Txw102 PC Architecture

download Txw102 PC Architecture

of 62

Transcript of Txw102 PC Architecture

  • 8/10/2019 Txw102 PC Architecture

    1/62PC Architecture (TXW102) 1February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    PC Architecture (TXW102)

    Topic 1:Introduction to Computer HardwareArchitecture

  • 8/10/2019 Txw102 PC Architecture

    2/62

    PC Architecture (TXW102) 2February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Objectives:Computer Hardware Architecture

    Upon completion of this topic, you will be able to:

    Identify two features to enhance computer security4.

    Identify common industry standards and the objective of benchmarksused with computer systems

    3.

    Define various PC architecture terminology including computer layers,controllers, and buses

    2.

    Identify the types of computers and their key differentiating features1.

  • 8/10/2019 Txw102 PC Architecture

    3/62

    PC Architecture (TXW102) 3February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Types and Features of Computers

    - IBM System x- IBM BladeCenter

    - Lenovo 3000- Lenovo ThinkCentre

    - Lenovo 3000- Lenovo ThinkPad

    BrandsBrandsBrands

    - Tower- Rack- 1U rack- Blades

    - Mini Desktop- Ultra Small- Small- Desktop- Tower- PC Blades

    - Ultraportable (one spindle)- Full function (two spindles)- Desktop alternative(three spindles)

    - Tablet

    DesignsDesignsDesigns

    - High security- Data processing and storage

    - Non-mobile- Wired connection

    - Mobile- Wireless

    ServerDesktopNotebook

    Types and Features of Computers

    The three main types of computers (or PCs) are

    Notebooks

    Desktops Servers

  • 8/10/2019 Txw102 PC Architecture

    4/62

  • 8/10/2019 Txw102 PC Architecture

    5/62

  • 8/10/2019 Txw102 PC Architecture

    6/62

    PC Architecture (TXW102) 6February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    Higher end desktop systems are commonly referred to as workstations. Workstations are often used

    for graphics and engineering users. They may run a UNIX-based operating system instead of a

    Microsoft Windows-based operating system.

    Below is a comparison of PC workstations and UNIX workstations.

    Servers

    Servers are computers that provide services to other computers, called clients. Servers are in secure

    areas because so many users are dependent on their function. They include file servers, print

    servers, terminal servers, Web servers, e-mail servers, database servers, and computation servers.

    Server designs include

    Tower, which rests on the floor

    Rack-based, which must be installed in a rack

    1U rack-based, which is a 1U-high server that must be installed in a rack. 1U is equal to 1.75.

    Server blades, which have server circuitry on a single board which slides into an enclosure with

    other blades.

    Note: Servers for racks vary in height by a U measurement (a U is 1.75-inch height). 1U servers

    are popular for Web sites because for Web pages it is better to spread the load across multiple

    servers (horizontal scalability) rather than to increase the processing power of a centralized server

    (vertical scalability).

    Difficult to manage; price prohibitivein some cases; Microsoft Officeapplications don't run natively

    Still lags behind UNIX counterparts in3D graphics capabilities; largeapplications may overwhelm system

    performance; lack of third-partygraphics applications

    Weaknesses

    Strong graphics; large number ofthird-party applications available forengineering and financial modeling;processor power to spare

    Low price; familiar Windows interfaceand Windows applications runnatively; ease of manageability

    Strengths

    Minimum configuration of SunUltraSPARC or IBM PowerPCprocessor; more memory; higher-endgraphics

    Minimum configuration of latest Intelprocessor; price starting around$2,000

    BasicsUNIX WorkstationsPC Workstations

  • 8/10/2019 Txw102 PC Architecture

    7/62

    PC Architecture (TXW102) 7February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    Differentiating Computer Features

    Each type of computer has important characteristics that distinguish it from each other.

    Key differentiating features of notebooks are size and weight, power management and battery,

    screen type and size, integrated wireless, docking station or port replicator, number of spindles or

    bays, modular bay(s), sales presentation capability, integrated wireless, Bluetooth, infrared, securitychip, and ThinkVantage Technologies.

    Key differentiating features of desktops are fastest processor, graphics performance, 3D graphics

    adapters, systems management, removable storage (DVDRW), chipset, security chip, and

    ThinkVantage Technologies.

    Key differentiating features of servers are support of many concurrent users (up to 1000s), multiple

    processors, large memory capacity, large disk capacity (internal and external), redundant

    components (disk, fans, power supplies, memory, etc.), hot-swap components to maximize uptime

    (disk, fans, power supplies, memory, etc.), and Predictive Failure Analysis to warn the admin of

    any impending failure.

    2006 Lenovo

    Types and Features of Computers:Differentiating Computer Features

    - Support many concurrent users(up to 1000s)

    - Multiple processors- Large memory capacity- Large disk capacity(internal and external)

    - Redundant components (disk,fans, power supplies, memory,etc.)

    - Hot-swap components tomaximize uptime (disk, fans,power supplies, memory, etc.)

    - Predictive Failure Analysis towarn the admin of anyimpending failure

    - Fastest processor- Graphics performance- 3D graphics adapters- Systems management- Removable storage (DVDRW)- Chipset- Security chip- ThinkVantage Technologies

    - Size and weight- Power mgmt/battery- Screen type and size- Integrated wireless- Docking station or port replicator- Number of spindles or bays- Modular bay(s)- Sales presentation capability- Integrated wireless, Bluetooth,

    infrared- Security chip- ThinkVantage Technologies

    ServerDesktopNotebook

  • 8/10/2019 Txw102 PC Architecture

    8/62

    PC Architecture (TXW102) 8February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Types and Features of Computers:PC Blades

    User Ports

    The ClearCube User Port connectscomputer peripherals like themonitor, keyboard, mouse, speakers,or USB peripherals to PC Blades atthe data center or telecom closet.

    PC BladeThe PC Blade is each user's actualcomputer: a configurable, Intel-based PCBlade that delivers full functionality to thedesktop.

    CageThe ClearCube Cage isa centralized chassis thathouses up to eight PC Blades.

    ClearCube Management Suite

    The ClearCube Management Suite empowersadministrators to manage the complete ClearCubeinfrastructure from any location. This powerful,remotely accessible suite includes a versatile set offeatures such as "hot spare" switching, movemanagement, and automatic data backup.

    User Port

    (C/Port)

    Direct Connection

    Ethernet

    User Port (I/Port)

    PC is removedfrom users deskand replaced witha small User Port

    PC Blade is in arack in secure,centralized location

    Lenovo resellsClearCube-brandedPC Blades andmanagementsoftware

    PC Blades

    PC Blades separate the guts of the PC from the physical desktop, putting processing power in data

    centers and computer rooms. Employees then have only a monitor, keyboard and mouse on their

    desks, along with a client appliance that is linked back to a blade server. PC blades offer a range of

    benefits, including streamlined management and tighter security since all the hardware iscentralized. PC Blade configurations provide a dedicated blade to each user or a pool of blades that

    can be dynamically allocated. In addition, spare blades can be used to provide hot backup to avoid

    system outages.

    PC Blade Advantages

    Centralized asset management PC Blade hardware is centralized for easy access and asset

    management.

    Mission critical applications Blade infrastructure has high levels of redundancy; users can be

    swapped to a functioning blade very quickly in case of hardware or software failure

    Reduced support costs Hardware or software upgrades can be managed centrally in a fraction

    of the time it would take to upgrade large numbers of dispersed PCs.

    Multiple locations There is potential to support multiple locations with PC Blades by remotely

    switching a user to a spare standby blade in the event of hardware failure (saving the cost of an

    urgent engineer visit or keeping support staff on-site).

    Reduced costs for new users It is lower cost to install and configure a new user with a PC

    Blade than a desktop.

  • 8/10/2019 Txw102 PC Architecture

    9/62

    PC Architecture (TXW102) 9February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    Easy relocation There are no significant costs when users move work location within a building.

    Improved security The physical asset and intellectual property on the disk are centralized, e.g., it

    is easier to steal a hard disk from a desktop than a PC Blade.

    Reduced user down time Spare PC Blades can be configured to provide hot backup in case of

    hardware failure. Improved appearance In front office environments, the clients user port has no moving parts,

    generates no noise, produces little heat, and requires less space.

    Remote access Users can access their own PC environment from multiple desks in the building

    or from other remote locations with blade infrastructure installed

    PC Blade Disadvantages

    Higher acquisition cost Purchase price of PC Blade and its infrastructure is higher than a stand

    alone PC.

    No wireless mobility Mobile users or users who need to work away from their desks are notsupported.

    Lagging technology PC Blade processors and technology may be six to 12 months behind

    desktop technology.

    Unsuitable for power graphics users.

    New infrastructure Significant change to current PC deployment, maintenance, and support

    (skills, tools and processes).

    More difficult to plan and manage upgrades when customer has a mix of PC Blades and traditional

    desktops.

    Lack of local CD and DVD drives except USB devices which open security risks and asset controlissues.

    User resistance for advanced/experienced PC users to losing access to 'their' PC.

    Extra cost for redundancy Extra cost for closet spare (with cooling) to enable redundancy.

    Technology lock in Little option to cascade or sell blades to other users or customers.

  • 8/10/2019 Txw102 PC Architecture

    10/62

    PC Architecture (TXW102) 10February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    PC Blade

    - PC Blade is located with otherPC Blades in a rack in centralizedlocation

    - Intel processor, memory, disk, andgraphics on PC Blade

    User Port

    - Small client device that connects theusers monitor, keyboard, mouse,speakers, and USB devices to theirPC Blade

    - No moving parts, generates no noise,and creates little heat

    - Can support multiple monitors

    Types and Features of Computers:ClearCube PC Blade Products

    PC Blade (ClearCube R1300)

    User Port (ClearCube C/Port)

    ClearCube

    ClearCube is a company that has offered PC Blades since 1997 and dominates the PC Blade

    market. Lenovo resells ClearCube-branded PC Blades and management software.

    See www.clearcube.com for more information.

  • 8/10/2019 Txw102 PC Architecture

    11/62

    PC Architecture (TXW102) 11February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    ClearCube Products

    A PC Blade solution from ClearCube require PC Blades, User Ports, Cage, BackPack, management

    software, and optional accessories.

    The ClearCube PC Blade is an Intel-based computer that delivers full PC functionality to the user

    from a centralized location. The PC Blade is very compact and house all the standard PC componentsincluding an Intel processor, memory, disk drive, and graphics.

    For the client desk, each user requires a ClearCube User Portwhich is a compact device that

    connects the users monitor, keyboard, mouse, speakers, and USB devices to their PC Blade. The

    User Port has no moving parts, generates no noise, and creates very little heat. ClearCube offers

    several User Ports as follows:

    C/Port The C/Port connects to a centralized PC Blade over standard Category 5 cabling up to 200

    meters long. The C/Port is about the same size and weight as a VHS cassette tape.

    Fiber C/Port The Fiber C/Port connects to a centrally located PC Blade over a point-to-point fiber

    optic cable up to 500 meters long. Because stray electromagnetic emissions are eliminated, the

    Fiber C/Port is ideally suited for ultra-secure environments.

    Multi-Video Expander For demanding, multi-task environments, the Multi-Video Expander is a

    C/Port accessory that can be matched with an NVIDIA mezzanine video card on the PC Blade to

    drive up to four displays. By accommodating analog and digital input monitors in a variety of

    physical configurations, the Multi-Video Expander is the perfect choice for hectic, cramped trading

    floors.

    I/Port The I/Port lets users connect to their PC Blades over a standard switched ethernet network.

    By connecting over ethernet and leveraging thin client technology, the distance between a PC

    Blade and the desktop can be unlimited.

    ClearCube R1300 PC Blade

  • 8/10/2019 Txw102 PC Architecture

    12/62

    PC Architecture (TXW102) 12February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    A ClearCube Cage is a 3U-high chassis which houses up to eight PC Blades. Each Cage is a self-

    contained unit that provides all of the ethernet connections, airflow management, and power required

    by the PC Blades. Up to 14 Cages (112 PC Blades) can be mounted in a standard 6 foot rack. A

    BackPack connects directly to the back of each Cage, and PC Blades slide in the front.

    The ClearCube Blade Switching BackPackis an interface that plugs into the rear of the Cage and

    provides all of the external connections for the PC Blades. The BackPack contains the distance

    extension circuitry that links each PC Blade to a User Port. The Blade Switching BackPack also

    features a full 8x8 switching matrix and spare switching circuitry that controls the connections to

    standard and Fiber C/Ports.

    ClearCube C/Port (front)

    ClearCube Cage

    ClearCube Blade Switching BackPack

    ClearCube C/Port (back)

    ClearCube Cages in a rack

  • 8/10/2019 Txw102 PC Architecture

    13/62

    PC Architecture (TXW102) 13February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    The ClearCube Management Suite (CMS) is a comprehensive set of software tools that work

    together to give IT administrators unprecedented control over their computing assets. Inventory

    management, automated health alerting, remote control, hard drive image management, data backup

    and Blade switching are just some of the capabilities ClearCube offers. All of the CMS applications

    can be accessed via secure web browser and can be integrated with industry-standard systems

    management tools.

    Layer 1: Industry standard components

    Layer 2: ClearCube infrastructure

    Layer 3: System management software

    Blade ManagerSwitch Manager

    Data Failover Move Manager

    PC Blade

    BackPackCageUser Port

    ClearCube Management Suite

  • 8/10/2019 Txw102 PC Architecture

    14/62

    PC Architecture (TXW102) 14February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Types and Features of Computers:Lenovo 3000 Desktops and Notebooks

    Lenovo 3000 Desktops (J Series)

    Lenovo 3000 Notebooks

    TowerSmall Desktop

    C200 15" Regular N100 14.1" Wide and 15.4" Wide V100 12" Wide

    Lenovo 3000 Desktops and Notebooks

    In February 2006, Lenovo introduced the 3000 Family of desktops and notebooks. The

    following information shows the branding and positioning of the two product lines.

    The Lenovo 3000 J100/J110 features Intel processors while the Lenovo 3000 J105/J115

    features AMD processors.

    The Lenovo 3000 notebooks are available in various screen sizes in both widescreen and

    standard screen formats.

    Visit lenovo.com/3000 for more information on the Lenovo 3000 Family of desktops and

    notebooks.

    Success, Prestige

    Rock Solid

    Lowest Total Costof Ownership

    Worry-free

    Great Value

    Stylish Design

    InnovativeHigh Quality and Reliability

    Service Excellence

    Small Business/Very Small BusinessLarge Enterprise/Mid-Market

    Think Family(ThinkPad and ThinkCentre)The Ultimate Business Tool

    Lenovo 3000 FamilyThe Smart Choice for

    Small Business

    Common Attributes

  • 8/10/2019 Txw102 PC Architecture

    15/62

    PC Architecture (TXW102) 15February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Types and Features of Computers:Lenovo ThinkPad, ThinkCentre, and ThinkVision

    Lenovo Think Family

    ThinkVantage

    TechnologiesThinkVantage

    DesignThinkPlus

    Accessoriesand Services

    ThinkPad, ThinkCentre, and ThinkVision offerings will continue to differentiateLenovo from our competitors with

    Quality, service, and support expected from Lenovo Industrial design that simplifies and enhances usability Open standards-based products that work well together Lenovo innovation that delivers key benefits for customers

    Lenovo ThinkPad, ThinkCentre, and ThinkVision

    The Lenovo Think-branded family of offerings includes the following brands:

    ThinkPad Notebook category

    ThinkCentre Desktop category ThinkVision Visuals category

    ThinkVantage Technologies Solutions and offerings category

    ThinkPlus Accessories Accessories and upgrades for Think products

    ThinkPlus Services Services for Think offerings

    An essential part of what makes a product a ThinkPad, ThinkCentre, or ThinkVision offering is

    its industrial and graphic design. Lenovo calls this design approach ThinkVantage Design.

    ThinkVantage Design is built upon the concept of synergistically joining form and function.

    ThinkVantage Design provides value to the customer by providing meaningful innovation that

    enhances the ownership experience. It also has its own design DNA based on the classic

    ThinkPad design, which is its heritage.

    Visit lenovo.com for more information on Lenovo brand offerings.

  • 8/10/2019 Txw102 PC Architecture

    16/62

    PC Architecture (TXW102) 16February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Types and Features of Computers:ThinkVantage Technologies

    System Migration AssistantMoves system settings and dataeasily from an old PC to a new PC

    Software Delivery CenterAutomates delivery of applicationsoftware updates to PCs

    ImageUltra BuilderConsolidates multiple softwareimages into one master image

    Rescue and Recovery

    Enables hassle-free recoveryof data and system image

    Client Security SolutionSecures users PCs, data, andnetwork communications fromunauthorized access

    Productivity CenterProvides users with access toself-help support tools andinformation with just one click

    Access ConnectionsSwitches painlessly betweensettings for different wirelessand wired networks

    System UpdateAccesses, downloads, and installs thelatest updates for Think systems

    System Information CenterCollects and tracks PC asset andsecurity compliance information

    ThinkVantage Technologies

    ThinkVantage Technologies are a select group of offerings from

    Lenovo designed to address emerging customer needs. Adding

    value to open industry standards, ThinkVantage Technologies help

    customers manage the cost of deploying end-user systems,implement new technologies such as wireless computing, and help

    ensure that these technologies can be implemented securely. While

    many of these offerings currently exist, some are being significantly

    enhanced and all of them have now been consolidated into a single

    family of offerings.

    Visit lenovo.com/thinkvantage for more information.

    Popup from ThinkVantage

    Productivity Center

  • 8/10/2019 Txw102 PC Architecture

    17/62

    PC Architecture (TXW102) 17February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Types and Features of Computers:Benefits of ThinkVantage Technologies

    ThinkVantage Technologies address the entire customer ownership experience fromdeployment to disposal.

    Image CreationImage Creation

    ImageUltra BuilderImageUltra Builder

    -- Hardware IndependentHardware IndependentImaging TechnologyImaging Technology

    -- Dynamic OperatingDynamic Operating

    EnvironmentEnvironment

    -- Software DeliverySoftware DeliveryAssistantAssistant

    Image on DemandImage on Demand

    Imaging TechnologyImaging TechnologyCenterCenter

    Network DeploymentNetwork Deployment

    Remote DeploymentRemote Deployment

    ManagerManager

    Client MigrationClient Migration

    System MigrationSystem Migration

    AssistantAssistant

    Hassle FreeHassle Free

    ConnectionConnection

    AccessAccess

    ConnectionsConnections

    Secure ClientSecure Client

    DataData

    Client Security SolutionClient Security Solution

    Password ManagerPassword Manager

    Secure DataSecure Data

    MediaMedia

    Active ProtectionActive ProtectionSystemSystem

    Backup andBackup and

    RecoveryRecovery

    Rescue and RecoveryRescue and Recovery

    Critical UpdatesCritical Updates

    Rescue and RecoveryRescue and Recoverywith Antidote Deliverywith Antidote Delivery

    ManagerManager

    EndEnd--user Selfuser Self--

    help Portalhelp Portal

    Productivity CenterProductivity Center

    Rescue andRescue and

    RecoveryRecovery

    InformationInformation

    and Assetand Asset

    ManagementManagement

    System InformationSystem InformationCenterCenter

    Software onSoftware on

    DemandDemand

    Software DeliverySoftware Delivery

    CenterCenter

    System UpdateSystem Update

    Hard DriveHard Drive

    DataData

    DestructionDestruction

    Secure DataSecure Data

    DisposalDisposal

    Benefits of ThinkVantage Technologies

    Industry analysts state that the annualized cost of a PC represents less than 20 percent of the annual

    total cost of ownership. ThinkVantage Technologies address the other 80% to help reduce your

    total cost of ownership. ThinkVantage Technologies also help improve your business' productivity

    and efficiency throughout each system's life cycle as you deploy, connect, protect, support, anddispose of your company's PCs.

    System Information Center Software Distribution Center ImageUltra Builder Secure Data Disposal Remote Deployment Manager

    Access Connections Productivity Center Active Protection System Client Security Software Rescue and Recovery System Migration Assistant System utilities

    Life-cycle Management(solutions for SMB and LE)

    End-user productivity(value out of the box that also can

    provide key IT benefits)

  • 8/10/2019 Txw102 PC Architecture

    18/62

  • 8/10/2019 Txw102 PC Architecture

    19/62

    PC Architecture (TXW102) 19February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    Deployed once per system versus manualprocesses

    $70 per unit deployedSystem Migration Assistant

    $35-60 hardware replacement

    $49-150 encryption software replacement

    $40 support cost reduction

    Replaces comparable equipment (key fobs, etc.)

    $124-250+ per unitClient Security Solution

    Annual savings and only in notebook systems

    Assumes two help desk call per user per year

    $50 per wireless PCAccess Connections

    Only in notebook systems

    $200 is the hardware replacement cost for a

    ThinkPad 30 GB hard drive

    $200 or more peroccurrence

    Active Protection System

    Once per PC per life cycle$45 per PCSecure Data Disposal

    Used for one incident in 13% of installed systems

    Average support time savings of 183 minutes

    $180 per occurrenceRescue and Recovery

    Deployed once per system versus manualprocesses

    $90 per systemRemote Deployment Manager

    Deployed once per system versus typical clonedimage management and loading process

    $100 per unitImageUltra Builder

    Assumptions Used in Calculating SavingsPotential Savings*ThinkVantage Technology

    Potential savings are based on typical customer environments. Some figures represent costs that customers may redirect fromlabor-intensive areas to other areas of their business. Other figures are based on cost avoidance of competitive solutionspurchased separately. All figures are calculated using the TVT and Wireless Calculators and data from Gartner Research andcustomers. Actual savings are not guaranteed and will vary by customer.

    *

  • 8/10/2019 Txw102 PC Architecture

    20/62

    PC Architecture (TXW102) 20February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    PC Architecture:Computer Layers

    Layered structure

    - This structure allows forcompatibility.

    - Bypassing layers increasesperformance.

    BIOS (basic input/output system)

    - Located in flash memory(sometimes called EEPROM)

    - Supports plug-and-play

    - Supports power management

    Device driver

    - Software to control a piece ofhardware

    User

    API

    Operatingsystem

    BIOS

    Hardware

    Applications

    Devicedriver

    Firmware

    Adapter

    Layers

    EEPROM BIOS

    Middleware

    Computer Layers

    A computer consists of several layers that each have interfaces to communicate to the layer next

    to it. A layered structure allows for compatibility; for example, the same shrink wrapped

    operating system can work on millions of PCs from different vendors because it interfaces with

    industry standard BIOS calls. The disadvantage to the layers is that each layer can slow

    performance. So to increase performance a layer could be bypassed; for example, an application

    could be written directly to the BIOS and device driver of a specific computer which would gain

    performance, but would only work on that unique computer.

    Some of the different computer layers shown in the diagram above are explained below.

    Applications are the software programs with which a user typically interacts, such as those used

    for word processing (Microsoft Word), Web browsing (Internet Explorer), sending e-mail

    (Lotus Notes), and using spreadsheets (Microsoft Excel).

    Middleware is software that provides an additional level of abstraction to applications. The idea

    behind the middleware is to hide the complexity of implementing code that is not strictly

    related to the business objectives that the application is supposed to be written for. Writing

    applications against the basic APIs that the OS is able to expose is sometimes very timeconsuming and it might take a while before a programmer starts to get into the business

    modules of the application being developed. Using middleware is like actually talking to a

    cleverer interface compared to the interface provided by the OS. Middleware has to implement

    all the boring stuff, so that developers can concentrate on the business logic. Examples

    include IBM DB2, Oracle, Microsoft SQL Server, Lotus Domino, Microsoft Internet

    Information Server, IBM WebSphere, and BEA WebLogic.

  • 8/10/2019 Txw102 PC Architecture

    21/62

    PC Architecture (TXW102) 21February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    The operating system is a set of programs that provides an environment in which applications

    can run, allowing them easily to take advantage of the processor and I/O devices, such as disks

    or adapters. Examples include Windows 2000, Windows XP, Vista, Red Hat Linux, and AIX

    5L.

    The Basic Input/Output System (BIOS) is a set of program instructions that activates system

    functions independently of hardware design (the layer between the physical hardware and the

    operating system) and allows for software compatibility. BIOS is typically located in flashmemory (EEPROM) on the systemboard. When a PC is started, the BIOS runs a power-on self-

    test (POST). It then tests the system and prepares the computer for operation by searching for

    other BIOSes on the plug-in boards and setting up pointers (interrupt vectors) in memory to

    access those routines. It then loads the operating system and passes control to it. The BIOS

    accepts requests from the drivers as well as the application programs. The BIOS supports plug-

    and-play and power management. BIOS vendors include IBM, AMI, and Phoenix. Although

    there are several BIOS vendors, there are few differences among their products.

    Note: To preclude the problem of performing OS, BIOS, or driver updates before the OS or

    network drivers are loaded, a Preboot Execution Environment (PXE) allows the system to boot

    off the network. At boot, a PXE agent executes, and the PC gets an IP address from a DHCP

    server and then uses the BOOTP protocol to look for a PXE server. The PXE client is firmwareimplemented in BIOS (if LAN hardware is on the systemboard) or as a boot PROM (if LAN

    adapter). Programs, including those in the PXE environment, require system configuration and

    diagnostic information. A Systems Management BIOS (SMBIOS) is a chip that makes the

    necessary information available via BIOS calls that are available through the OS and in the

    preboot environment.

    Firmware is usually the layer of software that is between the device driver and adapter. It

    typically is on a EEPROM of an adapter card and can be upgraded with new releases. Firmware

    is similar to BIOS.

    Device Drivers are a type of software (which may be embedded in firmware) that controls or

    emulates devices attached to the computer such as a printer, scanner, hard disk, monitor, or

    mouse. Device drivers are typically loaded low into the memory of PCs at boot time. A devicedriver expands an operating system's ability to work with peripherals and controls the software

    routines that make peripherals work (a network card, a disk, printer). These routines may be part

    of another program (many applications include device drivers for printers), or they may be

    separate programs. Basic drivers come with the operating system, and drivers are normally

    installed for each peripheral added.

  • 8/10/2019 Txw102 PC Architecture

    22/62

    PC Architecture (TXW102) 22February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    Layers of a PC: Illustration

    To illustrate the different layers of a PC, below is a graphic that shows the series of processes

    that occur when a user executes a single keystroke on a computer keyboard, and the

    corresponding key to the numbered steps.

    1. The user presses N on keyboard.

    2. The code corresponding to pressed key is sent over the cable to the keyboard port on

    the systemboard.

    3. The keyboard BIOS routine accepts the code, translates it into the letter n, and passes

    it to the operating system.

    4. The operating system passes the keystroke to the application program and sends the n

    to the video BIOS (or the device driver).5. The video BIOS sends the n to the graphics circuitry.

    6. The application program accepts the keystroke and instructs the operating system to

    look for the next keystroke.

    7. The n appears on the screen.

    Application Program

    6.

    Operating System

    4.

    BIOS5. 3.

    Video

    Circuitry

    Hardware1. 2.

    Keyboard PortHardware

    Keyboard

    Cable

    7.

  • 8/10/2019 Txw102 PC Architecture

    23/62

    PC Architecture (TXW102) 23February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    PC Architecture:Subsystems

    Major internal subsystems of a PC:

    Processor (Core 2 Duo)

    L2 cache (2 MB)

    Memory (2 GB)

    Bus(es) (PCI, PCIe)

    Graphics controller (SVGA)

    Disk controller (SATA)and disk (250 GB)

    Slots (PCI Express)

    PCIe

    MCH orGMCH

    host bridge

    Processor +L1/L2 cache

    Memory

    I/OController

    Hub(ICH)

    PCI Express

    x16 slot

    Direct

    MediaInterface

    4 SATA disks

    Super I/O

    Low PinCount interface

    AC '97 codec

    or

    High Definition Audio

    USB 2.0Firmware

    hub

    PCI Express slots

    PCIe controllerPCI controller

    IDE controllerUSB controller

    Memory and optional

    graphics controller

    SATA controller

    Subsystems

    Subsystems in a PC communicate to each other via buses. Buses adhere to a particular

    architecture (set of rules) to allow compatibility with the numerous subsystems that adhere to

    the same architecture.

    Most PCs are associated with the term Wintel, which refers to Microsoft Windows and Intel

    chip technologies. PCIe stands for PCI Express.

    The processor is the central component of a PC. Intel and AMD are the main processor vendors

    used in PCs.

    Data in the processor, caches, memory, buses, disk controller, and graphics controller is stored

    electrically; so when electrical power is shut down, this data is lost. Data on the disk is stored

    magnetically, so the data is saved even when electrical power is removed.

  • 8/10/2019 Txw102 PC Architecture

    24/62

    PC Architecture (TXW102) 24February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    PC Architecture:Controllers

    All major subsystems have controllers.

    Controllers are circuitry controlling manner, method, and speed of accessto device.

    Controllers are part of chipset.

    PCI Express (PCIe)Data busBus controller(s)

    2 GBMemoryMemory controller

    2 MBL2 cacheL2 cache controller

    ATI Radeon 9600MonitorGraphics controller

    250 GB Serial ATA diskDiskDisk controller

    ExamplesControlsController

    Controllers

    All major subsystems have controllers that define how data will be obtained and stored.

    Sometimes a controller is a single chip with the data stored in separate physical circuitry. For

    example, a memory controller controls memory, but the data is stored in different physical chips

    called DIMMs.

    Sometimes a single physical chip contains multiple controllers. For example, the I/O Controller

    Hub (ICH) is a single physical chip which houses the PCI Express controller, PCI controller,

    Serial ATA controller, EIDE controller, USB controller, and other controllers.

    Controllers are normally included in the chipset of the computer.

  • 8/10/2019 Txw102 PC Architecture

    25/62

    PC Architecture (TXW102) 25February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    PC Architecture:Buses

    Most transfers use three buses

    Control bus

    Address bus

    Data bus

    Some architectures multiplex signal on same bus (wires)

    16-bit bus = 16 wires for on/off charges (data)32-bit bus = 32 wires for on/off charges (data)64-bit bus = 64 wires for on/off charges (data)

    Processor Memory

    I/OController

    Graphics LANDisk

    Control

    Address

    Data

    Data

    Buses

    If two subsystems are on a bus, such as in the diagram with processor and memory, a data

    transfer first involves sending the address on the address bus. Next, data is sent on the data bus.

    If multiple subsystems exist on a bus, a control bus is needed in addition to the address and databus. The control bus is used to signal which subsystem will control the bus for the next transfer.

  • 8/10/2019 Txw102 PC Architecture

    26/62

    PC Architecture (TXW102) 26February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    Address Bus

    An address bus determines how much memory the processor or any subsystem can directly

    address. For example, a 32-bit address bus means 2 to the power of 32 or 4 billion unique

    numbers to address 4 GB of memory.

    Before data is read or written by a processor, the address of that data is sent first. This address is

    sent on a separate set of physical wires called the address bus. The data is then sent on a

    different set of physical wires called the data bus.

    A processor is designed to use a certain maximum quantity of address lines. The amount of

    physical memory that a processor can address is determined by this quantity. The number of

    unique numbers that can be made by a base two number system (0s and 1s) with the quantity of

    address digits determines the maximum addressable memory of a processor. Software can limit

    this maximum addressability, for example, DOS sets the processor to use 20 address lines as

    DOS only addresses 1 MB of memory.

    Following are some processors and their addressability:

    Sometimes operating systems limit addressability, so that the operating system can not utilize

    all the available physical memory.

    00

    0

    0

    0

    00

    0

    0

    0

    00

    0

    0

    0

    .

    .

    .

    .

    .

    00

    0

    0

    0

    00

    0

    0

    0

    00

    0

    1

    1

    00

    1

    0

    0

    01

    0

    0

    1

    .

    .

    .

    .

    .

    00

    0

    0

    0

    .

    .

    .

    .

    .

    Memory Addressing Similar to Car Odometer

    EM64T virtual memory256 TB48

    EM64T physical memory1 TB40

    Pentium 4, Xeon64 GB36

    Itanium18 TB44

    IA-64 64-bit flat addressing

    486DX2

    486SLC

    Examples

    18 EX64

    4 GB

    16 MB

    Addressable memory

    32

    24

    Address lines

  • 8/10/2019 Txw102 PC Architecture

    27/62

    PC Architecture (TXW102) 27February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    PC Architecture:Bus Speeds

    Each bus is clocked at a different rate. Bus speed is different from data transfer rate (MB/s). Newer buses are double data rate (same MHz doubles throughput). System bus and memory bus can be asynchronous or synchronous.

    MCH orGMCH

    Host Bridge

    Processor +L1/L2 Cache

    MemoryPCI Expressx16 slot

    Direct Media Interface (DMI)100 MHz

    Super I/O

    Low Pin Count (LPC) Interface 33 MHz

    USBFirmwareHub

    System bus400 to 1066 MHz

    Memory bus200 to 400 MHz

    PCIe 2.5 GHz

    PCIe 2.5 GHz

    PCI Express slots

    PCI 2.0 33 MHz

    PCI 2.0 slots4 SATA

    disks

    I/OController

    Hub(ICH)

    Bus Speeds

    Each bus in a PC has a speed (measured in megahertz) and a data transfer rate.

    The bus between the processor and the memory controller was originally called thefrontside

    bus; the processor had a separate bus to its integrated L2 cache called the backside bus and aseparate bus outside the processor to the memory controller called thefrontside bus. The

    frontside bus and the backside bus were two different buses. With the introduction of the

    Pentium 4 and follow-on processors, the frontside bus was namedsystem bus, although both

    terms were still used interchangeably. The change of the name tosystem bus was due to the fact

    that the L2 cache was not isolated off a separate, independent bus to the degree that it was for

    earlier processors, such as the Pentium II and Pentium III.

    The memory bus is clocked at 200 to 400 MHz, but most memory today is double data rate

    (DDR); this means data is transferred on both the rising and falling edge which doubles the

    throughput from the base clock speed.

    The system bus and the memory bus can be either synchronous or asynchronous, depending on

    the memory controller of the chipset. Some memory controllers only support synchronoussystem and memory bus speeds; some support either synchronous or asynchronous speeds. An

    example of a memory controller that supports synchronous system and memory bus speeds is a

    400 MHz system bus with a 200 MHz memory bus with PC2-3200 DDR2 memory (there is an

    even multiple of 200 among 200 MHz and 400 MHz). An asynchronous example is a 400 MHz

    system bus with a 266 MHz memory bus with PC2-4200 533MHz DDR2 memory.

  • 8/10/2019 Txw102 PC Architecture

    28/62

    PC Architecture (TXW102) 28February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    In 1996 and 1997, the PC industry standardized the 66 MHz system bus. Migration to a 100

    MHz system bus occurred in 1998, then to a 133 MHz bus in 2000. The Pentium 4 introduced a

    400 MHz system bus in late 2000, although it was really 100 MHz 4 to yield 400 MHz. Later,Pentium 4 processors utilized an 800 MHz system bus (200 MHz 4) followed by a 1066 MHzsystem bus (266 MHz 4).

    Data Transfer Rates

    Data transfer rates (assuming that data is transferred on only one edge of the clock):

    8-bit at 133 MHz (double data rate) in 266 MB/s (Hub Interface)

    32-bit at 33 MHz is 132 MB/s (PCI bus)

    32-bit at 66 MHz is 264 MB/s (PCI bus)

    64-bit at 33 MHz is 264 MB/s (PCI bus)

    64-bit at 66 MHz is 528 MB/s (PCI bus and system bus)

    64-bit at 100 MHz is 800 MB/s (system bus)

    64-bit at 200 MHz is 1.6 GB/s (backside bus to L2 cache; PC1600 DDR memory)

    64-bit at 266 MHz is 2.1 GB/s (PC2100 DDR memory)

    64-bit at 400 MHz is 3.2 GB/s (backside bus to full speed L2 cache, Pentium 4 system bus)

  • 8/10/2019 Txw102 PC Architecture

    29/62

    PC Architecture (TXW102) 29February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    PC Architecture:Cache

    Cache is a buffer between subsystems.

    Disk transfer could involve five cache locations.

    PCIExpress

    MCH orGMCH

    Host Bridge

    Processor +1. L1 Cache2. L2 Cache

    3. Memory

    I/OController

    Hub(ICH)

    PCI Expressx16 slot

    EIDE Disks

    FirmwareHub

    PCI Express slots

    4.SCSI

    5.

    Cache

    Cache is a storage place (buffer or bucket) that exists between two subsystems in order for data

    to be accessed more quickly to increase performance. Performance is increased because the

    cache subsystem usually has faster access technology and does not have to cross an additional

    bus. Cache is typically used for reads, but it is increasingly being used for writes as well.

    For example, getting information to the processor from the disk involves up to five cache

    locations:

    1. L1 cache in the processor (memory cache)

    2. L2 cache (memory cache)

    3. Software disk cache (in main memory)

    4. Hardware disk cache (some disks may only use an FIFO buffer)

    5. Disk buffer

    For reads, one subsystem will usually request more data than what is immediately needed, andthat excess data is stored in the cache(s). During the next read, the cache(s) is searched for the

    requested data, and if it is found, a read to the subsystem beyond the cache is not necessary.

  • 8/10/2019 Txw102 PC Architecture

    30/62

    PC Architecture (TXW102) 30February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Restriction of hazardous substances in electricaland electronic equipment

    Started by the European Union

    Effective for shipments after July 1, 2006

    Lenovo PC products comply across all of itsproduct lines worldwide

    Restricted substances:

    Lead

    Mercury

    Cadmium Hexavalent chromium

    Polybrominated biphenyls

    Polybrominateddiphenylethers

    IE

    FR

    SP PT

    FIN

    CH

    IT

    GR

    GER

    POL GB

    SE

    NO

    ES

    LV

    LT

    BY

    MAL

    ROM

    BUL YU

    BA

    HR

    AL MK

    CZ SK

    HU

    AT

    NL

    BE

    LU

    CY

    IS

    IE

    FR

    SPPT

    FIN

    CH

    IT

    RUS

    GR TUR

    GER

    POLGB

    SE

    NO

    ES

    LV

    LT

    BY

    UK

    MAL

    ROM

    BULYU

    BA

    HR

    ALMK

    CZ

    SK

    HU

    AT

    NL

    BE

    LU

    CY

    IS

    Industry Standards:Restriction of Hazardous Substances (RoHS) Directive

    Restriction of Hazardous Substances (RoHS) Directive

    In February 2003, the European Union (EU) issued directive 2002/95/EC on the restriction of the

    use of certain hazardous substances in electrical and electronic equipment on the EU market

    beginning July 1, 2006. The Restriction of Hazardous Substances (RoHS) Directive requires

    producers of electrical and electronic equipment to eliminate the use of six environmentally-sensitive substances: lead, mercury, cadmium, hexavalent chromium, and the use of

    polybrominated biphenyls (PBB) and polybrominated diphenylethers (PBDE) flame retardants. The

    purpose is to eliminate the potential risks associated with electronic waste, so this legislation affects

    the content and disposal requirements for electronic products.

    Most IT hardware is included in scope of the directive: PCs, printers, servers, storage, and options.

    Products (and their components) must comply.

    Lenovo PC products comply with the RoHS directive across its product lines worldwide.

    See www.environment-agency.gov.uk/netregs/legislation/380525/477158/?lang=_e for more

    information.

  • 8/10/2019 Txw102 PC Architecture

    31/62

    PC Architecture (TXW102) 31February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    A similar directive from the European Union is the Waste Electrical and Electronic Equipment (WEEE)

    Directive. WEEE encourages and sets criteria for the collection, treatment, recycling and recovery of

    electrical and electronic waste. WEEE requires producers to ensure that equipment they put on the

    market in the EU after August 13, 2005 is marked with the crossed-out wheeled bin symbol, the

    producers name, and indication that the equipment was put on the market after August 13, 2005.

    Lenovo PC products comply with the WEEE Directive requirements.

    WEEE-Compliant Symbol

    Example of RoHS Labeling on a PCI Express Adapter

  • 8/10/2019 Txw102 PC Architecture

    32/62

    PC Architecture (TXW102) 32February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Industry Standards:Intel High Definition Audio (Intel HD Audio)

    Next-generation architecture (after AC 97) for implementing audio, modem,and communications functionality

    Immersive home-theater-quality sound experience including Dolby 7.1audio capability

    Up to eight channels at 192 kHz with 32-bit quality

    Multi-streaming capabilities to send two or more different audio streams todifferent places at the same time

    Supported with Intel ICH6/ICH7/ICH8 family- ICH6/ICH7 integrates both AC 97 and HD Audio to facilitate transition

    - ICH8 only integrates HD audio (not AC '97)

    - Only AC 97 or Intel HD Audio can be used at one time

    Game audio

    Dolby

    Digital

    Chat audio

    Intel HD Audiosupports multiple

    audio streams at

    the same time.

    Intel High Definition Audio (Intel HD Audio)

    Intel High Definition (HD) Audio is an evolutionary technology that replaces AC 97. This next

    generation architecture for implementing audio, modem, and communications functionality was

    developed to enhance the overall user PC audio experience and to improve stability. Intel HD

    Audio facilitates exciting audio usage models while providing audio quality that can deliverconsumer electronics levels of audio experience. The Intel HD Audio specification v1.0 was

    released in June 2004.

    OS native bus driver and IndependentHardware Vendor value-added function driver

    Driver software developed by audio codecsupplier

    Up to 15 input and 15 output streams at onetime and up to 16 channels per stream

    Single stream (in and out)

    24 MHz clock provided by the ICH6 12 MHz clock provided by primary codec

    No codec configuration limitation Codec configuration limitation

    Codec enumeration done by software(bus driver)

    Codec enumeration at boot time (BIOS)

    DMAs: dynamic function assignment AC 97 DMAs: dedicated function assignment Dynamic bandwidth assignment Fixed bandwidth assignment

    8 channels with 32-bit output, 192 kHz multi-channel

    48 Mb/s (SDO), 24 Mb/s (SDI)

    6 channels with 20-bit output, 96 kHz stereo max 12 Mb/s max

    Intel High Definition AudioAC 97

  • 8/10/2019 Txw102 PC Architecture

    33/62

    PC Architecture (TXW102) 33February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    33

    Support for Intel HD Audio is found in the ICH6, ICH7, and ICH8 families. The ICH6 and

    ICH7 integrate both AC 97 and Intel HD Audio to facilitate transition from the older AC 97;

    however, only AC 97 or Intel HD Audio can be used at one time. (Either requires an additional

    external codec chip; when Intel HD Audio was announced, the older AC 97 chips cost less

    money.) The ICH6/ICH7 Intel HD Audio digital link shares pins with the AC 97 link. For

    input, the ICH6/ICH7 adds support from an array of microphones that can be used for enhancedcommunication capabilities and improved speech recognition. The ICH8 only supports HD

    Audio (not AC '97).

    Intel HD Audio has support for a multi-channel audio stream, a 32-bit sample depth, and a

    sample rate up to 192 kHz.

    Intel HD Audio delivers significant improvements over previous-generation integrated audio

    and sound cards. Intel HD Audio hardware is capable of delivering the support and sound

    quality for up to eight channels at 192 kHz/32-bit quality, while the AC 97 specification can

    only support six channels at 48 kHz/20-bit quality. In addition, by providing dedicated system

    bandwidth for critical audio functions, Intel HD Audio is architected to prevent the occasional

    glitches or pops that other audio solutions can have.

    Dolby Laboratories selected Intel HD Audio to bring Dolby-quality surround sound

    technologies to the PC, as part of the PC Logo Program that Dolby recently announced. The

    combination of these technologies marks an important milestone in delivering quality digital

    audio to consumers. Intel HD Audio will be able to support all the Dolby technologies,

    including the latest Dolby Pro Logic IIx, which makes it possible to enjoy older stereo content

    in 7.1-channel surround sound.

    Intel HD Audio also allows users to play back two different audio tracks, such as a CD and a

    DVD simultaneously, which can not be done using current audio solutions. Intel HD Audio

    features multi-streaming capabilities that give users the ability to send two or more differentaudio streams to different places at the same time, from the same PC.

    Intel HD

    Audio Link

    Only Intel HD Audio or AC 97

    may be used at one time

    Intel HD

    Audio

    Controller

    AC 97

    Cntrl

    DockAC Link

    UAA

    bus driver

    AC 97

    drivers

    Intel HDAudio

    registers

    AC 97

    registers

    ICH6OS

    Standardized

    Register Interface

    (UAA)

    Audiodriver

    Modem

    driver

    Modem codec

    Audio codec

    Telephony codec

    HDMI codec

    Dock codecAudio

    codec

    Modem

    codec

    Intel HD Audio Overview

  • 8/10/2019 Txw102 PC Architecture

    34/62

    PC Architecture (TXW102) 34February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    34

    CD

    Dolby Digital

    DTS

    DVD Video

    Surround

    Right

    Center

    Subwoofer

    Left

    Surround

    With Intel HD Audio, a DVD movie with 5.1 audio can be sent

    to a surround sound system in the living room, while you

    listen to digital music and surf the Web on the PC.

    Microsoft has chosen Intel HD Audio as the main architecture for their new Unified Audio

    Architecture (UAA), which provides one driver that will support all Intel HD Audio controllers

    and codecs. While the Microsoft driver is expected to support basic Intel HD Audio functions,

    codec vendors are expected to differentiate their solutions by offering enhanced Intel HD audio

    solutions.

    Intel HD Audio also enables enhanced voice capture through the use of array microphones,giving users more accurate speech input. While other audio implementations have limited

    support for simple array microphones, Intel HD Audio supports larger array microphones. By

    increasing the size of the array microphone, users get incredibly clean input through better noise

    cancellation and beam forming. This produces higher-quality input to voice recognition, Voice

    over IP (VoIP), and other voice-driven activities.

    Intel HD Audio also provides improvements that support better jack retasking. The computer

    can sense when a device is plugged into an audio jack, determine what kind of device it is, and

    change the port function if the device has been plugged into the wrong port. For example, if a

    microphone is plugged into a speaker jack, the computer will recognize the error and can

    change the jack to function as a microphone jack. This is an important step in getting audio to a

    point where it just works. (Users wont need to worry about getting the right device pluggedinto the right audio jack.)

    The Intel HD Audio controller supports up to three codecs (such as an audio codec or modem

    codec). With three Serial Data In (SDI) and one Serial Data Out (SDO) signals, concurrent

    codec transactions on multiple codecs are made possible.

    The SDO connects to all codecs and provides a bandwidth of 48 Mb/s. Each of the three SDIs

    are typically connected to a codec and have a bandwidth of 24 Mb/s. In addition, the controller

    has eight non-dedicated, multipurpose DMA engines (4 input, and 4 output). This allows

    potential for full utilization of DMA engines for better performance than the dedicated function

    DMA engines found in AC 97. In addition, dynamic allocation of the DMA engines allows

    link bandwidth to be managed effectively and enables the support of simultaneous independent

    streams. This capability enables new exciting usage models (e.g., listening to music whileplaying a multi-player game on the Internet).

  • 8/10/2019 Txw102 PC Architecture

    35/62

    PC Architecture (TXW102) 35February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Industry Standards:Intel Active Management Technology (AMT)

    Remote management of networked platforms in any system state (even ifpowered off or crashed)

    Remote hardware and software asset tracking eliminates manual inventorytracking

    Hardware (requires an Intel Ethernet controller) and firmware solution usesout-of-band communication for system access

    Lenovo offers ThinkCentre desktops with Intel AMT support

    Out-of-Band

    System

    Management

    Allows remotemanagementof platformsregardless ofpower on/offstate or OSstate

    Remote

    Troubleshooting

    and Recovery

    Significantlyreduces desk-side visits,increasing theefficiency of ITtechnical staff

    Proactive

    Alerting

    Decreasesdowntime andminimizestime-to-repair

    Remote

    Hardware and

    Software

    Tracking

    Eliminates time-consumingmanual inventorytracking andhuman error,reducing assetaccounting costsand increasingtracking accuracy

    Non-Volatile

    Storage

    Survivespower outagesand systemrebuilds

    Tamper-

    Resistant

    Agents

    Prevents usersfrom removingcriticalinventory,remote-control,or virus-protectionagents

    Intel Active Management Technology (AMT)

    Intel Active Management Technology provides capabilities that make new levels of IT

    management possible. This platform-resident hardware (requires an Intel Ethernet controller)

    and firmware solution uses out-of-band (OOB) communication for platform access regardless of

    the state of the operating system (OS) or platform power. Essentially, the only requirements arethat the platform be corporate network connected and have stand-by power (plugged into an

    electrical outlet). Even when a platform is powered down or has a non-operational OS, Intel

    Active Management Technology maintains access to and management of the platform. This

    "any platform state" access gives corporate IT departments unprecedented power for more

    efficient platform management with reduced IT operating costs. A software-only solution does

    not provide the same level of management when a system is crashed or powered off. See

    www.intel.com/technology/manage/iamt/for more information.

    The ability to communicate with a machine that is powered down has been available for a

    decade through use of the "magic packet." What is new with AMT is that the capability to wake

    up a machine is contained in a piece of hardware and not just in the operating system, where it

    has resided in the past.

    Extensive surveys of numerous IT shops laid the groundwork for defining Intel Active

    Management Technology. Three of the top IT needs revealed by these surveys are better asset

    management, reduced downtime, and minimized desk-side visits. Intel design teams determined

    that these issues are best addressed through platform architectural enhancements, resulting in

    the following solutions:

    OOB System Management Allows remote management of platforms regardless of power

    on/off state or OS state

  • 8/10/2019 Txw102 PC Architecture

    36/62

    PC Architecture (TXW102) 36February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    Remote Troubleshooting and Recovery Significantly reduces desk-side visits, increasing the

    efficiency of IT technical staff

    Proactive Alerting Decreases downtime and minimizes time-to-repair

    Remote Hardware and Software Tracking Eliminates time-consuming manual inventory tracking

    and human error, reducing asset accounting costs and increasing tracking accuracy Non-Volatile Storage Survives power outages and system rebuilds

    Tamper-Resistant Agents Prevents users from removing critical inventory, remote-control, or virus-

    protection agents

    Physical implementation of Intel Active Management Technology utilizes hardware and firmware on

    the platform's systemboard. Platform auxiliary power maintains this technology's features even when

    the platform is turned off.

    To appreciate the importance of the OOB management feature, consider the case where a network

    platform's OS becomes non-operational, as shown in the image above. In the traditional IT

    environment, the end user calls the IT department to report the problem. An IT technician is then sent to

    assess and fix the problem, hopefully in a single desk-side visit or two. On platforms using this newtechnology, problems with a non-operational OS can be quickly and efficiently resolvedpossibly even

    avertedwithout any desk-side visits. The following sequence explains how:

    Proactive alerting reports platform deficiencies, such as an inoperable OS, to the IT management

    console. The proactive alerting feature of this new technology uses OOB communication, which is

    not handled by the OS. As a result, the inoperable OS cannot stop the alert from being sent. The IT

    management console receives the alert about the inoperable OS, and the console operator knows what

    has happened, precluding the need for a desk-side visit.

    Remote booting allows the console operator to take control of the crashed platform by remotely

    booting it to an IT diagnostic platform. At this point, the console operator uses existing management

    software to assess and fix the inoperable OS. This could include reinstallation of the IT-approved OS

    and patches from the IT management platform, eliminating the requirement of a desk-side visit.

    Remote management uses third-party IT management tools that work through a uniform network-

    connected application programming interface (API) provided by Intel Active Management

    Technology.

    System

    down

    System problem

    occurs

    Problem alert to IT

    Remote reboot from IT

    management console

    Remote control and diagnostics of

    platform using ISV applications

    IT Management Console1

    2

    3

    4

    Corporate Network

    Numbers refer to process steps

  • 8/10/2019 Txw102 PC Architecture

    37/62

    PC Architecture (TXW102) 37February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    The image below shows how a corporate IT department can use Intel Active Management Technology

    to inventory platform asset information stored in non-volatile, always-available memory. This always-

    available memory allows the IT department to continue tracking platform inventory in any system state.

    Because it is non-volatile and tamper resistant, asset inventory information cannot be removed,

    intentionally or inadvertently, from platforms, and it survives OS rebuilds. This allows more efficient

    control and use of network platforms, reducing the number of unidentifiable platforms on the intranet.

    ISV application polls

    platforms for inventory

    Platforms report inventory to

    IT Management Console

    IT Management Console

    Corporate Network

    Numbers refer to process steps

    1

    2

    1

    2

    1

    2

    Polling and reporting work

    in any system state

  • 8/10/2019 Txw102 PC Architecture

    38/62

    PC Architecture (TXW102) 38February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Industry Standards:Intel Viiv Technology

    Intel brand name for PCs designed for digital entertainment in the home

    PCs that meet specific criteria (hardware and software) receive thisbranding

    Features:- Instant on/off

    -Simple navigation via remote control

    -Smaller and quieter systems

    Over 100 companies offer content services and products with Viiv logo

    Lenovo does not have any products utilizing this branding

    Intel Viiv Technology

    In January 2006, Intel announced the brand of Intel Viiv technology. Notebook and desktop PCs

    that meet specific criteria can receive this branding; the criteria includes specific hardware and

    software requirements.

    Intel Viiv technology-based PCs feature:

    Consumer electronics-like features for simplified entertainment

    Instant on/off

    Simple navigation to online services with a remote control

    Smaller and quieter systems

    Performance for high definition entertainment

    Intel's latest dual-core processors

    Support for up to 7.1 surround sound

    Support for high definition video including content downloaded from the Internet

    More than 100 companies offer content services and software that have been verified to work with

    Intel Viiv PCs. Look for the Enjoy with logo to identify services and applications that have been

    verified to work with Intel Viiv technology.

    See intel.com/products/viiv for more information.

  • 8/10/2019 Txw102 PC Architecture

    39/62

    PC Architecture (TXW102) 39February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Industry Standards:Intel vPro Technology

    Intel brand name for management of corporate desktop PCs

    Desktop PCs that meet specific criteria (hardware and software)receive this branding

    Features:-Diagnose, reboot, and repair desktops down-the-wire

    -Agent presence checking

    -Remote asset inventory

    -Security virtualization

    Select Lenovo ThinkCentre desktops are vPro-compliant

    Intel vPro Technology

    In April 2006, Intel announced the brand of Intel vPro Technology. Desktop PCs (does not

    apply to notebooks) that meet specific criteria can receive this branding; the criteria includes

    specific hardware and software requirements.Desktop PCs with Intel vPro technology include built-in, hardware-based capabilities that can

    allow remote management, maintenance, and update of PCs that have traditionally been

    inaccessible from the IT management console. A console can remotely communicate with these

    PCs, even if system power is off, the operating system is inoperative, or software agents are not

    yet installed.

    Intel vPros primary feature is the latest version of Intel Active Management Technology

    (IAMT version 2) and Intel Virtualization Technology. It allows the implementation of virtual

    software appliances to enhance security and reliability of corporate PCs; this includes security

    virtualization which enables security software to run as a software appliance in a single virtual

    machine partition isolated from the operating system (Lenovo implements this with its

    ThinkVantage Virtualization Module for Antidote Delivery Manager).

    See intel.com/vpro for more information.

  • 8/10/2019 Txw102 PC Architecture

    40/62

    PC Architecture (TXW102) 40February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Benchmarks

    Understand benchmark objective:either application throughput orsubsystem performance

    Examples include:- BAPCo

    SYSmark 2004 SE

    - MobileMark 2005

    - 3DMark05 and 3DMark06

    - SPEC CPU2000

    PC performancedoubles every

    two years.

    Lenovo ThinkCentre A60

    Benchmarks

    The following is a short list of benchmarks and the systems they measure.

    Overall performance:

    SYSmark 2004 SE - SYSmark includes office productivity and Internet content creation

    benchmark tests. The two scores are combined and given a weighted average to produce an

    overall performance rating. Both SYSmark tests derive scores by using real-world

    applications to run a preset script of user-driven workloads and usage models developed by

    application experts.

    The SYSmark 2004 SE Internet Content Creation test is organized as scenarios that are

    designed to simulate an Internet content creators day. This benchmark incorporates such

    applications as Adobe Photoshop 7.01, Discreet 3ds max 5.0, and Macromedia

    Dreamweaver MX.

    The SYSmark 2004 SE Office Productivity test follows ICCs blueprint by mimicking the

    usage patterns of todays desktop and mobile business users, including the concurrentexecution of multiple programs. Applications such as Adobe Acrobat 5.0.5, McAfee

    VirusScan 7.0, and the Microsoft Office suite are used. Each SYSmark test measures the

    response time of the application to user input. Both scores are combined using a geometric

    mean to get an overall score.

  • 8/10/2019 Txw102 PC Architecture

    41/62

    PC Architecture (TXW102) 41February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    The SYSmark benchmarks are created by BAPCo (Business Applications Performance

    Corporation), which is a nonprofit corporation founded in May 1991 to create objective

    performance benchmarks that are representative of the typical business environment. For

    notebook systems, MobileMark 2005 is a benchmark created by BAPCo that measures both

    performance and battery life at the same time using popular applications. Contact

    www.bapco.com for more information. MobileMark 2005 MobileMark 2005 is the latest version of the premier notebook battery

    life and performance under battery life metric based on real world applications.

    Graphics performance

    3DMark03, 3DMark05, 3DMark06, and 3DMarkMobile06 are benchmark tests that run

    through different scenes using various DirectX or OpenGL calls to derive a score reflecting

    the graphics hardware and driver performance. See www.futuremark.com/products/ for

    more information.

    Battery life

    Business Winstone BatteryMark (BWS BatteryMark) 2004 measures the battery life of

    notebook computers, providing users with a good idea of how long a notebook battery will

    hold up under normal use. This benchmark uses the same workload as in Business

    Winstone 2004.

    Notable benchmark organizations

    In 1988, the Transaction Processing Council (TPC) was formed to fulfill the need for

    transaction processing benchmarks that emulate the workloads found on database servers.

    The council includes representatives from a cross-section of 45 hardware and software

    companies that meet to establish benchmark content. A primary goal of the council is to

    provide objective and verifiable performance data to the industry. Visit www.tpc.org for

    more information.

    The Standard Performance Evaluation Corporation (SPEC) establishes, maintains, and

    endorses a standardized set of relevant benchmarks and metrics for performance evaluation.

    Contact www.specbench.org for more information.

    SPEC CPU2000 - Introduced in late 2000, SPEC (Standard Performance Evaluation Corp.)

    CPU2000 is a workstation application-based benchmark program that can be used across

    several versions of Microsoft Windows NT, Windows 2000, and Unix. It consists of the

    two benchmark suites listed below. Both measure the real-world performance of a

    computers processor, memory architecture, and compiler. They replace CPUmark and

    FPUmark.:

    SPECINT2000 measures computation-intensive integer performance

    SPECFP2000 measures computation-intensive floating point performance.

  • 8/10/2019 Txw102 PC Architecture

    42/62

    PC Architecture (TXW102) 42February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Security Issues:Client Security Solution

    ThinkPad security chip

    ThinkVantage software (Client Security Solution) offersunique advantages

    Robust security solution

    Hardware and software combination

    Client Security Solution

    ThinkVantage Client Security Solution is a unique hardware-

    software combination helps protect your company information,

    including vital security information like passwords, encryption

    keys and electronic credentials, while helping to guard againstunauthorized user access to data.

    This level of security is critical for both desktop and notebook

    systems. In fact, you cannot get a higher level of security on

    select ThinkPad notebooks or ThinkCentre desktops as a

    standard feature on a PC from any other manufacturer.ThinkCentre security chip

    ThinkPad security chip

  • 8/10/2019 Txw102 PC Architecture

    43/62

    PC Architecture (TXW102) 43February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    New Features

    Active Directory support for seamless configuration and management support

    Completely new and easier to use password manager with broader browser support, auto-

    recognize/fill, and per-site security policies

    Multi-factor support and policy manager for improved security

    Updated fingerprint reader software with integrated tutorial

    ThinkVantage Client Security Solution helps turn your computer into a highly protected vault.

    Available preloaded or by download for all ThinkPad notebooks and ThinkCentre desktops, it

    provides advanced technology for user authentication plus enhanced security for wired and

    wireless networking.

    To further enhance security, select ThinkPad and ThinkCentre systems also include an

    embedded Trusted Platform Module (TPM). ThinkVantage Client Security Solution works in

    conjunction with this chip to manage encryption keys and processes.

    The TPM itself is isolated from the operating system using patented tamper-resistant

    technology. To initialize the TPM, users or administrators simply download the Client Security

    Solution and run a single setup wizard to install the software and create a set of master

    encryption keys.

    With new Active Directory integration, IT administrators gain significant flexibility and control

    over how CSS works in the customer environment. From logon to password manager, IT gets

    tremendous flexibility to deploy and enforce policies and customization options.

    Security made easy

    The Client Security Software wizard helps simplify installation and setup and includes a set of

    predefined security settings, allowing you to select the best suited to your needs. For enterprisecustomers, script-driven silent installations can facilitate large deployments and are

    complemented by the ability to push policies to clients from a central server.

    Simplify passwords: The Client Security Password Manager replaces multiple passwords with

    one easy-to-remember password or fingerprint (requires an optional fingerprint reader

    device), thereby reducing password reset calls to the help desk.

    Reset forgotten passwords: Users can pre-configure personal questions for this purpose. If the

    user later forgets his Power On password, Hard Drive password or Windows password, he

    can click a button, answer his pre-configured personal questions and CSS will reset his

    forgotten password, require a new password, and enable the user to log on.

    Simplify encryption: "On-the-fly" file and folder encryption saves you time by automatically

    encrypting files and helping to protect data from unauthorized access.

  • 8/10/2019 Txw102 PC Architecture

    44/62

    PC Architecture (TXW102) 44February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    Flexible security

    Client Security Solution supports the use of a password, a passphrase or a fingerprint as

    authentication credentials for access to protected data. Where central management is an

    important requirement, Client Security Solution can be integrated into a Windows Domain

    Services management model. If very sensitive data must be protected on a PC, the customer can

    create policies that force multi-factor authentication and can integrate Client Security Solutionwith best-of-breed data encryption solutions.

    Client Security Solution includes Utimaco Private Disk Personal Edition so users can

    automatically lock valuable data with file and folder encryption. The size of the "disk volume"

    to be encrypted can be set by IT staff or controlled by the user. Only verified users can unlock

    the encrypted data, so sensitive information is better protected should a computer be stolen. For

    users interested in protecting all the data on their computer, full hard drive encryption is also

    available from Lenovo with Utimaco SafeGuard Easy. (Availability varies by country.)

    Enhanced security for both wired and wireless

    Client Security Solution provides enhanced security for both wired and wireless networks. In

    both cases, the Client Security Solution and TPM ensure data confidentiality and availability by

    providing a hardware- and software-based architecture to provide better protection for sensitive

    keys, identity information and confidential data. Further, for wireless networks, the TPM

    hardware provides enhanced authentication and session confidentiality by concealing

    authentication credentials for industry-standard 802.1x protocols and Cisco LEAP.

    Advanced protection for your digital identity

    By requiring an advanced means of authentication for your systemwhat you know (a

    passcode), what you have (using optional solutions such as a token) or who you are (biometric

    scan, such as a fingerprint)you can help keep your digital identity and data more secure. TheClient Security Solution and TPM store and enable user authentication through integrated

    hardware rather than in the software or memory, both of which are more vulnerable to

    unauthorized users. It also provides additional protection for digital IDs used for e-business

    transactions and network access.

    The ThinkVantage Client Security Solution is certified RSA SecurID-ready for remote access

    protection, and can function as an RSA SecurID authenticator. As a result, mobile users can

    employ cost-efficient SecurID software tokens and carry one less piece of equipment on the

    roadwithout sacrificing security or budget.

  • 8/10/2019 Txw102 PC Architecture

    45/62

    PC Architecture (TXW102) 45February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    ThinkCentre Security Chip

    (2003 to 2004)

    ThinkCentre Security Chip

    (2004 to 2006)

    Security chip was integrated in Super I/O on systemboard as the National

    Semiconductor PC8375T or Winbond PC8375S (TPM 1.2-compliant) Super I/O for

    security chip, Asset ID, serial, parallel, diskette, keyboard, mouse, auto-thermal

    controls, hardware event log

    Security chip was a separate module from Atmel that plugged into

    systemboard

  • 8/10/2019 Txw102 PC Architecture

    46/62

    PC Architecture (TXW102) 46February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    ThinkPad Security Chip

    (2002 to 2003)

    Security chip was a separate module from Atmel mainly used in ThinkPad T3x

    systems that plugged into systemboard

    ThinkPad Security Chip

    (2003 to 2004)

    Security chip was soldered to systemboard and was a module from Atmel

    mainly used in select ThinkPad notebooks such as the T40/T41/T42 systems

    ThinkPad Security Chip

    (2005)

    Security chip was integrated in Super I/O on systemboard as the National

    Semiconductor PC8394T Super I/O for security chip, Asset ID, hardware event log,

    parallel, infrared, keyboard, mouse [docking station ports (serial, diskette)]

  • 8/10/2019 Txw102 PC Architecture

    47/62

    PC Architecture (TXW102) 47February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    ThinkPad Security Chip

    (2005 to 2006)

    Security chip was soldered to systemboard and was a module from Atmel

    mainly used in select ThinkPad notebooks such as the T60/X60/Z60 systems

  • 8/10/2019 Txw102 PC Architecture

    48/62

    PC Architecture (TXW102) 48February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    Trusted Platform Module

    A Trusted Platform Module (TPM) is a special-purpose integrated circuit (IC) built into a variety of

    platforms to enable strong user authentication and machine attestationessential to prevent

    inappropriate access to confidential and sensitive information and to protect against compromised

    networks. Trusted Platform Modules utilize open standards and technologies to ensure interoperability

    of diverse products in mixed-vendor environments.

    The TPM is based on specifications developed by the Trusted Computing Group (TCG). The TCG is

    an industry standards group formed to develop, define, and promote open standards for trusted

    computing and security technologies, including hardware building blocks and software interfaces,

    across multiple platforms, peripherals, and devices. Members include Microsoft, Intel, Dell, HP, IBM,

    and Lenovo. Current TPM implementations are based on the TCG 1.1 specification. TPM

    implementations based on the next-generation version, TCG 1.2, started shipping in 2005. Microsoft's

    Vista due in 2006 will support both TPM 1.1 and 1.2. See www.trustedcomputinggroup.org for

    more information.

    The logon user name and

    password are stored in the

    TPM chip.

    User ID

    Password *******

    abcdefg

    TPM

    chip

    Disk

    Fingerprint reader

    Smart-card

    reader

    Encrypted Files

    Fingerprint and smart-card readers

    can be used in addition to the TPM for

    an additional security layer.

    When files and folders are encrypted, they can

    be decrypted only by the person who has the

    authentication data the TPM chip requires.

    Anyone trying to hack into your system

    will not be able to read any of the

    encrypted files or folders.

    TPM

    chip

    TPM chip Encrypted files

    If a disk is removed, the encrypted data is safe

    because it can not be decrypted without being

    authenticated through the TPM.

    How a Trusted Platform Module (TPM) Secures A System

  • 8/10/2019 Txw102 PC Architecture

    49/62

    PC Architecture (TXW102) 49February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    Platform Attestation with TPMPlatform Attestation without TPM

    Secure access prevents unauthorized access;secure hash comparison validates settings

    Easy to change settings and parameters forunauthorized access and malicious damage

    Validated settings ensure system integrity andprevent inappropriate access

    Altered settings allow inappropriate access tovalued networks and sensitive data

    Trustworthy systems result in reliable andtrustworthy practice; reduce support expenses

    Untrustworthy systems result in unreliable anduntrustworthy practices

    Secure storage of IDs and passwords; multiplelog-in secrets secured by the TPM

    Storage of IDs and passwords in easily copiedfiles; use of one set of secrets for access to allsystems

    On-chip, protected storage of secrets reducesuser burden; enables secure single sign-on;ensures strong protections

    Multiple login IDs and passwords cause users tobe careless; store secrets without protectingthem; use weak protections

    Strong protections eliminate "spoofing"; verifiesintegrity of user login credentials

    Inadequate user ID and password protectionmakes "spoofing" very easy

    User Authentication with TPMUser Authentication without TPM

  • 8/10/2019 Txw102 PC Architecture

    50/62

    PC Architecture (TXW102) 50February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    2006 Lenovo

    Security Issues:Integrated Fingerprint Reader

    Fingerprint image can replace:

    - Power-on password

    - Supervisor password

    - Hard drive password- Windows password

    Easy and reliable to use

    - User slides finger over reader

    - Reader takes multiple snapshots of finger

    - Snapshots are assembled into singleimage

    More productive and secure thanpasswords, key fobs, and smart cards

    - One swipe at power-on and a PC comes

    up to the Windows desktop

    - Impossible to lose as the fingerprintreader is integrated into the system

    Fingerprint software is used as:

    - An interface to the fingerprint reader toregister and manage user fingerprints

    - An interface to Client SecuritySoftware as a means of authentication

    - A means to bypass BIOS andWindows logon passwords

    - A replacement for Windows 2000 andWindows XP logon passwords

    Integrated fingerprint reader is included

    in select ThinkPad notebooks.

    Integrated Fingerprint Reader

    The integrated fingerprint reader is a new security device introduced on select ThinkPad notebook

    models (first introduced on the ThinkPad T42 in October 2004), the Preferred Pro USB Fingerprint

    Reader Keyboard, and USB Fingerprint Reader. The device allows users to register their

    fingerprints on these systems and then use the reader as an authentication device to replace BIOSand Windows passwords. The integrated fingerprint reader can also be used as an authentication

    device with the security chip included on select ThinkPad and ThinkCentre systems.

    The integrated fingerprint reader provides a convenient means for authenticating to a Windows

    system, eliminating the need for users to remember multiple passwords and thereby reducing the

    number of support calls for forgotten passwords. When used with Client Security Solution with

    Password Manager, the fingerprint reader can be used as a means for authenticating to secure

    operations. Fingerprint technology provides the security of unique user identification, and the

    integrated design means no inconvenient external devices are needed.

    The integrated fingerprint reader also comes with a special utility called Fingerprint Software. This

    software allows you to enroll fingerprints and adjust security settings related to the fingerprint

    sensor.

  • 8/10/2019 Txw102 PC Architecture

    51/62

    PC Architecture (TXW102) 51February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    The format of the reader is called a slide sensor. In order to get a reading, you must slide, drag, or

    swipe your finger across the reader. The slide sensor takes sequential snapshots of your finger as it

    slides over the surface. It then stitches those snapshots together to form a fingerprint image that canbe as large as or even larger than the image taken by a contact sensor.

    The advantages of a slide over a contact are as follows:

    The slide can make a larger image of the finger being read. This means the matcher software has

    more data to analyze and is therefore less likely to make a mistake.

    The slide is only 20% of the size of a contact sensor. The much smaller footprint of the slide

    sensor compared to the contact sensor is a key feature in terms of ergonomic and engineering

    considerations around placement of the device.

    Fingerprint Software Screen

  • 8/10/2019 Txw102 PC Architecture

    52/62

    PC Architecture (TXW102) 52February 2007

    Topic 1 - Introduction to Computer Hardware Architecture

    An integrated fingerprint reader is used on the optional

    Preferred Pro USB Fingerprint Reader Keyboard (part number 73P4730)

    An integrated fingerprint reader is supported on select Lenovo

    systems via the optional USB Fingerprint Reader (part number 41U3167)

  • 8/10/2019 Txw102 PC Architecture

    53/62

    PC Ar