Download presentation
Presentation is loading. Please wait.
1
Chapter 5 Computing Components Nell Dale John Lewis
2
5-2 Chapter Goals Read an ad for a computer and understand the jargon List the components and their function in a von Neumann machine Describe the fetch-decode-execute cycle of the von Neumann machine
3
5-3 Chapter Goals (cont.) Describe how computer memory is organized and accessed Name and describe different auxiliary storage devices Define three alternative parallel computer configurations
4
5-4 Computer Components Consider the following ad Page 116
5
5-5 Sizes in Perspective Admiral Grace Murray Hopper –A coil of wire nearly 1,000 feet long Distance traveled by an electron along the wire in the space of a microsecond –A short piece of wire In the space of a nanosecond –A bag containing grains of pepper In the space of a picosecond
6
5-6 Sizes in Perspective (cont.) Page 119
7
5-7 Stored-Program Concept Figure 5.1 The von Neumann architecture
8
Memory Memory is a collection of cells, each with a unique physical address Page 122
9
5-9 Arithmetic/Logic Unit Performing basic arithmetic operations such as adding Performing logical operations such as AND, OR, and NOT Most modern ALUs have a small amount of special storage units called registers
10
5-10 Input/Output Units An input unit is a device through which data and programs from the outside world are entered into the computer –Keyboard, the mouse, and scanning devices An output unit is a device through which results stored in the computer memory are made available to the outside world –Printers and video display terminals
11
5-11 Control Unit Control unit is the organizing force in the computer There are two registers in the control unit –The instruction register (IR) contains the instruction that is being executed –The program counter (PC) contains the address of the next instruction to be executed ALU and the control unit called the Central Processing Unit, or CPU
12
5-12 Flow of Information The parts are connected to one another by a collection of wires called a bus Figure 5.2 Data flow through a von Neumann architecture
13
5-13 The Fetch-Execute Cycle Fetch the next instruction Decode the instruction Get data if needed Execute the instruction
14
5-14 The Fetch-Execute Cycle (cont.)
15
5-15 RAM and ROM RAM stands for Random Access Memory –Inherent in the idea of being able to access each location is the ability to change the contents of each location ROM stands for Read Only Memory –The contents in locations in ROM cannot be changed RAM is volatile, ROM is not –This means that RAM does not retain its bit configuration when the power is turned off, but ROM does
16
5-16 Secondary Storage Devices Because most of main memory is volatile and limited, it is essential that there be other types of storage devices where programs and data can be stored when they are no longer being processed Secondary storage devices can be installed within the computer box at the factory or added later as needed
17
Magnetic Tape The first truly mass auxiliary storage device was the magnetic tape drive Figure 5.4 A magnetic tape
18
Magnetic Disks A read/write head travels across a spinning magnetic disk, retrieving or recording data
19
Magnetic Disks Seek time: time to position R/W head to the track Latency: Time to wait for the sector under R/W head Access time: seek time + latency Transfer rate: the rate to move data from disk to memory Ex: Rotating speed = 7200RPM; tracks =1000; sectors/track = 50; bytes/sector = 512; arm moving time = 0.02msec/track; A = seek time: Best case = 0/ worst case = 0.02msec*999/ avr = 0.02msec*300(assumed) B = latency: best = 0/ worst = 60*1000msec/7200 = 8.33msec/ avr = 4.17msec access time = A + B transfer time of a sector = 8.33msec * 1/50
20
5-20 Compact Disks A CD drive uses a laser to read information stored optically on a plastic disk CD-ROM is Read-Only Memory DVD stands for Digital Versatile Disk
21
5-21 Synchronous processing SIMD - One approach to parallelism is to have multiple processors apply the same program to multiple data sets
22
5-22 Pipelining Arranges processors in tandem, where each processor contributes one part to an overall computation
23
5-23 Ethical Issues: Facial Recognition/Privacy An identity verification technique that matches the structure of a person’s face to his/her picture –Cameras scan the peaks and valleys of features An invasion of privacy? –Critics oppose both clandestine capture (the scanning of faces without consent) and tracking (the use of this technology to monitor a person’s movement)
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.