Execution of a full instruction - computer architecture, Computer Engineering

Assignment Help:

Execution of a full Instruction:

Regard as the instruction:

Add (R3), R1

  • Executing this particular instruction needed the below described actions:

a) Fetch the instruction

b) Fetch the primary operand (the contents of the memory location pointed to by R3)

c) Perform the addition operation

d) Load the result into R1register

Control Sequence for instruction Add (R3), R1:

  • PCout, MARin, Read, Select4, Add, Zin
  • Zout, PCin, Yin, Wait for the MFC
  • MDRout, IRin
  • R3out, MARin, Read
  • R1out, Yin, Wait for MFC
  • MDRout, Select Y, Add, Zin
  • Zout, R1in, End

Branch Instructions:

  • PCout, MARin, Read, Select4, Add, Zin
  • Zout, PCin, Yin, Wait for the MFC (WFMC)
  • MDRout, Irin
  • offset_field_of_IRout, Add, Zin
  • Zout, PCin, End

 


Related Discussions:- Execution of a full instruction - computer architecture

How enterprises are using bpr in their e-business processes, One of the mos...

One of the most important competitive strategies for E-Businesses today is business process reengineering. BPR is more than automating business processes to make modest improvement

Register-to-register operands in RISC, Q. Register-to-register operands in ...

Q. Register-to-register operands in RISC? Register-to-register operands: In RISC machines operation which access memories are LOAD and STORE. All other operands are kept in reg

Differentiate between validation and simulation, Question 1: a) Name a...

Question 1: a) Name and give a brief description of three Real-Time Systems. b) State three downfalls of Embedded Systems. c) Differentiate between a microprocessor an

Build and fix model, Why Build and fix model is considered as ad-hoc softwa...

Why Build and fix model is considered as ad-hoc software development model?

Cryptarithmetic problem in artificial intelligence, Solve the following cry...

Solve the following cryptarithmetic problem using Prolog: P I N G P O N G + F U N --------- I G N I P Each of the 7 different letters stands for a different digit. The

What is guard bits, What is guard bits? Guard bits are extra bits which...

What is guard bits? Guard bits are extra bits which are produced while the intermediate steps to yield maximum accuracy in the final results.

Convert the following into sop form, Q. Convert the following into SOP form...

Q. Convert the following into SOP form   1. (A+B) (B'+C) (A'+ C) 2. (A+C) (AB'+AC) (A'C'+B) 3. (A'+B') (C'+B)   Q.Convert the following into POS form   1. WYZ + XYZ + W'X'

Advantages on electronic payment system, Advantages on electronic payment s...

Advantages on electronic payment system It gives good security schemes.  Four necessary security requirements for safe e-payments are Authentication, Encryption, Integrity,

Explain advantage of static storage class, Explain advantage of static stor...

Explain advantage of static storage class The second and more subtle use of 'static' is in connection with external declarations. With external constructs it provides a privacy

What is insertion sort, What is insertion sort? Insertion Sort : One o...

What is insertion sort? Insertion Sort : One of the easiest sorting algorithms is the insertion sort. Insertion sort having of n - 1 passes. For pass p = 2 by  n, insertion so

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd