Instruction cycle-flynn’s classification, Computer Engineering

Instruction Cycle

The instruction cycle consists of a series of steps needed for the implementation of an instruction in a program. A typical instruction in a program is described of two parts: Operand and Opcode. The Operand part identify the data on which the identified operation is to be done. The Operand part is separated into two parts: the Operand and addressing mode. The addressing mode specifies the method of determining the addresses of the real data on which the operation is to be executed and the operand part is used as an disputed by the method in determining the real address.

                                      1646_Instruction Cycle.png

The control unit of the CPU of the computer fetches instructions in the program, only one at a time. The fetched Instruction is then decoded by the decoder which is a piece of the control unit and the processor implements the decoded instructions. The result of implementation is temporarily stored in Memory Buffer Register (MBR) (also called Memory Data Register). The ordinary execution steps are shown in Figure 2.

 

 

 

                            1749_Instruction Cycle 1.png

Posted Date: 3/1/2013 6:38:53 AM | Location : United States







Related Discussions:- Instruction cycle-flynn’s classification, Assignment Help, Ask Question on Instruction cycle-flynn’s classification, Get Answer, Expert's Help, Instruction cycle-flynn’s classification Discussions

Write discussion on Instruction cycle-flynn’s classification
Your posts are moderated
Related Questions
Node at the highest level in the structure is known as?? Root.

Define the term- encryption The user would then type in O P E and card purchase will be authorised. This extra protection is used as well as encryption. Some of the new syste

What are the extra variables by which customers call for to work out? All customers who do not purchase Internet connectivity through a Service Provider do call for to work out

Intranets are mainly "small" Internets. They use same network facilities that Internet does, though access is restricted to a limited sphere. For example, a company can set up an i

Proving ( or disproving) mathematical theorems are an intensive intellectual task. This is because it requires deductions from hypotheses and also involves judgment. This judgm

#questionabut diffraction ..

consider the 8 bit floating point format including support for normalised nimbers and nonnumeric values.it included 3 bits for mantissa and 4 bitys for excess 7 exponent

Explain about the Object Identity of object oriented analysis Object identity is a feature of an object that differentiates the objects from all other objects in the applicati

What is the Scope of public/private/friend/protected/protected friend?    Scope of public/private/friend/protected/protected friend. Visual Basic/Visual C# Public/pub

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4