Lecture 24: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 24 Review James Harland

Slides:



Advertisements
Similar presentations
Chapter 2: Data Manipulation
Advertisements

Lecture 9: Data Storage Devices Intro to IT COSC1078 Introduction to Information Technology Lecture 9 Data Storage Devices James Harland
Lecture 20: Internet Intro to IT COSC1078 Introduction to Information Technology Lecture 20 Internet James Harland
Lecture 16: Processes Intro to IT COSC1078 Introduction to Information Technology Lecture 16 Processes James Harland
James Harland COSC1078 Introduction to Information Technology Lecture 12 System Fundamentals James Harland
Lecture 12: Machine Processing Intro to IT COSC1078 Introduction to Information Technology Lecture 12 Machine Processing James Harland
(4.4) Internet Protocols Layered approach to Internet Software 1.
Lecture 19: Internet Intro to IT COSC1078 Introduction to Information Technology Lecture 19 Internet James Harland
Lecture 23: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 23 Future of IT James Harland
CS 300 – Lecture 3 Intro to Computer Architecture / Assembly Language Sequential Circuits.
Lecture 10: System Fundamentals Intro to IT COSC1078 Introduction to Information Technology Lecture 10 System Fundamentals James Harland
Lecture 14: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 14 Revision and Review James Harland
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland
Storage of Bits Computers represent information as patterns of bits
Lecture 16: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 16 Operating Systems James Harland
Course Review i206 Fall 2010 John Chuang. 2 Outline  Test 3 topics  Course review  Course evaluation.
Lecture 14: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 15 Operating Systems James Harland
Lecture 9: System Fundamentals Intro to IT COSC1078 Introduction to Information Technology Lecture 9 System Fundamentals James Harland
Introduction to computer: executes instructions. Overview Topics discussed in this webnote: –Structure and operation of the CPU –Program flow –Types of.
Data Communications and Networks
Lecture 14: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 14 Operating Systems James Harland
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland
Lecture 24: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 24 Future of IT James Harland
1 Catalog of useful (structural) modules and architectures In this course we will be working mostly at the BEHAVIORAL and STRUCTURAL levels. We will rely.
Presentation on Osi & TCP/IP MODEL
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Characteristics of Communication Systems
Lecture 3. Diff b/w RAM and Registers Registers are used to hold data immediately applicable to the operation at hand Registers are used to hold data.
Lecture 11: Machine Processing Intro to IT COSC1078 Introduction to Information Technology Lecture 11 Machine Processing James Harland
Lecture 17: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 17 Memory and Deadlock James Harland
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Computer Networks (CS 132/EECS148) General Networking Example Karim El Defrawy Donald Bren School of Information and Computer Science University of California.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Lecture 10: Binary Representation Intro to IT COSC1078 Introduction to Information Technology Lecture 10 Binary Representation James Harland
Computer Systems Organization CS 1428 Foundations of Computer Science.
Introduction to Computing Systems from bits & gates to C & beyond The Von Neumann Model Basic components Instruction processing.
CPU Design. Introduction – The CPU must perform three main tasks: Communication with memory – Fetching Instructions – Fetching and storing data Interpretation.
Lecture 18: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 18 Operating Systems James Harland
REGISTER TRANSFER & MICROOPERATIONS By Sohaib. Digital System Overview  Each module is built from digital components  Registers  Decoders  Arithmetic.
Computer Organization - 1. INPUT PROCESS OUTPUT List different input devices Compare the use of voice recognition as opposed to the entry of data via.
Revision Lecture Intro to IT COSC1078 Introduction to Information Technology Extra Lecture Review James Harland
Lecture 23: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 23 Future of IT James Harland
Data Manipulation CSC 2001 TTU CSC 2001 TTU. Now what?  Program can be represented (and stored) like data. So, now what happens?  The program needs.
Lecture 11: System Fundamentals Intro to IT COSC1078 Introduction to Information Technology Lecture 11 System Fundamentals James Harland
Lecture 10: Binary Representation Intro to IT COSC1078 Introduction to Information Technology Lecture 10 Binary Representation James Harland
Network and the internet Part eight Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
Computer Organization. The digital computer is a digital system that performs various computational tasks Digital computer use binary number system which.
Lecture 16: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 16 Operating Systems James Harland
Logic Design / Processor and Control Units Tony Diep.
Computer operation is of how the different parts of a computer system work together to perform a task.
Simple ALU How to perform this C language integer operation in the computer C=A+B; ? The arithmetic/logic unit (ALU) of a processor performs integer arithmetic.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
1 3 Computing System Fundamentals 3.2 Computer Architecture.
Digital Computer Concept and Practice Copyright ©2012 by Jaejin Lee Control Unit.
Logic Gates Dr.Ahmed Bayoumi Dr.Shady Elmashad. Objectives  Identify the basic gates and describe the behavior of each  Combine basic gates into circuits.
1 Chapter 1 Basic Structures Of Computers. Computer : Introduction A computer is an electronic machine,devised for performing calculations and controlling.
© 2015 Pearson Education Limited 2015 Quiz in last 15 minutes Midterm 1 is next Sunday Assignment 1 due today at 4pm Assignment 2 will be up today; due.
The Transport Layer Implementation Services Functions Protocols
Dr.Ahmed Bayoumi Dr.Shady Elmashad
Computer Organisation
Edexcel GCSE Computer Science Topic 15 - The Processor (CPU)
COSC 2021: Computer Organization Instructor: Dr. Amir Asif
CSE 370 – Winter Sequential Logic-2 - 1
Lecture 17 Logistics Last lecture Today HW5 due on Wednesday
COMS 361 Computer Organization
Lecture 17 Logistics Last lecture Today HW5 due on Wednesday
16EC Computer networks unit II Mr.M.Jagadesh
Presentation transcript:

Lecture 24: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 24 Review James Harland

Lecture 24: ReviewIntro to IT Introduction to IT 1-4 Introduction, Images, Audio, Video 5-6 Computer Fundamentals Assignment 1, WebLearn Test 1 7 Review 8 Operating Systems WebLearn Test 2 9 Operating Systems Assignment 2 10 Internet 11 Internet Security WebLearn Test 3 12 Review Assignment 3 Peer and Self Assessment

Lecture 24: ReviewIntro to IT Overview  Questions?  Mock Exam  Requested topics  Questions?

Lecture 24: ReviewIntro to IT Intro to IT Schedule WeekLecture 1Lecture 2 12Future of IT Review by request Various topics requested 13Mock Exam Wednesday 2 nd June

Lecture 24: ReviewIntro to IT Requests Received  Logic gates  Hexadecimal to/from binary conversions  Process vs. program  Floating point  Network layers  Encryption  Internet architecture  Machine cycle

Lecture 24: ReviewIntro to IT Mock Exam  on Wednesday 2 rd June in  Bring your own paper, pens, etc.  Calculators and translation dictionaries allowed  Answers will be available from me when you leave Schedule:  Access to room  Reading time commences  Writing time commences  1.00 Exam concludes

Lecture 24: ReviewIntro to IT Hexadecimal … AF136DF738CA BCFE5C36A63B…

Lecture24: ReviewIntro to IT Hexadecimal  Notation for binary numbers  More compact than  NOT decimal (0-9)  Base 16: = 1 x x C D A 1010 E B 1011 F 1111

Lecture 24: ReviewIntro to IT Excess Notation Bit patternValue  A different encoding of the numbers  “naive” bit pattern encodes 4 more than actual value  100 (looks like 4) encodes 0  101 (looks like 5) encodes 1  110 (looks like 6) encodes 2

Lecture 24: ReviewIntro to IT Floating Point sign bit Mantissa exponent 1 bit for sign 3 bits for exponent 4 bits for mantissa

Lecture 24: ReviewIntro to IT Floating Point : +ve shifted 111 (+3) places = : –ve shifted 001 (-3) places =  Mantissa: digit sequence (1 st digit always 1)  Exponent: where to put the.  This is generally given in ‘excess’ notation  Binary form of x 10 4

Lecture 24: ReviewIntro to IT Gates and circuits or and not

Lecture 24: ReviewIntro to IT Gates and circuits  No storage here  Results instantaneously available  Disappear when inputs change  How can a bit be `stored’?

Lecture 24: ReviewIntro to IT Memory via `Flip flops’ or and not

Lecture 24: ReviewIntro to IT Memory via `Flip flops’ or and not

Lecture 24: ReviewIntro to IT Memory via `Flip flops’  Can design other versions of flip-flops  Shows how circuits can be designed using AND, OR, NOT (NAND, NOR, XOR, …) in combinations (gates)  Hierarchy and abstraction  Shows how electric circuits can store values

Lecture 24: ReviewIntro to IT Fetch Decode Execute FETCH EXECUTEDECODE Machine cycle

Lecture 24: ReviewIntro to IT Two special registers Instruction register: holds current instruction Program counter: address of next instruction Fetch: Put instruction specified by program counter into instruction register Increment program counter by two Decode: Work out what to do Execute: Perform the instruction

Lecture 24: ReviewIntro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A0 AddressContents

Lecture 24: ReviewIntro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A0 FETCH 156C

Lecture 24: ReviewIntro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A2 FETCH 156C

Lecture 24: ReviewIntro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A2 DECODE 156C 6C 2B

Lecture 24: ReviewIntro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A2 EXEC 156C 6C 2B 2B5

Lecture 24: ReviewIntro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A2 FETCH 166D

Lecture 24: ReviewIntro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A4 FETCH 166D

Lecture 24: ReviewIntro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A4 DECODE 166D

Lecture 24: ReviewIntro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A4 EXEC 166D 6D FF FF6

Lecture 24: ReviewIntro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A6 FETCH 5056

Lecture 24: ReviewIntro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register …

Lecture 24: ReviewIntro to IT Processing Program Counter Instruction Register EXEC B258 B4

Lecture 24: ReviewIntro to IT Processing Program Counter Instruction Register EXEC B258 58

Lecture 24: ReviewIntro to IT Processing  Jump instructions change program counter  Can load any memory address into program counter (!!!)  Often use pipelining for efficiency  Fetch next instruction while executing  Processor doesn’t wait for fetch to complete  Can do more than one instruction …

Lecture 24: ReviewIntro to IT Processes

Lecture 24: ReviewIntro to IT Processes A program is a static set of instructions A processes is the execution of a program, which changes state over time.

Lecture 24: ReviewIntro to IT Processes Executing in Context Program Counter Instruction Register CC ROM RAM ProcessorMemory Disk 00 CC

Lecture 24: ReviewIntro to IT Processes Executing in Context Program Counter Instruction Register DD ROM RAM ProcessorMemory Disk 00 CC DD

Lecture 19: Internet: ImagesIntro to IT Internet Lisa? Hi Dad! Listen! Lisa? Hi Dad! Listen!

Lecture 24: ReviewIntro to IT Internet Structure Application Transport Network Link Network Link Mordor sucks! 2 dor1 Mor 3 suc4 ks! dor1 Mor 3 suc4 ks! Mordor sucks!

Lecture 24: ReviewIntro to IT Internet Structure 1 Mor 1 6 6

Lecture 24: ReviewIntro to IT Network Layer (Internet Protocol)  Real intelligence is in the network layer  Adds next destination to packet  Not complete list of addresses  Sends to next destination  Retrieves final destination packets for this node  Passes them to the transport layer  Routing tables can be updated when disconnections occur  Hop counts used to stop endless looping

Lecture 24: ReviewIntro to IT Transport layer  Transmission Control Protocol (TCP) often used  User Datagram Protocol (UDP) becoming more common  TCP Establishes connection first Send and wait for acknowledgement Reliable Can adjust flow control to avoid congestion Often best for (which is not real-time) Older

Lecture 24: ReviewIntro to IT Transport layer  UDP Doesn’t establish connection Just sends and forget Efficient No congestion adjustment Works well for DNS lookup Often used for Voice over Internet Protocol (VoIP) applications such as Skype

Lecture 24: ReviewIntro to IT Transmitting secrets Question: How do you share a secret with someone you have never met?

Lecture 24: ReviewIntro to IT Encryption “new password is bumblebee” “new password is bumblebee” Send Decrypt Encrypt

Lecture 24: ReviewIntro to IT Public Key Systems  Alice needs to know Bob's encryption key  Alice needs to know Charlie's encryption key  Alice needs to know David's encryption key...  Alice needs to know everyone's encryption key All encryption keys are made public All decryption keys are kept private

Conclusion  Come to the mock exam  Finish Assignment 3