Professional Documents
Culture Documents
PC Architecture (TXW102)
Topic 1:
Introduction to Computer Hardware
Architecture
2006 Lenovo
PC Architecture (TXW102)
February 2007
Objectives:
Computer Hardware Architecture
Upon completion of this topic, you will be able to:
1. Identify the types of computers and their key differentiating features
2. Define various PC architecture terminology including computer layers,
controllers, and buses
3. Identify common industry standards and the objective of benchmarks
used with computer systems
4. Identify two features to enhance computer security
2006 Lenovo
PC Architecture (TXW102)
February 2007
Notebook
- Mobile
- Wireless
Designs
- Ultraportable (one spindle)
- Full function (two spindles)
- Desktop alternative
(three spindles)
- Tablet
Brands
- Lenovo 3000
- Lenovo ThinkPad
Desktop
- Non-mobile
- Wired connection
Designs
- Mini Desktop
- Ultra Small
- Small
- Desktop
- Tower
- PC Blades
Brands
- Lenovo 3000
- Lenovo ThinkCentre
Server
- High security
- Data processing and storage
Designs
- Tower
- Rack
- 1U rack
- Blades
Brands
- IBM System x
- IBM BladeCenter
2006 Lenovo
PC Architecture (TXW102)
February 2007
Notebooks
Notebooks are optimized for traveling and for mobile users who need easy access to data.
Notebooks can be categorized as ultraportable (around three pounds), full function (up to seven
pounds), or a desktop alternative (desktop features in a larger notebook design). Lenovo uses the
brand names 3000 or ThinkPad for its notebook systems.
The tablet PC is another kind of PC. Tablet PCs are based on a Microsoft specification for inkenabled touch screen computers (using Windows XP Tablet PC Edition). The tablet PC comes in
two form factors: slate (which has no keyboard attached because the tablet can be connected to a
docking station) and convertible (includes integrated keyboard). Lenovo markets the ThinkPad X60
Tablet, which is a convertible.
PC Architecture (TXW102)
February 2007
Desktops
Desktops are for users who work in one place and need access to data on the desktop or through a
network. Lenovo uses the brand names 3000 or ThinkCentre for its desktop systems.
Common desktop mechanical designs include the following:
Mini Desktop (0 slot x 2 bay)
Ultra Small (1 slot x 2 bay)
Small (2 slot x 3 bay or 4 slot x 3 bay)
Desktop (4 slot x 4 bay or 3 slot x 3 bay)
Tower (4 slot x 5 bay)
Tower
Mini
Desktop
Small
Desktop
Small
(2 slot x 3 bay)
Desktop
(3 slot x 3 bay)
Desktop
(4 slot x 4 bay)
PC Architecture (TXW102)
February 2007
Higher end desktop systems are commonly referred to as workstations. Workstations are often used
for graphics and engineering users. They may run a UNIX-based operating system instead of a
Microsoft Windows-based operating system.
Below is a comparison of PC workstations and UNIX workstations.
PC Workstations
UNIX Workstations
Basics
Strengths
Weaknesses
Servers
Servers are computers that provide services to other computers, called clients. Servers are in secure
areas because so many users are dependent on their function. They include file servers, print
servers, terminal servers, Web servers, e-mail servers, database servers, and computation servers.
Server designs include
Tower, which rests on the floor
Rack-based, which must be installed in a rack
1U rack-based, which is a 1U-high server that must be installed in a rack. 1U is equal to 1.75.
Server blades, which have server circuitry on a single board which slides into an enclosure with
other blades.
Note: Servers for racks vary in height by a U measurement (a U is 1.75-inch height). 1U servers
are popular for Web sites because for Web pages it is better to spread the load across multiple
servers (horizontal scalability) rather than to increase the processing power of a centralized server
(vertical scalability).
PC Architecture (TXW102)
February 2007
Notebook
Size and weight
Power mgmt/battery
Screen type and size
Integrated wireless
Docking station or port replicator
Number of spindles or bays
Modular bay(s)
Sales presentation capability
Integrated wireless, Bluetooth,
infrared
- Security chip
- ThinkVantage Technologies
-
Desktop
Fastest processor
Graphics performance
3D graphics adapters
Systems management
Removable storage (DVDRW)
Chipset
Security chip
ThinkVantage Technologies
Server
- Support many concurrent users
(up to 1000s)
- Multiple processors
- Large memory capacity
- Large disk capacity
PC Architecture (TXW102)
February 2007
PC is removed
from users desk
and replaced with
a small User Port
PC Blade is in a
rack in secure,
centralized location
Lenovo resells
ClearCube-branded
PC Blades and
management
software
Ethernet
User Port
(C/Port)
Direct Connection
PC Blade
The PC Blade is each user's actual
computer: a configurable, Intel-based PC
Blade that delivers full functionality to the
desktop.
Cage
The ClearCube Cage is
a centralized chassis that
houses up to eight PC Blades.
2006 Lenovo
PC Blades
PC Blades separate the guts of the PC from the physical desktop, putting processing power in data
centers and computer rooms. Employees then have only a monitor, keyboard and mouse on their
desks, along with a client appliance that is linked back to a blade server. PC blades offer a range of
benefits, including streamlined management and tighter security since all the hardware is
centralized. PC Blade configurations provide a dedicated blade to each user or a pool of blades that
can be dynamically allocated. In addition, spare blades can be used to provide hot backup to avoid
system outages.
PC Blade Advantages
Centralized asset management PC Blade hardware is centralized for easy access and asset
management.
Mission critical applications Blade infrastructure has high levels of redundancy; users can be
swapped to a functioning blade very quickly in case of hardware or software failure
Reduced support costs Hardware or software upgrades can be managed centrally in a fraction
of the time it would take to upgrade large numbers of dispersed PCs.
Multiple locations There is potential to support multiple locations with PC Blades by remotely
switching a user to a spare standby blade in the event of hardware failure (saving the cost of an
urgent engineer visit or keeping support staff on-site).
Reduced costs for new users It is lower cost to install and configure a new user with a PC
Blade than a desktop.
PC Architecture (TXW102)
February 2007
Easy relocation There are no significant costs when users move work location within a building.
Improved security The physical asset and intellectual property on the disk are centralized, e.g., it
is easier to steal a hard disk from a desktop than a PC Blade.
Reduced user down time Spare PC Blades can be configured to provide hot backup in case of
hardware failure.
Improved appearance In front office environments, the clients user port has no moving parts,
generates no noise, produces little heat, and requires less space.
Remote access Users can access their own PC environment from multiple desks in the building
or from other remote locations with blade infrastructure installed
PC Blade Disadvantages
Higher acquisition cost Purchase price of PC Blade and its infrastructure is higher than a stand
alone PC.
No wireless mobility Mobile users or users who need to work away from their desks are not
supported.
Lagging technology PC Blade processors and technology may be six to 12 months behind
desktop technology.
Unsuitable for power graphics users.
New infrastructure Significant change to current PC deployment, maintenance, and support
(skills, tools and processes).
More difficult to plan and manage upgrades when customer has a mix of PC Blades and traditional
desktops.
Lack of local CD and DVD drives except USB devices which open security risks and asset control
issues.
User resistance for advanced/experienced PC users to losing access to 'their' PC.
Extra cost for redundancy Extra cost for closet spare (with cooling) to enable redundancy.
Technology lock in Little option to cascade or sell blades to other users or customers.
PC Architecture (TXW102)
February 2007
User Port
- Small client device that connects the
users monitor, keyboard, mouse,
speakers, and USB devices to their
PC Blade
- No moving parts, generates no noise,
and creates little heat
- Can support multiple monitors
2006 Lenovo
ClearCube
ClearCube is a company that has offered PC Blades since 1997 and dominates the PC Blade
market. Lenovo resells ClearCube-branded PC Blades and management software.
See www.clearcube.com for more information.
PC Architecture (TXW102)
February 2007
10
ClearCube Products
A PC Blade solution from ClearCube require PC Blades, User Ports, Cage, BackPack, management
software, and optional accessories.
The ClearCube PC Blade is an Intel-based computer that delivers full PC functionality to the user
from a centralized location. The PC Blade is very compact and house all the standard PC components
including an Intel processor, memory, disk drive, and graphics.
For the client desk, each user requires a ClearCube User Port which is a compact device that
connects the users monitor, keyboard, mouse, speakers, and USB devices to their PC Blade. The
User Port has no moving parts, generates no noise, and creates very little heat. ClearCube offers
several User Ports as follows:
C/Port The C/Port connects to a centralized PC Blade over standard Category 5 cabling up to 200
meters long. The C/Port is about the same size and weight as a VHS cassette tape.
Fiber C/Port The Fiber C/Port connects to a centrally located PC Blade over a point-to-point fiber
optic cable up to 500 meters long. Because stray electromagnetic emissions are eliminated, the
Fiber C/Port is ideally suited for ultra-secure environments.
Multi-Video Expander For demanding, multi-task environments, the Multi-Video Expander is a
C/Port accessory that can be matched with an NVIDIA mezzanine video card on the PC Blade to
drive up to four displays. By accommodating analog and digital input monitors in a variety of
physical configurations, the Multi-Video Expander is the perfect choice for hectic, cramped trading
floors.
I/Port The I/Port lets users connect to their PC Blades over a standard switched ethernet network.
By connecting over ethernet and leveraging thin client technology, the distance between a PC
Blade and the desktop can be unlimited.
PC Architecture (TXW102)
February 2007
11
A ClearCube Cage is a 3U-high chassis which houses up to eight PC Blades. Each Cage is a selfcontained unit that provides all of the ethernet connections, airflow management, and power required
by the PC Blades. Up to 14 Cages (112 PC Blades) can be mounted in a standard 6 foot rack. A
BackPack connects directly to the back of each Cage, and PC Blades slide in the front.
ClearCube Cage
The ClearCube Blade Switching BackPack is an interface that plugs into the rear of the Cage and
provides all of the external connections for the PC Blades. The BackPack contains the distance
extension circuitry that links each PC Blade to a User Port. The Blade Switching BackPack also
features a full 8x8 switching matrix and spare switching circuitry that controls the connections to
standard and Fiber C/Ports.
PC Architecture (TXW102)
February 2007
12
The ClearCube Management Suite (CMS) is a comprehensive set of software tools that work
together to give IT administrators unprecedented control over their computing assets. Inventory
management, automated health alerting, remote control, hard drive image management, data backup
and Blade switching are just some of the capabilities ClearCube offers. All of the CMS applications
can be accessed via secure web browser and can be integrated with industry-standard systems
management tools.
Switch Manager
Blade Manager
Data Failover
Move Manager
Cage
PC Blade
PC Architecture (TXW102)
February 2007
13
Small Desktop
Tower
Common Attributes
Success, Prestige
Rock Solid
Lowest Total Cost
of Ownership
Innovative
High Quality and Reliability
Service Excellence
Large Enterprise/Mid-Market
Worry-free
Great Value
Stylish Design
The Lenovo 3000 J100/J110 features Intel processors while the Lenovo 3000 J105/J115
features AMD processors.
The Lenovo 3000 notebooks are available in various screen sizes in both widescreen and
standard screen formats.
Visit lenovo.com/3000 for more information on the Lenovo 3000 Family of desktops and
notebooks.
PC Architecture (TXW102)
February 2007
14
ThinkVantage
Technologies
ThinkPlus
Accessories
and Services
ThinkVantage
Design
PC Architecture (TXW102)
February 2007
15
Access Connections
System Update
Productivity Center
ThinkVantage Technologies
ThinkVantage Technologies are a select group of offerings from
Lenovo designed to address emerging customer needs. Adding
value to open industry standards, ThinkVantage Technologies help
customers manage the cost of deploying end-user systems,
implement new technologies such as wireless computing, and help
ensure that these technologies can be implemented securely. While
many of these offerings currently exist, some are being significantly
enhanced and all of them have now been consolidated into a single
family of offerings.
Visit lenovo.com/thinkvantage for more information.
PC Architecture (TXW102)
February 2007
16
Image Creation
ImageUltra Builder
- Hardware Independent
Imaging Technology
- Dynamic Operating
Environment
- Software Delivery
Assistant
Hassle Free
Connection
Secure Client
Data
Access
Connections
Productivity Center
Hard Drive
Data
Destruction
Password Manager
Rescue and
Recovery
Secure Data
Disposal
Secure Data
Media
Information
and Asset
Management
Image on Demand
Active Protection
System
Imaging Technology
Center
System Information
Center
Backup and
Recovery
Network Deployment
Remote Deployment
Manager
Client Migration
Critical Updates
System Migration
Assistant
Software on
Demand
Software Delivery
Center
System Update
2006 Lenovo
End-user productivity
(value out of the box that also can
provide key IT benefits)
Access Connections
Productivity Center
Active Protection System
Client Security Software
Rescue and Recovery
System Migration Assistant
System utilities
PC Architecture (TXW102)
Life-cycle Management
(solutions for SMB and LE)
System Information Center
Software Distribution Center
ImageUltra Builder
Secure Data Disposal
Remote Deployment Manager
February 2007
17
TVT
Purpose/Function of Tool
Deploy
ImageUltra Builder
Connect
Access Connections
Manages all wireless and wired connectivity settings and allows easy
switching between them
Protect
Productivity Center
A help desk behind the button that allows a system to recover itself from
OS corruption and even hard drive failures, fills the gap between
traditional backup and restore programs and re-imaging, allows remote
system recovery with or without user intervention, and automates the
deployment of critical patches, even if a system will not boot.
Automates delivery of application software updates to PCs without enduser intervention or disruption
Asset ID
System Update
Accesses, downloads, and installs the latest updates for Think systems
IBM Director
Support
Dispose
PC Architecture (TXW102)
February 2007
18
ThinkVantage Technology
Potential Savings*
ImageUltra Builder
Access Connections
$45 per PC
* Potential savings are based on typical customer environments. Some figures represent costs that customers may redirect from
labor-intensive areas to other areas of their business. Other figures are based on cost avoidance of competitive solutions
purchased separately. All figures are calculated using the TVT and Wireless Calculators and data from Gartner Research and
customers. Actual savings are not guaranteed and will vary by customer.
PC Architecture (TXW102)
February 2007
19
PC Architecture:
Computer Layers
Layered structure
User
Applications
Middleware API
Operating
system
Device
driver
Firmware
BIOS
Adapter
Hardware
Layers
Device driver
- Software to control a piece of
hardware
EEPROM BIOS
2006 Lenovo
Computer Layers
A computer consists of several layers that each have interfaces to communicate to the layer next
to it. A layered structure allows for compatibility; for example, the same shrink wrapped
operating system can work on millions of PCs from different vendors because it interfaces with
industry standard BIOS calls. The disadvantage to the layers is that each layer can slow
performance. So to increase performance a layer could be bypassed; for example, an application
could be written directly to the BIOS and device driver of a specific computer which would gain
performance, but would only work on that unique computer.
Some of the different computer layers shown in the diagram above are explained below.
Applications are the software programs with which a user typically interacts, such as those used
for word processing (Microsoft Word), Web browsing (Internet Explorer), sending e-mail
(Lotus Notes), and using spreadsheets (Microsoft Excel).
Middleware is software that provides an additional level of abstraction to applications. The idea
behind the middleware is to hide the complexity of implementing code that is not strictly
related to the business objectives that the application is supposed to be written for. Writing
applications against the basic APIs that the OS is able to expose is sometimes very time
consuming and it might take a while before a programmer starts to get into the business
modules of the application being developed. Using middleware is like actually talking to a
cleverer interface compared to the interface provided by the OS. Middleware has to implement
all the boring stuff, so that developers can concentrate on the business logic. Examples
include IBM DB2, Oracle, Microsoft SQL Server, Lotus Domino, Microsoft Internet
Information Server, IBM WebSphere, and BEA WebLogic.
PC Architecture (TXW102)
February 2007
20
The operating system is a set of programs that provides an environment in which applications
can run, allowing them easily to take advantage of the processor and I/O devices, such as disks
or adapters. Examples include Windows 2000, Windows XP, Vista, Red Hat Linux, and AIX
5L.
The Basic Input/Output System (BIOS) is a set of program instructions that activates system
functions independently of hardware design (the layer between the physical hardware and the
operating system) and allows for software compatibility. BIOS is typically located in flash
memory (EEPROM) on the systemboard. When a PC is started, the BIOS runs a power-on selftest (POST). It then tests the system and prepares the computer for operation by searching for
other BIOSes on the plug-in boards and setting up pointers (interrupt vectors) in memory to
access those routines. It then loads the operating system and passes control to it. The BIOS
accepts requests from the drivers as well as the application programs. The BIOS supports plugand-play and power management. BIOS vendors include IBM, AMI, and Phoenix. Although
there are several BIOS vendors, there are few differences among their products.
Note: To preclude the problem of performing OS, BIOS, or driver updates before the OS or
network drivers are loaded, a Preboot Execution Environment (PXE) allows the system to boot
off the network. At boot, a PXE agent executes, and the PC gets an IP address from a DHCP
server and then uses the BOOTP protocol to look for a PXE server. The PXE client is firmware
implemented in BIOS (if LAN hardware is on the systemboard) or as a boot PROM (if LAN
adapter). Programs, including those in the PXE environment, require system configuration and
diagnostic information. A Systems Management BIOS (SMBIOS) is a chip that makes the
necessary information available via BIOS calls that are available through the OS and in the
preboot environment.
Firmware is usually the layer of software that is between the device driver and adapter. It
typically is on a EEPROM of an adapter card and can be upgraded with new releases. Firmware
is similar to BIOS.
Device Drivers are a type of software (which may be embedded in firmware) that controls or
emulates devices attached to the computer such as a printer, scanner, hard disk, monitor, or
mouse. Device drivers are typically loaded low into the memory of PCs at boot time. A device
driver expands an operating system's ability to work with peripherals and controls the software
routines that make peripherals work (a network card, a disk, printer). These routines may be part
of another program (many applications include device drivers for printers), or they may be
separate programs. Basic drivers come with the operating system, and drivers are normally
installed for each peripheral added.
PC Architecture (TXW102)
February 2007
21
Application Program
6.
Operating System
4.
7.
Keyboard
Cable
1.
5.
BIOS 3.
Video
Circuitry
Keyboard Port
Hardware
2.
Hardware
PC Architecture (TXW102)
February 2007
22
PC Architecture:
Subsystems
Major internal subsystems of a PC:
PCI Express
x16 slot
PCI Express slots
Direct
Media
Interface
PCIe
Processor +
L1/L2 cache
MCH or
GMCH
host bridge
Low Pin
Count interface
Memory
I/O
Controller
Hub
(ICH)
PCIe controller
PCI controller
SATA controller
IDE controller
USB controller
Firmware
hub
USB 2.0
AC '97 codec
or
High Definition Audio
4 SATA disks
Super I/O
2006 Lenovo
Subsystems
Subsystems in a PC communicate to each other via buses. Buses adhere to a particular
architecture (set of rules) to allow compatibility with the numerous subsystems that adhere to
the same architecture.
Most PCs are associated with the term Wintel, which refers to Microsoft Windows and Intel
chip technologies. PCIe stands for PCI Express.
The processor is the central component of a PC. Intel and AMD are the main processor vendors
used in PCs.
Data in the processor, caches, memory, buses, disk controller, and graphics controller is stored
electrically; so when electrical power is shut down, this data is lost. Data on the disk is stored
magnetically, so the data is saved even when electrical power is removed.
PC Architecture (TXW102)
February 2007
23
PC Architecture:
Controllers
All major subsystems have controllers.
Controllers are circuitry controlling manner, method, and speed of access
to device.
Controller
Controls
Examples
L2 cache controller
L2 cache
2 MB
Memory controller
Memory
2 GB
Bus controller(s)
Data bus
Graphics controller
Monitor
Disk controller
Disk
2006 Lenovo
Controllers
All major subsystems have controllers that define how data will be obtained and stored.
Sometimes a controller is a single chip with the data stored in separate physical circuitry. For
example, a memory controller controls memory, but the data is stored in different physical chips
called DIMMs.
Sometimes a single physical chip contains multiple controllers. For example, the I/O Controller
Hub (ICH) is a single physical chip which houses the PCI Express controller, PCI controller,
Serial ATA controller, EIDE controller, USB controller, and other controllers.
Controllers are normally included in the chipset of the computer.
PC Architecture (TXW102)
February 2007
24
PC Architecture:
Buses
Most transfers use three buses
Control bus
Address bus
Data bus
I/O
Controller
Control
Data
Address
Processor
Data
Memory
Disk
Graphics
LAN
Buses
If two subsystems are on a bus, such as in the diagram with processor and memory, a data
transfer first involves sending the address on the address bus. Next, data is sent on the data bus.
If multiple subsystems exist on a bus, a control bus is needed in addition to the address and data
bus. The control bus is used to signal which subsystem will control the bus for the next transfer.
PC Architecture (TXW102)
February 2007
25
Address Bus
An address bus determines how much memory the processor or any subsystem can directly
address. For example, a 32-bit address bus means 2 to the power of 32 or 4 billion unique
numbers to address 4 GB of memory.
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
0
0
0
0
0
0
0
0
0
0
0
0
0
1
1
0
0
1
0
0
0
1
0
0
1
Before data is read or written by a processor, the address of that data is sent first. This address is
sent on a separate set of physical wires called the address bus. The data is then sent on a
different set of physical wires called the data bus.
A processor is designed to use a certain maximum quantity of address lines. The amount of
physical memory that a processor can address is determined by this quantity. The number of
unique numbers that can be made by a base two number system (0s and 1s) with the quantity of
address digits determines the maximum addressable memory of a processor. Software can limit
this maximum addressability, for example, DOS sets the processor to use 20 address lines as
DOS only addresses 1 MB of memory.
Following are some processors and their addressability:
Address lines
Addressable memory
Examples
24
16 MB
486SLC
32
36
40
44
4 GB
64 GB
1 TB
18 TB
486DX2
Pentium 4, Xeon
EM64T physical memory
Itanium
48
256 TB
64
18 EX
Sometimes operating systems limit addressability, so that the operating system can not utilize
all the available physical memory.
PC Architecture (TXW102)
February 2007
26
PC Architecture:
Bus Speeds
Processor +
L1/L2 Cache
System bus
400 to 1066 MHz
PCI Express
x16 slot
PCI Express slots
MCH or
GMCH
Host Bridge
Memory
Memory bus
200 to 400 MHz
4 SATA
disks
Super I/O
I/O
Controller
Hub
(ICH)
Firmware
Hub
USB
Bus Speeds
Each bus in a PC has a speed (measured in megahertz) and a data transfer rate.
The bus between the processor and the memory controller was originally called the frontside
bus; the processor had a separate bus to its integrated L2 cache called the backside bus and a
separate bus outside the processor to the memory controller called the frontside bus. The
frontside bus and the backside bus were two different buses. With the introduction of the
Pentium 4 and follow-on processors, the frontside bus was named system bus, although both
terms were still used interchangeably. The change of the name to system bus was due to the fact
that the L2 cache was not isolated off a separate, independent bus to the degree that it was for
earlier processors, such as the Pentium II and Pentium III.
The memory bus is clocked at 200 to 400 MHz, but most memory today is double data rate
(DDR); this means data is transferred on both the rising and falling edge which doubles the
throughput from the base clock speed.
The system bus and the memory bus can be either synchronous or asynchronous, depending on
the memory controller of the chipset. Some memory controllers only support synchronous
system and memory bus speeds; some support either synchronous or asynchronous speeds. An
example of a memory controller that supports synchronous system and memory bus speeds is a
400 MHz system bus with a 200 MHz memory bus with PC2-3200 DDR2 memory (there is an
even multiple of 200 among 200 MHz and 400 MHz). An asynchronous example is a 400 MHz
system bus with a 266 MHz memory bus with PC2-4200 533MHz DDR2 memory.
PC Architecture (TXW102)
February 2007
27
In 1996 and 1997, the PC industry standardized the 66 MHz system bus. Migration to a 100
MHz system bus occurred in 1998, then to a 133 MHz bus in 2000. The Pentium 4 introduced a
400 MHz system bus in late 2000, although it was really 100 MHz 4 to yield 400 MHz. Later,
Pentium 4 processors utilized an 800 MHz system bus (200 MHz 4) followed by a 1066 MHz
system bus (266 MHz 4).
Data Transfer Rates
Data transfer rates (assuming that data is transferred on only one edge of the clock):
8-bit at 133 MHz (double data rate) in 266 MB/s (Hub Interface)
32-bit at 33 MHz is 132 MB/s (PCI bus)
32-bit at 66 MHz is 264 MB/s (PCI bus)
64-bit at 33 MHz is 264 MB/s (PCI bus)
64-bit at 66 MHz is 528 MB/s (PCI bus and system bus)
64-bit at 100 MHz is 800 MB/s (system bus)
64-bit at 200 MHz is 1.6 GB/s (backside bus to L2 cache; PC1600 DDR memory)
64-bit at 266 MHz is 2.1 GB/s (PC2100 DDR memory)
64-bit at 400 MHz is 3.2 GB/s (backside bus to full speed L2 cache, Pentium 4 system bus)
PC Architecture (TXW102)
February 2007
28
PC Architecture:
Cache
Cache is a buffer between subsystems.
Disk transfer could involve five cache locations.
PCI Express
x16 slot
PCI Express slots
PCI
Express
4.
SCSI
Processor +
1. L1 Cache
2. L2 Cache
MCH or
GMCH
Host Bridge
I/O
Controller
Hub
(ICH)
3. Memory
EIDE Disks
5.
Firmware
Hub
2006 Lenovo
Cache
Cache is a storage place (buffer or bucket) that exists between two subsystems in order for data
to be accessed more quickly to increase performance. Performance is increased because the
cache subsystem usually has faster access technology and does not have to cross an additional
bus. Cache is typically used for reads, but it is increasingly being used for writes as well.
For example, getting information to the processor from the disk involves up to five cache
locations:
1. L1 cache in the processor (memory cache)
2. L2 cache (memory cache)
3. Software disk cache (in main memory)
4. Hardware disk cache (some disks may only use an FIFO buffer)
5. Disk buffer
For reads, one subsystem will usually request more data than what is immediately needed, and
that excess data is stored in the cache(s). During the next read, the cache(s) is searched for the
requested data, and if it is found, a read to the subsystem beyond the cache is not necessary.
PC Architecture (TXW102)
February 2007
29
Industry Standards:
Restriction of Hazardous Substances (RoHS) Directive
Restriction of hazardous substances in electrical
and electronic equipment
Restricted substances:
Lead
Mercury
Cadmium
Hexavalent chromium
Polybrominated biphenyls
Polybrominated
diphenylethers
FIN
FIN
IS
NO NO
RUS
ES
SE
LV
LT
IE
PT
PT SP
IE
SP
ES
LV
LT
BY
BY
GB GB
POL POL
NL GER
NL GER
UK
BE BE
CZ CZ
LU LU
SK SK
AT AT
HU HUROM ROM
FR
FR CH
CH
HR HR
BA BA
BUL BUL
YU YU
IT
MK MK
AL
TUR
GR GR
CY
MAL
2006 Lenovo
PC Architecture (TXW102)
February 2007
30
A similar directive from the European Union is the Waste Electrical and Electronic Equipment (WEEE)
Directive. WEEE encourages and sets criteria for the collection, treatment, recycling and recovery of
electrical and electronic waste. WEEE requires producers to ensure that equipment they put on the
market in the EU after August 13, 2005 is marked with the crossed-out wheeled bin symbol, the
producers name, and indication that the equipment was put on the market after August 13, 2005.
Lenovo PC products comply with the WEEE Directive requirements.
WEEE-Compliant Symbol
PC Architecture (TXW102)
February 2007
31
Industry Standards:
Intel High Definition Audio (Intel HD Audio)
Next-generation architecture (after AC 97) for implementing audio, modem,
and communications functionality
Dolby
Digital
Intel HD Audio
supports multiple
audio streams at
the same time.
Chat audio
2006 Lenovo
PC Architecture (TXW102)
February 2007
32
Support for Intel HD Audio is found in the ICH6, ICH7, and ICH8 families. The ICH6 and
ICH7 integrate both AC 97 and Intel HD Audio to facilitate transition from the older AC 97;
however, only AC 97 or Intel HD Audio can be used at one time. (Either requires an additional
external codec chip; when Intel HD Audio was announced, the older AC 97 chips cost less
money.) The ICH6/ICH7 Intel HD Audio digital link shares pins with the AC 97 link. For
input, the ICH6/ICH7 adds support from an array of microphones that can be used for enhanced
communication capabilities and improved speech recognition. The ICH8 only supports HD
Audio (not AC '97).
Intel HD Audio has support for a multi-channel audio stream, a 32-bit sample depth, and a
sample rate up to 192 kHz.
Intel HD Audio delivers significant improvements over previous-generation integrated audio
and sound cards. Intel HD Audio hardware is capable of delivering the support and sound
quality for up to eight channels at 192 kHz/32-bit quality, while the AC 97 specification can
only support six channels at 48 kHz/20-bit quality. In addition, by providing dedicated system
bandwidth for critical audio functions, Intel HD Audio is architected to prevent the occasional
glitches or pops that other audio solutions can have.
Dolby Laboratories selected Intel HD Audio to bring Dolby-quality surround sound
technologies to the PC, as part of the PC Logo Program that Dolby recently announced. The
combination of these technologies marks an important milestone in delivering quality digital
audio to consumers. Intel HD Audio will be able to support all the Dolby technologies,
including the latest Dolby Pro Logic IIx, which makes it possible to enjoy older stereo content
in 7.1-channel surround sound.
Standardized
Register Interface
(UAA)
OS
Audio
driver
Modem
driver
UAA
bus driver
AC 97
drivers
Intel HD
Audio
registers
AC 97
registers
Modem codec
Audio codec
ICH6
Intel HD
Audio
Controller
AC 97
Cntrl
Telephony codec
Intel HD
Audio Link
AC Link
Audio
codec
HDMI codec
Dock
Dock codec
Modem
codec
Intel HD Audio also allows users to play back two different audio tracks, such as a CD and a
DVD simultaneously, which can not be done using current audio solutions. Intel HD Audio
features multi-streaming capabilities that give users the ability to send two or more different
audio streams to different places at the same time, from the same PC.
PC Architecture (TXW102)
February 2007
33
Microsoft has chosen Intel HD Audio as the main architecture for their new Unified Audio
Architecture (UAA), which provides one driver that will support all Intel HD Audio controllers
and codecs. While the Microsoft driver is expected to support basic Intel HD Audio functions,
codec vendors are expected to differentiate their solutions by offering enhanced Intel HD audio
solutions.
Intel HD Audio also enables enhanced voice capture through the use of array microphones,
giving users more accurate speech input. While other audio implementations have limited
support for simple array microphones, Intel HD Audio supports larger array microphones. By
increasing the size of the array microphone, users get incredibly clean input through better noise
cancellation and beam forming. This produces higher-quality input to voice recognition, Voice
over IP (VoIP), and other voice-driven activities.
Intel HD Audio also provides improvements that support better jack retasking. The computer
can sense when a device is plugged into an audio jack, determine what kind of device it is, and
change the port function if the device has been plugged into the wrong port. For example, if a
microphone is plugged into a speaker jack, the computer will recognize the error and can
change the jack to function as a microphone jack. This is an important step in getting audio to a
point where it just works. (Users wont need to worry about getting the right device plugged
into the right audio jack.)
The Intel HD Audio controller supports up to three codecs (such as an audio codec or modem
codec). With three Serial Data In (SDI) and one Serial Data Out (SDO) signals, concurrent
codec transactions on multiple codecs are made possible.
The SDO connects to all codecs and provides a bandwidth of 48 Mb/s. Each of the three SDIs
are typically connected to a codec and have a bandwidth of 24 Mb/s. In addition, the controller
has eight non-dedicated, multipurpose DMA engines (4 input, and 4 output). This allows
potential for full utilization of DMA engines for better performance than the dedicated function
DMA engines found in AC 97. In addition, dynamic allocation of the DMA engines allows
link bandwidth to be managed effectively and enables the support of simultaneous independent
streams. This capability enables new exciting usage models (e.g., listening to music while
playing a multi-player game on the Internet).
Surround
Surround
Center
Right
Left
Dolby Digital
DTS
DVD Video
CD
Subwoofer
With Intel HD Audio, a DVD movie with 5.1 audio can be sent
to a surround sound system in the living room, while you
listen to digital music and surf the Web on the PC.
PC Architecture (TXW102)
February 2007
34
Industry Standards:
Intel Active Management Technology (AMT)
Remote management of networked platforms in any system state (even if
powered off or crashed)
Remote
Troubleshooting
and Recovery
Proactive
Alerting
Remote
Hardware and
Software
Tracking
Non-Volatile
Storage
TamperResistant
Agents
Allows remote
management
of platforms
regardless of
power on/off
state or OS
state
Significantly
reduces deskside visits,
increasing the
efficiency of IT
technical staff
Decreases
downtime and
minimizes
time-to-repair
Eliminates timeconsuming
manual inventory
tracking and
human error,
reducing asset
accounting costs
and increasing
tracking accuracy
Survives
power outages
and system
rebuilds
Prevents users
from removing
critical
inventory,
remote-control,
or virusprotection
agents
2006 Lenovo
PC Architecture (TXW102)
February 2007
35
Remote Troubleshooting and Recovery Significantly reduces desk-side visits, increasing the
efficiency of IT technical staff
Proactive Alerting Decreases downtime and minimizes time-to-repair
Remote Hardware and Software Tracking Eliminates time-consuming manual inventory tracking
and human error, reducing asset accounting costs and increasing tracking accuracy
Non-Volatile Storage Survives power outages and system rebuilds
Tamper-Resistant Agents Prevents users from removing critical inventory, remote-control, or virusprotection agents
Physical implementation of Intel Active Management Technology utilizes hardware and firmware on
the platform's systemboard. Platform auxiliary power maintains this technology's features even when
the platform is turned off.
1
IT Management Console
System problem
occurs
em
st
y
S
wn
do
Problem alert to IT
Remote reboot from IT
management console
Corporate Network
To appreciate the importance of the OOB management feature, consider the case where a network
platform's OS becomes non-operational, as shown in the image above. In the traditional IT
environment, the end user calls the IT department to report the problem. An IT technician is then sent to
assess and fix the problem, hopefully in a single desk-side visit or two. On platforms using this new
technology, problems with a non-operational OS can be quickly and efficiently resolvedpossibly even
avertedwithout any desk-side visits. The following sequence explains how:
Proactive alerting reports platform deficiencies, such as an inoperable OS, to the IT management
console. The proactive alerting feature of this new technology uses OOB communication, which is
not handled by the OS. As a result, the inoperable OS cannot stop the alert from being sent. The IT
management console receives the alert about the inoperable OS, and the console operator knows what
has happened, precluding the need for a desk-side visit.
Remote booting allows the console operator to take control of the crashed platform by remotely
booting it to an IT diagnostic platform. At this point, the console operator uses existing management
software to assess and fix the inoperable OS. This could include reinstallation of the IT-approved OS
and patches from the IT management platform, eliminating the requirement of a desk-side visit.
Remote management uses third-party IT management tools that work through a uniform networkconnected application programming interface (API) provided by Intel Active Management
Technology.
PC Architecture (TXW102)
February 2007
36
The image below shows how a corporate IT department can use Intel Active Management Technology
to inventory platform asset information stored in non-volatile, always-available memory. This alwaysavailable memory allows the IT department to continue tracking platform inventory in any system state.
Because it is non-volatile and tamper resistant, asset inventory information cannot be removed,
intentionally or inadvertently, from platforms, and it survives OS rebuilds. This allows more efficient
control and use of network platforms, reducing the number of unidentifiable platforms on the intranet.
1
IT Management Console
2
1
2
1
Corporate Network
PC Architecture (TXW102)
February 2007
37
Industry Standards:
Intel Viiv Technology
Intel brand name for PCs designed for digital entertainment in the home
PCs that meet specific criteria (hardware and software) receive this
branding
Features:
- Instant on/off
- Simple navigation via remote control
- Smaller and quieter systems
Over 100 companies offer content services and products with Viiv logo
Lenovo does not have any products utilizing this branding
2006 Lenovo
PC Architecture (TXW102)
February 2007
38
Industry Standards:
Intel vPro Technology
Intel brand name for management of corporate desktop PCs
Desktop PCs that meet specific criteria (hardware and software)
receive this branding
Features:
- Diagnose, reboot, and repair desktops down-the-wire
- Agent presence checking
- Remote asset inventory
- Security virtualization
2006 Lenovo
PC Architecture (TXW102)
February 2007
39
Benchmarks
Understand benchmark objective:
either application throughput or
subsystem performance
Examples include:
- BAPCo
SYSmark 2004 SE
- MobileMark 2005
- 3DMark05 and 3DMark06
Lenovo ThinkCentre A60
- SPEC CPU2000
PC performance
doubles every
two years.
2006 Lenovo
Benchmarks
The following is a short list of benchmarks and the systems they measure.
Overall performance:
SYSmark 2004 SE - SYSmark includes office productivity and Internet content creation
benchmark tests. The two scores are combined and given a weighted average to produce an
overall performance rating. Both SYSmark tests derive scores by using real-world
applications to run a preset script of user-driven workloads and usage models developed by
application experts.
The SYSmark 2004 SE Internet Content Creation test is organized as scenarios that are
designed to simulate an Internet content creators day. This benchmark incorporates such
applications as Adobe Photoshop 7.01, Discreet 3ds max 5.0, and Macromedia
Dreamweaver MX.
The SYSmark 2004 SE Office Productivity test follows ICCs blueprint by mimicking the
usage patterns of todays desktop and mobile business users, including the concurrent
execution of multiple programs. Applications such as Adobe Acrobat 5.0.5, McAfee
VirusScan 7.0, and the Microsoft Office suite are used. Each SYSmark test measures the
response time of the application to user input. Both scores are combined using a geometric
mean to get an overall score.
PC Architecture (TXW102)
February 2007
40
PC Architecture (TXW102)
February 2007
41
Security Issues:
Client Security Solution
ThinkVantage software (Client Security Solution) offers
unique advantages
PC Architecture (TXW102)
February 2007
42
New Features
Active Directory support for seamless configuration and management support
Completely new and easier to use password manager with broader browser support, autorecognize/fill, and per-site security policies
Multi-factor support and policy manager for improved security
Updated fingerprint reader software with integrated tutorial
ThinkVantage Client Security Solution helps turn your computer into a highly protected vault.
Available preloaded or by download for all ThinkPad notebooks and ThinkCentre desktops, it
provides advanced technology for user authentication plus enhanced security for wired and
wireless networking.
To further enhance security, select ThinkPad and ThinkCentre systems also include an
embedded Trusted Platform Module (TPM). ThinkVantage Client Security Solution works in
conjunction with this chip to manage encryption keys and processes.
The TPM itself is isolated from the operating system using patented tamper-resistant
technology. To initialize the TPM, users or administrators simply download the Client Security
Solution and run a single setup wizard to install the software and create a set of master
encryption keys.
With new Active Directory integration, IT administrators gain significant flexibility and control
over how CSS works in the customer environment. From logon to password manager, IT gets
tremendous flexibility to deploy and enforce policies and customization options.
Security made easy
The Client Security Software wizard helps simplify installation and setup and includes a set of
predefined security settings, allowing you to select the best suited to your needs. For enterprise
customers, script-driven silent installations can facilitate large deployments and are
complemented by the ability to push policies to clients from a central server.
Simplify passwords: The Client Security Password Manager replaces multiple passwords with
one easy-to-remember password or fingerprint (requires an optional fingerprint reader
device), thereby reducing password reset calls to the help desk.
Reset forgotten passwords: Users can pre-configure personal questions for this purpose. If the
user later forgets his Power On password, Hard Drive password or Windows password, he
can click a button, answer his pre-configured personal questions and CSS will reset his
forgotten password, require a new password, and enable the user to log on.
Simplify encryption: "On-the-fly" file and folder encryption saves you time by automatically
encrypting files and helping to protect data from unauthorized access.
PC Architecture (TXW102)
February 2007
43
Flexible security
Client Security Solution supports the use of a password, a passphrase or a fingerprint as
authentication credentials for access to protected data. Where central management is an
important requirement, Client Security Solution can be integrated into a Windows Domain
Services management model. If very sensitive data must be protected on a PC, the customer can
create policies that force multi-factor authentication and can integrate Client Security Solution
with best-of-breed data encryption solutions.
Client Security Solution includes Utimaco Private Disk Personal Edition so users can
automatically lock valuable data with file and folder encryption. The size of the "disk volume"
to be encrypted can be set by IT staff or controlled by the user. Only verified users can unlock
the encrypted data, so sensitive information is better protected should a computer be stolen. For
users interested in protecting all the data on their computer, full hard drive encryption is also
available from Lenovo with Utimaco SafeGuard Easy. (Availability varies by country.)
Enhanced security for both wired and wireless
Client Security Solution provides enhanced security for both wired and wireless networks. In
both cases, the Client Security Solution and TPM ensure data confidentiality and availability by
providing a hardware- and software-based architecture to provide better protection for sensitive
keys, identity information and confidential data. Further, for wireless networks, the TPM
hardware provides enhanced authentication and session confidentiality by concealing
authentication credentials for industry-standard 802.1x protocols and Cisco LEAP.
Advanced protection for your digital identity
By requiring an advanced means of authentication for your systemwhat you know (a
passcode), what you have (using optional solutions such as a token) or who you are (biometric
scan, such as a fingerprint)you can help keep your digital identity and data more secure. The
Client Security Solution and TPM store and enable user authentication through integrated
hardware rather than in the software or memory, both of which are more vulnerable to
unauthorized users. It also provides additional protection for digital IDs used for e-business
transactions and network access.
The ThinkVantage Client Security Solution is certified RSA SecurID-ready for remote access
protection, and can function as an RSA SecurID authenticator. As a result, mobile users can
employ cost-efficient SecurID software tokens and carry one less piece of equipment on the
roadwithout sacrificing security or budget.
PC Architecture (TXW102)
February 2007
44
Security chip was a separate module from Atmel that plugged into
systemboard
PC Architecture (TXW102)
February 2007
45
Security chip was a separate module from Atmel mainly used in ThinkPad T3x
systems that plugged into systemboard
Security chip was soldered to systemboard and was a module from Atmel
mainly used in select ThinkPad notebooks such as the T40/T41/T42 systems
PC Architecture (TXW102)
February 2007
46
Security chip was soldered to systemboard and was a module from Atmel
mainly used in select ThinkPad notebooks such as the T60/X60/Z60 systems
PC Architecture (TXW102)
February 2007
47
User ID
Password
TPM
chip
abcdefg
Disk
*******
Encrypted Files
Smart-card
reader
Fingerprint and smart-card readers
can be used in addition to the TPM for
an additional security layer.
Fingerprint reader
TPM
chip
TPM chip
Encrypted files
PC Architecture (TXW102)
February 2007
48
Multiple login IDs and passwords cause users to On-chip, protected storage of secrets reduces
be careless; store secrets without protecting
user burden; enables secure single sign-on;
them; use weak protections
ensures strong protections
Storage of IDs and passwords in easily copied
files; use of one set of secrets for access to all
systems
PC Architecture (TXW102)
February 2007
49
Security Issues:
Integrated Fingerprint Reader
Fingerprint image can replace:
- Power-on password
- Supervisor password
PC Architecture (TXW102)
February 2007
50
The format of the reader is called a slide sensor. In order to get a reading, you must slide, drag, or
swipe your finger across the reader. The slide sensor takes sequential snapshots of your finger as it
slides over the surface. It then stitches those snapshots together to form a fingerprint image that can
be as large as or even larger than the image taken by a contact sensor.
The advantages of a slide over a contact are as follows:
The slide can make a larger image of the finger being read. This means the matcher software has
more data to analyze and is therefore less likely to make a mistake.
The slide is only 20% of the size of a contact sensor. The much smaller footprint of the slide
sensor compared to the contact sensor is a key feature in terms of ergonomic and engineering
considerations around placement of the device.
PC Architecture (TXW102)
February 2007
51
PC Architecture (TXW102)
February 2007
52
Fingerprint Hardware
ThinkPad BIOS
Trusted Platform
Module
Fingerprint Sensor
ThinkPad T42
PC Architecture (TXW102)
February 2007
53
Summary:
Computer Hardware Architecture
Notebooks, desktops, PC Blades, and
servers are different types of computers
with unique features.
