Computer Systems and Networks Barry Blundell Nawaz Khan Aboubaker Lasebae Muthana Jabbar Instant Download
Computer Systems and Networks Barry Blundell Nawaz Khan Aboubaker Lasebae Muthana Jabbar Instant Download
https://ebookbell.com/product/computer-systems-and-networks-
barry-blundell-nawaz-khan-aboubaker-lasebae-muthana-
jabbar-4137998
https://ebookbell.com/product/reliability-of-computer-systems-and-
networks-martin-l-shooman-930460
https://ebookbell.com/product/reliability-of-computer-systems-and-
networks-fault-tolerance-analysis-and-design-1st-martin-l-
shooman-1232394
https://ebookbell.com/product/reliability-of-computer-systems-and-
networks-fault-tolerance-analysis-and-design-martin-l-shooman-1720410
Theory And Engineering Of Dependable Computer Systems And Networks
Proceedings Of The Sixteenth International Conference On Dependability
Of Computer Systems Depcosrelcomex June 28 July 2 2021 Wrocaw Poland
Wojciech Zamojski
https://ebookbell.com/product/theory-and-engineering-of-dependable-
computer-systems-and-networks-proceedings-of-the-sixteenth-
international-conference-on-dependability-of-computer-systems-
depcosrelcomex-june-28-july-2-2021-wrocaw-poland-wojciech-
zamojski-33377982
https://ebookbell.com/product/data-science-theory-algorithms-and-
applications-transactions-on-computer-systems-and-networks-1st-
ed-2021-gyanendra-k-verma-editor-34071918
https://ebookbell.com/product/communication-networks-and-computer-
systems-a-tribute-to-professor-erol-gelenbe-illustrated-edition-
javier-a-barria-1185372
https://ebookbell.com/product/security-of-esystems-and-computer-
networks-obaidat-m-boudriga-n-2597800
Computer Systems
and Networks
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
Computer Systems and Networks
All rights reserved by Cengage Learning. The text of this publication, or any
part thereof, may not be reproduced or transmitted in any form or by any
means, electronic or mechanical, including photocopying, recording, storage
in an information retrieval system, or otherwise, without prior permission of
the publisher.
While the publisher has taken all reasonable care in the preparation of this
book the publisher makes no representation, express or implied, with regard
to the accuracy of the information contained in this book and cannot accept
any legal responsibility or liability for any errors or omissions from the book
or the consequences thereof.
Products and services that are referred to in this book may be either
trademarks and/or registered trademarks of their respective owners. The
publisher and author/s make no claim to these trademarks.
ISBN 978-1-84480-639-3
Series preface ix
Preface xi
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
vii
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
Series preface
FastTrack books can be used for self-study or as directed reading by a tutor. They contain the
essential reading necessary to complete a full understanding of the topic. They are augmented
by resources and activities, some of which will be delivered online as indicated in the text.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
Preface xi
1234567890
The time bar indicates approximately how long each activity will take:
1234567890
12345
12345
1234567890
12345
1234567890
12345
12345
1234567890
1234567890 short < 10 minutes
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890 medium 10-45 minutes
1234567890
123456789012345
1234567890
123456789012345
123456789012345
1234567890
123456789012345
123456789012345 long > 45 minutes
Review questions are (usually) short questions at the end of each chapter to check you
have remembered the main points of a chapter. They are a useful practical summary of
the content, and can be used as a form of revision aid to ensure that you remain
competent in each of the areas covered. Answers are provided at the end of the book.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
xii
Nawaz Khan is a lecturer at the School of Computing Science, Middlesex University, UK. He
lectures on the topic of online database, web-based data transaction technologies, data
warehousing and data strategies. His present associations include professional membership of
IEEE and ACM, distance learning programme of Middlesex University and University of
Liverpool, UK.
Acknowledgements
Figures 9.9, 9.10 and Table 9.3 have been adapted from
Computer Communications and Networking Topologies, Gallo M & Hancock W
Published 2002 by Thomson Learning, ISBN 0-534-37780-7
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
About the website
xiii
For Lecturers
● Downloadable PowerPoint slides.
Fundamentals of
Programming Using
Java
Edward Currie
Database Management
Systems
George A Dafoulas &
Patricia Ward
Human–Computer
Interaction
Serengul Smith-Atakan
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
xiv
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
CHAPTER 1
OVERVIEW
Here we introduce various aspects of the modern computer. A computer comprises hardware
and software, and the power of the computer is derived from the ability of software to control
the functionality of hardware. In this way, a computer can be used for a wide range of tasks –
indeed, the computer is a general-purpose, programmable, machine.
● Distinguish between hardware and software and understand the concept of a ‘general
purpose programmable machine’
● Identify the key characteristics associated with the ‘stored program’ computer model and
name different forms of memory and storage devices employed in the modern computer
● Describe the computer in terms of a mathematical machine operating in the binary (base
2) number system
● Manually perform basic arithmetic in the binary number base and verify your results by
means of a calculator
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
2 COMPUTER SYSTEMS AND NETWORKS
1.1 Introduction
In this introductory chapter we present various background material and key concepts that will
be developed further in other parts of this book. In the next section we distinguish between
the software and hardware components that comprise a computer and introduce the concept
of a ‘general purpose programmable machine’. Here, we identify the three ways in which a
computer can execute a set of instructions: in sequence, by selection, and by iteration. This
leads on in Section 1.3 to consideration of the ‘stored program architecture’ that was
developed in the mid-1940s and enabled instructions to be represented as numerical codes
stored within a computer’s memory. At the time, this represented a major shift in thinking, and
is a technique that underpins the modern computer architecture.
In Section 1.4 we discuss traditional categories of computer, specifically: the mainframe, the
minicomputer, and the desktop machine. The mainframe gained considerable popularity in the
1960s, and ever larger computer installations evolved. Ultimately, systems of this sort became
outdated not only because of the rapid advances that were being made in computer hardware,
but also because of the complexity of the software needed to impose security and equitably
share computing resources between users. The minicomputer provided a lower-cost computing
solution and was particularly favoured by medium-sized businesses who were able to increase
efficiency by, for example, employing automated inventory and payroll management systems.
Furthermore, companies were able to employ affordable computer systems for activities such as
computer aided design (CAD) and simulation. However, in the case of both the mainframe
machine and minicomputer, the computer’s resources are shared between a number of users.
As a result, the performance offered to each user by these types of machine varies according to
the number of people using the system and the types of computer program in execution. Such
a lack of predictability is frustrating and was one of the factors that led to the development of
the desktop personal computer (PC). As the name implies, the PC does not constitute a shared
resource but is (traditionally) a single user machine. This form of computer was researched
throughout the 1970s, and rapidly gained popularity from the early 1980s onwards.
All material stored and processed by computer technologies is represented numerically, and in
Section 1.5 we briefly consider the computer as a mathematical machine in which
computations are carried out using the binary number base (base 2). Here, we also refer to the
computer as a digital machine whereby all signals may take on only certain (two) discrete
values. In Section 1.6 we discuss the conversion of base 10 numbers to binary and binary
number to base 10. Finally, in Section 1.7 we consider the range of values that may be
represented by a certain number of binary digits. In this section, we introduce the terms ‘bits’
and ‘bytes’. The former is used when referring to one or more binary digits, and the latter
when considering a number represented by eight bits (or groups of eight bits).
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
SETTING THE SCENE 3
Figure 1.1: A computer accepts some form of input, processes this in accordance with a
set of instructions and generates some type of output.
A computer comprises both ‘hardware’ and ‘software’ systems. These are briefly introduced
below:
Hardware
This represents the electronic circuits and/or electromechanical components from which the
computer is constructed. As summarised in Figure 1.2, a basic computer system includes the
following types of hardware:
Storage devices
Central Printer
Keyboard Processing
Unit Speakers
Mouse (CPU)
Display
Memory
Figure 1.2: The computer is able to take input from various sources and provide output
to devices such as the display screen and printer(s).
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
4 COMPUTER SYSTEMS AND NETWORKS
Software
Computer hardware is in itself unable to perform any useful tasks – it must be provided with
detailed and unambiguous instructions indicating exactly what actions are to be taken.
Consequently, it is necessary to provide the hardware with a set of instructions that define the
tasks that the hardware is to perform. These instructions (and any necessary data) are
contained within ‘computer programs’. Software is a term that is used when referring to
programs in a general way, and encompasses instructions that are to be acted upon by a
computer and the data that may be needed by these instructions. As we will discuss later in
the book, software is ‘permanently’ stored by means of secondary storage devices (e.g. hard
disks, floppy disks, or CD-ROM). Such media does not lose its contents when the computer is
turned off (hence these devices are said to provide long-term storage capability). During the
execution of a program, software is temporarily stored in main memory. However, the contents
of main memory are usually lost when the computer is turned off or reset.
Figure 1.3: A photograph of the inside of a PC. This shows some major components
located on the main circuit board (motherboard).
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
SETTING THE SCENE 5
Modifying the instructions and/or data supplied to a computer can change the actions
performed by the computer hardware. In this respect the hardware is said to represent a
‘general purpose programmable machine’ and this enables computer technologies to be used
in many diverse areas of human endeavour.
1234567890
123456789012345
123456789012345
1234567890
123456789012345
1234567890
123456789012345
Activity 1.1
123456789012345
PC subsystems
Gain access to a PC (preferably an old machine), ensure that the computer is not
plugged in, and remove the cover. By reference to Figure 1.3 or otherwise, identify
the following components/ subsystems:
(a) The power supply (b) The central processing unit (CPU)
(c) The main memory (d) The hard disk
In the case that you have access to a machine that is no longer required (i.e. a
broken computer), remove the CPU from the motherboard. Note the large number
of pins (connections) that link between the chip and the motherboard. As with all
connectors within the computer, these pins are gold plated (this helps to maintain
good electrical connectivity). You are strongly advised not to remove the CPU from a
working computer – the pins can be easily bent and it may prove quite difficult to re-
seat the CPU in its socket!
Computers can perform calculations at a very high speed and have the ability to support the
storage and rapid retrieval of enormous volumes of data. Furthermore, a computer is able to
make ‘decisions’ during the execution of instructions. In fact, a computer can handle
instructions in three general ways:
● It can execute a sequence of instructions. By way of analogy, consider baking a cake.
Here you would follow a recipe, i.e. you would follow one instruction after another. A
computer has the ability to execute a ‘list’ of instructions
● It can execute instructions by iteration. By this we mean that it can execute a series of
instructions repeatedly. By way of analogy, and using the cake example, you could imagine
somebody making ten cakes, each one after the other. Here they would execute the same
instructions repeatedly as they produced each cake – this is a process of repeated ‘iteration’
● It can execute instructions by selection. This is something we do continuously in our
everyday lives. For example, when we get up in a morning, we may look out of the window to
see what the weather is like. Subsequently we might make the following decision:
“If the weather is good, wear light clothing, or else wear warmer clothing.”
A computer is also able to select the next instruction that it should execute according to some
condition. For example, a computer is able to execute instructions of the form:
“If the value stored in a certain memory location is less than 10 do this…or else do this…”
The ability of a computer to execute instructions in sequence, by selection, and by iteration (see
Figure 1.4) provides the basis for a machine that offers tremendous flexibility. These concepts
are by no means new, and some 150 years ago a remarkable visionary called Charles Babbage
identified with great foresight the potential of programmable hardware, and the three modes
of instruction execution referred to above. However, many years were to pass before practical
computing machines were constructed.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
6 COMPUTER SYSTEMS AND NETWORKS
➤
➤
➤
➤
➤
➤
➤
➤
➤
➤
➤
➤
Figure 1.4: A computer is able to execute instructions (a) in sequence, (b) by selection
and (c) by iteration. Here, we assume that each rectangle represents a program
instruction.
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
Activity 1.2
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
SETTING THE SCENE 7
In this book we will adopt the title ‘stored program architecture’, and avoid the debate as to
the correct origins of this technique.
In Figure 1.5 the general approach used in the stored program architecture is illustrated. As
may be seen, we assume that the computer comprises a central processing unit and memory.
Instructions and data are passed to the computer and stored within the memory. The central
processing unit (usually abbreviated to the ‘processor’) is able to access the instructions and
data from memory and perform the appropriate computations. The results of the computation
are then returned to memory or are output in a form that can be understood by the operator.
Central
Input Processing
data Unit
(CPU) Output of
results
Input
instructions
Memory
Figure 1.5: The stored program architecture. Here, instructions are represented by
numerical codes and stored within the computer’s memory.
As we will discuss in later chapters, the modern computer makes use of various forms of
memory and storage devices. The main memory (normally referred to as random access
memory (RAM)) contains the instructions and data associated with programs that are currently
being run (‘executed’) by the processor. Additionally, within the processor itself there are a
number of registers. These are locations where temporary numerical values can be stored
during calculations, and which also perform other tasks for the processor (we will examine their
purpose in some detail in Chapter 3). For the moment it is sufficient to note that registers can
be accessed at very high speeds because they are located within the processor. On the other
hand, main memory (RAM) operates at a lower speed but offers a far greater storage capacity.
The contents of registers and main memory are lost when a computer is turned off or reset.
Naturally, we also require storage devices that can retain their contents even when the
computer is no longer in operation, and for this purpose we make use of devices such as the
hard disk, floppy disk, and optical disk (such as the CD-ROM and DVD).
The hard disk can store vast amounts of material but is usually fixed in place within the
computer, and allows us to store and retrieve data and information within the computer itself.
On the other hand, the floppy disk and optical disks represent forms of ‘portable media’,
enabling material to be transferred between computers or stored in a secure repository.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
8 COMPUTER SYSTEMS AND NETWORKS
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
Activity 1.3
Memory and storage
Suggest additional reasons for using different types of memory and storage media
within a computer.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
SETTING THE SCENE 9
users. Within a business, typical tasks that would have been carried out in the 1970s by
minicomputers included staff payroll calculation and stock inventories. As with any centralised
machine, reliability is paramount. Should the minicomputer develop a technical problem, then
all users are stopped in their work. Furthermore, when a computer is shared between users,
one can never guarantee performance – this being determined by the number of programs
running on the machine at any one time.
In the early 1970s, Xerox undertook pioneering work in an effort to develop the personal
computer. Essential to the vision was the development of a desktop machine where each user
has access to their own computer, and its resources are not shared. Consequently,
performance is controlled by the user and not by others using the machine. Xerox also
pioneered new interaction techniques, particularly the incorporation of the mouse (invented in
the mid-1960s), and the graphical user interface that we use today. They also pioneered the
development of the WYSIWYG wordprocessor (‘What You See Is What You Get’ – i.e. the
document that appears on the computer screen is identical to the form of the document when
printed).
The development work at Xerox took some time, and it was not until the early 1980s that the
personal computer (PC) that we know today became readily available. Soon a variety of
personal computers were produced by vendors such as Xerox, IBM, Commodore and
Macintosh. Other companies appeared on the scene, and a wide range of products became
available.
The 1980s denoted a period of rapid advancement in computer development and
performance. It was also a period of the survival of the fittest, and intense corporate warfare
broke out within the computer industry; excellent products seemed to disappear almost
overnight. Occasionally, companies were taken over simply in order to suppress products. This
was also a period when standards began to evolve and the issue of backward compatibility
became paramount. In this context, support for backward compatibility means that when a
new computer architecture is developed, it must still be able to execute older software
products. The availability of DOS within current versions of Windows provides an example of
adherence to backward compatibility.
Since the mid-1980s there has been a reduction in the diversity of computer architectures and
operating systems. The main advances that have taken place are in the areas of computer
performance, the increased capacity of storage media such as hard disks, and networking
technologies (particularly the Internet). In later chapters we will be considering these issues in
some depth.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
10 COMPUTER SYSTEMS AND NETWORKS
Even when we create words and sentences in a document, these are not stored and
manipulated by the computer as a series of characters, but as a set of numerical values – the
operation of the computer is indeed based on mathematics.
A computer is said to be a ‘digital’ machine because all the components, wires, etc, operate
only on discrete signals. This is rather like a conventional light switch. The light can only be
turned on or off – it cannot be a half on, a quarter on, or a quarter off; the bulb has one of
two states: illuminated or otherwise. This analogy with a light bulb serves us quite well,
because not only is a computer a digital machine, but all computation is performed not in our
conventional base 10 system (in which we represent numbers by means of ten symbols, 0 to 9),
but in base 2 (for which we have only two symbols ‘0’ and ‘1’). In the next section we briefly
consider the base two number system.
As you can see in the above, the digit ‘3’ indicates the number of thousands, the digit ‘4’ the
number of hundreds, the digit ‘6’ the number of tens, and the digit ‘7’ the number of units.
Each digit in the number has a different significance depending on the column in which it is
located. Now look at the values ascribed to the columns. We have the number of ones (units),
the number of tens, the number of hundreds, and the number of thousands. The next column
would be the number of ten thousands, etc. From this pattern it should be clear that the
columns can actually be represented in terms of ‘powers’ of ten:
Units = 100 (remember that 100 is defined as equalling 1)
Tens = 101
Hundreds = 102
Thousands = 103
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
SETTING THE SCENE 11
Because we are working in base 10, the values ascribed to each column in our numeric
representation increase by a factor of 10 as we move along the number.
In base 2 (binary), the values of the columns increase by a factor of 2. Let us take an example:
but in order to understand this you need to remember that, just as in base 10 we have ten
symbols at our disposal, in base 2 we only have two symbols (represented as 0 and 1).
Suppose we write the binary number 1100. What does this represent in our base 10 number
system? Examine the following table:
Eights (23) Fours (22) Twos (21) Units (20)
1 1 0 0
The binary number 1100 represents one 8, one 4, zero 2s, and zero units. Adding 8 and 4
together gives us 12. In short, the binary number 1100 corresponds to the base 10 number of
twelve.
Consider a further example – the binary number 1111.
Eights (23) Fours (22) Twos (21) Units (20)
1 1 1 1
As you can see, this corresponds to one 8, one 4, one 2, and one unit (1). Adding these
together gives us 15. Thus the binary number 1111 corresponds to the base 10 number of
fifteen. You can now convert binary numbers to base 10.
1234567890
1234567890
123456
123456
1234567890
123456
Activity 1.4
The next step is to convert base 10 numbers into binary. As long as you remember the values
assigned to the columns in both base 10 and base 2, you should encounter no problems with
this.
Let us begin with a simple example. Consider the base 10 number ‘five’. In order to convert
this into binary, we write down the values of a few binary columns:
8s 4s 2s 1s
Now we remember that a binary number can only be expressed using 0s and 1s. Therefore, all
we have to do is to insert 0s and 1s in the appropriate columns:
8s 4s 2s 1s
1 0 1
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
12 COMPUTER SYSTEMS AND NETWORKS
Thus the binary representation of the base 10 number five is 101. When expressing a number
in binary we are simply looking at what ‘column values’ we need to use so as to form the base
10 number (five can be expressed as a ‘four’ plus a ‘one’). Consider another example – the
base 10 number twenty-seven. As this is a larger number, extra columns are needed:
Here we have provided more columns than are necessary: naturally the 32 and 64 columns
cannot assist us in representing twenty-seven as placing a ‘1’ in either of these columns would
give rise to a binary number larger than 27! However, if we place a ‘1’ in the 16 column, a ‘1’
in the 8 column (this would add to 24), then we have 3 left to represent. This can be achieved
by placing a ‘1’ in the 2 column and a ‘1’ in the 1 column – as follows:
16s 8s 4s 2s 1s
1 1 0 1 1
1234567890
1234567890
123456
123456
1234567890
123456
123456
1234567890
Activity 1.5
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
SETTING THE SCENE 13
1234567890
1234567890
1234567890
1234567890
Binary arithmetic 1234567890
1234567890
1234567890
1234567890
Activity 1.6
1234567890
Most scientific calculators support binary arithmetic, and a ‘mode’ key is usually
provided to enable the calculator to operate in different number bases. This facility is
also available in the calculator program supplied with Windows. The calculator can
be accessed by selecting ‘programs’, ‘accessories’, and then ‘calculator’ under the
‘start’ menu icon (at the bottom left-hand side of the screen). Once you have
accessed the calculator, you need to select ‘scientific’ mode (this is available under
the ‘view’ icon). To enable the calculator to operate in base 2, check the ‘bin’
(binary) option. You will now find that only the ‘0’ and ‘1’ numbers on the keypad
operate (as we have seen, in binary we only have these two numerical symbols). Use
this calculator to perform the following binary arithmetic. You should check the
results that you obtain by manually converting each of the binary numbers to base
10, performing the arithmetic in base 10 and converting the result back to base 2.
(a) 11 + 101 =
(b) 1110 -11 =
(c) 100101 * 11 =
Note that * represents the multiplication operation.
1234567890
1234567890
123456
123456
1234567890
123456
123456
Activity 1.7
Counting in binary
Consider the case of four binary digits. List all possible values that may be
represented by four bits, and state the number of values that they may be used to
represent. As we have seen, two bits can be used to represent four different values
(=22); three bits, eight different values (=23); and four bits, 16 values (=24). From this
pattern it is readily apparent that an arbitrary number of n bits can be used to
represent 2n different values.
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
Activity 1.8
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
14 COMPUTER SYSTEMS AND NETWORKS
1.8 Summary
In this first introductory chapter we have introduced a number of key ideas that will be used as
the basis for discussion in the coming chapters. As we have seen, although the computer is
able to process different forms of media (such as graphics, video, audio and text), within the
computer itself these are all represented by sets of numbers and processed by means of
mathematical calculations. Additionally, although in our everyday lives we generally employ the
decimal number base, computers operate in base 2 (binary). This is not an essential
characteristic of the computing machine but greatly facilitates aspects of their implementation.
Since operations are performed by the computer in base 2, a clear knowledge of base 2
arithmetic is an essential precursor to gaining a sound understanding the internal operation of
computer-based technologies.
Despite the flexibility and power of modern computer systems, computer hardware is based on
the interconnection of large numbers of very simple circuits (‘logic gates’). In the next chapter
we introduce a number of these ‘gates’ and show how they can be used to construct more
complicated devices.
Question 1.3 Convert the base 10 number 21 to binary, and the binary number 1001 to
base 10.
Question 1.4 State two key features of the ‘stored program’ computer architecture.
Question 1.5 How many different values may be represented by (a) 4 bits and (b) by 2
bytes?
Question 1.8 What do you understand by the phrase ‘a general purpose programmable
machine’?
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
SETTING THE SCENE 15
One main reason for providing different forms of memory/storage device within a computer
concerns the balance we seek to obtain between speed, storage capacity, and price. Higher-
speed memory devices are more expensive in terms of their cost-per-unit of storage capacity.
Therefore storage devices able to store larger volumes of data tend to be less expensive, but
operate at a lower speed. Main memory (RAM) is more expensive (in terms of cost-per-unit
of storage) than, for example, the hard disk drive. On the other hand, main memory
operates at a higher speed.
(a) The binary number 1101 corresponds to 13 in base 10, i.e. one unit, zero 2s, one 4, and
one 8.
(b) The binary number 11111 corresponds to 31 in base 10, i.e. one unit, one 2, one 4, one
8 and one 16. Adding these up gives us 31.
(a) 1001. Meaning that 9 can be represented by writing a ‘1’ in the 8 column, and a ‘1’ in
the 1 column.
(b) 100100. Meaning that 36 can be represented by placing a ‘1’ in the 32 column, and a
‘1’ in the 4’ column.
(c) 1001001.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
16 COMPUTER SYSTEMS AND NETWORKS
0000
0001
0010
0011
0100
0101
0110
0111
1000
1001
1010
1011
1100
1101
1110
1111
(c) 3 bytes corresponds to 24 bits which can take on 16,777,216 different values.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
CHAPTER 2
OVERVIEW
The basic hardware elements that form a computer (gates) are very simple – not only in terms
of their electronic circuitry, but also in terms of their functionality. A computer comprises an
enormous number of such simple building blocks and in this chapter we introduce logic gates
by reviewing their individual functionality and by providing some simple circuits that show how
they can be interconnected in order to form useful functions.
● Identify the function of various logic gates and draw their associated symbols
● Understand and write out truth tables for logic gates and simple circuits
● Perform conversions between binary (base 2) and hexadecimal (base 16) and understand
the advantages of representing binary in base 16.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
18 COMPUTER SYSTEMS AND NETWORKS
2.1 Introduction
Computers are constructed through the interconnection of very large numbers of simple circuits
(these are referred to as logic gates). In this chapter, we introduce several types of logic gate,
focusing our attention on the most basic and most widely used devices. In Section 2.3 we
briefly introduce two general types of digital circuit – these being referred to as combinational
and sequential logic circuits. In the case of the former, a circuit’s output is entirely determined
by the combination of signals currently supplied to it. In contrast, sequential logic circuits
produce output which is determined not only by the current logical state of the input signals,
but also by the previous state of the circuit. In short, sequential logic circuits exhibit ‘memory’
and underpin the construction of, for example, a computer’s main memory.
In Sections 2.4 and 2.5 we provide exemplar circuits that demonstrate the implementation of
both combinational and sequential circuits and therefore provide an insight into the design of
digital electronics.
Finally, in Section 2.6 we discuss the hexadecimal number base (base 16). As we discussed in
the previous chapter, modern computers perform their computations on binary (base 2)
numbers. Although binary may be the language of machines, from our point of view it is
certainly a far from convenient method of expressing and writing down large numbers.
However, binary numbers can be easily converted into base 16 and this provides a compact and
convenient means by which we can express and represent strings of 1s and 0s.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
LOGIC GATES AND SIMPLE DIGITAL CIRCUITS 19
input output
input output 0 1
1 0
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
20 COMPUTER SYSTEMS AND NETWORKS
voltage at
output
time
Figure 2.2: A simple oscillator that may, in principle, be formed using three
inverters
1234567890
123456
1234567890
123456
1234567890
123456
123456
Activity 2.1
Consider the circuit presented in Figure 2.2. Suppose that rather than using three
inverters, five inverters are connected in a similar way. What effect is this likely to
have?
1234567890
123456
1234567890
123456
123456
1234567890
123456
1234567890
Activity 2.2
Consider the circuit shown in Figure 2.2. Suppose that it is constructed using an
even rather than an odd number of gates. For example, you may consider a circuit
comprising two, or four inverters, connected together in the manner indicated in
Figure 2.2. How will this circuit behave?
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
LOGIC GATES AND SIMPLE DIGITAL CIRCUITS 21
The symbol for an AND gate is given in Figure 2.3, together with a corresponding truth table.
Here, an AND gate with two inputs (labelled A and B) is shown, and as can be seen from the
truth table, if either of these inputs is a logic low then the output is also a logic low.
Consequently, the output from the gate can only be a logic high if the inputs are all logic highs.
As with an inverter, this functionality does not seem particularly complicated and it is difficult to
imagine that such a simple circuit can be of such importance in the implementation of
computer systems. As with the inverter and all other gates, there is a propagation delay
associated with the operation of the AND gate.
input A
output A B output
input B 0 0 0
0 1 0
A 2-input AND gate
1 0 0
1 1 1
Truth table
Consider for a moment the implementation of the NAND gate using a NOT and an AND gate,
as shown in Figure 2.5. Here, we have simply inverted the output from the AND gate, and a
comparison of the truth table provided in this illustration with the one presented in Figure 2.4
shows that both circuits perform the same logical function. However, since electrical signals
must now travel through two gates this circuit will exhibit a greater propagation delay than
would be the case if a single NAND gate were used.
Truth table
Figure 2.4: A two-input NAND gate and its truth table
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
22 COMPUTER SYSTEMS AND NETWORKS
As with the AND gate, a NAND gate has two or more inputs (typically between two and eight),
and a single output. Referring to the symbol for the NAND gate which is illustrated in Figure
2.4, you will see that this symbol is the same as that used for the AND gate, but it has a small
circle at the output. As indicated above when discussing the inverter, this circle indicates that
the gate has an inverting function. By connecting together the inputs of a NAND gate, an
inverter may be constructed. This is illustrated in Figure 6.6.
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
Activity 2.3
1234567890
A three-input NAND gate
A B C output
input A output 0 0 0 1
input B 0 1 0 1
1 0 0 1
1 1 1 0
Truth table
Figure 2.5: A NAND gate implemented by using an AND gate and inverter
input output
input output
Figure 2.6: When the inputs of a NAND gate are connected together it acts as
an inverter
The OR gate
As with the AND and NAND gates, the OR gate has two or more inputs. The symbol for a two-
input OR gate is given in Figure 2.7 together with the corresponding truth table.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
LOGIC GATES AND SIMPLE DIGITAL CIRCUITS 23
input A
output A B output
input B 0 0 0
0 1 1
A 2-input OR gate
1 0 1
1 1 1
Truth table
Figure 2.7: The symbol for a two-input OR gate and its truth table
In fact, an OR gate can be implemented using an AND gate and some inverters. Consider the
circuit and truth table presented in Figure 2.8. As may be seen, each of the input signals passes
through an inverter before being applied to the AND gate, and the output from this is also
passed through an inverter. You should verify the truth table presented in this illustration, and
with reference to the truth table given in Figure 2.7 confirm that this circuit performs the logical
OR operation.
C A B C D E output
input A
E output 0 0 1 1 1 0
input B 0 1 1 0 0 1
D
1 0 0 1 0 1
1 1 0 0 0 1
Truth table
Figure 2.8: A two-input OR gate implemented using an AND gate and three
inverters
1234567890
123456
1234567890
123456
123456
1234567890
123456
Activity 2.4
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
24 COMPUTER SYSTEMS AND NETWORKS
input A
output A B output
input B 0 0 1
0 1 0
A 2-input NOR gate
1 0 0
1 1 0
Truth table
Figure 2.9: The symbol for a two-input NOR gate and its truth table
1234567890
1234567890
123456
123456
1234567890
123456
1234567890
123456
Activity 2.5
Draw a circuit diagram showing how a three-input NOR gate could be implemented
using only NAND gates.
input A
output A B output
input B 0 0 0
0 1 1
A 2-input XOR gate
1 0 1
1 1 0
Truth table
Figure 2.10: The symbol for an XOR gate and its truth table
A deeper insight into the functionality of an XOR gate can be obtained from the information
provided in Figure 2.12. Here, one input is labelled as ‘A’ and the other as ‘control’. As may be
seen from the truth table provided in this illustration when the ‘control’ input is at a logic low,
the output simply follows the input signal applied to ‘A’. Thus, in this case if ‘A’ is a logic low –
so too is the output. If we now apply a logic high to ‘A’, then the output also takes on this
same logic state.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
LOGIC GATES AND SIMPLE DIGITAL CIRCUITS 25
However, if the input labelled ‘control’ is a at logic high, then the gate acts as an inverter – the
output state is a logic low when ‘A’ is a logic high and vice versa.
A output 1
B
output 2
Figure 2.11: An XOR gate may be implemented using an AND gate, a NAND
gate and an OR gate
input A
output
control
The buffer
The symbol and truth table for this gate are provided in Figure 2.13. As may be seen, the
symbol used for the buffer has the same form as that used for the inverter, although the small
circle used at the output of the inverter is missing. (Recall that this circle is used to indicate that
the gate performs an inverting function.) In fact, as may be seen from the truth table, the
buffer does not have any logical function – the input and output have identical logic states (a
buffer has a single input and single output). It therefore appears that this device has little
purpose – it simply relays to the output the logic state applied to the input.
A B
input output 0 0
1 1
Figure 2.13: The buffer – here we show the circuit symbol and truth table.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
26 COMPUTER SYSTEMS AND NETWORKS
However, within digital circuits the buffer has a very important function which relates to the
interconnection of gates.
Gates are electronic devices which have one or more inputs to which we apply logic low and
logic high signals. Typically, the former is represented by voltages close to zero volts and the
latter by voltages close to 5 volts. (For example, in the case of a particular type (family) of logic
gates (called the TTL LS series (Transistor-Transistor Logic Low-power Schottky)) a logic low
applied to the input of a gate is represented by voltages in the range 0 – 0.8v, and a logic high
by 2.8 – 5v. Another form of logic (CMOS) employs somewhat different voltages to represent
logic low and logic high states). When we apply these voltages to the input(s) of a gate, a
small electrical current will flow into the gate. This current must come from somewhere – it is
in fact provided by the output circuit of the gate to which the input(s) of other gates are
connected. Consider a circuit where the output of a NAND gate is connected to the inputs of
six inverters. So as to correctly operate, each of these inverters will draw a small current from
the NAND gate. However, there is a maximum current that the NAND gate can provide and if
this is exceeded, the circuit will fail to operate. This limits the number of gates that can be
connected to the output of a single gate and in this context we make use of the term ‘fan-out’
which refers to the maximum number of gates that can be directly driven by a single gate. For
the TTL LS family of gates mentioned earlier, the maximum fan-out is 20.
A buffer is commonly used in situations in which we wish to exceed the maximum fan-out that
can be supported by a single gate. By way of an example, suppose that we are using some
form of logic gates that have a maximum fan-out of four (this would not be a very attractive
form of gate) and that we wish a NAND gate to drive six other gates (inverters). If we simply
connect these then we would exceed the fan-out limitation and the circuit would not operate
correctly. However, by means of two buffers, we can solve the problem whereby the NAND
gate drives the two buffers and each of these drives three inverters and so the maximum fan-
out specification is not exceeded.
It is important to note that although the buffer serves no logical function, as with all logic
gates, it does exhibit a propagation delay and therefore when the logic state applied to the
input is changed, a short time will elapse before this change appears at the output.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
LOGIC GATES AND SIMPLE DIGITAL CIRCUITS 27
As we will see in the next section, these may be interconnected to provide us with more
complex combinational logic circuits
● Sequential logic: A sequential logic circuit differs from combinational logic in that the
output(s) depend not only on the combination of inputs applied to the circuit but also on the
sequence in which they occur (i.e. on some previous state). The concept of sequential logic
will be familiar to you – but the name may not be. For example, a TV may have a single ON/
OFF button, and the TV may be in one of two states: ON or OFF. The effect of pressing the
ON/OFF button will depend on the state of the TV before the button is pressed. If, for example
the TV is already turned on, then the effect of pressing the button will be to turn it off.
Similarly, if the TV is turned off, then pressing the button will turn it on. Thus the output
resulting from the input depends on where we are in the on/off sequence. Sequential logic
circuits are constructed using the combinational logic gates of the sort described in the
previous section.
A output
B
y
A B x y output
0 0 1 1 1
0 1 1 0 0
1 0 0 1 0
1 1 0 0 0
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
28 COMPUTER SYSTEMS AND NETWORKS
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
Activity 2.6
1234567890
Circuit behaviour 1
Consider the circuit provided in Figure 2.15. Complete the truth table so as to show
the output from the circuit for all possible combinations of input.
A
output
A B x output
x 0 0
B 0 1
1 0
1 1
Truth table
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
Activity 2.7
Consider the circuit provided in Figure 2.16. For all possible combinations of input,
determine the corresponding outputs. Hint: you should employ the same approach
that was used in the previous activity and complete the truth table provided.
A B S x y z output
0 0 0
y
0 1 0
z output 1 0 0
B 1 1 0
0 0 1
S x
. 0 1 1
1 0 1
1 1 1
Truth table
Figure 2.16: Combinational logic example circuit
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
LOGIC GATES AND SIMPLE DIGITAL CIRCUITS 29
Examine the truth table that you have drawn for Activity 2.7. Here, you will see that when the
input ‘S’ is a logic low, then the output corresponds to whatever input signal is applied to ‘B’.
Conversely, when ‘S’ is a logic high, the output follows whatever signal is applied to input ‘A’.
The type of circuit is referred to as a multiplexer and is widely used in digital electronics. In fact,
in circuit diagrams a special symbol is often used to represent the multiplexer – as illustrated in
Figure 2.17(a). In Figure 2.17(b) a diagram is presented which shows the functional behaviour
of the multiplexer.
We can consider this device to act as a switch, with the position of the switch being
determined by the value of the ‘select’ signal. Consequently, if the ‘select’ signal has one
particular binary value, the output will be governed by the signal applied to one of the inputs
(say ‘input 1’) and when the value of the ‘select’ signal is changed, the output will be driven by
the binary values applied to the other input (‘input 2’). In fact, multiplexers often have more
than two inputs – perhaps eight or sixteen – in which case more than one ‘select’ signal is
required. For example, in the case that a multiplexer has eight inputs, then three ‘select’ signals
are required. This is because the three signals may take on 23=8 different binary values and
each of these values determines the particular input that will drive the output.
1234567890
12345
1234567890
12345
1234567890
12345
12345
1234567890
Activity 2.8
Consider a multiplexer with 16 inputs and a single output. How many select wires
(lines) are required to enable any of the inputs to be routed through to the output?
input 1 input 1
output output
input 2 input 2
select select
(a) (b)
Figure 2.17: In (a) the symbol for a multiplexer is given and (b) indicates the
effective action of this device.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
30 COMPUTER SYSTEMS AND NETWORKS
The half-adder
Here we briefly consider the creation of a circuit able to add together two binary digits (bits).
Before we do this, let us briefly look at the process of adding binary numbers.
First, consider adding two 3-bit binary numbers. For example:
1 1 0+
0 1 1
We start the addition process with the rightmost column (the least significant bits) and work
our way to the left.
1 1 0+
0 1 1
1
As we add, we may need to carry. In this example, we begin by adding 0 and 1. What should
we carry? Technically, you do not have to carry anything. However, when this process is
implemented in hardware, we always need to define a carry value, which in this case is zero.
We therefore carry a 0 into the next column, and then add that column.
0
1 1 0+
0 1 1
0 1
This time, when we add the middle column, we get 0 + 1 + 1 which sums to 0, with a
carry of 1.
1 0
1 1 0+
0 1 1
(1) 0 0 1
The final (leftmost) column adds 1 + 1 + 0, which sums to 0, and also generates a carry. We
put the carry in parentheses on the left.
Typically, when we perform an addition of two k-bit numbers, we expect the answer to be k-
bits. If the numbers are represented in binary, the result can be k+1 bits. To handle that case,
we have a carry bit (the one written in parentheses above).
It makes sense to design a circuit that adds in ‘columns’. Let us consider adding the rightmost
column. We are adding two bits. Therefore the adder we want to create should have two
inputs. It generates a sum bit for that column, plus a carry bit. So there should be two
outputs. This device is called a half-adder.
● Data inputs: 2 (call them A and B)
● Outputs: 2 (call them SUM, for sum, and CARRY, for carry).
A circuit for a half-adder together with its associated truth table is presented in Figure 2.18 and
uses an AND gate together with an XOR gate.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
LOGIC GATES AND SIMPLE DIGITAL CIRCUITS 31
1234567890
123456
1234567890
123456
1234567890
123456
123456
1234567890
Activity 2.9
123456
The half-adder
Verify the accuracy of the truth table presented in Figure 2.18 for the half-adder.
A B sum carry
A sum
0 0 0 0
0 1 1 0
1 0 1 0
carry 1 1 0 1
B
As may be seen, a ‘carry’ value of 1 is generated only when both inputs are a logic high, and
the ‘sum’ is zero when we add together two zeros or two ones (in this latter case a ‘carry’ is
produced). This circuit is called a half-adder because although it produces a ‘carry out’ of the
current arithmetic operation, it does not permit a ‘carry in’ from a previous arithmetic
operation.
A Q
B
Q
Figure 2.19: A simple example of sequential logic. This circuit is known as the
‘RS bistable’.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
32 COMPUTER SYSTEMS AND NETWORKS
Consider the case that A is a logic low and B a logic high. Using the same approach that was
adopted in the previous section, we can readily determine the output states (recall that for a
NAND gate ‘any low gives a high’). Since input A is low, it follows that the output from the top
gate will be a logic high (thus Q is high). Both inputs to the lower NAND gate are high, and so
its output will be a logic low. Thus Q=high and Q =low. If we now change input A to a logic
high state (leaving B unaltered), then this will have no impact on Q and Q (in fact we can say
that the circuit ‘remembers’ its previous state).
Now consider the case that A is a logic high and B a logic low. Using the same reasoning as
was used in the previous paragraph, it follows that Q will be a logic low and Q a logic high. If
we now change input B to a logic high and leave A unaltered this will have no effect on the
outputs. Again the circuit ‘remembers’ its previous state.
Unfortunately, if a logic low is applied to both inputs, then any subsequent change to either
one of the inputs has an undefined impact on the circuit. This can be understood by
examination of the circuit. If both inputs are a logic low, then the outputs from both NAND
gates will be high. If we now change A and B to a logic high, we cannot predict the states of
Q and Q – this will simply depend on slight differences in the propagation delays of the two
gates and so the circuit cannot be viewed as being stable. Consequently, we must avoid
simultaneously applying a logic low to both inputs.
The operation of this circuit can be summarised as follows:
● If A=0 and B=1 then Q=1 and Q =0. Call this state 1
● If A=1 and B=0 then Q=0 and Q =1. Call this state 2
● If we now make A=1 and B=1 then the circuit will retain its previous state (state 1 or state 2) –
i.e. it will ‘remember’ its previous state.
Note that when A=0 and B=1 then Q=1 and Q =0. Similarly when A=1 and B=0 then Q =1
and Q=0. Thus the output from the circuit corresponds to the inverted input. When Q=1 and
Q =0 the circuit is said to be ‘set’ and in the converse case (Q=0 and Q =1) the circuit is referred
to as being in the ‘reset’ state. Additionally, when both inputs are a logic high the circuit is said
to ‘latch’ (remember) the previous input.
As we have seen, the circuit can latch two input states (1,0 and 0,1) and the output is the
inverted input. Since the circuit can exhibit two stable states it is referred to as a ‘bistable’
device and is generally called an ‘RS latch’ or ‘RS bistable’. Here, the R and S indicate the set
and reset conditions in which the circuit is able to exhibit stability.
1234567890
1234567890
1234567890
1234567890
1234567890
1234567890
Activity 2.10
1234567890
The RS bistable 1234567890
1234567890
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
LOGIC GATES AND SIMPLE DIGITAL CIRCUITS 33
A Q
B
Q
D
A Q
E
D F Q
Clk
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
34 COMPUTER SYSTEMS AND NETWORKS
Now consider the case in which the clock (‘clk’) is a logic high. If the input D is a logic low, the
output from gate A will be a logic high and the output from gate B a logic low (this is because
in the case of gate B, the value of D has been inverted and so both its inputs are in a logic high
state). Thus the bistable receives 1,0 and so Q=0 and Q =1 (the reset condition).
If input D is a logic high, the output from gate A will be a logic low and from gate B a logic
high. Thus the bistable is presented with 0,1 and so Q=1 and Q =0 (the set condition).
Summary
● We apply either a logic high or low to input D when the clock is in a logic high state. The value
of D sets or resets Q and Q . If now the clock changes to a logic low (before we remove the
value applied to input D), the bistable will latch (remember) the value of the signal that was
applied to input D. We have a memory device able to store one binary digit (bit).
This circuit is referred to as the ‘level-triggered D-type bistable’ and there are no circumstances
(other than circuit failure) in which both of the inputs of the bistable will be simultaneously
presented with a logic low. Thus the ‘invalid’ state is avoided.
The device is said to be ‘level-triggered’ since it is the binary value (level) of the clock that
determines when the bistable is in the latched state. As we will see, many digital circuits
employ an alternative approach in which they react to changes in the state of a signal (rather
than to the absolute binary value). Such devices are said to be ‘edge-triggered’. This can be
readily understood by reference to Figure 2.22, which shows the variation of a digital signal
(waveform) with time. As indicated, a ‘level-triggered’ device responds to the absolute binary
value of a signal. This contrasts with the ‘edge-triggered’ device in which changes in the state
of the waveform are of importance.
The waveform presented in this illustration is idealised in as much as the changes in state
appear to occur instantaneously. However, in the case of a real signal these changes occupy a
finite (although very small) time. The transition from a logic low to a logic high corresponds to
the waveform’s ‘rising edge’ and the converse to the ‘falling edge’.
A register
As we will discuss in Chapter 3, within a microprocessor there are a number of registers. These
are each able to store one or more bytes, and support both the operation of the processor and
the implementation of arithmetic and logical operations. Since the registers are implemented
on the processor chip, they operate at very high speeds.
For our present purposes it is sufficient to note that registers are simply storage locations able
to ‘remember’ one or more bytes. We can implement such a register by means of a set of D-
type bistables (the number of bistables needed corresponds to the number of bits that are to be
stored within the register). For simplicity, we will assume that a register is to hold (store) four
bits, and a suitable circuit is illustrated in Figure 2.23. Here, you will notice that each bistable
device is simply represented by a rectangle, each of which has two inputs (‘D’ and ‘clk’) and
two outputs Q and Q . For the moment we will assume that these are ‘level-triggered’ devices
of the sort that were illustrated in Figure 2.21.
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
LOGIC GATES AND SIMPLE DIGITAL CIRCUITS 35
Logic high
Rising Falling
edge edge
Figure 2.22: An idealised waveform. Circuits may react to the absolute binary
state (voltage) of the signal or to changes in its state.
Clk
Figure 2.23: The creation of a 4-bit register using level-triggered D-type bistable
Copyright 2006 Cengage Learning, Inc. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part.
Another Random Scribd Document
with Unrelated Content
combat between Frederick and a champion who may be willing to
appear for Elsa. None of the knights will defend her cause. She then
describes a champion whose form has appeared to her in a vision,
and she proclaims that he shall be her champion. Her pretence is
derided by Frederick and his followers, who think that she is out of
her mind; but after a triple summons by the Herald, there is seen in
the distance on the river, a boat drawn by a swan, and in it a knight
clad in silver armour. He comes to champion Elsa's cause, and before
the combat betroths himself to her, but makes a strict condition that
she shall never question him as to his name or birthplace, for should
she, he would be obliged to depart. She assents to the conditions,
and the combat which ensues results in Frederick's ignominious
defeat. Judgment of exile is pronounced on him.
Instead, however, of leaving the country he lingers in the
neighbourhood of Brabant, plotting with Ortrud how they may
compass the ruin of Lohengrin and Elsa. Ortrud by her entreaties
moves Elsa to pity, and persuades her to seek a reprieve for
Frederick, at the same time, however, using every opportunity to
instil doubts in Elsa's mind regarding her champion, and rousing her
to such a pitch of nervous curiosity that she is on the point of asking
him the forbidden question. After the bridal ceremonies, and in the
bridal chamber, the distrust which Ortrud and Frederick have
engendered in Elsa's mind so overcomes her faith that she
vehemently puts the forbidden question to her champion. Almost at
the same moment Frederick and four of his followers force their way
into the apartment, intending to take the knight's life. A single blow
of his sword, however, stretches Frederick lifeless, and his followers
bear his corpse away. Placing Elsa in the charge of her ladies-in-
waiting, and ordering them to take her to the presence of the King,
he repairs thither himself.
The Brabantian hosts are gathering, and he is expected to lead them
to battle, but owing to Elsa's question he is now obliged to disclose
who he is and to take his departure. He proclaims that he is
Lohengrin, son of Parsifal, Knight of the Holy Grail, and that he can
linger no longer in Brabant, but must return to the place of his
coming. The swan has once more appeared, drawing the boat down
the river, and bidding Elsa farewell he steps into the little shell-like
craft. Then Ortrud, with malicious glee, declares that the swan is
none other than Elsa's brother, whom she (Ortrud) bewitched into
this form, and that he would have been changed back again to his
human shape had it not been for Elsa's rashness. But Lohengrin,
through his supernatural powers, is able to undo Ortrud's work, and
at a word from him the swan disappears and Godfrey stands in its
place. A dove now descends, and, hovering in front of the boat,
draws it away with Lohengrin, while Elsa expires in her brother's
arms.
Owing to the lyric character of the story upon which "Lohengrin" is
based, the opera, while not at all lacking in strong dramatic
situations is characterized by a subtler and more subdued
melodiousness than "Tannhäuser," is more exquisitely lyrical in fact
than any Wagnerian work except "Parsifal."
There are typical themes in the score, but they are hardly handled
with the varied effect that entitles them to be called leading motives.
On the other hand there are fascinating details of orchestration.
These are important because the composer has given significant
clang-tints to the music that is heard in connection with the different
characters in the story. He uses the brass chiefly to accompany the
King, and, of course, the martial choruses; the plaintive, yet spiritual
high wood-wind for Elsa; the English horn and sombre bass clarinet
—the instrument that had to be bought—for Ortrud; the violins,
especially in high harmonic positions, to indicate the Grail and its
representative, for Lohengrin is a Knight of the Holy Grail. Even the
keys employed are distinctive. The Herald's trumpeters blow in C
and greet the King's arrival in that bright key. F-sharp minor is the
dark, threatful key that indicates Ortrud's appearance. The key of A,
which is the purest for strings and the most ethereal in effect, on
account of the greater ease of using "harmonics," announces the
approach of Lohengrin and the subtle influence of the Grail.
Moreover Wagner was the first composer to discover that celestial
effects of tone colour are produced by the prolonged notes of the
combined violins and wood-wind in the highest positions more truly
than by the harp. It is the association of ideas with the Scriptures,
wherein the harp frequently is mentioned, because it was the most
perfected instrument of the period, that has led other composers to
employ it for celestial tone-painting. But while no one appreciated
the beauty of the harp more than Wagner, or has employed it with
finer effect than he, his celestial tone-pictures with high-violins and
wood-wind are distinctly more ecstatic than those of other
composers.
The music clothes the drama most admirably. The Vorspiel or
Prelude immediately places the listener in the proper mood for the
story which is to unfold itself, and for the score, vocal and
instrumental, whose strains are to fall upon his ear.
The Prelude is based entirely upon one theme, a beautiful one and
expressive of the sanctity of the Grail, of which Lohengrin is one of
the knights. Violins and flutes with long-drawn-out, ethereal chords
open the Prelude. Then is heard on the violins, so divided as to
heighten the delicacy of the effect, the Motive of the Grail, the cup in
which the Saviour's blood is supposed to have been caught as it
flowed from the wound in His side, while he was on the Cross. No
modern book on orchestration is considered complete unless it
quotes this passage from the score, which is at once the earliest
and, after seventy years, still the most perfect example of the effect
of celestial harmony produced on the high notes of the divided violin
choir. This interesting passage in the score is as follows:
[Listen (MP3)]
Although this is the only motive that occurs in the Prelude, the ear
never wearies of it. Its effectiveness is due to the wonderful skill
with which Wagner handles the theme, working it up through a
superb crescendo to a magnificent climax, with all the splendours of
Wagnerian orchestration, after which it dies away again to the
ethereal harmonies with which it first greeted the listener.
Act I. The curtain, on rising, discloses a scene of unwonted life on
the plain near the River Scheldt, where the stream winds toward
Antwerp. On an elevated seat under a huge oak sits King Henry I.
On either side are his Saxon and Thuringian nobles. Facing him with
the knights of Brabant are Count Frederick of Telramund and his
wife, Ortrud, daughter of the Prince of Friesland, of dark, almost
forbidding beauty, and with a treacherous mingling of haughtiness
and humility in her carriage.
It is a strange tale the King has just heard fall from Frederick of
Telramund's lips. Henry has assembled the Brabantians on the plain
by the Scheldt in order to summon them to join his army and aid in
checking the threatened invasion of Germany by the Hungarians. But
he has found the Brabantians themselves torn by factional strife,
some supporting, others opposing Frederick in his claim to the ducal
succession of Brabant.
"Sire," says Frederick, when called upon by the King to explain the
cause of the discord that has come upon the land, "the late Duke of
Brabant upon his death-bed confided to me, his kinsman, the care of
his two children, Elsa and her young brother Godfrey, with the right
to claim the maid as my wife. But one day Elsa led the boy into the
forest and returned alone. From her pale face and faltering lips I
judged only too well of what had happened, and I now publicly
accuse Elsa of having made away with her brother that she might be
sole heir to Brabant and reject my right to her hand. Her hand!
Horrified, I shrank from her and took a wife whom I could truly love.
Now as nearest kinsman of the duke I claim this land as my own, my
wife, too, being of the race that once gave a line of princes to
Brabant."
So saying, he leads Ortrud forward, and she, lowering her dark
visage, makes a deep obeisance to the King. To the latter but one
course is open. A terrible accusation has been uttered, and an
appeal must be made to the immediate judgment of God in trial by
combat between Frederick and whoever may appear as champion
for Elsa. Solemnly the King hangs his shield on the oak, the Saxons
and Thuringians thrust the points of their swords into the ground,
while the Brabantians lay theirs before them. The royal Herald steps
forward. "Elsa, without delay appear!" he calls in a loud voice.
A sudden hush falls upon the scene, as a slender figure robed in
white slowly advances toward the King. It is Elsa. With her fair brow,
gentle mien, and timid footsteps it seems impossible that she can be
the object of Frederick's dire charge. But there are dark forces
conspiring against her, of which none knows save her accuser and
the wife he has chosen from the remoter North. In Friesland the
weird rites of Odin and the ancient gods still had many secret
adherents, Ortrud among them, and it is the hope of this heathenish
woman, through the undoing of Elsa, and the accession of Frederick
whom she has completely under her influence, to check the spread
of the Christian faith toward the North and restore the rites of Odin
in Brabant. To this end she is ready to bring all the black magic of
which she secretly is mistress into play. What wonder that Elsa, as
she encounters her malevolent gaze, lowers her eyes with a
shudder!
Up to the moment of Elsa's entrance, the music is harsh and
vigorous, reflecting Frederick's excitement as, incited by Ortrud, he
brings forward his charge against Elsa. With her appearance a
change immediately comes over the music. It is soft, gentle, and
plaintive; not, however, entirely hopeless, as if the maiden, being
conscious of her innocence, does not despair of her fate.
"Elsa," gently asks the King, "whom name you as your champion?"
She answers as if in a trance; and it is at this point that the music of
"Elsa's Dream" is heard. In the course of this, violins whisper the
Grail Motive and in dreamy rapture Elsa sings, "I see, in splendour
shining, a knight of glorious mien. His eyes rest upon me with
tranquil gaze. He stands amid clouds beside a house of gold, and
resting on his sword. Heaven has sent him to save me. He shall my
champion be!"
[Listen]
The Herald now stations his trumpeters at the corners of the plain
and bids them blow a blast toward the four points of the compass.
When the last echo has died away he calls aloud:
"He who in right of Heaven comes here to fight for Elsa of Brabant,
let him step forth!"
The deep silence that follows is broken by Frederick's voice. "No one
appears to repel my charge. 'Tis proven."
"My King," implores Elsa, whose growing agitation is watched by
Ortrud with a malevolent smile, "my champion bides afar. He has not
yet heard the summons. I pray you let it go forth once more."
Again the trumpeters blow toward the four points of the compass,
again the Herald cries his call, again there is the fateful silence. "The
Heavens are silent. She is doomed," murmured the men. Then Elsa
throws herself upon her knees and raises her eyes in prayer.
Suddenly there is a commotion among the men nearest the river
bank.
"A wonder!" they cry. "A swan! A swan—drawing a boat by a golden
chain! In the boat stands a knight! See, it approaches! His armour is
so bright it blinds our eyes! A wonder! A wonder!"
There is a rush toward the bank and a great shout of acclaim, as the
swan with a graceful sweep rounds a bend in the river and brings
the shell-like boat, in which stands a knight in dazzling armour and
of noble mien, up to the shore. Not daring to trust her senses and
turn to behold the wondrous spectacle, Elsa gazes in rapture
heavenward, while Ortrud and Telramund, their fell intrigue suddenly
halted by a marvel that surpasses their comprehension, regard each
other with mingled amazement and alarm.
A strange feeling of awe overcomes the assembly, and the tumult
with which the advent of the knight has been hailed dies away to
breathless silence, as he extends his hand and in tender accents bids
farewell to the swan, which gently inclines its head and then glides
away with the boat, vanishing as it had come. There is a chorus, in
which, in half-hushed voices, the crowd gives expression to the
mystery of the scene. Then the men fall back and the Knight of the
Swan, for a silver swan surmounts his helmet and is blazoned upon
his shield, having made due obeisance to the King, advances to
where Elsa stands and, resting his eyes upon her pure and radiant
beauty, questions her.
"Elsa, if I become your champion and right the foul wrong that is
sought to be put upon you, will you confide your future to me; will
you become my bride?"
"My guardian, my defender!" she exclaims ecstatically. "All that I
have, all that I am, is yours!"
"Elsa," he says slowly, as if wishing her to weigh every word, "if I
champion your cause and take you to wife, there is one promise I
must exact: Never must you ask me whence I come or what my
name."
"I promise," she answers, serenely meeting his warning look. He
repeats the warning and again she promises to observe it.
"Elsa, I love you!" he exclaims, as he clasps her in his arms. Then
addressing the King he proclaims his readiness to defend her
innocence in trial by combat.
In this scene occurs one of the significant themes of the opera, the
motive of warning—for it is Elsa's disregard of it and the breaking of
her promise that brings her happiness to an end.
[Listen]
Three Saxons for the Knight and three Brabantians for Frederick
solemnly pace off the circle within which the combatants are to
fight. The King, drawing his sword, strikes three resounding blows
with it upon his shield. At the first stroke the Knight and Frederick
take their positions. At the second they draw their swords. At the
third they advance to the encounter. Frederick is no coward. His
willingness to meet the Knight whose coming had been so strange
proves that. But his blows are skilfully warded off until the Swan
Knight, finding an opening, fells him with a powerful stroke.
Frederick's life is forfeited, but his conqueror, perchance knowing
that he has been naught but a tool in the hands of a woman leagued
with the powers of evil, spares it and bids his fallen foe rise. The
King leads Elsa to the victor, while all hail him as her deliverer and
betrothed.
The scenes here described are most stirring. Before the combat
begins, the King intones a prayer, in which first the principals and
then the chorus join with noble effect, while the music of rejoicing
over the Knight's victory has an irresistible onsweep.
Act II. That night in the fortress of Antwerp, the palace where abide
the knights is brilliantly illuminated and sounds of revelry issue from
it, and lights shine from the kemenate, where Elsa's maids-in-waiting
are preparing her for the bridal on the morrow. But in the shadow of
the walls sit two figures, a man and a woman; the man, his head
bowed in despair, the woman looking vindictively toward the palace.
They are Frederick and Ortrud, who have been condemned to
banishment, he utterly dejected, she still trusting in the power of her
heathenish gods. To her the Swan Knight's chivalrous forbearance in
sparing Frederick's life has seemed weak instead of noble, and Elsa
she regards as an insipid dreamer and easy victim. Not knowing that
Ortrud still darkly schemes to ruin Elsa and restore him to power,
Frederick denounces her in an outburst of rage and despair.
As another burst of revelry, another flash of light, causes Frederick
to bow his head in deeper gloom, Ortrud begins to unfold her plot to
him. How long will a woman like Elsa—as sweet as she is beautiful,
but also as weak—be able to restrain herself from asking the
forbidden question? Once her suspicion aroused that the Knight is
concealing from her something in his past life, growing jealousy will
impel her first to seek to coax from him, then to demand of him his
name and lineage. Let Frederick conceal himself within the minster,
and when the bridal procession reaches the steps, come forth and,
accusing the Knight of treachery and deceit, demand that he be
compelled to disclose his name and origin. He will refuse, and thus,
even before Elsa enters the minster, she will begin to be beset by
doubts. She herself meanwhile will seek to enter the kemenate and
play upon her credulousness. "She is for me; her champion is for
you. Soon the daughter of Odin will teach you all the joys of
vengeance!" is Ortrud's sinister exclamation as she finishes.
Indeed it seems as if Fate were playing into her hand. For at that
very moment Elsa, all clad in white, comes out upon the balcony of
the kemenate and, sighing with happiness, breathes out upon the
night air her rapture at the thought of what bliss the coming day has
in store for her. As she lets her gaze rest on the calm night she hears
a piteous voice calling her name, and looking down sees Ortrud, her
hands raised in supplication to her. Moved by the spectacle of one
but a short time before so proud and now apparently in such utter
dejection, the guileless maid descends and, herself opening the door
of the kemenate, hastens to Ortrud, raises her to her feet, and
gently leads her in, while, hidden in the shadows, Frederick of
Telramund bides his time for action. Thus within and without,
mischief is plotting for the unsuspecting Elsa.
These episodes, following the appearance of Elsa upon the balcony,
are known as the "Balcony Scene." It opens with the exquisite
melody which Elsa breathes upon the zephyrs of the night in
gratitude to heaven for the champion sent to her defence. Then,
when in pity she has hastened down to Ortrud, the latter pours
doubts regarding her champion into Elsa's mind. Who is he? Whence
came he? May he not as unexpectedly depart? The whole closes
with a beautiful duet, which is repeated by the orchestra, as Ortrud
is conducted by Elsa into the apartment.
It is early morn. People begin to gather in the open place before the
minster and, by the time the sun is high, the space is crowded with
folk eager to view the bridal procession. They sing a fine and spirited
chorus.
At the appointed hour four pages come out upon the balcony of the
kemenate and cry out:
"Make way, our Lady Elsa comes!" Descending, they clear a path
through the crowd to the steps of the minster. A long train of richly
clad women emerges upon the balcony, slowly comes down the
steps and, proceeding past the palace, winds toward the minster. At
that moment a great shout, "Hail! Elsa of Brabant!" goes up, as the
bride herself appears followed by her ladies-in-waiting. For the
moment Ortrud's presence in the train is unnoticed, but as Elsa
approaches the minster, Frederick's wife suddenly throws herself in
her path.
"Back, Elsa!" she cries. "I am not a menial, born to follow you!
Although your Knight has overthrown my husband, you cannot boast
of who he is—his very name, the place whence he came, are
unknown. Strong must be his motives to forbid you to question him.
To what foul disgrace would he be brought were he compelled to
answer!"
Fortunately the King, the bridegroom, and the nobles approaching
from the palace, Elsa shrinks from Ortrud to her champion's side and
hides her face against his breast. At that moment Frederick of
Telramund, taking his cue from Ortrud, comes out upon the minster
steps and repeats his wife's accusation. Then, profiting by the
confusion, he slips away in the crowd. The insidious poison,
however, has already begun to take effect. For even as the King
taking the Knight on his right and Elsa on his left conducts them up
the minster steps, the trembling bride catches sight of Ortrud whose
hand is raised in threat and warning; and it is clinging to her
champion, in love indeed but love mingled with doubt and fear, that
she passes through the portal, and into the edifice.
These are crucial scenes. The procession to the minster, often known
as the bridal procession, must not be confused with the "Bridal
Chorus." It is familiar music, however, because at weddings it often
is played softly as a musical background to the ceremony.
Act III. The wedding festivities are described in the brilliant
"Introduction to Act III." This is followed in the opera by the "Bridal
Chorus," which, wherever heard—on stage or in church—falls with
renewed freshness and significance upon the ear. In this scene the
Knight and Elsa are conducted to the bridal chamber in the castle.
From the right enter Elsa's ladies-in-waiting leading the bride; from
the left the King and nobles leading the Knight. Preceding both
trains are pages bearing lights; and voices chant the bridal chorus.
The King ceremoniously embraces the couple and then the
procession makes its way out, until, as the last strains of the chorus
die away, Elsa and her champion are for the first time alone.
It should be a moment of supreme happiness for both, and indeed,
Elsa exclaims as her bridegroom takes her to his arms, that words
cannot give expression to all its hidden sweetness. Yet, when he
tenderly breathes her name, it serves only to remind her that she
cannot respond by uttering his. "How sweetly sounds my name
when spoken by you, while I, alas, cannot reply with yours. Surely,
some day, you will tell me, all in secret, and I shall be able to
whisper it when none but you is near!"
In her words the Knight perceives but too clearly the seeds of the
fatal mistrust sown by Ortrud and Frederick. Gently he leaves her
side and throwing open the casement, points to the moonlit
landscape where the river winds its course along the plain. The
same subtle magic that can conjure up this scene from the night has
brought him to her, made him love her, and give unshrinking
credence to her vow never to question his name or origin. Will she
now wantonly destroy the wondrous spell of moonlight and love?
But still Elsa urges him. "Let me be flattered by your trust and
confidence. Your secret will be safe in my heart. No threats, not
even of death, shall tear it from my lips. Tell me who you are and
whence you come!"
"Elsa!" he cries, "come to my heart. Let me feel that happiness is
mine at last. Let your love and confidence compensate me for what I
have left behind me. Cast dark suspicion aside. For know, I came not
hither from night and grieving but from the abode of light and noble
pleasures."
But his words have the very opposite effect of what he had hoped
for. "Heaven help me!" exclaims Elsa. "What must I hear! Already
you are beginning to look back with longing to the joys you have
given up for me. Some day you will leave me to sorrow and regret. I
have no magic spells wherewith to hold you. Ah!"—and now she
cries out like one distracted and with eyes straining at distance
—"See!—the swan!—I see him floating on the waters yonder! You
summon him, embark!—Love—madness—whatever it may be—your
name declare, your lineage and your home!"
Hardly have these mad words been spoken by her when, as she
stands before her husband of a few hours, she sees something that
with a sudden shock brings her to her senses. Rushing to the divan
where the pages laid the Knight's sword, she seizes it and thrusts it
into his hand, and he, turning to discover what peril threatens, sees
Frederick, followed by four Brabantian nobles, burst into the room.
With one stroke he lays the leader lifeless, and the others, seeing
him fall, go down on their knees in token of submission. At a sign
from the Knight they arise and, lifting Frederick's body, bear it away.
Then the Knight summons Elsa's ladies-in-waiting and bids them
prepare her in her richest garments to meet him before the King.
"There I will make fitting answer to her questions, tell her my name,
my rank, and whence I come."
Sadly he watches her being led away, while she, no longer the happy
bride, but the picture of utter dejection, turns and raises her hands
to him in supplication as though she would still implore him to undo
the ruin her lack of faith in him has wrought.
Some of the most beautiful as well as some of the most dramatic
music of the score occurs in these scenes.
The love duet is exquisite—one of the sweetest and tenderest
passages of which the lyric stage can boast. A very beautiful musical
episode is that in which the Knight, pointing through the open
casement to the flowery close below, softly illumined by the moon,
sings to an accompaniment of what might be called musical
moonbeams, "Say, dost thou breathe the incense sweet of flowers?"
But when, in spite of the tender warning which he conveys to her,
she begins questioning him, he turns toward her and in a passionate
musical phrase begs her to trust him and abide with him in loving
faith. Her dread that the memory of the delightful place from which
he has come will wean him from her; the wild vision in which she
imagines she sees the swan approaching to bear him away from her,
and when she puts to him the forbidden questions, are details
expressed with wonderful vividness in the music.
After the attack by Frederick and his death, there is a dramatic
silence during which Elsa sinks on her husband's breast and faints.
When I say silence I do not mean that there is a total cessation of
sound, for silence can be more impressively expressed in music than
by actual silence itself. It is done by Wagner in this case by long
drawn-out chords followed by faint taps on the tympani. When the
Knight bends down to Elsa, raises her, and gently places her on a
couch, echoes of the love duet add to the mournfulness of the
music. The scene closes with the Motive of Warning, which resounds
with dread meaning.
A quick change of scene should be made at this point in the
performance of the opera, but as a rule the change takes so long
that the third act is virtually given in two acts.
It is on the banks of the Scheldt, the very spot where he had
disembarked, that the Knight elects to make reply to Elsa's
questions. There the King, the nobles, and the Brabantians, whom
he was to lead, are awaiting him to take command, and as their
leader they hail him when he appears. This scene, "Promise of
Victory," is in the form of a brilliant march and chorus, during which
the Counts of Brabant, followed by their vassals, enter on horseback
from various directions. In the average performance of the opera,
however, much of it is sacrificed in order to shorten the
representation.
The Knight answers their hail by telling them that he has come to
bid them farewell, that Elsa has been lured to break her vow and ask
the forbidden questions which he now is there to answer. From
distant lands he came, from Montsalvat, where stands the temple of
the Holy Grail, his father, Percival, its King, and he, Lohengrin, its
Knight. And now, his name and lineage known, he must return, for
the Grail gives strength to its knights to right wrong and protect the
innocent only so long as the secret of their power remains
unrevealed.
Even while he speaks the swan is seen floating down the river. Sadly
Lohengrin bids Elsa farewell. Sadly all, save one, look on. For Ortrud,
who now pushes her way through the spectators, it is a moment of
triumph.
"Depart in all your glory," she calls out. "The swan that draws you
away is none other than Elsa's brother Godfrey, changed by my
magic into his present form. Had she kept her vow, had you been
allowed to tarry, you would have freed him from my spell. The
ancient gods, whom faithfully I serve, thus punish human
faithlessness!"
By the river bank Lohengrin falls upon his knees and prays in silence.
Suddenly a white dove descends over the boat. Rising, Lohengrin
loosens the golden chain by which the swan is attached to the boat;
the swan vanishes; in its place Godfrey stands upon the bank, and
Lohengrin, entering the boat, is drawn away by the dove. At sight of
the young Duke, Ortrud falls with a shriek, while the Brabantian
nobles kneel before him as he advances and makes obeisance to the
King. Elsa gazes on him in rapture until, mindful of her own sorrow,
as the boat in which Lohengrin stands vanishes around the upper
bend of the river, she cries out, "My husband! My husband!" and falls
back in death in her brother's arms.
Lohengrin's narrative of his origin is beautifully set to music familiar
from the Prelude; but when he proclaims his name we hear the
same measures which Elsa sang in the second part of her dream in
the first act. Very beautiful and tender is the music which he sings
when he hands Elsa his horn, his sword, and his ring to give to her
brother, should he return, and also his greeting to the swan when it
comes to bear him back. The work is brought to a close with a
repetition of the music of the second portion of Elsa's dream,
followed by a superb climax with the Motive of the Grail.
INTRODUCTION
ebookbell.com