Fetching a word from memory - computer architecture, Computer Engineering

Assignment Help:

Fetching a word from memory:

CPU transfers the address of the needed information word to the memory address register (MAR). Address of the needed word is transferred to the primary memory.

  • In the meantime, the CPU uses the control lines of the memory bus to mention that a read operation is needed.
  • After issuing this request, the CPU waits till it retains an answer from the memory, informing it that the required function has been finished. It is accomplished through the use of another control signal on the memory bus, which will be denoted as Memory Function Completed (MFC).
  • The memory sets this signal to one to mention that the contents of the particular location in the memory have been read and are available on the data lines of the memory bus.
  • We will suppose that as soon as the MFC signal is set to one, the information on the data lines is loaded into

MDR and is therefore available for use inside the CPU. It finishes the memory fetch operation.

 

1960_Fetching a word from memory.png

The actions required for instruction Move (R1), R2 are:

MAR - [R1]

  • Begin Read operation on the memory bus
  • Wait for the response of the MFC from the memory
  • Load MDR from the memory bus
  • R2 - [MDR]

Signals activated for that problem are:

  • WMFC MDRout
  • R1out, MARin,
  • Read MDRinE, , R2in

 


Related Discussions:- Fetching a word from memory - computer architecture

Explain virtual memory, In a memory hierarchy system, data and programs are...

In a memory hierarchy system, data and programs are first stored in secondary or auxiliary memory. Program and its related data are brought in main memory for execution. What if th

Where time synchronization is necessary, Time synchronization is necessary ...

Time synchronization is necessary in? Time synchronization is essential in TDM.

Define deadlock with resource request and allocation graph, Define Deadlock...

Define Deadlock with Resource request and allocation graph (RRAG) Deadlocks can be described through a directed bipartite graph termed as a RRAG that is Resource Request All

4 variable k-maps, 4-variable K-maps have 16 squares which arearranged in 4...

4-variable K-maps have 16 squares which arearranged in 4 columns and 4 rows.  Columns and rows are labeled with 2 variables. The rows are arranged so that C or D ch

Enum statement differ from a typedef statement, How does an enumstatement d...

How does an enumstatement differ from a typedef statement? Typedef statement permits user to define an identifier that would show an exiting data type. The user-defined data

Unit test an mvc application, Is it possible to unit test an MVC applicatio...

Is it possible to unit test an MVC application without running the controllers in an ASP.NET process? Ans) Yes, all the features in an asp.net MVC application are interface ba

Real-time software, Real-Time Software Programs that monitor/analyze...

Real-Time Software Programs that monitor/analyze/ control real world events as they take place are known as real-time software. Elements of real-time software involve a data

Write an algorithm to outline the macro-expansion, Write an algorithm to ou...

Write an algorithm to outline the macro-expansion using macro-expansion counter. The flow of control throughout macro expansion can be implemented by using a MEC that is macro-

Data communication, how CSMA protocol is improved through persistence metho...

how CSMA protocol is improved through persistence methods & collition detection

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd