Skip to main content

COMPUTER NETWORKING ARCHITECTURE: THE BASIC MODULES

 The main modules that constitutes a computer:

The memory

The processor

The exchange units


MEMORY

Memory holds all the data used by the processor.  There are two types of data:

A series of instructions

Data on which to execute these instructions

The information stored in a memory only becomes meaningful once it is used. 

**If it is handled by a program, it consists of data, and if it is read by the control unit to be executed, it consists of instructions.

For example: If we double click on the icon of a word processor, then this program, stored on a drive, is transferred to memory using a program called a LOADER, which sees it as "data" until becomes a "program" to the user.

Memory is also known as memory words, made up of m electronic elements that can exist in two stable states referred to as "0" and "1".  

Each cell is identified by a number - its address.  The information in the memory is accessed by setting n lines of the address buses.  The binary configuration of these n lines codes the address of the word, whose m bits of content can then be read by the data bus.

The unit of memory size is generally a byte, in which case it is expressed in kilobytes (kB), megabytes (MB) or gigabytes (GB), with:

1 kilobyte = 2^10 bytes = 1024 bytes

1 megabyte = 2^20 bytes = 1048576 bytes

1 gigabytes = 2^30 bytes = 1073741824 bytes


Volatile memories are usually known as RAM (Random Access Memory) and non-volatile memories as ROM (Read Only Memory).


PROCESSOR

The processor has two functional units:

The control unit

The processing unit



THE CONTROL UNIT

The control unit has 3 functions:

It fetches instructions in the memory: it sets the address of the instruction on the address bus, then after a delay long enough to ensure that the address is in fact stable on the data bus, it loads the instruction it has just obtained into a register.

It decodes the instructions

It indicates to the processing unit which arithmetic and logic processes need to be performed and generates all of the signals necessary to the execution of the instruction.  This is the execution step.

THE PROCESSING UNIT



 




Comments

Popular posts from this blog

THE OSI MODEL: THE 7 LAYERS IN NETWORKING EXPLAINED

 The Open Systems Interconnection (OSI)  was developed by the International Organization for Standardization in 1984 to enable different types of networks to be linked together.  The model contains seven layers, as shown in the Figure below. These layers describe networking functions from the physical network interface to the software applications interfaces. The intent of the OSI model is to provide a framework for networking that ensures compatibility in the network hardware and software and to accelerate the development of new networking technologies.  Physical layer Provides the electrical and mechanical connection to the network. Examples of technologies working in this layer are Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA)–related technologies, UTP, fiber, and network interface cards (NICs).  It uses topologies: BUS, STAR, RING, MESH Communication modes: Simplex, Half Duplex, Full Duplex Hardware including ne...

NETWORKING: PACKET TRACER - IoT

In simple terms the IoT is a connection of :  networked sensors, actuators, and smart devices that collect and share data.   Packet Tracer 7 contains many new features to support the IoT.  This includes the addition of IoT devices that can be configured to react to certain environmental values such as sun, wind, rain, and humidity. These devices can be configured to take actions based on the changing environmental values, such as turning on lights or closing garage doors.  The next parts of learning will include instructions to locate the IoT devices, to connect them to your network, to configure and modify scripts to make them function, and to control these devices remotely. Packet Tracer provides everything you need to create simulated smart homes, smart cities, and smart factories. CONFIGURE IoT DEVICES USING PACKET TRACER Packet Tracer has a wide variety of sensors and smart devices that will allow you to design smart homes, smart cities, smart factorie...

PEER TO PEER NETWORK MODEL: HOW CAN IT MAKE A DIFFERENCE IN YOUR EVERYDAY TASK?

When using  peer-to-peer network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control.  The computers are known as nodes or hosts on the network, form a logical group of computers and users that share resources.  Each computer using peer-to-peer network controls its own administration, resources and security.  Basically, it functions without any intermediary.   The types of operating system that can be installed on computers in a peer to peer network are Windows, Linux and macOS. You can also be more open to knowing how this Peer-to-peer settings can help you in your studies as well as in the future. Keep in mind that the connecting lines describes the logical arrangement or topology of the group of computers. THE ADVANTAGES OF USING PEER-TO-PEER NETWORKS: They are simple to configure. For these reason, this network type can be used where technical assistants ar...