Concepts of an address - data and control bus, Operating System

Assignment Help:

  Let us consider the operation of the EPROM device in more detail. Consider the pining details below again

1663_Concepts of an address, data and control bus.png

 
Before we examine the interface means of the EPROM, it is worth giving the operation a little thought. Each memory cell in the EPROM  could store 1 byte of data i.e. 8 1, 0's. In order to access each location the EPROM has to assign each location a unique address, this is used to access the data. This is similar to the concept of a telephone number  each house has its own number. The device is constructed to request this address from external pins namely: A0 -> A15. The data pathway to the device is by means of the data bus i.e. DQ0 -> DQ7.  The remaining pins of the device are concerned with selecting the device i.e. power on (CE) and reading the data (OE).  These additional pins are often termed 'control bus'. The operation of the device to read data is simple in that we:

    1) Turn on the device CE =0
    2) Present the address on the address pins A0 -> A15
    3) Output enable the device to read the data (OE =0)
    4) Read the data of the data bus (D7 -> D0)
 
The timing of these operations is sometimes critical since it takes a finite time to access the data, therefore we must be careful not to read the data too quick. This time is termed the access time of the device, for this EPROM it is 150ns. RAM devices are similar in operation besides they have a read/write pin which enables the user to input and output data. The remaining digital systems employ VLSI methods ' Very Large scale integration', these devices are the heart of the modern PC, i.e. microprocessors, complex function devices. Before we discuss microprocessor we really should look at base systems and binary, hexadecimal and deanery systems


Related Discussions:- Concepts of an address - data and control bus

How the nested macro calls are expanded, How the Nested Macro calls are exp...

How the Nested Macro calls are expanded LIFO (Last in First out)

Briefly discuss on bankers algorithm, Briefly discuss on Bankers algorithm?...

Briefly discuss on Bankers algorithm? The resource-allocation graph algorithm is not applicable to a resource-allocation system with multiple examples  for each resource type.

How does windows xp execute transport protocols, Q. What kinds of networkin...

Q. What kinds of networking does Windows XP support? How does Windows XP execute transport protocols? Describe two networking protocols. Answer: Support is offer for bo

Explain the advantage of assembly language, Explain the Advantage of Assemb...

Explain the Advantage of Assembly Language The advantages of assembly language program is: a)    Reduced errors  b)    Faster translation times  c)    Changes could be ma

Define latency plus seek time, Define Latency plus seek time The total...

Define Latency plus seek time The total time to arrange a disk drive mechanism for a block of data to be read from is its Latency plus seeks time

Deadlock detection, Deadlocks can be detected while the program is running,...

Deadlocks can be detected while the program is running, by running cycle detection algorithms on the graph that de?nes the current use of resources. De?ne this graph as follows:

Explain internal fragmentation, Explain internal fragmentation The Inter...

Explain internal fragmentation The Internal fragmentation signifies to the result of reserving a piece of space without ever intending to use it. This space is wasted that this

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd