
- •Ssd2: Introduction to Computer Systems contents
- •Prerequisites
- •Course Textbook
- •Hardware/Software Requirements
- •The purpose of ssd2 is for students to
- •Students successfully completing ssd2 will be able to
- •1.1 Overview of Computer Systems
- •1.1.1 Components of a Computer System
- •Hardware System
- •Software System—Operating System Software and Application Software
- •Network System
- •1.2 Evolution of Computer Systems
- •1.2.1 Brief History
- •1200S—Manual Calculating Devices
- •1600S—Mechanical Calculators
- •1800S—Punched Cards
- •1940S—Vacuum Tubes
- •1950S—Transistors
- •1960S—Integrated Circuits
- •1970S to Present—Microprocessor
- •Pace of Advancement
- •1.2.2 Applications of Computer Systems
- •In Education Multimedia-Facilitated Learning
- •Simulation-Based Education
- •Intelligent Machine-Based Training
- •Interactive Learning
- •In Business Supply Chain Management
- •Project Management
- •Customer Relationship Management
- •Sales and Marketing Using Electronic Commerce
- •Manufacturing Research
- •In Entertainment Movies
- •Video Games
- •1.3 Data Representation in a Computer System
- •1.3.1 Bits and Bytes
- •Data Representation Using Binary Digits
- •Increasing Need for Bytes
- •1.3.2 Number Systems
- •Decimal
- •Hexadecimal
- •Learning Exercise
- •2.1 Processor and Memory
- •2.1.1 Processor Basics
- •Processor
- •Instruction Execution with the cpu
- •Performance: Factors and Measures
- •Types of Processors
- •2.1.2 Types of Memory
- •Cmos Memory
- •Summary
- •2.1.3 Lab: Benchmarking (Optional)
- •2.2 Peripherals
- •2.2.1 Connecting Peripherals
- •Expansion Slots and Cards
- •Usb and FireWire
- •Comparing Different Ports
- •2.2.2 Buses
- •2.2.3 Input/Output Devices
- •Input Devices
- •Cameras
- •Digital Camcorders
- •Scanners
- •Output Devices: Monitors and Projectors
- •Crt Monitors
- •Lcd Monitors
- •Projectors
- •Output Devices: Printers
- •Ink Printers
- •Dye-Sublimation Printers
- •Laser Printers
- •Comparing Printers
- •2.3 Storage Devices
- •2.3.1 Disk Controller Interfaces
- •Ide Interface
- •Eide Master/Slave
- •2.3.2 Mass Storage
- •How Mass Storage Devices Differ from ram
- •Disk Drive Reliability
- •Optical Media: cDs versus dvDs
- •Magnetic Media
- •Optical versus Magnetic
- •Solid State
- •Comparing Storages
- •2.4 Putting Together the Hardware Components
- •2.4.1 How Components Work Together
- •2.4.2 Lab: Researching a Computer System
- •2.4.3 Lab: Online Configuration
- •2.5 Improving Computer Performance
- •2.5.1 Moore's Law
- •2.5.2 Bottlenecks
- •Bottlenecks—Slowing a Process
- •Typical Bottlenecks
- •Eliminating Bottlenecks
- •2.5.3 Throughput and Latency
- •Unit 3. Operating System Software
- •3.1 Structure
- •3.1.1 Layers of Software
- •Layers and Process Management
- •Encapsulation and Abstraction
- •Layers of Software
- •3.1.2 The bios: Life at the Bottom
- •The Role of the bios
- •Changing bios Settings
- •3.1.3 Process Control
- •3.1.4 Lab: The Task Manager
- •3.2 Device Management and Configuration
- •3.2.1 Interrupt Handling
- •Interrupts
- •Interrupt Priority and Nested Interrupts
- •Traps and Faults
- •3.2.2 Hardware Attributes
- •Installing Drivers
- •Changing a Driver's Configuration
- •3.2.3 Configuration
- •3.2.4 Lab: Device Management
- •3.3 Resource Sharing
- •3.3.1 Virtual Memory
- •Managing Memory
- •Relocation
- •Virtual Memory
- •3.3.2 File and Printer Sharing
- •Printers
- •3.4 File Systems
- •3.4.1 File Organization
- •Folders
- •Shortcuts
- •File Names and Types
- •3.4.2 File Allocation Table and nt File System
- •Clusters and File Allocation Tables
- •Nt File System
- •Unit 4. Application Software
- •4.1 Software Basics
- •4.2 Using Software Systems
- •4.2.1 Lab: dos Commands
- •4.2.2 Lab: Macros
- •4.2.3 Lab: Embedding Application Objects
- •4.3 Batch Script Files
- •4.3.1 Advanced Command-Line Functions
- •Dos Command Syntax
- •Review of File System Commands
- •Wildcard Characters
- •Redirection and Piping
- •4.3.2 Batch File Commands
- •Batch Files
- •Commands
- •4.3.3 Lab: Creating a Batch File
- •Example of a Batch File
- •Example of a Batch File with Arguments
- •4.4 Databases
- •4.4.1 Lab: Searching the Library of Congress
- •4.5 Software Engineering
- •4.5.1 Issues in Large-Scale Software Development
- •The Software Development Process
- •Define or Redefine the Problem
- •Plan a Solution to the Problem
- •Code the Solution
- •Evaluate and Test Everything
- •4.5.2 Open Source Model
- •Free Software
- •4.5.3 Tools for Software Creation and Management
- •Editors
- •Compilers
- •Debuggers
- •Integrated Development Environments (idEs)
- •Unit 5. Network Systems
- •5.1 Internet Basics
- •5.1.1 Mime Types
- •5.1.2 Internet Languages
- •JavaScript
- •5.2 Local and Wide Area Networks
- •5.3 Communication Strategies
- •5.3.1 Client-Server Framework
- •5.3.2 Peer-to-Peer Connectivity
- •5.4 Data Transfer Technologies
- •5.5 Internet Architecture
- •5.5.1 Routers and tcp/ip
- •Internet Protocol
- •Routers
- •Transmission Control Protocol
- •5.5.2 Domain Name Service
- •Domain Name Service
- •5.5.3 Connectivity
- •Conventional Analog Phone Lines
- •Isdn: Integrated Services Digital Network
- •Cable Modem
- •XDsl: Digital Subscriber Line
- •Dedicated High Speed Lines
- •5.5.4 Internet Service Providers
- •Unit 6. Computer Security
- •6.1 Security Threats
- •6.1.1 Intruders: Who, Why, and How?
- •6.1.2 Identity Theft and Privacy Violation
- •Password Cracking
- •Packet sniffing
- •Social Engineering/Fraud
- •Spoofing
- •Port Scanning
- •6.1.3 Malicious Software
- •Trojan Horse
- •Prevention
- •Detection
- •Counter Measures
- •6.1.4 Denial of Service
- •Network Connectivity
- •Network Bandwidth
- •Other Resource Consumption Attacks
- •Distributed Denial of Service Attack
- •Prevention
- •6.2 Security Technologies
- •6.2.1 Encryption
- •Substitution Cipher
- •Transmitting the Key
- •Private Key Encryption Scheme
- •Public Key Encryption Scheme
- •Hybrid Encryption Schemes
- •6.2.2 Applications of Encryption
- •Hard Drives
- •Dvd Movies
- •Cellular Phones
- •6.2.3 Authentication
- •Strong Passwords
- •Smart Cards
- •Biometrics
- •Digital Signatures
- •Digital Certificates and Certificate Authorities
- •Ssl Protocol
- •6.3 Prevention, Detection, and Recovery
- •6.3.1 Firewall
- •Application Gateway
- •Packet Filter
- •Application Gateway versus Packet Filter
- •Intruder Attacks Prevented by Firewall
- •Setting up a Firewall
- •6.3.2 Intrusion Detection Tools
- •Intrusion Detection Systems
- •Network Monitoring Tools
- •Anti-Virus Software
- •6.3.3 Data Recovery
- •6.3.4 Summary of Security Tips
Types of Processors
Intel is a well-known microprocessor vendor. Microprocessors produced by Intel became popular with the highly successful IBM Personal Computer (PC), introduced in 1981. The IBM PC used the early members of the Intel x86-microprocessor family and the Microsoft Disk Operating System (MS-DOS), giving Intel and Microsoft early market share and increased product recognition. The progression of Intel PC processors, with a few variations, has gone from the 8086, through the 80286 (or just 286, as the 80 is often dropped), the 386, and the 486. The 586 was renamed the Pentium for legal and marketing reasons. Among the Pentium family are the Pentium Pro, the Celeron, and the Pentium II, III, IV, M, and Xeon. Read about the history of Intel microprocessors. Find out about the latest processors developed by Intel.
Companies such as Advanced Micro Devices (AMD) now market processor chips that are compatible with the Pentium family. These chips, called "Pentium clones," are typically less expensive and sometimes even faster than Intel's products. There is an ongoing battle among chip manufacturers to provide the fastest processors at the lowest cost. Although Intel retains the majority of the market share for Pentium-type processors, chips from other vendors are finding increasing acceptance, especially in less expensive systems designed for home use. Read about AMD's processors.
Another widely-used processor architecture is the PowerPC used in the Macintosh family of computers. The PowerPC was based on IBM's architecture and then modified by Motorola and Apple. Database servers storing large amounts of data are sometimes built around the SPARC family of processors developed by Sun Microsystems. On the smaller side, there are many specialized processor chip families created for embedded applications, such as automobiles or cellular phones. A cell phone is actually a moderately powerful computer with a radio transmitter as its main peripheral device. If you are interested, you can find out about how a cell phone works.
There are also some Web sites that compare CPU specifications and CPU prices. If you come across unfamiliar terms, there are reference resources on the Web such as Geek.com or Webopedia. When comparing processors, keep in mind that some processors with a "mobile" or a "-M" label in its name indicate that they can be used for laptops. For example, AMD Mobile Duron and Mobile Athlon XP are for laptops. Processors for laptop computers generally have slower processing speeds, in exchange for lower power consumption and longer battery life. Intel's "mobile" or "-M" processors are for laptops, and Transmeta processors are mostly for laptops.
-
2.1.2 Types of Memory
RAM
ROM
CMOS Memory
Summary
Memory components include the main memory, also known as RAM, and the memory components needed to boot or start a computer, ROM and CMOS. Each of these memory components will be discussed in the following pages.
The figure below shows a top-level view of the different types of memory.
Figure 1 RAM, ROM, and CMOS
RAM
RAM (random access memory) is a temporary holding area for both data and instructions. It is also referred to as main memory. RAM stores data and instructions needed to execute programs. The data in RAM is lost when the computer is turned off. In contrast to accessing data serially, searching sequentially for the data to be retrieved, data in RAM can be accessed directly via its address. Therefore, RAM stands for "random access memory." Random access is similar to accessing a song on a CD directly via its track number, as opposed to finding a song serially on tape.
RAM is measured by its memory capacity and latency.
Capacity is the maximum number of bits or bytes that can be stored. The capacity of RAM is typically measured in megabytes (MB). Many computers have RAM capacity of 128MB or more.
Latency is the delay between the time when the memory device receives an address and the time when the first bit of data is available from the memory device. This delay is also referred to as access time. Latency is typically measured in nanoseconds (ns), billionth of a second (10-9 sec). Latency measures the speed of RAM.
Two major categories of RAM called DRAM and SRAM are discussed below.
DRAM - Dynamic RAM is a common type of RAM. It is made of an integrated circuit (IC), composed of millions of transistors and capacitors. A capacitor can hold electrons, just as a cup can hold water. An empty capacitor represents a zero, and a non-empty capacitor represents a one. Each capacitor can register either a zero or a one for a memory cell, storing one bit of data. The transistor is like a switch that controls whether the capacitor's state (charged or not charged, 1 or 0) is to be read or changed. Changing the state of a capacitor is like writing new data to a memory cell. However, a capacitor is like a cup that leaks, in order to keep its charge, the memory control needs to be recharged or refreshed periodically. Therefore, it is called the dynamic RAM because its state is not constant. Refreshing capacitors also takes time and slows down memory.
There are several types of DRAM, one is SDRAM (Synchronous Dynamic RAM) used in many personal computers. It is fast and relatively inexpensive. It is synchronized to the clock so that data can be sent to the CPU at each tick of the clock, increasing the number of instructions the processor can execute within a given time. Below is a picture of SDRAM configured as a series of DIPs (dual in-line packages), which has two rows of pins that connect the IC circuitry to a circuit board. The entire circuit board shown is called a DIMM (dual in-line memory module).
Figure 2 SDRAM circuit board
A faster version of SDRAM is DDR SDRAM (Double Data Rate SDRAM), which transfers twice the amount of data per clock cycle compared to SDRAM. Its capacity is up to 2 GB.
Another type of DRAM is RDRAM (Rambus Dynamic RAM), which has a higher bandwidth than SDRAM, but it is more expensive compared to SDRAM. The high bandwidth enhances the performance of applications that access large amounts of data through memory, i.e. real-time video and video editing. You can learn more about RDRAM.
SRAM - Static RAM is a type of RAM that uses transistors to store data. Because SRAM does not use capacitors, reading data from SRAM does not require recharging the capacitors. Therefore, it is faster than DRAM. But, because it consists of more electronic parts, it holds fewer bits and costs more compared to DRAM of the same size. SRAM is appropriate for use in the cache because it is fast and cache does not require a large memory capacity.
The following chart lists the relative capacity and price of the types of RAM mentioned above.
Type of RAM |
Capacity |
Price |
SDRAM |
@@ |
$ |
DDR SDRAM |
@@@ |
$ |
RDRAM |
@@@ |
$$ |
SRAM |
@ |
$$$ |
Table 1 Comparing different types of RAM
You can learn more about RAM in the white paper, "A Basic Overview of Commonly Encountered Types of Random Access Memory (RAM)." A table comparing different types of RAM can be found on page 20 of the PDF document.
ROM
Read-only memory (ROM) is programmed with data hard-wired when it is manufactured. Data and instructions on a ROM are permanent, or nonvolatile, which means they are not lost when power is turned off. Why is ROM needed when RAM enables all the memory operations necessary for a computer? Because data in RAM is lost when the computer is turned off, some instructions are needed for the CPU to start or boot the computer when the computer is first turned on. Therefore, ROM contains a set of instructions that is needed to start the computer. These instructions tell the computer how to access the hard disk, find the operating system, and load it into RAM. Then RAM stores all subsequent instructions to be executed by the CPU.
Typically, ROM is hardwired with start-up instructions for the computer. At one time, changing the boot instructions (for example, to integrate a new video card and disable the old one) on a ROM required replacing the entire ROM chip. Currently, a type of ROM, electrically erasable programmable read-only memory (EEPROM), can be updated by applying an electrical field changing instructions stored on the chip one byte at a time. This could slow down the update process.
An alternative to EEPROM is flash memory. Flash memory is a type of EEPROM that rewrites data in chunks, usually 512 bytes in size, instead of 1 bit at a time.