- •Ssd2: Introduction to Computer Systems contents
- •Prerequisites
- •Course Textbook
- •Hardware/Software Requirements
- •The purpose of ssd2 is for students to
- •Students successfully completing ssd2 will be able to
- •1.1 Overview of Computer Systems
- •1.1.1 Components of a Computer System
- •Hardware System
- •Software System—Operating System Software and Application Software
- •Network System
- •1.2 Evolution of Computer Systems
- •1.2.1 Brief History
- •1200S—Manual Calculating Devices
- •1600S—Mechanical Calculators
- •1800S—Punched Cards
- •1940S—Vacuum Tubes
- •1950S—Transistors
- •1960S—Integrated Circuits
- •1970S to Present—Microprocessor
- •Pace of Advancement
- •1.2.2 Applications of Computer Systems
- •In Education Multimedia-Facilitated Learning
- •Simulation-Based Education
- •Intelligent Machine-Based Training
- •Interactive Learning
- •In Business Supply Chain Management
- •Project Management
- •Customer Relationship Management
- •Sales and Marketing Using Electronic Commerce
- •Manufacturing Research
- •In Entertainment Movies
- •Video Games
- •1.3 Data Representation in a Computer System
- •1.3.1 Bits and Bytes
- •Data Representation Using Binary Digits
- •Increasing Need for Bytes
- •1.3.2 Number Systems
- •Decimal
- •Hexadecimal
- •Learning Exercise
- •2.1 Processor and Memory
- •2.1.1 Processor Basics
- •Processor
- •Instruction Execution with the cpu
- •Performance: Factors and Measures
- •Types of Processors
- •2.1.2 Types of Memory
- •Cmos Memory
- •Summary
- •2.1.3 Lab: Benchmarking (Optional)
- •2.2 Peripherals
- •2.2.1 Connecting Peripherals
- •Expansion Slots and Cards
- •Usb and FireWire
- •Comparing Different Ports
- •2.2.2 Buses
- •2.2.3 Input/Output Devices
- •Input Devices
- •Cameras
- •Digital Camcorders
- •Scanners
- •Output Devices: Monitors and Projectors
- •Crt Monitors
- •Lcd Monitors
- •Projectors
- •Output Devices: Printers
- •Ink Printers
- •Dye-Sublimation Printers
- •Laser Printers
- •Comparing Printers
- •2.3 Storage Devices
- •2.3.1 Disk Controller Interfaces
- •Ide Interface
- •Eide Master/Slave
- •2.3.2 Mass Storage
- •How Mass Storage Devices Differ from ram
- •Disk Drive Reliability
- •Optical Media: cDs versus dvDs
- •Magnetic Media
- •Optical versus Magnetic
- •Solid State
- •Comparing Storages
- •2.4 Putting Together the Hardware Components
- •2.4.1 How Components Work Together
- •2.4.2 Lab: Researching a Computer System
- •2.4.3 Lab: Online Configuration
- •2.5 Improving Computer Performance
- •2.5.1 Moore's Law
- •2.5.2 Bottlenecks
- •Bottlenecks—Slowing a Process
- •Typical Bottlenecks
- •Eliminating Bottlenecks
- •2.5.3 Throughput and Latency
- •Unit 3. Operating System Software
- •3.1 Structure
- •3.1.1 Layers of Software
- •Layers and Process Management
- •Encapsulation and Abstraction
- •Layers of Software
- •3.1.2 The bios: Life at the Bottom
- •The Role of the bios
- •Changing bios Settings
- •3.1.3 Process Control
- •3.1.4 Lab: The Task Manager
- •3.2 Device Management and Configuration
- •3.2.1 Interrupt Handling
- •Interrupts
- •Interrupt Priority and Nested Interrupts
- •Traps and Faults
- •3.2.2 Hardware Attributes
- •Installing Drivers
- •Changing a Driver's Configuration
- •3.2.3 Configuration
- •3.2.4 Lab: Device Management
- •3.3 Resource Sharing
- •3.3.1 Virtual Memory
- •Managing Memory
- •Relocation
- •Virtual Memory
- •3.3.2 File and Printer Sharing
- •Printers
- •3.4 File Systems
- •3.4.1 File Organization
- •Folders
- •Shortcuts
- •File Names and Types
- •3.4.2 File Allocation Table and nt File System
- •Clusters and File Allocation Tables
- •Nt File System
- •Unit 4. Application Software
- •4.1 Software Basics
- •4.2 Using Software Systems
- •4.2.1 Lab: dos Commands
- •4.2.2 Lab: Macros
- •4.2.3 Lab: Embedding Application Objects
- •4.3 Batch Script Files
- •4.3.1 Advanced Command-Line Functions
- •Dos Command Syntax
- •Review of File System Commands
- •Wildcard Characters
- •Redirection and Piping
- •4.3.2 Batch File Commands
- •Batch Files
- •Commands
- •4.3.3 Lab: Creating a Batch File
- •Example of a Batch File
- •Example of a Batch File with Arguments
- •4.4 Databases
- •4.4.1 Lab: Searching the Library of Congress
- •4.5 Software Engineering
