Ae-145 Aktiebolaget Atomenerg

Total Page:16

File Type:pdf, Size:1020Kb

Ae-145 Aktiebolaget Atomenerg AE-145 UDC 681.177 621.039.538 LLJ A User's Manual for the NRN Shield Design Method L. iniarn I * •• e AKTIEBOLAGET ATOMENERG STOCKHOLM, SWEDEN 1964 AE-145 A USER'S MANUAL FOR THE NRN SHIELD DESIGN METHOD Editor: Leif Hjärne Authors: E Aalto, R Fräki, L Hjärne, M Leimdörfer, K Lindblom S Linde, K Målen, K Nyman Summary: This report describes a code system for bulk shield design written for a Ferranti Mercury computer and is intended as a ma- nual for those using the programme. The idea of an "almost direct" flux, as in the removal theory serves as a basis for further deve- lopment of the theory. An important aspiration has been to mini- mize the manual work of administering the codes. The codes con- cerned are: NECO, computing necessary group constants from pri- mary data, REFUSE and REBOX (infinite plane or cylindrical, and box geometry, respectively), computing removal flux, NEDI a one- dimensional (plane, spherical, cylindrical) diffusion multigroup code, and SALOME a Monte Carlo code computing the gamma flux. Output tapes are constructed for direct use as input tapes, when required, for a following code. Printed and distributed in June 1964 Contents DESCRIPTION OF PRINCIPLES 1. Introduction 1 2. Cross-sections 1 3. The deep penetration of neutrons 5 4. Neutron diffusion and slowing down 9 5. Gamma penetration and energy deposition 11 DATA PREPARATION 6. General instructions 13 7. Data for NE CO 14 8. a. Data for REFUSE 26 8.b. Data for REBOX 31 9. Data for NEDI 33 10. Data for SALOME 44 OPERATION INSTRUCTIONS 11. Operation of NEC O 47 12. a. Operation of REFUSE . 49 12.b. Operation of REBOX 49 13. Operation of NEDI 50 14. Operation of SALOME 50 15. Error prints 52 LAY-OUTS OF DATA 16. Lay-out of data for NECO 56 1 7. a. Lay-out of data for REFUSE 60 17.b. Lay-out of data for REBOX 60 18. Lay-out of data for NEDI 64 19. Lay-out of data for SALOME 69 APPENDICES Appendix A 72 Appendix B. Tables 103 References 107 DESCRIPTION OF PRINCIPLES ]_, Introduction The diffusion theory, based on the so called diffusion approxima- tion, is accurate only far away from sources and material surfaces. It has,, however, certain advantages over the strict transport theory, i.e. its relative simplicity and its applicability to geometrically more complicated problems. For deep penetration problems, however, diffusion theory requires some complementary information about the neutrons coming directly from the sources at a comparably high energy (about 1 Mev). This is because of the decreasing cross-sections and the increasing scattering anisotropy with higher energies. The methods used hitherto for neutron penetration computa- tions in large geometries are impaired by some serious defects, essentially inherent in the semi-empirical character of the removal theory. The method which will be described here is a further develop- ment of the course suggested by the removal theory, but more strictly based on theoretical elements. In this report we shall describe a code system for shielding purposes.An important aspiration has been to minimize the manual work of administering the codes. The codes concerned are: NECO, computing necessary group constants from primary data, REFUSE and RE BOX (infinite plane or cylindrical, and box geometry, respec- tively), computing removal flux, NEDI a one-dimensional (plane, spherical, cylindrical)diffusion multigroup code, and SALOME, a Monte Carlo code computing the gamma flux. Output tapes are con- structed for direct use as input tapes, when required, for a following code. 2. Cross-sections In solving neutron attenuation problems one needs a rather detailed knowledge of elementary data, such as cross-sections as functions of energy, from which the constants occurring in the transport formalism can be computed. This work can be accurately executed by NECO, a code which reads raw data from a tape library, containing experimental and theoretical information which can easily be kept up to date. The output tapes from NECO can be used directly as data tapes for the following codes. - 2 - In the data library for NECO the cross-sections are organized from the pqint of view of neutron transport. Therefore all reactions of the type (n, y) (n,p) (n,OJ) must be looked upon as absorptions. The angular distribution of elastic scattering is very important owing to its effect on deep penetration and the energy degradation. In the data library these distributions are given in the form of Legendre poly- nomial expansions: 0(E;li) = (2 I + l) ^ (E) P fti) (2. with the first coefficient normalized f = 1 o Taking data from various compilations one must keep in mind that the Legendre coefficients, £„ , can be defined in a number of ways, al- though lately this form (eq. 2. l) has predominated. Directly from the experimental data often some kind of fitting by least squares must be accomplished. For this purpose the code COFFEE (ref. 1) for the IBM 7090 has been developed in cooperation with FOA (Res. Inst. Natl. Def.)- Inelastic scattering is treated in different ways in different energy regions. In the energy region where the energy levels are known (generally below 4-5 Mev) we give cross-sections for excita- tion of each level. At higher energies the level density grows very fast, and we use an evaporation model to describe the secondary energy distribution. Let E be the primary energy E1 the secondary energy. The distribution is then described by: E' E' e + -2" e (2.2) T n2n nn1 T~ The "temperatures" T are defined according to - 3 - B is the (n, 2n) threshold. The constants a. and a? can be deter- mined from experiments, but very roughly they are one tenth of the atomic weight of the residual nucleus (ref. 2), Inelastic scattering is assumed to be isotrbpic. The group constants are defined as usual as weighted averages over the groups. The weight function must be the expected form of the neutron flux spectrum within the group. This spectrum can be de- scribed in an approximate way as varying as E' & for the diffusion group constants. If the a> are not given, they are all set equal to - 1, m.aking collision density constant. For the removal group con- stants the weight function is the source spectrum, a Watt type fission spectrum: E sin h yE • (2.3) being a normalization constant. The two constants P and y a.xe for u ] .036 and 2.29, respectively, for Pu 7 1.0 and 2.0 and for Pu 1 . 0 and 2. 2 (see table II in app. B). Thermal cross-sections are treated in a special way. For the library we need elastic and capture cross-sections at 2200 m/sec (0.0253 ev). The elastic cross-section is assumed to be constant the capture cross-section to vary as (Energy) ' . Now the thermal neutron spectrum is assumed to be a Maxwellian spectrum with temperature T , which usually can be set to some fifty degrees above the temperature of the medium: E E " kT~ ,- ^ _ e (2.4) (kT)2 Observe that T is given in centrigrades for NECO, not as the absolute temperature as in (2.4). In the data for the programme a maximum step length in lethargy (Au) for the group averaging integrations must be speci- fied for each group g . The programme selects the "basic step length" (Au) slightly below the given value so that it goes an inte- gral number of times into the group width. Close to the group boun- dary certain functions can vary quickly with the energy: - 4 2 (E) = / 2 (E-»E') dE' (2.5) v f v x ; s,g ' J s ' E g S^ (E) .= 2(E) - J 2s(E-*E') dE' (2.6) E • g This applies also, for example, to (E-»E«) dE' (2.7) The variation is particularly rapid in the event of strong an- isotropy in heavy nuclei. To obtain reasonable accuracy with a simple integration formula, the basic step lowest in energy in each group is divided into seven "whole integration steps" (ÅU)1 .These are, in order from the group boundary, u Au Au Vi k >g 54 < >g lz ^>g T6 < 'g i Mg In the remainder of the energy group a !'whole integration step" is equal to the "basic step length". In the integration the flux per lethargy unit is regarded as constant over a "whole integration step" and cross- sections and Legendre coefficients over a "basic step length". The functions are integrated as step functions or with Simpson's formula except as regards the distribution of the secondary neutrons from the inelastic scattering process amongst discrete levels, where an analytical approach is used. The remarks above concerning step length etc. apply likewise to the integration over primary groups. The distribution functions are integrated analytically over the secondary groups. - 5 3. The deep penetration of neutrons The treatment of neutron transport is divided into two stages. The first stage is the direct flux attenuation which is of a simple ex- ponential type, with its sources situated within the core. Our "direct flux" is not exactly uncollided, as a small energy loss and small angle scattering do not necessarily remove a neutron from the direct flux, for which reason we shall retain the expression "removal flux". The theory underlying this method is presented in ref. 3. The relation to the old removal theory can be illustrated by fig. 1 which demonstrates the organization of the rectangular removal matrix of cross-sections. R R D ~Fixed energy boundary» —• -s boundary of tfree choice.
