Computer architecture basics, Computer Engineering

Assignment Help:

Computer Architecture Basics:

Some of computer architecture at companies such like AMD and Intel uses more fine distinctions:

  • Macro architecture- this is an architectural layer that are more abstract than micro architecture, for example. ISA
  • ISA (Instruction Set Architecture) -it's already defined above
  • Assembly ISA - it is a smart assembler can convert an abstract assembly language common to a group of machines into slightly different machine language for different implementations
  • Programmer Visible Macro architecture- it is higher level language tools like as compilers may define a consistent interface or contract to programmers by using them, abstracting differences between UISA ,underlying ISA, , and micro architectures for example. The C, C++, or Java standards describe different Programmer Visible Macro architecture - even though in practice the C micro architecture for a specific computer includes
  • UISA (Microcode Instruction Set Architecture) -it is a family of machines having different hardware level micro architectures may share a common microcode architecture, and therefore a UISA.
  • Pin Architecture -it is a set of functions that a microprocessor is likely to provide, from the point of view of a hardware platform For example. FERR/IGNNE ,the x86 A20M, or FLUSH pins, and the messages that the processor is likely to produce after completing a cache invalidation so that external caches can be invalidated. Pin architecture functions are more supple than ISA functions - external hardware may adapt to changing encodings, or changing from a pin to a message - but the functions are expected to be provided in successive implementations even if the way of encoding them changes.

 

 


Related Discussions:- Computer architecture basics

Explain pass-1 algorithm of passes used in two-pass-assemble, Explain pass-...

Explain pass-1 algorithm of passes used in two-pass assembler? Pass I: (i) Separate the symbol, operand fields and mnemonic opcode (ii) Make the symbol table (iii)

Multiple instruction and multiple data stream (mimd), Multiple Instruction ...

Multiple Instruction and Multiple Data stream (MIMD): In this categorization, numerous processing elements and multiple control units are ordered as in MISD. However the differ

What is public key cryptography, What is Public Key Cryptography? Pub...

What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared

How can i delete a file, The Standard C Library function is removing. (This...

The Standard C Library function is removing. (This is thus one of the few questions in this section for which the answer is not ''It's system-dependent.'') On older, pre-ANSI Unix

Cheques vs credit cards, Cheques vs Credit Cards       E-cheques:  E-ch...

Cheques vs Credit Cards       E-cheques:  E-cheques are used for business dealing in e-commerce.  Transactions of these cheques take place on Internet. In this system the elect

Search methods and heuristics - artificial intelligence, Search Methods and...

Search Methods and Heuristics - Artificial intelligence: Here now we come to the question of how constraint solvers search for solutions -constraint preserving coursework of v

Assembler, Assembler: Typically a modern assembler makes object code b...

Assembler: Typically a modern assembler makes object code by translating assembly instruction into op codes, & by resolving symbolic names for memory locations and any other e

Double negation - artificial intelligence, Double Negation - Artificial int...

Double Negation - Artificial intelligence: Always parents are correcting their children for the use of double negatives, but we have to be very alert with them in natural langu

Background and foreground colors can be interchanged, Background and foregr...

Background and foreground colors can be interchanged using the command?? Format Inverse command.

Determine the order in which optimized c-scan would service, Consider the s...

Consider the situation in which the disk read/write head is currently located at track 45 (of tracks 0-255) and moving in the positive direction. Assume that the following track re

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd