Instruction cycle-flynn’s classification, Computer Engineering

Instruction Cycle

The instruction cycle consists of a series of steps needed for the implementation of an instruction in a program. A typical instruction in a program is described of two parts: Operand and Opcode. The Operand part identify the data on which the identified operation is to be done. The Operand part is separated into two parts: the Operand and addressing mode. The addressing mode specifies the method of determining the addresses of the real data on which the operation is to be executed and the operand part is used as an disputed by the method in determining the real address.

                                      1646_Instruction Cycle.png

The control unit of the CPU of the computer fetches instructions in the program, only one at a time. The fetched Instruction is then decoded by the decoder which is a piece of the control unit and the processor implements the decoded instructions. The result of implementation is temporarily stored in Memory Buffer Register (MBR) (also called Memory Data Register). The ordinary execution steps are shown in Figure 2.

 

 

 

                            1749_Instruction Cycle 1.png

Posted Date: 3/1/2013 6:38:53 AM | Location : United States







Related Discussions:- Instruction cycle-flynn’s classification, Assignment Help, Ask Question on Instruction cycle-flynn’s classification, Get Answer, Expert's Help, Instruction cycle-flynn’s classification Discussions

Write discussion on Instruction cycle-flynn’s classification
Your posts are moderated
Related Questions
BIOS - Basic Input Output System, Power On Self Test (POST) and Loading Bootloader from the Hard disk drive Boot Sector is being completed by BIOS. It started the system for

Shadow RAM is a copy of Basic Input/Output Operating System (BIOS) routines from read-only memory (ROM) into a particular area of random access memory (RAM) so that they can be acc

First, remember that different processes keep their own data in distinct address spaces. Threads, on the other hand, explicitly share their entire address space with one another. A

write a programme to simulate a train station to automate

Program Level This is usually the dependability of the operating system, which runs processes simultaneously. Different programs are evidently independent of each other. So par

Q. What is Internet Routing Hierarchy? So how do packets find their way across Internet? Does every computer connected to Internet know where other computers are? Do packets ba

Q. Show the characteristic of cache memory? The essential characteristic of cache memory is its fast access time. So very little or no time should be wasted when searching for

Define the full form of SSL SSL has become fundamental to the spread of Internet community, and commerce and trade over Internet. Over years, the spread of its use for an incr

How is network examined by intranets, extranets and Internet? When more and more businesses seek to build their mission critical business solutions onto IP networks, networking

Define the Example Client-server Implementations Once you accept the client-server mindset, the process of architecting and developing applications becomes rather easy. Clearly