Recommended publications
  • Technical Details of the Elliott 152 and 153
    Appendix 1 Technical Details of the Elliott 152 and 153 Introduction The Elliott 152 computer was part of the Admiralty’s MRS5 (medium range system 5) naval gunnery project, described in Chap. 2. The Elliott 153 computer, also known as the D/F (direction-finding) computer, was built for GCHQ and the Admiralty as described in Chap. 3. The information in this appendix is intended to supplement the overall descriptions of the machines as given in Chaps. 2 and 3. A1.1 The Elliott 152 Work on the MRS5 contract at Borehamwood began in October 1946 and was essen- tially finished in 1950. Novel target-tracking radar was at the heart of the project, the radar being synchronized to the computer’s clock. In his enthusiasm for perfecting the radar technology, John Coales seems to have spent little time on what we would now call an overall systems design. When Harry Carpenter joined the staff of the Computing Division at Borehamwood on 1 January 1949, he recalls that nobody had yet defined the way in which the control program, running on the 152 computer, would interface with guns and radar. Furthermore, nobody yet appeared to be working on the computational algorithms necessary for three-dimensional trajectory predic- tion. As for the guns that the MRS5 system was intended to control, not even the basic ballistics parameters seemed to be known with any accuracy at Borehamwood [1, 2]. A1.1.1 Communication and Data-Rate The physical separation, between radar in the Borehamwood car park and digital computer in the laboratory, necessitated an interconnecting cable of about 150 m in length.
    [Show full text]
  • Information Technology 3 and 4/1998. Emerging
    OCCASION This publication has been made available to the public on the occasion of the 50th anniversary of the United Nations Industrial Development Organisation. DISCLAIMER This document has been produced without formal United Nations editing. The designations employed and the presentation of the material in this document do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations Industrial Development Organization (UNIDO) concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries, or its economic system or degree of development. Designations such as “developed”, “industrialized” and “developing” are intended for statistical convenience and do not necessarily express a judgment about the stage reached by a particular country or area in the development process. Mention of firm names or commercial products does not constitute an endorsement by UNIDO. FAIR USE POLICY Any part of this publication may be quoted and referenced for educational and research purposes without additional permission from UNIDO. However, those who make use of quoting and referencing this publication are requested to follow the Fair Use Policy of giving due credit to UNIDO. CONTACT Please contact [email protected] for further information concerning UNIDO publications. For more information about UNIDO, please visit us at www.unido.org UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION Vienna International Centre, P.O. Box 300, 1400 Vienna, Austria Tel: (+43-1) 26026-0 · www.unido.org · [email protected] EMERGING TECHNOLOGY SERIES 3 and 4/1998 Information Technology UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION Vienna, 2000 EMERGING TO OUR READERS TECHNOLOGY SERIES Of special interest in this issue of Emerging Technology Series: Information T~chn~~ogy is the focus on a meeting that took INFORMATION place from 2n to 4 November 1998, in Bangalore, India.
    [Show full text]
  • Alan Turingturing –– Computercomputer Designerdesigner
    AlanAlan TuringTuring –– ComputerComputer DesignerDesigner Brian E. Carpenter with input from Robert W. Doran The University of Auckland May 2012 Turing, the theoretician ● Turing is widely regarded as a pure mathematician. After all, he was a B-star Wrangler (in the same year as Maurice Wilkes) ● “It is possible to invent a single machine which can be used to compute any computable sequence. If this machine U is supplied with the tape on the beginning of which is written the string of quintuples separated by semicolons of some computing machine M, then U will compute the same sequence as M.” (1937) ● So how was he able to write Proposals for development in the Mathematics Division of an Automatic Computing Engine (ACE) by the end of 1945? 2 Let’s read that carefully ● “It is possible to inventinvent a single machinemachine which can be used to compute any computable sequence. If this machinemachine U is supplied with the tapetape on the beginning of which is writtenwritten the string of quintuples separated by semicolons of some computing machinemachine M, then U will compute the same sequence as M.” ● The founding statement of computability theory was written in entirely physical terms. 3 What would it take? ● A tape on which you can write, read and erase symbols. ● Poulsen demonstrated magnetic wire recording in 1898. ● A way of storing symbols and performing simple logic. ● Eccles & Jordan patented the multivibrator trigger circuit (flip- flop) in 1919. ● Rossi invented the coincidence circuit (AND gate) in 1930. ● Building U in 1937 would have been only slightly more bizarre than building a differential analyser with Meccano.
    [Show full text]
  • NEWSLETTER Cpdtrf;Lq'tp.Nn •
    Th~?p~,~eps~9ti(t~J.s··r'~ws{~tt~I"" DIGITAL COMPUTER j.~~p'~r()xJ ?~i~\ .me? lumfOr ~he !.."te r-?h~9ge among t n'ter~~te~ p~r~On~\?jlnf9rtl).~t 1?n<?o" ... <;(Enl~g ,·rT?~9~•.· •.···· ••• ~. ~v;lop1l1en~~ In.t,v.~t.I.~iJ$>·· .. ~... 1,9 f~·.1l.·I·i· ••. ?9I11p.tJt~.r pr;.;J;ct$~pi.~lr.I.~.lIt.ton.<.i~ ..... 11 T'" ItT<i'~O'9?y~rvm~~t~gEl~<:iesi NEWSLETTER cPDtrf;lQ'tp.nn •. "'n(.t,.~ontr I bu't;Qrs. OFFICE OF NAVAL RESEARCH MATHEMATICAL SCIENCES DIVISION Vol. 11, No.3 Gordon D. Goldstein, Editor July 1959 Jean S. Campbell, Asst. Editor TABLE OF CONTENTS Page No. COMPUTERS AND DATA PROCESSING, NORTH AMERICA 1. Ferranti Electric, Inc., Sirius, Hempstead, L.L, New York 1 2. Librascope, Inc., Libratrol- 500, Glendale, California 1 3. Monroe Calculating Machine Company, Distributape, Orange, New Jersey 2 COMPUTING CENTERS 1. Air Force Cambridge Research Center, Computer and Mathematical Sciences Laboratory, L.G. Hanscom Field, Bedford, Massachusetts 2 2. Georgia Institute of Technology, Rich Electronic Computer Center, 2 Atlanta, Georgia 2 3. Holloman Air Force Base, New Mexico, Data Assimilator 3 4. National Bureau of Standards, Computation Laboratory, Washington, D.C. 4 5. New York University,AEC Computing and Applied Mathematics Center, NewYork,N.Y. 4 6. RCA Service Company, FLAC I and IBM 709, Patrick Air Force Base, Florida 5 7. U.S. Naval Missile Center, 709 andRAYDAC Systems, Point Mugu, California 5 8. U.S. NavalProving Ground, Naval Ordnance Computation Center, Dahlgren, Virginia 6 9.
    [Show full text]
  • Clementina - (1961-1966) a Personal Experience
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Servicio de Difusión de la Creación Intelectual The Beginning of Computer Science in Argentina – Clementina - (1961-1966) A Personal Experience Cecilia Berdichevsky 1 SADIO-Argentine Computing Society-Uruguay 252-Buenos Aires-Argentina http://www.sadio.org.ar, <[email protected]> 2 ICDL Argentina (International Computer Driving Licence)-Rincon 326-Buenos Aires-Argentina http://www.icdl.org.ar, <[email protected]> I dedicate this work to the memory of Dr. Manuel Sadosky. Abstract. 1957 marked the beginning of modern education in computing in Argentina. I was lucky enough to live this part of the history. After issuing an international bid that year, all members of a special commission from the University of Buenos Aires selected the Ferranti Mercury computer to be purchased for the University. Once installed in 1961, an Institute of Calculus1 was created with the aim of improving the use and professional and technical applications of the machine. Almost at the same time, a new course of study was organized, the Scientific Computist2. Those three events, promoted by our teacher and mentor Manuel Sadosky, set the start point of education assisted by computers in our country. The work at the Institute covered three fields: problem solving, research and teaching. Several Working Teams were organized looking to solve “real problems” in different disciplines: Mathematical Economics, Operations Research, Statistics, Linguistics, Applied Mechanics, Numerical Analysis, Electronic Engineering and Programming Systems. The architecture, structure, operation, languages and other characteristics of the machine, quite advanced for the time, determined the specific area of each of the working teams.
    [Show full text]
  • Issue 3 January 2005 Ferranti Mercury X1 Index B3 Sales of Ferranti
    Issue 3 January 2005 Ferranti Mercury X1 Index B3 Sales of Ferranti Mercury Computers etc D1 Design history and designers References Delivery etc Issue 3 January 2005 B3 Sales of Ferranti Mercury computers. Information mostly taken from: The Ferranti Computer Department – an informal history. B B Swann, 1975. Typescript for private circulation only. See the National Archive for the History of Computing, catalogue number NAHC/FER/C30. No. customer date del’d scientific applic’s. Commercial applic’s 1 Norwegian Defence Research Aug. ’57 Atomic energy work - Est., Kjeller. 2 Manchester University Oct. ’57 Research & service work - Transferred to University of Sheffield 1963 3 French Atomic Energy Nov. ’57 Atomic energy work - Authority, Saclay. 4 United Kingdom Atomic Feb. ’58 Atomic energy work - Energy Authority, Harwell. 5 RAF Meteorological Office, Sept. ’58 Weather forecasting - Dunstable. 6 Council for European Nuclear Jun. ’58 Atomic energy work - Research, Geneva. 7 London University. Oct. ’58 Research & service work - 8 United Kingdom Atomic Oct. ’58 Atomic energy work Energy Authority, Risley. 9 Oxford University. Nov. ’58 Research & service work - Forestry (large Dbs) Replaced by KDF9 10 Shell International Petroleum Jan. ’59 Linear programming. Sales analysis Co. Ltd., London. 11 Royal Aircraft Establishment, Mar. ’59 Aircraft calculations - Farnborough. 12 ICI Ltd., Central Instruments Jun. ’59 Chemical process analysis - Division, Reading. 13 Swedish Atomic Energy Jul. ’59 Atomic energy work - Authority, Stockholm. 14 Belgian Atomic Energy Sept. ’59 Atomic energy work - Authority, Mol. 15 The General Electric Co. Ltd., Dec. ’59 Atomic energy work - Erith. and machine design. 16 Metropolitan-Vickers Electrical Oct. ’60 Transformer design - Co.
    [Show full text]
  • Systems Architecture of the Ferranti Mark I and Mark I* Computers
    Version 1, August 2011. CCS-F1X2 Systems Architecture of the Ferranti Mark I and Mark I* computers. Contents. 1. Historical development. 2. The early Manchester University computers, 1948 – 1949. 3. Overview of the Ferranti Mark I. 4. Summary of the main differences between the Ferranti Mark I and the Mark I*. 1. Historical development. These Ferranti machines were the fully-engineered production versions of prototype computers designed and built at the University of Manchester. The first of the prototypes was called the Small Scale Experimental Machine (SSEM), also known as the Baby. The SSEM first ran a program on the morning of Monday 21st June 1948, thereby being the world‟s first electronic stored-program computer to become operational. The SSEM was a minimal computer, primarily intended to test a novel storage system that had been developed by F C Williams and T Kilburn, first at the Telecommunications Research Establishment and then, from January 1947 at the Electro-technical Department of the University of Manchester where Professor Freddie Williams moved to become head of Department. Tom Kilburn was seconded to Manchester, to help with the storage research. The novel storage system, later to be called the Williams-Kilburn tube, depended upon regenerating a pattern of electrostatically- charged spots on the inner surface of a cathode ray tube. The system is thus sometimes called CRT storage, or electrostatic storage. Each charged spot represented a binary one or zero. Two varieties of spots were tried: dot-dash, and focus-defocus, the latter being used on the Ferranti computers. The system was patented and eventually used under licence on several early computers, including the IBM 701 and 702.
