100% found this document useful (6 votes)
122 views

Instant ebooks textbook (eBook PDF) The Architecture of Computer Hardware, Systems Software, and Networking: An Information Technology Approach 5th Edition download all chapters

Information

Uploaded by

comiruhel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (6 votes)
122 views

Instant ebooks textbook (eBook PDF) The Architecture of Computer Hardware, Systems Software, and Networking: An Information Technology Approach 5th Edition download all chapters

Information

Uploaded by

comiruhel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

Visit https://ebookluna.

com to download the full version and


explore more ebooks

(eBook PDF) The Architecture of Computer Hardware,


Systems Software, and Networking: An Information
Technology Approach 5th Edition

_____ Click the link below to download _____


https://ebookluna.com/product/ebook-pdf-the-
architecture-of-computer-hardware-systems-software-and-
networking-an-information-technology-approach-5th-
edition/

Explore and download more ebooks at ebookluna.com


Here are some recommended products that might interest you.
You can download now and explore!

Code: The Hidden Language of Computer Hardware and


Software - eBook PDF

https://ebookluna.com/download/code-the-hidden-language-of-computer-
hardware-and-software-ebook-pdf/

ebookluna.com

(eBook PDF) Computer Organization and Design ARM Edition:


The Hardware Software Interface

https://ebookluna.com/product/ebook-pdf-computer-organization-and-
design-arm-edition-the-hardware-software-interface/

ebookluna.com

(eBook PDF) Computer Architecture: A Quantitative Approach


5th Edition

https://ebookluna.com/product/ebook-pdf-computer-architecture-a-
quantitative-approach-5th-edition/

ebookluna.com

Essentials of Computer Organization and Architecture 5th


Edition (eBook PDF)

https://ebookluna.com/product/essentials-of-computer-organization-and-
architecture-5th-edition-ebook-pdf/

ebookluna.com
(eBook PDF) Essentials of Computer Organization and
Architecture 5th Edition

https://ebookluna.com/product/ebook-pdf-essentials-of-computer-
organization-and-architecture-5th-edition/

ebookluna.com

(eBook PDF) The Essentials of Computer Organization and


Architecture 4th

https://ebookluna.com/product/ebook-pdf-the-essentials-of-computer-
organization-and-architecture-4th/

ebookluna.com

Computer Networking: A Top-Down Approach 7th Edition


(eBook PDF)

https://ebookluna.com/product/computer-networking-a-top-down-
approach-7th-edition-ebook-pdf/

ebookluna.com

(eBook PDF) Computer Networking: A Top-Down Approach 7th


Edition

https://ebookluna.com/product/ebook-pdf-computer-networking-a-top-
down-approach-7th-edition/

ebookluna.com

(eBook PDF) Computer Architecture: A Quantitative Approach


6th Edition

https://ebookluna.com/product/ebook-pdf-computer-architecture-a-
quantitative-approach-6th-edition/

ebookluna.com
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page vi

CONTENTS

Preface xviii
About the Author xxv

PART ONE
AN OVERVIEW OF COMPUTER SYSTEMS 2
n CHAPTER 1 Computers and Systems 4
1.0 Introduction 5
1.1 The Starting Point 9
1.2 Components of the Computer System 11
The Hardware Component 13
The Software Component 16
The Communication Component 18
The Computer System 18
1.3 The Concept of Virtualization 20
1.4 Protocols and Standards 20
1.5 Overview of This Book 22
1.6 A Brief Architectural History of the Computer 23
Early Work 24
Computer Hardware 25
Operating Systems 28
Communication, Networks, and the Internet 33
Summary and Review 34 For Further Reading 34
Key Concepts and Terms 35 Reading Review Questions 35
Exercises 36

n CHAPTER 2 An Introduction to System Concepts and Systems


Architecture 38
2.0 Introduction 39
2.1 The General Concept of Systems 40
2.2 IT System Architectures 47
Distributed Processing Systems 49
The Role of the System Architect 59
vi
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page vii

CONTENTS vii

Google: A System Architecture Example 60


Another Example: Facebook’s Application Architecture 64
Summary and Review 65 For Further Reading 66
Key Concepts and Terms 66 Reading Review Questions 67
Exercises 67

PART TWO
DATA IN THE COMPUTER 70
n CHAPTER 3 Number Systems 72
3.0 Introduction 73
3.1 Numbers as a Physical Representation 74
3.2 Counting in Different Bases 74
3.3 Performing Arithmetic in Different Number Bases 78
3.4 Numeric Conversion Between Number Bases 82
An Alternative Conversion Method 83
3.5 Hexadecimal Numbers and Arithmetic 85
3.6 A Special Conversion Case—Number Bases that are Related 87
3.7 Fractions 88
Fractional Conversion Methods 90
3.8 Mixed Number Conversions 93
Summary and Review 94 For Further Reading 94
Key Concepts and Terms 95 Reading Review Questions 95
Exercises 96

n CHAPTER 4 Data Formats 100


4.0 Introduction 101
4.1 General Considerations 101
4.2 Alphanumeric Character Data 104
4.3 Visual Data 111
Bitmap Images 112
Object Images 116
Representing Characters as Images 119
Video Images 120
4.4 Audio Data 120
4.5 Data Compression 124
4.6 Page Description Languages 125
4.7 Internal Computer Data Format 126
Numerical Character to Integer Conversion 128
Summary and Review 129 For Further Reading 130
Key Concepts and Terms 130 Reading Review Questions 131
Exercises 132
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page viii

viii CONTENTS

n CHAPTER 5 Representing Numerical Data 136


5.0 Introduction 137
5.1 Unsigned Binary and Binary-Coded Decimal
Representations 138
5.2 Representations for Signed Integers 141
Sign-and-Magnitude Representation 141
Nine’s Decimal and 1’s Binary Complementary
Representations 143
Ten’s Complement and 2’s Complement 149
Overflow and Carry Conditions 152
Other Bases 153
Summary of Rules for Complementary Numbers 153
5.3 Real Numbers 154
A Review of Exponential Notation 154
Floating Point Format 156
Normalization and Formatting of Floating Point Numbers 158
A Programming Example 161
Floating Point Calculations 162
Floating Point in the Computer 164
Conversion between Base 10 and Base 2 166
5.4 Programming Considerations 167
Summary and Review 168 For Further Reading 169
Key Concepts and Terms 169 Reading Review Questions 169
Exercises 170

PART THREE
COMPUTER ARCHITECTURE AND HARDWARE
OPERATION 176
n CHAPTER 6 The Little Man Computer 178
6.0 Introduction 179
6.1 Layout of the Little Man Computer 179
6.2 Operation of the LMC 181
6.3 A Simple Program 182
6.4 An Extended Instruction Set 184
6.5 The Instruction Cycle 187
6.6 A Note Regarding Computer Architectures 190
Summary and Review 190
Key Concepts and Terms 191 Reading Review Questions 191
Exercises 191
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page ix

CONTENTS ix

n CHAPTER 7 The CPU and Memory 194


7.0 Introduction 195
7.1 The Components of the CPU 196
7.2 The Concept of Registers 197
7.3 The Memory Unit 200
The Operation of Memory 200
Memory Capacity and Addressing Limitations 204
Primary Memory Characteristics and Implementation 205
7.4 The Fetch–Execute Instruction Cycle 207
7.5 Buses 210
Bus Characteristics 210
7.6 Classification of Instructions 214
Data Movement Instructions (LOAD, STORE, and Other
Moves) 215
Arithmetic Instructions 217
Boolean Logic Instructions 218
Single Operand Manipulation Instructions 218
Bit Manipulation Instructions 218
Shift and Rotate Instructions 218
Program Control Instructions 219
Stack Instructions 220
Multiple Data Instructions 223
Other Instructions 224
7.7 Instruction Word Formats 224
7.8 Instruction Word Requirements and Constraints 226
Summary and Review 229 For Further Reading 229
Key Concepts and Terms 230 Reading Review Questions 230
Exercises 231

n CHAPTER 8 CPU and Memory: Design, Enhancement,


and Implementation 234
8.0 Introduction 235
8.1 CPU Architectures 236
Overview 236
Traditional Modern Architectures 237
8.2 CPU Features and Enhancements 238
Introduction 238
Fetch–Execute Cycle Timing Issues 239
A Model for Improved CPU Performance 241
Scalar and Superscalar Processor Organization 245
8.3 Memory Enhancements 248
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page x

x CONTENTS

Wide Path Memory Access 249


Memory Interleaving 249
Cache Memory 250
8.4 The Compleat Modern Superscalar CPU 254
8.5 Multiprocessing 256
8.6 A Few Comments on Implementation 260
Summary and Review 260 For Further Reading 261
Key Concepts and Terms 262 Reading Review Questions 262
Exercises 263

n CHAPTER 9 Input/Output 266


9.0 Introduction 267
9.1 Characteristics of Typical I/O Devices 268
9.2 Programmed I/O 273
9.3 Interrupts 275
Servicing Interrupts 275
The Uses of Interrupts 277
Multiple Interrupts and Prioritization 282
9.4 Direct Memory Access 286
9.5 I/O Controllers 289
Summary and Review 291 For Further Reading 292
Key Concepts and Terms 292 Reading Review Questions 292
Exercises 293

n CHAPTER 10 Computer Peripherals 294


10.0 Introduction 295
10.1 The Hierarchy of Storage 296
10.2 Solid-State Memory 298
10.3 Magnetic Disks 299
Disk Arrays 306
10.4 Optical Disk Storage 307
10.5 Magnetic Tape 309
10.6 Displays 310
Basic Display Design 310
Graphical Processing Units (GPUs) 312
Liquid Crystal Display Technology 316
OLED Display Technology 317
10.7 Printers 317
Laser Printers 319
Inkjet Printers 320
10.8 User Input Devices 320
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page xi

CONTENTS xi

Keyboards 320
Pointing Devices 321
Alternative Sources of Alphanumeric Input 322
Scanners 324
Multimedia Input 324
Mobile Devices 325
10.9 Network Communication Devices 326
Summary and Review 327 For Further Reading 327
Key Concepts and Terms 328 Reading Review Questions 328
Exercises 329

n CHAPTER 11 Modern Computer Systems 332


11.0 Introduction 333
11.1 Putting All the Pieces Together 335
11.2 System Architecture 340
Basic System Interconnection Requirements 341
Bus I/O 343
Channel Architecture 347
Blurring the Line 349
11.3 Computer Interconnection: A Brief Overview 349
11.4 Clusters 350
Overview 350
Classification and Configuration 350
Beowulf Clusters 352
11.5 High-Performance Computing 353
Grid Computing 354
Summary and Review 354 For Further Reading 355
Key Concepts and Terms 355 Reading Review Questions 356
Exercises 356

PART FOUR
NETWORKS AND DATA COMMUNICATIONS 358
n CHAPTER 12 Networks and Data Communications—An
Overview 360
12.0 Introduction 361
12.1 The Impact of Networking on Business Processes and User
Access to Knowledge and Services 362
12.2 A Simple View of Data Communications 363
12.3 Basic Data Communication Concepts 366
Messages 366
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page xii

xii CONTENTS

Packets 367
General Channel Characteristics 369
12.4 Networks 373
Network Topology 373
Types of Networks 376
Network Interconnection 390
12.5 Standards 393
Summary and Review 395 For Further Reading 396
Key Concepts and Terms 396 Reading Review Questions 397
Exercises 397

n CHAPTER 13 Ethernet and TCP/IP Networking 400


13.0 Introduction 401
13.1 TCP/IP, OSI, and Other Communication Protocol Models 402
13.2 Program Applications Versus Network Applications 406
13.3 The Physical and Data Link Layers 407
The Physical Layer 408
The Data Link Layer 408
Hub-Based Ethernet 410
Switched Ethernet 411
Wireless Ethernet (Wi-Fi) 411
13.4 The Network Layer 413
13.5 The Transport Layer 416
13.6 IP Addresses 421
IPv4 and DHCP 421
IPv6 425
13.7 Domain Names and DNS Services 425
13.8 Quality of Service 430
13.9 Network Security 431
Physical and Logical Access Restriction 432
Encryption 432
13.10 Alternative Protocols 433
A Comparison of TCP/IP and OSI 433
Other Protocol Suites and Components 434
SCSI Over IP 434
Cellular Technology 435
MPLS 435
SONET/SDH 436
Frame Relay 436
Summary and Review 436 For Further Reading 437
Key Concepts and Terms 437 Reading Review Questions 438
Exercises 439
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page xiii

CONTENTS xiii

n CHAPTER 14 Communication Channel Technology 442


14.0 Introduction 443
14.1 Communication Channel Technology 444
14.2 The Fundamentals of Signaling Technology 447
Analog Signaling 448
Digital Signaling 456
Modems 461
14.3 Transmission Media and Signaling Methods 462
14.4 Alternative Technologies 464
Cellular Technology 464
Wi-Fi 466
Bluetooth 466
Summary and Review 467 For Further Reading 468
Key Concepts and Terms 468 Reading Review Questions 469
Exercises 470

PART FIVE
THE SOFTWARE COMPONENT 474
n CHAPTER 15 Operating Systems: An Overview 476
15.0 Introduction 477
15.1 The Barebones Computer System 478
15.2 The Operating Systems Concept: An Introduction 479
15.3 Services and Facilities 485
User Interface and Command Execution Services 486
File Management 487
Input/Output Services 489
Process Control Management 489
Memory Management 490
Scheduling and Dispatch 491
Secondary Storage Management 493
Network and Communications Support Services 494
Security and Protection Services 494
System Administration Support 495
15.4 Organization 499
15.5 Types of Computer Systems 502
Summary and Review 506 For Further Reading 506
Key Concepts and Terms 507 Reading Review Questions 507
Exercises 508
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page xiv

xiv CONTENTS

n CHAPTER 16 The User View of Operating Systems 510


16.0 Introduction 511
16.1 Purpose of the User Interface 512
16.2 User Functions and Program Services 514
Program Execution 514
File Commands 515
Disk and Other I/O Device Commands 516
Security and Data Integrity Protection 516
Interuser Communication and Data Sharing Operations 517
System Status Information and User Administration 518
Program Services 519
16.3 Types of User Interface 519
The Command Line Interface 520
Batch System Commands 522
Graphical User Interfaces 523
Touchless Gesture- and Voice-Based Interfaces 528
Trade-offs in the User Interface 529
Software Considerations 530
16.4 X Window and Other Graphics Display Methodologies 532
16.5 Command and Scripting Languages 535
The Elements of a Command Language 536
The Command Language Start-up Sequence Files 537
16.6 Services to Programs 538
Summary and Review 540 For Further Reading 540
Key Concepts and Terms 540 Reading Review Questions 541
Exercises 541

n CHAPTER 17 File Management 544


17.0 Introduction 545
17.1 The Logical and Physical View of Files 545
17.2 The Role of the File Management System 550
17.3 Logical File Access Methods 555
Sequential File Access 555
Random Access 556
Indexed Access 557
17.4 Physical File Storage 557
Contiguous Storage Allocation 558
Noncontiguous Storage Allocation 559
Indexed Allocation 561
Free Space Management 564
Tape Allocation 565
Visit https://ebookluna.com
now to explore a diverse
collection of ebooks available
in formats like PDF, EPUB, and
MOBI, compatible with all
devices. Don’t miss the chance
to enjoy exciting offers and
quickly download high-quality
materials in just a few simple
steps!
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page xv

CONTENTS xv

CD, DVD, and Flash Drive Allocation 566


17.5 File Systems, Volumes, Disks, Partitions, and Storage Pools 566
17.6 The Directory Structure 569
Tree-Structured Directories 570
Acyclic-Graph Directories 573
17.7 Network File Access 576
17.8 Storage Area Networks 578
17.9 File Protection 578
17.10 Journaling File Systems 581
Summary and Review 581 For Further Reading 582
Key Concepts and Terms 582 Reading Review Questions 583
Exercises 584

n CHAPTER 18 The Internal Operating System 586


18.0 Introduction 587
18.1 Fundamental OS Requirements 588
Example: A Simple Multitasking Operating System 590
18.2 Starting the Computer System: The Bootstrap 592
18.3 Processes and Threads 595
Process Creation 597
Process States 598
Threads 600
18.4 Basic Loading and Execution Operations 600
18.5 CPU Scheduling and Dispatching 601
High-Level Scheduler 601
Dispatching 603
Nonpreemptive Dispatch Algorithms 605
Preemptive Dispatch Algorithms 606
18.6 Memory Management 608
Memory Partitioning 608
18.7 Virtual Storage 610
Overview 610
Pages and Frames 610
The Concept of Virtual Storage 616
Page Faults 617
Working Sets and the Concept of Locality 619
Page Sharing 620
Page Replacement Algorithms 620
Thrashing 624
Page Table Implementation 624
Segmentation 626
Process Separation 627
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page xvi

xvi CONTENTS

18.8 Secondary Storage Scheduling 627


First-Come, First-Served Scheduling 627
Shortest Distance First Scheduling 628
Scan Scheduling 628
n-Step c-Scan Scheduling 628
18.9 Network Operating System Services 629
OS Protocol Support and Other Services 629
18.10 Other Operating System Issues 632
Deadlock 632
Other Issues 632
18.11 Virtual Machines 634
Summary and Review 636 For Further Reading 636
Key Concepts and Terms 637 Reading Review Questions 638
Exercises 639
Bibliography 645
Index 657

SUPPLEMENTARY CHAPTERS
On the Web at www.wiley.com/college/englander

n SUPPLEMENTARY CHAPTER 1 An Introduction to Digital


Computer Logic
S1.0 Introduction
S1.1 Boolean Algebra
S1.2 Gates and Combinatorial Logic
S1.3 Sequential Logic Circuits
Summary and Review For Further Reading
Key Concepts and Terms Reading Review Questions
Exercises

n SUPPLEMENTARY CHAPTER 2 System Examples


S2.0 Introduction
S2.1 Hardware Examples
The x86 Family
The POWER Family
The IBM System 360/370/390/zSeries Family
S2.2 Operating System Examples
The Microsoft Windows Family
UNIX and Linux
The IBM z/OS Operating System
Englander ftoc.tex V2 - December 10, 2013 12:46 A.M. Page xvii

CONTENTS xvii

S2.3 Networking Examples


Google
Summary and Review For Further Reading
Key Concepts and Terms Reading Review Questions
Exercises

n SUPPLEMENTARY CHAPTER 3 Instruction Addressing


Modes
S3.0 Introduction
S3.1 Register Addressing
S3.2 Alternatives to Absolute Addressing
S3.3 Alternatives to Direct Addressing
Immediate Addressing
Indirect Addressing
Register Indirect Addressing
Indexed Addressing
Indirect Indexed and Indirect Indexed Addressing
Summary and Review For Further Reading
Key Concepts and Terms Reading Review Questions
Exercises

n SUPPLEMENTARY CHAPTER 4 Programming Tools


S4.0 Introduction
S4.1 Program Editing and Entry
S4.2 The Concept of Program Translation
S4.3 Assembly Language and the Assembler
Operation of the Assembler
Assembly Language Formats
Features and Extensions
Relocatability
S4.4 Program Language Description and Rules
A Description of Written English
Programming Language Rules
Computer Language Descriptions
The Compilation Process
Interpreters
S4.5 Linking and Loading
S4.6 Debuggers
Summary and Review For Further Reading
Key Concepts and Terms Reading Review Questions
Exercises
Englander f02.tex V2 - December 9, 2013 2:51 P.M. Page xviii

PREFACE

T
he modern world offers a lot of readily available online resources for learning. Wikipedia,
Google, news sources, millions of Web sites and blogs, even YouTube, offer access to
information in nearly any subject that triggers your curiosity and interest. Nonetheless,
I continue to believe that for deep understanding of something, nothing beats the integrated
approach and focus of an old-fashioned printed-on-paper textbook. Well—maybe the e-book
equivalent, but, still, a textbook.
When I open a new book, in any subject, the first thing I want to know is what the book
has to offer that makes it worth my while to read it. I would like to try to help you answer that
question for the book that you’re holding in your hand or on your tablet.
The information systems and technology fields are wonderfully exciting places to be! It
seems as though every day brings new developments that alter the ways we create and work
with information. Of course, with this excitement comes a challenge. To be a successful player
in IS or IT, we have to be adaptable and flexible.
Much of the change occurs around computer system technology. The computer is, after
all, at the foundation of information systems. A deep understanding of computer systems is,
therefore, an essential element of success. We must be able to understand each new development,
assess its value, and place it in the context of our knowledge of computer systems.
The subject of this book is the architecture of computer systems. Computer architecture is
about the structure and operation of digital computers and computer-based devices. Computer
architecture is concerned with the operational methods of the hardware; with the services
provided by operating system software; with the acquisition, processing, storage, and output of
data; and with the interaction between computer-based devices.
There is a tendency for people in information systems and technology to neglect a study
of computer architecture. After all, the technology changes so rapidly—is it really worth trying
to understand something that may be out of date by the time I finish this book? There is no
question that computer technology has evolved rapidly. The computer in a smartphone is far
more powerful than the mainframe computer of twenty-five years ago, with memory, disk and
flash storage capacity, display and multimedia capability, and ease of use that would have been
unthinkable just a few years ago. Even more important, connecting systems to work together is
now routine and simple.
Interestingly enough, however, as profound as advances in the technology have been, the
concepts of computer architecture that really matter have changed only nominally over the
last seventy years. The new technologies are based on a foundation of architectural concepts
that were developed many years ago. The architecture of a modern computer system was
developed in the 1940s. The instruction set in a modern personal computer or smartphone is
nearly identical to that of computers built in the 1950s and 1960s. Modern operating system
xviii
Englander f02.tex V2 - December 9, 2013 2:51 P.M. Page xix

PREFACE xix

techniques were developed in the 1960s. The graphical user interface is based on a 1960s’
project. The Internet is built from concepts developed more than forty years ago.
So you see that an understanding of computer architecture makes it possible to “ride the
wave” of technological change, secure in the feeling that you are equipped to deal with new
developments as they occur, and to have fun doing so. When you are done reading this book,
you will have substantial knowledge about how a computer works and a good understanding of
the operating concepts, the hardware, and system software that make up a computer. You will
see the interaction between computers and between data and the computer. Plus, you will have
learned lots of jargon that you can show off at parties and job interviews.
This textbook is designed for a wide range of readers, both undergraduate and graduate.
The material is specifically directed toward IS and IT majors. There are no explicit prerequisites,
although the book assumes that the student is familiar with a personal computer. It also assumes
(but does not require) some basic programming skills: although there is no programming in
the book, program code is occasionally used as an example to clarify an idea, and a knowledge
of programming is helpful at understanding instruction set design and program execution
concepts. The material in this textbook conforms to the criteria of the IT Infrastructure courses
and core concepts, as described in the ACM and AIS standard IS2010 and IT2008 curricula.
Although the material in this book may be useful as background for system design and
implementation project courses, the course can be placed anywhere in the curriculum.
Most instructors will not cover the entire textbook in a single semester. The organization
of this book is designed to allow an instructor to cover the major topic areas in different levels
of depth, depending on the experience and needs of the students. On the other hand, it is my
intention that this book will serve a student as a useful reference long after the formal course is
completed. It is designed for use as a book where a professional can look up the basic concepts
that clarify new developments as they occur.
This text is the outgrowth of courses that I have taught to CIS majors and minors at
Bentley University at both the undergraduate and graduate levels for more than thirty years.
Student responses to the material and the approach have generally been very enthusiastic. Many
students have returned after graduation to tell me that their knowledge in this area has directly
contributed to their career development. Along the way, student comments have also been
extremely helpful to me in the book’s continuing evolution.
Those familiar with previous editions will notice that the organization of recent editions
has undergone substantial revision to reflect current technological practices and trends.
In particular, it is no longer reasonable to discuss computers as individual units without
also considering the networks that tie them together; computer networking is now covered
thoroughly in its own section, and there is an increased emphasis on the integration and synergy
of the various components of the computer system and on the system as a whole. Still, the basic
philosophy, organization, and approach remain essentially similar to those of the first edition,
reflecting the unchanging nature of the underlying principles.

ORGANIZATION OF THE FIFTH EDITION,


NOTING CHANGES FROM PREVIOUS EDITIONS
The biggest challenge for me as the author of this book has been to preserve the guiding principles
established in the first edition, while reflecting the major changes in the way computers are
Englander f02.tex V2 - December 9, 2013 2:51 P.M. Page xx

xx PREFACE

used, in the rapid deployment of new technology, and in the resulting evolution of IS/IT
curriculum to reflect those changes. The fifth edition is a substantial, though incremental,
update to previous editions. It reflects the rapid growth in the use of tablets and smartphones as
important computing devices. The material on networking has been substantially reorganized.
Still, users of previous editions will find that much of the material is familiar; after all, the way
in which computers are used in IS/IT may have changed, but the basic guiding principles of
computer architecture are essentially the same as they have been for many years.
This book is organized into five parts totaling eighteen chapters, plus four additional
supplementary chapters that are posted on the Web. The first part serves as an introduction
and overview of the role of the computer in information systems; it introduces the concept of
a system and provides a brief introduction to each of the components that make up a modern
computer system. Each of the remaining four parts deals with a single architectural aspect of
the computer system.
Part Two discusses the role and representation of data in the computer. Here, we consider
numbers, text, sound, images, video, and other data forms. Part Three presents the hardware
architecture and operational concepts. It introduces the components of a computer and shows
how they collaborate to execute computer instructions, discusses the nature of a computer
instruction set, and explores the interaction between the CPU, memory, and I/O peripheral
devices. Part Four presents a thorough introduction to the basics of computer networking. Part
Five discusses the system software, the programs that function to make the resources of the
computer system, and other interconnected computer systems and components, accessible to
the user and to application programs.
The approach within each group of chapters is layered. Each new layer builds upon the
previous material to add depth and understanding to the reader’s knowledge. Each topic section
consists of a short introduction that places the topic to be discussed into the context of the
computer system as a whole and then lays out in detail the organization of the chapters within
the section. Each topic area is introduced as gently as possible, using ideas and examples that are
already familiar to students. Successive material is progressive and accumulative. In addition
to the numerous examples that are used throughout the text, the supplementary chapters
offer substantial case studies that show application of the text material to current examples
of importance. Overall, the approach is gentle, progressive, and accumulative. As much as
possible, each section is self-contained.
An overview of the organization of each part follows. A few comments about the differences
between the fourth and fifth editions are included for those who are familiar with the previous
edition. More details can be found in the introductions to each section.
Part One consists of two chapters that present a short overview of computing and placing
architectural concepts into the context of information technology. Chapter 1 introduces the
components of a computer system and shows the relationships among the components. In the
new edition, I have assumed that today’s students are more familiar with computer technology
and terminology than previous generations, so there is less introduction of “IT101”-type
material. Chapter 1 also presents a simple model of computing and discusses the importance
of standards and protocols in the development of computer systems. This chapter concludes
with a short history of computers from the architectural point of view. Chapter 2 focuses on the
concepts of systems, models, and system architectures, using various types of computer systems
as examples. There are several relatively small but important additions and updates in this
chapter. In Section 2.2, there is an increased emphasis on n-tier architectures and distributed
Englander f02.tex V2 - December 9, 2013 2:51 P.M. Page xxi

PREFACE xxi

computing. Section 2.2 also contains a new section on cloud computing, which is presented as
a variation of the client–server concept. A new Facebook application architecture example has
also been added.
Chapters 3 through 5 comprise Part Two. Chapter 3 introduces number systems and basic
number system operations; it then explores the relationships between numbers in different
number bases and the conversion techniques between the different representations. Chapter 4
investigates different types of data formats, including alphanumeric, image, video, and audio
formats. It considers the relationship between numerical and character-based representations.
Previously, Chapter 4 also introduced various devices and data formats used for data input and
output. Much of that material has been moved to Chapter 10 since it is more directly related to
the devices themselves. Chapter 5 studies the various formats that are used to represent and to
perform calculations on integer and floating point numbers.
Part Three discusses the hardware architecture and operational aspects of the computer.
Chapter 6 begins the study with the introduction of the Little Man Computer, a simple model that
provides a surprisingly accurate representation of the CPU and memory. The model is used to
develop the concept of an instruction set and to explain the basic principles of the von Neumann
architecture. Chapter 7 extends the discussion to a real computer. It introduces the components
of the CPU and shows their relationship to the Little Man Computer model. It introduces the
bus concept, explains the operation of memory, presents the instruction fetch–execute cycle,
and discusses the instruction set. It identifies important classes of instructions and discusses
the ways in which instructions can be categorized. The ARM instruction set is offered as an
illustration of a typical current CPU model.
Chapter 8 expands the material in Chapter 7 to consider more advanced features of the CPU
and memory. It offers an overview of various CPU architectures. It continues with a discussion
of techniques for improving memory access, particularly cache memory, and an introduction
to current CPU organization, design, and implementation techniques, including pipelining and
superscalar processing. This chapter also introduces multiprocessing (or multicore, in current
terminology) concepts. Chapter 8 received basic updating from the previous edition, including
elimination of the VLIW and EPIC architectures that never caught on.
Chapter 9 presents the principles of I/O operation, and Chapter 10 illustrates how I/O
is performed in various I/O devices. With the advent of powerful tablets and smartphones,
Chapter 10 received a substantial overhaul. Solid-state storage is of increased importance, and
Section 10.2 has been expanded to increase the coverage. Section 10.3, the display section,
has a new discussion of graphical processing units. CRTs have been eliminated altogether.
The discussions of text-mode display processing and different types of raster scans have
been minimized. The discussion of printers in Section 10.4 now considers only laser and
inkjet technologies. Section 10.8, user input devices, now includes the alternative sources of
alphanumeric input, moved from Chapter 4, plus more on touch screens and voice input. There
is an additional section discussing the sensors available on mobile devices, including GPS,
accelerometers, gyroscopes, magnetic field sensors, and near-field communication sensors.
Chapter 11 discusses the computer system as a whole. It discusses the interconnection
techniques and integration of the various hardware components. Chapter 11 has been updated
to reflect modern systems, including mobile systems and radically changed bus architecture
technology. The new, just-introduced Intel Haswell architecture and System on a Chip concepts
are included. Firewire was removed; the Thunderbird port is introduced in its place. Chapter 11
Englander f02.tex V2 - December 9, 2013 2:51 P.M. Page xxii

xxii PREFACE

also addresses the interconnection of computers to increase the performance and reliability of
a computer with a specific focus on clustering and grid computing.
Three supplementary chapters on the Web provide additional resources to support the
chapters in Part Three. Supplementary Chapter 1 (SC1) offers an introduction to Boolean
algebra, combinatorial logic, and sequential logic for those readers that would like a deeper
understanding of the computer in its simplest and most elegant form. Supplementary Chapter 2
(SC2) offers three detailed case studies of important architectures: the Intel x86 family, the Power
computer, and the IBM zSystem. As of this writing, this supplement is currently being updated.
Supplementary Chapter 3 (SC3) discusses alternative approaches to instruction addressing.
Part Four, Chapters 12–14, presents a thorough introduction to networking. For the fifth
edition, Chapters 12 and 13 received a major reorganization; to a much lesser extent, Chapter 14
is also affected by the change. The goal was a more unified and systematic presentation of
networking material.
Chapter 12 introduces the concept of a communication channel and explores its charac-
teristics and configurations. This includes the communication channel model, the concept of
links, packets, basic channel characteristics, network topology, types of networks (LAN, MAN,
etc.), and basic network interconnection and routing. All of the material related to protocols
and movement of data through the network has been moved to Chapter 13. The chapter is
retitled as Networks and Data Communications—An Overview.
Chapter 13 now focuses on the passage of data packets through a network. The chapter
is now titled Ethernet and TCP/IP Networking. Section 13.1 introduces TCP/IP and OSI and
the concept of layered communication. Section 13.2 describes the differences between program
applications and network applications. Following these two sections, the next three sections
carefully describe the process of moving packets, one layer at a time, from the bottom-up. It
should be noted that wireless networking has been moved from Chapter 14 and is now included
as part of the Ethernet discussion. Sections 13.6 and 13.7 explain IPv4 and IPv6 addressing and
DHCP, and DNS, respectively. Quality of Service and network security are briefly introduced
in Sections 13.8 and 13.9. The chapter concludes with a discussion of alternative protocols,
including a comparison of OSI and TCP/IP, as well as brief discussions of MPLS, cellular
technology, and other protocol suites.
Chapter 14 focuses primarily on communication channel technology, including analog
and digital signaling, modulation and data conversion techniques between analog and digital,
and the characteristics of transmission media. Sections 14.1–14.3 are relatively unchanged.
Section 14.4, however, is mostly new. Titled Alternative Technologies, it offers advanced
introductions to the radio technologies of LTE cellular technology, Wi-Fi, and Bluetooth.
Part Five is dedicated to a discussion of system software. Chapter 15 provides an overview
of the operating system. It explains the different roles played by the operating system and
introduces the facilities and services provided. Chapter 16 presents the role of the operating
system from the viewpoint of the user of a system. The fifth edition offers new screenshots of
Windows 8 and recent versions of Linux. Chapter 17 discusses the all-important topic of file
systems, including an introduction to Microsoft’s new Resilient File System, intended to replace
NTFS. Chapter 18 discusses the operating system as a resource manager, with an in-depth
discussion of memory management, scheduling, process control, network services, and other
basic operating system services. Chapter 18 includes a detailed introduction to virtual memory
technique, rewritten for the fifth edition, with a new, detailed, worked-out example, carefully
illustrating the different page replacement algorithms. The chapter also includes an introduction
Englander f02.tex V2 - December 9, 2013 2:51 P.M. Page xxiii

PREFACE xxiii

to virtual machines. In addition to its hardware discussions, Supplementary Chapter 2, when


completed, will also provide current Windows, UNIX/Linux, and z/OS case studies.
A fourth supplementary chapter provides an introduction to the system development
software that is used for the preparation and execution of programs.
This book has been a continuing labor of love. My primary goal has been to create and
maintain a textbook that explains computer architecture in a way that conveys to you, the
reader, the sense of excitement and fun that I believe makes a career in information systems
and technology so satisfying. I hope that I have succeeded to some extent.

ADDITIONAL RESOURCES
Additional resources for students and instructors may be found at the textbook’s Web
site, www.wiley.com/college/englander. I can also be reached directly by e-mail at
[email protected]. Although I am happy to communicate with students, I am unable to
supply tutorial help or answers to review questions and exercises in this book.

ACKNOWLEDGMENTS
I’ve discovered that a major, ongoing textbook project is a formidable task. Many individuals
have helped to make the task manageable—and kept me going when, from time to time, I
became convinced that textbooks really do appear by magic and are not written by humans. It
is impossible to thank people adequately for all their help and support. First and foremost, a
special thank you to four friends who have helped me survive through all five editions, Wilson
Wong, Ray Brackett, Luis Fernandez, and Rich Braun. Their continuing backup has been
amazing! I couldn’t have asked for a better support team. Dinner is ready and the champagne
is on ice. Yet again!
My continuing thanks, too, to Stuart Madnick. Stuart, your technical inspiration and
personal encouragement was invaluable to me when I struggled to get the first edition of this
book going. You helped me to believe that this project was actually possible and worthwhile.
That support has continued to inspire me through every subsequent edition.
Next, I thank the many colleagues at Bentley University who shared their ideas, experiences,
and encouragement. In particular, colleagues Wilson Wong, David Yates, Doug Robertson, and
Mary Ann Robbert have all offered contributions that have substantially improved the book
over five editions. A special thank you, David, for your helpful technical discussions and reviews
of the data communications material in the fourth and fifth editions, and to you, Wilson,
for serving as a technical reviewer for the last three (!) editions, providing many comments,
rewrites, examples, and suggestions for clarification, and for creating many of the ancillary
materials for the book.
Thanks to the editors, production people, and marketing personnel at John Wiley & Sons
and the editors and production people at SPi Global. Sometimes the process is difficult, but
we always managed to get through it in a way that made the book better. I consider myself
fortunate to have worked with such committed people. Particular thanks to Beth Lang Golub,
Katie Singleton, and Felicia Ruocco for your ongoing efforts to make this book perfect, even
though we all know it’s impossible!
Other documents randomly have
different content
He set op hes hors anon,
And gaffe hem hotys and haye.

32
Yn the medys of the towne,
There he schowed hes ware;
‘Pottys! pottys!’ he gan crey foll sone,
‘Haffe hansell ffor the mare!’

33
Ffoll effen agenest the screffeys gate
Schowed he hes chaffare;
Weyffes and wedowes abowt hem drow,
And chepyd ffast of hes ware.

34
Yet, ‘Pottys, gret chepe!’ creyed Robyn,
‘Y loffe yeffell thes to stonde;’
And all that say hem sell
Seyde he had be no potter long.

35
The pottys that were werthe pens ffeyffe,
He solde tham ffor pens thre;
Preveley seyde man and weyffe,
‘Ywnder potter schall neuer the.’

36
Thos Roben solde ffoll ffast,
Tell he had pottys bot ffeyffe;
Op he hem toke of hes care,
And sende hem to the screffeys weyffe.

37
Thereof sche was ffoll ffayne,
‘Gereamarsey, ser,’ than seyde sche;
‘When ye com to thes contre ayen,
Y schall bey of the[y] pottys, so mot y the.’

38
‘Ye schall haffe of the best,’ seyde Roben,
And sware be the Treneytë;
Ffoll corteysley [sc]he gan hem call,
‘Com deyne with the screfe and me.’

39
‘God amarsey,’ seyde Roben,
‘Yowre bedyng schall be doyn;’
A mayden yn the pottys gan bere,
Roben and þe screffe weyffe ffolowed anon.

40
Whan Roben yn to the hall cam,
The screffë sone he met;
The potter cowed of corteysey,
And sone the screffe he gret.

41
‘Lo, ser, what thes potter hayt geffe yow and me;
Ffeyffe pottys smalle and grete!’
‘He ys ffoll wellcom,’ seyd the screffe;
‘Let os was, and go to mete.’

42
As they sat at her methe,
With a nobell chere,
To of the screffes men gan speke
Off a gret wager;

43
Off a schotyng, was god and ffeyne,
Was made the thother daye,
Off forty shillings, the soyt to saye,
Who scholde thes wager wen.
44
Styll than sat thes prowde potter,
Thos than thowt he;
As y am a trow cerstyn man,
Thes schotyng well y se.

45
Whan they had ffared of the best,
With bred and ale and weyne,
To the bottys the made them prest,
With bowes and boltys ffoll ffeyne.

46
The screffes men schot ffoll ffast,
As archares þat weren godde;
There cam non ner ney the marke
Bey halffe a god archares bowe.

47
Stell then stod the prowde potter,
Thos than seyde he;
And y had a bow, be the rode,
On schot scholde yow se.

48
‘Thow schall haffe a bow,’ seyde the screffe,
‘The best þat thow well cheys of thre;
Thou semyst a stalward and a stronge,
Asay schall thow be.’

49
The screffe commandyd a yeman þat stod hem bey
Affter bowhes to weynde;
The best bow þat the yeman browthe
Roben set on a stryng.

50
50
‘Now schall y wet and thow be god,
And polle het op to they nere;’
‘So god me helpe,’ seyde the prowde potter,
‘Þys ys bot rygȝt weke gere.’

51
To a quequer Roben went,
A god bolt owthe he toke;
So ney on to the marke he went,
He ffayled not a fothe.

52
All they schot abowthe agen,
The screffes men and he;
Off the marke he welde not ffayle,
He cleffed the preke on thre.

53
The screffes men thowt gret schame
The potter the mastry wan;
The screffë lowe and made god game,
And seyde, Potter, thow art a man.

54
. . . . . . .
. . . . . . .
Thow art worthey to bere a bowe
Yn what plas that þow goe.

55
‘Yn mey cart y haffe a bowe,
Ffor soyt,’ he seyde, ‘and that a godde;
Yn mey cart ys the bow
That gaffe me Robyn Hode.’

56
‘Kno est tho Rob n Hode?’ se de the sc effe
‘Knowest thow Robyn Hode?’ seyde the screffe,
‘Potter, y prey the tell thow me;’
‘A hundred torne y haffe schot with hem,
Vnder hes tortyll-tre.’

57
‘Y had leuer nar a hundred ponde,’ seyde þe screffe,
‘And sware be the Trenitë,
. . . . . . .
Þat the ffals outelawe stod be me.’

58
‘And ye well do afftyr mey red,’ seyde þe potter,
‘And boldeley go with me,
And to morow, or we het bred,
Roben Hode well we se.’

59
‘Y wel queyt the,’ kod the screffe,
‘Y swere be God of meythe;’
Schetyng thay left, and hom þey went,
Her soper was reddy deythe.

60
Vpon the morow, when het was day,
He boskyd hem fforthe to reyde;
The potter hes cart fforthe gan ray,
And wolde not leffe beheynde.

61
He toke leffe of the screffys wyffe,
And thankyd her of all thyng:
‘Dam, ffor mey loffe and ye well þys were,
Y geffe yow here a golde ryng.’

62
‘Gramarsey,’ seyde the weyffe,
‘Se god e lde het the ’
‘Ser, god eylde het the;’
The screffes hart was neuer so leythe,
The ffeyre fforeyst to se.

63
And when he cam yn to the fforeyst,
Yonder the leffes grene,
Berdys there sange on bowhes prest,
Het was gret goy to se.

64
‘Here het ys merey to be,’ seyde Roben,
‘Ffor a man that had hawt to spende;
Be mey horne I schall awet
Yeff Roben Hode be here.’

65
Roben set hes horne to hes mowthe,
And blow a blast þat was ffoll god;
Þat herde hes men þat þere stode,
Ffer downe yn the wodde.

66
‘I her mey master blow,’ seyde Leytell John,
. . . . . . .
. . . . . . .
They ran as thay were wode.

67
Whan thay to thar master cam,
Leytell John wold not spare;
‘Master, how haffe yow ffare yn Notynggam?
How haffe yow solde yowre ware?’

68
‘Ye, be mey trowthe, Leyty[ll] John,
Loke thow take no care;
Y haffe b o t the sc effe of Not nggam
Y haffe browt the screffe of Notynggam,
Ffor all howre chaffare.’

69
‘He ys ffoll wellcom,’ seyde Lytyll John,
‘Thes tydyng ys ffoll godde;
The screffe had leuer nar a hundred ponde
He had [neuer sene Roben Hode.]

70
‘[Had I] west þat befforen,
At Notynggam when we were,
Thow scholde not com yn ffeyre fforest
Of all thes thowsande eyre.’

71
‘That wot y well,’ seyde Roben,
‘Y thanke God that ye be here;
Thereffore schall ye leffe yowre hors with hos,
And all yowre hother gere.’

72
‘That ffend I Godys fforbod,’ kod the screffe,
‘So to lese mey godde;
. . . . . . .
. . . . . .

73
‘Hether ye cam on hors ffoll hey,
And hom schall ye go on ffote;
And gret well they weyffe at home,
The woman ys ffoll godde.

74
‘Y schall her sende a wheyt palffrey,
Het ambellet be mey ffey,
. . . . . . .
. . . . . .

75
‘Y schall her sende a wheyt palffrey,
Het hambellet as the weynde;
Nere ffor the loffe of yowre weyffe,
Off more sorow scholde yow seyng.’

76
Thes parted Robyn Hode and the screffe;
To Notynggam he toke the waye;
Hes weyffe ffeyre welcomed hem hom,
And to hem gan sche saye:

77
Seyr, how haffe yow ffared yn grene fforeyst?
Haffe ye browt Roben hom?
‘Dam, the deyell spede hem, bothe bodey and bon;
Y haffe hade a ffoll gret skorne.

78
‘Of all the god that y haffe lade to grene wod,
He hayt take het ffro me;
All bot thes ffeyre palffrey,
That he hayt sende to the.’

79
With þat sche toke op a lowde lawhyng,
And swhare be hem þat deyed on tre,
‘Now haffe yow payed ffor all þe pottys
That Roben gaffe to me.

80
‘Now ye be com hom to Notynggam,
Ye schall haffe god ynowe;’
Now speke we of Roben Hode,
And of the pottyr ondyr the grene bowhe.
81
‘Potter, what was they pottys worthe
To Notynggam þat y ledde with me?’
‘They wer worthe to nobellys,’ seyde he,
‘So mot y treyffe or the;
So cowde y [haffe] had ffor tham,
And y had there be.’

82
‘Thow schalt hafe ten ponde,’ seyde Roben,
‘Of money ffeyre and ffre;
And yeuer whan thow comest to grene wod,
Wellcom, potter, to me.’

83
Thes partyd Robyn, the screffe, and the potter,
Ondernethe the grene-wod tre;
God haffe mersey on Roben Hodys solle,
And saffe all god yemanrey!

2
2 . cortessey.
4
3 . werschep ye.
4
4 . the lefe.
1 1
5 , 6 . syde.
3
6 . Seche iij.
4
6 . þey cleffe by my seydys.
1 1 1 3
7 , 8 , 21 , 43 . xl s’.
3
7 . hys all.
4
7 . hem leffe.
1
11 . thes iij.
4
11 . I peney.
14 . And teke at the beginning of the line struck
2

through.
1
16 . thes ij.
1
17 . ffelow he seyde.
3
17 . a caward.
19 . onder or ender.
2

4
19 . hels: sclo.
1
20 . went yemen.
2
20 . To thes.
3 3 1
21 , 56 , 57 . a c.
25. st. 29 is wrongly put here.
4
25 . yede.
2
27 . ffelow hes.
28. The order of the lines is 3, 2, 1, 4.
3
30 . Heres.
1
35 . pens v.
2
35 . pens iij. d.
2
36 . bot v.
37 . Gere amarsey seyde sche than, with a
2

character after sche which is probably an


abbreviation for ser, as in 62 .
2

4
41 . to to.
1
42 . methe.
3
42 . ij of.
3
43 . xl s.
3
45 . the pottys.
4
45 . bolt yt.
2
48 . of iij.
3
48 . senyst.
4
48 . A say.
50 . And [thow]? The ll in polle is crossed; potte
2

may have been intended by the writer.


4
52 . on iij.
54 . No blank here, and none at 57 , 66 , 72 ,
1,2 3 2,3 3,4

3,4
74 .
55 . Yn mey cart ys the bow þat Robyn gaffe
3,4

me.
3
56 . A c.
1 3
57 , 69 . a c.
59 . & swere: meythey.
2

4
59 . scoper.
3
64 . he schall.
1
68 . I leyty.
69 , 70 . He had west þat be fforen.
4 1

74 . Ought perhaps to be dropped. The writer,


1,2

having got the second verse wrong, may have


begun the stanza again.
80 . After this line is repeated, Ye schall haffe
3

god ynowhe.
4
80 . bowhes.
3
81 . worthe ij.
81 . be there.
6

82. hafe x li.


Expleycyt Robynhode.
A bowt, a non, be heynde, etc. are joined. And
for & throughout. Some terminal curls
rendered with e were, perhaps, mere tricks of
writing; as marks over final m, n, in cam, on,
yemen, etc., crossed double l in all, etc., a
curled n in Roben, have been assumed to be.
APPENDIX

THE PLAYE OF ROBYN HODE (vv. 121 ff.)

As printed by Copland, at the end of his edition of


the Gest, with a few corrections from White’s edition,
1634: Ritson’s Robin Hood, 1795, II, 199. I have not
thought it necessary to collate Ritson’s reprint with
Copland. The collations with White here are made
with the undated copy in the Bodleian Library, Z. 3.
Art. Seld.
ROBYN HODE

Lysten, to [me], my mery men all,


And harke what I shall say; v. 121
Of an adventure I shall you tell,
That befell this other daye.
With a proude potter I met,
And a rose-garlande on his head,
The floures of it shone marvaylous freshe;
This seven yere and more he hath used this waye,
Yet was he never so curteyse a potter
As one peny passage to paye.
Is there any of my mery men all 130
That dare be so bolde
To make the potter paie passage,
Either silver or golde?

LYTELL JOHN

Not I master, for twenty pound redy tolde.


For there is not among us al one 135
That dare medle with that potter, man for man.
I felt his handes not long agone,
But I had lever have ben here by the;
Therfore I knowe what he is.
Mete him when ye wil, or mete him whan ye shal, 140
He is as propre a man as ever you medle[d] withal.

ROBYN HODE

I will lai with the, Litel John, twenti pound so read,


If I wyth that potter mete,
I wil make him pay passage, maugre his head.
145
LYTTEL JOHN

I consente therto, so eate I bread;


If he pay passage, maugre his head,
Twenti pound shall ye have of me for your mede.

THE POTTERS BOY JACKE

Out alas, that ever I sawe this daye!


For I am clene out of my waye
From Notyngham towne; 150
If I hye me not the faster,
Or I come there the market wel be done.

ROBYN HODE

Let me se, are the pottes hole and sounde?

JACKE

Yea, meister, but they will not breake the ground.


155
ROBYN HODE

I wil them breke, for the cuckold thi maisters sake;


And if they will breake the grounde,
Thou shalt have thre pence for a pound.

JACKE

Out alas! what have ye done?


If my maister come, he will breke your crown.
160
THE POTTER

Why, thou horeson, art thou here yet?


Thou shouldest have bene at market.

JACKE

I met with Robin Hode, a good yeman;


He hath broken my pottes
He hath broken my pottes,
And called you kuckolde by your name.
165
THE POTTER

Thou mayst be a gentylman, so God me save,


But thou semest a noughty knave.
Thou callest me cuckolde by my name,
And I swere by God and Saynt John,
Wyfe had I never none:
This cannot I denye. 170
But if thou be a good felowe,
I wil sel mi horse, mi harneis, pottes and paniers to,
Thou shalt have the one halfe, and I will have the other.
If thou be not so content,
Thou shalt have stripes, if thou were my brother. 175

ROBYN HODE

Harke, potter, what I shall say:


This seven yere and more thou hast used this way,
Yet were thou never so curteous to me
As one penny passage to paye.
180
THE POTTER

Why should I pay passage to thee?

ROBYN HODE

For I am Robyn Hode, chiefe gouernoure


Under the grene-woode tree.

THE POTTER

This seven yere have I used this way up and downe,


Yet payed I passage to no man,
Nor now I wyl not beginne, to do the worst thou 185
can.

ROBYN HODE

Passage shalt thou pai here under the grene-wode tre,


Or els thou shalt leve a wedde with me.

THE POTTER

If thou be a good felowe, as men do the call,


Laye awaye thy bowe,
And take thy sword and buckeler in thy hande, 190
And se what shall befall.

ROBIN HODE

Lyttle John, where art thou?

LYTTEL [JOHN]

Here, mayster, I make God avowe.


I tolde you, mayster, so God me save,
That you shoulde fynde the potter a knave. 195
Holde your buckeler faste in your hande,
And I wyll styfly by you stande,
Ready for to fyghte;
Be the knave never so stoute,
I shall rappe him on the snoute, 200
And put hym to flyghte.

The rest is wanting.

121. to [me], wanting in White.


142. medled, W.
153. maryet.
154. the, C.; thy, W.
186. to do: to wanting in W.
188. wedded, C.; wed, W.
196. your, C.; you, W.
122

ROBIN HOOD AND THE BUTCHER

A. ‘Robin Hood and the Butcher,’ Percy MS., p. 7;


Hales and Furnivall, I, 19.
B. ‘Robin Hood and the Butcher.’ a. Wood, 401, 19
b. b. Garland of 1663, No 6. c. Garland of 1670,
No 5. d. Pepys, II, 102, No 89.

Other copies, of the second class, are in the


Roxburghe collection, III, 259, and the Douce
collection, III, 114. B a was printed, with changes,
by Ritson, Robin Hood, 1795, II, 23; a copy
resembling the Douce by Evans, Old Ballads, 1777,
1784, I, 106.
The story is a variation of Robin Hood and the
Potter. According to A, the sheriff of Nottingham has
resolved to have Robin’s head. A butcher is driving
through the forest, and his dog flies at Robin, for
which Robin kills the dog. The butcher undertakes to
let a little of the yeoman’s blood for this, and there is
a bout between staff and sword, in which we know
that the butcher must bear himself well, though just
here the first of three considerable gaps occurs.
Robin buys the butcher’s stock, changes clothes with
him, and goes to Nottingham to market his flesh.
There he takes up his lodging at the sheriff’s, having
perhaps conciliated the sheriff’s wife with the present
of a fine joint. He sells at so low a rate that his stock
is all gone before any one else has sold a bit. The
butchers ask him to drink, and Robin makes an
appointment with them at the sheriff’s. A second gap
deprives us of the knowledge of what passes here,
but we infer that, as in B, Robin is so reckless of his
money that the sheriff thinks he can make a good
bargain in horned beasts with him. Robin is ready;
we see that he has come with a well-formed plan.
The next day the sheriff goes to view the livestock,
and is taken into the depth of the forest; it turns out
that the wild deer are the butcher’s horned beasts.
Robin’s men come in at the sound of his horn; the
sheriff is lightened of all his money, and is told that
his head is spared only for his wife’s sake. All this the
sheriff tells his wife, on his return, and she replies
that he has been served rightly for not tarrying at
home, as she had begged him to do. The sheriff says
he has learned wisdom, and will meddle no more
with Robin Hood.
B a omits the brush between Robin and the
butcher, mostly wanting, indeed, in A also, but only
because of the damage which the manuscript has
suffered.
The passage in which the sheriff is inveigled into
Robin’s haunts has, as already mentioned, close
affinity with the Gest, 181 ff.
The first three stanzas of A would not be missed,
[98]
and apparently belong to some other ballad.
B a is signed T. R., as is also Robin Hood and the
Beggar in two editions, and these we may suppose
to be the initials of the person who wrote the story
over with middle rhyme in the third line of the
stanza, a peculiarity which distinguishes a group of
ballads which were sung to the tune of Robin Hood
and the Stranger: see Robin Hood and Little John, No
125, and also No 128.
A

Percy MS., p. 7; Hales and Furnivall, I, 19.


1
But Robin he walkes in the g[reene] fforrest,
As merry as bird on boughe,
But he that feitches good Robins head,
Hee’le find him game enoughe.

2
But Robine he walkes in the greene fforrest,
Vnder his trusty-tree;
Sayes, Hearken, hearken, my merrymen all,
What tydings is come to me.

3
The sheriffe he hath made a cry,
Hee’le have my head i-wis;
But ere a tweluemonth come to an end
I may chance to light on his.

4
Robin he marcht in the greene forrest,
Vnder the greenwood scray,
And there he was ware of a proud bucher,
Came driuing flesh by the way.

5
The bucher he had a cut-taild dogg,
And at Robins face he flew;
But Robin he was a good sword,
The bucher’s dogg he slew.

6
‘Why slayes thou my dogg?’ sayes the bucher,
‘For he did none ill to thee;
By all the saints that are in heaven
Thou shalt haue buffetts three.’

7
He tooke his staffe then in his hand,
And he turnd him round about:
‘Thou hast a litle wild blood in thy head,
Good fellow, thou’st haue it letten out.’

8
‘He that does that deed,’ sayes Robin,
‘I’le count him for a man;
But that while will I draw my sword,
And fend it if I can.’

9
But Robin he stroke att the bloudy bucher,
In place were he did stand,

* * * * *

10
‘I [am] a younge bucher,’ sayes Robin,
‘You fine dames am I come amonge;
But euer I beseech you, good Mrs Sheriffe,
You must see me take noe wronge.’

11
‘Thou art verry welcome,’ said Master Sherriff’s wiffe,
‘Thy inne heere up [to] take;
If any good ffellow come in thy companie,
Hee’st be welcome for thy sake.’

12
Robin called ffor ale, soe did he for wine,
And for it he did pay:
‘I must to my markett goe,’ says Robin,
‘For I hold time itt of the day.’

13
But Robin is to the markett gone,
Soe quickly and beliue,
He sold more flesh for one peny
Then othe[r] buchers did for fiue.

14
The drew about the younge bucher,
Like sheepe into a fold;
Yea neuer a bucher had sold a bitt
Till Robin he had all sold.

15
When Robin Hood had his markett made,
His flesh was sold and gone;
Yea he had receiued but a litle mony,
But thirty pence and one.

16
Seaven buchers, the garded Robin Hood,
Ffull many time and oft;
Sayes, We must drinke with you, brother bucher,
It’s custome of our crafte.

17
‘If that be the custome of your crafte,
As heere you tell to me,
Att four of the clocke in the afternoone
At the sheriffs hall I wilbe.’

* * * * *

18
. . . . . . .
‘If thou doe like it well;
Yea heere is more by three hundred pound
Then thou hast beasts to sell.’

19
R b d ht th h th ht
Robyn sayd naught, the more he thought:
‘Mony neere comes out of time;
If once I catch thee in the greene fforest,
That mony it shall be mine.’

20
But on the next day seuen butchers
Came to guard the sheriffe that day;
But Robin he was the whigh[t]est man,
He led them all the way.

21
He led them into the greene fforest,
Vnder the trusty tree;
Yea, there were harts, and ther were hynds,
And staggs with heads full high.

22
Yea, there were harts and there were hynds,
And many a goodly ffawne;
‘Now praised be God,’ says bold Robin,
‘All these they be my owne.

23
‘These are my horned beasts,’ says Robin,
‘Master Sherriffe, which must make the stake;’
‘But euer alacke, now,’ said the sheriffe,
‘That tydings comes to late!’

24
Robin sett a shrill horne to his mouth,
And a loud blast he did blow,
And then halfe a hundred bold archers
Came rakeing on a row.

25
But when the came befor bold Robin,
E th th t d ll b
Even there the stood all bare:
‘You are welcome, master, from Nottingham:
How haue you sold your ware?’

* * * * *

26
. . . . . . .
. . . . . . .
. . . . . . .
It proues bold Robin Hood.

27
‘Yea, he hath robbed me of all my gold
And siluer that euer I had;
But that I had a verry good wife at home,
I shold haue lost my head.

28
‘But I had a verry good wife at home,
Which made him gentle cheere,
And therfor, for my wifes sake,
I shold haue better favor heere.

29
‘But such favor as he shewed me
I might haue of the devills dam,
That will rob a man of all he hath,
And send him naked home.’

30
‘That is very well done,’ then says his wiffe,
‘Itt is well done, I say;
You might haue tarryed att Nottingham,
Soe fayre as I did you pray.’

31
‘I haue learned wisdome ’ sayes the sherriffe
I haue learned wisdome, sayes the sherriffe,
‘And, wife, I haue learned of thee;
But if Robin walke easte, or he walke west,
He shall neuer be sought for me.’
B
a. Wood, 401, leaf 19 b. b. Garland of 1663, No 6. c. Garland of
1670, No 5. d. Pepys, II, 102, No 89.
1
Come, all you brave gallants, and listen a while,
With hey down, down, an a down
That are in the bowers within;
For of Robin Hood, that archer good,
A song I intend for to sing.

2
Upon a time it chancëd so
Bold Robin in forrest did spy
A jolly butcher, with a bonny fine mare,
With his flesh to the market did hye.

3
‘Good morrow, good fellow,’ said jolly Robin,
‘What food hast? tell unto me;
And thy trade to me tell, and where thou dost dwell,
For I like well thy company.’

4
The butcher he answered jolly Robin:
No matter where I dwell;
For a butcher I am, and to Notingham
I am going, my flesh to sell.

5
‘What is [the] price of thy flesh?’ said jolly Robin,
‘Come, tell it soon unto me;
And the price of thy mare, be she never so dear,
For a butcher fain would I be.’

6
‘The price of my flesh,’ the butcher repli’d,
‘I soon will tell unto thee;
With my bonny mare, and they are not dear,
Four mark thou must give unto me.’
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebookluna.com

You might also like