2.1 Hardware and Communication

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/106

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

107 Terms

1
New cards

Computer architecture

It describes how a computer is theoretically put together.

2
New cards

Describe the Von Neumann Machine.

The Von Neumann Machine is a computer architecture that stores both data and program instructions in the same memory. It uses a single processor to fetch, decode, and execute instructions in a linear sequence. (Input, Process, Output)

<p>The Von Neumann Machine is a computer architecture that stores both data and program instructions in the same memory. It uses a single processor to fetch, decode, and execute instructions in a linear sequence. (Input, Process, Output)</p>
3
New cards

What are the advantages of Von Neumann architecture?

- It can process nearly all types of data
- cheaper than alternative methods.

4
New cards

What are the disadvantages of Von Neumann architecture?

Can be slower than alternative methods;
can be limited by the bus transfer rate;
doesn't always make maximum use of the CPU;
Poorly written programs can get their data mixed up as both programs and data share the same memory.

5
New cards

Components of the CPU

ALU, Control Unit, Registers, Memory, Input, Output

<p>ALU, Control Unit, Registers, Memory, Input, Output</p>
6
New cards

ALU

Arithmetic Logic Unit carries out calculations and logical operations in the CPU. This is the main point where inputs and outputs interact

<p>Arithmetic Logic Unit carries out calculations and logical operations in the CPU. This is the main point where inputs and outputs interact</p>
7
New cards

Registers

  • Specialized storage locations in the CPU that hold data and instructions for quick retrieval and processing.

  • They provide high-speed access, as they run at the same speed as the processor, to frequently used data, improving overall processing efficiency.

  • They are the fastest memory and play a big role improving efficiency

8
New cards

Control Unit

Control unit is part of the CPU that executes instructions

9
New cards

Input

Input is devices used to give instructions to the computer

10
New cards

Output

Output is the devices used to display or produce results

11
New cards

Name the special registers used in the Von Neumann architecture.

PC (Program Counter)
CIR (Current Instruction Register)
MAR (Memory Address Register)
MDR (Memory Data Register)
ACC (Accumulator)

12
New cards

Program Counter (PC)

PC stores the location (address) of the next instruction in a program to be executed
When it is time to fetch the next instruction, the content of the program counter (PC) is loaded into the memory address register (MAR).

13
New cards

Current Instruction Register (CIR)

The Current Instruction Register (CIR) holds the current instruction ready for decoding and execution by the control unit.

14
New cards

What is opcode and operand?

Operand - the data or memory address an instruction operates on

Opcode - machine code that specifies the action performed in the instruction

15
New cards

Memory Address Register (MAR)

MAR temporarily stores the address of the next data or instruction in main memory. It is connected to the address bus.
This address is passed to RAM by means of the address bus.

16
New cards

Memory Data Register (MDR)

The Memory Data Register (MDR) holds the contents of the memory at the location stored in the Memory Address Register (MAR) temporarily after they are copied from main memory.

Data is passed in both directions through the MDR but program instructions go only one way from main memory to the CPU

The movements between CPU and MDR, MDR and main memory are made via the data bus

17
New cards

Accumulator (ACC)

ACC temporarily stores various pieces of data within the CPU.

All data to be processed or that has been processed, or results of calculations made by the Arithmetic Logic Unit (ALU), is temporarily stored within the accumulator.

18
New cards

What is the role of the fetch-decode-execute cycle?

The fetch-decode-execute cycle is used to process instructions in the Von Neumann architecture. It involves fetching the next instruction from memory, decoding it, and executing it.

19
New cards

What is pipelining

Pipelining allows for mulitple parts of the processor to operate in parrallel, meaning the accumulator can operate while new instructions are fetched. So one instruction can be fetched while the previous one is being decoded and registered (This is the point of separate registers, advantage of FDE). This improves efficiency

20
New cards

Steps in the Fetch process

1. The PC stores the address of the next instruction. The instructions are held sequentially in the memory, so the value in the PC is incremented so that it will always point to the next instruction to be carried out.

2. The address of the next instruction is copied from the PC to the MAR and the address is looked up in memory

3. The data that is stored at the memory (RAM) address in the MAR is then copied to the MDR. (Could Take a number of clock cycles depending on if the instruction is in cache memory)

4. Once it is ready to be executed, the executable part of the instruction is copied into the CIR.

21
New cards

Steps in the Decode process

  1. The opcode (Operation Code/Machine code) is decoded so execution can take place

  2. The contents of the MDR is copied over to the CIR

  3. Instructions are then decoded and executed from the CIR

  4. While this happens new instructions are being fetched which allows for efficient use of memory and clock cycles

22
New cards

Fetch-Decode-Execute Cycle

1. Load the address that is in the program counter (PC) into the memory address register (MAR).

2. Increment the PC by 1 to point to the next instruction to be executed.

3. Load the instructions that are in the memory address given by the MAR into the MDR.

4. Load the instruction that is now in the MDR into the current instruction register (CIR).

5. Decode the instruction that is in the CIR.

6. Execute the instruction.

7. Reset by going to step 1.

<p>1. Load the address that is in the program counter (PC) into the memory address register (MAR).<br><br>2. Increment the PC by 1 to point to the next instruction to be executed. <br><br>3. Load the instructions that are in the memory address given by the MAR into the MDR.<br><br>4. Load the instruction that is now in the MDR into the current instruction register (CIR).<br><br>5. Decode the instruction that is in the CIR.<br><br>6. Execute the instruction.<br><br>7. Reset by going to step 1.</p>
23
New cards

What is a jump (JMP) command?

  • A jump breaks the FDE cycle and forces it to start from scratch

  • This happens because the next instruction fetched is not the next one in the sequence

  • A jump will slow down the processor due to the break in the cycle and lose the benefits of pipelining

24
New cards

What is the purpose of incrementing the PC?

To point to the next instruction in sequence

25
New cards

What is the difference between the fetch and execute processes?

Fetch: retrieves instructions
Execute: carries out instructions

26
New cards

What is the role of the control unit (CU)?

The control unit manages the flow of data and instructions between the CPU and memory. By:

  1. Retrieving an instruction from memory

  2. Decodes he instruction

  3. It then generates control signals to send to other components of the CPU (like the ALU, and memory) or to other components through the connected Control Bus

27
New cards

What are the different types of memory used in computers?

Registers, RAM (Random Access Memory), Cache, and secondary storage (such as hard disks, optical disks, and solid-state storage devices)

28
New cards

Random Access Memory (RAM)

• RAM (Random Access Memory) holds programs and associated data when an application is running.

• RAM holds the operating system.

• RAM is composed of cheap semiconductor devices.

• A large amount of RAM allows more data and larger sections of programs to be held in electronic memory, reducing the number of slow disk operations or virtual memory

29
New cards

Why do we need chaching?

  • When a program is run it loads instructions from main memory

  • Memory is slower than the processor and therefore the processor will have to wait for main memory to fetch data (wastes clock cycles, reduces efficiency)

  • This is the von neuman bottle neck so we need cache to be a middle main as it is much faste

30
New cards

Cache

• Cache is small, extremely fast memory.

• Cache holds intermediate data while processing is carried out.

• Cache can be located on or very near the processor.

• Cache much faster to access than RAM main memory.

• Cache is made from logic devices, so it is more expensive than main memory.

• A large cache size reduces the need for slower access to RAM main memory.

• Cache memory attempts to solve the "Von Neumann Bottleneck" where the processor runs much faster than the memory by acting as a middleman between the main memory and the registers.

• Data and instructions that are used regularly are stored in cache and retrieved by the processor when necessary.

• When the cache is full, the least recently used data is discarded.

• Algorithms try to avoid a cache miss (when data has to be fetched from main memory rather than cache).

31
New cards

What are cache levels used for?

Due to high cost of cache memory, multiple levels of cache (L1, L2, L3) are used to optimize performance. Each level with varying speeds and sizes,.

32
New cards

What are the cache levels?

  • Level 1: Small and Fast embedded in the CPU

  • Level 2: Higher capacity but slower, on the CPU dedicated to a single or pair of cores, could be located on a separate chip to avoid being slowed down by traffic on the main bus

  • Level 3: Improves performance of the L1 and L2 cache and normally shared by all cores, largest and slowest cache but much faster than RAM

33
New cards

What is the difference between RAM and cache?

RAM is the main memory of the computer, while cache is a small, fast memory located near the processor that stores frequently used data and instructions.

34
New cards

What is the clock speed and how does it affect performance?

Clock speeed is the speed of the processor. It is measured in cycles per second and determines how many instructions the CPU can execute in a given time, as each instruction requires a fixed number of clock cycles. Higher clock speeds typically lead to better performance.

35
New cards

How many Clock Cycles are in a GHz?

One billion clock cycles. e.g. 1.8GHz is 1,800,000,000 Cycles

36
New cards

What other factors affect CPU performance?

  • Clock Speed

  • Threading Type (Hyper Or MultiThreading)

  • Number of Cores

  • UnderVolting - Reducing Power

  • (Over/Under)clocking

  • Cache Size

37
New cards

Difference between Underclocking and Undervolting

  • Underclocking decreases the CPU's clock speed to reduce power consumption and heat, but affecting performance

  • Undervolting lowers the voltage supplied to the CPU, often improving efficiency without affecting performance drastically. (Saving on Energy and Power)

38
New cards

What is Overclocking?

  • Overclocking increases the performance of the CPU by setting the clock rate above the manufacturers specified rate, which allows faster data processing and improved performance

39
New cards

What are some dangers of overclocking?

  • An Overclocked component operates outside the recomnded conditions which creates unpredicatble errors that may lead to system instability and data loss

  • Overclocking can void warranty and reduce life span of the CPU

  • It can also lead to excessive heat generation, requiring improved cooling solutions to avoid thermal damage and using more energy. (If the temperature is not regulated the component can shut down)

40
New cards

What is the von Neumann bottleneck

  • The CPU can process instructions faster than memory can supply data, which results in idle times where the CPU waits for data to be retrieved from memory

  • The bottleneck occurs because the same channel is being used to fetch data and instructions (It can only do 1 at a time)

  • This leads to the CPU waiting for memory to process instructions

41
New cards

What are strategies to fix the bottleneck?

  • Cache (Smaller, faster memory)

  • Parallel processing (Multi Core Processors)

    • The use of multiple cores means that instructions can be processed in parallel

    • While one core is executing instructions another can access memory

42
New cards

What happens in parallel processing?

  • Two or more processors work together to perform a single task

  • These are split into sub tasks called threads and then the tasks can be executed simultaneously by all processors

  • This reduces time taken to execute a program but it needs to be specially writen to take avantage of this

43
New cards

How do processors act in a multi core system?

  • All cores act in the same way as a single-core syste

  • Each processor in a multi-core system needs to communicate with each other continously, as other processors need to be aware of key tasks

  • When each processor has completed its task they combine results to complete the solution

44
New cards

What is Amdahls Law?

A technique used to find out the potential speed up of the task and allows for estimating the impact of parallel processing based on how much of a task can be parallelized versus how much must be performed sequentially.

45
New cards

What is the formula for Amdahls law

S=speed up P=portion that can be parallelised N=number of processors

S = 1 / ((1 - P) + (P / N))

New time = single core time/speed time

46
New cards

How can amdahls law assess feasibility of an investment?

High parallelisation > 70%

Moderate 50-70%

Low < 50%

High paralleisation will make it more feasable and worth it to invest in more processors

47
New cards

What is the purpose of parallel processing?

Parallel processing allows multiple tasks to be executed simultaneously, reducing the runtime of programs and improving performance.

In parallel processing, two or more processors work together to perform a single task, which is done by making use of cores on a processor

The task is split into smaller sub-tasks (threads).

These tasks are executed simultaneously by all available processors (any task can be processed by any processor).

This hugely decreases the time taken to execute a program, but software has to be specially written to take advantage of these multi-core systems.

48
New cards

What is a benefit of parallel processing?

More instructions can be processed
It decreases the time taken to execute a program
Tasks can be shared to reduce the load on individual processors and avoid bottlenecks

49
New cards

Disadvantages of Parallel Processing

- It is difficult to write programs for multi-core systems.

- Results from different processors need to be combined at the end of processing, which can be complex and adds to the time taken to execute a program.

- Not all tasks can be split across multiple processors.

- Concurrency introduces new classes of software bugs.

- Cannot split sequential tasks.

- Data must be up-to-date, and processing units will need to change their calculations based on the actions of other processing units.

50
New cards

Limitation factors of parllelisation of parallel processing in terms of runtime

Programs written specifically for parallel processing may have a certain portion of code that cannot be parallelised.

51
New cards

What is the formula for Amdahl's law (Runtime Calculations)?

Tp = Ts(L + P/N)

Tp is parallel processing time

Ts is time using a single processor system

L is fraction of the processing which must be linear

P is fraction which can be run in parallel

N is the number of processors.

52
New cards

What's Voice Input?

Voice input is used to give specific instructions to the computer system and is commonly used on smartphones. The system is only listening out for certain words, meaning it uses less processing power.

53
New cards

What's Vocabulary Dictation?

Vocabulary Dictation allows users to enter data that will be output as a text document.
This is of particular benefit in mobile computing and for visually or motor impaired users.
More processing required due to analysis of the sound wave to look for all words.

54
New cards

What's Voice Recognition Print?

Voice print recognition analyses the pattern of a sound to authenticate a user as part of a security system. It is looking for an almost exact match in the sound wave.

55
New cards

Runtime Calculations

Determining the limiting factors of parallelization

56
New cards

What are the different types of input devices commonly used?

Microphone, Camera, On-screen Keyboard

57
New cards

What's Microphone used for?

Microphones can be used as part of voice input systems in one of 3 ways

Voice command systems allow the user to specify commands, such as opening a file

Voice Dictation systems convert speech to text as an alternative to typing

Security systems recognise frequency and amplitude of a particular voice, controlling access to a file or physical room.

58
New cards

Limitations of Microphones?

• Noisy environments
• Different accents or dialects
• Delineation (was "therefore" said, or "their four" ?
• Homophones (e.g. buy/by/bye, too/to/two)

59
New cards

Uses of Camera

Facial recognition software can recognise a face in an image or video, perhaps even identifying it.

Barcode and QR scanning software allow an alternative to entering numbers or web addresses

Motion tracking software could activate image or video capture when something in the room moves

60
New cards

Limitations of camera

Cameras have finite resolution (the number of pixels)
Shutter speed ( the number of frames per second)
storage ( how much video and how many pictures can be stored)

61
New cards

What is an on-screen keyboard?

A virtual keyboard displayed on a screen.
It provides input functionality on the screen, reducing the need for physical input devices
It saves space and reduces the number of components that can break down

62
New cards

Limitations of on-screen keyboard

• When space is limited, keys can be too small, so words are mistyped
• Predictive text, auto-correct and similar technologies will not always be right.
• Often backup devices, such as voice input, needs to be included too.

63
New cards

What are the different types of output devices commonly used?

Visual display unit (VDU), Speaker, Light-emitting diode (LED), Printer

64
New cards

Light-emitting diode (LED)

A single, usually very small, light on an electronic device.
A VDU`s LED can flash to indicate that its plugged in, or a phone can signal that a message has been received, without using lots of power or attracting lots of attention.

65
New cards

Visual Display Unit

VDU is a screen for displaying information, can be found in desktops, laptops, tablets, mobile phones, sat navs, smart TVs, digital cameras

66
New cards

Speaker

Outputs sound, which increasingly incorporate speech synthesis.
Many people speak search terms into their phones to have their phones "speak" results back to them, e.g. SIRI.

67
New cards

Printer

Printers are divided into:

Inkjet (which uses ink)

Laser (which burns toner onto the paper using a laser) and

Plotter (which holds a pen in a mechanical hand, drawing accurately for technical documents such as architectural plans)

68
New cards

What are the different types of secondary storage devices?

Hard disks, optical disks, and solid-state storage devices

69
New cards

Storage Media Comparison

knowt flashcard image
70
New cards

Optical

Optical storage media, including CDs DVDs and Blu-Ray disks, are written to and read from using lasers.
Just like magnetic disks, optical disks spin to allow the laser to read the data from the correct location.

The surface of the disk will have billions of locations in which pits can be physically burned by a laser, or not burned, to represent either a `0` or a `1`

<p>Optical storage media, including CDs DVDs and Blu-Ray disks, are written to and read from using lasers.<br>Just like magnetic disks, optical disks spin to allow the laser to read the data from the correct location.<br><br>The surface of the disk will have billions of locations in which pits can be physically burned by a laser, or not burned, to represent either a `0` or a `1`</p>
71
New cards

Magnetic

Magnetic storage devices include the internal hard disk as well as floppy disks.
These disks are round and are divided into tracks and sectors:
Tracks
Clusters
Sectors

<p>Magnetic storage devices include the internal hard disk as well as floppy disks.<br>These disks are round and are divided into tracks and sectors:<br>Tracks<br>Clusters<br>Sectors</p>
72
New cards

Hard Disk Drive (HDD)

A magnetic hard disk drive (HDD) is the most common form of secondary storage within desktop computers. A read/write head moves nanometres above the disk platter and uses the magnetic field of the platter to read or edit data.

73
New cards

Solid State Drive (SSD)

Solid state storage devices use electronic circuits, specifically transistors, to store data electronically.

They have no moving parts and they are sturdier and quieter than magnetic or optical devices.

Each 0 or 1 requires two transistors for storage.

Transistors become smaller, so they allow more storage.

A USB flash drive (USB stick) is another type of solid state storage that is used to transport files easily because of its small size.

Memory cards, like the SD card in a digital camera or a Micro SD card in a smartphone, are another example of solid state storage.

<p>Solid state storage devices use electronic circuits, specifically transistors, to store data electronically.<br><br>They have no moving parts and they are sturdier and quieter than magnetic or optical devices.<br><br>Each 0 or 1 requires two transistors for storage.<br><br>Transistors become smaller, so they allow more storage.<br><br>A USB flash drive (USB stick) is another type of solid state storage that is used to transport files easily because of its small size.<br><br>Memory cards, like the SD card in a digital camera or a Micro SD card in a smartphone, are another example of solid state storage.</p>
74
New cards

Solid State Drives (SSDs) VS Hard Disk Drives (HDDs)?

SSDs feature a non-mechanical design of NAND flash mounted on circuit boards, making them shock-resistant, while HDDs consist of various moving parts, making them open to shock and damage.

SSDs have faster data access, quicker bootup times on computers, and the ability to access all parts of the drive equally. While HDDs, whose data access speed depends on the distance of data from the read and write heads,.

SSD performance is unaffected by fragmentation, but HDDs may need to be defragmented.

SSDs use significantly less power at peak load than hard drives

SSDs energy efficiency can deliver longer battery life in laptops.

Flash-based SSDs weigh considerably less than hard drives, which makes SSDs lighter.

SSDs require very little power to operate, which translates into less heat output by the system.

Hard Disk Drives are cheaper than SSDs, which generally have a more cost-effective storage capacity.

75
New cards

What is the process of fragmentation?

Fragmentation occurs when the file system fills up, and file changes result in blocks no longer being contiguous as they won't fit back into the space vacated. Files are then split and physically stored on different parts of the disk.

76
New cards

What is the process of defragmentation?

Defragmentation is the process of consolidating data on a disk by moving all parts of files to an empty contiguous area.

77
New cards

What is the difference between magnetic, optical, and solid-state storage media?

Magnetic storage uses magnetic disks to store data, optical storage uses lasers to read and write data on optical disks, and solid-state storage uses electronic circuits to store data electronically.

78
New cards

What is a network?

A network is a collection of connected devices that can communicate and share resources with each other.

Networks consist of two or more computers, a shared network medium, which may be wired or wireless, and a communication agreement or protocol.

79
New cards

What are the benefits of using a network?

Networks allow devices to share resources, communicate, and exchange information.
Example: Sharing files across network, printers

80
New cards

Local Area Network(LAN)

LAN is a small network, usually within one building and owned by one organisation.

81
New cards

Wide Area Network (WAN)

WAN is a large network, that can cover a whole country or even the entire globe, and may be owned by many organisations.

82
New cards

What is the difference between a LAN and a WAN?

A LAN (Local Area Network) is a small network within a single building, while a WAN (Wide Area Network) is a larger network that can cover a whole country or even the entire globe.

83
New cards

What are the two network structures?

- Client Server
- Peer-to-peer

84
New cards

Client-Server Structure

A client-server structure provides services to anyone connecting to it.

Services, such as file storage, are made available on servers to which clients connect in order to access the services. Web servers, which host websites over the internet, are among the most common. Clients use web browsers to access the webpages held on the server.

<p>A client-server structure provides services to anyone connecting to it.<br><br>Services, such as file storage, are made available on servers to which clients connect in order to access the services. Web servers, which host websites over the internet, are among the most common. Clients use web browsers to access the webpages held on the server.</p>
85
New cards

Peer-to-Peer (P2P) Strcuture

A P2P (Peer to Peer) network is where every client has the same status as one another. Each client is referred to as a 'peer'. This structure is used in torrents, where files are shared across various computers.
Peer-to-peer networking allows very large files to be downloaded efficiently without the need for a powerful server.

<p>A P2P (Peer to Peer) network is where every client has the same status as one another. Each client is referred to as a 'peer'. This structure is used in torrents, where files are shared across various computers.<br>Peer-to-peer networking allows very large files to be downloaded efficiently without the need for a powerful server.</p>
86
New cards

What is the difference between a client-server and a peer-to-peer network?

In a client-server network, a server provides services to clients, while in a peer-to-peer network, all computers are equal.

87
New cards

Networking standards

Networking standards are to make sure that the hardware and software that are made by different vendors can work together seamlessly. If there were no networking standards, it would be difficult to create networks that could share information reliably.

88
New cards

importance of networking standards

• Networking standards such as Wi-Fi protocols and Ethernet ensure the interoperability of networking technologies.
• The standards define the rules of communication among networked devices.
• Standards exist to help ensure products from different vendors are able to work together in a network without risk of incompatibility.
• Examples include Wi-Fi protocols and Ethernet.

89
New cards

What is a protocol?

A protocol is a set of rules for how devices communicate and how data is transmitted across a network.

90
New cards

What is the purpose of a protocol in networking?

It ensures that both the sender and receiver understand one another's transmissions.

91
New cards

Common Protocols

HTTP, FTP, SMTP, TCP/IP, IMAP, DHCP, UDP, RTSP

92
New cards

HTTP (Hypertext Transfer Protocol)

HTTP is used to transfer multimedia webpages from servers to browsers. The initial transfer is a HTML text document which may then initiate the downloading of other resources (eg: Images)

93
New cards

IMAP (Internet Message Access Protocol)

IMAP is used to upload/download e-mail between the user's computer and an internet server.

94
New cards

SMTP (Simple Mail Transfer Protocol)

SMTP transfers e-mail between internet servers.

95
New cards

FTP (File Transfer Protocol)

FTP allows the transfer of files across the internet, typically used when uploading files to a web server to make a website.

FTP applications use TCP (Transmission Control Protocol) - TCP has error checking facilities, which ensure that correct packets of data are received to construct the file. If packets are found to be corrupted, replacement copies can be requested.

96
New cards

DHCP (Dynamic Host Configuration Protocol)

DHCP can dynamically allocate an IP address when a device connects to a network. This IP address will apply for a single session then may be reallocated.

97
New cards

TCP (Transmission Control Protocol)

TCP is part of the layer that sits between the hardware and the software protocol being used. (HTTP, FTP etc). It provides reliable and error-checked streams of packets,

98
New cards

IP (Internet Protocol)

IP provides an address which identifies a computer device on a network.

99
New cards

TCP/IP (Transfer Control Protocol)

TCP/IP is a suite of protocols governing data transmission from sender to receiver across networks. It includes error checking to ensure accurate packet delivery for file reconstruction.

100
New cards

UDP (User Datagram Protocol)

Video applications use UDP (User Datagram Protocol) - UDP does not have error checking facilities. For video streaming, it is better to accept occasional corruption of the picture or sound, rather than pausing the presentation while replacement data packets are downloaded. There is no error checking and UPD can be described as providing an unreliable communication channel with a minimal level of features.