Define the arithmetic micro-operations, Computer Engineering

Assignment Help:

Q. Define the Arithmetic Micro-operations?

These micro-operations execute simple arithmetic operations on numeric data stored in registers. The fundamental arithmetic micro-operations are subtraction, addition, decrement, increment and shift. 

Addition micro-operation is expressed as:

      R3 ← R1 +R2 

It means that contents of register R1 are added to contents of register R2 and sum is transferred to register R3. This operation needs three registers to hold data along with Binary Adder circuit in the ALU. Binary adder is a digital circuitthat produces the arithmetic sum of two binary numbers of any lengths and is constructed with full-adder circuits associated in cascade. An n-bit binary adder needs n full-adders. Add micro-operation in accumulator machine can be performed as:

AC ← AC + DR

Subtraction is most frequently implemented in machines through complement and adds operations. It is specified as:

        R3 ← R1 - R2  

        R3 ← R1 + (2's complement of R2)

        R3 ← R1 + (1's complement of R2 + 1)

        R3 ← R1 + R2 + 1 (The bar on top of R2 implies 1's complement of R2 that is bitwise complement)    

Adding 1 to 1's complement generates the 2's complement. Adding contents of R1 to the 2's complement of R2 is equal to subtracting contents of R2 from R1 and storing the result in R3.

The increment micro-operation adds one to a number in a register. This operation is expressed as:

                 R1 ← R1 + 1

This can be implemented in hardware by employing a binary-up counter.  

The decrement micro-operation subtracts one from a number in a register. This operation is expressed as:

                 R1 ← R1 - 1 

This can be implemented by binary-down counter.


Related Discussions:- Define the arithmetic micro-operations

How is secure sockets layer relied on the certificates, How is Secure Socke...

How is Secure Sockets Layer relied on the certificates? The Secure Sockets Layer standard is not a single protocol, but quite a set of accepted data transfer routines which a

Define interrupts in assembly language, Q. Define Interrupts in assembly la...

Q. Define Interrupts in assembly language? An interrupt causes interruption of an ongoing program. A number of the common interrupts are: printer, monitor, keyboard, an error c

Define the term intranet, Define the term Intranet. Intranet: An...

Define the term Intranet. Intranet: An Intranet is a type of information system that facilitates communication within the organizations among widely dispersed department

What are the main advantages of sound, Problem: (a) What are the two m...

Problem: (a) What are the two main advantages of sound? (b) UTMDigitlab ltd, specialized in digitizing sound, converts an audio stream of the latest album of Britney Spea

Explain about ALU organisation, ALU ORGANISATION An ALU performs simple...

ALU ORGANISATION An ALU performs simple arithmetic and logic operation as well as shift operations. Complexity of an ALU relies on the type of instruction set for that it has b

Components of a 3-tier client server, What are the essential components of ...

What are the essential components of a 3-tier client server In a three-tier or multi-tier environment, the client executes the presentation logic (the client). The business log

Hidden input, Yet another type of input is HIDDEN input. A HIDDEN in...

Yet another type of input is HIDDEN input. A HIDDEN input is a value/name pair which is returned to you but doesn

Define opcode and operands, Q. Define Opcode and Operands? The most com...

Q. Define Opcode and Operands? The most common fields which are found in instruction formats are: Opcode: (What operation to perform?)  An operation code field cal

Add references dialog box, What is the difference among "using System.Data;...

What is the difference among "using System.Data;" and directly adding the reference from "Add References Dialog Box"?  When you compile a program using command line, you add th

Subsequent step in karnaugh map, The subsequent step in Karnaugh map is to ...

The subsequent step in Karnaugh map is to map truth table in the map. Mapping is done by putting a 1 in respective square belonging to 1 value in truth table. This mapped map is us

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd