SlideShare a Scribd company logo
BINARY / BCD ADDERS AND SUBTRACTORS
When two bits x and y are added, a sum and a carry are generated
HALF-ADDER
Block Diagram
Truth Table
Combinational Circuit
S = x’y + xy’ = x  y
C = xy
FULL-ADDER
Block Diagram
Truth Table
FULL-ADDER
S = x'y'z + x'yz' + xy'z' + xyz
= (x'y + xy')z' + (xy + x'y')z
Let w = x'y + xy' = x  y
w' = (x'y + xy')'
= (x'y)'(xy')'
= (x+y')(x'+y)
= xy + x'y'
S = wz' + w'z
= w  z
= x  y  z
C = x'yz + xy'z + xyz' + xyz
= (x'y + xy')z + xy(z + z')
= wz + xy
= (x  y)z + xy
Combinational Circuit
FULL-ADDER
4 – BIT BINARY ADDER (Ripple Carry Adder)
1 half-adder, 3 full-adders
4 full-adders
EXAMPLE
x = 310 (00112), y = 5 (01012)
11100100
0101011
0
BCD ADDER
HALF / FULL SUBTRACTOR
MULTIPLEXER
A multiplexer (MUX) is a combinational circuit that selects one of n input
lines and provides it on the output.
It has several inputs and only one output. The select lines identify or address one of several
inputs and provides it on the output line.
2-to-1 multiplexer block diagram
K-map of 2-to-1 MUX
Logic circuit of 2-to-1 MUXZ = S'd0 + Sd1
A large multiplexer can be implemented using a small multiplexer as the building block
4-to-1 multiplexer block diagram
Example: Implement Boolean equation f(x,y,z) = xz’ + yz using multiplexers
Step 1: Express the equation as sum of products (minterms)
f (x,y,z) = xz’ (y + y’) + yz (x + x’) = xyz’ + xy’z’ + xyz + x’yz
Step 2: Choose 2 of the 3 variables as select inputs, e.g. y and z.
f (x,y,z) = xz’ (y + y’) + yz (x + x’) = xyz’ + xy’z’ + xyz + x’yz
Step 3: Factor out all combinations of the chosen variables as select inputs in the minterm.
(y’z’, y’z, yz’, yz)
f (x,y,z) = xyz’ + xy’z’ + xyz + x’yz
= y’z’(x) + y’z (0) + yz’ (x) + yz (x + x’)
= y’z’(x) + y’z (0) + yz’ (x) + yz (1)
INSTRUCTION SET ARCHITECTURE (ISA)
What Is An ISA?
A well-define hardware/software interface that defines the functional operations, modes,
and storage locations supported by hardware through precise description of how to
invoke, and access them
Functionalities in designing ISA
• Allows communication of the capabilities of the hardware through software
• Common operations:
- memory addressing
- data movement
- arithmetic and logic
- program flow control
Instruction set architecture(ISA) is the set of processor design techniques used to
implement the instruction work flow on hardware.
What Makes a Good ISA?
• Programmability
Easy to express programs efficiently?
• Implementability
Easy to design high-performance implementations?
Easy to design low-power implementations?
Easy to design high-reliability implementations?
Easy to design low-cost implementations?
Compatibility
Easy to maintain programmability (implementability) as languages and
programs (technology) evolves?
x86 (IA32) generations: 8086, 286, 386, 486, Pentium, PentiumII, PentiumIII,
Pentium4,…
RISC AND CISC
RISC: reduced-instruction set computer
RISC processors only use simple instructions that can be executed within one clock
cycle.
Single-cycle execution
Fixed instruction format
Load/Store architecture
Examples: PowerPC, ARM, SPARC, Alpha, PA-RISC
Advantage:
1. Each instruction requires only one clock cycle to execute, the entire program will
execute in approximately the same amount of time as the multi-cycle “MULT”
command.
2. These RISC “reduced instructions” require less transistors of hardware space than
the complex instructions, leaving more room for general purpose registers.
Because all of the instructions execute in a uniform amount of time (i.e. one clock)
3. Pipelining is possible.
CISC: complex-instruction set computer
The primary goal of CISC architecture is to complete a task in as few lines of assembly as
possible. This is achieved by building processor hardware that is capable of
understanding & executing a series of operations, this is where our CISC architecture
introduced .
Variable-length instructions (1-16 bytes)
Support different addressing modes
Examples: x86, VAX, Motorola 68000, etc.
Advantage:
1. Compiler has to do very little work to translate a high-level language statement into
assembly
2. Length of the code is relatively short
3. Very little RAM is required to store instructions
4. The emphasis is put on building complex instructions directly into the hardware.
THE INTEL X86 PROGRAMMING MODEL

More Related Content

What's hot

8.2 integration by parts
8.2 integration by parts8.2 integration by parts
8.2 integration by parts
dicosmo178
 
2018 06-19 paris cybersecurity meetup
2018 06-19 paris cybersecurity meetup2018 06-19 paris cybersecurity meetup
2018 06-19 paris cybersecurity meetup
Raphaël Laffitte
 
Hidden loops
Hidden loopsHidden loops
Hidden loops
Alexandru Bolboaca
 
Re:ゲーム理論入門 第11回 - ふりかえり -
Re:ゲーム理論入門 第11回 - ふりかえり -Re:ゲーム理論入門 第11回 - ふりかえり -
Re:ゲーム理論入門 第11回 - ふりかえり -
ssusere0a682
 
Copia de derivadas tablas
Copia de derivadas tablasCopia de derivadas tablas
Copia de derivadas tablas
Geral Delgado
 
ARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lectureARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lecture
anishgoel
 
Rkf
RkfRkf
SOAL RANGKAIAN LOGIKA
SOAL RANGKAIAN LOGIKASOAL RANGKAIAN LOGIKA
SOAL RANGKAIAN LOGIKA
Afrilio Franseda
 
ゲーム理論BASIC 第37回 -カーネル-
ゲーム理論BASIC 第37回 -カーネル-ゲーム理論BASIC 第37回 -カーネル-
ゲーム理論BASIC 第37回 -カーネル-
ssusere0a682
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp
 
Programming for Artists and Designers: Week 2
Programming for Artists and Designers: Week 2Programming for Artists and Designers: Week 2
Programming for Artists and Designers: Week 2
Tinker
 
Re:ゲーム理論入門 第14回 - 仁 -
Re:ゲーム理論入門 第14回 - 仁 -Re:ゲーム理論入門 第14回 - 仁 -
Re:ゲーム理論入門 第14回 - 仁 -
ssusere0a682
 
133467 p2a3
133467 p2a3133467 p2a3
MySQL vs. PostgreSQL
MySQL vs. PostgreSQLMySQL vs. PostgreSQL
MySQL vs. PostgreSQL
Zhivko Angelov
 
ゲーム理論BASIC 第41回 -続・仁-
ゲーム理論BASIC 第41回 -続・仁-ゲーム理論BASIC 第41回 -続・仁-
ゲーム理論BASIC 第41回 -続・仁-
ssusere0a682
 
Selective codes
Selective codesSelective codes
Selective codes
Siva Gopal
 
Interpolation graph c++
Interpolation graph c++Interpolation graph c++
Interpolation graph c++
rpiitcbme
 
【演習】Re:ゲーム理論入門 第14回 -仁-
【演習】Re:ゲーム理論入門 第14回 -仁-【演習】Re:ゲーム理論入門 第14回 -仁-
【演習】Re:ゲーム理論入門 第14回 -仁-
ssusere0a682
 
Computational Linguistics week 10
 Computational Linguistics week 10 Computational Linguistics week 10
Computational Linguistics week 10
Mark Chang
 

What's hot (19)

8.2 integration by parts
8.2 integration by parts8.2 integration by parts
8.2 integration by parts
 
2018 06-19 paris cybersecurity meetup
2018 06-19 paris cybersecurity meetup2018 06-19 paris cybersecurity meetup
2018 06-19 paris cybersecurity meetup
 
Hidden loops
Hidden loopsHidden loops
Hidden loops
 
Re:ゲーム理論入門 第11回 - ふりかえり -
Re:ゲーム理論入門 第11回 - ふりかえり -Re:ゲーム理論入門 第11回 - ふりかえり -
Re:ゲーム理論入門 第11回 - ふりかえり -
 
Copia de derivadas tablas
Copia de derivadas tablasCopia de derivadas tablas
Copia de derivadas tablas
 
ARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lectureARM 7 LPC 2148 lecture
ARM 7 LPC 2148 lecture
 
Rkf
RkfRkf
Rkf
 
SOAL RANGKAIAN LOGIKA
SOAL RANGKAIAN LOGIKASOAL RANGKAIAN LOGIKA
SOAL RANGKAIAN LOGIKA
 
ゲーム理論BASIC 第37回 -カーネル-
ゲーム理論BASIC 第37回 -カーネル-ゲーム理論BASIC 第37回 -カーネル-
ゲーム理論BASIC 第37回 -カーネル-
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
 
Programming for Artists and Designers: Week 2
Programming for Artists and Designers: Week 2Programming for Artists and Designers: Week 2
Programming for Artists and Designers: Week 2
 
Re:ゲーム理論入門 第14回 - 仁 -
Re:ゲーム理論入門 第14回 - 仁 -Re:ゲーム理論入門 第14回 - 仁 -
Re:ゲーム理論入門 第14回 - 仁 -
 
133467 p2a3
133467 p2a3133467 p2a3
133467 p2a3
 
MySQL vs. PostgreSQL
MySQL vs. PostgreSQLMySQL vs. PostgreSQL
MySQL vs. PostgreSQL
 
ゲーム理論BASIC 第41回 -続・仁-
ゲーム理論BASIC 第41回 -続・仁-ゲーム理論BASIC 第41回 -続・仁-
ゲーム理論BASIC 第41回 -続・仁-
 
Selective codes
Selective codesSelective codes
Selective codes
 
Interpolation graph c++
Interpolation graph c++Interpolation graph c++
Interpolation graph c++
 
【演習】Re:ゲーム理論入門 第14回 -仁-
【演習】Re:ゲーム理論入門 第14回 -仁-【演習】Re:ゲーム理論入門 第14回 -仁-
【演習】Re:ゲーム理論入門 第14回 -仁-
 
Computational Linguistics week 10
 Computational Linguistics week 10 Computational Linguistics week 10
Computational Linguistics week 10
 

Similar to adders/subtractors, multiplexers, intro to ISA

Digital logic circuits
Digital  logic  circuitsDigital  logic  circuits
Digital logic circuits
Prof. Dr. K. Adisesha
 
NTU ML TENSORFLOW
NTU ML TENSORFLOWNTU ML TENSORFLOW
NTU ML TENSORFLOW
Mark Chang
 
Seminar PSU 10.10.2014 mme
Seminar PSU 10.10.2014 mmeSeminar PSU 10.10.2014 mme
Seminar PSU 10.10.2014 mme
Vyacheslav Arbuzov
 
Clustering and Factorization using Apache SystemML by Alexandre V Evfimievski
Clustering and Factorization using Apache SystemML by  Alexandre V EvfimievskiClustering and Factorization using Apache SystemML by  Alexandre V Evfimievski
Clustering and Factorization using Apache SystemML by Alexandre V Evfimievski
Arvind Surve
 
Clustering and Factorization using Apache SystemML by Alexandre V Evfimievski
Clustering and Factorization using Apache SystemML by  Alexandre V EvfimievskiClustering and Factorization using Apache SystemML by  Alexandre V Evfimievski
Clustering and Factorization using Apache SystemML by Alexandre V Evfimievski
Arvind Surve
 
Write Python for Speed
Write Python for SpeedWrite Python for Speed
Write Python for Speed
Yung-Yu Chen
 
Open GL T0074 56 sm4
Open GL T0074 56 sm4Open GL T0074 56 sm4
Open GL T0074 56 sm4
Roziq Bahtiar
 
Introduction to Neural Networks and Deep Learning from Scratch
Introduction to Neural Networks and Deep Learning from ScratchIntroduction to Neural Networks and Deep Learning from Scratch
Introduction to Neural Networks and Deep Learning from Scratch
Ahmed BESBES
 
Visual Basic(Vb) practical
Visual Basic(Vb) practicalVisual Basic(Vb) practical
Visual Basic(Vb) practical
Rahul juneja
 
Solutions Manual for Calculus Early Transcendentals 10th Edition by Anton
Solutions Manual for Calculus Early Transcendentals 10th Edition by AntonSolutions Manual for Calculus Early Transcendentals 10th Edition by Anton
Solutions Manual for Calculus Early Transcendentals 10th Edition by Anton
Pamelaew
 
Scaling Deep Learning with MXNet
Scaling Deep Learning with MXNetScaling Deep Learning with MXNet
Scaling Deep Learning with MXNet
AI Frontiers
 
Артём Акуляков - F# for Data Analysis
Артём Акуляков - F# for Data AnalysisАртём Акуляков - F# for Data Analysis
Артём Акуляков - F# for Data Analysis
SpbDotNet Community
 
Computer organiztion3
Computer organiztion3Computer organiztion3
Computer organiztion3
Umang Gupta
 
Yoyak ScalaDays 2015
Yoyak ScalaDays 2015Yoyak ScalaDays 2015
Yoyak ScalaDays 2015
ihji
 
SCIPY-SYMPY.pdf
SCIPY-SYMPY.pdfSCIPY-SYMPY.pdf
SCIPY-SYMPY.pdf
FreddyGuzman19
 
Econometric Analysis 8th Edition Greene Solutions Manual
Econometric Analysis 8th Edition Greene Solutions ManualEconometric Analysis 8th Edition Greene Solutions Manual
Econometric Analysis 8th Edition Greene Solutions Manual
LewisSimmonss
 
Calculus Early Transcendentals 10th Edition Anton Solutions Manual
Calculus Early Transcendentals 10th Edition Anton Solutions ManualCalculus Early Transcendentals 10th Edition Anton Solutions Manual
Calculus Early Transcendentals 10th Edition Anton Solutions Manual
nodyligomi
 
Creating masterpieces with raphael
Creating masterpieces with raphaelCreating masterpieces with raphael
Creating masterpieces with raphael
Pippi Labradoodle
 
2Part I1. Answer questions for the following graph, if .docx
2Part I1. Answer questions for the following graph, if .docx2Part I1. Answer questions for the following graph, if .docx
2Part I1. Answer questions for the following graph, if .docx
gilbertkpeters11344
 
MT T4 (Bab 3: Fungsi Kuadratik)
MT T4 (Bab 3: Fungsi Kuadratik)MT T4 (Bab 3: Fungsi Kuadratik)
MT T4 (Bab 3: Fungsi Kuadratik)
hasnulslides
 

Similar to adders/subtractors, multiplexers, intro to ISA (20)

Digital logic circuits
Digital  logic  circuitsDigital  logic  circuits
Digital logic circuits
 
NTU ML TENSORFLOW
NTU ML TENSORFLOWNTU ML TENSORFLOW
NTU ML TENSORFLOW
 
Seminar PSU 10.10.2014 mme
Seminar PSU 10.10.2014 mmeSeminar PSU 10.10.2014 mme
Seminar PSU 10.10.2014 mme
 
Clustering and Factorization using Apache SystemML by Alexandre V Evfimievski
Clustering and Factorization using Apache SystemML by  Alexandre V EvfimievskiClustering and Factorization using Apache SystemML by  Alexandre V Evfimievski
Clustering and Factorization using Apache SystemML by Alexandre V Evfimievski
 
Clustering and Factorization using Apache SystemML by Alexandre V Evfimievski
Clustering and Factorization using Apache SystemML by  Alexandre V EvfimievskiClustering and Factorization using Apache SystemML by  Alexandre V Evfimievski
Clustering and Factorization using Apache SystemML by Alexandre V Evfimievski
 
Write Python for Speed
Write Python for SpeedWrite Python for Speed
Write Python for Speed
 
Open GL T0074 56 sm4
Open GL T0074 56 sm4Open GL T0074 56 sm4
Open GL T0074 56 sm4
 
Introduction to Neural Networks and Deep Learning from Scratch
Introduction to Neural Networks and Deep Learning from ScratchIntroduction to Neural Networks and Deep Learning from Scratch
Introduction to Neural Networks and Deep Learning from Scratch
 
Visual Basic(Vb) practical
Visual Basic(Vb) practicalVisual Basic(Vb) practical
Visual Basic(Vb) practical
 
Solutions Manual for Calculus Early Transcendentals 10th Edition by Anton
Solutions Manual for Calculus Early Transcendentals 10th Edition by AntonSolutions Manual for Calculus Early Transcendentals 10th Edition by Anton
Solutions Manual for Calculus Early Transcendentals 10th Edition by Anton
 
Scaling Deep Learning with MXNet
Scaling Deep Learning with MXNetScaling Deep Learning with MXNet
Scaling Deep Learning with MXNet
 
Артём Акуляков - F# for Data Analysis
Артём Акуляков - F# for Data AnalysisАртём Акуляков - F# for Data Analysis
Артём Акуляков - F# for Data Analysis
 
Computer organiztion3
Computer organiztion3Computer organiztion3
Computer organiztion3
 
Yoyak ScalaDays 2015
Yoyak ScalaDays 2015Yoyak ScalaDays 2015
Yoyak ScalaDays 2015
 
SCIPY-SYMPY.pdf
SCIPY-SYMPY.pdfSCIPY-SYMPY.pdf
SCIPY-SYMPY.pdf
 
Econometric Analysis 8th Edition Greene Solutions Manual
Econometric Analysis 8th Edition Greene Solutions ManualEconometric Analysis 8th Edition Greene Solutions Manual
Econometric Analysis 8th Edition Greene Solutions Manual
 
Calculus Early Transcendentals 10th Edition Anton Solutions Manual
Calculus Early Transcendentals 10th Edition Anton Solutions ManualCalculus Early Transcendentals 10th Edition Anton Solutions Manual
Calculus Early Transcendentals 10th Edition Anton Solutions Manual
 
Creating masterpieces with raphael
Creating masterpieces with raphaelCreating masterpieces with raphael
Creating masterpieces with raphael
 
2Part I1. Answer questions for the following graph, if .docx
2Part I1. Answer questions for the following graph, if .docx2Part I1. Answer questions for the following graph, if .docx
2Part I1. Answer questions for the following graph, if .docx
 
MT T4 (Bab 3: Fungsi Kuadratik)
MT T4 (Bab 3: Fungsi Kuadratik)MT T4 (Bab 3: Fungsi Kuadratik)
MT T4 (Bab 3: Fungsi Kuadratik)
 

More from i i

Bouncing circle
Bouncing circleBouncing circle
Bouncing circle
i i
 
0-1 KNAPSACK PROBLEM
0-1 KNAPSACK PROBLEM0-1 KNAPSACK PROBLEM
0-1 KNAPSACK PROBLEM
i i
 
sequential and combinational circuits exam
sequential and combinational circuits examsequential and combinational circuits exam
sequential and combinational circuits exam
i i
 
hypothesis testing overview
hypothesis testing overviewhypothesis testing overview
hypothesis testing overview
i i
 
x86 architecture
x86 architecturex86 architecture
x86 architecture
i i
 
boolean algebra exercises
boolean algebra exercisesboolean algebra exercises
boolean algebra exercises
i i
 
database normalization case study
database normalization case studydatabase normalization case study
database normalization case study
i i
 
cpbricks context diagram
cpbricks context diagramcpbricks context diagram
cpbricks context diagram
i i
 
cpbricks project document
cpbricks project documentcpbricks project document
cpbricks project document
i i
 
cpbricks manual
cpbricks manualcpbricks manual
cpbricks manual
i i
 
imperative programming language, java, android
imperative programming language, java, androidimperative programming language, java, android
imperative programming language, java, android
i i
 
shortest job first
shortest job firstshortest job first
shortest job first
i i
 
designing reports
designing reportsdesigning reports
designing reports
i i
 
bnf of c switch statement
bnf of c switch statementbnf of c switch statement
bnf of c switch statement
i i
 
shell and merge sort
shell and merge sortshell and merge sort
shell and merge sort
i i
 

More from i i (15)

Bouncing circle
Bouncing circleBouncing circle
Bouncing circle
 
0-1 KNAPSACK PROBLEM
0-1 KNAPSACK PROBLEM0-1 KNAPSACK PROBLEM
0-1 KNAPSACK PROBLEM
 
sequential and combinational circuits exam
sequential and combinational circuits examsequential and combinational circuits exam
sequential and combinational circuits exam
 
hypothesis testing overview
hypothesis testing overviewhypothesis testing overview
hypothesis testing overview
 
x86 architecture
x86 architecturex86 architecture
x86 architecture
 
boolean algebra exercises
boolean algebra exercisesboolean algebra exercises
boolean algebra exercises
 
database normalization case study
database normalization case studydatabase normalization case study
database normalization case study
 
cpbricks context diagram
cpbricks context diagramcpbricks context diagram
cpbricks context diagram
 
cpbricks project document
cpbricks project documentcpbricks project document
cpbricks project document
 
cpbricks manual
cpbricks manualcpbricks manual
cpbricks manual
 
imperative programming language, java, android
imperative programming language, java, androidimperative programming language, java, android
imperative programming language, java, android
 
shortest job first
shortest job firstshortest job first
shortest job first
 
designing reports
designing reportsdesigning reports
designing reports
 
bnf of c switch statement
bnf of c switch statementbnf of c switch statement
bnf of c switch statement
 
shell and merge sort
shell and merge sortshell and merge sort
shell and merge sort
 

Recently uploaded

digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
Madhumitha Jayaram
 

Recently uploaded (20)

digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Wearable antenna for antenna applications
Wearable antenna for antenna applicationsWearable antenna for antenna applications
Wearable antenna for antenna applications
 

adders/subtractors, multiplexers, intro to ISA

  • 1. BINARY / BCD ADDERS AND SUBTRACTORS When two bits x and y are added, a sum and a carry are generated
  • 2. HALF-ADDER Block Diagram Truth Table Combinational Circuit S = x’y + xy’ = x  y C = xy
  • 4. Truth Table FULL-ADDER S = x'y'z + x'yz' + xy'z' + xyz = (x'y + xy')z' + (xy + x'y')z Let w = x'y + xy' = x  y w' = (x'y + xy')' = (x'y)'(xy')' = (x+y')(x'+y) = xy + x'y' S = wz' + w'z = w  z = x  y  z C = x'yz + xy'z + xyz' + xyz = (x'y + xy')z + xy(z + z') = wz + xy = (x  y)z + xy
  • 6. 4 – BIT BINARY ADDER (Ripple Carry Adder) 1 half-adder, 3 full-adders 4 full-adders
  • 7. EXAMPLE x = 310 (00112), y = 5 (01012) 11100100 0101011 0
  • 9. HALF / FULL SUBTRACTOR
  • 10. MULTIPLEXER A multiplexer (MUX) is a combinational circuit that selects one of n input lines and provides it on the output. It has several inputs and only one output. The select lines identify or address one of several inputs and provides it on the output line. 2-to-1 multiplexer block diagram K-map of 2-to-1 MUX Logic circuit of 2-to-1 MUXZ = S'd0 + Sd1
  • 11. A large multiplexer can be implemented using a small multiplexer as the building block 4-to-1 multiplexer block diagram
  • 12. Example: Implement Boolean equation f(x,y,z) = xz’ + yz using multiplexers Step 1: Express the equation as sum of products (minterms) f (x,y,z) = xz’ (y + y’) + yz (x + x’) = xyz’ + xy’z’ + xyz + x’yz Step 2: Choose 2 of the 3 variables as select inputs, e.g. y and z. f (x,y,z) = xz’ (y + y’) + yz (x + x’) = xyz’ + xy’z’ + xyz + x’yz Step 3: Factor out all combinations of the chosen variables as select inputs in the minterm. (y’z’, y’z, yz’, yz) f (x,y,z) = xyz’ + xy’z’ + xyz + x’yz = y’z’(x) + y’z (0) + yz’ (x) + yz (x + x’) = y’z’(x) + y’z (0) + yz’ (x) + yz (1)
  • 13. INSTRUCTION SET ARCHITECTURE (ISA) What Is An ISA? A well-define hardware/software interface that defines the functional operations, modes, and storage locations supported by hardware through precise description of how to invoke, and access them Functionalities in designing ISA • Allows communication of the capabilities of the hardware through software • Common operations: - memory addressing - data movement - arithmetic and logic - program flow control Instruction set architecture(ISA) is the set of processor design techniques used to implement the instruction work flow on hardware.
  • 14. What Makes a Good ISA? • Programmability Easy to express programs efficiently? • Implementability Easy to design high-performance implementations? Easy to design low-power implementations? Easy to design high-reliability implementations? Easy to design low-cost implementations? Compatibility Easy to maintain programmability (implementability) as languages and programs (technology) evolves? x86 (IA32) generations: 8086, 286, 386, 486, Pentium, PentiumII, PentiumIII, Pentium4,…
  • 15. RISC AND CISC RISC: reduced-instruction set computer RISC processors only use simple instructions that can be executed within one clock cycle. Single-cycle execution Fixed instruction format Load/Store architecture Examples: PowerPC, ARM, SPARC, Alpha, PA-RISC Advantage: 1. Each instruction requires only one clock cycle to execute, the entire program will execute in approximately the same amount of time as the multi-cycle “MULT” command. 2. These RISC “reduced instructions” require less transistors of hardware space than the complex instructions, leaving more room for general purpose registers. Because all of the instructions execute in a uniform amount of time (i.e. one clock) 3. Pipelining is possible.
  • 16. CISC: complex-instruction set computer The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced . Variable-length instructions (1-16 bytes) Support different addressing modes Examples: x86, VAX, Motorola 68000, etc. Advantage: 1. Compiler has to do very little work to translate a high-level language statement into assembly 2. Length of the code is relatively short 3. Very little RAM is required to store instructions 4. The emphasis is put on building complex instructions directly into the hardware.
  • 17. THE INTEL X86 PROGRAMMING MODEL