Cam 2
Cam 2
SMART DEVICES
Structure
2.1 Introduction
2.2 Objectives
2.3 Components of a computer
2.4 Central Processing Unit (CPU)
2.5 Storage and storage devices
2.6 I/O devices
2.7 Networking and networking devices
2.8 Plug and play devices
2.9 Smart Devices
2.10 Communication technology
2.11 Types of computer
2.12 Summary
2.13 Unit End exercises
2.14 References and Suggested Further Readings
2.1 INTRODUCTION
For an information system, hardware is defined as any machinery that helps
in input, processing, storage, and output activities. Similarly for a computer,
the hardware is the collection of devices that perform the functions of input,
processing, data storage, and output. In other words, all physical units of a
computer system constitute computer hardware. The input device gets the
data from the outside world and the data is stored in the memory. The central
processing unit (CPU) processes this data and the various output devices
provide the results. The components communicate with each other through
system bus. Each hardware component plays an important role in computing.
The arrangement of the component within the system even today is what
was suggested in 1945 as stored program concept of computing by Von
Neumann and is known as Von Neumann architecture. Smart devices use
internet or the organizational network and work as information processors
and information providers. A smart device is an electronic device, generally
connected to other devices or networks via different wireless protocols
such as Bluetooth, Wi-Fi etc., that can operate to some extent interactively
and autonomously. They can be used in almost any industry, from smart
manufacturing to healthcare, helping to improve efficiency and optimize
operations.
2.2 OBJECTIVES
After reading this unit you should be able to:
●● Identify the components of a computer system;
18
●● Describe the elements of a CPU; Computer Systems and
Smart Devices
●● Explain the concept of networking;
●● Use plug and play devices; and
●● Understand about smart devices.
Output
Primary Storage Devices
Secondary Storage
21
Information Technology Types of Main Memory
for Managers
Memory can be of various types like Random Access Memory (RAM) and
Read-Only Memory (ROM). The figure 2.2 given below gives a description
of the memory types.
Memory Types
Random Read
Access Only
Memory Memory
(RAM) (ROM)
RAM has become the synonym for main memory. Earlier, the word core
memory was used for referring to main memory. RAM is the memory
access method and core memory was the technology used in main memory.
The core memory technology is not used any more. RAM is an acronym
for Random Access Memory. As the name suggests, any location of the
memory can be accessed randomly and the access time to is independent of
the location. We will continue to use word RAM to refer to main memory.
RAM is very fast; the access time is in nano seconds. RAM is volatile that
is the contents of RAM are lost when the power supply to the RAM is
discontinued.
DRAM (Dynamic Random Access Memory) has been the most common
kind of RAM. The data is stored in the cell of transistors and capacitors
and the data has to be refreshed every few milliseconds. SRAM (Static
Random Access Memory) does not require periodical refresh. SRAM is
faster than DRAM but is more expensive as compared to DRAM. SDRAM
(Synchronous DRAM) is used these days. In fact the first version of
SDRAM which is also known as DDR (Double Data Rate) RAM came in
1998. Further advancements in DDR have gone up to DDR5 (July 2020)
which has capacity of double the capacity of DDR4 i.e. 2x21.3GB, the
DDR4 being of 21.3GB.
A part of computer storage is ROM that cannot be erased or changed. ROM
is an acronym for read only memory. ROM is nonvolatile i.e. its contents are
not lost when power is switched off. ROM is required for storing the boot
program that should not be lost or changed due to any failure. ROM also
comes in many flavors such as PROM and EPROM. PROM (Programmable
Read Only Memory) is used for storing some specialized application by the
computer designers instead of chip designers. PROM can be written only
once. EPROM (Erasable Programmable Read Only Memory) can be erased
and reprogrammed many times.
22
Secondary Memory Computer Systems and
Smart Devices
Main Memory provides a small amount of volatile storage. But a computer
needs to store large amount of data and instructions permanently. The
secondary memory is non-volatile and has large capacity. The secondary
memory is slow as compared to main memory. Various technologies are used
for secondary memory, some provide random access, and others provide
sequential access. In sequential access, data must be accessed in the order
in which it is stored. For example, if we have stored data of students in the
order of their roll numbers, then to retrieve data of student with roll number
20, we need to read (and possibly discard) the data of students with roll
numbers 01 to 19 before we can access the desired data. If direct access is
provided then any part of the data can be accessed directly, without the need
to pass by other data in sequence. The sequential access storage devices are
referred to as SASD (Sequential Access Storage Devices) and the direct
access devices are called DASDs (Direct Access Storage Devices). The
most common forms of secondary storage devices are magnetic tapes and
magnetic disks.
Magnetic tape is one of the common sequential secondary storage mediums.
The tape usually is a Mylar film coated with iron oxide. Portions of the tape
are magnetized to represent bits. It is sequential access device, to access the
nth block on tape; we must first read the preceding n-1 blocks. The main
advantages of the magnetic disks are that they are inexpensive, long lasting
and can store large volume of data (in Tera Bytes). Generally it is used for
back up or archival storage of data.
Magnetic Disk is all made of magnetic material shaped as a thin circular
disk and protected by a plastic or acrylic cover. A disk is single sided if
it stores information on only one of its surfaces and double sided if both
surfaces are used. To increase storage capacity, disks are assembled into
a disk pack, which may include many surfaces. Information is stored on
the disk surface in concentric circles of small width, each having a distinct
diameter. Each circle is called a track. For disk packs, the tracks with the
same diameter on the various surfaces are called a cylinder. The concept of
cylinder is very important because data stored on the same cylinder can be
retrieved much faster than if it were distributed among different cylinders.
Each concentric circle typically stores the same amount of data. The number
of tracks on a disk ranges up to 1023. Each track is divided into sectors. A
sector can store up to 4KB, available in laptop computers The division of a
track into equal sized blocks or pages is set by the operating system during
disk formatting. There is a read/write head, which reads data from the disk
and writes data to the disk. A disk is mounted on the disk drive, which has
the motor that rotates it. A read/write head has a mechanical arm attached to
it. All arms are connected to an actuator attached to another electrical motor,
which moves the head in unison and positions it over the cylinder of tracks
specified in a block address.
RAID (Redundant Array of Independent Disks) is an array of multiple
inexpensive hard disks that provides fault tolerance through redundancy and
improved access rates. It provides a method of accessing multiple individual
disks, as they are one large disk. The data is spread over these multiple
23
Information Technology disks, thereby reducing the risk of losing all data if one disk fails. Usually,
for Managers RAID is used in a computer, which is a file server or a transaction server,
where data accessibility is critical and fault tolerance is required. RAID is
also used in desktop systems for CAD, multimedia editing, and playback
systems where higher transfer rates are needed. RAID levels storage can be
used for three distinct purposes, including:
Capacity: Capacity is a simple one that is especially involved in most
every type of RAID setup used. For example, two hard drives can be linked
together as a single drive to the OS effectively making a virtual drive that
is twice the capacity.
Security: RAID levels can be used for data security by using some of the
space on the drives to essentially clone the data that is written to both drives.
Once again, with two drives you can make it so that the data is written to
both drives.
Performance: Performance is another key reason for using a RAID setup
on a personal computer. Also, RAID levels can be used for data security by
using some of the space on the drives to essentially clone the data that is
written to both drives. Once again, with two drives you can make it so that
the data is written to both drives.
The RAID has following levels:
1) RAID 0: It is also known as “Disk Striping”. This is technically not
a RAID level since it provides no fault tolerance. Data is written
in blocks across multiple drives for fast access. The advantages of
striping are the higher access rate, and full utilization of the array
capacity. The disadvantage is there is no fault tolerance
2) RAID 1: This is also known as “Disk Mirroring”. Raid 1 provides
redundancy by writing the data twice. If one disk fails, the other contains
an exact duplicate of the data and the RAID can switch to using the
mirror drive with no lapse in user accessibility. The disadvantages of
mirroring are no improvement in data access speed, and higher cost,
since twice the number of drives is required. However, it provides
the best protection of data since the array management software will
simply direct all application requests to the surviving disk members
when a member of disk fails.
3) RAID 2: In this type of RAID set up disk striping occurs at the bit-level.
RAID 2 is seldom deployed because cost to implement are usually
high as a typical set up requires 10 disks and gives poor performance
with some I/O operations.
4) RAID 3: RAID level 3 distribute data across multiple discs and stores
additional information on one disc for error correction in recovery. It
has high reliability and it is fast.
5) RAID 4: RAID 4 is a configuration in which disk striping happens at
the byte level rather than bit level as in RAID 3.
6) RAID 5: It is the most popular configuration. In RAID 5, the
additional data, which is used for error detection and correction, is
also distributed over many discs. This arrangement has very high
reliability and access speed is also good. However, the write operation
24
is slower compared to other RAID configurations. Computer Systems and
Smart Devices
7) RAID 6: RAID 6 is also used frequently in enterprises. It is identical
to RAID 5 except that it is an even more robust because it uses one
more parity block that RAID 5. You can have two disks non-functional
(dead) and still have a system be operational.
There are further RAID levels possible but above are sufficient for your
knowledge.
Optical Disks are the disks made of plastic, in which lasers that physically
burn pits in the disk record data. Here each pit represents a binary digit 1 and
each unpitted area represents binary digit 0. Optical discs are direct access
devices. The advantage of optical disks are that the amount of physical disk
space needed to record an optical bit is much smaller than usually required
by magnetic media and is less susceptible to deterioration.
Cache
It is high-speed memory and expensive. The CPU keeps part of the program
and the data into cache memory, which it is likely to use frequently. Cache
plays a direct role in increasing Internet speed than RAM does. RAM and
cache are both a form of computer memory. Cache stores images and text
from web pages as you view them. Pages in cache are not updated while
RAM refreshes it again and again.
Traditionally, Cache is categorized as “levels” that describe its closeness
and accessibility to the microprocessor. There are three general cache
levels: L1 cache, or primary cache, is extremely fast but relatively small,
and is usually embedded in the processor chip as CPU cache. L2 cache,
or secondary cache, is often more capacious than L1. L2 cache may be
embedded on the CPU, or it can be on a separate chip or coprocessor and
have a high-speed alternative system bus connecting the cache and CPU.
That way it doesn’t get slowed by traffic on the main system bus. Level 3
(L3) cache is specialized memory developed to improve the performance
of L1 and L2.
Activity A
1. Computer’s motherboard, processor, and CPU are the same or
different things?
………………………………………………………………………..
………………………………………………………………………..
………………………………………………………………………..
2. What’s the difference between cache and RAM?
………………………………………………………………………..
………………………………………………………………………..
………………………………………………………………………..
Ring Structure
Hybrid Structure Star Structure
Bus Structure
Tree Structure
Figure 2.3: Types of Network Topologies
Network Devices
Network devices allow multiple computers to exchange data and information
through Internet or Intranet connection. Many people can use a single
printer, or share other devices and resources on the network. Every network
has a router which is a device that connects two or more networks and
determines the next point to which a ‘packet’ of data should be forwarded
towards its destination. A packet is the smallest unit of data that travels on
the network. Hub and Switch are the center points where several network
connections converge i.e. they are the points where data comes in from one
or more directions/locations and is forwarded to one or more directions/
locations. Sometimes the same device serves as both the switch and router.
NIC (Network Interface Card) is a card installed on a computer that connects
the computer to the network. It provides dedicated and full-time connection
to the computer.
Sender Receiver
Transmission
Medium
For the effective communication both the sender and the receiver should
understand the signals and have common interpretation for them. When
communication has to be established a medium is required for transmission.
This pathway/medium is called as communication media. It includes twisted
pair, coaxial cable, fiber optic cable, microwave transmission, and satellite
transmission. With fiber-at-home communication media you get high speed
internet connectivity at your home with applications like internet TV (iTV)
giving the facility of watching TV channels, browsing web sites and can
play and view audio/video programs of your interest.
There are two modes of communication – Synchronous and Asynchronous.
In Synchronous transmission, data bits are sent over a communication link
and the data transfer is controlled by a timing signal initiated by the sending
device. Each data block is preceded by unique characters called sync
bits. The receiving device synchronizes itself with a stream of these bits.
Synchronous transmission is generally used for transmitting large volume
of data at high speed. For Asynchronous transmission, one character is
transmitted or received at a time. Each character is preceded by start bit and
ended with end bit, so that the receiving device knows where the character
begins and ends. It is inefficient due to the overhead of transmitting start
and stop bits. It is generally used for low speed data transmission.
Data transmission occurs in one of the following three directions: Simplex,
half duplex, or full duplex. In simplex data transmission, the data transmission
takes place in only one direction. Public announcement systems such as
radio and television use simplex mode of data transmission. It is simple and
relatively inexpensive. In half- duplex transmission mode, the transmission
takes place in both directions but only in one direction at a time. Full duplex
mode of transmission allows transmission in both directions simultaneously.
For example, on telephone both parties can communicate simultaneously.
The cost of full duplex transmission is high as compared to both simplex
and half duplex.
2.12 SUMMARY
In this unit, we have discussed an introduction to computer systems. The
components of computer, which we explained in detail include: CPU, ALU,
storage, and I/O devices. The CPU works as the brain of the system, while
RAM is the working memory of the system. Today’s computers come with
possibilities to use many plug and play devices, and they are also network
compatible. There are smart devices available today for information
gathering, processing and further disseminating. We have also discussed
the concepts related to networking in this unit, where we have described
the various media used such as co-axial cable, satellite, fiber optics, and
microwave communication. At the end, we have given a brief overview of
different types of computers though generations.