Chapter 3
Computer System: End user and Enterprise Computing
2
The word Calculate drawn from a Latin word “calculus” meaning “small stones” suggests that pebbles were arranged to form abacus , arguably first human made computing device
1642: Blaise Pascal machine like odometer 1880: Babbages Analytical Engine With Punched
Cards 1946: Moore School Of Engineering ENIAC with
use of vacuum tubes 1950: Transistor based digital computer 1982: IBM PC was born
3
Global pharmaceuticals needed to fix IT asset management problem 255 offices in 147 countries, 67000 employees using 90,000
hardware and software assets. Microsoft recommended French company BDNA Corp. Before PS. Soft we did not have global view, budgets were
managed at site offices impossible to get detail snapshot. Achieved cost saving, strength, confidence, knowledge.
United Health Group grown through acquisition and have unnecessary IT diversity. Hercules program focusing on standardization of management
processes. $42 million annual savings, managed end users nearly four
times Canadian based company making intelligent decisions in
life cycle management . Risk management , disaster recovery program, un controlled corporate growth
4
REAL WORLD
Grumman : Los Angels based company 5,500 units of Black Berries◦ Cost isn’t the issue, connectivity is
CIO of Boeing “some people simply must be connected”
CISCO 30000 remote users in 100 countries
US state Police contains 200 million citizens information on their black berry◦ Do background checks on suspicious vehicles
and persons
5
Computer systems have variety of sizes and shapes:-
Most important category is Microcomputers, Personal computers (PCs), Midrange or ‘mini’ computers, Notebook, Laptop,
Computer Terminals :dumb terminals, POS, ATM
Network computers◦ Used for accessing networks by operational
employees , Internet connectivity◦ Total cost of ownership is low
Information Appliances: ◦ Always “On” and connected, PDA’s, Cell Phones,
Black Berry◦ Devices available for games and internet, Xbox ,
playstation
6
Solid performance at reasonable price Operating system ready Connectivity Security Equipped
7
Mid range Systems are primarily high end network servers that can handle the large scale processing.◦ For industrial process control ,CAD/CAM, web server
Mainframe computers ◦ Large , fast and powerful super servers, shared by
hundreds concurrently◦ Information processing need of major corporations like
banks, airlines, oil companies, government agencies Supercomputers
◦ Extremely powerful with fastest processing speeds
10
Blade server Entire computer that fits on a single, thin card (or blade) and that is plugged into a single chassis to save space, power and complexity.
Blade servers cost 30 to 50 percent less than traditional servers◦ Due to low power consumption, reduced
cabling, smaller size Possible to install up to 280 blades in
single cabinet
11
Supercomputers are very expensive and are employed for specialized applications that require immense amounts of mathematical calculations. For example, weather forecasting requires a supercomputer.
Other uses of supercomputers include business application in ecommerce, dynamic calculations, nuclear energy research, and petroleum exploration.
Super computers use parallel processing architecture of interconnected micro processors.
The principal difference between a supercomputer and a mainframe is that a supercomputer channels all its power into executing a few programs as fast as possible, whereas a mainframe uses its power to execute many programs concurrently.
12
13
Computer terminalPersonal computerNetwork computerMainframe computerSupercomputer
14
Increasing
size
and
power
A computer is a high powered collection of electronic devices, performing a variety of information processing chores.
A computer is a system of hardware devices organized according to following system functions◦ Input◦ Processing◦ Output◦ Storage◦ Control
15
16
Secondarystorage
Input devices Output devices
Controlunit
Arithmetic/logic unit
Register storage area
Cache Memory
Processing device
Clock speed◦ Predetermined rate a CPU produces a series of
electronic pulses.◦ Hertz (Hz)
One cycle or pulse per second◦ Gigahertz (GHz)
Millions of cycles per second MIPS Throughput or ability to perform useful
computational during given period
17
Moore's Law and Microprocessing Power: ◦ Moore's law stated in 1965 that micro-processing
power doubles every two years. Variations of this law assert that
◦ Microprocessing power (transistor per IC)doubles every
18 months
◦ Computer storage power doubles every 18 months
◦ The price of computing reduced half every 18 months.
18
19
20
Computer Peripherals: Input, Output and Storage Technologies
21
Input is all information put into a computer. Input can be supplied from a variety of sources:
Input devices gather and translate data into a form the computer understands.◦ A person◦ Another computer◦ Another piece of equipment, such as a musical
instrument or thermometer
22
Keyboard - Most common input device; used to type in commands and data.◦ Specialized keyboards for blinds◦ customized keys for fast food
Pointing Devices- they worked with operating system GUI◦ Mouse or trackball enhances user’s ability to input
commands, manipulate text, images.◦ Pointing stick: small button like device◦ Touchpad◦ Touch screens◦ Pen based computing: hand writing recognition system
LCDs have a pressure sensitive layer
23
Speech recognition system: the future of the data entry◦Continues speech recognition system◦Speaker independent voice recognition
Optical Scanners are peripheral input devices which allow users to import: Text, Graphics, Images◦ Specialized software aids in translating
information into a format the computer can understand and manipulate.
◦ OCR : optical character recognition
24
Digital Cameras are peripheral input devices that allow users to create pictures and/or movies in a digital format.◦ Some require specialized software to import
images into the computer.◦ Some record digital images directly to a disk
that can be read by the computer. Smart Cards
◦ Magnetic strip and microprocessor based Joystick useful in education and games.
25
Output units store and display information (calculated results and other messages) for us to see and use.
Monitors are the most commonly used output device.◦ Monitors are connected to a computer system via a port
integrated on the video adapter or graphics card. Hi-resolution monitors come in two types:
◦ Cathode ray tube (CRT) - Streams of electrons make phosphors glow on a large vacuum tube.
◦ Liquid crystal display (LCD) - A flat panel display that uses crystals to let varying amounts of different colored light to pass through it. Developed primarily for portable computers.
26
Most monitors use a bitmap display. ◦ Allows user to resize the display.◦ Divides the screen into a matrix of tiny square “dots”
called pixels.◦ The more “dots” a screen can display, the higher the
resolution of the monitor. Projection systems or multimedia can
display information from a computer system on a larger screen for whole-class instruction.
27
Printers◦ Dot matrix◦ Bubble/Ink jet ◦ Thermal transfer◦ Laser
Plotters
28
Computer Storage Fundamentals◦ Data and information must be stored until needed◦ There are many types of storage media and devices
available.◦ Bit- the smallest element of data called . The term was
first used in 1946 by John Tukey, a leading statistician and adviser to five presidents.
◦ Short for binary digit, A single bit can hold only one of two values: 0 or 1.
◦ More meaningful information is obtained by combining consecutive bits into larger units. For example, a byte is composed of 8 consecutive bits.
◦ ASCII use various arrangements of bits
29
Type of Access Sequential - Obtained by proceeding through the
storage medium from the beginning until the designated area is reached (as in magnetic tape).
Random Access - Direct access (RAM and hard disks).
30
Primary storage or memory: Where the data and program that are currently in operation or being accessed are stored during use. ◦ Consists of microelectronic memory chips:
Extremely fast and expensive. Two types: RAM (non-permanent)
Programs and data can be stored here for the computer’s use.
Volatile: All information will be lost once the computer shuts down.
ROM (permanent) Contents do not change. Nonvolatile
31
Most common form of secondary storage Magnetic Disks contains metal disks that
are coated with an Iron Oxide recording material, FDD,HDD
RAID computer storage equipment: Redundant Array Of Independent Disks (RAID ), they combines from 6 to more than 100 small hard disk drives and their control micro processor into a single RAID unit
Magnetic Tape: major application of magnetic tape is long term archival
33
34
An optical disk is a compact disk or CD. The formatting of the optical disk will dictate whether it is a blueray, DVD, CD, read-only or rewritable.
Optical disks have replaced records, cassette tapes, videotapes and floppy disks.
Compact, lightweight, durable and digital, the optical disk also provides a minimum of 650 megabytes (MB) of data storage. A double-layered and double-sided DVD optical disk holds up to 15.9 gigabytes (GB) of data.
As the disk spins, a laser beam follows a spiraling trail of pits and lands in the plastic material of the disk. The pits reflect light differently than the lands, while a device translates the reflective difference to bits of “on/off” or 1 and 0.
35
Newest storage technology RFID is a system for tagging and
identifying mobile objects RFID works using small hardware Called
RFID chips , smaller than a grain of sand. Two general types of RFID
◦ Passive RFID do not have a power source and must derive power from signal sent from the reader
◦ Active RFID, self powered
36
RFID tags refers to spy chips Owner of an item will not necessarily be aware of the
presence of an RFID tag. It can gather sensitive data and even credit card. Read range of cards are increasing.(30-100 feet) uses of RFID, automatic photographed, webcam images
can be viewed from miles, RFID chips are in humans, RFID chips hacking
RFID enabled magzines◦ Measure mags readership◦ Which pages, open close time of mag◦
37
Computer will enable people to live forever Nanobots ll room in our blood and organs
for fixing diseases Nano biological intelligence Human body ver. 1.0 Back up of memory /intelligence Virtual reality girls/boys Biological computer generated virus
38