Computer architecture forms the backbone of computer science. So, it comes as no surprise it’s one of the most researched fields of computing.


But what is computer architecture, and why does it matter?


Basically, computer architecture dictates every aspect of a computer’s functioning, from how it stores data to what it displays on the interface. Not to mention how the hardware and software components connect and interact.


With this in mind, it isn’t difficult to realize the importance of this structure. In fact, computer scientists did this even before they knew what to call it. The first documented computer architecture can be traced back to 1936, 23 years before the term “architecture” was first used when describing a computer. Lyle R. Johnson, an IBM senior staff member, had this honor, realizing that the word organization just doesn’t cut it.


Now that you know why you should care about it, let’s define computer architecture in more detail and outline everything you need to know about it.


Basic Components of Computer Architecture


Computer architecture is an elaborate system where each component has its place and function. You’re probably familiar with some of the basic computer architecture components, such as the CPU and memory. But do you know how those components work together? If not, we’ve got you covered.


Central Processing Unit (CPU)


The central processing unit (CPU) is at the core of any computer architecture. This hardware component only needs instructions written as binary bits to control all its surrounding components.


Think of the CPU as the conductor in an orchestra. Without the conductor, the choir is still there, but they’re waiting for instructions.


Without a functioning CPU, the other components are still there, but there’s no computing.


That’s why the CPU’s components are so important.


Arithmetic Logic Unit (ALU)


Since the binary bits used as instructions by the CPU are numbers, the unit needs an arithmetic component to manipulate them.


That’s where the arithmetic logic unit, or ALU, comes into play.


The ALU is the one that receives the binary bits. Then, it performs an operation on one or more of them. The most common operations include addition, subtraction, AND, OR, and NOT.


Control Unit (CU)


As the name suggests, the control unit (CU) controls all the components of basic computer architecture. It transfers data to and from the ALU, thus dictating how each component behaves.


Registers


Registers are the storage units used by the CPU to hold the current data the ALU is manipulating. Each CPU has a limited number of these registers. For this reason, they can only store a limited amount of data temporarily.


Memory


Storing data is the main purpose of the memory of a computer system. The data in question can be instructions issued by the CPU or larger amounts of permanent data. Either way, a computer’s memory is never empty.


Traditionally, this component can be broken into primary and secondary storage.


Primary Memory


Primary memory occupies a central position in a computer system. It’s the only memory unit that can communicate with the CPU directly. It stores only programs and data currently in use.


There are two types of primary memory:


  • RAM (Random Access Memory). In computer architecture, this is equivalent to short-term memory. RAM helps start the computer and only stores data as long as the machine is on and data is being used.
  • ROM (Read Only Memory). ROM stores the data used to operate the system. Due to the importance of this data, the ROM stores information even when you turn off the computer.

Secondary Memory


With secondary memory, or auxiliary memory, there’s room for larger amounts of data (which is also permanent). However, this also means that this memory is significantly slower than its primary counterpart.


When it comes to secondary memory, there’s no shortage of choices. There are magnetic discs (hard disk drives (HDDs) and solid-state drives (SSDs)) that provide fast access to stored data. And let’s not forget about optical discs (CD-ROMs and DVDs) that offer portable data storage.


Input/Output (I/O) Devices


The input/output devices allow humans to communicate with a computer. They do so by delivering or receiving data as necessary.


You’re more than likely familiar with the most widely used input devices – the keyboard and the mouse. When it comes to output devices, it’s pretty much the same. The monitor and printer are at the forefront.


Buses


When the CPU wants to communicate with other internal components, it relies on buses.


Data buses are physical signal lines that carry data. Most computer systems use three of these lines:


  • Data bus – Transmitting data from the CPU to memory and I/O devices and vice versa
  • Address bus – Carrying the address that points to the location the CPU wants to access
  • Control bus – Transferring control from one component to the other

Types of Computer Architecture


There’s more than one type of computer architecture. These types mostly share the same base components. However, the setup of these components is what makes them differ.


Von Neumann Architecture


The Von Neumann architecture was proposed by one of the originators of computer architecture as a concept, John Von Neumann. Most modern computers follow this computer architecture.


The Von Neumann architecture has several distinguishing characteristics:


  • All instructions are carried out sequentially.
  • It doesn’t differentiate between data and instruction. They’re stored in the same memory unit.
  • The CPU performs one operation at a time.

Since data and instructions are located in the same place, fetching them is simple and efficient. These two adjectives can describe working with the Von Neumann architecture in general, making it such a popular choice.


Still, there are some disadvantages to keep in mind. For starters, the CPU is often idle since it can only access one bus at a time. If an error causes a mix-up between data and instructions, you can lose important data. Also, defective programs sometimes fail to release memory, causing your computer to crash.


Harvard Architecture


Harvard architecture was named after the famed university. Or, to be more precise, after an IBM computer called “Harvard Mark I” located at the university.


The main difference between this computer architecture and the Von Neumann model is that the Harvard architecture separates the data from the instructions. Accordingly, it allocates separate data, addresses, and control buses for the separate memories.


The biggest advantage of this setup is that the buses can fetch data concurrently, minimizing idle time. The separate buses also reduce the chance of data corruption.


However, this setup also requires a more complex architecture that can be challenging to develop and implement.


Modified Harvard Architecture


Today, only specialty computers use the pure form of Harvard architecture. As for other machines, a modified Harvard architecture does the trick. These modifications aim to soften the rigid separation between data and instructions.


RISC and CISC Architectures


When it comes to processor architecture, there are two primary approaches.


The CISC (Complex Instruction Set Computer) processors have a single processing unit and are pretty straightforward. They tackle one task at a time. As a result, they use less memory. However, they also need more time to complete an instruction.


Over time, the speed of these processors became a problem. This led to a processor redesign, resulting in the RISC architecture.


The new and improved RISC (Reduced Instruction Set Computer) processors feature larger registers and keep frequently used variables within the processor. Thanks to these handy functionalities, they can operate much more quickly.


Instruction Set Architecture (ISA)


Instruction set architecture (ISA) defines the instructions that the processor can read and act upon. This means ISA decides which software can be installed on a particular processor and how efficiently it can perform tasks.


There are three types of instruction set architecture. These types differ based on the placement of instructions, and their names are pretty self-explanatory. For stack-based ISA, the instructions are placed in the stack, a memory unit within the address register. The same principle applies for accumulator-based ISA (a type of register in the CPU) and register-based ISA (multiple registers within the system).


The register-based ISA is most commonly used in modern machines. You’ve probably heard of some of the most popular examples. For CISC architecture, there are x86 and MC68000. As for RISC, SPARC, MIPS, and ARM stand out.


Pipelining and Parallelism in Computer Architecture


In computer architecture, pipelining and parallelism are methods used to speed up processing.


Pipelining refers to overlapping multiple instructions and processing them simultaneously. This couldn’t be possible without a pipeline-like structure. Imagine a factory assembly line, and you’ll understand how pipelining works instantly.


This method significantly increases the number of processed instructions and comes in two types:


  • Instruction pipelines – Used for fixed-point multiplication, floating-point operations, and similar calculations
  • Arithmetic pipelines – Used for reading consecutive instructions from memory

Parallelism entails using multiple processors or cores to process data simultaneously. Thanks to this collaborative approach, large amounts of data can be processed quickly.


Computer architecture employs two types of parallelism:


  • Data parallelism – Executing the same task with multiple cores and different sets of data
  • Task parallelism – Performing different tasks with multiple cores and the same or different data

Multicore processors are crucial for increasing the efficiency of parallelism as a method.


Memory Hierarchy and Cache


In computer system architecture, memory hierarchy is essential for minimizing the time it takes to access the memory units. It refers to separating memory units based on their response times.


The most common memory hierarchy goes as follows:


  • Level 1: Processor registers
  • Level 2: Cache memory
  • Level 3: Primary memory
  • Level 4: Secondary memory

The cache memory is a small and fast memory located close to a processor core. The CPU uses it to reduce the time and energy needed to access data from the primary memory.


Cache memory can be further broken into levels.


  • L1 cache (the primary cache) – The fastest cache unit in the system
  • L2 cache (the secondary cache) – The slower but more spacious option than Level 1
  • L3 cache (a specialized cache) – The largest and the slowest cache in the system used to improve the performance of the first two levels

When it comes to determining where the data will be stored in the cache memory, three mapping techniques are employed:


  • Direct mapping – Each memory block is mapped to one pre-determined cache location
  • Associative mapping – Each memory block is mapped to a single location, but it can be any location
  • Set associative mapping – Each memory block is mapped to a subset of locations

The performance of cache memory directly impacts the overall performance of a computing system. The following cache replacement policies are used to better process big data applications:


  • FIFO (first in, first out) ­– The memory block first to enter the primary memory gets replaced first
  • LRU (least recently used) – The least recently used page is the first to be discarded
  • LFU (least frequently used) – The least frequently used element gets eliminated first

Input/Output (I/O) Systems


The input/output or I/O systems are designed to receive and send data to a computer. Without these processing systems, the computer wouldn’t be able to communicate with people and other systems and devices.


There are several types of I/O systems:


  • Programmed I/O – The CPU directly issues a command to the I/O module and waits for it to be executed
  • Interrupt-Driven I/O – The CPU moves on to other tasks after issuing a command to the I/O system
  • Direct Memory Access (DMA) – The data is transferred between the memory and I/O devices without passing through the CPU

There are three standard I/O interfaces used for physically connecting hardware devices to a computer:


  • Peripheral Component Interconnect (PCI)
  • Small Computer System Interface (SATA)
  • Universal Serial Bus (USB)

Power Consumption and Performance in Computer Architecture


Power consumption has become one of the most important considerations when designing modern computer architecture. Failing to consider this aspect leads to power dissipation. This, in turn, results in higher operating costs and a shorter lifespan for the machine.


For this reason, the following techniques for reducing power consumption are of utmost importance:


  • Dynamic Voltage and Frequency Scaling (DVFS) – Scaling down the voltage based on the required performance
  • Clock gating – Shutting off the clock signal when the circuit isn’t in use
  • Power gating – Shutting off the power to circuit blocks when they’re not in use

Besides power consumption, performance is another crucial consideration in computer architecture. The performance is measured as follows:


  • Instructions per second (IPS) – Measuring efficiency at any clock frequency
  • Floating-point operations per second (FLOPS) – Measuring the numerical computing performance
  • Benchmarks – Measuring how long the computer takes to complete a series of test programs

Emerging Trends in Computer Architecture


Computer architecture is continuously evolving to meet modern computing needs. Keep your eye out on these fascinating trends:


  • Quantum computing (relying on the laws of quantum mechanics to tackle complex computing problems)
  • Neuromorphic computing (modeling the computer architecture components on the human brain)
  • Optical computing (using photons instead of electrons in digital computation for higher performance)
  • 3D chip stacking (using 3D instead of 2D chips as they’re faster, take up less space, and require less power)

A One-Way Ticket to Computing Excellence


As you can tell, computer architecture directly affects your computer’s speed and performance. This launches it to the top of priorities when building this machine.


High-performance computers might’ve been nice-to-haves at some point. But in today’s digital age, they’ve undoubtedly become a need rather than a want.


In trying to keep up with this ever-changing landscape, computer architecture is continuously evolving. The end goal is to develop an ideal system in terms of speed, memory, and interconnection of components.


And judging by the current dominant trends in this field, that ideal system is right around the corner!

Related posts

The Yuan: AI is childlike in its capabilities, so why do so many people fear it?
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
Nov 8, 2024 6 min read

Source:

  • The Yuan, Published on October 25th, 2024.

By Zorina Alliata

Artificial intelligence is a classic example of a mismatch between perceptions and reality, as people tend to overlook its positive aspects and fear it far more than what is warranted by its actual capabilities, argues AI strategist and professor Zorina Alliata.

ALEXANDRIA, VIRGINIA – In recent years, artificial intelligence (AI) has grown and developed into something much bigger than most people could have ever expected. Jokes about robots living among humans no longer seem so harmless, and the average person began to develop a new awareness of AI and all its uses. Unfortunately, however – as is often a human tendency – people became hyper-fixated on the negative aspects of AI, often forgetting about all the good it can do. One should therefore take a step back and remember that humanity is still only in the very early stages of developing real intelligence outside of the human brain, and so at this point AI is almost like a small child that humans are raising.

AI is still developing, growing, and adapting, and like any new tech it has its drawbacks. At one point, people had fears and doubts about electricity, calculators, and mobile phones – but now these have become ubiquitous aspects of everyday life, and it is not difficult to imagine a future in which this is the case for AI as well.

The development of AI certainly comes with relevant and real concerns that must be addressed – such as its controversial role in education, the potential job losses it might lead to, and its bias and inaccuracies. For every fear, however, there is also a ray of hope, and that is largely thanks to people and their ingenuity.

Looking at education, many educators around the world are worried about recent developments in AI. The frequently discussed ChatGPT – which is now on its fourth version – is a major red flag for many, causing concerns around plagiarism and creating fears that it will lead to the end of writing as people know it. This is one of the main factors that has increased the pessimistic reporting about AI that one so often sees in the media.

However, when one actually considers ChatGPT in its current state, it is safe to say that these fears are probably overblown. Can ChatGPT really replace the human mind, which is capable of so much that AI cannot replicate? As for educators, instead of assuming that all their students will want to cheat, they should instead consider the options for taking advantage of new tech to enhance the learning experience. Most people now know the tell-tale signs for identifying something that ChatGPT has written. Excessive use of numbered lists, repetitive language and poor comparison skills are just three ways to tell if a piece of writing is legitimate or if a bot is behind it. This author personally encourages the use of AI in the classes I teach. This is because it is better for students to understand what AI can do and how to use it as a tool in their learning instead of avoiding and fearing it, or being discouraged from using it no matter the circumstances.

Educators should therefore reframe the idea of ChatGPT in their minds, have open discussions with students about its uses, and help them understand that it is actually just another tool to help them learn more efficiently – and not a replacement for their own thoughts and words. Such frank discussions help students develop their critical thinking skills and start understanding their own influence on ChatGPT and other AI-powered tools.

By developing one’s understanding of AI’s actual capabilities, one can begin to understand its uses in everyday life. Some would have people believe that this means countless jobs will inevitably become obsolete, but that is not entirely true. Even if AI does replace some jobs, it will still need industry experts to guide it, meaning that entirely new jobs are being created at the same time as some older jobs are disappearing.

Adapting to AI is a new challenge for most industries, and it is certainly daunting at times. The reality, however, is that AI is not here to steal people’s jobs. If anything, it will change the nature of some jobs and may even improve them by making human workers more efficient and productive. If AI is to be a truly useful tool, it will still need humans. One should remember that humans working alongside AI and using it as a tool is key, because in most cases AI cannot do the job of a person by itself.

Is AI biased?

Why should one view AI as a tool and not a replacement? The main reason is because AI itself is still learning, and AI-powered tools such as ChatGPT do not understand bias. As a result, whenever ChatGPT is asked a question it will pull information from anywhere, and so it can easily repeat old biases. AI is learning from previous data, much of which is biased or out of date. Data about home ownership and mortgages, e.g., are often biased because non-white people in the United States could not get a mortgage until after the 1960s. The effect on data due to this lending discrimination is only now being fully understood.

AI is certainly biased at times, but that stems from human bias. Again, this just reinforces the need for humans to be in control of AI. AI is like a young child in that it is still absorbing what is happening around it. People must therefore not fear it, but instead guide it in the right direction.

For AI to be used as a tool, it must be treated as such. If one wanted to build a house, one would not expect one’s tools to be able to do the job alone – and AI must be viewed through a similar lens. By acknowledging this aspect of AI and taking control of humans’ role in its development, the world would be better placed to reap the benefits and quash the fears associated with AI. One should therefore not assume that all the doom and gloom one reads about AI is exactly as it seems. Instead, people should try experimenting with it and learning from it, and maybe soon they will realize that it was the best thing that could have happened to humanity.

Read the full article below:

Read the article
The European Business Review: Adapting to the Digital Age: Teaching Blockchain and Cloud Computing
OPIT - Open Institute of Technology
OPIT - Open Institute of Technology
Nov 6, 2024 6 min read

Source:


By Lokesh Vij

Lokesh Vij is a Professor of BSc in Modern Computer Science & MSc in Applied Data Science & AI at Open Institute of Technology. With over 20 years of experience in cloud computing infrastructure, cybersecurity and cloud development, Professor Vij is an expert in all things related to data and modern computer science.

In today’s rapidly evolving technological landscape, the fields of blockchain and cloud computing are transforming industries, from finance to healthcare, and creating new opportunities for innovation. Integrating these technologies into education is not merely a trend but a necessity to equip students with the skills they need to thrive in the future workforce. Though both technologies are independently powerful, their potential for innovation and disruption is amplified when combined. This article explores the pressing questions surrounding the inclusion of blockchain and cloud computing in education, providing a comprehensive overview of their significance, benefits, and challenges.

The Technological Edge and Future Outlook

Cloud computing has revolutionized how businesses and individuals’ access and manage data and applications. Benefits like scalability, cost efficiency (including eliminating capital expenditure – CapEx), rapid innovation, and experimentation enable businesses to develop and deploy new applications and services quickly without the constraints of traditional on-premises infrastructure – thanks to managed services where cloud providers manage the operating system, runtime, and middleware, allowing businesses to focus on development and innovation. According to Statista, the cloud computing market is projected to reach a significant size of Euro 250 billion or even higher by 2028 (from Euro 110 billion in 2024), with a substantial Compound Annual Growth Rate (CAGR) of 22.78%. The widespread adoption of cloud computing by businesses of all sizes, coupled with the increasing demand for cloud-based services and applications, fuels the need for cloud computing professionals.

Blockchain, a distributed ledger technology, has paved the way by providing a secure, transparent, and tamper-proof way to record transactions (highly resistant to hacking and fraud). In 2021, European blockchain startups raised $1.5 billion in funding, indicating strong interest and growth potential. Reports suggest the European blockchain market could reach $39 billion by 2026, with a significant CAGR of over 47%. This growth is fueled by increasing adoption in sectors like finance, supply chain, and healthcare.

Addressing the Skills Gap

Reports from the World Economic Forum indicate that 85 million jobs may be displaced by a shift in the division of labor between humans and machines by 2025. However, 97 million new roles may emerge that are more adapted to the new division of labor between humans, machines, and algorithms, many of which will require proficiency in cloud computing and blockchain.

Furthermore, the World Economic Forum predicts that by 2027, 10% of the global GDP will be tokenized and stored on the blockchain. This massive shift means a surge in demand for blockchain professionals across various industries. Consider the implications of 10% of the global GDP being on the blockchain: it translates to a massive need for people who can build, secure, and manage these systems. We’re talking about potentially millions of jobs worldwide.

The European Blockchain Services Infrastructure (EBSI), an EU initiative, aims to deploy cross-border blockchain services across Europe, focusing on areas like digital identity, trusted data sharing, and diploma management. The EU’s MiCA (Crypto-Asset Regulation) regulation, expected to be fully implemented by 2025, will provide a clear legal framework for crypto-assets, fostering innovation and investment in the blockchain space. The projected growth and supportive regulatory environment point to a rising demand for blockchain professionals in Europe. Developing skills related to EBSI and its applications could be highly advantageous, given its potential impact on public sector blockchain adoption. Understanding the MiCA regulation will be crucial for blockchain roles related to crypto-assets and decentralized finance (DeFi).

Furthermore, European businesses are rapidly adopting digital technologies, with cloud computing as a core component of this transformation. GDPR (Data Protection Regulations) and other data protection laws push businesses to adopt secure and compliant cloud solutions. Many European countries invest heavily in cloud infrastructure and promote cloud adoption across various sectors. Artificial intelligence and machine learning will be deeply integrated into cloud platforms, enabling smarter automation, advanced analytics, and more efficient operations. This allows developers to focus on building applications without managing servers, leading to faster development cycles and increased scalability. Processing data closer to the source (like on devices or local servers) will become crucial for applications requiring real-time responses, such as IoT and autonomous vehicles.

The projected growth indicates a strong and continuous demand for blockchain and cloud professionals in Europe and worldwide. As we stand at the “crossroads of infinity,” there is a significant skill shortage, which will likely increase with the rapid adoption of these technologies. A 2023 study by SoftwareOne found that 95% of businesses globally face a cloud skills gap. Specific skills in high demand include cloud security, cloud-native development, and expertise in leading cloud platforms like AWS, Azure, and Google Cloud. The European Commission’s Digital Economy and Society Index (DESI) highlights a need for improved digital skills in areas like blockchain to support the EU’s digital transformation goals. A 2023 report by CasperLabs found that 90% of businesses in the US, UK, and China adopt blockchain, but knowledge gaps and interoperability challenges persist.

The Role of Educational Institutions

This surge in demand necessitates a corresponding increase in qualified individuals who can design, implement, and manage cloud-based and blockchain solutions. Educational institutions have a critical role to play in bridging this widening skills gap and ensuring a pipeline of talent ready to meet the demands of this burgeoning industry.

To effectively prepare the next generation of cloud computing and blockchain experts, educational institutions need to adopt a multi-pronged approach. This includes enhancing curricula with specialized programs, integrating cloud and blockchain concepts into existing courses, and providing hands-on experience with leading technology platforms.

Furthermore, investing in faculty development to ensure they possess up-to-date knowledge and expertise is crucial. Collaboration with industry partners through internships, co-teach programs, joint research projects, and mentorship programs can provide students with invaluable real-world experience and insights.

Beyond formal education, fostering a culture of lifelong learning is essential. Offering continuing education courses, boot camps, and online resources enables professionals to upskill or reskill and stay abreast of the latest advancements in cloud computing. Actively promoting awareness of career paths and opportunities in this field and facilitating connections with potential employers can empower students to thrive in the dynamic and evolving landscape of cloud computing and blockchain technologies.

By taking these steps, educational institutions can effectively prepare the young generation to fill the skills gap and thrive in the rapidly evolving world of cloud computing and blockchain.

Read the full article below:

Read the article