Computer Architecture Essay

1344 words - 6 pages

2/3/2014
Week 4 Assignment 1 Computer Architecture

John von Neumann was a mathematician and polymath who was born on December 28 1903 and while he made major contributions to a number of fields the one we care about in the IT field is von Neumann Architecture. In 1946 he co wrote a paper with Arthur W. Burks and Hermann H. Goldstine and out lined what would be need for a general purpose electronic computer. The title of the paper was “Preliminary Discussion of the Logical Design of an Electronic Computing Instrument” ( von Neumann , 2000) and the idea of the paper would have far reaching impacts on the field of computer science and would lead the design and building of the first ...view middle of the document...

The system bus of computers architecture is a subsystem that transfers information from computer components inside a computer. A bus defines its set of connectors to physically plug devices, cards or cables together. About 30 years ago the processors we so slow that the processor and the bus were synchronized and there was only one bus in a machine. As computers got more complicated they broke the system bus down into three parts the Front side bus, Backside Bus and PCI Cards. (Abbott, 2004) The front side bus is the physical connection that links most of the components in the computer this includes RAM, hard drives and PCI slots. The Backside bus is a separate usually works at the same speed as the processor and handles all the caching work as efficiently as possible. In the pass the cache was a separate chip the need a lot of memory but as computers has evolved it was integrated into the main processor. In a lot of system design since the cache is not about of the processor most people don’t think the backside bus counts a system bus anymore. PCI are system buses that can be added or removed as need and connect up to five external components the five connectors of an external component can be replaces for two fixed devices on the motherboard. PCI card use either a 47 pin or 49 pin to connect and can work without CPU intervention. (Abbott, 2004) The PCI bus can work with so few pins because of multiplexing this means that more than a single signal can be sent at one time over a single pin. In 1991 Intel proposed the PCI standard however it didn’t get any real fame until Windows 95 mostly because windows supports a new feature called Plug and Play.
A great leap in computer science was the introduction of Boolean or Boolean logic which is a subset of algebra used to create true/false statement. You might ask yourself how this works with programming but since computers use ones and zeros for programming you can use the true and false statements to mean 1 for true and 0 for false. (brown, 2012)In the end you get complex programming by linking strings of Boolean statements together as logic gates. Logic gates are the fundamental building concepts most logic gates use two inputs of binary values. Some circuits can have more than one logic gate such as microprocessors which have millions of them. When you combine millions of logic gates it’s possible to perform highly complex operations. The number of logic gates depends on the size of the microchip involved However how does Boolean logic work well Boolean logic is made or three basic expressions known as AND, OR, NOT and these expression when used correctly return a true or false statement. (brown, 2012)Here are some examples of Boolean expressions.
x...

Other Papers Like Computer Architecture

Computer Security Essay

1909 words - 8 pages good news is that you can take some simple steps to reduce the chance that you’ll be affected by the most common threats – and some of those steps help with both the intentional and accidental risk you’re likely to face. Before we get to what you can do to protect your computer or home network you must first understand the computer and home network architecture. Creating an effective network environment requires taking a variety of

Conservative Dignity Of Few To Modern Flair Of Many

1269 words - 6 pages Philip Scattergood Serena Potter ART 100 16 May 2016 Past Conservative Dignity of Few to a Present Modern Flair of Many Neoclassical residential architecture was mainly evident in the homes of only a few members of society that displayed the dignity of the lives of their owners, a product of Social History. Since then progress in the Arts and modern technology has led to postmodern residential architecture that has flair that many members

Networking

428 words - 2 pages amount of storage available on the CPU whose contents can be accessed more quickly than storage available elsewhere. Most, but not all, modern computer architectures operate on the principle of moving data from main memory into registers, operating on them, then moving the result back into main memory—a so-called load-store architecture. A common property of computer programs is locality of reference: the same values are often accessed repeatedly; and holding these frequently used values in registers improves program execution performance.

Computer Hardware

521 words - 3 pages Computing hardware evolved from machines that needed separate manual action to perform each arithmetic operation, to punched card machines, and then to stored-program computers. The history of stored-program computers relates first to computer architecture, that is, the organization of the units to perform input and output, to store data and to operate as an integrated mechanism. Before the development of the general-purpose computer, most

Ebay

774 words - 4 pages . N. Abdolvand 2 5/14/2016 Telecommunications and Networking in Today’s Business World What is a computer network? Two or more connected computers Major components in simple network Client computer Server computer Network interfaces (NICs) Connection medium Network operating system 5 © Prentice Hall 2011 Telecommunications and Networking in Today’s Business World Components of networks in large companies Hundreds of

The Internet Postive And Negative

1953 words - 8 pages protocol, the addressing system, the service that offers domain names, and the client-server paradigm, your internet application.1 1.KNU. “Internet Building blocks” Internet Technology. Networking technology, the interconnecting of computers, is the foundation for the World Wide Web computer systems have a recursive type of structure that stores and processes elements that are connected to one another to build larger elements. Architecture

Computers

779 words - 4 pages In this lab, you will demonstrate the ability to examine and investigate the different types of motherboards and CPUs used in a computer. Required Setup and Tools Photos of motherboards and CPUs are provided in the lab worksheet. However, if possible, the case cover of a desktop computer should be removed in order to get a look inside the system at the motherboard. The system should be unplugged and off when this work is done. You also need

Trusted Computing: Real Security For Today’S Advanced Threats

427 words - 2 pages TRUSTED COMPUTING: REAL SECURITY FOR TODAY’S ADVANCED THREATS DEMONSTRATION OVERVIEW Compliance-Grade Endpoint Encryption at a Fraction of the Cost Organizations, both large and small, understand that centralized encryption management is a critical component to their security architecture. Wave’s software provides the policy-based access controls, comprehensive reporting, directory services integration, centralized control and end-user

Mike

397 words - 2 pages INTRODUCTION TO COMPUTER INDUSTRIAL CHEMISTRY ELECTROTECHNOLOGY I APPLIED PHYSICS WATCHKEEPING MACHINE SHOP 2 PHILIPPINE HISTORY AND CULTURE 2ND SEM Units 3 3 2 3 4 1 3 3 2 2 24 26 3RD YEAR ELEC 2 ENG 7 MARPP 1 MASHOP 3 THERMO 1 PE 4 ELECTRONIC TECHNOLOGY 2 TECHNICAL WRITING W/ ORAL COMM MARINE POWER PLANT I(DIESEL) MACHINE SHOP 3 MARINE THERMODYNAMICS 1 PHYSICAL EDUCATION 4 Subject Name AUMAC 104 AUXILLARY MACHINERY 1 Units 4 4 3 4 3 4 2

Cloud Computing

415 words - 2 pages Cloud Computing Abstract: In this fast computerized world, cloud computing is one of the emerging technology in today's life and plays a major key role in changing the aspects of the computer world as many organizations have started using it from day to day life. The main purpose of "The Cloud" is what kind of models/architectures it offers for research and development in this digital world. Cloud computing primarily focuses on sharing data

Cio Organization Paper

1041 words - 5 pages Determines the Business Terminal Manager Optimization and sequence of Architecture Freight tracking freight pickup by System zip code input of origin and destination information of freight are grouped by zip codes. The dispatcher decides which zip codes will be loaded in a truck and what sequence it will be loaded for delivery and sent out in the morning. Pickups are handled by the

Related Essays

Hardware & Software Concepts Essay

572 words - 3 pages 1. Why is a peer-to-peer architecture not desirable in a business environment? Peer-to-peer architecture is not desired in a business environment because it is difficult or impossible to establish centralized control to restrict inappropriate access and to ensue data integrity. 2. How many instructions can be executed by a single computer’s CPU at a time? A single CPU can only process one instruction at a time. 3. What are the 4

Vinegar Battery Essay

595 words - 3 pages microcontroller. Instruction Set: CISC- CISC means complex instruction set computer, it allows the user to apply 1 instruction as an alternative to many simple instructions. RISC- RISC means Reduced Instruction Set Computers. RISC reduces the operation time by shortening the clock cycle per instruction. Memory Architecture: Harvard Memory Architecture Microcontroller Princeton Memory Architecture Microcontroller Microcontroller Applications

Web Application Essay

2759 words - 12 pages CSC581: Advanced Software Engineering Web Application Architectures Manar Alqarni Abstract As the difficulty of web application grows, the need to develop an architecture for the web application is become necessary in order to support and guide an organization for web system planning, maintenance, deployment, building and design. This research paper presents an abstract view for web application architecture and it will be

Information Systems Essay

682 words - 3 pages information systems There are five major components that needs to be in place in order for information systems to operate properly. The first component is hardware which is basically the physical aspects of computer parts such as monitors, motherboards, keyboards, mouse, and speakers. Software is the second component, which is the instructions for computers (5 key components of an information system?, 2014). Another major component is data, which