SlideShare a Scribd company logo
1 of 16
Department of Computer and Information Science,
 School of Science, IUPUI




CSCI 230

   Introduction to Computers
    - Hardware

         Dale Roberts, Lecturer
         Computer Science, IUPUI
         E-mail: droberts@cs.iupui.edu
What is a Computer?

Computer
 Device capable of performing computations and making
 logical decisions
 Computers process data under the control of sets of
 instructions called computer programs
 Personal computers: economical enough for individual
 Distributed computing: computing distributed over
 networks
 Client/server computing: sharing of information across
 computer networks between file servers and clients
 (personal computers)



                                             Dale Roberts
What is a Computer? (cont.)
Computer Hardware
Various devices comprising a computer:
Keyboard, screen, mouse, disks, memory, CD-
ROM, and processing units
                                                                       User
Hardware Trends: every year or two the following
approximately double (Moore’s Law):            High-level
                                               Language
                                                                    Application
  Amount of memory in which to execute programs            Assembly
                                                           Language
                                                                     Software

  Amount of secondary storage (such as disk storage)
    Used to hold programs and data over the longer term
                                                                          OS
  Processor speeds
    The speeds at which computers execute their programs   Firmware

                                                           Machine    Hardware
                                                           Code
What is a Computer? (cont.)
Computer Software
 Computer Programs that run on a computer, including
   Operation System (OS)
   Application Software
   Computer Language                                      User

                                            High-level
                                            Language
                                                     Application
                                            Assembly  Software
                                            Language




                                                             OS

                                            Firmware

                                            Machine      Hardware
                                            Code
Moore's Law

Defined by Dr. Gordon Moore during the
sixties.
Predicts an exponential increase in
component density over time, with a
doubling time of 18 months.
Applicable to microprocessors, DRAMs ,
DSPs and other microelectronics.
Monotonic increase in density observed
since the 1960s.
Moore’s Law - Density
Moore's Law and Performance

The performance of computers is
determined by architecture and clock
speed.
Clock speed doubles over a 3 year period
due to the scaling laws on chip.
Processors using identical or similar
architectures gain performance directly as
a function of Moore's Law.
Improvements in internal architecture can
yield better gains than predicted by
Moore's Law.
Moore’s Law - Clock Speed
What is a Computer? (cont.)
Internet
   The Internet enables
      Quick and easy communication via e-mail
      International networking of computers
   Packet switching
      The transfer of digital data via small packets
      Allows multiple users to send and receive data simultaneously
   No centralized control
      If one part of the Internet fails, other parts can still operate
   Bandwidth
      Information carrying capacity of communications lines
      Ex: Internet T2 at IUPUI
   World Wide Web
      Locate and view multimedia-based documents on almost any subject
      Makes information instantly and conveniently accessible worldwide
      Possible for individuals and small businesses to get worldwide exposure
      Changing the way business is done
Computer Organization
A Typical Von-Neumann Architecture
                       CPU
                   Control Circuit
             (ex: PC: Program Counter)
                                          Memory   I/O
                       ALU




   Example:

   1.   Input unit
   2.   Output unit
   3.   Memory unit
   4.   Arithmetic and logic unit (ALU)
   5.   Central processing unit (CPU)
   6.   Secondary storage unit
Computer Organization (cont.)
Six logical units in every computer:
   1. Input unit
           Obtains information from input devices (keyboard, mouse)
   1.   Output unit
           Outputs information (to screen, to printer, to control other
           devices)
   1.   Memory unit
           Rapid access, low capacity, stores input information
           ROM (Read Only Memory): CMOS, EPROM …
           RAM (Random Access Memory): SRAM, DRAM, SIMM, DIMM
           …
Computer Organization (cont.)
Six logical units in every computer (cont):
3. Arithmetic and logic unit (ALU) – part of CPU
       Performs arithmetic calculations (addition, subtraction...) and
       logic decisions
3.   Control unit (CU) - part of CPU
       Supervises and coordinates the other sections of the computer
3.   Secondary storage unit
       Cheap, long-term, high-capacity storage
       Stores inactive programs
Computer Organization (cont.)
Central Processing Unit (CPU),
“brain” of a computer, consisting of
     Arithmetic and logic unit (ALU): performs arithmetic calculations
     (addition, subtraction...) and logic decisions (>, <, =, ...)
     Control Unit (CU): decodes each machine instruction and sends
     signal to other components for carrying out the instruction.
An integrated circuit (IC) that is a full central processing unit
is called a microprocessor (µp); a CPU’s current instruction
and data values are stored temporally inside the CPU in
special high-speed memory location called registers.
CPU speed: ? MHz (M: Mega = 106, Hz=1/sec);
Computer Organization (cont.)
Memory
 A large collection of circuits, each capable of
 storing bit
 Cells (words): manageable units; typical size is 8
 bits (1 byte), some machines are 16 bits (2
 bytes) and some are 32 bits or 64 bits
   Byte (8 bits), KB (kilobyte, 103 ≈ 210 bytes), MB
   (Megabyte, 106 ≈ 220 bytes), GB (Gigabyte, 109 ≈ 230
   bytes). Note: k ≠ K because 1000 ≠ 1024.
Computer Organization (cont.)
          Computer memory is comparable to a collection of
          numbered mailboxes. To identify individual cells in a
          machine’s main memory, each cell is assigned a unique
          name, called its address
 ASCII      H            e             l               l      o          ,
 Data
          01001000     01100101 01101100 01101100 01101111 00101110
                                                                                 ...                  ...
Address    0000 0101    0000 0110   0000 0111    0000 1000   0001 0001   0001 0010
                                                                                                          Address Bus
                                                                                                     Data Bus


          The organization of byte-size memory cell
                          Most Significant Bit (MSB)            Least Significant Bit (LSB)


                         High-order end                                              Low-order end
                                                0 0 0 0 0 1 0 1
Acknowledgements
Moore’s Law: Kopp, Carlo. Monash University.
Melbourne, Australia. 2000.

More Related Content

What's hot

Ch.01 introduction to_computers
Ch.01 introduction  to_computersCh.01 introduction  to_computers
Ch.01 introduction to_computersejistcaloocan
 
T01 a computerintrohardware
T01 a computerintrohardwareT01 a computerintrohardware
T01 a computerintrohardwareSCHOOL
 
Module5 input output storage devices
Module5 input output storage devicesModule5 input output storage devices
Module5 input output storage devicesShaharizan Hassan
 
Computer organisation ppt
Computer organisation pptComputer organisation ppt
Computer organisation pptchandkec
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer FundamentalsMujahid Riaz
 
SYSTEM CONCEPT
SYSTEM CONCEPTSYSTEM CONCEPT
SYSTEM CONCEPTKak Yong
 
Computer program, computer languages, computer software
Computer program, computer languages, computer softwareComputer program, computer languages, computer software
Computer program, computer languages, computer softwareSweta Kumari Barnwal
 
Basics of Computer Hardware
Basics of Computer HardwareBasics of Computer Hardware
Basics of Computer HardwareThirumalai Baabu
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to misJob Thomas
 
Intro To Computer Hardware
Intro To Computer HardwareIntro To Computer Hardware
Intro To Computer Hardwareiarthur
 
Chapter 2: Computer Hardware (Revision)
Chapter 2: Computer Hardware (Revision)Chapter 2: Computer Hardware (Revision)
Chapter 2: Computer Hardware (Revision)李 舜生
 
The Basic Configuration of a Microcomputer
The Basic Configuration of a Microcomputer The Basic Configuration of a Microcomputer
The Basic Configuration of a Microcomputer Taminul Islam
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHISowmya Jyothi
 

What's hot (19)

Ch.01 introduction to_computers
Ch.01 introduction  to_computersCh.01 introduction  to_computers
Ch.01 introduction to_computers
 
T01 a computerintrohardware
T01 a computerintrohardwareT01 a computerintrohardware
T01 a computerintrohardware
 
Module5 input output storage devices
Module5 input output storage devicesModule5 input output storage devices
Module5 input output storage devices
 
Computer organisation ppt
Computer organisation pptComputer organisation ppt
Computer organisation ppt
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
SYSTEM CONCEPT
SYSTEM CONCEPTSYSTEM CONCEPT
SYSTEM CONCEPT
 
Computer program, computer languages, computer software
Computer program, computer languages, computer softwareComputer program, computer languages, computer software
Computer program, computer languages, computer software
 
Introduction to computer system
Introduction to computer systemIntroduction to computer system
Introduction to computer system
 
Basics of Computer Hardware
Basics of Computer HardwareBasics of Computer Hardware
Basics of Computer Hardware
 
Introduction to computers i
Introduction to computers iIntroduction to computers i
Introduction to computers i
 
Intro to it chap 1
Intro to it chap 1Intro to it chap 1
Intro to it chap 1
 
Computer Basic
Computer BasicComputer Basic
Computer Basic
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
Intro To Computer Hardware
Intro To Computer HardwareIntro To Computer Hardware
Intro To Computer Hardware
 
Chapter 2: Computer Hardware (Revision)
Chapter 2: Computer Hardware (Revision)Chapter 2: Computer Hardware (Revision)
Chapter 2: Computer Hardware (Revision)
 
Microprocessors and memory concepts
Microprocessors and memory conceptsMicroprocessors and memory concepts
Microprocessors and memory concepts
 
The Basic Configuration of a Microcomputer
The Basic Configuration of a Microcomputer The Basic Configuration of a Microcomputer
The Basic Configuration of a Microcomputer
 
Lecture 3
Lecture 3 Lecture 3
Lecture 3
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 

Viewers also liked

Networing basics
Networing basicsNetworing basics
Networing basicsMohd Arif
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformMohd Arif
 
Presentation
PresentationPresentation
PresentationMohd Arif
 
اخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدماخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدمTORKIALSOLAMI
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peerMohd Arif
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systemsMohd Arif
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psecMohd Arif
 
أخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلوماتأخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلوماتProf. Othman Alsalloum
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdpMohd Arif
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgetingMohd Arif
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management FundamentalsSolarWinds
 
Network Management
Network ManagementNetwork Management
Network Managementazura787
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarpMohd Arif
 
Pointers in c
Pointers in cPointers in c
Pointers in cMohd Arif
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcpMohd Arif
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniquesMohd Arif
 
Network Administrator
Network AdministratorNetwork Administrator
Network Administratorguest371b1b4
 

Viewers also liked (20)

Networing basics
Networing basicsNetworing basics
Networing basics
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
 
Presentation
PresentationPresentation
Presentation
 
اخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدماخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدم
 
Lists
ListsLists
Lists
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peer
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systems
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
أخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلوماتأخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلومات
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdp
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgeting
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
 
Network Management
Network ManagementNetwork Management
Network Management
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Loaders
LoadersLoaders
Loaders
 
Pointers in c
Pointers in cPointers in c
Pointers in c
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniques
 
Network Administrator
Network AdministratorNetwork Administrator
Network Administrator
 

Similar to Intro to comp. hardware

T01 a computerintrohardware
T01 a computerintrohardwareT01 a computerintrohardware
T01 a computerintrohardwareGaurav Juneja
 
ydtyT01 a computerintrohardware
ydtyT01 a computerintrohardwareydtyT01 a computerintrohardware
ydtyT01 a computerintrohardwarekasmraj1
 
C language computer introduction to the computer hardware
C language  computer introduction to the computer hardwareC language  computer introduction to the computer hardware
C language computer introduction to the computer hardwareNIKHIL KRISHNA
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating systemAnil Dharmapuri
 
Essential Knowledge of Computers.pptx
Essential Knowledge of Computers.pptxEssential Knowledge of Computers.pptx
Essential Knowledge of Computers.pptxHODCSE74
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming conceptshermiraguilar
 
Short_Term_Course_on_Phoenix_and_its_App.ppt
Short_Term_Course_on_Phoenix_and_its_App.pptShort_Term_Course_on_Phoenix_and_its_App.ppt
Short_Term_Course_on_Phoenix_and_its_App.pptNaveeN547338
 
E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp01E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp0112richa
 
Introduction to IT.pptx
Introduction to IT.pptxIntroduction to IT.pptx
Introduction to IT.pptxMewledMohammed
 
Computer basics and i.o devices
Computer basics and i.o devicesComputer basics and i.o devices
Computer basics and i.o deviceskitturashmikittu
 
Technology & Communications
Technology & Communications Technology & Communications
Technology & Communications Hellena Roza
 
CSE 370 - Introduction to Operating Systems
CSE 370 - Introduction to Operating SystemsCSE 370 - Introduction to Operating Systems
CSE 370 - Introduction to Operating SystemsDev Khare
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamentalrachit jaish
 

Similar to Intro to comp. hardware (20)

T01 a computerintrohardware
T01 a computerintrohardwareT01 a computerintrohardware
T01 a computerintrohardware
 
ydtyT01 a computerintrohardware
ydtyT01 a computerintrohardwareydtyT01 a computerintrohardware
ydtyT01 a computerintrohardware
 
C language computer introduction to the computer hardware
C language  computer introduction to the computer hardwareC language  computer introduction to the computer hardware
C language computer introduction to the computer hardware
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating system
 
Essential Knowledge of Computers.pptx
Essential Knowledge of Computers.pptxEssential Knowledge of Computers.pptx
Essential Knowledge of Computers.pptx
 
Information technology
Information technologyInformation technology
Information technology
 
Chapter 2(answer)2
Chapter 2(answer)2Chapter 2(answer)2
Chapter 2(answer)2
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
Bab1
Bab1Bab1
Bab1
 
Introduction to programming concepts
Introduction to programming conceptsIntroduction to programming concepts
Introduction to programming concepts
 
COMPUTER.docx
COMPUTER.docxCOMPUTER.docx
COMPUTER.docx
 
Short_Term_Course_on_Phoenix_and_its_App.ppt
Short_Term_Course_on_Phoenix_and_its_App.pptShort_Term_Course_on_Phoenix_and_its_App.ppt
Short_Term_Course_on_Phoenix_and_its_App.ppt
 
E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp01E 1-00powerpointpresentationupdate-090901115018-phpapp01
E 1-00powerpointpresentationupdate-090901115018-phpapp01
 
Introduction to IT.pptx
Introduction to IT.pptxIntroduction to IT.pptx
Introduction to IT.pptx
 
intro.ppt
intro.pptintro.ppt
intro.ppt
 
Computer basics and i.o devices
Computer basics and i.o devicesComputer basics and i.o devices
Computer basics and i.o devices
 
Technology & Communications
Technology & Communications Technology & Communications
Technology & Communications
 
CSE 370 - Introduction to Operating Systems
CSE 370 - Introduction to Operating SystemsCSE 370 - Introduction to Operating Systems
CSE 370 - Introduction to Operating Systems
 
intro.ppt
intro.pptintro.ppt
intro.ppt
 
Computer fundamental
Computer fundamentalComputer fundamental
Computer fundamental
 

More from Mohd Arif

User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Project identification
Project identificationProject identification
Project identificationMohd Arif
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
H.323 vs. cops interworking
H.323 vs. cops interworkingH.323 vs. cops interworking
H.323 vs. cops interworkingMohd Arif
 
Google search tips advanced features
Google search tips advanced featuresGoogle search tips advanced features
Google search tips advanced featuresMohd Arif
 
Distributed databases and dbm ss
Distributed databases and dbm ssDistributed databases and dbm ss
Distributed databases and dbm ssMohd Arif
 
Dinive conquer algorithm
Dinive conquer algorithmDinive conquer algorithm
Dinive conquer algorithmMohd Arif
 
Dcom vs. corba
Dcom vs. corbaDcom vs. corba
Dcom vs. corbaMohd Arif
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and securityMohd Arif
 
Data structure
Data structureData structure
Data structureMohd Arif
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communicationMohd Arif
 

More from Mohd Arif (15)

User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Project identification
Project identificationProject identification
Project identification
 
Network management
Network managementNetwork management
Network management
 
Heap sort
Heap sortHeap sort
Heap sort
 
H.323 vs. cops interworking
H.323 vs. cops interworkingH.323 vs. cops interworking
H.323 vs. cops interworking
 
H.323
H.323H.323
H.323
 
Graphs
GraphsGraphs
Graphs
 
Google search tips advanced features
Google search tips advanced featuresGoogle search tips advanced features
Google search tips advanced features
 
Google
GoogleGoogle
Google
 
Distributed databases and dbm ss
Distributed databases and dbm ssDistributed databases and dbm ss
Distributed databases and dbm ss
 
Dinive conquer algorithm
Dinive conquer algorithmDinive conquer algorithm
Dinive conquer algorithm
 
Dcom vs. corba
Dcom vs. corbaDcom vs. corba
Dcom vs. corba
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 
Data structure
Data structureData structure
Data structure
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Intro to comp. hardware

  • 1. Department of Computer and Information Science, School of Science, IUPUI CSCI 230 Introduction to Computers - Hardware Dale Roberts, Lecturer Computer Science, IUPUI E-mail: droberts@cs.iupui.edu
  • 2. What is a Computer? Computer Device capable of performing computations and making logical decisions Computers process data under the control of sets of instructions called computer programs Personal computers: economical enough for individual Distributed computing: computing distributed over networks Client/server computing: sharing of information across computer networks between file servers and clients (personal computers) Dale Roberts
  • 3. What is a Computer? (cont.) Computer Hardware Various devices comprising a computer: Keyboard, screen, mouse, disks, memory, CD- ROM, and processing units User Hardware Trends: every year or two the following approximately double (Moore’s Law): High-level Language Application Amount of memory in which to execute programs Assembly Language Software Amount of secondary storage (such as disk storage) Used to hold programs and data over the longer term OS Processor speeds The speeds at which computers execute their programs Firmware Machine Hardware Code
  • 4. What is a Computer? (cont.) Computer Software Computer Programs that run on a computer, including Operation System (OS) Application Software Computer Language User High-level Language Application Assembly Software Language OS Firmware Machine Hardware Code
  • 5. Moore's Law Defined by Dr. Gordon Moore during the sixties. Predicts an exponential increase in component density over time, with a doubling time of 18 months. Applicable to microprocessors, DRAMs , DSPs and other microelectronics. Monotonic increase in density observed since the 1960s.
  • 6. Moore’s Law - Density
  • 7. Moore's Law and Performance The performance of computers is determined by architecture and clock speed. Clock speed doubles over a 3 year period due to the scaling laws on chip. Processors using identical or similar architectures gain performance directly as a function of Moore's Law. Improvements in internal architecture can yield better gains than predicted by Moore's Law.
  • 8. Moore’s Law - Clock Speed
  • 9. What is a Computer? (cont.) Internet The Internet enables Quick and easy communication via e-mail International networking of computers Packet switching The transfer of digital data via small packets Allows multiple users to send and receive data simultaneously No centralized control If one part of the Internet fails, other parts can still operate Bandwidth Information carrying capacity of communications lines Ex: Internet T2 at IUPUI World Wide Web Locate and view multimedia-based documents on almost any subject Makes information instantly and conveniently accessible worldwide Possible for individuals and small businesses to get worldwide exposure Changing the way business is done
  • 10. Computer Organization A Typical Von-Neumann Architecture CPU Control Circuit (ex: PC: Program Counter) Memory I/O ALU Example: 1. Input unit 2. Output unit 3. Memory unit 4. Arithmetic and logic unit (ALU) 5. Central processing unit (CPU) 6. Secondary storage unit
  • 11. Computer Organization (cont.) Six logical units in every computer: 1. Input unit Obtains information from input devices (keyboard, mouse) 1. Output unit Outputs information (to screen, to printer, to control other devices) 1. Memory unit Rapid access, low capacity, stores input information ROM (Read Only Memory): CMOS, EPROM … RAM (Random Access Memory): SRAM, DRAM, SIMM, DIMM …
  • 12. Computer Organization (cont.) Six logical units in every computer (cont): 3. Arithmetic and logic unit (ALU) – part of CPU Performs arithmetic calculations (addition, subtraction...) and logic decisions 3. Control unit (CU) - part of CPU Supervises and coordinates the other sections of the computer 3. Secondary storage unit Cheap, long-term, high-capacity storage Stores inactive programs
  • 13. Computer Organization (cont.) Central Processing Unit (CPU), “brain” of a computer, consisting of Arithmetic and logic unit (ALU): performs arithmetic calculations (addition, subtraction...) and logic decisions (>, <, =, ...) Control Unit (CU): decodes each machine instruction and sends signal to other components for carrying out the instruction. An integrated circuit (IC) that is a full central processing unit is called a microprocessor (µp); a CPU’s current instruction and data values are stored temporally inside the CPU in special high-speed memory location called registers. CPU speed: ? MHz (M: Mega = 106, Hz=1/sec);
  • 14. Computer Organization (cont.) Memory A large collection of circuits, each capable of storing bit Cells (words): manageable units; typical size is 8 bits (1 byte), some machines are 16 bits (2 bytes) and some are 32 bits or 64 bits Byte (8 bits), KB (kilobyte, 103 ≈ 210 bytes), MB (Megabyte, 106 ≈ 220 bytes), GB (Gigabyte, 109 ≈ 230 bytes). Note: k ≠ K because 1000 ≠ 1024.
  • 15. Computer Organization (cont.) Computer memory is comparable to a collection of numbered mailboxes. To identify individual cells in a machine’s main memory, each cell is assigned a unique name, called its address ASCII H e l l o , Data 01001000 01100101 01101100 01101100 01101111 00101110 ... ... Address 0000 0101 0000 0110 0000 0111 0000 1000 0001 0001 0001 0010 Address Bus Data Bus The organization of byte-size memory cell Most Significant Bit (MSB) Least Significant Bit (LSB) High-order end Low-order end 0 0 0 0 0 1 0 1
  • 16. Acknowledgements Moore’s Law: Kopp, Carlo. Monash University. Melbourne, Australia. 2000.