StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Computer and Information Science Products - Research Paper Example

Cite this document
Summary
The paper "The Computer and Information Science Products" discusses that products are analyzed and evaluated for their performance and efficiency. Judgment of optimality in the utilization of resources like time and storage space plays a key role in the conduction of this analysis…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
The Computer and Information Science Products
Read Text Preview

Extract of sample "The Computer and Information Science Products"

?A Short Research Paper The computer and information science products are analyzed and evaluated for their performance and efficiency. Judgment of optimality in utilization of the resources like time and storage space play key role in conduction of this analysis. The consideration of time and space for performance analysis is equally important in evaluating both the computer hardware and software. The software being an algorithmic structure can be analyzed through the algorithm analysis techniques. The time complexity is measured as a function of input size n and the growth is taken as a measure to comment on the algorithmic efficiency through asymptotic. In different scenarios the notations for representation of time are different like turnaround time, waiting time and response time. Time efficient algorithms are not space efficient usually due to time/space trade off. These algorithms may prove to be heavier for the hardware in terms of their need for storage space they require to execute. In case of computer hardware the representation of time and space for performance evaluation can be seen in terms of processor speed, bus speed, memory access latency, throughput and the size of storage space accordingly. It has been observed historically that advancement in computer hardware and software always go hand in hand in order to cope up with the requirements of each other. The advent of semi conductor memory introduced the capability of memory addressing, memory segmentation and memory fencing through fence registers. This created the capacity of multiprogramming with memory security against old fashioned batch processing systems. Multiprogramming later evolved into timesharing and facilitated processor sharing. The huge sizes of peripheral devices and offline operations were replaced by the invention of miniaturized controllers with local buffers. This revolutionized the co-existence of peripheral devices through techniques of spooling and DMA. The memory management schemes evolved from a single partition allocation mechanism to multi partition mechanisms like MVT and MFT. The problems of internal and external fragmentation and compaction resulted in the genesis of paging as a non-contiguous memory allocation mechanism. The overgrowth of program sizes was initially dealt with techniques of overlays. This technique went obsolete due to programming restrictions and enormous sized program code. The concept of virtual memory appeared as a solution to this problem. The fact that has been continuously observed during the evolution of computing was, that with the implementation of new and advance techniques to address old problems the room of improvement in the performance of the computing systems remained persistent. The new solutions in turn produced new problems and this cycle goes on. For example to address the problem of incompatibility between the sizes of physical memory and program code, the concept of virtual memory and the techniques of paging and demand paging were introduced. These in turn resulted in multiple problems like, Access latency due to the involvement of secondary storage. Memory allocation for oversized page tables for which different strategies like multi level paging, inverted page tables and hashed page tables were applied (These have their drawbacks too). The involvement of cache as TLB to reduce access latency. Frame allocation and page replacement strategies and their drawbacks. Thrashing etc. The improvement capacity always coexisted with the upcoming solutions and increasing requirements. The last few decades saw the advent of some remarkable achievements like the RISC architecture, pipelining, cache, super scalar processing, memory management systems and virtual memory. The computational power increased manifolds as a result of these achievements. Referring to “Reduced instruction set computing” The type of computer architecture that involved simple instructions that were comprehensive and lesser in number. RISC incorporated registers along with the main memory itself for the allocation and storage of instructions. Superscalar computing involves the parallel execution of instruction by a single CPU. The main transition between CISC and RISC type of computing resulted after the advent of Superscalar computing. Pipelining, on the other hand, refers to a series of data elements. Connected in a series, the output of one process is the input of the next. Pipelined instructions can also be executed in parallel. Overlapping execution of multiple instructions having the same circuitry is greatly assisted by the phenomenon of pipelining. Superscalar computing involves the incorporation of pipelining within it. Thus it can easily be figured out that the combination of pipelining and superscalar processing within a system would definitely result in faster processing speed(1). Main memory is an essential part of every computer system. The main memory holds part of any computer process that is in execution. It is also referred to as RAM. Data can be read from or written to the computer memory. It is essential for the computer memory to have substantial space so as to facilitate the execution of processes. There, however is a limit to the size of RAM that can be incorporated into a computer system. For a number of processes to be executed simultaneously in a system the size of RAM often does not suffice. It is then that the phenomenon of Virtual memory comes in handy. Virtual memory looks up any pages in the memory that are static and are not being used for long. It swaps these pages onto the hard disk thus freeing space for the allocation of new tasks. This process happens automatically. Virtual memory increases the size of the RAM without introduction of any new physical memory components into the computer system. A system that incorporates virtual memory has its memory divided into physical and logical pages. Cache is another type of memory. Its hardware composition is different from that of the main memory. This enables the access latency of the cache to be much lesser than that of the main memory. The most frequently accessed instructions are placed in cache so that they can be accessed very quickly. There are two main strategies that are used to implement access to and from the cache. Most flexible cache strategy is the “Fully associative cache”. The other strategy is the “direct mapped or one way subsystem associative cache”. A fully associative cache subsystem involves the mapping of bytes of data onto any one of the lines of the cache memory. In direct mapped cache however fixed blocks of memory are always associated with cache lines whether they may be in use or not. Both the strategies have their specific pros and cons and neither can be weighed over the other (2). The close study reveals that the improvement in the software implementation techniques to utilize the hardware resources optimally is highly necessary. Some of the unsaturated areas for example are software pipelining (3) and multiprogramming scheduling (4). Sources: Silberschatz A., Galvin P. & Gagne G. (2010) Operating System Concepts 8 Ed. John Wiley and Sons. References: (1) Walters Garrison E. (2000). ESSENTIAL GUIDE TO COMPUTING: THE STORY OF INFORMATION TECHNOLOGY. Prentice Hall. (2) Watts D, Chabrol A, Dundas P, Fredrickson D, Kalmantas M, Marroquin M, Puri R, Rodriguez J, Zheng D.(2000). TUNING IBM SYSTEM X SERVERS FOR PERFORMANCE. IBM Redbooks. (3) Lam, M. (1988). Software Pipelining: An Effective Scheduling Technique for VLIW Machines. UMUC Library. (4) Liu,C.L. & Layland J. W. (1973) Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment. UMUC Library. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Describe how concepts such as RISC, pipelining, cache memory, and Research Paper”, n.d.)
Retrieved de https://studentshare.org/family-consumer-science/1420004-describe-how-concepts-such-as-risc-pipelining
(Describe How Concepts Such As RISC, Pipelining, Cache Memory, and Research Paper)
https://studentshare.org/family-consumer-science/1420004-describe-how-concepts-such-as-risc-pipelining.
“Describe How Concepts Such As RISC, Pipelining, Cache Memory, and Research Paper”, n.d. https://studentshare.org/family-consumer-science/1420004-describe-how-concepts-such-as-risc-pipelining.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Computer and Information Science Products

Computer Sciences and Information Technology

A paper "Computer Sciences and information Technology" claims that both computer science and information technology augment each other's purpose.... These serve as the foundations for the gathering, processing, representation, communication, storage, and access to relevant data, irrespective of such gathered data is encoded in bytes or bits within the computer's memories or just transcribed in the proteins and genes structure of the Human cellular structure....
5 Pages (1250 words) Research Paper

Computer Sciences and Information Technology

This paper ''Computer Sciences and information Technology'' discusses about the motherboard and it functions, central processing unit and it functions, a printer, drive disks, disk storage, a floppy disk, CD-ROM or DVD drive, a hard disk drive etc.... In addition, the computer case has some small wires that connect to the motherboard allowing for reset, power and LED lights to function.... These ports are said to allow most external peripherals of the computer to connect to the monitor, keyboard, printer, mouse, phone lines, speakers and other external devices....
11 Pages (2750 words) Term Paper

Computer Sciences and Information Technology

 Computer sciences and information technology  “Computing is not about computers any more.... My aim is to see people enjoying the computer games and take pride knowing that I have contributed in creating the programming of the game.... I love to read and play video games on the computer as my favorite past time.... APP is the software for Apple's products like Ipad and Iphone.... ?? ~Nicholas Negroponte A job in the field of computing had been my ambition ever since I had the fortunate chance of being exposed to this most modern equipment that science has put into the hands of the mankind....
4 Pages (1000 words) Personal Statement

The Whole Earth Network

This was the world's first stored-program computer and although initially it was not meant to be a practical computer, it was actually meant for a testbed for Williams Tube, which is the earlier memory device.... In the computer historical era, these empires used to handle their administrative records and messages reliably and at minimum cost.... Each of these empires possessed their own characteristic information handling technology, which makes them formulate their own technological solutions....
6 Pages (1500 words) Literature review

Procrastination by Regina Arnold

Computers are presently being used in information exchange in any form.... This has created advancement in information technology globally.... This paper appreciates that people comprehend the history of computing differently because some opinions are informed by traces of information available today of what happened in the past while others' viewpoints are informed by issues about computers that are of interest today....
8 Pages (2000 words) Book Report/Review

How Computer Science Helps Students in Schools

Name: Course: Title: Tutor: Date: How Computer science Helps Students in Schools Computer science as a subject of study is uniquely important in its own way.... As such, each of these specialties, having been drawn from Computer science would mainly focus on particular challenges, and the application and understanding of basically all aspects of Computer science.... Research by the Sheehy shows that only about 21,000 high schools out of about 42,000 public and private high schools in America offered Advanced Placement test in Computer science in 2011, a 25 per cent drop in the last 5 years....
9 Pages (2250 words) Essay

Mechanical Engineering And Science

Vehicles have played a great role in improving the economy of states, this is mostly because they transport products and goods to places of production.... This is because nearly all movable products are built through knowledge derived from this course.... This essay talks that technology refers to the methods used in collecting, modifying, and arranging information for the main purpose of developing a machine or a project.... Due to the evolution of technology, it is now possible to use some aspects of information technology, in mechanical engineering....
6 Pages (1500 words) Research Paper

Charles Babbage and His Lifetime

This essay "Charles Babbage and His Lifetime " proposes to discuss Charles Babbage's contribution to the development of computer technology through his work on The Difference Engines and The Analytical Engines.... His extensive work in other areas such as mathematics, economics and business management have made significant contributions to society, and it can be observed that all these have the common Charles Babbage (1791-1871) a mathematician, scientist, and economist, is well-known as the 'father of computing' for his invention of the modern computer....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us