SlideShare a Scribd company logo
1 of 12
Computing Machines
   Ubiquitous ( = everywhere)
       General purpose: servers, desktops, laptops, PDAs, etc.
       Special purpose: cash registers, ATMs, games, telephone
       switches, etc.
       Embedded: cars, hotel doors, printers, VCRs, industrial
       machinery, medical equipment, etc.

   Distinguishing Characteristics
       Speed
       Cost
       Ease of use, software support & interface
       Scalability

                       Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1-1                          Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
Two recurring themes
 Abstraction
       The notion that we can concentrate on one “level” of the big
        picture at a time, with confidence that we can then connect
        effectively with the levels above and below.
       Framing the levels of abstraction appropriately is one of the most
        important skills in any undertaking.

 Hardware        vs. Software
       On the other hand, abstraction does not mean being clueless
        about the neighboring levels.
       In particular, hardware and software are inseparably connected,
        especially at the level we will be studying.


                      Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1-2                         Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
What is Computer Organization?



Electronic                                                                                                     Desired
 Devices                                                                                                       Behavior



 … a very wide semantic gap between the intended behavior and the
  workings of the underlying electronic devices that will actually do
  all the work.

 The forerunners to modern computers attempted to assemble the raw
  devices (mechanical, electrical, or electronic) into a separate
  purpose-built machine for each desired behavior.
                    Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
 1-3                      Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
Role of General Purpose Computers
              computer
                                                                                  software
             organization


                                             General
Electronic                                                                                                        Desired
                                            Purpose
 Devices                                                                                                          Behavior
                                            Computer




  A general purpose computer is like an island that helps span the gap
  between the desired behavior (application) and the basic building
  blocks (electronic devices).




                    Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
 1-4                      Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
CPUs: the heart of computing systems




                                                                        ca 2000
              ca 1980                                          You can see why they called
   It took 10 of these boards to                               this CPU a microprocessor!
  make a Central Processing Unit

                    Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1-5                       Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
Two pillars of Computing

 Universal      Computational Devices
   Given enough time and memory, all computers are capable of
    computing exactly the same things (irrespective of speed, size or
    cost).
       Turing’s Thesis: every computation can be performed by some
        “Turing Machine” - a theoretical universal computational device


 Problem      Transformation
   The ultimate objective is to transform a problem expressed in
    natural language into electrons running around a circuit!
       That’s what Computer Science and Computer Engineering are all
        about: a continuum that embraces software & hardware.


                     Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1-6                        Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
A Turing Machine

      Also known as a Universal Computational Device: a theoretical
       device that accepts both input data and instructions as to how to
       operate on the data




                     Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1-7                        Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
Problem Transformation
          - levels of abstraction
      The desired behavior:                           Natural Language
      the application
                                                              Algorithm

                                                               Program

                                                   Machine Architecture

                                                      Micro-architecture

                                                          Logic Circuits
      The building blocks:
                                                                Devices
      electronic devices
               Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1-8                  Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
Levels of Abstraction

 These levels do not necessarily correspond                                         Natural Language
  to discrete components, but to well defined
  standard interfaces.                                                                       Algorithm

 Standard interfaces provide                                                                 Program
      portability
                                                                                  Machine Architecture
      third party software/hardware
      wider usage                                                                   Micro-architecture

 These levels are to some extent arbitrary -                                            Logic Circuits
  there are other ways to draw the lines.
                                                                                               Devices


                      Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
 1-9                        Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
The Program Level
  Most computers run a management
   program called the operating system                                   Application Program
   (OS).
                                                                           Operating System
  Application programs interface to the
   machine architecture via the OS.

                                                                             Program (Software)
 An example:

          This lecture                   Data

          PowerPoint                      Application Program

          Windows XP                      Operating System


                     Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 - 10                     Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
The Machine Level - 1

 Machine      Architecture
     This is the formal specification of all the functions a particular
      machine can carry out, known as the Instruction Set Architecture
      (ISA).


 Microarchitecture

     The implementation of the ISA in a specific CPU - i.e. the way in
      which the specifications of the ISA are actually carried out.



                    Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 - 11                    Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
The Machine Level - 2

 Logic   Circuits
    Each functional component of the microarchitecture is built up of
     circuits that make “decisions” based on simple rules


 Devices

    Finally, each logic circuit is actually built of electronic devices
     such as CMOS or NMOS or GaAs (etc.) transistors.




                     Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 - 12                     Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside

More Related Content

Similar to Chap1

Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.pptsheryl90
 
najjar_chap1.ppt
najjar_chap1.pptnajjar_chap1.ppt
najjar_chap1.pptdipakshow1
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering JayaKamal
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]Raul Soto
 
Infrastructure student
Infrastructure studentInfrastructure student
Infrastructure studentJohn Scrugham
 
Device Drivers
Device DriversDevice Drivers
Device DriversSuhas S R
 
Parallel and Distributed Computing: BOINC Grid Implementation Paper
Parallel and Distributed Computing: BOINC Grid Implementation PaperParallel and Distributed Computing: BOINC Grid Implementation Paper
Parallel and Distributed Computing: BOINC Grid Implementation PaperRodrigo Neves
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Open Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesTal Lavian Ph.D.
 
J2ME mobile app development
J2ME mobile app developmentJ2ME mobile app development
J2ME mobile app developmentMuthu Kumar
 
Challenges and advantages of grid computing
Challenges and advantages of grid computingChallenges and advantages of grid computing
Challenges and advantages of grid computingPooja Dixit
 
The Concurrency Challenge : Notes
The Concurrency Challenge : NotesThe Concurrency Challenge : Notes
The Concurrency Challenge : NotesSubhajit Sahu
 
Gridcomputingppt
GridcomputingpptGridcomputingppt
Gridcomputingpptnavjasser
 
Are you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the networkAre you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the networkMegan O'Keefe
 

Similar to Chap1 (20)

Technology technology.ppt
Technology technology.pptTechnology technology.ppt
Technology technology.ppt
 
CHAP1.ppt
CHAP1.pptCHAP1.ppt
CHAP1.ppt
 
CHAP1.ppt
CHAP1.pptCHAP1.ppt
CHAP1.ppt
 
najjar_chap1.ppt
najjar_chap1.pptnajjar_chap1.ppt
najjar_chap1.ppt
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Infrastructure student
Infrastructure studentInfrastructure student
Infrastructure student
 
Device Drivers
Device DriversDevice Drivers
Device Drivers
 
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N..."Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
"Parallel and Distributed Computing: BOINC Grid Implementation" por Rodrigo N...
 
Parallel and Distributed Computing: BOINC Grid Implementation Paper
Parallel and Distributed Computing: BOINC Grid Implementation PaperParallel and Distributed Computing: BOINC Grid Implementation Paper
Parallel and Distributed Computing: BOINC Grid Implementation Paper
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Open Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network DevicesOpen Programmable Architecture for Java-enabled Network Devices
Open Programmable Architecture for Java-enabled Network Devices
 
J2ME mobile app development
J2ME mobile app developmentJ2ME mobile app development
J2ME mobile app development
 
Challenges and advantages of grid computing
Challenges and advantages of grid computingChallenges and advantages of grid computing
Challenges and advantages of grid computing
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
The Concurrency Challenge : Notes
The Concurrency Challenge : NotesThe Concurrency Challenge : Notes
The Concurrency Challenge : Notes
 
Gridcomputingppt
GridcomputingpptGridcomputingppt
Gridcomputingppt
 
7- Grid Computing.Pdf
7- Grid Computing.Pdf7- Grid Computing.Pdf
7- Grid Computing.Pdf
 
Are you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the networkAre you ready to be edgy? Bringing applications to the edge of the network
Are you ready to be edgy? Bringing applications to the edge of the network
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Chap1

  • 1. Computing Machines  Ubiquitous ( = everywhere)  General purpose: servers, desktops, laptops, PDAs, etc.  Special purpose: cash registers, ATMs, games, telephone switches, etc.  Embedded: cars, hotel doors, printers, VCRs, industrial machinery, medical equipment, etc.  Distinguishing Characteristics  Speed  Cost  Ease of use, software support & interface  Scalability Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1-1 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
  • 2. Two recurring themes  Abstraction  The notion that we can concentrate on one “level” of the big picture at a time, with confidence that we can then connect effectively with the levels above and below.  Framing the levels of abstraction appropriately is one of the most important skills in any undertaking.  Hardware vs. Software  On the other hand, abstraction does not mean being clueless about the neighboring levels.  In particular, hardware and software are inseparably connected, especially at the level we will be studying. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1-2 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
  • 3. What is Computer Organization? Electronic Desired Devices Behavior … a very wide semantic gap between the intended behavior and the workings of the underlying electronic devices that will actually do all the work. The forerunners to modern computers attempted to assemble the raw devices (mechanical, electrical, or electronic) into a separate purpose-built machine for each desired behavior. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1-3 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
  • 4. Role of General Purpose Computers computer software organization General Electronic Desired Purpose Devices Behavior Computer A general purpose computer is like an island that helps span the gap between the desired behavior (application) and the basic building blocks (electronic devices). Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1-4 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
  • 5. CPUs: the heart of computing systems ca 2000 ca 1980 You can see why they called It took 10 of these boards to this CPU a microprocessor! make a Central Processing Unit Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1-5 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
  • 6. Two pillars of Computing  Universal Computational Devices  Given enough time and memory, all computers are capable of computing exactly the same things (irrespective of speed, size or cost).  Turing’s Thesis: every computation can be performed by some “Turing Machine” - a theoretical universal computational device  Problem Transformation  The ultimate objective is to transform a problem expressed in natural language into electrons running around a circuit!  That’s what Computer Science and Computer Engineering are all about: a continuum that embraces software & hardware. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1-6 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
  • 7. A Turing Machine Also known as a Universal Computational Device: a theoretical device that accepts both input data and instructions as to how to operate on the data Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1-7 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
  • 8. Problem Transformation - levels of abstraction The desired behavior: Natural Language the application Algorithm Program Machine Architecture Micro-architecture Logic Circuits The building blocks: Devices electronic devices Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1-8 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
  • 9. Levels of Abstraction  These levels do not necessarily correspond Natural Language to discrete components, but to well defined standard interfaces. Algorithm  Standard interfaces provide Program  portability Machine Architecture  third party software/hardware  wider usage Micro-architecture  These levels are to some extent arbitrary - Logic Circuits there are other ways to draw the lines. Devices Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1-9 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
  • 10. The Program Level  Most computers run a management program called the operating system Application Program (OS). Operating System  Application programs interface to the machine architecture via the OS. Program (Software) An example: This lecture Data PowerPoint Application Program Windows XP Operating System Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1 - 10 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
  • 11. The Machine Level - 1  Machine Architecture  This is the formal specification of all the functions a particular machine can carry out, known as the Instruction Set Architecture (ISA).  Microarchitecture  The implementation of the ISA in a specific CPU - i.e. the way in which the specifications of the ISA are actually carried out. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1 - 11 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
  • 12. The Machine Level - 2  Logic Circuits  Each functional component of the microarchitecture is built up of circuits that make “decisions” based on simple rules  Devices  Finally, each logic circuit is actually built of electronic devices such as CMOS or NMOS or GaAs (etc.) transistors. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1 - 12 Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside