Computer Architecture and Organization
I. Course Prefix/Number: CSC 204
Course Name: Computer Architecture and Organization
Credits: 3 (3 lecture; 1 lab)
III. Course (Catalog) Description
A survey of the various levels of hierarchical computer architectures and design. The analysis of internal and external memory models, busses, I/O devices, and CISC/RISC processor strategies are covered. Additional topics include the instruction formats and addressing schemes of architectures such as Intel, MIPS, ARM, and the JVM; parallel and vectorized multiprocessors and multicomputer systems; pipelining; parallel programming; secure and optimized programming techniques; coding and compression schemes; assembly programming in MIPS and MARIE.
IV. Learning Objectives
- Explain the historical development of computers and computer architectures.
- Analyze and emulate various forms of data representation and implement error detection/correction schemes through the use of various techniques.
- Apply digital logic using Boolean tables, circuit diagrams, or K-maps.
- Identify the basic components of computer organization and explain how they work together.
- Analyze the format of instruction sets and the operation of the instruction cycle and trace through their microinstructions.
- Write assembly language programs to implement low-level instructions.
- Analyze the hierarchical internal and external memory organization strategies and simulate the procedures utilized.
- Identify current superscalar microprocessor and multiprocessor models in today's market.
- Identify parallelization schemes such as distributed shared-memory and cluster processing and write programs that utilize them.
- Implement programming techniques that lead to secure programs and identify common coding errors that lead to insecure programs such as buffer and register overflow.
- Implement coding and compression techniques to solve various programming problems.
V. Academic Integrity and Student Conduct
• plagiarism (turning in work not written by you, or lacking proper citation),
• falsification and fabrication (lying or distorting the truth),
• helping others to cheat,
• unauthorized changes on official documents,
• pretending to be someone else or having someone else pretend to be you,
• making or accepting bribes, special favors, or threats, and
• any other behavior that violates academic integrity.
There are serious consequences to violations of the academic integrity policy. Oakton's policies and procedures provide students a fair hearing if a complaint is made against you. If you are found to have violated the policy, the minimum penalty is failure on the assignment and, a disciplinary record will be established and kept on file in the office of the Vice President for Student Affairs for a period of 3 years.
Please review the Code of Academic Conduct and the Code of Student Conduct, both located online at
VI. Sequence of Topics
- Background and introductions
- performance metrics
- arithmetic representation
- floating point
- Organization of computer systems
- bus strategies
- internal memory and cache hierarchies
- external memory
- I/O channels and processors
- CPU components
- register organization
- RISC strategies
- CISC strategies
- pipeline/superscalar processors
- instruction sets and addressing formats
- register organization
- Current architectures
- commodity microprocessors
- Power PC
- commodity microprocessors
- Multi-threaded processing
- cluster processing (OpenMP)
|Suggested 16 week syllabus:|
|1||1||Components, Heirarchy and History of a Computer|
|2-3||2||Number Systems: integers, floating-point standard, character codes||Base Converter, BCD|
|4-5||3||Boolean Algebra and Digital Logic including K-Maps||Adder, Full-adder, Half-adder|
|6-8||4||CPU Organization, System Bus, Clocks, Instruction Processing, Intel and MIPS Architectures||Matrix Multiplication and Memory Optimization|
|9-11||5||Instruction Formats, Instruction Types, MARIE, Intel and MIPS Instruction Sets Huffman Coding||Assembly, Coding and Compression|
|12||6||Cache Memory, Virtual Memory: paging, segmentation||Register Overflow|
|14||8||Java Virtual Machine|
|15||9||RISC Machines, Parallel and Multiprocessor Architectures, Parallel Processing||Parallel schemes|
VII. Methods of Instruction
Course may be taught as face-to-face, hybrid or online course.
VIII. Course Practices Required
Reading of the text is required for understanding the material. Use of a computer laboratory is necessary to learn the design of software.
IX. Instructional Materials
The Essentials of Computer Organization and Architecture w/ An Introduction to MIPS Assembly Language
Edition: Enhanced 4th Edition
Author: Null and Lobur
Copyright Year: 2015
Publisher: Jones & Bartlett
X. Methods of Evaluating Student Progress
Quizzes, written homework, computer assignments, major examinations and a final examination will be used.
XI. Other Course Information
If you have a documented learning, psychological, or physical disability you may be entitled to reasonable academic accommodations or services. To request accommodations or services, contact the Access and Disability Resource Center at the Des Plaines or Skokie campus. All students are expected to fulfill essential course requirements. The College will not waive any essential skill or requirement of a course or degree program.
Oakton Community College is committed to maintaining a campus environment emphasizing the dignity and worth of all members of the community, and complies with all federal and state Title IX requirements.
Resources and support for
- pregnancy-related and parenting accommodations; and
- victims of sexual misconduct
Resources and support for LGBTQ+ students can be found at www.oakton.edu/lgbtq.