Show the steps of execution of instructions, Computer Engineering

Assignment Help:

Q. Show the steps of execution of instructions?

Fetch First Instruction into CPU:

Step 1: Find/calculate the address of first instruction in memory. In this machine illustration next instruction address is contained in PC register. It comprises 1 that is the address of first instruction to be executed. (Figure above part a).

Step 2: Bring binary instruction to IR register. This stage requires:

  • Passing content of PC to Memory Address Registers so that instruction pointed to by PC is obtained i.e. location 1's content is fetched.
  • CPU concerns 'Memory read' operation so brings contents of location pointed by MAR (1 in this particular case) to MBR register.
  • Content of MBR is transferred to IR and PC is incremented to point to subsequent instruction in sequence (2 in this particular case).

Execute the Instruction

Step 3: IR has instruction LOAD A that is decoded like 'Load the content of address A in the accumulator register'.

Step 4: Address of operand which is 13 i.e. A is transferred to MAR register.

Step 5: Content of memory location (signified by MAR which is location 13) is transferred to MBR.

Step 6: Content of MBR is transferred to Accumulator Register.

So the accumulator register is loaded with content of location A that is 5. Now the instruction 1 execution is finished and the subsequent instruction which is 2 (specified by PC) is obtained and PC is incremented to 3. This instruction is ADD B that instructs CPU to add the contents of memory location B to accumulator. On execution of this instruction accumulator will comprise sum of its earlier value which is A and value stored in memory location B.

On execution of instruction at memory location 3 Program Counter becomes 4 and the accumulator results are stored in location C which is 15 and IR still comprises the third instruction. This condition is displayed in figure above part(C).

Please remember that execution of the instructions in above illustration is very simple and needs only data transfer and data processing operations in every instruction. Also these instructions need one memory reference at the time of its execution.


Related Discussions:- Show the steps of execution of instructions

What is a fifo, What is a FIFO? FIFO is otherwise known as 'named pipes...

What is a FIFO? FIFO is otherwise known as 'named pipes'. FIFO (first-in-first-out) is a particular file which is said to be data transient. Once data is read from named pipe,

Define constraints, Define Constraints Constraints can be defined as P...

Define Constraints Constraints can be defined as Preconditions (input values) and Post Conditions (output values). Preconditions on functions are constraints which input value

What is ROM, What is ROM? Ans: ROM: It is called Read Only Memor...

What is ROM? Ans: ROM: It is called Read Only Memory, is a Permanent or Semi-permanent Memory. The data is permanently stored and cannot be changed, in Permanent ROM. Th

What is reentrant tasks and functions, What is reentrant tasks and function...

What is reentrant tasks and functions Tasks and functions without optional keyword automatic are static , with all declared items being statically allocated. These items will b

Explain about the logical devices, Explain about the Logical Devices ...

Explain about the Logical Devices Locator, to indicate a position and/or orientation Pick, to select a displayed entity To input a single value in the space of re

What do you mean by first fit, What do you mean by first fit? First fi...

What do you mean by first fit? First fit allocates the first hole that is big enough. Searching can either begin at the beginning of the set of holes or where the last first-f

Hazard in pipeline - computer architecture, Hazard in pipeline - computer a...

Hazard in pipeline - computer architecture: A hazard in pipeline .-removing a hazard frequently need that some instructions in the pipeline to be permitted to proceed as othe

Explain the microprocessor development system, Microprocessor development s...

Microprocessor development system Computer systems have undergone many changes recently. Machines that once filled large areas have been reduced to small desktop computer syste

Name the popular security measures, Name the popular security measures ...

Name the popular security measures A number of security products covering a broad range of methods are available in the market. Most popular of all the security measures are th

State the datatypes of verilog, State the datatypes of Verilog Verilog....

State the datatypes of Verilog Verilog. Compared to VHDL, Verilog data types are very simple, easy to use and very much geared towards modeling hardware structure as opposed to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd