SlideShare a Scribd company logo
Presented by
Anil Pokhrel
Bsccsit
3 semester
1
 Introduction
 Common bus system
 Construction of bus
 Memory transfer
 Conclusion
 References
2
 A typical digital computer has many registers and
paths must be provided to transfer information from
one to another register
 A more efficient and widely used method for
transferring data between multiple register is a
common bus line system
 One way of constructing a common bus system is
with multiplexers
 A data read from memory or stored in memory is
called memory transfer
3
 A bus structure consist of a set of common lines each
for each register , through which binary information
can transfer one at a time
 Control signal determine that which register is
connected with a bus line at time to transfer the
information
4
5
6
7
8
9
10
11
12
13
14
 The multiplexers select the source register hose binary
information is then placed on the bus
 A shared communication path consist of one and more
lines is called bus and data transfer through this bus is
called bus transfer
 When an information is read from memory word is
called read operation and data stored in memory is
called write operation
15
 https://www.scribd.com/doc/53190329/Bus-and-
Memory-Transfers
 M.Morris Mano- Computer system architecture
16
17

More Related Content

What's hot

Register transfer and micro-operation
Register transfer and micro-operationRegister transfer and micro-operation
Register transfer and micro-operation
Nikhil Pandit
 
Instruction codes
Instruction codesInstruction codes
Instruction codes
pradeepa velmurugan
 
Register transfer language & its micro operations
Register transfer language & its micro operationsRegister transfer language & its micro operations
Register transfer language & its micro operations
Lakshya Sharma
 
Register transfer language
Register transfer languageRegister transfer language
Register transfer language
Sanjeev Patel
 
Registers
RegistersRegisters
Registers
Sahil Bansal
 
Computer instruction
Computer instructionComputer instruction
Computer instruction
Sanjeev Patel
 
Instruction Formats
Instruction FormatsInstruction Formats
Instruction Formats
RaaviKapoor
 
Computer registers
Computer registersComputer registers
Computer registers
DeepikaT13
 
Register Transfer Language,Bus and Memory Transfer
Register Transfer Language,Bus and Memory TransferRegister Transfer Language,Bus and Memory Transfer
Register Transfer Language,Bus and Memory Transfer
lavanya marichamy
 
Computer instructions
Computer instructionsComputer instructions
Computer instructionsAnuj Modi
 
INTERCONNECTION STRUCTURE
INTERCONNECTION STRUCTUREINTERCONNECTION STRUCTURE
INTERCONNECTION STRUCTURE
VENNILAV6
 
memory reference instruction
memory reference instructionmemory reference instruction
memory reference instruction
DeepikaT13
 
Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
Sanjeev Patel
 
Input Output Organization
Input Output OrganizationInput Output Organization
Input Output Organization
Kamal Acharya
 
Instruction codes and computer registers
Instruction codes and computer registersInstruction codes and computer registers
Instruction codes and computer registers
Sanjeev Patel
 
Computer architecture input output organization
Computer architecture input output organizationComputer architecture input output organization
Computer architecture input output organization
Mazin Alwaaly
 
Input output organization
Input output organizationInput output organization
Input output organizationabdulugc
 
Microoperations
MicrooperationsMicrooperations
Microoperations
Rakesh Pillai
 

What's hot (20)

Register transfer and micro-operation
Register transfer and micro-operationRegister transfer and micro-operation
Register transfer and micro-operation
 
Instruction codes
Instruction codesInstruction codes
Instruction codes
 
Register transfer language & its micro operations
Register transfer language & its micro operationsRegister transfer language & its micro operations
Register transfer language & its micro operations
 
Register transfer language
Register transfer languageRegister transfer language
Register transfer language
 
Registers
RegistersRegisters
Registers
 
Computer instruction
Computer instructionComputer instruction
Computer instruction
 
Instruction Formats
Instruction FormatsInstruction Formats
Instruction Formats
 
Computer registers
Computer registersComputer registers
Computer registers
 
Register Transfer Language,Bus and Memory Transfer
Register Transfer Language,Bus and Memory TransferRegister Transfer Language,Bus and Memory Transfer
Register Transfer Language,Bus and Memory Transfer
 
Computer instructions
Computer instructionsComputer instructions
Computer instructions
 
INTERCONNECTION STRUCTURE
INTERCONNECTION STRUCTUREINTERCONNECTION STRUCTURE
INTERCONNECTION STRUCTURE
 
memory reference instruction
memory reference instructionmemory reference instruction
memory reference instruction
 
Data transfer and manipulation
Data transfer and manipulationData transfer and manipulation
Data transfer and manipulation
 
Instruction code
Instruction codeInstruction code
Instruction code
 
Instruction cycle
Instruction cycleInstruction cycle
Instruction cycle
 
Input Output Organization
Input Output OrganizationInput Output Organization
Input Output Organization
 
Instruction codes and computer registers
Instruction codes and computer registersInstruction codes and computer registers
Instruction codes and computer registers
 
Computer architecture input output organization
Computer architecture input output organizationComputer architecture input output organization
Computer architecture input output organization
 
Input output organization
Input output organizationInput output organization
Input output organization
 
Microoperations
MicrooperationsMicrooperations
Microoperations
 

Similar to Bus and memory transfer

CH03 COMBUTER 000000000000000000000.pptx
CH03 COMBUTER 000000000000000000000.pptxCH03 COMBUTER 000000000000000000000.pptx
CH03 COMBUTER 000000000000000000000.pptx
227567
 
Bus and memory transfer
Bus and memory transferBus and memory transfer
Bus and memory transfer
rishi ram khanal
 
Computer Architecture Chapter 2 BUS
Computer Architecture Chapter 2 BUSComputer Architecture Chapter 2 BUS
Computer Architecture Chapter 2 BUS
AlyssaAina1
 
businterconnection ppt.pptx
businterconnection ppt.pptxbusinterconnection ppt.pptx
businterconnection ppt.pptx
Ramakrishna Reddy Bijjam
 
Introduction To Computer Bus - www.thestuffpoint.com
Introduction To Computer Bus - www.thestuffpoint.comIntroduction To Computer Bus - www.thestuffpoint.com
Introduction To Computer Bus - www.thestuffpoint.com
Abu Bakar Soomro
 
Implementation of MIL-STD-1553 Data Bus
Implementation of MIL-STD-1553 Data BusImplementation of MIL-STD-1553 Data Bus
Implementation of MIL-STD-1553 Data Bus
IJMER
 
dem.pptx
dem.pptxdem.pptx
dem.pptx
yogeshkute7
 
Pdc chapter1
Pdc chapter1Pdc chapter1
Pdc chapter1
SyedSafeer1
 
Computer networking 1
Computer networking 1Computer networking 1
Computer networking 1
Prof. Dr. K. Adisesha
 
Data conversion
Data conversionData conversion
Data conversion
Samuel Igbanogu
 
Basic operational concepts.ppt
Basic operational concepts.pptBasic operational concepts.ppt
Basic operational concepts.ppt
ssuser586772
 
Chapter 4- Communication in distributed system.ppt
Chapter 4- Communication in distributed system.pptChapter 4- Communication in distributed system.ppt
Chapter 4- Communication in distributed system.ppt
AschalewAyele2
 
A way of managing data center networks
A way of managing data center networksA way of managing data center networks
A way of managing data center networks
IOSR Journals
 
Es notes unit 2
Es notes unit 2Es notes unit 2
Es notes unit 2
Tamil Vendhan
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
IJMREMJournal
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
IJMREMJournal
 
Design and implementation of microprocessor trainer bus system
Design and implementation of microprocessor trainer bus systemDesign and implementation of microprocessor trainer bus system
Design and implementation of microprocessor trainer bus system
IJARIIT
 
Buses And Its Types Formation
Buses And Its Types FormationBuses And Its Types Formation
Buses And Its Types Formation
alihaxxan
 

Similar to Bus and memory transfer (20)

CH03 COMBUTER 000000000000000000000.pptx
CH03 COMBUTER 000000000000000000000.pptxCH03 COMBUTER 000000000000000000000.pptx
CH03 COMBUTER 000000000000000000000.pptx
 
Bus and memory transfer
Bus and memory transferBus and memory transfer
Bus and memory transfer
 
Computer Architecture Chapter 2 BUS
Computer Architecture Chapter 2 BUSComputer Architecture Chapter 2 BUS
Computer Architecture Chapter 2 BUS
 
businterconnection ppt.pptx
businterconnection ppt.pptxbusinterconnection ppt.pptx
businterconnection ppt.pptx
 
Introduction To Computer Bus - www.thestuffpoint.com
Introduction To Computer Bus - www.thestuffpoint.comIntroduction To Computer Bus - www.thestuffpoint.com
Introduction To Computer Bus - www.thestuffpoint.com
 
Implementation of MIL-STD-1553 Data Bus
Implementation of MIL-STD-1553 Data BusImplementation of MIL-STD-1553 Data Bus
Implementation of MIL-STD-1553 Data Bus
 
dem.pptx
dem.pptxdem.pptx
dem.pptx
 
Pdc chapter1
Pdc chapter1Pdc chapter1
Pdc chapter1
 
Bus interconnection
Bus interconnectionBus interconnection
Bus interconnection
 
Computer networking 1
Computer networking 1Computer networking 1
Computer networking 1
 
Data conversion
Data conversionData conversion
Data conversion
 
Basic operational concepts.ppt
Basic operational concepts.pptBasic operational concepts.ppt
Basic operational concepts.ppt
 
Chapter 4- Communication in distributed system.ppt
Chapter 4- Communication in distributed system.pptChapter 4- Communication in distributed system.ppt
Chapter 4- Communication in distributed system.ppt
 
Introduction to Data Communication by Vishal Garg
Introduction to Data Communication by Vishal GargIntroduction to Data Communication by Vishal Garg
Introduction to Data Communication by Vishal Garg
 
A way of managing data center networks
A way of managing data center networksA way of managing data center networks
A way of managing data center networks
 
Es notes unit 2
Es notes unit 2Es notes unit 2
Es notes unit 2
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
Design and implementation of microprocessor trainer bus system
Design and implementation of microprocessor trainer bus systemDesign and implementation of microprocessor trainer bus system
Design and implementation of microprocessor trainer bus system
 
Buses And Its Types Formation
Buses And Its Types FormationBuses And Its Types Formation
Buses And Its Types Formation
 

More from Anil Pokhrel

System software
System softwareSystem software
System software
Anil Pokhrel
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
Anil Pokhrel
 
Measure of dispersion
Measure of dispersionMeasure of dispersion
Measure of dispersion
Anil Pokhrel
 
Correlation and regression
Correlation and regressionCorrelation and regression
Correlation and regression
Anil Pokhrel
 
Correlation analysis
Correlation analysis Correlation analysis
Correlation analysis
Anil Pokhrel
 
Function in C Programming
Function in C ProgrammingFunction in C Programming
Function in C Programming
Anil Pokhrel
 
2 dimension array in programms
2 dimension array in programms2 dimension array in programms
2 dimension array in programms
Anil Pokhrel
 
Priority scheuling
Priority scheuling Priority scheuling
Priority scheuling
Anil Pokhrel
 
Operating system file system
Operating system file systemOperating system file system
Operating system file system
Anil Pokhrel
 
object oriented programming OOP
object oriented programming OOPobject oriented programming OOP
object oriented programming OOP
Anil Pokhrel
 
Numerical method runge kutta method
Numerical method runge kutta methodNumerical method runge kutta method
Numerical method runge kutta method
Anil Pokhrel
 
Management profile ppt
Management profile pptManagement profile ppt
Management profile ppt
Anil Pokhrel
 
Impact of error
Impact of errorImpact of error
Impact of error
Anil Pokhrel
 
Control statement
Control statementControl statement
Control statement
Anil Pokhrel
 
Computer architecture data representation
Computer architecture  data representationComputer architecture  data representation
Computer architecture data representation
Anil Pokhrel
 
Management and leadership skills
Management and leadership skillsManagement and leadership skills
Management and leadership skills
Anil Pokhrel
 
color detection using open cv
color detection using open cvcolor detection using open cv
color detection using open cv
Anil Pokhrel
 
Client-server technology in web design
Client-server technology in web designClient-server technology in web design
Client-server technology in web design
Anil Pokhrel
 
Software Engineering requirements
Software Engineering requirementsSoftware Engineering requirements
Software Engineering requirements
Anil Pokhrel
 
I WAY (SUPER HIGHWAY INFORMATION)
I WAY (SUPER HIGHWAY INFORMATION)I WAY (SUPER HIGHWAY INFORMATION)
I WAY (SUPER HIGHWAY INFORMATION)
Anil Pokhrel
 

More from Anil Pokhrel (20)

System software
System softwareSystem software
System software
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Measure of dispersion
Measure of dispersionMeasure of dispersion
Measure of dispersion
 
Correlation and regression
Correlation and regressionCorrelation and regression
Correlation and regression
 
Correlation analysis
Correlation analysis Correlation analysis
Correlation analysis
 
Function in C Programming
Function in C ProgrammingFunction in C Programming
Function in C Programming
 
2 dimension array in programms
2 dimension array in programms2 dimension array in programms
2 dimension array in programms
 
Priority scheuling
Priority scheuling Priority scheuling
Priority scheuling
 
Operating system file system
Operating system file systemOperating system file system
Operating system file system
 
object oriented programming OOP
object oriented programming OOPobject oriented programming OOP
object oriented programming OOP
 
Numerical method runge kutta method
Numerical method runge kutta methodNumerical method runge kutta method
Numerical method runge kutta method
 
Management profile ppt
Management profile pptManagement profile ppt
Management profile ppt
 
Impact of error
Impact of errorImpact of error
Impact of error
 
Control statement
Control statementControl statement
Control statement
 
Computer architecture data representation
Computer architecture  data representationComputer architecture  data representation
Computer architecture data representation
 
Management and leadership skills
Management and leadership skillsManagement and leadership skills
Management and leadership skills
 
color detection using open cv
color detection using open cvcolor detection using open cv
color detection using open cv
 
Client-server technology in web design
Client-server technology in web designClient-server technology in web design
Client-server technology in web design
 
Software Engineering requirements
Software Engineering requirementsSoftware Engineering requirements
Software Engineering requirements
 
I WAY (SUPER HIGHWAY INFORMATION)
I WAY (SUPER HIGHWAY INFORMATION)I WAY (SUPER HIGHWAY INFORMATION)
I WAY (SUPER HIGHWAY INFORMATION)
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Bus and memory transfer

  • 2.  Introduction  Common bus system  Construction of bus  Memory transfer  Conclusion  References 2
  • 3.  A typical digital computer has many registers and paths must be provided to transfer information from one to another register  A more efficient and widely used method for transferring data between multiple register is a common bus line system  One way of constructing a common bus system is with multiplexers  A data read from memory or stored in memory is called memory transfer 3
  • 4.  A bus structure consist of a set of common lines each for each register , through which binary information can transfer one at a time  Control signal determine that which register is connected with a bus line at time to transfer the information 4
  • 5. 5
  • 6. 6
  • 7. 7
  • 8. 8
  • 9. 9
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15.  The multiplexers select the source register hose binary information is then placed on the bus  A shared communication path consist of one and more lines is called bus and data transfer through this bus is called bus transfer  When an information is read from memory word is called read operation and data stored in memory is called write operation 15
  • 17. 17