KEMBAR78
UNIT 3 introduction Computer memory summary | PPTX
1
UNIT 3
Introduction to Memory Management
2
Table of Contents
1. Introduction
2. Evolution of Computers
1. First Generation (1940-1956)
2. Second Generation (1956-1963)
3. Third Generation (1964-1971)
4. Fourth Generation (1971-Present)
5. Fifth Generation (Present and Beyond)
3
content
1. Types of Computers
1. Supercomputers
2. Mainframe Computers
3. Personal Computers (PCs)
4. Workstations
5. Embedded Systems
6. Mobile Devices
2. Conclusion
3. References
4
Introduction
Computers have become an integral part of modern society, impacting nearly every
aspect of our daily lives. This document explores the evolution of computers, detailing
their historical development, technological advancements, and various types of
computers used today.
5
Evolution of Computers
First Generation (1940-1956)
Key Features:
1. Utilized vacuum tubes for circuitry.
2. Massive in size, often occupying entire rooms.
3. Consumed significant amounts of power.
Example:
ENIAC (Electronic Numerical Integrator and Computer) was one of the first general-purpose computers, built
in 1945.
Impact: Marked the beginning of the electronic computing era, paving the way for future innovations.
6
Second Generation (1956-1963)
Key Features:
 Replaced vacuum tubes with transistors, leading to smaller and more efficient machines.
 Improved reliability and reduced power consumption.
Example:
IBM 1401 was widely used for commercial applications.
Impact: Enabled the growth of businesses and organizations, leading to increased demand for computing
power.
7
Cont…
Third Generation (1964-1971)
Key Features:
 Introduction of integrated circuits (ICs), which combined multiple transistors on a single chip.
 Enhanced performance and reduced cost significantly.
Example:
IBM System/360, which introduced the concept of a compatible series of computers.
Impact: Set the stage for the development of personal computing.
8
Fourth Generation (1971-Present)
Key Features:
 Microprocessors integrated all computer functions onto a single chip.
 Rise of personal computers (PCs) for home and business use.
Example:
Intel 4004 was the first commercially available microprocessor.
Impact:
 Made computing accessible to the general public, leading to widespread adoption of personal
computers.
9
Fifth Generation (Present and Beyond)
Key Features:
 Focus on artificial intelligence (AI), machine learning, and quantum computing.
 Development of technologies that enhance data processing and decision-making capabilities.
Impact:
Potential to revolutionize industries and change how we interact with technology.
10
Types of Computers
Supercomputers
 Extremely powerful computers designed for complex computations.
 They are commonly used in scientific research, weather forecasting, and simulations.
Example:
Summit by IBM, used for advanced scientific research.
Mainframe Computers
 Large, powerful systems that handle vast amounts of data processing.
 They are Primarily used in industries like banking, insurance, and large corporations for transaction
processing.
Example:
IBM Z Series, known for its reliability and security features.
11
Conti
Personal Computers (PCs)
 Computers designed for individual use, available in desktop and laptop forms.
 They are Used for everyday tasks such as word processing, internet browsing, and gaming.
Example:
Dell Inspiron or HP Pavilion laptops.
Workstations
 High-performance computers designed for technical or scientific applications.
 They are used in graphic design, video editing, and engineering tasks.
Example:
HP Z Series Workstations, equipped with powerful graphics and processing capabilities.
12
Cont..
Embedded Systems
 Specialized computing systems integrated into other devices to perform specific functions.
 They are found in appliances, automotive systems, and medical devices.
Example:
Microcontrollers in washing machines.
Mobile Devices
 Portable computing devices such as smartphones and tablets.
 They are used for communication, browsing, and applications on the go.
Example:
Apple iPhone or Samsung Galaxy.
13
Introduction
Memory management is the process by which a computer system manages its memory resources,
including both primary and secondary memory.
It involves allocating memory to various applications, ensuring optimal performance, and freeing
up memory when it is no longer needed.
Effective memory management is essential for system stability, performance, and efficiency.
14
Types of Computer Memory
Primary Memory
Definition: Also known as main memory or RAM (Random Access Memory), primary memory is
where the computer stores data and instructions that are actively being used or processed.
Characteristics:
 Volatile: Loses its content when power is turned off.
 Fast access speed, enabling quick data retrieval.
Examples:
 DRAM (Dynamic RAM)
 SRAM (Static RAM)
15
Cont…
Secondary Memory
Definition: Also known as auxiliary memory, secondary memory is used for long-term data storage.
Characteristics:
 Non-volatile: Retains data even when the power is off.
 Generally slower than primary memory.
Examples:
 Hard Disk Drives (HDD)
 Solid-State Drives (SSD)
 Optical Discs (CD/DVD)
 USB Flash Drives
16
PRIMARY MEMORY
Primary memory, also known as main memory or RAM (Random Access Memory), is the memory
directly accessible by the CPU. It stores data and instructions that are actively being used or
processed.
Characteristics
Volatility: Primary memory is volatile, meaning it loses its content when the power is turned off.
Speed: It provides fast access speed, enabling quick data retrieval and processing.
Direct Accessibility: The CPU can access primary memory directly, which allows for efficient data
processing.
17
Examples.
Random Access Memory (RAM):
 Dynamic RAM (DRAM): Requires constant refreshing to maintain data.
 Static RAM (SRAM): Faster and more reliable than DRAM, but more expensive; retains data without
refreshing.
Read-Only Memory (ROM):
 PROM (Programmable ROM): Can be programmed once after manufacturing.
 EPROM (Erasable Programmable ROM): Can be erased and reprogrammed using UV light.
 EEPROM (Electrically Erasable Programmable ROM): Can be electrically erased and reprogrammed.
18
Memory Management Techniques for Primary
Memory
 Contiguous Memory Allocation: Allocates a single block of memory to a process, leading to
faster access but potential fragmentation.
 Paging: Divides memory into fixed-size pages, allowing processes to be loaded into non-
contiguous frames.
 Segmentation: Divides memory into variable-sized segments based on logical divisions,
improving usability and sharing.
19
3.Secondary Memory
Definition
Secondary memory, also known as auxiliary or external memory, is used for long-term data storage.
Unlike primary memory, it retains data even when the power is turned off.
Characteristics
 Non-volatility: Secondary memory is non-volatile, meaning it retains its content without power.
 Slower Access Speed: Typically has slower access speeds compared to primary memory, but
provides much larger storage capacity.
 Permanent Storage: Used for storing data and programs that are not actively being used.
20
Types of Secondary Memory
 Hard Disk Drives (HDD):
Magnetic storage devices that store data on rotating platters. Commonly used for bulk storage.
 Solid-State Drives (SSD):
Use flash memory to store data, providing faster access speeds and greater reliability than HDDs.
 Optical Discs:
CDs, DVDs, and Blu-ray discs are used for storing data that can be read by optical drives.
 USB Flash Drives:
Portable storage devices that use flash memory, widely used for transferring data.
 Magnetic Tape:
 Used for archival storage and backup; offers high capacity but slower access speed.
21
Hard Disk Drives (HDD)
Magnetic storage devices that use spinning disks (platters) coated with magnetic material to store data.
They are Commonly used in desktops and laptops for bulk storage of operating systems, applications,
and user files.
Characteristics:
 Higher storage capacity (typically from hundreds of gigabytes to several terabytes).
 Slower read/write speeds compared to SSDs.
22
Solid-State Drives (SSD)
Storage devices that use flash memory to store data, with no moving parts.
They are Increasingly popular in laptops and desktops for faster performance.
Characteristics:
Much faster read and write speeds compared to HDDs.
More durable and reliable due to the absence of mechanical components.
23
Memory Management Techniques for Secondary
Memory
 File Systems: Organizes data on secondary storage, allowing for efficient access and
management of files.
 Disk Management: Involves partitioning, formatting, and organizing data to optimize storage
and retrieval.
 Backup Solutions: Regularly creating copies of data to prevent loss in case of hardware failure
or corruption.
24
Importance of Memory Management
 Efficiency: Proper memory management ensures optimal utilization of both primary and
secondary memory resources, allowing multiple processes to run simultaneously.
 Performance: Efficient allocation reduces access time, enhancing the overall speed of
applications and the operating system.
 Stability: Good memory management prevents memory leaks and fragmentation, ensuring
system stability and reliability.
 Security: Protects memory spaces of different processes, preventing unauthorized access and
data corruption.
25
Challenges in Memory Management
 Fragmentation: Both internal (wasted space within allocated blocks) and external
fragmentation (unused space between allocated blocks) can lead to inefficient memory
utilization.
 Resource Allocation: Deciding how to allocate memory resources effectively can be complex,
especially in multitasking environments.
 Scalability: As systems grow, maintaining efficient memory management becomes
increasingly challenging.
 Performance Degradation: Excessive paging or swapping can lead to performance issues,
requiring careful monitoring and tuning.
26
References
 Stallings, W. (2015). Operating Systems: Internals and Design Principles. Pearson.
 Silberschatz, A., Galvin, P. B., & Gagne, G. (2018). Operating System Concepts. Wiley.
 Tanenbaum, A. S., & Austin, T. (2012). Structured Computer Organization. Prentice Hall.
27
SUB
Introduction to Computer Representation
28
Introduction
Computer representation refers to the way data and information are stored, processed, and
transmitted within a computer system.
Since computers operate using binary logic, they represent data in binary form, utilizing sequences
of bits (0s and 1s). Understanding how data is represented is crucial for programming, data
storage, and effective computer usage.
29
Types of Data Representation
1. Binary Representation
The fundamental way computers represent all types of data using binary digits (bits), where each bit can be either 0 or 1.
Bit and Byte:
Bit: The smallest unit of data in computing, representing a single binary value.
Byte: A group of 8 bits, commonly used as a basic unit of storage.
2 Number Systems
Computers use different number systems to represent data. The most common systems include:

Binary (Base 2):

Uses two symbols: 0 and 1.

Example: The decimal number 5 is represented as 101 in binary.

Decimal (Base 10):

The standard number system used by humans, consisting of ten symbols: 0-9.

Hexadecimal (Base 16):

Uses sixteen symbols: 0-9 and A-F (where A=10, B=11, ..., F=15).

Example: The decimal number 255 is represented as F in hexadecimal.

Octal (Base 8):

Uses eight symbols: 0-7.
Example: The decimal number 8 is represented as 10 in octal.
30
Character Encoding
character encoding schemes are used to represent text in computers.
Common encoding standards include:
 ASCII (American Standard Code for Information Interchange):
 Represents characters using 7 bits, allowing for 128 unique symbols (including control characters, digits,
uppercase and lowercase letters).
 Example: The letter 'A' is represented by the binary number 01000001.
 UTF-8:
 A variable-length character encoding that can represent any character in the Unicode standard.
 Uses 1 to 4 bytes to represent characters, making it efficient for text files.
 Unicode:
 A character encoding standard that aims to cover all the characters used in writing systems around the
world.
 Example: The letter 'A' is represented as U+0041 in Unicode.
31
Audio and Video Representation
Audio Representation:
Audio data is typically represented in digital form using sampling.
 The audio waveform is sampled at regular intervals, and each sample is quantized into a binary value.
Common formats include WAV, MP3, and AAC.
Video Representation:
Video data is represented as a series of images (frames) displayed in quick succession. Each frame is stored as
a bitmap or compressed format (e.g., MPEG, H.264).
 The frame rate (frames per second) determines the smoothness of the playback.
32
Importance of Computer Representation
 Data Processing: Efficient data representation is crucial for fast processing and computation.
 Storage Efficiency: Different representations can affect the amount of storage space required for data.
 Data Transmission: Representations affect how data is transmitted over networks; efficient encoding
reduces bandwidth usage.
 Interoperability: Standardized representations (like Unicode) allow different systems to communicate
and share data effectively.
33
Challenges in Computer Representation
 Precision Loss: In floating-point representation, precision can be lost during calculations due to limited
bits.
 Compatibility Issues: Different encoding systems can lead to compatibility issues when sharing files
across systems.
 Data Corruption: Improper representation can lead to data corruption during storage or transmission.
 Complexity of Encoding Schemes: Understanding and implementing various encoding schemes can be
complex, especially for developers.
34
References:
 Patterson, D. A., & Hennessy, J. L. (2014). Computer Organization and Design: The Hardware/Software
Interface. Morgan Kaufmann.
 Tanenbaum, A. S. (2016). Structured Computer Organization. Prentice Hall.
 W3C. (2008). Unicode® Standard. Available at: Unicode Consortium

UNIT 3 introduction Computer memory summary

  • 1.
    1 UNIT 3 Introduction toMemory Management
  • 2.
    2 Table of Contents 1.Introduction 2. Evolution of Computers 1. First Generation (1940-1956) 2. Second Generation (1956-1963) 3. Third Generation (1964-1971) 4. Fourth Generation (1971-Present) 5. Fifth Generation (Present and Beyond)
  • 3.
    3 content 1. Types ofComputers 1. Supercomputers 2. Mainframe Computers 3. Personal Computers (PCs) 4. Workstations 5. Embedded Systems 6. Mobile Devices 2. Conclusion 3. References
  • 4.
    4 Introduction Computers have becomean integral part of modern society, impacting nearly every aspect of our daily lives. This document explores the evolution of computers, detailing their historical development, technological advancements, and various types of computers used today.
  • 5.
    5 Evolution of Computers FirstGeneration (1940-1956) Key Features: 1. Utilized vacuum tubes for circuitry. 2. Massive in size, often occupying entire rooms. 3. Consumed significant amounts of power. Example: ENIAC (Electronic Numerical Integrator and Computer) was one of the first general-purpose computers, built in 1945. Impact: Marked the beginning of the electronic computing era, paving the way for future innovations.
  • 6.
    6 Second Generation (1956-1963) KeyFeatures:  Replaced vacuum tubes with transistors, leading to smaller and more efficient machines.  Improved reliability and reduced power consumption. Example: IBM 1401 was widely used for commercial applications. Impact: Enabled the growth of businesses and organizations, leading to increased demand for computing power.
  • 7.
    7 Cont… Third Generation (1964-1971) KeyFeatures:  Introduction of integrated circuits (ICs), which combined multiple transistors on a single chip.  Enhanced performance and reduced cost significantly. Example: IBM System/360, which introduced the concept of a compatible series of computers. Impact: Set the stage for the development of personal computing.
  • 8.
    8 Fourth Generation (1971-Present) KeyFeatures:  Microprocessors integrated all computer functions onto a single chip.  Rise of personal computers (PCs) for home and business use. Example: Intel 4004 was the first commercially available microprocessor. Impact:  Made computing accessible to the general public, leading to widespread adoption of personal computers.
  • 9.
    9 Fifth Generation (Presentand Beyond) Key Features:  Focus on artificial intelligence (AI), machine learning, and quantum computing.  Development of technologies that enhance data processing and decision-making capabilities. Impact: Potential to revolutionize industries and change how we interact with technology.
  • 10.
    10 Types of Computers Supercomputers Extremely powerful computers designed for complex computations.  They are commonly used in scientific research, weather forecasting, and simulations. Example: Summit by IBM, used for advanced scientific research. Mainframe Computers  Large, powerful systems that handle vast amounts of data processing.  They are Primarily used in industries like banking, insurance, and large corporations for transaction processing. Example: IBM Z Series, known for its reliability and security features.
  • 11.
    11 Conti Personal Computers (PCs) Computers designed for individual use, available in desktop and laptop forms.  They are Used for everyday tasks such as word processing, internet browsing, and gaming. Example: Dell Inspiron or HP Pavilion laptops. Workstations  High-performance computers designed for technical or scientific applications.  They are used in graphic design, video editing, and engineering tasks. Example: HP Z Series Workstations, equipped with powerful graphics and processing capabilities.
  • 12.
    12 Cont.. Embedded Systems  Specializedcomputing systems integrated into other devices to perform specific functions.  They are found in appliances, automotive systems, and medical devices. Example: Microcontrollers in washing machines. Mobile Devices  Portable computing devices such as smartphones and tablets.  They are used for communication, browsing, and applications on the go. Example: Apple iPhone or Samsung Galaxy.
  • 13.
    13 Introduction Memory management isthe process by which a computer system manages its memory resources, including both primary and secondary memory. It involves allocating memory to various applications, ensuring optimal performance, and freeing up memory when it is no longer needed. Effective memory management is essential for system stability, performance, and efficiency.
  • 14.
    14 Types of ComputerMemory Primary Memory Definition: Also known as main memory or RAM (Random Access Memory), primary memory is where the computer stores data and instructions that are actively being used or processed. Characteristics:  Volatile: Loses its content when power is turned off.  Fast access speed, enabling quick data retrieval. Examples:  DRAM (Dynamic RAM)  SRAM (Static RAM)
  • 15.
    15 Cont… Secondary Memory Definition: Alsoknown as auxiliary memory, secondary memory is used for long-term data storage. Characteristics:  Non-volatile: Retains data even when the power is off.  Generally slower than primary memory. Examples:  Hard Disk Drives (HDD)  Solid-State Drives (SSD)  Optical Discs (CD/DVD)  USB Flash Drives
  • 16.
    16 PRIMARY MEMORY Primary memory,also known as main memory or RAM (Random Access Memory), is the memory directly accessible by the CPU. It stores data and instructions that are actively being used or processed. Characteristics Volatility: Primary memory is volatile, meaning it loses its content when the power is turned off. Speed: It provides fast access speed, enabling quick data retrieval and processing. Direct Accessibility: The CPU can access primary memory directly, which allows for efficient data processing.
  • 17.
    17 Examples. Random Access Memory(RAM):  Dynamic RAM (DRAM): Requires constant refreshing to maintain data.  Static RAM (SRAM): Faster and more reliable than DRAM, but more expensive; retains data without refreshing. Read-Only Memory (ROM):  PROM (Programmable ROM): Can be programmed once after manufacturing.  EPROM (Erasable Programmable ROM): Can be erased and reprogrammed using UV light.  EEPROM (Electrically Erasable Programmable ROM): Can be electrically erased and reprogrammed.
  • 18.
    18 Memory Management Techniquesfor Primary Memory  Contiguous Memory Allocation: Allocates a single block of memory to a process, leading to faster access but potential fragmentation.  Paging: Divides memory into fixed-size pages, allowing processes to be loaded into non- contiguous frames.  Segmentation: Divides memory into variable-sized segments based on logical divisions, improving usability and sharing.
  • 19.
    19 3.Secondary Memory Definition Secondary memory,also known as auxiliary or external memory, is used for long-term data storage. Unlike primary memory, it retains data even when the power is turned off. Characteristics  Non-volatility: Secondary memory is non-volatile, meaning it retains its content without power.  Slower Access Speed: Typically has slower access speeds compared to primary memory, but provides much larger storage capacity.  Permanent Storage: Used for storing data and programs that are not actively being used.
  • 20.
    20 Types of SecondaryMemory  Hard Disk Drives (HDD): Magnetic storage devices that store data on rotating platters. Commonly used for bulk storage.  Solid-State Drives (SSD): Use flash memory to store data, providing faster access speeds and greater reliability than HDDs.  Optical Discs: CDs, DVDs, and Blu-ray discs are used for storing data that can be read by optical drives.  USB Flash Drives: Portable storage devices that use flash memory, widely used for transferring data.  Magnetic Tape:  Used for archival storage and backup; offers high capacity but slower access speed.
  • 21.
    21 Hard Disk Drives(HDD) Magnetic storage devices that use spinning disks (platters) coated with magnetic material to store data. They are Commonly used in desktops and laptops for bulk storage of operating systems, applications, and user files. Characteristics:  Higher storage capacity (typically from hundreds of gigabytes to several terabytes).  Slower read/write speeds compared to SSDs.
  • 22.
    22 Solid-State Drives (SSD) Storagedevices that use flash memory to store data, with no moving parts. They are Increasingly popular in laptops and desktops for faster performance. Characteristics: Much faster read and write speeds compared to HDDs. More durable and reliable due to the absence of mechanical components.
  • 23.
    23 Memory Management Techniquesfor Secondary Memory  File Systems: Organizes data on secondary storage, allowing for efficient access and management of files.  Disk Management: Involves partitioning, formatting, and organizing data to optimize storage and retrieval.  Backup Solutions: Regularly creating copies of data to prevent loss in case of hardware failure or corruption.
  • 24.
    24 Importance of MemoryManagement  Efficiency: Proper memory management ensures optimal utilization of both primary and secondary memory resources, allowing multiple processes to run simultaneously.  Performance: Efficient allocation reduces access time, enhancing the overall speed of applications and the operating system.  Stability: Good memory management prevents memory leaks and fragmentation, ensuring system stability and reliability.  Security: Protects memory spaces of different processes, preventing unauthorized access and data corruption.
  • 25.
    25 Challenges in MemoryManagement  Fragmentation: Both internal (wasted space within allocated blocks) and external fragmentation (unused space between allocated blocks) can lead to inefficient memory utilization.  Resource Allocation: Deciding how to allocate memory resources effectively can be complex, especially in multitasking environments.  Scalability: As systems grow, maintaining efficient memory management becomes increasingly challenging.  Performance Degradation: Excessive paging or swapping can lead to performance issues, requiring careful monitoring and tuning.
  • 26.
    26 References  Stallings, W.(2015). Operating Systems: Internals and Design Principles. Pearson.  Silberschatz, A., Galvin, P. B., & Gagne, G. (2018). Operating System Concepts. Wiley.  Tanenbaum, A. S., & Austin, T. (2012). Structured Computer Organization. Prentice Hall.
  • 27.
  • 28.
    28 Introduction Computer representation refersto the way data and information are stored, processed, and transmitted within a computer system. Since computers operate using binary logic, they represent data in binary form, utilizing sequences of bits (0s and 1s). Understanding how data is represented is crucial for programming, data storage, and effective computer usage.
  • 29.
    29 Types of DataRepresentation 1. Binary Representation The fundamental way computers represent all types of data using binary digits (bits), where each bit can be either 0 or 1. Bit and Byte: Bit: The smallest unit of data in computing, representing a single binary value. Byte: A group of 8 bits, commonly used as a basic unit of storage. 2 Number Systems Computers use different number systems to represent data. The most common systems include:  Binary (Base 2):  Uses two symbols: 0 and 1.  Example: The decimal number 5 is represented as 101 in binary.  Decimal (Base 10):  The standard number system used by humans, consisting of ten symbols: 0-9.  Hexadecimal (Base 16):  Uses sixteen symbols: 0-9 and A-F (where A=10, B=11, ..., F=15).  Example: The decimal number 255 is represented as F in hexadecimal.  Octal (Base 8):  Uses eight symbols: 0-7. Example: The decimal number 8 is represented as 10 in octal.
  • 30.
    30 Character Encoding character encodingschemes are used to represent text in computers. Common encoding standards include:  ASCII (American Standard Code for Information Interchange):  Represents characters using 7 bits, allowing for 128 unique symbols (including control characters, digits, uppercase and lowercase letters).  Example: The letter 'A' is represented by the binary number 01000001.  UTF-8:  A variable-length character encoding that can represent any character in the Unicode standard.  Uses 1 to 4 bytes to represent characters, making it efficient for text files.  Unicode:  A character encoding standard that aims to cover all the characters used in writing systems around the world.  Example: The letter 'A' is represented as U+0041 in Unicode.
  • 31.
    31 Audio and VideoRepresentation Audio Representation: Audio data is typically represented in digital form using sampling.  The audio waveform is sampled at regular intervals, and each sample is quantized into a binary value. Common formats include WAV, MP3, and AAC. Video Representation: Video data is represented as a series of images (frames) displayed in quick succession. Each frame is stored as a bitmap or compressed format (e.g., MPEG, H.264).  The frame rate (frames per second) determines the smoothness of the playback.
  • 32.
    32 Importance of ComputerRepresentation  Data Processing: Efficient data representation is crucial for fast processing and computation.  Storage Efficiency: Different representations can affect the amount of storage space required for data.  Data Transmission: Representations affect how data is transmitted over networks; efficient encoding reduces bandwidth usage.  Interoperability: Standardized representations (like Unicode) allow different systems to communicate and share data effectively.
  • 33.
    33 Challenges in ComputerRepresentation  Precision Loss: In floating-point representation, precision can be lost during calculations due to limited bits.  Compatibility Issues: Different encoding systems can lead to compatibility issues when sharing files across systems.  Data Corruption: Improper representation can lead to data corruption during storage or transmission.  Complexity of Encoding Schemes: Understanding and implementing various encoding schemes can be complex, especially for developers.
  • 34.
    34 References:  Patterson, D.A., & Hennessy, J. L. (2014). Computer Organization and Design: The Hardware/Software Interface. Morgan Kaufmann.  Tanenbaum, A. S. (2016). Structured Computer Organization. Prentice Hall.  W3C. (2008). Unicode® Standard. Available at: Unicode Consortium