CMP510 Computer System Architecture R
CMP510 Computer System Architecture R
Chavan Computer
Maharashtra System
Open University Architecture
Computer System
Architecture
Production
Course Objectives:
The objective of this course is to study the basics of Computer System and to learn how to
configure computer devices.
To understand the structure, function and characteristics of computer systems.
To understand the design of the various functional units and components of computers like
Motherboard, storage devices, display devices and input output devices.
To understand the peripheral devices and their applications.
To understand PC Troubleshooting and Maintenance Tools.
To understand the concept of Power supply and it’s working.
To understand the concept of parallel processing and pipelining in detail and its applications.
Learning Outcome:
After completion of this course, the student will be able to
Understand Motherboard & Its Components working.
Understand Cache memory and its working, role in OS.
Understand the roles and working of Storage Devices and how the data is stored on these
devices.
Understand how different storage, peripheral and input output devices are connected to
computer and their working.
Understand and demonstrate PC Troubleshooting use of different Maintenance Tools.
Understand the concept of parallel processing ,pipelining and Programming aspects for Intel
Itanium Processor.
Reference Books:
1. Computer organization and architecture by william stallings
2. “Computer Organization” by Zvonco Vranesic and Safwat Zaky
Note: This Study material is still under development and editing process. This draft is being made
available for the sole purpose of reference. Final edited copies will be made available once ready.
IA-32 (Protected)Mode:
This mode is the native state of theprocessor.
In this mode all instructions and architectural features are available, providing the
highest performance and capability. This is the recommended mode for all new
applications and operatingsystems.
Among the capabilities of protected mode is the ability to directly execute “real-
address mode” 8086 software in a protected, multi-taskingenvironment.
The advantages of protected mode (compared to real mode)are:
Northbridge:
MCH – Memory ControllerHub
Bridges connection from CPU to RAM and Video Bus(AGP/PCI-X)
Connects to SouthBridge
A Northbridge with integrated video is called a GMCH – Graphics and Memory
ControllerHub
Southbridge:
ICH – I/O ControllerHub
Bridge connection from Memory Controller Hub to slower devices like USB devices,
PCI-X, IDE(SATA/PATA), Real Time Clock, BIOS, onboard sound andmore
PCI(Peripheral ComponentInterconnect):
1. Extremely High-speed data transfer: 32 bit wide data transfer @33 MHz
gives a maximum throughput of 132 mbps. Data transfer @66 MHz with 64
bit wide data is now beingoffered.
2. Plug & play facility: A PCI board inserted in any PCI slot is automatically
detected & the required i/o & memory resources are allotted by thesystem.
3. New Approach: It moves peripherals of the i/o bus & places them closer to
the system processor bus. Thereby providing faster data transfer between
the processor &peripherals.
4. Processor Independent: The PCI local bus fulfills the need for the local bus
standard that is not directly dependent on the speed & structure of processor
bus, and that is both reliable andexpandable.
5. Full multi master capability: This allows any PCI master to communicate
directly with other PCI masterslave.
6. Parity on both data & address line: This allows implementation of robust
systems (Robustness is defined as "the ability of a system to resist change
without adapting its initial stable configuration") support for both 5 V & 3.3 V
operated logic.
7. Forward & backward compatibility between 66MHz & 33MHzPCI
Q. What is PCI & Explain the Features of PCI?
PCI-X: PCI-X (Peripheral Component Interconnect Extended) is a computer bus
technology that increases the frequency of the data bus from 66MHz to133MHz.
Features of PCI-X bus:
1. Upto 133MHz busspeed
2. 64 bitbandwidth
3. 1 Gbpsthroughput
4. More efficient bus operation for easierinterface.
5. Split transaction allows & indicator device to make only one data request & release
the bus, instead of constantly needing to poll the bus forresponse.
6. Byte count that enables indicators to specify in advanced, the specific number of
bytes requested, eliminating the inefficiency of involving a high risk of loss
prefetches.
7. Backward compatibility.
Q. What is the features of PCI-X Bus?
AGP is a port (it only connects two nodes) while PCI is abus.
AGP can access the system memory via complex operations while PCI can only access the
memory inside the actualcard.
AGP also doesn't share bandwidth with other local devices while PCIdoes.
AGP does not replace the PCI bus, it is a dedicated connection that can be used only by
the graphicssubsystem.
AGP transaction are multiples of 8 bytes in length and are aligned on 8 byte boundaries,
while PCI transactions must be multiples of 4 bytes and are aligned on 4 byteboundaries.
Logical memoryorganization:
High Memory Area: First 64Kb of 2nd Mb used in real mode. It is used for DOS.
ExpandedMemory:
An expanded memory specification (EMS) was a technique introduced in about 1984
for expanding the conventional or main memory beyond 1 MB in IBM XT compatible
computers.
The process was known as bank switching and involved expanding memory beyond
that which was directly addressed by theprocessor.
EMS was designed for disk operating system (DOS) software programs requiring the
additionalmemory.
It was designed to overcome 1 Mb of addressing limitations of first generation 8088 &
8086 PC.
Expanded memory cannot accessible by processor instead it is access with high
memory area 64 Kb segment on board combine with special switching &
mappinghardware.
ExtendedMemory:
All above the 1 Mb is called extendedmemory.
Extended memory refers to any amount of memory that is available for use over the
main memory that is inherent in most DOSsystems
In most cases, this means that any memory over the 1 megabyte (MB) that is
supported by DOS would be considered extendedmemory.
This is all above the high memory area until the end of systemmemory.
Memory of this type is supported by the use of certain types of microprocessors that
allow loading and access to the extended memory.
It is best for windows & multitasking operatingsystem.
Q. Compare Conventional Memory, Expanded Memory & Extended memory.
Types of RAM:
1. StaticRAM:
Static Random Access Memory (Static RAM or SRAM) is a type of RAM that holds data in
a static form, that is, as long as the memory has power. Unlike dynamic RAM, it does not need
to be refreshed. SRAM stores a bit of data on four transistors using two cross-coupled inverters.
Static RAM is faster and less volatile than dynamic RAM, but it requires more power and
is more expensive.
2. Dynamic RAM:
DRAM stores each bit in a storage cell consisting of a capacitor and a transistor. Capacitors
tend to lose their charge rather quickly; thus, the need for recharging or refreshing.
Types of DRAM:
1. FPM (Fast Page Mode): It was traditional RAM for PC. It was mounted in single
inline memory module (SIMM) of 2MB, 4MB, 8MB, 16MB,32MB.
2. EDO (Extended Data Out): It is faster than FPM RAM. EDO have improvement in
performance 2% to 5% compared withFPM.
3. ECC (Error Correcting Code): It is special error correcting RAM used inserver.
4. SDRAM (Synchronous Dynamic RAM): SDRAM replaced DRAM, FPM, and EDO.
SDRAM is an improvement because it synchronizes data transfer between the CPU
and memory. SDRAM allows the CPU to process data while another process is
beingqueued.
Q. Explain the types of DRAM
Features of SDRAM:
DDR SDRAM (double data rate SDRAM) is synchronous dynamic RAM (SDRAM) that
can theoretically improve memory clock speed to at least 200 MHz.
Features of DDR2:
Features of DDR3:
Concept of Cachememory:
CPU Secondary
Level 1 Level 2 Main Memory
Memory
Types of CacheMemory:
L1 (Level 1 or Internal or Primary) Cache:
Level 1 cache, often called primary cache, is a static memory integrated with
processor core that is used to store information recently accessed by a processor.
Level 1 cache is often abbreviated as L1 cache. The purpose of level 1 cache is to
improve data access speed in cases when the CPU accesses the same data multiple
times. For this reason access time of level 1 cache is always faster than access time of
system memory. The processor may have additional level 2 and level 3 caches, albeit
those caches are always slower then the L1 cache.
The L1 cache typically ranges in size from 8KB to 64KB and uses the high-
speed SRAM (static RAM) instead of the slower and cheaper DRAM (dynamic RAM)
used for main memory.
Level 2 cache, also called secondary cache, is a memory that is used to store
recently accessed information. The goal of having the level 2 cache is to reduce data
access time in cases when the same data was already accessed before. In modern
microprocessors that incorporate data prefetching feature the level 2 cache may also
be used to buffer program instructions and data that the processor is about to
request from memory. This also reduces data access time. Please note that the level
2 cache is secondary to the CPU - it is not as fast as the level 1 cache, although it is
usually much larger. All data that is requested from level 2 cache is copied to level 1
cache. Requested data stays in the secondary cache if it's an inclusive cache, and is
removed from secondary cache if it's an exclusive cache.
L3 Cache:
Cache Hit: A request to read from memory which can satisfied from the cache
without using the main memory.
Cache Miss: A request to read from memory which cannot be satisfied from
the cache, for which the main memory has to be consulted.
1. FM encoding method
2. MFM encoding method
3. RLLencodingmethod
1. FMEncodingScheme:
● FMorFrequency Modulation was the original data-encoding scheme used for
storing the data on the magnetic recording surface.
● This method of data encoding is also known as the“Single density recording”.
● In this method,a clock signal is put with every data signal on there cording
surface.
● This clock signal is used for synchronizing the read operation,as there will always
be a clock signal, whether the data signal is there or not.
● In this FM method of data recording a 1 bit is stored as two pulses (one clock
pulse and onedata pulse),and aobitis stored as a one pulse and one gap or no
pulse.
● For example, abinarynumber1011 willbestoredas PP PN PPPP
3. RLL EncodingScheme
● The RLL is encoding or the run length limited encoding is the most common
encoding scheme used in the harddisk storage.
● This encoding scheme can be more accurately called as 2,7 RLL encoding because
in this scheme in a series or in a running length the minimum number of0s next
to each other is two, and the maximum number of 0s together cannot be more
than seven.
● The RLL encoding scheme can store 50 percent more information than MFM
encoding scheme on a given surface and it can store three times as much
information as theFM encoding scheme.The Run length Limited name comes
from the minimum number (run Length)and maximum number (runLimit) of “no
pulse” values allowed between two pulses.
● For the RLL encoding, an encoder/decoder (Endec) table is used to find the pulse
signalto be used for different data bit groups. Endec table used by the IBM to
convert bit information to the pulse signal is shown below
4. Perpendicular Encoding
● Perpendicular recording (or perpendicular magnetic recording, PMR) is a
technology for data recording on magnetic media, particularly hard disks.
● Perpendicular recording can deliver more than three times the storage density of
traditional longitudinal recording.
● In 1986, Maxell announced a floppy disk using perpendicular recording that could
store 100 kB per inch (39 kB/cm).
● Perpendicular recording was later used by Toshiba in 3.5" floppy disks in 1989 to
permit 2.88 MB of capacity (ED or extra-high density), but they failed to succeed in
the marketplace.
1) Disk platters
2) Read/write heads
3) Head actuator mechanism
4) Spindle motor
5) Logic board
6) Cables and connectors
7) Bezel /Front Plate
8) Air Filter
● Thismechanismmovestheheadsacrossthediskandpositionsthemaccuratelyabove the
desired cylinder.
● Two basic Categories are used
● Stepper Motor Mechanism
● VoiceCoilActuator
● StepperMotoractuatorswerecommonlyusedonharddrivesmadeduringthe1980s and
early1990s with capacities of100MBor less
● Floppy disk drives position their head by using as Stepper motor actuator
● All hard disk drives being manufactures today use voice coil actuator.
Voice
CoilActuator
The two main types of voice coil positioner mechanisms are
● Linear Voice Coil Actuators
● Rotary Voice Actuators
Spindle Motor
● The spindle motor spins the platters connected to spindle. The motor is directly
connected to the spindle of platters. These platters revolve at exactly 3600 rpm to
1500 rpm. The speed of motor has to be controlled very precisely.
● Normally a feedback loop is employed in the control electronics to monitor the speed.
The speed control is fully automatic.
Logic Boards
● A disk drive will have a board containing the electronics that control the drive’s
spindle and head actuator systems These are called logic boards.
● They present data to the controller in a planned format.
● They may be removed and replaced to rectify a logic board problem.
Cable and Connectors
● Cable and connectors are used to connect HDD to the main computer system.
● AllharddiskdrivecontainsconnectionsforData/Control interface connector, Power
connector.
Bezel/Front Faceplate
● Bezel is the front faceplate provided on most of the hard disk drives.
●
Air Filters
● Nearly all hard disk drives have two air filter. One is called there circulating filter and
the other is called either a barometric or breather filter.
● These filters are permanently sealed inside the drive and are designed never to be
changes for the life of the drive.
● A hard disk on a PC system does not circulate air from inside to outside the
HDD or viceversa.
● There circulating filter permanently installed inside HD A is designed to filter only
small particles. Scraped off platters during head take-offs and landings.
Cylinder
● Same tracks of different platters form an imaginary cylinder likestructureData is
stored cylinder by cylinder
● All tracks on a cylinder are written and then theR/W head moves to the next
cylinder.
● This reduces movement of R/Whead and increases the speed of read and write
operation
Sector
● A track is a bigareatostoredata( 5000 bytes). Hence tracks are divided into sectors
● Theformattingprogramdividesdisksurfaceintosectorsbywritingmagneticpatternon
disk surface
● Different HDDcapacities have different number of tracks
● 512 byte data can be stored in each sector. Sectorno. starts from 1
Landing Zone
● This setting specifies the cylinder to which the BIOS should send the heads of the hard
disk when the machine is to be turned off. This is where the heads will "land" when
they spin down. Modern drives automatically park the heads in a special area that
contains no data when the power is turned off. Therefore this setting is meaningless
and is typically ignored.
● Most BIOS set this value to be the largest cylinder number of the logical geometry
specified for the disk when auto detection takes place. So if the drive has 6,136 logical
cylinders, the landing zone will be set to 6,135. In any event a modern IDE drive will
ignore this setting and auto-park by itself.
Zone Recording
● One way to increase the capacity of a hard drive during the low level format is to
create more sectors on the disks Outer cylinders than on the inner ones.
● Becausetheyhavealargercircumferencetheoutercylinderscanholdmoredata.Drives that
use zoned recording split the cylinders into groups called zones, with each successive
zone having more sectors per track as you move outward from the center of disk.
Write Precompensation
Master Boot Record, a small program that is executed when a computer boots up.
● Typically, the MBR resides on the first sector of the hard disk or diskette that
identifies how and where an operating system is located so that it can be boot
(loaded) into the computer's main storage or random access memory.
● The program begins the boot process by looking up the partition table to determine
which partition to use for booting.
● It then transfers program control to the boot sector of that partition, which continues
the boot process. In DOS and Windows systems, you can create the MBR with the
FDISK
/MBR command
The MBR contains two elements;
1. Executable code and
2. A partition table,
● Which identifies each partition residing on the hard drive? The MBR executable code
or program begins the boot process by looking up the partition table to determine
what partition holds the operating system.
● This program looks for two hidden program files IO.SYS and MSDOS.SYS for DOS and
executes IO.SYS program first. This program in turn loads MSDOS.SYS and
COMMAND.COM into RAM to complete the process of booting.
● From the above figure, you can see that a disk drive is composed of N sectors and
each sector is of 512 bytes.
● Out of the N sectors, the first sector is assigned to the Master Boot record. The first
512 bytes of the BIOS is the Master Boot Record. MBR is composed of two
components: a Bootsrapping program and the partition table. The code can be
Windows loader, Unix loaders, or a virus.
● Next, comes the partition table. The partition table is of 64 bytes and a 16 byte part
which tells about the partition of the disk.
● The MBR is very small in size. Its machine code just helps to load that sector which is
responsible for booting the associated partition
Formatting
1. It prepares a blank hard disk for a particular OS.
2. It puts magnetic marks of tracks and sectors on the platter surface.
3. The storage capacity of formatted hard disk is always less than the capacity of
unformatted disk.
4. A typical sector has 3 standard components.
a. Identification field which contains the address of the sector i.e. the track head and the
sector number.
b. Data field which contains data recorded at a particular location. It also contains
error detection and correction codes.
c. Number of gaps.
5. FAT and root directory are also put on the platter at the time of formatting. Hard Disk
requires a low level formatting and a high level formatting to make it useful for data
storage
6.
Low Level Formatting (Physical or true formatting)
● It is done at the factory level. (In low level formatting all the data stored on the disk is
lost as the disk is physically formatted)
● It magnetically divides the disk into tracks and sector.
● Basic addressing information is written to each sector of each cylinder.
● It checks for bad sectors and maps them out.
Partitioning
● Creating a partition on a hard disk drive enables it to support file systems each in its
own partition. Three common file systems are used by PC operating today:/
Structure
Partition Boot Master File System File File Area
Sector Table
● Used by Windows NT, XP, 2000 , Server 2003, Server 2008, Windows Vista
● NTFS provides better performance, security compatibility and extendibility than
FAT
● Read, Search, Write, Recovery are done fast.
● Master File Table (MFT) contains information about all files and folders. First file on
NTFS volume.
● Partition Boot Sector Start at Sector 0 to 16. First Info on an NTFS volume.
Features
● It allows you to encrypt files and automatically decrypt them as they are read.
● Supports long file names upto 255 characters
● Supports File Size upto 2 TB
● For keeping track of clusters it uses a B- tree directory
● Reliable File System as compared to FAT
● Allows Large partition sizes i.e more than 4 GB
● Built-in file compression facility
● Improved Security And access control deciding who can perform what sorts of
operations on various data within the file system
Features
Features
1. SATA is better more efficient interface than the dated PATA standard.
2. It supports hot swapping
3. Serial ATA uses only 7 conductors while PATA uses 40.
4. Data Transfers at the rate of 1.5 Gbit/s, 3 Gbit/s and 6 Gbit/s
CD ROM Recording
1. The laser diode emits a low –energy infra red beam towards the reflecting mirror
2. The servo motor positions the beam onto the correct track on the CD ROM
by moving the reflecting mirror
3. When the beam hits the disc, its reflected light is gathered and focused through
the first lens beneath the platter, bounce off the mirror and sent towards the
beam splitter
4. The beam splitter directs the returning laser light towards another focusing lens
5. The last lens direct the light beam to a photo detector and convert the light into
electric impulses
These incoming impulses are decoded by the microprocessor and sent along to the host
computer as data.
1. Optional
storage media for storing data
2. Uses primary for movies softwares and data backup purpose
3. DVD holds about 7 times more data than CD Data
4. DVDs can store more data than CDs for a few reasons:
Sides 1 1 or 2
Layers 1 1 or 2
length(µ)
Wavelength(nm) 780 650 Of laser diode
pickup
Tracks Yes No DVD uses files
not tracks
1 DVD 5 4.7 GB 1 1
2 DVD 9 8.54 GB 2 1
3 DVD 10 9.4 GB 1 2
4 DVD 18 17.08 GB 2 2
• The format offers more than five times the storage capacity of traditional
DVDs and can hold upto 25 GB on a single layer disc and 50 GB on a dual
layer disc.
● A blue laser is used to read the media. Blue light has a shorter wavelength than
red used by previous technologies. This makes it possible to read data with
greater precision.
Blu –Ray Disc Specification
●
Specification Value Specificatio Value
n
23.3 GB/25 0.32µm
Capacity (Single Tracking
Layer) GB/27 GB Pitch
0.160/0.149/0.1
46.6 GB/50 Shortest pit 3
Capacity (Dual
8
Layer)
GB/54 GB length µm
Trackin Groove
Disc thickness 1.2 mm g Recording
format
Optical Video
Protection 0.1 mm Format MPEG2
Layer
UNIT 3
– CRT works by moving an electron beam back and forth across the back of
the screen.
– Common in early 1960s through the 1980s.
– Green screen was the common name using green “P1”
Parts of a CRT
The features of a CRT can be split into 3 main sections: The electron gun, the deflection
system and the fluorescent screen.
1. Electron Gun
The role of this section is to produce electrons at a high, fixed, velocity.
This is done through a process known as thermionic emission.
A filament in the cathode is heated to the point where its electrons become loose.
An anode with a high voltage applied to it accelerates the electrons towards the screen
due to electrostatic attraction.
On the way, the electrons pass through a series of control grids which control the
brightness of the image produced.
The more negative the grid, the darker the image and vice versa.
2. Deflection system
The role of the deflection system is to control the image produced by controlling the
position that the electrons hit the screen.
It consists of Two PERPENDICULAR sets of Electric/Magnetic fields.
This allows control over both horizontal and vertical axes.
By controlling the Voltage applied to the fields, it is possible to vary the deflection
through Electrostatic force/Motor effect.
3. Fluorescent screen
The role of this part is to display where the electrons are hitting the CRT.
It is a screen coated with a material that emits light when struck by electrons.
Zinc sulfide or Phosphorus are two commonly used materials.
Working of CRT Monitor
1. An electron gun consists of a series of electrodes producing a narrow beam of highvelocity
electrons.
2. When voltage is applied to the heater coil the cathode energizes the electrons and starts
the emission of electrons
3. The intensity of the beam is controlled by variation of the negative potential of the
cylindrical control grid surrounding the cathode.
4. The control grid has a hole in the front to allow passage of the electron beam.
5. The focus grid adjust its potential to achieve the desired focus. The electrons are
accelerated and focused on the fluorescent screen In order to eliminate flicker, most monitors
refresh the screen at a 60 Hz rate.
LCD technology is used for displaying the image in notebook or some other electronic devices
like mini computers.
Light is projected from a lens on a layer of liquid crystal. This combination of colored light
with the grayscale image of the crystal (formed as electric current flows through the crystal)
forms the colored image. This image is then displayed on the screen.
Liquid crystal display screen works on the principle of blocking light rather than emitting light. LCD’s
requires backlight as they do not emits light by them. We always use devices which are made up of
LCD’s displays which are replacing the use of cathode ray tube. Cathode ray tube draws more power
compared to LCD’s and are also heavier and bigger.
1. The basic structure of LCD should be controlled by changing the applied current.
2. We must use a polarized light.
3. Liquid crystal should able be to control both of the operation to transmit or can also able to
change the polarized light.
Next comes to the second piece of glass with an electrode in the form of the rectangle on the
bottom and, on top, another polarizing film. It must be considered that both the pieces are
kept at right angles. When there is no current, the light passes through the front of the LCD it
will be reflected by the mirror and bounced back. As the electrode is connected to a battery
the current from it will cause the liquid crystals between the common-plane electrode and
the electrode shaped like a rectangle to untwist. Thus the light is blocked from passing
through. That particular rectangular area appears blank.
Passive matrix LCDs- use a simple grid to supply the charge to a particular pixel on the display.
The liquid crystal material is sandwiched between the two glass subtrates and a polarizing film is
added to the outer side of each substrate. To turn on a pixel, the integrated circuit sends a charge
down the correct column of one substrate and a ground activated on the correct row of the other.
The row and column intersect at the designated pixel, and that delivers the voltage to untwist the
liquid crystals at that pixel.
To address a pixel the column containing the pixel is sent a charge, the corresponding row is
connected to ground. When sufficient voltage is placed across the pixel, the liquid crystal
molecules align parallel to the electric field.
In passive matrix LCDs (PMLCDs)there are no switching devices, and each pixel is addressed for
more than one frame time.
Active matrix LCDs- In active matrix LCDs, a switching device and a storage capacitor are
integrated at the each cross point of the electrodes.
The active addressing removes the multiplexing limitations by incorporating an active switching
element. In contrast to passive matrix LCDs, active matrix LCDs have no inherent limitation in the
number of scan lines, and they present fewer cross talk issues.
Advantages of an LCD’s:
LCD’s consumes less amount of power compared to CRT and LED
LCD’s are consist of some microwatts for display in comparison to some mill watts for
LED’s
LCDs are of low cost
Provides excellent contrast
LCD’s are thinner and lighter when compared to cathode ray tube and LED
Disadvantages of an LCD’s:
Require additional light sources
Range of temperature is limited for operation
Low reliability
Speed is very low
LCD’s need an AC drive
Liquid crystal technology has major applications in the field of science and engineering as
well on electronic devices.
The core of the accelerator is the graphics chip (or Video chipset). The graphics chip connects
directly with the PC expansion bus. Graphics command and data are transmitted into pixel
data and stored in Video memory offers a second data bus that is routed directly to the Video
board’s RAM DAC (Random Access Memory Video to Analog Converter). The graphics chip
directs RAM DAC operation and ensures that VRAM data is available. The RAM DAC then
translates Video data into red, green and horizontal and vertical synchronization signals
output signals generated by the monitor. This architecture may appear simple, but this is due
to high level of integration provided by the chipsets being used.
VRAM Connect to
Monitor
RAMDAC
Video BIOS
ROM
Graphics
Accelerator
UNIT 4
Objectives
To understand the construction and working of Input /Output Devices.
To understand the Interfacing of the above peripherals.
4.1 Keyboard:
When buying a new desktop computer, no components are given less consideration
when evaluating the machine than the keyboard and mouse. Keyboard is the most
common and very popular input device which uses to input text data to the computer.
The layout of the keyboard is like that of traditional typewriter, although there are
some additional keys provided for performing additional functions. The basic
functionality of the PC keyboard has changed little in the almost 20 years since the
release of the original IBM PC. The number of keys increased 83 to 101 and now
there is 104 and most of keyboard manufacturers provide special faction keys like
multimedia functionality.
Both wireless and wired keyboards require a specific device driver in order to be used
with the computer. Drivers for standard, non-advanced keyboards usually don't need
to be downloaded because they're already included in the operating system.
b) Capacitive Keyboard
These keyboards are unique in that pressing a key does not make electrical contact to
complete the circuit. Instead, movement of the plunger on the bottom of a key alters
the state of a capacitive circuit, which the keyboard controller recognizes as a key
press. Keyboards with capacitive switches provide clacky feedback, are even more
durable than mechanical keyboards.
c) Membrane keyboard
Most current keyboards use membrane switches. Unlike mechanical and capacitive
keyboards, which use discrete physical switches for each key and are correspondingly
expensive to produce, a membrane keyboard combines all key switches into one unit
comprising three membrane layers. The bottom layer has printed conductive traces
that correspond to the individual key switches. The middle layer is a spacer, with
holes that expose each underlying switch. The top layer is an array of rubber domes,
against each of which the bottom of a key impinges. When a key is pressed, it
forces the conductive bottom of the rubber dome through the spacing layer and into
contact with the switch traces on the bottom layer, completing the circuit. When the
key is released, the rubber dome forces it back into rest position.
d) Dome-switch keyboard
There’s also a hybrid type that combines elements from the category of flat-panel
membrane or mechanical-switch. Known dome-switch, it uses two circuit board traces
under a flexible keypad using either metal or polyurethane formed dome. They bring
two circuit board traces together under a rubber or silicone keypad using either metal
"dome" switches or polyurethane formed domes. The metal dome switches are formed
pieces of stainless steel that, when compressed, give the user a crisp, positive tactile
feedback.
This type of switch technology happens to be most commonly used in handheld
controllers, mobile phones, automotive, consumer electronics and medical devices.
Dome-switch keyboards are also called direct-switch keyboards.
2 Reserved No connection
6 Reserved No connection
Shield - Ground
4.2 Mouse
Mouse was not part of original PC configuration till the Graphical User Interface (GUI)
had not been introduced. But in mouse became essential input device as keyboard.
Mouse is the most popular pointing device. It is a very famous cursor-control device
having a small palm size box with a round ball at its base, which senses the
movement of the mouse and sends corresponding signals to the CPU when the
mouse buttons are pressed.
Generally, it has two buttons called the left and the right button and a wheel is present
between the buttons. A mouse can be used to control the position of the cursor on
the screen, but it cannot be used to enter text into the computer. The optical mouse
is a computer mouse first introduced by Microsoft on April 19, 1999, that utilizes
LEDs (light-emitting diodes) or a laser to track movement. These differing
technologies are identified by examining the bottom of the mouse.
The Pointing devices come in many forms, all of which are the permutations o the
original mouse design. The following sections examine some of these pointing
devices and how they work.
The rotating ball of an opto-electronic mouse is metal made for weight and rubber-coated
for grip. When the mouse is moved, the ball rotates, and as it does so it drives two
rollers, one each an x-axis or y-axis displacement. A third spring-loaded roller holds
the ball in place against the other two. These rollers then turn two disks with radial
slots cut in them. Each disk rotates between a photo-detector cell, and each cell
contains two offset light emitting diodes (LEDs) and light sensors. As the disk turns,
the sensors see the light appear to flash, showing movement, while the offset
between the two light sensors shows the direction of movement.
1. The scroll wheel to detect rotation and switch mechanism detects button press.
2. A light-detector sensor detects the reflected light from surface for movements.
3. Desk surface to light-detector angular guided channels.
4. LED light generator to detect movement.
In optical mouse a LED glow the surface below the mouse. The light from the LED
reflects off microscopic textural features in the area of traverse, a plastic lens
collecting the reflected light and forming images on a sensor. The presence of optical
light is an added advantage because there is no case of a mechanical failure in the
mouse which affects the movement. Optical mouse have a standard DPI of 800 and it
increases depending on the need of the mouse. Gaming mouse go up to 12,000 DPI
as it requires extreme precision.
a) Serial Mouse
The IBM PC didn't have a joystick port, but it did have an RS-232C or serial port for
communicating with other devices. Early models from Microsoft and Mouse Systems
were often designed to attach to this port. Serial ports came in 9-pin and 25-pin
versions, but a serial mouse would work on either of those connections with an
appropriate adapter.
b) PS/2 Mouse
When IBM introduced its PS/2 series of personal computers, We already discussed in
keyboard, The PS/2 port is a 6-pin mini-DIN connector used for connecting keyboards
and mouse to a PC compatible computer system.
Original PS/2 connectors were black or had the same colour as the connecting cable
(mainly white). Later the PC 97 standard introduced a colour code: the keyboard port,
and the plugs on compliant keyboards, was purple colour while mouse ports and
plugs were green.
c) USB Mouse
When the USB interface was first defined in the 1990s, they provide a single port that
could be used for any peripheral device including a mouse. Any types of mouse that
still use a cord typically continue to use a USB connector.
d) Wireless Mouse
Cords can be inconvenient, so wireless mouse were introduced. Some conventional
designs plug a small wireless dongle into the USB port and use that to communicate
between the mouse and the computer. Cordless mouse use infrared or other
technologies to transmit their signal to a receiver connected to computer.
Modern laptops and tablets typically have Bluetooth built in, so a Bluetooth mouse
doesn't require a dongle.
4.3 Scanner
A scanner is an input device that scans physical documents such as photographs and
pages of text. When a document is scanned, it is converted into a digital format. This
creates a digital version of the document that can be viewed and edited using
computer.
Some scanners are flat scanning surface it call flat bed scanner. This is ideal for
photographs, magazines, and various documents. Another type of scanner is a sheet-
feed scanner, which can only accept single paper documents at one time. While
sheet-feed scanners cannot scan books, some models include an automatic
document feeder, which allows multiple pages to be scanned in sequence.
Scanners can access using computer software programs, which acquire data from the
scanner. Most scanners include basic scanning software that allows the user to
configure, initiate, and import scans. Scanning plug-ins can also be installed, which
allow various graphical editing software programs to import scanned images directly.
OCR systems are made up of a combination of hardware and software that is used to
convert physical documents into digital format. Optical scanner or specialized circuit
board is used to copy or read text while software typically handles the advanced
processing. Software can also take advantage of artificial intelligence (AI) to
implement more advanced methods of intelligent character recognition (ICR), like
identifying languages or styles of handwriting.
The dark areas are then processed further to find alphabetic letters or numeric digits.
OCR programs can vary in their techniques, but typically involve targeting one
character, word or block of text at a time. There are two basic types of core OCR
algorithm,
Pattern recognition- OCR programs are feed examples of text in various fonts and
formats which are then used to compare, and recognize, characters in the scanned
document.
Feature detection- OCR programs apply rules regarding the features of a specific letter or
number to recognize characters in the scanned document. Features could include the
number of angled lines, crossed lines or curves in a character for comparison. For
example, the capital letter “A” may be stored as two diagonal lines that meet with a
horizontal line across the middle.
4.3.7 TWAIN
TWAIN is a widely-used program scan an image using a scanner directly into the
application. Otherwise we have to switch between photo editor application and
scanner application to receive the image, and then move the image to the application
where you wanted to work with it. The TWAIN driver runs between an application and
the scanner hardware. TWAIN usually comes as part of the software package with
scanner.
The software was developed by a work group from major scanner manufacturers and
scanning software developers and is now an industry standard. In several accounts,
TWAIN was an acronym developed playfully from "Technology Without An Important
Name."
4.3.8 Resolution
Scanners simply read colour information from a photograph or piece of film and record
this information as a grid of pixels. The amount of detail captured with a scanner is
determined by something called scanning resolution. Resolution is measured in
samples per inch or SPI. Many times people refer to resolution with the term DPI,
"dots per inch", or with PPI, "pixels per inch". So before we define pixel resolution, it
is necessary to define a pixel. Pixel defines as the smallest element of an image. A
pixel can store a value proportional to the light intensity at that particular location.
The resolution can be defined in many ways. Such as pixel resolution, spatial resolution,
temporal resolution, spectral resolution. Out of which pixel resolution is mostly used
to define the resolution of digital image. In pixel resolution, the term resolution refers
to the total number of count of pixels in an digital image. If an image has M rows
and N columns, then its resolution can be defined as M X N.
The higher is the pixel resolution, the higher is the quality of the image.
4.4 Modem
Modem is short for "Modulator-Demodulator." It is a hardware component that allows
a computer or another device, such as a router or switch, to connect to the Internet.
It converts or "modulates" an analog signal from a telephone or cable wire to digital
data or machine understandable language. Similarly, it converts digital data from a
computer into an analog signal that can be sent over standard telephone lines.
Modem ware introduce as dial-up type meaning they had to dial a phone number to
connect to an ISP. These modems operated over standard analog phone lines and
used the same frequencies as telephone calls, which limited their maximum data
transfer rate to 56 Kbps. Dial-up modems also required full use of the local telephone
line, meaning voice calls would interrupt the Internet connection.
Modern type modems are typically DSL Digital Subscriber Line or cable modems,
which are considered "broadband" devices. DSL modems operate over standard
telephone lines, but use a wider frequency range. This allows for higher data transfer
rates than dial-up modems and enables them to not interfere with phone calls. Cable
modems send and receive data over standard cable television lines, which are
typically coaxial cables. Most modern cable modems support DOCSIS (Data Over
Cable Service Interface Specification), which provides an efficient way of transmitting
TV, cable Internet, and digital phone signals over the same cable line.
DSL
DSL stands for Digital Subscriber Line, and it's one of the many technologies used to
bring an Internet connection and information into homes and businesses. DSL is a
communications medium used to transfer digital signals over standard telephone lines.
Along with cable Internet, DSL is one of the most popular ways ISPs provide
broadband Internet access. Because it has more convenient than dial-up modem such
as Internet connection open and still use the phone line for voice calls,The speed is
much higher than a regular modem and DSL doesn't necessarily require new wiring;
it can use the phone line you already have. DSL modem has so
Broadband
Broadband refers to telecommunication in which a wide band of frequencies is
available to transmit information. Due to high-speed data transmission in which a
single cable can carry a large amount of data at once. Because a wide band of
frequencies is available, information can be multiplexed and sent on many different
frequencies or channels within the band concurrently, allowing more information to be
transmitted in a given amount of time.
Internal Modem
An internal modem is a modem which in installed inside of a computer. Internal
modems typically come with the computer and come pre-installed. However, some
computers may not have modems or the internal modem that came with the computer
might be damaged or corrupt. In either case, using an internal modem does not take
up any additional space outside the computer, and can be powered using the
computer's own power supply. Basically it is as PCI add-on card type and installed in
PCI, ISA, AMR, or CNR slot on IBM compatible computers.
External Modem
The external modem connects computer with serial or USB cable. The modem
typically connects to the computer via a serial or USB cable, and is usually powered
by an external source, rather than the computer. Modem perform basically three type
of role i.e Data compression, for reducing the amount of time, it takes for sending
data and for cutting down on the amount of error in the signal, modems need to
employ data compression. Another role is Error Correction, This is the process in
which the Modem checks the information they have received is undamaged.
Sometimes damage of data is being noticed in the form of altered or lost data. Next
is Flow Control, the speed of sending information differs from modem to modem.
There is a huge necessity of slowing down the speed of the fast modems so that the
slow ones can work properly.
A printer is an output device that prints paper documents. This includes text
documents, images, or a combination of both. The two most common types of
printers are inkjet and laser printers. Inkjet printers are commonly used by
consumers, while laser printers are a typical choice for businesses. Dot matrix
printers, which have become increasingly rare, are still used for basic text printing.
The printed output produced by a printer is often called a hard copy, which is the
physical version of an electronic document. While some printers can only print
black and white hard copies, most printers today can produce colour prints. In
fact, many home printers can now produce high-quality photo prints that rival
professionally developed photos. This is because modern printers have a high DPI
(dots per inch) setting, which allows documents to printed with a very fine
resolution.
In order to print a document, the electronic data must be sent from the computer
to the printer. Many software programs, such as word processors and image
editing programs include a "Print..." option in the File menu. When you select
"Print," you will typically present with a Print dialog box. This box allows you to
select the print output settings before sending the document to the printer. After
choosing the appropriate settings, you can hit the Print button, which will send the
document to the printer.
Most modern printers are connected using a standard USB cable. However, some
printers can be wirelessly connected to one or more computers over a Wi-Fi
network or using Bluetooth technology. We can also use more than one printer on
a single computer, as long as the correct drivers are installed.
Printer Characteristics
Types of Printer
Printer are categorised by the technology used in printer. This may vary the
speed; quality and feasibility of printer. Printers are available in following types.
Laser Printers
Solid Ink Printers
LED Printers
Business Inkjet Printers
Home Inkjet Printers
Multifunction Printers
Dot Matrix Printers
3D Printers
Impact dot matrix printing uses a print head that moves back-and-forth, or in an
up-and-down motion, on the page and prints by impact, striking an ink-soaked
cloth ribbon against the paper, much like the print mechanism on a typewriter. In
a dot matrix display, the images are estimated using a discrete set of dots instead
of lines and shapes. Therefore, the more dots that are used, the more clear and
accurate the image representation will be. For example, a 16x16 dot matrix can
represent the letter "R" more accurately than a 8x8 matrix. If enough dots are
used, the image will appear as a contiguous display rather than a group of dots.
This is because the human eye blends the dots together to create a coherent
image.
Working
Dot matrix printers, like any impact printer, can print on multi-part stationery or
make carbon-copies. Impact printers have one of the lowest printing costs per
page. They are able to use continuous paper rather than requiring individual
sheets, making them useful for data logging. Dot matrix printers are having two
important characteristics that in clued speed which is given character per second
(cps). The speed might get varied from 50 to over 500 cps. The dot matrix printer
uses a ribbon that is covered with ink. The pins strike the ribbon in order to
transfer the ink onto the paper in response to the computer’s command when the
paper feeder moves the paper in to position. Colour ink ribbon consists of three
bans corresponding to the three primary colours. Colour image need to be printer
with several pin strikes so that you can the proper tone.
The advantages are: low purchase cost, can handle multipart forms, cheap to
operate, rugged and low repair cost. The disadvantages are: noise, lower
resolution, and colour looks faded and streaky, speed.
4.5.2 Inkjet
Inkjet printers are the most common type of consumer printers. The inkjet
technology works by spraying very fine drops of ink on a sheet of paper. These
droplets are "ionized" which allows them to be directed by magnetic plates in the
ink's path. As the paper is feed through the printer, the print head moves back
and forth, spraying thousands of these small droplets on the page.
While inkjet printers used to lack the quality and speed of laser printers, they
have become almost as fast as laser printers and some can even produce higher-
quality images. Even low-budget inkjet printers can now print high-resolution
photos. The amazing thing is, as the quality of inkjet printers has improved, the
prices have continued to drop. However, for most people, refilling the inkjet
cartridges a few times will often cost more than the printer. Most consumer inkjet
printers use the thermal inkjet process.
The major part of an ink jet printer are a microscopic nozzles which eject ink onto
the paper. These nozzles are typically about 10 micrometers in diameter. It is not
unusual for a home ink jet printer to contain thousands of nozzles in all, several
hundred for each colour of ink. The diameter of each of these nozzles is
fabricated with sub-micrometer accuracy to achieve consistent and uniform ink
drop volume, which is essential for consistent and uniform colour density on the
page. The ink jet nozzles are all mounted together on a moving carriage assembly
that moves at high velocity. The nozzles are mounted about 1 mm from the paper,
and ink ejection velocities are in the range of 5 to 10 meters per second.
4.5.3 Laser
Laser printing is digital printing process to produces high-quality text and graphics
by repeatedly passing a laser beam back and forth over a negatively charged
cylinder called a "drum" to define a differentially charged image. Invented at Xerox
PARC in the 1970s, laser printers were introduced for the office and then home
markets. Over the decades, quality and speed have increased as price has fallen,
and the once cutting-edge printing devices are now ubiquitous.
Working
Though contrary to popular belief, the laser does not actually burn the images
onto the paper. Instead, as paper passes through the printer, the laser beam fires
at the surface of a cylindrical drum. This drum has an electrical charge (typically
positive), that is reversed in areas where the laser beam hits it. By reversing the
charge in certain areas of the drum, the laser beam can print patterns (such as
text and pictures) onto the photoreceptor.
Once the pattern has been created on the drum, it is coated with toner from a
toner cartridge. The toner is black in most cartridges, but may be cyan, magenta,
and yellow in colour laser printers. The positively charged toner clings to areas of
the drum that have been negatively charged by the laser. When the paper passes
through the printer, the drum is given a strong negative charge, which allows the
toner to transfer and stick to the paper. The result is a clean copy of the image
written on the paper.
Laser printers do not use ink so they have less image smearing problems than
inkjet printers and are able to print pages faster. While laser printers and toner
cartridges typically cost more than inkjet printers and ink cartridges, most laser
toner cartridges last several times longer than ink cartridges, which make their
cost per page about equal. For this reason, businesses tend to use laser printers,
while consumers are more likely to use inkjet printers. Laser printers typically
have a resolution of 600 dpi (dots per inch) or higher.
Advantages of laser printers are laser printer produce high quality printouts -
better than ink-jet or dot-matrix, faster than ink-jet or dot-matrix. While
disadvantages of laser printers are this printer are most expensive printer type to
buy, especially colour lasers as well as toner is more expensive than ink-jet
cartridges, due to lots of complex equipment inside it is expensive to repair.
Block diagram and specifications.
Fig. Laser printer assembly
SMPS-
Switch mode power supplies (SMPSs) are used in a range of applications as an efficient and
effective source of power. This is in major part of their efficiency. For anybody still working
on a desktop, look for the fan output in the central processing units (CPU). That’s where the
SMPS is. SMPS offers advantages in terms of size, weight, cost, efficiency and overall
performance. These have become an accepted part of electronics gadgets. Basically, it is a
device in which energy conversion and regulation is provided by power semiconductors that
are continuously switching “on” and “off” with high frequency.
A switching regulator does the regulation in the SMPS. A series switching element turns the
current supply to a smoothing capacitor on and off. The voltage on the capacitor controls the
time the series element is turned. The continuous switching of the capacitor maintains the
voltage at the required level.
Design basics-
AC power first passes through fuses and a line filter. Then it is rectified by a full-wave bridge
rectifier. The rectified voltage is next applied to the power factor correction (PFC) pre-
regulator followed by the downstream DC-DC converter(s). Most computers and small
appliances use the International Electrotechnical Commission (IEC) style input connector. As
for output connectors and pinouts, except for some industries, such as PC and compact PCI, in
general, they are not standardized and are left up to the manufacturer.
Why SMPS
Like every electronic gadget, SMPS also involve some active and some passive components.
And like each of those gadgets, it has its own advantages and disadvantages.
Signal description
Signals-
The variation of dependent parameter with respect to independent parameter constitutes a
signal. Signal can be also defined as a singled value function of time that conveys information.
It may be of real value or complex value. Signals may be of different types, eg. audio signal,
video signal or data signal etc.
Classification Of Signals
Signals may describe a wide variety of physical phenomena. Although signals can be
represented in many ways, in all cases, the information in a signal is contained in a pattern of
variations of some form. Signals are classified into following categories:
In discrete time signal, the independent variable is a discrete in type. Therefore they are just
defined only at discrete interval of time. A discrete time signal is a sampled form of
continuous time signal. When each sample is quantized into a finite series of value, we get a
digital signal.
Load regulation: Change in value of dc output voltage resulting from a change in load from
open-circuit to maximum-rated output current, specified as the change in ± mV or ± %.
Rated Wattage: This is the nominal wattage that the power supply can deliver. Nominal
wattage is a composite figure, determined by multiplying the amperages available at each of
the several voltages supplied by a PC power supply by those voltages. Nominal wattage is
mainly useful for general comparison of power supplies. What really matters are the
individual wattages available at different voltages, and those vary significantly between
nominally similar power supplies.
Ripple: Rectifying and filtering a switching power supply’s output results in an ac component
(ripple) that rides on its dc output. Ripple frequency is some integral multiple of the
converter’s switching frequency, which depends on the converter topology. Ripple is
relatively unaffected by load current, but can be decreased by external capacitor filtering.
1. Surge /Spike
Surges and spikes are short-term voltage increases. They are typically caused by
lightning strikes, power outages, short circuits or malfunctions caused by power
utility companies. They cause data corruption, catastrophic and costly equipment
damage and incremental damage that degrades equipment performance and
shortens its useful lifespan.
Problems caused by surges/spikes:
Systemlockups
Incremental or catastrophic equipmentdamage
Lostproductivity
2. LineNoise
Line noise refers to distortion on AC, telephone/DSL, network or coaxial lines caused
by Electromagnetic Interference (EMI) and Radio Frequency Interference (RFI). Line
noise is unavoidable and will appear on every signal at some point, though it is not
always detrimental, or even noticeable. It causes incremental electronic circuit
damage, data corruption, audio/video quality problems and confusion between
system components.
Line noise generated by electronic devices varies greatly and can be produced by
energy disturbances from a variety of sources, both natural and man-made.
1. Swell /Overvoltage
Swells are basically the opposite of a brownout: instead of a voltage deficiency, or
Over the years, as technology has progressed, electronics have grown more and more
sensitive to fluctuations in the electrical currents powering them. The microprocessors and
other fragile components in computers and home theater equipment can be compared to
temperamental little divas: they perform like a dream, but if working conditions become
unfavorable, they’ll blow up on you! Because of this, it’s more crucial than ever to invest in
surge protection.
Indicator Lights: Indicator lights on surge protectors can keep you informed of two things:
when a power surge is actually taking place, and the status of your surge protectors MOV. It’s
important to keep tabs on the condition of an MOV, because after a few good surges it can
become less effective. With an indicator light letting you know what’s going on inside your
surge suppressor, you’ll never have to guess whether or not your electronics are receiving
the protection they need!
UL Listing: A UL Listing is a great way to know that the product you’re purchasing is safe and
up to standard. But with items like surge protectors, it’s important to pay attention to exactly
which UL standard the device is listed for! There are some surge suppressors on the market
that are UL-listed for their power cords only. If you want to avoid ending up with one of
these, make sure that any surge-protection device you’re interested in is listed in accordance
with UL 1449, the Underwriters Laboratories standard for surge suppressors.
An uninterruptible power supply (UPS) is a device that allows a computer to keep running for
at least a short time when the primary power source is lost. UPS devices also provide
protection from power surges.
A UPS contains a battery that "kicks in" when the device senses a loss of power from the
primary source. If an end user is working on the computer when the UPS notifies of the
power loss, they have time to save any data they are working on and exit before the
secondary power source (the battery) runs out. When all power runs out, any data in your
computer's random access memory (RAM) is erased. When power surges occur, a
UPS intercepts the surge so that it does not damage the computer.
Every UPS converts incoming AC to DC through a rectifier and converts it back with an
inverter. Batteries or flywheels store energy to use in a utility failure. A bypass circuit routes
power around the rectifier and inverter, running the IT load on incoming utility or generator
power.
In the case of Off-Line UPS, the inverter is off when the mains power
is on and the output voltage is derived directly from the mains. The
inverter turns on only when the mains supply fails. Its switching
time is less than 5 ms. These UPS are generally used with PCs or
computers or other appliances where a small duration (5 ms or
less) interruption in power supply can be tolerated. Usually, sealed
batteries or lead-acid batteries are used. The running time of these
supplies is also low (about 10 to 30 minutes).
How does an Uninterruptible Power Supply (UPS) work?
An uninterruptible power supply (UPS), also known as a battery backup, provides backup
power when your regular power source fails or voltage drops to an unacceptable level. A UPS
allows for the safe, orderly shutdown of a computer and connected equipment. The size and
design of a UPS determine how long it will supply power.
UPS Topologies
Different UPS topologies provide specific levels of power protection. A Cyber Power UPS will
belong to one of these three topologies: standby, line interactive, and double-conversion.
Standby is the most basic UPS topology. A standby UPS resorts to battery backup power in
the event of common power problems such as a blackout, voltage sag, or voltage surge. When
incoming utility power drops below or surges above safe voltage levels, the UPS switches to
DC battery power and then inverts it to AC power to run connected equipment. These models
are designed for consumer electronics, entry-level computers, POS systems, security systems,
and other basic electronic equipment.
A line interactive UPS incorporates technology which allows it to correct minor power
fluctuations (under-voltages and over voltages) without switching to battery. This type of
UPS has an autotransformer that regulates low voltages (e.g., brownouts) and over voltages
(e.g., swells) without having to switch to battery. Line interactive UPS models are typically
used for consumer electronics, PCs, gaming systems, home theater electronics, network
equipment, and entry-to-mid-range servers. They provide power during such events as a
blackout, voltage sag, voltage surge, or over-voltage.
A double-conversion (online) UPS provides consistent, clean, and near perfect power
regardless of the condition of incoming power. This UPS converts incoming AC power to DC,
and then back to AC. UPS systems with this technology operate on isolated DC power 100
percent of the time and have a zero transfer time because they never need to switch to DC
power. Double-conversion UPS systems are designed to protect mission-critical IT
equipment, data center installations, high-end servers, large telecom installations and storage
applications, and advanced network equipment from damage caused by a power blackout,
voltage sag, voltage surge, over voltage, voltage spike, frequency noise, frequency variation,
or harmonic distortion.
Cyber Power UPS systems have either sine wave or simulated sine wave output, depending
upon the model.
Sine wave output: The highest quality waveform output is sine wave, which is a smooth,
repetitive oscillation of AC power. Enterprise-level UPS systems produce sine wave power to
operate sensitive electronic equipment. Sine wave output ensures that equipment utilizing
Active PFC power supplies do not shut down when switching from utility power to battery
power.
Simulated sine wave output: An approximated sine wave output waveform. It uses pulse
wave modulation to generate a stepped, approximated sine wave to supply more cost-
effective battery backup power for equipment that does not require sine wave output. The
technology used to produce this type of power output is less expensive to manufacture and is
common in standby and line interactive UPS systems.
No delay between switching from the primary power source to the UPS.
Can better support critical instruments compared to generators.
Consumers can choose the type and size of UPS, depending on the amount of power
they need to supply to a device.
UPSs are silent.
Maintenance of UPS systems is cheaper compared to generators.
The inability to run heavy appliances- because UPSs are run off of batteries.
If substandard batteries are used, users may end up replacing the batteries often.
UPSs may need professional installations.
Rating
A UPS’s rating is the amount of load, in volt-amperes (VA), that it’s designed to
support. UPSs are available with ratings as low as 300 VA and as high as 5,000,000 VA
or more. Use this very basic procedure to determine the approximate UPS rating your
organization requires:
Make a list of all the equipment your UPS will be protecting.2. Determine how many
volts and amps every device on the list draws.3. For each device, multiply volts by
amps to arrive at a VA figure.4. Add all of the VA figures together.5. Multiply that sum
by 1.2, to build in room for growth. The UPS you buy should have a rating equal to or
greater than the final number you arrived at in step 5, unless you have more precise
load data for the equipment you are protecting. Here are a few additional
considerations to keep in mind: Relying solely on nameplate ratings may lead you to
oversize the UPS system, so always use your equipment manufacturer’s sizing
calculator tools as well, if available. Most major manufacturers have Web-based or
downloadable sizing tools that can closely estimate your equipment’s power draw
based on the configuration you are using. When deploying a centralized power
protection architecture, you typically deploy larger kVA UPSs than you would deploy
using a distributed power protection scheme. If your UPS will be supporting motors,
variable-speed drives or laser printers, add more VA capacity to your requirements to
account for the high power inrush that occurs when those devices startup. Your UPS
vendor can assist in applying the proper UPS and rating for these types of applications.
Companies that anticipate rapid near- or medium-term growth should use a multiple
higher than 1.2 when building in room for growth in the procedure above. So should
organizations that expect to upgrade their server hardware soon, as newer servers
tend to have higher power requirements than older models.
6.1 SCSI:-
SCSI Standard:-
2. Centronics:-
Fig.Centronics
Fig.HighDensity
Q. Explainthe following external SCSI connectors Very HighDensity Cable
Interconnect(VHDCI).
4. Very HighDensityCableInterconnect(VHDCI):-
• It is awide only(68 pin)&also called as “micro centronics”, becauseituses the same
designas theCentronicsinterface. Thecontacts aremuch smaller&close to each other.
• Becauseof its small sizeitis beingusedwidely, also known as “Alternative-4”
Fig.VeryHighDensityCableInterconnect (VHDCI)
1. Regular Density
• It is used for narrow(8 bit) devices.
• It is arectangular connector with two rows of25 pins.
• This connector isverysimilartoIDE/ATA connector. (Except5 extrapins on each row.)
• It is widelyused in olderdevices (Slower.).
• In thecurrent standard itis called as“Alternative2”.
Fig.RegularDensity
2. HighDensity
• Thepin spacingin high densityis half of theolder SCSI-1 connector, makingthem
much smaller.
• It is the mostcommon connector used in todaysystems.
• Thenarrow 50 pin versions is unshielded connector “Alternative1”&the68-pin
version
is “Alternative3”.
Fig.HighDensity
3. Single ConnectorAttachment
(SCA)
• “Alternative4”in theSCSIstandards for unshielded connectors.
• The connector used for thesingleconnector attachment system forbackplane-
connecting of SCSIdrives.
SignalsfromPC toPrinter:-
• There are12 signals from PC to printer. Out of these8 signals aredata bits &4
signals arecontrol signals.
1. STROBE:-this becomes low. Whenever thePC sends abyteof data to printer.This low
voltagetells the printer that datais beingsent.
2. INIT:-when itis low, the printer resets its electronics logic&clears the printer buffer.
SignalsfromprintertoPC:-
• It is brand name for theIEEE 1394 high speed serial bus interface.
• The1394 interfaceis also known bythe brandI.Link (Sony)
• It was developed in thelate1980s and early1990s byApple, who called itFireWire.
• IEEE 1394 is a serialbusarchitecturefor high-speed data
transfer.FireWireis aserialbus, meaningthatinformation is transferred
onebitat a time.
• IEEE 1394 fullysupports bothisochronousand asynchronousapplications.
• It is used in modern PCs.
USB 2.0vs. FireWire (IEEE1394)
1. 1.5 Mbps, 12Mbps, 480 Mbps 100 Mbps, 200Mbps, 400 Mbps
supported. supported.
7. Application: Application:
6.6 Bluetooth
A Bluetooth technology is a high speed low powered wireless technology link that is designed to
connect phones or other portable equipment together. It is a specification (IEEE 802.15.1) for the
use of low power radio communications to link phones, computers and other network devices
over short distance without wires. Wireless signals transmitted with Bluetooth cover short
distances, typically up to 30 feet (10 meters).
Bluetooth can connect up to “eight devices” simultaneously and each device offers a unique 48 bit
address from the IEEE 802 standard with the connections being made point to point or
multipoint.
The first version was 1.2 standard with a data rate speed of 1Mbps. The second version was
2.0+EDR with a data rate speed of 3Mbps. The third was 3.0+HS with speed of 24 Mbps. The latest
version is 4.0.
How Bluetooth Works:
Bluetooth Network consists of a Personal Area Network or a piconet which contains a minimum of
2 to maximum of 8 bluetooth peer devices- Usually a single master and upto 7 slaves. A master is
the device which initiates communication with other devices. The master device governs the
communications link and traffic between itself and the slave devices associated with it. A slave
device is the device that responds to the master device. Slave devices are required to synchronize
their transmit/receive timing with that of the masters. In addition, transmissions by slave devices
are governed by the master device (i.e., the master device dictates when a slave device may
transmit). Specifically, a slave may only begin its transmissions in a time slot immediately
following the time slot in which it was addressed by the master, or in a time slot explicitly
reserved for use by the slave device.
Objectives
To understand the preventive maintenance of PC
To understand the diagnostic tools of PC
initialize BIOS
identify, organize, and select which devices are available for booting
The functions above are served by the POST in all BIOS versions back to the very first. In later BIOS
versions, POST will also:
discover, initialize, and catalog all system buses and devices
100-199 Motherboard
200-299 RAM or Memory
300-399 Keyboard
400-499 Video Mono
500-599 Video Color
600-699 Floppy Drive
700-799 Math Co-Processor
900-999 LPT1
1000-1099 LPT2
1100-1199 COM 1
1200-1299 COM 2
17xx Hard Disk Controller
3xxx NIC
86xx Mouse
PreventiveMaintenance
Thetwotypesof preventivemaintenanceproceduresareactiveandpassive.
Anactivepreventivemaintenanceprogramincludesprocedures thatpromotealonger,
trouble-freelifeforyourPC.
Thistypeof
preventivemaintenanceprimarilyinvolvestheperiodiccleaningofthesystem
anditscomponents.
Theactivepreventivemaintenanceproceduresincludecleaningandlubricatingall
major components,reseatingchipsandconnectors,andreformattingharddisks.
ActivePreventive MaintenanceProceduresTools
a. Contactcleaningsolution
b. Cannedair
c. Asmallbrush
d. Lint-freefoamcleaningswabs
e. Antistaticwrist-groundingstrap
f. Foamtape
g. Computervacuumcleaner
h. Chemicals
PassivePreventiveMaintenance
Passivepreventivemaintenanceincludesstepsyoucantaketoprotectasystemfromthe
environment,suchas
i) Usingpower-protectiondevices;
ii) Ensuringaclean,temperature-controlled environment;and
iii) Preventingexcessivevibration.
Inotherwords, passivepreventivemaintenancemeanstreatingyoursystemwell.
PassivePreventiveMaintenanceProcedures
Passivepreventivemaintenanceinvolvestakingcareofthesystem byprovidingthebest
possibleenvironment—both physicalandelectrical—forthesystem.Physicalconcernsare
conditionssuchas
a)Ambienttemperature,
b)Thermalstressfrompowercycling,
c)Dustandsmokecontamination,and
d)Disturbancessuchasshockandvibration.
PreventiveMaintenanceofKeyboard:
i) Donotspillliquidsonthekeyboard.
ii) Periodicallycleaninteriorofkeyboardwithvacuumcleaner
iii)Press thekeysgentlywithoutapplyingforce.
iv) Usedustcoverforkeyboardwhennotused.
PreventiveMaintenanceofHDD:
i) Defragmentharddiskatleastoncea monthtomaintaindiskefficiencyandspeed.
ii) Deletealltemporaryfilessuchas*.temp,~*.*,*.chkandwebbrowserhistoryand
temporaryinternetfiles.
iii)Makeperiodicbackupofyourdataandcritical areassuchasbootsectors,FATand
directorystructureondisk.
PreventiveMaintenanceofFDD
i) Cleanread/writeheadsensitivityusingspecialdiagnosticdiskettes.
ii) Checkrotatingspeedofdriveifitmustbeconstant.
iii)Clean&lubricatethemechanicalpart of drive
PreventiveMaintenanceof Monitor:
1. Usedustcoverformonitorwhenmonitorisoff.
2. Donotputmonitorneartistrongmagneticfieldwhichmaycauseimproperdeflection.
3. Cleanthedisplayscreensothatitisdustfree.
4. Provideproperventilationsuchascoolingfanforheatdissipationtoavoidintermittent
failures.
5. Donotputpaperofanythingontopofmonitor.
PreventiveMaintenanceofPrinter
1. Donotplaceprinternearheatgeneratingmachinessuchasheatersandfurnaces
2. Cleanexteriorof printerusingsoftclothwithmildorganicsolvent
3. Periodicallycleanoutdust,paperfragmentsanddirtfromitsmechanismusingsoft brush
i) Usequalityribbontoavoiddamagetoprinthead
ii) Usedustcoverforprinterwhennotused
iv) Lubricatemechanicalparts.
7.3.1 LogicProbe:
Alogicprobecanbeusefulfordiagnosingproblemsindigitalcircuits.
Inadigitalcircuitasignalisrepresentedaseitherhigh (+5V)orlow(0V)
Logicprobesareespeciallyusefulfortroubleshooting adeadsystem.
Byusingtheprobe,youcandeterminewhetherthebasicclockcircuitryisoperatingand
whetherthebasicclockcircuitryisoperatingandwhetherothersignalsnecessaryforsystem
operationarepresent.
Logicprobescanbeusefulfortroubleshooting.
LogicPulser
1. Thelogicpulserisahandheldtool usedtoinjectpulsesattheinputofagateundertest.A
singlepulseorastreamof pulsesatdifferentfrequenciesisissuedasperuser’schoice.
2. Apulserisdesignedtotestcircuitreactionbyalogicalhigh(+5V)pulseintoacircuitusually
lastingfrom1½to10millionthofasecond.Comparethe reactionwiththatofaknown
functionalcircuit.
3. Itcanbehelpful fortestingacircuit.
LogicPulser
Current Tracer:
Itisahandheldtoolwhichdetectscurrentflow inelectroniccircuits.Itisusefulinlocating
shortedcomponents,trackshorts,solderbridges,Vcc togroundshortsetc.
BlockDiagramandWorkingofLogicAnalyser:
LogicAnalyser:
• Alogicanalyzerisanelectronicinstrumentthatdisplayssignalsinadigital circuitthatare
toofasttobeobservedandpresentsittoausersothattheusercan moreeasilycheck correct
operationofthedigitalsystem
• Alogicanalyzercantriggeronacomplicatedsequenceofdigital events,andthencapture a
largeamountofdigitaldata from thesystemundertest(SUT).Thebestlogicanalyzers behavelike
software debuggers by showing the flow of the computer program and
decodingprotocolstoshowmessagesandviolations
Fig.showsfunctionalblockdiagram oflogicanalyser.Alogicanalyserisadevice,which allowsyou
toseethesignalson 16to64signallinesatonce.Itisalsocalledmultitracedigital oscilloscope.
Fig.7.5:Blockdiagramoflogicanalyser
Itcapturesandstoresseveraldigitalsignals,lettingyouviewthesignalssimultaneously
Blockdiagramdescription:
(a) Adjustablethresholdcomparator:Theinputsignalsarefirstappliedtotheadjustable
thresholdcomparatoroneforeachchannel.
(b) Memory:ItisusuallyRAMmemorywheresamplesofinputsignalsaretakenandstored
anddisplayedwhen required.
(c) Displayscancircuit:Samplesofsignal(around256to1024samplesofeachsignal)
whicharestoredinmemorycanbedisplayed.
(d) Triggerwordselectionswitches:Itisusedtogivecodewhichwewanttotestwithinput
signalappliedtoadjustablethresholdcomparator.
(e) Wordcomparatorandtriggercircuit:Wordcomparatorcomparesinputsignalwith
binarycodeenteredwiththehelpoftriggerselectionswitchesorkeyswitches.
Diagnosing Windows is not only something IT analysts need to worry about. Anyone who
owns a computer should be comfortable using Windows diagnostics tools to do basic
troubleshooting.
Believe it or not, you can fix most problems yourself if you have the right tools available
and know how to use them.
1. Process Explorer
2. CPUID:
CPUID is a powerful tool to view everything you need to know about your CPU. It can also
help gather GPU or memory card information if you’re looking to upgrade your system and
want to find a perfect match.
It’s free to download and use and works on both 32-bit and 64-bit systems. The amount of
information it shows you about your CPU and other system information is impressive.
3. Wi-Fi Analyzer
It provides the current strength of available Wi-Fi signals. It also shows you a
breakdown of details for the network you’re currently connected to. These include
the channel, frequency, bandwidth, and more.
BallGridArray(BGA)
Featuresof BGA
1. Smallpackagearea
2. Greaterfunctions andmorepins
3. More Reliable
4. Goodconductivityandlowoverall cost
BGAWorkstationApplications
BGARe-Workstation
1. Rework is the termfortherefinishingoperation or repair of anelectronic
printedcircuit board (PCB)assembly,
usuallyinvolvingdesolderingandresolderingofsurface mounted electronic
components(SMD).
2. Specializedmanual techniques byexpert personnel usingappropriate
equipment are required toreplace defectivecomponentsand ball grid
array(BGA)devices particularly require expertise and appropriate tools
thatare calledBGARe-workstation.
3. A hotair gunor hotairstationis usedto heatdevices and melt
thesolder and specialized toolsare usedto pickupandpositionoften
tinycomponents.
BGAReworkprocess
1. Mostofthesemiconductor device’s heat-
resistanttemperaturesarebetween2400 C and6000C.
Thereforethecontrolofthetemperatureanduniformityare veryimportant to
BGARework systems.
BGARemovalfrom Circuit Board
1. Prior toremoval, PCBpreheatingis necessary.Bysaturatingthecopper withinPCB,
thenapplyingtop heatto thecomponenttoberemoved,theheatbecomeslocalized at
thecomponentandnotdistributedthroughoutthethermallyconductivematerial ofthe
PCB.
2. Processfor saferemoval oftheBGAcomponentis completedwithaHotGas Rework
Station.
3. Thecircuit boardmayrequire additionalpreparationsuch asbakingandmaskingthe
areaoffadjacenttothere-work site.
4. Topreventdamagethe temperatureofthecircuit board
andcomponentmustbeclosely monitoredwith thermocouplesduringtheremoval
cycle.
2.Circuit BoardSiteCleaning
1. After componentremoval, thenextstepis sitecleaningalsoreferred toas
residual solder removal.
2. Thisprocesshasbeendoneoff-line typicallywith an operator usinga
handsoldering iron andcopperbraid.
3. Circuit boardandcomponentsitecleaningiscompletedwithvacuumde-
soldering nozzlethatremoves allresidual solderfromthesites.
3.BGAReballing
1. The placementofsolder balls on theworkstationandre-
ballingtheBGAcomponent mustbecompletedprior to placementon
thecircuit board.
2. For this process aspeciallydesigned toolforre-ballingis
usedalongwithspecific stencils andsolderballs tomatch thelayout
oftheworkstationandBGAcomponent.
4.ComponentAttach/Re-soldering
1. This stepshouldbesimilar toremovingthedevicefromthe PCB.
2. Themaindifferencenowthatthedeviceis removedfromthePCB,is thatthere is
sufficientaccesstoeither printsolderonto the device or PCBbefore the BGAis
soldered.
CHAPTER 8
The idea is that a compiler can do the instruction scheduling statically (with help of trace feedback
information). This results in:
no need of complex scheduling circuitry in the CPU
frees up space and power for other functions, including additional execution resources.
Parallel Processing:
Parallel processing is a method in computing of running two or more processors (CPUs) to
handle separate parts of an overall task. Breaking up different parts of a task among
multiple processors will help reduce the amount of time to run a program. Any system that
has more than one CPU can perform parallel processing, as well as multi-core processors
which are commonly found on computers today.
Multi-core processors are IC chips that contain two or more processors for better performance,
reduced power consumption and more efficient processing of multiple tasks. These multi-core set-
ups are similar to having multiple, separate processors installed in the same computer. Most
computers may have anywhere from two-four cores; increasing up to 12 cores.
Parallel processing is commonly used to perform complex tasks and computations. Data scientists
will commonly make use of parallel processing for compute and data-intensive tasks.
HOW PARALLEL PROCESSING WORKS
Typically, a computer scientist will divide a complex task into multiple parts with a software tool
and assign each part to a processor, then each processor will solve its part, and the data is
reassembled by a software tool to read the solution or execute the task.
Typically, each processor will operate normally and will perform operations in parallel as
instructed, pulling data from the computer’s memory. Processors will also rely on software to
communicate with each other so they can stay in sync concerning changes in data values. Assuming
all the processors remain in sync with one another, at the end of a task, software will fit all the data
pieces together.
Computers without multiple processors can still be used in parallel processing if they are
networked together to form a cluster.
Pipelining Processing:
Pipelining is the process of accumulating instruction from the processor through a
pipeline.
It allows storing and executing instructions in an orderly process. It is also known
as pipeline processing.
Pipelining is a technique where multiple instructions are overlapped during
execution.
Pipeline is divided into stages and these stages are connected with one another to
form a pipe like structure. Instructions enter from one end and exit from another
end.
Pipelining increases the overall instruction throughput.
How Pipelining Works:
The processor execute the program by fetching and executing instructions. One after the other.
Let Fi and Ei refer to the fetch and execute steps for instruction I
Computer that has two separate hardware units, one for fetching and another for executing
them.
the instruction fetched by the fetch unit is deposited in an intermediate buffer B1.
This buffer needed to enable the execution unit while fetch unit fetching the next
instruction.
The computer is controlled by a clock.
Any instruction fetch and execute steps completed in one clock cycle.
128 general integer registers, which are 64-bit plus one trap bit ("NaT", which
stands for "not a thing") used for speculative execution. 32 of these are static, the
other 96 are stacked using variably-sized register windows, or rotating for pipelined
loops. gr0 always reads 0.
128 floating point registers. The floating point registers are 82 bits long to preserve
precision for intermediate results. Instead of a dedicated "NaT" trap bit like the
integer registers, floating point registers have a trap value called "NaTVal" ("Not a
Thing Value"), similar to (but distinct from) NaN. These also have 32 static registers
and 96 windowed or rotating registers. fr0 always reads +0.0, and fr1 always reads
+1.0.
64 one-bit predicate registers. These also have 32 static registers and 96 windowed
or rotating registers. pr0 always reads 1 (true).
8 branch registers, for the addresses of indirect jumps. br0 is set to the return
address when a function is called with br.call.
128 special purpose (or "application") registers, which are mostly of interest to the
kernel and not ordinary applications. For example, one register called bsp points to
the second stack, which is where the hardware will automatically spill registers
when the register window wraps around.