BITH102 Foundations of Computer Hardware
BITH102 Foundations of Computer Hardware
BITH102 Foundations of Computer Hardware
Foundations of Computer
Hardware
Module BITH102
Author: Tafadzwa Zimucha
Master of Science in Computer Science (University
of Zimbabwe)
Bachelor of Science, Computer Science &
Mathematics (University of Zimbabwe)
Mount Pleasant
Harare, ZIMBABWE
You also need to be open-minded, frank, inquisitive learning package together with the sources to
and should leave no stone unturned as you analyze which you are referred. Fully-fledged lectures
ideas and seek clarification on any issues. It has can, therefore, be misleading as the tutor may
been found that those who take part in tutorials dwell on matters irrelevant to ZOU course.
actively, do better in assignments and examinations
because their ideas are streamlined. Taking part Distance education, by its nature, keeps the tutor
properly means that you prepare for the tutorial and student separate. By introducing the six hour
beforehand by putting together relevant questions tutorial, ZOU hopes to help you come in touch
and their possible answers and those areas that with the physical being, who marks your
cause you confusion. assignments, assesses them, guides you on
preparing for writing examinations and
Only in cases where the information being assignments and who runs your general academic
discussed is not found in the learning package can affairs. This helps you to settle down in your
the tutor provide extra learning materials, but this course having been advised on how to go about
should not be the dominant feature of the six hour your learning. Personal human contact is,
tutorial. As stated, it should be rare because the therefore, upheld by ZOU.
information needed for the course is found in the
Note that in all the three sessions, you identify the areas
that your tutor should give help. You also take a very
important part in finding answers to the problems posed.
You are the most important part of the solutions to your
learning challenges.
Introduction
BIT102 Foundations of Computer Hardware is one of the courses offered
by Faculty of Information Technology and Multimedia Communication at Zim-
babwe Open University (ZOU). The course first gives an insight of circuit
design and implementation as integrated circuits are the building blocks of
computer hardware. Further, the course demystifies the structure, functions
and evolution of the basic computer hardware components. Emphasis is given
to how each hardware component is installed, configured and troubleshoot.
The course also gives introductory remarks regarding the installation and con-
figuration of software that support the hardware.
Foundations of Computer Hardware Module BITH102
Course Audience
This module aims to impart knowledge in detail to an open and distance learner
regarding the foundations of computer hardware. The open and distant learner
will have the opportunity to learn, visualise, think and apply principles learn in
this course to everyday scenarios.
Study Schedule
It is a standard ZOU practice that learners accumulate 40 study hours for
every credit hour. As such, for a three-credit hour course, you are expected
to spend 120 study hours. Table 1 gives an estimation of how the 120 study
hours could be accumulated.
Table 1: Estimation of Time Accumulation of Study Hours
Objectives
By the end of this course, you should be able to:
Objectives: This section refers to what you should achieve after you have
completely gone through a unit. As you go through each unit, you should
frequently refer to these Objectives. By doing this, you can continuously gauge
your progress of digesting the unit.
Summary: You can find this component at the end of each unit. This compo-
nent helps you to recap the whole unit. By going through the summary, you
should be able to gauge your knowledge retention level. Should you find
points inside the summary that you do not fully understand, it would be a
good idea for you to revisit the details from the module.
Key Terms: This component can be found at the end of each unit. You should
go through this component to remind yourself of important terms or jargons
used throughout the module. Should you find terms here that you are not able
to explain, you should look for the terms from the module.
1.0 Introduction
I
n this chapter we give a comprehensive guide to you regarding fundamen
tals of how logic design and switching circuits are structured from a hard
ware perspective. We further spells out the relevance of digital systems
and the need to understand different number formats. You will be equipped
with the knowledge of how to design, implement and simplify logic circuits
through Boolean algebra and Karnaugh Maps.
Foundations of Computer Hardware Module BITH102
1.1 Objectives
By the end of the unit, you should be able to:
Analogue signals
These are quantities that are represented using proportional variables and
proportional indicators. The resulting signal is continuous and takes infinite
values within a given range of values. In other words, analogue signals take
non-discrete values within a given range. For example, the speedometer of
cars use analogue signals. The speed of the car is always proportional to the
deflection of the speedometer needle. Accordingly, when the car reduces
speed, the needle fluctuates until the car stops when the speedometer reads
zero. Additionally, microphones generate electrical analogue signals with varying
voltage outputs. However, it can be noted that analogue signals are more
susceptible to noise during transmission thus reducing the accuracy of these
types of signals. Analogue instruments consume a large amount of power but
utilizes less bandwidth. Hence, these types of signals are best suited for video
and audio transmission.
Digital Signals
These represent quantities using symbols called digits. The signals take dis-
crete values in a finite set of possible values to represent information. The
speed on car dashboards can now be measured digitally. Digital clocks measure
time using decimal digits that represent hours, minutes and seconds. This re-
sults in a digital clock being more precise and accurate compared to analogue
driven wall clocks. Digital devices consume a negligible amount of power but
consume a large amount of bandwidth. Digital signals are denoted using square
waves and are immune to noise during data transmission as they take exact
values. Hence, digital signals are best applied in computing and electronics.
Diagrams
Activity 1.1
1. Compare and contrast digital and analogue signal.
? 2. Critically analyse the drawbacks of using digital signal.
3. Discuss the future of digital technology.
For example in decimal number systems, the number 632.51. The 6 repre-
sents hundreds, 3 represents tens, 2 units, 5 tenths and 1 hundredth. Com-
puters are digitals systems that utilise binary number systems in the design and
implementation of simple and accurate electronic circuits. Binary quantities
have only two possible conditions for example open (0) switch or closed (1)
switch. Different combinations of zeros and ones yield patterns that when
matched are used in everyday applications such as opening and closing doors.
It is important to note that exact values of voltages are not important when
dealing with digital systems compared to analogue systems which require ex-
act values. For example, binary 1 may be used to represent a voltage range of
2 to 5, a binary 0 may represent voltage range of 0 to 0.8 whilst a range of 0.8
to 2 are invalid voltages that are not used. Hence digital circuits respond to
predefined range of values. The way in which digital circuits responds to input
values is called the circuit’s logic as it obeys the predefined logic rules thus
digital circuits are also referred to as logic circuits.
Example 1.
11001 base 2 to base 10
1 1 0 0 1
(2^4x1)+(2^3x1)+(2^2x0)+(2^1x0)+(2^0x1)=16+8+0+0+1=25
Example 2
1011.101 base 2 to base10
1 0 1 1 . 1 0 1
(2^3x1)+(2^2x0)+ (2^1x1)+(2^0x1)+(2^-1x1)+(2^-2x0)+(2^-
3x1)=8+0+2+1+0.5+0.125
=11.625
Example 1
15 in base 10 to binary
15/2=7 rem 1
7/2=3 rem 1
3/2=1 rem 1
1/2= 0 rem 1
Example 2
26 base 10 to binary
26/2=13 rem 0
13/2=6 rem 1
6/2=3 rem 0
3/2=1 rem 1
1/2=0 rem 1
2 4 0
160/8=20 rem 0
20/8=2 rem 4
2/8=0 rem 2
Octal Digit 0 1 2 3 4 5 6 7
Binary 000 001 010 011 100 101 110 111
Equivalent
5 3 2
Example 1
101011010 base 2 to octal
5 3 2
Example 2
1110010 base 2 to octal
1 6 2
Example 1
290 base 16 to decimal
2 9 0
=656 base10
Example 2
37AF base 16 to decimal
3 7 A F
12288+1792+160+15
14 255 base 10
Example 1
656 base 10 to hexadecimal
656/16=41 rem 0
41/16=2 rem 9
2/16=0 rem 2
Example 2
14255 base 10 to hexadecimal
14255/16=890 rem 15
890/16=55 rem 10
55/16= 3 rem 7
3/16=0 rem 3
Example 1
BA6 base 16 to binary
B A F
=101110101111 base 2
Example 2
82CD base 16 to binary
8 2 C D
=1000000111001101 base 2
Example 1
101011111 base 2 to hexadecimal
1 5 F
Example 2
11001110001 base 2 to hexadecimal
6 7 1
Activity 1.2
1. Convert 64.75 base 10 to binary.
? 2. Convert 8157 base 10 to hexadecimal then to binary.
3. Convert 100001110110101 base 2 to octal and hexadecimal.
4. Convert ABCD base 16 to octal.
5. Convert 765 base 8 to hexadecimal
6. Convert C43 base 16 to binary.
Logic gates are the building blocks for logic circuits and digital systems. These
logic gates are constructed from diodes, transistors and resistors connected
in such a manner that the circuit output results from basic operations per-
formed on the input variables.
There are three basic logic operations on Boolean algebra namely OR, AND
and NOT.
Truth tables
These are combinations that describe a logic circuit’s output in relation to the
circuit’s input. The input combinations on a truth table are denoted as 2^N
where N is the number of variables or inputs. For example, if we have three
variables A, B, C then 2^3=8. This means that we have 8 different combina-
tions on the input values.
The OR operation
Suppose we have two inputs/variables A and B. Let x denote the output.
Then x=A+B is defined as x equals A OR B. The truth table of the OR opera-
tion has an output of 1 provided that one of the inputs is a 1 otherwise the
output is a zero. The OR gate as depicted in the diagram performs an OR
operation on the circuit’s inputs as defined on the truth table.
Truth Table
A B x=A+B
0 0 0
0 1 1
1 0 1
1 1 1 Logic gate
Truth Table
A B C x=A+B
0 0 0 0
0 0 1 1
0 1 0 1
0 1 1 1
1 0 0 1
1 0 1 1
1 1 0 1
1 1 1 1
Logic gate
A
C X=A+B+C
A B x=AB
0 0 0
0 1 0
1 0 0
1 1 1
Truth Table
A B C x=AB
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 0
1 0 0 0
1 0 1 0
1 1 0 0
1 1 1 1
Logic gate
A
B X=ABC
Example1
X=A (B+C)
B B+C
C A (B+C)
A
Example 2
x= (AB)+(CD)
A AB
B
x= (AB)+(CD)
C CD
D
Suppose input variables have not been put in brackets, then the ordinary law
of algebra applies.
For example E.F+C. We firstly perform the AND operation and then lastly
address the OR operation. Please take note that operator precedence has
been observed to avoid wrong interpretation of the circuits.
A Ᾱ
x=Ᾱ+B
B
Example 2
Example 2
x= (A+B) (B+C)
A
B
B x
Example 1
x= [D + ] .E. Assume that A=0, B=0, C=1, D=1, E=1
Solution
x= [1+ ].1= [1+ ].1= [1+1].1=1
=1.
Example 2
x= (A+ ) (B+ ). Assume A=1, B=0, C=1
= (1) (0) = 0
The NOR truth table and ways of representing the NOR gates.
A B A+B
A
0 0 0 1
0 1 1 0 B
1 0 1 0
1 1 1 0 A
B
A B AB
0 0 0 1
0 1 0 1 A
1 0 0 1
1 1 1 0 B
=x
Circuit Diagram
x
D A
B
Activity 1.3
1. (A+ ) (C+ )
2. (A+ )(C+ +E)
However, SOP is more common and used frequently as compared to POS.
There are two ways of simplifying these algebraic expressions namely Theo-
rems (that have been studied earlier) and the use of Karnaugh Maps. The
simplification of circuits using theorems can be summarised as follows:
Apply De Morgan’s laws and multiply terms to convert the expression
to SOP.
If the expression is now in SOP, factor out common factors as and
when appropriate and simplify. This automatically eliminates one or
more variables from the expression.
Example :
Simplify the logic expression x=ABC+A ( )
Example
Design a three input logic circuit whose output value is 1 provided that the
majority of the inputs are 1s.
Step1
A B C X
0 0 0 0
0 0 1 0
0 1 0 0
0 1 1 1 BC
1 0 0 0
1 0 1 1 A C
1 1 0 1 AB
1 1 1 1 ABC
Step 2
Refer to the truth table. The product (AND) term for each case where the
output is 1 has been written on the last column of the truth table.
Step 3
x= BC+ A C+ AB ABC
Step 4
=BC+AC+AB
Step 5
Draw the circuit diagram for the expression x=BC+AC+AB using the knowl-
edge that was learnt earlier in this chapter.
Each row in the truth table corresponds to the specific square in the K map.
K maps squares are structured in such a way that horizontally adjacent squares
differ only in one variable. Thus, there is a defined order which K maps vari-
ables should be arranged.
1.14 Looping
The process of simplifying logic circuits by combining adjacent 1s in a K map.
Looping eliminates the variable that appears in the complemented and
uncomplemented forms.
Example1 x= B +AB
Method 2 K Map
0 0
1 0
1 0
AB
0 0
Hence x=BC.
Example 2 x= B + BC
0 0
1 1
AB 0 0
0 0
Hence C= B.
Example 3
x= +A
1 0
0 0
AB 0 0
1 0
Hence x=
Example 4
x= CD+ C +A +A C
CD
0 0 1 1 C
0 0 0 0
AB 0 0 0 0
A
1 0 0 1
Hence x= C+A
Example 5
x= C+ BC+ ABC +A C
0 1
0 1
0 1
0 1
Hence x=c
Example 6
X= B D+ BCD+AB D+ABCD
0 0 0 0
0 1 1 0
0 1 1 0
0 0 0 0
Hence x=BD
Example 7
x= + C +A +A C
1 0 0 1
0 0 0 0
0 0 0 0
1 0 0 1
Hence x=
Example 8
Simplify the following:
0 0 0 1
0 1 1 0
0 1 1 0
0 0 1 0
Hence x= C +ACD+BD
4. Loop any octets (8 ones that are adjacent) even if the loop contains
some 1s that have already been looped.
5. Loop any quad that has one or more 1s that have not already been
looped. Always aim to use the minimum number of loops as is possible.
6. Loop any pairs necessary to accommodate 1s that are not yet looped.
Take in mind again to use a minimum number of loops as is possible.
7. Construct the OR sum for all the terms from each loop.
Example 1
Simplify the following expression using a K map
( +D)+ A C+
Solution
( +D)+ A C+
= + D+A C+
1 1 0 1
1 1 0 1
1 1 0 1
1 1 1 1
Hence x=A + +
It is the duty for circuit designers to insert either a zero or a one to the don’t
care condition in such a manner that the resulting K map will be the simplest
but with the best output expression.
Example
Suppose we have a circuit as depicted by the following truth table:
A B C Y
0 0 0 0
0 0 1 0 0 0
0 1 0 0
0 1 1 X 0 x
1 0 0 X
1 0 1 1 1 1
1 1 0 1
1 1 1 1 x 1
The following K map depicts the best decision circuit designers can insert zeros and
The following K map depicts the best decision circuit designers can insert
zeros and ones for the best possible output expression
0 0
0 0
1 1
1 1
Hence y=A
Activity 1.4
0 1 x 1
1 X x x
0 X x x
0 0 x 0
1 0 1 1
1 0 0 1
0 0 0 0
1 0 1 1
Summary
In this chapter we defined the AND, OR and NOT gates as the building
blocks for logic design and switching circuits. Combinations of these gates
depicted circuits that constitute everyday applications. Further, different meth-
ods of simplifying these circuits were discussed namely the use of theorems
and Karnaugh maps. Don’t care conditions were implemented in the chapter
where output values are not defined from the inputs. Thus the chapter centred
on application, design and simplification of logic circuits.
References
Kohari, Z., & Jha N. K. (2010). Switching and Finite Automata Theory.
New Delhi: Cambridge University Press.
Lee, S.C. (1977). Digital Circuits and Logic design. USA: Prentice Hall.
Roth, C.H.J., & Kinney, L.L. (2013). Fundamentals of Logic Design. USA:
Cengage Learning.
Taub, H., & Schilling, D. (1977) Digital Integrated Electronics. New York:
McGraw-Hill.
Tocci,R.J., Widmer,N.S., & Moss, G.L. (2009). Digital Systems: Princi-
ples and Applications. Chennai: Pearson.
Motherboards
2.0 Introduction
T
he motherboard is the building block of any given machine. Peripherals
are linked to each other via the motherboard. Desktops, laptops and
palmtops all have different building blocks. However, the fundamental
principle is that motherboards link the physical components of a computer
ranging from inputs, processing and outputs together with the components’
associated interrelationships that yield a computer that works in unison.
Foundations of Computer Hardware Module BITH102
2.1 Objectives
Upon completion of the unit, you should be able to:
2.2 Motherboard
It is a Printed Circuit Board (PCB) or system board where different types of
drives, memory, BIOS, other different parts of a computer and peripheral
devices are attached. The main role of the motherboard is to relay informa-
tion between different parts of a computer system. The motherboard houses
sockets, connectors and slots where components such as the RAM and proc-
essor are attached.
Northbridge
It is the chipset that facilitates communication of the CPU with RAM and the
graphics card. Thus, it is also referred to as Memory Controller Hub. Mod-
ern day motherboards embed the Northridge on the CPU.
Southbridge
It is the chipset that facilitates communication of the CPU with the following
connectors and ports: Ethernet ports, USB ports, PCI slots, SATA connec-
tors and on board audio. Hence the Southbridge also referred to as the Input
/ Output Controller Hub.
AGP slot
These are dedicated expansion slots where video cards and 3D accelerators
are installed. A dedicated link between the AGP slot and memory exists that
guarantees high speed execution. The AGP and the monitor determines the
quality of the computer video display.
IDE connectors
These are standard interfaces for connections to storage devices such as hard
disks DVD drives. Normally, motherboards have two IDE connectors namely
the primary and the secondary IDE. The primary IDE connector is where the
hard drive connects to the motherboard. Likewise, the DVD drive and other
storage devices share the secondary IDE connector.
CMOS battery
The CMOS battery powers CMOS even if power has been switched off
from the motherboard. CMOS (Complementary Metal Oxide Semi-conduc-
tor) is a small memory on the motherboard that stores BIOS settings that
include system date, time and hardware settings. In other words, CMOS
battery supplies power to store BIOS settings that keep the real-time clock
running.
CPU socket
It is a socket where the CPU is installed. Standard installation procedures
have to be observed otherwise socket pins can be damaged.
DRAM slots
These are slots where RAM is installed. Correct installation procedures for
the RAM need to be observed to avoid damaging the motherboard or the
RAM itself.
Activity 2.1
Baby AT Motherboards
It is two thirds the size of an AT motherboard and it exhibits features of both
XT and AT motherboards. Thus, baby AT motherboards have a mixture of
SD and DDR RAM slots, PCI and ISA slots 12 pin and 20 pin power supply
connectors and slot type and PGA processor sockets. Pentium III and Pentium
IV machines have baby AT motherboards.
ATX Motherboard
These are the recent types of motherboards characterised by DDR RAM
slots, PCI slots, AGP slots, 20 pin and 24 pin ATX power supply connectors,
MPGA processor sockets and numerous connector port to peripherals. The
types of motherboards that fall into this category include Pentium IV, dual
core, core 2 duo quad core, i3, i5 and i7.
motherboard has 4 expansion slots compared to 7 for ATX. The micro ATX
can use a smaller sized power supply with lower wattage that minimizes power
consumption and heat production. However, the standard ATX power sup-
ply can still be mounted and used on the micro ATX motherboard without any
problems.
BTX Motherboard
The design of BTX motherboards maximised on lining heat producing com-
ponents between air intake vents and the power supply exhaust fan. This
design gave the assurance that some heat generating components were now
being cooled by passive heat sinks. Additionally, the design made it easier to
cool the heat sink and hot components and chips by a single air flow stream.
This new heat sink and fan combination was termed Thermal Module. This
design has low power CPU consumption, fewer fans and a very efficient air
flow path. The BTX motherboard is highly flexible as it supports a family of
motherboard sizes for different PCs. For example, the micro BTX has the
dimensions 264mm x 266mm supporting up to a maximum of 4 add in card
slots and the Pico BTX has the dimensions 203mm x 266mm supporting up
to a maximum of one add in card slot.
Activity 2.2
Summary
In this chapter we gave an insight that the motherboard is an attachment point
to different parts of the computer and peripherals. In other words, we high-
lighted that all components of the PC are attached to the machine via the
motherboard. The generic structure of the motherboard was discussed which
showed the positions of different connectors and ports. Different form factors
of motherboards were outlined in the chapter as they evolved from the XT
type up to the latest. The strengths and weaknesses of each motherboard
form factor were noted.
References
Andrews, J. (2014). A+ Guide to Hardware: Managing, Maintaining and
Troubleshooting. USA: Cengage learning.
Bhardwaj, P.K. (2007). A+, Network+, Security+ Exams. Sebastopol:
O’Reilly Media Inc.
Clarke, G.E.,Tetz, E.(2007). CompTIA A+ Certification All in one Refer-
ence for Dummies. Canada: John Wiley and Sons.
Goel, A. (2010). Computer Fundamentals. New Delhi: Dorling Kindersley
Pvt Limited.
Mueller, S. (2010). Upgrading and Repairing PCs. Indiana: Que
Soper, M.E. (2007). Absolute Beginners Guide to A+ Certification. USA:
Que
3.0 Introduction
T
he CPU also known as the processor or the microprocessor controls
and coordinates the fetching of the correct instructions from main memory,
decodes (interprets correctly) and the execution of these instructions. A
network of buses connects the CPU with the memory and other devices
which include the address bus, the data bus and the control bus. The main
components that constitute CPU include the ALU, the control unit and regis-
ters. The microprocessor is the most expensive single component which costs
up to more than four times the value of the motherboard. Intel, AMD and
Cyrix are some of the common designers and manufacturers of the different
types of microprocessors.
Foundations of Computer Hardware Module BITH102
3.1 Objectives
By the end of the unit, you should be able to:
putations that perform logic functions such as AND, OR and NOT. Com-
parison operations include the relational operators such as equal to, less than
and greater than. The ALU houses an accumulator that temporally stores
intermediate results from many operations before they are finally stored on
memory. General purpose registers are also found in the ALU and they are
responsible for holding data where the above specified operations are per-
formed.
Control unit
This is a specialised electronic circuitry that manages or controls through con-
trol signals the fetching of instructions and data from memory, interprets via
the instruction decoder operations to be done on the data and then executes
the respective operations. In other words, it controls the fetch-Decode –
Execute cycle. The Instruction Register (IR) and the Programs Counter (PC)
constitutes the control unit. The PC is incremented by one after the end of
each cycle points to the address of the next instruction that is to undergo
execution via the address bus. Instructions regarding execution are fetched
from main memory through the data bus into the IR. The IR then sends vari-
ous control signals to relevant CPU parts taking part in the respective opera-
tions. The control unit is responsible for sending signals that control input/
output devices. In addition to that, it controls the movement and operations
on data within the ALU.
Activity 3.1
1. Critically discuss the basic characteristics of processors.
? 2. Examine the components of a processor.
3. Explain the importance of the processor within a computer organisation.
Bus
It is a set of wires that interconnect the different subsystems of a
computer.
Address bus
This is a unidirectional bus that sends out the physical address of the memory
location or I/O port that is to be written to or read from by the processor. In
other words, the processor outputs the location of the data on the address
bus. The memory address may be on RAM, ROM, hard drive or any other
peripherals. The width of the address bus determines the amount of memory
that can be addressed.
Data bus
A group of bidirectional wires that are used to transfer data between the
processor and memory or other input/ output devices. Suppose the proces-
sor fetches data from memory, it outputs the address of the desired data on
the address bus and then the memory outputs the data on the data bus from
which the processor will read the data from.
Control bus
This is a dedicated bidirectional bus which is responsible for controlling and
synchronising data transfer processes. It carries commands from and returns
status signals to the processor. Common control signals are the memory read
/write and input or output read /write.
Quad Core
It is a processor chip where four cores are integrated on the same processor.
Processor manufacturers noted that increasing the number of processors im-
proves the performance of the processor without increasing the processor
clock speed. Quad core processors are not necessarily four times faster than
the single core. The processors have been designed to cater for users that run
high performance and demanding applications which consumes a lot of re-
sources. Such applications include video editing, facial recognition, file com-
pression, 3D stereo games just to mention a few. An Intel i7 is a quad core
with an eight way multi-tasking that has a dedicated video card meant for
videos and gaming.
Activity 3.2
?
1. Discuss the relevance of the different types of buses that are connected
to the processor.
2. Briefly explain how you would figure out the type of a given processor.
3. Is there a significant difference between types of processors and
execution speed? Justify fully your thinking.
Socket connections
The sockets are built around pin grids resulting in a square grid. During the
installation or removal of the processor, there is Zero Insertion Force (ZIF)
or Low Insertion Force (LIF) that is facilitated by a lever during installation or
uninstallation. Minimum or no force at all is used thus reducing the likelihood
of bending or damaging the processor. The variations for socket connection
motherboard includes PGA, SPGA, LGA and DIP.
Slot connections
A processor slot connection was an expansion slot that was meant to make
the upgrading of a processor easier. The user would install the processor
sliding the chip onto the slot. The following figure depict an Intel Slot 1 that
was designed for Pentium I processors. Sockets architecture have replaced
the slot architecture.
Activity 3.3
?
1. Are there any advantages of utilising sockets compared to slots for
processors? Table your arguments clearly.
2. Is it possible to upgrade a machine’s processor? Justify why or why
not.
3. Differentiate PGA from LGA.
Summary
The processor is one of the most important part of a machine that is respon-
sible for controlling how instructions are fetched from main memory, inter-
preted and executed via different buses. The components that constitute the
processor include ALU, control unit and registers. Different processors ex-
ecute different speeds depending upon the type of the processor. Lastly, it
was noted that there are two types of connections for processors to the
motherboard namely the socket and the slot connections.
References
Bhardwaj, P.K. (2007). A+, Network+, Security+ Exams. Sebastopol:
O’Reilly Media Inc.
Clarke, G.E.,Tetz, E.(2007). CompTIA A+ Certification All in one Refer-
ence for Dummies. Canada: John Wiley and Sons.
Goel, A. (2010). Computer Fundamentals. New Delhi: Dorling Kindersley
Pvt Limited.
Karbo, M. (2002). PC Architecture. France: Know Ware.
Mueller, S. (2001). Upgrading and Repairing PCs. USA: Que.
Memory
4.0 Introduction
C
omputer memory is a block of storage space where data to be proc
essed and program instructions required for processing are stored.
The block of memory is divided into units referred to as cells that are
assigned unique addresses as from zero up to the memory size minus one.
Computer performance is determined by the size of the memory. Computer
memory is of three types namely cache, primary memory and secondary
memory. The hierarchy and characteristics of different types of memory are
explained in this unit.
Foundations of Computer Hardware Module BITH102
4.1 Objectives
By the end of the unit, you should be able to:
The figure depicts the low capacity memory such as the cache memory is
quickly accessed by the processor for immediate execution of instructions.
Despite this type of memory having a low carrying capacity, it is very expen-
sive. As we get down the hierarchy, as evidenced by disk and tape storage,
the rate at which the processor accesses the memory is lowered and the
carrying capacity increases. Additionally, as we move down the hierarchy, the
memory becomes less expensive.
L1 Cache
It is also called primary cache. This fastest type of memory is embedded on
the processor and is used for the temporal storage for frequently accessed
instructions and data with a zero interface delay. Most processors nowadays
are embedded with at least 32KB of L1 cache.
L2 Cache
L2 cache refers to secondary cache memory that used to be the external
cache soldered on the motherboard or as a cache module in a socket. How-
ever, nowadays L2 cache is now being embedded on the processor as is with
L1 cache and has a minimum size of 512KB. It is further away from the
processor compared to L1 cache hence a greater delay due to distance when
resources are being fetched.
L3 Cache
L3 cache is found in multicore processors. It is crucial for managing inter core
communication. It is basically shared between all the cores on the same chip.
L3 is slower than L2 but larger in size (on average at least 8MB) hence
capable of storing data for all the cores. When the processor retrieves infor-
mation, it first checks whether it is stored in the L1 cache and if not, it checks
the next level of cache which is the L2 cache. If information not found again,
it references the L3 cache then finally the RAM. In other words, the RAM
feeds the L3 which feeds the L2 that in turn feeds L1 that finally responds to
processor. The figure below is an Intel core i7 -390X processor that has six
cores and a shared L3 cache.
DRAM
This is an integrated circuit that constitutes millions of transistors and capaci-
tors. Each dynamic memory cell is made up of a pair of a transistor and a
capacitor that forms a single bit of data. The capacitor holds the bit informa-
tion that is either a 0 or 1. The transistor performs the functions of a switch
that regulates the circuitry on the memory chip read the capacitor or observe
the changes in state. Capacitors need to be read and observed as they leak
electrons at a very high rate. Capacitors can be full of electrons denoted one
or empty denoted zero due to leaks. The memory controller is responsible
for recharging the capacitors before they discharge by reading the memory
and writing it right back, a principle referred to refreshing. The refreshing of
DRAM is an automated process that is done several thousand times per sec-
ond lest contains held by the memory may be lost. The need of periodic
refreshments by this type of memory makes it slower compared to SRAM.
However, DRAM is less expensive to produce compared to SRAM and is
the most common type of computer memory. Both DRAM and SRAM are
volatile as their state is reset or lost when power is switched off.
DDR-SDRAM
It is also known as DDR1-SDRAM. This type of SDRAM is capable of
transferring data on both the rising and falling edge of the clock. This poten-
tially doubles the throughput of the memory chip thus improving memory speed
to at least 200MHZ. DDR-SDRAM consumes less power and is suitable for
both desktop and notebook machines.
DDR2-SDRAM
This is an enhancement of DDR1. It transfers data four times per clock cycle
compared to two times per clock cycle for DDR1. Input/output buffers present
perform multiplexing that doubles the data transfers per clock cycle. DDR2
has an increased memory bandwidth but has the same operational frequency
as DDR1-SRAM and SRAM. The bus connecting memory cells with the
buffer is twice wider compared to DDR1-SRAM. Multiplexing is being done
on a bus where data is coming from a very wide buffer and going out through
the buffer that has the same width as DDR1. DDR2 SDRAM has an average
data rate of at least 400MHZ and this memory is not backward compatible
with DDR1.
DDR3-SDRAM
It is the most common and fastest type of memory in use for desktop comput-
ers today. Power consumption was cut by approximately 30% compared to
DDR2.The memory sizes drastically grew from 512 MB to 8GB at present.
DDR1 had 184 pins, DDR2 and DDR3 have both 240 pins.DDR3 is neither
forward nor backward compatible the earlier SDRAMs due changes in sig-
nalling voltages and timings. DDR3 supports1.5V, DDR2 support 1.8V and
DDR3 support 2.5V. DDR3 transfers data at twice the rate of DDR2 by
offering two transfers per cycle of within the quadrupled clock signal.
RDRAM
The RDRAM was developed by Rambus Company and can only be used on
motherboards specifically designed for them. 16 bit RDRAM has 64 pins
and 32 bit RDRAMS have 232 pins. The chip is very expensive and capable
of transmitting data at speeds such as 10GHZ per second. It makes use of a
synchronous bus capable of transferring data at both edges of the clock. Due
to the very high speeds of transmission, too much heat is generated and there
is great need for heat spreaders to dissipate the heat. RDRAM also makes
use of multiple memory banks for concurrent memory access within different
row addresses. The sophisticated electronic design renders fast clock speeds
hence this type of memory is optimized for usage on video memory on graph-
ics accelerator cards, cache memory and server memory.
Activity 4.1
30 Pin SIMM
72 Pin SIMM
SIMM is a small integrated circuit board with chips on one or both sides and
a single row of pins along one edge of the module resulting in one row of
electrical contact. Memory chips on SIMM can be DRAM or SDRAM.
These types of modules were found on early machines in the 1980s and 1990s.
SIMM circuit board houses six to nine memory chips where the ninth chip
specialised on error checking. The SIMM came in two variants namely the
30 pin which that was smaller compared to 72 pin which was large. The 30
pin SIMM supported 16 bit data transfer, 5V, access speed ranging from
60ns to 80ns whereas the 72 pin SIMM supported 32 bit data transfer rate,
5V or 3.3V and access speed ranging from 60ns to 70ns.
DIMM
electronically isolated from each other. In most cases, SDRAM and DRAM
are packaged using the DIMM form factor. The 168 pin DIMM transfers
data at 64 bits at a time which is twice SIMM data transfer rate. DDR1
DIMMs and DDR2 DIMMs have 184 pins and 200/240 pins respectively.
The socket on the motherboard where a DIMM is installed is completely
different from a SIMM slot. Only one DIMM is installed per socket whereas
SIMMs were installed in inline pairs. DIMMs have a faster data transfer rate
hence they replaced SIMMs.
SODIMMs are smaller integrated circuit boards that are alternatives to the
DIMM. They are roughly half the size of DIMM but they have equally the
same performance speeds as DIMM. These types of modules are installed
on motherboards that have limited space such as notebooks and routers.one
of the popular modules installed on laptops. Some of the variants include the
72pin, 100pin, 144pin and the 200 pin. The 72 and 100 pin SODIMM offer
32bit data transfer rate whereas the 144 and 200 pin support 64 bit data
transfer rates. Nowadays, 204 pin and 256 pin SODIMMS support DDR3
and DDR4 form factors respectively. The power voltage for SODIMMs is
mostly 3.3V meaning that they consume less power. SODIMMs support the
DRAM and the SDRAM form actors with different storage capacities for
example 2GB, 4GB and 8GB.
Micro DIMM
These are one of the smallest type of memory modules. They are half the size
of SODIMMs. They are mainly used on mini notebooks and Personal Digital
Assistants (PDAs) to cater for space and power needs. They support 1.8V
low power usage for longer working periods meant for travellers. Some vari-
ants of micro DIMM have 144 and 172 pins that support a 64 bit data bus.
Memory sizes range from 256MB, 2GB, 4GB and so on.
RIMM
RIMM is not an acronym but a term chosen by Rambus company to describe
their memory module. The memory chip package supports the Ball Grid Ar-
ray (BGA) form factor. RIMM has two variants namely the 16 bit single
channel bus and the 32bit dual channel bus. The 16 bit module have 184 pins
and are installed as pairs on the motherboard. The 32 bit module has 232
pins and can be installed as a single module on the motherboard. Data trans-
fer can be done on both the rising and falling edges of the clock as in DIMM.
RIMMs operate at very high frequencies hence they have aluminium heat
spreaders dissipate the elevated operating temperature thus preventing over-
heating. Most Rambus memory controllers are designed in such a manner
that modules are installed in sets of two. The remaining open memory slots
must be filled with continuity RIMMs (CRIMMs) as the one shown below.
CRIMMs do not provide any extra memory but they are responsible for
propagating the signals to terminating resistors that are found on the
motherboard. If CRIMMs are not installed, dead end exists and signals re-
flect as a result of very high speeds.
Parity Check
The RAM used on earlier systems was either parity RAM or non-parity RAM.
Non parity RAM used 8 bits to store a byte of data. On the other hand, parity
RAM for every 8 bits of data, and an additional bit is added to the data that
is meant for error detection. Hence for parity RAM, 9 bits are used to store
a byte of data. In other words, the parity bit was used to validate the integrity
of each byte. Parity RAM has an additional chip on the circuit board meant
for these calculations hence this type of RAM has an increased size and is
more expensive. Two types of parity check exists namely even parity and
odd parity. The parity bit is either set to a 0 or a 1.
If the protocol has been set to even parity, then the number of ones including
the parity bit should be even. For example, 11001011 is the data to be writ-
ten onto the RAM. When using even parity, a 1 has to be appended as a
parity bit before the data is stored as the number of ones is not even. Thus the
stored data on the RAM will be 110010111. When the data is now being
retrieved, the total number of ones is added and if the number of ones is odd
and the parity is 1, then data is assumed to be valid and is sent to the CPU. In
other words, the computed parity is compared against the stored parity and if
they tally, it is assumed that no errors were encountered otherwise an error
would have happened.
Odd parity is contrary to even parity. Parity check only detects errors but is
not able to correct even a one bit error on the memory.
The ECC RAM module have addition chip responsible for error detection
and correction as is the case for the parity check.
ECC RAM is on average 2% slower that non-ECC RAM due to the addi-
tional facility for error detection and correction. ECC RAM is mainly used for
high speed and high end applications on servers and other workstations that
are used for storing very high value data.
Activity 4.2
PROM
PROM is a variant of ROM manufactured as a blank chip on which data or
instructions are written to using a PRO programmer. However, it is only pro-
grammed once by the user after manufacture. Suppose errors have happened
during programming, the PROM is discarded. The programming process burns
open small fuses of the PROM chip at high voltage as instructions are perma-
nently stored. All fuses correspond to 1 at PROM manufacture but those
fuses burnt during programming corresponds to 0 and those that are not burnt
remain as 1. Hence the process is permanent and cannot be erased. Early
systems computer BIOS is a typical example of the PROM.
gate region during its programming process. This electrical charge does not
have a leak path and is retained on this position for a duration more than 10
years. EPROM charge can be erased by exposing ultra-violet light at certain
wavelength through the crystal window for about 40 minutes thus the charge
is dissipated as the fuses are reconstructed and memory bits return to 1.
When the machine is being used, the glass panel is sealed with a sticker.
EEPROM
This type of EPROM can be programmed and erased electrically on average
for about ten thousand times. The EEPROM chip can be erased and repro-
grammed whilst it is on the motherboard and this takes on average about 4
milliseconds. This type of memory is very flexible as it can be selectively
erased by a simple electric current and reprogrammed. Selective erasure and
reprogramming is slow compared to erasing and programming the whole chip.
4.11 BIOS
It is a chip located on the motherboard that contains a set of instructions and
setup that governs how the computer boots and operates. When power is
switched on, the BIOS takes control. The bootstrap process begins where
the computer initialises by self-organising itself from a chaotic state to an or-
dered state. It then performs the Power-On Self-Test (POST) which first
checks whether the video card is functioning properly to facilitate the proper
display of errors to the user. Suppose the video card does not work properly,
then BOIS will beep as a way of signalling respective types of errors. BIOS
will then check the next proper connection and functionality of major input
devices that include the keyboard and the mouse. If these are working well,
BIOS then checks RAM functionality. BIOS confirms the functionality of the
RAM by writing and reading the same data on specific memory locations. If
this has been successfully completed, BIOS confirms main memory storage
devices connected to the machine. These are devices like DVD ROM / CD
ROM and the hard drive.
At this stage, BIOS now searches for the operating system to load first from
DVD/CD ROM then the hard drive. If the operating system has been lo-
cated, the operating system instructions and data are loaded from the main
storage device to the memory and BIOS instructs the processor to take over
from there the execution of other instructions.
The above is a hard disk drive showing visibly the IDE connectors, the jumper
block and the power connectors. Refer to the storage devices section for a
detailed explanation.
Activity 4.3
1. Briefly explain the importance of virtual memory within the machine.
? 2. Describe the process of memory optimization.
3. Discuss the relevance of BIOS and CMOS within the computer
organisation.
4. Narrate the evolution of ROM chips up to the present day era.
Summary
The chapter has outlined the hierarchy of computer memory clearly spelling
out the characteristics of each type of memory. The installation procedure for
RAM has been tabled with features that signal faulty and missing RAMs.
Different error detection and correction methods that are used by RAM such
as parity check and ECC were discussed. Conclusively, ROM types, char-
acteristics and their applications were analysed.
References
Bhardwaj, P.K. (2007). A+, Network+, Security+ Exams. Sebastopol:
O’Reilly Media Inc.
Goel, A. (2010). Computer Fundamentals. New Delhi: Dorling Kindersley
Pvt Limited.
Kamra, A., & Bhambri, P. (2008). Computer Peripherals and Interfaces.
Pune: Technical Publications.
Karbo, M. (2002). PC Architecture. France: Know Ware.
Mueller, S. (2001). Upgrading and Repairing PCs. USA: Que.
Ports
5.0 Introduction
P
orts are interfaces on the motherboard with a set of signal lines used by
the processor to exchange data with other peripherals. They are found
at the back of PCs and are colour coded in most cases. They perform
different functionalities hence different ports operate at different speeds.
Foundations of Computer Hardware Module BITH102
5.1 Objectives
By the end of the unit, you should be able to:
♦ Identify different ports found on a PC.
♦ Differentiate the functions of each port.
♦ Match the cable and connectors for each port.
♦ Distinguish different versions of the same port.
♦ Relate the colour of the port to the type of the port
♦ Compare and contrast speed and functionalities of different ports
The figure above shows the different types of ports. The ports are now being
addressed in more detail in this section.
Activity 5.1
1. Match each port on the motherboard by its respective colour.
? 2. Differentiate input ports from output ports.
3. Are the number of ports and type of ports the same on all
motherboards? Justify.
Serial Port
This is an asynchronous interface that was designed as a system to system
communication port that transfers information in and out one bit at a time. It
was sometimes referred to as a COM port. This system did not use clocking
signals or synchronisation but rather utilised start and stop bits. This meant
that characters sent over a serial interface were framed in between the start
and stop bits. A single zero bit signified the start bit and meant that the eight
bits that followed (the byte) was being transmitted. Normally after the eight
bits, the one or two last characters signified the stop bits. Thus, given a byte
of data, serial ports transmits the eight bits in a byte one bit at a time. This
asynchronous type of communication yields on average 25% overheads ema-
nating from the utilisation of the start and stop bits. Serial interfaces are in two
standard variants namely the 9 pin connector and the 25 pin connector and
they are colour coded blue. The cable below connects to the serial interface.
The serial interface makes use of the Universal Asynchronous Receiver /Trans-
mitter (UART) to convert the parallel output of the computer system to a
serial format that can be transmitted through the serial interface. The UART
chip utilises their in-built buffers to control the flow of the data conversion by
caching data from the computer system bus whilst processing data moving
out from the serial port. The data is then converted back to parallel format at
the receiving end.
The maximum transfer rate for Standard Serial Ports (SSP) is on average
115Kpbs whilst high speed serial ports such as the Enhanced Serial Port
(ESP) and the Super Enhanced Serial Port (SESP) have an average transfer
rate of 460 Kbps.
Serial ports have since been overtaken by USB ports and they are no longer
found on machines nowadays. However, these were used to connect a ma-
chine to the modem, routers and switches to PC for console configuration or
connecting to server computers as control consoles for diagnostics.
Parallel port
This is sometimes referred to as a printer port or Centronics port. Parallel
ports have 8 transmission lines hence the eight bits of a byte are transmitted
parallel to each other. Thus the interface is very fast when transmitting and
receiving data. They are found in 25 pin and 36 pin variants. However, paral-
lel ports can transmit data over short distances before signals are amplified to
prevent high data error rates. Parallel ports both send and receive data. For
example, a printer port sends data that is to be printed to the printer. Suppose
the printer has run short of paper or a paper jam has occurred, then the
printer has to send signals back to the PC via the printer port thus communi-
cation in a parallel port is bi-directional. The following is the male connector
to the printer port.
Standard Parallel Ports (SPP) were the first parallel ports to be produced.
They had a transfer input rate of average 50Kbps and an output rate of
150Kbps. Communication was unidirectional that is from the PC to the printer
only. However, Enhanced Parallel Ports (EPP) and Enhanced Capabilities
Port (ECP) are the improved versions of the parallel port that are half duplex,
bidirectional and capable of transmitting at very high speeds. These types of
ports make use of a status bit that indicates the direction of data flow within
the channel. EPP have a transfer rate on average of 2 Mbps that is meant for
connections of parallel port peripherals such as tape backups, LAN adaptors
and disk drives. The ECP offers very high speeds and is meant for connec-
tions to very high performance scanners and printers. However, ECP require
special hardware logic and the Direct Memory Access (DMA) channel to
support the high throughput. The DMA channel and the parallel port now
regulate the transfer of data instead of the busy processor handling this job.
Hence, the transfer rate for ECP is on average 2.5 Mbps. These ECP ports
can be converted to EPP and SPP via the BIOS. Parallel ports are burgundy
colour coded.
Activity 5.2
USB 1.0 was introduced in January 1996 but did not gain any mileage to the
market. The versions of USB that penetrated the market include USB 1.1 in
September 1998, USB 2.0 in April 2000, USB 3.0 in November 2008 and
USB 3.1 in July 2013. The following is the cable male head connector to the
USB port:
The following table summarises USB data rates and backward compatibility
with respective USB predecessors.
With respect to the above table, USB 2.0 has a maximum speed of 480Mbps
in high speed mode and backward compatible with USB 1.1 and capable of
working at 1.5Mbps. USB 3.1 matches the speed of the original Thunder-
bolt. A single USB port can connect up to 127 peripherals. USB 3.1 power
specifications range up to 20V, 5A; USB 3.0 as 5V, 1.8A and USB 2.0 as
2.5V, 1.8A. USB 2.0 and 3.0 are the most common ports nowadays and
they are colour coded black and blue respectively.
4. Navigate through different USB Root Hubs and open the respective
properties window.
5. Click the advanced tab to view the respective port speed.
6. Click the power tab to view the power specifications of the USB de-
vice.
Activity 5.3
VGA is found in two resolutions. The 640 x 480 pixels resolution is capable
of displaying 16 colours with a refresh rate of 60 Hz. The lowered resolution
of 320 x 200 pixels displays 256 colours. VGA has 15 pins that are displayed
in three rows and uses analogue signals. The VGA replaced earlier display
standard such as Monochrome Display Adaptor (MDA), Colour Display
Adaptor (CDA) and Enhanced Graphics Adaptor (EGA) that used digital
signals. VGA was replaced by Super VGA that initially supported 800 x 600
pixels with 16 colours. With the advancement of technology, SVGA had a
resolution of 1024 x 768 pixels that supported 256 colours still on the same
15 pins arranged in three rows. The advent of flat screens triggered the need
for new specifications and paved way for the introduction of DVI and HDMI
port that replaced the VGA standard.
DVI interfaces are found in three main formats namely DVI-D that is digital
only, DVI-A that is analogue only and DVI-I that is integrated and capable of
supporting both analogue and digital signals. The DVI –I interface has two
variants that is the single link and the dual link. DVI interfaces support high
bandwidth specifications such as 160MHz hence they are used for high reso-
lution displays not only on PCs but on other high resolutions applications such
as television sets. It should be noted that DVI specifications are compatible
with the VGA interface.
There are four most common types of HDMI cable namely Standard HDMI,
Standard HDMI with Ethernet, High speed HDMI and High Speed HDMI
with Ethernet. The standard HDMI cable provides a reliable sufficient band-
width of 720p and 1080i video. HDMI with Ethernet cable have the same
cable specifications and additionally has a dedicated Ethernet channel for
directly streaming videos from the Internet. The High Speed HDMI cable
provides a high bandwidth that is capable of carrying video with a resolution
of 1080p or higher, supports 3D video and the display of deep colours. How-
ever, the capability these signals degrades with distance. High Speed HDMI
with Ethernet have the same specifications as High Speed HDMI but addi-
tionally provides an Ethernet connection.
Ethernet Port
It is a standard port for connecting a PC to the wired network. This interface
connects PCs, switches and routers linked by Ethernet cables creating a net-
work for communication referred to as the Local Area Network (LAN). An
Ethernet cable has RJ45 connectors on both ends and one side is plugged on
the Ethernet port of the machine whilst the other side is plugged onto the wall
socket.
Ethernet cables have multiple standards that use the same Ethernet port. Some
of the Ethernet cable specifications include 10 Base T that supports 10Mbps,
100 Base T that supports 100Mbps and the 1000 Base T which is also
referred to as Gigabit Ethernet that supports 1000mbps. Ethernet devices are
backward compatible. A machine that has an Ethernet port that supports 10
Base T specifications can be connected to 100 Base T Ethernet LAN al-
though the machine can only send and receive packets at 10Mbps.
Power Port
The power port powers the machine. One end of the cable is plugged onto
the power port on the machine that directly links to the power supply whilst
the other end is connected to the power wall socket.
The above pictures show the power port of a desktop machine with the asso-
ciated cable that is plugged into that port. Different power ports exists that
are not even compatible with one another.
Activity 5.4
Audio Ports
Audio ports are jacks on which audio devices are connected. These audio
devices include head phones, microphones and speakers that are meant for
privacy and improved sound quality. These jacks are colour coded as de-
picted below.
The orange jack is a 3mm receptacle meant for analogue line level audio
output specifically for the centre channel speaker and the subwoofer. The
light blue jack is a 3mm receptacle sometimes referred to as stereo line and
thus an analogue audio input. An arrow going into a circle symbolises this
jack. The pink coded 3mm jack is symbolised by a microphone. It is meant
for analogue microphone audio input. The lime green 3mm jack is used for
analogue line level audio output that is meant for front speakers and head
phones. An arrow that is going one side of a circle into a wave symbolises this
jack. The black coded 3mm jack is an analogue line level audio output that is
meant for rear surround speakers. The gold coded 15 pin port is a game port
/ MIDI where the joystick is connected. A machine may not have all these
audio ports. These audio ports can be inbuilt on the motherboard or can be
found on sound cards that are inserted on expansion slots on the motherboard.
Sound cards convert the digital signals to analogue signals which is output for
example on speakers. Some of the uses of these ports include entertainment,
music composition and video editing. However, USB ports found nowadays
are used as audio ports and they are digital audio ports compared to these
that are analogue audio ports.
PS/2 Port
This is a mini DIN type of a port that has six pins developed by IBM in
1987as a Personal System/2 (PS2) series and adopted for usage as a stand-
ard. Before the emergence of this type of port, the serial ports were used for
connecting the mouse and the keyboard. The introduction of PS/2 ports paved
way for serial interfaces to be used for modem connections. These circular
ports are colour coded purple for the keyboard and green/teal for the mouse.
Apart from these colours, pictures of these devices were normally found next
to the respective ports. The following are PS2 cable heads that were plugged
onto the PS/2 port.
The PS/2 interface transports serial signals at frequencies ranging from 10-16
KHz. Like serial interfaces, it makes use of one start bit, one stop bit and a
parity bit for error detection. However, PS/2 were not hot swappable as it
was potentially harmful to remove PS/2 devices whilst the machine was pow-
ered on. Additionally, they were port specific.
Hence, PS/2 ports have since been replaced by USB ports that are hot
swappable and either the keyboard or the mouse can be connected on any
USB port.
Thunderbolt Port
It is a peripheral technology interface developed by Intel in collaboration with
Apple. This port combines the PCI Express and display ports architectures
that are capable of outputting audio, video, data and power on a single inter-
face connection. The PCI Express architecture facilitates direct connection to
the PCI Express bus that yields very high speed connections. The embedded
display port facilitates very high speed transmission of high definition videos.
Thunderbolt is a bidirectional two channelled port that has a data transfer rate
or throughput of 10Gbps. The following pictures show the thunderbolt port
and the respective cable that fits into the port.
FireWire port
This is a high speed port that is used to connect peripherals at very high data
rates as well as preserving total quality. It is sometimes referred to as the
IEEE 1394 standard. These ports are specialised for transferring data on
professional scanners, printers, video and audio equipment. The ports are in
two variants namely FireWire 400 and FireWire 800.
FireWire 400 has a data rate of 400Mbps and are almost rectangular in shape
with six pin conductors. The curved end will be pointing downwards when
the respective cable is being inserted. It supports a maximum distance of 4.5
metres. FireWire 800 is the latest version that supports 800Mbps, has nine
pin conductors and almost square in shape that has a groove on one side.
The maximum cable length of 100 metres is accepted by this type of port.
The groove has to be facing the user when FireWire 800 is being inserted into
the port. FireWire port can connect up to 63 devices through a maximum of
16 hopped daisy chained scenario. FireWire interfaces also provides power
to devices connected them.
These types of ports can be used to upload images from a digital camera onto
the PC preserving the original quality of the images. In addition to that, FireWire
ports can be used to connect directly two independent devices. For example,
the small printers that are connected directly to digital cameras utilise FireWire
ports for their connections during printing.
Activity 5.5
? 1. Figure out the devices that were connected through the PS2 ports and
synthesise the reasons why PS2 ports were overtaken by USB ports.
2. Is there any difference between plug and play and hot swappable?
Justify your reasoning.
3. Evaluate the relevance of using the thunderbolt port and fire wire port
in specific application domains.
Summary
Ports are specialised interfaces that were designed for particular situations.
Improvements are constantly being developed that address speed, maximum
distance, efficiency and effectiveness for the movement of data. Different ports
have different functionalities and operate at different speeds depending upon
the time they evolved.
References
Bhardwaj, P.K. (2007). A+, Network+, Security+ Exams. Sebastopol:
O’Reilly Media Inc.
Bhatnagar, S. (2008).Textbook for Computer Science for Class XI. New
Delhi: Prentice Hall.
Goel, A. (2010). Computer Fundamentals. New Delhi: Dorling Kindersley
Pvt Limited.
Kamra, A., & Bhambri, P. (2008). Computer Peripherals and Interfaces.
Pune: Technical Publications.
Mueller, S. (2001). Upgrading and Repairing PCs. USA: Que.
6.0 Introduction
T
hese are sockets that are found on the motherboard where additional
circuit boards are added to expand the capabilities of a computer. These
additional circuit boards, also referred to as expansion cards have elec-
trical connections that facilitate communication with the motherboard. Some
of the capabilities of computers that can be expanded on these slots include
video, sound, network interface adaptors and RAM. Utilisation of these slots
customises machines to precisely address the needs of specific users as new
functionalities can be added on these slots in future. On average, desktops
have a minimum of one expansion slot and a maximum of seven slots. These
slots have different sizes and processing speed and moreover still evolving.
Different types of slots are now discussed in this Unit.
Foundations of Computer Hardware Module BITH102
6.1 Objectives
By the end of the unit, candidates should be able to:
The 16 bit ISA slot was backward compatible with the 8 bit ISA as can be
seen above. It supported 16 MB of memory and interrupts were not shared
by more than one card hence it was widely used then. The interfaces that
were housed on an ISA slot included the VGA or EGA display controller
adaptor, two serial ports, one parallel port, the disk drive interface, the game
port, sound card and network card.
The above pictures depict the ISA 16 bit card and slot. These have since
been replaced by PCI slot and cards.
As a result of the 32 bit address bus, ISA has a maximum data transfer rate of
33 megabytes per second. Additionally, more than one processor would share
the bus. One major strength of EISA was it being a plug and play device that
automatically configured adaptor cards. The bus mastering for greater effi-
ciency was adopted by this slot supported a memory access of 4GB. This
type of slot shared interrupts. However, it was expensive to build such an
interface such that it was mainly found on servers it was meant for high band-
width intensive applications then. These expansion slots are no longer imple-
mented as improved versions of slots that perform better have been devel-
oped.
On the other hand, the major strength of MCA was auto configuration and
bus mastering. Bus mastering entails the ability of a peripheral device to tem-
porarily take control of the bus from the processor. Auto configuration was
the ability of any device connected to the bus to automatically configure them-
selves. This meant that owing to this principle, it was no longer necessary for
jumpers and switches to be set on either cards or motherboards. The 16 bit
bus had a transfer rate of 20 Mbps whilst the 32 bit bus had a transfer rate of
40Mbps.
It was backward compatible with ISA and ran on a 32 bit data bus that had
a maximum speed of 66MHz. VESA by then provided more bandwidth for
video and graphics and was considered a very fast interface. On average, a
maximum of three VESA cards were normally installed at a time to address
problems of timing glitches. It was highly dependent on the processor thus
limited to the 386 and 486 models and was not compatible with Pentium
motherboards. In most cases, there were one or two VLB capable ISA slots
from an average total of about six ISA slots. VESA had an increased slot
length and number of pins hence difficult to install. This standard was re-
placed by PCI and AGP.
Activity 6.1
The PCI Extended (PCI-X) is a variant of the PCI that was meant for servers
with high speeds that utilised speeds of more than 532Mbps. The mini PCI
was used for laptops. PCI slots were meant for future customer expansions
that would improve the performance of the computer. The PCI buffers pro-
vided isolation and amplification of signals that warranted multiple device con-
nections to the PC. This standard supported plug and play. The PCI standard
made use of a latency timer that calculated the maximum time the device
would use the bus. However, the PCI standard had limitations to users who
AGP Pro was another variant of AGP that was used on high power specifica-
tions such as CAD workstations in the engineering discipline. All AGP slots
were located very close to the processor for fast execution of instructions.
The table below depicts the different versions and form factors of lanes of
PCI-E with the associated clock speeds and maximum bandwidth rendered.
The PCI-E interface supports both hot plugging and hot swapping. The mini
PCI-E is a form factor for PCI-E specially designed for laptops, notebooks
and other portable devices with limited space.
Normally, PC cards are sized 85.6mm by 54mm and they come in three
variants namely Type I, Type II and Type III. Approximately, Type I PC
cards are 3.3mm thick and they are commonly used for memory modules.
Type I slot is compatible with Type I cards only. Type II PC cards are on
average 5mm thick and are used for modems and as network adaptors. Type
II slot is compatible with both Type I and Type II cards. Type III cards are
approximately 10.5mm thick and are used for portable disk drives. Type III
slots are compatible with Type I, II and III cards. However, PC cards had a
16 bit data width that was further improved to a 32 bit data width referred to
as the Card Bus. The Card bus was then improved to yield the serial based
Express Card that supports very high bandwidth, supports USB2.0, uses
less voltage and has a very much reduced cost of production.
Activity 6.2
? 1. Identify and explain the different types of cards that can be installed on
expansion slots. Briefly describe the relevance of each type of card
identified above to the PC user.
2. With reference to the expansion slots discussed in this unit, differentiate
the parallel mode of data transmission from the serial mode of data
transmission.
3. Compare and contrast the Small Computer System Interface (SCSI)
with the Integrated Drive Electronics (IDE) interface. Further, discuss
the significance of these interfaces to expansion slots and relate each
interface to expansion slots that it is compatible with.
4. Is it possible to implement hot plugging and hot swapping on expansion
slots? Justify your reasoning.
5. Suppose one of your subordinates is stuck with his/her laptop that
does not have a Network Interface Card (NIC). He /she proposes to
you that a NIC be added via an expansion slot. Advise accordingly
your subordinate how best to solve this problem.
6. Compare and contrast the following expansion slots:
a) PCI and PCI-E.
b) AGP and PCI-E
Summary
The Unit starts by explaining the relevance of expansion cards and slots to
users. It then expands by demystifying the evolution of expansion slots and
cards as from the earliest ISA slots and cards, EISA, MCA, VESA, PCI,
AGP and the latest PCI-E. These form factors are discussed in depth by
spelling out the structure of the slot, data bus width, speed of the clock, the
maximum bandwidth and other important characteristics rendered by the con-
cerned slots. It is important to note that earlier slots implemented a parallel
architecture whereas the recent slots utilise the high performance serial lane
architecture. The increasing demand for 3D technology will continuously re-
quire new specifications that are in tandem with the ever-changing technology
hence the need to be always abreast with video graphics technology. Thus,
expansion slots and cards will continuously evolve for the benefit of different
user specifications.
References
Andrews, J. (2014). A+ Guide to Hardware: Managing, Maintaining and
Troubleshooting. USA: Cengage learning.
Bhardwaj, P. K. (2007). A+, Network+, Security+ Exams. Sebastopol:
O’Reilly Media Inc.
Mueller, S. (2010). Upgrading and Repairing PCs. Indiana: Que.
Rosenthal, J., & Irwin, K. (2007). PC Repair and Maintenance Guide.
Networking Series. New Delhi: Laxmi Publishers Pvt Limited.
Zacker, C., & Rourke, J. (2001). PC Hardware: The Complete Reference.
USA: Osborne/ McGraw-Hill.
Input Devices
7.0 Introduction
A
n input device is any hardware component that allows a user to enter
data and instructions into a computer. The input is the data and instruc
tions that are fed into the computer memory. Input devices help a user
to easily interact with a computer because without it, a computer would only
be a display device and not allow users to interact with it. There are a number
of input devices that we are going to discuss next.
Foundations of Computer Hardware Module BITH102
7.1 Objectives
By the end of the unit, you should be able to:
7.2 Keyboard
The keyboard is one of the primary input devices used to enter data into a
computer. It has its own processor and circuitry that carries information to
and from the processor. The key matrix is a grid of circuits underneath the
keys. When you press a key, it presses a switch, completing the circuit and
allowing a tiny amount of current to flow through. It tells the processor the
position of each key in the matrix and what each keystroke or combination of
keystrokes represents. Most keyboards have between 80 and 110 keys.
These keys include typing keys, numeric keypad, function keys and control
keys. Using a keyboard, a person can type a document, use keystroke
shortcuts, access menus, play games and perform a variety of other tasks.
Keyboards can have different keys depending on the manufacturer, the oper-
ating system they are designed for or whether they are attached to a desktop
computer or part of laptop.
Keys Description
Typing keys/ alphanumeric keys These keys include letter keys (A-Z) and
digit keys (0-9) which generally give same
layout as that of typewriter.
Numeric keypad Used to enter numeric data or cursor
movement. Generally it consists of a set of
17 keys that are laid out in the same
configuration used by most adding machines
and calculators.
Function keys The twelve function keys (F1-F12) are
present on the keyboard which are arranged
in a row at the top of the keyboard. Each
function key has unique meaning and is used
to some specific purpose.
Control keys/ cursor movement keys These keys provide cursor and screen
control. It includes 4 directional arrow keys.
Control keys also include Home, End, Insert,
Delete, Page-Up, Page-Down, Control (Ctrl),
Alternate (Alt), Escape (Esc)
Special purpose keys/ modifier keys Keyboard also contains some special purpose
keys such as Enter, Shift, Caps Lock, Num
Lock, Spacebar, Tab and Print Screen
Standard keyboard
Standard keyboard are desktop keyboards such as the 101-key US tradi-
tional keyboard or the 104-key Windows keyboards which include alpha-
betic characters, punctuation symbols, numbers and a variety of function keys.
Laptop keyboard
The laptop computer keyboard is a small version of the typical QWERTY
keyboard. A typical laptop have the same keyboard type as a normal key-
board, except for the fact that most laptop keyboards condense the symbols
into fewer buttons to accommodate less space.
Thumb-sized keyboard
Smaller external keyboards have been introduced for devices without a build-
in keyboard such as PDAs and a smartphones. Small keyboards are also
useful where there is a limited space.
Virtual keyboard
The virtual keyboards are not actually physical keyboards but they are simu-
lated using a software.
Zimbabwe Open University 117
Foundations of Computer Hardware Module BITH102
Foldable keyboard
Foldable keyboards are extremely good for travelling. Simply roll them up
and then unroll them when you need them again.
QWERTY
The QWERTY layout is the common layout we know. The pattern of the
alphabetic keys starts with the keys that make up the word “QWERTY”,
therefore the name QWERTY keyboard.
QWERTZ
Used in Germany, Hungary and Czech Republic. The alphabetic pattern also
starts with the keys that make up the word “QWERTZ”.
AZERTY
Used by most French speakers based in Europe. Likewise the alphabetic
pattern starts with the keys that make up the word “AZERTY”.
DVORAK
The DVORAK layout is an alternative to the QWERTY. DVORAK layout
uses less finger motion, increase typing speed and reduces errors compared
to the standard QWERTY. It is named after the person who created it, Dr
August Dvorak. The idea behind the DVORAK layout is to have the most
commonly typed keys under the fingers and make it as easy as possible to
type common words and combinations of letters. As such the layout places
the most commonly used letters in the home row where they are easy to reach
and the least commonly used letters on the bottom row where they are hard-
est to reach.
Here is a brief explanation which led to the creation of the Dvorak layout.
Dvorak believed that there were many problems with the original QWERTY
keyboard claiming that it was a problem that:
Many common letter combinations require a finger to jump over the
home row.
Many English letter combinations require awkward finger motions
Many common letter combinations are typed with one hand (for exam-
ple was, were) instead of spreading the load across all the fingers.
Most typing is done with the left hand which for most people is not the
dominant hand.
Dvorak studied letter frequencies and the physiology of people’s hands and
created a layout to alleviate the problems he believed were part of the
QWERTY layout. The layout he created adheres to the principles that:
Letters should be typed by alternating between hands which makes
typing more rhythmic, increases speed, reduces error and reduces fa-
tigue. On the Dvorak, vowels are all on the left home row, the most
used symbols are on the left, while the most used consonants are on the
right.
For maximum speed and efficiency, the most common letters and
bigrams should be the easiest to type. This means that they should be
on the home row (which is where the fingers rest) and under the strongest
fingers.
The least common letters should be on the bottom row which is the
hardest row to reach.
The right hand should do most of the typing because most people are
right handed.
So the Dvorak keyboard layout addressed problems that were said to be
brought about by the QWERTY layout.
Activity 7.1
1. What is an ergonomic keyboard?
? 2. Research on ABCDE and XPeRT keyboard layouts.
3. Explain the advantages and disadvantages of keyboards.
7.3 Mouse
A mouse is a pointing device that control movement of a cursor on the screen
when it is moved horizontally over a flat surface. The cursor on the screen can
take several shapes for example
I-beam, block arrow, pointing hand and many more. A mouse is the widely
used pointing device in a graphical user interface environment on personal
computers. A user can simply point to options and objects and click a mouse
button. Buttons on the mouse let you select options from menus and drag
objects around the screen and so on.
Mechanical
A mechanical mouse have a rubber or metal ball on its underside that can roll
in all directions to detect movement of the mouse.
Optical
Optical mouse uses devices that emit and sense light to detect the mouse’s
movement. It is more precise than mechanical.
Activity 7.2
7.4 Trackball
A trackball is a stationary pointing device consisting of a ball held by a socket
containing sensors to detect a rotation of the ball about two axes-like an
upside-down mouse with an exposed protruding ball. Instead of moving the
whole mouse around, the user rolls the trackball only which is on the top or
side. To move pointer/ cursor, rotate ball with thumb, fingers or palm of hand.
Trackball is mostly used in notebook or laptop computer instead of a mouse.
Activity 7.3
Activity 7.4
Most OCR readers include a small optical scanner for reading characters and
sophisticated OCR software for analyzing what is read. Advanced OCR sys-
tems cam recognize hand printing though hand printing is much more difficult
to analyze than machine-printed text. With OCR, hard copies can be read
directly into the computer without retyping and the characters converted can
be edited by a word processing software.
Activity7.5
1. Outline the advantages and disadvantages of OCR.
?
7.8 Optical Mark Reader (OMR)
OMR reads hand-drawn pencil marks such as small circles or rectangles on
pre-printed forms in certain places. The OMR reader first reads the answer
key sheet to record the correct answers based on the patterns of light and
then reads the remaining documents and matches their patterns of light against
the answer key sheet. OMR readers are often used for marking multiple choice
answer sheets, capturing data from questionnaires, enrolment forms and lot-
tery tickets.
Activity 7.6
1. Discuss the advantages and disadvantages of OMR.
?
7.9 Bar code reader
A bar code reader or scanner also known as point of sale scanner is a hard-
ware device capable of reading a bar code and printing out the details of the
product and or logging that product into a database so that a company can
easily keep track of its inventory. A bar code reader reads bar coded data
using light patterns that pass through the bar code lines. The bar code reader
uses laser beams to read bar codes. A bar code is data coded in the form of
small lines that act as identification code that consists of a set of vertical lines
and spaces of different widths and sizes that determines what the scanned
object is. Bar codes are often used to help organize and be able to index
information or prices about an object. So the bar code system is widely used
in point of sale in supermarkets, department stores, libraries and so on. The
bar code reader may be a hand held scanner or may be embedded in a
stationary scanner. Bar code reader scans a bar code image, converts it into
an alphanumeric value which is then fed to the computer to which bar code
reader is connected.
Activity 7.7
Summary
This chapter covered the different input devices that we use in the computer
system. The input devices are crucial because they capture different kinds of
information into the computer system for it to be processed and be able to
produce output which will be used for different purposes.
References
Bhardwaj, P. K. (2007). A+, Network+, Security+ Exams. Sebastopol:
O’Reilly Media Inc.
Goel, A. (2010). Computer Fundamentals. New Delhi: Dorling Kindersley
Pvt Ltd.
Kamra, A., & Bhambri, P. (2008). Computer Peripherals and Interfaces.
Pune: Technical Publications.
Karbo, M. (2002). PC Architecture. France: Know Ware.
Mueller, S. (2001). Upgrading and Repairing PCs. USA: Que.
Storage Devices
8.1 Introduction
I n this unit we cover storage devices. Storage devices are categorized into
primary and secondary storage. Secondary storage is further categorised
into magnetic storage, optical storage, solid-state storage and cloud storage.
Foundations of Computer Hardware Module BITH102
8.2 Objectives
By the end of this unit, you should be able to:
able to detect and modify the magnetization of the material. The magnetic
surface is divided into very small regions, each of which has a mostly uniform
magnetisation. As the head moves relative to the surface, the changes in
magnetisation from region to region are detected and recorded as zeros and
ones. Different technologies vary in how the head moves relative to the surface
of the media and how the regions on the media are organized, but the basic
principle is the same.
Magnetic storage is a form of non-volatile storage. This means that the data is
not lost when the storage device is not powered. Magnetic storage is widely
used because it is relatively cheap in comparison with other storage
technologies. Magnetic storage is read-write, which makes it possible to re-
use the storage capacity over and over again by deleting older data. The
storage capacity is also very large, making it attractive for storing very large
amounts of data. The major limitation of magnetic storage is that accessing
the data can be quite slow. As a result, most computer systems use magnetic
storage for non-volatile storage of large amounts of data (typically in a form
of a hard-disk drive) but a different type of storage for system memory, such
as read-only memory (RAM), which is much smaller but can be accessed
much faster.
Magnetic storage media are diskettes, hard disks and magnetic tapes.
Magnetic storage devices hold data even when the computer is turned off so
the data can be used whenever needed. Storage involves writing data to the
medium and reading from the medium. Writing data is the recording of data
on the surface of the disk where it is stored for later use. Reading is the
retrieving of data from the surface and transferring it into the computer’s
memory for use.
even several terabytes. HDD can be internal or external. Those that are internal
are mounted on the motherboard using IDE or SATA cables and those that
are eternal are connected to the CPU usually using USB ports. Examples of
internal HDDs are Seagate, Toshiba, Western Digital and many more.
Platter
Platters are the actual disks inside the drive that store the data contained on
the hard disk drive. They are shaped like a record with a magnetic surface. A
HDD can contain one or more platters depending on its capacity. A spindle
holds the platters together and a motor rotates them at a certain speed
measured in Revolutions Per Minute (RPM).
Spindle
The platters in a drive are separated by disk spacers and are clamped to a
rotating spindle that turns all the platters in unison. The spindle motor is built
right into the spindle or mounted directly below it and spins the platters at a
constant set rate ranging from 3,600 to 7,200 RPM. The motor is attached to
a feedback loop to ensure that it spins at precisely the speed it is supposed to.
Actuator
The actuator is designed to move the read/write arm to the correct position
on the platter to read the data. The actuator moves the actuator arm (read/
write arm) to the correct position on the platters using voice coils motivated
by electric currents. When no electric current is being received, the actuator
causes the actuator arm to place the read/write heads in the parked position.
The read/write arm contains many heads on the end of the arm which are
designed to float above the platter and read data from the platter. It is the
actuator arm that helps position the read/write heads at the correct location
on the platter to read the data. The heads never actually touch the platters when
accessing the data. They function at approximately 5 microns above the surface
of the platter.
Read/Write heads
particle or a fingerprint could disable the spin. This necessitates that hard
drive assembly be done in a clean room When the platters cease spinning the
heads come to rest, or park, at a predetermined position on the heads, called
the landing zone.
External HDD
Magnetic Tapes
needed. Serial access makes it fairly slow to find and retrieve data so it would
not be much useful to store data that is needed quickly, however it is excellent
for archiving data not likely to be needed instantly.
Optical storage is any storage method in which data is written and read with
a laser for archival or backup purposes. The writing or reading of data is
done in the CD-ROM drive or DVD-ROM drive of a PC. Data is written to
optical media such as CDs, DVDs etc. Data is recorded by making dots in a
pattern that can be read back with the aid of light, usually a beam of laser light
precisely focused on a spinning disc. The data on the storage medium is read
by bouncing the laser beam off the surface of the medium. If the beam hits a
dot it is reflected back differently to how it would be if there were no dot.
This difference can be detected, so the data can be read.
Dots can be created using the laser beam (for media that is writable such as
CD-Rs). The beam is used in a high power mode to actually mark the surface
of the medium, making a dot. This process is known as burning data onto a
disc.
The current optical disc technologies such as DVD, DVD-R and DVD-RW
rely on red laser to read and write data whilst new formats use blue violet
laser instead. The benefit of using a blue violet laser (405nm) is that it has a
shorter wavelength than a red laser (650nm) which makes it possible to focus
the laser spot with even greater precision. This allows data to be packed
more tightly and stored in less space, so it is possible to fit more data on the
disc even though it’s the same size as a CD or DVD.
CD/DVD
The most basic form of optical storage is the CD or DVD that can hold data
that can only be read. Formally it is CD-ROM or DVD-ROM. ROM stands
for read-only memory which translates also as non-writeable. CD-ROMs and
A CD-R, DVD-R or DVD+R may be recorded (written on), but only a single
time. The R stands for recordable. This write-once process uses a light-
sensitive dye recording layer to which information is irreversibly written by
means of a laser heating and altering it, to create a pattern of marks
mimicking those of a prerecorded (pressed/molded) CD or DVD. This is
why the writing process is sometimes called burning. Recordable optical discs
can have data written onto them (burnt) by a computer user using a special
disc drive called a disc burner. Data can only be burnt but cannot be erased.
You can keep adding data until the disc is full but you cannot remove any data
or reuse a full disc.
DVD RAM
DVD-RAM discs are a type of rewritable DVD. They often come in a floppy-
disc style case to protect the disc. DVD-RAM also uses phase-change
technology but can be rewritten roughly 100,000 times. With its hard sectors,
random access capabilities and optional cartridge, DVD-RAM more closely
resembles traditional hard drive storage media than do DVD-RW and
DVD+RW. The discs have a similar capacity as DVDs and are random access
devices. DVD-RAM discs are used in many camcorders (video recording
cameras). The discs have a much higher quality than normal DVD-RW and
can reliably store data for up to 30 years. This means that they are often used
for video data backup and archiving.
Blu-Ray
Blu-Ray disks are a recent replacement for DVDs. A Blu-Ray disc can hold 25
to 50GB of data (a dual-layer Blu-Ray disc can hold twice that). Blu-Ray
discs are random access devices. Blu-Ray discs are used in the same way
as DVD-ROMs but, since they can hold more data, they are also used to
store very high-quality, high-definition (HD) video.
The Blu part of Blu-Ray refers to the fact that the laser used to read the disc
uses blue light instead of red light. Blue light has a shorter wave-length than
red light (used with CDs and DVDs).
Using a blue laser allows more data to be placed closer together on a Blu-
Ray disc, than on a DVD or CD, so Blu-Ray has a much higher storage
capacity than the older discs.
HD DVD
The HD-DVD format was launched at the same time as Blu-Ray. For about
a year they competed to be the next DVD. For various reasons, Blu-Ray
won the fight, and the HD-DVD format has been abandoned.
Flash Memory
Memory sticks have made many other forms of portable storage almost
obsolete (there is no point to burn a CD or DVD when you can more
easily copy your files onto a memory stick).
Memory sticks are non-volatile, random-access storage devices.
Each of these small devices has some flash memory connected to a
USB interface. Plug it into your computer and it appears as a drive.
You can then add files, erase files, etc. You can use it to move any type
of file between computers.
Flash memory used to be very expensive, but in recent years it has
become much cheaper and you can now buy a 16GB memory stick
for just a few dollars.
2) Memory Cards
Many of our digital devices (cameras, mobile phones, MP3 players,
etc.) require compact, non-volatile data storage. Flash memory cards
provide this and come in a variety of shapes and sizes.
One of the most common formats used by digital cameras is the SD
Card. The cards store the digital images taken by the camera.
Mobile phones contain a Subscriber Identity Module (SIM) card that
contains the phone’s number, the phonebook numbers, text messages,
etc.
Many phones also have extra memory cards to store music, video,
photos, etc. (e.g Tiny Micro-SD cards).
3) Smart cards
Many credit cards (e.g. ‘chip-and-pin’ cards), door entry cards, satellite
TV cards, etc. have replaced the very limited storage of the magnetic
strip (the dark strip on the back of older cards) with flash memory.
This is more reliable and has a much larger storage capacity.
Cards with flash memory are called smart cards.
Activity 8.1
8.4 Summary
In this unit we discussed that data can be stored on temporary basis in the
RAM or cache memory. Data on the RAM is data that is currently being
used. It is stored on the RAM for easy access. When data needs to be stored
for later use, it can be stored in secondary storage that is magnetically, optically,
in a solid-state or in the cloud.
References
Bhardwaj, P. K. (2007). A+, Network+, Security+ Exams. Sebastopol:
O’Reilly Media Inc.
Goel, A. (2010). Computer Fundamentals. New Delhi: Dorling Kindersley
Pvt Ltd.
Kamra, A., & Bhambri, P. (2008). Computer Peripherals and Interfaces.
Pune: Technical Publications.
Karbo, M. (2002). PC Architecture. France: Know Ware.
Mueller, S. (2001). Upgrading and Repairing PCs. USA: Que.
Output Devices
9.1 Introduction
9.2 Objectives
By the end of this unit, you should be able to:
9.3 Softcopy
Softcopy is an unprinted/ electronic version of a document. It is output in the
form of displays on monitor screens. It is viewed through an appropriate
editing program like adobe reader software, word processing programs or
PowerPoint programs depending on the type of file. One can update a soft
copy document at any time and transfer of documents can be done between
two or more computers so easily and very fast using ftp programs, emails or
through memory sticks etc. Softcopy documents have paved way for paperless
office since all documents will be stored on the computer.
9.3.1 Monitors
A monitor is an output device that displays information from the CPU on the
screen. Thus it works as an interface between CPU and user. It is also known
as visual display unit. A monitor is more like a television but differ in that the
monitor displays information at a much higher resolution. Monitors are
connected to the CPU through video adapter or video card which is mounted
on the motherboard. The connections are done through different kinds of
ports like HDMI, DVI or VGA depending on the type of connection. The
CPU sends instruction to the video adapter telling what needs to be displayed
on the screen. The video adapter converts the instructions into a set of
corresponding signals and sends to the monitor. The Monitor contains a circuitry
that generates the picture on the screen from the set of signals. Monitors
usually are not user serviceable, so for your safety it is not wise to open and
work on a monitor.
Measurements of performance
Monitor performance is measured using the resolution, dot pitch, refresh rate,
response time, aspect ratio, luminance, contrast ratio, power consumption
just to name a few.
Resolution
Resolution refers to the number of dots of colour (known as pixels) that are
displayed in the X (across) and Y (down) co-ordinates. It tells how densely
pixels are arranged on a screen. It is expressed in terms of horizontal pixels x
vertical pixels. For example typical screens are capable of displaying 800x600
pixels. For a given display size, maximum resolution is limited by dot pitch.
Dot Pitch
Dot pitch is the measurement of how close together the pixels or phosphor
dots are that make up an image. The smaller the dot pitch, the sharper the
image.
Refresh rate
Refresh rate is the vertical frequency or the rate at which each pixel on a
screen is redrawn. A low refresh rate results in an image that flickers resulting
in eye strain. A refresh rate of 60Hz means the image is redrawn 60 times per
second. Maximum refresh rate is limited by response time.
Response time
Response time is the time a pixel in a monitor takes to change, that is from
active (white) to inactive (black) and back to active again. It is measured in
milliseconds. Lower numbers mean faster transition and therefore fewer visible
image artefacts.
Aspect ratio
Aspect ratio is the ratio of the horizontal length to the vertical length. It is
written as horizontal length followed by a full colon (:) then vertical length.
Monitors usually have the aspect ratio 4:3, 5:4, 16:10, 16:9. This means that
the ratio of the width of the display screen to the height is 16 to 9 for example.
CRT monitors use CRT technology to create a display. The CRT (also known
as the picture tube) receives the signals through a cable and the signal is
decoded by the display controller which finally appears on a phosphor screen.
CRTs have a conical shape and there is an electron gun or cathode ray gun at
the back end of the monitor and a phosphor screen in the front. The electron
gun fires a stream of electrons towards the display screen through a vacuum
tube. This stream of electrons is also known as cathode rays. At the middle of
a monitor there are magnetic anodes which are magnetized in accordance
with the instruction from the display controller. When electrons (cathode rays)
pass through the magnetic anodes, they are pushed or pulled in one direction
or other depending on the magnetic field on the anodes. This directs the
electrons towards the correct part of phosphor coating inside the display
glass. When electrons strikes the phosphor coated screen passing through
the mesh (shadow mask or aperture grill), the phosphor lights up making a
displayable dot on the computer screen. There are three different coloured
phosphors (Red, Green and Blue) for each pixel and the colour of the pixel
depends on the phosphor on which the electrons strike.
CRTs incorporate a metal sheet behind the display screen which affects the
pixels on the screen as well as brightness on the screen. Shadow mask is an
obsolete technology in which there is a sheet with millions of holes to pass
electrons in order to hit the phosphor coating. The shadow mask covers the
entire screen thereby protecting the phosphors from stray ions (due to vacuum)
and also limits the strengths of the rays reducing the brightness on the monitor.
Aperture grill is a mesh of wires rather than any metal sheet with holes in it.
Although the grill is fragile, it allows a brighter display.
An LCD monitor is a thin, light, flat display that uses LCD technology to
show clear images and is used on laptops, cell phones, calculators, digital
cameras and flat screen displays. LCD technology allows displays to be much
thinner than CRT technology. LCD screens are based on the principle of
blocking the light rather than emitting it and because of that they use up much
less power than CRT or LED monitors. The image on an LCD screen is
created by sandwiching an electrically reactive substance between two
electrodes. The colour of this substance can be changed by increasing or
reducing the electrical current. A colour monitor is typically made up of five
layers: a backlight, a sheet of polarized glass, a mask of coloured pixels, a
grid layer of responsive liquid crystal solution and a second polarized sheet of
glass. Images are created by manipulating the orientation of the crystals through
precise electrical charges of varying degrees and voltages. They act like tiny
shutters, opening or closing in response to the stimulus, thereby allowing
degrees of light that have passed through specific coloured pixels to illuminate
the screen. As LCD technology has evolved, different technologies for
producing colour have emerged. Passive matrix screens which were the first
to be invented, use two transistors one for each row and one for each column
of pixels to activate a particular point on the LCD grid. Active matrix screen
usually use thin film transistor (TFT) technology in which each point on the
grid has its own transistor. This allows only the desired pixels to be activated.
Passive matrix screens tend to respond more slowly than active matrix screens
and are not able to produce the same level of image quality.
Plasma display
A plasma display is a flat panel display in which each pixel on the screen is
illuminated by a tiny bit of charged gas (plasma), somewhat like a tiny neon
light. Plasma displays are thinner than CRTs and brighter than LCDs. A plasma
display panel is common to large TV displays of 30 inches (76cm) or larger.
They are called plasma displays because they use small cells containing
electrically charged ionized gases called plasmas.
LED is a new type of screen that has been introduced to supersede the LCD
and Plasma screens. Its name relates to the way the display is being illuminated.
LED monitors still use the same liquid crystals as the previous LCD displays.
The way the backlight works however with the LEDs led to a number of
improvements in the display. LEDs are energy efficient and have a long lifespan.
The energy efficient nature of LEDs allows them to produce brighter light than
other types of bulbs while using less energy. For this reason traditional flat
screen LCD displays have started to be replaced by LED displays which use
LEDs for the backlight. LED TVs and computer monitors are typically brighter
and thinner than their LCD counterparts. LEDs has been around for decades
and is used in some laptops as backlighting. You probably know it best from
its use as the backlighting in your cell phones. The advantage of using LED
lighting primarily centre on its ability to provide uniform lighting that offers a
wide range of angles for viewing. Simply put, with LED lighting you can look
at your laptop display from almost any angle and still make sense of what you
see. Both LCD and LED screens are TFT LCD (discussed earlier) screens
but using different backlight. LED version is a LCD screen using LED backlight
instead of florescent backlight that is used in normal LCD.
This is the latest technology for display screens. Using polymers that can be
made from almost any organic material, the OLED technology is superior to
other types of display lighting since it requires no backlighting. That change
has the benefit of reducing the power consumption of any laptop with the
technology which should not only save power but improve the battery life of
laptops. OLEDs are made from organic (carbon based) materials that emit
light when electricity is applied through them. Since OLEDs do not require a
backlight and filters (unlike LCD displays), they are more efficient, simpler to
make and much thinner. OLEDs have a great picture quality, brilliant colours,
fast response rate and a wide viewing angle.
Activity 9.1
? 1. Explain other monitor performance measurements aspects
in detail.
2. Differentiate the different screen technologies.
9.4 Hardcopy
A hardcopy is a computer output printed on paper, film or other permanent,
tangible medium as distinguished from information on a computer disk or in
computer memory. It is sometimes referred to as printout. Hard copies are
often preferred to electronic versions for reproductions purposes. They can
be read by anyone at any time as it requires no assistance from external
devices. Important and official documents are usually preserved in this form
to create a tangible record of the material. Hardcopy is again not subject to
failure of an electronic system, and while it can be physically lost or damaged,
it cannot be corrupted or lost in the same way that a computer document can.
For this reason many people generate electronic and printed versions of
important material. Hard copy/ printouts are made out through different types
of printers.
9.4.1 Printers
A printer is an output device that produces text and graphics on a physical
medium such as paper or transparency film. Printers can be categorized into
two:
i) Impact printers
Dot matrix printer is an impact printer that uses print heads containing from 9
to 24 pins. These pins produce patterns of dots on paper to form the individual
characters. The 24 pin dot matrix printer produces more dots than a 9 pin dot
matrix printer which results in much better quality and clearer characters. The
general rule is the more the pins the clearer the letters on paper. The pins
strike the ribbon individually as the print mechanism moves across the entire
line in both directions that is from left to right then right to left and so on. The
user can produce a color output with a dot matrix printer (the user will change
the black ribbon with a ribbon that has color stripes). Dot matrix printers are
inexpensive and typically print at speeds of 100 to 600 characters per second
(cps).
The daisy wheel printer is called so because the print mechanism looks like a
daisy, at the end of each petal is a fully formed character which produces
solid line print. A hammer strikes a petal containing a character against the
ribbon and the character prints on the paper. Its speed is slow, typically 25-
55 cps. As the characters on the wheel are fixed, the size and font can only be
changed by using a different wheel. To print a character, the printer rotates
the disk until the desired letter is facing the paper. Then the hammer strikes
the disk forcing the character to hit an ink ribbon, leaving an impression of the
character on the paper.
Inkjet printers
Inkjet printers work in the same way as dot matrix printers in the form of
images and characters with little dots. However on inkjet printers, the dots
are formed by tiny droplets of ink. Characters on paper are formed by spraying
ink from tiny nozzles through an electrical field that arranges the charged ink
particles into characters at the rate of approximately 250cps. Characters are
formed as a result of electrically charged or heated ink being sprayed in fine
jets onto paper. The ink is absorbed into the paper and dries instantly. Various
colors scan be used.
Laser printer
Laser printer works like a photocopy machine. The printer produces images
on paper by directing a laser beam at a mirror which bounces the beam onto
a drum. The drum has a special coating on it to which toner (an ink powder)
sticks. Using patterns of small dots, a laser beam conveys information from
the computer to a positively charged drum to become neutralized. From all
those areas of drum which become neutralized, the toner detaches. As the
paper rolls by the drum, the toner is transferred to the paper printing the
letters or other graphics on the paper. A hot roller bonds the toner to the
paper. The speed of laser printers is high and they print quietly without
producing much noise. Laser printers produce high quality output as compared
to other printers.
Activity 9.2
Parallel
Serial
A serial interface sends data to the printer one bit at a time. These interfaces
need to be configured to serial communication parameters such as baud rate,
parity bit or start and stop bits. Serial printers are rarely used these days.
USB
The USB is the most common type of printer interfaces used on small and
medium-range printers and many other peripherals. USB is faster than other
types of interfaces. USB printers come with PnP-compatibility and can be
automatically detected and configured by the Operating System.
IEEE1394
The IEEE1394 is also known as firewire interface. This interface is not built-
in on many printers or computers. It is mainly used where highly demanding
printing applications are used.
Network interface
Wireless interface
SCSI interface
Very few printers have a SCSI interface. These printers are becoming obsolete
due to other faster technologies such as the USB and the IEEE1394. SCSI
printers use the SCSI interface on the computer and an SCSI ID is used to
identify the device on the SCSI bus that can have more than one device
attached to the SCSI chain.
Activity 9.3
? 1.
2.
Discuss the various printer interfaces.
What is the purpose of a printer interface?
BIOS
The printer BIOS or firmware is just like the computer BIOS that detects
various components of the printer during startup. The BIOS is usually located
on a semiconductor chip on the motherboard or logic board of the printer.
Printer driver
A printer driver acts as an interface between the operating system and the
printer. It converts print jobs into a format that the printer can understand.
When you install a printer on a windows XP or a windows 7 desktop, you
will also be required to install the printer driver if the operating system does
not automatically configure it for you. Installing an incorrect printer driver
results in garbled printing or no printing at all.
The PDL is used to convert an incoming print job into electrical signals so that
the text or the image can be reproduced on paper. Common PDLs include
PostScript and Printer Control Language (PCL).
Printer Memory
Printers use RAM to temporarily store print jobs during printing. High-end
printers have large amounts of RAM to accept large print jobs. Some printers
also have a built-in hard disk that further helps improve printing performance.
Some printers allow you to upgrade the printer memory to enhance its
performance.
1. Check the compatibility of the device with the operating system installed
on the computer.
2. Obtain necessary hardware, connection cables and device drivers.
3. Connect the printer to an appropriate port such as parallel, serial, USB,
IEEE1394, SCSI, wired or wireless network port.
4. Install the device driver if it is not automatically installed by the operating
system.
5. Configure the printer
6. Verify the installation and test its functionality by printing a test page.
Activity 9.4
9.8 Summary
In this unit, we discussed about the various output devices. We outlined that
output come in two forms either as softcopy or hardcopy. Softcopy output is
shown on the screen and hardcopy output is printed on paper. We also
discussed that the type of monitor is defined by the screen technology used
on that monitor. Again we discussed two types of printers impact and non-
impact printers. Most printers we use in our offices for different purposes fall
in these two categories. However there are other various types of printers not
covered in this unit. Further research on them.
References
10.1 Introduction
I n this chapter we equip you with the knowledge of various disk system
architectures that were once used in the computer system. It is important to
have an appreciation of these architectures though they may be obsolete
because as a computer technician you may encounter them in one way or the
other during the servicing process and you do not have to get stuck when you
encounter such architectures. It also gives an insight to students regarding the
evolution of disk architectures.
Foundations of Computer Hardware Module BITH102
10.2 Objectives
By the end of this unit, you should be able to:
floppy disk drive that uses the 3 ½ inch floppy disk is called the 3 ½ inch
floppy disk drive. There are three types of floppy disks namely 8 inch, 5 ¼
inch and 3 ½ inch disks.
This was the first disk with 8 inches in diameter. It was protected by a flexible
plastic jacket and was a read-only device used by IBM as a way of loading
microcode. Early microcomputers used for engineering, business or word
processing often used one or more 8-inch disk drives for removable storage.
The CP/M operating system was developed for microcomputers with 8-inch
drives. The family of 8-inch disks and drives increased over time and later
versions could store up to 1.2MB. Many microcomputer applications did
not need that much capacity on one disk, so a smaller size disk with lower
cost media and drives was feasible. The 5 ¼-inch drive succeeded the 8-inch
size in many applications and developed to about the same storage capacity
as the original 8-inch size using higher density media and recording techniques.
Older systems used the 5 ¼ inch floppy disk drive to read and write data to
the 5 ¼ inch floppy disk. This drive had a lever on the front of the drive that
must be turned clockwise to lock the floppy disk in after inserting the disk in
the drive. Turning the lever anti-clockwise would remove the floppy disk from
the drive.
The 3 ½ inch floppy disk drive can read and write data to the 3 ½ inch floppy
Zimbabwe Open University 165
Foundations of Computer Hardware Module BITH102
disk. The 3 ½ inch floppy drive spins the floppy disk at a speed of 300
rotations per minute. This enables the floppy to be formatted with 80 tracks
on each side of the disk. Each track is alienated into 18 sectors. The sector
can hold 512 bytes. The 3 ½ inch floppy disk drive also had an eject button
that is used to remove the floppy disk from the drive. The 3 ½ inch floppy had
a high density and could hold 720KB of data. The floppy disk was then
improved and the density increased to create a high-density floppy disk that
could hold 1.44MB of data. The 3 ½ inch floppy was again further improved
and the double-sided floppy disk was created that could store data on both
sides of the floppy disk.
In addition to the connectors, the cable on most systems has a special twist
that inverts the signals of wires 10-16. These are the wires carrying the Drive
Select and Motor Enable signals for each of the two drives. Floppy disk
drives have DS (Drive Select) jumpers that were designed to enable you to
select whether a given drive should be recognized as A or B. You might not
even know that these jumpers exist because the twist in the cable prevents
you from having to adjust them. When installing two floppy disk drives in one
system (admittedly a rarity nowadays), the cable electrically changes the DS
configuration of the drive that is plugged in after the twist. Thus a twist causes
a drive physically set to the second DS position (B) to appear to the controller
to be set to the first position (A) and vice versa. The adoption of this cable
has made it possible to use a standard jumper configuration for all floppy disk
drives, regardless of whether you install one or two drives in a computer. If
you install only a single floppy disk drive, you use the connector after the twist
which will cause the drive to be recognized as drive A.
Activity 10.1
? 1.
2.
Differentiate the various floppy disk types.
Explain what is meant by floppy connectors and which
are they.
Activity 10.2
? Research on each of the above interfaces
ST-506/412 and ESDI are what you could call true disk-controller-to-drive
interfaces. SCSI and IDE are system-level interfaces that usually incorporate
a chipset-based variation of one of the other two types of disk controller
interfaces internally. For example most SCSI and IDE drives incorporate the
same basic controller circuitry used in separate ESDI controllers. The SCSI
interface adds another layer of interface that attaches the controller to the
system bus whereas IDE is a direct bus attachment interface.
IDE is different than SCSI and ESDI (Enhanced Small Device Interface)
because its connectors are on each drive meaning the drive can connect directly
to the motherboard or controller. IDE and its updated successor EIDE are
common drive interfaces found in IBM compatible computers. IDE/ATA is
also known as PATA (Parallel ATA). Below is a picture of the IDE connector
on the back of a hard drive, a picture of what an IDE cable looks like and the
IDE channels it connects to on the motherboard.
In data recovery it helps to know the disk interface you are working with
because many data recovery problems involve drive setup and installation
problems. Each interface requires a slightly different method of installation
and drive configuration. If the installation or configuration is incorrect or
accidentally altered by the system user, it can prevent access to data on a
drive. Accordingly anyone who wants to become proficient in data recovery
must be an expert on installing and configuring various types of hard disks and
controllers.
ATA-2: Better known as EIDE. EIDE outlined PIO mode 3 and PIO mode
4.
ATA-3: Improved the reliability of high speed transfers and added Self-
Monitoring Analysis and Reporting Technology (SMART).
Activity 10.3
? 1.
2.
Differentiate IDE and SATA.
What are the advantages of SATA over IDE?
Although SCSI has been popular in the past, today many users are switching
over to SATA drives.
SCSI-2: was approved in 1990, added new features such as fast and wide
SCSI and support for additional devices.
SCSI standards are usually backward compatible. This means that, if an older
peripheral device is attached to a newer computer with support for a later
standard, the older device will work at the older and slower data rate.
Activity 10.4
? 1.
2.
Give the full form of SCSI.
Name the devices that are used to connect through SCSI
ports.
3. What are the three components of the SCSI system?
10.6 Summary
This unit discussed about the floppy disk architecture whereby we focused
on the overview of floppy disks, their history and the different floppy disk
types that were used in the computer system. It further went on to discuss the
main internal interfaces that were used to connect a computer motherboard’s
data paths or bus and the computer’s disk storage devices that is the IDE and
SCSI interfaces. We discovered that IDE is the same as ATA or PATA and it
has been superseded by SATA which is the interface widely used to connect
for example HDD internally to the motherboard. SCSI is said to be obsolete
but it is still being used in some computer systems. SCSI is the most popular
interface for attaching high speed disk drives to higher performance PCs such
as workstations or network servers.
References
Bhardwaj, P. K. (2007). A+, Network+, Security+ Exams. Sebastopol:
O’Reilly Media Inc.
Field, G., & Ridge, P. M. (2000). The book of SCSI. USA: William Pollock.
Kamra, A., & Bhambri, P. (2008). Computer Peripherals and Interfaces.
Pune: Technical Publications.
Karbo, M. (2002). PC Architecture. France: Know Ware.
Mueller, S. (2001). Upgrading and Repairing PCs. USA: Que.
Networking Hardware
11.1 Introduction
I n this unit we are going to cover all equipment that builds up a network
from as simple as the Network Interface Card, to the cables that are used
to connect the computers in a network, to the switches, routers, firewalls,
gateways and all other equipment that make from as smaller a network as
possible to the big network that we call the internet.
Foundations of Computer Hardware Module BITH102
11.2 Objectives
By the end of this unit, you should be able to:
Define a network.
Differentiate various network types.
Understand various cables used in networking and where
each cable is appropriate.
Understand the wiring standards used when preparing
UTP cables.
Demonstrate how to wire a UTP cable.
Explain various networking equipment and where each
is appropriate.
A LAN is a computer network that spans a relatively small area. Most LANs
are confined to one building or a group of buildings. Each individual computer
in a LAN has its own CPU with which it executes programs, but it also is able
to access data and devices anywhere on the LAN. This means that many
users can share expensive devices such as laser printers as well as data. Users
can also use the LAN to communicate with each other by sending email or
engaging in chat sessions. LANs are capable of transmitting data at very fast
rates, much faster than data can be transmitted over a telephone line but the
distances are limited and there is also a limit on the number of computers that
can be attached to a single LAN. Below is a diagram that shows a LAN.
These networks are similar to the ones mentioned above respectively, only
differ in that the wireless networks are formed without the use of cable
connections or physical media to connect hosts with the server. Data is
transferred over radio transceivers.
Now that we know what a network is, we need now to explore the hardware
or equipment that makes it possible for devices within a network to be able to
communicate and share resources.
11.4 Cables
Cables are the medium through which information usually moves from one
device on a network to the other. The type of cable chosen for a network is
related to the network’s topology, protocol and size.
Coaxial cables
Coaxial cabling is the primary type of cabling used by cable television industry
and is also widely used for computer networks such as Ethernet. Though
more expensive than standard telephone wire, it is much less susceptible to
interference and can carry much more data. It consists of a Centre core made
of a solid copper or stranded copper surrounded by a dielectric insulator.
The insulator is covered on top by a braided metal shield or wire mesh of
aluminium or copper. The shielding protects transmitted data by absorbing
the stray electromagnetic signals or noise, so that the noise does not get to the
core and distort the data.
Twisted pair cable is a type of cable that consists of two independently insulated
wires twisted around one another. The wires are twisted together to help
reduce crosstalk (noise generated by adjacent pairs) and electromagnetic
induction. This is the type of cabling that is used for telephone communications
and most modern Ethernet networks. Twisted pair cables come in two varieties
that is, Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP).
UTP cable has four pairs of wires inside the jacket. Each pair is twisted with
a different number of twists per inch to help eliminate interference from adjacent
pairs and other electrical devices. The tighter the twisting, the higher the
supported transmission rate and the greater the cost per foot.
There are two wiring standards in use that are T-568A and T-568B
T-568B standard
The diagrams below shows how the wires look like in a RJ-45 8pin connector
using a T-568B wiring standard.
T-568A standard
The T-568A specifications reverses the orange and green connections. Below
is a diagram to show how the pins look like in a RJ-45 8pin connector using
T-568A standard.
Activity 11.1
? 1. Demonstrate how to wire a UTP cable using both
standards you have learnt in this unit.
2. Test your cables to see if they are working.
STP is a type of copper telephone wiring in which each of the two copper
wires that are twisted together are coated with an insulating coating that
functions as a ground for the wires. It is similar to UTP but with each pair
covered by an additional copper braid jacket or foil wrapping. It combines
the techniques of shielding, cancellation and wire twisting. It is more expensive
and difficult to install as compared to UTP. STP cables come with a layer of
metallic shielding material between the cables and the sheath. STP cables
provide some degree of protection from electromagnetic interference and
radio frequency disturbances and can carry signals to greater distances. But
this advantage comes with extra cost of installation. The metallic shielding
must be grounded at both ends. If it is improperly grounded, the shield acts
like an antenna and picks up unwanted signals. Because of its cost and difficult
Fibre optic cable is made up of very thin glass or plastic stretched out and put
inside a sheath. The transmission in fibre optic cables is carried by light signals
and is immune to electromagnetic interference and radio frequency
disturbances. This makes it ideal for certain environments that contain a large
amount of electrical interference. It has also made it the standard for connecting
networks between buildings due to its immunity to the effects of moisture and
lighting. They can also carry data signals to longer distances than coaxial and
twisted pair cables and is considered the most secure of all cable types. It is
also capable of carrying signals at vastly greater speeds. This capacity broadens
communication possibilities to include services such as video conferencing
and interactive services. Fibre optic cables are very expensive in terms of the
cost involved in installation and maintenance. They need expensive hardware,
skilled technicians and special tools for installation.
Fibre optic cables are categorized into single-mode and multimode fibre optic
cables.
Single-mode fibre optic cable allows one beam (or wavelength) of light to
propagate through the fibre. It is capable of higher bandwidth and greater
distances than multimode, and it is often used for campus backbones. This
type of fibre uses lasers as the light generating method. It is much more expensive
than multimode.
In multimode fibre optic cable, multiple beams of light travel through the core
and are reflected by the cladding. Some of the beams even get refracted into
the cladding causing loss of signal. It is often used for workgroup applications
and intra-building applications such as risers. It uses light emitting diodes (LED)
as a light-generating method.
Some computers have two NICs, one for wired connections as the one above
and one for wireless connections. Below is a picture for NIC expansion card
for wireless connections.
11.7 Workstation
A workstation is a computer on which a person performs everyday regular
assignments. A workstation is primarily a PC. It can also be a laptop. A typical
workstation is a computer that is configured with a NIC, networking software
and the appropriate cables. Workstations do not necessarily need large storage
hard drives because files can be saved on the file server.
11.8 Hub
11.9 Repeater
A repeater is a hardware device that function at the physical layer of the OSI
and that is used to connect two segments of the same network. A repeater
11.10 Bridge
A bridge is a network connectivity device that connects one LAN segment to
another that use the same protocol for example Ethernet or Token ring.
Network bridges have two purposes: connecting to LAN segments to form a
large segment and dividing a large network segment into smaller segments. A
bridge runs at the data link layer of the OSI model. It is used to filter traffic by
only forwarding traffic to the destination network segment. If a data unit on
one LAN is intended for a destination on an interconnected LAN, the bridge
forwards the data unit to that LAN otherwise it passes it along on the same
LAN. A bridge builds a routing table of computer MAC (Media Access
Control) addresses. It does this by examining the source MAC addresses of
frames it encounters on its interfaces and builds up the routing table that maps
an interface to a MAC address according to the interface on which a MAC
address is received. A bridge usually offers only one path to a given
interconnected LAN.
Bridges can also reduce network traffic by segmenting the network (dividing
one network into segments) creating collision domains. This isolates and or
reduces traffic on both segments, making more bandwidth available. Bridges
pass on all broadcast frames that is frames with no entry in the routing table.
If the destination address of a frame is not in the bridge’s MAC address table,
the bridge forwards the frame to all interfaces except the one on which it is
received, thereby contributing to broadcast storms. Bridges are slow in
operation and there can be some data loss in bridges and if a data loss occurs,
the lost data cannot be recovered. However new technology has been
developed in the form of switches and routers that replaced bridges.
Activity 11.2
11.11 Switch
the OSI layer at which they operate. Because of that, there are layer 2 and
layer 3 switches. Layer 2 switches enable data frames to be switched using
MAC address information. Layer 3 switches enable data to be switched using
IP address information, therefore they incorporate some routing functions such
as address and path determination. Each port on a switch will receive only
packets that are meant for it through the use of internal address tables.
11.12 Router
A router is a networking device that provide internetwork connectivity that is
it interconnects different networks allowing data to be moved from one network
to the other. Conceptually routers are similar to bridges, except that they
operate at the network layer (layer 3) of the OSI model and gather information
about the networks to which they are connected. Like bridges, routers provide
filtering but does so using network addresses to route data packets across
multiple networks instead of MAC addresses. Routers also do not pass on
broadcast traffic. This reduces network traffic significantly and prevents
propagation of broadcast storms. Routers are more intelligent than bridges.
They make complex routing decisions to select the optimal path to a given
destination from among multiple paths. Routers can be configured to support
single or multiple protocols. A router creates and maintains a table, known as
a routing table of the routes available to get to the different networks to which
it is connected. The router uses this information together with information
about prevailing network conditions to determine the best route for a given
packet. Routing tables can be configured manually using static routes or
dynamically using some routing protocols. Whether a router is configured
statically or dynamically or a combination of both, the objective is the same,
to facilitate communication between hosts or nodes on different networks.
Static routing requires the systems administrator to manually setup and
configure the routing table and to specify each route between networks. The
router does not have the capacity of adjusting to changes in the network (it is
not possible to learn new routes). As a result if a defined route fails or becomes
unavailable, the destination becomes unreachable. This technique is simple to
implement and simple to understand, but it becomes difficult to keep routing
tables accurate when the network is growing rapidly and too much work if
the network is very large. It has the advantage of eliminating all traffic related
to routing information updates. Static routing conserves bandwidth because
the routes do not generate route update traffic, which consumes a lot of network
bandwidth. In dynamic routing, routes have the ability to discover the best
routes using some protocols. In a network a link may fail unexpectedly or a
11.13 Brouter
A brouter is a network device that combines the functionality of a bridge and
a router but cannot be distinctly classified as either. It operates at the data link
and network layers of the OSI reference model. It can function as either a
bridge or a router depending on the network transport protocol in use. For
instance, a brouter can act like a router with routable protocols such as TCP/
IP and acts as a bridge with non-routable protocols line NetBEUI. Bridged
protocols might propagate throughout the network but techniques such as
filtering and learning might be used to reduce potential congestion. Brouters
are used as connecting devices in the networking system, so it acts as a bridge
in a network and as a router in an internetwork.
11.14 Gateway
A gateway is a network device that is responsible for translating information
from one format to another and can run at any layer of the OSI model depending
on what information the gateway translates. A typical use of a gateway is to
ensure that system in one environment can access information in another
environment, in other words it provides a remote network with connectivity
to a host network. It provides remote network or an autonomous system that
is out of bounds for the host network nodes. Any network has a boundary or
a limit, so all communication placed within that network is conducted using
the devices attached to it including switches and routers. If a network node
wants to communicate with a node/ network that resides outside of that network
or autonomous system, the network will require the services of a gateway
which is familiar with the routing paths of other remote networks. Gateways
serve as the entry and exit point of a network, all data routed inward or
outward must first pass through and communicate with the gateway in order
to use routing paths. Generally a router is configured to work as a gateway
device in computer networks. The gateway or default gateway is implemented
at the boundary of a network to manage all the data communication that is
routed internally or externally from that network. Besides routing packets,
gateways also possess information about the host network’s internal paths
and learned path of different remote networks. If a node wants to communicate
with a foreign network, it will pass the data packet to the gateway which then
routes it to the destination using the best possible path. Gateways are also
called protocol converters. The activities of a gateway are more complex
than that of a router or switch as it communicates using more than one protocol.
Activity 11.3
? Explain the differences between a gateway and a router.
11.15 Firewall
A firewall is a network security device that grants or rejects network access
to traffic flows between an untrusted zone for example the internet and a
trusted zone for example private or corporate network. In other words, a
firewall protects a computer network from unauthorized access. The firewall
acts as a demarcation point or traffic cop in the network as all communication
should flow through it and it is where traffic is granted or rejected access.
Only traffic that is defined in the firewall policy is granted access. Network
firewalls may be hardware devices, software programs or a combination of
both. Network firewalls may also be configured to limit access to the outside
from internal users, for example an organization may limit access to social
networks like Facebook during working hours. A common form of firewall is
a proxy server. A proxy server act as an intermediary between internal
computers and external networks by receiving and selectively blocking data
packets at the network boundaries. These network firewalls also provide an
extra measure of safety by hiding internal LAN addresses from the outside
internet. In a proxy server environment, network requests from multiple clients
appear to the outsider as all coming from the same proxy server address.
Activity 11.4
? Differentiate between firewall and gateway.
11.16 Servers
A server is a computer that is designed to manage network resources by
processing requests from clients and delivering data to those client computers.
Servers can serve data to systems on a LAN or a WAN over the internet.
Servers enable sharing of resources and information. They centralize file
storage, which facilitates preserving and backing up important data. Users
can be granted access to selected areas depending on work needs, which
enhances security. Servers streamline managing computers in a department.
With server management tools, IT administrators can centrally maintain
workstations on the network and automate routine tasks, which save time
and reduce costs. There are many types of servers for example web servers,
mail servers, file servers and many more. Each type runs software specific to
the purpose of the server for example a web server may run Apache HTTP
Server or Microsoft IIS which provide access to websites over the internet.
Network servers typically are configured with additional processing, memory
and storage capacity to handle the load of servicing clients. While any computer
can be configured as a server, most large businesses use rack-mountable
hardware designed specifically for server functionality. Multiple rack-mountable
servers can be placed in a single rack and often share the same monitor and
input devices. Most servers are accessed remotely using remote access
software, so input devices are often not even necessary. While servers can
run on different types of computers, it is important that the hardware is sufficient
to support the demands of the server for example a web server that runs lots
of web scripts in real time should have a fast processor and enough RAM to
handle the load without slowing down.
Activity 11.5
? Explain the purpose of a server on a network.
11.17 Summary
In this unit we discussed the different types of networks and the different
equipment that is used in order to make up a network. We discovered that
some equipment works better in some environments and worst in others so it
will be wise to choose equipment that best fits your network in order to get
effective performance of your network.
References
Bhardwaj, P. K. (2007). A+, Network+, Security+ Exams. Sebastopol:
O’Reilly Media Inc.
Bonaventure, O. (2010). Computer Networking: Principles, Protocols and
Practice. Belgium: cnp3book.
Goel, A. (2010). Computer Fundamentals. New Delhi: Dorling Kindersley
Pvt Ltd.
Kurose, J. K., Ross, K.W. (2012). Computer Networking: A top down
approach. USA: Pearson.
Mueller, S. (2001). Upgrading and Repairing PCs. USA: Que.
12.1 Introduction
12.2 Objectives
By the end of this unit, you should be able to:
Peer-to-peer network
Client/Server network
Advantages
Centralized: resources and data security are controlled through the
server.
Scalability: any or all elements can be replaced individually as needs
increase.
Flexibility: new technology can be easily integrated into system.
Interoperability: all components (client/network/server) work together.
Accessibility: server can be accessed remotely and across multiple
platforms.
Disadvantages
Expense: requires initial investment in dedicated server
Maintenance: large networks will require a professional to ensure
efficient operation.
Dependence: when a server goes down, operations will cease across
the network.
Installing Windows Server 2012
Step 1: Insert the Windows Server 2012 DVD into the drive and press Enter
when you see the
Message, “Press any key to boot from CD or DVD” in order to boot from
setup.
Step 2: Once the setup files are loaded, setup will start. Click Next
Step 4: On the screen with four options that appears, select Windows Server
2012 DataCenter Evaluation (Server with GUI) and Click Next.
Step 6: Now you will be asked for the drive (or Partition) you want to install
Windows on, if you don’t have it is advisable to create a partition to install
your Windows and Click Next.
Step 7: Once the setup is done, it will restart your machine and start your
Windows Server 2012 for the first time. It will ask you then to set up a
password for the administrator user.
Step 9: When setup is done, you log in for the first time using the credentials
you supplied during setup process.
Step 10: Once logged in, Windows Server 2012 shows the server manager.
Step 11: Done, You now have Windows Server 2012 installed with DataCenter.
network and the same workgroup for File and Printer sharing to work properly.
File sharing allows easy access and share files and folders on computers that
belong to the same workgroup or homegroup. Printer sharing allows your
computers that are part of the main network and same workgroup or
homegroup to send print jobs to a printer connected wired or wirelessly to
your computer.
Step 1: Make sure that all options in the advanced sharing settings are on.
These options include Network discovery, file and printer sharing, public folder
sharing and so on. These options are found by following the path: Start-
>Control Panel->Network and Internet->View network status and tasks-
>change advanced sharing settings.
Step 2: Share the file/folder by right clicking the file/folder you like to share
and select Properties from the Menu that appears.
Step 3: On the window that appears, go to sharing tab and click on the share
button.
Step 4: On the drop down menu, type a name of the person or group you
want to share the file/folder with and click Add. Alternatively you can select
an already existing name and click share.
Step 5: You are done. Your file/folder should now be accessible to the users
or groups you specified.
Step 1: Make sure that all options in the advanced sharing settings are on.
These options include Network discovery, file and printer sharing, public folder
sharing and so on. These options are found by following the path: Start-
>Control Panel->Network and Internet->View network status and tasks-
>change advanced sharing settings.
Step 3: Locate and double-click on the icon of the printer you like to share.
Step 5: Go to the sharing tab and check the share this printer option.
Step 6: Enter a share name for your printer and click OK.
You should now be able to browse and add your printer on the other computers
within your network. All what the other users on the network need to do in
order to access the network printer is to add the printer to their computers.
a file or folder may be accessible only to one user (the owner), to system
administrators, to a certain group of users, to the public that is to all logged
users. The exact procedure varies by platform.
TCP
packets back into the same order in which they were sent. TCP’s connection-
oriented properties set it apart from similar protocols such as UDP. TCP
provides error detection and recovery, flow control and guaranteed reliable
delivery of data. Network applications that require reliable, guaranteed, error-
free delivery use TCP. But TCP does this at a price. The TCP header contains
20 bytes, which means it has more overhead than UDP. Because it has more
overhead, it is slower than UDP. To choose between TCP and UDP, decide
whether you want speed (UDP) or reliability (TCP).
UDP
Activity 12.1
? 1.
2.
Explain the meaning of internet access software
Discuss the steps involved in configuring internet access
software.
12.9 Summary
Network software is software that is designed to help setup, manage and or
monitor computer networks. Network software allows network devices to
share resources such as files and printers. Communication over the network
is made possible by the use of protocols which are the rules of communication
within a network.
References
Bhardwaj, P. K. (2007). A+, Network+, Security+ Exams. Sebastopol:
O’Reilly Media Inc.
Bonaventure, O. (2010). Computer Networking: Principles, Protocols and
Practice. Belgium: cnp3book.
Goel, A. (2010). Computer Fundamentals. New Delhi: Dorling Kindersley
Pvt Ltd.
Kurose, J. K., Ross, K.W. (2012). Computer Networking: A top down
approach. USA: Pearson.
Mueller, S. (2001). Upgrading and Repairing PCs. USA: Que.
Software
13.1 Introduction
13.2 Objectives
By the end of the unit, you should be able to:
Application software
This type of operating system can be used by only one user and only one task
can be executed at a time. The operating system efficiently and effectively
manages all hardware components in such a manner that only one job can be
can be processed at a time thus being used on hand held devices and palmtops.
Typical operating systems include the Palm Operating System and the
Windows Mobile.
Within this type of interface, the user is able to simultaneously execute multiple
tasks simultaneously on a single machine. For example a user can concurrently
download an application form from a university website, typing his or her
application letter and also printing his scanned copies of certificates. Single
user multitasking operating systems include Microsoft Windows Vista,
Microsoft Windows 8 and Linux just to mention a few. These are the most
common type of operating systems found on desktop machines and laptops
on both the Windows and Macintosh (Apple) platforms.
Multi-user
This is an interface that uses menus, icons, graphics, pointing devices and
windows to achieve the user desired goals. The GUI is characterised by a
start menu that has all groups of programs and a task bar that depicts programs
that are currently being used. Menus in GUI bundle and organise commands
in an efficient manner such that commands can easily be selected from this
menu compared to them being typed in as for the command line interface. A
pointing device such as a mouse direct items of interest in a specific window
and selects the desired menu choices for the user.
entails the mixture of text and graphic elements on the same visual display
unit. The three most common GUI interaction styles include menu selection,
form filling and direct manipulation. The dragging and dropping of folders in a
Windows environment is an example of direct manipulation. Windows XP,
Vista, 7 and 8 all implement the GUI. Some versions of Linux have now
adopted the GUI mode of operation.
The GUI is a user friendly environment that is easy to learn and use. However,
the user is only confined to the limited choices on the respective menus. GUI
is continuously improving emanating from the constant hardware advancement.
This type of a user interface is navigated by the user directly typing commands
on the keyboard to give instructions to the system. It was the earliest type of
interface used on MS DOS and UNIX. This interface works as follows:
The CLI displays a prompt signifying that the computer is ready to
execute operations.
The user types desired commands and presses the Enter key
The command is executed and the result of the operation displayed.
A new prompt is displayed ready for the next input command.
The CLI was designed in such a manner that it runs on simple hardware
specifications with very much limited resources compared to GUI. Nowadays,
it is mainly used by technically advanced computer personnel such as systems
administrators and programmers. CLI supports a quick interaction between
the user and the machine and users have complete control of the interface.
However, it is difficult for new users as they have to know the correct syntax
and semantics to execute the commands. Additionally, there is a high likelihood
of typographical errors.
13. The TPM digitally signs the log recorded by the UEFI using the unique
key.
14. The client sends the log to the server.
15. The attestation server verifies the integrity of the start-up process.
16. Anti-Malware is loaded.
17. Windows sign in.
17. Choose customise from the two given options customise and express
settings.
18. Click the ‘Yes turn on sharing and connect to devices’.
19. Choose your preferred options and click next on the subsequent
prompts until a Metro user interface is presented on your screen.
20. Verify that all hardware and device drivers have been detected and
installed correctly using the Device Manager. Go to the Device Manager
and click search. Type devmgmt.msc and click devmgmt on the left.
21. All hardware components are listed and a yellow exclamation mark
signifies that the device driver has not been installed
22. Search for all these drivers manually from the respective manufacturers
and install them. The configuration will be complete if all the yellow
exclamation marks have been removed from the Device Manager.
RAM
128MB 1GB 1GB(32 bit) or 1GB(32 bit) or
2GB(64 bit) 2GB(64 bit)
Hard Disk
space 1.5GB 40 GB+15GB 16GB (32 bit) 16GB (32 bit)
for installation or 20GB (64 or 20GB (64
bit) bit)
Graphics Card
Microsoft Microsoft Microsoft Microsoft
DirectX 9.0c DirectX 9 with DirectX 9 with DirectX 9 with
WDDM WDDM WDDM
ii. Patches
Patches are pieces of programs designed to address security loopholes
or related issues with the operating systems. The security loopholes are
mainly associated with browsers. For example, Microsoft often releases
the patches for the Internet Explorer browser to address the browser’s
memory corruption and vulnerability.
Activity 13.1
? Evaluate the security properties exhibited by Windows 8
during the booting process.
13.14 Summary
In this unit we discussed about software. Software are programs and their
associated documentation and it is an interface between hardware and a
computer user. Software is classified into system software, application software
and programming software.
References
Ashdown, A. (2001). Installing Software. Bristol: Dorling Kindersley
Publishers Ltd.
Bhardwaj, P. K. (2007). A+, Network+, Security+ Exams. Sebastopol:
O’Reilly Media Inc.
Grubb, P., Takang, A. A. (2003). Software Maintenance: Concepts and
Practice. New Jersey: World Scientific Publishing.
Mueller, S. (2001). Upgrading and Repairing PCs. USA: Que.
Pigoski, T. M. (1996). Practical Software Maintenance: Best Practices for
Managing your Software Investment. New York: John Wiley and Sons
Inc.
14.1 Introduction
T his unit gives students an appreciation of the software that they use on a
daily basis. It equips students with more understanding of the difference
between application software and system software and also how to install,
configure, repair and uninstall application software.
Foundations of Computer Hardware Module BITH102
14.2 Objectives
By the end of the unit, you should be able to:
Activity 14.1
? Differentiate custom-written software from off-the-shelf-
software.
Activity 14.2
? 1.
2.
Go to Start -> Control Panel
Programs -> Uninstall a program
3. Select a program that you want to uninstall or repair.
4. If you want to uninstall, click on uninstall and if you want
to repair click on repair.
Activity 14.3
? 1. Rigorously define system software with the aid of
examples.
2. Install system software on a machine of your choice.
3. Compare and contrast system software and application
software.
4. Figure out applications installed on your computer. Did
you have to install them or they came pre-installed on
your computer?
5. Differentiate mobile applications from desktop
applications.
14.6 Summary
An application software is used in the daily operations of a computer user to
perform specific tasks. An application software runs on a system software.
For a computer user to be able to use application software, it has to be first
installed on the system software. Application software can get corrupt and be
repaired or be uninstalled if it is no longer needed.
References