PERKEMBANGAN PERANGKAT KOMPUTER DAN

advertisement
PERKEMBANGAN PERANGKAT KOMPUTER DAN INTERCONNECTION
NETWORK
ABSTRACT
History of computer development started with the development of the mathematical sciences.
Starting with the use of human fingers, then created Abakus tool that can perform simple
arithmetic operations.
The development of computer innovation since 1960 to add a list of very interesting discoveries
and most important, namely the Reduced Instruction Set Architecture computers (RISC).
Essential elements used most common design is a RISC instruction set is limited and simple,
general-purpose registers numerous or use of compiler technology to optimize register usage,
and an emphasis on optimizing the instruction pipeline.
Basically, a computer program designed by using a method which does not enable parallel
computing, namely by completing each step in a single time. For programs that perform the
process in this way (parallel computing), then the program is designed to be able to divide the
task into the task-smaller task that can be done individually. Parallel Computing appear when the
computer carry more than one task simultaneously (concurrently).
In 1969, first formed a computer network. At that time only a computer network consists of
several computers connected by cables and hereinafter referred to as the ARPAnet. And
subsequently formed the Interconnected Network, abbreviated form the Internet. Internet is a
global network that connects computers to each other around the world. With the Internet,
computers can connect to each other to communicate, share and get information.
INTRODUCTION ORGANIZATION COMPUTERS
1. Computer
Computer is an electronic calculating machine that rapidly accept digital input information and
process information according to a set of instructions stored in the computer and generate output
information generated after processing. A list of commands is called a computer program and a
computer storage unit is a memory.
Computers functional units are: input, memory, arithmetic and logic, output and control.
2. Computer Organization
Computers are part of the organization that is closely associated with the operational units and
the interconnection between components of a computer system to realize the architectural
aspects. Examples are the organizational aspects of technology hardware, software interfaces,
memory technology, system memory, and control signals.
Differences between the Organization and Computer Architecture:
Computer Organization
The part that is closely related to operational units
Example: technology hardware, software interfaces, memory technology, system memory, and
control signals
Computer Architecture
attributes associated with computer systems programmer
Example: set of instructions, arithmetic is used, addressing technique, the mechanism of the I /
O
3. Structure and Function Main Computer
Computer Structures
Computer is a system that interacts with a particular way with the outside world. Interaction with
the outside world is done through peripheral devices and communication channels.
Computer structure is divided into 4 main structures:
1. Central Processing Unit (CPU), serves as the central control computer operations and
processing functions - the functions of the computer. The deal, simply referred to as a processor
CPU (processor) only.
2. Main Memory, serves as a data storage.
3. I / O, serves to move the data to the outside environment or other devices.
4. System Interconnection, is a system that connects the CPU, main memory and I / O.
Figure 1.2 Basic Computer Structure
CPU structure is divided into 4 main structures:
• Control Unit, serves to control the operation of the CPU and controls the overall computer.
• And Arithmetic Logic Unit (ALU), serves to establish a function - the function of data
processing computer.
• Register, serves as an internal storage for the CPU.
• CPU Interconnection, serves to connect all parts of the CPU.
Computer functions
In principle, there are four operating functions, namely:
• Function Data Processing Operations
• Function Data Storage Operations
• Function Data Transfer Operations
• Operation Control Function
Gambar Fungsi Komputer
Gambar Operasi pengolahan data
Gambar Operasi pemindahan data
Gambar Operasi pengolahan data
Gambar Operasi penyimpanan data
Gambar Operasi pengolahan data
EVOLUTION AND PERFORMANCE COMPUTER
History of Computers
History of computer development is divided into two, namely:
1. Before 1940
2. After 1940
Computer Before 1940
History of computer development started with the development of the mathematical sciences.
Starting with the use of human fingers, then created Abakus tool that can perform simple
arithmetic operations.
In 1617, John Napier has been suggested this tool called logarithms and Napier bones which can
perform various calculations of numbers.
Then Blaise Pascal created the first mechanical calculating machine in 1642 that operates by
moving the gear on the wheel and then has been developed by William Leibnitz.
In 1816 Charles Babbage has been fostering the difference engine that has been able to solve the
problem of mathematical calculations such as logarithm mechanically exactly up to twenty
digits.
This machine also has used a kind of "card" as an input, to save the "files" of data automatically
perform calculations and so on to output in printed form on paper. "Card" the first time it has
been used as input devices in the textile industry in the automatic loom Joseph Jecquard creation
in 1801.
In 1887 Herman Hoolerith has been popularizing the use of "card" as a data input tool that has
been widely used American population.
Howard Aiken introduced the use of electromechanical machine called the "Mark 1" in 1937,
electronic and mechanical. This machine can solve the problem of trigonometric functions in
addition to the calculations that have been done before these machines.
Computer After 1940
I. First Generation Computers:
Vacuum Tube 1940 - 1959
ENIAC (Electronic Numerical Integrator and Calculator)
The ENIAC computer was invented by Dr. John Mauchly and Presper Eckert in 1946
EDVAC (Electronic Discrete Variable Automatic Computer)
Tiub use tiub vacuum has also been reduced in the EDVAC, where the calculation process has
become faster than ENIAC
EDSAC (Electronic Delay Storage Automatic Calculator)
EDSAC has introduced the use of mercury (mercury) in the tube to keep the memory.
UNIVAC I (Universal Automatic Calculator)
In 1951 Dr. Mauchly and Eckert created UNIVAC I, the first computer is used to process the
data commerce.
II. Second Generation Computers: Transistor (1959 - 1964)
The second generation of computers have used a transistor and a diode to replace the vacuum
ducts and make computers smaller size and cheaper. A new way to save memory is also
introduced through magnetic technology. Keupayaan processing and computer main memory
size also increases and manjadikan it more efficient.
FORTRAN and COBOL emergence marks the beginning of a high-level language to replace
the language of instruction in the machine more difficult.
Minicomputer also been introduced which is the second largest in the computer generation. The
first version of the DEC PDP 8 was created in 1964 that is useful to process the data.
III. Third Generation Computers:
Integrated Circuits (1964 - 1980)
Chip began to replace the transistor as a computer with terhasilnya logical circuit terkamir or
better known as chips.
The smallest computer type microcomputers have emerged and quickly became the most popular
as the Apple II, IBM PC and Sinclair.
Many programming languages have emerged such as BASIC, Pascal and PL / 1. Most
microcomputers based on the interpretation of the language in depth, chip ROM to use BASIC
language.
IV. Fourth Generation Computers:
Very Large Scale Integration (1980 - 2000)
Chip was used to process and store memory. He is more sophisticated, equipped with up to
hundreds of thousands of transistor components called pengamiran scale is very large (very large
scale intergartion, VLSI). Processing can be done more precisely, to the millions of bits per
second. The computer's main memory becomes greater, causing the secondary memory is less
important. This advanced chip technology has realized one more class of computers called
Supercomputer.
V. Fifth Generation Computer
(2000 - Present)
Many advances in the field of computer design and technology increasingly allows the
manufacture of fifth generation computers. Non Neumann model will be replaced with a system
that is able to coordinate many CPUs to work in unison. Another advancement is the
superconducting technology that allows the flow of electrically without any obstacles, which will
accelerate the speed of information.
Design of Computer Performance
The performance of a computer system is the result of a process of all components of a
computer, which involves the CPU, main memory, secondary memory, bus, peripherals.
Desktop applications are virtually owned by all computer systems today include:
• Image processing
• The introduction of voice or speech
• Video conferencing
• mulitimedia
• Data transfer
This increase in microprocessor performance continues not unrelenting with various techniques
that have been developed, including:
• Branch Prediction, a technique which allows observing the first processor in the software and
perform branch prediction or group instruction to be executed next.
• Data Flow Analysis, the processor will analyze instruction - instruction that does not depend on
the results or other data to create optimum scheduling in execution.
• Speculative Execution, with a capital of branch prediction and analysis of data, the processor
can perform speculative execution before his time.
There are several methods to overcome the problem of the difference between the operating
speed of the microprocessor with other components, including:
• Increase the number of bits that are searched at a certain time to dilate and widen lintasa
DRAM bus system.
• Change DRAM interface so more efficiently by using caching techniques or other patterns on
chip DRAM buffer.
• Increase interconnection bandwidth processors and memory with the use of hierarchical bus faster bus for buffering and make the data flow structure.
STRUCTURE CPU
Main components of the CPU
1. Arithmetic and Logic Unit (ALU), in charge of forming a function - the function of data
processing computer. ALU often called machine language (machine language) as part of this
work instruction - machine language instructions given to him. Like the term, ALU consists of
two parts, the unit arithmetika and boolean logic unit.
2. Control Unit, in charge of controlling the operation of the CPU and overall control of the
computer, causing synchronization between the components in function - the function
operations. Included in this responsibility is the control unit fetches instructions - instructions
from main memory and determines the type of instruction.
3. Registers, is the CPU internal storage media used during data processing. This memory is
temporary, usually used to store data during processing or data for further processing.
4. CPU Interconnections, is the connection system and the bus that connects the internal
components of the CPU, ie ALU, control unit and registers - register and also by bus - the CPU
external bus that connects with other systems, such as main memory, device input / output.
Figure 3.1 The internal components of the CPU
Figure 3.2 Structure of internal detail CPU
CPU functions
The function of the CPU is running the program - a program stored in the main memory by
taking instructions - instructions, test instructions and executes commands one by one
corresponding groove.
The simplest view of the process of execution of the program is to take instruction processing
consists of two steps, namely: operation of reading instruction (fetch) and operating instruction
execution (execute).
Figure 3.3 The basic instruction cycle
Fetch cycle - Execution
Fetch cycle - Execution grouped into four categories, namely:
1. CPU - memory, data transfer from the CPU to the memory and vice versa.
2. CPU -I / O, data transfer from the CPU to I / O module and vice versa.
3. Data Processing, CPU formed a number of arithmetic and logic operations on data.
4. Control, an instruction for controlling the function or job. Eg conversion instruction execution
affairs.
Details operating cycle, namely:
1. Instruction addess Calculation (IAC), which calculates or determines the address of the next
instruction to be executed.
2. Instruction Fetch (IF), which is read or getter instructions from the CPU to the memory
location.
3. Instruction Operation Decoding (IOD), which analyzes the instruction to determine the type of
operation to be set up and operands to be used.
4. Operand Address Calculation (OAC), which determines the operand address, this is done if it
involves reference operand on memory.
5. Operand Fetch (OF), is taking operand from memory or I / O module.
6. Data Operation (DO), which form the operation instructed in the instruction.
7. Operand store (OS), which store the execution results into memory.
Figure 3.4 Diagram instruction cycle
Interrupt Function
Interrupt function is the mechanism of termination or transfer of processing instructions in the
CPU to the interrupt routine. Almost all modules (memory and I / O) has a mechanism that can
interrupt the CPU.
General purpose interrupt routine instructions for executing management in order to effectively
and efficiently between CPU and module - I / O module and a memory.
Kind of - kind of interrupt signal class:
1. The program, which interrupts generated by some of the conditions that occur in the result of
program execution. Examples: arithmetic overflow, division of zero, operashun illegal.
2. Timer, is generated interrupt timing in the processor. This signal allows the operating system
to run certain functions on a regular basis.
3. I / O, interrupt signal generated by the module I / O connection notification of error conditions
and the completion of an operation.
4. Hardware failure, is an interrupt generated by a power failure or memory parity error.
With the mechanism of interruptions, the processor can be used to execute the instruction - the
instruction of others. Once a module has finished performing his duties and is ready to receive
the next task then the module will send an interrupt request to the processor. Then the processor
will stop the execution being operated to handle routine interruptions.
Once the program is completed, the processor interrupts will continue program execution back.
When a processor interrupt signal is received, there are two possible courses of action, namely
interruptions accepted / rejected suspended and interruptions.
If the interruption is suspended, the processor will do - it below:
1. Processor suspend the execution of a program run and storing its context.
This action is to store the address of the next instruction to be executed and other relevant data.
2. Processor set the program counter (PC) to the address of the interrupt handler routine early.
Figure 3.5 Cycle execution instruction with interrupt
MEMORY
Understanding Memory
Memory is part of the computer that serves as a repository of information that must be set and
maintained as well as possible.
The computer has a memory hierarchy consisting of three levels, namely:
• Physical registers in CPU, are at the highest level.
The information is in the register can be accessed in one CPU clock cycle.
• Primary Memory (executable memory), is in the middle level. For example, the RAM. Primary
Memory is measured with one byte at a time, can be accessed relatively quickly, and is volatile
(the information can be lost when the computer is turned off). CPU access this memory with a
single load and store instructions in a clock cycle.
• Secondary Memory, located at a lower level.
For example, disk or tape. Secondary Memory measured as a collection of bytes (block of bytes),
access time is slow, and non-volatile (the information is retained when the computer is turned
off). This memory is implemented in the storage device, so access to include action by the driver
and the device.
Memory Type
1. Internal Memory
• ROM (Read Only Memory)
Is a type of memory contents are not lost when without electricity and at first it can only be read.
ROM on a computer provided by the vendor computer and containing programs or data. On the
PC, the ROM is commonly called the BIOS (Basic Input / Output System) or ROM-BIOS.
• CMOS (Compmentary Meta-Oxyde Semiconductor)
Is a type of chip that requires electrical power from the battery. This chip contains a 64-byte
memory whose contents can be replaced. At this CMOS various basic computer settings done,
for example, devices that are used to load the operating system and including the date and time
of the system. CMOS is a part of the ROM.
• RAM (Random-Access Memory)
Is a type of memory whose contents can be changed as long as the computer is turned on and is
volatile. Additionally, RAM has properties that can store and retrieve data very quickly.
• DRAM (Dynamic RAM)
Is a type of RAM that periodically be refreshed by the CPU so that the data contained in them is
not lost. DRAM is a type of RAM that is contained in the PC.
• SDRAM (Sychronous Dynamic RAM)
Is a type of RAM that is a continuation of the DRAM but has disnkronisasi by the system clock
and has a higher speed than the DRAM. Suitable for systems with bus speeds up to 100 MHz.
• DIMM (dual in-line memory module)
With a capacity of 168 pins, both active memory modules, each surface is 84 pin. This is
different than the SIMM that only works on one side of the module only. Penghantaran support
the 64-bit data. SDRAM (synchronous DRAM) using DIMM. A substitute of DRAM, FPM (fast
page memory) and EDO. SDRAM regulator (synchronizes) so that the same memory with the
CPU clock for faster data transfer. There are two speeds are 100MHz (PC100) and 133MHz
(PC133). DIMM 168 PIN. DIMM is a type of RAM that is available in the market.
• Cache Memory
Limited-capacity memory, this memory is high-speed and more expensive than main memory.
Located between main memory and the processor registers, to work so that processors do not
directly refer to the main memory but in cache memory access speed is higher, methods of using
the cache memory will improve system performance. Cache memory is the fastest type of RAM,
and is used by the CPU, hard drive, and several other components.
External Memory
An additional memory function to store data or program.Contoh: Hard drive, Floppy Disk etc.
The relationship between Chace Memory, Main Memory and the basic concept is the external
memory: Storing data is fixed (non-volatile), either when the computer is on or not. External
memory is commonly referred to as external memory which is the hardware to perform the
operation of writing, reading and storage of data, beyond the main memory.
External memory has two main objectives, namely as a permanent data storage to RAM and the
help function to get a cheap high-capacity memory for long-term use.
Types of External Memory
By Type Access Data
DASD (Direct Access Storage Device) in which it has direct access to the data.
Examples:
Magnetic (floppy disk, hard disk)
removeable hard disk (Zip disk, flash disk)
Optical Disk
SASD (Sequential Access Storage Device)
Indirect data access (in sequence), such as magnetic tape.
Based on Material Characteristics
Punched Card or perforated card
A small card containing holes depicting various instructions or data.
This card is read via puch card reader that are not used anymore since 1979.
Magnetic disk
Magnetic Disk is a disk made of material that is magnetic, Example: floppy and hard disk.
DATA STORAGE EQUIPMENT
Kinds of Data Storage Equipment
• Magnetic Disk
• Floppy Disk
• IDE Disk
• SCSI Disk
• RAID
• Optical Disk
• CDROM
• CD-R
• CD-RW
• DVD
Magnetic Disk (Magnetic Tape)
Disk is a round disc made of a certain material (metal or plastic) with a surface material that can
be coated in magnetization.
Mechanism of read / write heads read or write using the so-called head, is komparan conductive
(conducting coil).
Physical design, the head is stationary while spinning disk platters appropriate controls
Two methods of layout data on the disk, ie constant angular velocity and multiple zoned
recording
Disk organized in the form of a ring - concentric rings called tracks
Each track on the disc are separated by a gap (gap: prevent or reduce the reading or writing
errors caused by slipping of the head or because of interference magnetic fields)
The same number of bits that will occupy the track - track available.
Getting into the disk density (density) disk will increase.
This data is sent to a memory in the form of a block, the block is generally smaller than the track
capacity.
Blocks - blocks of data are stored in disk-sized blocks, called sectors.
Track usually filled several sectors, generally 10 to 100 sectors each tracknya.
Layout and Readings
Read and write
Head should be able to identify a start or position - the position of the sector as well as track
The data will be stored additional data to inform header sector and track the location of a data
Additional data header is only used by the disk drive without any system can be accessed by
penggunaFormat data on the disk tracks Field ID is the header data used disk drive locate and
tracknya sector.
Synch byte is a bit pattern that signifies the beginning of the data field.
Characteristics Magnetic Disk:
• Contact (floppy)
• Fixed gap
• Aerodynamic gap (Winchester)
Mechanism head:
• Single-platter
• Multiple-platter
Platters:
• Single-sided
• Double-sided
Sides:
• nonremovable disk
• Removable disk
Portability disk:
• Fixed head (one per track)
• Movable head (one per surface)
Head movement
Various characteristics of Head Movement
At the head fixed each track has its own head head, while the head moves, the head of the head is
used for some of the tracks in the face of the disc.
In the moving head is a head arm to move toward the desired tracks on orders from the disk
drive.
Portability disk
• Disk is fixed (non-removable disks)
• The disc can be moved (removable disk).
Sides / Side and Platters / disc
Sides:
• one side of the disc (single sides)
• Two front disc (double sides)
Platters:
• One disc (single platter)
• Many discs (multiple platter).
Mechanism head
Head touches the disk (contact) as the floppy disk, which has a crack head north remain or not
remain dependent magnetic field.
Gap or distance depending on the density of the disk head to the data, the more solid data is
needed within the head is getting closer, but it is getting close to the head, the greater the risk
factor, namely the occurrence of read errors.
Winchester technology from IBM anticipate problems head gap above the head aerodynamic
models. Head shaped tin sheets on the surface if the disc does not move, as the velocity of the
disk, the disk will lift headnya.
IBM introduced the term Winchester model 3340 its disk. This model is a removable disk pack
with head wrapped in a pack. Winchester term now used by any disk drive that is wrapped pack
and wear head aerodinamisDisk disc design many (multiple disk platters) Floppy Disk
Characteristics diskette is head touches the surface of the disk when reading or writing.
UNIT INPUT AND OUTPUT
Unit Input and Output (I / O Devices) is a hardware interface (interface) to the system bus or
central switch and controls one or more peripheral devices.
I / O module has two main functions, namely:
• As a tool interface to the CPU and memory via the system bus.
• As a tool the interface with other peripheral equipment by using a specific data link.
Function Module I / O
Function to perform tasks for I / O modules can be divided into several categories, namely:
1. Control and timing
Berfungi to synchronize the operation of each component of the computer
2. Communication CPU
Functions of communication between the CPU and I / O module includes processes - the
following processes:
• Command Decoding, ie I / O module receives a command - a command from the CPU that is
sent as a signal to the control bus. For example, a module I / O to disk can receive commands:
Read sectors, Scan record ID, Format disk.
• Data, the exchange of data between the CPU and I / O modules via a data bus.
• Status Reporting, which is reporting the status module I / O and peripheral devices, generally in
the form of conditions Busy or Ready status. Also the status of wide - range fault condition
(error).
• Address Recognition, that equipment or components of a computer could be contacted or
summoned it must have a unique address, as well as the peripheral device, so that each module I
/ O must know the address of the peripherals it controls.
3. Communication external devices
On the side I / O modules to peripheral devices also include communication includes data
communication, control and status
4. Data Buffer
Function to get the data adjustment in respect of differences in data transfer rates of peripheral
devices with the processing speed of the CPU
5. Detection of errors
If the peripheral device there is a problem so that the process can not be executed, then the I / O
module will report the error
Structure Module I / O
The interface module I / O to the CPU via the computer system bus, there are three channels,
namely data channel, the channel address and control lines. The most important part is the logic
block I / O associated with all peripheral equipment interfaces, there is a regulatory function and
switching on this block.
Mechanical Input / Output
There are three techniques in the I / O operations, namely: I / O programmed, interrupt - driven I
/ O, and DMA (Direct Memory Access).
External Devices
In general, external devices are classified into 3 categories:
1. Human Readable, ie devices that are related to humans as computer users. For example: a
monitor, keyboard, mouse, printer, joystick, disk drives.
2. Machine readable, namely device-related equipment. Usually a sensor and transducer module
for monitoring and control of an equipment or system.
3. Communication, yatu device associated with long-distance communication. For example: NIC
and modem.
BUS SYSTEM
Understanding System Bus
Bus is a communication pathway shared users a single set of wires used to connect the various
subsystems.
The bus system is the hub for the entire computer components in performing their duties.
Bus Slots
How it Works System Bus
1. At a more advanced computer systems, computer architecture would be more complex, so as
to improve performance, use multiple buses. Each bus is a data path between several different
devices. In this way the RAM, processor, GPU (VGA AGP) connected by a high-speed main
bus, better known by the name of the FSB (Front Side Bus). While other devices are slower
connected by a lower-speed bus that is connected to the other bus faster to the main bus. For
communication between the bus is used a bridge.
Type - Type Bus
Based on the type of bus, the bus can be divided into:
• Dedicated Bus: special bus channel specific data, such as data packets only, or address alone.
• Multiplexed Bus: bus traversed different information of data, address, and control signals with
the data multiplex method.
Disadvantages are multiplexed bus requires only a little channel that saves space but the data
transfer speed decreases and the complex mechanisms need to parse the data that have been
multiplexed. As for the dedicated bus is the inverse of multipexed bus.
Bus Structure
A bus system consists of 50 to 100 separate channels. Each channel is marked with a special
meaning and function. Although there are a number of different bus designs, bus line functions
can be classified into three groups, namely data channel, the channel address and control lines. In
addition, there are also distribution lines that provide power requirements for the connected
modules.
Interconnection Bus
1. Data Channel
Data channels provide the path for the transfer of data between the two systems modules. These
channels are collectively called the data bus. Generally the data bus consists of 8, 16, 32
channels, the number of channels diakitakan denang data bus width. Because at a certain time
each channel can only carry one bit, the number of channels determines the number of bits that
can be transferred at one time. Data bus width is an important factor in determining overall
system performance. For example, if the data bus width is 8 bits, and each instruction length is
16 bits, then the CPU must be twice to access the memory modules in each cycle instructions.
2. Channel Address
Channel address is used to indicate the source or destination of data on the data bus. For
example, if the CPU will read a word of data from memory, the CPU will put the word address is
on the address line. Address bus width determines maximum memory capacity of the system. In
addition, generally channel address is also used to put address port-port input / outoput.
Typically, the bits of order higher is used to select the memory location or I / O ports on the
module.
3. Channel Control
Mengntrol control channel is used for access to the channel address and the use of data and the
channel address. Because the data and address channel shared by all components, then there must
be a tool to control their use. Control signals to transmit both commands and timing information
between modules of the system. Timing signals indicate the validity of the data and address
information. Signals specifying command operations will be established. Generally the control
channels include: memory write, memory read, I / O write, I / O read, ACK transfer, the bus
request, bus grant, interrupt request, ACK interrupt, clock, reset.
Example - Sample Bus
• ISA Bus: other personal computer industry responds to these developments by adopting its own
standards, bus ISA (Industry Standard Architecture), which is basically a bus PC / AT that
operates at 8.33 MHz. The advantage is that this approach still maintaining compatibility with
machines and existing cards.
• Bus PCI: Peripheral Component Interconect (PCI) is a bus that does not depend on the
processor and serves as a mezzanine bus or peripheral bus. PCI standard is 64 channels of data at
a speed of 33MHz, the data transfer rate of 263 MB per second or 2.112 Gbps. PCI excellence
not only on speed alone but cheap with a little chip.
• USB Bus: All peripheral devices are not effective when mounted on a high speed PCI bus,
while much of the equipment that have low speed such as keyboard, mouse, and printer. As a
solution seven vendor computer (Compaq, DEC, IBM, Intel, Microsoft, NEC, and Northen
Telecom) together meranccang bus for I / O speed is low. Dihasilakan standard called Universal
Standard Bus (USB).
• Bus SCSI: Small Computer System Interface (SCSI) is an external peripheral device that depot
[ulerkan by macintosh in 1984. SCSI is a standard interface for CD-ROM drives, audio
equipment, hard disk, and external storage devices of size large. SCSI uses a parallel interface
with 8,16, or 32 channel data.
• Bus P1394 / Fire Wire: The more rapid the needs of bus I / O high-speed processors and faster
rate, currently at 1 GHz, it needs to be balanced with high-speed bus as well. SCSI and PCI bus
can not meet current needs. Thus developed a high performance bus known as FireWire (IEEE
P1393). P1394 has advantages compared with I / O interfaces, namely, very fast, inexpensive,
and easy to implement. The fact P1394 is not only popular in the computer system, but also in
electronic equipment such as digital cameras, VCRs, and televisions.
Another advantage is the use of serial transmission that does not require a lot of wires.
Reduced Instruction Set Computer (RISC)
The development of computer innovation since 1960 to add a list of very interesting discoveries
and most important, namely the Reduced Instruction Set Architecture computers (RISC).
Although RISC systems have been specified and designed in various ways by the community, an
important element that is used most commonly draft are:
1. Set a limited and simple instruction
2. Register numerous general purpose or use of compiler technology to optimize register usage.
3. Emphasis on optimizing the instruction pipeline.
Instruction Execution Characteristics
To understand the need to pay attention to the characteristics of RISC instruction execution.
The computational aspects are:
• Operations performed
• operands-operand used
• Ordering the execution ,.
1. Operation
Several studies have analyzed the behavior of the program HLL (High Level Language).
Assignment very prominent statement stating that displacement is a simple one important thing.
Results of this study are important for designers set of machine instructions that indicate the type
of instruction which is often the case because it must be supported optimally.
2. operands
Research Paterson have noticed [PATT82a] dynamic frequency occurrence of classes of
variables. Results were consistent between Pascal and C program showed a majority of reference
points to the scalar variable. This study has tested the dynamic behavior of HLL program that
does not depend on the particular architecture.
Research [LUND77] test instruction DEC-10 and dynamically discover each instruction average
of 0.5 references in memory operand and an average of 1.4 references the register. Of course this
figure depends on the architecture and compiler, but is sufficient to explain the frequency of
accessing operands that express the importance of an architecture.
3. Procedure Calls
In HLL procedure call and return is an important aspect because it is an operation that requires a
lot of time in the program dikompalasi so much useful to consider how the implementation of
this opperasi efficiently. The important aspect is the number of parameters and variables related
to the procedure and the depth pensarangan (nesting).
4. Implications
In general, research suggests there are three elements that determine the character of RISC
architectures:
Characteristics of Reduced Instruction Set Architecture Computers (RISC)
RISC architecture has several characteristics including:
1. The machine cycle is determined by the time it used to take two operands from registers,
perform ALU operations, and store the results of its operations into register, thus RISC machine
instructions should not be more complex and must be able to execute as soon as mikroinstruksi
on CISC machines. By using a simple instruction or instruction one cycle only takes one
microcoded or not at all, can be dihardwired machine instructions. Such instructions will be
executed more quickly than those on the other because they do not need to access penyimapanan
mikroprogram control current instruction execution took place.
2. Operation form of register-to-register which only consists of the operation load and store
memory accesses. This design features simplified set of instructions that also simplifies the
control unit.
The other advantage that enables optimization of the use of registers that are frequently accessed
operand will remain in storage berkecepatantinggi. Emphasis on the register to register operation
is unique for RISC design.
3. Using simple addressing modes, similar to the instruction using register addressing. Some
additional modes such as shifting and relative pe can be included in addition to the many
complex mode can be synthesized on the software than the simple, but can simplify instruction
cell and control unit.
4. Using a simple instruction formats, fixed and adjustable length instruction word lengths. This
feature has several advantages for using a fixed field opcode decoding and accessing operand
register can do together
Characteristics of RISC
• Instruction single size
• The size of the public is 4 bytes
• The amount of data addressing bit, usually less than 5 pieces.
• There is no indirect addressing that requires doing a memory access in order to obtain the other
operand address in memory
• There is no operation that combines the operating load / store with arithmetic operations, such
as addition to the memory and the addition of memory.
• There is more than one addressable memory operand per instruction
• Do not support any alignment for the data to the operating load / store
• The maximum amount of memory usage management for a data address is an instruction.
• The number of bits for integer registers spesifier equal to 5 or more, meaning that at least 32
pieces at the same integer registers can be referenced explicitly.
• The number of bit floating point registers spesifier equal to 4 or more, meaning that at least 16
floating point registers can be referenced at the same time explicitly.
Advantages and Disadvantages RISC Technology
Excess RISC
 In connection with the simplification of the compiler, which the maker task compiler to
generate a series of machine instructions for all HLL statement. Complex machine instructions
are often difficult to use because the compiler must find cases that fit the concept. Work to
optimize the generated code to minimize code size, reducing the count of instruction execution,
and improve pipelining is much easier when using RISC over CISC use.
underlying RISC PowerPC architecture has a tendency to put more emphasis on the register
compared to reference memory references, and reference registers require fewer bits so that it
has access faster instruction execution.
Trends register to register operation will further simplify and streamline instruction set control
unit as well as optimizing the register will cause the operand-operand frequently accessed will
remain dipenyimpan high speed.
Use addressing modes and instruction format is much simpler.
RISC shortage
Program generated in symbolic language will be longer (more instructions) .2. Larger
programs that require more memory, is certainly less save resources.
larger program would cause b. The reduced performance, ie more instructions would mean
more bytes of instructions that must be taken.
On paging environment will lead to the possibility of a larger page fault.
PARALLEL COMPUTERS
Parallel Computing appear when the computer carry more than one task simultaneously
(concurrently). This technique can allow the computer to work faster than doing it all at once,
just as a person with two hands can accomplish more work than people who use only one hand.
Basically, a computer program designed by using a method which does not enable parallel
computing, namely by completing each step in a single time. For programs that perform the
process in this way (parallel computing), then the program is designed to be able to divide the
task into the task-smaller task that can be done individually.
The main advantage of parallel computing is a program to execute more quickly. If the computer
hardware that executes a program that menggnakan parallel computing has the architecture, such
as the Processor (CPU / Central Pecessing Unit), parallel computing can be an efficient
technique.
As an analogy, if one were to carry one box and that person is the processor, which executes
programs in a sequence can only carry one box at a time. When executing in parallel, the same
program can be divided into two different task, and if there are two processors available, it can
carry two boxes in the same time. By doing this, the person can carry the box and finish the job
more quickly.
CONTROL UNIT
Understanding Control Unit
Control Unit is part of the computer which generates the signal and controls the operation of the
computer.
Functional Requirements:
Defining basic element processors
describe the micro operation should be done processors
Determine the function of the Control Unit to be done processors
Basic Element Processor:
ALU
Register
Internal Data Path
External Data Path
Control Unit
Micro Operation Type:
Defining basic element processors
describe the micro operation should be done processors
Determine the function of the Control Unit to be done processors
Function Control Unit
• Sequencing (sort operations)
• Execute
Type Control Unit
1. Control Unit microprogrammed
Control Vertical
Control Horizontal
2. Control Unit Conventional / Hard-Wired
Key components of the Control Unit microprogrammed:
1. Instruction Register
2. Control Store contains microprogrammed
3. Address Computing circuiting
4. microprogrammed Counter
5. Microinstruction Buffer
6. Microinstruction Decoder
Interconnection NETWORK
Understanding the Internet
Internet (Interconnected Network) is a global network that connects computers to each other
around the world. With the Internet, computers can connect to each other to communicate, share
and get information.
The information in the Internet is generally disseminated through a web page created with the
programming language format HTML (Hypertext Markup Language).
History of the Internet
Internet was originally formed from the military environment, under the auspices of the US
Defense Department project called the Advanced Research Project Agency (ARPA). Computer
network was first formed in 1969. At that time, the computer network only consists of several
computers connected by cables and hereinafter referred to as the ARPAnet. ARPAnet itself was
built with the aim of making the spread of computer networks so that information is not focused
on a single point that is expected to be easily destroyed in the event of war. If one part of the
network is disconnected, the path through the network automatically transferred to other lines.
In 1977, more than 100 mini and mainframe computers are mostly located in the university is
connected to ARPAnet. Relations computer is used by teachers and students to share
information. In the early 1980s, ARPAnet was divided into two networks, namely the ARPAnet
and MILNET. Milnet a military networks, but both have a relationship that can be interconnected.
This interconnection network called the DARPA Internet, but later simply called the Internet. At
first the Internet can only be accessed by mini and mainframe computers. After opening the
service Usenet and BITNET, the Internet can be accessed by Personal Computer (PC). Now,
with the development of technology perangkatmobile like "phone", PDA, Tablet PC and
Smartphone, even television and assorted other telecommunication devices, we can very easily
connect to the Internet with a system called WAP (Wireless Application Protocol).
Services or facilities in the Internet
Existing services on the Internet include:
1. E-mail (Electronic Mail) is an Internet facility to send and receive mail that is transmitted
electronically
2. Mailing List, namely the development of the e-mail in the form of subscription of news or
information sent via e-mail.
3. News Group or Network News or BBS (Bulletin Board Service), namely Internet applications
such as Electronic Bulletin Board or facilities that allow us joined with the group and discuss
each other according certain topics.
4. File Transfer Protocol (FTP), this service allows Internet users to upload (save / upload) or file
transfer activity from a single web server computer and download (take / download) or activity
retrieve files from a web server and or transfer files from computer to another.
5. Remote login is Telnet, is a facility for accessing another computer remotely. With this
facility, for example, we are located in the city can control a computer located in the city of
Bandung.
6. Information Browsing ie Gopher, is the facility to find information on the Internet in the form
of text menus. Gopher weakness can only display the menus limited in written form.
7. Advanced Browsing ie WWW (World Wide Web), a collection of documents stored on a web
server in the form of HTML. Users can easily find information on the Internet is not only in
writing, but the graphics, sound and video are interlinked using so-called hypermedia link.
8. Automatic Title Search, which Archie and Veronica, is the search information on the Internet
by typing the tittle (title) topic.
9. Automatic Content Search, the WAIS (Wide Area Information System), is the automated
information search by examining the contents of documents found.
10. Two-way communication services, namely chat: can send and receive messages with text,
audio communication: can send and receive messages in the form of voice, video call: can send
and receive messages in the form of images and sounds in realtime and teleconference: two-way
communication multimedia enabling us as if doing a meeting or a meeting directly within a room
without being limited distance.
How it Works Internet
The workings of the Internet is set in a series of rules and standards called protocols.
A server will manage access and transmit data from and into the Internet requested by some
client, so the client computer can access the various facilities available on the Internet such as
web, chat, email, and so forth.
Figure 1: Chart How it Works Internet On When Data Transmission Between Two Fruit Node
Bodies or Institutions Regulatory Internet
International Internet Society (ISOC)
Is a professional body with membership open to anyone whether private, companies,
universities, and government. ISOC is the body that facilitates the Internet, support, and promote
the use of and access to the Internet.
Internet Architecture Board (IAB)
Is a coordinating body and the technical advisor of the ISOC. The agency acts as a technical
review and editorial end all Internet standards. IAB has the authority to issue a document known
as an Internet standard RFC (Request For Comment) created by the IETF, IEEE and other
institutions are entitled to make proposals. Another task of the IAB is to arrange numbers and
constants used in Internet protocol (TCP port numbers, IP protocol codes, etc.).
Internet Engineering Task Force (IETF)
Is a unit that is under the IAB is comprised of people who concentrate on developing
applications and future Internet architecture. The agency is tasked to establish Internet standards.
One of his duties was published RFC (Request For Comment) on a protocol or standard
proposed by someone for comment by the public with the consent of the IAB. Website is
www.ietf.org. The IETF is divided into nine working groups (eg applications, routing and
addressing, computer security).
Institute of Electrical and Electronics Enginering (IEEE)
IEEE stands for the beginning is the Institute of Electrical and Electronic Enginering (in
Indonesian means the Institute of Electrical and Electronic Engineers) is the actual length is no
longer used, the official name of the agency currently only IEEE alone. The goal of the IEEE is
developing technology to enhance the dignity of humanity.
Internet Research Task Force (IRTF)
IRTF is the agency that has a research orientation in the short term and long term on Internet
protocols, applications, architecture and Internet technology. IRTF is below the IAB unit.
Website is www.irtf.org
Internet Assigned Numbers Authority (IANA)
IANA charge of taking care of the problem-setting Internet protocol parameters, such as IP
address space and the Domain Name System (DNS). IANA also acts as the ultimate authority to
set the DNS root set DNS information center database, also determine the IP address of
autonomous systems in the Internet network. IANA operates under ISOC and is also part of the
IAB, funded by the US government. Due to the increasing use of the Internet IANA will be
replaced by the Internet Corporation for Assigned Names and Numbers (ICANN) which is an
international non-profit agencies.
In addition to the above bodies there are also W3C (World Wide Web Consortium), which is the
body responsible for managing and developing standards for the World Wide Web (WWW).
W3C is currently led by Tim Berners-Lee, creator of the World Wide Web.
Bibliography
http://apriskacute.blogspot.com/2011/04/komputer-dari-generasi-pertama-sampai.html
http://apriskacute.blogspot.com/2011/04/evolusi-dan-kinerja-komputer.html
http://www.anneahira.com/komputer/memori-komputer.htm
http://www.indojaya.com/teknologi/komputer/801-pengertian-memori.html
http://cheppyandriana.blogspot.com/2010/01/pengertian-memory.html
http://iskandar-zulkarnaen1.tripod.com/risc.pdf
http://www.isomwebs.com/2012/pengertian-parallel-computing/
http://ocw.gunadarma.ac.id/course/industrial-technology/program-of-electronics-engineeringstudy-2013-s1/arsitektur-komputer/control-unit
http://yogapw.wordpress.com/2012/04/08/pengertian-internet-interconnected-network/
Download