    [Show full text]
  • Version 3 January 2005 Ferranti Mercury. X2. Systems Architecture
    Version 3 January 2005 Ferranti Mercury. X2. Systems Architecture. Note:- Ferranti terminology is used with modern equivalents in brackets when first used. Index B1 Computer and user features D4 Hardware and technical details References Version 3 January 2005 B1 Computer and User features. According to the manufacturer’s literature1 the Ferranti Mercury Computer was a high speed machine using hardware floating point arithmetic and with exceptionally large storage capacity. The main applications areas were foreseen as in science and technology, with nine areas listed as:- volume computation matrix algebra X-ray analysis Eigenvalue problems design optimisation linear programming stress analysis relaxation techniques partial differential equations. “When an IBM representative, Samuels, visited Dover Street and saw the electronic floating point in operation he was very impressed. IBM stopped production of their current machine soon after and came out later with a floating point version.” (DBG Edwards, private communication) Mercury was unusual in that it was designed for floating point use exclusively. The integer arithmetic was limited to 10 digits (bits) and thus is difficult to compare with other machines on the basis of fixed point operations. The multiplier was a parallel/serial design, operating on 10 digits in parallel with three serial sections using what later became known as carry save adders. Two multiplier bits where decoded per cycle (Mark I performed 20 digits in parallel in two sections, ‘decoding’ one digit at a time and also using the ‘carry save’ technique). D4 Hardware Technical Details. The CPU was serial in operation, with a clock speed of 1 Mc/s (Mhz).
    [Show full text]
  • Early Nordic Compilers and Autocodes Peter Sestoft
    Early Nordic Compilers and Autocodes Peter Sestoft To cite this version: Peter Sestoft. Early Nordic Compilers and Autocodes. 4th History of Nordic Computing (HiNC4), Aug 2014, Copenhagen, Denmark. pp.350-366, 10.1007/978-3-319-17145-6_36. hal-01301428 HAL Id: hal-01301428 https://hal.inria.fr/hal-01301428 Submitted on 12 Apr 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Early Nordic Compilers and Autocodes Version 2.1.0 of 2014-11-17 Peter Sestoft IT University of Copenhagen Rued Langgaards Vej 7, DK-2300 Copenhagen S, Denmark [email protected] Abstract. The early development of compilers for high-level program- ming languages, and of so-called autocoding systems, is well documented at the international level but not as regards the Nordic countries. The goal of this paper is to provide a survey of compiler and autocode development in the Nordic countries in the early years, roughly 1953 to 1965, and to relate it to international developments. We also touch on some of the historical societal context. 1 Introduction A compiler translates a high-level, programmer-friendly programming language into the machine code that computer hardware can execute.
    [Show full text]
  • Virtual Memory
    ECE4750/CS4420 Computer Architecture L7: Virtual Memory Edward Suh Computer Systems Laboratory [email protected] Announcements . HW1 due today • Check the clarification and announcement on blackboard • Submit a version early – we will be strict with the deadline . Prelim conflict should be reported by the end of this week ECE4750/CS4420 — Computer Architecture, Fall 2008 2 1 Overview . Previous lecture: Improving cache performance • Reduce hit time • Reduce miss rate • Reduce miss penalty . Today: Virtual memory (VM) • Why do we need it? • What is it? • How does it affect the cache design? . Reading: Appendix C.3, C.4, Chapter 5.4 ECE4750/CS4420 — Computer Architecture, Fall 2008 3 Imagine Computers w/o VM Wireless sensor node (8-bit CPU, 4KB RAM) EDSAC, early 50’s What are the difficulties of programming such machines? ECE4750/CS4420 — Computer Architecture, Fall 2008 4 2 Virtual Memory Concept ECE4750/CS4420 — Computer Architecture, Fall 2008 5 Simple Base and Bound Translation current Load X Virtual segment Address Main Memory Main Program Address Space ECE4750/CS4420 — Computer Architecture, Fall 2008 6 3 Separate Areas for Program and Data Data Bound Bounds Register Violation? data Effective Addr Load X Register segment Data Base Register + Program Program Bound Bounds Address Register Violation? MemoryMain Space Program program Counter segment Program Base Register + What is an advantage of this separation? ECE4750/CS4420 — Computer Architecture, Fall 2008 7 Memory Fragmentation Users 4 & 5 Users 2 & 5 free arrive leave user 1 16K user 1 16K user 1 16K user 2 24K user 2 24K 24K user 4 24K 16K user 4 16K 8K 8K user 3 32K user 3 32K user 3 32K 24K user 5 24K 24K ECE4750/CS4420 — Computer Architecture, Fall 2008 8 4 Paged Memory Systems .
    [Show full text]
  • In Focus: Computing
    CERNCOURIER IN FOCUS COMPUTING A retrospective of 60 years’ coverage of computing technology cerncourier.com 2019 COMPUTERS, WHY? 1972: CERN’s Lew Kowarski on how computers worked and why they were needed COMPUTING IN HIGH ENERGY PHYSICS 1989: CHEP conference considered the data challenges of the LEP era WEAVING A BETTER TOMORROW 1999: a snapshot of the web as it was beginning to take off THE CERN OPENLAB 2003: Grid computing was at the heart of CERN’s new industry partnership CCSupp_4_Computing_Cover_v3.indd 1 20/11/2019 13:54 CERNCOURIER WWW. I N F OCUS C OMPUT I N G CERNCOURIER.COM IN THIS ISSUE CERN COURIER IN FOCUS COMPUTING Best Cyclotron Systems provides 15/20/25/30/35/70 MeV Proton Cyclotrons as well as 35 & 70 MeV Multi-Particle (Alpha, Deuteron & Proton) Cyclotrons Motorola CERN Currents from 100uA to 1000uA (or higher) depending on the FROM THE EDITOR particle beam are available on all BCS cyclotrons Welcome to this retrospective Best 20u to 25 and 30u to 35 are fully upgradeable on site supplement devoted to Cyclotron Energy (MeV) Isotopes Produced computing – the fourth in 18F, 99mTc, 11C, 13N, 15O, a series celebrating CERN Best 15 15 64Cu, 67Ga, 124I, 103Pd Courier’s 60th anniversary. Big impact An early Data shift CERN’s Computer Centre in 1998, with banks of Best 15 + 123I, The Courier grew up during the microprocessor chip. 19 computing arrays for the major experiments. 25 Best 20u/25 20, 25–15 111 68 68 In, Ge/ Ga computing revolution. CERN’s first Best 30u Best 15 + 123I, SPECIAL FOREWORD 5 30 computer, the Ferranti Mercury, which (Upgradeable) 111In, 68Ge/68Ga CERN computing guru Graeme Stewart describes the immense task of had less computational ability than an taming future data volumes in high-energy physics.
    [Show full text]
  • The Atlas Story
    The Atlas story. Simon Lavington. Second edition, 6 th December 2012. Contents. Introduction page 1 Birth pains 1 Atlas at Manchester 1 Ferranti and the market place 5 Timeline 6 Technical innovations: facts and figures 6 The London Atlas 8 The Chilton Atlas 9 The Atlas 2 developments 11 Titan at Cambridge 13 Atlas 2 at AWRE Aldermaston 13 Atlas 2 at the CAD centre 13 More technical details of Atlas installations 15 Physical layout 17 Organisation of the Atlas storage hierarchy 17 Format of an Atlas instruction. 19 Guide to the Atlas Supervisor 20 People and places 21 More information 22 Originally produced for the Atlas Symposium held on 5 th December 2012 in the School of Computer Science, Kilburn Building, University of Manchester. It is a pleasure to acknowledge the help given by many former Atlas pioneers in the writing of this brochure. Comments on the text are welcomed and should be sent to Simon Lavington : [email protected] Picture credits to copyright holders. Computer Laboratory, University of Cambridge: Figure 9 Graham Penning: Figure 10 Simon Lavington: Figure 3 Iain MacCallum: Front cover Museum of Science & Industry, Manchester Figures 1, 2, 4, 5, 6 STFC Rutherford Appleton Laboratory: Figures 7a, 7b, 8 (On 5 th December the original printed version of this document had a cover design based on photographs of the Atlas at Manchester University in 1963). i By the end of 1955 there were less than 16 production digital computers in use in the UK. They were of five British designs, from five different companies, and were single-user systems with practically no systems software.
    [Show full text]