Revision Lecture Intro to IT COSC1078 Introduction to Information Technology Extra Lecture Review James Harland

Slides:



Advertisements
Similar presentations
Chapter 2: Data Manipulation
Advertisements

Lecture 9: Data Storage Devices Intro to IT COSC1078 Introduction to Information Technology Lecture 9 Data Storage Devices James Harland
Lecture 20: Internet Intro to IT COSC1078 Introduction to Information Technology Lecture 20 Internet James Harland
Lecture 16: Processes Intro to IT COSC1078 Introduction to Information Technology Lecture 16 Processes James Harland
James Harland COSC1078 Introduction to Information Technology Lecture 12 System Fundamentals James Harland
Lecture 12: Machine Processing Intro to IT COSC1078 Introduction to Information Technology Lecture 12 Machine Processing James Harland
(4.4) Internet Protocols Layered approach to Internet Software 1.
Lecture 19: Internet Intro to IT COSC1078 Introduction to Information Technology Lecture 19 Internet James Harland
TCP/IP: the transport layer Skills: none IT concepts: layered protocols, transport layer functions, TCP and UDP protocols, isochronous applications This.
Lecture 23: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 23 Future of IT James Harland
CS 300 – Lecture 3 Intro to Computer Architecture / Assembly Language Sequential Circuits.
Lecture 10: System Fundamentals Intro to IT COSC1078 Introduction to Information Technology Lecture 10 System Fundamentals James Harland
Lecture 14: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 14 Revision and Review James Harland
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
OSI Model MIS 416 – Module II Spring 2002 Networking and Computer Security.
Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland
Stored Program Concept: The Hardware View
Storage of Bits Computers represent information as patterns of bits
1 Review of Important Networking Concepts Introductory material. This module uses the example from the previous module to review important networking concepts:
Lecture 16: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 16 Operating Systems James Harland
Course Review i206 Fall 2010 John Chuang. 2 Outline  Test 3 topics  Course review  Course evaluation.
Lecture 14: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 15 Operating Systems James Harland
Lecture 9: System Fundamentals Intro to IT COSC1078 Introduction to Information Technology Lecture 9 System Fundamentals James Harland
Lecture 24: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 24 Review James Harland
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
Lecture 14: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 14 Operating Systems James Harland
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland
Lecture 24: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 24 Future of IT James Harland
1 Catalog of useful (structural) modules and architectures In this course we will be working mostly at the BEHAVIORAL and STRUCTURAL levels. We will rely.
CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
Characteristics of Communication Systems
Lecture 3. Diff b/w RAM and Registers Registers are used to hold data immediately applicable to the operation at hand Registers are used to hold data.
Lecture 11: Machine Processing Intro to IT COSC1078 Introduction to Information Technology Lecture 11 Machine Processing James Harland
Lecture 17: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 17 Memory and Deadlock James Harland
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Lecture 10: Binary Representation Intro to IT COSC1078 Introduction to Information Technology Lecture 10 Binary Representation James Harland
Computer Systems Organization CS 1428 Foundations of Computer Science.
Introduction to Computing Systems from bits & gates to C & beyond The Von Neumann Model Basic components Instruction processing.
CPU Design. Introduction – The CPU must perform three main tasks: Communication with memory – Fetching Instructions – Fetching and storing data Interpretation.
How Computers Work … and how you can work them. Art 315 Lecture 03 Dr. J Parker Fall 2010.
Lecture 18: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 18 Operating Systems James Harland
REGISTER TRANSFER & MICROOPERATIONS By Sohaib. Digital System Overview  Each module is built from digital components  Registers  Decoders  Arithmetic.
Computer Organization - 1. INPUT PROCESS OUTPUT List different input devices Compare the use of voice recognition as opposed to the entry of data via.
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 1 Introduction James Harland
Lecture 23: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 23 Future of IT James Harland
Data Manipulation CSC 2001 TTU CSC 2001 TTU. Now what?  Program can be represented (and stored) like data. So, now what happens?  The program needs.
Lecture 11: System Fundamentals Intro to IT COSC1078 Introduction to Information Technology Lecture 11 System Fundamentals James Harland
Lecture 10: Binary Representation Intro to IT COSC1078 Introduction to Information Technology Lecture 10 Binary Representation James Harland
Network and the internet Part eight Introduction to computer, 2nd semester, 2009/2010 Mr.Nael Aburas Faculty of Information.
Lecture 16: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 16 Operating Systems James Harland
Logic Design / Processor and Control Units Tony Diep.
Computer operation is of how the different parts of a computer system work together to perform a task.
Simple ALU How to perform this C language integer operation in the computer C=A+B; ? The arithmetic/logic unit (ALU) of a processor performs integer arithmetic.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Logic Gates Dr.Ahmed Bayoumi Dr.Shady Elmashad. Objectives  Identify the basic gates and describe the behavior of each  Combine basic gates into circuits.
1 Chapter 1 Basic Structures Of Computers. Computer : Introduction A computer is an electronic machine,devised for performing calculations and controlling.
© 2015 Pearson Education Limited 2015 Quiz in last 15 minutes Midterm 1 is next Sunday Assignment 1 due today at 4pm Assignment 2 will be up today; due.
The Transport Layer Implementation Services Functions Protocols
Dr.Ahmed Bayoumi Dr.Shady Elmashad
Computer Organisation
Processor/Memory Chapter 3
Edexcel GCSE Computer Science Topic 15 - The Processor (CPU)
Processor (I).
CS149D Elements of Computer Science
CSE 370 – Winter Sequential Logic-2 - 1
Lecture 17 Logistics Last lecture Today HW5 due on Wednesday
Control units In the last lecture, we introduced the basic structure of a control unit, and translated our assembly instructions into a binary representation.
Lecture 17 Logistics Last lecture Today HW5 due on Wednesday
Presentation transcript:

Revision Lecture Intro to IT COSC1078 Introduction to Information Technology Extra Lecture Review James Harland

Revision LectureIntro to IT Introduction to IT 1 Introduction 2 Images 3 Audio 4 Video 5 Binary Representation WebTest 1, Assignment 1 6 Data Storage 7 Review/Machine Processing 8 Operating Systems WebLearn Test 1 9 Processes Assignment 2 10 Internet & Survey 11 Internet Security WebLearn Test 3 12 Future of ITAssignment 3, Peer and Self Assessment

Revision LectureIntro to IT Overview  Questions?  Mock Exam  Requested topics  Questions?

Revision LectureIntro to IT Intro to IT Schedule WeekLecture 1Lecture 2 12Future of IT 13Tuesday 19 th October Review Thursday 21 st October Mock Exam

Revision LectureIntro to IT Mock Exam  on Thursday 21 st October in  Bring your own paper, pens, etc.  Calculators and translation dictionaries allowed  Answers will be available from me when you leave Schedule:  1.00 Access to room  1.15 Reading time commences  1.30 Writing time commences  3.30 Exam concludes

Revision LectureIntro to IT Review Topics  Logic gates  Hexadecimal to/from binary conversions  Process vs. program  Floating point  Network layers  Encryption  Internet architecture  Machine cycle

Revision Lecture Intro to IT Hexadecimal … AF136DF738CA BCFE5C36A63B…

Revision Lecture Intro to IT Hexadecimal  Notation for binary numbers  More compact than  NOT decimal (0-9)  Base 16: = 1 x x C D A 1010 E B 1011 F 1111

Revision Lecture Intro to IT Excess Notation Bit patternValue  A different encoding of the numbers  “naive” bit pattern encodes 4 more than actual value  100 (looks like 4) encodes 0  101 (looks like 5) encodes 1  110 (looks like 6) encodes 2

Revision Lecture Intro to IT Floating Point sign bit Mantissa exponent 1 bit for sign 3 bits for exponent 4 bits for mantissa

Revision Lecture Intro to IT Floating Point : +ve shifted 111 (+3) places = : –ve shifted 001 (-3) places =  Mantissa: digit sequence (1 st digit always 1)  Exponent: where to put the.  This is generally given in ‘excess’ notation  Binary form of x 10 4

Revision Lecture Intro to IT Gates and circuits or and not

Revision Lecture Intro to IT Gates and circuits  No storage here  Results instantaneously available  Disappear when inputs change  How can a bit be `stored’?

Revision Lecture Intro to IT Memory via `Flip flops’ or and not

Revision Lecture Intro to IT Memory via `Flip flops’ or and not

Revision Lecture Intro to IT Memory via `Flip flops’  Can design other versions of flip-flops  Shows how circuits can be designed using AND, OR, NOT (NAND, NOR, XOR, …) in combinations (gates)  Hierarchy and abstraction  Shows how electric circuits can store values

Revision Lecture Intro to IT Fetch Decode Execute FETCH EXECUTEDECODE Machine cycle

Revision Lecture Intro to IT Two special registers Instruction register: holds current instruction Program counter: address of next instruction Fetch: Put instruction specified by program counter into instruction register Increment program counter by two Decode: Work out what to do Execute: Perform the instruction

Revision Lecture Intro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A0 AddressContents

Revision Lecture Intro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A0 FETCH 156C

Revision Lecture Intro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A2 FETCH 156C

Revision Lecture Intro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A2 DECODE 156C 6C 2B

Revision Lecture Intro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A2 EXEC 156C 6C 2B 2B5

Revision Lecture Intro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A2 FETCH 166D

Revision Lecture Intro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A4 FETCH 166D

Revision Lecture Intro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A4 DECODE 166D

Revision Lecture Intro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A4 EXEC 166D 6D FF FF6

Revision Lecture Intro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register A6 FETCH 5056

Revision Lecture Intro to IT Processing A0 15 A1 6C A2 16 A3 6D A4 50 A5 56 A6 30 A7 C0 A8 C0 A9 00 Program Counter Instruction Register …

Revision Lecture Intro to IT Processing Program Counter Instruction Register EXEC B258 B4

Revision Lecture Intro to IT Processing Program Counter Instruction Register EXEC B258 58

Revision Lecture Intro to IT Processing  Jump instructions change program counter  Can load any memory address into program counter (!!!)  Often use pipelining for efficiency  Fetch next instruction while executing  Processor doesn’t wait for fetch to complete  Can do more than one instruction …

Lecture 24: ReviewIntro to IT Processes

Revision Lecture Intro to IT Processes A program is a static set of instructions A processes is the execution of a program, which changes state over time.

Revision Lecture Intro to IT Processes Executing in Context Program Counter Instruction Register CC ROM RAM ProcessorMemory Disk 00 CC

Revision Lecture Intro to IT Processes Executing in Context Program Counter Instruction Register DD ROM RAM ProcessorMemory Disk 00 CC DD

Lecture 19: Internet: ImagesIntro to IT Internet Lisa? Hi Dad! Listen! Lisa? Hi Dad! Listen!

Revision Lecture Intro to IT Internet Structure Application Transport Network Link Network Link Mordor sucks! 2 dor1 Mor 3 suc4 ks! dor1 Mor 3 suc4 ks! Mordor sucks!

Revision Lecture Intro to IT Internet Structure 1 Mor 1 6 6

Revision Lecture Intro to IT Network Layer (Internet Protocol)  Real intelligence is in the network layer  Adds next destination to packet  Not complete list of addresses  Sends to next destination  Retrieves final destination packets for this node  Passes them to the transport layer  Routing tables can be updated when disconnections occur  Hop counts used to stop endless looping

Revision Lecture Intro to IT Transport layer  Transmission Control Protocol (TCP) often used  User Datagram Protocol (UDP) becoming more common  TCP Establishes connection first Send and wait for acknowledgement Reliable Can adjust flow control to avoid congestion Often best for (which is not real-time) Older

Revision Lecture Intro to IT Transport layer  UDP Doesn’t establish connection Just sends and forget Efficient No congestion adjustment Works well for DNS lookup Often used for Voice over Internet Protocol (VoIP) applications such as Skype

Revision Lecture Intro to IT Transmitting secrets Question: How do you share a secret with someone you have never met?

Revision Lecture Intro to IT Encryption “new password is bumblebee” “new password is bumblebee” Send Decrypt Encrypt

Revision Lecture Intro to IT Public Key Systems  Alice needs to know Bob's encryption key  Alice needs to know Charlie's encryption key  Alice needs to know David's encryption key...  Alice needs to know everyone's encryption key All encryption keys are made public All decryption keys are kept private

Conclusion  Come to the mock exam