Illustrate the execute cycle, Computer Engineering

Assignment Help:

Q. Illustrate the Execute Cycle?

The fetch and indirect cycles include a small, fixed sequence of micro-operations. Every one of these cycles has fixed sequence of micro-operations which are common to all instructions. 

This isn't true of the execute cycle. For a specific machine with N different opcodes there are N different sequences of micro-operations which can occur. Let's consider some hypothetical instructions:

An add instruction which adds the contents of memory location X to Register R1 with R1 storing the result:

ADD R1, X

Sequence of micro-operations can be:

T1:  MAR ← IR (address)

T2:  MBR ← [MAR]

T3:  R1     ← R1 + MBR

At the beginning of execute cycle IR comprises the ADD instruction and its direct operand address (memory location X). At time T1 address part of the IR is transferred to MAR. At T2 the referenced memory location is read in MBR.

Lastly at T3 contents of R1 and MBR are added by ALU. 

Let's discuss one more instruction:

ISZ X it increments content of memory location X by 1. If the result is 0 the subsequent instruction in the sequence is skipped. A possible sequence of micro-operations for this instruction can be:

 T1:  MAR ← IR (address)

         T2:  MBR ← [MAR]

         T3:  MBR ← MBR+ 1

         T4:  [MAR] ← MBR

 If (MBR = 0) then (PC ← PC+ I)

Please remember that for this machine we have presumed that MBR can be incremented by ALU directly.

PC is incremented if MBR comprises 0. This test and action can be applied as one micro-operation. Please note also that this micro-operation may be executedat the time of the same time unit during which updated value in MBR is stored back to memory.


Related Discussions:- Illustrate the execute cycle

Components of magnetic disk, Q. Components of magnetic disk? Disk itsel...

Q. Components of magnetic disk? Disk itself is mounted in a disk drive that comprises arm which is a shaft that rotates disk and the electronics required for input and output b

Bell lapadula model, A computer system provides protection using the Bell-L...

A computer system provides protection using the Bell-LaPadula policy. How would a virus spread if A) the virus were placed on the system at system low (the compartment that all o

Operation research, how to implement a modified distribution method using c...

how to implement a modified distribution method using c/c++

Differentiate the latch and flip-flop, Differentiate the latch and flip-flo...

Differentiate the latch and flip-flop? The major difference between latch and FF is which latches is level sensitive whereas FF is edge sensitive. They both need the use of clo

#dbms., #example of cascading rollback#

#example of cascading rollback#

Intelligent systems assignment, This logbook should be used to record decis...

This logbook should be used to record decisions, ideas, work done by your group on this assignment. Each group should keep one logbook, which must be submitted along with your sour

Oo modelling, We might model such a scenario using three types of object: o...

We might model such a scenario using three types of object: one for Customers, one for BankAccounts and another for Transactions. In terms of data required, for Customers assume we

Significance of having less memory references, Q. What is the significance ...

Q. What is the significance of having less memory references? As the time needed for memory reference is more than that of a register reference so increased number of memory r

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd