Computer architecture basics, Computer Engineering

Computer Architecture Basics:

Some of computer architecture at companies such like AMD and Intel uses more fine distinctions:

  • Macro architecture- this is an architectural layer that are more abstract than micro architecture, for example. ISA
  • ISA (Instruction Set Architecture) -it's already defined above
  • Assembly ISA - it is a smart assembler can convert an abstract assembly language common to a group of machines into slightly different machine language for different implementations
  • Programmer Visible Macro architecture- it is higher level language tools like as compilers may define a consistent interface or contract to programmers by using them, abstracting differences between UISA ,underlying ISA, , and micro architectures for example. The C, C++, or Java standards describe different Programmer Visible Macro architecture - even though in practice the C micro architecture for a specific computer includes
  • UISA (Microcode Instruction Set Architecture) -it is a family of machines having different hardware level micro architectures may share a common microcode architecture, and therefore a UISA.
  • Pin Architecture -it is a set of functions that a microprocessor is likely to provide, from the point of view of a hardware platform For example. FERR/IGNNE ,the x86 A20M, or FLUSH pins, and the messages that the processor is likely to produce after completing a cache invalidation so that external caches can be invalidated. Pin architecture functions are more supple than ISA functions - external hardware may adapt to changing encodings, or changing from a pin to a message - but the functions are expected to be provided in successive implementations even if the way of encoding them changes.

 

 

Posted Date: 10/13/2012 2:47:12 AM | Location : United States







Related Discussions:- Computer architecture basics, Assignment Help, Ask Question on Computer architecture basics, Get Answer, Expert's Help, Computer architecture basics Discussions

Write discussion on Computer architecture basics
Your posts are moderated
Related Questions
Your task is to program software agents able to send and receive messages according to the two Gnutella protocols above. Your solution should have two types of agents:   A

What is Morphing Differences in appearance between key frames are automatically calculated by computer - this is called MORPHING or TWEENING. Animation is ultimately RENDERED (

The hexadecimal number for (95.5) 10 is ? Ans. (95.5) 10 = (5F.8) 16 Integer part Fractional part 0.5x16=8.0

What is the difference between, page directive include, action tag include? Ans) One difference is whereas using the include page directive, in translation time it is making t

What are the advantages of Public Key Cryptography? Advantages of Public Key Cryptography are illustrated in below: a) Increased convenience and security and b) Electro

In assignment you are required extend the Patient class to implement an  Inpatient  class,  representing a patient who is admitted to the hospital for a longer term and who may req

where should I work?

There are various approaches to the classification of Computer Networks. One such classification is based on distance approach. Networks can be classified into LAN, WAN and MAN net

Q. What is File allocation table? FAT maps the usage of data space of disk. It comprises information about space used by every individual file and unused disk space as well as

Electronic Data Interchange (EDI ) is used by companies for transactions that happen on regular basis to a pre-determined format. It is one of the electronic commerce technologies.