PC Architecture (TXW102)
February 2007
54
Computer Measurements
Bit (b): on charge or off charge (0 or 1)
Byte (B): eight bits (a character/number represented by a byte)
Kilobyte (2^10): one thousand bytes (KB): 1,024
Megabyte (2^20): one million bytes (MB): 1,048,576
Gigabyte (2^30): one billion bytes (GB): 1,073,741,824
Terabyte (2^40): one trillion bytes (TB): 1,099,511,627,776
Petabyte (2^50): one quadrillion bytes (PB): 1,125,899,906,842,624
Exabyte (2^60): 1,000 petabytes (EB): 1,152,921,504,606,846,976
Zettabyte (2^70): 1,000 exabytes (ZB): 1,180,591,620,717,411,303,424
Yottabyte (2^80): 1,000 zettabytes (YB): 1,208,925,819,614,629,174,706,176
Millisecond: one thousandth of a second (ms): 1/1,000
Microsecond: one millionth of a second (us): 1/1,000,000
Nanosecond: one billionth of a second (ns): 1/1,000,000,000
Picosecond: one trillionth of a second (ps): 1/1,000,000,000,000
Megahertz: millions of cycles per second (MHz)
Gigahertz: billions of cycles per second (GHz); 1GHz=1,000 MHz
PC Architecture (TXW102)
February 2007
55
PC Architecture (TXW102)
February 2007
56
Speeds
bps
KB/s
Mb/s
MB/s
Gb/s
GB/s
=
=
=
=
=
=
Some magazines (like PC Magazine) measure in megabytes (1,024 bytes squared, or 1,048,576).
For rough conversion, subtract five million from every hundred million bytes. For example, 720
million bytes is 687 megabytes.
Speeds for connectivity are normally measured in bits (bits per second). Speeds for transfers
within a PC (like across PC buses) are normally measured in bytes (bytes per second).
5 MB/s
AT Bus (ISA)
132 MB/s
528 MB/s
66 MHz at 64-bit
800 MB/s
1,064 MB/s
1,200 MB/s
1,600 MB/s
1,600 MB/s
3,200 MB/s
3,200 MB/s
4,200 MB/s
6,400 MB/s
6,400 MB/s
For each 20 degrees Celsius-increase in operating temperature, electronic component life drops in
half.
A billion bits is equivalent to 62,500 double-spaced typewriter pages--enough paper to stack 21
feet high.
0.15 micron is 1/600 the width of one human hair.
Logic circuits are used to process information; memory circuits store information.
PC Architecture (TXW102)
February 2007
57
Network Speeds
Data Rate
Average Usable
Throughput
10 Mb/s
5 Mb/s
Power-line (HomePlug)
14 Mb/s
5 Mb/s
54 Mb/s
25 Mb/s
Pre-802.11n
108 Mb/s
50 Mb/s
Fast Ethernet
100 Mb/s
60 Mb/s
1,000 Mb/s
600 Mb/s
Gigabit Ethernet
Average Required
Throughput
Applications
Video
Uncompressed full-motion video stream
1,000-2,000 Mb/s
Compressed HDTV
18 Mb/s
7-15 Mb/s
Audio
Radio-quality MP3 or WMA stream
64 Kb/s
128 Kb/s
640 Kb/s
Other
VolP traffic
64 Kb/s
1-256 Kb/s
E-mail traffic
30-100 Kb/s
Broadband Types
Business cable
Business DSL
Fractional T1
Wired MAN
Wireless MAN
2-5 Mb/s
384-768 Kb/s
10 Mb/s-1 Gb/s
symmetrical
Pros
Inexpensive
Inexpensive
Reliable
Fast, costeffective
No cabling, instant
installation
Cons
Shared media,
limited bandwidth
Limited bandwidth
Expensive
Limited
availability
Limited availability
Speed
(download/
upload)
PC Architecture (TXW102)
February 2007
58
Review Quiz
Objective 1
1. What type of system would market its wireless capability, weight, and docking station support?
a. Notebook
b. Desktop
c. Server
d. Information appliance
2. What type of system would most likely market its systems management support, chipset, and
graphics performance?
a. Notebook
b. Desktop
c. PC Blade
d. Information appliance
3. The ThinkPad brand name is associated with what type of computer system?
a. PDA
b. Notebook
c. Desktop
d. Server
4. Rescue and Recovery, Access Connections, and Productivity Center are from what strategic
Lenovo offering?
a. ThinkVantage Technologies
b. ThinkVision monitors
c. ImageUltra Builder
d. System Migration Assistant
Objective 2
5. A device driver is an interface between what subsystems?
a. The applications and BIOS
b. Hardware and the operating system
c. The operating system and the BIOS
d. An API and the standard hardware
6. What layer is between the physical hardware and the operating system and allows for software
compatibility?
a. Applications programming interface
b. Device driver
c. Operating system
d. BIOS
PC Architecture (TXW102)
February 2007
59
7. What circuitry controls the methods, manner, and speed in which a subsystem is accessed?
a. Controller
b. Keyboard
c. VLSI logic
d. Device driver
8. Most transfers of data between subsystems involve which buses?
a. Data bus
b. Data and address bus
c. Data, address, and control bus
d. Data, address, control, and tag bus
Objective 3
9. What is the name of the architecture for implementing audio, modem, and communications
functionality after AC 97?
a. Intel High Definition Audio (Intel HD Audio)
b. I/O Controller Hub 6 (ICH6)
c. Unified Audio Architecture (UAA)
d. Dolby Digital
10. What is an important characteristic of a performance benchmark?
a. Understanding if it measures a subsystem or application throughput
b. The benchmark needs to incorporate Java
c. Benchmark must include MPEG-2 encoding
d. The PCI bus must be enabled
11. What is the Intel brand name for PCs designed for digital entertainment in the home?
a. Intel High Definition Audio (Intel HD Audio)
b. Intel Viiv Technology
c. Intel vPro Technology
d. Intel Advanced Digital Media Boost
12. What is the Intel brand name for management of corporate desktop PCs?
a. Intel High Definition Audio (Intel HD Audio)
b. Intel Viiv Technology
c. Intel vPro Technology
d. Intel Advanced Digital Media Boost
PC Architecture (TXW102)
February 2007
60
Objective 4
13. What single device can be used to replace the power-on password, supervisor password, hard
drive password, and Windows password?
a. Optical drive
b. Digital certificate
c. Integrated fingerprint reader
d. Encryption key
PC Architecture (TXW102)
February 2007
61
Answers
Objective 1
1. A
2. B
3. B
4. A
Objective 2
5. B
6. D
7. A
8. C
Objective 3
9. A
10. A
11. B
12. C
Objective 4
13. C
PC Architecture (TXW102)
February 2007
62