Computer architecture basics, Computer Engineering

Assignment Help:

Computer Architecture Basics:

Some of computer architecture at companies such like AMD and Intel uses more fine distinctions:

  • Macro architecture- this is an architectural layer that are more abstract than micro architecture, for example. ISA
  • ISA (Instruction Set Architecture) -it's already defined above
  • Assembly ISA - it is a smart assembler can convert an abstract assembly language common to a group of machines into slightly different machine language for different implementations
  • Programmer Visible Macro architecture- it is higher level language tools like as compilers may define a consistent interface or contract to programmers by using them, abstracting differences between UISA ,underlying ISA, , and micro architectures for example. The C, C++, or Java standards describe different Programmer Visible Macro architecture - even though in practice the C micro architecture for a specific computer includes
  • UISA (Microcode Instruction Set Architecture) -it is a family of machines having different hardware level micro architectures may share a common microcode architecture, and therefore a UISA.
  • Pin Architecture -it is a set of functions that a microprocessor is likely to provide, from the point of view of a hardware platform For example. FERR/IGNNE ,the x86 A20M, or FLUSH pins, and the messages that the processor is likely to produce after completing a cache invalidation so that external caches can be invalidated. Pin architecture functions are more supple than ISA functions - external hardware may adapt to changing encodings, or changing from a pin to a message - but the functions are expected to be provided in successive implementations even if the way of encoding them changes.

 

 


Related Discussions:- Computer architecture basics

Access to external identifiers, Access to External Identifiers: An external...

Access to External Identifiers: An external identifier is one which is referred in one module though defined in another. You can declare an identifier to be external by including i

Fundamental change to the cloud to support mobility, Question: The abun...

Question: The abundance of resources and the ease of access to cloud computing can help to bridge the gap the resource gap for mobile computing. Nevertheless some fundamental c

Using library methods returns number of threads, Q. Using Library methods r...

Q. Using Library methods returns number of threads? #include void subdomain(float x[ ], int istart, int ipoints) { int i; for (i = 0; i x[istart+i] = 123.456;

Using bit wise operator implement nor and nand gate, Q. Write a program t...

Q. Write a program to implement NOR, NAND, XOR and XNOR gates using and without using bit wise operator. Also perform necessary checking. The user has option to give n numbe

Computer architecture basics, Computer Architecture Basics: Some of co...

Computer Architecture Basics: Some of computer architecture at companies such like AMD and Intel uses more fine distinctions: Macro architecture- this is an architectura

What is serial mouse, Q. What is Serial Mouse? Mice that use standard s...

Q. What is Serial Mouse? Mice that use standard serial port are known as 'serial'. Because Serial ports 1 and 4 (COM1, COM4 under DOS, /dev/ttyS0 and /dev/ttyS3 under Unix/GNU-

For which class address 192.5.48.3 belogs, Address 192.5.48.3 belongs to? ...

Address 192.5.48.3 belongs to? Address 192.5.48.3 belongs to class C.

How transmission bridges help in satisfying the connectivity, How do tra...

How do transmission bridges help in satisfying the connectivity? A usual transmission bridge is demonstrated in figure. The series capacitance and the shunt inductances of

Weighted-average under perpetual inventory procedure, Q. Weighted-average u...

Q. Weighted-average under perpetual inventory procedure? Weighted-average under perpetual inventory procedure in perpetual inventory procedure firms calculate a new weighted-av

Explain turing reducibility, Explain Turing reducibility?  Exponential ...

Explain Turing reducibility?  Exponential time algorithms typically happens when we solve by searching by a space of solutions known as brute -force search

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd