Computer Architecture
Computer Architecture
.
(b) Positive Denary to Positive Hexadecimal
To convert denary to hexadecimal, divide by 16 and record the remainders:
For example, converting denary 255:
1. 255÷16=15255÷16=15 remainder 15 (F)
2. 15÷16=015÷16=0 remainder 15 (F)
Thus, denary 255 is represented as FF in hexadecimal
.
(c) Positive Hexadecimal to Positive Binary
Each hexadecimal digit can be converted directly to a four-bit binary
equivalent:
F → 1111
A → 1010
For example, hexadecimal FA converts to binary as 11111010
.
2. Hexadecimal Representation
Hexadecimal is beneficial for humans because it provides a more compact
representation of binary data. For instance, one hexadecimal digit
corresponds to four binary digits (bits), making it easier to read large binary
numbers
2
.
2. Methods of Data Transmission
2.1 Types of Transmission
Data can be transmitted using various methods, each with its advantages
and disadvantages:
Serial Transmission: Data is sent one bit at a time over a single
channel.
Advantages: Simplicity and reduced cost.
Disadvantages: Slower than parallel transmission.
Parallel Transmission: Multiple bits are sent simultaneously over
multiple channels.
Advantages: Faster than serial transmission.
Disadvantages: More complex and susceptible to interference.
Simplex: Data can only flow in one direction (e.g., keyboard to
computer).
Half-Duplex: Data can flow in both directions but not simultaneously
(e.g., walkie-talkies).
Full-Duplex: Data can flow in both directions simultaneously (e.g.,
telephone calls).
2.2 Suitability of Transmission Methods
The choice of transmission method depends on specific scenarios:
For high-speed connections over short distances, parallel
transmission may be suitable (e.g., internal computer buses).
For long-distance communication, serial transmission is often
preferred due to its simplicity and reliability.
3. Universal Serial Bus (USB) Interface
The USB interface is a widely used standard for connecting devices and
transmitting data:
It allows for both data transfer and power supply to connected devices.
USB supports multiple data transfer modes, including low-speed (1.5
Mbps), full-speed (12 Mbps), and high-speed (480 Mbps).
It simplifies connections by allowing plug-and-play functionality and
supports multiple devices through hubs.
4. Error Detection Methods
4.1 Need for Error Checking
Errors can occur during data transmission due to various factors like
interference or signal degradation. To ensure data integrity, error detection
methods are employed.
4.2 Common Error Detection Techniques
1. Parity Check:
Uses an additional bit (parity bit) to ensure that the total number
of bits with value one is even (even parity) or odd (odd parity).
Simple but limited in detecting multiple errors.
2. Checksum:
A value calculated from a data set that is sent along with the
data; the receiver recalculates it to check for errors.
3. Echo Check:
The sender receives back a copy of the transmitted data to verify
correctness.
4. Check Digit:
A digit added to a number (like ISBN or barcodes) used to
validate that the number has been entered correctly by
performing calculations based on its digits.
5. Automatic Repeat Request (ARQ):
A method where acknowledgments are used to confirm receipt of
packets; if an acknowledgment isn’t received within a specified
time, the packet is retransmitted
Computer Architecture
Computer architecture refers to the design and organization of a computer's
components, particularly the central processing unit (CPU). This section
covers the roles of the CPU, its components, and how they interact within a
Von Neumann architecture.
.
5. Embedded Systems
5.1 Purpose and Characteristics
Embedded systems are specialized computing systems designed to perform
dedicated functions within larger systems. They are typically found in
devices such as:
Domestic appliances (e.g., microwaves)
Automotive systems (e.g., engine control units)
Security systems
Industrial machines
Unlike general-purpose computers, embedded systems are optimized for
specific tasks, often with constraints on power consumption and processing
capabilities
Interactio
n Operates in the background Directly interacts with users