Explain about instruction cycle, Computer Engineering

Assignment Help:

Q. Explain about Instruction Cycle?

The instruction cycle for this provided machine comprises four cycles. Presume a 2-bit instruction cycle code (ICC). The ICC can represent the state of the processor in terms of cycle. For illustration we can use:

00:  Fetch 

01:  Indirect

10: Execute

11: Interrupt

At the end of each of four cycles ICC is set appropriately. Please note that an indirect cycle is always followed by execute cycle and interrupt cycle is always followed by fetch cycle. For both execute and fetch cycles, the subsequent cycle relies on the state of the system. Let's show an instruction execution employing instruction cycles and timing diagram:

1683_Explain about Instruction Cycle.png

Figure: Timing Diagram for ISZ instruction

Please note that address line decide the location of memory. Read/ write signal controls whether the data is being input or output. For illustration at time T2 in M2 read control signal becomes active A9 - A0 input comprises MAR that value is kept enabled on address bits and data lines are enabled to accept data from RAM so enabling a typical RAM data output on the data bus.

For reading no data input is applied by CPU however it is put on data bus by memory after the read control signal to memory is activated. Write operation is triggered along with data bus carrying the output value.


Related Discussions:- Explain about instruction cycle

Can the size of an array be declared at runtime, Can the size of an array b...

Can the size of an array be declared at runtime?              No, the size of an array can't be declared at run time, we always require to mention the dimensions of an array at

Linear model., what is linear model and its type

what is linear model and its type

How many voice channel have a master group, A Master group consists of? ...

A Master group consists of? A master group have 300 voice channels.

What is gustafsons law, Q. What is Gustafsons Law? Amdahl's law is app...

Q. What is Gustafsons Law? Amdahl's law is appropriate for applications where response time is significant. On the other hand there are numerous applications that necessitate

What is public key cryptography, What is Public Key Cryptography? Pub...

What is Public Key Cryptography? Public-key cryptography is a type of modern cryptography that allows users to communicate safely without any previously agreeing on a shared

Explain the method to identify the object classes, Explain the method to id...

Explain the method to identify the Object Classes You would always be careful while identifying relevant object classes from application domain. Objects may include physical e

Give solution for readers-writers problem, Give a solution for readers-writ...

Give a solution for readers-writers problem using conditional critical regions. Solution for readers-writers problem using conditional critical regions: Conditional critical

What are conditional chain statement, What are conditional chain statement?...

What are conditional chain statement? ON CHAIN-INPUT similar to ON INPUT. The ABAP/4 module is called if any one of the fields in the chain having a value other than its in

Write an applet that display the directory holding html file, Write an appl...

Write an applet that display the directory holding the HTML file that started the applet and the directory from which, applet class file was loaded. An applet is here given bel

What is meant by opening a data file, What is meant by opening a data file ...

What is meant by opening a data file A data file is a file that can be read from or written to. Data files are particularly useful when large amounts of data are involved. Each

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd