Explain the fetch cycle, Computer Engineering

Assignment Help:

Q. Explain the Fetch Cycle?

The beginning of every instruction cycle is the fetch cycle and causes an instruction tobe fetched from memory.  

The fetch cycle comprises four micro-operations which are executed in three timing steps. The fetch cycle can be written as:

T1:  MAR ← PC

T2:  MBR ← [MAR]

         PC    ← PC + I

T3:  IR      ← MBR

Where I is the instruction length. We presume that a clock is available for timing purposes and that it produces regularly spaced clock pulses. Every clock pulse defines a time unit. So all the units are of equal duration. Every micro-operation can be performed within the time of a single time unit. Notation (T1, T2, T3) represents successive time units. What is done in these time units?

  • In the first time unit the content of PC is moved to MAR.
  • In the second time unit contents of memory location specified by MAR is moved to MBR and contents of PC is incremented by I.
  • In the third time unit content of MBR is moved to IR.

 


Related Discussions:- Explain the fetch cycle

What is the main use of structures, What is The main use of structures ...

What is The main use of structures The main use of structures is to lump together collections of disparate variable types, so they can conveniently be treated as a unit. For ex

What is arithmetic pipeline, What is arithmetic pipeline?  Pipeline ari...

What is arithmetic pipeline?  Pipeline arithmetic units are usually found in very high speed computers. They are used to execute floating point operations, multiplication of fi

Explain the terms topology used in lans, Explain the terms topology used in...

Explain the terms topology used in LANs. (i) LAN topologies: This network topology is a physical schematic that shows interconnection of the several users. There are four fun

How do you turn off cookies for one page in your site, How do you turn off ...

How do you turn off cookies for one page in your site?  Use the Cookie. Discard Property which Gets or sets the discard flag set by the server. When true, this property initiat

Explain asymmetric cryptographyand its components, Explain Asymmetric crypt...

Explain Asymmetric cryptographyand its components. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound to a single

Which address is specially used by transport layer, The addressing speciall...

The addressing specially used by Transport Layer is? The addressing particularly used through transport layer is application port address.

Explain the benefits of interpreter, Explain the Benefits of Interpreter? ...

Explain the Benefits of Interpreter? The benefit of an interpreter though is that it doesn't need to go through the compilation stage during which machine instructions are gene

What do you understand by work flow automation, What do you understand by w...

What do you understand by work flow automation? Work Flow Automation: Organizations often standardize processes over the organization and encourage users to adopt them. Ev

Resetting the computer, Sometime you may have to reset your computer (i.e.,...

Sometime you may have to reset your computer (i.e., Reboot DOS) when it is still running because DOS does not work accurately. To reset your computer you have two choices: 1. P

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd