Vacuum tube computer

Replica of the Atanasoff–Berry computer replica at Iowa State University
The 1946 ENIAC computer used 17,468 vacuum tubes

A vacuum tube computer, now termed a first-generation computer, is a computer which uses vacuum tubes for logic circuitry. Although superseded by second generation, transistorized computers, vacuum tube computers continued to be built into the 1960s. These computers were mostly one-of-a-kind designs.

Vacuum tube technology required a great deal of electricity. It was found that supplying a small amount of power to the tubes all the time, rather than turning off the system, reduced tube failures. The ENIAC computer (1946) had over 17,000 tubes and suffered a tube failure (which would take 15 minutes to locate) on average every two days. In operation the ENIAC consumed 150 kilowatts of power.[1]

An IBM 650 at Texas A&M University.

The Atanasoff–Berry computer, a prototype of which was first demonstrated in 1939, is now credited as the first vacuum tube computer.[2] However it was not a general-purpose computer being able to only solve a system of linear equations and it was also not very reliable. The Ferranti Mark 1 (1951) is considered the first commercial vacuum tube computer. The first mass-produced computer was the IBM 650 (1953).

Design issues

Because the failure of any one of the thousands of tubes in a computer could result in errors, tube reliability was of high importance. Special quality tubes were built for computer service, with higher standards of materials, inspection and testing than standard receiving tubes. One effect of digital operation that rarely appeared in analog circuits was cathode poisoning. Vacuum tubes that operated for extended intervals with no plate current would develop a high-resistivity layer on the cathodes, reducing the gain of the tube. Specially selected materials were required for computer tubes to prevent this effect. To avoid mechanical stresses associated with warming the tubes to operating temperature, often the tube heaters had their full operating voltage applied slowly, over a minute or more, to prevent stress related fractures of the cathode heaters. Heater power could be left on during standby time for the machine, with high voltage plate supplies switched off. Marginal testing was built into sub-systems of a vacuum tube computer; by lowering plate or heater voltages and testing for proper operation, components at risk of early failure could be detected. To regulate all the power supply voltages and prevent surges and dips from the power grid from affecting computer operation, power was derived from a motor-generator set that improved the stability and regulation of power supply voltages.

Two broad types of logic circuits were used in construction of vacuum tube computers. The "asynchronous" or direct, DC coupled type used only resistors to connect between logic gates and within the gates themselves. Logic levels were represented by two widely separated voltages. In the "synchronous" or "dynamic pulse" type of logic, every stage was coupled by pulse networks such as transformers or capacitors. Each logic element had a "clock" pulse applied. Logic states were represented by the presence or absence of pulses during each clock interval. Asynchronous designs potentially could operate faster, but required more circuitry to protect against logic "races" as different logic paths would have different propagation time from input to stable output. Synchronous systems avoided this problem, but needed extra circuitry to distribute a clock signal, which might have several phases for each stage of the machine. Direct-coupled logic stages were somewhat sensitive to drift in component values or small leakage currents, but the binary nature of operation gave circuits considerable margin against malfunction due to drift.[3] An example of a "pulse" (syncronous) compute was the MIT Whirlwind. The IAS cmputers (ILLIAC and others) used asynchronous, direct-coupled logic stages.

Tube computers primarily used triodes and pentodes as switching and amplifying elements. At least one specially designed gating tube had two control grids with similar characteristics, which allowed it to directly implement a two-input AND gate.[3] Thyratrons were sometimes used, suchas for driving I/O devices or to simplify design of latches and holding registers. Often vacuum tube computers made extensive use of solid-state ("crystal") diodes to perform AND and OR logic functions, and only used vacuum tubes to amplify signals between stages or to construct elements such as flip-flops, counters, and registers. The solid-state diodes reduced the size and power consumption of the overall machine.

World War II Applications

World War II spurred development of many great technologies and vacuum tube computers were one of them due to their potential to decrypt the Axis Powers' messages. The German Enigma machine produced encrypted messages for communication, but development of more impenetrable ciphers proceeded with the Lorenz SZ40 and Siemens & Halske T52 machines. With the more complex codes produced by the aforementioned machines, the first-generation computers were needed to perform the rigorous calculations to decipher the daily pass code. This opportunity to learn about the Axis Power’s plans drove the development of the Heath Robinson and Colossus[4] models, early breakthroughs in vacuum tube computers. These models used punch paper for the programming, but as newer models with increased calculation speeds were developed, the punch paper would be torn from the tension and a new system of programming memory as well as general purpose memory would be required.[5]

The Colossus Computer at Bletchley Park

The Colossus was significant due to its use in cracking the Lorenz cipher, also known as Tunny, from the Germans. It was developed in 1943 and was further refined to decipher the Tunny code, which was previously untouched by machines able to break the Enigma code.[6] The British cryptanalysts eventually became familiar enough with the code to break it consistently. The Colossus machines were also used to crack codes created by the Siemens & Halske T52 machines, called “Sturgeon”. However, more attention was placed on the Tunny and because of this it is thought that the British were never able to break this code consistently.[6] Regarding its size, the number of vacuum tubes used in this computer varied from 1600 to 2400 during its lifespan.[2] The general public was unaware of the technology being used to decipher messages and remained unaware until the 1970’s.[2]

Members of the Women’s Royal Naval Service[4], at the Government Code and Cypher School at Bletchley Park, operated many of these purpose-built computers in order to decrypt messages sent through the Enigma System.[7] They were in charge of setting the computers up with the appropriate connections, but finding a successful combination was often difficult and time consuming. It was known that the Germans updated the code daily so there was a strict time constraint leading to high pressure to find correct settings and break as many codes as possible. It is believed that between 2,000 and 6,000 enemy codes were deciphered each day.[7] As a testament to the work women did in operating calculating machines the creators of the ENIAC included the title “Computer” in the name of the machine. The ENIAC was developed in 1946 as a general-purpose computer, one of the first of its kind.[5]

The end of the war saw a continued increase in technology, especially in advancing computer technology. These interests were headed by Max Newman with the Royal Society Computing Machine Laboratory at Manchester University and Alan Turing with his Automatic Computing Engine (ACE). The Computing Machine Laboratory produced the Manchester Machine, a general-purpose stored-program electronic digital computer created by F.C. Williams and Tom Kilburn. The U.S. also showed interest in the electronic computing world with the completion of the ENIAC in 1945.[2]

Memory technology

Early systems used a variety of memory technologies prior to finally settling on magnetic core memory. The Atanasoff–Berry computer of 1942 stored numerical values as binary numbers in a revolving mechanical drum, with a special circuit to refresh this "dynamic" memory on every revolution. The war-time ENIAC could store 20 numbers, but the vacuum-tube registers used were too expensive to build to store more than a few numbers. A stored program computer was out of reach until an economical form of memory could be developed. Maurice Wilkes built EDSAC in 1947, which had a mercury delay line memory that could store 32 words of 17 bits each. Since the delay line memory was inherently serially organized, the machine logic was also bit-serial as well.[8]

Mercury delay line memory was used by J. Presper Eckert in the EDVAC and UNIVAC I. Eckert and John Mauchly received a patent for delay line memory in 1953. Bits in a delay line are stored as sound waves in the medium, which travel at a constant rate. The UNIVAC I (1951) used seven memory units, each containing 18 columns of mercury, storing 120 bits each. This provided a memory of 1000 12-character words with an average access time of 300 microseconds.[9] This memory subsystem formed its own walk-in room.

Williams tube from an IBM 701 at the Computer History Museum

Williams tubes were the first true random-access memory device. The Williams tube displays a grid of dots on a cathode ray tube (CRT), creating a small charge of static electricity over each dot. The charge at the location of each of the dots is read by a thin metal sheet just in front of the display. Frederic Calland Williams and Tom Kilburn applied for patents for the Williams Tube in 1946. The Williams Tube was much faster than the delay line, but suffered from reliability problems. The UNIVAC 1103 used 36 Williams Tubes with a capacity of 1024 bits each, giving a total random access memory of 1024 words of 36 bits each. The access time for Williams Tube memory on the IBM 701 was 30 microseconds.[9]

Magnetic drum memory was invented in 1932 by Gustav Tauschek in Austria.[10][11] A drum consisted of a large rapidly-rotating metal cylinder coated with a ferromagnetic recording material. Most drums had one or more rows of fixed read-write heads along the long axis of the drum for each track. The drum controller selected the proper head and waited for the data to appear under it as the drum turned. The IBM 650 had a drum memory of 1000 to 4000 10-digit words with an average access time of 2.5 milliseconds.

Magnetic-core memory, 18×24 bits, with a US quarter

Magnetic core memory was patented by An Wang in 1951. Core uses tiny magnetic ring cores, through which wires are threaded to write and read information. Each core represents one bit of information. The cores can be magnetized in two different ways (clockwise or counterclockwise) and the bit stored in a core is zero or one depending on that core's magnetization direction. The wires allow an individual core to be set to either a one or a zero and for its magnetization to be changed by sending appropriate electric current pulses through selected wires. Core memory offered random access and greater speed, in addition to much higher reliability. It was quickly put to use in computers such as the MIT/IBM Whirlwind where an initial 1024 16-bit words of memory were installed replacing Williams Tubes. Likewise the UNIVAC 1103 was upgraded to the 1103A in 1956, with core memory replacing Williams tubes. The core memory used on the 1103 had an access time of 10 microseconds.[9]

See also

References

  1. "Press release: PHYSICAL ASPECTS, OPERATION OF ENIAC ARE DESCRIBED" (PDF). Smithsonian – National Museum of American History. WAR DEPARTMENT Bureau of Public Relations. Retrieved Dec 30, 2017.
  2. 1 2 3 4 Jack, Copeland, B. "The Modern History of Computing". plato.stanford.edu. Retrieved 2018-04-29.
  3. 1 2 Edward L. Braun, Digital Computer Design: Logic, Circuitry, and Synthesis Academic Press, 2014, ISBN 1483275736, pp.116–126
  4. 1 2 Gray, G.T.; Smith, R.Q. (October 2004). "Sperry Rand's first-generation computers, 1955–1960: hardware and software". IEEE Annals of the History of Computing. 26: 20–34 via IEEE Xplore.
  5. 1 2 Ceruzzi, Paul (15 May 2013). "Inventing the Computer [Scanning Our Past]". Proceedings of the IEEE. 101: 1503–1508 via IEEE Xplore.
  6. 1 2 G. Zorpette, "Breaking the enemy's code: British intelligence deciphered Germany's top-secret military communications with colossus, an early vacuum-tube computer," in IEEE Spectrum, vol. 24, no. 9, pp. 47–51, Sept. 1987.
  7. 1 2 Heath, Nick. "Hacking the Nazis: The secret story of the women who broke Hitler's codes". TechRepublic.
  8. Mark Donald Hill, Norman Paul Jouppi, Gurindar Sohi *ed., Readings in Computer Architecture, Gulf Professional Publishing, 2000, ISBN 1558605398,pages 3–4
  9. 1 2 3 Dasgupta, Subrata (2014). It Began with Babbage: The Genesis of Computer Science. Oxford University Press. p. VII. ISBN 978-0-19-930941-2. Retrieved Dec 30, 2017.
  10. US Patent 2,080,100 Gustav Tauschek, Priority date August 2, 1932, subsequent filed as German Patent DE643803, "Elektromagnetischer Speicher für Zahlen und andere Angaben, besonders für Buchführungseinrichtungen" (Electromagnetic memory for numbers and other information, especially for accounting institutions)
  11. Universität Klagenfurt (ed.). "Magnetic drum". Virtual Exhibitions in Informatics. Retrieved 2011-08-21.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.