Upload
john-mcconnachie
View
215
Download
0
Embed Size (px)
Citation preview
8/8/2019 Higher Comp. Comp Syst
1/13
Computer Systems
Ron Loan Currie Community High School 1
1. Data Representation
i. The Binary System
Reasons for using binary
Easy to represent ON and OFF as 0 Volts and a higher voltage
(often above 1V nominally 5V).
Fewer rules needed with binary (0, 1) arithmetic than with decimal
(0..9) arithmetic.
Any loss of voltage due to resistance etc does not change value.
Easy to represent 0, 1 with other devices e.g. pits and lands on a CD-
ROM or directions of magnetic field on a hard disc.
Binary Arithmetic
Bits a binary digit.
Byte 8 bits
Kilobyte 1024 bytes (210 bytes)
Megabyte 1024 x 1024 bytes
Gigabyte 1024 x 1024 x 1024 bytes
Terabyte 1024 x 1024 x 1024 x 1024 bytes
Place Values
the values are doubled as you add more digits starting from the least
significant bit128 64 32 16 8 4 2 1
Converting between binary and decimal
Add the place values e.g. 1011 1001 = 1 +8 + 16 + 32 + 128 = 185 indecimal
Converting between decimal and binaryDivide repeatedly by 2.
ii. Storing NumbersPositive integers are stored as described aboveNegative integers are stored either using signed bit or 2s complement.Signed Bit The most significant bit is 0 if the number is +ve, 1 if ve.
However there are two zeroes (+0 and 0) and the ordinary
rules of arithmetic dont work.
2s complement To find the 2s complement of a number change all 0s to1s and 1s to 0s. Then add 1.
Only one zero and all the ordinary rules of arithmetic work.The most significant bit will be a 1 if the number is ve.
Least significant bitMost significant bit
8/8/2019 Higher Comp. Comp Syst
2/13
Computer Systems
Ron Loan Currie Community High School 2
Floating Point Numbers are stored using mantissa and exponent. E.g. 1011.11 is
equal to .101111 X 2 100 (since 100 in binary is 4 indecimal and the point has been moved 4 places)
This is stored as 101111 in the mantissa, 100 as the
exponent.Because of the number of bits being used to store the
number is limited. The mantissa cannot be exactly accurate.
Increasing the number of bits used to store the mantissa can
increase precision (accuracy); increasing the number of bits
used to store the exponent increases the range of numbersthat can be stored.
iii. Storing Text
character a symbol or letter on the keyboard. A list of all the characters acomputer can process is called the character set.
ASCII American Standard Code for Information Interchange is an agreed 7-
bit code, which gives 128 characters. Text data is stored using an 8-bit code;
the 8th bit either being used for parity checking or to extend the number of
characters.
UNICODE a 16 bit agreed code covering characters from more languages.The lowest numbers are the same codes as ASCII.
iv. Storing Graphics
Graphics are made up of dots and on screen displayed using pixels (picture
elements). For black and white, each pixel can be set ON with the value 1 orOFF with the value 0. For colour, more bits are needed for each pixel. E.g. a
colour bit depth of 8 bits allows 28 (256) different colours.
Bitmapped images store the screen display as a set of values of each pixel
colour for the whole document. This can use a large amount of memory.
File size = height x breadth x colour depth.Compression is used to reduce the file size of bitmapped images. Photographs
are typical bit mapped images.
Vector graphicsjust store the attributes of each object e.g. for a circle, object
number, type of object, X and Y coordinates of centre, radius, line thickness,
line colour, fill colour, line pattern, fill pattern. Vector graphics use less
memory and are resolution independent, as the resolution of the screen does
not affect the stored details.
2. Computer Structure
i. The Two state machine
The processing and storage devices have only two states ON and OFF,
represented using the binary system - 1 and 0.
8/8/2019 Higher Comp. Comp Syst
3/13
Computer Systems
Ron Loan Currie Community High School 3
ii. The Structure of the Central Processing Unit (CPU)
In a microcomputer, this consists of a microprocessor, containinga control unit, arithmetic and logic unit (ALU) and registers.
The control unit controls the fetching, decoding and executing of instructions.
The ALU carries out the calculations and the logic operations.
The registers are a group of storage locations within the microprocessor that
are used temporarily to hold: data being processed,
instructions being executed and
addresses to be accessed.
Buses are the sets of wires connecting the CPU to the mainmemory and peripherals
Address Bus carries address information from the CPU to main memory or
peripherals. It is unidirectional. The width of the address bus determines the
maximum amount of memory that the computer can have. This is 2n
where n
is the width of the address bus.Data Bus carries data between the CPU and the memory or peripherals.
During a write operation data is carried from the CPU and in a read operation,
to the CPU. It is bi-directional. The width of the data bus determines how
much data can be transferred in a single operation.
Control Bus is made up of a number of separate wires, connecting the controlunit to memory and peripherals.
Read and Write wires
Clock wire carries clock pulses, which keep the CPU and other units instep. The clock rate is measured in hertz (MHz or GHz).
Interrupt wires carry signals to the CPU, which can cause the CPU tobreak in the carrying out of its program. The CPU may be able to
ignore the interrupt (maskable) or not (non-maskable interrupt - NMI).Reset line is used to return the CPU to its initial state. E.g. used to
recover from crashes.
Memory AddressRegister
Memory DataRegister
Control Unit
MoreRegisters
Arithmeticand LogicUnit (ALU)
MainMemory
Address Bus
Data Bus
Control Bus
Read & Write
8/8/2019 Higher Comp. Comp Syst
4/13
Computer Systems
Ron Loan Currie Community High School 4
iii. The Fetch Execute Cycle
Program instructions are got (fetched) one at a time from main memory,decoded and then carried out (executed).
The CPU fetches the instructions and data in the program from memory. This is
a read operation. The program may require data to be put into memory a
write operation.
Memory Read Operation Memory Write Operation
1. The required memory address is put in
the Memory Address Register.
1. The required memory address is put
in the Memory Address Register.
2. The control unit activates the Read
Line.
2. The value to be written is put into the
Memory Data Register
3. The contents of the memory at the
address are put on the data bus and
into the Memory Data Register
3. The control unit activates the Write
Line.
4 The contents of the Memory Data
Register are transferred by the data
bus to the required memory address.
iv. Memory Registers, Cache and Main Memory
Main memory consists of memory locations each with a unique address.
Each location can hold a word. A word is the number of bits of data that can
be processed in a single operation by the CPU. The word length is the same as
the width of the data bus. There are two types of main memory RAM and
ROM.
Random Access Memory
RAM is volatile memory - data held in RAM is lost when the power is
switched off. RAM holds the computers programs and data while they arebeing processed.
DRAM (Dynamic RAM) is normal RAM and needs to have its contents
refreshed otherwise the contents are lost.
SRAM (Static RAM) doesnt need refreshed as long as power is applied. It is
used for holding date etc when the computer is switched off; power beingsupplied by a rechargeable battery. SRAM is also fast and used for cache
memory.
Cache memory is memory close to (or in) the processor, which is used to
hold often-used instructions to speed up processing.
VRAM (Video RAM) is used to hold the data, which makes up the screendisplay. It is related to the number of colours and screen resolution. It may be
part of the main memory or, more usually, on a separate graphics card.
Read Only Memory
ROM is permanent memory data is retained when the power is switched off.
ROM is used to hold programs and data permanently, the data being fixedduring manufacture. In computers with a disc-based operating system, ROM
8/8/2019 Higher Comp. Comp Syst
5/13
Computer Systems
Ron Loan Currie Community High School 5
is used to hold the bootstrap loader program, which loads the operating system
from disc.In some games machines, ROM cartridges are used to hold software and ROM
is used in many digital automated systems.
Virtual Memory
With limited memory, there may be insufficient room for the required
program(s) and data. Virtual memory uses the hard disc as a temporary
storage area and swaps programs and data between memory and hard disc as
required. This is much slower than just using RAM.
Speed of Memory Access
Processor registers are accessed fastest, cache memory in the processor next,
then the cache outside the processor, the main memory and slowest is virtual
memory on disc.
v. Factors that Affect System Performance
System Performance can be measured using MIPS (millions ofinstruction per second), FLOPS (floating point operations per second) orBenchmarks (timing the computer carrying out tasks such as recalculating in aspreadsheet or redrawing complex graphics)
Bus Width
Increasing the data bus width will increase the amount of data fetched in eachcycle and hence increase system performance.
Increasing the width of the address bus increases the maximum amount of
memory that the computer could have. More memory allows more programs
and data to be loaded at the same time, which can improve productivity. Also
with a larger memory, slower virtual memory does not need to be used as
often.
Clock Speed
The clock generates a series of pulses at a constant rate, which keeps
everything that the CPU does in time. The faster the clock speed, the faster
the operations will be carried out. Remember that the overall speed isdetermined by the slowest component.
Memory
Adding more memory can speed up the computer (see i above). Also some
memory has faster access time than other types. Use ofcache memory made
of fast static RAM can also improve performance.
Speed of data transfer to peripheral devices
Speeds of Interfaces increasing e.g. USB 1 USB 2, Firewire 400 Firewire 800.
Cables are being replaced by Wireless communication between CPU andperipheral e.g. WIFI and Bluetooth
8/8/2019 Higher Comp. Comp Syst
6/13
Computer Systems
Ron Loan Currie Community High School 6
3. Peripherals
i. Buffers and Spoolers
A buffer is an area of memory used for the temporary storage of data beingtransferred between computer and peripheral. It compensates for any
difference in their speeds, e.g. a printer buffer. A printer spooler is a
program that uses fast backing storage such as hard disk for the temporary
storage of print data. This is printed as a background task while the user
continues his/her work the foreground task.
ii. Hardware
Hardware should be selected in terms of appropriate characteristics including
resolution, capacity, speed, cost and compatibility
iii. Solid State Storage DevicesExamples include digital camera flash card storage or USB memory sticks.Advantages are small size, speed of data transfer and the fact that there are no
moving parts which could wear out and break down.
iv. Interfaces
An interface is the hardware (and associated software) needed to allow
communication between the CPU and peripheral devices and to compensate forany differences in their characteristics.
Functions of an Interface will include some of the followingBuffering holding data temporarily while in transit between the CPU and
peripheral.Data Conversion changing data into a form the CPU can understand and
vice-versa - protocol conversion e.g. serial to parallel, voltage conversionHandling Status Information to show whether the device is ready to
receive or send data e.g. is the printer ready or out of paper.
v. Serial and Parallel Transmission of data between devices
Serial Data Transmission sends the bits of the data one after each other
along the same data line. Relatively slow but more efficient over longdistances.Parallel Data Transmission sends the bits of data along separate lines at
the same time. This is fast but only suitable for short distances.
8/8/2019 Higher Comp. Comp Syst
7/13
Computer Systems
Ron Loan Currie Community High School 7
3. Networking
i Nodes and Channels Networked computers can exchange data and messages.
Each computer on the network is called a station, terminal or node. They can
be connected by different means e.g. by cable, which could be wire (most
common is UTP Unshielded Twisted Pair) or optical fibre or radio(wireless) links. The means of connection is the communications channel.
ii Mainframe
This is very large computer, which may be connected to hundreds of
terminals, many of which may be dumb terminals with no processing power.
Most of the processing will be done by the mainframe processor, which sharesits time between the terminals a multi-access system.
iii Types of Network LAN Local Area Network commonly using UTP wire cable (perhaps withoptical fibre) or wireless.
WAN Wide Area Network may use public communication channels e.g.
telephone lines wire, optical fibre, microwave.
Intranet private network which may be local or covering a wider area, using
same protocols (TCP/IP) as the Internet. Secure intranets are much less
expensive to build and manage than private networks based on other protocols.Client Server Network has dedicated servers, which provide facilities such as
file serving, print serving, web serving or mail serving for the client machines
the other stations on the network.
Peer to Peer Network is similar to the client server network but each stationusually deals with its own storage.
iv File, Print and Web ServersIn the client/server model, a File Server is a computer responsible for the
central storage and management of data files so that other computers on the
same network can access the files.
A Web Server is a program often running on a dedicated computer, which
uses the web protocol, HTTP, to serve out files that form Web pages to Webusers (whose computers contain HTTP clients web browser programs).
Every computer on the Internet that hosts a Web site must have a Web server
program.
A Print Server is a program, a network device, or computer that manages
print requests and makes printer queue status information available to users.
v Network topologies can be Bus, Star, Tree, Mesh, and Ring etc.Consequences of channel and node failure need to be known.
8/8/2019 Higher Comp. Comp Syst
8/13
Computer Systems
Ron Loan Currie Community High School 8
vi Network hardwareAnetwork interface card(NIC) is an electronic card fitted to a computer. It
provides a dedicated full-time connection to a network and has a unique
hardware address.Ahub is common connection point for segments of a LAN. A hub contains
multiple ports. When a packet arrives at one port, it is copied to the other ports
so that all segments of the LAN can see all packets.Aswitch actually reads the destination address (the hardware address of the
NIC) on each packet and then forwards the packet to the correct port on theswitch.
Arouter is connected between networks, commonly two LANs or WANs. A
router keeps tables of the states of the networks it is connected to and uses
these to decide which way to send each information packet.
vii Trends in NetworksBandwidth In computer networks, means the same as data transfer rate - theamount of data that can be carried from one point to another in a given timeusually expressed in bits (of data) per second (bps) or bytes per second (Bps).
Network bandwidth is steadily increasing.Wireless networks are becoming more popular.
viii Misuse of NetworksMisuse covered by the following Acts in British Law.
Misuse of Computers Act
Makes hacking (attempting to access to computer data without
authorisation) a criminal offence. Writing or wilful distribution of viruses made illegal.
Data Protection Act
Protects personal data
Principles include
o Data controllers who use personal data must register,
o Data must be processed lawfully.
o Data must be accurate
o Subjects have right to find out what data is held about them
only and have it corrected if wrong.
o If subject can show that they have suffered because datawas wrong they can take legal action for compensation.
Exemptions include National Security
Copyright, Designs and Patents Act
Gives the creators rights to control ways their material can be
copied or distributed. .
Computer programs and pages on websites (text, pictures etc.) areprotected.
8/8/2019 Higher Comp. Comp Syst
9/13
Computer Systems
Ron Loan Currie Community High School 9
1. Systems Software
i Operating System
Single User OS
This is a program that controls the entire operation of thecomputer and any devices that are attached to it.
The OS is often thought of as a series of modules orlayers. One design is shown.
Command Language Interpreter is the layer that the user
interacts with to give instructions to the computer. It can be
command-driven, menu-driven or a GUI which may use a
WIMP system.Memory Management System controls where programs and
data are placed in main memory. Many OSs allow more thanone program to be in memory at the same time. MMS tries to make
sure that any program does not overwrite any other program
(including the OS itself!).
File Management System deals with the user of the computers backing
storage devices. It uses part of the disc as a file catalog, which holds details of
where data is stored on disc. Files are organised into a hierarchical filing
system storing files in separate directories and subdirectories.
Input Output System communicates directly with peripherals and handles the
transfer of data between peripherals and the CPU.Kernel manages processes (when a program runs it starts a process and this
may start further processes) and handles interrupts.
The layers work together to carry out operations, data being passed between them.
Resource allocation
The OS allocates resources to other programs such as applications. For example:
Scheduler to share processor - batch, foreground/background, timesharing
Memory management e.g. Virtual memory paging, swapping memory
contents to hard disc
ensures drivers are given access to hardware devices
Mechanisms for accounting; limit enforcement - e.g. no. of pages printed, file
space per user etc.
Operating system can be ROM based or disc based
If disc based, then there must be a small part of the OS in ROM the bootstrap
loader to load the main OS from disc to RAM.
Network Operating SystemsA Network OS provides all the features of a single user OS with the addition of the
following.
Multi-user access and security. If more than one person can access thesystem, then they need to log on by giving an ID and password.
Kernel
I/O
FMS
MMS
CLI
8/8/2019 Higher Comp. Comp Syst
10/13
Computer Systems
Ron Loan Currie Community High School 10
File Server. Different users have different levels of access to the files e.g. file
read and write privileges for a certain file.Print Server. The OS may provide a print server program to queue print jobs
for all users, using a central printer spooler.
ii. Utility Software
Utility programs are programs that aid the maintenance of the computer. They are not
normally essential for the running of the computer and are usually kept on disk until
needed. They include:
Virus Checkers
Scans discs/memory for viruses see below.
Disk Editors
Allows the user to view the bytes of data held on disc and make changes tothem. This is useful if disc errors occur to allow for data to be repaired or
parts of files to be extracted.Disk Defragmenter
When disks have been used many times (i.e. files saved and deleted from
them), as the disc fills up, free space appears between sectors with data, files
have to be split up into these gaps as there is no room to save them in one
continuous place. This makes loading programs slow as lots of fragments of
file have to be found and linked. The defragmenter program move filesaround on disk until they are all stored in consecutive sectors and the free
space is maximised.
iii. Standard Graphics File Formats
Supported across a wide range of operating systems and application software.
compressionColourdepth
Supportstransparency
Supportedon Web
Pages
Used for
Jpeg JointPhotographic
Expert Group
Yes, lossy
Compression
can be varied.
More
compression,
less resolution
Up to 24bit
No yesPhotographs,pictures on Web
Gif Graphics
Interchange
Format
Yes, lossless Up to 8 bit Yes YesWeb Graphics
with blocks ofcolour
TIFF Tagged
Image File
Format
Not in standardTIFF
24 bitcolour or 8
bitgreyscale
No NoSaving high
resolution
graphics.
8/8/2019 Higher Comp. Comp Syst
11/13
Computer Systems
Ron Loan Currie Community High School 11
iv. Malicious Programs
i. Definition of a Virus
A computer virus is a small program written to alter the waya computer operates, without the permission or knowledgeof the user. A virus executes itself and will replicate.
For example, it may replace other executable files with a copy of the virusinfected file. Viruses can infect desktop computers and network servers alike.
ii. Types of Virus
File viruses
infect program files. These viruses normally infect executable code,
such as .com and .exe files.
They can infect other files when an infected program is run from
floppy, hard drive, or from the network
Boot sector viruses
infect the system area of a disk-that is, the boot record on floppy disks
and hard disks.
activate when the user attempts to start up from the infected disk.
Macro viruses
The virus code written as a macro mainly infects data files (especiallyMicrosoft Office files.)
Because of the ease with which these viruses can be created, there are
now thousands of them in circulation.
iii Virus Actions
Replication
They spread as files are copied and sent between computer users.
Camouflage
It is possible for a virus to avoid detection by changing its
characteristics from that which detection software is programmed to
look for.
Watching
The virus damage routines may activate when certain conditions aremet e.g. opening a particular application or on a particular date.
Delivery
This is how the virus gets from one computer to another.
o Infected disks brought in from the outside
o E-mail now provides the ideal delivery vehicle.
8/8/2019 Higher Comp. Comp Syst
12/13
Computer Systems
Ron Loan Currie Community High School 12
iv. Trojan Horses
The difference between Trojan horse programs and true viruses is thatTrojans do not replicate themselves.
Trojans contain malicious code that when triggered cause loss, or even
theft, of data.
For a Trojan horse to spread, you must, invite these programs onto
your computers--for example, by opening an email attachment or
downloading and running a file from the Internet.
v. Worms
Worms spread from computer to computer, but unlike a virus they do
not infect other files.
A worm takes advantage of data transport features on your system e.g.
using email, which allows it to travel unaided. It could send out
hundreds or thousands of copies of itself. The end result in most cases is that the worm consumes too much
system memory (or network bandwidth), causing Web servers,
network servers, and individual computers to stop responding.
vi. Antivirus techniques
Virus signature
This is a unique pattern of bits within a virus code.
The anti-virus software searches for the presence of the virus signature
and may remove it.
Useful only for known viruses.
Checksum
This is created by an algorithm from the bytes that make up a file
creating a unique numeric code that represents the file.
Any subsequent change to the file by a virus will produce a change in
the checksum calculation.
Heuristic detection
describes the technique of finding unknown viruses by looking forcharacteristics in files that from experience been associated with
known viruses. Heuristics can detect a virus that has disguised its signature, by
recognising a particular characteristic of the virus attributes or
behaviour.
Occasionally can stop legitimate programs running.
Memory Resident Monitoring Memory Resident programs operate in the background, while other
programs are running, unlike virus scanner programs which operate inbatch mode, scanning files as requested by the user
They take up memory and processor time tending to cause a slowing
down of the system and can cause false alarms.
8/8/2019 Higher Comp. Comp Syst
13/13
Computer Systems
Ron Loan Currie Community High School 13
3. Application Software
Types of Application Software (and Contemporary Software)
i. Text e.g. Text Editor (Wordpad), Word Processor (Word)ii. Number e.g. Spreadsheet (Excel) or Accounting (Money)
iii. Data e.g. Database (Access, FileMaker)
iv. Communications e.g. WWW browsers (Internet Explorer,Firefox), Email (Outlook)
v. Graphics e.g. painting (Photoshop), drawing (Illustrator,
Freehand), CAD (AutoCAD)
vi. Multimedia e.g. presentation (PowerPoint), multimedia authoring(Macromedia Director)
vii. Integrated 2 or more applications in a single program
(AppleWorks). It is easy to link data between them and they have
a common HCI.viii. Page Layout or Desktop Publishing (PageMaker, InDesign,
Quark Express)