Accessing the operands - assembly language, Computer Engineering

Accessing the Operands:

  • operands are usually place in one of two places:

-registers (32 int, 32 fp)

-memory (232locations)

  • registers are

-simple to specify

-shut to the processor (fast access)

  • The idea that we desire to access registers whenever probable led to load-store architectures.

-normally all arithmetic instructions only access registers

-just access memory with explicit and stores and loads.

Load-store architectures

It can do: add r1=r2+r3 and then load r3, M(address)

⇒forces serious dependence on registers, which is accurately what you desire in today's CPU can't do add r1 = r2 + M(address)

- Other more instructions

+ Fast implementation (for example: easy pipelining)

 

Posted Date: 10/13/2012 3:29:20 AM | Location : United States







Related Discussions:- Accessing the operands - assembly language, Assignment Help, Ask Question on Accessing the operands - assembly language, Get Answer, Expert's Help, Accessing the operands - assembly language Discussions

Write discussion on Accessing the operands - assembly language
Your posts are moderated
Related Questions
Given a RAID 5 (block-level distributed parity) with k disks, how well will large block trnsmitted work? How well will it handle a high I/O request rate? Evaluate the performance t

explain the construction and working of calomel electrode

Can we use WRITE statements in screen fields? If not how is data transferred from field data to screen fields? We cannot write field data to the screen using the WRITE stateme

The Orbix Connect resource adapter is packaged as a standard J2EE Connector Architecture resource adapter archive (RAR) file, corbaconn.rar. The corbaconn.rar file having all the c

Explain Non-Folded network Non-Folded Network: In a switching network, every inlet/outlet connection may be utilized for inter exchange transmission. In this case, the .excha

Explain about the Biometrics  This includes obtaining data and identifying characteristics automatically in security systems e.g. use of palm prints, finger prints, facial ima

Examples of declarations of external variables  that  are  not definitions: extern char stack[10]; extern int stkptr; These declarations tell the compiler that the variab

Determine the salient features of a parallel programmable interface, 8255. 24 I/O lines in 3 8-bit port groups - A, B, C A, B can be 8-bit input or output ports C

The demand placed on a system is explained by a lognormally distributed random variable with mean 50 and standard deviation of 10. The capacity of the system is modeled by a Weibul

Explain Session Layer of OSI Model. The session layer manages, establishes and terminates communication sessions. Communication sessions contain service of requests and serv