info tech new

Upload: khaledawarsi

Post on 14-Apr-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 Info Tech New

    1/49

    Pravin Jain

    Introduction to Computers

    By Pravin

  • 7/30/2019 Info Tech New

    2/49

    Pravin Jain

    Nearly 5,000 years ago the abacus emerged in China. The

    abacus may be considered the first computer.This device allowed its users to make computations using asystem of sliding beads arranged on a rack.

    History of Computing

  • 7/30/2019 Info Tech New

    3/49

    Pravin Jain

    In 1642, Blaise Pascal invented a numerical wheel calculator

    to help his father with his duties. The Pascaline, a brassrectangular box, used eight movable dials to add sums up toeight figures long.

    History of Computing

  • 7/30/2019 Info Tech New

    4/49

    Pravin Jain

    In 1671, Gottfried Wilhelm Von Leibniz invented a computer

    (Stepped Reckoner) that was built in 1694. It could add andmultiply

    History of Computing

  • 7/30/2019 Info Tech New

    5/49

    Pravin Jain

    In 1820 Charles Xavier Thomas de Colmar, invented a

    machine that could perform the four basic mathematicfunctions add, subtract, multiply and divide. It was calledarithometer.

    History of Computing

  • 7/30/2019 Info Tech New

    6/49

    Pravin Jain

    The real beginnings of computers began with an Englishmathematics professor, Charles Babbage.

    Powered by steam engine.

    The Analytical Engine consisted of over 50,000 components.

    The basic design of included input devices in the form of perforated cards containing operating instructions and astore for memory of 1,000 numbers of up to 50 decimaldigits long.

    History of Computing

  • 7/30/2019 Info Tech New

    7/49

    Pravin Jain

    In 1889, an American inventor, Herman Hollerith, created a

    machine that used cards to store data information which wasfed into a machine and compiled the results mechanically.

    Hollerith brought his punch card reader into the businessworld, founding Tabulating Machine Company in 1896, later to become International Business Machines (IBM) in 1924.

    History of Computing

  • 7/30/2019 Info Tech New

    8/49

    Pravin Jain

    In 1933, Howard H. Aiken, a

    Harvard engineer workingwith IBM, succeeded in

    producing an all-electroniccalculator called MARK I.

    The computer was createdfor the U.S. Navy. It wasabout 50 feet long andcontained about 500 miles of wiring and 750000 parts.

    History of Computing

  • 7/30/2019 Info Tech New

    9/49

    Pravin Jain

    Electronic Numerical Integrator and Computer (ENIAC) wasthe first general-purpose computer, developed by John P.Eckert and John W. Mauchly

    It consisted of 18,000 vacuum tubes, 70,000 resistors and 5million soldered joints, and consumed 160 kilowatts of

    electrical power.

    History of Computing

  • 7/30/2019 Info Tech New

    10/49

    Pravin Jain

    In 1945, John Von

    Neumann proposed thedesign of a computer witha memory to hold both astored program as well as

    data.The key element to the Von

    Neumann architecture wasthe CPU, which allowed allcomputer functions to becoordinated through asingle source.

    In 1949 EDVAC

    History of Computing

  • 7/30/2019 Info Tech New

    11/49

    Pravin Jain

    Maurice Wilkes and team developed, the EDSAC (ElectronicDelay Storage Automatic Computer), which was closely

    based on the EDVAC.

    The clock speed of the EDSAC was 500 kHz; mostinstructions take about 1500 ms to execute.

    Its I/O was on paper tape, and a set of constant registers was provided for booting.

    History of Computing

  • 7/30/2019 Info Tech New

    12/49

    Pravin Jain

    In 1951, the UNIVAC I (Universal Automatic Computer),

    built by Remington Rand, became one of the firstcommercially available computers. It uses machine or binarylanguage.

    History of Computing

  • 7/30/2019 Info Tech New

    13/49

    Pravin Jain

    Year Computer/Device

    Inventor Type Remark

    ~5000BC

    Abacus Chinese - First known calculationdevice

    1642 Pascaline Blaiz Pascal Mechanical

    Can add numbers upto 8digits

    1671 Stepped

    Reckoner

    Gottfried Wilhelm

    Von Leibniz

    Mechanica

    l

    Can add and multiply.

    Working model availablein 1694

    1820 Arithometer Charles Xavier Thomas de Colmar

    Mechanical

    could perform the four basic mathematicfunctions add, subtract,multiply and divide

    1821 DifferenceEngine

    Charles Babbage(Father of Computers)

    Mechanical

    Introduced the conceptof stored program andmemory in computers

    Summary-Hsitory of Computers

  • 7/30/2019 Info Tech New

    14/49

    Pravin Jain

    Year Computer/Device Inventor Type Remark

    1933 MARK-I Howard H. Aiken Electronic about 50 feet long andcontained about 500miles of wiring and750000 parts

    1946 Electronic NumericalIntegrator andComputer (ENIAC)

    John P. Eckert andJohn W. Mauchly

    Electronic First general-purposecomputer, Contain about18000 vacuum tubes

    1949 Electronic Discrete

    Variable AutomaticComputer ( EDVAC)

    Eckert , Mauchly

    and John von Neumann.

    Electronic Concept of CPU was

    first used in thiscomputer.

    1949 Electronic Delay

    Storage AutomaticComputer

    Maurice Wilkes Electronic I/O was based upon

    paper tape

    Summary-Hsitory of Computers

  • 7/30/2019 Info Tech New

    15/49

    Pravin Jain

    Generations of Computers

  • 7/30/2019 Info Tech New

    16/49

    Pravin Jain

    Technology was based on the vacuum

    tubes.These were very expensive and very bulkyin size.

    They generated very large amount of heatthus required very heavy air conditioners.

    These were very slow, their computationtime were in milliseconds.

    They were very expensive and consumegreat amount of electricity.

    They were very sensitive and often proneto hardware failure.

    First Generation : 1940-1956

  • 7/30/2019 Info Tech New

    17/49

    Pravin Jain

    Transistor technology based computing devices.

    Size was very small as compared to first generationcomputers and was portable.

    More reliable than first generation computers.

    They were also heat generating and required air conditioning but amount of heat was quit less ascompared to first generation computers.

    Requirement of electricity was less than firstgeneration computers.

    Less expensive and required very little space.

    Computation time was in microseconds.

    Second Generation : 1956-1963

  • 7/30/2019 Info Tech New

    18/49

    Pravin Jain

    They were integrated circuit (IC) technology based

    computing devices.Size was very small as compared to all previous generationcomputers.

    They were portable and more reliable.They were less heat generating but required air conditioningsometimes.

    Requirement of electricity was less.

    Less expensive and required very little space.

    Computation time was reduced to nanoseconds.

    Third Generation - 1963-1971

  • 7/30/2019 Info Tech New

    19/49

    Pravin Jain

    They are microprocessor based computing devices.

    Size is very small.

    They were portable and more reliable.

    They generates negligible amount of heat and

    hardly requires air conditioning.

    Requirement of electricity is very less.

    These are cheapest and required very little space.

    Computation time was reduces to nanoseconds.

    Graphical user interface based multiuser and multitaskingo eratin s stem were made available for various com uters.

    Fourth Generation : 1971 toPresent

    P i J i

  • 7/30/2019 Info Tech New

    20/49

    Pravin Jain

    Fifth generation computing devices, based on artificial

    intelligence, are still in development.The use of parallel processing and superconductors is helpingto make artificial intelligence a reality.

    The goal of fifth-generation computing is to develop devicesthat respond to natural language input and are capable of learning and self-organization. It includes

    Games playing: programming computers to play games such aschess and checkers.

    Expert Systems: programming computers to make decisions inreal-life situations.

    Natural Language: programming computers to understand

    Fifth Generation : (1990 andbeyond)

    P i J i

  • 7/30/2019 Info Tech New

    21/49

    Pravin Jain

    Computer Assisted Control & Automation

    P i J i

  • 7/30/2019 Info Tech New

    22/49

    Pravin Jain

    A control system is a device or set of devices to manage,

    command, direct or regulate the behavior of other devices or system.

    Types of Control System:

    Manual Control System

    Automated Control System

    Control Systems

    P i J i

  • 7/30/2019 Info Tech New

    23/49

    Pravin Jain

    Manual Control System is the system where human

    intervention is mandatory to perform a task or to control

    the logic.

    For example, to close and open a lock on a gate,perhaps including logic so that it cannot be opened or

    closed unless the key is in place.

    Manual Control Systems

    Pra in Jain

  • 7/30/2019 Info Tech New

    24/49

    Pravin Jain

    An automatic sequential control system may trigger a

    series of mechanical operations in the correct sequence

    to perform a task. For example various electric and

    pneumatic transducers may fold and glue a cardboard

    box, fill it with product and then seal it in an automatic

    packaging machine.

    Automatic Control Systems

    Pravin Jain

  • 7/30/2019 Info Tech New

    25/49

    Pravin Jain

    Automation is the use of control systems and information technologies to

    reduce the need for human work in the production of goods and services.

    Automation is a step beyond mechanization, whereas mechanization

    provided human operators with machinery to assist them with the muscular

    requirements of work, automation greatly decreases the need for human

    sensory and mental requirements as well.

    Automation plays an increasingly important role in the world economy and in

    daily experience.

    Automation

    Pravin Jain

  • 7/30/2019 Info Tech New

    26/49

    Pravin Jain

    Applications of Automations

    Automated video surveillance

    Automated highway systems

    Automated manufacturing

    Home automation

    Industrial automation

    Automation

    Pravin Jain

  • 7/30/2019 Info Tech New

    27/49

    Pravin Jain

    The main advantages of automation are:

    Replacing human operators in tasks that involve hard

    physical or monotonous work.

    Replacing humans in tasks done in dangerous

    environments (i.e. fire, space, volcanoes,

    nuclear facilities, underwater, etc.)

    Performing tasks that are beyond human capabilities

    of size, weight, speed, endurance, etc.

    Economy improvement: Automation may improve in

    economy of enterprises, society or most of

    humanity.

    Advantages of Automations

    Pravin Jain

  • 7/30/2019 Info Tech New

    28/49

    Pravin Jain

    The main disadvantages of automation are:

    Unemployment rate increases due to machines

    replacing humans and putting those humans out

    of their jobs.

    Technical Limitation: Sometimes technology is unable

    to automate all the desired tasks.

    Security Threats/Vulnerability: An automated system

    may have limited level of intelligence, hence it is

    most likely to commit error.

    Disadvantages of Automations

    Pravin Jain

  • 7/30/2019 Info Tech New

    29/49

    Pravin Jain

    The main disadvantages of automation are:

    Unpredictable development costs : The research

    and development cost of automating a process may

    exceed the cost saved by the automation itself.

    High initial cost : The automation of a new product or

    plant requires a huge initial investment in comparison

    with the unit cost of the product.

    Disadvantages of Automations

    Pravin Jain

  • 7/30/2019 Info Tech New

    30/49

    Pravin Jain

    Computer ControlledBiometric/RFID based AccessControl

    Pravin Jain

  • 7/30/2019 Info Tech New

    31/49

    Pravin Jain

    It refers to the technology through which the access/use

    of any object can be controlled by certain means.

    A lock on a car door is essentially a form of access

    control. A PIN on an ATM system at a bank is another

    means of access control.

    Access Control should be so strong that it could not be

    accessed unauthorized.

    Access Control

    Pravin Jain

  • 7/30/2019 Info Tech New

    32/49

    Pravin Jain

    security? Authentication (password/crypto/etc.)

    Who are you? Authorization (Acess control)

    What are you allowed to do.

    Focus is policy

    Enforcement Mechanism

    How its policy implemented/enforced

    Pravin Jain

  • 7/30/2019 Info Tech New

    33/49

    Pravin Jain

    Night Club Example Authentication

    ID Check Access Control

    Over 18 - allowed in

    Over 21 - allowed to drinkOn VIP List - allowed to access VIP area

    Enforcement Mechanism

    Walls, Doors, Locks, Bouncers

    Pravin JainNight Club Example: More

  • 7/30/2019 Info Tech New

    34/49

    Pravin JainNight Club Example: MoreInteresting Phenomena

    Tickets

    Name or anonymous?

    Date

    What if you want to leave and come back

    Hand stamp or bracelet

    Pravin Jain

  • 7/30/2019 Info Tech New

    35/49

    Pravin Jain

    There are three factors of authenticating information:

    Something the user knows, e.g. a password or PIN Something the user has, such as smart card

    Something the user is, such as verified by biometric

    measurement (fingerprints, retinal scan, irisrecognition, voice recognition, hand geometry, etc.)

    Features of Access Control

    Pravin Jain

  • 7/30/2019 Info Tech New

    36/49

    Biometrics Access Control RFID Access Control

    Types of Access Control

    Pravin Jain

  • 7/30/2019 Info Tech New

    37/49

    It consist of methods for uniquely recognizing humans

    based upon one or more intrinsic physical or behavioral

    traits.

    In computer science, in particular, biometrics is used as a

    form of identity access management and access control.

    It is also used to identify individuals in groups that are

    under surveillance.

    Biometrics Access Control

    Pravin Jain

  • 7/30/2019 Info Tech New

    38/49

    Physiological Mode

    Behavioral Mode

    Biometrics Access ControlModes

    Pravin Jain

  • 7/30/2019 Info Tech New

    39/49

    Physiological Mode

    Physiological are related to the shape of the body.

    Example includes

    Fingerprint

    Face recognition

    DNA

    Palm print

    Hand geometry

    iris recognition

    Retina, etc.

    Biometrics Access ControlModes

    Pravin Jain

  • 7/30/2019 Info Tech New

    40/49

    Behavioral Mode

    Behavioral are related to the behavior of a person.

    Example includes

    Voice

    Signature Dynamics, etc.

    Biometrics Access ControlModes

    Pravin Jain

    h

  • 7/30/2019 Info Tech New

    41/49

    Finger Print Technology

    Fingerprint identification is the oldest of all the biometrictechniques.

    It is the combination of hardware and softwaretechnologies.

    The hardware scans the live fingerprints and softwarematches it with the stored database.

    The live fingerprint readers are based on optical,thermal, silicon or ultrasonic principles.

    All the optical fingerprint readers comprise of the sourceof light, the light sensor and a special reflection surfacethat changes the reflection according to the pressure.Some of the readers are fitted out with the processingand memory chips as well.

    Biometrics Techniques

    Pravin Jain

    i i h i

  • 7/30/2019 Info Tech New

    42/49

    Iris Recognition

    The iris is the colored ring of textured tissue thatsurrounds the pupil of the eye. Even twins have differentiris patterns and everyones left and right iris is different,too.

    Research shows that the matching accuracy of irisidentification is greater than of the DNA testing.

    Each iris is a unique structure featuring a complexpattern. This can be a combination of specificcharacteristics known as corona, crypts, filaments,

    freckles, pits, furrows, striations and rings.

    Biometrics Techniques

    Pravin Jain

    Bi i T h i

  • 7/30/2019 Info Tech New

    43/49

    Retina Scan

    Retina scan is based on the blood vessel pattern in theretina of the eye. Retina scan technology is older thanthe iris scan technology that also uses a part of the eye.The first retinal scanning systems were launched byEyeDentify in 1985.

    Retina is not directly visible and so a coherent infraredlight source is necessary to illuminate the retina. Theinfrared energy is absorbed faster by blood vessels inthe retina than by the surrounding tissue. The image of

    the retina blood vessel pattern is then analyzed for characteristic points within the pattern.

    Biometrics Techniques

    Pravin Jain

    Bi i T h i

  • 7/30/2019 Info Tech New

    44/49

    Hand Geometry

    Hand geometry is based on the fact that nearly everypersons hand is shaped differently and that the shape of a persons hand does not change after certain age. Handgeometry systems produce estimates of certainmeasurements of the hand such as the length and thewidth of fingers. Various methods are used to measurethe hand. These methods are most commonly basedeither on mechanical or optical principle.

    Biometrics Techniques

    Pravin Jain

    Bi i T h i

  • 7/30/2019 Info Tech New

    45/49

    Signature Dynamics

    The signature dynamics recognition is based on thedynamics of making the signature, rather than a directcomparison of the signature itself afterwards. Thedynamics is measured as a means of the pressure,direction, acceleration and the length of the strokes,number of strokes and their duration.

    This technique treats the signature as a number of separate events, with each event consisting of the periodbetween the pen striking the writing surface and lifting off again. This approach is much more flexible. If themajority of the signature is accurate and only one eventis missing or added then this event can be easilyignored.

    Biometrics Techniques

    Pravin Jain

    Bi i T h i

  • 7/30/2019 Info Tech New

    46/49

    Facial Recognition

    Facial recognition is the most natural means of biometricidentification. Any camera (with a sufficient resolution) can be used to

    obtain the image of the face. Any scanned picture can beused as well. The better the image source (i.e. camera or scanner) the more accurate results we get. The facialrecognition systems usually use only the gray-scaleinformation.

    Most of facial recognition systems require the user tostand a specific distance away from the camera and lookstraight at the camera. This ensures that the capturedimage of the face is within a specific size tolerance andkeeps the features (e.g., the eyes) in as similar positioneach time as possible.

    Biometrics Techniques

    Pravin Jain

    RFID A C l

  • 7/30/2019 Info Tech New

    47/49

    It is a technology that uses radio waves to transfer data

    from an electronic tag, called RFID tag or label, attached

    to an object, through a reader for the purpose of

    identifying and tracking the object.

    Some RFID tags can be read from several meters away

    and beyond the line of sight of the reader.

    The application of bulk reading enables an almost-

    parallel reading of tags.

    RFID Access Control

    Pravin Jain

    Ad t f RFID

  • 7/30/2019 Info Tech New

    48/49

    Tag detection not requiring human intervention reduces employment

    costs and eliminates human errors from data collection As no line-of-sight is required, tag placement is less constrained

    RFID tags have a longer read range than, e. g., barcodes

    Tags can have read/write memory capability, while barcodes do not

    Tags are less sensitive to adverse conditions (dust, chemicals,

    physical damage etc.)

    Many tags can be read simultaneously

    Automatic reading at several places reduces time lags andinaccuracies in an inventory

    Advantages of RFID

    Pravin Jain

    Li it ti f RFID

  • 7/30/2019 Info Tech New

    49/49

    High Cost

    Data Collision

    Faulty manufacturing of Tags

    Possible virus attack

    Limitations of RFID