Operation of micro-programmed control unit, Computer Engineering

Assignment Help:

Micro-instructions are stored in control memory. Address register for control memory comprises the address of subsequent instruction which is to be read. Control memory Buffer Register receives micro-instruction which has been read. A particular micro-instruction execution mainlyincludes the generation of desired control signals and signals used to determine the subsequent micro-instruction to be executed. Sequencing logic section loads control memory address register. It issues a read command to control memory. The subsequent functions are performed by micro-programmed control unit:

1. Sequence logic unit specifies address of the control memory word which is to be read in the Address Register of Control Memory. It also issues READ signal.

2. Desired control memory word is read into control memory Buffer Register.

3. Content of the control memory buffer register is decoded to create control signals and subsequent-address information for sequencing logic unit.

4. Sequencing logic unit finds address of next control word on the foundation of next-address information from decoder and ALU flags.

The execute cycle steps of micro-operations are different for every instructions additionally the addressing mode can be different. All such information normally is dependent on opcode of the instruction Register (IR). So IR input to Address Register for Control Memory is desirable. So there exist a decoder from IR to Address Register for control memory.


Related Discussions:- Operation of micro-programmed control unit

Determine the use of loop instruction, Q. Determine the use of LOOP instruc...

Q. Determine the use of LOOP instruction? Program: This program prints the alphabets (A-Z) ; Register used: AX, CX, DX CODE SEGMENT ASSUME: CS: CODE.     MAINP:

What is visibility give uml notation, What is visibility give UML notation?...

What is visibility give UML notation? Visibility refers to the ability of a process to reference a feature from another class and has possible valued of public, private, protec

Describe the three mapping techniques, Describe the three mapping technique...

Describe the three mapping techniques used in cache memories with suitable Example. The cache memory is a fast memory that is inserted among the larger slower main memory and t

Credit line, The Credit Line The Credit Line is a set of informational f...

The Credit Line The Credit Line is a set of informational facts usually found below or beside a picture of a work of art. Should the picture appear in a book, magazine, poster,

Explain in brief about the insert operation, INSERT OPERATION The inser...

INSERT OPERATION The insert operation inserts a new value into a set of bits. This is done by first masking bits and then O ring them with required value. For illustration, sup

What is gustafsons law, Q. What is Gustafsons Law? Amdahl's law is app...

Q. What is Gustafsons Law? Amdahl's law is appropriate for applications where response time is significant. On the other hand there are numerous applications that necessitate

Dataflow computing, Dataflow Computing A different to the von Neumann m...

Dataflow Computing A different to the von Neumann model of computation is the dataflow computation model. In a dataflow model, control is fixed to the flow of data. The order o

Define cache line, Define cache line. Cache block is used to refer to a...

Define cache line. Cache block is used to refer to a set of contiguous address location of some size. Cache block is also referred to as cache line.

Explain vector-vector instructions, Vector-Vector Instructions In this...

Vector-Vector Instructions In this category, vector operands are fetched from vector register and accumulated in another vector register. These instructions are indicated with

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd