Data stream and instruction stream-flynn’s classification, Computer Engineering

Data Stream and Instruction Stream

The term 'stream' refers to an order or flow of either data operated or instructions on by the computer. In the complete chain of instruction execution, a flow of directions from main memory to the CPU is recognized. This flow of instructions is named as instruction stream. Similarly, there is a flow of operands among processor and memory bi-directionally. This flow of operands is named as data stream. These two types of streams are shown in Figure .

 

                          314_Data Stream and Instruction Stream.png

Thus, it can be assumed that the sequence of instructions implemented by CPU forms the sequence of data (operands) and Instruction streams required for implementation of instructions form the Data streams.

 

 

Posted Date: 3/1/2013 6:41:54 AM | Location : United States







Related Discussions:- Data stream and instruction stream-flynn’s classification, Assignment Help, Ask Question on Data stream and instruction stream-flynn’s classification, Get Answer, Expert's Help, Data stream and instruction stream-flynn’s classification Discussions

Write discussion on Data stream and instruction stream-flynn’s classification
Your posts are moderated
Related Questions
Explain a multiprogramming operating system? A multiprogramming operating system: It is system which allows more than one active user program or part of user program to be st

Explain the disadvantages Off-the-shelf -  can be over-complex since it tries to cover as many characteristics as possible (for example most users of Word only utilise about

Evidence of intelligent behavior - Artificial Intelligence: Machines mean they could simply be personal computers, or they could be robots with embedded automative systems, or

Edith & Associates is a modern law firm. They have an Internet Link that is an ADSL 8MB links from JJNET. The server they are to deploy will the main service giving  server and wil

State the Encryption and decryption process with example Encryption and decryption process in the Figure where Ram wants to send a confidential message to his friend Shyam. Ram

The princess (or prince if you're female) has been captured by the Evil Dragon and held prisoner in a tower. The tower is also surrounded by a maze to keep out the riff-raff. You

Q. Environment of the Packet Flow? Protocol stack used on Internet is referred to as TCP/IP protocol stack. If we were to follow the path that message "Hello computer 5.6.7.8!"

State the term- Use a define function This is almost exactly the same approach as #define and -D compiler arg that C programs use. In your  Verilog  code,  use  a  'define  to

What is the  logical difference among Move A TO B and COMPUTE B = A ? Ans) In case of Move A TO B it will move whatever the value of a in to b. It mean it will move nume

IT Management 1. Describe how the IT infrastructure is designed. 2. Explain briefly the audit planning phase in IT Audit 3. Explain localized and distributed load balanci