Unit 1 Introduction.
Unit 1 Introduction.
4 Hrs
Table of Contents:
Computer Organization & Architecture
Review of Evolution of Computers
Basic Structure of Computer
Example of Computer families
Future trends of Computers
Review of Instruction set, Addressing modes & Instruction formats
……………………………………………………………………………………………………………
What is computer?
Computer is an electronic & electro-mechanical device capable of storing, managing and processing lots
of data at rapid rate.
Level-1:
At level-1, Cache Memory is present.
It stores the segments of program that are frequently accessed by the processor.
It is expensive and therefore smaller in size (in MB).
Cache memory is implemented using static RAM.
Level-2:
At level-2, main memory is present.
It can communicate directly with the CPU and with auxiliary memory devices through an I/O
processor.
It is less expensive than cache memory and therefore larger in size (in few GB).
Main memory is implemented using dynamic RAM.
Level-3:
At level-3, secondary storage devices like Magnetic Disk are present.
They are used as back up storage.
They are cheaper than main memory and therefore much larger in size (in few TB).
Level-4:
At level-4, tertiary storage devices like magnetic tape are present.
They are used to store removable files.
They are cheapest and largest in size (1-20 TB).
I.C
F.C E.C
Time
System bus:
Wire connection between memory, input /output and micro processor.
Type of system bus:
In this mode of addressing, the address of the operand (data) is given in the instruction itself.
There are certain instruction which operate on the accumulator such instruction does not require the
address of operand.
The address of the operand (data) is specified by the register pair as pointer for operand.
In this mode, the instruction specifies the register whose contents give us the address of operand which is
in memory. Thus, the register contains the address of operand rather than the operand itself. Example -
MOV A, M
When the operand is specified within the instructions itself, we say that the immediate addressing mode
has been used. E.g. MVI, LXI, ADI etc.
When the operands for any operations are in a general purpose registers, only the register needs to specify
the address of the operand.
In this mode the operand is stored in the register and this register is present in CPU. The instruction has
the address of the Register where the operand is stored.
Instruction format
D7 D6 D5 D4 D3 D2 D1 D0
E.G. OPCODE OPERAND
MOV A, B
ADD B
CMA
D7 D6 D5 D4 D3 D2 D1 D0 OPCODE
D7 D6 D5 D4 D3 D2 D1 D0 DATA OR ADDRESS
3) 3-byte instruction
D7 D6 D5 D4 D3 D2 D1 D0
D7 D6 D5 D4 D3 D2 D1 D0
D7 D6 D5 D4 D3 D2 D1 D0
E.g. Opcode Operand Hex code
LDA 2050H 3A
50
20
Design Computer architecture deals with high Computer organization deals with low level
3
level design. design.
History of Computers
Abacus
The history of computer begins with the birth of abacus which is believed to be the first computer. It is
said that Chinese invented Abacus around 4,000 years ago.
It was a wooden rack which has metal rods with beads mounted on them. The beads were moved by the
abacus operator according to some rules to perform arithmetic calculations. Abacus is still used in some
countries like China, Russia and Japan. An image of this tool is shown below;
Napier's Bones
It was a manually-operated calculating device which was invented by John Napier (1550-1617) of
Merchiston. In this calculating tool, he used 9 different ivory strips or bones marked with numbers to
multiply and divide. So, the tool became known as "Napier's Bones. It was also the first machine to use
the decimal point.
HTML Tutorial
Pascaline is also known as Arithmetic Machine or Adding Machine. It was invented between 1642 and
1644 by a French mathematician-philosopher Biaise Pascal. It is believed that it was the first mechanical
and automatic calculator.
Pascal invented this machine to help his father, a tax accountant. It could only perform addition and
subtraction. It was a wooden box with a series of gears and wheels. When a wheel is rotated one
revolution, it rotates the neighboring wheel. A series of windows is given on the top of the wheels to read
the totals. An image of this tool is shown below;
Difference Engine
In the early 1820s, it was designed by Charles Babbage who is known as "Father of Modern Computer".
It was a mechanical computer which could perform simple calculations. It was a steam driven calculating
machine designed to solve tables of numbers like logarithm tables.
This calculating machine was also developed by Charles Babbage in 1830. It was a mechanical computer
that used punch-cards as input. It was capable of solving any mathematical problem and storing
information as a permanent memory.
Tabulating Machine
It was invented in 1890, by Herman Hollerith, an American statistician. It was a mechanical tabulator
based on punch cards. It could tabulate statistics and record or sort data or information. This machine was
used in the 1890 U.S. Census. Hollerith also started the Hollerith?s Tabulating Machine Company which
later became International Business Machine (IBM) in 1924.
It was the first electronic computer introduced in the United States in 1930. It was an analog device
invented by Vannevar Bush. This machine has vacuum tubes to switch electrical signals to perform
calculations. It could do 25 calculations in few minutes.
Mark I
The next major changes in the history of computer began in 1937 when Howard Aiken planned to
develop a machine that could perform calculations involving large numbers. In 1944, Mark I computer
was built as a partnership between IBM and Harvard. It was the first programmable digital computer.
Mainframe Computers
With large Hard Drives, lots of Memory (RAM), multiple CPU’s running together, does lots of
computing depending upon the speed of processors used and memory used.
Super Computer
A computer is with lots of processors, ALUs (Arithmetic logic unit), Memory (RAM), etc. Usually in
scientific research work. Capability of 14,000 microcomputers.
Laptop/Notebook
A laptop, often called a notebook or "notebook computer", is a small, portable personal computer with a
"clamshell" form factor, an alphanumeric keyboard on the lower part of the "clamshell" and a thin LCD
or LED computer screen on the upper part, which is opened up to use the computer. Compact and
portable version of a PC, Usually in a notebook shape.
Micro Computer
A very small computer, usually used in cameras. A microcomputer (sometimes shortened to micro) is a
computer with a microprocessor as its central processing unit. Another general characteristic of these
Digital
Digital computers are computers that process the data in binary form ie.0’s and 1’s.
The main benefit of digital computers is that they are quick and re-programmable.
Some of the examples are laptops, smartphones, and calculators.
Hybrid.
Hybrid computers are a special purpose computer that has a combination of both Analog and digital
computers.
They are digital computer which accepts Analog signals and converts them to digital form.
These are generally used for scientific applications, airplanes, and hospitals.
Some of the examples include electrocardiogram machine, ultrasound machine, monitoring machine.
Generation of Computer
Vacuum tubes and diode valves were used as the main electronic component in the first
generation computers.
Punch cards, paper tape utilized for input and output operations.
Magnetic drums used for storage.
Huge in size and weight with a lot of power consumption.
Very expensive in price also not reliable.
Computers were programmed with low-level machine language also has low operating speed.
Examples
Examples of the first generation of computers are ENIAC (Electronic Numerical Integrator and
Computer), UNIVAC (Universal Automatic Computer) EDSEC (Electronic Delay Storage Automatic
Calculator), EDVAC (Electronic Discrete Variable Automatic Computer), (Electronic delay storage
automatic calculator), IBM -701 and IBM 650.
In this generation, computers based on Integrated Circuit was more powerful than the transistor.
The size of the computers was likewise little because the size of the IC being more modest than
the circuit size of the transistors.
More reliable, inexpensive, faster, energy-efficient, as well as very light in weight than 2nd gen
computers.
The first Computer Mouse and Keyboard were appeared and used in the 3rd generation of
computers
Use of new versions of high-level languages like BASIC, COBOL, FORTRAN, PASCAL, and
ALGOL
Available for a mass audience and made it possible for general purpose usage.
Examples Some of the most popular models of the 3rd generation of computers were the ICL 2903, ICL
1900, TDC-B16, IBM 360 and 370, Honeywell 6000, UNIVAC 1108, PDP-8, and PDP-11, which were
ideal in their handling multiprocessing capabilities, reliability, and flexibility than previous generations.
Computer Computing
Generation Examples Advantages
Technology Disadvantages
and
Features.
ENIAC, EDSAC
EDVAC, Huge, slow,
1st Computers based
Used vacuum expensive, limited
Generation on vacuum tube UNIVAC, IBM701 and
tubes for circuitry. memory and generates
(1940-1956) technology. IBM 650. lot of heat.
Artificial intelligence is the simulation of human intelligence processes by machines, especially computer
systems. Specific applications of AI include expert systems, natural language processing, speech
recognition and machine vision.
Advantages
Good at detail-oriented jobs;
Reduced time for data-heavy tasks;
Delivers consistent results; and
AI-powered virtual agents are always available.
Disadvantages
Expensive;
Requires deep technical expertise;
Limited supply of qualified workers to build AI tools;
Only knows what it's been shown; and
Lack of ability to generalize from one task to another.
Weak AI, also known as narrow AI, is an AI system that is designed and trained to complete a
specific task. Industrial robots and virtual personal assistants, such as Apple's Siri, use weak AI.
Strong AI, also known as artificial general intelligence (AGI), describes programming that can
replicate the cognitive abilities of the human brain. When presented with an unfamiliar task, a
strong AI system can use fuzzy logic to apply knowledge from one domain to another and find a
solution autonomously. In theory, a strong AI program should be able to pass both a Turing
Test and the Chinese room test.
Robotic process automation (RPA) allows using software robots instead of people to drive the business.
It is used to automate regular tasks so the user can concentrate on accomplishing complex tasks rather
than routine work manually. This would in turn reduce the human errors.
RPA Benefits
What Is AR?
Almost any person with a smartphone can get access to augmented reality, making it more efficient than
VR as a branding and gaming tool. AR morphs the mundane, physical world into a colorful, visual one by
What Is VR?
Virtual reality takes these same components to another level by producing an entirely computer-generated
simulation of an alternate world. These immersive simulations can create almost any visual or place
imaginable for the player using special equipment such as computers, sensors, headsets, and gloves.
Internet of Things
IoT systems allow users to achieve deeper automation, analysis, and integration within a system. They
improve the reach of these areas and their accuracy. IoT utilizes existing and emerging technology for
sensing, networking, and robotics.
IoT exploits recent advances in software, falling hardware prices, and modern attitudes towards
technology. Its new and advanced elements bring major changes in the delivery of products, goods, and
services; and the social, economic, and political impact of those changes.
The most important features of IoT include artificial intelligence, connectivity, sensors, active
engagement, and small device use. A brief review of these features is given below −
AI − IoT essentially makes virtually anything “smart”, meaning it enhances every aspect of life
with the power of data collection, artificial intelligence algorithms, and networks. This can mean
something as simple as enhancing your refrigerator and cabinets to detect when milk and your
favorite cereal run low, and to then place an order with your preferred grocer.
Connectivity − New enabling technologies for networking, and specifically IoT networking,
mean networks are no longer exclusively tied to major providers. Networks can exist on a much
smaller and cheaper scale while still being practical. IoT creates these small networks between
its system devices.
Sensors − IoT loses its distinction without sensors. They act as defining instruments which
transform IoT from a standard passive network of devices into an active system capable of real-
world integration.
Active Engagement − Much of today's interaction with connected technology happens through
passive engagement. IoT introduces a new paradigm for active content, product, or service
engagement.
Small Devices − Devices, as predicted, have become smaller, cheaper, and more powerful over
time. IoT exploits purpose-built small devices to deliver its precision, scalability, and versatility.
IoT − Advantages
IoT − Disadvantages
Though IoT delivers an impressive set of benefits, it also presents a significant set of challenges. Here is
a list of some its major issues −
Security − IoT creates an ecosystem of constantly connected devices communicating over
networks. The system offers little control despite any security measures. This leaves users
exposed to various kinds of attackers.
Privacy − The sophistication of IoT provides substantial personal data in extreme detail without
the user's active participation.
Complexity − Some find IoT systems complicated in terms of design, deployment, and
maintenance given their use of multiple technologies and a large set of new enabling
technologies.
Flexibility − Many are concerned about the flexibility of an IoT system to integrate easily with
another. They worry about finding themselves with several conflicting or locked systems.
Compliance − IoT, like any other technology in the realm of business, must comply with
regulations. Its complexity makes the issue of compliance seem incredibly challenging when
many consider standard software compliance a battle.
5G Technology
What is 5G Technology?
The 5G technology is expected to provide a new (much wider than the previous one) frequency bands
along with the wider spectral bandwidth per frequency channel. As of now, the predecessors
(generations) mobile technologies have evidenced substantial increase in peak bitrate. Then — how is
5G different from the previous one (especially 4G)? The answer is — it is not only the increase in bitrate
made 5G distinct from the 4G, but rather 5G is also advanced in terms of −
Salient Features of 5G
5th Generation Mobile Network or simply 5G is the forthcoming revolution of mobile technology. The
features and its usability are much beyond the expectation of a normal human being. With its ultra-high
speed, it is potential enough to change the meaning of a cell phone usability.
Cyber Security
"Cyber Security is the body of technologies, processes, and practices designed to protect networks,
devices, programs, and data from attack, theft, damage, modification or unauthorized access."
Network Security: It involves implementing the hardware and software to secure a computer
network from unauthorized access, intruders, attacks, disruption, and misuse. This security
helps an organization to protect its assets against external and internal threats.
Application Security: It involves protecting the software and devices from unwanted threats.
This protection can be done by constantly updating the apps to ensure they are secure from
attacks. Successful security begins in the design stage, writing source code, validation, threat
modeling, etc., before a program or device is deployed.
Information or Data Security: It involves implementing a strong data storage mechanism to
maintain the integrity and privacy of data, both in storage and in transit.
Mobile Security: It involves securing the organizational and personal data stored on mobile
devices such as cell phones, computers, tablets, and other similar devices against various
malicious threats. These threats are unauthorized access, device loss or theft, malware, etc.
Cloud Security: It involves in protecting the information stored in the digital environment or
cloud architectures for the organization. It uses various cloud service providers such as AWS,
Azure, Google, etc., to ensure security against multiple threats.
We can break the CIA model into three parts: Confidentiality, Integrity, and Availability. It is actually a
security model that helps people to think about various parts of IT security.
Confidentiality
This principle ensures that the data is authentic, accurate, and safeguarded from unauthorized
modification by threat actors or accidental user modification. If any modifications occur, certain measures
should be taken to protect the sensitive data from corruption or loss and speedily recover from such an
event. In addition, it indicates to make the source of information genuine.
Availability
This principle makes the information to be available and useful for its authorized people always. It
ensures that these accesses are not hindered by system malfunction or cyber-attacks.
3. Logical instruction
This instruction performs logical operation like AND, OR, COMPARE, ROTATED.
CMP- compare
RAL- rotation left
RAR- rotation right
ANA- AND
ORA- OR
These instructions perform logic operations on the contents of the accumulator. – ANA, ANI, ORA, ORI,
XRA and XRI
4. Branch instruction-
Two types:
1. Unconditional branch.
a. Go to a new location no matter what.
2. Conditional branch.
b. Go to a new location if the condition is true.
Unconditional Branch
Conditional Branch
– Go to new location if a specified condition is met.
JZ Address (Jump on Zero) – Go to address specified if the Zero flag is set.
JNZ Address (Jump on NOT Zero) – Go to address specified if the Zero flag is
not set.
JC Address (Jump on Carry) – Go to the address specified if the Carry flag is set.
JNC Address (Jump on No Carry) – Go to the address specified if the Carry flag
is not set.
JP Address (Jump on Plus) – Go to the address specified if the Sign flag is not set
JM Address (Jump on Minus) – Go to the address specified if the Sign flag is set.
5. Machine Control
– HLT
Stop executing the program. – NOP
No operation
Exactly as it says, do nothing.
Usually used for delay or to replace instructions during debugging.
These instruction control machines function such as HLT, NOP, and EI etc.