Register transfer micro-operations, Computer Engineering

Assignment Help:

Register Transfer Micro-operations

These micro-operations as the name proposes transfer information from one register to another. The information doesn't change during these micro-operations. A register transfer micro-operation can be designed as: R1← R2. The ←symbol implies that contents of register R2 are transferred to register R1. R2 here is a source register whereas R1 is a destination register. We will employ this notation throughout this section. Please note that the following important points about register transfer micro-operations.

  • For a register transfer micro-operation there should be a path for data transfer from output of source register to input of destination register.
  • Additionally the destination register must have a parallel load capability as we expect the register transfer to take place in a predetermined control condition.
  • A common path for connecting different registers is via a common internal data bus of the processor. In general size of this data bus must be equal to number of bits in a general register.

 


Related Discussions:- Register transfer micro-operations

Differentiate between worms and boot-sector viruses, Question: (a) Pro...

Question: (a) Program instructions and data are brought into memory first, in order to be executed. Explain how the CPU enables an instruction to be executed? (b) Describe

Computer architecture by henessy and patterson, what is initial interval an...

what is initial interval and latency in a functional unit(fp) of a pipeline

Explain cache memory, What is cache memory? It is a small, fast memory ...

What is cache memory? It is a small, fast memory that is inserted among large, slower main memory and the processor. It decreases the memory access time

Non repudiation, What is non-repudiation? how can it be achieved in designi...

What is non-repudiation? how can it be achieved in designing e-cash based system?

The major underlying concepts of object orientation, Objects, messages, cla...

Objects, messages, class, inheritance and polymorphism are the major concepts of object orientation.

What are instruction hazards, What are instruction hazards? The pipelin...

What are instruction hazards? The pipeline might also be stalled because of a delay in the availability of an instruction. For instance, this may be a result of a miss in the c

Explain the working of a three bit binary ripple counter, With the help of ...

With the help of clocked JK flip flops and waveforms, explain the working of a three bit binary ripple counter. Write truth table for clock transitions. Ans. Three-Bit Binary Rip

Explain arithmetic data processing instructions, Q. Explain Arithmetic Data...

Q. Explain Arithmetic Data Processing Instructions? These instructions carry outlogical and arithmetic operations on data. Arithmetic: The four fundamental operations are

What is shadow mask, Q. What is Shadow Mask? Shadow Mask is a metal she...

Q. What is Shadow Mask? Shadow Mask is a metal sheet that has fine perforations (holes) in it and is situated a short distance before phosphor coated screen. The Phosphor dots

Last ant on rod, i want program code for the above question in c language

i want program code for the above question in c language

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd