Ledin / Farley | Modern Computer Architecture and Organization | E-Book | www.sack.de
E-Book

E-Book, Englisch, 666 Seiten

Ledin / Farley Modern Computer Architecture and Organization

Learn x86, ARM, and RISC-V architectures and the design of smartphones, PCs, and cloud servers
2. Auflage 2024
ISBN: 978-1-80323-823-4
Verlag: De Gruyter
Format: EPUB
Kopierschutz: 0 - No protection

Learn x86, ARM, and RISC-V architectures and the design of smartphones, PCs, and cloud servers

E-Book, Englisch, 666 Seiten

ISBN: 978-1-80323-823-4
Verlag: De Gruyter
Format: EPUB
Kopierschutz: 0 - No protection



Are you a software developer, systems designer, or computer architecture student looking for a methodical introduction to digital device architectures, but are overwhelmed by the complexity of modern systems? This step-by-step guide will teach you how modern computer systems work with the help of practical examples and exercises. You'll gain insights into the internal behavior of processors down to the circuit level and will understand how the hardware executes code developed in high-level languages.

This book will teach you the fundamentals of computer systems including transistors, logic gates, sequential logic, and instruction pipelines. You will learn details of modern processor architectures and instruction sets including x86, x64, ARM, and RISC-V. You will see how to implement a RISC-V processor in a low-cost FPGA board and write a quantum computing program and run it on an actual quantum computer.

This edition has been updated to cover the architecture and design principles underlying the important domains of cybersecurity, blockchain and bitcoin mining, and self-driving vehicles.

By the end of this book, you will have a thorough understanding of modern processors and computer architecture and the future directions these technologies are likely to take.

Ledin / Farley Modern Computer Architecture and Organization jetzt bestellen!

Weitere Infos & Material


Table of Contents - Introducing Computer Architecture
- Digital Logic
- Processor Elements
- Computer System Components
- Hardware-Software Interface
- Specialized Computing Domains
- Processor and Memory Architectures
- Performance-Enhancing Techniques
- Specialized Processor Extensions
- Modern Processor Architectures and Instruction Sets
- The RISC-V Architecture and Instruction Set
- Processor Virtualization
- Domain-Specific Computer Architectures
- Cybersecurity and Confidential Computing Architectures
- Blockchain and Bitcoin Mining Architectures
- Self-Driving Vehicle Architectures
- Quantum Computing and Other Future Directions in Computer Architectures
- Appendix


Contents


  1. Preface
    1. Who this book is for
    2. What this book covers
    3. To get the most out of this book
    4. Get in touch
  2. Introducing Computer Architecture
    1. Technical requirements
    2. The evolution of automated computing devices
      1. Charles Babbage’s Analytical Engine
      2. ENIAC
      3. IBM PC
        1. The Intel 8088 microprocessor
        2. The Intel 80286 and 80386 microprocessors
      4. The iPhone
    3. Moore’s law
    4. Computer architecture
      1. Representing numbers with voltage levels
      2. Binary and hexadecimal numbers
      3. The 6502 microprocessor
      4. The 6502 instruction set
    5. Summary
    6. Exercises
  3. Digital Logic
    1. Technical requirements
    2. Electrical circuits
    3. The transistor
    4. Logic gates
    5. Latches
    6. Flip-flops
    7. Registers
    8. Adders
      1. Propagation delay
    9. Clocking
    10. Sequential logic
    11. Hardware description languages
      1. VHDL
    12. Summary
    13. Exercises
  4. Processor Elements
    1. Technical requirements
    2. A simple processor
      1. Control unit
        1. Executing an instruction – a simple example
      2. Arithmetic logic unit
      3. Registers
    3. The instruction set
    4. Addressing modes
      1. Immediate addressing mode
      2. Absolute addressing mode
      3. Absolute indexed addressing mode
      4. Indirect indexed addressing mode
    5. Instruction categories
      1. Memory load and store instructions
      2. Register-to-register data transfer instructions
      3. Stack instructions
      4. Arithmetic instructions
      5. Logical instructions
      6. Branching instructions
      7. Subroutine call and return instructions
      8. Processor flag instructions
      9. Interrupt-related instructions
      10. No operation instruction
    6. Interrupt processing
      1. processing
      2. processing
      3. BRK instruction processing
    7. Input/output operations
      1. Programmed I/O
      2. Interrupt-driven I/O
      3. Direct memory access
    8. Summary
    9. Exercises
  5. Computer System Components
    1. Technical requirements
    2. Memory subsystem
    3. Introducing the MOSFET
    4. Constructing DRAM circuits with MOSFETs
      1. The capacitor
      2. The DRAM bit cell
      3. DDR5 SDRAM
      4. Graphics DDR
      5. Prefetching
    5. I/O subsystem
      1. Parallel and serial data buses
      2. PCI Express
      3. SATA
      4. M.2
      5. USB
      6. Thunderbolt
    6. Graphics displays
      1. VGA
      2. DVI
      3. HDMI
      4. DisplayPort
    7. Network interface
      1. Ethernet
      2. Wi-Fi
    8. Keyboard and mouse
      1. Keyboard
      2. Mouse
    9. Modern computer system specifications
    10. Summary
    11. Exercises
  6. Hardware-Software Interface
    1. Technical requirements
    2. Device drivers
      1. The parallel port
      2. PCIe device drivers
      3. Device driver structure
    3. BIOS
      1. UEFI
    4. The boot process
      1. BIOS boot
      2. UEFI boot
      3. Trusted boot
      4. Embedded devices
    5. Operating systems
    6. Processes and threads
      1. Scheduling algorithms and process priority
    7. Multiprocessing
    8. Summary
    9. Exercises
  7. Specialized Computing Domains
    1. Technical requirements
    2. Real-time computing
      1. Real-time operating systems
    3. Digital signal processing
      1. ADCs and DACs
      2. DSP hardware features
      3. Signal processing algorithms
        1. Convolution
        2. Digital filtering
        3. Fast Fourier transform (FFT)
    4. GPU processing
      1. GPUs as data processors
        1. Big data
        2. Deep learning
    5. Examples of specialized architectures
    6. Summary
    7. Exercises
  8. Processor and Memory Architectures
    1. Technical requirements
    2. The von Neumann, Harvard, and modified Harvard architectures
      1. The von Neumann architecture
      2. The Harvard architecture
      3. The modified Harvard architecture
    3. Physical and virtual memory
      1. Paged virtual memory
      2. Page status bits
      3. Memory pools
    4. Memory management unit
    5. Summary
    6. Exercises
  9. Performance-Enhancing Techniques
    1. Technical requirements
    2. Cache memory
      1. Multilevel processor caches
      2. Static RAM
      3. Level 1 cache
      4. Direct-mapped cache
      5. Set associative cache
      6. Processor cache write policies
      7. Level 2 and level 3 processor caches
    3. Instruction pipelining
      1. Superpipelining
      2. Pipeline hazards
      3. Micro-operations and register renaming
      4. Conditional branches
    4. Simultaneous multithreading
    5. SIMD processing
    6. Summary
    7. Exercises
  10. Specialized...


Ledin Jim :

Jim Ledin is the CEO of Ledin Engineering, Inc. Jim is an expert in embedded software and hardware design and testing. He is also an expert in system cybersecurity assessment and penetration testing. He has a B.S. degree in aerospace engineering from Iowa State University and an M.S. degree in electrical and computer engineering from the Georgia Institute of Technology. Jim is a registered professional electrical engineer in California, a Certified Information System Security Professional (CISSP), a Certified Ethical Hacker (CEH), and a Certified Penetration Tester (CPT).



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.