- •Ssd2: Introduction to Computer Systems contents
- •Prerequisites
- •Course Textbook
- •Hardware/Software Requirements
- •The purpose of ssd2 is for students to
- •Students successfully completing ssd2 will be able to
- •1.1 Overview of Computer Systems
- •1.1.1 Components of a Computer System
- •Hardware System
- •Software System—Operating System Software and Application Software
- •Network System
- •1.2 Evolution of Computer Systems
- •1.2.1 Brief History
- •1200S—Manual Calculating Devices
- •1600S—Mechanical Calculators
- •1800S—Punched Cards
- •1940S—Vacuum Tubes
- •1950S—Transistors
- •1960S—Integrated Circuits
- •1970S to Present—Microprocessor
- •Pace of Advancement
- •1.2.2 Applications of Computer Systems
- •In Education Multimedia-Facilitated Learning
- •Simulation-Based Education
- •Intelligent Machine-Based Training
- •Interactive Learning
- •In Business Supply Chain Management
- •Project Management
- •Customer Relationship Management
- •Sales and Marketing Using Electronic Commerce
- •Manufacturing Research
- •In Entertainment Movies
- •Video Games
- •1.3 Data Representation in a Computer System
- •1.3.1 Bits and Bytes
- •Data Representation Using Binary Digits
- •Increasing Need for Bytes
- •1.3.2 Number Systems
- •Decimal
- •Hexadecimal
- •Learning Exercise
- •2.1 Processor and Memory
- •2.1.1 Processor Basics
- •Processor
- •Instruction Execution with the cpu
- •Performance: Factors and Measures
- •Types of Processors
- •2.1.2 Types of Memory
- •Cmos Memory
- •Summary
- •2.1.3 Lab: Benchmarking (Optional)
- •2.2 Peripherals
- •2.2.1 Connecting Peripherals
- •Expansion Slots and Cards
- •Usb and FireWire
- •Comparing Different Ports
- •2.2.2 Buses
- •2.2.3 Input/Output Devices
- •Input Devices
- •Cameras
- •Digital Camcorders
- •Scanners
- •Output Devices: Monitors and Projectors
- •Crt Monitors
- •Lcd Monitors
- •Projectors
- •Output Devices: Printers
- •Ink Printers
- •Dye-Sublimation Printers
- •Laser Printers
- •Comparing Printers
- •2.3 Storage Devices
- •2.3.1 Disk Controller Interfaces
- •Ide Interface
- •Eide Master/Slave
- •2.3.2 Mass Storage
- •How Mass Storage Devices Differ from ram
- •Disk Drive Reliability
- •Optical Media: cDs versus dvDs
- •Magnetic Media
- •Optical versus Magnetic
- •Solid State
- •Comparing Storages
- •2.4 Putting Together the Hardware Components
- •2.4.1 How Components Work Together
- •2.4.2 Lab: Researching a Computer System
- •2.4.3 Lab: Online Configuration
- •2.5 Improving Computer Performance
- •2.5.1 Moore's Law
- •2.5.2 Bottlenecks
- •Bottlenecks—Slowing a Process
- •Typical Bottlenecks
- •Eliminating Bottlenecks
- •2.5.3 Throughput and Latency
- •Unit 3. Operating System Software
- •3.1 Structure
- •3.1.1 Layers of Software
- •Layers and Process Management
- •Encapsulation and Abstraction
- •Layers of Software
- •3.1.2 The bios: Life at the Bottom
- •The Role of the bios
- •Changing bios Settings
- •3.1.3 Process Control
- •3.1.4 Lab: The Task Manager
- •3.2 Device Management and Configuration
- •3.2.1 Interrupt Handling
- •Interrupts
- •Interrupt Priority and Nested Interrupts
- •Traps and Faults
- •3.2.2 Hardware Attributes
- •Installing Drivers
- •Changing a Driver's Configuration
- •3.2.3 Configuration
- •3.2.4 Lab: Device Management
- •3.3 Resource Sharing
- •3.3.1 Virtual Memory
- •Managing Memory
- •Relocation
- •Virtual Memory
- •3.3.2 File and Printer Sharing
- •Printers
- •3.4 File Systems
- •3.4.1 File Organization
- •Folders
- •Shortcuts
- •File Names and Types
- •3.4.2 File Allocation Table and nt File System
- •Clusters and File Allocation Tables
- •Nt File System
- •Unit 4. Application Software
- •4.1 Software Basics
- •4.2 Using Software Systems
- •4.2.1 Lab: dos Commands
- •4.2.2 Lab: Macros
- •4.2.3 Lab: Embedding Application Objects
- •4.3 Batch Script Files
- •4.3.1 Advanced Command-Line Functions
- •Dos Command Syntax
- •Review of File System Commands
- •Wildcard Characters
- •Redirection and Piping
- •4.3.2 Batch File Commands
- •Batch Files
- •Commands
- •4.3.3 Lab: Creating a Batch File
- •Example of a Batch File
- •Example of a Batch File with Arguments
- •4.4 Databases
- •4.4.1 Lab: Searching the Library of Congress
- •4.5 Software Engineering
- •4.5.1 Issues in Large-Scale Software Development
- •The Software Development Process
- •Define or Redefine the Problem
- •Plan a Solution to the Problem
- •Code the Solution
- •Evaluate and Test Everything
- •4.5.2 Open Source Model
- •Free Software
- •4.5.3 Tools for Software Creation and Management
- •Editors
- •Compilers
- •Debuggers
- •Integrated Development Environments (idEs)
- •Unit 5. Network Systems
- •5.1 Internet Basics
- •5.1.1 Mime Types
- •5.1.2 Internet Languages
- •JavaScript
- •5.2 Local and Wide Area Networks
- •5.3 Communication Strategies
- •5.3.1 Client-Server Framework
- •5.3.2 Peer-to-Peer Connectivity
- •5.4 Data Transfer Technologies
- •5.5 Internet Architecture
- •5.5.1 Routers and tcp/ip
- •Internet Protocol
- •Routers
- •Transmission Control Protocol
- •5.5.2 Domain Name Service
- •Domain Name Service
- •5.5.3 Connectivity
- •Conventional Analog Phone Lines
- •Isdn: Integrated Services Digital Network
- •Cable Modem
- •XDsl: Digital Subscriber Line
- •Dedicated High Speed Lines
- •5.5.4 Internet Service Providers
- •Unit 6. Computer Security
- •6.1 Security Threats
- •6.1.1 Intruders: Who, Why, and How?
- •6.1.2 Identity Theft and Privacy Violation
- •Password Cracking
- •Packet sniffing
- •Social Engineering/Fraud
- •Spoofing
- •Port Scanning
- •6.1.3 Malicious Software
- •Trojan Horse
- •Prevention
- •Detection
- •Counter Measures
- •6.1.4 Denial of Service
- •Network Connectivity
- •Network Bandwidth
- •Other Resource Consumption Attacks
- •Distributed Denial of Service Attack
- •Prevention
- •6.2 Security Technologies
- •6.2.1 Encryption
- •Substitution Cipher
- •Transmitting the Key
- •Private Key Encryption Scheme
- •Public Key Encryption Scheme
- •Hybrid Encryption Schemes
- •6.2.2 Applications of Encryption
- •Hard Drives
- •Dvd Movies
- •Cellular Phones
- •6.2.3 Authentication
- •Strong Passwords
- •Smart Cards
- •Biometrics
- •Digital Signatures
- •Digital Certificates and Certificate Authorities
- •Ssl Protocol
- •6.3 Prevention, Detection, and Recovery
- •6.3.1 Firewall
- •Application Gateway
- •Packet Filter
- •Application Gateway versus Packet Filter
- •Intruder Attacks Prevented by Firewall
- •Setting up a Firewall
- •6.3.2 Intrusion Detection Tools
- •Intrusion Detection Systems
- •Network Monitoring Tools
- •Anti-Virus Software
- •6.3.3 Data Recovery
- •6.3.4 Summary of Security Tips
Optical Media: cDs versus dvDs
Data in an optical media is read and written using laser beams. Compact discs (CDs) and digital video discs (DVDs) are optical disks. A DVD is an enhanced form of a CD. The two types of disks are physically the same size, but they differ in format. DVDs offer much greater capacity, which they achieve in two ways. First, DVDs have narrower tracks, so they can squeeze more tracks onto the same size disk. Both CDs and DVDs are read using light from a laser. But, the CD laser is red, while the DVD laser is blue. Red light has a longer wavelength than a blue light. The blue laser is thus able to produce a smaller beam, allowing it to focus on the tinier tracks of the DVD. The second way that DVDs achieve increased capacity over CDs is by using multiple layers of tracks. The blue laser is not only narrower, but also more powerful. Its beams can penetrate the plastic and focus at different depths. DVDs that are dual-layered actually have two sets of tracks on one side of the disk, one beneath the other. The laser beam can be focused on either the upper or lower layer. This doubles the capacity of one side of a DVD disk. It is also possible to put tracks on both sides of a DVD. A double layer double side (DLDS) DVD drive uses double layers and can read double-sided disks, giving it four times the capacity of a single layer single side (SLSS) drive.
CDs have two recordable formats, CD-R and CD-RW. While the Parsons and Oja textbook lists recordable DVDs, there are multiple standard formats for this. So, while CD-Rs and CD-RWs are readable on most CD or DVD drives, recordable DVDs may not be readable on some types of DVD drives. For this reason, users who record data on optical media for widespread distribution (for example, for releasing a new software package) may wish to limit themselves to CDs for now even though it has lower capacity than DVDs. DVDs are usually used as a medium for multimedia presentations that combine sound with graphics, such as movies.
Magnetic Media
Magnetic media range from some of the smallest capacity storage devices, floppy disks, to the largest capacity devices, hard disk drives. The floppy disk is no longer used to distribute operating systems, though, because of the increasingly large size of current operating systems. The last major distribution of Windows using floppy disks was Windows 95, which occupied 30 diskettes.
Zip disks, removable storage drives produced by Iomega, allow users to store much larger amounts of data than a floppy disk can hold—although Zip disks are physically not much bigger than floppy disks. These drives were once very popular, and many machines came with a Zip drive as standard equipment. But, their use declined with the wide availability of CD-RW and DVD-RW drives and the reduced cost of blank CD-R and DVD-R disks.
Smaller portable drives are being manufactured with larger capacities. For example, Mini USB storage device offers 512MB, 1GB, or 8GB of storage capacity on a storage device the size of a car key. Another portable storage device offered by Iomega is the pocket-size HDD Desktop external hard drive. It is available from 40GB all the way to 1TB of storage capacity. These devices can be connected to a USB or FireWire port.
Fixed (non-removable) hard disk drives are still the main storage medium for computers today. They can hold more data than any of the removable media types, optical or magnetic. On most personal machines, the operating system, application programs, and user data all reside on one hard drive. The smallest hard drives today, which are typically found in laptops, hold about 20 GB. When purchased separately, hard drives run from 20 GB up to around 750 GB, with the limit continuing steadily upward each year. Another important characteristic when comparing hard disk drives is the speed at which a disk drive rotates, since this limits the rate at which bits can be transferred between the drive and the computer. Slower drives spin at 4200 rpm (i.e. laptop computers); faster ones, at 15,000 rpm. If a hard drive is to be used in a performance-critical application, such as a database server, the data transfer rate is an important consideration. This rate will be affected by several other factors besides the rotation speed of the disk and latency (time it takes to access the first bit of data)—such as the type of disk controller selected and the type of memory architecture the computer uses. Refer to the sections on benchmarking in 2.1.1 Processor Basics and 2.5.2 Bottlenecks to find more information on this subject.
