DOC PREVIEW
SJSU CS 147 - Lecture 1

This preview shows page 1-2-3-4-24-25-26-50-51-52-53 out of 53 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Lecture 1Slide 2Slide 3Slide 4Slide 5Slide 6Slide 7Slide 8Slide 9Slide 10Slide 11Slide 12Slide 13Slide 14Slide 15ENIAC - backgroundENIAC - detailsSlide 18Slide 19Slide 20Slide 21Slide 22Slide 23Slide 24Slide 25What’s Computer Architecture?von Neumann/TuringVon Neumann ModelSlide 29Slide 30Structure of von Neumann machineIAS - detailsCommercial ComputersSlide 34Slide 35Slide 36Slide 37Slide 38Binary Digits (Bits)Slide 40Slide 41Slide 42Chapter 1. Number BaseSlide 44Slide 45Slide 46Slide 47Slide 48Slide 49Slide 50Slide 51Slide 52Slide 53Lecture 1Prof. Sin-Min LeeDepartment of Computer ScienceSan Jose State UniversityTuesday Thursday10:15 – 11:30Your evaluation in this course is determined by:30% 15%Class Presentation 10%Presentation report 5%Final Exam 30%Midterm 1: Sept. 11Midterm 2: Oct 4 Midterm 3: Nov. 1Text BookM. Murdocca and V. Heuring, Computer Architecture and Organization, an integrated approach,Wiley, 2007.Linda Null and Julia Lobur, The Essentials Of Computer Organization and Architecture, 2nd edition, Jones and Bartlett Publishers ,2006. ISBN -10-7637-3769-0 Good REFERENCE The text covers such topics as digital logic, data representation, machine-level language, general organization, assembly language programming, CPU organization, memory organization, and input/output devices, as well as a new chapter on Embedded Systems.ENIAC - background•Electronic Numerical Integrator And Computer•Eckert and Mauchly•University of Pennsylvania•Trajectory tables for weapons •Started 1943•Finished 1946–Too late for war effort•Used until 1955ENIAC - details•Decimal (not binary)•20 accumulators of 10 digits•Programmed manually by switches•18,000 vacuum tubes•30 tons•15,000 square feet•140 kW power consumption•5,000 additions per secondWhat’s Computer Architecture?The attributes of a [computing] system as seen by the programmer, i.e., the conceptual structure and functional behavior, as distinct from the organization of the data flows and controls the logic design, and the physical implementation. Amdahl, Blaaw, and Brooks, 1964SOFTWARESOFTWAREvon Neumann/Turing•Stored Program concept•Main memory storing programs and data•ALU operating on binary data•Control unit interpreting instructions from memory and executing•Input and output equipment operated by control unit•Princeton Institute for Advanced Studies –IAS•Completed 1952Von Neumann Model •1940’s a new model for building computers.•Today we can still see the effect.•Radically different from what went before. –The memory of the computer was to store both the data to be worked on and the program doing the work.–The stored program computer concept.Von Neumann Architecture A.L.UINPUT OUTPUTMEMORYData ControlINPUT > PROCESS >OUTPUTCONTROLAddressWhat’s Computer Architecture?•1950s to 1960s: Computer Architecture Course Computer Arithmetic.•1970s to mid 1980s: Computer Architecture Course Instruction Set Design, especially ISA appropriate for compilers. (What we’ll do in Chapter 2)•1990s to 2000s: Computer Architecture CourseDesign of CPU, memory system, I/O system, Multiprocessors. (All evolving at a tremendous rate!)Structure of von Neumann machineIAS - details•1000 x 40 bit words–Binary number–2 x 20 bit instructions•Set of registers (storage in CPU)–Memory Buffer Register–Memory Address Register–Instruction Register–Instruction Buffer Register–Program Counter–Accumulator–Multiplier QuotientCommercial Computers•1947 - Eckert-Mauchly Computer Corporation•UNIVAC I (Universal Automatic Computer)•US Bureau of Census 1950 calculations•Became part of Sperry-Rand Corporation•Late 1950s - UNIVAC II–Faster–More memoryGordon Moore (co-founder of Intel) predicted in 1965 that the transistor density of semiconductor chips would double roughly every 18 months. Moore's Law, formulated by Gordon Moore in 1965, three years before he helped found chip maker Intel Corp..Binary Digits (Bits)Only 2states possibleOn OffFiber Optic Cable}Light PulseNo Light PulsePermanentlystored onCD-ROM}PittedNotPittedInside thecomputer’smemory (RAM) }Electronicpulse presentElectronicpulse absentPermanentlystored ondisks}Positive magnetic fieldNegative magnetic field}Human readable symbols On1Of0Chapter 1. Number BaseWilliam George HornerBorn: 1786 in Bristol, EnglandDied: 22 Sept 1837 in Bath, EnglandHorner's only significant contribution to mathematics was Horner's method for solving algebraic equations. It was submitted to the Royal Society on 1 July 1819 and was published in the same year in the Philosophical Transactions of the Royal Society. Some years earlier Ruffini had described a similar method which had won him the gold medal offered by the Italian Mathematical Society for Science who had asked for improved methods for numerical solutions to equations. However neither Ruffini nor Horner was the first to discover this method as it was known to Zhu Shijie 500 years earlier.Ch'in Chiu-Shao is a thirteenth century Chinese sage who around 1247 AD composed the nine sections of mathematics. He also developed a scheme for the solution of numerical equations. The difference between Ch'in Chiu-Shao and Horner's is that Ch'in Chiu-Shao uses Horner's method of synthetic division in reverse order No one noticed that the Chinese had this knowledge for a long time until Wang Ling and Joseph Needham's paper on 1. "Horner's Method in Chinese Mathematics “2. F Cajori, Horner's Method of Approximation Anticipated by Ruffini, Bull. Amer. Math. Soc. 17 (1911), 409-414.霍霍霍 「「「「「「 Horner's method 「「「 「「「「「「「「「「「「「「「 1819 「「「「「「「「「「 1786-1837 「「「「「「 「「「「「「「「「「「「「「「「「「「「「「「「「「「「「「「「「「「「「「 「「「「「「「「「「「「「「「「「「「「「「「「「 1247


View Full Document

SJSU CS 147 - Lecture 1

Documents in this Course
Cache

Cache

24 pages

Memory

Memory

54 pages

Memory

Memory

70 pages

Cisc

Cisc

18 pages

Quiz 1

Quiz 1

4 pages

LECTURE 2

LECTURE 2

66 pages

RISC

RISC

40 pages

LECTURE 2

LECTURE 2

66 pages

Lecture 2

Lecture 2

67 pages

Lecture1

Lecture1

53 pages

Chapter 5

Chapter 5

14 pages

Memory

Memory

27 pages

Counters

Counters

62 pages

Load more
Download Lecture 1
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture 1 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture 1 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?