3 Hardware
3 Hardware
51
COMPUTER ARCHITECTURE & OPERATING SYSTEM
Von Neumann architecture
The Von Neumann architecture, on a simple level, state that a computer system can be
through to consist of three main sections: CPU, Storage and INPUT/OUTPUT devices.
52
Arithmetic Logic Unit (ALU)
This is an internal part of the CPU that carries out calculation on data. The arithmetic part
uses the usual operators such as multiply, divide, add and subtract. The logic part carries
out comparisons such as ‘equal to’, ‘greater than’ and ‘less than’. Values need to be
placed in the accumulator for calculation to be carried out.
Storage
Primary memory (also known as main memory) is fast to access and it directly
accessible by the processor. RAM and ROM from main memory, along with cache
memory and registers.
Second storage (also known as backing storage) is slow to access and is not directly
accessible by the processor. Instead, communication with secondary memory is through
input/output controllers. Hard drives and CD-ROMs are example of secondary memory.
Buses
The components of the model need to be connected to one another and this is usually done
through buses. A bus is a series of conductors, or pathways, which can be considered a sort
of ‘highway’ for information. Three separate buses are used:
1. Data Bus
2. Address Bus
3. Control Bus
53
Data Bus Address Bus Control Bus
It sends data between It carries signals relating to It carries signals relating to
the processor, the addresses between the the control and
memory unit and the processor and the memory. coordination of all activities
input/output devices. within the computer.
It is unidirectional. Signals
It is bi-directional, data travel in one direction. Examples include: the read
can travel in both and write functions
directions.
It is unidirectional. Signals
travel in one direction only.
Memory
The computer will have memory that can hold both data and its address and also the program
processing that data. In modern computers this memory is RAM.
The address will uniquely identify every location in the memory and the content will be in the
binary value stored in each location.
Let us consider two examples how MDR and MAR registers can be used when carrying out a
read and write operation to and from memory.
Registers
These are internal memory location within the CPU. They temporarily hold data and instruction
during processing. Registers are used to move data instruction into and around the different
components of the CPU.
1. Program counter – PC
2. Current Instruction Register – CIR
3. Memory Address Register – MAR
4. Memory Data Register – MDR
5. Accumulator – ACC
MAR: The memory address register is used to hold the memory address that contains either
the next piece of data or an instruction that is to be used.
MDR/MBR: The memory data register acts like a buffer and holds anything that is copied from
the memory ready for the processor to use it.
PC: The program counter keeps track of where to find the next instruction so that a copy of
the instruction can be placed in the current instruction register. Sometimes the program
counter is called the Sequence Control Register (SCR) as it controls the sequence in which
instructions are executed.
CIR/IR: The current instruction register holds the instruction that is to be executed.
Accumulator: It is the register that holds intermediate values of arithmetic operations.
54
Clock speed
It determines the number of cycles the CPU can execute per second. Increasing clock speed
increases the number of operations/numbers of fetch-execute cycles that can be carried out
per unit of time, however, there is a limit on clock speed.
Von Neumann create architecture with a single processor that follows a linear sequence.
This sequence is called the ‘fetch-execute cycle’;
55
Register Notation
1. [MAR] [PC]
2. [MDR] [ [MAR]]
3. [CIR] [MDR]
4. [PC] [PC] +1
Read Operation
Write Operation
Cache
Most data is stored on the hard disk. When we use that data, it is loaded into Random Access
Memory (RAM) because it is much faster to access the data from RAM than from the hard
disk.
56
When we looked at the 'immediate access store' earlier, we found out that the CPU needs to
access data very quickly. Although RAM is faster than the hard disk, it still isn't fast enough to
cope with the speed that the CPU needs to deal with data.
To appreciate this, image a race taking place between two cars, one is a powerful high speed
sports car and the other is an ordinary little run-about. Their task is to race across town but
there are many traffic lights in the way. The start flag goes down and the big car shoots off the
line and the little car just tootles along, well behind. Moments later, the big car has to stop at
a traffic light, so within a minute the small car catches up once again. By the time the race is
over, the big car is hardly in front of the slow car because of all the traffic light delays. This is
exactly what happens in a CPU. The processor may sit around idly waiting for new data to
arrive and so it appears less powerful than it really is.
The way around this, is to store as much data as possible, as close as possible to the CPU to
avoid delays. This nearby storage area is called the 'cache'.
The cache is a special type of computer memory which can be accessed much faster than
RAM. The CPU looks in the cache for the data it needs. If the data is there, it will retrieve it
and process it. If the data is not there, then the CPU accesses the system memory and then
puts a copy of the new data in the cache before processing it.
Cache memory is volatile i.e. when the computer is shut down, the data stored there is lost.
Thus, in order to improve the computer's performance, it is important to keep the local cache
full at all times so that the CPU doesn't have to wait around with nothing to do.
Summarizing all the factors need to be taken into account when considering computer
performance.
Increasing but width (data and address buses) increases the performance and speed
of a computer system
Increasing clock speed will potentially increase the speed of a computer
A computer’s performance can be changed by altering bus width, clock speed and use
of multi-core CPUs
Use of cache memories can also speed up a CPU’s performance.
57
Instruction Sets
Instructions are a set of operations which are decoded in a sequence. Each operation will
instruct the ALU and CU. Operation consists of two parts opcode and operand.
Operand: It is the data which needs to be acted on or it can refer to a register in the memory.
Computer needs to understand the operation to be carried out, there is actually a limited
number of opcodes that can be used; this is known as the instruction set.
For example: Intel, Pentium and AMD Athlon CPU’s use almost identical x86 instructions even
though they are based on very different designs.
Instruction sets are the low-level language instructions that instructs the CPU how to carry out
the operations.
OPERATING SYSTEMS
An operating system (OS), in its most general sense, is software that allows a user to run other
applications on a computing device. An OS is the framework that allows us to communicate
with computer hardware in an interactive way. Operating systems perform basic tasks. Such
as recognizing input from the keyboard, sending output to the display screen, keeping track of
file and controlling peripheral devices such as printers.
Before operating system developed to have a GUI, they had a command line interface (CLI).
In this type of interface, a user would need to type in the different commands they would like
to carry out on the operating system. Some users still use a CLI operating system; an example
of this is Linux.
58
An OS has several main functions:
It provides the GUI for the user to interact with the computer.
It manages the hardware and peripherals that are connected to the computer.
It manages the transfer of programs into and out of memory. The OS will manage how
the programs will be places into the available memory.
It manages security for the computer, such as anti-virus software and firewalls, and
manages access right (the amount of information a user is allowed access to).
It manages file handing, allowing users to store, delete and move files on a computer. It
keeps track of all action carried out on files.
It manages utility software on the computer such as disk defragmentation and disk
formatting software.
Interrupts
An interrupt is a signal. When this signal is received it will inform software that something
has happened, an event has occurred. An interrupt could be generated by many sources. It
could be generated by a user pressing keys on a keyboard, it could be form printer
connected to the computer. The signal will come a device attached to the computer or from a
program within the computer.
An interrupt will cause the operating system on a computer to stop and then the operating
system will need to work out what to do next. After an interrupt is detected, the operating
system will either continue running the the program it was currently running or it will begin
running a new program.
A computer can only run one program at a time, but because the program it is currently
running can be interrupted to run another program, it can perform multiple tasks. It will take it
in turn to run the programs so that it appears to be running them a same time. This is called
‘multitasking’. It is the ability to do his that means that we can listen to music on our
computer, whilst completing work in a word processing application, whilst surfing the internet
for information.
An OS will contain a program called an interrupt handler. The role of the interrupt handler is
to priorities the interrupt signals as it receives them and places them in a queue to be
handled.
Buffers
Buffers are used in computers as a temporary memory area. These are essential in modern
computers since hardware devices operate at much slower speeds than the processor. If it
wasn’t for buffers, processors would spend the majority of their time idle, waiting for the
hardware device to complete its operation. Buffers are essentially filled from the processor or
memory unit and whilst these are emptied to the hardware device, the processor carries on
with other tasks. Buffers are used, for example, when streaming a video from the internet.
59
This ensures that the video playback doesn’t keep on stopping to wait for data from the
internet.
Buffers and interrupts are often used together to allow standard computer functions to be
carried out.
KEY TERM
Cache memory – a portion of memory used for high-speed storage.
Register –an internal memory location within the CPU that temporarily holds data and
instruction during processing.
Accumulator – the register that is used for arithmetic and logic calculation.
Embedded Systems
Embedded System is a combination of hardware and software which is designed to carry out
a specific set of functions. The hardware is electronic, electrical or electro-mechanical.
Embedded system can be based on:
60
Depending on the device, embedded systems are either programmable or non-programmable.
Non-programmable devices need, in general, to be replaced if they requires a software
upgrade. Programmable devices permit upgrading by two methods:
Connecting the device to a computer and allowing the download of updates to the software
(for example, this is used to update the maps on a GPS System used in a vehicle).
Automatic updates via a Wi-fi, satellite or cellular (mobile phone network) link (for example,
many modern cars allow updates to engine management systems and other components
via satellite link).
There are definite benefits and drawbacks of devices being controlled using embedded
systems:
Motor Vehicles
Modern cars have many parts that rely on embedded systems to function correctly. Figure
shows some of the many components that are controlled in this way.
61
Set-top Box
A Set-up Box uses an embedded system to allow, for example, recording and playback of
television programmes. This can be operated remotely by the user when not at home using
an internet enabled device or by using the interface panel when at home.
Security Systems
62
Lighting Systems
Embedded Systems are used in modern sophisticated lighting systems from simple home use
to major architectural lighting systems. We will concentrate here on a lighting system used in
a large office. The system needs to control the lighting taking into account:
An embedded system can automatically control the lighting using a number of inputs (such as
light sensors) and key data stored in memory. Again, this fits very well into the system
described.
Vending Systems
Vending Machines make considerable use of embedded systems. They usually use
microcontrollers to control a number of functions that we all associate with vending machines.
63
Washing Machines
Many white goods (such as refrigerators, washing machines, microwave ovens and so on) are
controlled by embedded systems. They all come with a keyboard or dials that are used to
select the temperature, wash cycle or cooking duration. This data forms the input to the
embedded system, which then carries out the required task without any further human
intervention.
64
3.2 Input & Output Devices
65
3.2 INPUT AND OUTPUT DEVICES
INPUT Devices:
Input Devices are peripherals used to provide data and control signals to a computer. Input
devices allow us to enter raw data for processing. There are many examples of input devices,
each with their own benefits and drawbacks.
Scanners:
Two-dimensional scanners
These types of scanner are the most common form and are generally used to input hard-copy
(paper) documents. The image is converted into an electronic form which can be stored in a
computer.
A number of stages occur when scanning a document:
66
They come in two varieties, flatbed or handheld. Some printers have inbuilt flatbed scanners.
The functionality of 2D scanners is enhanced when combined with OMR and OCR
software. For example, OCR software can convert scanned in text into a computer readable
form.
2D scanners are used at airports to read passports. They make use of OCR technology to
produce digital images which represent the passport pages. Because of the OCR technology,
these digital images can be manipulated in a number of ways.
At many airports the two-dimensional photograph in the passport is also scanned and stored
as a jpeg image. The passenger’s face is also photographed using a digital camera (a 2D
image is taken so it can be matched to the image taken from the passport). The two digital
images are compared using face recognition/detection software. Key parts of the face are
compared.
The face in above figure shows several of the positions used by the face recognition software.
Each position is checked when the software tries to compare two facial images. Data such as:
distance between the eyes
width of the nose
shape of the cheek bones
length of the jaw line
shape of the eyebrows
are all used to identify a given face.
Converting a hard copy of a document into an electronic / digital form for storage,
sending or editing
Reading passports
Three-dimensional scanners
A 3D scanner is an input device that creates a 3D model of the object scanned. Scanning can
be achieved either by using lasers, light, radio waves or x-rays.
67
The scanned images can be used in COMPUTER AIDED DESIGN (CAD) or, more recently,
sent to a 3D printer to produce a working model of the scanned image.
There are numerous technologies used in 3D scanners like lasers, magnetic resonance, white
light, and so on.
68
Barcode readers/scanners
Benefits of barcodes
The barcode is first read by a red laser or red LED (LIGHT EMITTING DIODE).
• Light is reflected back off the barcode; the dark areas reflect little or no light which allows
the bars to be read.
• The reflected light is read by sensors (photoelectric cells).
• As the laser or LED light is scanned across the barcode, a pattern is generated which is
converted into digital data – this allows the computer to understand the barcode.
• For example: the digit ‘3’ on the left generates the pattern L D D D D L D (where
L = light and D = dark); this has the binary equivalent of 0 1 1 1 1 0 1 (where L =
0 and D = 1).
Barcode readers are most commonly found at the checkout in supermarkets. There are
several other input and output devices at the checkout:
69
Devices are used at the checkout in supermarkets.
The barcode number is looked up in the stock database (the barcode is known as the
KEY FIELD in the stock item record); this key field uniquely identifies each stock
item.
When the barcode number is found, the stock item record is looked up.
The price and other stock item details are sent back to the checkout (or POINT OF
SALE TERMINAL (POS)).
The number of stock items in the record is reduced by one each time the barcode is
read.
This new value for number of stock items is written back to the stock item record.
The number of stock items is compared to the re-order level; if it is less than or equal
to this value, more stock items are automatically ordered.
Once an order for more stock items is generated, a flag is added to the record to stop
re-ordering every time the stock item barcode is read.
When new stock items arrive, the stock levels are updated in the database.
70
allows for automatic stock control
possible to check customer buying habits more easily by linking barcodes to, for
example, customer loyalty cards.
Packaging
Promotional materials
Warehouses
Benefits of QR codes
there is no need for the user to write down or key in a website address; scanning the
QR code does this automatically
QR codes can store website addresses/URLs that appear in magazines, trains,
buses or even on business cards, giving a very effective method of advertising.
Data is stored within the pattern, so no need for a connected database
Simple and quick way to store and retrieve information
Can store a variety of information
71
Digital cameras
Digital cameras are input devices that capture images (and sometimes video) digitally. Digital
cameras use an image sensor chip to capture the image, rather
than the film used by a traditional camera.
Interactive Whiteboard
Classrooms
Business board rooms and training centres
72
Keyboards
Keyboards are by far the most common method used for data entry. They are used as the
input device on computers, tablets, mobile phones and many other electronic items.
The keyboard is connected to the computer either by using a USB connection or by wireless
connection. In the case of tablets and mobile phones, the keyboard is often VIRTUAL or a
type of TOUCHSCREEN technology.
Keyboards are a relatively slow method of data entry and are also prone to errors. But they
are probably still the easiest way to enter text into a computer. However, frequent use of these
devices can lead to injuries, such as REPETITIVE STRAIN INJURY (RSI) in the hands and
wrists.
Ergonomic keyboards can help to overcome this problem – these have the keys arranged
differently. They are also designed to give more support to the wrists and hands when doing
a lot of typing.
Pointing devices
The selection of an application often requires the user to ‘click’ on an icon. Selection of the
icon is usually done with a POINTING DEVICE (such as a MOUSE or a TRACKERBALL) or
by using a touchscreen.
Mouse
A mouse is an input device that allows you to control the coordinates and movement of the
onscreen cursor/pointer by simply moving the mouse across a flat surface with your hand.
Mouse comes in various forms:
the more traditional type with a mechanical ball arrangement; connected to the
computer through a USB port
the more modern type that use red LEDs to detect movement in the x-y direction; these
are a type of optical mouse
mice that use either of the above types of technology but use a wireless connection to
the computer.
Most mice are now optical which means they use a laser to detect and track movement across
the surface.
Trackerball
A trackball is an input device used to control a pointer/cursor. Unlike a mouse, the device stays
stationary whilst the user moves the ball within its socket.
Trackballs can be stand-alone devices or combined into a keyboard or control panel. Some
people prefer using a trackball over a mouse as they believe it gives them a finer degree of
control over the pointer. They are also handy for people with limited hand motor skills as they
are less demanding then a mouse.
73
Typical applications for trackballs
Benefits of trackballs
Touchscreens
Touchscreens are now a very common form of input device. They allow simple touch to launch
an application or to carry out many of the functions of pointing devices such as a mouse.
One of the main uses of touchscreen technology is in mobile phones. At present, there are
three major types of touchscreen technologies applied to mobile phone screens:
Smartphones and tablet computers, e.g. easy input of data and selection of apps/icons
Ticket / Information kiosks, e.g. allows limited options that can be selected easily.
Capacitive touchscreens
Electrical current is sent from the four corners of the screen. When your finger (or stylus)
touches the screen, the current changes. This allows the location of the touch to be calculated.
Benefits Drawbacks
Good visibility in sunlight Glass screen can shatter/break on impact
Very durable surface Cannot use wearing standard gloves
Allows multi-touch
74
Resistive touchscreens
Resistive touchscreens use multiple layers of material that transmit electrical currents. When
the top layer of the screen is pushed/touched into the bottom layer the electrical current
changes. This allows the location of the touch to be found.
Benefits Drawbacks
Inexpensive to manufacture Poor visibility in sunlight
Can use stylus, finger, gloved finger or pen Vulnerable to scratching
to operate
Wears through time
Does not allow multi-touch
Infra-red touchscreens
Infra-red touchscreens use a pattern of LED infra-red beams to form an ‘invisible’ grid on the
screen.
Heat-sensitive:
Uses glass as the screen material. Needs a warm object (e.g. fingers) to carry out an input
operation.
Optical:
Uses glass as the screen material. Uses an array of sensors (in the form of a grid), the
point of contact is based on which grid coordinate is touched.
Benefits Drawbacks
Good durability Expensive to manufacture
Allows multi-touch Glass screen can shatter/break on impact
Can use stylus, finger, gloved finger or pen Sensitive to dust and dirt
to operate
Sensors
Sensors are input devices that record data about the physical environment around it. Sensors
send data to a microprocessor (computer). They do not make judgements, decisions or
control any output devices.
There are many types of sensors used in a variety of household, commercial and industrial
applications.
75
Advantages of using sensors
Sensor Application
Magnetic Field Sensor Mobile phones
Anti-lock braking
Detection of cars at traffic lights
Reading magnetic ink characters on cheques
Motion (infra-red) Sensor Automatic doors
Burglar alarm systems
Gaming systems,
Counting, e.g. people or cars
Temperature Sensor Chemical process or reaction
Central heating (thermostat) / air-con
Greenhouses
Ovens, refrigerators and freezers
Sound Sensor Burglar alarm systems
Leak detection system
Moisture / Humidity Sensor Clothes dryer
Environmental control / greenhouse, air-con
Pressure Sensor Burglar alarm systems
Traffic light controls
Chemical processes
Liquid through pipes
Gas Sensor Pollution monitoring (river)
Greenhouse environments
Confined areas (space craft, aircraft)
Fish tanks / aquariums
Carbon monoxide alarms
Light Sensor Controlling street lighting
Burglar alarms (beams of light)
Automatic doors
Greenhouse
pH Sensor Water treatment plants
Pollution monitoring (river)
Aquariums
Greenhouse
76
Types of sensors
Sensors are used in both monitoring and control applications. There is a subtle difference
between how these two methods work:
77
Monitoring applications
A burglar alarm monitoring system will carry out the following actions:
The system is activated by keying in a password on a keypad.
The infra-red sensor picks up the movement of an intruder in the building.
The acoustic sensor picks up sounds such as footsteps or breaking glass.
The pressure sensor picks up the weight of an intruder coming through a door or
through a window.
The sensor data is passed through an ADC if it is in an analogue form to produce
digital data.
The computer/microprocessor will sample the digital data coming from these
sensors at a given frequency (e.g. every five seconds); the data is compared with
the stored values by the computer/microprocessor.
If any of the incoming data values are outside the acceptable range, then the
computer sends a signal to:
• a siren to sound the alarm, or
• a light to start flashing.
A DAC is used if the devices need analogue values to operate them.
The alarm continues to sound/lights continue to flash until the system is reset with a
password.
Control applications
This next sequence shows how a microprocessor is used to control the operation of a street
lamp. The lamp is fitted with a light sensor which constantly sends data to the
microprocessor. The data value from the sensor changes according to whether it is sunny,
cloudy, raining or it is night time etc.
78
The light sensor sends data to the ADC interface.
This digitises the data and sends it to the microprocessor.
The microprocessor samples the data every minute (or at some other frequency
rate).
If the data from the sensor < value stored in memory:
• a signal is sent from the microprocessor to the street lamp
• and the lamp is switched on.
The lamp stays switched on for 30 minutes before the sensor readings are sampled
again (this prevents the lamp flickering off and on during brief heavy cloud cover,
for example).
If the data from the sensor >= value stored in memory:
• a signal is sent from the microprocessor to the street lamp
• and the lamp is switched off.
The lamp stays switched off for 30 minutes before sensor readings are sampled
again (this prevents the lamp flickering off and on during heavy cloud cover, for
example).
ANTI-LOCK BRAKING SYSTEMS (ABS) on cars use magnetic field sensors to stop
the wheels locking up on the car if the brakes have been applied too sharply.
When one of the car wheels rotates too slowly (i.e. it is locking up), a magnetic
field sensor sends data to a microprocessor.
The microprocessor checks the rotation speed of the other three wheels.
If they are different (i.e. rotating faster), the microprocessor sends a signal to the
braking system:
• and the braking pressure to the affected wheel is reduced
• the wheel’s rotational speed is then increased to match the other wheels.
Checking the rotational speed using these magnetic field sensors is done several times
a second and the braking pressure to all the wheels can be constantly changing to
prevent any of the wheels locking up under heavy braking; this is felt as a ‘judder’ on
the brake pedal as the braking system is constantly switched off and on to equalise
the rotational speed of all four wheels.
If one of the wheels is rotating too quickly, braking pressure is increased to that
wheel until it matches the other three.
Output devices
Inkjet printers
79
The ink droplets are produced currently using two different technologies.
Thermal bubble: tiny resistors create localised heat which makes the ink vaporise. This
causes the ink to form a tiny bubble; as the bubble expands, some of the ink is ejected
from the print head onto the paper. When the bubble collapses, a small vacuum is
created which allows fresh ink to be drawn into the print head. This continues until the
printing cycle is completed.
Piezoelectric: a crystal is located at the back of the ink reservoir for each nozzle. The
crystal is given a tiny electric charge which makes it vibrate. This vibration forces ink
to be ejected onto the paper; at the same time more ink is drawn in for further printing.
Laser printers
LASER PRINTERS differ greatly from inkjet printers in the way they print pages. They use dry
powder ink rather than liquid ink and make use of the properties of static electricity to produce
the text and images. Unlike inkjet printers, laser printers print the whole page in one go (inkjet
printers print the page line by line).
Their advantage is the speed at which they can carry out large print jobs (e.g. 2000 leaflets)
and the fact that they don’t run out of ink halfway through.
80
9. Paper finally goes through a fuser (set of heated rollers); heat melts the ink so it is
permanent
10. Discharge lamp removes all electric charge from the drum, ready to print next page
3D printers
They can produce solid objects which actually work. The solid object is built up layer by layer
using materials such as powdered resin, powdered metal, paper or ceramic powder.
Uses of 3D printers
Used for models of cars
Produce solid objects that work
Built up layer by layer, using powdered resin, ceramic powder
A design is made using Computer-aided Design (CAD)
81
2D and 3D cutters
A three-dimensional (3D) laser cutter works in a similar way to a two-dimensional (2D) cutter.
The main difference is that the 3D cutter can recognise an object in the xy-z direction rather
than just x-y.
3D laser cutters can cut the following materials:
glass
crystal
metal
polymer
wood.
Very complex designs can be cut since the cutters are controlled by computers and very
sophisticated software.
A 3D cutter can cut beyond the surface of the material and produce very intricate designs.
It is interesting to contrast this method of shaping objects with 3D printers,
although it is true to say that not all the materials which can undergo 3D cutting can be used
in 3D printing methods.
Actuators
ACTUATORS are used in many control applications involving sensors and devices such as
ADC and DAC.
Loudspeakers/headphones
Sound is produced from a computer by passing the digital data through a DIGITAL TO
ANALOGUE CONVERTER (DAC) and then through an AMPLIFIER, finally the sound
emerges from a (loud)SPEAKER.
The sound is produced by voltage differences vibrating a cone in the speaker housing at
different frequencies and amplitudes:
Modern LCD monitors are back lit using LIGHT EMITTING DIODE (LED)
technology. This gives the image better contrast and brightness. Before the use of LEDs, LCD
monitors used a cold cathode fluorescent lamp (CCFL) as the backlighting method.
82
Essentially, CCFL uses two fluorescent tubes behind the LCD screen which supplies the light
source. When LEDs are used, a matrix of tiny LEDs is used behind the LCD screen. Because
LCD doesn’t emit any light, some form of back-lit technology needs to be used.
LEDs reach their maximum brightness almost immediately (there is no need to ‘warm
up’ before reaching full efficiency)
LEDs give a whiter light which sharpens the image and make the colours appear more
vivid; CCFL had a slightly yellowish tint
LEDs produce a brighter light which improves the colour definition
monitors using LED technology are much thinner than monitors using CCFL
technology
LEDs last almost indefinitely; this makes the technology more reliable and means a
more consistent product
LEDs consume very little power which means they produce less heat as well as using
less energy.
83
Advantages of using OLED compared with existing LEDs and LCDs include:
the plastic, organic layers of an OLED are thinner, lighter and more flexible than the
crystal structures used in LEDs or LCDs
the light-emitting layers of an OLED are lighter; OLED layers can be made from plastic
rather than the glass used in LED and LCD screens
OLEDs give a brighter light than LEDs
OLEDs do not require backlighting like LCD screens – OLEDs generate their own light
since OLEDs require no backlighting, they use much less power than LCD screens
(most of the LCD power is used to do the backlighting); this is very important in battery-
operated devices such as mobile phones
since OLEDs are essentially plastics, they can be made into large, thin sheets (this
means they could be used on large advertising boards in airports, subways, and so
on)
OLEDs have a very large field of view, about 170 degrees, which makes them ideal for
use in television sets and for advertising screens.
Light projectors
84
Digital Light Projectors (DLP)
Uses millions of micro mirrors
the number of micro mirrors and the way they are arranged on the DLP chip determines
the resolution of the image
When the micro mirrors tilt towards the light source, they are on
When the micro mirrors tilt away from the light source, they are off
This creates a light or dark pixel on the projection screen
A bright white light source passes through a colour filter on its way to the DLP chip
White light splits into primary colours
LCD Projectors
Older technology than DLP
A powerful beam of white light is generated from a bulb
This beam of light is then sent to a group of chromatic-coated mirrors; these reflect the
light back at different wavelengths
When the white light hits the mirrors, the reflected light has wavelengths corresponding
to red, green and blue
These three different lights pass through three LCD screens; these screens show the
image to be projected as millions of pixels in grayscale
When the coloured light passes through the LCD screens, a red, green and blue
version of the grey image emerges
Finally, the image passes through the projector lens onto the screen
Loudspeakers
Loudspeakers are output devices that produce sound. When connected to a computer system,
digitized sound stored on a file needs to be converted into sound as follows:
85
The digital data is first passed through a digital to analogue converter (DAC) where it is
changed into an electric current.
This is then passed through an amplifier (since the current generated by DAC will be very
small); this creates a current large enough to drive a loudspeaker.
This electric current is then fed to a loudspeaker where it is converted into sound.
The following schematic shows how this is done:
If the sound is stored in a computer file, it must pass through a digital to analogue converter
to convert binary (digital) data into an analogue form (electric current) that can then drive the
loudspeakers. It shows how the loudspeaker converts the electric current into sound:
86
3.3 Data Storage
87
3.3 Data Storage
Computer storage:
• Primary storage
• Secondary storage
• Off-line storage
Here is a summary of the differences between primary memory and storage devices:
88
Primary storage
Primary storage is also known as ‘primary memory ‘or ‘memory’. Once data has been input
into a computer, it needs to be stored in a place that can be accessed quickly and directly by
the computer’s processor. Primary storage is a computer’s internal storage.
Primary is separated into random access memory (RAM) and read only memory (ROM). Both
types are memory chips.
it is volatile/temporary memory (the contents of the memory are lost when the power
to the RAM is turned off)
it is used to store data, files, or part of the operating system that are currently in use
it can be written to or read from and the contents of the memory can be changed.
RAM is much faster to write to or read from than other types of memory; but its main drawback
is its volatility. RAM is often built into peripherals such as printers. Data to be printed is
transferred to the printer’s RAM, and then the printer prints the data whilst the computer moves
on to other tasks.
Application:
The user may wish to program in their own routines; these new instructions
Would be stored in the RAM chip
The RAM chip will store the data/instructions received from the remote control unit.
89
Dynamic RAM (DRAM)
Each DYNAMIC RAM (DRAM) chip consists of a number of transistors and capacitors. Each
of these parts is tiny since a single RAM chip will contain millions of transistors and capacitors.
The function of each part is:
This type of RAM needs to be constantly REFRESHED (that is, the capacitor needs to be
recharged every 15 microseconds otherwise it would lose its value). If it wasn’t refreshed, the
capacitor’s charge would leak away very quickly, leaving every capacitor with the value 0.
DRAMs have a number of advantages over SRAMs:
90
Read Only Memory (ROM)
ROM is primary storage that can be read from but not written to. Unlike RAM, ROM does not
lose its contents when the computer’s power is switched off. As a result we say that ROM is
‘non-volatile’.
General purpose device use ROM to hold software known as a bootstrap. The bootstrap
contains instructions that determine the basic hardware structure of the computer and
instruction for finding and loading the operating system.
The main features of READ ONLY MEMORY (ROM) can be summarised as follows:
They are non-volatile/permanent memories (the contents of the memory remain even
when the power to the ROM is turned off)
They are often used to store the start-up instructions when the computer is first
switched on (for example, ROM might store the basic input/output system (BIOS))
The data or contents of a ROM chip can only be read; they cannot be changed.
Application
Data is stored in a digital format on the magnetic surface of the disks (platter)
Number of read/write heads can access all of the surfaces of the disk
Each platter will have two surfaces which can be used to store the data
Data is stored on the surfaces in sectors and tracks
HDD have very slow data access compared to RAM
91
Solid state Drives (SSD)
SOLID-STATE DRIVES (SSD) remove this issue considerably. They have no moving parts
and all data is retrieved at the same rate. They don’t rely on magnetic properties; the most
common type of solid-state storage devices store data by controlling the movement of
electrons within NAND chips. The data is stored as 0s and 1s in millions of tiny transistors
within the chip. This effectively produces a non-volatile rewritable memory.
The main difference is the use of NOR chips rather than NAND. This makes them faster in
operation but devices using EEPROM are considerably more expensive than those that use
NAND technology. EEPROM also allows data to be read or erased in single bytes at a time.
Use of NAND only allows blocks of data to be read or erased. This makes EEPROM
technology more useful in certain applications where data needs to be accessed or erased in
byte-sized chunks.
Drawback of SSD
The main drawback of SSD is the questionable longevity of the technology. Most solid state
storage devices are conservatively rated at only 20 GB write operations per day over a three
year period – this is known as SSD endurance.
Off-line storage
Off-line storage is any non-volatile storage device or, medium that is disconnected (off-line) or
removed, from a computer. Typical examples of off-line storage include optical media (CD,
DVD and Blu-ray disks), USB RAM sticks, external hard drives and magnetic tape.
92
CD/DVD disks
93
DVD-RAM
DVD-RAM uses a very different technology to CDs and DVDs. They have the following
features:
Instead of a single, spiral track, they use a number of concentric tracks
Use of concentric tracks allows simultaneous read and write operations to take place.
They allow numerous read and write operations (up to 100 000 times) and have great
longevity (over 30 years) which makes them ideal for archiving.
Blu-ray disks
BLU-RAY DISKS are another example of optical storage media. However, they are
fundamentally different to DVDs in their construction and in the way they carry out read–write
operations.
The main differences between CD,DVD and Blue ray are:
• A blue laser, rather than a red laser, is used to carry out read and write operations; the
wavelength of blue light is only 405 nanometres (compared to 650 nm for red light).
• Using blue laser light means that the ‘pits’ and ‘bumps’ can be much smaller; consequently,
Blu-ray can store up to five times more data than normal DVD.
• Blu-ray uses a single 1.1 mm thick polycarbonate disk; normal DVDs use a sandwich of two
0.6 mm thick disks.
• using two sandwiched layers can cause BIREFRINGENCE (light is refracted into two
separate beams causing reading errors); because Blu-ray uses only one layer, the disks don’t
suffer from birefringence.
• Blu-ray disks automatically come with a secure encryption system which helps to prevent
piracy and copyright infringement.
94
How flash memory works
Large electric current used to force electrons through a barrier and trap them on the other
side. They remain on the other side until “flashed” with a new current, hence the name.
Trapped (charged) or not trapped = 0 or 1.
Virtual Memory
If the amount of available RAM is exceeded due to multiple programs running, it is likely to
cause a system crash. This can be solved by utilizing the hard disk drive (or SSD) if we need
more memory. This is the basis behind virtual memory.
Essentially RAM is the physical memory, while virtual memory is RAM+swap space on the
hard disk or SSD.
It is possible to show the differences between using normal memory management and virtual
memory management in two simple diagrams.
95
The main benefits of virtual memory are:
Programs can be larger than physical memory and still be executed
There is no need to waste memory with data that isn’t being used (e.g. during error
handling)
It reduces the need to buy and install more expensive RAM memory (although as
mentioned earlier there are limits to the value of doing this).
Cloud Storage
Cloud storage is a method of data storage where data is stored on remote servers. The same
data is stored on more than one server in case of maintenance or repair, allowing clients to
access data at any time. This is known as data redundancy. The physical environment is
owned and managed by a hosting company and may include hundreds of servers in many
locations.
96
There are three common systems:
Public Cloud: this is a storage environment where the customer/client and cloud storage
provider are different companies.
Private Cloud: The private cloud is defined as computing services offered either over the
Internet or a private internal network and only to select users instead of the general public.
Hybrid Cloud: this is combination of the two above environments, some data resides in the
private cloud and less sensitive/less commercial data can be accessed from a public cloud
storage provider.
97
3.4 Network Hardware
98
NETWORK HARDWARE
Network Interface Card (NIC):
A network interface card (NIC) is needed to allow a device to connect to a network (such as
the Internet). It is usually part of the device hardware and contains the Media Access Control
(MAC) address generated at the manufacturing stage.
While the standard NIC is a plastic circuit board that slides into a computer to connect with
the motherboard, there are multiple ways this connection can occur:
Wireless
Wired
USB
Fiber optics
A MAC address is usually made up of 48 bits which are shown as six groups of hexadecimal
digits (although 64-bit addresses are also known):
NN – NN – NN – DD – DD – DD
or NN:NN:NN:DD:DD:DD
Where the first half (NN – NN – NN) is the identity number of the manufacturer of the device
and the second half (DD – DD – DD) is the serial number of the device.
99
Types of MAC address
It should be pointed out that there are two types of MAC address: the UNIVERSALLY
ADMINISTERED MAC ADDRESS (UAA) and the LOCALLY ADMINISTERED MAC
ADDRESS (LAA).
The UAA is by far the most common type of MAC address and this is the one set by the
manufacturer at the factory. It is rare for a user to want to change this MAC address.
However, there are some occasions when a user or an organisation wishes to change their
MAC address. This is a relatively easy task to carry out but it will cause big problems if the
changed address isn’t unique.
There are a few reasons why the MAC address needs to be changed using LAA:
Certain software used on mainframe systems needs all the MAC addresses of devices
to fall into a strict format; because of this, it may be necessary to change the MAC
address of some devices to ensure they follow the correct format.
It may be necessary to bypass a MAC address filter on a router or a firewall; only MAC
addresses with a certain format are allowed through, otherwise the devices will be
blocked.
To get past certain types of network restrictions it may be necessary to emulate
unrestricted MAC addresses; hence it may require the MAC address to be changed on
certain devices connected to the network.
IPv4 is based on 32-bits and the address is written as four groups of eight bits. For
example: 254.25.28.77
IPv6 is based on 128-bits address and it take the form of eight groups of hexadecimal
digits. For example A8FB: 7A88:FFF0:0FFF:3D21:2085:66FB:F0FA
IPv6 has been designed to allow the internet to grow in terms of the number of hosts
and potential increase in the amount of data traffic.
100
101
Static and dynamic IP addresses
Dynamic IP addresses are assigned by the ISP each time a device logs onto the internet.
This is done using Dynamic Host Configuration Protocol (DHCP). A computer on the internet,
configured as a DHCP server, is used by the ISP to automatically assign an IP address to a
device.
102
Routers
Routers enable data packets to be routed between different networks, for example, to join a
LAN to a WAN. The router takes data transmitted in one format from a network (which is using
a particular protocol) and converts the data to a protocol and format understood by another
network. Thereby allowing them to communicate.
The router’s main function is to transmit internet and transmission protocols between two
networks and also allow private networks to be connected together.
Routers inspect the data package sent to it from any computer on any of the networks
connected to it. Routers can be wired or wireless devices.
103