txw102 pc architecture
TRANSCRIPT
-
8/10/2019 Txw102 PC Architecture
1/62PC Architecture (TXW102) 1February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
PC Architecture (TXW102)
Topic 1:Introduction to Computer HardwareArchitecture
-
8/10/2019 Txw102 PC Architecture
2/62
PC Architecture (TXW102) 2February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Objectives:Computer Hardware Architecture
Upon completion of this topic, you will be able to:
Identify two features to enhance computer security4.
Identify common industry standards and the objective of benchmarksused with computer systems
3.
Define various PC architecture terminology including computer layers,controllers, and buses
2.
Identify the types of computers and their key differentiating features1.
-
8/10/2019 Txw102 PC Architecture
3/62
PC Architecture (TXW102) 3February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Types and Features of Computers
- IBM System x- IBM BladeCenter
- Lenovo 3000- Lenovo ThinkCentre
- Lenovo 3000- Lenovo ThinkPad
BrandsBrandsBrands
- Tower- Rack- 1U rack- Blades
- Mini Desktop- Ultra Small- Small- Desktop- Tower- PC Blades
- Ultraportable (one spindle)- Full function (two spindles)- Desktop alternative(three spindles)
- Tablet
DesignsDesignsDesigns
- High security- Data processing and storage
- Non-mobile- Wired connection
- Mobile- Wireless
ServerDesktopNotebook
Types and Features of Computers
The three main types of computers (or PCs) are
Notebooks
Desktops Servers
-
8/10/2019 Txw102 PC Architecture
4/62
-
8/10/2019 Txw102 PC Architecture
5/62
-
8/10/2019 Txw102 PC Architecture
6/62
PC Architecture (TXW102) 6February 2007
Topic 1 - Introduction to Computer Hardware Architecture
Higher end desktop systems are commonly referred to as workstations. Workstations are often used
for graphics and engineering users. They may run a UNIX-based operating system instead of a
Microsoft Windows-based operating system.
Below is a comparison of PC workstations and UNIX workstations.
Servers
Servers are computers that provide services to other computers, called clients. Servers are in secure
areas because so many users are dependent on their function. They include file servers, print
servers, terminal servers, Web servers, e-mail servers, database servers, and computation servers.
Server designs include
Tower, which rests on the floor
Rack-based, which must be installed in a rack
1U rack-based, which is a 1U-high server that must be installed in a rack. 1U is equal to 1.75.
Server blades, which have server circuitry on a single board which slides into an enclosure with
other blades.
Note: Servers for racks vary in height by a U measurement (a U is 1.75-inch height). 1U servers
are popular for Web sites because for Web pages it is better to spread the load across multiple
servers (horizontal scalability) rather than to increase the processing power of a centralized server
(vertical scalability).
Difficult to manage; price prohibitivein some cases; Microsoft Officeapplications don't run natively
Still lags behind UNIX counterparts in3D graphics capabilities; largeapplications may overwhelm system
performance; lack of third-partygraphics applications
Weaknesses
Strong graphics; large number ofthird-party applications available forengineering and financial modeling;processor power to spare
Low price; familiar Windows interfaceand Windows applications runnatively; ease of manageability
Strengths
Minimum configuration of SunUltraSPARC or IBM PowerPCprocessor; more memory; higher-endgraphics
Minimum configuration of latest Intelprocessor; price starting around$2,000
BasicsUNIX WorkstationsPC Workstations
-
8/10/2019 Txw102 PC Architecture
7/62
PC Architecture (TXW102) 7February 2007
Topic 1 - Introduction to Computer Hardware Architecture
Differentiating Computer Features
Each type of computer has important characteristics that distinguish it from each other.
Key differentiating features of notebooks are size and weight, power management and battery,
screen type and size, integrated wireless, docking station or port replicator, number of spindles or
bays, modular bay(s), sales presentation capability, integrated wireless, Bluetooth, infrared, securitychip, and ThinkVantage Technologies.
Key differentiating features of desktops are fastest processor, graphics performance, 3D graphics
adapters, systems management, removable storage (DVDRW), chipset, security chip, and
ThinkVantage Technologies.
Key differentiating features of servers are support of many concurrent users (up to 1000s), multiple
processors, large memory capacity, large disk capacity (internal and external), redundant
components (disk, fans, power supplies, memory, etc.), hot-swap components to maximize uptime
(disk, fans, power supplies, memory, etc.), and Predictive Failure Analysis to warn the admin of
any impending failure.
2006 Lenovo
Types and Features of Computers:Differentiating Computer Features
- Support many concurrent users(up to 1000s)
- Multiple processors- Large memory capacity- Large disk capacity(internal and external)
- Redundant components (disk,fans, power supplies, memory,etc.)
- Hot-swap components tomaximize uptime (disk, fans,power supplies, memory, etc.)
- Predictive Failure Analysis towarn the admin of anyimpending failure
- Fastest processor- Graphics performance- 3D graphics adapters- Systems management- Removable storage (DVDRW)- Chipset- Security chip- ThinkVantage Technologies
- Size and weight- Power mgmt/battery- Screen type and size- Integrated wireless- Docking station or port replicator- Number of spindles or bays- Modular bay(s)- Sales presentation capability- Integrated wireless, Bluetooth,
infrared- Security chip- ThinkVantage Technologies
ServerDesktopNotebook
-
8/10/2019 Txw102 PC Architecture
8/62
PC Architecture (TXW102) 8February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Types and Features of Computers:PC Blades
User Ports
The ClearCube User Port connectscomputer peripherals like themonitor, keyboard, mouse, speakers,or USB peripherals to PC Blades atthe data center or telecom closet.
PC BladeThe PC Blade is each user's actualcomputer: a configurable, Intel-based PCBlade that delivers full functionality to thedesktop.
CageThe ClearCube Cage isa centralized chassis thathouses up to eight PC Blades.
ClearCube Management Suite
The ClearCube Management Suite empowersadministrators to manage the complete ClearCubeinfrastructure from any location. This powerful,remotely accessible suite includes a versatile set offeatures such as "hot spare" switching, movemanagement, and automatic data backup.
User Port
(C/Port)
Direct Connection
Ethernet
User Port (I/Port)
PC is removedfrom users deskand replaced witha small User Port
PC Blade is in arack in secure,centralized location
Lenovo resellsClearCube-brandedPC Blades andmanagementsoftware
PC Blades
PC Blades separate the guts of the PC from the physical desktop, putting processing power in data
centers and computer rooms. Employees then have only a monitor, keyboard and mouse on their
desks, along with a client appliance that is linked back to a blade server. PC blades offer a range of
benefits, including streamlined management and tighter security since all the hardware iscentralized. PC Blade configurations provide a dedicated blade to each user or a pool of blades that
can be dynamically allocated. In addition, spare blades can be used to provide hot backup to avoid
system outages.
PC Blade Advantages
Centralized asset management PC Blade hardware is centralized for easy access and asset
management.
Mission critical applications Blade infrastructure has high levels of redundancy; users can be
swapped to a functioning blade very quickly in case of hardware or software failure
Reduced support costs Hardware or software upgrades can be managed centrally in a fraction
of the time it would take to upgrade large numbers of dispersed PCs.
Multiple locations There is potential to support multiple locations with PC Blades by remotely
switching a user to a spare standby blade in the event of hardware failure (saving the cost of an
urgent engineer visit or keeping support staff on-site).
Reduced costs for new users It is lower cost to install and configure a new user with a PC
Blade than a desktop.
-
8/10/2019 Txw102 PC Architecture
9/62
PC Architecture (TXW102) 9February 2007
Topic 1 - Introduction to Computer Hardware Architecture
Easy relocation There are no significant costs when users move work location within a building.
Improved security The physical asset and intellectual property on the disk are centralized, e.g., it
is easier to steal a hard disk from a desktop than a PC Blade.
Reduced user down time Spare PC Blades can be configured to provide hot backup in case of
hardware failure. Improved appearance In front office environments, the clients user port has no moving parts,
generates no noise, produces little heat, and requires less space.
Remote access Users can access their own PC environment from multiple desks in the building
or from other remote locations with blade infrastructure installed
PC Blade Disadvantages
Higher acquisition cost Purchase price of PC Blade and its infrastructure is higher than a stand
alone PC.
No wireless mobility Mobile users or users who need to work away from their desks are notsupported.
Lagging technology PC Blade processors and technology may be six to 12 months behind
desktop technology.
Unsuitable for power graphics users.
New infrastructure Significant change to current PC deployment, maintenance, and support
(skills, tools and processes).
More difficult to plan and manage upgrades when customer has a mix of PC Blades and traditional
desktops.
Lack of local CD and DVD drives except USB devices which open security risks and asset controlissues.
User resistance for advanced/experienced PC users to losing access to 'their' PC.
Extra cost for redundancy Extra cost for closet spare (with cooling) to enable redundancy.
Technology lock in Little option to cascade or sell blades to other users or customers.
-
8/10/2019 Txw102 PC Architecture
10/62
PC Architecture (TXW102) 10February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
PC Blade
- PC Blade is located with otherPC Blades in a rack in centralizedlocation
- Intel processor, memory, disk, andgraphics on PC Blade
User Port
- Small client device that connects theusers monitor, keyboard, mouse,speakers, and USB devices to theirPC Blade
- No moving parts, generates no noise,and creates little heat
- Can support multiple monitors
Types and Features of Computers:ClearCube PC Blade Products
PC Blade (ClearCube R1300)
User Port (ClearCube C/Port)
ClearCube
ClearCube is a company that has offered PC Blades since 1997 and dominates the PC Blade
market. Lenovo resells ClearCube-branded PC Blades and management software.
See www.clearcube.com for more information.
-
8/10/2019 Txw102 PC Architecture
11/62
PC Architecture (TXW102) 11February 2007
Topic 1 - Introduction to Computer Hardware Architecture
ClearCube Products
A PC Blade solution from ClearCube require PC Blades, User Ports, Cage, BackPack, management
software, and optional accessories.
The ClearCube PC Blade is an Intel-based computer that delivers full PC functionality to the user
from a centralized location. The PC Blade is very compact and house all the standard PC componentsincluding an Intel processor, memory, disk drive, and graphics.
For the client desk, each user requires a ClearCube User Portwhich is a compact device that
connects the users monitor, keyboard, mouse, speakers, and USB devices to their PC Blade. The
User Port has no moving parts, generates no noise, and creates very little heat. ClearCube offers
several User Ports as follows:
C/Port The C/Port connects to a centralized PC Blade over standard Category 5 cabling up to 200
meters long. The C/Port is about the same size and weight as a VHS cassette tape.
Fiber C/Port The Fiber C/Port connects to a centrally located PC Blade over a point-to-point fiber
optic cable up to 500 meters long. Because stray electromagnetic emissions are eliminated, the
Fiber C/Port is ideally suited for ultra-secure environments.
Multi-Video Expander For demanding, multi-task environments, the Multi-Video Expander is a
C/Port accessory that can be matched with an NVIDIA mezzanine video card on the PC Blade to
drive up to four displays. By accommodating analog and digital input monitors in a variety of
physical configurations, the Multi-Video Expander is the perfect choice for hectic, cramped trading
floors.
I/Port The I/Port lets users connect to their PC Blades over a standard switched ethernet network.
By connecting over ethernet and leveraging thin client technology, the distance between a PC
Blade and the desktop can be unlimited.
ClearCube R1300 PC Blade
-
8/10/2019 Txw102 PC Architecture
12/62
PC Architecture (TXW102) 12February 2007
Topic 1 - Introduction to Computer Hardware Architecture
A ClearCube Cage is a 3U-high chassis which houses up to eight PC Blades. Each Cage is a self-
contained unit that provides all of the ethernet connections, airflow management, and power required
by the PC Blades. Up to 14 Cages (112 PC Blades) can be mounted in a standard 6 foot rack. A
BackPack connects directly to the back of each Cage, and PC Blades slide in the front.
The ClearCube Blade Switching BackPackis an interface that plugs into the rear of the Cage and
provides all of the external connections for the PC Blades. The BackPack contains the distance
extension circuitry that links each PC Blade to a User Port. The Blade Switching BackPack also
features a full 8x8 switching matrix and spare switching circuitry that controls the connections to
standard and Fiber C/Ports.
ClearCube C/Port (front)
ClearCube Cage
ClearCube Blade Switching BackPack
ClearCube C/Port (back)
ClearCube Cages in a rack
-
8/10/2019 Txw102 PC Architecture
13/62
PC Architecture (TXW102) 13February 2007
Topic 1 - Introduction to Computer Hardware Architecture
The ClearCube Management Suite (CMS) is a comprehensive set of software tools that work
together to give IT administrators unprecedented control over their computing assets. Inventory
management, automated health alerting, remote control, hard drive image management, data backup
and Blade switching are just some of the capabilities ClearCube offers. All of the CMS applications
can be accessed via secure web browser and can be integrated with industry-standard systems
management tools.
Layer 1: Industry standard components
Layer 2: ClearCube infrastructure
Layer 3: System management software
Blade ManagerSwitch Manager
Data Failover Move Manager
PC Blade
BackPackCageUser Port
ClearCube Management Suite
-
8/10/2019 Txw102 PC Architecture
14/62
PC Architecture (TXW102) 14February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Types and Features of Computers:Lenovo 3000 Desktops and Notebooks
Lenovo 3000 Desktops (J Series)
Lenovo 3000 Notebooks
TowerSmall Desktop
C200 15" Regular N100 14.1" Wide and 15.4" Wide V100 12" Wide
Lenovo 3000 Desktops and Notebooks
In February 2006, Lenovo introduced the 3000 Family of desktops and notebooks. The
following information shows the branding and positioning of the two product lines.
The Lenovo 3000 J100/J110 features Intel processors while the Lenovo 3000 J105/J115
features AMD processors.
The Lenovo 3000 notebooks are available in various screen sizes in both widescreen and
standard screen formats.
Visit lenovo.com/3000 for more information on the Lenovo 3000 Family of desktops and
notebooks.
Success, Prestige
Rock Solid
Lowest Total Costof Ownership
Worry-free
Great Value
Stylish Design
InnovativeHigh Quality and Reliability
Service Excellence
Small Business/Very Small BusinessLarge Enterprise/Mid-Market
Think Family(ThinkPad and ThinkCentre)The Ultimate Business Tool
Lenovo 3000 FamilyThe Smart Choice for
Small Business
Common Attributes
-
8/10/2019 Txw102 PC Architecture
15/62
PC Architecture (TXW102) 15February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Types and Features of Computers:Lenovo ThinkPad, ThinkCentre, and ThinkVision
Lenovo Think Family
ThinkVantage
TechnologiesThinkVantage
DesignThinkPlus
Accessoriesand Services
ThinkPad, ThinkCentre, and ThinkVision offerings will continue to differentiateLenovo from our competitors with
Quality, service, and support expected from Lenovo Industrial design that simplifies and enhances usability Open standards-based products that work well together Lenovo innovation that delivers key benefits for customers
Lenovo ThinkPad, ThinkCentre, and ThinkVision
The Lenovo Think-branded family of offerings includes the following brands:
ThinkPad Notebook category
ThinkCentre Desktop category ThinkVision Visuals category
ThinkVantage Technologies Solutions and offerings category
ThinkPlus Accessories Accessories and upgrades for Think products
ThinkPlus Services Services for Think offerings
An essential part of what makes a product a ThinkPad, ThinkCentre, or ThinkVision offering is
its industrial and graphic design. Lenovo calls this design approach ThinkVantage Design.
ThinkVantage Design is built upon the concept of synergistically joining form and function.
ThinkVantage Design provides value to the customer by providing meaningful innovation that
enhances the ownership experience. It also has its own design DNA based on the classic
ThinkPad design, which is its heritage.
Visit lenovo.com for more information on Lenovo brand offerings.
-
8/10/2019 Txw102 PC Architecture
16/62
PC Architecture (TXW102) 16February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Types and Features of Computers:ThinkVantage Technologies
System Migration AssistantMoves system settings and dataeasily from an old PC to a new PC
Software Delivery CenterAutomates delivery of applicationsoftware updates to PCs
ImageUltra BuilderConsolidates multiple softwareimages into one master image
Rescue and Recovery
Enables hassle-free recoveryof data and system image
Client Security SolutionSecures users PCs, data, andnetwork communications fromunauthorized access
Productivity CenterProvides users with access toself-help support tools andinformation with just one click
Access ConnectionsSwitches painlessly betweensettings for different wirelessand wired networks
System UpdateAccesses, downloads, and installs thelatest updates for Think systems
System Information CenterCollects and tracks PC asset andsecurity compliance information
ThinkVantage Technologies
ThinkVantage Technologies are a select group of offerings from
Lenovo designed to address emerging customer needs. Adding
value to open industry standards, ThinkVantage Technologies help
customers manage the cost of deploying end-user systems,implement new technologies such as wireless computing, and help
ensure that these technologies can be implemented securely. While
many of these offerings currently exist, some are being significantly
enhanced and all of them have now been consolidated into a single
family of offerings.
Visit lenovo.com/thinkvantage for more information.
Popup from ThinkVantage
Productivity Center
-
8/10/2019 Txw102 PC Architecture
17/62
PC Architecture (TXW102) 17February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Types and Features of Computers:Benefits of ThinkVantage Technologies
ThinkVantage Technologies address the entire customer ownership experience fromdeployment to disposal.
Image CreationImage Creation
ImageUltra BuilderImageUltra Builder
-- Hardware IndependentHardware IndependentImaging TechnologyImaging Technology
-- Dynamic OperatingDynamic Operating
EnvironmentEnvironment
-- Software DeliverySoftware DeliveryAssistantAssistant
Image on DemandImage on Demand
Imaging TechnologyImaging TechnologyCenterCenter
Network DeploymentNetwork Deployment
Remote DeploymentRemote Deployment
ManagerManager
Client MigrationClient Migration
System MigrationSystem Migration
AssistantAssistant
Hassle FreeHassle Free
ConnectionConnection
AccessAccess
ConnectionsConnections
Secure ClientSecure Client
DataData
Client Security SolutionClient Security Solution
Password ManagerPassword Manager
Secure DataSecure Data
MediaMedia
Active ProtectionActive ProtectionSystemSystem
Backup andBackup and
RecoveryRecovery
Rescue and RecoveryRescue and Recovery
Critical UpdatesCritical Updates
Rescue and RecoveryRescue and Recoverywith Antidote Deliverywith Antidote Delivery
ManagerManager
EndEnd--user Selfuser Self--
help Portalhelp Portal
Productivity CenterProductivity Center
Rescue andRescue and
RecoveryRecovery
InformationInformation
and Assetand Asset
ManagementManagement
System InformationSystem InformationCenterCenter
Software onSoftware on
DemandDemand
Software DeliverySoftware Delivery
CenterCenter
System UpdateSystem Update
Hard DriveHard Drive
DataData
DestructionDestruction
Secure DataSecure Data
DisposalDisposal
Benefits of ThinkVantage Technologies
Industry analysts state that the annualized cost of a PC represents less than 20 percent of the annual
total cost of ownership. ThinkVantage Technologies address the other 80% to help reduce your
total cost of ownership. ThinkVantage Technologies also help improve your business' productivity
and efficiency throughout each system's life cycle as you deploy, connect, protect, support, anddispose of your company's PCs.
System Information Center Software Distribution Center ImageUltra Builder Secure Data Disposal Remote Deployment Manager
Access Connections Productivity Center Active Protection System Client Security Software Rescue and Recovery System Migration Assistant System utilities
Life-cycle Management(solutions for SMB and LE)
End-user productivity(value out of the box that also can
provide key IT benefits)
-
8/10/2019 Txw102 PC Architecture
18/62
-
8/10/2019 Txw102 PC Architecture
19/62
PC Architecture (TXW102) 19February 2007
Topic 1 - Introduction to Computer Hardware Architecture
Deployed once per system versus manualprocesses
$70 per unit deployedSystem Migration Assistant
$35-60 hardware replacement
$49-150 encryption software replacement
$40 support cost reduction
Replaces comparable equipment (key fobs, etc.)
$124-250+ per unitClient Security Solution
Annual savings and only in notebook systems
Assumes two help desk call per user per year
$50 per wireless PCAccess Connections
Only in notebook systems
$200 is the hardware replacement cost for a
ThinkPad 30 GB hard drive
$200 or more peroccurrence
Active Protection System
Once per PC per life cycle$45 per PCSecure Data Disposal
Used for one incident in 13% of installed systems
Average support time savings of 183 minutes
$180 per occurrenceRescue and Recovery
Deployed once per system versus manualprocesses
$90 per systemRemote Deployment Manager
Deployed once per system versus typical clonedimage management and loading process
$100 per unitImageUltra Builder
Assumptions Used in Calculating SavingsPotential Savings*ThinkVantage Technology
Potential savings are based on typical customer environments. Some figures represent costs that customers may redirect fromlabor-intensive areas to other areas of their business. Other figures are based on cost avoidance of competitive solutionspurchased separately. All figures are calculated using the TVT and Wireless Calculators and data from Gartner Research andcustomers. Actual savings are not guaranteed and will vary by customer.
*
-
8/10/2019 Txw102 PC Architecture
20/62
PC Architecture (TXW102) 20February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
PC Architecture:Computer Layers
Layered structure
- This structure allows forcompatibility.
- Bypassing layers increasesperformance.
BIOS (basic input/output system)
- Located in flash memory(sometimes called EEPROM)
- Supports plug-and-play
- Supports power management
Device driver
- Software to control a piece ofhardware
User
API
Operatingsystem
BIOS
Hardware
Applications
Devicedriver
Firmware
Adapter
Layers
EEPROM BIOS
Middleware
Computer Layers
A computer consists of several layers that each have interfaces to communicate to the layer next
to it. A layered structure allows for compatibility; for example, the same shrink wrapped
operating system can work on millions of PCs from different vendors because it interfaces with
industry standard BIOS calls. The disadvantage to the layers is that each layer can slow
performance. So to increase performance a layer could be bypassed; for example, an application
could be written directly to the BIOS and device driver of a specific computer which would gain
performance, but would only work on that unique computer.
Some of the different computer layers shown in the diagram above are explained below.
Applications are the software programs with which a user typically interacts, such as those used
for word processing (Microsoft Word), Web browsing (Internet Explorer), sending e-mail
(Lotus Notes), and using spreadsheets (Microsoft Excel).
Middleware is software that provides an additional level of abstraction to applications. The idea
behind the middleware is to hide the complexity of implementing code that is not strictly
related to the business objectives that the application is supposed to be written for. Writing
applications against the basic APIs that the OS is able to expose is sometimes very timeconsuming and it might take a while before a programmer starts to get into the business
modules of the application being developed. Using middleware is like actually talking to a
cleverer interface compared to the interface provided by the OS. Middleware has to implement
all the boring stuff, so that developers can concentrate on the business logic. Examples
include IBM DB2, Oracle, Microsoft SQL Server, Lotus Domino, Microsoft Internet
Information Server, IBM WebSphere, and BEA WebLogic.
-
8/10/2019 Txw102 PC Architecture
21/62
PC Architecture (TXW102) 21February 2007
Topic 1 - Introduction to Computer Hardware Architecture
The operating system is a set of programs that provides an environment in which applications
can run, allowing them easily to take advantage of the processor and I/O devices, such as disks
or adapters. Examples include Windows 2000, Windows XP, Vista, Red Hat Linux, and AIX
5L.
The Basic Input/Output System (BIOS) is a set of program instructions that activates system
functions independently of hardware design (the layer between the physical hardware and the
operating system) and allows for software compatibility. BIOS is typically located in flashmemory (EEPROM) on the systemboard. When a PC is started, the BIOS runs a power-on self-
test (POST). It then tests the system and prepares the computer for operation by searching for
other BIOSes on the plug-in boards and setting up pointers (interrupt vectors) in memory to
access those routines. It then loads the operating system and passes control to it. The BIOS
accepts requests from the drivers as well as the application programs. The BIOS supports plug-
and-play and power management. BIOS vendors include IBM, AMI, and Phoenix. Although
there are several BIOS vendors, there are few differences among their products.
Note: To preclude the problem of performing OS, BIOS, or driver updates before the OS or
network drivers are loaded, a Preboot Execution Environment (PXE) allows the system to boot
off the network. At boot, a PXE agent executes, and the PC gets an IP address from a DHCP
server and then uses the BOOTP protocol to look for a PXE server. The PXE client is firmwareimplemented in BIOS (if LAN hardware is on the systemboard) or as a boot PROM (if LAN
adapter). Programs, including those in the PXE environment, require system configuration and
diagnostic information. A Systems Management BIOS (SMBIOS) is a chip that makes the
necessary information available via BIOS calls that are available through the OS and in the
preboot environment.
Firmware is usually the layer of software that is between the device driver and adapter. It
typically is on a EEPROM of an adapter card and can be upgraded with new releases. Firmware
is similar to BIOS.
Device Drivers are a type of software (which may be embedded in firmware) that controls or
emulates devices attached to the computer such as a printer, scanner, hard disk, monitor, or
mouse. Device drivers are typically loaded low into the memory of PCs at boot time. A devicedriver expands an operating system's ability to work with peripherals and controls the software
routines that make peripherals work (a network card, a disk, printer). These routines may be part
of another program (many applications include device drivers for printers), or they may be
separate programs. Basic drivers come with the operating system, and drivers are normally
installed for each peripheral added.
-
8/10/2019 Txw102 PC Architecture
22/62
PC Architecture (TXW102) 22February 2007
Topic 1 - Introduction to Computer Hardware Architecture
Layers of a PC: Illustration
To illustrate the different layers of a PC, below is a graphic that shows the series of processes
that occur when a user executes a single keystroke on a computer keyboard, and the
corresponding key to the numbered steps.
1. The user presses N on keyboard.
2. The code corresponding to pressed key is sent over the cable to the keyboard port on
the systemboard.
3. The keyboard BIOS routine accepts the code, translates it into the letter n, and passes
it to the operating system.
4. The operating system passes the keystroke to the application program and sends the n
to the video BIOS (or the device driver).5. The video BIOS sends the n to the graphics circuitry.
6. The application program accepts the keystroke and instructs the operating system to
look for the next keystroke.
7. The n appears on the screen.
Application Program
6.
Operating System
4.
BIOS5. 3.
Video
Circuitry
Hardware1. 2.
Keyboard PortHardware
Keyboard
Cable
7.
-
8/10/2019 Txw102 PC Architecture
23/62
PC Architecture (TXW102) 23February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
PC Architecture:Subsystems
Major internal subsystems of a PC:
Processor (Core 2 Duo)
L2 cache (2 MB)
Memory (2 GB)
Bus(es) (PCI, PCIe)
Graphics controller (SVGA)
Disk controller (SATA)and disk (250 GB)
Slots (PCI Express)
PCIe
MCH orGMCH
host bridge
Processor +L1/L2 cache
Memory
I/OController
Hub(ICH)
PCI Express
x16 slot
Direct
MediaInterface
4 SATA disks
Super I/O
Low PinCount interface
AC '97 codec
or
High Definition Audio
USB 2.0Firmware
hub
PCI Express slots
PCIe controllerPCI controller
IDE controllerUSB controller
Memory and optional
graphics controller
SATA controller
Subsystems
Subsystems in a PC communicate to each other via buses. Buses adhere to a particular
architecture (set of rules) to allow compatibility with the numerous subsystems that adhere to
the same architecture.
Most PCs are associated with the term Wintel, which refers to Microsoft Windows and Intel
chip technologies. PCIe stands for PCI Express.
The processor is the central component of a PC. Intel and AMD are the main processor vendors
used in PCs.
Data in the processor, caches, memory, buses, disk controller, and graphics controller is stored
electrically; so when electrical power is shut down, this data is lost. Data on the disk is stored
magnetically, so the data is saved even when electrical power is removed.
-
8/10/2019 Txw102 PC Architecture
24/62
PC Architecture (TXW102) 24February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
PC Architecture:Controllers
All major subsystems have controllers.
Controllers are circuitry controlling manner, method, and speed of accessto device.
Controllers are part of chipset.
PCI Express (PCIe)Data busBus controller(s)
2 GBMemoryMemory controller
2 MBL2 cacheL2 cache controller
ATI Radeon 9600MonitorGraphics controller
250 GB Serial ATA diskDiskDisk controller
ExamplesControlsController
Controllers
All major subsystems have controllers that define how data will be obtained and stored.
Sometimes a controller is a single chip with the data stored in separate physical circuitry. For
example, a memory controller controls memory, but the data is stored in different physical chips
called DIMMs.
Sometimes a single physical chip contains multiple controllers. For example, the I/O Controller
Hub (ICH) is a single physical chip which houses the PCI Express controller, PCI controller,
Serial ATA controller, EIDE controller, USB controller, and other controllers.
Controllers are normally included in the chipset of the computer.
-
8/10/2019 Txw102 PC Architecture
25/62
PC Architecture (TXW102) 25February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
PC Architecture:Buses
Most transfers use three buses
Control bus
Address bus
Data bus
Some architectures multiplex signal on same bus (wires)
16-bit bus = 16 wires for on/off charges (data)32-bit bus = 32 wires for on/off charges (data)64-bit bus = 64 wires for on/off charges (data)
Processor Memory
I/OController
Graphics LANDisk
Control
Address
Data
Data
Buses
If two subsystems are on a bus, such as in the diagram with processor and memory, a data
transfer first involves sending the address on the address bus. Next, data is sent on the data bus.
If multiple subsystems exist on a bus, a control bus is needed in addition to the address and databus. The control bus is used to signal which subsystem will control the bus for the next transfer.
-
8/10/2019 Txw102 PC Architecture
26/62
PC Architecture (TXW102) 26February 2007
Topic 1 - Introduction to Computer Hardware Architecture
Address Bus
An address bus determines how much memory the processor or any subsystem can directly
address. For example, a 32-bit address bus means 2 to the power of 32 or 4 billion unique
numbers to address 4 GB of memory.
Before data is read or written by a processor, the address of that data is sent first. This address is
sent on a separate set of physical wires called the address bus. The data is then sent on a
different set of physical wires called the data bus.
A processor is designed to use a certain maximum quantity of address lines. The amount of
physical memory that a processor can address is determined by this quantity. The number of
unique numbers that can be made by a base two number system (0s and 1s) with the quantity of
address digits determines the maximum addressable memory of a processor. Software can limit
this maximum addressability, for example, DOS sets the processor to use 20 address lines as
DOS only addresses 1 MB of memory.
Following are some processors and their addressability:
Sometimes operating systems limit addressability, so that the operating system can not utilize
all the available physical memory.
00
0
0
0
00
0
0
0
00
0
0
0
.
.
.
.
.
00
0
0
0
00
0
0
0
00
0
1
1
00
1
0
0
01
0
0
1
.
.
.
.
.
00
0
0
0
.
.
.
.
.
Memory Addressing Similar to Car Odometer
EM64T virtual memory256 TB48
EM64T physical memory1 TB40
Pentium 4, Xeon64 GB36
Itanium18 TB44
IA-64 64-bit flat addressing
486DX2
486SLC
Examples
18 EX64
4 GB
16 MB
Addressable memory
32
24
Address lines
-
8/10/2019 Txw102 PC Architecture
27/62
PC Architecture (TXW102) 27February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
PC Architecture:Bus Speeds
Each bus is clocked at a different rate. Bus speed is different from data transfer rate (MB/s). Newer buses are double data rate (same MHz doubles throughput). System bus and memory bus can be asynchronous or synchronous.
MCH orGMCH
Host Bridge
Processor +L1/L2 Cache
MemoryPCI Expressx16 slot
Direct Media Interface (DMI)100 MHz
Super I/O
Low Pin Count (LPC) Interface 33 MHz
USBFirmwareHub
System bus400 to 1066 MHz
Memory bus200 to 400 MHz
PCIe 2.5 GHz
PCIe 2.5 GHz
PCI Express slots
PCI 2.0 33 MHz
PCI 2.0 slots4 SATA
disks
I/OController
Hub(ICH)
Bus Speeds
Each bus in a PC has a speed (measured in megahertz) and a data transfer rate.
The bus between the processor and the memory controller was originally called thefrontside
bus; the processor had a separate bus to its integrated L2 cache called the backside bus and aseparate bus outside the processor to the memory controller called thefrontside bus. The
frontside bus and the backside bus were two different buses. With the introduction of the
Pentium 4 and follow-on processors, the frontside bus was namedsystem bus, although both
terms were still used interchangeably. The change of the name tosystem bus was due to the fact
that the L2 cache was not isolated off a separate, independent bus to the degree that it was for
earlier processors, such as the Pentium II and Pentium III.
The memory bus is clocked at 200 to 400 MHz, but most memory today is double data rate
(DDR); this means data is transferred on both the rising and falling edge which doubles the
throughput from the base clock speed.
The system bus and the memory bus can be either synchronous or asynchronous, depending on
the memory controller of the chipset. Some memory controllers only support synchronoussystem and memory bus speeds; some support either synchronous or asynchronous speeds. An
example of a memory controller that supports synchronous system and memory bus speeds is a
400 MHz system bus with a 200 MHz memory bus with PC2-3200 DDR2 memory (there is an
even multiple of 200 among 200 MHz and 400 MHz). An asynchronous example is a 400 MHz
system bus with a 266 MHz memory bus with PC2-4200 533MHz DDR2 memory.
-
8/10/2019 Txw102 PC Architecture
28/62
PC Architecture (TXW102) 28February 2007
Topic 1 - Introduction to Computer Hardware Architecture
In 1996 and 1997, the PC industry standardized the 66 MHz system bus. Migration to a 100
MHz system bus occurred in 1998, then to a 133 MHz bus in 2000. The Pentium 4 introduced a
400 MHz system bus in late 2000, although it was really 100 MHz 4 to yield 400 MHz. Later,Pentium 4 processors utilized an 800 MHz system bus (200 MHz 4) followed by a 1066 MHzsystem bus (266 MHz 4).
Data Transfer Rates
Data transfer rates (assuming that data is transferred on only one edge of the clock):
8-bit at 133 MHz (double data rate) in 266 MB/s (Hub Interface)
32-bit at 33 MHz is 132 MB/s (PCI bus)
32-bit at 66 MHz is 264 MB/s (PCI bus)
64-bit at 33 MHz is 264 MB/s (PCI bus)
64-bit at 66 MHz is 528 MB/s (PCI bus and system bus)
64-bit at 100 MHz is 800 MB/s (system bus)
64-bit at 200 MHz is 1.6 GB/s (backside bus to L2 cache; PC1600 DDR memory)
64-bit at 266 MHz is 2.1 GB/s (PC2100 DDR memory)
64-bit at 400 MHz is 3.2 GB/s (backside bus to full speed L2 cache, Pentium 4 system bus)
-
8/10/2019 Txw102 PC Architecture
29/62
PC Architecture (TXW102) 29February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
PC Architecture:Cache
Cache is a buffer between subsystems.
Disk transfer could involve five cache locations.
PCIExpress
MCH orGMCH
Host Bridge
Processor +1. L1 Cache2. L2 Cache
3. Memory
I/OController
Hub(ICH)
PCI Expressx16 slot
EIDE Disks
FirmwareHub
PCI Express slots
4.SCSI
5.
Cache
Cache is a storage place (buffer or bucket) that exists between two subsystems in order for data
to be accessed more quickly to increase performance. Performance is increased because the
cache subsystem usually has faster access technology and does not have to cross an additional
bus. Cache is typically used for reads, but it is increasingly being used for writes as well.
For example, getting information to the processor from the disk involves up to five cache
locations:
1. L1 cache in the processor (memory cache)
2. L2 cache (memory cache)
3. Software disk cache (in main memory)
4. Hardware disk cache (some disks may only use an FIFO buffer)
5. Disk buffer
For reads, one subsystem will usually request more data than what is immediately needed, andthat excess data is stored in the cache(s). During the next read, the cache(s) is searched for the
requested data, and if it is found, a read to the subsystem beyond the cache is not necessary.
-
8/10/2019 Txw102 PC Architecture
30/62
PC Architecture (TXW102) 30February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Restriction of hazardous substances in electricaland electronic equipment
Started by the European Union
Effective for shipments after July 1, 2006
Lenovo PC products comply across all of itsproduct lines worldwide
Restricted substances:
Lead
Mercury
Cadmium Hexavalent chromium
Polybrominated biphenyls
Polybrominateddiphenylethers
IE
FR
SP PT
FIN
CH
IT
GR
GER
POL GB
SE
NO
ES
LV
LT
BY
MAL
ROM
BUL YU
BA
HR
AL MK
CZ SK
HU
AT
NL
BE
LU
CY
IS
IE
FR
SPPT
FIN
CH
IT
RUS
GR TUR
GER
POLGB
SE
NO
ES
LV
LT
BY
UK
MAL
ROM
BULYU
BA
HR
ALMK
CZ
SK
HU
AT
NL
BE
LU
CY
IS
Industry Standards:Restriction of Hazardous Substances (RoHS) Directive
Restriction of Hazardous Substances (RoHS) Directive
In February 2003, the European Union (EU) issued directive 2002/95/EC on the restriction of the
use of certain hazardous substances in electrical and electronic equipment on the EU market
beginning July 1, 2006. The Restriction of Hazardous Substances (RoHS) Directive requires
producers of electrical and electronic equipment to eliminate the use of six environmentally-sensitive substances: lead, mercury, cadmium, hexavalent chromium, and the use of
polybrominated biphenyls (PBB) and polybrominated diphenylethers (PBDE) flame retardants. The
purpose is to eliminate the potential risks associated with electronic waste, so this legislation affects
the content and disposal requirements for electronic products.
Most IT hardware is included in scope of the directive: PCs, printers, servers, storage, and options.
Products (and their components) must comply.
Lenovo PC products comply with the RoHS directive across its product lines worldwide.
See www.environment-agency.gov.uk/netregs/legislation/380525/477158/?lang=_e for more
information.
-
8/10/2019 Txw102 PC Architecture
31/62
PC Architecture (TXW102) 31February 2007
Topic 1 - Introduction to Computer Hardware Architecture
A similar directive from the European Union is the Waste Electrical and Electronic Equipment (WEEE)
Directive. WEEE encourages and sets criteria for the collection, treatment, recycling and recovery of
electrical and electronic waste. WEEE requires producers to ensure that equipment they put on the
market in the EU after August 13, 2005 is marked with the crossed-out wheeled bin symbol, the
producers name, and indication that the equipment was put on the market after August 13, 2005.
Lenovo PC products comply with the WEEE Directive requirements.
WEEE-Compliant Symbol
Example of RoHS Labeling on a PCI Express Adapter
-
8/10/2019 Txw102 PC Architecture
32/62
PC Architecture (TXW102) 32February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Industry Standards:Intel High Definition Audio (Intel HD Audio)
Next-generation architecture (after AC 97) for implementing audio, modem,and communications functionality
Immersive home-theater-quality sound experience including Dolby 7.1audio capability
Up to eight channels at 192 kHz with 32-bit quality
Multi-streaming capabilities to send two or more different audio streams todifferent places at the same time
Supported with Intel ICH6/ICH7/ICH8 family- ICH6/ICH7 integrates both AC 97 and HD Audio to facilitate transition
- ICH8 only integrates HD audio (not AC '97)
- Only AC 97 or Intel HD Audio can be used at one time
Game audio
Dolby
Digital
Chat audio
Intel HD Audiosupports multiple
audio streams at
the same time.
Intel High Definition Audio (Intel HD Audio)
Intel High Definition (HD) Audio is an evolutionary technology that replaces AC 97. This next
generation architecture for implementing audio, modem, and communications functionality was
developed to enhance the overall user PC audio experience and to improve stability. Intel HD
Audio facilitates exciting audio usage models while providing audio quality that can deliverconsumer electronics levels of audio experience. The Intel HD Audio specification v1.0 was
released in June 2004.
OS native bus driver and IndependentHardware Vendor value-added function driver
Driver software developed by audio codecsupplier
Up to 15 input and 15 output streams at onetime and up to 16 channels per stream
Single stream (in and out)
24 MHz clock provided by the ICH6 12 MHz clock provided by primary codec
No codec configuration limitation Codec configuration limitation
Codec enumeration done by software(bus driver)
Codec enumeration at boot time (BIOS)
DMAs: dynamic function assignment AC 97 DMAs: dedicated function assignment Dynamic bandwidth assignment Fixed bandwidth assignment
8 channels with 32-bit output, 192 kHz multi-channel
48 Mb/s (SDO), 24 Mb/s (SDI)
6 channels with 20-bit output, 96 kHz stereo max 12 Mb/s max
Intel High Definition AudioAC 97
-
8/10/2019 Txw102 PC Architecture
33/62
PC Architecture (TXW102) 33February 2007
Topic 1 - Introduction to Computer Hardware Architecture
33
Support for Intel HD Audio is found in the ICH6, ICH7, and ICH8 families. The ICH6 and
ICH7 integrate both AC 97 and Intel HD Audio to facilitate transition from the older AC 97;
however, only AC 97 or Intel HD Audio can be used at one time. (Either requires an additional
external codec chip; when Intel HD Audio was announced, the older AC 97 chips cost less
money.) The ICH6/ICH7 Intel HD Audio digital link shares pins with the AC 97 link. For
input, the ICH6/ICH7 adds support from an array of microphones that can be used for enhancedcommunication capabilities and improved speech recognition. The ICH8 only supports HD
Audio (not AC '97).
Intel HD Audio has support for a multi-channel audio stream, a 32-bit sample depth, and a
sample rate up to 192 kHz.
Intel HD Audio delivers significant improvements over previous-generation integrated audio
and sound cards. Intel HD Audio hardware is capable of delivering the support and sound
quality for up to eight channels at 192 kHz/32-bit quality, while the AC 97 specification can
only support six channels at 48 kHz/20-bit quality. In addition, by providing dedicated system
bandwidth for critical audio functions, Intel HD Audio is architected to prevent the occasional
glitches or pops that other audio solutions can have.
Dolby Laboratories selected Intel HD Audio to bring Dolby-quality surround sound
technologies to the PC, as part of the PC Logo Program that Dolby recently announced. The
combination of these technologies marks an important milestone in delivering quality digital
audio to consumers. Intel HD Audio will be able to support all the Dolby technologies,
including the latest Dolby Pro Logic IIx, which makes it possible to enjoy older stereo content
in 7.1-channel surround sound.
Intel HD Audio also allows users to play back two different audio tracks, such as a CD and a
DVD simultaneously, which can not be done using current audio solutions. Intel HD Audio
features multi-streaming capabilities that give users the ability to send two or more differentaudio streams to different places at the same time, from the same PC.
Intel HD
Audio Link
Only Intel HD Audio or AC 97
may be used at one time
Intel HD
Audio
Controller
AC 97
Cntrl
DockAC Link
UAA
bus driver
AC 97
drivers
Intel HDAudio
registers
AC 97
registers
ICH6OS
Standardized
Register Interface
(UAA)
Audiodriver
Modem
driver
Modem codec
Audio codec
Telephony codec
HDMI codec
Dock codecAudio
codec
Modem
codec
Intel HD Audio Overview
-
8/10/2019 Txw102 PC Architecture
34/62
PC Architecture (TXW102) 34February 2007
Topic 1 - Introduction to Computer Hardware Architecture
34
CD
Dolby Digital
DTS
DVD Video
Surround
Right
Center
Subwoofer
Left
Surround
With Intel HD Audio, a DVD movie with 5.1 audio can be sent
to a surround sound system in the living room, while you
listen to digital music and surf the Web on the PC.
Microsoft has chosen Intel HD Audio as the main architecture for their new Unified Audio
Architecture (UAA), which provides one driver that will support all Intel HD Audio controllers
and codecs. While the Microsoft driver is expected to support basic Intel HD Audio functions,
codec vendors are expected to differentiate their solutions by offering enhanced Intel HD audio
solutions.
Intel HD Audio also enables enhanced voice capture through the use of array microphones,giving users more accurate speech input. While other audio implementations have limited
support for simple array microphones, Intel HD Audio supports larger array microphones. By
increasing the size of the array microphone, users get incredibly clean input through better noise
cancellation and beam forming. This produces higher-quality input to voice recognition, Voice
over IP (VoIP), and other voice-driven activities.
Intel HD Audio also provides improvements that support better jack retasking. The computer
can sense when a device is plugged into an audio jack, determine what kind of device it is, and
change the port function if the device has been plugged into the wrong port. For example, if a
microphone is plugged into a speaker jack, the computer will recognize the error and can
change the jack to function as a microphone jack. This is an important step in getting audio to a
point where it just works. (Users wont need to worry about getting the right device pluggedinto the right audio jack.)
The Intel HD Audio controller supports up to three codecs (such as an audio codec or modem
codec). With three Serial Data In (SDI) and one Serial Data Out (SDO) signals, concurrent
codec transactions on multiple codecs are made possible.
The SDO connects to all codecs and provides a bandwidth of 48 Mb/s. Each of the three SDIs
are typically connected to a codec and have a bandwidth of 24 Mb/s. In addition, the controller
has eight non-dedicated, multipurpose DMA engines (4 input, and 4 output). This allows
potential for full utilization of DMA engines for better performance than the dedicated function
DMA engines found in AC 97. In addition, dynamic allocation of the DMA engines allows
link bandwidth to be managed effectively and enables the support of simultaneous independent
streams. This capability enables new exciting usage models (e.g., listening to music whileplaying a multi-player game on the Internet).
-
8/10/2019 Txw102 PC Architecture
35/62
PC Architecture (TXW102) 35February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Industry Standards:Intel Active Management Technology (AMT)
Remote management of networked platforms in any system state (even ifpowered off or crashed)
Remote hardware and software asset tracking eliminates manual inventorytracking
Hardware (requires an Intel Ethernet controller) and firmware solution usesout-of-band communication for system access
Lenovo offers ThinkCentre desktops with Intel AMT support
Out-of-Band
System
Management
Allows remotemanagementof platformsregardless ofpower on/offstate or OSstate
Remote
Troubleshooting
and Recovery
Significantlyreduces desk-side visits,increasing theefficiency of ITtechnical staff
Proactive
Alerting
Decreasesdowntime andminimizestime-to-repair
Remote
Hardware and
Software
Tracking
Eliminates time-consumingmanual inventorytracking andhuman error,reducing assetaccounting costsand increasingtracking accuracy
Non-Volatile
Storage
Survivespower outagesand systemrebuilds
Tamper-
Resistant
Agents
Prevents usersfrom removingcriticalinventory,remote-control,or virus-protectionagents
Intel Active Management Technology (AMT)
Intel Active Management Technology provides capabilities that make new levels of IT
management possible. This platform-resident hardware (requires an Intel Ethernet controller)
and firmware solution uses out-of-band (OOB) communication for platform access regardless of
the state of the operating system (OS) or platform power. Essentially, the only requirements arethat the platform be corporate network connected and have stand-by power (plugged into an
electrical outlet). Even when a platform is powered down or has a non-operational OS, Intel
Active Management Technology maintains access to and management of the platform. This
"any platform state" access gives corporate IT departments unprecedented power for more
efficient platform management with reduced IT operating costs. A software-only solution does
not provide the same level of management when a system is crashed or powered off. See
www.intel.com/technology/manage/iamt/for more information.
The ability to communicate with a machine that is powered down has been available for a
decade through use of the "magic packet." What is new with AMT is that the capability to wake
up a machine is contained in a piece of hardware and not just in the operating system, where it
has resided in the past.
Extensive surveys of numerous IT shops laid the groundwork for defining Intel Active
Management Technology. Three of the top IT needs revealed by these surveys are better asset
management, reduced downtime, and minimized desk-side visits. Intel design teams determined
that these issues are best addressed through platform architectural enhancements, resulting in
the following solutions:
OOB System Management Allows remote management of platforms regardless of power
on/off state or OS state
-
8/10/2019 Txw102 PC Architecture
36/62
PC Architecture (TXW102) 36February 2007
Topic 1 - Introduction to Computer Hardware Architecture
Remote Troubleshooting and Recovery Significantly reduces desk-side visits, increasing the
efficiency of IT technical staff
Proactive Alerting Decreases downtime and minimizes time-to-repair
Remote Hardware and Software Tracking Eliminates time-consuming manual inventory tracking
and human error, reducing asset accounting costs and increasing tracking accuracy Non-Volatile Storage Survives power outages and system rebuilds
Tamper-Resistant Agents Prevents users from removing critical inventory, remote-control, or virus-
protection agents
Physical implementation of Intel Active Management Technology utilizes hardware and firmware on
the platform's systemboard. Platform auxiliary power maintains this technology's features even when
the platform is turned off.
To appreciate the importance of the OOB management feature, consider the case where a network
platform's OS becomes non-operational, as shown in the image above. In the traditional IT
environment, the end user calls the IT department to report the problem. An IT technician is then sent to
assess and fix the problem, hopefully in a single desk-side visit or two. On platforms using this newtechnology, problems with a non-operational OS can be quickly and efficiently resolvedpossibly even
avertedwithout any desk-side visits. The following sequence explains how:
Proactive alerting reports platform deficiencies, such as an inoperable OS, to the IT management
console. The proactive alerting feature of this new technology uses OOB communication, which is
not handled by the OS. As a result, the inoperable OS cannot stop the alert from being sent. The IT
management console receives the alert about the inoperable OS, and the console operator knows what
has happened, precluding the need for a desk-side visit.
Remote booting allows the console operator to take control of the crashed platform by remotely
booting it to an IT diagnostic platform. At this point, the console operator uses existing management
software to assess and fix the inoperable OS. This could include reinstallation of the IT-approved OS
and patches from the IT management platform, eliminating the requirement of a desk-side visit.
Remote management uses third-party IT management tools that work through a uniform network-
connected application programming interface (API) provided by Intel Active Management
Technology.
System
down
System problem
occurs
Problem alert to IT
Remote reboot from IT
management console
Remote control and diagnostics of
platform using ISV applications
IT Management Console1
2
3
4
Corporate Network
Numbers refer to process steps
-
8/10/2019 Txw102 PC Architecture
37/62
PC Architecture (TXW102) 37February 2007
Topic 1 - Introduction to Computer Hardware Architecture
The image below shows how a corporate IT department can use Intel Active Management Technology
to inventory platform asset information stored in non-volatile, always-available memory. This always-
available memory allows the IT department to continue tracking platform inventory in any system state.
Because it is non-volatile and tamper resistant, asset inventory information cannot be removed,
intentionally or inadvertently, from platforms, and it survives OS rebuilds. This allows more efficient
control and use of network platforms, reducing the number of unidentifiable platforms on the intranet.
ISV application polls
platforms for inventory
Platforms report inventory to
IT Management Console
IT Management Console
Corporate Network
Numbers refer to process steps
1
2
1
2
1
2
Polling and reporting work
in any system state
-
8/10/2019 Txw102 PC Architecture
38/62
PC Architecture (TXW102) 38February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Industry Standards:Intel Viiv Technology
Intel brand name for PCs designed for digital entertainment in the home
PCs that meet specific criteria (hardware and software) receive thisbranding
Features:- Instant on/off
-Simple navigation via remote control
-Smaller and quieter systems
Over 100 companies offer content services and products with Viiv logo
Lenovo does not have any products utilizing this branding
Intel Viiv Technology
In January 2006, Intel announced the brand of Intel Viiv technology. Notebook and desktop PCs
that meet specific criteria can receive this branding; the criteria includes specific hardware and
software requirements.
Intel Viiv technology-based PCs feature:
Consumer electronics-like features for simplified entertainment
Instant on/off
Simple navigation to online services with a remote control
Smaller and quieter systems
Performance for high definition entertainment
Intel's latest dual-core processors
Support for up to 7.1 surround sound
Support for high definition video including content downloaded from the Internet
More than 100 companies offer content services and software that have been verified to work with
Intel Viiv PCs. Look for the Enjoy with logo to identify services and applications that have been
verified to work with Intel Viiv technology.
See intel.com/products/viiv for more information.
-
8/10/2019 Txw102 PC Architecture
39/62
PC Architecture (TXW102) 39February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Industry Standards:Intel vPro Technology
Intel brand name for management of corporate desktop PCs
Desktop PCs that meet specific criteria (hardware and software)receive this branding
Features:-Diagnose, reboot, and repair desktops down-the-wire
-Agent presence checking
-Remote asset inventory
-Security virtualization
Select Lenovo ThinkCentre desktops are vPro-compliant
Intel vPro Technology
In April 2006, Intel announced the brand of Intel vPro Technology. Desktop PCs (does not
apply to notebooks) that meet specific criteria can receive this branding; the criteria includes
specific hardware and software requirements.Desktop PCs with Intel vPro technology include built-in, hardware-based capabilities that can
allow remote management, maintenance, and update of PCs that have traditionally been
inaccessible from the IT management console. A console can remotely communicate with these
PCs, even if system power is off, the operating system is inoperative, or software agents are not
yet installed.
Intel vPros primary feature is the latest version of Intel Active Management Technology
(IAMT version 2) and Intel Virtualization Technology. It allows the implementation of virtual
software appliances to enhance security and reliability of corporate PCs; this includes security
virtualization which enables security software to run as a software appliance in a single virtual
machine partition isolated from the operating system (Lenovo implements this with its
ThinkVantage Virtualization Module for Antidote Delivery Manager).
See intel.com/vpro for more information.
-
8/10/2019 Txw102 PC Architecture
40/62
PC Architecture (TXW102) 40February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Benchmarks
Understand benchmark objective:either application throughput orsubsystem performance
Examples include:- BAPCo
SYSmark 2004 SE
- MobileMark 2005
- 3DMark05 and 3DMark06
- SPEC CPU2000
PC performancedoubles every
two years.
Lenovo ThinkCentre A60
Benchmarks
The following is a short list of benchmarks and the systems they measure.
Overall performance:
SYSmark 2004 SE - SYSmark includes office productivity and Internet content creation
benchmark tests. The two scores are combined and given a weighted average to produce an
overall performance rating. Both SYSmark tests derive scores by using real-world
applications to run a preset script of user-driven workloads and usage models developed by
application experts.
The SYSmark 2004 SE Internet Content Creation test is organized as scenarios that are
designed to simulate an Internet content creators day. This benchmark incorporates such
applications as Adobe Photoshop 7.01, Discreet 3ds max 5.0, and Macromedia
Dreamweaver MX.
The SYSmark 2004 SE Office Productivity test follows ICCs blueprint by mimicking the
usage patterns of todays desktop and mobile business users, including the concurrentexecution of multiple programs. Applications such as Adobe Acrobat 5.0.5, McAfee
VirusScan 7.0, and the Microsoft Office suite are used. Each SYSmark test measures the
response time of the application to user input. Both scores are combined using a geometric
mean to get an overall score.
-
8/10/2019 Txw102 PC Architecture
41/62
PC Architecture (TXW102) 41February 2007
Topic 1 - Introduction to Computer Hardware Architecture
The SYSmark benchmarks are created by BAPCo (Business Applications Performance
Corporation), which is a nonprofit corporation founded in May 1991 to create objective
performance benchmarks that are representative of the typical business environment. For
notebook systems, MobileMark 2005 is a benchmark created by BAPCo that measures both
performance and battery life at the same time using popular applications. Contact
www.bapco.com for more information. MobileMark 2005 MobileMark 2005 is the latest version of the premier notebook battery
life and performance under battery life metric based on real world applications.
Graphics performance
3DMark03, 3DMark05, 3DMark06, and 3DMarkMobile06 are benchmark tests that run
through different scenes using various DirectX or OpenGL calls to derive a score reflecting
the graphics hardware and driver performance. See www.futuremark.com/products/ for
more information.
Battery life
Business Winstone BatteryMark (BWS BatteryMark) 2004 measures the battery life of
notebook computers, providing users with a good idea of how long a notebook battery will
hold up under normal use. This benchmark uses the same workload as in Business
Winstone 2004.
Notable benchmark organizations
In 1988, the Transaction Processing Council (TPC) was formed to fulfill the need for
transaction processing benchmarks that emulate the workloads found on database servers.
The council includes representatives from a cross-section of 45 hardware and software
companies that meet to establish benchmark content. A primary goal of the council is to
provide objective and verifiable performance data to the industry. Visit www.tpc.org for
more information.
The Standard Performance Evaluation Corporation (SPEC) establishes, maintains, and
endorses a standardized set of relevant benchmarks and metrics for performance evaluation.
Contact www.specbench.org for more information.
SPEC CPU2000 - Introduced in late 2000, SPEC (Standard Performance Evaluation Corp.)
CPU2000 is a workstation application-based benchmark program that can be used across
several versions of Microsoft Windows NT, Windows 2000, and Unix. It consists of the
two benchmark suites listed below. Both measure the real-world performance of a
computers processor, memory architecture, and compiler. They replace CPUmark and
FPUmark.:
SPECINT2000 measures computation-intensive integer performance
SPECFP2000 measures computation-intensive floating point performance.
-
8/10/2019 Txw102 PC Architecture
42/62
PC Architecture (TXW102) 42February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Security Issues:Client Security Solution
ThinkPad security chip
ThinkVantage software (Client Security Solution) offersunique advantages
Robust security solution
Hardware and software combination
Client Security Solution
ThinkVantage Client Security Solution is a unique hardware-
software combination helps protect your company information,
including vital security information like passwords, encryption
keys and electronic credentials, while helping to guard againstunauthorized user access to data.
This level of security is critical for both desktop and notebook
systems. In fact, you cannot get a higher level of security on
select ThinkPad notebooks or ThinkCentre desktops as a
standard feature on a PC from any other manufacturer.ThinkCentre security chip
ThinkPad security chip
-
8/10/2019 Txw102 PC Architecture
43/62
PC Architecture (TXW102) 43February 2007
Topic 1 - Introduction to Computer Hardware Architecture
New Features
Active Directory support for seamless configuration and management support
Completely new and easier to use password manager with broader browser support, auto-
recognize/fill, and per-site security policies
Multi-factor support and policy manager for improved security
Updated fingerprint reader software with integrated tutorial
ThinkVantage Client Security Solution helps turn your computer into a highly protected vault.
Available preloaded or by download for all ThinkPad notebooks and ThinkCentre desktops, it
provides advanced technology for user authentication plus enhanced security for wired and
wireless networking.
To further enhance security, select ThinkPad and ThinkCentre systems also include an
embedded Trusted Platform Module (TPM). ThinkVantage Client Security Solution works in
conjunction with this chip to manage encryption keys and processes.
The TPM itself is isolated from the operating system using patented tamper-resistant
technology. To initialize the TPM, users or administrators simply download the Client Security
Solution and run a single setup wizard to install the software and create a set of master
encryption keys.
With new Active Directory integration, IT administrators gain significant flexibility and control
over how CSS works in the customer environment. From logon to password manager, IT gets
tremendous flexibility to deploy and enforce policies and customization options.
Security made easy
The Client Security Software wizard helps simplify installation and setup and includes a set of
predefined security settings, allowing you to select the best suited to your needs. For enterprisecustomers, script-driven silent installations can facilitate large deployments and are
complemented by the ability to push policies to clients from a central server.
Simplify passwords: The Client Security Password Manager replaces multiple passwords with
one easy-to-remember password or fingerprint (requires an optional fingerprint reader
device), thereby reducing password reset calls to the help desk.
Reset forgotten passwords: Users can pre-configure personal questions for this purpose. If the
user later forgets his Power On password, Hard Drive password or Windows password, he
can click a button, answer his pre-configured personal questions and CSS will reset his
forgotten password, require a new password, and enable the user to log on.
Simplify encryption: "On-the-fly" file and folder encryption saves you time by automatically
encrypting files and helping to protect data from unauthorized access.
-
8/10/2019 Txw102 PC Architecture
44/62
PC Architecture (TXW102) 44February 2007
Topic 1 - Introduction to Computer Hardware Architecture
Flexible security
Client Security Solution supports the use of a password, a passphrase or a fingerprint as
authentication credentials for access to protected data. Where central management is an
important requirement, Client Security Solution can be integrated into a Windows Domain
Services management model. If very sensitive data must be protected on a PC, the customer can
create policies that force multi-factor authentication and can integrate Client Security Solutionwith best-of-breed data encryption solutions.
Client Security Solution includes Utimaco Private Disk Personal Edition so users can
automatically lock valuable data with file and folder encryption. The size of the "disk volume"
to be encrypted can be set by IT staff or controlled by the user. Only verified users can unlock
the encrypted data, so sensitive information is better protected should a computer be stolen. For
users interested in protecting all the data on their computer, full hard drive encryption is also
available from Lenovo with Utimaco SafeGuard Easy. (Availability varies by country.)
Enhanced security for both wired and wireless
Client Security Solution provides enhanced security for both wired and wireless networks. In
both cases, the Client Security Solution and TPM ensure data confidentiality and availability by
providing a hardware- and software-based architecture to provide better protection for sensitive
keys, identity information and confidential data. Further, for wireless networks, the TPM
hardware provides enhanced authentication and session confidentiality by concealing
authentication credentials for industry-standard 802.1x protocols and Cisco LEAP.
Advanced protection for your digital identity
By requiring an advanced means of authentication for your systemwhat you know (a
passcode), what you have (using optional solutions such as a token) or who you are (biometric
scan, such as a fingerprint)you can help keep your digital identity and data more secure. TheClient Security Solution and TPM store and enable user authentication through integrated
hardware rather than in the software or memory, both of which are more vulnerable to
unauthorized users. It also provides additional protection for digital IDs used for e-business
transactions and network access.
The ThinkVantage Client Security Solution is certified RSA SecurID-ready for remote access
protection, and can function as an RSA SecurID authenticator. As a result, mobile users can
employ cost-efficient SecurID software tokens and carry one less piece of equipment on the
roadwithout sacrificing security or budget.
-
8/10/2019 Txw102 PC Architecture
45/62
PC Architecture (TXW102) 45February 2007
Topic 1 - Introduction to Computer Hardware Architecture
ThinkCentre Security Chip
(2003 to 2004)
ThinkCentre Security Chip
(2004 to 2006)
Security chip was integrated in Super I/O on systemboard as the National
Semiconductor PC8375T or Winbond PC8375S (TPM 1.2-compliant) Super I/O for
security chip, Asset ID, serial, parallel, diskette, keyboard, mouse, auto-thermal
controls, hardware event log
Security chip was a separate module from Atmel that plugged into
systemboard
-
8/10/2019 Txw102 PC Architecture
46/62
PC Architecture (TXW102) 46February 2007
Topic 1 - Introduction to Computer Hardware Architecture
ThinkPad Security Chip
(2002 to 2003)
Security chip was a separate module from Atmel mainly used in ThinkPad T3x
systems that plugged into systemboard
ThinkPad Security Chip
(2003 to 2004)
Security chip was soldered to systemboard and was a module from Atmel
mainly used in select ThinkPad notebooks such as the T40/T41/T42 systems
ThinkPad Security Chip
(2005)
Security chip was integrated in Super I/O on systemboard as the National
Semiconductor PC8394T Super I/O for security chip, Asset ID, hardware event log,
parallel, infrared, keyboard, mouse [docking station ports (serial, diskette)]
-
8/10/2019 Txw102 PC Architecture
47/62
PC Architecture (TXW102) 47February 2007
Topic 1 - Introduction to Computer Hardware Architecture
ThinkPad Security Chip
(2005 to 2006)
Security chip was soldered to systemboard and was a module from Atmel
mainly used in select ThinkPad notebooks such as the T60/X60/Z60 systems
-
8/10/2019 Txw102 PC Architecture
48/62
PC Architecture (TXW102) 48February 2007
Topic 1 - Introduction to Computer Hardware Architecture
Trusted Platform Module
A Trusted Platform Module (TPM) is a special-purpose integrated circuit (IC) built into a variety of
platforms to enable strong user authentication and machine attestationessential to prevent
inappropriate access to confidential and sensitive information and to protect against compromised
networks. Trusted Platform Modules utilize open standards and technologies to ensure interoperability
of diverse products in mixed-vendor environments.
The TPM is based on specifications developed by the Trusted Computing Group (TCG). The TCG is
an industry standards group formed to develop, define, and promote open standards for trusted
computing and security technologies, including hardware building blocks and software interfaces,
across multiple platforms, peripherals, and devices. Members include Microsoft, Intel, Dell, HP, IBM,
and Lenovo. Current TPM implementations are based on the TCG 1.1 specification. TPM
implementations based on the next-generation version, TCG 1.2, started shipping in 2005. Microsoft's
Vista due in 2006 will support both TPM 1.1 and 1.2. See www.trustedcomputinggroup.org for
more information.
The logon user name and
password are stored in the
TPM chip.
User ID
Password *******
abcdefg
TPM
chip
Disk
Fingerprint reader
Smart-card
reader
Encrypted Files
Fingerprint and smart-card readers
can be used in addition to the TPM for
an additional security layer.
When files and folders are encrypted, they can
be decrypted only by the person who has the
authentication data the TPM chip requires.
Anyone trying to hack into your system
will not be able to read any of the
encrypted files or folders.
TPM
chip
TPM chip Encrypted files
If a disk is removed, the encrypted data is safe
because it can not be decrypted without being
authenticated through the TPM.
How a Trusted Platform Module (TPM) Secures A System
-
8/10/2019 Txw102 PC Architecture
49/62
PC Architecture (TXW102) 49February 2007
Topic 1 - Introduction to Computer Hardware Architecture
Platform Attestation with TPMPlatform Attestation without TPM
Secure access prevents unauthorized access;secure hash comparison validates settings
Easy to change settings and parameters forunauthorized access and malicious damage
Validated settings ensure system integrity andprevent inappropriate access
Altered settings allow inappropriate access tovalued networks and sensitive data
Trustworthy systems result in reliable andtrustworthy practice; reduce support expenses
Untrustworthy systems result in unreliable anduntrustworthy practices
Secure storage of IDs and passwords; multiplelog-in secrets secured by the TPM
Storage of IDs and passwords in easily copiedfiles; use of one set of secrets for access to allsystems
On-chip, protected storage of secrets reducesuser burden; enables secure single sign-on;ensures strong protections
Multiple login IDs and passwords cause users tobe careless; store secrets without protectingthem; use weak protections
Strong protections eliminate "spoofing"; verifiesintegrity of user login credentials
Inadequate user ID and password protectionmakes "spoofing" very easy
User Authentication with TPMUser Authentication without TPM
-
8/10/2019 Txw102 PC Architecture
50/62
PC Architecture (TXW102) 50February 2007
Topic 1 - Introduction to Computer Hardware Architecture
2006 Lenovo
Security Issues:Integrated Fingerprint Reader
Fingerprint image can replace:
- Power-on password
- Supervisor password
- Hard drive password- Windows password
Easy and reliable to use
- User slides finger over reader
- Reader takes multiple snapshots of finger
- Snapshots are assembled into singleimage
More productive and secure thanpasswords, key fobs, and smart cards
- One swipe at power-on and a PC comes
up to the Windows desktop
- Impossible to lose as the fingerprintreader is integrated into the system
Fingerprint software is used as:
- An interface to the fingerprint reader toregister and manage user fingerprints
- An interface to Client SecuritySoftware as a means of authentication
- A means to bypass BIOS andWindows logon passwords
- A replacement for Windows 2000 andWindows XP logon passwords
Integrated fingerprint reader is included
in select ThinkPad notebooks.
Integrated Fingerprint Reader
The integrated fingerprint reader is a new security device introduced on select ThinkPad notebook
models (first introduced on the ThinkPad T42 in October 2004), the Preferred Pro USB Fingerprint
Reader Keyboard, and USB Fingerprint Reader. The device allows users to register their
fingerprints on these systems and then use the reader as an authentication device to replace BIOSand Windows passwords. The integrated fingerprint reader can also be used as an authentication
device with the security chip included on select ThinkPad and ThinkCentre systems.
The integrated fingerprint reader provides a convenient means for authenticating to a Windows
system, eliminating the need for users to remember multiple passwords and thereby reducing the
number of support calls for forgotten passwords. When used with Client Security Solution with
Password Manager, the fingerprint reader can be used as a means for authenticating to secure
operations. Fingerprint technology provides the security of unique user identification, and the
integrated design means no inconvenient external devices are needed.
The integrated fingerprint reader also comes with a special utility called Fingerprint Software. This
software allows you to enroll fingerprints and adjust security settings related to the fingerprint
sensor.
-
8/10/2019 Txw102 PC Architecture
51/62
PC Architecture (TXW102) 51February 2007
Topic 1 - Introduction to Computer Hardware Architecture
The format of the reader is called a slide sensor. In order to get a reading, you must slide, drag, or
swipe your finger across the reader. The slide sensor takes sequential snapshots of your finger as it
slides over the surface. It then stitches those snapshots together to form a fingerprint image that canbe as large as or even larger than the image taken by a contact sensor.
The advantages of a slide over a contact are as follows:
The slide can make a larger image of the finger being read. This means the matcher software has
more data to analyze and is therefore less likely to make a mistake.
The slide is only 20% of the size of a contact sensor. The much smaller footprint of the slide
sensor compared to the contact sensor is a key feature in terms of ergonomic and engineering
considerations around placement of the device.
Fingerprint Software Screen
-
8/10/2019 Txw102 PC Architecture
52/62
PC Architecture (TXW102) 52February 2007
Topic 1 - Introduction to Computer Hardware Architecture
An integrated fingerprint reader is used on the optional
Preferred Pro USB Fingerprint Reader Keyboard (part number 73P4730)
An integrated fingerprint reader is supported on select Lenovo
systems via the optional USB Fingerprint Reader (part number 41U3167)
-
8/10/2019 Txw102 PC Architecture
53/62
PC Ar