Instruction cycle-flynn’s classification, Computer Engineering

Instruction Cycle

The instruction cycle consists of a series of steps needed for the implementation of an instruction in a program. A typical instruction in a program is described of two parts: Operand and Opcode. The Operand part identify the data on which the identified operation is to be done. The Operand part is separated into two parts: the Operand and addressing mode. The addressing mode specifies the method of determining the addresses of the real data on which the operation is to be executed and the operand part is used as an disputed by the method in determining the real address.

                                      1646_Instruction Cycle.png

The control unit of the CPU of the computer fetches instructions in the program, only one at a time. The fetched Instruction is then decoded by the decoder which is a piece of the control unit and the processor implements the decoded instructions. The result of implementation is temporarily stored in Memory Buffer Register (MBR) (also called Memory Data Register). The ordinary execution steps are shown in Figure 2.

 

 

 

                            1749_Instruction Cycle 1.png

Posted Date: 3/1/2013 6:38:53 AM | Location : United States







Related Discussions:- Instruction cycle-flynn’s classification, Assignment Help, Ask Question on Instruction cycle-flynn’s classification, Get Answer, Expert's Help, Instruction cycle-flynn’s classification Discussions

Write discussion on Instruction cycle-flynn’s classification
Your posts are moderated
Related Questions
The Need Of Parallel Computation With the advancement of computer science (CS), computational speed of the processors has also improved many a time. Moreover, there is certain

Write an algorithm for deadlock detection. An algorithm for deadlock detection: 1. Assume that Work and Finish be vectors of length m and n, correspondingly. Initialize:

As CMOS is a special chip with its own battery, the best way to clear out a CMOS chip is to cut off it from its power supply. To clear the CMOS password you just take away the

Vliw Architecture Superscalar architecture was designed to develop the speed of the scalar processor. But it has been realized that it is not easy to execute as we discussed pr

All digital devices are made from circuits whichcan be switched between two possible states.These two states are represented by a voltagelevel at the output of the circuit e.g. 0V

a. Define the meaning of "Document & Finger print" and "Message & Message Digest". What's the difference among the 2 pairs? b. Describe Davies Meyer scheme with diagram. c. W

Explain in detail about Real time (transaction) processing When booking seats on a flight, for illustration, real time (transaction) processing would be used. Response to a que

State the drawbacks of laptop compared to PC The main disadvantages of laptops compared to desk top PCs are: -  They tend to be more expensive to purchase -  It's easie

Q. What are common reason for error massages while copying file? While copying files with copy, DOS in encounters any error, it displays a suitable error massage. The common re

Q. Describe the External Users of system? External Users: Modern information systems are now reaching beyond the boundaries of traditional business to involve customers and o