SlideShare a Scribd company logo
1 of 33
CSC 3650 Introduction to Computer Architecture
Time: 3:30 to 6:30 Meeting Days: W Location: Oxendine 1237B
Textbook: Essentials of Computer Architecture, Author: Douglas E. Comer, 2005, Pearson Prentice Hall
Spring 2011
Chapter Five
Processor Types and Instruction Sets
Instruction Set
• Set of operations the hardware recognizes
• Representation the hardware uses for each
operation
• The set of operations a processor provides
represents a tradeoff among the copst of the
hardware, the convenience for a
programmer, and engineering
considerations such as power consumption
Program Flow in Computer
Flowchart to execute assembly language program
Java Program Execution
Instruction Set Illustration
Instruction Formats
Variable-Length vs Fixed-Length Instructions
• Variable-Length
– Makes optimal use of memory
– Requires complex hardware to decode
• Fixed-Length
– Requires less complex hardware
– Processor can operate at higher speeds
• Can fetch and decode instruction without examining
opcode
Registers
• General Purpose
– Fixed size
– Supports fetch and store
– Acts as temporary storage facility
– Small number of registers, < 100
– Usually large enough to hold an integer
• Processor does 32 bit arithmetic, registers have 32
bits
– Numbered from 0 to N-1
Registers
• Programming with Registers
– Operands stored in general purpose registers
– Place results in general purpose registers
– Must move value to registers and from registers
• load a copy of X into register 3
• Load a copyh of Y into register 6
• Add the value in register 3 to the value in register 6
and place the result in register 7
• Store a copy of the value in register 7 in Z
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
• Operands from an instruction must come from different banks
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
• Since operands must come from different banks, this
presents a problem
• X and Y must be in separate banks
• Z and X must be in different banks
• So either Y or Z will have to be moved to complete T
Complex and Reduced Instruction Sets
• Complex Instruction Set Computer (CISC)
– Includes many instructions (hundreds)
– Each instruction can perform an arbitrarily
complex computation
– Intel’s Pentium is CISC
• Provides hundreds of instructions
• Complex instructions that require a long time to
complete
• Instructions that manipulate graphics in memory,
instructions to compute sine and cosine functions
Complex and Reduced Instruction Sets
• Reduced Instruction Set Computer (RISC)
– Minimum set of instructions sufficient for all
computations, around 32
– Each instruction performs a basic computation
– Instructions are fixed size
– Execute instruction in one clock cycle
– Motorola’s MIPS processor, had 32 instructions
and each takes only one clock cycle
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
Although a RISC processor cannot perform all steps of the
fetch-execute in a single clock cycle, an instruction pipeline
with parallel hardware provides approximately the same
performance once the pipeline is full, one instruction
completes on every clock cycle
Fetch
instruction
Examine
opcode
Fetch
operands
Perform
operations
Store
results
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
Fetch
instruction
Examine
opcode
Fetch
operands
Perform
operations
Store
results
Other Causes of Stalls
• Any instruction that delays processing or
disrupts the normal flow
– Accesses external storage
– Invokes a coprocessor
– Branches to a new location
– Calls a subroutine
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
Delay D  subtract E C until C is available
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
Add a feature to the processor to detect the stall
Sends the output from Instruction K directly to Instruction K + 1
Types of Operations
• Instructions are divided into basic
categories
– Arithmetic instructions (integer arithmetic)
– Logical instructions (also called Boolean)
– Data access and transfer instructions
– Conditional and unconditional branch
instructions
– Floating point instructions
– Processor control instructions
Data movement instructions for
the 8085 microprocessor
Data Operation instructions for
the 8085 microprocessor
Program Control instructions
for the 8085 microprocessor
Program Counter, Fetch-Execute, and Branching
• Program counter: used to store the location
of the next instruction in memory
• Start the fetch-execute cycle by getting the
address of the next instruction in memory
from the program counter
• Once the instruction is fetched, update
program counter
Algorithm used to move through the fetch-
execute cycle
Assign the program counter an intial program address. Repeat forever {
Fetch: access the next step of the program from the location given by
the program counter.
Set an internal address register, A, to the address beyond the
instruction that was just fetched
Execute: Perform the step of the program
Copy the contents of address register A to the program counter
Subroutine Calls, Arguments, and Register Windows
• Two basic methods to pass parameters
– Store them in memory, eg, put on a stack
• Could be slow
– Use registers
• Faster, but limited number which may cause conflict
with operands
• Could use a register window
– Subset of registers used to pass parameters
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
• Registers are numbered from 0 through the window size – 1
• Program places the parameters in registers 4 – 7
• Subroutine gets the parameters from its registers 0 – 3
• xi only available to main program, In only to subroutine
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights

More Related Content

What's hot

Advanced Techniques for Exploiting ILP
Advanced Techniques for Exploiting ILPAdvanced Techniques for Exploiting ILP
Advanced Techniques for Exploiting ILPA B Shinde
 
Basic MIPS implementation
Basic MIPS implementationBasic MIPS implementation
Basic MIPS implementationkavitha2009
 
Simplified instructional computer
Simplified instructional computerSimplified instructional computer
Simplified instructional computerKirby Fabro
 
Instruction level parallelism
Instruction level parallelismInstruction level parallelism
Instruction level parallelismdeviyasharwin
 
Pipelining of Processors
Pipelining of ProcessorsPipelining of Processors
Pipelining of ProcessorsGaditek
 
Introduction to Simplified instruction computer or SIC/XE
Introduction to Simplified instruction computer or SIC/XEIntroduction to Simplified instruction computer or SIC/XE
Introduction to Simplified instruction computer or SIC/XETemesgen Molla
 
CPU Organization,Datatransfer and manipulation
CPU Organization,Datatransfer and manipulationCPU Organization,Datatransfer and manipulation
CPU Organization,Datatransfer and manipulationNITISH KUMAR
 
Pipelining, processors, risc and cisc
Pipelining, processors, risc and ciscPipelining, processors, risc and cisc
Pipelining, processors, risc and ciscMark Gibbs
 
Embedded c c++ programming fundamentals master
Embedded c c++ programming fundamentals masterEmbedded c c++ programming fundamentals master
Embedded c c++ programming fundamentals masterHossam Hassan
 
Computer Architecture - Program Execution
Computer Architecture - Program ExecutionComputer Architecture - Program Execution
Computer Architecture - Program ExecutionVarun Bhargava
 
System design techniques and networks
System design techniques and networksSystem design techniques and networks
System design techniques and networksRAMPRAKASHT1
 
Introduction to Computer Architecture & Organization
Introduction to Computer Architecture & OrganizationIntroduction to Computer Architecture & Organization
Introduction to Computer Architecture & Organizationbabuece
 
Complex instruction set computer ppt
Complex instruction set computer pptComplex instruction set computer ppt
Complex instruction set computer pptVenkatesh Pensalwar
 
Pe 6441 advanced manufacturing lab ch4 wks 12 14
Pe  6441 advanced manufacturing lab ch4 wks 12 14Pe  6441 advanced manufacturing lab ch4 wks 12 14
Pe 6441 advanced manufacturing lab ch4 wks 12 14Charlton Inao
 
Chapter 3 instruction level parallelism and its exploitation
Chapter 3 instruction level parallelism and its exploitationChapter 3 instruction level parallelism and its exploitation
Chapter 3 instruction level parallelism and its exploitationsubramaniam shankar
 
System Programing Unit 1
System Programing Unit 1System Programing Unit 1
System Programing Unit 1Manoj Patil
 

What's hot (20)

Advanced Techniques for Exploiting ILP
Advanced Techniques for Exploiting ILPAdvanced Techniques for Exploiting ILP
Advanced Techniques for Exploiting ILP
 
Basic MIPS implementation
Basic MIPS implementationBasic MIPS implementation
Basic MIPS implementation
 
Simplified instructional computer
Simplified instructional computerSimplified instructional computer
Simplified instructional computer
 
Instruction level parallelism
Instruction level parallelismInstruction level parallelism
Instruction level parallelism
 
Pipelining of Processors
Pipelining of ProcessorsPipelining of Processors
Pipelining of Processors
 
Risc & cisk
Risc & ciskRisc & cisk
Risc & cisk
 
Introduction to Simplified instruction computer or SIC/XE
Introduction to Simplified instruction computer or SIC/XEIntroduction to Simplified instruction computer or SIC/XE
Introduction to Simplified instruction computer or SIC/XE
 
CISC & RISC Architecture
CISC & RISC Architecture CISC & RISC Architecture
CISC & RISC Architecture
 
Pipelining & All Hazards Solution
Pipelining  & All Hazards SolutionPipelining  & All Hazards Solution
Pipelining & All Hazards Solution
 
CPU Organization,Datatransfer and manipulation
CPU Organization,Datatransfer and manipulationCPU Organization,Datatransfer and manipulation
CPU Organization,Datatransfer and manipulation
 
Assembler
AssemblerAssembler
Assembler
 
Pipelining, processors, risc and cisc
Pipelining, processors, risc and ciscPipelining, processors, risc and cisc
Pipelining, processors, risc and cisc
 
Embedded c c++ programming fundamentals master
Embedded c c++ programming fundamentals masterEmbedded c c++ programming fundamentals master
Embedded c c++ programming fundamentals master
 
Computer Architecture - Program Execution
Computer Architecture - Program ExecutionComputer Architecture - Program Execution
Computer Architecture - Program Execution
 
System design techniques and networks
System design techniques and networksSystem design techniques and networks
System design techniques and networks
 
Introduction to Computer Architecture & Organization
Introduction to Computer Architecture & OrganizationIntroduction to Computer Architecture & Organization
Introduction to Computer Architecture & Organization
 
Complex instruction set computer ppt
Complex instruction set computer pptComplex instruction set computer ppt
Complex instruction set computer ppt
 
Pe 6441 advanced manufacturing lab ch4 wks 12 14
Pe  6441 advanced manufacturing lab ch4 wks 12 14Pe  6441 advanced manufacturing lab ch4 wks 12 14
Pe 6441 advanced manufacturing lab ch4 wks 12 14
 
Chapter 3 instruction level parallelism and its exploitation
Chapter 3 instruction level parallelism and its exploitationChapter 3 instruction level parallelism and its exploitation
Chapter 3 instruction level parallelism and its exploitation
 
System Programing Unit 1
System Programing Unit 1System Programing Unit 1
System Programing Unit 1
 

Similar to Ch05

Basics of micro controllers for biginners
Basics of  micro controllers for biginnersBasics of  micro controllers for biginners
Basics of micro controllers for biginnersGerwin Makanyanga
 
Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Subhasis Dash
 
Computer Organization and Architechuture basics
Computer Organization and Architechuture basicsComputer Organization and Architechuture basics
Computer Organization and Architechuture basicsLucky Sithole
 
isa architecture
isa architectureisa architecture
isa architectureAJAL A J
 
L-2 (Computer Performance).ppt
L-2 (Computer Performance).pptL-2 (Computer Performance).ppt
L-2 (Computer Performance).pptImranKhan997082
 
Reduced instruction set computers
Reduced instruction set computersReduced instruction set computers
Reduced instruction set computersSyed Zaid Irshad
 
Parallel Computing - Lec 6
Parallel Computing - Lec 6Parallel Computing - Lec 6
Parallel Computing - Lec 6Shah Zaib
 
Principle of Computer Operation.ppt
Principle of Computer Operation.pptPrinciple of Computer Operation.ppt
Principle of Computer Operation.pptAbdulRehman703897
 
UNIT 3 - General Purpose Processors
UNIT 3 - General Purpose ProcessorsUNIT 3 - General Purpose Processors
UNIT 3 - General Purpose ProcessorsButtaRajasekhar2
 
isa architecture
isa architectureisa architecture
isa architectureAJAL A J
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
Synapseindia dot net development computer programming
Synapseindia dot net development  computer programmingSynapseindia dot net development  computer programming
Synapseindia dot net development computer programmingSynapseindiappsdevelopment
 
Embedded programming Embedded programming (1).pptx
Embedded programming Embedded programming (1).pptxEmbedded programming Embedded programming (1).pptx
Embedded programming Embedded programming (1).pptxlematadese670
 
Performance Tuning by Dijesh P
Performance Tuning by Dijesh PPerformance Tuning by Dijesh P
Performance Tuning by Dijesh PPlusOrMinusZero
 
Basic Structure of Computers: Functional Units, Basic Operational Concepts, B...
Basic Structure of Computers: Functional Units, Basic Operational Concepts, B...Basic Structure of Computers: Functional Units, Basic Operational Concepts, B...
Basic Structure of Computers: Functional Units, Basic Operational Concepts, B...Abhishekn84
 
Unit 1 Computer organization and Instructions
Unit 1 Computer organization and InstructionsUnit 1 Computer organization and Instructions
Unit 1 Computer organization and InstructionsBalaji Vignesh
 

Similar to Ch05 (20)

Debate on RISC-CISC
Debate on RISC-CISCDebate on RISC-CISC
Debate on RISC-CISC
 
Basics of micro controllers for biginners
Basics of  micro controllers for biginnersBasics of  micro controllers for biginners
Basics of micro controllers for biginners
 
CAO.pptx
CAO.pptxCAO.pptx
CAO.pptx
 
Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1) Computer Organisation & Architecture (chapter 1)
Computer Organisation & Architecture (chapter 1)
 
Computer Organization and Architechuture basics
Computer Organization and Architechuture basicsComputer Organization and Architechuture basics
Computer Organization and Architechuture basics
 
isa architecture
isa architectureisa architecture
isa architecture
 
L-2 (Computer Performance).ppt
L-2 (Computer Performance).pptL-2 (Computer Performance).ppt
L-2 (Computer Performance).ppt
 
Reduced instruction set computers
Reduced instruction set computersReduced instruction set computers
Reduced instruction set computers
 
Parallel Computing - Lec 6
Parallel Computing - Lec 6Parallel Computing - Lec 6
Parallel Computing - Lec 6
 
Principle of Computer Operation.ppt
Principle of Computer Operation.pptPrinciple of Computer Operation.ppt
Principle of Computer Operation.ppt
 
UNIT 3 - General Purpose Processors
UNIT 3 - General Purpose ProcessorsUNIT 3 - General Purpose Processors
UNIT 3 - General Purpose Processors
 
RISC.ppt
RISC.pptRISC.ppt
RISC.ppt
 
isa architecture
isa architectureisa architecture
isa architecture
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Synapseindia dot net development computer programming
Synapseindia dot net development  computer programmingSynapseindia dot net development  computer programming
Synapseindia dot net development computer programming
 
Embedded programming Embedded programming (1).pptx
Embedded programming Embedded programming (1).pptxEmbedded programming Embedded programming (1).pptx
Embedded programming Embedded programming (1).pptx
 
Code Optimization
Code OptimizationCode Optimization
Code Optimization
 
Performance Tuning by Dijesh P
Performance Tuning by Dijesh PPerformance Tuning by Dijesh P
Performance Tuning by Dijesh P
 
Basic Structure of Computers: Functional Units, Basic Operational Concepts, B...
Basic Structure of Computers: Functional Units, Basic Operational Concepts, B...Basic Structure of Computers: Functional Units, Basic Operational Concepts, B...
Basic Structure of Computers: Functional Units, Basic Operational Concepts, B...
 
Unit 1 Computer organization and Instructions
Unit 1 Computer organization and InstructionsUnit 1 Computer organization and Instructions
Unit 1 Computer organization and Instructions
 

More from Avijeet Negel

More from Avijeet Negel (20)

TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Upper OSI LAYER
Upper OSI LAYERUpper OSI LAYER
Upper OSI LAYER
 
SONET/SDH
SONET/SDHSONET/SDH
SONET/SDH
 
ATM
ATMATM
ATM
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
X.25
X.25X.25
X.25
 
Integrated Services Digital Network (ISDN)
Integrated Services Digital Network (ISDN)Integrated Services Digital Network (ISDN)
Integrated Services Digital Network (ISDN)
 
Switching
SwitchingSwitching
Switching
 
Point to Point Protocol
Point to Point ProtocolPoint to Point Protocol
Point to Point Protocol
 
Networking and Networking Devices
Networking and Networking DevicesNetworking and Networking Devices
Networking and Networking Devices
 
DATA Link Control
DATA Link ControlDATA Link Control
DATA Link Control
 
CRC
CRCCRC
CRC
 
Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
 
Telephone Network
Telephone NetworkTelephone Network
Telephone Network
 
Time Division Multiplexing
Time Division MultiplexingTime Division Multiplexing
Time Division Multiplexing
 
MULTIPLEXING
MULTIPLEXINGMULTIPLEXING
MULTIPLEXING
 
Radio Communication Band
Radio Communication BandRadio Communication Band
Radio Communication Band
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 
DB-37 AND DB-9 CONNECTORS
DB-37 AND DB-9 CONNECTORSDB-37 AND DB-9 CONNECTORS
DB-37 AND DB-9 CONNECTORS
 
Transmission Of Digital Data
Transmission Of Digital DataTransmission Of Digital Data
Transmission Of Digital Data
 

Recently uploaded

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyAnusha Are
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfayushiqss
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxalwaysnagaraju26
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456KiaraTiradoMicha
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 

Recently uploaded (20)

+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdfThe Top App Development Trends Shaping the Industry in 2024-25 .pdf
The Top App Development Trends Shaping the Industry in 2024-25 .pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456LEVEL 5   - SESSION 1 2023 (1).pptx - PDF 123456
LEVEL 5 - SESSION 1 2023 (1).pptx - PDF 123456
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 

Ch05

  • 1. CSC 3650 Introduction to Computer Architecture Time: 3:30 to 6:30 Meeting Days: W Location: Oxendine 1237B Textbook: Essentials of Computer Architecture, Author: Douglas E. Comer, 2005, Pearson Prentice Hall Spring 2011 Chapter Five Processor Types and Instruction Sets
  • 2. Instruction Set • Set of operations the hardware recognizes • Representation the hardware uses for each operation • The set of operations a processor provides represents a tradeoff among the copst of the hardware, the convenience for a programmer, and engineering considerations such as power consumption
  • 3. Program Flow in Computer
  • 4. Flowchart to execute assembly language program
  • 8. Variable-Length vs Fixed-Length Instructions • Variable-Length – Makes optimal use of memory – Requires complex hardware to decode • Fixed-Length – Requires less complex hardware – Processor can operate at higher speeds • Can fetch and decode instruction without examining opcode
  • 9. Registers • General Purpose – Fixed size – Supports fetch and store – Acts as temporary storage facility – Small number of registers, < 100 – Usually large enough to hold an integer • Processor does 32 bit arithmetic, registers have 32 bits – Numbered from 0 to N-1
  • 10. Registers • Programming with Registers – Operands stored in general purpose registers – Place results in general purpose registers – Must move value to registers and from registers • load a copy of X into register 3 • Load a copyh of Y into register 6 • Add the value in register 3 to the value in register 6 and place the result in register 7 • Store a copy of the value in register 7 in Z
  • 11. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights • Operands from an instruction must come from different banks
  • 12. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights • Since operands must come from different banks, this presents a problem • X and Y must be in separate banks • Z and X must be in different banks • So either Y or Z will have to be moved to complete T
  • 13. Complex and Reduced Instruction Sets • Complex Instruction Set Computer (CISC) – Includes many instructions (hundreds) – Each instruction can perform an arbitrarily complex computation – Intel’s Pentium is CISC • Provides hundreds of instructions • Complex instructions that require a long time to complete • Instructions that manipulate graphics in memory, instructions to compute sine and cosine functions
  • 14. Complex and Reduced Instruction Sets • Reduced Instruction Set Computer (RISC) – Minimum set of instructions sufficient for all computations, around 32 – Each instruction performs a basic computation – Instructions are fixed size – Execute instruction in one clock cycle – Motorola’s MIPS processor, had 32 instructions and each takes only one clock cycle
  • 15. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
  • 16. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights Although a RISC processor cannot perform all steps of the fetch-execute in a single clock cycle, an instruction pipeline with parallel hardware provides approximately the same performance once the pipeline is full, one instruction completes on every clock cycle Fetch instruction Examine opcode Fetch operands Perform operations Store results
  • 17. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
  • 18. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights Fetch instruction Examine opcode Fetch operands Perform operations Store results
  • 19. Other Causes of Stalls • Any instruction that delays processing or disrupts the normal flow – Accesses external storage – Invokes a coprocessor – Branches to a new location – Calls a subroutine
  • 20. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights Delay D  subtract E C until C is available
  • 21. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights Add a feature to the processor to detect the stall Sends the output from Instruction K directly to Instruction K + 1
  • 22. Types of Operations • Instructions are divided into basic categories – Arithmetic instructions (integer arithmetic) – Logical instructions (also called Boolean) – Data access and transfer instructions – Conditional and unconditional branch instructions – Floating point instructions – Processor control instructions
  • 23. Data movement instructions for the 8085 microprocessor
  • 24. Data Operation instructions for the 8085 microprocessor
  • 25. Program Control instructions for the 8085 microprocessor
  • 26. Program Counter, Fetch-Execute, and Branching • Program counter: used to store the location of the next instruction in memory • Start the fetch-execute cycle by getting the address of the next instruction in memory from the program counter • Once the instruction is fetched, update program counter
  • 27. Algorithm used to move through the fetch- execute cycle Assign the program counter an intial program address. Repeat forever { Fetch: access the next step of the program from the location given by the program counter. Set an internal address register, A, to the address beyond the instruction that was just fetched Execute: Perform the step of the program Copy the contents of address register A to the program counter
  • 28. Subroutine Calls, Arguments, and Register Windows • Two basic methods to pass parameters – Store them in memory, eg, put on a stack • Could be slow – Use registers • Faster, but limited number which may cause conflict with operands • Could use a register window – Subset of registers used to pass parameters
  • 29. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights • Registers are numbered from 0 through the window size – 1 • Program places the parameters in registers 4 – 7 • Subroutine gets the parameters from its registers 0 – 3 • xi only available to main program, In only to subroutine
  • 30. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
  • 31. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
  • 32. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights
  • 33. From Essentials of Computer Architecture by Douglas E. Comer. ISBN 0131491792. © 2005 Pearson Education, Inc. All rights