- •4.5.1 Issues in Large-Scale Software Development
- •The Software Development Process
- •Define or Redefine the Problem
- •Plan a Solution to the Problem
- •Code the Solution
- •Evaluate and Test Everything
- •4.5.2 Open Source Model
- •Free Software
- •4.5.3 Tools for Software Creation and Management
- •Editors
- •Compilers
- •Debuggers
- •Integrated Development Environments (idEs)
- •Unit 5. Network Systems
- •5.1 Internet Basics
- •5.1.1 Mime Types
- •5.1.2 Internet Languages
- •JavaScript
- •5.2 Local and Wide Area Networks
- •5.3 Communication Strategies
- •5.3.1 Client-Server Framework
- •5.3.2 Peer-to-Peer Connectivity
- •5.4 Data Transfer Technologies
- •5.5 Internet Architecture
- •5.5.1 Routers and tcp/ip
- •Internet Protocol
- •Routers
- •Transmission Control Protocol
- •5.5.2 Domain Name Service
- •Domain Name Service
- •5.5.3 Connectivity
- •Conventional Analog Phone Lines
- •Isdn: Integrated Services Digital Network
- •Cable Modem
- •XDsl: Digital Subscriber Line
- •Dedicated High Speed Lines
- •5.5.4 Internet Service Providers
- •Unit 6. Computer Security
- •6.1 Security Threats
- •6.1.1 Intruders: Who, Why, and How?
- •6.1.2 Identity Theft and Privacy Violation
- •Password Cracking
- •Packet sniffing
- •Social Engineering/Fraud
- •Spoofing
- •Port Scanning
- •6.1.3 Malicious Software
- •Trojan Horse
- •Prevention
- •Detection
- •Counter Measures
- •6.1.4 Denial of Service
- •Network Connectivity
- •Network Bandwidth
- •Other Resource Consumption Attacks
- •Distributed Denial of Service Attack
- •Prevention
- •6.2 Security Technologies
- •6.2.1 Encryption
- •Substitution Cipher
- •Transmitting the Key
- •Private Key Encryption Scheme
- •Public Key Encryption Scheme
- •Hybrid Encryption Schemes
- •6.2.2 Applications of Encryption
- •Hard Drives
- •Dvd Movies
- •Cellular Phones
- •6.2.3 Authentication
- •Strong Passwords
- •Smart Cards
- •Biometrics
- •Digital Signatures
- •Digital Certificates and Certificate Authorities
- •Ssl Protocol
- •6.3 Prevention, Detection, and Recovery
- •6.3.1 Firewall
- •Application Gateway
- •Packet Filter
- •Application Gateway versus Packet Filter
- •Intruder Attacks Prevented by Firewall
- •Setting up a Firewall
- •6.3.2 Intrusion Detection Tools
- •Intrusion Detection Systems
- •Network Monitoring Tools
- •Anti-Virus Software
- •6.3.3 Data Recovery
- •6.3.4 Summary of Security Tips
2.4.2 Lab: Researching a Computer System
You can research a computer system using the Web by retrieving product reviews and price comparisons. Suppose you are interested in a particular line of notebook computers, such as the Dell Inspiron or the Sony VAIO. The following activity will lead you through a sample comparison.
|
Learning Exercise:
|
-
2.4.3 Lab: Online Configuration
Some computer-vendor Web sites allow you to specify a system configuration by selecting from various menus listing available options. Then, when you click the "update price" button, you can see the exact price for the system you selected. Two such Web sites are Dell (www.dell.com) and Gateway, Inc. (www.gateway.com).
|
Learning Exercise:
|
-
2.5 Improving Computer Performance
How do you measure computer performance? And, how is computer performance being improved? These are some of the topics covered in this section.
|
Reading Sequence:
|
|
Assessments:
|
-
2.5.1 Moore's Law
A transistor is an electronic switch that can alternate between two states, "on" and "off," representing one bit of information. Modern microchips contain millions of transistors, each so small that it cannot be seen with the naked eye. Gordon Moore, one of the founders of Intel, observed that in 1965, microchip capacity (the number of transistors contained within a silicon wafer) had doubled every year. This trend in computing, which has become known as Moore's Law, continues on into the present—although the rate of change has slowed recently so that chip capacity now doubles every 12-18 months, not every year. Moore's Law, an example of exponential growth, refers specifically to the capacity of microchips, and the law might be stated this way: the number of transistors that can be put on a microchip will double every 12-18 months, until physical limitations are reached.
To illustrate the power of exponential growth, consider the parable of the inventor of chess and his emperor. The emperor wanted to reward the inventor with anything he wanted for creating the game of chess. The inventor requested that he be given one grain of rice for the first square of the chessboard and that each additional square would double the previous square's amount of rice. The emperor immediately granted his wish. There are 64 squares on a chessboard. By the 32nd square, 4 billion grains of rice would have been given, that is about one large field's worth of rice. And, the next square would need about 2 million grains of rice, the next square about 4 million, the next square about 8 million, and so on. The 64th square would need 9*1018 grains of rice, more than the amount of rice that could be produced even if the entire earth's surface is used to grow rice.
The number of transistors on a single chip increased at such exponential rate, doubling every 12-18 months. Below is a graph illustrating the exponential increase in the number of transistors on processors introduced over the years.

Figure 1 Illustration of Moore's Law applied to Intel Processors
Below is the log scaled graph to provide you with a different perspective of the exponential growth of transistors on a microchip.

Figure 2 Illustration of Moore's Law applied to Intel Processors in log scale

For more recent data, see the press kit from Intel
With the exponential growth of transistor density on microchips, many inferences can be made that allow analysts to predict other developments in the computer industry. Extending the scope of Moore's Law, the following predictions can be made:
Processing power (speed) doubles every 12-18 months.
Storage capacity of RAM doubles every 12-18 months.
Other observations are that storage capacity of hard disk drives is also increasing exponentially, and the cost for consumers to purchase computer parts is decreasing over time.
The reason Moore's Law continues to hold true is that circuitry is becoming ever smaller. Circuits that used to require hundreds of square microns of silicon (a micron is a millionth of a meter) now fit into just a few square microns. This trend has enabled more and more circuits to be packed into the same area. Processors, memory chips, and special-purpose chips for controlling peripheral devices are all becoming denser. Although Moore's Law only predicts the increase in circuit density, this increase in density reduces the time required for inter-component communications, which also means that chips can process data faster.
Improvements in microchip technology are being matched by improvements in several other technologies found in computer systems. Disk capacity is increasing for a variety of reasons. Improvements in magnetic media (the iron oxide coating on the surface of a disk, flatter platters, etc.) and read/write electronics are increasing the capacity of hard disk drives. Introduction of new optical disk technologies is another source of increased storage capacity for personal computers. Corresponding increases in processor speed and bus bandwidth enable computers to take full advantage of the growth in storage capabilities.
Despite the growth in processing speed and storage capacity, the cost per byte of data processed or stored decreases as lower-capacity memory chips become out-dated. For instance, the cost of a 64MB RAM a couple of years ago is now about the same as the cost of a 128MB RAM.
An interesting counter to improvements in capacity and throughput is known as Parkinson's Law of Data, which says that data expands to fill the space available. In other words, as more memory or disk space becomes available, the demand for more memory or disk space increases accordingly. For example, when computers had only a few kilobytes (KB) of memory, their simple operating systems fit in as little as 4 KB. Today's microcomputers typically have 128 MB or more of memory and, as Parkinson's Law would predict, today's operating systems are much more elaborate and require tens of megabytes of memory for their own use. Similarly, as disk drive capacity increases, people begin using them in new ways. Early computers with 360 KB floppy disks mainly stored small text files. Today, when computers routinely come with multi-gigabyte hard drives, people store musical recordings, short video clips (each file several megabytes in length), and even collections of feature-length films on DVD (typically about 5 gigabytes).
Parkinson's Law drives the entire computing industry, through the knowledge that applications will always keep pace with Moore's Law. As capacity increases, users would ask for even more performance in order to accomplish more ambitious tasks. Thanks to Moore's Law, we can expect to see continued technological improvements to meet consumer demand for greater performance at affordable prices. (But, note that Moore's Law doesn't cover all aspects of computer technology. It says nothing about increases in system reliability, or about the quality of the software programs used in computer systems.)
Without fundamental changes in chip technology, the laws of physics suggest that there are limits to how far we will be able to improve computing performance. For example, the circuit pathways have to be wide enough for electrons to pass through. Another limitation is the wavelength of light. Light is used to etch circuits into silicon, and the width of the pathways etched is related directly to the wavelength of the light used to do the etching—the shorter the wavelength, the narrower the pathway. Ultraviolet light has a shorter wavelength than visible light, and X-rays are shorter still. But, there are technical problems with using wavelengths that short. What happens when the limit is reached? We don't know, but experience suggests that progress will continue, possibly in unanticipated directions. At some point, the cost of producing ultra-dense chips may restrict their use to the most expensive supercomputers.
-
