SlideShare a Scribd company logo
1 of 21
IKI20210 Pengantar Organisasi Komputer Kuliah no. 1: Pendahuluan Pembina Mata Kuliah: M. YAHYA Sumber : 1. Hamacher.  Computer Organization , ed-5. 2. Materi kuliah CS61C/2000 & CS152/1997, UCB.
IKI20210 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Organisasi Sistem Komputer “ Organisasi Komputer adalah bagian yang terkait erat dengan unit-unit operasional dan interkoneksi antar komponen penyusun sistem komputer dalam merealisasikan aspek arsitekturnya
Organisasi Sistem Komputer ,[object Object],I/O system Processor Compiler Operating System (Windows 98) Application (Netscape) Digital Design Circuit Design Instruction Set Architecture Datapath & Control  transistors Memory Hardware Software Assembler 20210
Tingkat-tingkat Abstraksi Organisasi Komputer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Tingkat-tingkat Bahasa Pemrograman ,[object Object],[object Object],[object Object],[object Object],High Level Language Program (e.g., C) Assembly  Language Program (e.g.,AVR) Machine  Language Program (AVR) Control Signal Specification Compiler Assembler Machine Interpretation A = 25; B = 8; C = A * B; 0000 1001 1100 0110 1010 1111 0101 1000 1010 1111 0101 1000 0000 1001 1100 0110  1100 0110 1010 1111 0101 1000 0000 1001  0101 1000 0000 1001 1100 0110 1010 1111   ° ° 20210
Organisasi Bahasa Pemrograman Java Java Language Java Virtual Machine Operating System Computer H/W byte code JVM dapat langsung berhubungan dgn h/w
5 Komponen Utama Komputer Processor (active) Computer Control (“brain”) Datapath (“brawn”) Memory (passive) (where  programs,  data  live when running) Devices Input Output Keyboard,  Mouse Display ,  Printer Disk   (where  programs,  data  live when not running)
Contoh-contoh (Organisasi) Komputer
Contoh: Komputer Berbasis Pentium Processor/Memory Bus PCI Bus I/O Busses
Contoh: Komputer Berbasis SPARCstation20 ,[object Object],Floating-point Unit Integer Unit Inst Cache Ref MMU Data Cache Store Buffer Bus Interface SuperSPARC L2 $ CC MBus Module MBus L64852 MBus control M-S Adapter SBus DRAM  Controller SBus DMA SCSI Ethernet STDIO serial kbd mouse audio RTC Boot PROM Floppy SBus Cards
Contoh: Microcontroller AT90S8515
Struktur (Umum) Interkoneksi Antar-Komponen Proc Caches Processor-Memory  Bus Memory I/O Devices : Controllers adapters Disks Displays Keyboards Networks Semua komponen memiliki organisasi & antar-muka I/O  Bus
Outline Materi Kuliah ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Generasi Komputer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trend Teknologi
Tren Teknologi: Kapasitas Mikroprosesor 2X transistors/Chip Every 1.5 years Called “ Moore’s Law ”   Alpha 21264: 15 million Pentium  Pro: 5.5 million PowerPC 620: 6.9 million Alpha 21164: 9.3 million Sparc Ultra: 5.2 million Moore’s Law
Tren Teknologi: Kinerja Prosesor 1.54X/yr Processor performance increase/year, mistakenly  referred to as Moore’s Law (transistors/chip)
Tren Teknologi: Kapasitas Memori (1 Chip DRAM) year   size(Megabit) 1980 0.0625 1983 0.25 1986 1 1989 4 1992 16 1996 64 2000 256 Now 1.4X/yr, or doubling every 2 years 4000X since 1980
Teknologi Komputer    Perubahan Dramatis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bicycle Computer (Embedded)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Speed Altitude Heart Rate Dramatic change !!!

