
- •1. TABLE OF CONTENTS
- •2. COMPUTER HARDWARE
- •3. A BRIEF OVERVIEW OF COMPUTER HARDWARE
- •3.1 BASIC COMPONENTS
- •3.1.1 The components of a computer are,
- •3.1.2 Some I/O Devices
- •3.2 AN EXAMPLE OF A COMPUTER IN MANUFACTURING
- •3.3 COMMERCIAL COMPUTERS
- •3.3.1 Mainframes
- •3.3.2 Super Computers
- •3.3.3 Workstations
- •3.3.4 Personal Computers
- •3.3.5 Dedicated Computers
- •3.3.6 Single Board Computers
- •3.4 ARCHITECTURE AND BUSES
- •3.4.1 Clock Speed and the Buses
- •3.5 SOFTWARE
- •4. COMPUTER INTERFACING
- •4.1 DIGITAL SIGNALS
- •4.2 ANALOG SIGNALS
- •4.2.1 Analog to Digital Conversion
- •4.2.1.1 - Flash A/D Converter
- •4.2.2 Digital to Analog Conversion
- •4.3 TIMING
- •4.3.1 Interrupts
- •4.3.2 Clocks and Timers
- •4.3.3 Watch Dog Timers
- •4.3.4 Polling
- •4.4 DISPLAYS
- •5. COMPUTER INTERFACE BOARDS
- •5.1 OVERVIEW
- •5.1.1 Types
- •5.2 REGISTER LEVEL PROGRAMMING
- •5.3 EXAMPLES
- •6. COMPUTER CONTROL OF PROCESSES
- •6.1 TEMPERTURE CONTROL
- •6.2 BATCH PROCESSING
- •6.3 COMPUTER PROCESS MONITORING
- •6.4 IMPLEMENTING A COMPUTER CONTROL SYSTEM
- •6.4.1 SCADA
- •6.5 PRACTICE PROBLEMS
- •7. COMPUTER COMMUNICATIONS
- •7.1 COMPUTER COMMUNICATIONS CATEGORIES
- •7.2 THE HISTORY
- •7.3 SERIAL COMMUNICATIONS
- •7.6 GPIB/IEEE-488
- •7.7 PARALLEL COMMUNICATIONS
- •8. INTERFACING COMPUTERS FOR DATA TRANSFER
- •8.1 SERIAL DATA TRANSFER
- •8.2 PARALLEL DATA TRANSFER
- •8.2.1 GPIB Bus (IEEE-488)
- •9. COMPUTER NETWORKING
- •9.1 OSI NETWORK MODEL
- •9.1.1 Why Use A Network?
- •9.1.1.1 - Physical Layer
- •9.1.1.2 - Data Link Layer
- •9.1.1.3 - Network Layer
- •9.1.1.4 - Transport Layer
- •9.1.1.5 - Session Layer
- •9.1.1.6 - Presentation Layer
- •9.1.1.7 - Application Layer
- •9.2 OPEN SYSTEMS
- •9.3 NETWORKING HARDWARE
- •10. MANUFACTURING AUTOMATION PROTOCOL (MAP)
- •10.1 OVERVIEW
- •10.2 DETAILS
- •10.2.1 Physical Alternatives (Layer 1 OSI Model),
- •10.2.2 Data Link Layer (Layer 2 OSI Model),
- •10.2.3 Application Layer:
- •10.3 DETAILS FOR TOP
- •10.3.1 Application Layer:
- •10.5 MAP AND OTHER STANDARDS
- •10.6 AN EXAMPLE OF A MAP IMPLEMENTATION
- •10.7 ETHERNET
- •10.7.1 Internet
- •10.7.2 SLIP/PPP
- •10.8 DATA HIGHWAY+
- •10.9 REMOTE PLC I/O
- •10.10 DEVICENET
- •10.11 OTHER STUFF
- •10.12 Network Facts
- •11. DATABASE TECHNOLOGY
- •11.1 DISTRIBUTED DATABASE SYSTEMS
- •11.1.1 Relational database systems
- •11.1.2 Issues for distributed database systems
- •11.1.2.1 - Query processing
- •11.1.2.2 - Concurrency control

page 39
9. COMPUTER NETWORKING
•A Network is a way of connecting different computers to allow data and message passing, and resource sharing.
•Early communication techniques included telegraphs (with morris code), telephones and teletypes.
•Advantages
-allows shared computers and peripherals
-provides communication and cooperation tools for people and computers
-increases reliability by having alternate computers available
-decreases isolation of many computers
•Applications,
-allows remote access to databases and libraries
-electronic mail
-distributed computational facilities
-remote control of applications
•The relationship between various network types is shown below
Example LAN Topologies
Bus or Ring |
Star |
...
- Shared Media
- Distributed Control
- No media sharing
- Central Control

page 40
•The Star Network topology uses many connections to a central server
-Central control
- Dedicated communication channels
- Single point of failure
- Often compatible with telephone wiring (voice/data integration)
-Typical minicomputer and mainframe environments
•When all computers are connected to the same network cable, there are a number of structures which may be used. The bus topology below is simpler, and the tree topology is more flexible

page 41
and versatile. This approach uses a single cable which is easy to add to
...
Bus Topology
...
Tree Topology
R
R
R
R Repeater
• The ring topology below shows a closed loop of cable which can be simple to implement, but

page 42
limited in capabilities
- Distributed control
-Entire communication capacity
capacity for any station
- Vulnerable to loss of shared communication facilities
-Primary vendors: IBM & Proteon
•An enhanced ring topology is pictured below
Characteristics
H O S T
N o . 3
- Control token passed from H O S T
N o . 2
node to node
- Only node with token can transmit
- |
Token replaced on ring at the end |
|
|
|
|
S |
start of |
|
|
|
|
|
|||||
|
|
|
|
|||||
|
|
|
|
|||||
|
|
|
|
|
|
|||
|
of message |
|
|
|
|
message |
||
|
H O S T |
|
|
|
|
|||
|
|
|
|
|
|
|
|
|
- |
Permits variable size messages |
N o . 4 |
|
|
|
|
|
|
|
|
|
H O S T |
|
||||
|
|
|
|
|
|
|
||
- |
Only one message on the ring |
|
|
|
|
|||
|
|
|
E |
N o . 1 |
|
|||
|
|
|
|
|
|
|
|
|
at a time
end of message
direction of message flow