Concepts of an address - data and control bus, Operating System

Assignment Help:

  Let us consider the operation of the EPROM device in more detail. Consider the pining details below again

1663_Concepts of an address, data and control bus.png

 
Before we examine the interface means of the EPROM, it is worth giving the operation a little thought. Each memory cell in the EPROM  could store 1 byte of data i.e. 8 1, 0's. In order to access each location the EPROM has to assign each location a unique address, this is used to access the data. This is similar to the concept of a telephone number  each house has its own number. The device is constructed to request this address from external pins namely: A0 -> A15. The data pathway to the device is by means of the data bus i.e. DQ0 -> DQ7.  The remaining pins of the device are concerned with selecting the device i.e. power on (CE) and reading the data (OE).  These additional pins are often termed 'control bus'. The operation of the device to read data is simple in that we:

    1) Turn on the device CE =0
    2) Present the address on the address pins A0 -> A15
    3) Output enable the device to read the data (OE =0)
    4) Read the data of the data bus (D7 -> D0)
 
The timing of these operations is sometimes critical since it takes a finite time to access the data, therefore we must be careful not to read the data too quick. This time is termed the access time of the device, for this EPROM it is 150ns. RAM devices are similar in operation besides they have a read/write pin which enables the user to input and output data. The remaining digital systems employ VLSI methods ' Very Large scale integration', these devices are the heart of the modern PC, i.e. microprocessors, complex function devices. Before we discuss microprocessor we really should look at base systems and binary, hexadecimal and deanery systems


Related Discussions:- Concepts of an address - data and control bus

Calculate the number of processes to avoid race condition, To evade race co...

To evade race condition, the maximum number of processes that may be at the same time inside the critical section is The maximum number of processes which may be at the same t

What is banker''s algorithm, What is banker's algorithm? Banker's algor...

What is banker's algorithm? Banker's algorithm is a deadlock avoidance algorithm that is applicable to a resource-allocation system with multiple examples of each resource type

What is single-level directory, What is Single-level Directory All file...

What is Single-level Directory All files are constrained in the similar directory, which is simple to support and understood. One limitation is when the number of files enhance

What is the use of boot block, What is the use of boot block? For a com...

What is the use of boot block? For a computer to begin running when powered up or rebooted it requires having an initial program to run. This bootstrap program tends to be easy

Explain signal handling, Signal handling A signal is used in UNIX syste...

Signal handling A signal is used in UNIX systems to inform a process that a particular event has occurred. 1. A signal is produced by the occurrence of a particular event.

How can the deadlock be prevented-safe state, How can the deadlock be preve...

How can the deadlock be prevented-Safe State Safe state : A state is safe if the system is able to allocate resources to each process in some order and still avoid deadlock.

Fork system call in unix, Forking is an important phase of Unix, critical t...

Forking is an important phase of Unix, critical to the support of its design strategies, which encourages the implementation of filters. In Unix, a filter is a process that reads i

Explain the basic method of paging method, Explain the basic method of pagi...

Explain the basic method of paging method. Physical memory is divided into the fixed-sized blocks called frames. Logical memory is as well divided into blocks of the same size

Conservative garbage collection, Conservative GC can be used for languages ...

Conservative GC can be used for languages such as C and C++, which were not explicitly designed for garbage collection. This is a non-copying technique. A conservative garbage coll

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd