chap02 data manipulation

47
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Chapter 2: Data Manipulation

Upload: zohair-pia

Post on 14-Dec-2014

120 views

Category:

Education


4 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Chap02   data manipulation

Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Computer Science: An OverviewTenth Edition

by J. Glenn Brookshear

Chapter 2:Data Manipulation

Page 2: Chap02   data manipulation

2-2Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Chapter 2: Data Manipulation

• 2.1 Computer Architecture

• 2.2 Machine Language

• 2.3 Program Execution

• 2.4 Arithmetic/Logic Instructions

• 2.5 Communicating with Other Devices

• 2.6 Other Architectures

Page 3: Chap02   data manipulation

2-3Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Computer Architecture

• Central Processing Unit (CPU) or processor– Arithmetic/Logic unit versus Control unit– Registers

• General purpose• Special purpose

• Bus• Motherboard

Page 4: Chap02   data manipulation

2-4Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.1 CPU and main memory connected via a bus

Page 5: Chap02   data manipulation

2-5Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Stored Program Concept

A program can be encoded as bit patterns and stored in main memory. From there, the CPU can then extract the instructions and execute them. In turn, the program to be executed can be altered easily.

Page 6: Chap02   data manipulation

2-6Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Terminology

• Machine instruction: An instruction (or command) encoded as a bit pattern recognizable by the CPU

• Machine language: The set of all instructions recognized by a machine

Page 7: Chap02   data manipulation

2-7Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Machine Language Philosophies

• Reduced Instruction Set Computing (RISC)– Few, simple, efficient, and fast instructions– Examples: PowerPC from Apple/IBM/Motorola

and SPARK from Sun Microsystems

• Complex Instruction Set Computing (CISC)– Many, convenient, and powerful instructions– Example: Pentium from Intel

Page 8: Chap02   data manipulation

2-8Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Machine Instruction Types

• Data Transfer: copy data from one location to another

• Arithmetic/Logic: use existing bit patterns to compute a new bit patterns

• Control: direct the execution of the program

Page 9: Chap02   data manipulation

2-9Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.2 Adding values stored in memory

Page 10: Chap02   data manipulation

2-10Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.3 Dividing values stored in memory

Page 11: Chap02   data manipulation

2-11Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.4 The architecture of the machine described in Appendix C

Page 12: Chap02   data manipulation

2-12Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Parts of a Machine Instruction

• Op-code: Specifies which operation to execute

• Operand: Gives more detailed information about the operation– Interpretation of operand varies depending on

op-code

Page 13: Chap02   data manipulation

2-13Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.5 The composition of an instruction for the machine in Appendix C

Page 14: Chap02   data manipulation

2-14Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.6 Decoding the instruction 35A7

Page 15: Chap02   data manipulation

2-15Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.7 An encoded version of the instructions in Figure 2.2

Page 16: Chap02   data manipulation

2-16Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Program Execution

• Controlled by two special-purpose registers– Program counter: address of next instruction– Instruction register: current instruction

• Machine Cycle– Fetch– Decode– Execute

Page 17: Chap02   data manipulation

2-17Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.8 The machine cycle

Page 18: Chap02   data manipulation

2-18Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.9 Decoding the instruction B258

Page 19: Chap02   data manipulation

2-19Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.10 The program from Figure 2.7 stored in main memory ready for execution

Page 20: Chap02   data manipulation

2-20Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.11 Performing the fetch step of the machine cycle

Page 21: Chap02   data manipulation

2-21Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.11 Performing the fetch step of the machine cycle (cont’d)

Page 22: Chap02   data manipulation

2-22Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Arithmetic/Logic Operations

• Logic: AND, OR, XOR– Masking

• Rotate and Shift: circular shift, logical shift, arithmetic shift

• Arithmetic: add, subtract, multiply, divide– Precise action depends on how the values are

encoded (two’s complement versus floating-point).

Page 23: Chap02   data manipulation

2-23Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Masking

• 00001111

• AND 10101010

• ----------------------------

• 00001010

Page 24: Chap02   data manipulation

2-24Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.12 Rotating the bit pattern 65 (hexadecimal) one bit to the right

Page 25: Chap02   data manipulation

2-25Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Logical shift

• To discard the bit that falls off the edge and always fill the hole with a 0

Page 26: Chap02   data manipulation

2-26Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Arithmetic shift

• The way that do right shifts and fill the hole with its original value.

Page 27: Chap02   data manipulation

2-27Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Solution of question 11

• 12A7(load)

• 2380(load)

• 7023(OR)

• 30A7(store)

• c000

Page 28: Chap02   data manipulation

2-28Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Solution of q12

• 15E0(load)

• A502(rotate 2bits right)

• 260F(load)

• 8056(AND)

• 30E1(store)

• c000

Page 29: Chap02   data manipulation

2-29Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Communicating with Other Devices

• Controller: An intermediary apparatus( a collection of circuitry) that handles communication between the computer and a peripheral device– Specialized controllers for each type of device– General purpose controllers (USB and

FireWire)• Peripheral device: Monitor, keyboard, mice,

printer, mass storage system, digital cameras• Port: The point at which a device connects to a

computer

Page 30: Chap02   data manipulation

2-30Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.13 Controllers attached to a machine’s bus

Page 31: Chap02   data manipulation

2-31Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

How does CPU handle communication?

• Special I/O instructions

e.g. AARXY

AA store the contents of register R to Peripheral device location XY

• Memory-mapped I/O: CPU communicates with peripheral devices as though they were memory cells

Page 32: Chap02   data manipulation

2-32Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Figure 2.14 A conceptual representation of memory-mapped I/O

Page 33: Chap02   data manipulation

2-33Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

DMA

• Direct memory access (DMA): Main memory access by a controller over the bus

• DMA allows the CPU and controller work at the same time, so to save the waiting time of CPU.

• Von Neumann Bottleneck: Insufficient bus speed impedes performance

Page 34: Chap02   data manipulation

2-34Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Handshaking

• Handshaking: The process of coordinating the transfer of data between components

• Status word: a bit map in which the bits reflect the conditions of the device

• Take the status word between a printer and computer as an example.

Page 35: Chap02   data manipulation

2-35Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

• C->P: Hey, wake up• P->C: Wait, I will need some time…• P->C: OK, I am ready.• C->P: I am sending a 10MB file to you.• P->C: OK, I can accommodate 2 MB one time, fire away!• C->P: This is the first 2 MB.• P->C: I have received the first 2 MB file and printing it.• P->C: OK, I am ready to receive the second 2 MD file• …..

Page 36: Chap02   data manipulation

2-36Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Communicating with Other Devices (continued)

• Parallel Communication: Several communication paths transfer bits simultaneously.

• The transmission distance can not be long, otherwise, the signals will be lost.

• Serial Communication: Bits are transferred one after the other over a single communication path.

• ..can transfer long distance

Page 37: Chap02   data manipulation

2-37Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

MODEM

• To transfer the digital data over voice line, we need MODEM to convert digital signals to voice tones (analog signal). And, the MODEM of receiver side will convert analog signals back to digital data.

Page 38: Chap02   data manipulation

2-38Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

DSL

• Digital subscriber line• Take the high frequency of spectrum to

send data while leave the lower frequency part of spectrum to voice transfer

•非對稱數位式用戶線路 ( Asymmetric Digital Subscriber Line )

• Other Broadband service: cable television system, satellite…

Page 39: Chap02   data manipulation

2-39Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Data Communication Rates

• Measurement units– Bps: Bits per second– Kbps: Kilo-bps (1,000 bps)– Mbps: Mega-bps (1,000,000 bps)– Gbps: Giga-bps (1,000,000,000 bps)

• Bandwidth: Maximum available rate

Page 40: Chap02   data manipulation

2-40Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Other Architectures

• Technologies to increase throughput:– Pipelining: Overlap steps of the machine cycle– Parallel Processing: Use multiple processors

simultaneously• SISD: No parallel processing• MIMD: Different programs, different data• SIMD: Same program, different data

Page 41: Chap02   data manipulation

2-41Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

SISD

Page 42: Chap02   data manipulation

2-42Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

SIMD

• Several CPU execute same program, but handling different data, E.g. Tax data processing

Page 43: Chap02   data manipulation

2-43Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

SIMD

Page 44: Chap02   data manipulation

2-44Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

MIMD

•MIMD: slice the program into several smaller programs and ask other CPU to execute them.

Page 45: Chap02   data manipulation

2-45Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

MIMD

Page 46: Chap02   data manipulation

2-46Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

dual-core CPUs

Page 47: Chap02   data manipulation

2-47Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Gates and Jobs

• Bill Gates

• The founder of Microsoft Inc.

• Steve Jobs

• The founder of Apple Inc.