Date post: | 15-Jan-2016 |
Category: |
Documents |
View: | 221 times |
Download: | 1 times |
Lecture 24: Review Intro to IT
COSC1078 Introduction to Information Technology
Lecture 24
ReviewJames Harland
Lecture 24: Review Intro to IT
Introduction to IT
1-4 Introduction, Images, Audio, Video
5-6 Computer Fundamentals Assignment 1, WebLearn Test 1
7 Review
8 Operating Systems WebLearn Test 2
9 Operating Systems Assignment 2
10 Internet
11 Internet Security WebLearn Test 3
12 Review Assignment 3
Peer and Self Assessment
Lecture 24: Review Intro to IT
Overview
Questions?
Mock Exam
Requested topics
Questions?
Lecture 24: Review Intro to IT
Intro to IT Schedule
Week Lecture 1 Lecture 2
12 Future of IT Review by request
Various topics requested
13 Mock Exam Wednesday 2nd June
Lecture 24: Review Intro to IT
Requests Received
Logic gates Hexadecimal to/from binary conversions Process vs. program Floating point Network layers Encryption Internet architecture Machine cycle
Lecture 24: Review Intro to IT
Mock Exam
10.30-1.00 on Wednesday 2rd June in 12.08.02 Bring your own paper, pens, etc. Calculators and translation dictionaries allowed Answers will be available from me when you leave
Schedule:
10.30 Access to room 10.45 Reading time commences 11.00 Writing time commences 1.00 Exam concludes
Lecture 24: Review Intro to IT
Hexadecimal
01010100001010101010100110100010101001101001010010100011100010101010100101111001001010…
AF136DF738CA23895389BCFE5C36A63B…
Lecture24: Review Intro to IT
Hexadecimal
Notation for binary numbers More compact than 1001010001010101001010... NOT decimal (0-9) Base 16: 9 + 9 = 1 x 16 + 2 x120 0000 4 0100 8 1000 C 11001 0001 5 0101 9 1001 D 11012 0010 6 0110 A 1010 E 11103 0011 7 0111 B 1011 F 1111
Lecture 24: Review Intro to IT
Excess Notation
Bit pattern Value
111 3
110 2
101 1
100 0
011 -1
010 -2
001 -3
000 -4
A different encoding of the numbers “naive” bit pattern encodes 4 more than actual value
100 (looks like 4) encodes 0101 (looks like 5) encodes 1110 (looks like 6) encodes 2
Lecture 24: Review Intro to IT
Floating Point
sign bitMantissa
exponent
1 bit for sign3 bits for exponent4 bits for mantissa100.101
Lecture 24: Review Intro to IT
Floating Point
01111001: +ve 0.1001 shifted 111 (+3) places = 100.110011110: –ve 0.1110 shifted 001 (-3) places = -0.0001110
Mantissa: digit sequence (1st digit always 1)
Exponent: where to put the . This is generally given in ‘excess’ notation
Binary form of -2.423 x 104
Lecture 24: Review Intro to IT
Gates and circuits
or
and
not1
0
00
0
0
0
0
0
1
11
1
11
1
Lecture 24: Review Intro to IT
Gates and circuits
No storage here
Results instantaneously available
Disappear when inputs change
How can a bit be `stored’?
Lecture 24: Review Intro to IT
Memory via `Flip flops’
or
and
not1
00
0 0 0
0
0
1
Lecture 24: Review Intro to IT
Memory via `Flip flops’
or
and
not0
11
1 1 1
1
0
Lecture 24: Review Intro to IT
Memory via `Flip flops’
Can design other versions of flip-flops
Shows how circuits can be designed using AND, OR, NOT (NAND, NOR, XOR, …) in combinations (gates)
Hierarchy and abstraction
Shows how electric circuits can store values
Lecture 24: Review Intro to IT
Fetch Decode Execute
FETCH
EXECUTE DECODE
Machinecycle
Lecture 24: Review Intro to IT
Two special registers
Instruction register: holds current instructionProgram counter: address of next instruction
Fetch: Put instruction specified by program counter into instruction registerIncrement program counter by two
Decode: Work out what to do
Execute: Perform the instruction
Lecture 24: Review Intro to IT
Processing
A0 15A1 6CA2 16A3 6DA4 50A5 56A6 30A7 C0A8 C0A9 00
Program Counter
InstructionRegister
A0Address Contents
Lecture 24: Review Intro to IT
Processing
A0 15A1 6CA2 16A3 6DA4 50A5 56A6 30A7 C0A8 C0A9 00
Program Counter
InstructionRegister
A0FETCH
156C
Lecture 24: Review Intro to IT
Processing
A0 15A1 6CA2 16A3 6DA4 50A5 56A6 30A7 C0A8 C0A9 00
Program Counter
InstructionRegister
A2FETCH
156C
Lecture 24: Review Intro to IT
Processing
A0 15A1 6CA2 16A3 6DA4 50A5 56A6 30A7 C0A8 C0A9 00
Program Counter
InstructionRegister
A2DECODE
156C
6C 2B
Lecture 24: Review Intro to IT
Processing
A0 15A1 6CA2 16A3 6DA4 50A5 56A6 30A7 C0A8 C0A9 00
Program Counter
InstructionRegister
A2
EXEC
156C
6C 2B
2B5
Lecture 24: Review Intro to IT
Processing
A0 15A1 6CA2 16A3 6DA4 50A5 56A6 30A7 C0A8 C0A9 00
Program Counter
InstructionRegister
A2 FETCH
166D
Lecture 24: Review Intro to IT
Processing
A0 15A1 6CA2 16A3 6DA4 50A5 56A6 30A7 C0A8 C0A9 00
Program Counter
InstructionRegister
A4 FETCH
166D
Lecture 24: Review Intro to IT
Processing
A0 15A1 6CA2 16A3 6DA4 50A5 56A6 30A7 C0A8 C0A9 00
Program Counter
InstructionRegister
A4 DECODE
166D
Lecture 24: Review Intro to IT
Processing
A0 15A1 6CA2 16A3 6DA4 50A5 56A6 30A7 C0A8 C0A9 00
Program Counter
InstructionRegister
A4 EXEC
166D
6D FF
FF6
Lecture 24: Review Intro to IT
Processing
A0 15A1 6CA2 16A3 6DA4 50A5 56A6 30A7 C0A8 C0A9 00
Program Counter
InstructionRegister
A6 FETCH
5056
Lecture 24: Review Intro to IT
Processing
A0 15A1 6CA2 16A3 6DA4 50A5 56A6 30A7 C0A8 C0A9 00
Program Counter
InstructionRegister
…
Lecture 24: Review Intro to IT
Processing
Program Counter
InstructionRegister
EXEC
B258
B4
Lecture 24: Review Intro to IT
Processing
Program Counter
InstructionRegister
EXEC
B258
58
Lecture 24: Review Intro to IT
Processing
Jump instructions change program counter
Can load any memory address into program counter (!!!)
Often use pipelining for efficiency Fetch next instruction while executing Processor doesn’t wait for fetch to complete
Can do more than one instruction …
Lecture 24: Review Intro to IT
Processes
Lecture 24: Review Intro to IT
Processes
A program is a static set of instructions
A processes is the execution of a program, which changes state over time.
Lecture 24: Review Intro to IT
Processes Executing in Context
Program Counter
InstructionRegister
CC ROM
RAM
Processor Memory Disk
00
CC
Lecture 24: Review Intro to IT
Processes Executing in Context
Program Counter
InstructionRegister
DD ROM
RAM
Processor Memory Disk
00
CC
DD
Lecture 19: Internet: Images Intro to IT
InternetLisa?Hi Dad!
Listen!Lisa?Hi Dad! Listen!
Lecture 24: Review Intro to IT
Internet Structure
Application Application
Transport Transport
Network
Link
Network
Link
Mordor sucks!
2 dor1 Mor3 suc 4 ks!
1 2 3 49 5 6 2
14
3
22
1
3
4
2 3 1 49 5 6 2
2 dor1 Mor3 suc 4 ks!
Mordor sucks!
Lecture 24: Review Intro to IT
Internet Structure
1 Mor
1
6
6
Lecture 24: Review Intro to IT
Network Layer (Internet Protocol) Real intelligence is in the network layer
Adds next destination to packet
Not complete list of addresses
Sends to next destination
Retrieves final destination packets for this node
Passes them to the transport layer
Routing tables can be updated when disconnections occur
Hop counts used to stop endless looping
Lecture 24: Review Intro to IT
Transport layer
Transmission Control Protocol (TCP) often used
User Datagram Protocol (UDP) becoming more common
TCP
Establishes connection first
Send and wait for acknowledgement
Reliable
Can adjust flow control to avoid congestion
Often best for email (which is not real-time)
Older
Lecture 24: Review Intro to IT
Transport layer
UDP
Doesn’t establish connection
Just sends and forget
Efficient
No congestion adjustment
Works well for DNS lookup
Often used for Voice over Internet Protocol (VoIP) applications such as Skype
Lecture 24: Review Intro to IT
Transmitting secrets
Question: How do you share a secret with someone you have never met?
Lecture 24: Review Intro to IT
Encryption
“new password is bumblebee”
“new password is bumblebee”
Send
Decrypt
Encrypt
Lecture 24: Review Intro to IT
Public Key Systems
Alice needs to know Bob's encryption key
Alice needs to know Charlie's encryption key
Alice needs to know David's encryption key ...
Alice needs to know everyone's encryption key
All encryption keys are made public
All decryption keys are kept private
Conclusion
Come to the mock exam Finish Assignment 3