Highly encoded micro-instructions, Computer Engineering

Assignment Help:

Highly Encoded micro-instructions

  • Encoded bits required in micro-instructions are small.
  • It provided an aggregated view that is a higher view of CPU as just an encoded sequence can be usedfor micro-programming.
  • Encoding helpsin reduction in programming burden; however concurrency can't be used to the fullest.
  • Complex control logic is needed as decoding is a necessity. So execution of a micro-instruction can have propagation delay by gates. So execution of micro-program takes a longer time than that of an unencoded micro-instruction.
  • Highly encoded micro-instructions are aimed at optimizing programming effort.

In most of cases design is kept between two extremes. LSI 11 (highly encoded) and IBM 3033 (unencoded) control units are close illustrations of these two techniques.


Related Discussions:- Highly encoded micro-instructions

What are instruction hazards, What are instruction hazards? The pipelin...

What are instruction hazards? The pipeline might also be stalled because of a delay in the availability of an instruction. For instance, this may be a result of a miss in the c

Explain about ALU organisation, ALU ORGANISATION An ALU performs simple...

ALU ORGANISATION An ALU performs simple arithmetic and logic operation as well as shift operations. Complexity of an ALU relies on the type of instruction set for that it has b

Control traffic flowing in and out of the network, Firewalls use one or mor...

Firewalls use one or more of three methods to control traffic flowing in and out of the network:  Packet filtering - Packets (small chunks of data) are examined against a s

Define encapsulation- object oriented technology, Define Encapsulation- obj...

Define Encapsulation- object-oriented technology Encapsulation also called as information hiding, is the characteristic of separating the external aspects of an object, from t

What is the purpose of guard bits, What is the purpose of guard bits used i...

What is the purpose of guard bits used in floating point operations? The guard bits are the extra bits which are used to retain the in-between steps to enhance the accuracy in

At least two optional data fields, As an XML expert you are needed to model...

As an XML expert you are needed to model a system for an online furniture shop. After an interview with the shop manager you have the certain information: The detail of th

Performance of caches - computer architecture, Performance of caches: ...

Performance of caches:       Amdahl's Law regarding overall speed up:                  Alternatively, CPU stall can be considered:

What is external modems, Q. What is External Modems? External Modems: M...

Q. What is External Modems? External Modems: Modems externally associated to PC via a parallel or serial port and into a telephone line at the other end.  They can generally co

Describe the functions of an operating system, Question: (a) Software ...

Question: (a) Software may be categorized into System software and Application software. Differentiate between these two categories, using examples to support your answer.

Explain physical characteristics of magnetic disk, Q. Explain Physical Char...

Q. Explain Physical Characteristics of magnetic disk? Figure below lists main features that differentiate among different types of magnetic disks. First head may either be fixe

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd