Explain the fetch cycle, Computer Engineering

Assignment Help:

Q. Explain the Fetch Cycle?

The beginning of every instruction cycle is the fetch cycle and causes an instruction tobe fetched from memory.  

The fetch cycle comprises four micro-operations which are executed in three timing steps. The fetch cycle can be written as:

T1:  MAR ← PC

T2:  MBR ← [MAR]

         PC    ← PC + I

T3:  IR      ← MBR

Where I is the instruction length. We presume that a clock is available for timing purposes and that it produces regularly spaced clock pulses. Every clock pulse defines a time unit. So all the units are of equal duration. Every micro-operation can be performed within the time of a single time unit. Notation (T1, T2, T3) represents successive time units. What is done in these time units?

  • In the first time unit the content of PC is moved to MAR.
  • In the second time unit contents of memory location specified by MAR is moved to MBR and contents of PC is incremented by I.
  • In the third time unit content of MBR is moved to IR.

 


Related Discussions:- Explain the fetch cycle

Explain session layer of osi model, Explain Session Layer of OSI Model. ...

Explain Session Layer of OSI Model. The session layer manages, establishes and terminates communication sessions. Communication sessions contain service of requests and serv

Determine waiting and average waiting time of CPU, CPU burst time indicates...

CPU burst time indicates the time, the process needs the CPU. The following are the set of processes with their respective CPU burst time     (in milliseconds). Process

How can we convert infix expression to a postfix expression, One can change...

One can change an infix expression to a postfix expression using a By using Stack you can convert infix expression to a postfix expression

How to copy files from a drive and directory, Q. How to copy files from a d...

Q. How to copy files from a drive and directory? You can copy files from a drive and directory other that the currently selected one. However in that case, you need to speci

What layers are covered under end to end layer connectivity, What layers ar...

What layers are covered under end to end layer connectivity? The layers 4 to 7 of ISO-OSI reference model communicate along with peer entities into the end systems. There is n

Critical path analysis, Given the information provided in Table 1: ...

Given the information provided in Table 1: Prepare an Activity on the Node (AON) Network Diagram ( I recommend you  use MS Project or any drawing tool); Prepare

What is a pipeline hazard, What is a pipeline hazard? Any condition tha...

What is a pipeline hazard? Any condition that causes the pipeline to stall is known as hazard. They are also known as stalls or bubbles.

What is minimum spanning tree, Minimum Spanning Tree: Given a weighted gra...

Minimum Spanning Tree: Given a weighted graph G, it is often desired to make a spanning tree T for G, like the sum of weights of the edges in T is the least. Like tree is known as

What is called network, Network with point-to-point link is known as (...

Network with point-to-point link is known as (A) Fully Connected Network        (B)  Half Connected Network (C)  Duplex Connected Network    (D)  None of these Ans:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd