
- •Ssd2: Introduction to Computer Systems contents
- •Prerequisites
- •Course Textbook
- •Hardware/Software Requirements
- •The purpose of ssd2 is for students to
- •Students successfully completing ssd2 will be able to
- •1.1 Overview of Computer Systems
- •1.1.1 Components of a Computer System
- •Hardware System
- •Software System—Operating System Software and Application Software
- •Network System
- •1.2 Evolution of Computer Systems
- •1.2.1 Brief History
- •1200S—Manual Calculating Devices
- •1600S—Mechanical Calculators
- •1800S—Punched Cards
- •1940S—Vacuum Tubes
- •1950S—Transistors
- •1960S—Integrated Circuits
- •1970S to Present—Microprocessor
- •Pace of Advancement
- •1.2.2 Applications of Computer Systems
- •In Education Multimedia-Facilitated Learning
- •Simulation-Based Education
- •Intelligent Machine-Based Training
- •Interactive Learning
- •In Business Supply Chain Management
- •Project Management
- •Customer Relationship Management
- •Sales and Marketing Using Electronic Commerce
- •Manufacturing Research
- •In Entertainment Movies
- •Video Games
- •1.3 Data Representation in a Computer System
- •1.3.1 Bits and Bytes
- •Data Representation Using Binary Digits
- •Increasing Need for Bytes
- •1.3.2 Number Systems
- •Decimal
- •Hexadecimal
- •Learning Exercise
- •2.1 Processor and Memory
- •2.1.1 Processor Basics
- •Processor
- •Instruction Execution with the cpu
- •Performance: Factors and Measures
- •Types of Processors
- •2.1.2 Types of Memory
- •Cmos Memory
- •Summary
- •2.1.3 Lab: Benchmarking (Optional)
- •2.2 Peripherals
- •2.2.1 Connecting Peripherals
- •Expansion Slots and Cards
- •Usb and FireWire
- •Comparing Different Ports
- •2.2.2 Buses
- •2.2.3 Input/Output Devices
- •Input Devices
- •Cameras
- •Digital Camcorders
- •Scanners
- •Output Devices: Monitors and Projectors
- •Crt Monitors
- •Lcd Monitors
- •Projectors
- •Output Devices: Printers
- •Ink Printers
- •Dye-Sublimation Printers
- •Laser Printers
- •Comparing Printers
- •2.3 Storage Devices
- •2.3.1 Disk Controller Interfaces
- •Ide Interface
- •Eide Master/Slave
- •2.3.2 Mass Storage
- •How Mass Storage Devices Differ from ram
- •Disk Drive Reliability
- •Optical Media: cDs versus dvDs
- •Magnetic Media
- •Optical versus Magnetic
- •Solid State
- •Comparing Storages
- •2.4 Putting Together the Hardware Components
- •2.4.1 How Components Work Together
- •2.4.2 Lab: Researching a Computer System
- •2.4.3 Lab: Online Configuration
- •2.5 Improving Computer Performance
- •2.5.1 Moore's Law
- •2.5.2 Bottlenecks
- •Bottlenecks—Slowing a Process
- •Typical Bottlenecks
- •Eliminating Bottlenecks
- •2.5.3 Throughput and Latency
- •Unit 3. Operating System Software
- •3.1 Structure
- •3.1.1 Layers of Software
- •Layers and Process Management
- •Encapsulation and Abstraction
- •Layers of Software
- •3.1.2 The bios: Life at the Bottom
- •The Role of the bios
- •Changing bios Settings
- •3.1.3 Process Control
- •3.1.4 Lab: The Task Manager
- •3.2 Device Management and Configuration
- •3.2.1 Interrupt Handling
- •Interrupts
- •Interrupt Priority and Nested Interrupts
- •Traps and Faults
- •3.2.2 Hardware Attributes
- •Installing Drivers
- •Changing a Driver's Configuration
- •3.2.3 Configuration
- •3.2.4 Lab: Device Management
- •3.3 Resource Sharing
- •3.3.1 Virtual Memory
- •Managing Memory
- •Relocation
- •Virtual Memory
- •3.3.2 File and Printer Sharing
- •Printers
- •3.4 File Systems
- •3.4.1 File Organization
- •Folders
- •Shortcuts
- •File Names and Types
- •3.4.2 File Allocation Table and nt File System
- •Clusters and File Allocation Tables
- •Nt File System
- •Unit 4. Application Software
- •4.1 Software Basics
- •4.2 Using Software Systems
- •4.2.1 Lab: dos Commands
- •4.2.2 Lab: Macros
- •4.2.3 Lab: Embedding Application Objects
- •4.3 Batch Script Files
- •4.3.1 Advanced Command-Line Functions
- •Dos Command Syntax
- •Review of File System Commands
- •Wildcard Characters
- •Redirection and Piping
- •4.3.2 Batch File Commands
- •Batch Files
- •Commands
- •4.3.3 Lab: Creating a Batch File
- •Example of a Batch File
- •Example of a Batch File with Arguments
- •4.4 Databases
- •4.4.1 Lab: Searching the Library of Congress
- •4.5 Software Engineering
- •4.5.1 Issues in Large-Scale Software Development
- •The Software Development Process
- •Define or Redefine the Problem
- •Plan a Solution to the Problem
- •Code the Solution
- •Evaluate and Test Everything
- •4.5.2 Open Source Model
- •Free Software
- •4.5.3 Tools for Software Creation and Management
- •Editors
- •Compilers
- •Debuggers
- •Integrated Development Environments (idEs)
- •Unit 5. Network Systems
- •5.1 Internet Basics
- •5.1.1 Mime Types
- •5.1.2 Internet Languages
- •JavaScript
- •5.2 Local and Wide Area Networks
- •5.3 Communication Strategies
- •5.3.1 Client-Server Framework
- •5.3.2 Peer-to-Peer Connectivity
- •5.4 Data Transfer Technologies
- •5.5 Internet Architecture
- •5.5.1 Routers and tcp/ip
- •Internet Protocol
- •Routers
- •Transmission Control Protocol
- •5.5.2 Domain Name Service
- •Domain Name Service
- •5.5.3 Connectivity
- •Conventional Analog Phone Lines
- •Isdn: Integrated Services Digital Network
- •Cable Modem
- •XDsl: Digital Subscriber Line
- •Dedicated High Speed Lines
- •5.5.4 Internet Service Providers
- •Unit 6. Computer Security
- •6.1 Security Threats
- •6.1.1 Intruders: Who, Why, and How?
- •6.1.2 Identity Theft and Privacy Violation
- •Password Cracking
- •Packet sniffing
- •Social Engineering/Fraud
- •Spoofing
- •Port Scanning
- •6.1.3 Malicious Software
- •Trojan Horse
- •Prevention
- •Detection
- •Counter Measures
- •6.1.4 Denial of Service
- •Network Connectivity
- •Network Bandwidth
- •Other Resource Consumption Attacks
- •Distributed Denial of Service Attack
- •Prevention
- •6.2 Security Technologies
- •6.2.1 Encryption
- •Substitution Cipher
- •Transmitting the Key
- •Private Key Encryption Scheme
- •Public Key Encryption Scheme
- •Hybrid Encryption Schemes
- •6.2.2 Applications of Encryption
- •Hard Drives
- •Dvd Movies
- •Cellular Phones
- •6.2.3 Authentication
- •Strong Passwords
- •Smart Cards
- •Biometrics
- •Digital Signatures
- •Digital Certificates and Certificate Authorities
- •Ssl Protocol
- •6.3 Prevention, Detection, and Recovery
- •6.3.1 Firewall
- •Application Gateway
- •Packet Filter
- •Application Gateway versus Packet Filter
- •Intruder Attacks Prevented by Firewall
- •Setting up a Firewall
- •6.3.2 Intrusion Detection Tools
- •Intrusion Detection Systems
- •Network Monitoring Tools
- •Anti-Virus Software
- •6.3.3 Data Recovery
- •6.3.4 Summary of Security Tips
2.2.1 Connecting Peripherals
Expansion Slots and Cards
Ports
USB and FireWire
Comparing Different Ports
An expansion slot is a slit-like socket on the motherboard into which a circuit board can be inserted. The circuit board is called the expansion card; it is used to extend the capability of a computer. Examples of an expansion card include the sound card and the video card. An expansion card also provides port(s), which are connector(s) between the expansion card and the peripheral device. A port can also be built into the system unit case of a computer, such as a mouse port.
A number of different ports were needed to connect different peripheral devices, until the advent of standardized universal ports, such as Universal Serial Bus (USB) port and FireWire port. Because these universal ports are being widely used, they are replacing the need for other ports.
See the diagram below for how peripheral devices and their connectors attach to other components in a computer.
Figure 1 Peripheral devices and their connectors
Expansion Slots and Cards
An expansion slot is a socket on the motherboard where expansion cards can be plugged into. An expansion card, also referred to as "expansion boards," "controller cards," or "adapters," is a small circuit board that enhances the functionality of a computer by enabling a computer to control storage devices, input devices, or output devices. Examples of expansion cards include graphics cards (or video cards) and sound cards.
The image below shows an expansion card being inserted into an expansion slot.
Figure 2 Inserting an expansion card into an expansion slot
The two most common types of expansion slots are Peripheral Component Interconnect (PCI) and Accelerated Graphics Port (AGP). A PCI slot can hold a variety of expansion cards such as a sound card or an Ethernet card (discussed later in this section).An AGP slot is primarily used for graphics cards (see discussion on graphics cards below).
In laptops, a PCMCIA (personal computer memory card international association) slot, which is relatively smaller than a PCI slot, fulfills the role of a PCI slot. Typically, a notebook computer is equipped with PCMCIA slots for expansion cards also called CardBus cards or PC cards.
Some commonly used expansion cards are:
Graphics card- transforms images into analog data that we perceive as light when displayed on the computer monitor. A graphics card is also known as the video card. A graphical image on the monitor is composed of many colored dots, or pixels. In order to display an image on the screen, image data is represented as colored pixels. Each color is indicated by an RGB value, a mix of red, green, and blue colors.
A graphics card has its own memory and processor that handles computations necessary to convert image data to be displayed into pixels on the monitor. More specifically, to display a 3-D image, the graphics card first rasterizes the image, or convert the 3-D image into a 2-D representation of the image using geometric conversion algorithms. Each pixel in the 2-D representation has an RGB (red, green, and blue) value to indicate its color. The graphics card then converts the RGB value of each pixel into analog data to enable the monitor to project the colored pixels that we recognize as the 3-D image.
Sound card- allows a computer to play sounds such as music from CDs, sound files, games, or DVDs. It can also record sounds from a microphone, cassette player, or CD player. The sound card is usually plugged into the Peripheral Component Interconnect (PCI) slot, or its functionality may be integrated as part of the chipset on the motherboard.
In order for the computer to record sounds, which are analog waveform signals, the analog signals are converted into digital signals. For instance, to record a sound input through a microphone onto a .wav file and save it on hard disk, sounds in analog waveform are converted into digital data. The data is then sent through the bus to the processor, which routes the data to the hard-disk controller, and the hard-disk controller sends the data to the hard-disk drive to be saved there as a .wav file.
Modem- one type of modem is the dial-up modem, which enables a computer to exchange information with a remote computer through ordinary telephone lines. Generally, data in binary form is sent out through a modem, which converts the binary data into analog data before transmitting it through a phone line or a cable line. A modem at the receiving end converts the analog data back into digital data to be used by the computer at the receiving end. A dial-up modem can transfer data at a rate up to 56 kilobits per second (Kbps) from the Internet to the computer.
Ethernet card- serves as the interface to a Local Area Network (LAN), a common network technology allowing users access to network resources such as the Internet, email, shared printers, etc. at a rate of 10 Mbps (more about LAN will be discussed in Unit 6). Newer versions of Ethernet called "Fast Ethernet" and "Gigabit Ethernet" support data rates of 100 Mbps and 1 Gbps (1000 Mbps).
Below are images of Ethernet cards. The one on the left is an Ethernet card used to plug into the PCMCIA slot of a laptop computer. The one on the right is an Ethernet card for a PCI slot in a desktop.
Figure 3 Ethernet cards for PCMCIA slot and PCI slot, respectively
Ports
An expansion card usually includes ports, which are connectors that enable signals to be passed in and out of a computer or peripheral device to exploit the functionality of the expansion card. For example, a video card provides a monitor port. Ports can also be built into the motherboard of a desktop or a notebook computer. Similar ports can be used to plug in peripheral devices such as the mouse and the keyboard.
The image below shows the ports on the back of a computer.
Figure 4 Ports on the back of a computer
A PS/2 port is also known as a serial port. A serial port transfers data one bit at a time. It uses a 6-pin, mini-DIN configuration, which looks like a small, round port. The first appearance of this port was on the IBM PS/2 system, and since then it has become the de facto standard for keyboard and mouse connections. However, the PS/2 ports are gradually being replaced by USB ports.
Another type of serial port is the DB-9 port. It is also becoming obsolete. PDA devices used to connect to DB-9 ports before the advent of USB ports. Other devices that can be connected to a DB-9 port are the external modem and the barcode scanner, in general, older electronic devices.
In contrast, a parallel port transfers one byte at a time. The port connection on the system is DB-25F, requiring a 25-pin male connector (DB-25M) on the cable. A DB-25F port can be used for printers or external drives. A parallel port is typically used to connect a computer to a printer, which uses a different kind of connector than does the computer.