Professional Documents
Culture Documents
Contents
Memory Hierarchy................................ ................................ ................................ ......................... 2 USB , Wi-Fi and scanner ................................ ................................ ................................ ............... 2 Instruction set, clock speed , bandwidth ................................ ................................ ......................... 3 Strucuture of CPU and data movement................................ ................................ ........................... 3 History of the development of computers and communications systems ................................ ......... 4 Mobile communications technology................................ ................................ ............................... 4 VPN and its security ................................ ................................ ................................ ...................... 5 Logic gates in computer technology (refer to class note)................................ ................................ . 5 Truth table, simplification with KMAP(refer to class note and exercises) ................................ ....... 5 Mail Server, Proxy Server ,Web Server and Application Server ................................ .................... 5 Network Operating System ................................ ................................ ................................ ............ 5 Multi-media and hardware requirements ................................ ................................ ........................ 6 Twisted Pair and Fibre Optics Cabling ( refer to class lecture) ................................ ........................ 6 Baseband, Broadband, Asynchronous transmission, Synchronous transmission .............................. 6 Compare and contrast the use of magnetic and optical disk storage systems................................ .... 6 Hard-disk calculation ................................ ................................ ................................ ..................... 7 Command Line Interface(CLI) vs Grafical User Interface(GUI) ................................ ..................... 7 FTP and SMTP ................................ ................................ ................................ .............................. 8
Memory Hierarchy
Answer Pointers
Ideally, all computer memory should be fast (access time low so that the CPU can read data without having to slow down), cheap, non-volatile (retain data without power), high density (the memory elements should store large qualities of data and use little energy (i.e., low power consumption prolongs the life of the computer, saves energy, and make portable computing possible). No real memory has all these attributes. However, by means of memory management techniques it is possible to use several different types of memory in a computer and obtain a performance close to the ideal of fast, cheap, non-volatile memory. The key point in this answer is that students should appreciate that different memories have different properties in particular speed, density, and volatility, and that different types of memory can be combined to overcome the limitation of individual technologies.
USB also supports plug and play. This means that a new device can communicate with the PC and provide its own device drivers removing many of the problems of locating and loading a device driver for a new peripheral. WiFi is a wireless-based local area network based on the IEEE 802.11 standards. Originally, WiFi was used to link computers. Today, it is used to link computers, laptops, video consoles, MP3 players, smartphones, printers, and even disk drives. In many ways, WiFi performs a similar role to USB by linking together modern electronic devices. WiFi now plays an important role in mobile computing. Many public areas (stores, hotels, libraries and public buildings, restaurants, airports, and even trains) have so-called WiFi hot spots where WiFi-enabled devices may be used often without payment. The main use of WiFi away from the home/office is to access the internet for browsing, email, and downloading programs/data/multimedia. A disadvantage/danger of WiFi is that it is potentially open to eavesdropping (although it is possible to use secure encryption modes. The range of WiFi is typically 32m indoors. However, by means of directional antennas ranges of several kilometres are possible. Modern versions of WiFi permit speeds of 54Mbps and 108 Mbps. A potential problem is that the growth in the use of WiFi may create bottlenecks as the radio spectrum allocated to WiFi is limited. The principal properties/characteristics of a scanner are : Type (drum, flatbed, handheld) Media size (e.g., up to A4 paper for a flatbed scanner). Resolution (the number of dots/pixels per inch in both the x and y axes) Speed (time to scan a document) Interface (connection to the host computer SCSI, parallel, serial, USB , wireless) Physical parameters (weight, physical dimensions, power consumption, noise level)
The diagram describes the structure of a CPU. Different candidates will describe the processor in different ways. However, the key features are the program counter that contains the address of the next instruction to be executed. The program counter is connected to the program and data memory. The processor reads the current instruction and transfers it (via the memory buffer register) to the instruction register. A CPU has at least one data register and buses between the data register and memory buffer register to the ALU where operations are carried out. The output of the ALU is connected to both the data register (accumulator) and the memory buffer register (in order to write results into memory).
Disadvantages of mobile communications technology: Security Mobile systems are more vulnerable to security breaches due to their broadcast. Users need to be aware of the dangers and take necessary actions to make sure their wireless communications are secure. Effective range All mobile communications systems have limits on their range and this can be frustrating for users. This means that if you are planning to make a call, you cant do so.
Logic gates in computer technology (refer to class note) Truth table, simplification with KMAP(refer to class note and exercises) Mail Server, Proxy Server ,Web Server and Application Server
Mail Server - move and store mail over corporate networks (via LANs and WANs) and across the Internet. Proxy servers sit between a client program (typically a Web browser) and an external server (typically another server on the Web) to filter requests, improve performance, and share connections. A Web server serves static content to a Web browser by loading a file from a disk and serving it across the network to a user's Web browser. This entire exchange is mediated by the browser and server talking to each other using HTTP. An application server occupies a large chunk of computing territory between databases and the end user and they often connect the two.
Reliability: Making sure the network is available to users and responding to hardware and software malfunctions Resource Management: Range of tasks provided on hardware and software; e.g. connections, memory management, router/switch functions, etc.
Twisted Pair and Fibre Optics Cabling ( refer to class lecture) Baseband, Broadband, Asynchronous transmission, Synchronous transmission
Baseband : The original band of frequencies of a signal before it is modulated for transmission at a higher frequency. A type of data transmission in which digital or analog data is sent over a single unmultiplexed channel, such as an Ethernet LAN. Baseband transmission sends simultaneous bits of data along the full bandwidth of the transmission channel. Broadband : A type of data transmission in which a single medium (wire) can carry several channels at once. Cable TV, for example, uses broadband transmission. In contrast, baseband allows only one signal at a time. Asynchronous transmission - Not synchronized; that is, not occurring at predetermined or regular intervals. The term asynchronous is usually used to describe communications in which data can be transmitted intermittently rather than in a steady stream. For example, a telephone conversation is asynchronous because both parties can talk whenever they like. If the communication were synchronous, each party would be required to wait a specified interval before speaking.
Compare and contrast the use of magnetic and optical disk storage systems
A few years ago, hard disks had small capacities (well below 1 GBytes) and the CD ROM had a relatively large capacity (600 Mbytes) but was read-only except in a few very expensive writable systems. In those days, the hard disk was used to hold programs and data and the CD was largely a means of transporting programs. Today, the situation has changed considerably. The highest capacity magnetic hard drives available in 2007 are 750 GBytes, which is three orders of magnitude larger than the CD. A modern hard disk has an acc ess time of the order of 4 ms. On-board caching (4 or 8 Mbytes) is used to increase disk performance. Note that the access time of hard disks has not increased significantly over the years because of their electro-mechanical nature. There has also been significant improvement in optical storage technology over the last decade in terms of cost, capacity and functionality (read/write), although optical storage systems (like their magnetic memory counterparts) have not become significantly faster over the years. Magnetic disks record information by magnetizing tiny regions of the surface under the read/write head. Data is recorded along concentric circular tracks. The time to step from track-to-track is far faster in a magnetic disk than an optical disk. All optical storage uses a sequence of bumps (pits and land) that are stored along a helical track on a disk. A laser light follows the track and uses light reflected from the disk surface to detect the stored data. Optical storage is intrinsically unreliable and sophisticated error-correcting codes are used to deal with relatively large numbers of dropped (corrupt) bits. Seeking data in an optical store is slow because of the mass (inertia) of the head. The CD has a capacity of about 600 Mbytes. The DVD is a replacement for the CD which uses virtually identical technology. However, modern manufacturing processes have allowed the system to be scaled down to fit more bits on the disk (typically 4.7 GBytes). Sophisticated focusing mechanisms have allowed two pla nes of data (dual layer) within a DVD which has doubled the capacity to over 9 GBytes. In recent yeas, the cost of writable (usually write once) disks and readers has declined. A disk can be written by using a laser to ablate the surface leaving an underlying reflective layer visible. Re-writable disks are also available and these exploit a magneto-optical property of the surface (rotatable polarization).
Unfortunately, there is no single standard for the DVD. Fortunately, most readers and writers are mult istandard. The DVD is largely used to transport large programs (e.g. those with large databases or maps) and to archive data. This is particularly important in the world of digital photography and digital video which have unlimited storage requirements. At the moment, two new optical storage mechanisms are becoming available (both are modified DVDs). Blu -ray has a capacity of 50 GByte/disk and high density DVD, HD-DVD, has a capacity of 15-45 GBytes. Unfortunately, these mechanisms are mutually incompatible. Such large storage mechanisms are required for both high definition video and backing up the increasingly low-cost large magnetic disk drives.
Hard-disk calculation
A hard disk rotates at 15,000 revolutions per minute. A track contains 63 sectors. i) For this disk calculate the average rotational latency. ii) Calculate the time taken to read a sector once it has been located. iii) Calculate the rate at which data is read from a sector (the speed at which data comes from the disk sector is being read the units are bits/second). Assume that a sector contains 4,096 bits. i)The average rotational latency is period of revolution. 15,000 rpm is 15,000/60 = 250 revolutions/second. So, 250 revolutions= 1second= 1000ms 1 revolution= 1000/250 ms= 4 ms The average rotational latency is period of revolution. So, rotational latency 4ms/2= 2ms ii) 1 revolutions reads all 63 sectors which takes 4ms time so 1 sector can be read on 4ms/63= 0.063 ms iii) 1 sector contains 4096 bits so rate is 4096/0.063 bits/ms =65015 bits/ms =65015Mbits/s
which a