Unit 1
Unit 1
Ashima Wadhwa
Introduction to IT System
devices.
Input devices include:
Keyboard
Mouse
Joystick
Scanner
FUNCTIONS OF INPUT UNIT
Accept the data and instructions from the
outside world.
Convert it to a form that the computer can
understand.
Supply the converted data to the computer
world.
CPU
It is the brain of the computer.
The ALU and the Control Unit (CU) of a
The acronym RAM stems from the fact that data stored in random
access memory can be accessed – as the name suggests – in any
random order. Or, put another way, any random bit of data can be
accessed just as quickly as any other bit.
The most important things to understand about RAM are that RAM
memory is very fast, it can be written to as well as read, it is volatile (so
all data stored in RAM memory is lost when it loses power) and, finally,
it is very expensive compared to all types of secondary memory in
terms of cost per gigabyte. It is because of the relative high cost of RAM
compared to secondary memory types that most computer systems use
both primary and secondary memory.
Data that is required for imminent processing is moved to RAM where it
can be accessed and modified very quickly, so that the CPU is not kept
waiting. When the data is no longer required it is shunted out to slower
but cheaper secondary memory, and the RAM space that has been freed
up is filled with the next chunk of data that is about to be used.
Types of RAM
DRAM: DRAM stands for Dynamic RAM, and it is the most
common type of RAM used in computers. The oldest type is
known as single data rate (SDR) DRAM, but newer computers use
faster dual data rate (DDR) DRAM. DDR comes in several versions
including DDR2 , DDR3, and DDR4, which offer better
performance and are more energy efficient than DDR. However
different versions are incompatible, so it is not possible to mix
DDR2 with DDR3 DRAM in a computer system. DRAM consists of a
transistor and a capacitor in each cell.
SRAM: SRAM stands for Static RAM, and it is a particular type of
RAM which is faster than DRAM, but more expensive and bulker,
having six transistors in each cell. For those reasons SRAM is
generally only used as a data cache within a CPU itself or as RAM
in very high-end server systems. A small SRAM cache of the most
imminently-needed data can result in significant speed
improvements in a system
ROM Computer Memory
ROM stands for read-only memory, and the name stems from the
fact that while data can be read from this type of computer memory,
data cannot normally be written to it. It is a very fast type of
computer memory which is usually installed close to the CPU on the
motherboard.
ROM is a type of non-volatile memory, which means that the data
stored in ROM persists in the memory even when it receives no power
– for example when the computer is turned off. In that sense it is
similar to secondary memory, which is used for long term storage.
When a computer is turned on, the CPU can begin reading
information stored in ROM without the need for drivers or other
complex software to help it communicate. The ROM usually contains
“bootstrap code” which is the basic set of instructions a computer
needs to carry out to become aware of the operating system stored
in secondary memory, and to load parts of the operating system into
primary memory so that it can start up and become ready to use.
Types of ROM
PROM PROM stands for Programmable Read-Only Memory, and it is
different from true ROM in that while a ROM is programmed (i.e. has
data written to it) during the manufacturing process, a PROM is
manufactured in an empty state and then programmed later using a
PROM programmer or burner.
EPROM EPROM stands for Erasable Programmable Read-Only Memory,
and as the name suggests, data stored in an EPROM can be erased and
the EPROM reprogrammed. Erasing an EPROM involves removing it from
the computer and exposing it to ultraviolet light before re-burning it.
EEPROM EEPROM stands for Electrically Erasable Programmable Read-
Only Memory, and the distinction between EPROM and EEPROM is that
the latter can be erased and written to by the computer system it is
installed in. In that sense EEPROM is not strictly read-only. However in
many cases the write process is slow, so it is normally only done to
update program code such as firmware or BIOS code on an occasional
basis
Differences between RAM and ROM
ROM:
Non-volatile
Fast to read
Usually used in small quantities
Cannot be written to quickly
Used to store boot instructions or firmware
Relatively expensive per megabyte stored compared to RAM
RAM:
Volatile
Fast to read and write
Used as system memory to store data (including program code)
that the CPU needs to process imminently
Relatively cheap per megabyte stored compared to ROM, but
relatively expensive compared to secondary memory
Secondary Memory/ Mass Storage
Devices
We have read so far, that primary memory is volatile
and has limited capacity. So, it is important to have
another form of memory that has a larger storage
capacity and from which data and programs are not
lost when the computer is turned off. Such a type of
memory is called secondary memory. In secondary
memory, programs and data are stored. It is also
called auxiliary memory. It is different from primary
memory as it is not directly accessible through the
CPU and is non-volatile. Secondary or external
storage devices have a much larger storage capacity
and the cost of secondary memory is less as
compared to primary memory.
Mass Storage Devices
A mass storage device (MSD) is any storage
device that makes it possible to store and
port large amounts of data across computers,
servers and within an IT environment. MSDs
are portable storage media that provide a
storage interface that can be both internal
and external to the computer.
A mass storage device may also be referred
2. Thick clients :
A thick client is a system which can be connected to the server even
without the network. Thick clients are also referred as heavy or fat
clients. Thick clients are not dependent on server’s applications. They
have their own operating system and software applications. They
have high flexibility and high server capacity. Thick clients have more
security threats and are less secure than thin clients.
Factors Thin clients Thick clients
recovery
Productivity applications, such as email
High-volume e-commerce transactions
Powering online gaming communities
Big data, machine learning and artificial
intelligence
Data Center Challenges
Data Security
A consistent issue of data center networking challenges is data
security. Data breaches can cost millions of dollars in lost
intellectual property, private data breaches, and theft of personal
information. Risk management and protecting the data stored and
transmitted over the network are the primary concerns of every
data center administrator.
Power Management
The most common causes of unplanned downtime are poor
planning and UPS battery failure. As virtualization reduces the
number of servers, the power consumption required for cabinets
and racks continues to decrease. Despite the dramatic increase in
efficiency, blade servers consume four to five times the energy of
previous data storage technologies. This requires data center
managers to avoid this by planning wisely and investing in the right
UPS that can handle the expected load.
Capacity Planning
Maintaining optimal performance requires operating your data
center at maximum capacity. Running out of capacity is a
mortal challenge, so IT managers often set aside some fault
tolerance to ensure the operation of the data center.
Additionally, data center infrastructure management (DCIM)
systems, as an efficient way to manage capacity, are also
increasingly favored by managers. DCIM systems can be used to
identify compute, storage, and cooling capacity, while also
helping to manage data centers more efficiently and achieve full
capacity, keeping data centers at risk within limits.
The Internet of Things (IoT)
The ability to remotely control sensors creates several
additional problems for data center management. With the
development of the Internet of Things and the massive growth
of system data, data centers have to increase the bandwidth
rate to preferentially process, store and analyze data streams.
Therefore, new data center strategies such as edge computing
must be adopted to control the amount of data.
Mobile Enterprise
Mobile computing and some personal devices are also further
troubling data security in the data center. Company employees
also need to be monitored and protected when they access
critical business data through their devices to prevent data
leakage. Also, data breaches require some extra protection
when remotely wiping mobile device memory, tracking and
locking lost or stolen devices. Mobile enterprise computing
presents technical, organizational, and legal issues that data
centers must ultimately address.
Real-Time Reporting
The traditional approach to IT monitoring, which involves using
reports, has certain limitations. It can only show what has
already happened and by the time it is analyzed, identified
trends and predicted any instances of failure, it may be too late
to make the right fix. Real-time reporting helps fill this gap by
providing you with real-time data, alerts and notifications to
handle failures in a timely manner.
Balancing Cost Controls with Efficiency
High efficiency and low cost are inherent contradictions
of data centers. In data center management, it is not
only necessary to ensure the efficiency, innovation, and
flexibility of the data center, but also to control costs
carefully. As a sustainable construction goal, green data
center requires enterprises to strictly control the energy
efficiency of data centers and enhance their sense of
social and environmental responsibility. The currently
developing virtualization technology can reduce the
physical limitations of servers, storage, and network
equipment on applications, solve the inefficiency
problem caused by application configuration dedicated
servers, and achieve load balance, thereby effectively
reducing data center operating costs.
Queries?