Fetching a word from memory - computer architecture, Computer Engineering

Fetching a word from memory:

CPU transfers the address of the needed information word to the memory address register (MAR). Address of the needed word is transferred to the primary memory.

  • In the meantime, the CPU uses the control lines of the memory bus to mention that a read operation is needed.
  • After issuing this request, the CPU waits till it retains an answer from the memory, informing it that the required function has been finished. It is accomplished through the use of another control signal on the memory bus, which will be denoted as Memory Function Completed (MFC).
  • The memory sets this signal to one to mention that the contents of the particular location in the memory have been read and are available on the data lines of the memory bus.
  • We will suppose that as soon as the MFC signal is set to one, the information on the data lines is loaded into

MDR and is therefore available for use inside the CPU. It finishes the memory fetch operation.

 

1960_Fetching a word from memory.png

The actions required for instruction Move (R1), R2 are:

MAR - [R1]

  • Begin Read operation on the memory bus
  • Wait for the response of the MFC from the memory
  • Load MDR from the memory bus
  • R2 - [MDR]

Signals activated for that problem are:

  • WMFC MDRout
  • R1out, MARin,
  • Read MDRinE, , R2in

 

Posted Date: 10/13/2012 6:44:21 AM | Location : United States







Related Discussions:- Fetching a word from memory - computer architecture, Assignment Help, Ask Question on Fetching a word from memory - computer architecture, Get Answer, Expert's Help, Fetching a word from memory - computer architecture Discussions

Write discussion on Fetching a word from memory - computer architecture
Your posts are moderated
Related Questions
Microprocessor development system Computer systems have undergone many changes recently. Machines that once filled large areas have been reduced to small desktop computer syste

Your professor wants you to fill a two-dimensional N by N matrix with some numbers by following a specific pattern. According to his explanation as in the figure below, you have to

Example of Prolog: We can say that this is also true if there are four even numbers. Now we have our first rule: • If there are three or four even numbered cards, such play

What is a SAP system? The union of all s/w components that are assigned to the similar databases is known as a SAP system.

Q. Explain rudimentary file formats? FTP only understands two rudimentary file formats. It classifies every file either as a text file or a binary file. A text file comprise a

Bidirectional Search: We've concentrated so far on the searches where the point of view for the search is to find a solution, but not the path to the solution. Like any other

What is the purpose of zero (z) flag and carry (c) flag? Carry flag holds the carry after addition or the borrow after subtraction. Carry flag also indicates error conditions,

Replacement policy: On a particular cache miss we require to evict a line to build room for the new line "In an A-way set associative cache, we have A option of which block

Q. Define critical mass and critical volume? The minimum size in which at least one neutron is available for further fission reaction. The throng of the fissile material at the

For this part of your assessment you are required to prepare and conduct a usability test of the website that you have chosen to review from Part A . You must design the script,c