Computer Engineering. A Coursebook of Professional English - Coursebook.
Computer Engineering. A Coursebook of Professional English - Coursebook.
VERETENNIKOVA V.P.
COMPUTER ENGINEERING
ODESA 2020
Veretennikova V.P.
UDC 811.11:004.7(075) Plan of EMP 2020
Edited by: Y.V. Fleita, Ph.D. in Engineering, O.S. Popov Odesa National
.Academy of Telecommunications.
Reviewed by:
Associate Professor I.A. Zhaboryuk, Ph. D. in Philology, the Department of
Foreign Languages, South Ukrainian National Pedagogical University named after
K.D. Ushinsky;
Associate Professor E.S. Zinchenko, Ph. D. in Philology, the head of the
Department of Foreign Languages, Odessa National Academy of Food Technologies;
2
COMPUTER ENGINEERING
CONTENTS
3
Veretennikova V.P.
COMPUTER ENGINEERING
II. Read Text One and get ready to discuss it in the classroom:
Text 1
COMPUTER ENGINEERING AS a DISCIPLINE
Computer engineering provides some background of the field and shows how
it evolved over time. It is important for graduates to have a proper sense of
professionalism to ensure a proper perspective in the practice of computer
engineering. Computer engineering is defined as the discipline that embodies the
science and technology of design, construction, implementation, and maintenance of
software and hardware components of modern computing systems and computer-
controlled equipment.
Computer engineering has traditionally been viewed as a combination of both
computer science (CS) and electrical engineering (EE). It has evolved over the past
three decades as a separate, although intimately related, discipline. Computer
engineering is solidly grounded in the theories and principles of computing,
mathematics, science, and engineering and it applies these theories and principles to
solve technical problems through the design of computing hardware, software,
networks, and processes. Historically, the field of computer engineering has been
widely viewed as “designing computers.” In reality, the design of computers
themselves has been the province of relatively few highly skilled engineers whose
goal was to push forward the limits of computer and microelectronics technology.
The successful miniaturization of silicon devices and their increased reliability as
system building blocks has created an environment in which computers have replaced
the more conventional electronic devices. These applications manifest themselves in
the proliferation of mobile telephones, personal digital assistants, location-aware
devices, digital cameras, and similar products. It also reveals itself in the myriad of
applications involving embedded systems, namely those computing systems that
appear in applications such as automobiles, large-scale electronic devices, and major
appliances. Increasingly, computer engineers are involved in the design of computer-
based systems to address highly specialized and specific application needs. Computer
engineers work in most industries, including the computer, aerospace,
4
COMPUTER ENGINEERING
telecommunications, power production, manufacturing, defense, and electronics
industries. They design high-tech devices ranging from tiny microelectronic
integrated-circuit chips, to powerful systems that utilize those chips and efficient
telecommunication systems that interconnect those systems. Applications include
consumer electronics (CD and DVD players, televisions, stereos, microwaves,
gaming devices) and advanced microprocessors, peripheral equipment, systems for
portable, desktop and client/server computing, and communications devices (cellular
phones, pagers, personal digital assistants).
A wide array of complex technological systems, such as power generation and
distribution systems and modern processing and manufacturing plants, rely on
computer systems developed and designed by computer engineers. Technological
advances and innovation continue to drive computer engineering. There is now a
convergence of several established technologies (such as television, computer, and
networking technologies) resulting in widespread and ready access to information on
an enormous scale. This has created many opportunities and challenges for computer
engineers. This convergence of technologies and the associated innovation lie at the
heart of economic development and the future of many organizations.
As noted previously, computer engineering evolved from the disciplines of
electrical engineering and computer science. Initial curricular efforts in computer
engineering commonly occurred as a specialization within EE programs, extending
digital logic design to the creation of small-scale digital systems and, eventually, the
design of microprocessors and computer systems. The evolution may take many
forms, including (a) an expanded content from computer science, (b) collaboration
with the emerging software engineering discipline on application-focused projects
and embedded systems with a greater emphasis on design and analysis tools to
manage complexity, or (c) re-integration with electrical engineering, as computer-
based systems become dominant in areas such as control systems and
telecommunications.
(From Computer Engineering Curriculum Guidelines for Undergraduate Degree
Programs in Computer Engineering)
Commentary
EE stands for Electrical Engineering, the branch of engineering science that
studies the uses of electricity and the equipment for power generation and distribution
and the control of machines and communication. The Department of Electrical
Engineering offers a variety of programs for graduate study. For instance, students
who complete their BS (Bachelor of Science) in EE gain a basic understanding of
electrical engineering built on a foundation of physical science, mathematics,
computing, and technology. Coursework prepares students for careers in government
agencies, the corporate sector, or for future study in graduate or professional schools.
I. Find in the above text English equivalents for the following word
combinations and write them out:
5
Veretennikova V.P.
небольшие цифровые системы; продвигать пределы; эта сходимость
технологий; встроенные системы; микроэлектронные кристаллы интегральной
схемы; в огромном масштабе; обеспечивает некоторые предпосылки; как
отмечено ранее; прочно обоснована в теориях; огромное количество сложных
систем; высококвалифицированные инженеры; несметное число приложений;
глубоко связанный; как системные стандартные блоки; миниатюризация
кремниевых устройств; быстрое увеличение количества мобильных телефонов;
фокусируемые на приложении проекты; много возможностей и проблем;
начальные учебные усилия; осведомлённые о расположении устройства.
III. Look through the text again and find the answers to the following
questions:
1. Why is it important for graduates to have a proper sense of professionalism
to ensure a proper perspective in the practice of computer engineering? 2. How can
you define computer engineering? 3. What theories and principles is computer
engineering grounded in? 4. What has the field of computer engineering been widely
viewed historically as? 5. What has created an environment in which computers have
replaced the more conventional electronic devices? 6. Where can computer engineers
work? 7. Who designs high-tech devices ranging from tiny microelectronic
integrated-circuit chips to powerful systems? 8. What drives computer engineering?
9. What does the convergence of several established technologies result in? 10. What
disciplines did computer engineering evolve from? 11. What forms may the evolution
of computer engineering take?
IV. Retell the above text using as many of the word combinations from
Exercise I as you can.
WORKING ON WORDS
I a). Study the table and learn phrasal verbs with “push”.
II. Complete the sentences with the words from the box:
WRITTEN PRACTICE
II. Choose the necessary verb form from the box and translate the
sentences:
1. During their work, computer engineers may find themselves with answers
….. computer dilemmas, creating the next big technological solution. 2. You also
need good communication skills, because a computer engineer often needs to go
outside the lab ….. with customers, and other professionals. 3. While his
responsibilities ….. more of electrical and software engineering, he must be trained in
software design and the integration of hardware and software. 4. We must ….. strong
detail orientation, teamwork, and analytical skills. 5. Our engineer had to apply the
theories and principles of science and mathematics to design hardware and …..
technical problems. 6. Because of the rapid pace of change in the computing field,
computer engineers must be life-long learners to maintain their knowledge and skills
within their ….. discipline. 7. An important distinction should be ….. between
computer engineers, electrical engineers, other computer professionals, and
engineering technologists. 8. Computer engineering students must …..to integrate
theory, professional practice, and social constructs in their engineering careers. 9.
Graduates of our Academy should have an understanding of the responsibilities …..
with engineering practice, including the professional, societal, and ethical context in
which they do their work. 10. You will ….. to contribute significantly to the analysis,
design, and development of complex systems.
III. Find in the above text the sentences with the present perfect active or
passive and translate them.
COMMUNICATIVE SITUATIONS
8
COMPUTER ENGINEERING
DATA STRUCTURES AND ALGORITHMS
II. Read Text Two and get ready to discuss it in the classroom:
Text 2
DATA STRUCTURES AND ALGORITHMS
Data structures and algorithms are the materials out of which programs are
constructed. Furthermore, the computer itself consists of nothing other than structures
and algorithms. The built-in data structures are the registers and memory words
where binary values are stored; the hard-wired algorithms are the fixed rules,
embodied in electronic logic circuits, by which stored data are interpreted as
instructions to be executed. Thus at the most fundamental level a computer can work
with only one kind of data, namely individual bits, or binary digits, and it can act on
the data according to only one set of algorithms, those defined by the instruction set
of the central processing unit.
The problems people undertake to solve with the aid of a computer are seldom
expressed in terms of bits. Instead the data take the form of numbers, characters,
texts, events, symbols and more elaborate structures such as sequences, lists and
trees. The algorithms employed to solve the problems are even more varied; indeed,
there are at least as many algorithms as there are computational problems. The
computer is a truly general-purpose device, whose nature can be transformed
altogether by the program given it. The underlying principle was first set forth by
John von Neumann. A stream of information is at one moment data being processed
by a program, and at the next moment the same information is interpreted as a
program in its own right. Hence a program is formulated in terms of familiar notions
convenient to the problem at hand; then another program, called an assembler or a
compiler, maps those notions onto the
9
Veretennikova V.P.
facilities available in the computer. In this way it is possible to construct systems of
extraordinary complexity. The programmer sets up a hierarchy of abstractions,
viewing the program first in broad outline and then attending to one part at a time
while ignoring the internal details of other parts. Without higher level abstractions a
program could not be understood fully even by its creator.
Among the facilities provided by almost all programming languages is the
ability to refer to an item of data by assigning it a name, or identifier. Some of the
named quantities are constants, which have the same value throughout the segment of
the program in which they are defined; for example, pi might be assigned the value
3.14159. Other named quantities are variables, which can be assigned a new value by
statements within the program, so that their value cannot be known until the program
is run. The variables diameter and circumference might take on new values each time
a calculation is done.
The name of a constant or a variable is a mnemonic aid to the programmer, but
it has no meaning to the computer. The compiler that translates a program text into
binary code merely associates each identifier with an address in memory. If an
instruction calls for multiplying diameter by pi, the computer fetches whatever
numbers are stored at the specified addresses and calculates the product; if the result
is to become the new value of circumference, it is stored in memory at the address
corresponding to that label.
The naming of constants and variables in programming is similar to the use of
symbolic expressions in algebra, but for a computer to handle the process some
additional information must be supplied. The information gives the «type» of each
named quantity. A person working a problem by hand has an intuitive grasp of data
types and the operations that are valid for each type; it is known, for example, that
one cannot take the square root of a word or capitalize a number. One reason such
distinctions are easily made is that words, numbers and various other symbols are
represented quite differently. For the computer, however, all types of data ultimately
resolved into a sequence of bits, and the type distinctions must be made explicit.
Suppose in the course of some operation the seven-bit binary value 1010011
has been read into a register in the central processing unit of a computer. How is the
value to be interpreted? One possibility is that it represents a cardinal, or counting,
number, in which case the equivalent in decimal notation would be 83. In many
programming languages the value could also represent a signed integer equal to
decimal — 45. The same binary data could encode not a number but a character; in
the American Standard Code for Information Interchange (ASCII) binary 1010011
specifies the letter S.
The data types recognized by common programming languages include
cardinal numbers, integers, real numbers (approximated as decimal fractions), sets,
characters and strings of characters. Information on each variable's type is needed not
only to interpret the binary representation but also to set aside the correct amount of
space in storage. In many modern computer systems a single character is allocated
eight bits, or one byte, of memory, whereas a cardinal or an integer might be given
two or four bytes and a real number might take up as many as eight bytes.
(From Algorithms & Data Structures by Niklaus Wirth)
10
COMPUTER ENGINEERING
Commentary
Niklaus Emil Wirth (born 15 February 1934) is a Swiss computer scientist,
best known for designing several programming languages, including Pascal, and for
pioneering several classic topics in software engineering. In 1984 he won the Turing
Award, generally recognized as the highest distinction in computer science, for
developing a sequence of innovative computer languages.
I. Find in the above text English equivalents for the following word
combinations and write them out:
отображать понятия на объекты; извлечь квадратный корень; в общем;
строки символов; логическая схема; вычислительная задача; аппаратно-
реализованный алгоритм; формулировать в терминах привычных понятий;
другие именованные величины; действительны для каждого типа; базовый
принцип; десятичная система счисления; пространство в устройстве хранения
данных; операторами в программе; вручную; регистры и слова памяти;
выражаются в битах; требует умножения диаметра на число пи; знаковое целое
число; прописать число; двоичное представление; вычисляет произведение.
III. Answer the following questions using the words and word
combinations from Exercises I and II:
1. What are programs constructed of? 2. Where are binary values stored? 3.
What do you know about hard-wired algorithms? 4. What level at can a computer
work with only one kind of data, namely individual bits, or binary digits? 5. Who was
the underlying principle first set forth by? 6. Which terms is a program formulated
in? 7. How does a programmer set up a hierarchy of abstractions? 8. In which case
couldn’t a program be understood fully? 9. What quantities have the same value
throughout the segment of the program in which they are defined? 10. What can you
say about variables? 11. What is a mnemonic aid to the programmer? 12. What does
the compiler that translates a program text into binary code associate each identifier
with? 13. What is similar to the use of symbolic expressions in algebra? 14. Are
words, numbers and various other symbols represented quite differently? 15. What do
the data types recognized by common programming languages include? 16. How
many bytes might a real number take up?
11
Veretennikova V.P.
WORKING ON WORDS
II a). Study the table and learn phrasal verbs with “set”.
Set against means to balance one thing against another or to compare one
thing with another.
Set aside means to not consider something, because other things are more
important; to use something, often time or money, for a specific purpose.
Set back means to cause a delay by a particular time.
Set forth means to state or outline an opinion.
Set up means to prepare equipment, software etc., for use.
(From the Oxford Advanced Learner’s Dictionary)
12
COMPUTER ENGINEERING
c). Find in the above text and copy out the sentences containing the
phrasal verb “set”.
III. Find in the above text and copy out sentences in which linking
expressions however, thus, namely and hence are used. Translate the sentences
with them. Say which of these linking expressions:
a) introduces clarification?
b) introduces a contrast?
c) expresses results and conclusions?
WRITTEN PRACTICE
IV. Find in the above text and copy out sentences containing modal verbs
with the Infinitive Passive.
14
COMPUTER ENGINEERING
The results that I obtained may invoke positive social change. (The results
(that) I obtained may invoke positive social change.)
I have found the article, which I have been looking for.
b). Find in the text and copy out sentences containing whose/that/ which.
VIII. Translate the following sentences into English using the words and
word combinations of the topical vocabulary:
1. Структура представляет собой дерево, листьями которого являются
элементы исходного массива. 2. При измерении сложности алгоритмов и
структур данных мы обычно говорим о количестве операций, требуемых для
завершения работы (вычислительная сложность), и объёме ресурсов, который
необходим алгоритму (пространственная сложность). 3. Алгоритм, который
выполняется в десять раз быстрее, но использует в десять раз больше места,
может вполне подходить для серверной машины с большим объёмом памяти. 4.
Сложность алгоритма растёт с увеличением размера входных данных. 5. Если
линейный алгоритм обрабатывает один элемент пять миллисекунд, то мы
можем ожидать, что тысячу элементов он обработает за пять секунд. 6.
Структуры данных формируются с помощью типов данных, ссылок и операций
над ними на выбранном языке программирования. 7. Чтобы доказать, что
данный алгоритм работает верно, мы используем метод математической
индукции по номеру разряда.
16
COMPUTER ENGINEERING
COMPUTATION THEORY
II. Read Text Three and get ready to discuss it in the classroom:
Text 3
COMPUTATION THEORY
A computer is a physical device that helps us process information by executing
algorithms. An algorithm is a well-defined procedure, with finite description, for
realizing an information-processing task. An information-processing task can always
be translated into a physical task.
When designing complex algorithms and protocols for various information-
processing tasks, it is very helpful, perhaps essential, to work with some idealized
computing model. However, when studying the true limitations of a computing
device, especially for some practical reason, it is important not to forget the
relationship between computing and physics. Real computing devices are embodied
in a larger and often richer physical reality than represented by the idealized
computing model.
Quantum information processing is the result of using the physical reality that
quantum theory tells us about for the purposes of performing tasks that were
previously thought impossible or infeasible. Devices that perform quantum
information processing are known as quantum computers. Quantum computers can be
used to solve certain problems more efficiently than can be done with classical
computers and also this can be done reliably even when there is a possibility for
errors to occur.
We are often interested in the amount if resources used by a computer to solve
a problem, and we refer to this as the complexity of the computation. An important
resource for a computer is time. Another resource is space, which refers to the
amount of memory used by the computer in performing the computation. We
measure the amount of a resource used in a computation for solving a given problem
17
Veretennikova V.P.
as a function of the input length of an instance of that problem. For example, if the
problem is to multiply two n bit numbers, a computer might solve this problem using
2
up to 2n + 3 units of time (where the unit of time may be seconds, or the length of
time required for the computer to perform a basic step).
Of course, the exact amount of resources used by a computer executing an
algorithm depends on the physical architecture of the computer. A different computer
3
multiplying the same numbers mentioned above might use up to time 4n + n + 5 to
execute the same basic algorithm. This fact seems to present a problem if we are
interested in studying the complexity of algorithms themselves, abstracted from the
details of the machines that might be used to execute them. In theoretical computer
science, an algorithm is considered to be efficient with respect to some resource if the
k
amount of that resource used in the algorithm is in O (n ) for some k. In this case we
say that the algorithm is polynomial with respect to the resource. If an algorithm’s
running time is in O (n), we say that it is linear, and if the running time is in O (log n)
we say that it is logarithmic. Since linear and logarithmic functions do not grow faster
than polynomial functions, these algorithms are also efficient. Algorithms that use
(с n ) resources, for some constant c, are said to be exponential, and are considered
not to be efficient. If the running time of an algorithm cannot be bounded above by
any polynomial, we say its running time is superpolynomial. The term ‘exponential’
is often used loosely to mean superpolynomial.
One advantage of this coarse measure of complexity is that it appears to be
robust against reasonable changes to the computing model and how resources are
counted. For example one cost that is often ignored when measuring the complexity
of a computing model is the time it takes to move information around. For example,
if the physical bits that are arranged along a line, then to bring together two bits that
are n-units apart will take time proportional to n (due to special relativity, if nothing
else). Ignoring this cost is in general justifiable, since in modern computers, for an n
of practical size, this transportation time is negligible. Furthermore, properly
accounting for this time only changes the complexity by a linear factor (and thus does
not affect the polynomial versus superpolynomial dichotomy).
Computers are used so extensively to solve such a wide variety of problems
that questions of their power and efficiency are of enormous practical importance,
aside from being of theoretical interest.
(From Introduction to the Theory of Computation. By Michael Sipser)
18
COMPUTER ENGINEERING
WORKING ON THE TEXT
I. Find in the above text English equivalents for the following word
combinations and write them out:
пример задачи; время транспортировки; линейный множитель;
продолжительность эксплуатации; по отношению к; для выполнения одного и
того же базового алгоритма; задача обработки информации; ранее считались
невозможными или неосуществимыми; часто используется свободно;
полиномиальные функции.
II. Memorize the following word combinations and make up your own
sentences or situations with them:
to execute algorithms, to work with an idealized computing model, a coarse
measure of complexity, to perform quantum information processing, by a linear
factor, with respect to some resource.
III. Answer the following questions using the words and word
combinations of the topical vocabulary:
1. In what way does a computer help us process information? 2. When is it
essential to work with some idealized computing model? 3. Why is it important when
studying the true limitations of a computing device not to forget the relationship
between computing and physics? 4. Can quantum computers be used to solve certain
problems more efficiently than can be done with classical computers? 5. How do we
usually measure the amount of a resource used in a computation for solving a given
problem? 6. What does the exact amount of resources used by a computer executing
an algorithm depend on? 7. In which case can we say that the algorithm is polynomial
with respect to the resource? 8. What algorithms are said to be exponential, and are
considered not to be efficient? 9. When will it take time proportional to n to bring
together two bits that are n-units apart?
IV. Retell the above text using as many of the word combinations from
Exercises I and II as you can.
WORKING ON WORDS
I. Find in the above text and copy out phrases in which the preposition by
is used. Translate them.
II. Choose the correct preposition to complete each of the following
sentences:
on with (2) into by for at of (2) to
IV. Complete the sentences with the words from the box:
20
COMPUTER ENGINEERING
WRITTEN PRACTICE
II. Fill in the blank with the passive voice of the verb in brackets after the
given modal verb. Translate the sentences.
1. This computing problem …… on any computer (can/solve). 2. Efficient
fault-tolerant error-correcting techniques …… to deal with realistic error models
(must/ find). 3. The Theory of Computation …… into the following three areas:
Complexity Theory, Computability Theory, and Automata Theory (can/divide). 4.
These mathematical problems…... in a systematic way (can/solve). 5. A direct
proof…… by providing a factorization of an − bn (can/give). 6. These algorithms that
use (с ) resources ….... not to be efficient (must/consider). 7. The amount of a
n
III. Find in the above text and copy out sentences containing modal verbs
with the Infinitive Passive.
21
Veretennikova V.P.
V. a) Study the grammar table and learn.
b) Find in the above text and copy out sentences containing the present
participle in the function of an adverbial modifier.
COMMUNICATIVE SITUATIONS
II. Discuss the arguments for the following problem. Explain why it is so.
In theoretical computer science and mathematics, the theory of computation is
the branch that deals with how efficiently problems can be solved on a model of
computation, using an algorithm.
III. Imagine you are an expert of a great modern computer scientist. Note
down 5 pieces of factual information about the design of computational systems,
the theory of computation and the practical technique of the scientist. Your
fellow student will ask you questions to find out what you know about your
subject. Use the topical vocabulary.
22
COMPUTER ENGINEERING
INTEGRATED CIRCUITS
II. Read Text Four and get ready to discuss it in the classroom:
Text 4
INTEGRATED CIRCUITS
An integrated circuit or monolithic integrated circuit (also referred to as an IC,
a chip, or a microchip) is a set of electronic circuits on one small flat piece (or "chip")
of semiconductor material, normally silicon. The integration of large numbers of
tiny transistors into a small chip resulted in circuits that are orders of magnitude
smaller, cheaper, and faster than those constructed of discrete electronic components.
The IC's mass production capability, reliability and building-block approach to circuit
design ensured the rapid adoption of standardized ICs in place of designs using
discrete transistors. ICs are now used in virtually all electronic equipment and have
revolutionized the world of electronics. Computers, mobile phones, and other
digital home appliances are now inextricable parts of the structure of modern
societies, made possible by the small size and low cost of ICs.
ICs were made possible by experimental discoveries showing that
semiconductor devices could perform the functions of vacuum tubes, and by mid-
20th-century technology advancements in semiconductor device fabrication. Since
their origins in the 1960s, the size, speed, and capacity of chips has increased
enormously, driven by technical advances that allow more and more transistors on
chips of the same size – a modern chip may have several billion transistors in an area
of a human fingernail in size. These advances, roughly following Moore's law, allow
a computer chip of 2016 to have millions of times the capacity and thousands of
times the speed of the computer chips of the early 1970s.
Semiconductor ICs are fabricated in a planar process which includes three key
process steps – imaging, deposition and etching. The main process steps are
supplemented by doping and cleaning.
23
Veretennikova V.P.
Mono-crystal silicon wafers (or for special applications, silicon on sapphire or
gallium arsenide wafers) are used as the substrate. Photolithography is used to mark
different areas of the substrate to be doped or to have polysilicon, insulators or metal
(typically aluminium or copper) tracks deposited on them.
Integrated circuits are composed of many overlapping layers, each defined by
photolithography, and normally shown in different colors. Some layers mark where
various dopants are diffused into the substrate (called diffusion layers), some define
where additional ions are implanted (implant layers), some define the conductors
(polysilicon or metal layers), and some define the connections between the
conducting layers (via or contact layers). All components are constructed from a
specific combination of these layers.
ICs have two main advantages over discrete circuits: cost and performance.
Cost is low because the chips, with all their components, are printed as a unit by
photolithography rather than being constructed one transistor at a time. Furthermore,
packaged ICs use much less material than discrete circuits. Performance is high
because the IC's components switch quickly and consume little power (compared to
their discrete counterparts) because of their small size and close proximity. The main
disadvantage of ICs is the high cost to design them and fabricate the required
photomasks. This high initial cost means ICs are only practical when high production
volumes are anticipated.
(From Wikipedia, the free encyclopedia)
Commentary
Moore’s law: Moore's law is the observation that, over the history of
computing hardware, the number of transistors in a dense integrated circuit doubles
approximately every two years. The law is named after Gordon E. Moore, co-founder
of Intel Corporation, who described the trend in his 1965 paper.
I. Find in the above text English equivalents for the following word
combinations and write them out:
много накладывающихся слоёв; принцип компоновки из стандартных
блоков; крошечные транзисторы; полупроводниковые устройства; изготовить
необходимые фотошаблоны; монокристаллические кремниевые пластины;
набор электронных схем; стоимость и производительность; человеческий
ноготь; различные примеси; на порядок меньше, дешевле и быстрее;
неразъёмные части; дополняются легированием и очисткой.
II. Study the following word combinations and use them in sentences of
your own:
discrete electronic components; to refer to as an IC; to result in circuits;
semiconductor device fabrication; to ensure the rapid adoption; to be driven by
technical advances; to consume little power, many overlapping layers.
24
COMPUTER ENGINEERING
III. Answer the following questions using the word combinations and
phrases of the topical vocabulary:
1. What is an integrated circuit or monolithic integrated circuit? 2. What did
the integration of large numbers of tiny transistors into a small chip result in? 3.
Where are ICs now used? 4. What experimental discoveries were ICs made possible
by? 5. How many transistors may a modern chip have in an area of a human
fingernail in size? 6. How are semiconductor ICs fabricated? 7. What are the main
process steps supplemented by? 8. What is used as the substrate? 9. What is
photolithography used for? 10. Why are overlapping layers shown in different
colors? 11. Are all components constructed from a specific combination of these
layers? 12. What advantages do ICs have over discrete circuits? 13. Is there any
disadvantage in ICs?
IV. Retell the above text using as many of the word combinations from
Exercises I and II as you can.
WORKING ON WORDS
I. Find in the above text and copy out phrases in which the preposition
into is used. Translate them.
III. Complete the sentences with the words from the box:
25
Veretennikova V.P.
WRITTEN PRACTICE
III. Ask questions to which the following statements may serve as the
answers.
1. A cylindrical p-type silicon crystal has typical dimensions 25 cm long and
2.5 cm diameter. 2. The high-resistance resistors are long and narrow while low-
resistance resistors are short and of greater cross-section. 3. In order to protect ICs
from external environment and to provide mechanical protection, various forms of
encapsulation are used for integrated circuits. 4. The interconnection of the circuit
elements is accomplished by extending the metallic deposits from terminal to
terminal of adjacent components. 5. A logarithmic amplifier produces an output
voltage that is proportional to the logarithm of the input voltage. 6. Before any
impurity is added to the substrate, the oxide layer (i.e. SiO2 layer) is etched. 7. The
simultaneous mass production is the reason for the low cost of integrated circuits.
26
COMPUTER ENGINEERING
V. Translate the following sentences into English:
1. Основным элементом аналоговых микросхем являются транзисторы. 2.
В ближайшем будущем большинство сложных ИС будут изготовляться на
основе совмещенной технологии в связи с непрерывным развитием и
совершенствованием как полупроводниковой, так и тонкоплёночной
технологий. 3. Часто под интегральной схемой понимают кристалл или плёнку
с электронной схемой. 4. Цифровые интегральные микросхемы по большей
части состоят из транзисторов. 5. Триггеры предназначены для запоминания
двоичной информации. 6. Размеры компонентов постоянно уменьшаются
благодаря развитию технологий. 7. Использование триггеров позволяет
реализовывать устройства оперативной памяти (то есть памяти, в которой
информация хранится только на время вычислений). 8. Аналоговые
интегральные схемы также содержат резисторы и конденсаторы.
COMMUNICATIVE SITUATION
27
Veretennikova V.P.
TYPES OF CIRCUITS
II. Read Text Five and get ready to discuss it in the classroom:
Text 5
TYPES OF CIRCUITS
The circuits consisted of separately manufactured components (e.g. resistors,
capacitors, diodes, transistors etc.) joined by wires or plated conductors on printed
boards are known as discrete circuits because each component added to the circuit is
discrete (i.e. distinct or separate) from the others. Discrete circuits have two main
disadvantages. Firstly, in a large circuit (e.g. TV circuit, computer circuit) there may
be hundreds of components and consequently a discrete assembly would occupy a
large space. Secondly, there will be hundreds of soldered points posing a considerable
problem of reliability. To meet these problems of space conservation and reliability,
engineers started a drive for miniaturized circuits. This led to the development of
microelectronics in the late 1950s.
Microelectronics is the branch of electronics engineering which deals with
micro-circuits. A micro-circuit is simply a miniature assembly of electronic
components. One type of such circuit is the integrated circuit, generally abbreviated
as IC. An integrated circuit has various components such as resistors, capacitors,
diodes, transistors etc. fabricated on a small semiconductor chip. How circuits
containing hundreds of components are fabricated on a small semiconductor chip to
produce an IC is a fascinating feat of microelectronics. This has not only fulfilled the
ever increasing demand of industries for electronic equipment of smaller size, lighter
weight and low power requirements, but it has also resulted in high degree of
reliability.
An integrated circuit consists of a number of circuit components and their
interconnections in a single small package to perform a complete electronic function.
The following points are worth noting about integrated circuits: (1) In an IC, the
various components are automatically part of a small semi-conductor chip and the
individual components cannot be removed or replaced. This is in contrast to a
discrete assembly in which individual components can be removed or replaced if
28
COMPUTER ENGINEERING
necessary. (2) The size of an IC is extremely small. In fact, ICs are so small that you
normally need a microscope to see the connections between the components. It is
possible to produce circuits containing many transistors, diodes, resistors etc. on the
surface of this small chip. (3) No components of an IC are seen to project above the
surface of the chip. This is because all the components are formed within the chip.
Integrated circuits free the equipment designer from the need to construct
circuits with individual discrete components such as transistors, diodes and resistors.
With the exception of a few very simple circuits, the availability of a large number of
low-cost integrated circuits has largely rendered discrete circuitry obsolete.
Integrated circuits have the significant advantages over discrete circuits. However,
integrated circuits have some disadvantages and continuous efforts are on to
overcome them.
(From Wikipedia, the free encyclopedia)
II. Look through the text again and find the answers to the following
questions:
1. What did the circuits consist of? 2. Which circuits are known as discrete
ones? 3. What disadvantages do discrete circuits have? 4. Why did engineers start a
drive for miniaturized circuits? 5. What does microelectronics deal with? 6. What
kind of components does an integrated circuit have? 7. Do a number of circuit
components and their interconnections in a single small package allow an integrated
circuit to perform a complete electronic function? 8. Why cannot individual
components be removed in an IC? 9. Can individual components be removed or
replaced in a discrete assembly? 10. Why aren’t components of an IC seen to project
above the surface of the chip?
III. Retell the above text using as many of the word combinations from
Exercise I as you can.
WORKING ON WORDS
29
Veretennikova V.P.
the equipment designer; the availability of a large number of low-cost integrated
circuits; to be in contrast to.
II. Complete the sentences with the words from the box:
IV. Fill in the blanks with corresponding adjectives from the list below.
WRITTEN PRACTICE
II. Read the following sentences and comment on the functions of the
infinitive in the sentence.
1. To meet these problems of space conservation and reliability, engineers
started a drive for miniaturized circuits. 2. An integrated circuit consists of a number
of circuit components and their interconnections in a single small package to perform
a complete electronic function. 3. Semiconductor devices could perform the functions
of vacuum tubes. 4. Integrated circuits free the equipment designer from the need to
construct circuits with individual discrete components such as transistors, diodes and
resistors. 5. ICs are so small that you normally need a microscope to see the
connections between the components. 6. It is possible to produce circuits containing
many transistors, diodes, resistors on the surface of a small chip. 7. No components
of an IC are seen to project above the surface of the chip. 8. However, integrated
circuits have some disadvantages and continuous efforts are on to overcome them. 9.
To handle negative inputs, you should reverse the direction of the diode. 10. It is
profitable to know technical advances about the fabrication of ICs.
31
Veretennikova V.P.
III. Study the grammar table and learn.
IV. Find in the above text and copy out the italicized adverbs. Say what
kind each one is.
COMMUNICATIVE SITUATIONS
III. You are at the conference. The theme of your report is The History of
the Integrated Circuit.
32
COMPUTER ENGINEERING
MICROCONTROLLER
II. Read Text Six and get ready to discuss it in the classroom:
Text 6
MICROCONTROLLER
A microcontroller (or MCU, short for a microcontroller unit) is a small
computer (SoC) on a single integrated circuit containing a processor core, memory,
and programmable input/output peripherals. Program memory in the form of
Ferroelectric RAM or NOR flash is also often included on a chip, as well as a
typically small amount of RAM. Microcontrollers are designed for embedded
applications, in contrast to the microprocessors used in personal computers or other
general purpose applications consisting of various discrete chips.
Microcontrollers are used in automatically controlled products and devices,
such as automobile engine control systems, implantable medical devices, remote
controls, office machines, appliances, power tools, toys and other embedded systems.
By reducing the size and cost compared to a design that uses a separate
microprocessor, memory, and input/output devices, microcontrollers make it
economical to digitally control even more devices and processes. Mixed
signal microcontrollers are common, integrating analog components needed to
control non-digital electronic systems.
Some microcontrollers may use four-bit words and operate at frequencies as
low as 4 kHz, for low power consumption (single-digit milliwatts or microwatts).
They will generally have the ability to retain functionality while waiting for an event
such as a button press or other interrupt; power consumption while sleeping (CPU
clock and most peripherals off) may be just nanowatts, making many of them well
suited for long lasting battery applications. Other microcontrollers may serve
performance-critical roles, where they may need to act more like a digital signal
processor (DSP), with higher clock speeds and power consumption.
A typical home in a developed country is likely to have only four general-
purpose microprocessors but around three dozen microcontrollers. A typical mid-
33
Veretennikova V.P.
range automobile has as many as 30 or more microcontrollers. They can also be
found in many electrical devices such as washing machines, microwave ovens, and
telephones.
Embedded design
A microcontroller can be considered a self-contained system with a processor,
memory and peripherals and can be used as an embedded system. The majority of
microcontrollers in use today are embedded in other machinery, such as automobiles,
telephones, appliances, and peripherals for computer systems.
While some embedded systems are very sophisticated, many have minimal
requirements for memory and program length, with no operating system, and low
software complexity. Typical input and output devices include switches, relays,
solenoids, LED's, small or custom liquid-crystal displays, radio frequency devices,
and sensors for data such as temperature, humidity, light level etc. Embedded systems
usually have no keyboard, screen, disks, printers, or other recognizable I/O devices of
a personal computer, and may lack human interaction devices of any kind.
Interrupts
Microcontrollers must provide real-time (predictable, though not necessarily
fast) response to events in the embedded system they are controlling. When certain
events occur, an interrupt system can signal the processor to suspend processing the
current instruction sequence and to begin an interrupt service routine (ISR, or
"interrupt handler") which will perform any processing required based on the source
of the interrupt, before returning to the original instruction sequence. Possible
interrupt sources are device dependent, and often include events such as an internal
timer overflow, completing an analog to digital conversion, a logic level change on
an input such as from a button being pressed, and data received on a communication
link. Where power consumption is important as in battery devices, interrupts may
also wake a microcontroller from a low-power sleep state where the processor is
halted until required to do something by a peripheral event.
(From Wikipedia, the free encyclopedia)
I. Find in the above text English equivalents for the following word
combinations and write them out:
процессорное ядро; исходная последовательность команд; большинство
используемых сегодня микроконтроллеров; переполнение внутреннего
таймера; четырёхбитовые слова; для встроенных приложений; из маломощного
состояния сна; интегрируя аналоговые компоненты; предсказуемый, хотя и не
обязательно быстрый; для управления нецифровыми электронными системами;
приостановить обработку; вероятно, будет иметь только четыре
микропроцессора общего назначения; работать на частотах; в отличие от
микропроцессоров; низкая сложность программного обеспечения; для
длительных применений батарей; сохранить функциональность; система
прерываний.
34
COMPUTER ENGINEERING
II. Give the adjective of each of the following nouns:
reliability, experiment, program, dependency, reality, possibility, recognition,
origin, electricity, electron, economy, digit, prediction, necessity, type, minimum,
person, certainty, variety.
III. Ask your own questions to the text for class discussion.
IV. Retell the above text using as many of the word combinations from
Exercise I as you can.
WORKING ON WORDS
II. Find in the above text and copy out phrases in which the preposition
for is used. Translate them.
III. Complete the sentences with the words from the box:
1. Microcontrollers are embedded ….. some other device so that they can
control the features or actions of the product. 2. Responding to immediate challenges,
the conference passed ….. resolutions from different microcontrollers to using
information technologies. 3. Microcontrollers are dedicated to ….. task and run one
specific program. 4. A desktop computer is ….. always plugged into a wall socket
and might consume 50 watts of electricity. 5. The microcontroller inside a TV takes
input from the remote control and displays ….. on the TV screen. 6. The
actual processor used to implement a microcontroller can vary ….. . 7.
Microcontrollers traditionally do not have a ….. coprocessor, so floating point
arithmetic is performed by software. 8. Some microcontrollers allow higher priority
interrupts to interrupt lower priority ….. .
IV. Find in the above text and copy out sentences in which linking
expressions such as, as well as and in contrast to are used. Translate the
sentences with them. Say which of these linking expressions:
a) introduces an addition?
b) introduces clarification?
c) expresses a clear contrast?
35
Veretennikova V.P.
WRITTEN PRACTICE
II. Memorize the following word combinations and make up your own
sentences or situations with them:
to retain functionality; to digitally control devices and processes; to return to
the original instruction sequence; to suspend processing; to be embedded in; to be
well suited for.
c). Find in the text and copy out sentences containing as + adjective + as.
36
COMPUTER ENGINEERING
IV. Ask all types of questions to the following sentence:
A microcontroller can be considered a self-contained system with a processor,
memory and peripherals.
COMMUNICATIVE SITUATIONS
37
Veretennikova V.P.
II. Read Text Seven and get ready to discuss it in the classroom:
Text 7
Pulse width modulation and interrupts
Pulse width modulation (PWM), or pulse-duration modulation (PDM), is a
method of reducing the average power delivered by an electrical signal, by effectively
chopping it up into discrete parts. The average value of voltage (and current) fed to
the load is controlled by turning the switch between supply and load on and off at a
fast rate. The longer the switch is on compared to the off periods, the higher the total
power supplied to the load. Along with MPPT maximum power point tracking, it is
one of the primary methods of reducing the output of solar panels to that which can
be utilized by a battery. PWM is particularly suited for running inertial loads such as
motors, which are not as easily affected by this discrete switching, because they have
inertia to react slowly. The PWM switching frequency has to be high enough not to
affect the load, which is to say that the resultant waveform perceived by the load
must be as smooth as possible.
The term duty cycle describes the proportion of 'on' time to the regular interval
or 'period' of time; a low duty cycle corresponds to low power, because the power is
off for most of the time. Duty cycle is expressed in percent, 100% being fully on.
When a digital signal is on half of the time and off the other half of the time, the
digital signal has a duty cycle of 50% and resembles a "square" wave. When a digital
signal spends more time in the on state than the off state, it has a duty cycle of >50%.
Pulse-width modulation uses a rectangular pulse wave whose pulse width is
modulated resulting in the variation of the average value of the waveform.
The simplest way to generate a PWM signal is the intersective method, which
requires only a sawtooth or a triangle waveform (easily generated using a simple
oscillator) and a comparator. When the value of the reference signal (the sine wave)
is more than the modulation waveform, the PWM signal is in the high state,
otherwise it is in the low state.
38
COMPUTER ENGINEERING
Many digital circuits can generate PWM signals (e.g., many microcontrollers
have PWM outputs). They normally use a counter that increments periodically (it is
connected directly or indirectly to the clock of the circuit) and is reset at the end of
every period of the PWM. When the counter value is more than the reference value,
the PWM output changes state from high to low (or low to high). This technique is
referred to as time proportioning, particularly as time-proportioning control – which
proportion of a fixed cycle time is spent in the high state.
The incremented and periodically reset counter is the discrete version of the
intersecting method's sawtooth. The analog comparator of the intersecting method
becomes a simple integer comparison between the current counter value and the
digital (possibly digitized) reference value. The duty cycle can only be varied in
discrete steps, as a function of the counter resolution. However, a high-resolution
counter can provide quite satisfactory performance.
The pulse-width modulator feature is very common in embedded systems. It
provides a way to generate a pulse periodic waveform for motor control or can act as
a digital-to-analog converter with some external components. This PWM peripheral
is basically a timer with a period counter and a first-phase duration comparator,
where bit width of the period and first-phase duration are both programmable.
The PWM has the following features:
• 32-bit period counter
• 32-bit first-phase duration counter
• Configurable to operate in either one-shot mode, which generates a single
interrupt at the end of operation, or continuous mode, which generates an interrupt
per period.
• 8-bit repeat counter for one-shot operation. One-shot operation will produce
N + 1 periods of the waveform, where N is the repeat counter value.
• One-shot operation can be triggered by the CCD VSYNC output of the video
processing subsystem to allow any of the PWM instantiations to be used as a CCD timer.
• Configurable PWM output pin inactive state.
• Interrupt and EDMA synchronization events.
• Emulation support for stop or free-run operation.
Each instance of the PWM peripheral has a single output signal, PWMn. The
output signal is driven based on the state of the PWM as described below:
• Inactive state: When the PWM is idle, the output pin is driven to its inactive
output level. This inactive logic state is determined by configuring the INACTOUT
bit in the PWM configuration register (CFG).
• First-phase active state: During the first phase of an active PWM period, the
output signal is driven to the state defined in the P1OUT bit in the PWM
configuration register (CFG). The duration of the first phase is controlled by the
PWM first-phase duration register (PH1D). The duration of the entire period is
controlled by the PWM period register (PER).
• Second-phase active state: After the first phase of the period is complete, the
output signal is driven to the opposite state of the first phase for the remainder of the
period (the second phase).
(From Wikipedia, the free encyclopedia)
39
Veretennikova V.P.
Commentary
MPPT – Maximum power point tracking or sometimes just power point
tracking (PPT) is a technique used commonly with wind turbines and photovoltaic
solar systems to maximize power extraction under all conditions.
CCD stands for a charge-coupled device. It is a device for the movement
of electrical charge, usually from within the device to an area where the charge can
be manipulated, such as conversion into a digital value.
VSYNC means a vertical synchronization signal.
EDMA – Enhanced Direct Memory Access (Enhanced Direct Memory Access
Controller: consists of the EDMA transfer controller (EDMATC) and the EDMA
channel controller (EDMACC).
EDMA is a method of morphometric analysis that avoids superimposition and
its drawbacks altogether.
INACTOUT = 0 (Inactive bus time-out is disabled).
I. Find in the above text English equivalents for the following word
combinations and write them out:
дискретная версия пилообразного сигнала; рабочий цикл; опорный
сигнал; эффективно измельчая его на отдельные части; на оставшуюся часть
периода; работающие инерционные нагрузки; метод пересечения; неактивный
выходной уровень; пилообразная или треугольная форма волны; подключён
прямо или косвенно к тактовым сигналам схемы; одно прерывание;
распределение времени; компаратор длительности первой фазы; однократный
режим; значение счётчика повторений; для остановки или работы в автономном
режиме; широтно-импульсная модуляция.
II. Memorize the following word combinations and make up your own
sentences or situations with them:
To chop up into discrete parts; to be driven to an inactive output level; a high-
resolution counter; to be suited for running inertial loads; the reference value.
IV. Outline the main ideas of the text and write a summary.
V. Retell the above text using the words and word combinations of the
topical vocabulary.
40
COMPUTER ENGINEERING
WORKING ON WORDS
I. Complete the sentences with the words from the box:
switch reference voltage interaction technique duty output signal
1. When the charging ….. of a battery reaches the regulation setpoint, the
charging algorithm slowly reduces the charging current to avoid heating and gassing
of the battery. 2. Pulse width modulation is a very powerful ….. which allows analog
variables to be controlled from a purely digital output, and with only a single data
connection. 3 In Pulse Width Modulation mode, a CCP module can be used to
generate a timed ….. signal. 4. This function controls the power ….. , turning it “on”
at the beginning of the period and turning it “off” when the ramp exceeds the voltage.
5. The PWM period T is determined by the ….. of the PR2 register and the eight bits
of Timer 2. 6. PWM also works well with digital controls, which because of their
on/off nature, can easily set the needed ….. cycle. 7. Every time the integral of the
output ….. reaches one of the limits, the PWM signal changes state. 8. In delta-sigma
modulation as a PWM control method, the output signal is subtracted from a …..
signal to form an error signal.
II. Find in the above text and copy out sentences in which linking
expressions otherwise, such as and however are used. Translate the sentences
with them. Say which of these linking expressions:
a) expresses a contrast?
b) introduces clarification?
c) introduces an alternative?
III. a) Study the table and learn phrasal verbs with “chop”.
to chop (away) at means to aim blows at something with a heavy sharp tool
such as an axe; to hit something with a sharp tool in order to cut it;
to chop down means to make something, such as a tree, fall by cutting it at the
base with a sharp tool, to make a tree or tall plant fall down by cutting through it;
to chop off means to remove something by cutting it with a sharp tool;
to chop through something means to make a path through something by
cutting; to cut a way/path/route through something;
to chop up means to cut something such as food or wood into pieces.
(From the Oxford Advanced American Dictionary)
b). Translate the following sentences having the phrasal verb “chop”.
1. Brian chopped off the small branches before cutting down the tree. 2. There
are concerns over how quickly the forests are being chopped down. 3. The boys
chopped at the bushes with their knives. 4. An electrical signal wasn't chopped up
effectively into necessary discrete parts. 5. The flakes are quite handy, as they are
easy to measure and you don't need to chop up the block of solid wax before melting
it. 6. My aunt tried to cut through the undergrowth. 7. You can chop down an audio
clip to a section you want in superb detail.
41
Veretennikova V.P.
c). Find in the above text and copy out the sentence containing the phrasal
verb “chop”.
IV. Choose the correct preposition or adverb to complete each of the
following sentences:
at down through off
1. He'll stab and slash and chop ….. their heads! 2. They had to chop their way
….. the undergrowth. 3. Dad and Grandpa went together to chop ….. the Christmas
tree every year. 4. You must use a spade to chop ….. the smaller roots. 5. Then he
turned and waded back into the wheat and chopped ….. it with a shovel. 6.
He chopped his way ….. the jungle with a machete.
WRITTEN PRACTICE
I. Choose the correct preposition to complete each of the following
sentences:
1. The elements ….. a block can be all located at the same address, at
contiguous addresses, or at a configurable offset from one another. 2. Channel
parameter sets can be triggered ….. various methods, including event trigger, chain
trigger, or CPU trigger. 3. The element count has to be reloaded by the element count
reload field (ELERLD) ….. the transfer entry. 4. The addresses of elements within a
frame can be located ….. a specific distance apart, as determined by the element
index (ELEIDX). 5. The vertical sync signal is a series ….. much longer pulses,
indicating the start of a new field. 6. Pulse width modulation is used in a variety of
applications particularly ….. control. 7. One of the advantages of PWM is that the
signal remains digital all the way ….. the processor to the controlled system. 8. The
PWM wave is generated continuously ….. the setup is completed.
Keys: of, after, within, from, in, at, by, for.
II. Fill in the blanks with corresponding adjectives from the list below.
1. The percentage duty cycle specifically describes the percentage of time a
….. signal is on over an interval or period of time. 2. Pulse width modulation (PWM)
is a ….. technique for controlling analog circuits with a microprocessor's digital
outputs. 3. The use of pulses in the PWM charge controller is also ….. for the
batteries as it mixes the electrolyte cleaning of the lead plates and prevents sulfation.
4. The main advantage of PWM is that power loss in the switching devices is very
….. . 5. Although pulse width modulation of speech channel followed by frequency
modulation has been used in an ….. system, most systems employ binary frequency
shift keying or binary phase shift keying. 6. The duration of the ….. period is
controlled by the PWM period register. 7. The PWM switching frequency has to be
….. enough not to affect the load. 8. A PWM output is basically a . waveform with a
specified period and duty cycle. 9. Spectral databases are also included for …..
interpretation of results.
___________________
Low, earlier, powerful, simple, entire, digital, high, good, square.
42
COMPUTER ENGINEERING
III. a) Form the degrees of comparison of the following adjectives:
Idle, complete, inactive, fast, smooth, regular, intersective.
IV. Choose the necessary verb form from the box and translate the
sentences:
will be using ranging reaches require are not used can
accomplish includes required
43
Veretennikova V.P.
II. Read Text Eight and get ready to discuss it in the classroom:
Text 8
The PWM modes operation
The PWM module can operate in either one-shot or continuous mode. In both
modes, the PWM peripheral has a first-phase duration register (PH1D) and a period
register (PER) to specify, respectively, the first-phase duration and period of the
waveform. The first-phase output level can be configured to be either high or low in
the P1OUT bit of the PWM configuration register (CFG) and the second phase output
is automatically the opposite polarity of the first-phase level. The inactive state before
and after the PWM operation can also be configured to be either a 0 or a 1 in the
INACTOUT bit of CFG.
In one-shot mode operation, the PWM produces a series of periods but does
not run continuously. The number of periods in the series is controlled by the repeat
count contained in the PWM repeat count register (RPT). To select one-shot mode,
configure the MODE bit in the PWM configuration register (CFG) to 1h. For one-
shot mode operation, the PWM should first be configured for mode, period, and first-
phase duration, along with other configuration options. The PWM uses the last
programmed set of parameters once it is started by writing a 1 to the START bit in
the PWM start register (START). Once started, the PWM asserts/deasserts the output
as configured, driving to the first-phase output level during the first phase and the
opposite level during the second phase. When the prescribed number of RPT + 1
periods of pulses expire, the peripheral sends an interrupt to the system (if the
interrupt is enabled in CFG). The PWM then becomes inactive until the START bit is
written a 1 again. The PWM is stopped during one-shot mode operation by changing
the MODE bit to 0 (disable). When the PWM is disabled, the output is immediately
driven to the configured inactive state.
In one-shot mode, the PWM senses a rising or falling transition on an event-
trigger input signal to start the operation. This event trigger input is synchronized to
the PWM clock inside the module and is driven by the video processing subsystem
CCDC_VD output signal. This capability is provided to allow the PWM to be used as
44
COMPUTER ENGINEERING
a CCD timer. The trigger event can be detected on the rising edge or the falling edge
of CCDC_VD. After event triggering is enabled as part of the configuration process,
a write to the PWM START register (START) starts the sensing circuitry in the
PWM and after the first event the PWM starts the period counting.
In continuous mode operation, the PWM produces the repeating output
waveforms continuously without stopping. For continuous mode operation, the PWM
should first be configured for mode, period, and first-phase duration, along with other
configuration options. The PWM uses the last programmed set of parameters once it
is started by writing a 1 to the START bit in the PWM start register (START). Unlike
the one-shot mode, the repeat count does not affect the continuous operation. To
select the continuous mode, configure the MODE bit in the PWM configuration
register (CFG) to 2h. Once started, the PWM asserts/deasserts the output as
configured, driving to first-phase output level during the first phase and the opposite
level during the second phase. Once a period expires, the next period starts. When a
period starts, the PWM copies the period and first-phase duration registers into a set
of internal shadow registers and maintains the counts there. An interrupt is also
generated (if enabled) after the registers are copied. This buffering scheme and
interrupt timing allows the CPU or EDMA to program the durations for the next
period while the current period is running. The PWM is stopped during the
continuous mode operation by either disabling it or by reconfiguring it to one-shot
mode using the MODE bit. Whenever the PWM is disabled, the output is
immediately driven to the configured inactive state. To allow the PWM to stop
gracefully from continuous operation, upon an interrupt, configure the PWM to one-
shot mode operation. The PWM then operates for RPT + 1 periods and stops by itself
(sending an interrupt, if enabled). Note that unlike normal one-shot mode operation,
another write to the START bit is not required for the one-shot mode operation to
start. While operating in continuous mode, the minimum period for the PWM is 8
cycles.
There is a single interrupt from the CPU interrupt controller for each PWM
instance. When the PWM is configured in one-shot mode and the interrupt bit
(INTEN) in the PWM configuration register (CFG) is enabled, the peripheral
generates an interrupt when RPT + 1 number of periods have been completed. When
the PWM is configured in continuous mode and the interrupt bit (INTEN) in CFG is
enabled, the PWM peripheral generates an interrupt every period after the first-phase
duration register and period register values have been copied to the associated
shadow registers. This event indicates it is safe to program the duration values for the
next period.
(From Texas Instruments, August 2010)
I. Find in the above text English equivalents for the following word
combinations and write them out:
запрограммированный набор параметров; переход нарастания или спада;
противоположный уровень; схема буферизации; становится неактивным; запуск
45
Veretennikova V.P.
события включен как часть процесса конфигурации; или в однократном или
непрерывном режиме; есть одно прерывание; набор внутренних теневых
регистров; вход триггера события; не влияет на непрерывную работу.
III. Answer the following questions using the word combinations and
phrases of the topical vocabulary:
1. What modes can the PWM module operate in? 2. Why does the PWM
peripheral have a first-phase duration register and a period register in both modes? 3.
How can the first-phase output level be configured? 4. What does the PWM produce
in one-shot mode operation? 5. What is the number of periods in the series controlled
by? 6. Should the PWM be configured for mode, period, and first-phase duration
along with other configuration options for one-shot mode operation? 7. When does
the peripheral send an interrupt to the system? 8. What happens when the PWM is
disabled? 9. What is the event trigger input synchronized to? 10. What can the trigger
event be detected on? 11. What mode operation does the PWM produce the repeating
output waveforms continuously without stopping in? 12. Does the repeat count affect
the continuous operation? 13. What must you do to select the continuous mode? 14.
When does the next period start? 15. What allows the CPU or EDMA to program the
durations for the next period while the current period is running? 16. When is the
output immediately driven to the configured inactive state? 17. What event indicates
it is safe to program the duration values for the next period?
WORKING ON WORDS
46
COMPUTER ENGINEERING
II a). Study the grammar table and learn.
We use once [wʌns] as a conjunction meaning ‘as soon as’, ‘after’ or from the
moment when: I didn't know how I would cope with everything once the money had
gone.
b). Find in the text and copy out sentences containing once as a
conjunction.
WRITTEN PRACTICE
I. Fill in prepositions:
1. The infinite bandwidth is caused ….. the nonlinear operation of the pulse-
width modulator. 2. High frequency PWM power control systems are easily
realizable ….. semiconductor switches. 3. There was almost no voltage drop ….. the
switch. 4. Modern semiconductor switches such as MOSFETs or insulated-gate
bipolar transistors (IGBTs) are well suited components ….. high-efficiency
controllers. 5. The rate (or frequency) ….. which the power supply must switch can
vary greatly depending on load and application. 6. In Figure 1 we can show the
behavior of PWMn with different combination ….. active and inactive polarities. 7.
Power flow ….. the supply is not constant and will require energy storage on the
supply side in most cases. 8. An interrupt is also generated (if enabled) ….. the
registers are copied.
Keys: with, from, by, after, of, for, at, across.
II. Translate the sentences and define the italicized verb forms.
1. You must note that each subsequent event does not restart period counting.
2. Events received within the PWM period are ignored as well. 3. PWM has also
been used in certain communication systems where its duty cycle has been used to
convey information over a communications channel. 4. We want to show the event-
triggered one-shot mode operation in this Figure. 5. The polarity must be configured
as inactive low, first phase high-then-low. 6. When a switch is off there is practically
no current, and when it is on and power is being transferred to the load. 7. The
number of periods in the series is controlled by the repeat count contained in the
PWM repeat count register. 8. In this case the present clock time and program
contents will also be saved.
47
Veretennikova V.P.
e.g. The plane had already landed when the pilot announced that there would
be a delay in getting to the gate.
Yet [jɛt] = when we ask if something has happened or has not happened. We
use yet at the end in questions and negative sentences. Yet means up until the present
or a specified or implied time; by now or then.
V. Fill the spaces in the following sentences by using already, still, yet.
1. While the rheostat was one of several methods of controlling power a low
cost and efficient power switching/adjustment method was ….. to be found. 2. The
high-resolution counter has ….. provided quite satisfactory performance. 3. We have
….. avoided aliasing effects by limiting the bandwidth of the PWM kernel. 4. The
number of pulses in the waveform is ….. equal to the number of Nyquist samples. 5.
PWM is ….. used in efficient voltage regulators. 6. PWM signals are ….. used to
control the speed of the robot by controlling the motors. 7. This method hasn’t been
used in the SACD format ….. . 8. A new class of audio amplifiers based on the PWM
principle is …. becoming popular. 9. Sine–triangle pulse width modulation signals
have ….. been used in micro-inverter design used in solar and wind power
applications. 10. Why haven’t you encoded each pulse position relative to the
previous ….. ?
Complex Object
Subject + Predicate + Complex Object (Noun/Pronoun + Infinitive)
The infinitive may be used as a part of a complex object after the following
verbs:
1. to hear, to see, to watch, to feel, to let, to make, to observe. After these verbs
the Infinitive has no particle 'to'.
2. to want, to expect, to know, to suppose, to consider, to believe. After these
verbs the particle 'to' is used before the Infinitive.
49
Veretennikova V.P.
HARDWARE TROUBLESHOOTING
II. Read Text Nine and get ready to discuss it in the classroom:
Text 9
HARDWARE TROUBLESHOOTING
Hardware troubleshooting is the process of reviewing, diagnosing and
identifying operational or technical problems within a hardware device or equipment.
It is a logical, systematic search for the source of a problem in order to solve it, and
make the product or process operational again. Troubleshooting is needed to identify
the symptoms. It aims to resolve physical and/or logical problems and issues within a
computing hardware. Determining the most likely cause is a process of elimination –
eliminating potential causes of a problem. Finally, troubleshooting requires
confirmation that the solution restores the product or process to its working state.
Hardware troubleshooting is done by hardware or technical support technician.
Hardware troubleshooting processes primarily aim to resolve mobile hardware
problems using a systematic approach. The process starts by first identifying the
problem and finding different issues that can cause such a problem and eventually
leading to implementing a solution or alternative. Troubleshooting is a systematic
approach to problem solving that is often used to find and correct issues with
complex machines, electronics, computers and software systems.
Now, here is the basic procedure to repair a mobile phone step by step on
hardware troubleshooting. Different mobile phones have different circuit designs and
components. First thing to be familiar with is, how each circuit components or parts
are mounted, connected, assembled or designed in your mobile.
The first step in troubleshooting is gathering information on the issue, such as
an undesired behavior or a lack of expected functionality. Other important
information includes related symptoms and special circumstances that may be
required to reproduce
50
COMPUTER ENGINEERING
the issue. Any unexpected or undesirable behavior is a symptom. Frequently the
symptom is a failure of the product or process to produce any results. (Nothing was
printed, for example). Corrective action can then be taken to prevent further failures
of a similar kind.
Once the issue and how to reproduce it are understood, the next step might be
to eliminate unnecessary components in the system and verify that the issue persists,
to rule out incompatibility and third-party causes. Depending on the particular issue
and the troubleshooter’s experience, they may have some ideas. They may also check
product documentation and/or conduct research on a support database or through
a search engine. After common causes are ruled out, the troubleshooter may resort to
the more systematic and logical process of verifying the expected function of parts of
a system.
One common method is the split-half troubleshooting approach: With a
problem resulting from a number of possible parts in series, one tests half-way down
the line of components. If the middle component works, one goes to the middle of the
remaining parts, approaching the end. If the test finds a problem at the mid-point, one
does a split towards the start of the line until the problem part is found. The split-half
process can save time in systems that depend on many components.
Once the problem part is identified, it may be adjusted, repaired or replaced as
needed.
Evidence of effective troubleshooting is indicated when the issue is no longer
reproducible and function is restored one. The success of troubleshooting often
depends on the thoroughness and experience of the troubleshooter. Preventative
action is possible using failure mode and effects (FMEA) and fault tree analysis
(FTA) before full-scale production, and these methods can also be used for failure
analysis.
I. Find in the above text English equivalents for the following words and
word combinations and write them out:
наполовину диагностирующий подход; аппаратный поиск и устранение
неисправностей; в зависимости от конкретной проблемы; процесс устранения;
сначала идентифицируя проблему; анализ дерева отказов; зависит от
тщательности аварийного монтёра; профилактическое действие; проблема
сохраняется; устранение неисправностей требует подтверждения; устранить
ненужные компоненты; рабочее состояние; первый шаг в поиске и устранении
неисправностей; исключить несовместимость; постепенно; процесс разделения
пополам; предотвращать дальнейшие отказы аналогичного вида; провести
исследование; отсутствие ожидаемых функциональных возможностей; больше
не воспроизводится.
51
Veretennikova V.P.
III. Answer the following questions using the word combinations and
phrases of the topical vocabulary:
1. What is called hardware troubleshooting? 2. What does troubleshooting
require? 3. Who is hardware troubleshooting done by? 4. What approach do hardware
troubleshooting processes primarily aim to resolve mobile hardware problems? 5.
What does the first step in troubleshooting deal with? 6. Why can corrective action be
taken then? 7. What next step might be once the issue and how to reproduce it are
understood? 8. When may the troubleshooter resort to the more systematic and
logical process of verifying the expected function of parts of a system? 9. What can
you say about the split-half troubleshooting approach? 10 What does the success of
troubleshooting often depend on?
IV. Retell the above text using as many of the word combinations from
Exercise I as you can.
WORKING ON WORDS
II. Complete the sentences with the words from the box:
III. Find in the above text and copy out phrases containing adverbs with
the suffix –ly. Say what adjectives are these derivative adverbs formed from,
translate them.
52
COMPUTER ENGINEERING
WRITTEN PRACTICE
I. Choose the proper verb form and write down the translation of each
sentence.
1. Troubleshooting is a form of problem solving, often applied to repair …..
products or processes on a machine or a system. 2. Troubleshooting is the
identification or diagnosis of "trouble" in the management flow of a corporation or a
system ….. by a failure of some kind. 3. Usually troubleshooting ….. to something
that has suddenly stopped working. 4. A troubleshooter could check each component
in a system one by one, substituting ….. good components for each potentially
suspect one. 5. Efficient methodical troubleshooting starts on with a clear
understanding of the expected behavior of the system and the symptoms ….. . 6. One
of the core principles of troubleshooting is that reproducible problems can be reliably
….. and resolved. 7. I ….. the up arrow on my keyboard to scroll back to the previous
command. 8. The student ….. to create models that are in the Troubleshooting
section.
Keys: known, have pressed, failed, is trained, caused, being observed, is
applied, isolated.
II. Translate the following sentences into English using the words and
word combinations of the topical vocabulary:
1. С помощью утилиты он исправил проблемы с сетью, выполнил
проверку на наличие вредоносных программ, а также проверку жёсткого диска
и оперативной памяти. 2. Если сервер баз данных не может продолжать
обычную обработку и должен отключиться, то происходит ошибка
подтверждения. 3. Мы уже выполнили все действия, описанные в сообщении об
ошибке подтверждения. 4. Устранение неисправностей оборудования
выполняется только техническими специалистами. 5. Процессы устранения
неполадок оборудования в первую очередь направлены на решение проблем с
компьютерным оборудованием. 6. Устранение неполадок оборудования обычно
выполняется на аппаратном оборудовании, установленном на компьютере или
связанном с ним устройстве. 7. Прежде всего, основным принципом поиска и
устранения неполадок является начало с самых простых и вероятных
возможных проблем. 8. Эффективное методическое устранение неполадок мы
начинаем с чёткого понимания ожидаемого поведения системы и наблюдаемых
симптомов. 9. Некоторые из наиболее сложных проблем, связанных с
устранением неполадок, связаны с симптомами, которые происходят с
перерывами.
53
Veretennikova V.P.
IV. a) Study the grammar table and learn.
Gerunds are words ending in "-ing" that are made from verbs but act as nouns.
A gerund can be the subject or the object of a verb or it may be governed by a
preposition.
b) Find in the above text and copy out sentences having the gerund, point
out the gerunds in them and give the function of each. Say whether it is the
subject of a verb, object of a verb or governed by a preposition.
V. This sentence includes examples of both ing - forms, the gerund and the
present participle. Say which words in italics are gerunds and which are present
participles.
Many IT professionals are now helping in the executing different tasks like,
computer networking and information processing, data management, data base and
software design, engineering of computer hardware as well as the administration and
management of the entire systems at affordable cost.
COMMUNICATIVE SITUATIONS
I. Discuss the arguments for the following problem. Explain why it is so.
Computer technology is the discipline that studies the foundations of modern
computer systems in terms of hardware, software, networks and communications and
the relationships between each other. University degrees in computer technology
usually cover both computer science and information technology.
54
COMPUTER ENGINEERING
ALGORITHM DESIGN
II. Read Text Ten and get ready to discuss it in the classroom:
Text 10
ALGORITHM DESIGN
Algorithm design is a challenging intellectual activity that provides a rich
source of observation and a test domain for a theory of problem-solving behavior.
Algorithm design is the process of coming up with a sketch, in a very high
level language, of a computationally feasible technique for achieving a specified
behavior. The design process combines cleverness in problem solving, knowledge of
specific algorithm design principles, and knowledge of the subject matter of the
algorithm (e.g. geometry, graph theory, physics). When people design algorithms,
their design repertoire includes discovery and visual reasoning in addition to the
(ideally) disciplined application of problem-solving techniques. Human design is a
rich source of ideas for a model of algorithm design. Observing that design process
and attempting capture the basic ideas in an automated system both helps us
understand how people structure and use their knowledge about design and also
validates our observations. The goal of the project is to create an automatic design
system that can apply existing design principles as well as exhibit some creativity.
The observations of human design are to be incorporated, but the automatic system
should take the strengths and weaknesses of both computers and people into account.
We are not trying to model human problem solving behavior as an end in itself.
Since the design of complex algorithms is currently best accomplished by
human beings, observing their performance would appear to be a profitable starting
point for automating the design process. However, since the talents of computers are
not those of people, it is reasonable to search for a different method if the goal is total
automation of design or a novel mixture of human and machine design.
Our designers were independently given the task of creating algorithms to find
convex hulls, closest pairs and intersecting line segments. Several protocols have
55
Veretennikova V.P.
been analyzed in great detail while the others have been gone over more lightly and
used primarily as confirming evidence.
Assuming that a problem specification has been understood, design begins
with a kernel idea or solution plan, quickly selected from those known to the
designer. Depending on the designer's background, the idea may vary in
sophistication from generate and test to input process output to more complex
strategies such as divide and conquer or dynamic programming. The designer lays out
the basic steps of the chosen idea and follows through with it unless the approach
proves completely inapplicable |D1.1|
D1 had the initial idea that the algorithm should be one that generated all
points in the input in some arbitrary order and tested each to determine whether it was
on the hull. This had the potential of running in linear tim»- (proportional to the
number of input points').
|D2 1| decided to try a divide and conquer algorithm (th*- special torn) of
divide and conquer in which the input', are divided into subsets, the algorithm is
recursively applied to each, and the results are back together.
After formulating a plan, the designer refines the basic steps of the kernel idea.
By and large, this elaboration proceeds by stepwise refinement. The designer may lay
down the major components, effectively decomposing the problem into subparts, or
may add new inputs or assertions about details of the structure. The refinement steps
(1) may be suggested by knowledge appropriate to the problem and task domain or
(2) may be a natural result of attempting to execute an algorithm.
(Elaine Kanf)
I. Find in the above text English equivalents for the following words and
word combinations and write them out:
найти выпуклые оболочки; в некотором произвольном порядке; делятся
на подмножества; цель проекта; испытательная область для теории; выполнять
алгоритм; специальный разрыв; основные этапы сущности идеи; алгоритм
деления и покорения; теория проблемного поведения; установить главные
компоненты; самые близкие пары и пересекающиеся линейные сегменты; тема
алгоритма; в зависимости от образования проектировщика; в общем и целом;
пошаговой обработкой; подтверждение доказательств; возможная в
вычислительном отношении методика; открытие и визуальное мышление.
56
COMPUTER ENGINEERING
II. Answer the following questions using the word combinations and
phrases of the topical vocabulary:
1. What does an algorithm design provide? 2. What is called an algorithm
design? 3. Why is human design a rich source of ideas for a model of algorithm
design? 4. Should the automatic system take the strengths and weaknesses of both
computers and people into account? 5. What task were the designers independently
given? 6. What does the design begin with? 7. How may the idea vary? 8. When does
the designer refine the basic steps of the kernel idea? 9. What does this elaboration
proceed by? 10. What may the designer lay down? 11. What do you know about the
refinement steps?
III. Explain in English the meaning of:
a feasible technique, creativity, an arbitrary order, stepwise.
IV. Retell the above text using as many of the word combinations from
Exercise I as you can.
WORKING ON WORDS
I. Make up your own sentences or situations with the following word-
combinations:
knowledge of the subject matter of the algorithm; problem-solving techniques;
to validate one’s observations; as confirming evidence; to search for a different
method; the task of creating algorithms; depending on the designer's background.
II. Complete the sentences with the words from the box:
III. a). Study the table and learn phrasal verbs with “lay”.
57
Veretennikova V.P.
b). Choose the correct preposition or adverb to complete each of the
following sentences:
down into off out
1. Our designer laid ….. us when we arrived ten minutes late. 2. They laid …..
a lot of money on their design process. 3. The rules of the design process elaboration
were laid ….. on Thursday. 4. The manager laid ….. two engineers because they
couldn’t exhibit any creativity. 5. The Engineering Council regrets to inform you that
it will have to lay ….. some computer engineers without the creative ability to design
next week. 6. My colleague will really lay ….. me if I tarnish the image of our
computer engineering department. 7. Information technology specialists must lay …..
programs that focus on one specific aspect of computer engineering and cover it in
great depth. 8. We usually lay ….. the management of information resources to meet
the needs of users within an organizational and societal context through the creation,
application, integration, and administration of computing technologies.
c). Find in the above text and copy out the sentences containing the
phrasal verb “lay”.
IV. Find in the above text and copy out phrases containing adverbs with
the suffix –ly. Say what adjectives are these derivative adverbs formed from,
translate them.
VI. a) Find in the above text nouns with the suffix –ness, copy them out
and translate.
b) Add the suffix –ness to the following stems, make any necessary spelling
changes, and translate the words:
fond, aware, kind, dark, calm, one, happy, heavy, sad, rude, testy, useful.
WRITTEN PRACTICE
I. Choose the proper verb form and write down the translation of each
sentence:
1. Even bad algorithms ….. quickly when applied to small test cases on
extremely fast processors. 2. It is important …. that an algorithm can be polynomial
time even if its running time is not written as n raised to some integer power. 3. An
algorithm is a procedure that ….. any of the possible input instances and transforms it
to the desired output. 4. Divide and conquer typically ….. the problem in half, solves
each half, then stitches the halves back together to form a full solution. 5. Graphs are
important because they ….. to represent essentially any relationship. 6. Describing
58
COMPUTER ENGINEERING
algorithms requires a notation for expressing a sequence of steps ….. . 7. An
algorithm's implementation complexity is often a function of how it ….. .
Keys: splits, has been described, can run, can be used, to realize, takes, to be
performed.
II. Ask questions to which the following statements may serve as the
answers.
1. To apply dynamic programming, we need to construct a recurrence
computing the length of the longest sequence. 2. Many algorithms process items
according to a particular order. 3. In designing algorithms for an optimization
problem, we must prove that our algorithm always gives the best possible solution. 4.
We will seek algorithms that are correct and efficient, while being easy to implement.
5. In order to represent an algebraic expression in a computer program, most systems
seek to store the minimum information. 6. The development of new algorithms is one
of the most active areas of investigation in computer algebra. 7. Computer – algebra
systems have been improved significantly in the past few years.
COMMUNICATIVE SITUATIONS
59
Veretennikova V.P.
THE INTERNET OF THINGS
II. Read Text Eleven and get ready to discuss it in the classroom:
Text 11
THE INTERNET OF THINGS
The intriguing Internet of Things is the centre of a conglomeration of bustling
activities, from education, research and standardization to economic planning. While
there is no generally accepted definition of “Internet of Things”, it can be viewed as
the ability for things and people to remotely interact through the Internet anywhere,
anytime, thanks to the timely convergence of many technologies.
Machines, everyday objects and virtual elements (such as digital pictures) now
have the possibility to be identified in the same way as individuals on the Internet of
people. As a result, things can be integrated into a vast web of interrelations where
they can communicate with each other or with people. Essentially, in the world of the
Internet of Things, things are now on par with people. In most cases, thing-to-thing
communications will be found in the business-to-business arena and thing-to-person
communications in the business-to-consumer arena.
ITU defines the Internet of Things as a “global infrastructure for the
information society, enabling advanced services by interconnecting (physical and
virtual) things, based on existing and evolving interoperable information and
communication technologies.” ITU’s foundational definition offers useful insight and
a sound springboard for further analysis and research into the Internet of Things. ITU
points out that the Internet of Things is a “vision”, not a single technology, and that it
has “technological and societal implications.”
There are many more things than people on Earth – the tally of things that
could be part of the Internet of Things varies enormously according to experts. No
matter what the exact number is, it is big! For example, according to estimates made
by Cisco’s Internet Business Solutions Group, some 50 billion devices will be
60
COMPUTER ENGINEERING
connected to the Internet by 2020. These things include mobile devices, parking
meters, thermostats, cardiac monitors, tyres, roads, cars, supermarket shelves and
even cattle.
The Internet-of-Things galaxy encompasses ubiquitous computing, radio-
frequency identification, cyber-physical systems, wireless sensor networks, and
machine-to-machine communications. Other clusters, such as those centred on
pervasive computing, autonomic computing, human-computer interaction, ambient
intelligence, and, more generally, on smart objects, systems and technologies are also
intrinsically connected to the Internet of Things.
The concepts of cyber-physical systems and the Internet of Things are
undeniably intertwined. Cyber-physical systems are physical, biological, and
engineered systems whose operations are integrated, monitored, and/or controlled by
a computational core. Components are networked at every scale. Computing is deeply
embedded into every physical component, possibly even into materials. The
computational core is an embedded system, usually demands real-time response, and
is most often distributed.
Wireless sensor networks are a fundamental constituent of the Internet of
Things. This domain has strong scientific, technological and industry backing, and
the link with the Internet of Things is immediate. The research of smart dust (a
collection of countless tiny micro-electromechanical systems) and of the Internet of
nano-things provides a window into the future shape of the Internet of Things.
Machine-to-machine communications are the earliest manifestation of the
Internet of Things.
Pioneering data transmission technologies, such as basic telemetry and
industrial control systems can legitimately be seen as machine-to-machine precursors.
Over the years, machine-to-machine communication has evolved towards advanced
remote monitoring and control. Machine-to-machine communication has begun to
offer enabling platforms, integrating mobile and/or fixed, wired and/or wireless
networking architectures (such as wireless personal area networks), and cellular and
satellite (including global positioning system) services.
(From ITU News magazine)
Commentary
ITU: The International Telecommunication Union, originally the International
Telegraph Union (French: Union Internationale des Télécommunications), is a
specialized agency of the United Nations (UN) that is responsible for issues that
concern information and communication technologies.
Cisco: Cisco Systems, Inc. is an American multinational corporation
headquartered in San Jose, California, that designs, manufactures, and sells
networking equipment.
I. Find in the above text English equivalents for the following words and
word combinations and write them out:
61
Veretennikova V.P.
наравне с; скопление суетливой деятельности; требует ответ в реальном
времени; предложить разрешающие платформы; предшественники от машины
к машине; неоспоримо переплетены; дистанционно взаимодействовать;
совместимая информация; возможность быть идентифицированными; подсчёт
вещей; фундаментальный компонент; согласно оценкам; обширная паутина
взаимосвязей; промышленная поддержка; полезное понимание; архитектура
беспроводной сети; социальные последствия; своевременное сближение;
трамплин для дальнейшего анализа и исследований; определение
радиочастоты.
II. Look through the text again and find the answers to the following
questions:
1. What is the centre of a conglomeration of bustling activities, from education,
research and standardization to economic planning? 2. How can the definition of the
Internet of Things be viewed? 3. What possibility do machines, everyday objects and
virtual elements have? 4. Can things be integrated into a vast web of interrelations? 5.
Are things on par with people now? 6. How does ITU define the Internet of Things?
7. What does ITU’s foundational definition offer into the Internet of Things? 8. How
many devices will be connected to Internet by 2020? 9. What do these things include?
10. What does the Internet of Things galaxy encompass? 11. What concepts are
undeniably intertwined? 12. What are cyber-physical systems? 13. Is computing
embedded into every physical component? 14. What are wireless sensor networks?
15. What is the earliest manifestation of the Internet of Things? 16. What can be seen
as machine-to-machine precursors? 17. Has machine-to-machine communication
evolved over the years? 18. What has it begun to offer?
IV. Retell the above text using the word combinations from Exercise I.
WORKING ON WORDS
II. Find in the above text and copy out phrases in which the preposition
into is used. Translate them.
62
COMPUTER ENGINEERING
III. a). Study the table and learn phrasal verbs with “point”.
V. Find in the above text and copy out sentences in which linking
expressions such as and as a result are used. Translate the sentences with them.
Say which of these linking expressions:
63
Veretennikova V.P.
a) expresses a reason?
b) introduces clarification?
WRITTEN PRACTICE
b). Find in the above text and copy out complex sentences having relative
clauses with whose and where.
III. Translate the following sentences into English using the words and
word combinations of the topical vocabulary:
1. «Интернет вещей» (IoT) может изменить и уже меняет работу
складских логистических комплексов. 2. Интернет вещей представляет собой
очень важное направление развития человечества и технологического
прогресса в целом. 3. Для внедрения IoT используются различные технические
модели обеспечения связи, каждая из которых имеет свои собственные
характеристики. 4. Интернет вещей позволит разработать такие динамические
сети, которые будут состоять из миллиардов различных устройств и смогут
обмениваться информацией друг с другом. 5. Все цифровые аналоги будут в
64
COMPUTER ENGINEERING
состоянии воспринимать информацию, поступающую из окружающего мира, и
вступать во взаимодействие с различными предметами, а также обмениваться
информацией. 6. Под термином «Интернет вещей» скрывается концепция
информационной коммуникационной сети между большим количеством
различных физических объектов (вещей), которые будут оснащены
необходимым оборудованием для связи с внешней средой или друг с другом. 7.
В настоящее время Интернет вещей рассматривается как интеллектуальная
окружающая среда и всепроникающие компьютерные системы. 8. В результате
может возникнуть совершенно новая среда, в которой интеллект,
реализованный через программные приложения, сможет оценивать вещи,
происходящие в физическом мире.
IV. Choose the proper verb form and write down the translation of each
sentence:
1. We assume without loss of generality that q has no variables in common
with p except x, and ….. the value of x. 2. This is incorrect because you ….. how to
produce x deterministically when it exists. 3. Each machine requires only O(nk)
states ….. the counting. 4. You must ….. a total recursive function that grows
asymptotically faster than any provably total recursive function. 5. We have shown
that the guessing ….. either universally or existentially so as not to increase the
number of alternations along any computation path. 6. This exercise was not …... as
an endurance test. 7. Because these strings are of polynomial length in n and C is
sparse, the string yn ….. of polynomial length. 8. This subformula says that the
machine ….. at time 0 in its start state.
Keys: starts, to do, can be done, meant, does not change, build, have not
shown, is.
V. Choose the verb form in the brackets that best completes the sentence.
1. The IoT is significant because an object that can represent itself digitally
(becomes, become, to become) something greater than the object by itself. 2. With
the internet of things, the physical world is (becoming, become, became) one big
information system. 3. The quality and scope of the data across the Internet of Things
(generates, generating, to generate) an opportunity for much more contextualized and
responsive interactions with devices to create a potential for change. 4. As devices
(become, becomes, to become) more connected thanks to the IoT, security and
privacy have become the primary concern among consumers and businesses. 5. The
smart lighting system (allows, allow, allowing) a city to intelligently provide the right
level of lighting needed by time of day, season, and weather conditions. 6. Sensors
installed inside equipment will (monitor, be monitored, monitored) if any parts have
exceeded their designed thresholds, and will automatically (send, sent, to send)
reports to owners and manufacturers. 7. These devices will (bridge, bridging, bridged)
the gap between physical and digital world to improve the quality and productivity of
life, society and industries.
65
Veretennikova V.P.
TOPICS FOR DISCUSSION
I. Do you think things are now on par with people in the world of the
Internet of Things? What are the advantages and disadvantages of the Internet
of Things?
III. What do you think of the following statement? What could you add?
Necessity is the mother of invention. Inventions are solutions to different
problems.
66
COMPUTER ENGINEERING
VERY-LARGE-SCALE INTEGRATION
II. Read Text Twelve and get ready to discuss it in the classroom:
Text 12
VERY-LARGE-SCALE INTEGRATION
Very-large-scale integration (VLSI) is the process of creating an integrated
circuit (IC) by combining hundreds of thousands of transistors or devices into a single
chip. VLSI began in the 1970s when complex semiconductor and technologies were
being developed. The microprocessor is a VLSI device. Before the introduction of
VLSI technology most ICs had a limited set of functions they could perform.
An electronic circuit might consist of a CPU, ROM, RAM and other glue logic. VLSI
lets IC designers add all of these into one chip.
Scientists who had worked on radar returned to solid-state device development.
With the invention of transistors at Bell Labs in 1947, the field of electronics shifted
from vacuum tubes to solid-state devices.
With the small transistor at their hands, electrical engineers of the 1950s saw
the possibilities of constructing far more advanced circuits. However, as the
complexity of circuits grew, problems arose. One problem was the size of the circuit.
A complex circuit like a computer was dependent on speed. If the components were
large, the wires interconnecting them must be long.
The electric signals took time to go through the circuit, thus slowing the
computer.
The invention of the integrated circuit by Jack Kilby and Robert Noyce solved
this problem by making all the components and the chip out of the same block
(monolith) of semiconductor material. The circuits could be made smaller, and the
manufacturing process could be automated. This led to the idea of integrating all
components on a single silicon wafer, which led to small-scale integration (SSI) in
the early 1960s, medium-scale integration (MSI) in the late 1960s, and then large -
scale integration (LSI) as well as VLSI in the 1970s and 1980s, with tens of
67
Veretennikova V.P.
thousands of transistors on a single chip (later hundreds of thousands, then millions,
and now billions).
Structured VLSI design is a modular methodology originated by Carver
Mead and Lynn Conway for saving microchip area by minimizing the interconnect
fabrics area. This is obtained by repetitive arrangement of rectangular macro blocks
which can be interconnected using wiring by abutment. An example is partitioning
the layout of an adder into a row of equal bit slices cells. In complex designs this
structuring may be achieved by hierarchical nesting. Structured VLSI design had
been popular in the early 1980s, but lost its popularity later because of the advent of
placement and routing tools wasting a lot of area by routing, which is tolerated
because of the progress of Moore's Law.
A primary task for VLSI designer is to translate circuit schematics into silicon
form (this process is called physical design). Current designs, unlike the earliest
devices, use extensive design automation and automated logic synthesis to lay out the
transistors, enabling higher levels of complexity in the resulting logic functionality.
Certain high-performance logic blocks like the SRAM (static random-access
memory) cell, are still designed by hand to ensure the highest efficiency.
(From Wikipedia, the free encyclopedia)
I. Find in the above text English equivalents for the following words and
word combinations and write them out:
намного более продвинутые схемы; интеграция малого уровня; в отличие
от самых ранних устройств; равные ячейки срезов бит; ограниченный набор;
высокопроизводительные логические блоки; модульная методология;
разрабатывались технологии; твердотельное устройство; иерархическим
вложением; проводка границей; пройти через схему; для обеспечения
максимальной эффективности; область соединительных тканей.
II. Answer the following questions using the word combinations from
Exercise I:
1. What kind of process is very-large-scale integration? 2. When did VLSI
begin? 3. What might an electronic circuit consist of? 4. When and why did the field
of electronics shift from vacuum tubes to solid-state devices? 5. Why did problems
arise as the complexity of circuits grew? 6. How did the invention of the integrated
circuit solve the problem of slowing the computer? 7. What did the idea of
integrating all components on a single silicon wafer lead to? 8. Who is a modular
methodology originated by? 9. Why did the structured VLSI design lose its
popularity? 10. What is a primary task for a VLSI designer? 11. What logic blocks
are still designed by hand?
III. Retell the above text using as many of the word combinations from
Exercise I as you can.
68
COMPUTER ENGINEERING
WORKING ON WORDS
II. Make up your own sentences or situations with the following phrases:
to create an integrated circuit, a limited set of functions, far more advanced
circuits, to lay out the transistors, to solve the problem, to interconnect using wiring
by abutment, to ensure the highest efficiency.
III. Use the following phrasal verbs in the sentences of your own:
to work on, to be dependent on, to translate into, to combine into, to lay out, to
concern with.
IV. Complete the sentences with the words from the box:
1. The first ….. chips held two transistors e ach. 2. Designers must keep ever
more of these rules in ….. while laying out custom circuits. 3. As microprocessors
become more complex due to technology scaling, microprocessor ….. have
encountered several challenges. 4. Subsequent…..added more transistors, and as a
consequence, more individual functions or systems were integrated over time. 5.
Today’s microprocessors have many millions of ….. and billions of individual
transistors. 6. Such improvements in technique led to …… with hundreds of logic
gates, known as medium-scale integration (MSI). 7. Several ….. philosophies have
been developed to aid this new design flow.
WRITTEN PRACTICE
I. Choose the necessary verb form from the box and translate the
sentences:
1. The first integrated circuits ….. only a few devices, perhaps as many as
ten diodes, transistors, resistors and capacitors. 2. It has made possible ….. one or
more logic gates on a single device. 3. In the mid-1920s several inventors attempted
devices that ….. to control current in solid-state diodes and convert them into triodes.
4. The VLSI designer ….. to translate circuit schematics into silicon form. 5. There
….. an effort to name and calibrate various levels of large-scale integration above
VLSI. 6. The use of silicon and germanium crystals ….. to improvements in
fabrication and theory. 7. He proved by mathematical methods that the system had
69
Veretennikova V.P.
certain ….. properties, and that certain undesired effects (such as deadlock) could not
occur.
III. Find in the above text and copy out sentences containing modal verbs
with the Infinitive Passive.
The infinitive after the linking verb BE is part of the compound nominal predicate.
VII. Translate the following sentences using the words and word
combinations of the topical vocabulary.
1. Каждая большая интегральная схема представляет собой кристалл
размером в несколько квадратных миллиметров, в котором сосредоточены
десятки тысяч полупроводниковых элементов. 2. Преимуществами диодных
матриц являются простота и небольшая занимаемая на кристалле площадь, а
недостатком – значительные токи, потребляемые по входам матрицы. 3.
Интегральная микросхема представляет собой микроэлектронное устройство,
схему определённой сложности, которая изготавливается на полупроводнивом
кристалле или плёнке. 4. Плёночная технология делится на два направления,
связанных соответственно с использованием тонких или толстых плёнок. 5.
Интегральные схемы разрабатываются и выпускаются сериями. 6. Цифровые
интегральные микросхемы применяют в устройствах обработки дискретной
информации, а так же в системах автоматики. 7. Большую интегральную схему
создают методами планарной технологии путём формирования их элементов
с одной стороны полупроводниковой пластины (подложки).
71
Veretennikova V.P.
DATABASE
II. Read Text Thirteen and get ready to discuss it in the classroom:
Text 13
DATABASE
A database is an organized collection of data, generally stored and accessed
electronically from a computer system. Where databases are more complex they are
often developed using formal design and modeling techniques.
The database management system (DBMS) is the software that interacts with
end users, applications, the database itself to capture and analyze the data and
provides facilities to administer the database. The sum total of the database, the
DBMS and the associated applications can be referred to as a "database system".
Often the term "database" is also used to loosely refer to any of the DBMS, the
database system or an application associated with the database.
Computer scientists may classify database-management systems according to
the database models that they support. Relational databases became dominant in the
1980s. These model data as rows and columns in a series of tables, and the vast
majority use SQL for writing and querying data. In the 2000s, non-relational
databases became popular, referred to as NoSQL because they use different query
languages.
Formally, a "database" refers to a set of related data and the way it is
organized. Access to this data is usually provided by a "database management
system" (DBMS) consisting of an integrated set of computer software that
allows users to interact with one or more databases and provides access to all of the
data contained in the database (although restrictions may exist that limit access to
particular data). The DBMS provides various functions that allow entry, storage and
retrieval of large quantities of information and provides ways to manage how that
information is organized.
Outside the world of professional information technology, the term database is
often used to refer to any collection of related data (such as a spreadsheet or a card
72
COMPUTER ENGINEERING
index) as however size and usage requirements typically necessitate use of a database
management system. Existing DBMSs provide various functions that allow
management of a database and its data which can be classified into four main
functional groups:
Data definition – Creation, modification and removal of definitions that define
the organization of the data.
Update – Insertion, modification, and deletion of the actual data.
Retrieval – Providing information in a form directly usable or for further
processing by other applications. The retrieved data may be made available in a form
basically the same as it is stored in the database or in a new form obtained by altering
or combining existing data from the database.
Administration – Registering and monitoring users, enforcing data security,
monitoring performance, maintaining data integrity, dealing with concurrency
control, and recovering information that has been corrupted by some event such as an
unexpected system failure.
Both a database and its DBMS conform to the principles of a
particular database model. "Database system" refers collectively to the database
model, database management system, and database.
Databases and DBMSs can be categorized according to the database model(s)
that they support (such as relational or XML), the type(s) of computer they run on
(from a server cluster to a mobile phone), the query language(s) used to access the
database (such as SQL or XQuery), and their internal engineering, which affects
performance, scalability, resilience, and security.
(From Wikipedia, the free encyclopedia)
Commentary
SQL (pronounced ɛs-kjuː-ɛl) stands for Structured Query Language. SQL is
used to communicate with a database. According to ANSI (American National
Standards Institute), it is the standard language for relational database management
systems.
XQuery (XML Query) is a query and functional programming language that
queries and transforms collections of structured and unstructured data, usually in the
form of XML, text and with vendor-specific extensions for other data formats (JSON,
binary, etc.).
XML stands for eXtensible Markup Language. XML is a markup language
much like HTML. XML was designed to store and transport data as well as to be self-
descriptive.
DBMS (database management system) is system software for creating and
managing databases. The DBMS provides users and programmers with a systematic
way to create, retrieve, update and manage data.
I. Find in the above text English equivalents for the following words and
word combinations and write them out:
73
Veretennikova V.P.
работа с контролем параллелизма; организованный сбор данных; как
строки и столбцы; собирать и анализировать данные; набор связанных данных;
путём изменения или объединения существующих данных; реляционные базы
данных; интегрированный набор компьютерного программного обеспечения;
поиск большого количества информации; устойчивость и безопасность.
II. Memorize the following word combinations and make up your own
sentences or situations with them:
to be corrupted by some event; to capture and analyze the data; retrieved data;
as rows and columns; to maintain data integrity; to update and manage data.
III. Answer the following questions using the word combinations from
Exercises I and II:
1. What is a database? 2. What does the database management system interact
with? 3. May computer scientists classify database-management systems according to
the database models that they support? 4. When did relational databases become
dominant? 5. What uses SQL for writing and querying data? 6. What does a database
management system consist of? 7. How many functional groups can the functions be
classified into? 8. What does data definition mean? 9. When can information be
corrupted? 10. How can databases and DBMSs be categorized?
IV. Retell the above text using as many of the words and word
combinations from Exercises I and II as you can.
WORKING ON WORDS
I. a). Study the table and learn phrasal verbs with “deal”.
74
COMPUTER ENGINEERING
1. He dealt … recovering information that was corrupted by such an
unexpected system failure. 2. These application requirements must be dealt … among
market research firms. 3. Database security deals … all various aspects of protecting
the database content, its owners, and its users. 4. This database management system
deals … modeling, storage, and retrieval of multi-dimensional arrays such as satellite
images and climate simulation output. 5. Tasks such as loading data, building indexes
and evaluating queries will be dealt … among our special authorized personnel. 6.
Database access control deals … controlling who (a person or a certain computer
program) is allowed to access information in the database. 7. The authorization rights
to view payroll data are dealt … only among the financial group of users and view
medical data among the others. 8. The government must now deal …
the problem of high unemployment.
II. Fill in the blanks with corresponding adjectives from the list below.
1. Database servers are dedicated computers that hold the … databases. 2.
RAID disk arrays are used for … storage. 3. In recent years, there has been a …
demand for massively distributed databases with … partition tolerance. 4. Main
memory databases are … than disk databases, and so are often used. 5. A mobile
database can be carried on or synchronized from a … computing device. 6. Existing
DBMSs provide … functions that allow management of a database. 7. Hardware
database accelerators, … to one or more servers via a high-speed channel, are also
used in large volume transaction processing environments. 8. End-user databases
consist of data … by individual end-users. 9. A database management system
(DBMS) consists of an … set of computer software that allows users to interact with
one or more databases.
__________________
Integrated, faster, mobile, actual, high, developed, stable, various, connected, strong
WRITTEN PRACTICE
I. Choose the necessary verb form from the box and translate the
sentences:
1. A graph database uses graph structures with nodes, edges, and properties
.…. and store information. 2. XML databases are a type of structured document-
oriented database that allows querying …… on XML document attributes. 3.
An active database includes an event-driven architecture which can ….. to conditions
both inside and outside the database. 4. Operational databases store ….. data about
the operations of an organization. 5. He usually uses a special kind of database
for knowledge management, ….. the means for the computerized collection,
organization, and retrieval of knowledge. 6. We aim ….. the same scalable
performance of SQL systems for online transaction processing. 7. This term is often
75
Veretennikova V.P.
….. casually to refer to both a database and the DBMS. 8. Data security prevents
unauthorized users from viewing or ….. the database. 9. A document-oriented
database ….. for storing, retrieving, and managing document-oriented information.
IV. Translate the following sentences using the words and word
combinations of the topical vocabulary.
1. База данных – это организованная структура, предназначенная для
хранения, изменения и обработки взаимосвязанной информации,
преимущественно больших объёмов. 2. Система управления базами данных
представляет собой комплекс программных средств, необходимых для создания
структуры новой базы, её наполнения, редактирования и отображения
информации. 3. Использование реляционных баз данных было предложено
доктором Коддом в 1970 году. 4. При помощи SQL можно выполнять запросы,
которые возвращают наборы данных, получаемых из одной или нескольких
таблиц. 5. Данный алгоритм хорошо работает лишь потому, что оба исходных
массива были заранее отсортированы. 6. Исходный массив делится на
подмассивы, состоящие из одного элемента. 7. База данных хранится и
обрабатывается в вычислительной системе.
VI. Collect all the material about data bases and write down a short
abstract.
76
COMPUTER ENGINEERING
TALKING TOPICS:
77
Veretennikova V.P.
ENERGY CONSERVATION
II. Read Text Fourteen and get ready to discuss it in the classroom:
Text 14
ENERGY CONSERVATION
78
COMPUTER ENGINEERING
One of the primary ways to improve energy conservation in buildings is to
perform an energy audit. An energy audit is an inspection and analysis of energy use
and flows for energy conservation in a building, process or system with an eye
toward reducing energy input without negatively affecting output. This is normally
accomplished by trained professionals and can be part of some of the national
programs. Recent development of smartphone apps enables homeowners to complete
relatively sophisticated energy audits themselves.
Building technologies and smart meters can allow energy users, both
commercial and residential; to visualize the impact their energy use can have in their
workplace or homes. Advanced real-time energy metering can help people save
energy by their actions.
(From Wikipedia, the free encyclopedia)
Commentary
Smartphone apps: The word "app" is an abbreviation for "application." It's a
piece of software that can run through a web browser or offline on your computer,
and on a smart phone, tablet or other electronic devices, including smart TVs and
smart watches. Apps may or may not have a connection to the internet.
I. Find in the above text English equivalents for the following words and
word combinations and write them out:
Убытки и потери; применяя «зелёные» инженерные методы; большая
налоговая нагрузка для потребителей высокой энергии; энергетический аудит;
энергосбережение; с прицелом на снижение энергозатрат; уменьшить их
потребление; устойчивая энергетическая иерархия; многоуровневый налог на
энергию; экономить энергию; концепция экологичности; учёт энергии в
реальном времени; будущее истощение ресурсов; экологические побочные
эффекты и ограничения.
II. Memorize the following word combinations and make up your own
sentences or situations with them:
To be accomplished by trained professionals, environmental side effects, to
reduce the consumption of energy, energy conservation, with an eye toward,
advanced real-time energy metering.
III. Look through the text again and find the answers to the following
questions:
1. What is energy conservation? 2. What can energy conservation lower energy
costs by? 3. Why can technological upgrades and improved operation and
maintenance conserve energy? 4. Can energy be transformed from one form to
another? 5. Why do some countries employ energy or carbon taxes? 6. Why is it
important to perform an energy audit? 7. What is an energy audit? 8. How is
an energy audit normally accomplished? 9. What do you know about smart meters?
79
Veretennikova V.P.
IV. Find in Text 14 synonyms of the following words:
Stable, exhaustion, educated, radically, progressive.
V. Retell the above text using as many of the word combinations from
Exercises I and II as you can.
WORKING ON WORDS
III. Complete the sentences with the words from the box:
1. In cold climates, heating air and water is a major ….. on household energy
use. 2. Significant energy reductions are possible by using ….. technologies. 3.
Zoning reforms that allow greater urban density as well as designs for walking and
bicycling can greatly ….. energy consumed for transportation. 4. Energy ….. is the
effort made to reduce the consumption of energy by using less of an energy service.
5. There are ….. reasons why people or organizations choose to conserve energy –
from cutting costs to promoting economic, political and environmental
sustainability. 6. Our ….. are often poorly informed of the savings of energy efficient
products. 7. We must ….. the concept of Eco-sufficiency. 8. Through new
technologies, consumers will be able to not only….. manage their consumption but
get actively engaged in the energy market.
IV. Complete the passage below using the linkers in the box.
80
COMPUTER ENGINEERING
existence. ….. , the electric power system has come to face three adversely affecting
issues, ….. , steady electricity supply (energy security), decrease of electricity price and
economic growth (economic growth), and harmonization with environment
(environmental protection). Load leveling, electric energy storage technology, …..
renewable or new energy power generation systems such as wind-power generation are
being developed as the effective measures to solve these types of trilemma syndrome,
….. it is true that we have not found the fundamental solution yet.
WRITTEN PRACTICE
b) Find in the above text the sentence containing the infinitive in the
function of a compound nominal predicate and write it out.
II. Write down questions to which the following statements may serve as
the answers.
1. The British thermal unit (Btu or BTU) is defined as the amount of heat
required to raise the temperature of one pound of water by one degree Fahrenheit. 2.
In passive solar building design, windows, walls, and floors are made to collect,
store, and distribute solar energy in the form of heat in the winter and reject solar heat
in the summer. 3. Energy conservation can be achieved either by using energy more
efficiently or by reducing the amount of service used. 4. In warm climates where air
conditioning is used, any household device that gives off heat will result in a larger
load on the cooling system. 5. New appliances are regularly tested on efficiency, and
the most efficient ones are made the standard. 6. A prominent example of this is the
energy savings that can be made by replacing an incandescent light bulb with a more
modern alternative. 7. Standard electric boilers can be made to run only at hours of
the day when they are needed by means of a time switch.
81
Veretennikova V.P.
III. Supply the correct reflexive pronouns (myself/itself/ourselves, etc.) in
the following sentences.
1. Smart metering system in ….. does not necessarily lead to energy savings,
however correct use of the infrastructure, does. 2. Recent development of smart
phone apps enables homeowners to complete relatively sophisticated energy audits
….. . 3. Last month the center for energy conservation was created as a project
financed by the International Environment Facility and gradually established ….. as
an independent technical national center. 4. George prides ….. on testing new
appliances on efficiency. 5. In addition, total smart metering investment ….. appears
to be influenced by local conditions (including local labour costs, geographical
configurations, etc.). 6. She blamed ….. for not reducing wastage and losses of
energy. 7. We focus ….. on the long term conservation of energy and prefer to make
use of renewable energy technologies. 8. You must avail ….. of measures to reduce
pollution, promote sustainability, and minimize risk to human health and the
environment. 9. He taught ….. how to pass his test in energy savings. 10. I don’t need
any help. I can familiarize ….. with designing the systems that have a positive impact
on the environment. 11. You didn’t know about the electricity consumption data …..
till yesterday.
IV. In the following sentences, cross out the adjective which does not
collocate with the noun.
1. The passive solar design or climatic / sunny design does not involve the use
of mechanical and electrical devices. 2. When purchasing light bulbs, many
consumers opt for technical / cheap incandescent bulbs, failing to take into account
their higher energy costs and lower lifespan. 3. The burning of valuable / fossil fuels
by humans is the largest source of emissions of carbon dioxide. 4. This is the most
prevalent / good model adopted for smart metering. 5. One of the satisfactory/main
factors in achieving energy savings is feedback provision on the electricity
consumption data to the consumers enabled by smart metering infrastructure. 6. We
didn’t minimize depletion of natural / historical resources last month. 7. They have
to ensure that all material and energy inputs and outputs are as inherently safe /
scientific and benign as possible.
TALKING TOPICS:
82
COMPUTER ENGINEERING
AUTOMATIC CONTROL THEORY
II. Read Text Fifteen and get ready to discuss it in the classroom:
Text 15
AUTOMATIC CONTROL THEORY
Control engineering is concerned with the analysis and design of goal-oriented
systems. Therefore the mechanization of goal-oriented policies has grown into a
hierarchy of goal-oriented control systems. Modern control theory is concerned with
systems that have self-organizing, adaptive, robust, learning, and optimum qualities.
This interest has aroused even greater excitement among control engineers. The
control of an industrial process (manufacturing, production, and so on) by automatic
rather than manual means is often called automation. Automation is prevalent in the
chemical, electric power, paper, automobile, and steel industries, among others. The
concept of automation is central to our industrial society. Industry seeks to provide
products that are increasingly precise, reliable, accurate, and robust.
Control engineering is based on the foundations of feedback theory and linear
system analysis, and it integrates the concepts of network theory and communication
theory. Therefore control engineering is not limited to any engineering discipline but
is equally applicable to aeronautical, chemical, mechanical, environmental, civil, and
electrical engineering. For example, a control system often includes electrical,
mechanical, and chemical components.
The first step of the automatic control system analysis is the development of a
system dynamic model. Dynamic model here is assumed as model, describing
dynamics of the system. This Automatic system theory course deals with linear time
invariant systems, whose models are described by linear differential equations.
Development of dynamic model allows simulation of a system, i.e. obtain solutions
of system differential equations.
A control system is an interconnection of components forming a system
configuration that will provide a desired system response. The basis for analysis of a
system is the foundation provided by the linear system theory, which assumes a
cause–effect relationship for the components of a system.
The input–output relationship represents the cause-and-effect relationship of
the process, which in turn represents a processing of the input signal to provide an
83
Veretennikova V.P.
output signal variable, often with power amplification. An open-loop control system
utilizes a controller or control actuator to obtain the desired response. An open-loop
system is a system without feedback. An open-loop control system utilizes an
actuating device to control the process directly without using feedback.
In contrast to an open-loop control system, a closed-loop control system
utilizes an additional measure of the actual output to compare the actual output with
the desired output response. The measure of the output is called the feedback signal.
A feedback control system is a control system that tends to maintain a prescribed
relationship of one system variable to another by comparing functions of these
variables and using the difference as a means of control. A feedback control system
often uses a function of a prescribed relationship between the output and reference
input to control the process. Often the difference between the output of the process
under control and the reference input is amplified and used to control the process so
that the difference is continually reduced. The feedback concept has been the
foundation for control system analysis and design.
Feedback control systems are used extensively in industrial applications.
Thousands of industrial and laboratory robots are currently in use. Manipulators can
pick up objects weighing hundreds of pounds and position them with an accuracy of
one tenth of an inch or better. Automatic handling equipment for home, school, and
industry is particularly useful for hazardous, repetitious, dull, or simple tasks.
Machines that automatically load and unload, cut, weld, or cast are used by industry
to obtain accuracy, safety, economy, and productivity. The use of computers
integrated with machines that perform tasks like a human worker has been foreseen
by several authors. As stated earlier, robots are programmable computers integrated
with machines, and they often substitute for human labor in specific repeated tasks.
Some devices even have anthropomorphic mechanisms, including what we might
recognize as mechanical arms, wrists, and hands.
In its modern usage, automation can be defined as a technology that uses
programmed commands to operate a given process, combined with feedback of
information to determine that the commands have been properly executed.
Automation is often used for processes that were previously operated by humans.
When automated, the process can operate without human assistance or interference.
In fact, most automated systems are capable of performing their functions with
greater accuracy and precision, and in less time, than humans are able to do. A
semiautomated process is one that incorporates both humans and robots. For instance,
many automobile assembly line operations require cooperation between a human
operator and an intelligent robot. A robot is a computer-controlled machine and
involves technology closely associated with automation. Industrial robotics can be
defined as a particular field of automation in which the automated machine (that is,
the robot) is designed to substitute for human labor. Thus robots possess certain
humanlike characteristics. We recognize that the automatic machine is well suited to
some tasks and that other tasks are best carried out by humans.
84
COMPUTER ENGINEERING
WORKING ON THE TEXT
I. Find in the above text English equivalents for the following words and
word combinations and write them out:
анализ системы автоматического управления; целевая политика;
управлять данным процессом; система обратной связи; вызвало еще большее
волнение; ранее управляемые людьми; без помощи или вмешательства
человека; имеет дело с линейными инвариантными по времени системами;
взаимосвязь компонентов; заменить человеческий труд; опорный вход;
причинно-следственная связь; могут подбирать предметы; промышленная
робототехника, автоматическое погрузочно-разгрузочное оборудование,
техника управления.
II. Answer the following questions using the words and word
combinations from Exercise I:
1. What is control engineering concerned with? 2. What is called automation?
3. What is control engineering based on? 4. Why is the first step of the automatic
control system analysis the development of a system dynamic model? 5. Does the
development of dynamic model allow simulation of a system? 6. What is the basis for
analysis of a system? 7. What represents the cause-and-effect relationship of the
process? 8. Which system is a system without feedback? 9. What can you say about a
feedback control system? 10. Where are feedback control systems used? 11. What
substitutes for human labor in specific repeated tasks? 12. What can be defined as a
technology that uses programmed commands to operate a given process, combined
with feedback of information to determine that the commands have been properly
executed? 13. When can the process operate without human assistance or
interference? 14. What process is called a semiautomated one? 15. What is a robot?
IV. Retell the above text using as many of the word combinations from
Exercise I as you can.
WORKING ON WORDS
II. Complete the sentences with the words from the box:
85
Veretennikova V.P.
improving complementary systems toward hour investigation
designers challenge improved
1. Advanced robotic ….. are striving for task adaptability through enhanced
sensory feedback. 2. We are referring to labor productivity, which is real output per
….. of work. 3. The present ….. to control engineers is the modeling and control of
modern, complex, interrelated systems such as traffic control systems and robotic
systems. 4. Modern control engineering practice includes the use of control design
strategies for ….. manufacturing processes, and the efficiency of energy use. 5. The
gap exists between the complex physical system under ….. and the model used in the
control system synthesis. 6. Precise, reliable control of automobile performance has
….. markedly over the past decades. 7. The twin goals of understanding and
controlling are ….. because effective systems control requires that the systems be
understood and modeled. 8. Many research activities are aimed ….. reducing
implementation cost and expanding the realm of application. 9. In the past, disk drive
….. have concentrated on increasing data density and data access times.
86
COMPUTER ENGINEERING
1. The trend toward increased connectivity ….. the networks of an organization
and its external stakeholders is expected to continue. 2. She wants to distribute the
tasks ….. our engineers. 3. The computer's operating system may rapidly switch back
and forth ….. different tasks. 4. This secret should strictly remain ….. two of us. 5.
The chief engineer was standing ….. his subordinates. 6. The connections ….. nodes
are established using either cable media or wireless media. 7. The first ….. the
electronic computers was The ENIAC, designed by John Mauchly and J. Presper
Eckert. 8. He was placed ….. two designers of goal-oriented systems. 9. You can
only choose ….. an open-loop control system and a closed-loop control system. 10.
During the conference, I had to sit ….. a large group of reporters and journalists. 11.
The fortunate engineer will celebrate his success ….. his friends. 12. She is German,
but she has been living ….. Americans for many years. 13. ….. you and me, I don't
like the idea to cease developing a computer-controlled machine.
V. Find in the above text and copy out sentences in which the prepositions
among and between are used. Translate them.
WRITTEN PRACTICE
II. These sentences include examples of both ing - forms, the gerund and
the present participle. Say which words are gerunds and which are present
participles.
1. An open-loop control system utilizes an actuating device to control the
process directly without using feedback. 2. Designers are now considering employing
disk drives to perform tasks historically delegated to central processing units, thereby
leading to improvements in the computing environment. 3. Many IT professionals are
now helping in the executing different tasks like, computer networking and
information processing. 4. This program tends to focus on learning current operating
systems, hardware/software training and computer repair.
87
Veretennikova V.P.
III. Find in the above text and copy out sentences in which linking
expressions therefore, in fact and in contrast to are used. Translate the sentences
with them. Say which of these linking expressions:
a) introduces a contrast?
b) expresses reality?
c) introduces results and conclusions?
IV. Read the above text again, find and copy out the sentences with
Present Perfect Active and Present Perfect Passive tense forms. Translate them
into your language.
88
COMPUTER ENGINEERING
ROBOTICS
II. Read Text Sixteen and get ready to discuss it in the classroom:
Text 16
ROBOTICS
Robotics is an interdisciplinary branch of engineering and science that includes
mechanical engineering, electronic engineering, information engineering, computer
science, and others. This field overlaps with electronics, computer science, artificial
intelligence, mechatronics, nanotechnology and bioengineering. Robotics deals with
the design, construction, operation, and use of robots, as well as computer systems for
their control, sensory feedback, and information processing. The word robotics was
derived from the word robot, which was introduced to the public by Czech writer
Karel Čapek in 1920.
These technologies are used to develop machines that can substitute for
humans and replicate human actions. Robots can be used in many situations and for
lots of purposes, but today many are used in dangerous environments
(including bomb detection and deactivation), manufacturing processes, or where
humans cannot survive (e.g. in space, under water, in high heat, and clean up and
containment of hazardous materials and radiation). Robots can take on any form but
some are made to resemble humans in appearance. This is said to help in the
acceptance of a robot in certain replicative behaviors usually performed by people.
Such robots attempt to replicate walking, lifting, speech, cognition, or any other
human activity. Many of today's robots are inspired by nature, contributing to the
field of bio-inspired robotics.
The concept of creating machines that can operate autonomously dates back to
classical times, but research into the functionality and potential uses of robots did not
grow substantially until the 20th century. Throughout history, it has been frequently
assumed by various scholars, inventors, engineers, and technicians that robots will
one day be able to mimic human behavior and manage tasks in a human-like fashion.
Today, robotics is a rapidly growing field, as technological advances continue;
89
Veretennikova V.P.
researching, designing, and building new robots serve various practical purposes,
whether domestically, commercially, or militarily. Many robots are built to do jobs
that are hazardous to people, such as defusing bombs, finding survivors in unstable
ruins, and exploring mines and shipwrecks. Robotics is also used in STEM
(science, technology, engineering, and mathematics) as a teaching aid. The advent of
nanorobots, microscopic robots that can be injected into the human body, could
revolutionize medicine and human health.
There are many types of robots; they are used in many different environments
and for many different uses, although being very diverse in application and form they
all share three basic similarities when it comes to their construction.
Robots all have some kind of mechanical construction, a frame, form or shape
designed to achieve a particular task. For example, a robot designed to travel across
heavy dirt or mud, might use caterpillar tracks. The mechanical aspect is mostly the
creator's solution to completing the assigned task and dealing with the physics of the
environment around it. Form follows function.
Robots have electrical components which power and control the machinery.
For example, the robot with caterpillar tracks would need some kind of power to
move the tracker treads. That power comes in the form of electricity, which will have
to travel through a wire and originate from a battery, a basic electrical circuit. Even
petrol powered machines that get their power mainly from petrol still require an
electric current to start the combustion process which is why most petrol powered
machines like cars, have batteries. The electrical aspect of robots is used for
movement (through motors), sensing (where electrical signals are used to measure
things like heat, sound, position, and energy status) and operation (robots need some
level of electrical energy supplied to their motors and sensors in order to activate and
perform basic operations)
All robots contain some level of computer programming code. A program is
how a robot decides when or how to do something. In the caterpillar track example, a
robot that needs to move across a muddy road may have the correct mechanical
construction and receive the correct amount of power from its battery, but would not
go anywhere without a program telling it to move. Programs are the core essence of a
robot, it could have excellent mechanical and electrical construction, but if its
program is poorly constructed its performance will be very poor (or it may not
perform at all). There are three different types of robotic programs: remote control,
artificial intelligence and hybrid. A robot with remote control programming has a
preexisting set of commands that it will only perform if and when it receives a signal
from a control source, typically a human being with a remote control. It is perhaps
more appropriate to view devices controlled primarily by human commands as falling
in the discipline of automation rather than robotics. Robots that use artificial
intelligence interact with their environment on their own without a control source,
and can determine reactions to objects and problems they encounter using their
preexisting programming. Hybrid is a form of programming that incorporates both AI
and RC functions.
(From Wikipedia, the free encyclopedia)
90
COMPUTER ENGINEERING
WORKING ON THE TEXT
I. Find in the above text English equivalents for the following words and
word combinations and write them out:
био-вдохновленная робототехника; содержат некоторый уровень;
основные сходства; искусственный интеллект; самостоятельно; робот с
гусеничным ходом; в качестве учебного пособия; основная сущность робота;
имитировать поведение человека; с дистанционным программированием;
сенсорная обратная связь; контролируемые в первую очередь человеческими
командами; копировать действия человека; двигать гусеницы трекера.
IV. Outline the main ideas of the text and write a summary.
WORKING ON WORDS
II. Complete the sentences with the words from the box:
1. Cognitive models try ….. the robot, the world, and how they interact. 2.
Many robots are designed for assembly work, which may not be readily ….. for other
applications. 3. The mechanical structure of a robot must be ….. to perform tasks. 4.
Many different types of batteries can be ….. as a power source for robots. 5. The
ability of tiny computing devices to control complex operations has transformed the
way many tasks are ….. . 6. The control of a robot ….. three distinct phases –
perception, processing, and action (robotic paradigms). 7. In 1948, Norbert
Wiener ….. the principles of cybernetics, the basis of practical robotics.
WRITTEN PRACTICE
I. These sentences include examples of both ing - forms, the gerund and
the present participle. Say which words are gerunds and which are present
participles.
1. Designing a battery-powered robot needs to take into account factors such as
safety, cycle lifetime and weight. 2. Inserting a program into a robot gives it the
ability to know when and how to carry out a task. 3. Balancing robots generally use
a gyroscope to detect how much a robot is falling and then drive the wheels
proportionally in the same direction. 4. Walking robots can be used for uneven
terrains, which would provide better mobility and energy efficiency than other
locomotion methods. 5. They will utilize an approach of passive dynamics where
the momentum of swinging limbs can be used for greater efficiency. 6. He wants to
develop a skating robot with a walking and skating multi-mode. 7. The concept of
creating machines dates back to classical times, but research into the potential uses of
robots did not grow substantially until the 20th century. 8. Of course, machines are
capable of displaying intelligent behavior, both in a language connected and in a
mechanical way.
II. Choose the proper verb form and translate the sentences.
1. Commercial and industrial robots are ….. today and used to perform jobs
more cheaply, more accurately and more reliably, than humans. 2. Some robots are
specifically designed for heavy load manipulation, and are ….. as "heavy-duty
robots". 3. Robotics is one of the most advanced and ….. technologies in the field of
medicine. 4. This robot was known as Shakey because its ….. camera shook as the
robot moved. 5. The mechanical aspect of a robot helps it ….. tasks in the
environment for which it’s designed. 6. Without a set of code telling it what ….. , a
robot would just be another piece of simple machinery. 7. Computer vision systems
rely on image sensors which ….. electromagnetic radiation which is typically in the
form of either visible light or infra-red light. 8. Robots can also be ….. with multiple
vision sensors to be better able to compute the sense of depth in the environment. 9.
Our robotics engineers ….. robots, maintain them, develop new applications for
them, and conduct research ….. the potential of robotics.
Keys: detect, emerging, equipped, widespread, to expand, mounted, design,
labeled, to do, complete.
92
COMPUTER ENGINEERING
III. Translate the following sentences into English using the words and
word combinations of the topical vocabulary:
1. Робототехника опирается на такие дисциплины, как электроника,
механика, кибернетика, телемеханика, информатика, а также радиотехника и
электротехника. 2. Уже создано множество механизмов, перемещающихся на
более чем двух конечностях. 3. В настоящее время самой важной задачей
является проблема оснащения робота искусственным интеллектом. 4. Благодаря
весьма продвинутой системе искусственного интеллекта, построенной на
основе нейросетей, робот научился ходить. 5. В 50-х годах XX века появились
механические манипуляторы для работы с радиоактивными материалами. 6.
Существует несколько подходов к классификации роботов, например, по сфере
применения, по назначению или по способу передвижения.
TALKING TOPICS:
II. Study the following information. What is your opinion on the topic?
The word robotics was derived from the word robot, which was
introduced to the public by Czech writer Karel Čapek in his play R.U.R. (Rossum's
Universal Robots), which was published in 1920. The word robot comes from the
Slavic word robota, which means labour/work. The play begins in a factory that
makes artificial people called robots, creatures who can be mistaken for humans –
very similar to the modern ideas of androids. Karel Čapek himself did not coin the
word. He wrote a short letter in reference to an etymology in the Oxford English
Dictionary in which he named his brother Josef Čapek as its actual originator.
According to the Oxford English Dictionary, the word robotics was first used in print
by Isaac Asimov, in his science fictionshort story "Liar!", published in May 1941
in Astounding Science Fiction. Asimov was unaware that he was coining the term;
since the science and technology of electrical devices is electronics, he
93
Veretennikova V.P.
assumed robotics already referred to the science and technology of robots. In some of
Asimov's other works, he states that the first use of the word robotics was in his short
story Runaround (Astounding Science Fiction, March 1942), where he introduced his
concept of The Three Laws of Robotics. However, the original publication of "Liar!"
predates that of "Runaround" by ten months, so the former is generally cited as the
word's origin.
(From Wikipedia, the free encyclopedia)
94
COMPUTER ENGINEERING
PROCESS & SYSTEM IDENTIFICATION
II. Read Text Seventeen and get ready to discuss it in the classroom:
Text 17
PROCESS & SYSTEM IDENTIFICATION
Process identification is a set of activities aiming to systematically define the
set of business processes of a company and establish clear criteria for prioritizing
them. The output of process identification is a process architecture, which represents
the business processes and their interrelations. Process architecture serves as a
framework for defining the priorities and the scope of process modeling and redesign
projects.
Process architecture refers to the hierarchal design of processes and systems
that are applied when transforming inputs into outputs. The term can be applied to
computing, the processes businesses undertake, and project management to name but
a few. In fact, it applies to fields such as computers (software, hardware, networks,
etc.), business processes (enterprise architecture, policy and procedures, logistics,
project management, etc.), and any other process system of varying degrees
of complexity.
Processes are defined as having inputs, outputs and the energy required to
transform inputs to outputs. Use of energy during transformation also implies a
passage of time: a process takes real time to perform its associated action. A process
also requires space for input/output objects and transforming objects to exist: a
process uses real space.
PID (proportional integral derivative) controller is undeniably the most popular
method used in controlling various industrial processes. The feature to tune the three
elements in PID has allowed the controller to deal with specific needs of the
industrial processes. A PID controller is used to regulate temperature, flow, pressure,
speed and other process variables. PID controllers use a control loop feedback
mechanism to control process variables and are the most accurate and stable
controller.
95
Veretennikova V.P.
There are three elements of control actions and improving robustness of
controllers through combination of these control actions in various forms. A plant
model is simulated using the Process Control Simulator in order to evaluate the
controller performance. At first, the open loop response of the plant is studied by
applying a step input to the plant and collecting the output data from the plant. Then,
FOPDT of physical model is formed by using both Matlab-Simulink and PRC
method. Then, calculation of controller's setting is performed to find the values
of Kc and τi that will give satisfactory control in closed loop system. Then, the
performance analysis of closed loop system is obtained by setpoint tracking analysis
and disturbance rejection performance. To optimize the overall physical system
performance, a refined tuning of PID or detuning is further conducted to ensure a
consistent resultant output of closed loop system reaction to the setpoint changes and
disturbances to the physical model. As a result, the PB = 100 (%) and τi= 2.0 (s) is
preferably chosen for setpoint tracking while PB = 100 (%) and τi = 2.5 (s) is selected
for rejecting the imposed disturbance to the model. In a nutshell, selecting correlation
tuning values is likewise depended on the required control's objective for the stability
performance of overall physical model.
The field of system identification uses statistical methods to build mathe-
matical models of dynamical systems from measured data. System identification also
includes the optimal design of experiments for efficiently generating informative data
for fitting such models as well as model reduction. A common approach is to start
from measurements of the behavior of the system and the external influences (inputs
to the system) and try to determine a mathematical relation between them without
going into many details of what is actually happening inside the system; this
approach is called system identification.
One of the many possible applications of system identification is in control
systems. For example, it is the basis for modern data-driven control systems, in which
concepts of system identification are integrated into the controller design, and lay the
foundations for formal controller optimality proofs.
System identification techniques can utilize both input and output data
(e.g. Eigensystem realization algorithm) or can include only the output data
(e.g. frequency domain decomposition). Typically an input-output technique would
be more accurate, but the input data is not always available.
The quality of system identification depends on the quality of the inputs, which
are under the control of the systems engineer. Therefore, systems engineers have long
used the principles of the design of experiments. In recent decades, engineers have
increasingly used the theory of optimal experimental design to specify inputs that
yield maximally precise estimators.
(From Wikipedia, the free encyclopedia)
Commentary
The Eigensystem realization algorithm (ERA) is a system identification
technique popular in civil engineering, in particular in structural health monitoring.
ERA can be used as a modal analysis technique and generates a system
realization using the time domain response (multi-)input and (multi-)output data.
96
COMPUTER ENGINEERING
I. Find in the above text English equivalents for the following words and
word combinations and write them out:
навязанное возмущение модели; для отслеживания заданного значения;
при преобразовании входных данных в выходные; техника ввода-вывода;
повышение надёжности контроллеров; математическое отношение; служит
основой; течение времени; в последние десятилетия; отклик разомкнутого
контура; объём процессов моделирования; механизм обратной связи с контуром
управления; выполнить связанное с ним действие; в двух словах; расчёт
настройки контроллера; заложить основы.
III. Answer the following questions using the words and word
combinations from Exercise I:
1. What is process identification? 2. What does process architecture serve as?
3. What design does process architecture refer to? 4. Why is a PID controller the most
popular method used in controlling various industrial processes? 5. How many
elements of control actions and improving robustness of controllers are there? 6.
What is calculation of controller's setting performed for? 7. What is obtained by
setpoint tracking analysis and disturbance rejection performance? 8. Why is a refined
tuning of PID or detuning further conducted? 9. What is selecting correlation tuning
values depended on? 10. What methods does the field of system identification use to
build mathematical models of dynamical systems from measured data? 11. What lays
the foundations for formal controller optimality proofs? 12. Can system identification
techniques utilize both input and output data? 13. What does the quality of system
identification depend on?
IV. Outline the main ideas of the text and write a summary.
97
Veretennikova V.P.
WORKING ON WORDS
II. Complete the sentences with the words from the box:
WRITTEN PRACTICE
II. Write the singular of the following irregular plural nouns. Use a
dictionary if necessary.
99
Veretennikova V.P.
V. Choose the correct alternative in each of the following sentences.
1. Then they sorting/sorted the eigenvectors according to the eigenvalues and
divided them into three subsets. 2. The distinguishing feature of the PID controller is
the ability to use/ to be used the three control terms of proportional, integral and
derivative influence on the controller output to apply accurate and optimal control. 3.
The use of the PID algorithm does not guarantees/guarantee optimal control of the
system or its stability. 4. The controller's PID algorithm restores the measured speed
to the desired/ desiring speed with minimal delay. 5. In linear algebra, an eigenvector
or characteristic vector of a linear transformation is/has been a nonzero vector. 6. The
tuning constants must be derived/derive for each control application, as they depend
on the response characteristics of the complete loop external to the controller. 7. We
can build/building different mathematical models of dynamical systems from
measured data.
II. Discuss what place labour takes in your life, what it gives every citizen
personally and why you should consider your tastes when choosing your future
work.
100
COMPUTER ENGINEERING
COMPUTER NETWORKING
II. Read Text Eighteen and get ready to discuss it in the classroom:
Text 18
EXPEDITED FORWARDING
The goal of the EF PHB is to provide low queuing delay to the marked
packets; the canonical example is VoIP traffic, even though the latter now has its own
PHB. EF is generally considered to be the best DS service, though this depends on
how much EF traffic is accepted by the DS domain. Each router in a DS domain
supporting EF is configured with a committed rate, R, for EF traffic. Different routers
can have different committed rates. At any one router, RFC 3246 spells out the rule
this way (note that this rule does indeed express a per-hop behavior): intuitively, the
definition of EF is simple: the rate at which EF traffic is served at a given output
interface should be at least the configured rate R, over a suitably defined interval,
independent of the offered load of non-EF traffic to that interface. To the EF traffic,
in other words, each output interface should appear to offer bandwidth R, with no
competing non-EF traffic. In general this means that the network should appear to be
lightly loaded, though that appearance depends very much on the strict control of
entering EF traffic. Normally R will be well below the physical bandwidths of the
router’s interfaces. RFC 3246 goes on to specify how this apparent service should
work. Roughly, if EF packets have length L then they should be sent at intervals L/R.
If an EF packet arrives when no other EF traffic is waiting, it can be held in a queue,
but it should be sent soon enough so that, when physical transmission has ended, no
more than L/R time has elapsed in total. That is, if R and L are such that L/R is 10µs,
but the physical bandwidth delay in sending is only 2µs, then the packet can be held
up to 8µs for other traffic. Note that this does not mean that EF traffic is given strict
priority over all other traffic (though implementation of EF- traffic processing via
priority queuing is a reasonable strategy); however, the sending interface must
provide service to the EF queue at intervals of no more than L/R; the EF rate R must
be in effect at per-packet time scales. Queuing ten EF packets and then sending the
101
Veretennikova V.P.
lot of them after time 10L/R is not allowed. Fair queuing can be used instead of
priority queuing, but if quantum fair queuing is used then the quantum must be small.
An EF router’s committed rate R means simply that the router has promised to
reserve bandwidth R for EF traffic; if EF traffic arrives at a router faster than rate R,
then a queue of EF packets may build up (though the router may be in a position to
use some of its additional bandwidth to avoid this, at least to a degree). Queuing
delays for EF traffic may mean that someone’s application somewhere fails rather
badly, but the router cannot be held to account. As long as the total EF traffic arriving
at a given router is limited to that routers’ EF rate R, then at least that router will be
able to offer good service. If the arriving EF traffic meets a token-bucket
specification TB(R,B), then the maximum number of EF packets in the queue will be
B and the maximum time an EF packet should be held will be B/R. So far we have
been looking at individual routers. A DS domain controls EF traffic only at its border.
One very conservative approach is to limit the total EF traffic entering the DS domain
to the common committed rate R. This will likely mean that individual routers will
not see EF traffic loads anywhere close to R.
Suppose in addition the domain knows from experience that exiting EF traffic
generally divides equally between R1–R4, and also that these border routers are the
bottlenecks. Then it might allow an EF-traffic entry rate of R at each router R1– R4,
meaning a total entering EF traffic volume of 4ˆR. Of course, if on some occasion all
the EF traffic entering through R1, R2 and R3 happened to be addressed so as to exit
via R4, then R4 would see an EF rate of 3ˆR, but hopefully this would not happen
often. If an individual ISP wanted to provide end-user DiffServ-based VoIP service,
it might mark VoIP packets for EF service as they entered (or might let the customer
mark them, subject to the ISP’s policing). The rate of marked packets would be
subject to some ceiling, which might be negotiated with the customer as a certain
number of voice lines. These marked VoIP packets would receive EF service as they
were routed within the ISP. For calls also terminating within that ISP – or switching
over to the traditional telephone network at an interface within that ISP – this would
be all that was necessary, but some calls will likely be to customers of other ISPs. To
address this, the original ISP might negotiate with its ISP neighbors for continued
preferential service; such service might be at some other DS service class (e.g. AF).
Packets would likely need to be remarked as they left the original ISP and entered
another. The original ISP may have one larger ISP in particular with which it has a
customer-provider relationship. The larger ISP might feel that with its high-volume
internal network it has no need to support preferential service, but might still agree to
carry along the original ISP’s EF marking for use by a third ISP down the road.
(by Peter L Dordal)
Commentary
EF (Expedited Forwarding) – The expedited forwarding per-hop behavior
assures that any traffic class with EF's related DSCP is given highest priority and is
not queued. EF provides low loss, latency, and jitter. ... Use the EF DSCP when
assigning priority to customers or applications with a premium SLA.
102
COMPUTER ENGINEERING
PHB (per-hop behavior) – In computer networking, per-hop behaviour (PHB)
is a term used in differentiated services (DiffServ) or multiprotocol label switching
(MPLS). It defines the policy and priority applied to a packet when traversing a hop
(such as a router) in a DiffServ network.
DS stands for differentiated services or DiffServ; it is a computer networking
architecture that specifies a simple and scalable mechanism for classifying and
managing network traffic and providing quality of service (QoS) on modern IP
networks.
RFC 3246 (Proposed Standard, March 2002) – This document defines a PHB
(per-hop behavior) called Expedited Forwarding (EF). The PHB is a basic building
block in the Differentiated Services architecture. EF is intended to provide a building
block for low delay, low jitter and low loss services by ensuring that the EF aggregate
is served at a certain configured rate.
µs is a symbol for the microsecond, an SI unit of time equal to 10−6 seconds.
ISP stands for Internet Service Provider.
VoIP is an acronym for Voice over Internet Protocol, or in more common
terms phone service over the Internet.
I. Find in the above text English equivalents for the following words and
word combinations and write them out:
поведение для каждого перехода; независимо от предлагаемой нагрузки;
продолжает уточнять; скорость помеченных пакетов; низкая задержка в
очереди; настроен с фиксированной скоростью; должен действовать в масштабе
времени для каждого пакета; квантовая организация честных очередей; роутер
не может быть привязан к аккаунту; пограничные маршрутизаторы; задержка
физической полосы пропускания; трафик имеет строгий приоритет;
поддерживать льготный сервис; время истекло в общей сложности; скорее
всего, нужно отметить; в течение определённого интервала.
II. Memorize the following word combinations and make up your own
sentences or situations with them:
to reserve bandwidth, to provide low queuing delay, on some occasion, be
subject to some ceiling, to express a per-hop behavior.
III. Reproduce the text in your own words using the topical vocabulary.
WORKING ON WORDS
103
Veretennikova V.P.
1. Modern data networks carry many different types of services, ….. voice,
video, streaming music, web pages and email. 2. DiffServ relies on a mechanism to
classify and mark packets as ….. to a specific class. 3. DiffServ operates on the
principle of traffic classification, ….. each data packet into one of a limited number
of traffic classes. 4. A group of routers that implement common, administratively …..
DiffServ policies are referred to as a DiffServ domain. 5. Assured ….. allows the
operator to provide assurance of delivery as long as the traffic does not exceed some
subscribed rate. 6. To prevent issues associated with tail drop, more ….. drop
selection algorithms such as random early detection are often used. 7. By ….. the
packets, the sender indicates that it wants the packets to be treated as a specific
service, but it can only hope that this happens.
104
COMPUTER ENGINEERING
IV. Translate the following sentences paying attention to the words and
word combinations in italics:
1. Components of a network can be connected to each other differently in some
fashion. 2. In general this means that the network should appear to be lightly loaded.
3. Hosts which needs to communicate outside their subnet, needs to know destination
network address, where the packet/data is to be sent. 4. A router creates a data packet
and then sends it to each host one by one. 5. Real-time traffic can be said to be delay-
intolerant. 6. A lost video packet might result in replay of the previous video frame. 7.
To address this, the original ISP might negotiate with its ISP neighbors for continued
preferential service. 8. Networks have interconnecting devices, which receives data
from directly connected sources, stores data, analyze it and then forwards to the next
interconnecting device closest to the destination. 9. Handling traffic that is both loss-
and delay-intolerant is very difficult.
WRITTEN PRACTICE
105
Veretennikova V.P.
IV. Translate the following sentences containing modal verbs with
infinitive passive.
1. When data-frame is transmitted there are probabilities that data-frame may
be lost in the transit or it is received corrupted. 2. Network address must always be
configured on a network interface card. 3. This task can be done by a server which
provides Layer-3 address of a remote host mapped with its domain name. 4. The
received stream should be delivered to the receiving application (for playback, if it is
a voice or video stream) slightly behind the time when it was sent. 5. Setting the
playback buffer capacity to 25 ms means that the third packet is not received in time
to be played back, and so it must be discarded. 6. While the lower rates have lower
voice quality, they can be used as a fallback in the event that congestion prevents
successful use of the 64 kbps rate. 7. If EF packets have length L then they should be
sent at intervals L/R. 8. The maximum time an EF packet should be held in the queue
will be B/R. 9. New connections must not be accepted unless resources are available.
10. We think that in this case the delay cannot be avoided completely.
SPEAKING:
106
COMPUTER ENGINEERING
SYSTEM ANALYSIS of COMPLEX CONTROL SYSTEMS
II. Read Text Nineteen and get ready to discuss it in the classroom:
Text 19
COMPUTER-BASED ANALYSIS OF COMPLEX SYSTEMS
It should be noted at this point that while many software systems for computer-
aided analysis and design are available by now, they are oriented mostly towards
linear systems and towards regulatory control with explicit control algorithms. There
still are only very few software packages designed for simulation and analysis of
complex control systems involving the use of nonlinear process models, forecasting
procedures and optimization algorithms for on-line decision making.
During design of a complex control system one can distinguish two main
stages:
• Preparatory stage.
• Interactive design stage.
At the preparatory stage the description (model) and the properties of the
process to be controlled are obtained and investigated in broad terms. The objectives
are specified and expressed in the form required. Then, the layout of the control
structure is proposed, together with algorithms to be used during on-line operation
for: identification (filtering), forecasting and decision making. It is obvious that the
complexity of those algorithms is growing as we consider more complex problems
and structures and as more powerful computing facilities are available for the on-line
usage. This last factor is in fact extremely important as it somehow changes the basic
paradigm of control design.
For many years the control and system engineers were used to the idea that the
control rule had to be simple and computationally low demanding. Many
sophisticated techniques were proposed to design such control algorithms and – due
to rather simple, mostly linear, form – it was possible to investigate the properties of
those algorithms by the theoretical analysis.
107
Veretennikova V.P.
The control algorithms can be made and are made quite complex and
computationally demanding. In particular the model-based predictive control for
nonlinear systems involving the repetitive, on-line, usage of non-linear models, real-
time forecasting tools and optimization techniques, is considered for many
applications.
During the preparatory stage good understanding of underlying theory is
needed as well as the knowledge about the process to be controlled. Computer
simulation may be required to get better understanding of the process properties.
The interactive design stage begins when the structural decisions regarding the
control structure and algorithms are made. These algorithms have then to be made
operational, tuned, checked for reliability and timeliness and validated in terms of
meeting the design objectives. Eventually they can be modified or even replaced with
others.
At this stage the computer-based analysis and simulation (CAS) is necessary if
we want to have the control system tested and verified prior to the actual real
implementation. The objectives of CAS are:
• to test the functioning of all the algorithms involved: their correctness,
accuracy, timeliness and reliability,
• to investigate the system performance under various possible scenarios of the
uncontrolled inputs or disturbances, and under variations of the process parameters
(parameters of the process model),
• to seek a trade-off, where necessary, between the use of more complicated
decision techniques, involving larger decision delays, and the use of less complicated
algorithms allowing for prompt control actions but offering less in terms of control
objectives.
In order to perform CAS efficiently and in a proper manner it is required to
have:
• Software environment (shell) allowing for convenient organization of the
simulation experiments with: friendly user interface, facilities for timing and
communication between participating tasks and data base for storing historical data,
input scenarios and the results of simulation.
• Algorithms for identification, forecasting and decision making (e.g.
optimization routines) used as the elements of a control structure; these are chosen
within the preparatory stage but have to be available as subprograms or procedures
with well-defined interfaces.
• Process simulator consisting, if required, of several modules related to the
process components.
• Simulator of the process environment; in particular the module or modules,
allowing for generation of the uncontrolled inputs to the process and other data
required by the control algorithms.
• Data related to the process and the process environment; parameters,
historical data, probability distributions etc.
Both process and process environment simulators are necessary to create “a
reality”. CAS will provide useful, meaningful results only in the case when we can
put trust into this reality. One cannot also overestimate the importance of having
108
COMPUTER ENGINEERING
sufficient and reliable data related to the process and its environment. The computer-
based analysis cannot be done without such data.
Various algorithms forming the control mechanisms should be available prior
to a simulation experiment. It may happen, however, that some of these algorithms
will be very complicated and it will be useful to replace them, for the purpose of
simulation, with much simpler ones. In particular, assume that the real-time control
system involves the use of complicated forecasting procedures. As far as the results
of computer simulation are concerned the use of forecast dummies could be possible.
The forecast dummy would be obtained by using a much simpler algorithm. It is only
essential to make sure that on average the forecast dummies have the same
probabilistic error characteristics as the real forecasts operationally generated on-line.
(by K. Malinowski, E. Niewiadomska-Szynkiewicz)
I. Find in the above text English equivalents for the following word
combinations and write them out:
принятие решений; характеристики вероятностной ошибки;
вычислительно требовательные; следует отметить; с точки зрения достижения
целей проекта; неконтролируемые входы или помехи; в среднем; использование
манекенов для прогнозирования; средства для синхронизации; явные
алгоритмы управления; до моделирования эксперимента; исследовать
производительность системы; на подготовительном этапе; обеспечить
полезные, значимые результаты; основная теория.
IV. Retell the above text using as many of the word combinations from
Exercise I as you can.
WORKING ON WORDS
II. Complete the sentences with the words from the box:
109
Veretennikova V.P.
1. Computer ….. may be required to get better understanding of the process
properties. 2. This ….. of systems allows to set up the simulation experiments and to
analyze different types of processes. 3. These computer ….. provide framework
organization for different classes of applications. 4. He is oriented mostly towards the
regulator control with explicit control ….. . 5. The implemented ….. is based on the
open-loop- feedback control approach. 6. The ….. may set or change the area of
admissible storage and release. 7. General purpose systems (class B) for computer-
based simulation and analysis will have much wider ….. of applications. 8. It is
difficult for the user to modify a software ….. when new features need to be
introduced.
IV. Find in the above text and copy out sentences having the preposition
prior to.
WRITTEN PRACTICE
I. Complete the following sentences using a word or phrase from the box.
1. The advantage of a specialized system (class A) is that one can have in the
software environment both typical algorithms for identification and control ….. the
process simulators. 2. On the other hand, ….. make such systems easy to use they
should consist of a wide range of facilities for convenient implementation of the
user’s applications. 3. The model permits one to analyze many fundamental display-
related issues ….. the following in a quantitative manner. 4. This process is repeated
….. all remaining rows of the array are completed. 5. ….. frequency domain
techniques are limited to linear systems, time domain is widely used to analyze real-
world nonlinear systems. 6. ….. an open-loop control system, a closed-loop control
110
COMPUTER ENGINEERING
system utilizes an additional measure of the actual output to compare the actual
output with the desired output response. 7. ….. the increasing complexity of the
system under control and the interest in achieving optimum performance, the
importance of control system engineering has grown in the past decade. 8. Typically,
these packages include ….. classical ….. state-space oriented methodologies.
II. Look at the first sentence in each pair and highlight the passive verb
forms. Then complete the second sentence, which is active.
1. a) The program is prepared for multi-input and multi-output dynamic
discrete-time systems that in general may be non linear and non stationary.
b) The system designer ….. the program for multi-input and multi-output
dynamic discrete-time systems that in general may be non linear and non stationary.
2. a) The forecast dummy will be obtained by using a much simpler algorithm.
b) Our team ….. the forecast dummy by using a much simpler algorithm.
3. a) Computers and similar devices are called nodes when connected to a
network.
b) We ……. computers and similar devices nodes when they are connected to a
network.
4. a) These algorithms have already been checked for reliability and timeliness.
b) You …. these algorithms for reliability and timeliness.
5. a) The communication of information between the nodes on a network is
controlled by the file server.
b) The file server ….. the communication of information between the nodes on
a network.
6. a) The results of computer simulation were validated in terms of meeting the
design objectives.
b) The computer engineer …. the results of computer simulation in terms of
meeting the design objectives.
7. a) The system performance is now being investigated under variations of the
process parameters.
b) They ….. the system performance under variations of the process
parameters.
8. a) The mechanism to integrate all the components of the network is provided
by the network operating system.
b) The network operating system ….. the mechanism to integrate all the
components of the network.
9. a) New products are being developed at the intersection of traditional
disciplines of engineering, computer science, and the natural sciences.
b) This computer engineer …. new products that are at the intersection of
traditional disciplines of engineering, computer science, and the natural sciences.
III. Choose the proper verb form and write down the translation.
1. The criterion ….. an analytical means for testing the stability of a linear
system of any order. 2. This software environment has already proved ….. very
useful when performing the analysis of the impact on various possible decision
111
Veretennikova V.P.
delays in flood control systems. 3. A control system is an interconnection of
components forming a system configuration that ….. a desired system response. 4.
This algorithm involves optimization of control trajectory for a ….. prediction of
external uncontrolled inputs. 5. The interactive design stage ….. when the structural
decisions regarding the control structure and algorithms are made. 6. The underlying
numerical algorithms ….. on the latest research in numerical analysis. 7. We have
….. a general purpose system allowing for setting up simulation experiments and
analysis for different types of processes.
Keys: will provide, are based, given, provides, to create, to be, begins.
IV. Read and translate the following sentences paying attention to the
infinitive passive in the function of an attribute.
III. Have you ever considered working abroad? Give your reasons.
112
COMPUTER ENGINEERING
SUPPLEMENT
TEXTS FOR HOME-READING AND ABSTRACTING
Text 1
Learn the material about a computer network.
Computer network
A computer network is a set of connected computers. Computers on a network
are called nodes. The connection between computers can be done via cabling, most
commonly the Ethernet cable, or wirelessly through radio waves. Connected
computers can share resources, like access to the Internet, printers, file servers, and
others. A network is a multipurpose connection, which allows a single computer to do
more.
A computer network, or data network, is a digital telecommunications network
which allows nodes to share resources. In computer networks, computing devices
exchange data with each other using connections (data links) between nodes. These
data links are established over cable media such as wires or optic cables, or wireless
media such as Wi-Fi.
Network computer devices that originate, route and terminate the data are
called network nodes. Nodes can include hosts such as personal computers, phones,
servers as well as networking hardware. Two such devices can be said to be
networked together when one device is able to exchange information with the other
device, whether or not they have a direct connection to each other. In most cases,
application-specific communications protocols are layered (i.e. carried as payload)
over other more general communications protocols. This formidable collection of
information technology requires skilled network management to keep it all running
reliably.
Computer networks support an enormous number of applications and services
such as access to the World Wide Web, digital video, digital audio, shared use of
application and storage servers, printers, and fax machines, and use of email and
instant messaging applications as well as many others. Computer networks differ in
the transmission medium used to carry their signals, communications protocols to
organize network traffic, the network's size, topology, traffic control mechanism and
organizational intent. The best-known computer network is the Internet.
114
COMPUTER ENGINEERING
4. It allows for more presence of computer viruses and malware.
There would be instances that stored files are corrupt due to computer viruses.
Thus, network administrators should conduct regular check-ups on the system, and
the stored files at the same time.
5. Its light policing usage promotes negative acts.
It has been observed that providing users with internet connectivity has
fostered undesirable behavior among them. Considering that the web is a minefield of
distractions – online games, humor sites and even porn sites – workers could be –
tempted during their work hours. The huge network of machines could also
encourage them to engage in illicit practices, such as instant messaging and file
sharing, instead of working on work-related matters. While many organizations draw
up certain policies on this, they have proven difficult to enforce and even engendered
resentment from employees.
6. It requires an efficient handler.
For a computer network to work efficiently and optimally, it requires high
technical skills and know-how of its operations and administration. A person just
having basic skills cannot do this job. Take note that the responsibility to handle such
a system is high, as allotting permissions and passwords can be daunting. Similarly,
network configuration and connection is very tedious and cannot be done by an
average technician who does not have advanced knowledge.
7. It requires an expensive set-up.
Though computer networks are said to be an inexpensive system when it is
already running, its initial set up cost can still be high depending on the number of
computers to be connected. Expensive devices, such as routers, switches, hubs, etc.,
can add up to the cost. Aside from these, it would also need network interface cards
(NICs) for workstations in case they are not built in.
(by Ashish Kr. Jha)
Text 2
Study the following text.
Repeaters & Bridges
Since a signal loses strength as it passes along a cable, it is often necessary to
boost the signal with a device called a repeater. A repeater operates at the physical
layer. Its job is to regenerate the signal over the same network before the signal
becomes too weak or corrupted so as to extend the length to which the signal can be
transmitted over the same network. An important point to be noted about repeaters is
that they do not amplify the signal. When the signal becomes weak, they copy the
signal bit by bit and regenerate it at the original strength. It is a 2 port device.
The repeater electrically amplifies the signal it receives and rebroadcasts it.
Repeaters can be separate devices or they can be incorporated into a concentrator.
They are used when the total length of your network cable exceeds the standards set
for the type of cable being used.
A good example of the use of repeaters would be in a local area network using
a star topology with unshielded twisted-pair cabling. The length limit for unshielded
twisted pair cable is 100 meters. The most common configuration is for each
115
Veretennikova V.P.
workstation to be connected by twisted-pair cable to a multi-port active concentrator.
The concentrator amplifies all the signals that pass through it allowing for the total
length of cable on the network to exceed the 100 meter limit.
A collision domain is the set of nodes competing to access the same
transmissive medium → the simultaneous transmission causes collision.
Interconnecting two network segments creates a single collision domain: repeater is
not able to recognize collisions which are propagated to all ports → this is a limit to
the size of the physical domain.
A bridge is a device that allows you to segment a large network into two
smaller, more efficient networks. A bridge operates at data link layer. If you are
adding to an older wiring scheme and want the new network to be up-to-date, a
bridge can connect the two. A bridge monitors the information traffic on both sides of
the network so that it can pass packets of information to the correct location. Most
bridges can "listen" to the network and automatically figure out the address of each
computer on both sides of the bridge. The bridge can inspect each message and, if
necessary, broadcast it on the other side of the network.
The bridge manages the traffic to maintain optimum performance on both sides
of the network. You might say that the bridge is like a traffic cop at a busy
intersection during rush hour. It keeps information flowing on both sides of the
network, but it does not allow unnecessary traffic through. Bridges can be used to
connect different types of cabling, or physical topologies. They must, however, be
used between networks with the same protocol.
Types of Bridges
Transparent Bridges: - These are the bridge in which the stations are
completely unaware of the bridge’s existence i.e. whether or not a bridge is added or
deleted from the network, reconfiguration of the stations is unnecessary. These
bridges make use of two processes i.e. bridge forwarding and bridge learning.
Source Routing Bridges: - In these bridges, routing operation is performed by
source station and the frame specifies which route to follow. The hot can discover
frame by sending a special frame called discovery frame, which spreads through the
entire network using all possible paths to destination.
Bridge decouples broadcast domain from collision domain:
it 'splits' the collision domain: it implements the CSMA/CD protocol to detect
collisions, avoiding propagating them to the other ports;
it extends the broadcast domain: frames sent in broadcast are propagated to all
ports.
(From Wikipedia, the free encyclopedia)
Text 3
Outline the main ideas of the text and write a summary.
Definition of a Computer Network
A computer network may be defined as the coordination or interconnection of
a number of individual computers. A computer network is basically established by
the network layer in the Open Systems Infrastructure model, popularly known as the
OSI model.
116
COMPUTER ENGINEERING
Computer networks exist on various scales, from links between machines in
the same room up through wiring connecting the machines in a building or campus to
regional, national and global networks. Various media are used to carry the
communications signals: copper wire, fibre-optic cables and wireless or radio
transmissions etc.
Networking is the concept of sharing resources and services. A network of
computers is a group of interconnected systems sharing resources and interacting
using a shared communications link. A network, therefore, is a set of interconnected
systems with something to share. The shared resource can be data, a printer, a fax
modem, or a service such as a database or an email system. The individual systems
must be connected through a pathway (called the transmission medium) that is used
to transmit the resource or service between the computers. All systems on the
pathway must follow a set of common communication rules for data to arrive at its
intended destination and for the sending and receiving systems to understand each
other. The rules governing computer communication are called protocols. In
summary, all networks must have the following:
1. A resource to share (resource)
2. A pathway to transfer data (transmission medium)
3. A set of rules governing how to communicate (protocols)
Having a transmission pathway does not always guarantee communication.
When two entities communicate, they do not merely exchange information; rather,
they must understand the information they receive from each other. The goal of
computer networking, therefore, is not simply to exchange data but to understand and
use data received from other entities on the network. An analogy is people speaking,
just because two people can speak, it does not mean they automatically can
understand each other.
These two people might speak different languages or interpret words
differently. One person might use sign language, while the other uses spoken
language. As in human communication, even though you have two entities who
"speak," there is no guarantee they will be able to understand each other. Just because
two computers are sharing resources, it does not necessarily mean they can
communicate. Because computers can be used in different ways and can be located at
different distances from each other, enabling computers to communicate often can be
a daunting task that draws on a wide variety of technologies.
BENEFITS OF COMPUTER NETWORK
Assuming you have six people in your family. Each has their own computer
and wants to be able to print and have internet access. You don't want to pay for six
modems (for internet connections) and six printers. Why not have one internet
connection and one printer connected to one computer. This computer has all other
computers attached to it.
They all share its internet and printer. They can also each have some shared
folders that everyone on the network can access (upon providing a password).
Properly planned, an efficient network brings a wide range of benefits to a company
such as:
117
Veretennikova V.P.
File Sharing: Networks offer quick and easy way to share files directly. Instead
of using a disk or USB key to carry files from one computer or office to another, you
can share files directly using a network.
Security: Specific directories can be password protected to limit access to
authorized users. Also, files and programs on a network can be designated as "copy
inhibit" so you don’t have to worry about the illegal copying of programs.
Resource Sharing: All computers in the network can share resources such as
printers, fax machines, modems, and scanners.
Communication: Even outside of the internet, those on the network can
communicate with each other via electronic mail over the network system. When
connected to the internet, network users can communicate with people around the
world via the network.
Flexible Access: Networks allow their users to access files from computers
throughout the network. This means that a user can begin work on a project on one
computer and finish up on another. Multiple users can also collaborate on the same
project through the network.
Workgroup Computing: Workgroup software like Microsoft BackOffice
enables many users to contribute to a document concurrently. This allows for
interactive teamwork.
Error reduction and improving consistency: One can reduce errors and
improve consistency by having all staff work from a single source of information, so
that standard versions of manuals and directories can be made available, and data can
be backed up from a single point on a scheduled basis, ensuring consistency.
(From Wikipedia, the free encyclopedia)
Text 4
Sum up your ideas of the text.
Broadcast routing
A broadcast message is destined to all network devices. Broadcast routing can
be done in two ways (algorithm): A router creates a data packet and then sends it to
each host one by one. In this case, the router creates multiple copies of single data
packet with different destination addresses.
In computer networking, telecommunication and information theory,
broadcasting is a method of transferring a message to all recipients simultaneously.
Broadcasting can be performed as a high-level operation in a program, for example,
broadcasting in Message Passing Interface, or it may be a low-level networking
operation, for example broadcasting on Ethernet.
All-to-all communication is a computer communication method in which each
sender transmits messages to all receivers within a group. In networking this can be
accomplished using broadcast or multicast. This is in contrast with the point-to-
point method in which each sender communicates with one receiver.
In computer networking, broadcasting refers to transmitting a packet that will
be received by every device on the network. In practice, the scope of the broadcast is
limited to a broadcast domain. Broadcasting a message is in contrast to unicast
118
COMPUTER ENGINEERING
addressing in which a host sends datagrams to another single host identified by a
unique address.
Unicast is communication between a single sender and a single receiver over a
network. The term exists in contradistinction to multicast, communication between a
single sender and multiple receivers, and anycast, communication between any
sender and the nearest of a group of receivers in a network.
In computer networking, unicast refers to a one-to-one transmission from one
point in the network to another point; that is, one sender and one receiver, each
identified by a network address.
Broadcasting is the most general communication method, and is also the most
intensive in the sense that many messages may be required and many network
devices are involved.
Broadcasting may be performed as all scatter in which each sender performs its
own scatter in which the messages are distinct for each receiver, or all broadcast in
which they are the same. The MPI message passing method which is the de facto
standard on large computer clusters includes the MPI_Alltoall method.
Not all network technologies support broadcast addressing; for example,
neither X.25 nor frame relay have broadcast capability, nor is there any form of
Internet-wide broadcast. Broadcasting is largely confined to local area
network (LAN) technologies, most notably Ethernet and token ring, where the
performance impact of broadcasting is not as large as it would be in a wide area
network.
The successor to Internet Protocol Version 4 (IPv4), IPv6 also does not
implement the broadcast method, so as to prevent disturbing all nodes in a network
when only a few may be interested in a particular service. Instead it relies
on multicast addressing - a conceptually similar one-to-many routing methodology.
However, multicasting limits the pool of receivers to those that join a specific
multicast receiver group.
Both Ethernet and IPv4 use an all-ones broadcast address to indicate a
broadcast packet. Token Ring uses a special value in the IEEE 802.2 control field.
Broadcasting may be abused to perform a type of DoS-attack known as
a Smurf attack. The attacker sends fake ping requests with the source IP-address of
the victim computer. The victim computer is flooded by the replies from all
computers in the domain.
When applying link-state algorithms, a graphical map of the network is the
fundamental data used for each node. To produce its map, each node floods the entire
network with information about the other nodes it can connect to. Each node then
independently assembles this information into a map. Using this map, each router
independently determines the least-cost path from itself to every other node using a
standard shortest paths algorithm such as Dijkstra's algorithm. The result is a tree
graph rooted at the current node, such that the path through the tree from the root to
any other node is the least-cost path to that node. This tree then serves to construct
the routing table, which specifies the best next hop to get from the current node to
any other node.
(From Wikipedia, the free encyclopedia)
119
Veretennikova V.P.
Text 5
Read the following text and be ready to discuss it.
Ethernet Packet Format & Ethernet Multicast
Here is the format of a typical Ethernet packet (DIX specification); it is still
used for newer, faster Ethernets: dest addr src addr type data CRC. The destination
and source addresses are 48-bit quantities; the type is 16 bits, the data length is
variable up to a maximum of 1500 bytes, and the final CRC checksum is 32 bits. The
checksum is added by the Ethernet hardware, never by the host software. There is
also a preamble, not shown: a block of 1 bit followed by a 0, in the front of the
packet, for synchronization. The type field identifies the next higher protocol layer; a
few common type values are 0x0800 = IP, 0x8137 = IPX, 0x0806 = ARP. The IEEE
802.3 specification replaced the type field by the length field, though this change
never caught on. The two formats can be distinguished as long as the type values
used are larger than the maximum Ethernet length of 1500 (or 0x05dc); the type
values all meet this condition. The Ethernet maximum packet length of 1500 bytes
worked well in the past, but can seem inconveniently small at 10 Gbit speeds. But
1500 bytes has become the de facto maximum packet size throughout the Internet,
not just on Ethernet LANs; increasing it would be difficult. TCP TSO (12.5 TCP
Offloading) is one alternative. Each Ethernet card has a (hopefully unique) physical
address in ROM; by default any packet sent to this address will be received by the
board and passed up to the host system. Packets addressed to other physical addresses
will be seen by the card, but ignored (by default). All Ethernet devices also agree on a
broadcast address of all 1’s: a packet sent to the broadcast address will be delivered to
all attached hosts. It is sometimes possible to change the physical address of a given
card in software. It is almost universally possible to put a given card into
promiscuous mode, meaning that all packets on the network, no matter what the
destination address, are delivered to the attached host. This mode was originally
intended for diagnostic purposes but became best known for the security breach it
opens: it was once not unusual to find a host with network board in promiscuous
mode and with a process collecting the first 100 bytes (presumably including user id
and password) of every telnet connection.
Another category of Ethernet addresses is multicast, used to transmit to a set of
stations; streaming video to multiple simultaneous viewers might use Ethernet
multicast. The lowest-order bit in the first byte of an address indicates whether the
address is physical or multicast. To receive packets addressed to a given multicast
address, the host must inform its network interface that it wishes to do so; once this is
done, any arriving packets addressed to that multicast address are forwarded to the
host. The set of subscribers to a given multicast address may be called a multicast
group. While higher-level protocols might prefer that the subscribing host also
notifies some other host, eg the sender, this is not required, although that might be the
easiest way to learn the multicast address involved. If several hosts subscribe to the
same multicast address, then each will receive a copy of each multicast packet
transmitted. We are now able to list all cases in which a network interface forwards a
received packet up to its attached host:
120
COMPUTER ENGINEERING
• if the destination address of the received packet matches the physical address
of the interface;
• if the destination address of the received packet is the broadcast address;
• if the interface is in promiscuous mode;
• if the destination address of the received packet is a multicast address and the
host has told the network interface to accept packets sent to that multicast address.
If switches (below) are involved, they must normally forward multicast
packets on all outbound links, exactly as they do for broadcast packets; switches have
no obvious way of telling where multicast subscribers might be. To avoid this, some
switches do try to engage in some form of multicast filtering, sometimes by snooping
on higher-layer multicast protocols. Multicast Ethernet is seldom used by IPv4, but
plays a larger role in IPv6 configuration.
(by Peter L Dordal)
Text 6
Study the text. Be ready to speak about its main ideas.
Ethernet Address Internal Structure
The second-to-lowest-order bit of a physical Ethernet address indicates
whether that address is believed to be globally unique or if it is only locally unique;
this is known as the Universal/Local bit. For real Ethernet physical addresses, the
multicast and universal/local bits of the first byte should both be 0. When (global)
Ethernet IDs are assigned to physical Ethernet cards by the manufacturer, the first
three bytes serve to indicate the manufacturer. They are allocated by the IEEE, and
are officially known as organizationally unique identifiers. These can be looked up at
any of several sites on the Internet to identify the manufacturer associated with any
given Ethernet address; the official IEEE site is
standards.ieee.org/develop/regauth/oui/public.html (OUIs must be entered here
without colons). As long as the manufacturer involved is diligent in assigning the
second three bytes, every manufacturer provided Ethernet address should be globally
unique. Lapses, however, are not unheard of. Ethernet addresses for virtual machines
must be distinct from the Ethernet address of the host system, and may be (e.g. with
so-called “bridged” configurations) as visible on the LAN as that host system’s
address. The first three bytes of virtual Ethernet addresses are often taken from the
OUI assigned to the manufacturer whose card is being emulated; the last three bytes
are then either set randomly or via configuration. In principle, the universal/local bit
should be 1, as the address is only locally unique, but this is often ignored. It is
entirely possible for virtual Ethernet addresses to be assigned so as to have some
local meaning, though this appears not to be common.
The Slot Time and Collisions
The diameter of an Ethernet is the maximum distance between any pair of
stations. The actual total length of cable can be much greater than this, if, for
example, the topology is a “star” configuration. The maximum allowed diameter,
measured in bits, is limited to 232 (a sample “budget” for this is below). This makes
the round-trip-time 464 bits. As each station involved in a collision discovers it, it
transmits a special jam signal of up to 48 bits. These 48 jam bits bring the total above
121
Veretennikova V.P.
to 512 bits, or 64 bytes. The time to send these 512 bits is the slot time of an Ethernet;
time intervals on Ethernet are often described in bit times but in conventional time
units the slot time is 51.2 µsec. The value of the slot time determines several
subsequent aspects of Ethernet. If a station has transmitted for one slot time, then no
collision can occur (unless there is a hardware error) for the remainder of that packet.
This is because one slot time is enough time for any other station to have realized that
the first station has started transmitting, so after that time they will wait for the first
station to finish. Thus, after one slot time a station is said to have acquired the
network. The slot time is also used as the basic interval for retransmission scheduling,
below. Conversely, a collision can be received, in principle, at any point up until the
end of the slot time. As a result, Ethernet has a minimum packet size, equal to the slot
time, i.e. 64 bytes (or 46 bytes in the data portion). A station transmitting a packet
this size is assured that if a collision were to occur, the sender would detect it (and be
able to apply the retransmission algorithm, below). Smaller packets might collide and
yet the sender might not know it, ultimately leading to greatly reduced throughput. If
we need to send less than 46 bytes of data (for example, a 40-byte TCP ACK packet),
the Ethernet packet must be padded out to the minimum length. As a result, all
protocols running on top of Ethernet need to provide some way to specify the actual
data length, as it cannot be inferred from the received packet size. As a specific
example of a collision occurring as late as possible, consider the diagram below. A
and B are 5 units apart, and the bandwidth is 1 byte/unit. A begins sending “hello
world” at T=0; B starts sending just as A’s message arrives, at T=5. B has listened
before transmitting, but A’s signal was not yet evident. A doesn’t discover the
collision until 10 units have elapsed, which is twice the distance.
(by Peter L Dordal)
Text 7
Read the following text and be ready to discuss it.
Network LAN Technologies
Ethernet
Ethernet is a Local Area Network implementation technology which is widely
deployed. This technology was invented by Bob Metcalfe and D.R. Boggs in early
70s. It was standardized in IEEE 802.3 in 1980. Ethernet is network technology
which shares media. Network which uses shared media has high probability of data
collision. Ethernet uses CSMA/CD technology to detect collisions. CSMA/CD stands
for Carrier Sense Multi Access/Collision Detection. When a collision happens in
Ethernet, all its host rolls back and waits for some random amount of time and then
re-transmit data. Ethernet connector, i.e. Network Interface cards is equipped with
48-bits MAC address. This helps other Ethernet devices to identify and communicate
with remote devices in Ethernet. Traditional Ethernet uses 10BASE-T specifications.
10 is for 10mpbs speed, BASE stands for using baseband and T stands for Thick net
or Thick Ethernet. 10BASE-T Ethernet provides transmission speed up to 10mbps
and uses Coaxial cable or Cat-5 Twisted Pair cable with RJ-5 connector. Ethernet
follows Star Topology with segment length up to 100 meters. All devices are
connected to a Hub/Switch in a Star Fashion.
122
COMPUTER ENGINEERING
Fast-Ethernet
To encompass need of fast emerging software and hardware technologies,
Ethernet extends itself as Fast-Ethernet. It can run on UTP, Optical Fiber and can be
wireless too. It can provide speed up to 100 mbps. This standard is named as
100BASE-T in IEEE 803.2 using Cat-5 Twisted pair cable. It uses CSMA/CD
technique for wired media sharing among Ethernet hosts and CSMA/CA (Collision
Avoidance) technique for wireless Ethernet LAN. Fast Ethernet on fiber is defined
under 100BASE-FX standard which provides speed up to 100mbps on fiber. Ethernet
over Fiber can be extended up to 100 meters in half-duplex mode and can reach
maximum of 2000 meters in full-duplex over multimode fibers.
Giga-Ethernet
After being introduced in 1995, Fast-Ethernet could enjoy its high speed status
only for 3 years till Giga-Ethernet introduced. Giga-Ethernet provides speed up to
1000 mbits/seconds. IEEE802.3ab standardizes Giga-Ethernet over UTP using Cat-5,
Cat-5e and Cat-6 cables. IEEE802.3ah defines Giga-Ethernet over Fiber.
LAN uses Ethernet which in turn works on shared media. Shared media in
Ethernet create one single broadcast domain and one single collision domain.
Introduction of switches to Ethernet has removed single collision domain issue and
each device connected to switch works in its separate collision domain. But even
Switches cannot divide a network into separate Broadcast domain. Virtual LAN is a
method to divide a single Broadcast domain into more than one Broadcast domains.
Host in one VLAN cannot speak to a host in another. By default, all hosts are placed
into same VLAN.
VLAN is Layer-2 technology which works closely on Ethernet. To route
packets between two different VLANs a Layer-3 device (such as Router) is required.
VLANs work by applying tags to network frames and handling these tags in
networking systems – creating the appearance and functionality of network
traffic that is physically on a single network but acts as if it is split between separate
networks. In this way, VLANs can keep network applications separate despite being
connected to the same physical network, and without requiring multiple sets of
cabling and networking devices to be deployed.
VLANs allow network administrators to group hosts together even if the hosts
are not directly connected to the same network. Because VLAN membership can be
configured through software, this can greatly simplify network design and
deployment. Without VLANs, grouping hosts according to their resource needs the
labor of relocating nodes or rewiring data links. VLANs allow networks and devices
that must be kept separate to share the same physical cabling without interacting,
improving simplicity, security, traffic management, or economy. For example, a
VLAN could be used to separate traffic within a business due to users, and due to
network administrators, or between types of traffic, so that users or low priority
traffic cannot directly affect the rest of the network's functioning. Many Internet
hosting services use VLANs to separate their customers' private zones from each
other, allowing each customer's servers to be grouped together in a single network
segment while being located anywhere in their data center. Some precautions are
123
Veretennikova V.P.
needed to prevent traffic "escaping" from a given VLAN, an exploit known as VLAN
hopping.
(From Wikipedia, the free encyclopedia)
Text 8
Read the following text and be ready to discuss it.
100 Mbps (Fast) Ethernet
Classic Ethernet, at 10 Mbps, is quite slow by modern standards, and so by
1995 the IEEE had created standards for Ethernet that operated at 100 Mbps. Ethernet
at this speed is commonly known as Fast Ethernet; this name is used even today as
“Fast” Ethernet is being supplanted by Gigabit Ethernet. By far the most popular
form of 100 Mbps Ethernet is officially known as 100BASE-TX; it operates over
twisted-pair cable.
The bandwidth, minimum packet size and maximum network diameter were all
interrelated, in order to ensure that collisions could always be detected by the sender.
Increasing the speed means that at least one of the other constraints must be scaled as
well. For example, if the network physical diameter were to remain the same when
moving to 100 Mbps, then the Fast-Ethernet round-trip time would be the same in
microseconds but would be 10-fold larger measured in bits; this might mean a
minimum packet size of 640 bytes instead of 64 bytes. (Actually, the minimum
packet size might be somewhat smaller, partly because the “jam signal” doesn’t have
to become longer, and partly because some of the numbers in the 10 Mbps delay
budget above were larger than necessary, but it would still be large enough that a
substantial amount of bandwidth would be consumed by padding.) The designers of
Fast Ethernet felt that such a large minimum-packet size was impractical. However,
Fast Ethernet was developed at a time (~1995) when reliable switches were widely
available.
Large “virtual” Ethernet networks could be formed by connecting small
physical Ethernets with switches, effectively eliminating the need to support large-
diameter physical Ethernets. So instead of increasing the minimum packet size, the
decision was made to ensure collision detectability by reducing the network diameter
instead. The network diameter chosen was a little over 400 meters, with reductions to
account for the presence of hubs. At 2.3 meters/bit, 400 meters is 174 bits, for a
round-trip of 350 bits. The slot time (and minimum packet size) remains 512 bits –
now 5.12 µsec – which is safely large enough to ensure collision detection. This 400-
meter diameter, however, may be misleading: the specific 100BASE-TX standard,
which uses so-called Category 5 twisted-pair cabling (or better), limits the length of
any individual cable segment to 100 meters. The maximum 100BASE-TX network
diameter – allowing for hubs – is just over 200 meters. The 400-meter distance does
apply to optical-fiber-based 100BASE-FX in half-duplex mode, but this is not
common. The 100BASE-TX network-diameter limit of 200 meters might seem small;
it amounts in many cases to a single hub with multiple 100-meter cable segments
radiating from it. Switches partition an Ethernet into separate “collision domains”;
the network-diameter rules apply to each domain separately but not to the aggregated
whole. In a fully switched (that is, no hubs) 100BASE-TX LAN, each collision
124
COMPUTER ENGINEERING
domain is simply a single twisted-pair link, subject to the 100-meter maximum
length. Fast Ethernet also introduced the concept of full-duplex Ethernet: two twisted
pairs could be used, one for each direction. Full-duplex Ethernet is limited to paths
not involving hubs, that is, to single station-to-station links, where a station is either a
host or a switch. Because such a link has only two potential senders, and each sender
has its own transmit line, full-duplex Ethernet is entirely collision-free. Fast Ethernet
(at least the 100BASE-TX form) uses 4B/5B encoding, covered in 4.1.4 4B/5B. This
means that the electronics have to handle 125 Mbps, versus the 200 Mbps if
Manchester encoding were still used. Fast Ethernet 100BASE-TX does not
particularly support links between buildings, due to the maximum cable-length
limitation. However, fiber-optic point-to-point links are an effective alternative here,
provided full-duplex is used to avoid collisions. We mentioned above that the coax-
based 100BASE-FX standard allowed a maximum half-duplex run of 400 meters, but
100BASE-FX is much more likely to use full duplex, where the maximum cable
length rises to 2,000 meters.
(by Peter L Dordal)
Text 9
Read the text and outline its main ideas.
Computer-Controlled Assembly
Continuing inflation, competition from other countries and record deficits in
international trade have created a widespread awareness of the need to increase
productivity in manufacturing, which means decreasing the man-hours, materials,
energy or capital required to produce industrial goods of all kinds. An additional
stimulus for increasing productivity arises from the desire to improve the quality of
life, including the life of workers now engaged in stultifying, repetitive and
sometimes hazardous tasks. Today there are pressures to use power, materials and
capital more efficiently.
Although there are many ways of increasing manufacturing productivity –
financial, fiscal and social – we shall focus here on advanced technology to an old
field: assembly. Technology has brought about radical changes in many areas –
power generation, transportation chemical manufacturing, communications and data
processing – but it has had only a minor effect on the way the broad spectrum of
consumer goods, from electric toasters to automobiles, are actually assembled.
At present manufacturing is based largely on experience; it is really an art
form. Equipment designers and factory managers prefer to repeat what has worked in
the past, which can be taken as evidence that they are struggling with a vastly
complicated situation. Such changes as introduced tend to be small ones. Wholesale
shifts in technique are expensive and risky.
At present assembly is performed by people and, when the production volume
is high enough, by special-purpose machines. People are readily taught new tasks,
and they adapt to changing conditions, to different models of the same product on the
same assembly line and to major changes in product design.
Special-purpose machines are very efficient, give reproducible performance
and are not subject to fatigue, but they consist almost totally of jigs and fixtures built
125
Veretennikova V.P.
to perform one task, or a closely related series of tasks, on one product. They cannot
easily be altered to accommodate different models on the production line or changes
in product design.
Most products are manufactured in batches with wide style variations, in
quantities too small or a design life too short to justify investment in a special-
purpose machine. In addition many items are not designed with sufficient attention to
assembly problems, partly because assembly phenomena are not well enough
understood to allow precise requirements to be placed before the product designers.
Moreover, assembly-line workers do more than just put parts together. They often
make spot repairs and perform many vital inspection tasks.
A programmable machine is one that can be taught, with minor alterations, to
perform several tasks in sequence. This capability is essential if assembly machines
are to be economic for low-volume manufacturing.
(by James L. Nevins and Daniel E. Whitney)
Text 10
Read and sum up your ideas of the text.
Beyond Software
After the idea of network became a meta-paradigm in all different disciplines,
in philosophy and science as well as in technology it had been realized by the
creation of the World Wide Web. The concept of network is not just a heuristic idea,
but an idea which has empirical existence. From that point on, the scientific and the
technological community started to understand the idea of a human-machine or a
man-machine hybrid. It is not just the idea of computers being connected. Because
computers are being connected literally do nothing, unless they are part of human-
machine-systems, i.e. unless human beings are involved.
If one looks for instance at the screen of a PC then one sees changes of
physical states. But in order to interpret these as different letters or different signs, in
order to interpret signs at all, one needs a human observer that is also a human user.
The machine user entity is the node, not the node of the technical network as such.
The hybrids of human beings and machines are connected to networks. And
therefore, the hybrid networks (the human-machine-networks) replace the idea of
individual artificial intelligent entities such like computers or robots. From the 1990s
on we did not talk anymore about robots as individual intelligent entities or individual
mechanical entities displaying intelligent behavior. Now we are talking about
systems, networks of mechanical devices and human beings displaying intelligent
behavior together in processes of interaction. Again the idea began to develop – like
50 years before – that there is a decisive difference between hardware and software,
between the mechanical device (be it electrical, chemical or whatsoever) and the
program running on that mechanical device.
Our wet-wear which we have in our skulls, our brains is of course also entities
on which programs, i.e. software is running. There is an interesting development to
be observed when we project this back into history. By doing this it becomes obvious
that the definition of the humankind of human beings was always a mirror of the most
advanced pieces of technology.
126
COMPUTER ENGINEERING
At the beginning of the Modern Age in the mechanical thinking human beings
of course were considered to be complicated clocks. Just think of Leibnitz, for whom
of course the whole world was a clock work and God was the clock maker, who had
manufactured all these perfectly running clocks. The idea of pre-stabilized harmony
is illustrated by Leibnitz with the image of a clockmaker, who created absolutely
synchronized clocks (Bayle 1978). And then we can see it happen all over again,
when in the 19th-century the human brain was perceived to be something like a very
complicated telephone system (Searle1984). And since the 1950s and 1960s the
neurosciences perceived the human brain as a computer (Anderson & Ross 1964).
From the 1980s on the idea of self-organizing networks, neural networks replaced the
idea of the human brain being a computer (Hopfield 1988; Churchland 1986). And
almost the same is happening now again, if the step from the individual mechanical
technical devices displaying intelligent behavior is made to the system of the
coordination of individual mechanical devices displaying intelligent behavior (Beni
2004). It is in this context that the old question of the individual robots shows up
again with respect to software:
• Could it be possible for us to design devices which would be capable of
designing other devices, could we e.g. design a robot that could be capable of
designing other robots? Can machines or computers produce software?
And the answer of course is highly disputed: Yes, it is no longer impossible, it
is rather easily possible.
And now the decisive question comes up:
• Can machines or computers offer nominal values that include an aim towards
the realization, of which the software judged to be suitable used? In other words: Can
machines deal with values?
If that is the case then of course the main anthropological issue would be
solved by the dissolution of the main anthropological issue. There would be no
privileged situation for human beings anymore, if robots could do the same. So the
answer to this question is: No. I should put it differently: the answer has to be: No. If
we try to stick to the notion of a “human being” and if we try to stick to the notion of
“human-machine-hybrid-systems” then there should be at least one decisive
difference between human beings and machines displaying intelligent behavior. And
this decisive difference is probably the capability of defining and setting values.
Consequently the answer is “No” and has to be “No.” If the answer would be “Yes,”
then we would have to start a new round of deliberations.
(by Walther Ch. Zimmerli)
NOTE
Leibnitz [lɪbˈnɪts], Baron Gottfried Wilhelm von Leibniz. 1646 – 1716. German
philosopher and mathematician.
127
Veretennikova V.P.
Text 11
Discuss the problems mentioned in the text.
Assembly Line Robots & Swarm-Intelligence
Looking at the production system we see that the dominant idea, even if we are
in actual fact already working within a network is still one of a sequence or a line: the
assembly line. If we look at late modern production systems we see, however, that it
is not organized according to the tradition of the assembly line anymore, but rather
according to an integrated network of different assembly lines (and the same applies
to the traditional idea of supply chains) (Zimmerli, Bagusat & Muller 2007). But the
main idea is nevertheless still that of an assembly line of robots, the type of robots
e.g. you usually see at the car production. They do not show “android” features, they
do not look homo erectus-like, but you see e.g. one great arm. And this great arm
performs almost the same movements all the time. That is what assembly line robots
are all about. They seem to move on their own free will. One looks at them and they
seem to display intelligent autonomous behavior. And one would not even be capable
to tell whether they are actually internally programmed to do that or whether they are
developing their program as they go along. It would not be possible to tell that
because there is an asymmetry between the possibility to explain these movements
after the fact and the possibility to predict them before, i.e. an asymmetry between
explanation and prediction. These assembly line robots seem to move on their own
free will. Under certain circumstances and under different conditions of carrying out
various operations, they may seem (to some observers) like independent beings, who
program their own set values.
What we have seen before applies here too: if the only action which these
robots cannot do, the only limits to robots taking over work operations in the
production process would be the setting of the values by themselves, then of course
everything else, every operation that can be described by software production
analysis methods can be carried out by every suitably implemented machine.
The only thing that cannot be carried out by suitably implemented machines is
the setting of the set values itself. And if we apply the notion of “network,” then it
becomes obvious that the operation of networks of robots can easily be programmed,
be it by human beings or by machines: Of course we can design machines, which are
capable of designing networks of programs of machines.
Originally swarm intelligence used to be a notion taken from the biological
sphere, especially with respect to the behavior of ants, birds and fish. But these days
we speak about swarm-intelligence of robots, especially of nano-robots, which are
very tiny little devices displaying intelligent behavior themselves (Winfield, Harper
& Nembrini 2005). Or to put it more precisely: the behavior displayed by swarms of
small robots (“nanobots”) is not a behavior called “intelligent,” because the
individual nanobots display intelligent behavior, but only because the system of
intelligent nanobots is displaying intelligent behavior. That is why the very notion of
“robots programmed in an assembly line (or any other kind of collaborative pattern)”
is presupposing the idea of a decentralized meta-program or rather a behavioral
collaborative pattern of robots (or other “intelligent” machines) – and this idea is
what we call “swarm-intelligence.”
128
COMPUTER ENGINEERING
So the question is not whether the individual robot in an assembly line
performs intelligent behavior (that is always the case, because that is what they are
supposed to do) but the assembly line itself has to display intelligent behavior.
Example: given that a robot as the individual intelligent production machine
always takes a piece or device and puts it over here and does all the time with it, what
it is programmed to do, and given that there is no piece or device around then the
whole system does not work. So the individual robot could perform the same
operation as many times as it is programmed, but if the supply of the elements needed
to perform an actual labor action by doing this would be lacking, i.e. if the system
would not be so efficient by not having a sufficient supply of elements or devices,
then the system itself would not be behaving in an intelligent way; it would run
empty.
So, if the network itself is not programmed intelligently then there is no way of
talking about intelligent behavior of robots. Therefore, we have to deal from now on
with what I call meta-programs or meta-robots. The discourse on robots has in actual
fact already been replaced by the discourse on meta-robots, if we talk about robots in
this new system-oriented way. With regard to this meta-robot, however, an
asymmetry-hypothesis (that seems to be valid) between observation of behavior and
programming is applied.
Although we can observe intelligent behavior it is possible that we cannot
program it. What we find here is the next level of the asymmetry between explanation
and prediction in the philosophy of science and it is called the difference between
programming and teaching. The very notion of “teaching” is used here in a system,
which does not deal with the interaction between teachers and students at all, but with
the interaction between human beings and machines. For instance, if one tries to
program a laser welding device then one does not have to write programs anymore.
Consequently, what we do is teaching the machine by actually physically
guiding it, by taking the laser welding arm and putting it into some place and then
putting it over and bringing it back, and then putting it back over there. And after
doing that a few times the machine has “learned” it, and from then on it does it by
itself. Of course, it does not literally do it by itself; it is not autonomous in the very
strict philosophical sense of “autonomy.” But we have taught the machine to do that
and the machine does it, unless we teach it to behave differently.
We can teach the machine by talking to it, in written language (program) or by
showing it how to behave, by taking the laser welding arm again and putting it to a
different place etc. By doing so a few times, you have taught the machine to behave
like an intelligent being. And pretty much the same applies to swarm intelligence of a
system which has to be “taught” and not just programmed.
(by Walther Ch. Zimmerli)
129
Veretennikova V.P.
Text 12
Study the text. Be ready to speak about its main ideas.
Robotics as a Future Vision for Hypermodern Technologies
The robots of today are smart, but they are not smart enough. They have to act
under pressure: Their employers always require higher and more complex
performance.
There is especially one thing of what they have to be capable of: thinking. The
almost unstoppable triumphal procession of the working machine ended up in
stagnation during the past years. Even despite remarkable technical improvements,
most of such systems are still comparatively dumb. For example, Car-O-bot can
easily open a room door. But once the door is stocked, because the frame has got
distorted, the machine becomes helpless. The same thing happens to a welding robot
once the assembly line stops. Robots are not yet useful for practice. Robotics-
research was focused far too long on the necessities of only a few industries. At that
time people did not invest into the intelligence of robots, but into optimizing the
environment. Now there are robots, built especially in order to be integrated into
small and middle production processes. This new generation of robots is at least
limitedly able to cooperate directly with human colleagues. But to enable such an
improvement, the machines are required to perceive their environment, e.g. tools or
instruments. One of the most important tasks is the precise proportioning of power.
The dialogue between human being and a machine is hard working as well. But
things that work in sterile and clean laboratories do not have to work on the outdoors.
More and more objects and characteristics need to be included by the machine if its
environment gets more and more complex. Increasing speed and stability are
lowering precision and controllability. This is a cultural breakdown for the engineers,
who usually try to control everything with precision.
The terms of “technique” and “technology” are used quite similar. Relating to
my phenomenological-hermeneutical method, the following distinction is
recommended: Technique refers to technical abilities and the produced artifacts as
well as their use. Technology describes the technical knowledge and the teaching of
technical knowledge (about technical courses of action and about operational
sequences), and further the out coming machines and technological structures. Both
kinds are interacting with each other and exist nowadays next to each other. I will call
the sum of techniques and technologies the “technical world.” An adequate definition
of the technique, which I, for further valuation, take as a basis even for the interaction
of humans and machines, demonstrated in the description of the production cycle. It
has got three aspects with two sides in each case: It includes (1) the construction and
the production of instruments and works, as well as the use of instruments, (2) the use
and the consumption of technical works and (3) the disposal and the recycling of
technical works and of new products in terms of a closure of the circuitry. The two
aspects are (1) producing and using in terms of human actions and (2) technical
instruments in order to perceive works as describable physical, chemical and
biological operations. The Production of something is a technical action in a proper
sense, to use something refers to determined technical handling and to dispose of
something refers to technical handling in a classical meaning. The subject of
130
COMPUTER ENGINEERING
Philosophy of Technology is technical and technical determined handling, since
technical handling is performed to finally enable technical determined handling.
The subject of Philosophy of Technology is in the strict sense the mutual
relation of technical handling and technical determined handling. Different technical
potentials have to be seen as a result of the connection between technical handling on
the one hand and technical determined handling on the other hand. The cycle of
technical and technical determined handling, as different kinds of “know how,”
implies a dynamization of the concept of technical handling and a transformation of
the different kinds of technical practice. The classical concept of poiesis and the
instrumental rationality are no longer appropriate to the current technical reality.
The human handling of a technical artifact puts it into an anthropological
context, into an anthropological potential. The human being is in possession of a
handling knowledge, an implicit know how of the effect, which can be achieved by
technical handling. This implicit knowledge occurs as individual knowledge within
individuals, even in animals (e.g. the gull and the clam), but it does not occur as a
systematic world knowledge. The world knowledge is the collected handling
knowledge within the world including the own finiteness. The capability of human
handling is related to the world, full of theories and sense.
(by Walther Ch. Zimmerli)
Text 13
Read the text and then comment.
The Different Cultural Robot-Traditions in Europe and Japan
The concept of the robot (as automat) belongs to the mechanical tradition of
engineers, researchers (example: “Frankenstein”) and of the working machine in
Europe. The mechanism conceived as something unnatural, with the result that the
mechanical automata had often developed a terrible independent existence.
Automata are working machines in Europe. They replace labour although it is
high valued social good in Europe. Changes of our environment by autonomous
intelligent technology (automation) could be larger than changes, which are triggered
by the humanoid robot which is conceived as a human companion and partner. From
a European point of view the more important issues are found in the automation and
in the change of the paradigm of work. The robot in Japan, especially the humanoid
robot, emerged from the tradition, from folk culture and from pre-scientific myths. As
a matter of fact he has not such terrible independent existence like in Europe and is
derived from a childlike scheme. Humanoid robots are therefore more popular and
socially acceptable in Japan.
During the ancient times they were suggested to be freely deployable and
controllable slaves called “androids.” Hephaistos has forged Pandora through godly
mission. Even Daidalos, artificial created human beings (in the sense of living
statues) became traditional since the Greeks. The “Iron Maiden” of the tyrant Nabis
of Sparta (200 B.C.) was even a real statue. Citizens who did not pay tribute got
“hugged” and then speared by her stings if they would not pay on time. During
medieval times there have been threatening and inflective statues. The mechanical
131
Veretennikova V.P.
clock and automatic mechanisms were discovered first at Byzantium and Arabia. The
“Iron Man” by Albertus Magnus did appear to serve as his doorkeeper.
The 18th century has been the century of “androids,” which occurred within
various legends during the age of the mechanics (Volker 1994). The flutist was a
system of bellows, driven by clock units. Pygmalion can be seen as a living statue
(Volker 1994). Within the Greek mythology the forging goddess Hephaistos was
responsible for creating artificial beings. Daidalos, the Attic master-builder, belongs
to the fabulous mankind creators, as well. His inventions are already technically
comprehensible. The term “android” relates to the Greek words “aner” (“man,”
“human being”) and “eidos” (“look,” “form,” “shape”) what stands for “The human
copy.” Admittedly, he was shaped first during the time of absolutism. During the
17th- and 18th-century the artistic clockmakers promoted the replication of the
human being to new heights. But within the Industrial Revolution, the practical
interests to create human like machines got lost for the engineers. Mary Shelley’s
literary character of “Frankenstein” is a counter movement to this. Shelley quotes a
basic topic from the literary illustration of technology: the unpredictability of
research and invention with cross natural borders (Drux 2001). These discussions are
nowadays promoted, facing artificial life and expert systems. Especially the defeat of
Kasparow in his match with the computer deep blue has caused a sensation. The
computer’s game appeared to be intuitively right, inventive and highly intelligent to
Kasparow. What a human would have done for his feelings had been calculated
through a machine. The world champion concludes that high quantity leads to quality
at certain, at least in chess.
E.T.A. Hoffmann talks about “androids,” what means humanlike beings. An
artificial human being plays for example the main character in his work “Die
Automate” from 1814. The “speaking Turk” is the protagonist, an automat, which is
so artistically manufactured that it is impossible to find the source of its voices. The
speaking Turk is adequately responding to questions by ingenious and appropriate
answers in different languages. Automata are imitations of human beings, which are
almost perfect if they are no longer to distinguish from the original. A certain kind of
averseness towards the waxworks becomes apparent in the writings of E.T.A.
Hoffmann, even if the instruments of the artists are very reasonable. The automaton
and the mechanical orchestra of the professor are displaying the dead and numbness
of the machines music. The mechanic is using his ability (art) for this adverse joy and
not for the perfection of musical instruments even though the perfection of the
musical instruments would lead to higher musical mechanisms. Natural noises and
environmental music are put into one context. Hoffmann’s conclusion is that the
human being is not replaceable via technology. The automaton is not the right
execution of technology. Hoffmann plays with the ancient and romantic motive:
technology is limited. Technology should be used to build musical instruments, and
therefore it is decreed as pure device. Technology has to be used and controlled by
the human being. But the human being should not be replaced by technology. In
E.T.A. Hoffmann’s “Der Sandmann” is an “android” as well, same as in Ambroce
Bierce’s “Moxon’s Master” and as in “Meister Zacharias” from “Le Docteur Ox” by
Jule Vernes.
132
COMPUTER ENGINEERING
Robots, cyborgs and other “androids” are playing a special role in the science-
fiction literature of the past decades. During the era of Reagan emerged a movement
of massive anti-technological sentiment. It was caused by the Vietnam War, which
just reverted into renewed optimism, while new technologies promised an economical
strengthening (upturn). Models have been formulated in Star Wars where the scheme
of a robot was transferred into a defence system. This led to a proceeding
militarization of the universe. A cyborg contained subjectivity in the “theatre of
mind.” The movie “The Terminator” has been characteristic for that. Cyberspace is
an artificial world within one computer or within a network of computers. It is the
matter of an artificial intelligence without human corpus or body. The cyborg
represents the abstraction and emotional distance, which is produced by technological
media. Computers are also central in the movies “2001 – A Space Odyssey” and
“War Games” from 1983. Machines can be obsessed, they can be constructed as
servants and act like servants. But there is a counter-movement which assumes
subjectivity for machines. In this way the cyborg can get rehabilitated. Such
“android” commanders are for example displayed in the movie “Blade Runner,”
which is about “replicants.”
(by Bernhard Irrgang)
Text 14
Read the text about a computer algebra system and outline its main ideas.
Computer algebra system
A computer algebra system (CAS) is any mathematical software with the
ability to manipulate mathematical expressions in a way similar to the traditional
manual computations of mathematicians and scientists. The development of the
computer algebra systems in the second half of the 20th century is part of the
discipline of "computer algebra" or "symbolic computation", which has spurred work
in algorithms over mathematical objects such as polynomials.
Computer algebra systems may be divided into two classes: specialized and
general-purpose. The specialized ones are devoted to a specific part of mathematics,
such as number theory, group theory, or teaching of elementary mathematics.
General-purpose computer algebra systems aim to be useful to a user working
in any scientific field that requires manipulation of mathematical expressions. To be
useful, a general-purpose computer algebra system must include various features such
as:
- a user interface allowing a user to enter and display mathematical formulas,
typically from a keyboard, menu selections, mouse or stylus.
- a programming language and an interpreter (the result of a computation
commonly has an unpredictable form and an unpredictable size; therefore user
intervention is frequently needed),
- a simplifier, which is a rewrite system for simplifying mathematics formulas,
- a memory manager, including a garbage collector, needed by the huge size of
the intermediate data, which may appear during a computation,
- an arbitrary-precision arithmetic, needed by the huge size of the integers that
may occur,
133
Veretennikova V.P.
- a large library of mathematical algorithms and special functions.
The library must not only provide for the needs of the users, but also the needs
of the simplifier. For example, the computation of polynomial greatest common
divisors is systematically used for the simplification of expressions involving
fractions.
This large amount of required computer capabilities explains the small number
of general-purpose computer algebra systems. The main ones are Axiom, Maxima,
Magma, Maple, Mathematica and SageMath.
The development of computers has made possible the introduction of computer
algebra systems for “doing mathematics”. They are software systems able to perform
mathematical operations formally.
These systems, such as Macsyma, Reduce, Derive, Maple, Mathematica,
Matlab, Sage, can also be used on relatively small computers (PC), and with their
help, we can transform complicated expressions, calculate derivatives and integrals,
solve systems of equations, represent functions of one and of several variables
graphically, etc. They can manipulate mathematical expressions, i.e., they can
transform and simplify mathematical expressions according to mathematical rules if
this is possible in closed form. They also provide a wide range of numerical solutions
to required accuracy, and they can represent functional dependence between data sets
graphically. Most computer algebra systems can import and export data. Besides a
basic offer of definitions and procedures which are activated at every start of the
system, most systems provide a large variety of libraries and program packages from
special fields of mathematics, which can be loaded and activated on request.
Computer algebra systems allow users to build up their own packages. However, the
possibilities of computer algebra systems should not be overestimated.
For instance, Maxima is a system for the manipulation of symbolic and
numerical expressions, including differentiation, integration, Taylor series, Laplace
transforms, ordinary differential equations, systems of linear equations, polynomials,
sets, lists, vectors, matrices and tensors. Maxima yields high precision numerical
results by using exact fractions, arbitrary-precision integers and variable-precision
floating-point numbers. Maxima can plot functions and data in two and three
dimensions.
The Maxima source code can be compiled on many systems, including
Windows, Linux, and MacOS X. The source code for all systems and precompiled
binaries for Windows and Linux are available at the SourceForge file manager.
Computer algebra systems began to appear in the 1960s and evolved out of two
quite different sources—the requirements of theoretical physicists and research into
artificial intelligence. They have been extensively used in higher education. Many
universities offer either specific courses on developing their use, or they implicitly
expect students to use them for their course work. The companies that develop
computer algebra systems have pushed to increase their prevalence among university
and college programs.
(From Wikipedia, the free encyclopedia)
134
COMPUTER ENGINEERING
GRAMMAR REFERENCE
going on at the present connected with the began in the past and is
usually/generally moment. present; result. still going on now.
always/never for a month
often/seldom now, at present, already/yet a long time
sometimes at the moment ever/never since 5 o’clock
lately/recently how long
*Fact this week/today since when
*Future action (to a *Future action planned by now
timetable, schedule) before
moment.
yesterday at 5 yesterday by 5 o’clock yesterday He had been working
last week from 5 to 6 yesterday before he came for 2 hours, when my
3 days ago for 3 days last week by the end of last year brother came.
all day long
the whole day *At sequence of
when he came tenses.
will ask will be asking will have asked will have been asking
135
Veretennikova V.P.
He is answered the The cake is being cooked now. The work has been done today.
questions every day.
He was answered the The cake was being cooked the He said his car had been bought
questions yesterday. whole evening. yesterday.
They were taken home The work had been done by 5
yesterday. pm yesterday.
*Future action
*Action completed before a
definite moment in the future.
FUTURE
taken there the next day. have been done by 5 pm the next
day.
THE INFINITIVE
The Infinitive is a non-finite form of the verb in English. It consists of the base
form of the verb with the particle "to": to do; to go; to connect; to take; to break; to
find.
The infinitive has some properties of the verb. The infinitive names an action
(to drive a car) or state (to be sick), but cannot show person, number, or mood. The
infinitive has active and passive forms (to take; to be taken) and can express voice
and time, though in a rather limited way.
136
COMPUTER ENGINEERING
However the Infinitive in this function can occur at the beginning of the
sentence too.
To collect all this information for such a short period of time would be
completely impossible!
To quit now would be a mistake.
Note: There is an interesting model where both the subject and the predicate
are expressed by the Infinitive.
To love is to believe.
To know is to understand.
The infinitive in this function always has appositive meaning, i.e. it explains
the meaning of the subject of the sentence. Hence, sentences of this kind have the
following structural peculiarity – the subject of the sentence can be expressed only by
a limited number of nouns. The most commonly occurring of these nouns are: advice,
aim, answer, approach, desire, difficulty, duty, function, idea, intention, job, method,
137
Veretennikova V.P.
need, objective, plan, problem, purpose, reason, task, thing, way, wish and some
others.
b. Part of the Compound Verbal Modal Predicate
You should have told me about it yesterday.
I must do it at once.
3. An object
I hate to ask people such questions.
They promised to come in time.
4. An attribute
The captain was the last to leave the ship.
Here is an article to be translated at once.
Notes:
a. The Infinitive is used attributively often acquires some modal meaning - the
meaning of obligation or that of possibility.
This is a book to read before going to bed.
(Это книга, которую можно читать перед сном.)
She gave him some documents to be signed immediately.
(Она дала ему документы, которые надо было немедленно подписать.)
He is not a man to make a woman happy.
(Он не тот человек, который может сделать женщину счастливой.)
b. When the meaning is passive, the active form of the Infinitive is often used
instead of the passive one here.
There is no time to be lost = There is no time to lose.
5. An adverbial modifier
a. Adverbial modifier of purpose, often with the conjunctions in order and so
as, especially when the meaning is negative.
She put on her coat in order not to catch cold.
b. Adverbial modifier of result after the adverbs too, enough and sufficiently.
Molecules are too small to see with an eye.
138
COMPUTER ENGINEERING
d. Adverbial modifier of attendant circumstances.
An astronaut leaves the Earth and returns fifty years later to find his twin-brother
quite an old man while he is still in the prime of his life.
7. A part of the complex object, the complex subject with the infinitive.
a. the complex object
The complex object consists of a noun in the common case or a pronoun in the
objective case and an infinitive.
The complex object is used after:
(1) the verbs of physical perception ( to hear, to see, to feel, to watch, etc.)
After these verbs the infinitive is used without the particle to.
(2) the verbs of mental perception ( to think, to consider, to remember, to know,
to find, etc.)
2. The present participle is used with the verb to be to form the Continuous
Tenses (Progressive Tenses).
The engineer is carrying out the experiment involving the use of nonlinear
process models.
5. The present participle can be used as a predicative (the nominal part of the
compound nominal predicate).
The effect of his words was terrifying.
140
COMPUTER ENGINEERING
If a verb of one syllable ends in consonant-vowel-consonant, double the final
consonant and add "ed":
chat > chatted
stop > stopped
If last syllable of a longer verb is stressed and ends in consonant-vowel-
consonant, double the last consonant and add "ed":
occur > occurred
prefer > preferred
If the verb ends "e," just add "d":
use > used
live > lived
If the verb ends in consonant + "y", change the "y" to an "i" and add "ed":
carry > carried
rely > relied
2. It can be used to form a verb phrase as part of the present perfect tense.
I have learnt English. (Learnt is part of the verb phrase 'have learnt')
It can be used to form the passive voice.
The experiment was carried out yesterday.
141
Veretennikova V.P.
THE GERUND
Its Forms and Functions
Gerunds are words that are formed with verbs but act as nouns. They’re very
easy to spot, since every gerund is a verb with -ing tacked to its tail.
The gerund looks exactly the same as a present participle, but it is useful to
understand the difference between the two. The gerund always has the same function
as a noun (although it looks like a verb).
A gerund can be the subject or the object of a verb or it may be governed by a
preposition.
If a gerund is formed from a transitive verb it can take an object.
Functions Examples
Reading books is useful. Smoking is harmful. Reading love
Subject
stories made her cry.
His hobby is collecting stamps. The main thing is getting there
Predicative
in time. Seeing is believing.
Part of a Compound
She went on reading. She stopped smoking.
Verbal Predicate
I couldn’t avoid speaking to her. The film is worth seeing. I
Direct Object
don’t mind waiting.
Prepositional I am fond of reading. He insisted on doing the work himself. I
Object don’t like his habit of making people wait.
All liked the idea of going to the country. I have no intention
of discussing this question. There are different ways of solving
Attribute
this problem. She liked the idea of studying software
engineering.
On entering the room he came up to me. He left the room
Adverbial Modifier
without saying a word. Excuse me for being so late.
142
COMPUTER ENGINEERING
THE GERUND AFTER PREPOSITIONS
The gerund must be used when a verb comes after a preposition. This is also true
of certain expressions ending in a preposition, for example the expressions in spite
of and there's no point in.
In spite of missing the train, we arrived on time.
COMPARATIVE ADJECTIVES
Comparative adjectives are used to compare differences between the two objects
they modify (larger, smaller, faster, higher). They are used in sentences where two
nouns are compared, in this pattern:
143
Veretennikova V.P.
Noun (subject) + verb + comparative adjective + than + noun (object).
The second item of comparison can be omitted if it is clear from the context
(final example below).
EXAMPLES:
My house is larger than hers.
This box is smaller than the one I lost.
Jim and Jack are both my friends, but I like Jack better. ("than Jim" is understood)
SUPERLATIVE ADJECTIVES
Superlative adjectives are used to describe an object which is at the upper or
lower limit of a quality (the tallest, the smallest, the fastest, the highest). They are
used in sentences where a subject is compared to a group of objects. We use the
article 'the' before the superlative degrees.
Noun (subject) + verb + the + superlative adjective + noun (object).
The group that is being compared with can be omitted if it is clear from the
context (final example below).
EXAMPLES:
My house is the largest one in our neighborhood.
This is the smallest box I've ever seen.
We all threw our rocks at the same time. My rock flew the highest. ("of all the
rocks" is understood)
144
COMPUTER ENGINEERING
3) When the positive ends in 'y' and has a consonant before it, we change 'y' into 'i'
and then add 'er' and 'est'.
By deleting the final ‘y’ and adding ‘ier’ and ‘iest’
POSITIVE COMPARATIVE SUPERLATIVE
costly costlier costliest
dry drier driest
easy easier easiest
happy happier happiest
heavy heavier heaviest
lazy lasier lasiest
mercy mercier merciest
wealthy wealthier wealthiest
4) when the positive degree ends in a consonant with a vowel before it, we double the
consonant and then add '-er' and '-est'
POSITIVE COMPARATIVE SUPERLATIVE
big bigger biggest
dim dimmer dimmest
fat fatter fattest
hot hotter hottest
thin thinner thinnest
145
Veretennikova V.P.
5) by addition of '-er' and '-est' to the positive degree when it ends in '-y'
POSITIVE COMPARATIVE SUPERLATIVE
gay gayer gayest
grey greyer greyest
6) by placing 'more' and 'most' before the positive form. The adjectives that do
this are usually rather long words. All adjectives of three or more syllables, e.g. ex-
cit-ing, un-for-tu-nate, are compared like this.
POSITIVE COMPARATIVE SUPERLATIVE
active more active most active
attractive more attractive most attractive
beautiful more beautiful most beautiful
brilliant more brilliant most brilliant
careful more careful most careful
courageous more courageous most courageous
cunning more cunning most cunning
difficult more difficult most difficult
famous more famous most famous
faithful more faithful most faithful
important more important most important
proper more proper most proper
popular more popular most popular
splendid more splendid most splendid
suitable more suitable most suitable
Some adjectives do not follow any of the rules explained earlier. They are
compared irregularly. Here are the different forms of such adjectives.
POSITIVE COMPARATIVE SUPERLATIVE
bad worse worst
evil worse worst
good better best
ill worse worst
far farther farthest
well better best
late later latest (time)
late later last (position)
little less least
much more most
many more most
146
COMPUTER ENGINEERING
EXAMPLES:
Today is the worst day I've had in a long time.
You play tennis better than I do.
This is the least expensive sweater in the store.
This sweater is less expensive than that one.
I ran pretty far yesterday, but I ran even farther today.
147
Veretennikova V.P.
APPENDIX I
IRREGULAR VERBS
150
COMPUTER ENGINEERING
VOCABULARY
A
abstraction [æbˈstrækʃn] – абстракция
abutment [əˈbʌtmənt] – граница
accommodate v. [əˈkɒmədeɪt] – приспосабливать
accurate [ˈækjʊrɪt] – точный
adaptive [əˈdæptɪv] – адаптивный, приспосабливающийся
adder [ˈædə] – сумматор
adjacent [əˈʤeɪsənt] – примыкающий, смежный
adjust v. [ə'ʤʌst] – регулировать
administer v. [ədˈmɪnɪstə] – управлять
advantage [ədvˈɑːntɪʤ] – преимущество
aliasing [ˈeɪlɪæsɪŋ] – наложение спектров
allocate v. [ˈæləʊkeɪt] – распределять, размещать
alteration [ˌɔːltəˈreɪʃ(ə)n] – изменение
ambient [ˈæmbɪənt] – окружающий
amplification [ˌæmplɪfɪˈkeɪʃ(ə)n] – усиление
amplify v. [ˈæmplɪfaɪ] – усиливать
apparent [əˈpærənt] – очевидный
appliance [əˈplaɪəns] – прибор, устройство
approach [əˈprəʊʧ] – подход
approximate v. [əˈprɔksɪmɪt] – приближаться, приблизительно равняться
arrange v. [əˈreɪnʤ] – организовать, устраивать
array [əˈreɪ] – массив, матрица
artificial [ˌɑːtɪˈfɪʃ(ə)l] – искусственный
assemble v. [əˈsɛmbl] – собирать, составлять
assembly [əˈsɛmbli] – сборка
assertion [əˈsɜːʃ(ə)n] – утверждение
assign v. [əˈsaɪn] – присвоить
asterisk ['æstərɪsk] – звёздочка (знак сноски)
attend v. [əˈtɛnd] – обслуживать, сопровождать
average [ˈævərɪʤ] – средний
avoid v. [əˈvɔɪd] – избегать
151
Veretennikova V.P.
B
background [ˈbækɡraund] – фон; происхождение; предпосылки
bandwidth [ˈbændwɪdθ] – пропускная способность
binary [ˈbaɪnərɪ] – двоичный
boost v. [buːst] – повышать, способствовать увеличению
border [ˈbɔːdə] – граница
bottleneck [ˈbɒtlnɛk] – узкое место (горлышко бутылки)
bound v. [baʊnd] – связывать, ограничивать
building-block [ˈbɪldɪŋ-blɒk] – структурный элемент; стандартный блок
C
capitalize v. [kəˈpɪtəlaɪz] – печатать или писать прописными буквами
cardinal [ˈkɑːdɪnl] – количественный; кардинальный; количественное число
carry out v. [ˈkæri aʊt] – выполнять
cause–effect [kɔːz-ɪˈfɛkt ] – причинно-следственный
cellular [ˈseljulə] – сотовая связь; сотовый
circuit [ˈsɜːkɪt] – цепь, контур; схема
circuitry [ˈsɜːkɪtri] – схема
circumference [səˈkʌmfərəns] – окружность; периметр
clock [ˈkl ɔk] – часы
clock speed [ˈkl ɔk spiːd]– тактовая частота
coarse [kɔːs] – грубый; необработанный
combustion [kəmˈbʌsʧən] – сгорание
complexity [kəmˈplɛksɪti] – сложность
complicated [ˈkɒmplɪkeɪtɪd] – сложный, запутанный
computational [kɒmpjʊˈteɪʃənl] – вычислительный
computing [kəmˈpjuːtɪŋ] – вычисление
concurrency [kənˈkʌrənsɪ] – совпадение, согласованность
confine v. [kənˈfaɪn] – ограничивать
conform v. [kənˈfɔːm] – соответствовать
congestion [kənˈʤɛsʧən] – перегруженность
connection [kəˈnɛkʃən] – соединение, связь
conservation [ˌkɒnsə(ː)ˈveɪʃən] – сохранение, сбережение
consistent [kənˈsɪstənt] – последовательный, совместимый,
согласующийся
consumption [kənˈsʌm(p)ʃən] – потребление
152
COMPUTER ENGINEERING
D
deadlock [ˈdɛdlɒk] – безвыходное положение; тупик
decimal [ˈdesɪməl] – десятичный
decomposition [ˌdiːkɒmpəˈzɪʃən] – разложение, распад
delay [dɪˈleɪ] – задержка
depletion [dɪˈpliːʃən] – истощение
deposit v. [dɪˈpɔzɪt] – осаждать
derivative [dɪˈrɪvətɪv] – производное; производная функция
disable v. [dɪsˈeɪbl] – отключить
discrete [dɪsˈkriːt] – дискретный; отдельный
dichotomy [daɪˈkɒtəmi] – последовательное деление на две части;
дихотомия
digitize v. [ˈdɪʤɪtaɪz] – оцифровать, преобразовывать в цифровую форму
disadvantage [ˌdɪsədˈvɑːntɪʤ] – недостаток, вред
distinct [dɪsˈtɪŋkt] – отчётливый определённый
distinguish v. [dɪsˈtɪŋgwɪʃ] – различать
distribution [ˌdɪstrɪˈbjuːʃən] – распределение, распространение
disturbance [dɪsˈtɜːbəns] – нарушение
domain [dəʊˈmeɪn] – домен; область
dope v. [dəʊp] – легировать
dummy [ˈdʌmi] – фиктивный
duration [djʊəˈreɪʃən] – продолжительность
E
eigenvector [ˈaɪɡənˈvɛktər] – собственный вектор
elaborate [ɪˈlæbərɪt] – продуманный; тщательно разработанный
153
Veretennikova V.P.
F
facility [fəˈsɪlɪtɪ] – установка, устройство; возможность, способность
factor [ˈfæktə] – фактор; коэффициент; множитель
failure [ˈfeɪljə] – отказ, сбой
fatigue v. [fəˈtiːg] – изнурять
feasible [ˈfiːzəbl] – выполнимый
feat [fiːt] – подвиг; проявление большого искусства
feedback [ˈfiːdbæk] – обратная связь
ferroelectric [ˈfɛrəʊ ɪˈlɛktrɪk] – сегнетоэлектрический
fetch v. [feʧ] – получить, извлекать
fidelity [fɪˈdɛlɪti] – точность
fit v. [fɪt] – соответствовать, приспосабливать
flash [flæʃ] – вспышка; короткий кадр
forecasting [ˈfɔːkɑːstɪŋ] – прогнозирование
formidable [ˈfɔːmɪdəbl] – огромный
forwarding [ˈfɔːwədɪŋ] – пересылка
fraction [frækʃn] – дробь
frequency [ˈfriːkwənsɪ] – частота
154
COMPUTER ENGINEERING
G
general-purpose [ˈʤɛnərəl-ˈpɜːpəs ] – многоцелевой, универсальный; общего
назначения
H
halt [hɔːlt] v. – останавливать
hard-wired [hɑːd-ˈwaɪəd] – аппаратно-реализованный; жёстко-проводной
hazardous [ˈhæzədəs] – опасный, рискованный
humidity [hjuːˈmɪdɪtɪ] – влажность
I
impair v. [ɪmˈpeə] – ухудшать, ослаблять
implantable [ɪmˈplɑːntəbl] – вживляемый, имплантируемый
implementation [ˌɪmplɪmɛnˈteɪʃən] – реализация; осуществление; выполнение
incompatibility [ˌɪnkəmˌpætəˈbɪlɪti] – несовместимость
infeasible [ɪnˈfiːzəbl] – невыполнимый; неосуществимый
insertion [ɪnˈsɜːʃən] – вставка
instantaneous [ˌɪnstənˈteɪniəs] – мгновенный
instantiations [ˌɪnst(ə)ntɪˈeɪʃənz] – конкретизации
integrated-circuit [ˈɪntɪgreɪtɪd-ˈsɜːkɪt] – интегральная схема
integer [ˈɪntɪʤə] – целое число
interconnection [ˌɪntə(ː)kəˈnɛkʃən] – взаимосвязь, соединение
interoperable [ˌɪntə(ː)ˈɒpərəbl ] – совместимый
interrelation [,ɪntə(ː)rɪˈleɪʃən] – взаимосвязь
interrupt [,ɪntəˈrʌpt] – n. прерывание; v. прерывать
intertwine v. [,ɪntə(ː)ˈtwaɪn] – сплетаться
intrinsically [ɪnˈtrɪnsɪk(ə)li ] – внутренне; свойственно
invariant [ɪnˈveərɪənt] – инвариантный, неизменный
invention [ɪnˈvɛnʃən] – изобретение
investigate v. [ɪnˈvɛstɪgeɪt] – исследовать
J
jig [ʤɪg] – зажимное приспособление
jitter [ˈʤɪtə] – дрожание
join v. [ʤɔɪn] – соединять, присоединить
155
Veretennikova V.P.
L
label [leɪbl] – метка, ярлык
layout [ˈleɪaut] – расположение
length [lɛŋθ] – длина
level [ˈlɛvl] – уровень
load [ləʊd] – нагрузка
loop [luːp] – цикл
low pass filter [ləʊ pɑːs ˈfɪltə ] – фильтр нижних частот
M
map v. [mæp] – отображать
measurement [ˈmɛʒəmənt] – измерение
mechatronics [mɪˈkæˈtrɒnɪks] – мехатроника
meter [ˈmiːtə] – измерять
microcontroller [ˈmaɪkrəʊkənˈtrəʊlə] – микроконтроллер
myriad [ˈmɪrɪəd] – несметный, бесчисленный; несметное число
memory [ˈmemərɪ] – память
motive v. [ˈməʊtɪv] – побуждать
multiplicative [ˌmʌltɪˈplɪkətɪv] – мультипликативный
multiply v. [ˈmʌltɪplaɪ] – увеличиваться, умножать
N
necessitate v. [nɪˈsɛsɪteɪt] – вызывать необходимость; вынуждать
negligible [ˈnɛglɪʤəbl] – незначительный, не принимаемый в расчёт
node [nəʊd] – узел
notation [nəʊˈteɪʃn] – система счисления, представление; нотация
O
obsolete [ˈɒbsəliːt] – устарелый
obtain v. [əbˈteɪn] – получать
occupy v. [ˈɒkjʊpaɪ] – занимать
one-shot mode [wʌn-ʃɒt məʊd] – однократный режим
open-loop [ˈəʊpən-luːp] – открытый цикл
originate v. [əˈrɪʤɪneɪt] – происходить; возникать
156
COMPUTER ENGINEERING
P
package ['pækɪʤ] – пакет
partitioning [pɑːˈtɪʃənɪŋ] – разделение
payload [ˈpeɪləʊd ] – полезная нагрузка
perform v. [pəˈfɔːm] – выполнять
performance [pəˈfɔːməns] – производительность; выполнение;
характеристика; эксплуатационные качества
pervasive [pəː ˈveɪsɪv] – распространяющийся
photomask [ˌfəʊtəʊˈmɑːsk] – фотошаблон
planar [ˈpleɪnə] – плоскостной
polynomial [ˌpɒlɪˈnəʊmiəl] – многочлен
preparatory [prɪˈpærətəri] – подготовительный
precise [prɪˈsaɪz] – точный
precursor [pri(ː)ˈkɜːsə] – предшествующий продукт; предшественник
printed board [ˈprɪntɪd bɔːd] – печатная плата
project v. [ˈprɒʤɛkt] – отражать, проецировать
property [ˈprɒpəti] – свойство
proximity [prɔkˈsɪmɪtɪ] – близость
Q
quantify v. [ˈkwɒntɪfaɪ] – определять количество
quantize v. [kwɒntaɪz] – квантовать
quantum information [ˈkwɒntəm ˌɪnfəˈmeɪʃən] – квантовая (количественная)
информация
query [ˈkwɪəri] – запрос
queue [kjuː] – очередь
R
ramp [ræmp] – наклонная плоскость
rectangular [rɛkˈtæŋgjʊlə] – прямоугольный
redundant [rɪˈdʌndənt] – избыточный
refinement [rɪˈfaɪnmənt] – улучшение, обработка
157
Veretennikova V.P.
S
sample [ˈsɑːmpl] – v. отбирать образцы; n. выборка
sampling [ˈsɑːmplɪŋ] – дискретизация, отбор образцов
sawtooth [ˈsɔːtuːθ] – пилообразный (напр. волна)
scalability [skeɪləˈbɪlɪti] – масштабируемость
scale [skeɪl] – масштаб, шкала; уровень
search engine [sɜːʧ ˈɛnʤɪn] – поисковая система
self-contained [sɛlf-kənˈteɪnd ] – автономный
semiconductor [ˌsɛmɪkənˈdʌktə] – полупроводник
separate [ˈsɛprɪt] – отдельный
sequence [ˈsiːkwəns] – последовательность
158
COMPUTER ENGINEERING
T
terminate v. [ˈtɜːmɪneɪt] – завершаться
timeliness [ˈtaɪmlɪnɪs] – своевременность
timing [ˈtaɪmɪŋ] – синхронизация
tiny [ˈtaɪni] – крошечный; очень маленький
tool [tuːl] – инструмент, орудие
tracking [ˈtrækɪŋ] – отслеживание
trade-off [treɪd-ɒf] – компромисс
tread [trɛd] – протектор
troubleshoot v. [ˈtrʌbəl,ʃʊt] – разрешать проблемы; исправлять проблемы
159
Veretennikova V.P.
U
ubiquitous [ju(ː)ˈbɪkwɪtəs] – повсеместный
unit [ˈjuːnɪt] – устройство; блок; модуль
V
valid [ˈvælɪd] – действительный, допустимый, обоснованный,
справедливый
validate v. [ˈvælɪdeɪt] – проверять; утверждать
value [ˈvæljuː] – значение; ценность; величина
variable [ˈvɛərɪəbl] – переменная
verify [ˈverɪfaɪ] v. – проверять, контролировать; верифицировать
W
wastage [ˈweɪstɪʤ] – потери, изнашивание
weld [wɛld] v. – сваривать
160
COMPUTER ENGINEERING
LITERATURE
ELECTRONIC RESOURCES
http://paulo.moreira.free.fr/
https://securityintelligence.com/the-importance-of-ipv6-and-the-internet-of-things/
http://blog.trendmicro.com/trendlabs-security-intelligence/high-profile-mobile-apps-
at-risk-due-to-three-year-old-vulnerability/#
161
Veretennikova V.P.
Навчальне видання
Computer Engineering
A Coursebook of Professional English
Навчальний посібник
162