Online shopping for ROBOTCS Kit Websites

Friday, 20 September 2013
Read more ...

ROBOTICS - How to start ???

Saturday, 24 August 2013
      
On the most basic level, human beings are made up of five major components:
  • A body structure
  • A muscle system to move the body structure
  • A sensory system that receives information about the body and the surrounding environment
  • A power source to activate the muscles and sensors
  • A brain system that processes sensory information and tells the muscles what to do
Of course, we also have some intangible attributes, such as intelligence and morality, but on the sheer physical level, the list above about covers it.
A robot is made up of the very same components. A typical robot has a movable physical structure, a motor of some sort, a sensor system, a power supply and a computer "brain" that controls all of these elements. Essentially, robots are man-made versions of animal life -- they are machines that replicate human and animal behavior.
In this article, we'll explore the basic concept of robotics and find out how robots do what they do.
Joseph Engelberger, a pioneer in industrial robotics, once remarked "I can't define a robot, but I know one when I see one." If you consider all the different machines people call robots, you can see that it's nearly impossible to come up with a comprehensive definition. Everybody has a different idea of what constitutes a robot.
You've probably heard of several of these famous robots:
  • R2D2 and C-3PO: The intelligent, speaking robots with loads of personality in the "Star Wars" movies
  • Sony's AIBO: A robotic dog that learns through human interaction
  • Honda's ASIMO: A robot that can walk on two legs like a person
  • Industrial robots: Automated machines that work on assembly lines
  • Data: The almost human android from "Star Trek"
  • BattleBots: The remote control fighters on Comedy Central
  • Bomb-defusing robots
  • NASA's Mars rovers
  • HAL: The ship's computer in Stanley Kubrick's "2001: A Space Odyssey"
  • Robomower: The lawn-mowing robot from Friendly Robotics
  • The Robot in the television series "Lost in Space"
  • MindStorms: LEGO's popular robotics kit
All of these things are considered robots, at least by some people. The broadest definition around defines a robot as anything that a lot of people recognize as a robot. Most roboticists (people who build robots) use a more precise definition. They specify that robots have a reprogrammable brain (a computer) that moves a body.­
By this definition, robots are distinct from other movable machines, such as cars, because of their computer element. Many new cars do have an onboard computer, but it's only there to make small adjustments. You control most elements in the car directly by way of various mechanical devices. Robots are distinct from ordinary computers in their physical nature -- normal computers don't have a physical body attached to them.
In the next section, we'll look at the major elements found in most robots today.


Robot Basics

The vast majority of robots do have several qualities in common. First of all, almost all robots have a movable body. Some only have motorized wheels, and others have dozens of movable segments, typically made of metal or plastic. Like the bones in your body, the individual segments are connected together with joints.
Robots spin wheels and pivot jointed segments with some sort of actuator. Some robots use electric motors and solenoids as actuators; some use a hydraulic system; and some use a pneumatic system (a system driven by compressed gases). Robots may use all these actuator types.
A robot needs a power source to drive these actuators. Most robots either have a battery or they plug into the wall. Hydraulic robots also need a pump to pressurize the hydraulic fluid, and pneumatic robots need an air compressor or compressed air tanks.
The actuators are all wired to an electrical circuit. The circuit powers electrical motors and solenoids directly, and it activates the hydraulic system by manipulating electrical valves. The valves determine the pressurized fluid's path through the machine. To move a hydraulic leg, for example, the robot's controller would open the valve leading from the fluid pump to a piston cylinder attached to that leg. The pressurized fluid would extend the piston, swiveling the leg forward. Typically, in order to move their segments in two directions, robots use pistons that can push both ways.



The robot's computer controls everything attached to the circuit. To move the robot, the computer switches on all the necessary motors and valves. Most robots are reprogrammable -- to change the robot's behavior, you simply write a new program to its computer.
Not all robots have sensory systems, and few have the ability to see, hear, smell or taste. The most common robotic sense is the sense of movement -- the robot's ability to monitor its own motion. A standard design uses slotted wheels attached to the robot's joints. An LED on one side of the wheel shines a beam of light through the slots to a light sensor on the other side of the wheel. When the robot moves a particular joint, the slotted wheel turns. The slots break the light beam as the wheel spins. The light sensor reads the pattern of the flashing light and transmits the data to the computer. The computer can tell exactly how far the joint has swiveled based on this pattern. This is the same basic system used in computer mice.
These are the basic nuts and bolts of robotics. Roboticists can combine these elements in an infinite number of ways to create robots of unlimited complexity. In the next section, we'll look at one of the most popular designs, the robotic arm.


The Robotic Arm

 

The term robot comes from the Czech word robota, generally translated as "forced labor." This describes the majority of robots fairly well. Most robots in the world are designed for heavy, repetitive manufacturing work. They handle tasks that are difficult, dangerous or boring to human beings.
The most common manufacturing robot is the robotic arm. A typical robotic arm is made up of seven metal segments, joined by six joints. The computer controls the robot by rotating individual step motors connected to each joint (some larger arms use hydraulics or pneumatics). Unlike ordinary motors, step motors move in exact increments (check out Anaheim Automation to find out how). This allows the computer to move the arm very precisely, repeating exactly the same movement over and over again. The robot uses motion sensors to make sure it moves just the right amount.
An industrial robot with six joints closely resembles a human arm -- it has the equivalent of a shoulder, an elbow and a wrist. Typically, the shoulder is mounted to a stationary base structure rather than to a movable body. This type of robot has six degrees of freedom, meaning it can pivot in six different ways. A human arm, by comparison, has seven degrees of freedom.


Your arm's job is to move your hand from place to place. Similarly, the robotic arm's job is to move an end effector from place to place. You can outfit robotic arms with all sorts of end effectors, which are suited to a particular application. One common end effector is a simplified version of the hand, which can grasp and carry different objects. Robotic hands often have built-in pressure sensors that tell the computer how hard the robot is gripping a particular object. This keeps the robot from dropping or breaking whatever it's carrying. Other end effectors include blowtorches, drills and spray painters.
Industrial robots are designed to do exactly the same thing, in a controlled environment, over and over again. For example, a robot might twist the caps onto peanut butter jars coming down an assembly line. To teach a robot how to do its job, the programmer guides the arm through the motions using a handheld controller. The robot stores the exact sequence of movements in its memory, and does it again and again every time a new unit comes down the assembly line.
Most industrial robots work in auto assembly lines, putting cars together. Robots can do a lot of this work more efficiently than human beings because they are so precise. They always drill in the exactly the same place, and they always tighten bolts with the same amount of force, no matter how many hours they've been working. Manufacturing robots are also very important in the computer industry. It takes an incredibly precise hand to put together a tiny microchip.

Mobile Robots

 

Robotic arms are relatively easy to build and program because they only operate within a confined area. Things get a bit trickier when you send a robot out into the world.
The first obstacle is to give the robot a working locomotion system. If the robot will only need to move over smooth ground, wheels or tracks are the best option. Wheels and tracks can also work on rougher terrain if they are big enough. But robot designers often look to legs instead, because they are more adaptable. Building legged robots also helps researchers understand natural locomotion -- it's a useful exercise in biological research.

Typically, hydraulic or pneumatic pistons move robot legs back and forth. The pistons attach to different leg segments just like muscles attach to different bones. It's a real trick getting all these pistons to work together properly. As a baby, your brain had to figure out exactly the right combination of muscle contractions to walk upright without falling over. Similarly, a robot designer has to figure out the right combination of piston movements involved in walking and program this information into the robot's computer. Many mobile robots have a built-in balance system (a collection of gyroscopes, for example) that tells the computer when it needs to correct its movements.



Bipedal locomotion (walking on two legs) is inherently unstable, which makes it very difficult to implement in robots. To create more stable robot walkers, designers commonly look to the animal world, specifically insects. Six-legged insects have exceptionally good balance, and they adapt well to a wide variety of terrain.
Some mobile robots are controlled by remote -- a human tells them what to do and when to do it. The remote control might communicate with the robot through an attached wire, or using radio or infrared signals. Remote robots, often called puppet robots, are useful for exploring dangerous or inaccessible environments, such as the deep sea or inside a volcano. Some robots are only partially controlled by remote. For example, the operator might direct the robot to go to a certain spot, but not steer it there -- the robot would find its own way.


Autonomous Robots

 

Autonomous robots can act on their own, independent of any controller. The basic idea is to program the robot to respond a certain way to outside stimuli. The very simple bump-and-go robot is a good illustration of how this works.
This sort of robot has a bumper sensor to detect obstacles. When you turn the robot on, it zips along in a straight line. When it finally hits an obstacle, the impact pushes in its bumper sensor. The robot's programming tells it to back up, turn to the right and move forward again, in response to every bump. In this way, the robot changes direction any time it encounters an obstacle.
Advanced robots use more elaborate versions of this same idea. Roboticists create new programs and sensor systems to make robots smarter and more perceptive. Today, robots can effectively navigate a variety of environments.
Simpler mobile robots use infrared or ultrasound sensors to see obstacles. These sensors work the same way as animal echolocation: The robot sends out a sound signal or a beam of infrared light and detects the signal's reflection. The robot locates the distance to obstacles based on how long it takes the signal to bounce back.


More advanced robots use stereo vision to see the world around them. Two cameras give these robots depth perception, and image-recognition software gives them the ability to locate and classify various objects. Robots might also use microphones and smell sensors to analyze the world around them.
Some autonomous robots can only work in a familiar, constrained environment. Lawn-mowing robots, for example, depend on buried border markers to define the limits of their yard. An office-cleaning robot might need a map of the building in order to maneuver from point to point.
More advanced robots can analyze and adapt to unfamiliar environments, even to areas with rough terrain. These robots may associate certain terrain patterns with certain actions. A rover robot, for example, might construct a map of the land in front of it based on its visual sensors. If the map shows a very bumpy terrain pattern, the robot knows to travel another way. This sort of system is very useful for exploratory robots that operate on other planets (check out JPL Robotics to learn more).
An alternative robot design takes a less structured approach -- randomness. When this type of robot gets stuck, it moves its appendages every which way until something works. Force sensors work very closely with the actuators, instead of the computer directing everything based on a program. This is something like an ant trying to get over an obstacle -- it doesn't seem to make a decision when it needs to get over an obstacle, it just keeps trying things until it gets over it.

Read more ...

How Computer Keyboards Work?

Thursday, 15 August 2013


When you look at all the extras and options that are available for new computer keyboards, it can be hard to believe that their original design came from mechanical typewriters that didn't even use electricity. Now, you can buy ergonomic keyboards that bear little resemblance to flat, rectangular models with ordinary square keys. Some flashier models light up, roll up or fold up, and others offer options for programming your own commands and shortcuts.
But no matter how many bells and whistles they offer, most keyboards operate using similar technology. They use switches and circuits to translate a person's keystrokes into a signal a computer can understand. In this article we will explore keyboard technology along with different key layouts, options and designs.

Keyboard Basics

 

A keyboard's primary function is to act as an input device. Using a keyboard, a person can type a document, use keystroke shortcuts, access menus, play games and perform a variety of other tasks. Keyboards can have different keys depending on the manufacturer, the operating system they're designed for, and whether they are attached to a desktop computer or part of a laptop. But for the most part, these keys, also called keycaps, are the same size and shape from keyboard to keyboard. They're also placed at a similar distance from one another in a similar pattern, no matter what language or alphabet the keys represent.
Most keyboards have between 80 and 110 keys, including:
  • Typing keys
  • A numeric keypad
  • Function keys
  • Control keys
The typing keys include the letters of the alphabet, generally laid out in the same pattern used for typewriters. According to legend, this layout, known as QWERTY for its first six letters, helped keep mechanical typewriters' metal arms from colliding and jamming as people typed. Some people question this story -- whether it's true or not, the QWERTY pattern had long been a standard by the time computer keyboards came around.
Keyboards can also use a variety of other typing key arrangements. The most widely known is Dvorak, named for its creator, August Dvorak. The Dvorak layout places all of the vowels on the left side of the keyboard and the most common consonants on the right. The most commonly used letters are all found along the home row. The home row is the main row where you place your fingers when you begin typing. People who prefer the Dvorak layout say it increases their typing speed and reduces fatigue. Other layouts include ABCDE, XPeRT, QWERTZ and AZERTY. Each is named for the first keys in the pattern. The QWERTZ and AZERTY arrangements are commonly used in Europe.
The numeric keypad is a more recent addition to the computer keyboard. As the use of computers in business environments increased, so did the need for speedy data entry. Since a large part of the data was numbers, a set of 17 keys, arranged in the same configuration found on adding machines and calculators, was added to the keyboard.
The Apple keyboard's control keys include the "Command" key.
In 1986, IBM further extended the basic keyboard with the addition of function and control keys. Applications and operating systems can assign specific commands to the function keys. Control keys provide cursor and screen control. Four arrow keys arranged in an inverted T formation between the typing keys and numeric keypad move the cursor on the screen in small increments.
Other common control keys include:




  • Home
  • End
  • Insert
  • Delete
  • Page Up
  • Page Down
  • Control (Ctrl)
  • Alternate (Alt)
  • Escape (Esc)
The Windows keyboard adds some extra control keys: two Windows or Start keys, and an Application key. Apple keyboards, on the other hand, have Command (also known as "Apple") keys. A keyboard developed for Linux users features Linux-specific hot keys, including one marked with "Tux" the penguin -- the Linux logo/mascot.


Inside the Keyboard

 

A keyboard is a lot like a miniature computer. It has its own processor and circuitry that carries information to and from that processor. A large part of this circuitry makes up the key matrix.
The key matrix is a grid of circuits underneath the keys. In all keyboards (except for capacitive models, which we'll discuss in the next section), each circuit is broken at a point below each key. When you press a key, it presses a switch, completing the circuit and allowing a tiny amount of current to flow through. The mechanical action of the switch causes some vibration, called bounce, which the processor filters out. If you press and hold a key, the processor recognizes it as the equivalent of pressing a key repeatedly.
When the processor finds a circuit that is closed, it compares the location of that circuit on the key matrix to the character map in its read-only memory (ROM). A character map is basically a comparison chart or lookup table. It tells the processor the position of each key in the matrix and what each keystroke or combination of keystrokes represents. For example, the character map lets the processor know that pressing the a key by itself corresponds to a small letter "a," but the Shift and a keys pressed together correspond to a capital "A."
The key matrix
A computer can also use separate character maps, overriding the one found in the keyboard. This can be useful if a person is typing in a language that uses letters that don't have English equivalents on a keyboard with English letters. People can also set their computers to interpret their keystrokes as though they were typing on a Dvorak keyboard even though their actual keys are arranged in a QWERTY layout. In addition, operating systems and applications have keyboard accessibility settings that let people change their keyboard's behavior to adapt to disabilities.

Keyboard Switches

Keyboards use a variety of switch technologies. Capacitive switches are considered to be non-mechanical because they do not physically complete a circuit like most other keyboard technologies. Instead, current constantly flows through all parts of the key matrix. Each key is spring-loaded and has a tiny plate attached to the bottom of it. When you press a key, it moves this plate closer to the plate below it. As the two plates move closer together, the amount of current flowing through the matrix changes. The processor detects the change and interprets it as a key press for that location. Capacitive switch keyboards are expensive, but they have a longer life than any other keyboard. Also, they do not have problems with bounce since the two surfaces never come into actual contact.
All of the other types of switches used in keyboards are mechanical in nature. Each provides a different level of audible and tactile response -- the sounds and sensations that typing creates. Mechanical key switches include:
  • Rubber dome
  • Membrane
  • Metal contact
  • Foam element
This keyboard uses rubber dome switches.
Rubber dome switches are very common. They use small, flexible rubber domes, each with a hard carbon center. When you press a key, a plunger on the bottom of the key pushes down against the dome, and the carbon center presses against a hard, flat surface beneath the key matrix. As long as the key is held, the carbon center completes the circuit. When the key is released, the rubber dome springs back to its original shape, forcing the key back up to its at-rest position. Rubber dome switch keyboards are inexpensive, have pretty good tactile response and are fairly resistant to spills and corrosion because of the rubber layer covering the key matrix.
Rather than having a switch for each key, membrane keyboards use a continuous membrane that stretches from one end to another. A pattern printed in the membrane completes the circuit when you press a key. Some membrane keyboards use a flat surface printed with representations of each key rather than keycaps. Membrane keyboards don't have good tactile response, and without additional mechanical components they don't make the clicking sound that some people like to hear when they're typing. However, they're generally inexpensive to make.

mmon. Metal contact switches simply have a spring-loaded key with a strip of metal on the bottom of the plunger. When the key is pressed, the metal strip connects the two parts of the circuit. The foam element switch is basically the same design but with a small piece of spongy foam between the bottom of the plunger and the metal strip, providing a better tactile response. Both technologies have good tactile response, make satisfyingly audible "clicks," and are inexpensive to produce. The problem is that the contacts tend to wear out or corrode faster than on keyboards that use other technologies. Also, there is no barrier that prevents dust or liquids from coming in direct contact with the circuitry of the key matrix.
Different manufacturers have used these standard technologies, and a few others, to create a wide range of non-traditional keyboards. We'll take a look at some of these non-traditional keyboards in the next section.

Read more ...

How MAGLEV Trains Work?

Wednesday, 14 August 2013


Magnetic levitated trains are abbreviated to maglev trains. Maglev trains do not have engine to pull the train cars rather they use the basic principles of electromagnets.
What are electromagnets?
Any current carrying conductor (e.g. wire) has a magnetic field around it. It loses its magnetism when the current is turned OFF. Electromagnet is a coil of wire. It is usually wound on an iron core with many turns lying side by side. This is done because; the strength of the magnetic force produced depends on
  • the number of turns of the coil
  • the amount of current.
Hence more the no of turns more is the magnetic field. The poles of the electromagnet can be changed by changing the direction of the current.

What are maglev trains?
Maglev trains are trains which are suspended, guided and propelled (moved forward) by magnetic forces. The track of the maglev train is called the guide-way. Working of the maglev trains can be studied under the following
  • Levitation
  • Propulsion
  • Guidance
Levitation

            Maglev trains have no contacts with the rails while they move forward. They are levitated on the guide-way with the help of magnetic forces. Levitation is the process by which an object is suspended against gravity in a stable position without any physical contact.
Magnetic levitation is used based on the property (1) that “The force between two magnetic bodies is directly proportional to their magnetic moments and indirectly proportional to the square of the distance between them”. Hence, while the magnetic levitation is designed, the major factor to be considered is the distance between the train and the guide-way.
There are two types of levitation used in maglev trains namely
  • Electro Magnetic Suspension (EMS)
  • Electro Dynamic Suspension (EDS)
Electro Magnetic Suspension (EMS)

            Like poles repel each other and unlike poles attract. This is the basic principle used in EMS. The electromagnets are placed under the train and in the guide-way. The electromagnet on the guide-way repels with the magnets under the train and hence the train levitates. The levitating gap is kept as small as possible to have greater magnetic forces according to the property (1) discussed earlier. The levitating gap is usually 10mm with passengers onboard. While the train is moving, the electromagnets are magnetized and when the train has to be stopped, just the current is turned off to demagnetize the magnets. The train stops and rests on the guide-way closing the gap.
The magnets are placed in the form of C under the train. The  repulsive force acts on all the three edges of the C-shape and helps in better levitation.
The major factor to be considered while designing the magnetic strength is the earth’s gravity. As already mentioned, the magnetic strength depends on the amount of current. Hence, to make the train levitate against the gravitational pull, large current is required to create a strong repulsive magnetic force. Study shows that to maintain a gap of 50.8 mm 50,000 ampere turns of magnetic strength has to be supplied.
Magnetic intensity (strength) = N × I
Where,
N – Number of turns of the coil
I – amount of current
Hence, to maintain a gap of 50.8mm in a coil with 1000 turns (assumption) 50 amperes of current has to be supplied.
The train moves at a speed of 400 km/hr. The maintenance of a very small levitating gap at higher speed using EMS is challenging. The monitoring and control of the gap is very difficult at higher speed. Hence, higher speeds cannot be achieved in this design.
 Electro Dynamic Suspension (EDS)
EDS was discovered by Japanese while EMS by Germans. By using EDS, much higher speeds can be attained. The fastest train running in the world uses EDS principle and runs at a speed of 581km/hr. However the train has to be run on wheels till it gains a speed of 100 km/hr, only after which it can be levitated. In this system the track is called inductrack.
Electro dynamic suspension system has electromagnets on the train. The inductrack has an array of electrically shorted circuits (coils connected in series from the start of the track till the end). According to Faraday’s law of electromagnetic induction, whenever there is a change of flux linked with the coil, an emf (current) is induced in the coil. When the train starts to move on its wheels, the magnetic flux linked with the coils in the inductrack changes and hence an emf (current) is induced in the coils. As already discussed, every current carrying conductor has a magnetic field around it. Hence, there is a magnetic field developed around the coils in the inductrack. This magnetic field opposes its cause i.e. the magnetic field in the train (by Lenz’s law – when a current is induced in a conductor it is in such a way to oppose the cause). Therefore, a repulsive force is produced between the magnetic field of the train and the track and the train levitates.
The electromagnets in the train are superconducting electromagnets. Superconductors are materials whose resistivity (Resistivity is how much a material opposes the flow of current) becomes zero when they are cooled to critical temperature. Critical temperature is the temperature at which the matter has no distinction in its states. For e.g. at critical temperature of nitrogen, nitrogen is neither a gas nor a liquid, but has both the characteristics of gas and liquid. Superconducting electromagnets are used as the coils of these electromagnets can carry huge amount of current as the resistivity is almost zero. Hence, the magnetic force is higher and hence higher speed is achieved.
Here, as the power is supplied only to the electromagnets in the train, this system consumes less power compared to EMS system. In EDS system the levitation gap is 10 cm. Though the distance between the two magnetic bodies is larger, the magnetic force produced is huge because of the use of superconducting magnets. Therefore, this system does not require any control and monitoring of the levitating gap.
 Propulsion

Propulsion is moving the train forward. To propel the vehicle, the electromagnets are placed on the sides of the guide-way.  They are energized according to the time when the train reaches that particular spot and are de-energized the rest of the time.





In figure, the train is pushed due to repulsion of south poles and is pulled due to attraction of poles. So the train moves forward. Now the next set of pole comes into action and thereby a continuous motion is produced.

 Guidance

The propulsion coils are used for guidance. The propulsion coils are placed on the left and right side of the guide-way.
Emf is induced in the coils when the train is moving, the same principle on which EDS works. The coils are connected and hence the emf on either side of the train are opposite in direction. Hence, they cancel out each other. Thus the  train moves in the centre of the guide-way. When the train deviates from its centre position i.e. when it moves towards one of the walls, one of the emf is greater than the other and the resultant emf directly depends on the difference in distance. As, there is an emf, a resultant magnetic force is also produced. Hence, the magnetic force due to emf depends on the difference in distance. This resultant magnetic force called the guiding force pushes the train to the same distance and thereby putting in the centre.
Maglev trains are mainly used for transportation in china, japan, germany,etc. It is still not used by many countries. This article has just briefed the basic principles and working of the maglev trains.  Maglev trains are the best example of the modern transport means.
If solar panels are installed above the guide-way all the way along in maglev trains, they can also help in saving world resources!

for more informatin click here

Read more ...

How Ceiling Fans Work?

Wednesday, 14 August 2013

You certainly appreciate it keeping your rooms cool in during the summer heat? But do you know how your ceiling fan works? We take a look inside the breeze machine.


Installing a ceiling fan is easy, according to how-to videos and breezy online tutorials. But these instructions assume that an electrical box rated to hang 70 pounds of fan is just sitting in the ceiling, mounted to a joist on bolts strong enough for chin-ups. Sorry, but unless you’re replacing an existing fan, that box isn’t in place yet.

What is there, most likely, is a basic lighting fixture connected to someone else’s electrical work—a pile of wiry pigtails bearing a strong resemblance to a can of worms. Replacing it involves clearing out a wrist-size hole and then reaching back in to mount a metal box, clamp the wires and secure their connections, all while never once getting a clear look at what you’re doing. Now, many amateurs can hang a pot rack or an overhead planter, and most can wire a receptacle, but few can do both at the same time. If the project gets unmanageable, a licensed electrician can finish the job for around $175.

Once the box is in, the work really is easy, and a lifetime of cool breezes is within reach. 


Dust in the Wind


Fan blades attract dander, dust mites and more. Antidust products keep a fan clean, but do they bust the dust better than a wet rag? We polished a filthy old fan and a brand-new one to test four common options.


1 Endust Worked well, but an ingredient list heavy with petroleum seemed like overkill for a dirty fan.

2 Pledge Broke up thick crud with a pleasing lemon scent. Shiny, clean finish.

3 Swiffer Too flimsy for the filthy fan, but its crimped fibers found dust on the new blades.

4 Wet Rag Elbow grease and dish soap did the trick on both fans.

The Bottom Line Chemical cleaners work, but soap is cheap—and safe for skin contact.

3 Sounds of Fan Failure


Squeaking A series of squeaks suggests a loose screw. Tighten fasteners connecting the canopy, the blades and the globe.

Clicking Clicking indicates a bearing gone bad. It happens. The bearing (or motor) may be replaceable. Ask the manufacturer.

Wah-Wah It's over. This magnetic noise signals defective internal motor components, a problem in cheap fans. Replace the fan. 
 Induction motors use a rotating magnetic field to move machinery. Nikola Tesla demonstrated the technology in such devices as 1893’s Egg of Columbus. Early motors operated at a single speed; semiconductors made them more practical by enabling variable-speed operation.

1 Wires Conductors carry electrical current to sets of copper coils called windings.

2 Windings Wrapped around steel bars, or laminations, energized windings form an electromagnet called a stator.

3 Stator Fluctuating polarity creates a rotating magnetic field in the stator. The field crosses a 0.3-mm gap to induce a current in laminations in the rotor, which spins around the stationary stator.

4 Rotor The angle at which the stator faces the rotor, the physical distance between the two, and the geometry of slots carved into each set of laminations combine to create two out-of-phase magnetic fields. The rotor spins because it repels the rotating magnetic field induced by the stator.

5 Housing The motor housing envelops the rotor as it revolves on bearings around the stator. In the design shown here, known as an inside-out motor, fan blades attach to the housing bottom. Vents on top cool the motor—it needs a breeze, too.

Blade Geometry


Blade Tilt Most blades tilt between 12 and 14 degrees off horizontal. Decorative blades, such as textured palm fronds, can tilt up to 20 degrees.

Fan RPM Fans on low speed revolve 40 to 70 times per minute. Medium speeds range from 100 to 115, and high speeds hit 180 to 200.

Blade Count A high blade count cannibalizes airflow per blade, according to manufacturer Fanimation's John Moody. "Looking strictly at what moves the air most efficiently, three blades are best," he says.

Rotation Rule Blades tilt so that a counterclockwise rotation pushes air downward to cool a room. Reverse the rotation, and blades draw air upward to circulate the hot air hugging the ceiling without creating a direct draft into the room. Here's the rule: Go clockwise in cold weather.

Ideal Blade Length Per Room Size
 

For more information click here





Read more ...

How does the Internet work?

Saturday, 10 August 2013



Even though the Internet is still a young technology, it's hard to imagine life without it now. Every year, engineers create more devices to integrate with the Internet. This network of networks crisscrosses the globe and even extends into space. But what makes it work?
To understand the Internet, it helps to look at it as a system with two main components. The first of those components is hardware. That includes everything from the cables that carry terabits of information every second to the computer sitting in front of you.
Other types of hardware that support the Internet include routers, servers, cell phone towers, satellites, radios, smartphones and other devices. All these devices together create the network of networks. The Internet is a malleable system -- it changes in little ways as elements join and leave networks around the world. Some of those elements may stay fairly static and make up the backbone of the Internet. Others are more peripheral.
These elements are connections. Some are end points -- the computer, smartphone or other device you're using to read this may count as one. We call those end points clients. Machines that store the information we seek on the Internet are servers. Other elements are nodes which serve as a connecting point along a route of traffic. And then there are the transmission lines which can be physical, as in the case of cables and fiber optics, or they can be wireless signals from satellites, cell phone or 4G towers, or radios.
All of this hardware wouldn't create a network without the second component of the Internet: the protocols. Protocols are sets of rules that machines follow to complete tasks. Without a common set of protocols that all machines connected to the Internet must follow, communication between devices couldn't happen. The various machines would be unable to understand one another or even send information in a meaningful way. The protocols provide both the method and a common language for machines to use to transmit data.
We'll take a closer look at protocols and how information travels across the Internet on the next page.

A Matter of Protocols

 

 

You've probably heard of several protocols on the Internet. For example, hypertext transfer protocol is what we use to view Web sites through a browser -- that's what the http at the front of any Web address stands for. If you've ever used an FTP server, you relied on the file transfer protocol. Protocols like these and dozens more create the framework within which all devices must operate to be part of the Internet.
Two of the most important protocols are the transmission control protocol (TCP) and the Internet protocol (IP). We often group the two together -- in most discussions about Internet protocols you'll see them listed as TCP/IP.
What do these protocols do? At their most basic level, these protocols establish the rules for how information passes through the Internet. Without these rules, you would need direct connections to other computers to access the information they hold. You'd also need both your computer and the target computer to understand a common language.
You've probably heard of IP addresses. These addresses follow the Internet protocol. Each device connected to the Internet has an IP address. This is how one machine can find another through the massive network.
The version of IP most of us use today is IPv4, which is based on a 32-bit address system. There's one big problem with this system: We're running out of addresses. That's why the Internet Engineering Task Force (IETF) decided back in 1991 that it was necessary to develop a new version of IP to create enough addresses to meet demand. The result was IPv6, a 128-bit address system. That's enough addresses to accommodate the rising demand for Internet access for the foreseeable future [source: Opus One].
When you want to send a message or retrieve information from another computer, the TCP/IP protocols are what make the transmission possible. Your request goes out over the network, hitting domain name servers (DNS) along the way to find the target server. The DNS points the request in the right direction. Once the target server receives the request, it can send a response back to your computer. The data might travel a completely different path to get back to you. This flexible approach to data transfer is part of what makes the Internet such a powerful tool.
Let's take a closer look at how information travels across the Internet.



Packet, Packet, Who's Got the Packet?

 

 

 

In order to retrieve this article, your computer had to connect with the Web server containing the article's file. We'll use that as an example of how data travels across the Internet.
First, you open your Web browser and connect to our Web site. When you do this, your computer sends an electronic request over your Internet connection to your Internet service provider (ISP). The ISP routes the request to a server further up the chain on the Internet. Eventually, the request will hit a domain name server (DNS).
This server will look for a match for the domain name you've typed in (such as www.howstuffworks.com). If it finds a match, it will direct your request to the proper server's IP address. If it doesn't find a match, it will send the request further up the chain to a server that has more information.
The request will eventually come to our Web server. Our server will respond by sending the requested file in a series of packets. Packets are parts of a file that range between 1,000 and 1,500 bytes. Packets have headers and footers that tell computers what's in the packet and how the information fits with other packets to create an entire file. Each packet travels back up the network and down to your computer. Packets don't necessarily all take the same path -- they'll generally travel the path of least resistance.
That's an important feature. Because packets can travel multiple paths to get to their destination, it's possible for information to route around congested areas on the Internet. In fact, as long as some connections remain, entire sections of the Internet could go down and information could still travel from one section to another -- though it might take longer than normal.
When the packets get to you, your device arranges them according to the rules of the protocols. It's kind of like putting together a jigsaw puzzle. The end result is that you see this article.
This holds true for other kinds of files as well. When you send an e-mail, it gets broken into packets before zooming across the Internet. Phone calls over the Internet also convert conversations into packets using the voice over Internet protocol (VoIP). We can thank network pioneers like Vinton Cerf and Robert Kahn for these protocols -- their early work helped build a system that's both scalable and robust.
That's how the Internet works in a nutshell. As you look closer at the various devices and protocols, you'll notice that the picture is far more complex than the overview we've given. It's a fascinating subject -- learn more by following the links on the next page.


 For more information click here

Read more ...

How Bluetooth Works?

Saturday, 10 August 2013


When you use computers, entertainment systems or telephones, the various pieces and parts of the systems make up a community of electronic devices. These devices communicate with each other using a variety of wires, cables, radio signals and infrared light beams, and an even greater variety of connectors, plugs and protocols.
There are lots of different ways that electronic devices can connect to one another. For example:
  • Component cables
  • Electrical wires
  • Ethernet cables
  • ­WiFi
  • Infrared signals
­­The art of connecting things is becoming more and more complex every day. In this article, we will look at a method of connecting devices, called Bluetooth, that can streamline the process. A Bluetooth connection is wireless and automatic, and it has a number of interesting features that can simplify our daily lives.

­­The Problem

When any two devices need to talk to each other, they have to agree on a number of points before the conversation can begin. The first point of agreement is physical: Will they talk over wires, or through some form of wireless signals? If they use wires, how many are required -- one, two, eight, 25? Once the physical attributes are decided, several more questions arise:
  • How much data will be sent at a time? For instance, serial ports send data 1 bit at a time, whil­e parallel ports send several bits at once.
  • How will they speak to each other? All of the parties in an electronic discussion need to know what the bits mean and whether the message they receive is the same message that was sent. This means developing a set of commands and responses known as a protocol.
Bluetooth offers a solution to the problem.

How Bluetooth Creates a Connection


 

­Bluetooth takes small-area networking to the next level by removing the need for user intervention and keeping transmission power extremely low to save battery power. Picture this: You're on your Bluetooth-enabled cell phone, standing outside the door to your house. You tell the person on the other end of the line to call you back in five minutes so you can get in the house and put your stuff away. As soon as you walk in the house, the map you received on your cell phone from your car's Bluetooth-enabled GPS system is automatically sent to your Bluetooth-enabled computer, because your cell phone picked up a Bluetooth signal from your PC and automatically sent the data you designated for transfer. Five minutes later, when your friend calls you back, your Bluetooth-enabled home phone rings instead of your cell phone. The person called the same number, but your home phone picked up the Bluetooth signal from your cell phone and automatically re-routed the call because it realized you were home. And each transmission signal to and from your cell phone consumes just 1 milliwatt of power, so your cell phone charge is virtually unaffected by all of this activity.
Bluetooth is essentially a networking standard that works at two levels:
  • It provides agreement at the physical level -- Bluetooth is a radio-frequency standard.
  • It provides agreement at the protocol level, where products have to agree on when bits are sent, how many will be sent at a time, and how the parties in a conversation can be sure that the message received is the same as the message sent.
The big draws of Bluetooth are that it is wireless, inexpensive and automatic. There are other ways to get around using wires, including infrared communication. Infrared (IR) refers to light waves of a lower frequency than human eyes can receive and interpret. Infrared is used in most television remote control systems. Infrared communications are fairly reliable and don't cost very much to build into a device, but there are a couple of drawbacks. First, infrared is a "line of sight" technology. For example, you have to point the remote control at the television or DVD player to make things happen. The second drawback is that infrared is almost always a "one to one" technology. You can send data between your desktop computer and your laptop computer, but not your laptop computer and your PDA at the same time. (See How Remote Controls Work to learn more about infrared communication.)
These two qualities of infrared are actually advantageous in some regards. Because infrared transmitters and receivers have to be lined up with each other, interference between devices is uncommon. The one-to-one nature of infrared communications is useful in that you can make sure a message goes only to the intended recipient, even in a room full of infrared receivers.
Bluetooth is intended to get around the problems that come with infrared systems. The older Bluetooth 1.0 standard has a maximum transfer speed of 1 megabit per second (Mbps), while Bluetooth 2.0 can manage up to 3 Mbps. Bluetooth 2.0 is backward-compatible with 1.0 devices.
Let's find out how Bluetooth networking works.


How Bluetooth Operates

Bluetooth networking transmits data via low-power radio waves. It communicates on a frequency of 2.45 gigahertz (actually between 2.402 GHz and 2.480 GHz, to be exact). This frequency band has been set aside by international agreement for the use of industrial, scientific and medical devices (ISM).
A number of devices that you may already use take advantage of this same radio-frequency band. Baby monitors, garage-door openers and the newest generation of cordless phones all make use of frequencies in the ISM band. Making sure that Bluetooth and these other devices don't interfere with one another has been a crucial part of the design process.
One of the ways Bluetooth devices avoid interfering with other systems is by sending out very weak signals of about 1 milliwatt. By comparison, the most powerful cell phones can transmit a signal of 3 watts. The low power limits the range of a Bluetooth device to about 10 meters (32 feet), cutting the chances of interference between your computer system and your portable telephone or television. Even with the low power, Bluetooth doesn't require line of sight between communicating devices. The walls in your house won't stop a Bluetooth signal, making the standard useful for controlling several devices in different rooms.
Bluetooth can connect up to eight devices simultaneously. With all of those devices in the same 10-meter (32-foot) radius, you might think they'd interfere with one another, but it's unlikely. Bluetooth uses a technique called spread-spectrum frequency hopping that makes it rare for more than one device to be transmitting on the same frequency at the same time. In this technique, a device will use 79 individual, randomly chosen frequencies within a designated range, changing from one to another on a regular basis. In the case of Bluetooth, the transmitters change frequencies 1,600 times every second, meaning that more devices can make full use of a limited slice of the radio spectrum. Since every Bluetooth transmitter uses spread-spectrum transmitting automatically, it’s unlikely that two transmitters will be on the same frequency at the same time. This same technique minimizes the risk that portable phones or baby monitors will disrupt Bluetooth devices, since any interference on a particular frequency will last only a tiny fraction of a second.
When Bluetooth-capable devices come within range of one another, an electronic conversation takes place to determine whether they have data to share or whether one needs to control the other. The user doesn't have to press a button or give a command -- the electronic conversation happens automatically. Once the conversation has occurred, the devices -- whether they're part of a computer system or a stereo -- form a network. Bluetooth systems create a personal-area network (PAN), or piconet, that may fill a room or may encompass no more distance than that between the cell phone on a belt-clip and the headset on your head. Once a piconet is established, the members randomly hop frequencies in unison so they stay in touch with one another and avoid other piconets that may be operating in the same room. Let's check out an example of a Bluetooth-connected system.



Bluetooth Piconets

Let's say you have a typical modern living room with typical modern stuff inside. There's an entertainment system with a stereo, a DVD player, a satellite TV receiver and a television; there's also a cordless telephone and a personal computer. Each of these systems uses Bluetooth, and each forms its own piconet to talk between the main unit and peripheral.
The cordless telephone has one Bluetooth transmitter in the base and another in the handset. The manufacturer has programmed each unit with an address that falls into a range of addresses it has established for a particular type of device. When the base is first turned on, it sends radio signals asking for a response from any units with an address in a particular range. Since the handset has an address in the range, it responds, and a tiny network is formed. Now, even if one of these devices should receive a signal from another system, it will ignore it since it's not from within the network. The computer and entertainment system go through similar routines, establishing networks among addresses in ranges established by manufacturers. Once the networks are established, the systems begin talking among themselves. Each piconet hops randomly through the available frequencies, so all of the piconets are completely separated from one another.
Now the living room has three separate networks established, each one made up of devices that know the address of transmitters it should listen to and the address of receivers it should talk to. Since each network is changing the frequency of its operation thousands of times a second, it's unlikely that any two networks will be on the same frequency at the same time. If it turns out that they are, then the resulting confusion will only cover a tiny fraction of a second, and software designed to correct for such errors weeds out the confusing information and gets on with the network's business.

Bluetooth Security

In any wireless networking setup, security is a concern. Devices can easily grab radio waves out of the air, so people who send sensitive information over a wireless connection need to take precautions to make sure those signals aren't intercepted. Bluetooth technology is no different -- it's wireless and therefore susceptible to spying and remote access, just like WiFi is susceptible if the network isn't secure. With Bluetooth, though, the automatic nature of the connection, which is a huge benefit in terms of time and effort, is also a benefit to people looking to send you data without your permission.
Bluetooth offers several security modes, and device manufacturers determine which mode to include in a Bluetooth-enabled gadget. In almost all cases, Bluetooth users can establish "trusted devices" that can exchange data without asking permission. When any other device tries to establish a connection to the user's gadget, the user has to decide to allow it. Service-level security and device-level security work together to protect Bluetooth devices from unauthorized data transmission. Security methods include authorization and identification procedures that limit the use of Bluetooth services to the registered user and require that users make a conscious decision to open a file or accept a data transfer. As long as these measures are enabled on the user's phone or other device, unauthorized access is unlikely. A user can also simply switch his Bluetooth mode to "non-discoverable" and avoid connecting with other Bluetooth devices entirely. If a user makes use of the Bluetooth network primarily for synching devices at home, this might be a good way to avoid any chance of a security breach while in public.
Still, early cell-phone virus writers have taken advantage of Bluetooth's automated connection process to send out infected files. However, since most cell phones use a secure Bluetooth connection that requires authorization and authentication before accepting data from an unknown device, the infected file typically doesn't get very far. When the virus arrives in the user's cell phone, the user has to agree to open it and then agree to install it. This has, so far, stopped most cell-phone viruses from doing much damage. See How Cell-phone Viruses Work to learn more.
Other problems like "bluejacking," "bluebugging" and "Car Whisperer" have turned up as Bluetooth-specific security issues. Bluejacking involves Bluetooth users sending a business card (just a text message, really) to other Bluetooth users within a 10-meter (32-foot) radius. If the user doesn't realize what the message is, he might allow the contact to be added to his address book, and the contact can send him messages that might be automatically opened because they're coming from a known contact. Bluebugging is more of a problem, because it allows hackers to remotely access a user's phone and use its features, including placing calls and sending text messages, and the user doesn't realize it's happening. The Car Whisperer is a piece of software that allows hackers to send audio to and receive audio from a Bluetooth-enabled car stereo. Like a computer security hole, these vulnerabilities are an inevitable result of technological innovation, and device manufacturers are releasing firmware upgrades that address new problems as they arise.
If communications security is a concern of yours, then click here to learn how phone conferencing security works. To learn more about Bluetooth security issues and solutions, see Bluetooth.com: Wireless Security.
For more information on Bluetooth and related topics, including full Bluetooth specifications, check out the links on the next page.

for more infrmation click here


Read more ...

How Microprocessors Work ?

Saturday, 10 August 2013
The computer you are using to read this page uses a microprocessor to do its work. The microprocessor is the heart of any normal computer, whether it is a desktop machine, a server or a laptop. The microprocessor you are using might be a Pentium, a K6, a PowerPC, a Sparc or any of the many other brands and types of microprocessors, but they all do approximately the same thing in approximately the same way.
A microprocessor -- also known as a CPU or central processing unit -- is a complete computation engine that is fabricated on a single chip. The first microprocessor was the Intel 4004, introduced in 1971. The 4004 was not very powerful -- all it could do was add and subtract, and it could only do that 4 bits at a time. But it was amazing that everything was on one chip. Prior to the 4004, engineers built computers either from collections of chips or from discrete components (transistors wired one at a time). The 4004 powered one of the first portable electronic calculators.
­ If you have ever wondered what the microprocessor in your computer is doing, or if you have ever wondered about the differences between types of microprocessors, then read on. In this article, you will learn how fairly simple digital logic techniques allow a computer to do its job, whether its playing a game or spell checking a document!

Microprocessor Progression: Intel

The first microprocessor to make it into a home computer was the Intel 8080, a complete 8-bit computer on one chip, introduced in 1974. The first microprocessor to make a real splash in the market was the Intel 8088, introduced in 1979 and incorporated into the IBM PC (which first appeared around 1982). If you are familiar with the PC market and its history, you know that the PC market moved from the 8088 to the 80286 to the 80386 to the 80486 to the Pentium to the Pentium II to the Pentium III to the Pentium 4. All of these microprocessors are made by Intel and all of them are improvements on the basic design of the 8088. The Pentium 4 can execute any piece of code that ran on the original 8088, but it does it about 5,000 times faster!
Since 2004, Intel has introduced microprocessors with multiple cores and millions more transistors. But even these microprocessors follow the same general rules as earlier chips.

Here are the differences between the different processors that Intel has introduced over the years.
Compiled from The Intel Microprocessor Quick Reference Guide and TSCP Benchmark Scores
Additional information about the table on this page:
  • The date is the year that the processor was first introduced. Many processors are re-introduced at higher clock speeds for many years after the original release date.
  • Transistors is the number of transistors on the chip. You can see that the number of transistors on a single chip has risen steadily over the years.
  • Microns is the width, in microns, of the smallest wire on the chip. For comparison, a human hair is 100 microns thick. As the feature size on the chip goes down, the number of transistors rises.
  • Clock speed is the maximum rate that the chip can be clocked at. Clock speed will make more sense in the next section.
  • Data Width is the width of the ALU. An 8-bit ALU can add/subtract/multiply/etc. two 8-bit numbers, while a 32-bit ALU can manipulate 32-bit numbers. An 8-bit ALU would have to execute four instructions to add two 32-bit numbers, while a 32-bit ALU can do it in one instruction. In many cases, the external data bus is the same width as the ALU, but not always. The 8088 had a 16-bit ALU and an 8-bit bus, while the modern Pentiums fetch data 64 bits at a time for their 32-bit ALUs.
  • MIPS stands for "millions of instructions per second" and is a rough measure of the performance of a CPU. Modern CPUs can do so many different things that MIPS ratings lose a lot of their meaning, but you can get a general sense of the relative power of the CPUs from this column.
From this table you can see that, in general, there is a relationship between clock speed and MIPS. The maximum clock speed is a function of the manufacturing process and delays within the chip. There is also a relationship between the number of transistors and MIPS. For example, the 8088 clocked at 5 MHz but only executed at 0.33 MIPS (about one instruction per 15 clock cycles). Modern processors can often execute at a rate of two instructions per clock cycle. That improvement is directly related to the number of transistors on the chip and will make more sense in the next section.

Microprocessor Logic

To understand how a microprocessor works, it is helpful to look inside and learn about the logic used to create one. In the process you can also learn about assembly language -- the native language of a microprocessor -- and many of the things that engineers can do to boost the speed of a processor.
A microprocessor executes a collection of machine instructions that tell the processor what to do. Based on the instructions, a microprocessor does three basic things:
  • Using its ALU (Arithmetic/Logic Unit), a microprocessor can perform mathematical operations like addition, subtraction, multiplication and division. Modern microprocessors contain complete floating point processors that can perform extremely sophisticated operations on large floating point numbers.
  • A microprocessor can move data from one memory location to another.
  • A microprocessor can make decisions and jump to a new set of instructions based on those decisions.
There may be very sophisticated things that a microprocessor does, but those are its three basic activities. The following diagram shows an extremely simple microprocessor capable of doing those three things:

This is about as simple as a microprocessor gets. This microprocessor has:
  • An address bus (that may be 8, 16 or 32 bits wide) that sends an address to memory
  • A data bus (that may be 8, 16 or 32 bits wide) that can send data to memory or receive data from memory
  • An RD (read) and WR (write) line to tell the memory whether it wants to set or get the addressed location
  • A clock line that lets a clock pulse sequence the processor
  • A reset line that resets the program counter to zero (or whatever) and restarts execution
Let's assume that both the address and data buses are 8 bits wide in this example.
Here are the components of this simple microprocessor:
  • Registers A, B and C are simply latches made out of flip-flops. (See the section on "edge-triggered latches" in How Boolean Logic Works for details.)
  • The address latch is just like registers A, B and C.
  • The program counter is a latch with the extra ability to increment by 1 when told to do so, and also to reset to zero when told to do so.
  • The ALU could be as simple as an 8-bit adder (see the section on adders in How Boolean Logic Works for details), or it might be able to add, subtract, multiply and divide 8-bit values. Let's assume the latter here.
  • The test register is a special latch that can hold values from comparisons performed in the ALU. An ALU can normally compare two numbers and determine if they are equal, if one is greater than the other, etc. The test register can also normally hold a carry bit from the last stage of the adder. It stores these values in flip-flops and then the instruction decoder can use the values to make decisions.
  • There are six boxes marked "3-State" in the diagram. These are tri-state buffers. A tri-state buffer can pass a 1, a 0 or it can essentially disconnect its output (imagine a switch that totally disconnects the output line from the wire that the output is heading toward). A tri-state buffer allows multiple outputs to connect to a wire, but only one of them to actually drive a 1 or a 0 onto the line.
  • The instruction register and instruction decoder are responsible for controlling all of the other components.
Although they are not shown in this diagram, there would be control lines from the instruction decoder that would:
  • Tell the A register to latch the value currently on the data bus
  • Tell the B register to latch the value currently on the data bus
  • Tell the C register to latch the value currently output by the ALU
  • Tell the program counter register to latch the value currently on the data bus
  • Tell the address register to latch the value currently on the data bus
  • Tell the instruction register to latch the value currently on the data bus
  • Tell the program counter to increment
  • Tell the program counter to reset to zero
  • Activate any of the six tri-state buffers (six separate lines)
  • Tell the ALU what operation to perform
  • Tell the test register to latch the ALU's test bits
  • Activate the RD line
  • Activate the WR line
Coming into the instruction decoder are the bits from the test register and the clock line, as well as the bits from the instruction register.

Microprocessor Memory

The previous section talked about the address and data buses, as well as the RD and WR lines. These buses and lines connect either to RAM or ROM -- generally both. In our sample microprocessor, we have an address bus 8 bits wide and a data bus 8 bits wide. That means that the microprocessor can address (28) 256 bytes of memory, and it can read or write 8 bits of the memory at a time. Let's assume that this simple microprocessor has 128 bytes of ROM starting at address 0 and 128 bytes of RAM starting at address 128.
ROM stands for read-only memory. A ROM chip is programmed with a permanent collection of pre-set bytes. The address bus tells the ROM chip which byte to get and place on the data bus. When the RD line changes state, the ROM chip presents the selected byte onto the data bus.
RAM stands for random-access memory. RAM contains bytes of information, and the microprocessor can read or write to those bytes depending on whether the RD or WR line is signaled. One problem with today's RAM chips is that they forget everything once the power goes off. That is why the computer needs ROM.

RAM chip
By the way, nearly all computers contain some amount of ROM (it is possible to create a simple computer that contains no RAM -- many microcontrollers do this by placing a handful of RAM bytes on the processor chip itself -- but generally impossible to create one that contains no ROM). On a PC, the ROM is called the BIOS (Basic Input/Output System). When the microprocessor starts, it begins executing instructions it finds in the BIOS. The BIOS instructions do things like test the hardware in the machine, and then it goes to the hard disk to fetch the boot sector (see How Hard Disks Work for details). This boot sector is another small program, and the BIOS stores it in RAM after reading it off the disk. The microprocessor then begins executing the boot sector's instructions from RAM. The boot sector program will tell the microprocessor to fetch something else from the hard disk into RAM, which the microprocessor then executes, and so on. This is how the microprocessor loads and executes the entire operating system.

Microprocessor Instructions

Even the incredibly simple microprocessor shown in the previous example will have a fairly large set of instructions that it can perform. The collection of instructions is implemented as bit patterns, each one of which has a different meaning when loaded into the instruction register. Humans are not particularly good at remembering bit patterns, so a set of short words are defined to represent the different bit patterns. This collection of words is called the assembly language of the processor. An assembler can translate the words into their bit patterns very easily, and then the output of the assembler is placed in memory for the microprocessor to execute.
Here's the set of assembly language instructions that the designer might create for the simple microprocessor in our example:
  • LOADA mem - Load register A from memory address
  • LOADB mem - Load register B from memory address
  • CONB con - Load a constant value into register B
  • SAVEB mem - Save register B to memory address
  • SAVEC mem - Save register C to memory address
  • ADD - Add A and B and store the result in C
  • SUB - Subtract A and B and store the result in C
  • MUL - Multiply A and B and store the result in C
  • DIV - Divide A and B and store the result in C
  • COM - Compare A and B and store the result in test
  • JUMP addr - Jump to an address
  • JEQ addr - Jump, if equal, to address
  • JNEQ addr - Jump, if not equal, to address
  • JG addr - Jump, if greater than, to address
  • JGE addr - Jump, if greater than or equal, to address
  • JL addr - Jump, if less than, to address
  • JLE addr - Jump, if less than or equal, to address
  • STOP - Stop execution
If you have read How C Programming Works, then you know that this simple piece of C code will calculate the factorial of 5 (where the factorial of 5 = 5! = 5 * 4 * 3 * 2 * 1 = 120):
a=1;f=1;while (a <= 5){ f = f * a; a = a + 1;}
At the end of the program's execution, the variable f contains the factorial of 5.

Assembly Language

A C compiler translates this C code into assembly language. Assuming that RAM starts at address 128 in this processor, and ROM (which contains the assembly language program) starts at address 0, then for our simple microprocessor the assembly language might look like this:
// Assume a is at address 128// Assume F is at address 1290 CONB 1 // a=1;1 SAVEB 1282 CONB 1 // f=1;3 SAVEB 1294 LOADA 128 // if a > 5 the jump to 175 CONB 56 COM7 JG 178 LOADA 129 // f=f*a;9 LOADB 12810 MUL11 SAVEC 12912 LOADA 128 // a=a+1;13 CONB 114 ADD15 SAVEC 12816 JUMP 4 // loop back to if17 STOP

ROM

So now the question is, "How do all of these instructions look in ROM?" Each of these assembly language instructions must be represented by a binary number. For the sake of simplicity, let's assume each assembly language instruction is given a unique number, like this:
  • LOADA - 1
  • LOADB - 2
  • CONB - 3
  • SAVEB - 4
  • SAVEC mem - 5
  • ADD - 6
  • SUB - 7
  • MUL - 8
  • DIV - 9
  • COM - 10
  • JUMP addr - 11
  • JEQ addr - 12
  • JNEQ addr - 13
  • JG addr - 14
  • JGE addr - 15
  • JL addr - 16
  • JLE addr - 17
  • STOP - 18
The numbers are known as opcodes. In ROM, our little program would look like this:
// Assume a is at address 128// Assume F is at address 129Addr opcode/value0 3 // CONB 11 12 4 // SAVEB 1283 1284 3 // CONB 15 16 4 // SAVEB 1297 1298 1 // LOADA 1289 12810 3 // CONB 511 512 10 // COM13 14 // JG 1714 3115 1 // LOADA 12916 12917 2 // LOADB 12818 12819 8 // MUL20 5 // SAVEC 12921 12922 1 // LOADA 12823 12824 3 // CONB 125 126 6 // ADD27 5 // SAVEC 12828 12829 11 // JUMP 430 831 18 // STOP
You can see that seven lines of C code became 18 lines of assembly language, and that became 32 bytes in ROM.

Decoding

The instruction decoder needs to turn each of the opcodes into a set of signals that drive the different components inside the microprocessor. Let's take the ADD instruction as an example and look at what it needs to do:
  1. During the first clock cycle, we need to actually load the instruction. Therefore the instruction decoder needs to: activate the tri-state buffer for the program counter activate the RD line activate the data-in tri-state buffer latch the instruction into the instruction register
  2. During the second clock cycle, the ADD instruction is decoded. It needs to do very little: set the operation of the ALU to addition latch the output of the ALU into the C register
  3. During the third clock cycle, the program counter is incremented (in theory this could be overlapped into the second clock cycle).
Every instruction can be broken down as a set of sequenced operations like these that manipulate the components of the microprocessor in the proper order. Some instructions, like this ADD instruction, might take two or three clock cycles. Others might take five or six clock cycles.

Microprocessor Performance and Trends

The number of transistors available has a huge effect on the performance of a processor. As seen earlier, a typical instruction in a processor like an 8088 took 15 clock cycles to execute. Because of the design of the multiplier, it took approximately 80 cycles just to do one 16-bit multiplication on the 8088. With more transistors, much more powerful multipliers capable of single-cycle speeds become possible.
More transistors also allow for a technology called pipelining. In a pipelined architecture, instruction execution overlaps. So even though it might take five clock cycles to execute each instruction, there can be five instructions in various stages of execution simultaneously. That way it looks like one instruction completes every clock cycle.
Many modern processors have multiple instruction decoders, each with its own pipeline. This allows for multiple instruction streams, which means that more than one instruction can complete during each clock cycle. This technique can be quite complex to implement, so it takes lots of transistors.

Trends

The trend in processor design has primarily been toward full 32-bit ALUs with fast floating point processors built in and pipelined execution with multiple instruction streams. The newest thing in processor design is 64-bit ALUs, and people are expected to have these processors in their home PCs in the next decade. There has also been a tendency toward special instructions (like the MMX instructions) that make certain operations particularly efficient, and the addition of hardware virtual memory support and L1 caching on the processor chip. All of these trends push up the transistor count, leading to the multi-million transistor powerhouses available today. These processors can execute about one billion instructions per second!


64-bit Microprocessors

Sixty-four-bit processors have been with us since 1992, and in the 21st century they have started to become mainstream. Both Intel and AMD have introduced 64-bit chips, and the Mac G5 sports a 64-bit processor. Sixty-four-bit processors have 64-bit ALUs, 64-bit registers, 64-bit buses and so on.
One reason why the world needs 64-bit processors is because of their enlarged address spaces. Thirty-two-bit chips are often constrained to a maximum of 2 GB or 4 GB of RAM access. That sounds like a lot, given that most home computers currently use only 256 MB to 512 MB of RAM. However, a 4-GB limit can be a severe problem for server machines and machines running large databases. And even home machines will start bumping up against the 2 GB or 4 GB limit pretty soon if current trends continue. A 64-bit chip has none of these constraints because a 64-bit RAM address space is essentially infinite for the foreseeable future -- 2^64 bytes of RAM is something on the order of a billion gigabytes of RAM.
With a 64-bit address bus and wide, high-speed data buses on the motherboard, 64-bit machines also offer faster I/O (input/output) speeds to things like hard disk drives and video cards. These features can greatly increase system performance.
Servers can definitely benefit from 64 bits, but what about normal users? Beyond the RAM solution, it is not clear that a 64-bit chip offers "normal users" any real, tangible benefits at the moment. They can process data (very complex data features lots of real numbers) faster. People doing video editing and people doing photographic editing on very large images benefit from this kind of computing power. High-end games will also benefit, once they are re-coded to take advantage of 64-bit features. But the average user who is reading e-mail, browsing the Web and editing Word documents is not really using the processor in that way.
For more information on microprocessors and related topics, check out the links on the next page.
Read more ...