More Related Content

What's hot

What's hot (20)

Cpu and its functions
Cpu and its functionsCpu and its functions
Cpu and its functions
 
Processor Management
Processor ManagementProcessor Management
Processor Management
 
Understanding The Boot Process
Understanding The Boot ProcessUnderstanding The Boot Process
Understanding The Boot Process
 
Computer Fundamentals Chapter 07 pam
Computer Fundamentals Chapter  07 pamComputer Fundamentals Chapter  07 pam
Computer Fundamentals Chapter 07 pam
 
01.osdoc
01.osdoc01.osdoc
01.osdoc
 
Bios
BiosBios
Bios
 
Cpu
CpuCpu
Cpu
 
Basics of boot-loader
Basics of boot-loaderBasics of boot-loader
Basics of boot-loader
 
บทที่ 3 โครงสร้างของระบบปฏิบัติการ
บทที่ 3 โครงสร้างของระบบปฏิบัติการบทที่ 3 โครงสร้างของระบบปฏิบัติการ
บทที่ 3 โครงสร้างของระบบปฏิบัติการ
 
Bios and cmos
Bios and cmosBios and cmos
Bios and cmos
 
Coa presentation3
Coa presentation3Coa presentation3
Coa presentation3
 
Bios
BiosBios
Bios
 
Chapter 01 New
Chapter 01 NewChapter 01 New
Chapter 01 New
 
arquitectura de computadoras
arquitectura de computadorasarquitectura de computadoras
arquitectura de computadoras
 
Processors
ProcessorsProcessors
Processors
 
Unix fundamentals
Unix fundamentalsUnix fundamentals
Unix fundamentals
 
Lec post , bios , cmos
Lec post , bios , cmosLec post , bios , cmos
Lec post , bios , cmos
 
Grub
GrubGrub
Grub
 
01 - Computer System
01 - Computer System01 - Computer System
01 - Computer System
 
Conventional memory
Conventional memoryConventional memory
Conventional memory
 

Viewers also liked

I N T R O T O C O M P U T E R N E T W O R K S ( N E W)
I N T R O  T O  C O M P U T E R  N E T W O R K S ( N E W)I N T R O  T O  C O M P U T E R  N E T W O R K S ( N E W)
I N T R O T O C O M P U T E R N E T W O R K S ( N E W)Yahya Electone
 
Jurnal jaringan komputer
Jurnal jaringan komputerJurnal jaringan komputer
Jurnal jaringan komputerApink Iketeru
 
Bab 4 (ppt pai sma kelas x 2013)
Bab 4 (ppt pai sma kelas x 2013)Bab 4 (ppt pai sma kelas x 2013)
Bab 4 (ppt pai sma kelas x 2013)Ulin Nuha
 

Viewers also liked (8)

Set instruksi
Set instruksiSet instruksi
Set instruksi
 
P I K 7
P I K 7P I K 7
P I K 7
 
I N T R O T O C O M P U T E R N E T W O R K S ( N E W)
I N T R O  T O  C O M P U T E R  N E T W O R K S ( N E W)I N T R O  T O  C O M P U T E R  N E T W O R K S ( N E W)
I N T R O T O C O M P U T E R N E T W O R K S ( N E W)
 
Journalfacebook2kolom
Journalfacebook2kolomJournalfacebook2kolom
Journalfacebook2kolom
 
Ok 11 operasi cpu
Ok 11 operasi  cpuOk 11 operasi  cpu
Ok 11 operasi cpu
 
Jurnal jaringan komputer
Jurnal jaringan komputerJurnal jaringan komputer
Jurnal jaringan komputer
 
Modul Powerpoint
Modul PowerpointModul Powerpoint
Modul Powerpoint
 
Bab 4 (ppt pai sma kelas x 2013)
Bab 4 (ppt pai sma kelas x 2013)Bab 4 (ppt pai sma kelas x 2013)
Bab 4 (ppt pai sma kelas x 2013)
 

Similar to Introduction to Computer Organization Fundamentals

Computer architecture
Computer architectureComputer architecture
Computer architectureRozase Patel
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating systemAnil Dharmapuri
 
Microprocessor & microcontroller
Microprocessor & microcontroller Microprocessor & microcontroller
Microprocessor & microcontroller Nitesh Kumar
 
microprocessormicrocontrollerbysanat-140107013112-phpapp02.pdf
microprocessormicrocontrollerbysanat-140107013112-phpapp02.pdfmicroprocessormicrocontrollerbysanat-140107013112-phpapp02.pdf
microprocessormicrocontrollerbysanat-140107013112-phpapp02.pdfMECHANICALENGINEERIN19
 
Computer Archeticture
Computer ArchetictureComputer Archeticture
Computer Archeticturemahmoud
 
Chp1 68000 microprocessor copy
Chp1 68000 microprocessor   copyChp1 68000 microprocessor   copy
Chp1 68000 microprocessor copymkazree
 
bit, Byte, Kilobyte
bit, Byte, Kilobyte bit, Byte, Kilobyte
bit, Byte, Kilobyte Poliano123
 
Computer Architecture – An Introduction
Computer Architecture – An IntroductionComputer Architecture – An Introduction
Computer Architecture – An IntroductionDilum Bandara
 
Basic course
Basic courseBasic course
Basic courseSirajRock
 
Os rtos.ppt
Os rtos.pptOs rtos.ppt
Os rtos.pptrahul km
 
T01 a computerintrohardware
T01 a computerintrohardwareT01 a computerintrohardware
T01 a computerintrohardwareSCHOOL
 
ydtyT01 a computerintrohardware
ydtyT01 a computerintrohardwareydtyT01 a computerintrohardware
ydtyT01 a computerintrohardwarekasmraj1
 
C language computer introduction to the computer hardware
C language  computer introduction to the computer hardwareC language  computer introduction to the computer hardware
C language computer introduction to the computer hardwareNIKHIL KRISHNA
 
Chapter 1 computer abstractions and technology
Chapter 1 computer abstractions and technologyChapter 1 computer abstractions and technology
Chapter 1 computer abstractions and technologyBATMUNHMUNHZAYA
 
Computer Hardware & Software Lab Manual 2
Computer Hardware & Software Lab Manual 2Computer Hardware & Software Lab Manual 2
Computer Hardware & Software Lab Manual 2senayteklay
 

Similar to Introduction to Computer Organization Fundamentals (20)

Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating system
 
Embedded Systems
Embedded SystemsEmbedded Systems
Embedded Systems
 
Microprocessor & microcontroller
Microprocessor & microcontroller Microprocessor & microcontroller
Microprocessor & microcontroller
 
Processor2
Processor2Processor2
Processor2
 
Information technology
Information technologyInformation technology
Information technology
 
microprocessormicrocontrollerbysanat-140107013112-phpapp02.pdf
microprocessormicrocontrollerbysanat-140107013112-phpapp02.pdfmicroprocessormicrocontrollerbysanat-140107013112-phpapp02.pdf
microprocessormicrocontrollerbysanat-140107013112-phpapp02.pdf
 
Computer Archeticture
Computer ArchetictureComputer Archeticture
Computer Archeticture
 
Chp1 68000 microprocessor copy
Chp1 68000 microprocessor   copyChp1 68000 microprocessor   copy
Chp1 68000 microprocessor copy
 
bit, Byte, Kilobyte
bit, Byte, Kilobyte bit, Byte, Kilobyte
bit, Byte, Kilobyte
 
Computer Architecture – An Introduction
Computer Architecture – An IntroductionComputer Architecture – An Introduction
Computer Architecture – An Introduction
 
Basic course
Basic courseBasic course
Basic course
 
Os rtos.ppt
Os rtos.pptOs rtos.ppt
Os rtos.ppt
 
T01 a computerintrohardware
T01 a computerintrohardwareT01 a computerintrohardware
T01 a computerintrohardware
 
ydtyT01 a computerintrohardware
ydtyT01 a computerintrohardwareydtyT01 a computerintrohardware
ydtyT01 a computerintrohardware
 
C language computer introduction to the computer hardware
C language  computer introduction to the computer hardwareC language  computer introduction to the computer hardware
C language computer introduction to the computer hardware
 
Chapter 1 computer abstractions and technology
Chapter 1 computer abstractions and technologyChapter 1 computer abstractions and technology
Chapter 1 computer abstractions and technology
 
Fg a
Fg aFg a
Fg a
 
Introduction to Blackfin BF532 DSP
Introduction to Blackfin BF532 DSPIntroduction to Blackfin BF532 DSP
Introduction to Blackfin BF532 DSP
 
Computer Hardware & Software Lab Manual 2
Computer Hardware & Software Lab Manual 2Computer Hardware & Software Lab Manual 2
Computer Hardware & Software Lab Manual 2
 

More from Yahya Electone (11)

P I K 6
P I K 6P I K 6
P I K 6
 
P I K 5
P I K 5P I K 5
P I K 5
 
P I K 4
P I K 4P I K 4
P I K 4
 
P I K 3
P I K 3P I K 3
P I K 3
 
P I K 2
P I K 2P I K 2
P I K 2
 
P I K 1
P I K 1P I K 1
P I K 1
 
Multimedia Pembelajaran
Multimedia  PembelajaranMultimedia  Pembelajaran
Multimedia Pembelajaran
 
Malicious Code
Malicious  CodeMalicious  Code
Malicious Code
 
Soal
SoalSoal
Soal
 
P T I
P T IP T I
P T I
 
Jadwal 35 Samarinda
Jadwal 35  SamarindaJadwal 35  Samarinda
Jadwal 35 Samarinda
 

Recently uploaded

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Introduction to Computer Organization Fundamentals

  • 1. IKI20210 Pengantar Organisasi Komputer Kuliah no. 1: Pendahuluan Pembina Mata Kuliah: M. YAHYA Sumber : 1. Hamacher. Computer Organization , ed-5. 2. Materi kuliah CS61C/2000 & CS152/1997, UCB.
  • 2.
  • 3. Organisasi Sistem Komputer “ Organisasi Komputer adalah bagian yang terkait erat dengan unit-unit operasional dan interkoneksi antar komponen penyusun sistem komputer dalam merealisasikan aspek arsitekturnya
  • 4.
  • 5.
  • 6.
  • 7. Organisasi Bahasa Pemrograman Java Java Language Java Virtual Machine Operating System Computer H/W byte code JVM dapat langsung berhubungan dgn h/w
  • 8. 5 Komponen Utama Komputer Processor (active) Computer Control (“brain”) Datapath (“brawn”) Memory (passive) (where programs, data live when running) Devices Input Output Keyboard, Mouse Display , Printer Disk (where programs, data live when not running)
  • 10. Contoh: Komputer Berbasis Pentium Processor/Memory Bus PCI Bus I/O Busses
  • 11.
  • 13. Struktur (Umum) Interkoneksi Antar-Komponen Proc Caches Processor-Memory Bus Memory I/O Devices : Controllers adapters Disks Displays Keyboards Networks Semua komponen memiliki organisasi & antar-muka I/O Bus
  • 14.
  • 15.
  • 17. Tren Teknologi: Kapasitas Mikroprosesor 2X transistors/Chip Every 1.5 years Called “ Moore’s Law ” Alpha 21264: 15 million Pentium Pro: 5.5 million PowerPC 620: 6.9 million Alpha 21164: 9.3 million Sparc Ultra: 5.2 million Moore’s Law
  • 18. Tren Teknologi: Kinerja Prosesor 1.54X/yr Processor performance increase/year, mistakenly referred to as Moore’s Law (transistors/chip)
  • 19. Tren Teknologi: Kapasitas Memori (1 Chip DRAM) year size(Megabit) 1980 0.0625 1983 0.25 1986 1 1989 4 1992 16 1996 64 2000 256 Now 1.4X/yr, or doubling every 2 years 4000X since 1980
  • 20.
  • 21.

Editor's Notes

  1. That is, any computer, no matter how primitive or advance, can be divided into five parts: 1. The input devices bring the data from the outside world into the computer. 2. These data are kept in the computer’s memory until ... 3. The datapath request and process them. 4. The operation of the datapath is controlled by the computer’s controller. All the work done by the computer will NOT do us any good unless we can get the data back to the outside world. 5. Getting the data back to the outside world is the job of the output devices. The most COMMON way to connect these 5 components together is to use a network of busses.