Illustrate the execute cycle, Computer Engineering

Assignment Help:

Q. Illustrate the Execute Cycle?

The fetch and indirect cycles include a small, fixed sequence of micro-operations. Every one of these cycles has fixed sequence of micro-operations which are common to all instructions. 

This isn't true of the execute cycle. For a specific machine with N different opcodes there are N different sequences of micro-operations which can occur. Let's consider some hypothetical instructions:

An add instruction which adds the contents of memory location X to Register R1 with R1 storing the result:

ADD R1, X

Sequence of micro-operations can be:

T1:  MAR ← IR (address)

T2:  MBR ← [MAR]

T3:  R1     ← R1 + MBR

At the beginning of execute cycle IR comprises the ADD instruction and its direct operand address (memory location X). At time T1 address part of the IR is transferred to MAR. At T2 the referenced memory location is read in MBR.

Lastly at T3 contents of R1 and MBR are added by ALU. 

Let's discuss one more instruction:

ISZ X it increments content of memory location X by 1. If the result is 0 the subsequent instruction in the sequence is skipped. A possible sequence of micro-operations for this instruction can be:

 T1:  MAR ← IR (address)

         T2:  MBR ← [MAR]

         T3:  MBR ← MBR+ 1

         T4:  [MAR] ← MBR

 If (MBR = 0) then (PC ← PC+ I)

Please remember that for this machine we have presumed that MBR can be incremented by ALU directly.

PC is incremented if MBR comprises 0. This test and action can be applied as one micro-operation. Please note also that this micro-operation may be executedat the time of the same time unit during which updated value in MBR is stored back to memory.


Related Discussions:- Illustrate the execute cycle

What are stacks, What are stacks? A stack  is an abstract data type in...

What are stacks? A stack  is an abstract data type in which items are additional to and removed only from one end known as TOP. For example, consider the pile of papers on you

Explain implementation of circuits from boolean expression, Explain Impleme...

Explain Implementation of the Circuits From the Boolean Expression? If the operation of the circuit is defined by a Boolean expression, a logic-circuit diagram can he implement

Software architecture of microprocessor, The 68HC11 series is based on the ...

The 68HC11 series is based on the Motorola 6800/1 programming instruction set and hence is a fairly simple 8 bit microprocessor. The internal structure of the 6800/1 is shown below

How many types of keys used to encrypt and decrypt data, How many types of ...

How many types of keys used to encrypt and decrypt data in Secure Sockets Layer? Two forms of keys are used as ciphers to decrypt and encrypt data. Private keys are referred to

Conjunctive normal forms, Conjunctive Normal Forms: However there for ...

Conjunctive Normal Forms: However there for the resolution rule to resolve two sentences so they must both be in a normalised format called as conjunctive normal form, that is

Explain 32 to 1 multiplexer tree, Why is Multiplexer Tree needed? Draw ...

Why is Multiplexer Tree needed? Draw the block diagram of a 32:1 Multiplexer Tree and explain how input is directed to the output in this system. Ans. One of the possible

BCD ADDER, create a BCD adder combinational ckt. that adds 2 digit BCD inpu...

create a BCD adder combinational ckt. that adds 2 digit BCD inputs

A variable number of input arguments, Write a function that will get a vari...

Write a function that will get a variable number of input arguments: the length and width of a rectangle, and possibly also the height of a box that has this rectangle as its base.

What are the general security issues, What are the General Security Issues ...

What are the General Security Issues Many issues exist when linking a computer system to the Internet or indeed to an external link via a network set up. There are numerous way

Define is a personality, Define is a Personality. In order to allow pro...

Define is a Personality. In order to allow programs coming other operating system to be run in Linux, Linux supports the idea of personalities. Every method is assign to an imp

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd