0 ratings0% found this document useful (0 votes) 48 views24 pagesComputer Architecture Part 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
fp bd a D a O
/ DIGITAL BRIDGE INSTITUTE ds
INTERNATIONAL CENTRE FOR COMMUNICATIONS STUDIES
pha re Ot fos cleft C1
OO gte A Soe WAL, 1 Clements py
Compute os, te Sab td ata Of He re
Hen sli Led,
lars OF A Umnyouse Sy sper
We Vern aoe a Conapiih = ArtlTa ture
: Alban AHte ius pNutl, Sh Used 2,
Mt tye af Coueuteys (Pda. Th}
sa hepert lon GUE Wan per
lewneTn inthe Nety 19KE, fe caper?
DBI website: www.dbieducation.org Necbess a
DIGITAL BRIDGE INSTITUTE
INTERNATIONAL CENTRE FOR COMMUNICATIONS STUDIES
Lan cleo Copa eee wil Hs Werely *
Welwdes te ALU, CU, fasaiters, Memmi lates’
land Instencpion an 0 pte fi aud Sierras’
fhornse LryathnOnas +
Vw tee fatenprigs of Cornputer Aarbutettur
i
oor ee clot Tes date
tino, f Stoo pp —ederne ts as wel a4 Le)
ttton Shmild bo payole. Lat vy Ke [SA
DBI website: www.dbieducation.org NEC
_4 Zp
: DIGITAL BRIDGE INSTITUTE
INTERNATIONAL CENTRE FOR COMMUNICATIONS STUDIES
Wiel press data
af 5 Corpfaers,
cas htrr
Lo 240, Lacha_arel LaSp>-uctts se
On tat, ea. Gon
ipl te ntrrration on SP IE
ISP do uo Sel *yesearth 04 He ole See of basa,
abled Cretprper Mrchite ofurt
mae eeputer Arthirelturs has |
1D pace wate Altowrb tes Chasatperctbice of be
pi ~lenetahinn ond yo alryainisw (Bry auker
Euste sas, Ke Qnerabinn Srrspeny curd eer fr
eee ©y fins, 2 fet
[2xde As Ou 21 b iA area oF
ted Aird MarrperAar 2
YLE OF Compurer BROMITECTIRE
ea : 5 Cathe Che
are
L Srtyle rte MAN rs,
es age 2 |
Redute f ial |
DBI website: www.dbieducation.org NEC |oS
DIGITAL RIDGE INSTITUTE
INTERNATIONAL CENTRE FOR COMMUNICATIONS STUDIES
FAttoRs [Par Apter (irmpureR FRY.
Te to Com Latter dar abfelt Conyube
a Ahas'ta edi Gre >
|) re chet,
ee
fe Ap itakinie _______—"srerer
ow) Vollung trees to discrete Comp —
WAbers ard td naka aged Lard isi bw Teh ni,
eras
Were ye otto curd faster Ly ab
pk elution +
avapld aber + Tn Compute Syspons, Sort
Cre sé pete Capita bt es ay Nate clever —
y fer
P ty ye of Memrers a eed oct
= enifhier Used for Toaaplen néatsacads
Mee Last L pie Fansfoent weal)
od ees a
Aer
¢
Atte, pSlucly pres psi da Mg? iP Vp See 4
wake sented (dtu, pre yelonenpbive Ligh |
oO Ce 7g |
nae 4 Lay Lore) Se tur ty [re fonsy
0 78
Linh Ana Ag faibygrys turd pa
eitanrts tat mabe He rp lev
DBI website: www.dbieducation.org NECae
J DIGITAL BRIDGE INSTITUTE
INTERNATIONAL CENTRE FOR COMMUNICATIONS STUDIES
Tse boar
een auder Sy spenl bysctaly wasetlinent=-
oY ToS a
s fe Wow 2 Late, !
fon pan aa tts wt, 60 alm Ke
Sofbusa re dove-te. lardlumses tv
lee Wee ewe ; “ 2
We Vadim He ino MP cle tiie
hove He nye Hie andar techrr Toray lien
ad Viton, Weide 7 # urrdees B dor
chard pe Mult sy Arniveero ty A Siri
dora
DBI website: www.dbieducation.org NEC
(i en ee} Definition and Introduction to Computer Network
| Computer Network is defined as collection of computers and other devices that use 9 common network
protocol to share resources with cach other over a network medium (wire/eable or wireless), Computer
Network means s
ing of information and services. Computer Networking provides the communication
tools which allow computers to share information andl data
‘one another over a shared
A network is any collection of independent computers that communicate
necwork medium, A computer network isa collection of two or more connected computers. When these
‘computers are joined in a network, people can share files and peripherals such as modems, printer, tape
backup drives, or CD-ROM drives. Whén networks at multiple locations are connected using services
available from phone companies, people ean send e-mail, share links to the global Intemet, oF conduct
Video conferences in realtime with other remote users. As companies rely on applications like electronic
mail and database management for core business operations, computer networking becomes increasingly
‘more important,
Computer Network Classification / Type of Networks
LANs (Local Area Networks)
‘A network is any collection of independent computers that communicate with one another over a shared
nctwork medium. LANS are networks usually confined to a geographic area, such as a single building or a
college campus. LANs ean be small, linking as few as three computers, but often link hundreds of
computers used by thousands of people. The development of standard networking protocols and media has
resulted in worldwide proliferation of LANs throughout business and educational organizations.
LAN configurations consist of:
A file server - stores all of the sofware that conteos the network, as well asthe so-vare that ean
be shared by the computers attached to the network
> A workstation - computers connected tothe file server (Mac or PCs). These are less powerful than
the file server
ables/Wireless - used to connect the network interface cards in each computer or through the
wireless card
Intranet
With the advancements made in browser-based software for the Internet, many private organizations are
implementing intranets. An intranet is a private network utilizing Intemet-type tools, but available only
‘within that organization. For large organizations, an intranet provides an easy access mode to corporate
information for employees.* (Wide Area Networks)
Me area ny
tor
a "Sing combines multiple LANs that are geouraphiealy separate, This is
® the diferent LANs using services suchas dedicated leased phone lines,
ccomplished by
dial-up phone lines,
Satellit oe :
sks, and data packet carer services. Wide aon netwrking can be
as simple as a modem and
rey
OIE aceess server for employees to dial into,
datete ‘r it can be as complex as hundreds of branch offices
® linked using special routing protools and filers to minimize the expense of sending data sent
over vast distances,
Internet
‘The Intemet is a system of linked networks that are worlwide in scope and facilitate data communication
Services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups.
‘With the meteoric rise in demand for connect
ty, the Internet has become a communications highway for
‘millions of users. The Intemet was intially restricted to military and academic institutions, but now itis a
full-fledged conduit for any and all forms of information and commerce. Internet websites now provide
Personal, educational, political and economic resources to every corner of the planet
MANs (Metropolitan area Networks)
‘This is refers to a network of computers with in a City. Metropolitan Area Network (MAN) covers larger
geographic areas, such as cities. Often used by local libraries and government agencies often to comect 10
citizens and private industries,
YPN (Virtual Private Network)
VPN uses a technique known as tunnelling to transfer data securely on the Internet to a remote access
server on your workplace network. Using a VPN helps you save moncy by using the public Internet
instead of making long-distance phone calls to connect securely with your private network. There are two
‘ways to create a VPN connection, by dialling an Internet service provider (ISP), or connecting directly to
Internet,
Network Topology
A network consists of multiple computers connected using some type of interface, each having one
fr more interface devices such as a Network Interface Card (NIC) and/or a serial deviee for PPP.
networking. Each computer is supported by network software that provides the server or client
functionality. The hardware used to transmit data across the network is called the media,
‘A topology is the characteristic of a communication network that is concern both with the physical
configuration of the cabling that is used to inter connect communicating system and theway
in which system yi
ie nee i ‘ew the structure of the network, Topology isthe therefore physical or
nt of computers. Ino
i ‘Omputer networking, “opology refers to the layout of
connected devices, This : 1, lopology ,
Tis handout invoices the tndard topologies of networking
Factors to consider when selecting a topology
> Cost ~ whatever :
atever tansmision medium is casen fora Loeal Area Network has tobe physically
installed in the building, this maybe a lengthy process including the installation cables and |
Faceways. For a Network to be cost effective one would strive to minimize installation cost. This
may be achieved by using the proper hardware linking the cables, good modems, cost effective
computers to reduced cost
> Flexibility one of the main benefit of a local Area Network is the ability to have the das
Processing and peripheral nodes distributed around a given area. This means thatthe computing
power and equipment can be located-close to the ultimate users. Because ‘the arrangements:
y should allow for
fami, iateral wall et inthe offices is ofen subst to change The topology should al
nd adding new nodes
easy reconstruction ofthe network which involves moving existing nodes an ee
cation ofthe fault ©
> Reliability ~The topology ehasen for the network ean help by allowing the Ioeaton of ts
be detected and to provide some means of isolating the faults
‘Topology in Network Design
Think of a topology as a network's virtual shape or structure. ‘This sha
1e network. For example, the computers
spe does not necessarily
correspond to the actual physical layout ofthe devices on th
‘ona home LAN may be arranged ina crete ina family room, but it would be highly unlikely t0
ssvork topologies are categorized into the following basic types |
finda rng topology there.
> Bus
> Ring
> Star
> Tree
>» Mesh
Bs Topology
Bus networks (not to be confused with the system bus of a computer) use a common backbone to
connect all devices. A single cable, the backbone functions as a shared communication medium,Dut only the i i
ly the intended recipient actully accepts nd processes the message.
Ethemet bus
t bus topologies are relatively cay to install nd don require much cabling compared 10
the alternatives. 1OBase-2 ("ThinNet
and 10Base-
("ThickNet") both were popular Ethemet
cabling options many years ago for bus topologies. However, bus networks work best with @
"imited mumber of devices. If more than a few dozen computers are added to a network bus
Performance problems will ikly result. In addition, if the backbone cable fils, the entre network
effectively becomes unusable
Advantages of Bus topology
Cheap because ofits simplicity
* Requires a short cable length
°* Easy to expand the network
° Simple to setup compared to Star and Ring topology
°* There is no chances of data collision since one computer transmit ata time
Locating cable fault in a bus topology is relatively easy
** Bus topology is ideal for one to many data transmission
° Signal on the cable are bidirectional hence reaches all the nodes
Disadvantages of Bus topology
+ Fault diagnosis is difficult in a bus topology ~ detection of fault may have to be performed
from any point inthe network
difficult
+ Fault isok
fault inthe node is detected the node can simply be removed
but if the fault is in network medium itself and entire segment of the Bus must be
disconnected to isolate the fault
Repeater confi
ration ~ When a Bus type_ network has its backbone intended for using a
repeater, configuration maybe necessary thus may involve tailoring cable length adjusting
terminator
+ Computer nodes must be intelligence — each node on the network is drestly connected to
the central Bus, This means that each node must have method of deciding and detecting its
own dataRing Topology :
Im a ring netw
at York, every device has exacly two neighbors for communication pupost. All
ge travel th i
tases vough a ring inthe same direction (ether “clockwise” or “counterelckwise"). A
a Any cable or device breaks the loop and can take down the entire network. Ring
opologi :
Pologies ae found in some office buildings or school campuses.
Advantages of ring Topology
* The ability to achieve transmission rates of the order of 10 million bits per second
* Prov
+ No central server which reduces the cost of establishing the ring topology
of local communication via single channel
Disadvantages
+ Failure of one node result into entire network failure
4 Detection of fault is very dint in ring topology
+ Isolation of fault is not easy inthis topology
Star Topology
Many home networks use the star topology. A star network features @ central connection point
called a "bub" that may be a hub, suiteh oF router. Devices typically conncet to the hub with
Unshielded Twisted Pair (UTP) Ethemet. This topology consist of @ central nodes to which all
ther nodes are connected, star topology is used in most existing information network involvin
data processing and voice communication. Star topology is also known as Radial topology and
allows sufficient connection point to be provided for one sub —area, while providing flexibility in
their allocation within that area
Compared to the bus topology, a star network generally requires more cable, but a failure in any
star network cable will only take down one computer's network access and not the entire LAN. (If
the hub fails, however, the entire network also fails.)Advantages of
*Dipocn ae
Piha = of problem is easy
* Failure of one eG a a
: mn does not affect the entre network
Usesasingle access protocols”
* Provide ease of service
* Is very fast
Disadvantages of star topotogy
* Theres central node dependency
* Becomes expensive when purchasing the nodes
* Always requires very long cable length when connecting many nodes
Tree Topology
‘Tree topologies integrate multiple star topologies together onto a bus, In its simplest form, only
hub devices connect directly to the tree bus, and each hub functions asthe "root" of a tre of
devices, This bus/tar hybrid approach supports future expandability of the network mach better
than a bus (limited in the number of devices due to the broadeast trafic it generates) oF a star
(limited by the number of hub connection points) alone,
' 3
Mesh Topology
Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages
Sent on a mesh network can take any of several possible paths from source to destination. (Recall
that even in a ring, although two cable paths exist, messages can only travel in one direction.)
‘Some WANS, most notably the Internet, employ mesh routing.
‘A mesh network in which every device connects to every other is called « full mesh. As shown in
the illustration below, partial mesh networks also exist in which some devices connect only
indires
y to othersNetwork Cabling
Networking Cables
a ' Cables ar used to connect one network device to other orto cect two or more
misters to share printer, scanner ete. Though
: : wireless technology is now taken the place of
cabling because iti easy and fast in connection
. ‘but most computer networks today still uilize
‘ables to transfer signals from one point to another.
Cable isthe medium though which information usally moves fom one network device 19
‘another, There are several types of cable which are commonly used with LANs. In some cases, a
network will uilze only one type of cable, other networks will use a variety of cable types. The
‘Pe of cable chosen for a network is related to the network's topology, protocol, and size
Understanding the characteristics of different types ofcable and how they relate to other aspects of
‘network is necessary for the development ofa successful network
‘Type of Networks cables
Y Unshielded Twisted Pair (UTP) Cable
¥ Shielded Twisted Pair (STP) Cable
¥ Coaxial Cable
j ¥ Fiber Optic Cable
Unshielded T
fed Pair (UTP) Cable
‘Twisted pair cabling comes in two varieties: shielded and unshielded. Unshiclded twisted pair
(UTP) is the most popular and is generally the best option for school networks. UTP is the most
popular form of cables in the network and the cheapest form that you can go with. The UTP has
four pars of wires and all inside plastic sheathing. The biggest reason that we call it Twisted Pair is
(o protect the wires from interference from themselves. Each wire is only protected with a thin
plastic sheath.
<<
Unshielded twisted pair
—
PdThe quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable
has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per
inch to help eliminate interference fiom adjacent pars and other electrical devices. The tighter the
‘twisting, the higher the supported transmission rate and the greater the cost per foot. ‘The ELA/TIA
(Electronic Industry Association/Telecommunication Industry Association) has established
standards of UTP and rated six categories of wire (additional categories are emerging).
Categories of Unshielded Twisted Pair
Use
‘Voiee Only (Telephone Wire)
LocalTalk & Telephone (Rare
3 16 Mops 1OBaseT Ethernet
4 20 Mbps [Token Ring Rarely used)
100BaseT Ethernet
100 Mbps (2 pat)
1000 Mbps (4 pair) Gigabit Ethemet
Gigabit Ethemet
Gigabit Ethernet
Unshielded Twisted Pair Connector
‘The standard connector for unshielded twisted pair cabling is an RJ-45 connector, This is a plastic
connector that looks like a large telephone-style connector as shown below. A slot allows the RU-45
to be inserted only one way. RJ stands for Registered Jack, implying that the connector follows aLL
st
vat borowed fom te lepton indus. This sun desintes which wi goes with
cach pin inside the connector.
AS
RUS connector
Shielded Twisted Pair (STP) Cable -
Although UTP cable isthe least expensive cable, it may be susceptible to radio and electrical
fiequency interference (it should not be too close to electric motors, Muorescent ight, et.) Ifyou
‘must plae cable in environments with lots of potential interference, o if you must place able in
cxttemely sensitive environments that may be susceptible to the electrical curent in the UTP,
shielded twistd pair may be the solution, Shielded cables can also help to extend the maximum,
stance of the cables. The diagram is shown below
Shielded twisted pair (STP)
STP is more common in high-speed networks. The bigest difference you will se in the UTP
STP is thatthe STP vse's metallic shied wrapping to protect the wire fom interference.
Shielded twisted pir cable viable in thee diferent coniguations
Each pir of wies is individually shield wit ol.
“Theres fil or braid shel inside the jacket covering all wires (asa group.
“Thee is a shield around each individ pir, 8 wll as around the entire group of wires (refered
to. double shield twisted pai),
Coaxial Cable
baa a a a ala
oaxial cabli
cabling has a single copper conductor at its center. plastic layer provides insulation
‘between the center conductor and a braided metal shield, The meal shield helps to block any
outside interference that may affect signal transmission.
A=
Coaxial cable
[Although couse cabling is difcal 1 install, itis highly resistant to signal interference, In
dion, ican suppor greater cable lengths between netvork devies than twisted pair cable. The
‘wo types of coaxial
‘Thin coaxial cable is also refered to
asthinnet,10Base2 refers to the specification for thin coaxial
cable carrying Ethemet
signals, The 2 refs tothe pprovnte maximum segment nth Kens
22090 eter natu fact the maximum segment eng is 185 meters. Thi
popular in :
in coanal cable bas been
hi enw cable is so refered to as thisket, 1OBae5 refer 10 the spcifesons for thick
coaxial eable crying Ethemet signals The 5 refers tothe maximum segment length being 500
Trt, Thick coal cable at ane pote lsc cover tt eps Keep mos away
From the ener ond. Tis aks he cou a rest eoiee when mins longs Fengths in
linear bas network,
Conval Cable Connectors
‘The mest common typeof eometor wed with coal cables isthe ‘Bayone-Neill-Coneelman
(BNC) camecor as shown below, Dien pes of apes are aa fr BNC connectors
iachtng oT cones, bare constr, and termina, Comes on he cable ate the weakest
pons in any newer. Top aid poems wih your nebo, hays ss the BNC connectors
that canbe crimp easily
BNC connector
Fiber Optic CableFiber optic cabling consists of a center gla core surounded by several layers of protective
materials as shown below, It ansmit ight rather than electronic signals eliminating the problem
of electrical interference, This makes it del for certain environments that contin large amount
of electrical interference, Ithas also made tthe standard for connecting networks between
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and
twisted pair Italo has the capability to carry information at vastly greater speeds. This eapacity
twoaders communication possibilities to include services such as video conferencing. and
interactive services. The cost of fiberoptic eabing is comparable to copper cabling; however, itis
‘very expensive than othe network cables
“The center core of fiber cables is made ftom glass or plastic fibers. plastic coating then cushions
the fiber center, and kevlar fibers help to stengen the cables and prevent breakage, The over
insulting jacket made of teflon or PVC.
———=—
Fiber optic eable
“There are two common types of fiber cables ~ single mode and multimode, Multimode cable has &
target diameter; however, oth cables provide high bandwith at high speeds. Single mode can
‘provide more distance, but itis more expensive.
Ethernet Cable Summary
Spcitat E ante Type
1ovaset | ‘Unsilded Twisted Pair
10Based_ ) Thin Coaxial
sooner i Unshildd Twisted Par |1WOBaseFX | Fiber Optic
|
100BaseBX | Single mode Fiber
|
— =
Multimode Fiber
\
100BaseSX |
1OODBaseT Unshielded Twisted Pair
BAF. | Fier Optic
1000BaseBX. | ‘Single mode Fiber
Me
fae i
ooupasesX Multimode Fiber
Some Guidelines on Installing Cable
‘When running cable itis best follow few simple rales
Always we more cable shan you ned, Leave plenty of slack.
s
«Tet evry ptt of ntwor as you instal Een if is brand mew, it may have problems tht
sl be clo islat ater
‘+ sayaveat’3 fc avay fom Muressent gt boxes and other sours of eletia merece
«itis cess oun cable across the oor, cover the cble with cable poeta
+ Label hens each abl
Use cable tes (not tap) to kp cables in he same losation ogee,Wireless LANs
“More and more networks are operating without cables, inthe wireless mode, Wireless LANS use
high fequeney radio signals, intared light beams, or lasers to communicate between the
‘workstations andthe file server r hubs. Each workstation and fle server ona wires network hs
some sort of transceverfantenna to send and receive the data. Informations
transceivers as if they were physically connected. For longer distance,
can lso take plae through celular telephone technology, microwave
s relayed between
less communications
transmission o by satellite
‘Wireless networks ae great for allowing laptop computers or remote computes fo cannes: © the
LAN, Wireless networks are also beneficial in older buildings where ft may Be Aitfielt of
possible o instal ables.
The two most common types of ifared communications use in schools re Fine-of-sight and
catered brondnst.Lin-oFsight commonicatin means that thee mast BE a? unblocked direst
Tin beeen the workstation andthe wansceive. Ia psson walks within Uh line-of-sight while
‘here is a wansmsion the infomation would nl 1 be set again. This Kind of obstruction can
stow down the wireless network, catered infrared communication is & Deoadeast of infrared
rsissions ent out in mts dvesons hat bounces of walls an ings unlit eventually
tits the resver. Networking commanicaons with laser ae virtually he same Tine-of sight
infrared networks.
‘Wireless standards and speeds
The Wit Alliance is 0 lobel,non-poftenanzaton that Helps to ensure sanders and
iteroperilty for wiles networks, and wirless networks are often refered © $8 WiFi
(Wiles Fein). The ovina WT stundard (EEE 87211) was aloped in 1997, Sines thea
‘many variations have emerged (
fand will continue to emerge). Wi-Fi networks use the Ethernet
proto.
= ee
Max Speed ‘Typical Range
1s0 feet
soztia |” S4Mbps |q 2 | aE EE
|g, Pad Compa fates se /D
re 5 Component Model
computer ytem can be vied no S com
esa operate entree
2 Safteare
\ 3. Data
4 Procedarss
5. Peromel
Im studying Computer Systems’ Architecture, ony the first 3 of these are of direct terest.
Tanivare :
+ Proce
aka, CPU /CenalPosesing Unit
° Cops
ALU Arteta Un arithmei& Bolen ogc oso
2 CU/Conol Ute stein proses sequencing an cot
3. Inerie Unie tal bus ste
Atte View
1 Exec Un
2 Cana Unit suena seeing an EU sbi
5 Rogol qk sees an womalnen” an "Ms
4 neal Bus neice
istrcton circuits (including ALU)
+ Input & Output Deviees oe
ee erat coal or electromnechanical 10 devices (cg Keyboards, printers, video monitor will nt
te considered as significant in our study of Computer Systems’ Architectures
+ Input & Ovtpot Interface
Extemal Bus Structure:
Colleton of "wires" that carries power and signals berween different computer components
Chane: é
Sepa, special purpose 10 processor connecting an 10 device to the CPU (or "ain memory"); my
perform signal conversion, iming conto, buffering te
(Communications
Direct/Indirect connection 1 ether computer systems
how communication is take place
based on pre-greed upon “protocol” (shared rules for
+ Storage /Memory
‘> (Main) Memory’ / Primary Storage
byte
typically 8 "bis" character
‘word
opivaly 32 "bits but many different sizes are ound on different computer systems) - basic numeric unit
basi uit of data transfer
bits: byte
Kbytes: 2" bytes (1024)
Mbytes: 2” bytes (1,048,576)
Gbytes: 2" bytes (1 300,109,824)
sage:
RAMs. ROM
ROM is non-modifiable (by normal computer operation)
© (Secondary) Storape
+ long-term (inactive) data and program storage
+ examples: disk, tape, CD.
+ nits: typically stored in "blocks" of multiple wordsbytes (physical records)
1of6REGISTERS ‘Man uenony SECONDARY
ea;9——_— anmemory —_rorace
fry Yat paises
DURATION ee
Frowsnbowntmecrlatia i it WOT
ee ae dala Mainain
Size — —_
Swern Pipl od wot
“[aitesoay Fo
A microcomputer has thre
The CPU cro a bas lcs: a cenal pressing wit (CPU), a mary en, anda intnpt i
es all the instructions and performs arithmetic and lagi operations on data. The CPU of the
Tyerocompute i called the “microprocessr.” The miaroprocessor i typically a single VLSI (Very Large-Scale
Integration chip that contains all the registers, conto nit, and arith! ogc sites of te mierocomputer.
‘A tmemory unit stores both data and insrctions. The memory setion typically contains ROM and RAM chips. The
ROM can only be read and is nonvoati, that i, it ans its conens when the power i tuned off. ROM is
‘ypically used to store instructions and data that donot change. For example, it might store a table of codes for
outputting data toa display external to the microcomputer fr turning ona digit om 0 109.
One can read from and write into a RAM. The RAM is volatile; that sit doesnot retin its contents when the
‘ower is tured off. A RAM is ued fo store programs and data that are temporary and might change daring the
sourse of exccuting a program. An VO (InpudOutput) unit transfers data between the microcomputer andthe
‘external deviees via VO pots (registers). The transfer involves data stats, and control signals
‘Address Bus
Control Bus
Figure 1 Von Neumann model of computer architecture
‘Computer system is divided into three subunits: CPU, Memory, and InpuvOutput (V0). This refinement ofthe von
Neumann model combines the ALU and the control unit into one Functional unit the CPU. The input and output
Units are also combined into a single VO unit Most imporant tothe system bus model, the communications among,
‘the components are by means of a shared pathway calle the system bus, which is made up ofthe address bus data
2of6
—EEEE——————————— Ee |wy
@
a
4
t
3s (which caries the information being transmitted), the control b
ve mitted), the control bus (which identifies where the information is
se sad he hic esr tsps oho he ifomation i bing et, and in wht manner). Ther i
falso a power bus for electrical power to the components, which isnot shown, but its presence is undet me
conurohtecies na) shone spec [Of one neRgwel sabe
Memory
The memory section usually consists of a mixture of RAM (Random Access M
sts of @ mixture of RAM (Random Access Memory) and ROM (Read Only
Memory). It may also have magnetic floppy disks, magnetic hard disks, or optical disks (CDs, DVDs). Memory has
two purposes. The frst purpose is to store the binary codes forthe Sequences of instructions you want the computer
to camry out. When you write a computer program, what you are rally doing is writing a sequential list of
instructions for the computer. The second purpose of the memory is to store the binary-coded data with which the
computer is going to be working. This data might be the inventory records ofa supermarket, for example:
InpulOutpot
‘The inpu/output or UO section allows the computer to take in data fc
‘outside world. Peripherals such as keyboards, video display terminals, printer
VO section. These allow the user and the eomputer to communicate with each other. The actual physical devices
used 10 interface the computer buses to external systems are ofien called ports. Ports in computer function Jus as
shipping port do for a count. An input port allows data from a keyboard, an A/D converte, or some olber source
be read into the computer under control ofthe CPU. An output port is used to send data fom the compures 9 wane
peripheral, such as a video display terminal, a printer, ora D/A converter. Physically, the simplest type of input or
‘output ports just a set of parallel D flip-flops.
the outside world or send data to the
rs, and modems are connected t0 the
Data Bus
“Tae data bus consists of 8,16, or 32 parallel signal lines. As indicated by the double-ended arrows onthe dat bos
Tne in Figur tho data us lines are biicectonl This means thatthe CPU can ead data in from memory ov Fort
art on thse Tins ot ean send ds om t memory er 0a port on these hes. Many deviees mn 2 9317) Wit
Hebe thelr opus connected to the data bus, but only one device a a ime wil have its outputs enabled. Any vies
rane om hs dat bus must ave three-state outputs so tha is outpus can be dssbled when it snot being used
to put data on the bus.
Address Bus
eersrece bus consists of 16, 20,24, or 32 parallel signal lines. On thes lies the CPU sends ou the adress of
aie ncmy locaton that it be written to or ead fom. The nmber of memory locations thatthe CPU can adress
ee cemired by the numberof adress Hines the CPU has Nae ines, the ican dretly adress 2* memory
Iecatgns For ramp, 2 CPU with 16 address lines can address 2 or 65.836 memory locations, 9 CPU with 20
aeons con adress 2 or 1,048,576 locations, and 2 CPU wih 24 address lines can address 2" or 16,777,216
Tbcuigns, When the CDU reads data from or writes data to «port it sends the pot address out on the address bus
Control Bus
Foe contol bus consists of to 10 parallel signal lines. The CPU sends out signals on the contol bus to enable the
anputs of addressed memory devices or pot devies. Typical contro bus signals are Memory Read, Memory Write
TO" Read, and VO Writ. To read a byte of data ffom a memory locaton, for example, the CPU sends out the
tremory adress of the desired byte onthe address bus nd then sends out a Memory Read signal onthe contol bus.
‘The Memory Read signal enable the addressed memory device to output a data word onto the data bus, The data
\word from memory travels along the dat bus tothe CPU,
Ras
‘alu
‘Cael Une
Figure 2:CPU Components
Design Levels
‘Three design levels ean be defined for digital systems: systems level, logic level, and device level
‘Syutems level is the typeof design in which CPU, memory, and VO chips are interfaced o build a computer.
“Logic level, on the other hand, is the design techaique in which chips containing logic gates such as AND, OR, and
NOT are used to design a digital component such as the ALU.
Finally, device level utilizes transistors to design logic gatesSystem Software
© Operating System
©. Uiiltes (may be built nx
+ Applicaton Software
© Application ols: word processors,
80s, spreadsheet managers,
o Caro pplcaions: hae systems ielog mavgcment
+ Mlgh-tevel v5, Machine-level Software .
© High-level: "Source™ insruction ina c
ion in a language suchas COBOL
© Mchnee:tnay pate wih no imme hana nearing
© Highevel instructions must be convened into Machine-evel instruction before they can be
proces hy a "pocesr this anvnionsacnomiy graces
+ Instruction Classes e pe oa
© data transfer (copying data)
© data transform (modifying data)
© instruction flow control (changing the default sequence)
ease ery amare cnmreree eee Sr acre ee cine eae
Data
One ofthe major requirements of any computer system isthe ability to represent and manipulate values ("data").
In general, digital computers represent values as ptterns of “ofl” and Yon” signals. Fach value requires a different
pater (or, atleast a pattem which is cfferent from any other valve of the same type). Different types of values
generally are represented using differen “encoding schemes". An “encoding ehicme” specifies how many “of” and
“on” signals are required for each valu, and provides a nique pattern of signals foreach possible value
1005 or extemal programs)
Data vs. Information
‘Two tems common in any discussion of computer systems are "data" and “information”. The difference in meaning
between these two terms is based on the concept that "information" is "data" which has “meaning” o someone (oF
Somthing) ouside ofthe computer system,
"Information" is "data" which has meaning, The st common task of a computer system (espeially when the input
source and the output destination are the same) is to transform data into information, Infact, this is sometimes used
asthe basis fr altemative definitions of a computer syst.
1. The 1PO(S) Model
X computer system ean be thought of a clletin of conponsns which tage are capable of 3 operations
Input Processing and Outpt ATouth operation, Stag, alo requ fr til computer s)tems
Nott the PO), apa Process Out Storage) mods! s aplastic
1th clleton of eupment hit make pa compar sem
2. the actos nt a conputer en cpl of ertnning
i Inpa
‘A comput stom must inchde a method fr aceping "dats nd ncn fom ouside the system,
Power or ena sores reeds eae operation of he computer stom ar not aps
Procesing:
A computer system must include th abiliy to change of “vans
“tansemation" typical nde (be nl Hite 1)
electing sitet ofthe data
1 couting and accumulating tots of selected data vals
4 rearnging the sequence or Tomato ta
utp
‘computer ystem must nlite ability to end proses eo ose thet in a fo tht canbe used
by the ousie word This "ose word” might be te hun “user ofthe omputer sem, but alemainey
could be etic or mechanical onl for ora eset, othe input or some oer tem.
Storage:
‘We wuld not nol consider a alton to be a computer ts ns tinted some fom of manera
previo input or pocessed das For expe, system composed of an ket! power sappy, an ovo wich, x
Tight bl, and aproprte wing connet he ater ee components would not normally be considered to Bea
computer tem fought conan PO clements of tsi om). Replsing te ono switch wih a "ogae
baton’, which woud reves the cure onofT "ae ofthe igh, woul ie us Something eiser Wa empuer
syste,
ata which has been input. These
4of6i —_
ersom between Dilfereat Numb
er Systems
‘mumber systems eee
{Autough We are accustonted to our decimal numb
Co as the Egyptian number system nee nee tem, which i postions, ther ancient sunker stems,
eres) 't positional, but rather used many addtional symbols to represent
Ina positional number system, the value of
ftir ig ei pe at
The values of each position corre
correspond to powers of the base ofthe number system. So for our decimal number
spe, which ss bse 10 te place ales Comspond spony af ° or ur deviant
1000 100 ot
10312 oto
Converting from other number bases to decimal
Other number systems use different bases. The binary number system uses base 2, so the place values ofthe digits
‘of binary number eorespond to powers of 2. For example, the value of te binary number 10011 is determined by
‘computing the place value ofeach of the digits of the number:
10 0 1 tthe binary number
me
2M 23 292 212M place values
So the binary number 10011 represents the vale
Ge 25 Gl eae, ee, (1 ee
fy ty fof fy 7
D mame ao ks as a
=
“The same principle applies fo any number base. For example, the mumber 2132 base 5 corresponds fo
2 1 32 rumberin base
S92 SM 50 place values
So the value ofthe number is
@tss + C492 + GIS) + ATS)
Qe) + 2) + GT + AD
2000+ OS +15 “2
~ 2
Converting from decimal other number bases
In onder to convert a decimal number ino its representation in different number base, we have to be able to
express the number in tenns of powers ofthe her base. For example, if we wish to convert the decimal number
100 to base 4, we must figure out how to express 100 as the sum of powers of
100 are + 216) + ana + oD
ea) + @t4ay + ata + (oro)
5of6
—— ee‘Then we use the coefficients ofthe powers of 4 to form the number as represented in base 4
wo = 1210 tase 4
One way todo this isto repeatedly divide the decimal number by the bas in which it sto be converted, until the
quotient becomes zero, As the numbers divided, the remainders - in reverse onder - form the digits of the umber in
the other base,
Example: Convert the decimal number 82 o base 6:
82/6 = 13. remainder 4
1316 = 2 remainder
U6 = 0 reminder?
‘The answers formed by taking the remainders in reverse order: 2 14 base 6
Number Svstems
‘A compute, lke al digital machines, izes two states 1 rereset information. These two sates are given the
symbols O and I, I is important to remember that these 0' and. 1 are symbols forthe to states and have no
inherent numerical meanings of their ova. These two digits ae called binary digits (bis) and can be used to
represent numbers of any magnitude. The microcomputer carries out all the arithmetic and logic operations
internally using binary numbers. Because binary numbers are long, a more compact form wsing some other number
system is preferable to represent them. The computer user fin it convenient to work with this compact form,
Hence, its important to understand the various number systems sed with computers. These ae described in the
{allowing sections
In general a umber 1V canbe represented inthe falling form
Ned XDP +d, RDP dy XO dX 1 #1. XB
— 1
where b isthe base or radix ofthe number system, tho d's are the digs ofthe number system, pis the numberof
integer digits, andg isthe number of factional digits, Ncan also be writen sa sting of digits whose integer and
Fractional portions are separated by the radix or decimal point (In this fora, the number Vis represented as
dndpamhdy. Ly
Ia number has no factional portion, (8.4 = 0 in the Form of Equation |), then the number i called an integer
number or an integer. Conversely, ifthe number has no integer potion (.g.p= 0 inthe farm of Equation 2), the
number is called a fractional number ora faction, If both p andy are not zero, hen the numb sealed a mined
‘number.
Decimal Number System
Inthe decimal mumber system (bse la), which is most familia ous the integer number 125, an be expressed as
Msgs TRIG IOES ETE pee eng
In this equation, the ll shand side corresponds tothe frm given by Equation 2. The right-hand side of Equation 3 is
represented by the form of equation I, where ®* Wade" adi 2b Syd s=.aed panda
Now, consider he fractional decimal number 0.532This number canbe expressed as
snag $3 +3 x 10442 0
inary Number System
Jn tems of Equation 1, the binary number system has «base or ras of 2 and has two allowable digits, O and
From Equition 2.1, «bit binary number 14 10, can bo interpreted as
“This conversion from binary o decimal canbe cbse! by inspecting the binary number as follows