Why we use addressing schemes, Computer Engineering

Assignment Help:

Q Why we use addressing schemes?

An operation code of an instruction tells the operation to be performed. This operation is executed on some data stored in memory or register. Operands can be specified in one of the 3 basic forms which are register, immediate and memory.

Though, why addressing schemes? The question of addressing is connected with how operands are interpreted. We can say in other wordsthat the term "addressing schemes" refers to techniqueused for specifying operands. There are a multitude of instruction formats and addressing schemes. Selecting which schemes are available will affect not only the ease to write compiler but will also consider how efficient the architecture can be?

All computers use more than one addressing schemes to provide programming flexibility to user by offering facilities likeloop control,pointers to memory, indexing of data and program relocation as well as to decrease the number of bits in operand field of instruction. Providing a variety of addressing modes can help decrease instruction counts though having more modes also raises the complexity of machine and in turn can raise the average Cycles per Instruction (CPI). Before we discuss the addressing modes let's consider the notations being used in this section. In description which follows the symbols A, A1, A2 ...... etc. indicate the content of an operand field. So Ai may refer to a memory address or data. In case operand field is a register address then symbols R, R1, R2,... etc., are used. If C indicates the contents (either of an operand field or a register or of a memory location) then (C) indicates the content of the memory location whose address is C. 


Related Discussions:- Why we use addressing schemes

Differentiate between protected and real modes of an intel, Differentiate b...

Differentiate between protected and real modes of an Intel microprocessor Operation of Real mode interrupt: When microprocessor completes executing the current instruction, it

What are the phases of swapping a page from the memory, What are the phases...

What are the phases of swapping a page from the memory? Page stealer searches the page eligible for swapping and places the page number in the list of pages to be swapped. K

Subprogram to output the result, Input a list of positive numbers (terminat...

Input a list of positive numbers (terminated by 0) into an array. Find the largest number in the array, and into the result. Use a subprogram to input the numbers, a function to fi

Compare memory mapped i/o with i/o mapped i/o, Compare memory mapped I/O wi...

Compare memory mapped I/O with I/O mapped I/O. Memory Mapped I/O Scheme: In this scheme there is only one address space. Address space is stated as all possible addresses tha

Explain the structure of virtual enterprise, Explain the Structure of Virtu...

Explain the Structure of Virtual Enterprise. The effective enterprise can be a suitable structure to explore the emerging opportunities for creating value within the informatio

Why data bus is bidirectional, Why data bus is bidirectional and address bu...

Why data bus is bidirectional and address bus is unidirectional in most microprocessors? The data bus is bidirectional because the data bus has to transfer data among the CPU a

Neural architectures, Neural architectures are appealing as mechanisms for...

Neural architectures are appealing as mechanisms for implementing intelligence for a number of reasons. Traditional AI programs tend to be brittle and overly sensitive to noise

Define ftp, FTP FTP (File Transfer Protocol) is the protocol used on th...

FTP FTP (File Transfer Protocol) is the protocol used on the Internet for sending files and is usually used for uploading / downloading files (web pages) to and from servers. T

Explain both absolute addressing and implied addressing, Absolute addressin...

Absolute addressing and  Implied addressing A fixed address is specified and also called as direct addressing. The location of data is implied by instruction itself, so no

Write shorts notes on digital signature, Write shorts notes on Digital Si...

Write shorts notes on Digital Signature. This method is used to authenticate the sender of a message. For sign a message, the sender encrypts the message by using a key ident

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd