SlideShare a Scribd company logo
Introduction to Computing Systems
from bits & gates to C & beyond
Chapter 1
Welcome Aboard!
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 2
• What computers consist of
• How computers work
• How they are organized
internally
• What are the design tradeoffs
• How design affects
programming and applications
• How to fix computers
• How to build myself one
real cheap
• Which one to buy
• Knowing all about the
Pentium IV or PowerPC
This course is about:
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 3
Computing Machines
 Ubiquitous ( = everywhere)
 General purpose: servers, desktops, laptops, PDAs, etc.
 Special purpose: cash registers, ATMs, games, telephone
switches, etc.
 Embedded: cars, hotel doors, printers, VCRs, industrial
machinery, medical equipment, etc.
 Distinguishing Characteristics
 Speed
 Cost
 Ease of use, software support & interface
 Scalability
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 4
Two recurring themes
 Abstraction
The notion that we can concentrate on one “level” of the big
picture at a time, with confidence that we can then connect
effectively with the levels above and below.
Framing the levels of abstraction appropriately is one of the most
important skills in any undertaking.
 Hardware vs. Software
On the other hand, abstraction does not mean being clueless
about the neighboring levels.
In particular, hardware and software are inseparably connected,
especially at the level we will be studying.
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 5
What is Computer Organization?
… a very wide semantic gap between the intended behavior and the
workings of the underlying electronic devices that will actually do
all the work.
The forerunners to modern computers attempted to assemble the raw
devices (mechanical, electrical, or electronic) into a separate
purpose-built machine for each desired behavior.
Electronic
Devices
Desired
Behavior
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 6
Role of General Purpose Computers
A general purpose computer is like an island that helps span the gap
between the desired behavior (application) and the basic building
blocks (electronic devices).
Electronic
Devices
Desired
Behavior
General
Purpose
Computer
computer
organization
software
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 7
CPUs: the heart of computing systems
ca 1980
It took 10 of these boards to
make a Central Processing Unit
ca 2000
You can see why they called
this CPU a microprocessor!
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 8
Two pillars of Computing
 Universal Computational Devices
 Given enough time and memory, all computers are capable of
computing exactly the same things (irrespective of speed, size or
cost).
 Turing’s Thesis: every computation can be performed by some
“Turing Machine” - a theoretical universal computational device
 Problem Transformation
 The ultimate objective is to transform a problem expressed in
natural language into electrons running around a circuit!
 That’s what Computer Science and Computer Engineering are all
about: a continuum that embraces software & hardware.
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 9
A Turing Machine
Also known as a Universal Computational Device: a theoretical
device that accepts both input data and instructions as to how to
operate on the data
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 10
Problem Transformation
- levels of abstraction
Natural Language
Algorithm
Program
Machine Architecture
Devices
Micro-architecture
Logic Circuits
The desired behavior:
the application
The building blocks:
electronic devices
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 11
Levels of Abstraction
 These levels do not necessarily correspond
to discrete components, but to well defined
standard interfaces.
 Standard interfaces provide
 portability
 third party software/hardware
 wider usage
 These levels are to some extent arbitrary -
there are other ways to draw the lines.
Natural Language
Algorithm
Program
Machine Architecture
Devices
Micro-architecture
Logic Circuits
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 12
The Program Level
 Most computers run a management
program called the operating system
(OS).
 Application programs interface to the
machine architecture via the OS.
An example:
Application Program
Operating System
Program (Software)
This lecture
PowerPoint
Windows XP
Data
Application Program
Operating System
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 13
The Machine Level - 1
 Machine Architecture
This is the formal specification of all the functions a particular
machine can carry out, known as the Instruction Set Architecture
(ISA).
 Microarchitecture
The implementation of the ISA in a specific CPU - i.e. the way in
which the specifications of the ISA are actually carried out.
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 14
The Machine Level - 2
 Logic Circuits
Each functional component of the microarchitecture is built up of
circuits that make “decisions” based on simple rules
 Devices
Finally, each logic circuit is actually built of electronic devices
such as CMOS or NMOS or GaAs (etc.) transistors.
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
1 - 15
Course Outline - What is Next?
 How to represent information
 The building blocks of computers: logic gates
 The basic algorithm: the von Neumann model
 An example: the LC-3 structure and language
 Programming the machine: assembly language
 A higher-level language: C
Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside
What is next?
1 - 16

More Related Content

Similar to Technology technology.ppt

aftercomputer fax waleed cv
aftercomputer fax waleed cvaftercomputer fax waleed cv
aftercomputer fax waleed cvwaleed seif
 
Cluster Tutorial
Cluster TutorialCluster Tutorial
Cluster Tutorialcybercbm
 
Network emulation with data rates
Network emulation with data ratesNetwork emulation with data rates
Network emulation with data rates
Packet Storm
 
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdfEnabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
John Archer
 
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Introduction to Information Systems Canadian 4th Edition Rainer Solutions ManualIntroduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
BradleyNoels
 
Reconfigurable Computing
Reconfigurable ComputingReconfigurable Computing
Reconfigurable Computingppd1961
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering
JayaKamal
 
Michael L Sawall Tier II Tech
Michael L Sawall Tier II TechMichael L Sawall Tier II Tech
Michael L Sawall Tier II TechMike Sawall
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Honeywell
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
Soetam Rizky
 
Embedded C workshop
Embedded C workshopEmbedded C workshop
Embedded C workshop
Mostafa El-koumy
 
Career in computer Hardware & Networking
Career in computer Hardware & NetworkingCareer in computer Hardware & Networking
Career in computer Hardware & Networking
NavjotKaur124
 
Architecture presentation
Architecture presentationArchitecture presentation
Architecture presentation
Md. Touhidur Rahman
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
Amber Wheeler
 
IJSRED-V2I2P57
IJSRED-V2I2P57IJSRED-V2I2P57
IJSRED-V2I2P57
IJSRED
 
IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015
Aron Kondoro
 
Interactive glossary
Interactive glossaryInteractive glossary
Interactive glossary
Otarola93
 

Similar to Technology technology.ppt (20)

aftercomputer fax waleed cv
aftercomputer fax waleed cvaftercomputer fax waleed cv
aftercomputer fax waleed cv
 
Cluster Tutorial
Cluster TutorialCluster Tutorial
Cluster Tutorial
 
Network emulation with data rates
Network emulation with data ratesNetwork emulation with data rates
Network emulation with data rates
 
U2
U2U2
U2
 
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdfEnabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
 
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Introduction to Information Systems Canadian 4th Edition Rainer Solutions ManualIntroduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
Introduction to Information Systems Canadian 4th Edition Rainer Solutions Manual
 
Reconfigurable Computing
Reconfigurable ComputingReconfigurable Computing
Reconfigurable Computing
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering
 
Michael L Sawall Tier II Tech
Michael L Sawall Tier II TechMichael L Sawall Tier II Tech
Michael L Sawall Tier II Tech
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
 
Embedded C workshop
Embedded C workshopEmbedded C workshop
Embedded C workshop
 
Career in computer Hardware & Networking
Career in computer Hardware & NetworkingCareer in computer Hardware & Networking
Career in computer Hardware & Networking
 
Architecture presentation
Architecture presentationArchitecture presentation
Architecture presentation
 
ResumeRossNagarasan
ResumeRossNagarasanResumeRossNagarasan
ResumeRossNagarasan
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
1. computers introduction
1. computers introduction1. computers introduction
1. computers introduction
 
IJSRED-V2I2P57
IJSRED-V2I2P57IJSRED-V2I2P57
IJSRED-V2I2P57
 
IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015IS 139 Lecture 1 - 2015
IS 139 Lecture 1 - 2015
 
Interactive glossary
Interactive glossaryInteractive glossary
Interactive glossary
 

More from sheryl90

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).ppt
sheryl90
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
sheryl90
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.ppt
sheryl90
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.ppt
sheryl90
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).ppt
sheryl90
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptx
sheryl90
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
sheryl90
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
sheryl90
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.ppt
sheryl90
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdf
sheryl90
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
sheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
sheryl90
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
sheryl90
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
sheryl90
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.ppt
sheryl90
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdf
sheryl90
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.ppt
sheryl90
 
ch03.ppt
ch03.pptch03.ppt
ch03.ppt
sheryl90
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.ppt
sheryl90
 

More from sheryl90 (19)

competitive advantage (1).ppt
competitive advantage (1).pptcompetitive advantage (1).ppt
competitive advantage (1).ppt
 
StrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptxStrategicInformationSystem_Assignment Template.pptx
StrategicInformationSystem_Assignment Template.pptx
 
Chapter10_mis.ppt
Chapter10_mis.pptChapter10_mis.ppt
Chapter10_mis.ppt
 
83172_pp7.ppt
83172_pp7.ppt83172_pp7.ppt
83172_pp7.ppt
 
wipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).pptwipo_smes_kul_06_www_68913 (1).ppt
wipo_smes_kul_06_www_68913 (1).ppt
 
kumar.pptx
kumar.pptxkumar.pptx
kumar.pptx
 
OpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.pptOpenSourceLicensingPowerPointPresentation.ppt
OpenSourceLicensingPowerPointPresentation.ppt
 
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
1._pmc_2019_day_1_project_initiation_and_planning_final.pptx
 
competitive advantage.ppt
competitive advantage.pptcompetitive advantage.ppt
competitive advantage.ppt
 
shidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdfshidiajisajiq-130116094406-phpapp02.pdf
shidiajisajiq-130116094406-phpapp02.pdf
 
969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt969_powerpoint_on_data_protection.ppt
969_powerpoint_on_data_protection.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
con_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.pptcon_mangt-lec4-project_costppt.ppt
con_mangt-lec4-project_costppt.ppt
 
Chapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptxChapter 2 Types of Law applicable in Malaysia.pptx
Chapter 2 Types of Law applicable in Malaysia.pptx
 
wipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.pptwipo_smes_kul_06_www_68913.ppt
wipo_smes_kul_06_www_68913.ppt
 
typesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdftypesofinformationsystems-121218091037-phpapp01.pdf
typesofinformationsystems-121218091037-phpapp01.pdf
 
IS-Overview.ppt
IS-Overview.pptIS-Overview.ppt
IS-Overview.ppt
 
ch03.ppt
ch03.pptch03.ppt
ch03.ppt
 
ch01_02.ppt
ch01_02.pptch01_02.ppt
ch01_02.ppt
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Technology technology.ppt

  • 1. Introduction to Computing Systems from bits & gates to C & beyond Chapter 1 Welcome Aboard!
  • 2. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 2 • What computers consist of • How computers work • How they are organized internally • What are the design tradeoffs • How design affects programming and applications • How to fix computers • How to build myself one real cheap • Which one to buy • Knowing all about the Pentium IV or PowerPC This course is about:
  • 3. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 3 Computing Machines  Ubiquitous ( = everywhere)  General purpose: servers, desktops, laptops, PDAs, etc.  Special purpose: cash registers, ATMs, games, telephone switches, etc.  Embedded: cars, hotel doors, printers, VCRs, industrial machinery, medical equipment, etc.  Distinguishing Characteristics  Speed  Cost  Ease of use, software support & interface  Scalability
  • 4. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 4 Two recurring themes  Abstraction The notion that we can concentrate on one “level” of the big picture at a time, with confidence that we can then connect effectively with the levels above and below. Framing the levels of abstraction appropriately is one of the most important skills in any undertaking.  Hardware vs. Software On the other hand, abstraction does not mean being clueless about the neighboring levels. In particular, hardware and software are inseparably connected, especially at the level we will be studying.
  • 5. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 5 What is Computer Organization? … a very wide semantic gap between the intended behavior and the workings of the underlying electronic devices that will actually do all the work. The forerunners to modern computers attempted to assemble the raw devices (mechanical, electrical, or electronic) into a separate purpose-built machine for each desired behavior. Electronic Devices Desired Behavior
  • 6. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 6 Role of General Purpose Computers A general purpose computer is like an island that helps span the gap between the desired behavior (application) and the basic building blocks (electronic devices). Electronic Devices Desired Behavior General Purpose Computer computer organization software
  • 7. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 7 CPUs: the heart of computing systems ca 1980 It took 10 of these boards to make a Central Processing Unit ca 2000 You can see why they called this CPU a microprocessor!
  • 8. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 8 Two pillars of Computing  Universal Computational Devices  Given enough time and memory, all computers are capable of computing exactly the same things (irrespective of speed, size or cost).  Turing’s Thesis: every computation can be performed by some “Turing Machine” - a theoretical universal computational device  Problem Transformation  The ultimate objective is to transform a problem expressed in natural language into electrons running around a circuit!  That’s what Computer Science and Computer Engineering are all about: a continuum that embraces software & hardware.
  • 9. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 9 A Turing Machine Also known as a Universal Computational Device: a theoretical device that accepts both input data and instructions as to how to operate on the data
  • 10. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 10 Problem Transformation - levels of abstraction Natural Language Algorithm Program Machine Architecture Devices Micro-architecture Logic Circuits The desired behavior: the application The building blocks: electronic devices
  • 11. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 11 Levels of Abstraction  These levels do not necessarily correspond to discrete components, but to well defined standard interfaces.  Standard interfaces provide  portability  third party software/hardware  wider usage  These levels are to some extent arbitrary - there are other ways to draw the lines. Natural Language Algorithm Program Machine Architecture Devices Micro-architecture Logic Circuits
  • 12. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 12 The Program Level  Most computers run a management program called the operating system (OS).  Application programs interface to the machine architecture via the OS. An example: Application Program Operating System Program (Software) This lecture PowerPoint Windows XP Data Application Program Operating System
  • 13. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 13 The Machine Level - 1  Machine Architecture This is the formal specification of all the functions a particular machine can carry out, known as the Instruction Set Architecture (ISA).  Microarchitecture The implementation of the ISA in a specific CPU - i.e. the way in which the specifications of the ISA are actually carried out.
  • 14. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 14 The Machine Level - 2  Logic Circuits Each functional component of the microarchitecture is built up of circuits that make “decisions” based on simple rules  Devices Finally, each logic circuit is actually built of electronic devices such as CMOS or NMOS or GaAs (etc.) transistors.
  • 15. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside 1 - 15 Course Outline - What is Next?  How to represent information  The building blocks of computers: logic gates  The basic algorithm: the von Neumann model  An example: the LC-3 structure and language  Programming the machine: assembly language  A higher-level language: C
  • 16. Copyright © 2003 The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Slides prepared by Walid A. Najjar & Brian J. Linard, University of California, Riverside What is next? 1 - 16