Illustration of an instruction cycle, Computer Engineering

Assignment Help:

Q. Illustration of an instruction cycle?

Instruction cycle displayed in given figure comprises subsequent stages:

  • First address of the subsequent instruction is calculated based on size of instruction and memory organisation. For an illustration if in a computer an instruction is of 16 bits in addition if memory is organized as 16-bits words then address of subsequent instruction is calculated by adding one in address of current instruction. If the memory is organized as bytes that can be addressed independently then we need to add two in current instruction address to obtain the address of next instruction to be executed in series.
  • Now the subsequent instruction is obtained from a memory location to CPU registers like Instruction register.
  • Subsequent state decodes instruction to decide the type of operation desired and operands to be used.
  • In case operands need to be obtained from memory or by Input devices then the address of memory location or Input device is evaluated.
  • Now the operand is obtained (or operands are obtained one by one) from memory or read from Input devices.
  • Next the operation asked by instruction is carried out.
  • Ultimately the results are written back to memory or Output devices wherever desired by calculating the address of operand and then transferring values to desired destination.

Please remember that multiple results and multiple operands are allowed in many computers. An illustration of such a case may be an instruction ADD A, B. This instruction needs operand A and B to be obtained. 

In some machines a single instruction can activate an operation to be carried out on an array of numbers or string of characters. Such an operation engages repeated fetch for operands without fetching instruction again which is the instruction cycle loops at operand fetch.

1757_Illustration of an instruction cycle.png


Related Discussions:- Illustration of an instruction cycle

Explain the differences of casex and casez, Explain the differences of case...

Explain the differences of casex and casez over the case statement? casex operator has to be used when both high impedance value (z) and unknown (x) in any bit  has  to  be  t

Advanced microprocessor, Write a program to mask bits D3D2D1D0 and to set ...

Write a program to mask bits D3D2D1D0 and to set bits D5D4 and to invert bits D7D6 of the AX register.

Define public identifiers, Q. Define Public Identifiers? Public Identif...

Q. Define Public Identifiers? Public Identifiers: A public identifier is one which is defined within one module of a program however potentially accessible by all of the other

Difference between the real mode and the protected mode, Problem (a) ...

Problem (a) Explain the difference between the real mode and the protected mode in the 80x86 family of processors. (b) The 32-bit physical address 047C:0048 is to be conv

What is the kernel, What is the kernel?          A more common definiti...

What is the kernel?          A more common definition is that the OS is the one program running at all times on the computer ,usually  known as the kernel, with all else being

What is inode, What is 'inode'? All UNIX files have its description kep...

What is 'inode'? All UNIX files have its description kept in a structure called 'inode'. The inode have info about the file-size, its location, time of last access, time of las

Explain the storage class register, The Storage Class register The Sto...

The Storage Class register The Storage Class register : The storage class 'register' tells the compiler that the associated variable  should  be stored  in  high-speed  memor

What do you mean by parallel virtual machine, Q.What do you mean by Paralle...

Q.What do you mean by Parallel virtual machine? PVM is essentially a simulation of a computer machine running parallel programs. It is a software package which allows a heterog

State the term availability - organisational security scheme, State the ter...

State the term Availability - organisational security scheme What data needs to be available continually, compared to data which can be "off line" for limited periods. Th

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd