Title: The First Computers
1The First Computers
2Tips!
3Quotes
"Computers in the future may weigh no more than
1.5 tons." --Popular Mechanics, forecasting the
relentless march of science, 1949
4Quotes
I think there is a world market for maybe five
computers." --Thomas Watson, chairman of IBM,
1943
5Quotes
"I have traveled the length and breadth of this
country and talked with the best people, and I
can assure you that data processing is a fad that
won't last out the year." --The editor in charge
of business books for Prentice Hall, 1957
6Quotes
"But what ... is it good for?" --Engineer at the
Advanced Computing Systems Division of IBM, 1968,
commenting on the microchip.
7Quotes
"There is no reason anyone would want a computer
in their home." --Ken Olson, president, chairman
and founder of Digital Equipment Corp., 1977
8Quotes
"So we went to Atari and said, 'Hey, we've got
this amazing thing, even built with some of your
parts, and what do you think about funding us? Or
we' ll give it to you. We just want to do it. Pay
our salary, we'll come work for you.' And they
said, 'No.' So then we went to Hewlett-Packard,
and they said, 'Hey, we don't need you. You
haven't got through college yet.'" --Apple
Computer Inc. founder Steve Jobs on attempts to
get Atari and H-P interested in his and Steve
Wozniak's personal computer.
9Quotes
"640K ought to be enough for anybody." -- Bill
Gates, 1981
10Quotes
"Everything that can be invented has been
invented." --Charles H. Duell, Commissioner, U.S.
Office of Patents, 1899.
11History Blaise Pascal 1642
- Pascaline
- 5 digits
- Added only
- Not reliable
- Two centuries ahead of its time
12Computer Concepts
13Basic Concepts
- Analog or Digital
- Analog continuous signals
- Voltage, pressure, weight etc.
- Digital discrete states, or quantized
information - The bit is the fundamental unit
- Why use digital?
14Computer Operating Principles
- Physical operating principles are simple
- Complexity and power are due to
- Miniaturization
- Speed
- Programming
15Tips!
16Basic Concepts
- Prefixes
- Kilo 1,000s
- Mega 1,000,000s
- Giga 1,000,000,000s
- Tera 1,000,000,000,000s
- Peta 1,000,000,000,000,000s
- Exa 1,000,000,000,000,000,000s
17Basic Terms
- Quantity and data rate terminology
- Bit (used in data rate)
- Byte (8 bits) (used to represent quantity)
- Kbps kilobit per second
- Kbyte 1024 bytes
- Mbps megabits per second
- MB megabyte (1,048,576 bytes 1meg)
- Gbps gigabit per second
- GB gigabyte (1 Gig)
18Basic Terms
- Frequency terminology
- kHz Thousands of cycles per second
- MHz Millions of cycles per second
- GHz Billions of cycles per second
- Used to indicate the clock frequency of busses,
CPUs and other microprocessors - CPU central processing units
19The Jacquard Loom
- The first truly programmable machine in 1804
- Punched cards
- Could produce an infinite variety of patterns
20Bus Memory, Address, Expansion
- A bus is a path or group of related paths that
carry electrical signals to represent data - Address bus transfers the where information
- Data bus transfers the what information
- Expansion bus interconnects hardware
- ISA 8-bit and 16 bit (8 mhz)
- PCI (32 mhz, 32 bit)
- AGP (variable mhz, 32 or 64 bit)
21Computer Hardware Issues
- Processors
- Vary in bus width, addressable memory, features
- Proprietary vs. non-proprietary issues
- Cost, service, expandability, compatibility
- Motherboards
- Vary in form factor, power, expansion, number and
type of busses, ram type and limits - Ports
- Serial, parallel, USB, Firewire, SCSI
22Limited Resources
- IRQs attention-getting signal
- I/O addresses device mailbox
- DMA ports (Direct Memory Access)
- Concerns
- Availability
- Configuration fixed, jumpers, PNP
- PNP?
23Computer Hardware Issues
- Cases
- Proprietary vs. non-proprietary issues
- Motherboard form-factor, power, expansion
- Quality issues
- Power supply UL listed?
- RF shielding?
- Structural integrity?
- Cooling?
24Computer Hardware Issues
- CMOS/BIOS/ROM issues
- Definitions? RAM vs. ROM?
- Functions of BIOS
- Time/date, disk assignments, ports, CPU speed
- Assigning/enabling/disabling resources and
devices - Boot order, startup method
- System protection virus, remote startup, BIOS
- CMOS memory, uses battery to hold BIOS
configuration
25Thomas de Colmar
The Arithmometer in 1820
- First commercially successful calculator
26Tips!
27Memory Primary, Secondary and Cache
Core Memory
Intel 1103
- Primary memory RAM, Random-Access?
- Why do we need RAM? How much is enough?
- Disk space is not the same primarily storage
- Exception Windows swap-file
- RAM is up to 1,000,000 times faster than a hard
disk! - Fast RAM can move over a 3 gigabyte/sec, fast
hard disk is about 7-8 megabyte/sec
28Computer Hardware Issues
- Secondary memory storage
- Floppy 5 ¼, 3 ½ (360K, 720K, 1.2M, 1.44M)
- Hard disks internal and external
- CD/CDR/CDRW
- Single session and multisession
- Media issues
- Audio CD issues media, writing cautions
29Secondary Storage
- Zip and other magnetic removables
- Soft media Zip and LS120 (SuperDisk)
- Hard platter Jazz and Syquest
- Tape drives
- Media issues
- DVDs and write capable DVDs
- Cost/speed issues
- Incompatibility issues
30Other Secondary Storage
- Flash memory portable, removable
- Types
- Proprietary (eg. Sony)
- CompactFlash (Kodak and others)
- Media Stick
- Quantities and cost issues
- Peripherals
- CompactFlash readers USB, floppy, parallel,
PCMCIA adapters
31Computer Hardware Issues
- Cache memory
- What is it?
- What uses it?
- What types
- Hardware CPU (primary and secondary)
- Virtually all digital devices use a cache
- Components to peripherals
- Disk, Internet and system cache
32BabbagesAnalytical Engine
- First general purpose calculator
- Decisions based on results
- Information AND instructions on punch cards
(memory) - Type set output
- 1000, 50-digit number memory
33Tips!
34BabbagesAnalytical Engine
35Lady Lovelace
- Ada Augusta Byron
- The mother of computer programming
- Mathematician
- Developed programs for the Analytical Engine
1842
36Computer Hardware Issues
- USB
- Advantages reasonably fast (12Mbps), 1 IRQ, can
be bus-powered, of devices, PNP - Disadvantages OS support, speed, compatibility
- IEEE1394 FireWire, Sony iLink
- Advantages high speed (400Mbps), good
professional device support, cross-platform - Disadvantages reduced support on PCs
37Video and Sound Basics
- Sound and video information
- Bit depth, frame rate, sample rate
- Sound and video hardware
- Displays, adapters
- Sound and video capture, storage and manipulation
- Digital cameras and video recorders
38Communication Issues
- Limitations of conductors
- Length vs. frequency issues, fiber, the local
loop - Modems
- ISDN too little too late
- xDSL voice and data
- Cable data services
- Satellite data services
- VOIP?
39Otto Steiger
- The Millionaire in 1893
- Business and science applications
- In use for 30 years, 4655 made
40Tips!
41First Programmers
Ada Augusta Analytical Engine (Babbage)
Adele Goldstein ENIAC
Grace Hopper UNIVAC, COBOL
42Network Designs
- LANs (Local Area Network)
- CANs (Campus Area Network)
- MANs (Metropolitan Area Network)
- WANs (Wide Area Network)
- AD-Hoc Network
- MANs and WANs cross the public right-of-way
43Network Issues
- Circuit switched circuits
- Connection-oriented
- Temporary, dedicated, real or virtual path
- Sequential order
- Packet switched circuits
- Connection-oriented (Frame-Relay) or
connectionless (IP) - Dedicated paths (ATM) or variable paths (IP)
- May arrive out of order (IP)
44Circuit Switching vs. Packet Switching
45Network Issues
- Networks rely on communication rules
(protocols) - OSI is the standard architectural model
- Must be independent of the application
- Alternative?
- TCP/IP is the most important protocol suite
46Great Brass Brain
Tide predictor Analog computer 1914
47IBM
Thomas Watson, 1921 98 accounting market
48OSI Layers
Physical media and transmission of unstructured
bits Data Link reliable transfer of frames
between connected devices Network establishes,
maintains and terminates connections between
devices on different networks Transport
transfers data between end points. Error,
recovery and flow control Session establishes,
maintains and terminates connections between
applications Presentation Converts data to
application-specific and OS-specific
formats Application user interface and services
49(No Transcript)
50Network Devices
- Hubs simply mirror one port to all others (layer
1) - Bridges link similar networks based on hardware
addresses. - Layer 2 device
- They extend and filter LAN traffic
- They can links LANs and/or WANs
- Switches like bridges, they are layer 2.
- Routers link, partition and transfer packets
between networks (similar or dissimilar) - Layer 3 device
51Hubs (repeaters) and Bridges
52Switches and Routers
53Konad Zuse
- Built the Z1 in Berlin 1936
- Pioneered relay calculators
- Binary math, floating point
- Unknown till modern time
- Proposed vacuum tube design in 1939-turned down
- Z1-Z4 destroyed
54Tips!
55Common Network Terms
- Ethernet IEEE 802.3
- Most popular LAN technology
- Variety of media coax, copper, fiber
- Includes 10-Base2, 10Base5, 10Base-T, 100Base-T
and many more - Gigabit Ethernet now popular
- CSMA/CD sets it apart
56Common Network Terms
- Other LAN technologies
- Token Ring 802.5
- Older, limited, slow (4 or 16 Mbps)
- No collisions
- Other LAN technologies
- FDDI (Fiber Distributed Data Interface)
- Very powerful, similar to Token Ring,
100Mbps-200Mbps, 124 miles (LAN or MAN) - ArcNet Token Bus, coax or fiber
57Wireless Issues
- WLANs (Wireless Lans) IEEEs 802.11
- 802.11 (1-2Mbps)
- 802.11b (5-11Mbps) 2.4 GHz, WiFi popular
- 400-1500 ft. (11Mbps-1Mbps)
- 802.11a 5-6 GHz, 6, 12, 24, 56Mbps (wireless
ATM) - HyperLan2 is similar
- Bluetooth
- Interconnect phones, printers, cameras,
computers, PDAs - 30 ft. range, 1 Mbps, mixed acceptance
- More portable than 802.11 (print a letter at your
friends house)
58Howard Aiken
The Harvard Calculator
- Used for vacuum tube design, defense, physics
1938
59More Wireless Technologies
- HomeRF
- Based on 802.11b, 2.4GHz, 1.6Mbps
- 150ft max, good protection from interference
- Designed for the home market
- Infrared networking
- Too little, too late
60Internet Connectivity
- Business connectivity
- Cost vs. performance vs. reliability
- Choices
- T-1, T-3, PRI, Fractionals
- xDSL or cable
- Frame Relay, ATM, X.25
- Performance guarantee issues (SLAs)
61ENIAC
- Electrical Numerical Integrator and Computer
- University of Pennsylvania's Moore School
- Most complex vacuum tube device ever built
- 1500 sq. ft., 30 tons, 18,000 tubes, 200
kilowatts - .1mhz, clocked logic, decimal, 1000 times faster
than Harvard Mark 1 - Real-time missile trajectories
- 1946-1955
62ENIAC
63ENIAC
One of 200 memory units for 20, 10-digit numbers
64Security Issues
- Physical security critical, often overlooked
- Locked rooms, physical media protection etc.
- Power (UPS, generator etc.)
- Environment humidity, fire, water damage,
temperature, vibration, sunlight - Hardware redundancy power supplies, hard disks,
backup trunks for data and voice - Software security
- Login, authorization, authentication, access
controls, software redundancy/replication
65Tips!
661 Threat Internal
- Access unauthorized systems/data
- Local or remote access
- Physical damage to systems/media/cabling
- Theft of software and/or hardware
- Theft of proprietary information
- Tampering with OS properties
- Changing data
- Installation of untested/unauthorized software
- Pirated software
- Viruses transmitted/received by employees
67External Threats
- Unauthorized access to user accounts
- Passwords guessing, observing, dictionary
attack, replay attack - Solutions encrypt password, complex password,
random password system, lock users after N
attempts, biometrics, smart cards - Physical damage incoming trunks, demarc, vendor
- Denial of service overwhelm the system
- Viruses via Internet, intranet, software
- Eavesdropping to capture and/or modify data
- Phreaking breaking into phone systems
68Viruses/External Attacks at Home
- Why?
- Just because
- Access to sensitive information
- Bank account information, passwords, credit card
numbers etc. identity theft - To attack others from your PC
- Why are ADSL and cable modems more susceptible?
69Viruses
- Types
- Worms, Trojan Horse, Macros, boot virus,
polymorphic, logic bomb, stealth - Hoax
- Method of transfer
- Boot, email attachment, web scripts, Outlook
email, infected file, infected Office file (macro)
70The Modern PC begins (1975)
Altair 8800
71Tips!
72Viruses
- Prevention
- Buy, install and update virus protection
- Watch that floppy drive. Consider locking it
- Scan floppies from anyone before executing files
- Dont allow Office documents with macros to
auto-execute (Tools, Macro, Security) - Scan all attachments before executing
- Keep up with Windows Critical Updates
- Use a firewall or defensive software (networks)
73Software Protection
- Firewalls
- Software and hardware issues
- Filtering ability
- Caching w/combined proxy server function
- Software for home use
- BlackICE Defender (www.networkice.com)
- ZoneAlarm (free!) (www.zonelabs.com)
- McAfee and Norton
74Spam
- What are the effects?
- 50 of an ISPs traffic
- Additional servers, technicians, customer service
reps - 15 of a customers AOL bill
- Worldcom has 30 employees to deal with spam
- Spam police
- Guilty until proven innocent
- Internet Billing Company lost 400,000 in 4 days
due to blacklisting
75Audio Standards
- MP3
- 128kbps, highly compressed, great support
- RealAudio
- Stream-oriented, lower quality and bandwidth,
20kbps typical - Windows Media
- Variable data rate, better than MP3 at same rate
- Quicktime
- Container for a variety of formats, including MP3
76Tips!
77Electronic Conferencing
78Video Conferencing
- Satisfaction varies
- Directly with number of channels and quality of
channels - Directly with degree of participant familiarity
- Inversely with topic complexity
- Inversely with number of participants
- Inversely with number of locations
79Video Conferencing
- Types
- Computer conferencing with or without graphics
- Chat, whiteboard, shared applications etc.
- Audio-only conferencing
- Speakerphones, conference calling etc.
- Sum of noise
- Consider individual mics and stereo
- Difficult for large groups (chaotic) requires
supervisor
80Video Conferencing
- After newness, limitations become apparent
- Eye contact, lack of physical freedom, dress
- No clear advantage over simple voice
- Reduced awareness of participants reactions
- Voice-activated switching can be distracting and
misused
81Video Conferencing
- As richness decreases, new groups uncertain with
regard to authority, norms, and role expectations - Richness is not overly relevant as long as rich
audio exists - Exceptions sensitive, confidential, or personal
discussions
82Video Conferencing
- As richness decreases, participants find it
easier to be insincere, say no, argue for
positions they do not support - As richness decreases, hierarchies break down
participants tend to equalize - Attention focuses on logic, eloquence, style,
vocal skill (TV mentality)
83Video Conferencing
- Rank reversal
- Familiarity with technology is helpful
- Benefits of electronic meetings
- Productivity, access, timeliness, number of
issues, more accurate information, improved
morale, increased cooperation
84Video Conferencing
- Inappropriate use of electronic meetings
- Less expensive, but not always cost-efficient
- May miss critical experiences and knowledge
- Physical meetings often have complex, sometimes
hidden objectives - Electronic meetings are often chosen because of
convenience/inconvenience issues (eg. traffic),
and not because it is the best choice