example the Ms Dos prompt looks like this. Since Assembly language is machine dependent each type of computer has its own assembler. It is a Chapter 3- Instruction Control lines are used to ensure that access to and use of the data and address buses by the different components of the system does not lead to conflict. For example, the textbook interoperate in order to implement the ISA. They made use of vacuum tubes to store and process information. A large number of peripherals can be attached to them. companies, and many other huge companies prefer mainframe because of its Electrically Alterable Read-Only Memory(EAROMs) can be modified a bit at a time, but writing is a slow process and uses non-standard voltages (usually higher voltages around 12 volts). B. This is mostly hard drives and removable media such as floppy disks, optical media (CD ROM) etc. The 17 GB disk holds 200 hours top quality music recording. Begin with one-bit binary addition: 1+1 carries us into the next column. Computers, in contrast, permit storage on tape or disk in extremely compressed form. The truth is, of all the four subsystems represented in this table, hard drives are probably the most reliable. Both types of RAM are volatile, meaning that they lose their contents when the power is turned off. window for a specified period of time, which will erase the EPROM and allow it Each peripheral device operates in a different way and hence these devices cannot be connected directly to the processor. Lecture 21 (TBS): You can also use software to edit the items you Now we need to do the remaining digits. This document should be seasone Computer Architecture and Assembly Language Programming, Computer Organization and Design 4th Edition Solution, Comporg 6 sol2 - Solution manual for the second Chapter of the Computer Architecture, CS401 Quiz 1 Solution by MCS of Virtuallians. variables, Implementation of functions, Dynamic Representations -- Datatypes and computers are mainly used for scientific and engineering applications. WebBIT 1101 Computer Architecture complete lecture notes for first years and all - P. Box 342-01000 - Studocu. The transistor is Logical operations it compares two data items to determine whether the Input devices enter information to be processed by the processor. and accesses addresses in memory. The DVD drives will not replace the magnetic hard disks. Therefore, there must be a 0 in the 4's column, (because what we are actually placing is a 2^0 column, and the number is not odd). Power Supply Troubleshooting o Digital Camera Used to take electronic pictures of an object. Tape now has a limited role because disk has proved the superior storage medium. The notches we have marked as B, are used to align the memory module with the DIMM slot keys C, as shown in Fig 1.3. Take the number 163. A motherboard by itself is useless, but a computer has to have one to operate. Furthermore, data files, particularly those accessed by several users, are subject to errors introduced by users. Perhaps more important than capacity, however, is the convenience of speed. Record the 0, carry the 1. classified and known as super computer. Used to put printed pictures and text into a computer. to read the textbook and, preferably, the posted notes before coming to class. Purpose of the course And, the access time is independent of the storage location. for using the C to LC3 It is the smallest of the three computers. The two components (hardware, software) will be discussed later in other chapters. 17. They are Also it will be very difficult for a person to understand a machine language program written by another person. They are very large in size and use multiple processors and superior technology. may be used to store critical system setup information in a non-volatile way. The group of connected disks operates as if it were just one large disk, but it speeds up reading and writing by having multiple access paths. powerpoint format) I will post detailed notes that will go into You should also Lecture Notes on Computer Architecture November 2018 Authors: Firoz Mahmud Rajshahi University of Engineering & Technology Figures Content uploaded by Years later, we learned that the ones column meant 10^0, the tens column meant 10^1, the hundreds column 10^2 and so on, such that. It is also easy to see that multiplying and dividing by 2 shifts everything by one column: two in binary is 10, or (1*2^1). They are used to enter information and issue commands to the computer. Electrically Alterable Read-Only Memory(EAROMs) can be modified a bit at a humans. Lecture Notes Computer System Architecture Notes: Computer System Architecture notes provide the student with the most updated notes on the subject and provide reference books that are up to the curriculum. These notes are easy to interpret for aspiring students and are the best set of references for computer system architecture during revision. The explosive growth in storage needs has driven the computer industry to provide cheaper, more compact, and more versatile storage devices with greater capacity. Peripheral Component Interconnect (PCI)-connections for video, sound and, video capture cards, as well as network cards, Integrated Drive Electronics (IDE) -interfaces for the hard drives. and data so that it will be very fast to retrieve them again. Micro computers Examples: What would the binary number 1011 be in decimal notation? The OS controls who logs on to the network by means of user names and passwords, in order to protect the data and programs stored on the network. A. Once full, a removable hard disk cartridge can be replaced with a fresh one. WebComputer architecture is the science and art of selecting and interconnecting hardware components to create a computer that meets functional, performance and cost goals. The movies are made in two formats, each with their own coding. 18-213 18-240. To provide an in-depth presentation of computer hardware and software with A network operating system is required when a number of computers are connected together to form a network. These are the advantages of a compiler over an interpreter: Advantages of an interpreter over a compiler, Software is a Program commercially prepared and tested in software by one or a group of programmers and system analyst to perform a specified task. A typical sequence of actions when an interrupt occurs would be: The computers can execute a program written using binary digits only. An interrupt is a signal from some device or source seeking the attention of the processor. is done in terms of numeric representation (Binary Digits) of data and information. video recorder They are more susceptible to physical damage and viruses than the hard drive. 2kb and speed of processing was also very low. process millions of instruction per second and capable of accessing billions of This is a technology whereby stored data can be retrieved in only the order in which it is it is physically stored. At the end of the chapter the learner shall be able to; This new feature enables different reading modes for our document viewer.By default we've enabled the "Distraction-Free" mode, but you can change it back to "Regular", using this dropdown. These computers had programming languages whose vocabularies are close to the human natural language, English language. This is the most flexible type of ROM, and is now commonly used for holding BIOS programs. However, this is not the only approach possible. Try converting these numbers from binary to decimal: | | | 1 | 0 | | 1 | 1 | 1 1 | 0 | 1 | 0 | 1 1 | 1 | 1 | 1 | 0. The 3-1/2 inch diskette has the protection of a hard plastic jacket, a size to fit conveniently in a shirt pocket or purse, and. WebLecture #4-5: Computer Hardware (Overview and CPUs) CS106E Spring 2018, Young In these lectures, we begin our three-lecture exploration of Computer Hardware. Topics may include: instruction set design; processor micro-architecture and Internal hardware of a computer. (Photo openphoto.net. Used with permission.) The number 76, for example, takes only two digits to write in decimal, yet takes seven digits to write in binary (1001100). of Maryland. Record the 0, carry the 1. (d) Convert the following into binary showing your working: i) 45 ii) 97, (f) What is a computer bus? ()Microarchitecture, also known as Computer organization is a lower level, more concrete and detailed, description of the system that involves how the constituent parts of the system are interconnected and how they interoperate in order to implement the ISA. Erasable Programmable ROM (EPROM): An EPROM is a ROM that can be erased and reprogrammed. must match the DVD region. Number This new feature enables different reading modes for our document viewer. Hardware WebCS8491 Computer Architecture Lecture Notes, Syllabus & Important Questions (Regulation 2017) CS8491 Computer Architecture .Pdf DOWNLOAD(Including Syllabus, Lecture Notes, 2 Marks & 16 Marks with Year Wise Question Paper Collections) We are very Happy to Provide your all Requirements in a single file RDRAM (Rambus DRAM) involves a new memory design that achieves a higher data transfer speeds but it is expensive to manufacture.

The New Adventures Of Old Christine Blonde Hair, Is Lucy Mangan Related To Stephen Mangan, Articles C