scispace - formally typeset
Search or ask a question

Showing papers on "Systems architecture published in 1974"


Journal ArticleDOI
TL;DR: A new approach is introduced for the design of Multi-User Real-Time Computer Networks called "Functional Distribution", which leads to a system architecture called "functional Distribution".
Abstract: A new approach is introduced for the design of Multi-User Real-Time Computer Networks. The approach leads to a system architecture called "Functional Distribution". Definitions of the concept and key issues of a practical implementation are discussed using as an example a Multi-User Experiment Control System. The discussion also includes the architecture of that hardware which has been traditionally referred to as the "interface between an experiment and a computer".

18 citations



Journal ArticleDOI
TL;DR: The character, scope, and economics of computer systems have dynamically evolved into a wide variety of architectures throughout the history of computing.
Abstract: The character, scope, and economics of computer systems have dynamically evolved into a wide variety of architectures throughout the history of computing. The present evolutionary movement of computer system architecture development is a rapid growth toward functionally distributing computer power. It therefore seems appropriate to review. recent developments in distributed-function architecture.

11 citations


Proceedings ArticleDOI
01 Jan 1974
TL;DR: The purpose of the study is to investigate the capability of a new system architecture; to study measurement and evaluation techniques for this and similar classes of architecture; and to derive some general properties of operating systems for machines of this general class.
Abstract: In this paper, a brief introduction is given to a multi associative processor computer system. This architecture embodies multiple control units, each capable of SIMD operation on an associatively addressed set of processing elements. The purpose of the study is threefold: to investigate the capability of a new system architecture; to study measurement and evaluation techniques for this and similar classes of architecture; and to derive some general properties of operating systems for machines of this general class.

3 citations


Journal ArticleDOI
TL;DR: It is believed that current hardware support of security is theoretically sufficient to enable penetration-proof systems to be written, but that additional hardware protection facilities will be required before secure computer systems are a practical reality.
Abstract: Providing security in computer systems has long been an active concern in software. By security we mean providing protection from malicious users and unauthorized preemption of system resources, as well as controlling access to data and programs. We believe that current hardware support of security is theoretically sufficient to enable penetration-proof systems to be written, but that additional hardware protection facilities will be required before secure computer systems are a practical reality. Conventional hardware support of system security includes the following features: i. Base/relocation facilities, which restrict the user to his address space. Examples are the UNIVAC 1108 and GE 635. 2. Multics-type ring structures, which order protection in terms of concentric rings with the outer of a pair of rings unable to access the inner. 3. Multics-type segmentation which both restricts the user to his address space and provides limited protection for each segment of his address space (read, write, and execute). 4. Data tagging which provides type information with data items thereby prohibiting misuse of the items. Minimal protection features, such as those cited above, may be theoretically sufficient to guarantee complete security. However, the proper use of such facilities must then be arbitrated by software alone. This is an unwise approach to the security problem since such software is more complex and less reliable than hardware. This seems to be why there are no fully secure systems in existence today. Examples of areas where security is usually supported by software but could better be done in hardware are: I. Argument certification. Many systems have been vulnerable to caller modification of procedural arguments after their certification by the called routine. Solution of this problem is extremely complex in software, but straightforward in hardware.-37

2 citations


Journal ArticleDOI
01 Dec 1974
TL;DR: This paper will present each of the hardware components of the system and discuss what each contributes to the production of pictures, including data flow, the functions of each major component, and some of the advantages that accrue from the approaches taken.
Abstract: THE PICTURE SYSTEM is a self-contained, stand-alone line drawing system for presenting dynamically moving pictures of two- or three-dimensional objects. This highly interactive system can display smoothly changing true perspective views of 3-D objects in real time. Objects can be rotating, translating, and changing in scale. Individual sub-objects can assume independent or compound motion. Lines or parts of lines outside the chosen viewing window are clipped. All these transformations are performed digitally to avoid inaccuracy and range limitations.In order to perform these calculations fast enough to show smooth motion, support high-level interaction, and also sustain flicker-free pictures of 11000 line segments or more, a new graphics system architecture has been developed. This paper will present each of the hardware components of the system and discuss what each contributes to the production of pictures.THE PICTURE SYSTEM represents a significant new graphics system architecture in several respects. This paper will describe the system including data flow, the functions of each major component, and some of the advantages that accrue from the approaches taken.

1 citations


Journal ArticleDOI
01 Dec 1974
TL;DR: The development of the Space Shuttle Orbiter system is traced through three distinct architectures to the current system, and a system figure of merit for evaluating competing systems architecture is developed.
Abstract: The Space Shuttle Orbiter manned reusable craft is being developed by NASA for applications in the 1980' and beyond. Navigation, guidance flight control, systems management and control, and payload checkout are but a few of the functions of the Orbiter which are being mechanized in the avionics computer complex.The development of the system is traced through three distinct architectures to the current system. Factors affecting the architecture and system development are discussed. A system figure of merit for evaluating competing systems architecture is developed.