Why we use addressing schemes, Computer Engineering

Assignment Help:

Q Why we use addressing schemes?

An operation code of an instruction tells the operation to be performed. This operation is executed on some data stored in memory or register. Operands can be specified in one of the 3 basic forms which are register, immediate and memory.

Though, why addressing schemes? The question of addressing is connected with how operands are interpreted. We can say in other wordsthat the term "addressing schemes" refers to techniqueused for specifying operands. There are a multitude of instruction formats and addressing schemes. Selecting which schemes are available will affect not only the ease to write compiler but will also consider how efficient the architecture can be?

All computers use more than one addressing schemes to provide programming flexibility to user by offering facilities likeloop control,pointers to memory, indexing of data and program relocation as well as to decrease the number of bits in operand field of instruction. Providing a variety of addressing modes can help decrease instruction counts though having more modes also raises the complexity of machine and in turn can raise the average Cycles per Instruction (CPI). Before we discuss the addressing modes let's consider the notations being used in this section. In description which follows the symbols A, A1, A2 ...... etc. indicate the content of an operand field. So Ai may refer to a memory address or data. In case operand field is a register address then symbols R, R1, R2,... etc., are used. If C indicates the contents (either of an operand field or a register or of a memory location) then (C) indicates the content of the memory location whose address is C. 


Related Discussions:- Why we use addressing schemes

What is time slicing, What is time slicing? With this technique each pr...

What is time slicing? With this technique each program runs for a short period known as a time slice, and then another program runs for its time slice and so on.

Explain semaphore, What is a semaphore? Semaphore: It is a synchroniz...

What is a semaphore? Semaphore: It is a synchronization tool which gives a general-purpose solution to controlling access to critical sections.

Different ways in which a thread can be cancelled, What are the different w...

What are the different ways in which a thread can be cancelled?  Cancellation of a target thread may occur in two different scenarios: Asynchronous cancellation: One thre

Define top-down parsing techniques, Define Top-down parsing Techniques ...

Define Top-down parsing Techniques Top-down parsing can be observed as an attempt to find left-most derivations of an input-stream through searching for parse trees using a top

What are the advantagesof fact finding, What are the Advantagesof fact find...

What are the Advantagesof fact finding - Analyst obtains reliable data - It's possible to see exactly what is being done -  This is an inexpensive method in comparison o

What is file scope, Explain File scope File scope: The variables and ...

Explain File scope File scope: The variables and functions with file scope appear outside any block or list of parameters and are accessible from any place in the translation

Define message passing, Q. Define Message Passing? The PVM communicatio...

Q. Define Message Passing? The PVM communication model offers asynchronous blocking receive and asynchronous blocking send and nonblocking receive functions. In our terminology

Explain the high level Language - computer programming, Explain the High Le...

Explain the High Level Language? The programming language such as FORTRAN, C, or Pascal that enables a programmer to write programs those are more or less independent of a parti

Subtraction 11011-11001 using 2's complement, Subtraction 11011-11001 using...

Subtraction 11011-11001 using 2's complement. Ans. 11011 - 11001 = A - B 2's complement of B = 00111 1 1 0 1 1 + 0 0 1 1 1 1 0 0 0 1 0 Ignore carry to get answer as 00010 = 2.

Differences between cisc and risc architectures, Question: a) What is ...

Question: a) What is the main difference between the Princeton and Harvard microprocessor architectures? b) State five main differences between CISC and RISC architectures?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd