SlideShare a Scribd company logo

IS 139
Lecture 2
(Introduction – Part 2)
Introduction
The Computer Level Hierarchy
 Computers consist of many things besides
chips.
 Before a computer can do anything worthwhile,
it must also use software.
 Writing complex programs requires a “divide
and conquer” approach, where each program
module solves a smaller problem.
 Complex computer systems employ a similar
technique through a series of virtual machine
layers.
2
The Computer Level Hierarchy
 Each virtual machine
layer is an abstraction of
the level below it.
 The machines at each
level execute their own
particular instructions,
calling upon machines at
lower levels to perform
tasks as required.
 Computer circuits
ultimately carry out the
work.
3
The Computer Level Hierarchy
 Level 6: The User Level
 Program execution and user interface level.
 The level with which we are most familiar.
 Level 5: High-Level Language Level
 The level with which we interact when we write
programs in languages such as C, Pascal, Lisp, and
Java.
4
The Computer Level Hierarchy
 Level 4: Assembly Language Level
 Acts upon assembly language produced from
Level 5, as well as instructions programmed
directly at this level.
 Level 3: System Software Level
 Controls executing processes on the system.
 Protects system resources.
 Assembly language instructions often pass
through Level 3 without modification.
5
The Computer Level Hierarchy
 Level 2: Machine Level
 Also known as the Instruction Set Architecture
(ISA) Level.
 Consists of instructions that are particular to the
architecture of the machine.
 Programs written in machine language need no
compilers, interpreters, or assemblers.
6
The Computer Level Hierarchy
 Level 1: Control Level
 A control unit decodes and executes instructions
and moves data through the system.
 Control units can be microprogrammed or
hardwired.
 A microprogram is a program written in a low-
level language that is implemented by the
hardware.
 Hardwired control units consist of hardware that
directly executes machine instructions.
7
The Computer Level Hierarchy
 Level 0: Digital Logic Level
 This level is where we find digital circuits (the
chips).
 Digital circuits consist of gates and wires.
 These components implement the mathematical
logic of all other levels.
8
The von Neumann Model
 On the ENIAC, all programming was done at
the digital logic level.
 Programming the computer involved moving
plugs and wires.
 A different hardware configuration was needed
to solve every unique problem type.
9
Configuring the ENIAC to solve a “simple” problem
required many days labor by skilled technicians.
The von Neumann Model
 Inventors of the ENIAC, John Mauchley and
J. Presper Eckert, conceived of a computer
that could store instructions in memory.
 The invention of this idea has since been
ascribed to a mathematician, John von
Neumann, who was a contemporary of
Mauchley and Eckert.
 Stored-program computers have become
known as von Neumann Architecture
systems.
10
The von Neumann Model
 Properties of a von Neumann architecture
 Data & Instructions are stored in the same
memory – are only distinguishable through
usage
 Only a single memory space – accessed
sequentially
 Memory is one dimensional
 Meaning of data is not stored with it
11
The von Neumann Model
 Today’s stored-program computers have the
following characteristics:
 Three hardware systems:
 A central processing unit (CPU)
 A main memory system
 An I/O system
 The capacity to carry out sequential instruction
processing.
 A single data path between the CPU and main
memory.
 This single path is known as the von Neumann
bottleneck.
12
The von Neumann Model
 This is a general
depiction of a
von Neumann
system:
 These computers
employ a fetch-
decode-execute
cycle to run
programs as
follows . . .
13
The von Neumann Model
 The control unit fetches the next instruction from
memory using the program counter to determine where
the instruction is located.
14
The von Neumann Model
 The instruction is decoded into a language that the ALU
can understand.
15
The von Neumann Model
 Any data operands required to execute the instruction
are fetched from memory and placed into registers
within the CPU.
16
The von Neumann Model
 The ALU executes the instruction and places results in
registers or memory.
17
von Neumann Models -
Improvements
 Conventional stored-program computers
have undergone many incremental
improvements over the years.
 These improvements include adding
specialized buses, floating-point units, and
cache memories, to name only a few.
 But enormous improvements in
computational power require departure from
the classic von Neumann architecture.
 Adding processors is one approach.
18
von Neumann Models -
Improvements
 In the late 1960s, high-performance
computer systems were equipped with dual
processors to increase computational
throughput.
 In the 1970s supercomputer systems were
introduced with 32 processors.
 Supercomputers with 1,000 processors were
built in the 1980s.
 In 1999, IBM announced its Blue Gene
system containing over 1 million processors.
19
Non-von Neumann Models
 Typed storage (self-identifying data)
 Each operand (data item) carries bits to
identify its type
 Programs that operate on structures rather
than words
 Functional approach
 Replacing computation as a sequence of
discrete operations
 Data flow model – order of execution
depends on data interdependence
20
Conclusion & Further reading
You should now be sufficiently familiar with general
system structure to guide your studies throughout
the remainder of this course.
Subsequent lectures will explore many of these
topics in great detail.
Essentials of Computer Organization &
architecture – Linda Null => Chapter 1
21

More Related Content

What's hot

Computer architecture
Computer architecture Computer architecture
Computer architecture
Ashish Kumar
 
Risc & cisk
Risc & ciskRisc & cisk
01. introduction to embedded systems
01. introduction to embedded systems01. introduction to embedded systems
01. introduction to embedded systems
ayush1313
 
Von-Neumann machine and IAS architecture
Von-Neumann machine and  IAS architectureVon-Neumann machine and  IAS architecture
Von-Neumann machine and IAS architecture
Shishir Aryal
 
Basic computer architecture
Basic computer architectureBasic computer architecture
Basic computer architecture
Daffodil International University
 
Computer organization-and-architecture-questions-and-answers
Computer organization-and-architecture-questions-and-answersComputer organization-and-architecture-questions-and-answers
Computer organization-and-architecture-questions-and-answers
appasami
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
saurabh sen sky
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
Rozase Patel
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
Zuhaib Zaroon
 
VTU University Micro Controllers-06ES42 lecturer Notes
VTU University Micro Controllers-06ES42 lecturer NotesVTU University Micro Controllers-06ES42 lecturer Notes
VTU University Micro Controllers-06ES42 lecturer Notes
24x7house
 
Computer Oraganisation and Architecture
Computer Oraganisation and ArchitectureComputer Oraganisation and Architecture
Computer Oraganisation and Architecture
yogesh1617
 
Computer Fundamentals Chapter 07 pam
Computer Fundamentals Chapter  07 pamComputer Fundamentals Chapter  07 pam
Computer Fundamentals Chapter 07 pam
Saumya Sahu
 
Computer Organization: Introduction to Microprocessor and Microcontroller
Computer Organization: Introduction to Microprocessor and MicrocontrollerComputer Organization: Introduction to Microprocessor and Microcontroller
Computer Organization: Introduction to Microprocessor and Microcontroller
AmrutaMehata
 
Computer Architecture and organization
Computer Architecture and organizationComputer Architecture and organization
Computer Architecture and organization
Badrinath Kadam
 
CS4109 Computer System Architecture
CS4109 Computer System ArchitectureCS4109 Computer System Architecture
CS4109 Computer System Architecture
ktosri
 
Cp unit 1
Cp unit 1Cp unit 1
Cp unit 1
rakkisu padmaja
 
Risc and cisc casestudy
Risc and cisc casestudyRisc and cisc casestudy
Risc and cisc casestudy
jvs71294
 
Computer architecture short note (version 8)
Computer architecture short note (version 8)Computer architecture short note (version 8)
Computer architecture short note (version 8)
Nimmi Weeraddana
 
Computer architecture and organization
Computer architecture and organizationComputer architecture and organization
Computer architecture and organization
Tushar B Kute
 
Computer Organization : CPU, Memory and I/O organization
Computer Organization : CPU, Memory and I/O organizationComputer Organization : CPU, Memory and I/O organization
Computer Organization : CPU, Memory and I/O organization
AmrutaMehata
 

What's hot (20)

Computer architecture
Computer architecture Computer architecture
Computer architecture
 
Risc & cisk
Risc & ciskRisc & cisk
Risc & cisk
 
01. introduction to embedded systems
01. introduction to embedded systems01. introduction to embedded systems
01. introduction to embedded systems
 
Von-Neumann machine and IAS architecture
Von-Neumann machine and  IAS architectureVon-Neumann machine and  IAS architecture
Von-Neumann machine and IAS architecture
 
Basic computer architecture
Basic computer architectureBasic computer architecture
Basic computer architecture
 
Computer organization-and-architecture-questions-and-answers
Computer organization-and-architecture-questions-and-answersComputer organization-and-architecture-questions-and-answers
Computer organization-and-architecture-questions-and-answers
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
VTU University Micro Controllers-06ES42 lecturer Notes
VTU University Micro Controllers-06ES42 lecturer NotesVTU University Micro Controllers-06ES42 lecturer Notes
VTU University Micro Controllers-06ES42 lecturer Notes
 
Computer Oraganisation and Architecture
Computer Oraganisation and ArchitectureComputer Oraganisation and Architecture
Computer Oraganisation and Architecture
 
Computer Fundamentals Chapter 07 pam
Computer Fundamentals Chapter  07 pamComputer Fundamentals Chapter  07 pam
Computer Fundamentals Chapter 07 pam
 
Computer Organization: Introduction to Microprocessor and Microcontroller
Computer Organization: Introduction to Microprocessor and MicrocontrollerComputer Organization: Introduction to Microprocessor and Microcontroller
Computer Organization: Introduction to Microprocessor and Microcontroller
 
Computer Architecture and organization
Computer Architecture and organizationComputer Architecture and organization
Computer Architecture and organization
 
CS4109 Computer System Architecture
CS4109 Computer System ArchitectureCS4109 Computer System Architecture
CS4109 Computer System Architecture
 
Cp unit 1
Cp unit 1Cp unit 1
Cp unit 1
 
Risc and cisc casestudy
Risc and cisc casestudyRisc and cisc casestudy
Risc and cisc casestudy
 
Computer architecture short note (version 8)
Computer architecture short note (version 8)Computer architecture short note (version 8)
Computer architecture short note (version 8)
 
Computer architecture and organization
Computer architecture and organizationComputer architecture and organization
Computer architecture and organization
 
Computer Organization : CPU, Memory and I/O organization
Computer Organization : CPU, Memory and I/O organizationComputer Organization : CPU, Memory and I/O organization
Computer Organization : CPU, Memory and I/O organization
 

Viewers also liked

Von neumann architecture
Von neumann architectureVon neumann architecture
Von neumann architecture
Nazak Rehman
 
32-bit unsigned multiplier by using CSLA & CLAA
32-bit unsigned multiplier by using CSLA &  CLAA32-bit unsigned multiplier by using CSLA &  CLAA
32-bit unsigned multiplier by using CSLA & CLAA
Ganesh Sambasivarao
 
Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann Architecture
Project Student
 
N301 Von Neumann Architecture
N301 Von Neumann ArchitectureN301 Von Neumann Architecture
N301 Von Neumann Architecture
guest3b9707
 
Design and development of carry select adder
Design and development of carry select adderDesign and development of carry select adder
Design and development of carry select adder
ABIN THOMAS
 
Von Neumann Architecture
Von Neumann ArchitectureVon Neumann Architecture
Von Neumann Architecture
Jawad Farooqi
 
Low power & area efficient carry select adder
Low power & area efficient carry select adderLow power & area efficient carry select adder
Low power & area efficient carry select adder
Sai Vara Prasad P
 
Wallace tree multiplier.pptx1
Wallace tree multiplier.pptx1Wallace tree multiplier.pptx1
Wallace tree multiplier.pptx1
vamshi krishna
 
Wallace tree multiplier
Wallace tree multiplierWallace tree multiplier
Wallace tree multiplier
Sudhir Kumar
 
Von Neumann vs Harvard Architecture
Von Neumann vs Harvard ArchitectureVon Neumann vs Harvard Architecture
Von Neumann vs Harvard Architecture
OLSON MATUNGA
 
Hadoop on-mesos
Hadoop on-mesosHadoop on-mesos
Hadoop on-mesos
Henry Cai 蔡明航
 

Viewers also liked (11)

Von neumann architecture
Von neumann architectureVon neumann architecture
Von neumann architecture
 
32-bit unsigned multiplier by using CSLA & CLAA
32-bit unsigned multiplier by using CSLA &  CLAA32-bit unsigned multiplier by using CSLA &  CLAA
32-bit unsigned multiplier by using CSLA & CLAA
 
Harvard vs Von Neumann Architecture
Harvard vs Von Neumann ArchitectureHarvard vs Von Neumann Architecture
Harvard vs Von Neumann Architecture
 
N301 Von Neumann Architecture
N301 Von Neumann ArchitectureN301 Von Neumann Architecture
N301 Von Neumann Architecture
 
Design and development of carry select adder
Design and development of carry select adderDesign and development of carry select adder
Design and development of carry select adder
 
Von Neumann Architecture
Von Neumann ArchitectureVon Neumann Architecture
Von Neumann Architecture
 
Low power & area efficient carry select adder
Low power & area efficient carry select adderLow power & area efficient carry select adder
Low power & area efficient carry select adder
 
Wallace tree multiplier.pptx1
Wallace tree multiplier.pptx1Wallace tree multiplier.pptx1
Wallace tree multiplier.pptx1
 
Wallace tree multiplier
Wallace tree multiplierWallace tree multiplier
Wallace tree multiplier
 
Von Neumann vs Harvard Architecture
Von Neumann vs Harvard ArchitectureVon Neumann vs Harvard Architecture
Von Neumann vs Harvard Architecture
 
Hadoop on-mesos
Hadoop on-mesosHadoop on-mesos
Hadoop on-mesos
 

Similar to IS 139 Lecture 2

Ch01.pptxxxxxxxxxcxcxcxxccxxxxxxxxxxxcccccc
Ch01.pptxxxxxxxxxcxcxcxxccxxxxxxxxxxxccccccCh01.pptxxxxxxxxxcxcxcxxccxxxxxxxxxxxcccccc
Ch01.pptxxxxxxxxxcxcxcxxccxxxxxxxxxxxcccccc
tasheebedane
 
Ch0 computer systems overview
Ch0 computer systems overviewCh0 computer systems overview
Ch0 computer systems overview
AboubakarIbrahima
 
Organization of modern digital computers
Organization of modern digital computersOrganization of modern digital computers
Organization of modern digital computers
DrRamaPrasathAssista
 
New Developments in the CPU Architecture
New Developments in the CPU ArchitectureNew Developments in the CPU Architecture
New Developments in the CPU Architecture
Maria Almudena Garcia-Fraile Fraile
 
Computer basics
Computer basicsComputer basics
Computer basics
kitturashmikittu
 
Stored program concept
Stored program conceptStored program concept
Stored program concept
gaurav jain
 
Chapter1a
Chapter1aChapter1a
Brief Introduction.ppt
Brief Introduction.pptBrief Introduction.ppt
Brief Introduction.ppt
MollyZolly
 
CSC204PPTNOTES
CSC204PPTNOTESCSC204PPTNOTES
CSC204PPTNOTES
Gilbert NZABONITEGEKA
 
Synapseindia dot net development computer programming
Synapseindia dot net development  computer programmingSynapseindia dot net development  computer programming
Synapseindia dot net development computer programming
Synapseindiappsdevelopment
 
Introduction to Embedded System
Introduction to Embedded SystemIntroduction to Embedded System
Introduction to Embedded System
Zakaria Gomaa
 
Chapter1-CS115.ppt
Chapter1-CS115.pptChapter1-CS115.ppt
Chapter1-CS115.ppt
TyseerArman
 
Programming basics
Programming basicsProgramming basics
Programming basics
Rakotoarison Louis Frederick
 
Basic Components of a digital Computer lecture
Basic Components of a digital Computer lectureBasic Components of a digital Computer lecture
Basic Components of a digital Computer lecture
iraq
 
COA.pptx
COA.pptxCOA.pptx
Fundamentals of computers & information system
Fundamentals of computers & information system  Fundamentals of computers & information system
Fundamentals of computers & information system
shefali mishra
 
Computer generations (1950–present)
Computer generations (1950–present)Computer generations (1950–present)
Computer generations (1950–present)
AJAL A J
 
An overview of computers and programming languages
An overview of computers and programming languages An overview of computers and programming languages
An overview of computers and programming languages
Ahmad Idrees
 
01 Computer Basics (Ch1.1).pptx
01 Computer Basics (Ch1.1).pptx01 Computer Basics (Ch1.1).pptx
01 Computer Basics (Ch1.1).pptx
sarah380333
 
Advanced virtualization techniques for FAUmachine
Advanced virtualization techniques for FAUmachineAdvanced virtualization techniques for FAUmachine
Advanced virtualization techniques for FAUmachine
webhostingguy
 

Similar to IS 139 Lecture 2 (20)

Ch01.pptxxxxxxxxxcxcxcxxccxxxxxxxxxxxcccccc
Ch01.pptxxxxxxxxxcxcxcxxccxxxxxxxxxxxccccccCh01.pptxxxxxxxxxcxcxcxxccxxxxxxxxxxxcccccc
Ch01.pptxxxxxxxxxcxcxcxxccxxxxxxxxxxxcccccc
 
Ch0 computer systems overview
Ch0 computer systems overviewCh0 computer systems overview
Ch0 computer systems overview
 
Organization of modern digital computers
Organization of modern digital computersOrganization of modern digital computers
Organization of modern digital computers
 
New Developments in the CPU Architecture
New Developments in the CPU ArchitectureNew Developments in the CPU Architecture
New Developments in the CPU Architecture
 
Computer basics
Computer basicsComputer basics
Computer basics
 
Stored program concept
Stored program conceptStored program concept
Stored program concept
 
Chapter1a
Chapter1aChapter1a
Chapter1a
 
Brief Introduction.ppt
Brief Introduction.pptBrief Introduction.ppt
Brief Introduction.ppt
 
CSC204PPTNOTES
CSC204PPTNOTESCSC204PPTNOTES
CSC204PPTNOTES
 
Synapseindia dot net development computer programming
Synapseindia dot net development  computer programmingSynapseindia dot net development  computer programming
Synapseindia dot net development computer programming
 
Introduction to Embedded System
Introduction to Embedded SystemIntroduction to Embedded System
Introduction to Embedded System
 
Chapter1-CS115.ppt
Chapter1-CS115.pptChapter1-CS115.ppt
Chapter1-CS115.ppt
 
Programming basics
Programming basicsProgramming basics
Programming basics
 
Basic Components of a digital Computer lecture
Basic Components of a digital Computer lectureBasic Components of a digital Computer lecture
Basic Components of a digital Computer lecture
 
COA.pptx
COA.pptxCOA.pptx
COA.pptx
 
Fundamentals of computers & information system
Fundamentals of computers & information system  Fundamentals of computers & information system
Fundamentals of computers & information system
 
Computer generations (1950–present)
Computer generations (1950–present)Computer generations (1950–present)
Computer generations (1950–present)
 
An overview of computers and programming languages
An overview of computers and programming languages An overview of computers and programming languages
An overview of computers and programming languages
 
01 Computer Basics (Ch1.1).pptx
01 Computer Basics (Ch1.1).pptx01 Computer Basics (Ch1.1).pptx
01 Computer Basics (Ch1.1).pptx
 
Advanced virtualization techniques for FAUmachine
Advanced virtualization techniques for FAUmachineAdvanced virtualization techniques for FAUmachine
Advanced virtualization techniques for FAUmachine
 

More from wajanga

IS 151 Lecture 3
IS 151 Lecture 3IS 151 Lecture 3
IS 151 Lecture 3
wajanga
 
IS 151 Lecture 2
IS 151 Lecture 2IS 151 Lecture 2
IS 151 Lecture 2
wajanga
 
IS 151 Lecture 1
IS 151 Lecture 1IS 151 Lecture 1
IS 151 Lecture 1
wajanga
 
IS 151 Outline 2014
IS 151 Outline 2014IS 151 Outline 2014
IS 151 Outline 2014
wajanga
 
IS 139 Assignment 3
IS 139 Assignment 3IS 139 Assignment 3
IS 139 Assignment 3
wajanga
 
IS 139 Lecture 7
IS 139 Lecture 7IS 139 Lecture 7
IS 139 Lecture 7
wajanga
 
IS 139 Lecture 6
IS 139 Lecture 6IS 139 Lecture 6
IS 139 Lecture 6
wajanga
 
IS 139 Assignment 2
IS 139 Assignment 2IS 139 Assignment 2
IS 139 Assignment 2
wajanga
 
IS 139 Lecture 5
IS 139 Lecture 5IS 139 Lecture 5
IS 139 Lecture 5
wajanga
 
IS 139 Lecture 4
IS 139 Lecture 4IS 139 Lecture 4
IS 139 Lecture 4
wajanga
 
IS 139 Assignment 1
IS 139 Assignment 1IS 139 Assignment 1
IS 139 Assignment 1
wajanga
 
IS 139 Lecture 3
IS 139 Lecture 3IS 139 Lecture 3
IS 139 Lecture 3
wajanga
 
IS 139 Lecture 1
IS 139 Lecture 1IS 139 Lecture 1
IS 139 Lecture 1
wajanga
 
IS 151 Lecture 11
IS 151 Lecture 11IS 151 Lecture 11
IS 151 Lecture 11
wajanga
 
IS 151 Lecture 10
IS 151 Lecture 10IS 151 Lecture 10
IS 151 Lecture 10
wajanga
 
IS 151 Lecture 9
IS 151 Lecture 9IS 151 Lecture 9
IS 151 Lecture 9
wajanga
 
IS 151 Lecture 8
IS 151 Lecture 8IS 151 Lecture 8
IS 151 Lecture 8
wajanga
 
IS 151 Lecture 7
IS 151 Lecture 7IS 151 Lecture 7
IS 151 Lecture 7
wajanga
 
IS 151 Lecture 6
IS 151 Lecture 6IS 151 Lecture 6
IS 151 Lecture 6
wajanga
 
IS 151 Lecture 6
IS 151 Lecture 6IS 151 Lecture 6
IS 151 Lecture 6
wajanga
 

More from wajanga (20)

IS 151 Lecture 3
IS 151 Lecture 3IS 151 Lecture 3
IS 151 Lecture 3
 
IS 151 Lecture 2
IS 151 Lecture 2IS 151 Lecture 2
IS 151 Lecture 2
 
IS 151 Lecture 1
IS 151 Lecture 1IS 151 Lecture 1
IS 151 Lecture 1
 
IS 151 Outline 2014
IS 151 Outline 2014IS 151 Outline 2014
IS 151 Outline 2014
 
IS 139 Assignment 3
IS 139 Assignment 3IS 139 Assignment 3
IS 139 Assignment 3
 
IS 139 Lecture 7
IS 139 Lecture 7IS 139 Lecture 7
IS 139 Lecture 7
 
IS 139 Lecture 6
IS 139 Lecture 6IS 139 Lecture 6
IS 139 Lecture 6
 
IS 139 Assignment 2
IS 139 Assignment 2IS 139 Assignment 2
IS 139 Assignment 2
 
IS 139 Lecture 5
IS 139 Lecture 5IS 139 Lecture 5
IS 139 Lecture 5
 
IS 139 Lecture 4
IS 139 Lecture 4IS 139 Lecture 4
IS 139 Lecture 4
 
IS 139 Assignment 1
IS 139 Assignment 1IS 139 Assignment 1
IS 139 Assignment 1
 
IS 139 Lecture 3
IS 139 Lecture 3IS 139 Lecture 3
IS 139 Lecture 3
 
IS 139 Lecture 1
IS 139 Lecture 1IS 139 Lecture 1
IS 139 Lecture 1
 
IS 151 Lecture 11
IS 151 Lecture 11IS 151 Lecture 11
IS 151 Lecture 11
 
IS 151 Lecture 10
IS 151 Lecture 10IS 151 Lecture 10
IS 151 Lecture 10
 
IS 151 Lecture 9
IS 151 Lecture 9IS 151 Lecture 9
IS 151 Lecture 9
 
IS 151 Lecture 8
IS 151 Lecture 8IS 151 Lecture 8
IS 151 Lecture 8
 
IS 151 Lecture 7
IS 151 Lecture 7IS 151 Lecture 7
IS 151 Lecture 7
 
IS 151 Lecture 6
IS 151 Lecture 6IS 151 Lecture 6
IS 151 Lecture 6
 
IS 151 Lecture 6
IS 151 Lecture 6IS 151 Lecture 6
IS 151 Lecture 6
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

IS 139 Lecture 2

  • 1.  IS 139 Lecture 2 (Introduction – Part 2) Introduction
  • 2. The Computer Level Hierarchy  Computers consist of many things besides chips.  Before a computer can do anything worthwhile, it must also use software.  Writing complex programs requires a “divide and conquer” approach, where each program module solves a smaller problem.  Complex computer systems employ a similar technique through a series of virtual machine layers. 2
  • 3. The Computer Level Hierarchy  Each virtual machine layer is an abstraction of the level below it.  The machines at each level execute their own particular instructions, calling upon machines at lower levels to perform tasks as required.  Computer circuits ultimately carry out the work. 3
  • 4. The Computer Level Hierarchy  Level 6: The User Level  Program execution and user interface level.  The level with which we are most familiar.  Level 5: High-Level Language Level  The level with which we interact when we write programs in languages such as C, Pascal, Lisp, and Java. 4
  • 5. The Computer Level Hierarchy  Level 4: Assembly Language Level  Acts upon assembly language produced from Level 5, as well as instructions programmed directly at this level.  Level 3: System Software Level  Controls executing processes on the system.  Protects system resources.  Assembly language instructions often pass through Level 3 without modification. 5
  • 6. The Computer Level Hierarchy  Level 2: Machine Level  Also known as the Instruction Set Architecture (ISA) Level.  Consists of instructions that are particular to the architecture of the machine.  Programs written in machine language need no compilers, interpreters, or assemblers. 6
  • 7. The Computer Level Hierarchy  Level 1: Control Level  A control unit decodes and executes instructions and moves data through the system.  Control units can be microprogrammed or hardwired.  A microprogram is a program written in a low- level language that is implemented by the hardware.  Hardwired control units consist of hardware that directly executes machine instructions. 7
  • 8. The Computer Level Hierarchy  Level 0: Digital Logic Level  This level is where we find digital circuits (the chips).  Digital circuits consist of gates and wires.  These components implement the mathematical logic of all other levels. 8
  • 9. The von Neumann Model  On the ENIAC, all programming was done at the digital logic level.  Programming the computer involved moving plugs and wires.  A different hardware configuration was needed to solve every unique problem type. 9 Configuring the ENIAC to solve a “simple” problem required many days labor by skilled technicians.
  • 10. The von Neumann Model  Inventors of the ENIAC, John Mauchley and J. Presper Eckert, conceived of a computer that could store instructions in memory.  The invention of this idea has since been ascribed to a mathematician, John von Neumann, who was a contemporary of Mauchley and Eckert.  Stored-program computers have become known as von Neumann Architecture systems. 10
  • 11. The von Neumann Model  Properties of a von Neumann architecture  Data & Instructions are stored in the same memory – are only distinguishable through usage  Only a single memory space – accessed sequentially  Memory is one dimensional  Meaning of data is not stored with it 11
  • 12. The von Neumann Model  Today’s stored-program computers have the following characteristics:  Three hardware systems:  A central processing unit (CPU)  A main memory system  An I/O system  The capacity to carry out sequential instruction processing.  A single data path between the CPU and main memory.  This single path is known as the von Neumann bottleneck. 12
  • 13. The von Neumann Model  This is a general depiction of a von Neumann system:  These computers employ a fetch- decode-execute cycle to run programs as follows . . . 13
  • 14. The von Neumann Model  The control unit fetches the next instruction from memory using the program counter to determine where the instruction is located. 14
  • 15. The von Neumann Model  The instruction is decoded into a language that the ALU can understand. 15
  • 16. The von Neumann Model  Any data operands required to execute the instruction are fetched from memory and placed into registers within the CPU. 16
  • 17. The von Neumann Model  The ALU executes the instruction and places results in registers or memory. 17
  • 18. von Neumann Models - Improvements  Conventional stored-program computers have undergone many incremental improvements over the years.  These improvements include adding specialized buses, floating-point units, and cache memories, to name only a few.  But enormous improvements in computational power require departure from the classic von Neumann architecture.  Adding processors is one approach. 18
  • 19. von Neumann Models - Improvements  In the late 1960s, high-performance computer systems were equipped with dual processors to increase computational throughput.  In the 1970s supercomputer systems were introduced with 32 processors.  Supercomputers with 1,000 processors were built in the 1980s.  In 1999, IBM announced its Blue Gene system containing over 1 million processors. 19
  • 20. Non-von Neumann Models  Typed storage (self-identifying data)  Each operand (data item) carries bits to identify its type  Programs that operate on structures rather than words  Functional approach  Replacing computation as a sequence of discrete operations  Data flow model – order of execution depends on data interdependence 20
  • 21. Conclusion & Further reading You should now be sufficiently familiar with general system structure to guide your studies throughout the remainder of this course. Subsequent lectures will explore many of these topics in great detail. Essentials of Computer Organization & architecture – Linda Null => Chapter 1 21