Sunteți pe pagina 1din 48

Candidate will be asked to attempt total five questions including one compulsory objective type question.

They will attempt at-least one question from each section. Each question will carry 20 marks.

Computer Architecture Operating System Computer Networks

Structured and Object Oriented Programming Data Structures and Algorithms Software Engineering

Databases Management Web Programming Computer Graphics

An early example of an architectural definition of a computer was John Von Neumann's 1945 paper Computer architecture refers to specification of the relationship between different hardware components of a computer system. Computer architecture is concerned with how the central processing unit (CPU) acts and how it accesses computer memory Computer architectures include cluster computing and Non-Uniform Memory Access

The hardware within a computer system or smartphone which carries out the instructions of a computer program by performing the basic arithmetical, logical, and input/output operations of the system On large machines, CPUs require one or more printed circuit boards. On personal computers and small workstations, the CPU is housed in a single silicon chip called a microprocessor.

CPU: The brains of the PCs follow instructions at a rate of up to 3.2billion/sec! Hard Drive: Stores files (e.g. your documents and games)Typical PC HD size: 40-160GB (Slow access: 10ms access) Memory: Also known as RAM Fastaccess memory used by the computer to complete tasks. (Fast access: a few nanoseconds) CPU design is the design engineering task of creating a central processing unit (CPU), a component of computer hardware. It is a subfield of electronics engineering and computer engineering.

A common misunderstanding of the phrase "reduced instruction set computer" is the mistaken idea that instructions are simply eliminated, resulting in a smaller set of instructions. In fact, over the years, RISC instruction sets have grown in size, and today many of them have a larger set of instructions than many CISC CPUs.[18][19] Some RISC processors such as the PowerPC have instruction sets as large as, say, the CISC IBM System/370; and conversely, the DEC PDP-8clearly a CISC CPU because many of its instructions involve multiple memory accesseshas only 8 basic instructions, plus a few extended instructions. The term "reduced" in that phrase was intended to describe the fact that the amount of work any single instruction accomplishes is reducedat most a single data memory cyclecompared to the "complex instructions" of CISC CPUs that may require dozens of data memory cycles in order to execute a single instruction.[20] In particular, RISC processors typically have separate instructions for I/O and data processing.

A stored-program computer is one which stores program instructions in electronic memory.[1] Often the definition is extended with the requirement that the treatment of programs and data in memory be interchangeable or uniform A computer with a von Neumann architecture stores program data and instruction data in the same memory; a computer with a Harvard architecture has separate memories for storing program and data

In the simplest sense, parallel computing is the simultaneous use of multiple compute resources to solve a computational problem: To be run using multiple CPUs A problem is broken into discrete parts that can be solved concurrently Each part is further broken down to a series of instructions Instructions from each part execute simultaneously on different CPUs

SIMD (Single Instruction Multiple Data)


In non-parallel system/software data flow in 1

instruction at a time with multiple data chunks E.g. Arithmetic & Logical operations in programming and transfer of data.

MIMD ( Multiple Instruction Multiple Data)


In parallel computing if program architecture

support : multiple data process at time with multiple instruction E.g. 2x5+6/5x3(2+1)

An operating system (OS) is a collection of software that manages computer hardware resources and provides common services for computer programs.

User
A user is an agent, either a human agent (end-user) or

Application software

software agent, who uses a computer or network service. A user often has a user account and is identified by a username (also user name)

Application software, also known as an application or

an app, is computer software designed to help the user to perform specific tasks. Examples include enterprise software, accounting software, office suites, graphics software , Browsers and media players.

Personal computer hardware


the component devices that are the building

blocks of personal computers. These are typically installed into a computer case, or attached to it by a cable or through a port

Process management Interrupts Memory management File system Device drivers Networking (TCP/IP, UDP) Security (Process/Memory protection) I/O

Process management
an integral part of any modern day operating system

(OS) The OS must allocate resources to processes, enable processes to share and exchange information, protect the resources of each process from other processes and enable synchronization among processes To meet these requirements, the OS must maintain a data structure for each process, which describes the state and resource ownership of that process, and which enables the OS to exert control over each process

Interrupt an interrupt is a signal to the processor emitted by hardware or software indicating an event that needs immediate attention
A hardware interrupt is an electronic alerting signal

sent to the processor from an external device, either a part of the computer itself such as a disk controller or an external peripheral. A software interrupt is caused either by an exceptional condition in the processor itself, or a special instruction in the instruction setwhich causes an interrupt when it is executed

Memory management
Memory management is the act of managing

computer memory. The essential requirement of memory management is to provide ways to dynamically allocate portions of memory to programs at their request, and freeing it for reuse when no longer needed This is critical to the computer system.

File system
A file system (or filesystem) is an abstraction to store,

retrieve and update a set of files The term also identifies the data structures specified by some of those abstractions, which are designed to organize multiple files as a single stream of bytes, and the network protocols specified by some other of those abstractions, which are designed to allow files on a remote machine to be accessed By extension, the term also identifies software or firmware components that implement the abstraction (i.e. that actually access the data source on behalf of other software or firmware that uses those components)

Device driver
In computing, a device driver or software driver is

a computer program that operates or controls a particular type of device that is attached to a computer A driver typically communicates with the device through the computer bus or communications subsystem to which the hardware connects

Computer network
A computer network, or simply a network, is a

collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information Properties
Facilitate communications Permit sharing of files, data, and other types of information Share network and computing resources May be insecure May interfere with other technologies May be difficult to set up

Computer security
Computer security is information security as

applied to computers and networks.

Input/output
In computing, input/output or I/O is the

communication between an information processing system (such as a computer) and the outside world, possibly a human or another information processing system Inputs are the signals or data received by the system, and outputs are the signals or data sent from it. The term can also be used as part of an action; to "perform I/O" is to perform an input or output operation

Types of operating systems


Real-time Multi-user

Multi-tasking vs. single-tasking


Distributed Embedded

A computer network, or simply a network, is a collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. A network is a group of devices connected to each other Networks may be classified into a wide variety of characteristics, such as the medium used to transport the data, communications protocol used, scale, topology, benefit, and organizational scope.

History
In September 1940, George Stibitz used a

Teletype machine to send instructions for a problem set from his Model at Dartmouth College to his Complex Number Calculator in New York and received results back by the same means Early networks of communicating computers included the military radar system SemiAutomatic Ground Environment (SAGE), started in the late 1950s.

Properties

Computer networks: Facilitate communications


Using a network, people can communicate efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing. In a network environment, authorized users may access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many networks. In a networked environment, each computer on a network may access and use resources provided by devices on the network, such as printing a document on a shared network printer. Distributed computing uses computing resources across a network to accomplish tasks. A computer network may be used by computer hackers to deploy computer viruses or computer worms on devices connected to the network, or to prevent these devices from normally accessing the network (denial of service). Power line communication strongly disturbs certain [3]forms of radio communication, e.g., amateur radio. It may also interfere with last mile access technologies such as ADSL and VDSL. A complex computer network may be difficult to set up. It may also be very costly to set up an effective computer network in a large organization or company.

Permit sharing of files, data, and other types of information

Share network and computing resources

May be insecure

May interfere with other technologies


May be difficult to set up

Communication media
Computer networks can be classified according to

the hardware and associated software technology that is used to interconnect the individual devices in the network, such as electrical cable (HomePNA, power line communication, G.hn), optical fiber, and radio waves (wireless LAN). In the OSI model, these are located at levels 1 and 2.

Communication media (Continue)


Wired technologies Wireless technologies

Exotic technologies

Communications protocols and network programming


Ethernet IEEE 802 IEEE 802.11 MAC bridging (IEEE 802.1D)

Communications protocols and network programming(Continue)


Internet Protocol Suite The Internet Protocol Suite, often also called TCP/IP, is the foundation of all modern internetworking SONET/SDH Synchronous optical networking (SONET) and Synchronous Digital Hierarchy (SDH) are standardized multiplexing protocols that transfer multiple digital bit streams over optical fibre using lasers

Communications protocols and network programming(Continue)


Asynchronous Transfer Mode Asynchronous transfer mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing and encodes data into small, fixed-sized cells. This differs from other protocols such as the Internet Protocol Suite or Ethernet that use variable sized packets or frames.

Communications protocols and network programming(Continue)


Network programming Computer network programming involves writing computer programs that communicate with each other across a computer network Different programs must be written for the client process, which initiates the communication, and for the server process, which waits for the communication to be initiated. Both endpoints of the communication flow are implemented as network sockets; hence network programming is basically socket programming.

Scale
Personal area network A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. A PAN may include wired and wireless devices.

Scale (Continue)
Local area network
A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings.

Home area network


A home area network (HAN) is a residential LAN which is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. An important function is the sharing of Internet access, often a broadband service through a cable TV or Digital Subscriber Line (DSL) provider

Scale (Continue)
Metropolitan area network A Metropolitan Area Network (MAN) is a large computer network that spans a metropolitan area or campus. Its geographic scope falls between a WAN and LAN. MANs provide Internet connectivity for LANs in a metropolitan region, and connect them to wider area networks like the Internet.

Scale (Continue)
Wide area network
A Wide Area Network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, or national boundaries) using private or public network transports.

Organizational scope
Intranets and extranets
An intranet is a set of networks, using the Internet Protocol and IP-based tools such as web browsers and file transfer applications, that is under the control of a single administrative entity. An extranet is a network that is limited in scope to a single organization or entity and also has limited connections to the networks of one or more other usually

Internet
The Internet is a global system of interconnected governmental, academic, corporate, public, and private computer networks. It is based on the networking technologies of the Internet Protocol Suite.

Network topology
Common layouts
A network topology is the layout of the interconnections of the nodes of a computer network. Common layouts are:
A bus network: all nodes are connected to a common medium along this medium. This was the layout used in the original Ethernet, called 10BASE5 and 10BASE2. A star network: all nodes are connected to a special central node. This is the typical layout found in a Wireless LAN, where each wireless client connects to the central Wireless access point. A ring network: each node is connected to its left and right neighbor node, such that all nodes are connected and that each node can reach each other node by traversing nodes left- or rightwards. The Fiber Distributed Data Interface (FDDI) made use of such a topology. A mesh network: each node is connected to an arbitrary number of neighbors in such a way that there is at least one traversal from any node to any other. A fully connected network: each node is connected to every other node in the network.

Overlay network
An overlay network is a virtual computer network that is built on top of another network. (e.g. VPN or Peer to Peer)

Basic hardware components


Network interface cards Repeaters and hubs

Bridges
Switches Routers Firewalls

Network performance
Circuit-switched networks: Asynchronous Transfer Mode (ATM) network,

quality of service (QoS),


Network security Network resilience Views of networks

OSI model
The Open Systems Interconnection (OSI) model (ISO/IEC 7498

1) is a product of the Open Systems Interconnection effort at the International Organization for Standardization. Layer 1: physical layer Layer 2: data link layer WAN protocol architecture Layer 3: network layer Layer 4: transport layer Layer 5: session layer Layer 6: presentation layer Layer 7: application layer

S-ar putea să vă placă și