Explain indirect cycle in control unit, Computer Engineering

Assignment Help:

Q. Explain Indirect Cycle in control unit?

Once an instruction is fetched the subsequent step is to fetch the operands. The instruction may have indirect and direct addressing modes. An indirect address is controlledemploying indirect cycle. The below micro-operations are needed in indirect cycle:

T1:   MAR ← IR (address)

T2:   MBR ← [MAR]

T3:   IR (address) ← MBR (address)

The MAR is loaded with address field of IR register. Then memory is read to fetch the address of operand that is transferred to address field of IR through MBR as data is received in MBR during read operation.  

So the IR now is in same state as of direct address viz as if indirect addressing hadn't been used. IR is now ready for execute cycle.


Related Discussions:- Explain indirect cycle in control unit

Which language is a platform free language, Which language  is a platform ...

Which language  is a platform free language Java language

Btree, What should the size of ''t'' in btree be depending on the hard disk...

What should the size of ''t'' in btree be depending on the hard disk size

Why we need linker, Q. Why we need linker?  The linker: Joins as...

Q. Why we need linker?  The linker: Joins assembled module in one executable program, Produces an .EXE module and initializes with special instructions to facilitate

Explain about the object identity of object oriented, Explain about the Obj...

Explain about the Object Identity of object oriented analysis Object identity is a feature of an object that differentiates the objects from all other objects in the applicati

Difference between a substructure and an append structure, What is the diff...

What is the difference between a Substructure and an Append Structure? In case of a substructure, the reference originates in the table itself, in the form of a statement

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

Define restoring method, Define restoring method? The hardware method j...

Define restoring method? The hardware method just explained is called the restoring method. The reason for this name is that the partial reminder is restored by adding the divi

Explain the program translation model, Explain the program translation mode...

Explain the program translation model The program translation model makes the execution gap through translating a program written in a programming language, termed as the sou

How can i execute a php script using command line, Just run the PHP CLI (Co...

Just run the PHP CLI (Command Line Interface) program and give the PHP script file name as the command line argument. For instance, "php myScript.php", assuming "PHP" is the comman

What is stack, Stack is a portion of RAM used for saving the content of Pro...

Stack is a portion of RAM used for saving the content of Program Counter and common purpose registers. LIFO stacks, also called as "push down" stacks, are the conceptually easi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd