SlideShare a Scribd company logo
1 of 50
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi –110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Semester:THIRDSemester
Name of the Subject:
COMPUTERARCHITECTURE
UNIT-1
FACULTY NAME: MS. Manu Shree
BCA
Registers in Computer Architecture
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Register is a very fast computer memory, used to store data/instruction
in-execution.
A Register is a group of flip-flops with each flip-flop capable of storing
one bit of information. An n-bit register has a group of n flip-flops and is
capable of storing binary information of n-bits.
A register consists of a group of flip-flops and gates. The flip-flops hold
the binary information and gates control when and how new information
is transferred into a register. Various types of registers are available
commercially. The simplest register is one that consists of only flip-flops
with no external gates.
These days registers are also implemented as a register file.
Register Transfer Language
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
The symbolic notation used to describe the micro-operation transfers
amongst registers is called Register transfer language.
The term register transfer means the availability of hardware logic
circuits that can perform a stated micro-operation and transfer the
result of the operation to the same or another register.
The word language is borrowed from programmers who apply this term
to programming languages. This programming language is a procedure
for writing symbols to specify a given computational process.
Register Transfer
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Information transferred from one register to another is designated in
symbolic form by means of replacement operator.
R2 ← R1
It denotes the transfer of the data from register R1 into R2.
Normally we want the transfer to occur only in predetermined
control condition. This can be shown by following if-then statement:
if (P=1) then (R2 ← R1)
Here P is a control signal generated in the control section.
Micro-Operations
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
The operations executed on data stored in registers are called micro-
operations.A micro-operation is an elementary operation performed on
the information stored in one or more registers.
Example: Shift, count, clear and load.
Types of Micro-Operations
β€’ The micro-operations in digital computers are of 4 types:
β€’ Register transfer micro-operations transfer binary information from
one register to another.
β€’ Arithmetic micro-operations perform arithmetic operations on
numeric data stored in registers.
β€’ Logic micro-operations perform bit manipulation operation on non-
numeric data stored in registers.
β€’ Shift micro-operations perform shift micro-operations performed on
data.
Shift Micro-Operations
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
These are used for serial transfer of data. That means we can shift
the contents of the register to the left or right. In the shift left
operation the serial input transfers a bit to the right most position
and in shift right operation the serial input transfers a bit to theleft
most position.
There are three types of shifts as follows:
a) Logical Shift
It transfers 0 through the serial input. The symbol "shl" is usedfor
logical shift left and "shr" is used for logical shift right.
R1 ← she R1R1 ← she R1
The register symbol must be same on both sides of arrows.
b) Circular Shift
This circulates or rotates the bits of register around the two ends without
any loss of data or contents. In this, the serial output of the shift register
is connected to its serial input. "cil" and "cir" is used for circular shift
left and right respectively.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
c) Arithmetic Shift
This shifts a signed binary number to left or right. An arithmeticshift
left multiplies a signed binary number by 2 and shift left divides the
number by 2. Arithmetic shift micro-operation leaves the sign bit
unchanged because the signed number remains same when it is
multiplied or divided by 2.
Arithmetic Logical Unit
Instead of having individual registers performing the micro-operations, computer
system provides a number of registers connected to a common unit called as
Arithmetic Logical Unit (ALU). ALU is the main and one of the most important unit
inisde CPU of computer. All the logical and mathematical operations of computer
are performed here. The contents of specific register is placed in the in the input of
ALU. ALU performs the given operation and then transfer it to the destination
register.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Computer Instructions
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
The basic computer has three instruction code formats. The Operation code
(opcode) part of the instruction contains 3 bits and remaining 13 bits dependsupon
the operation code encountered.
There are three types of formats:
1. Memory Reference Instruction
It uses 12 bits to specify the address and 1 bit to specify the addressing mode (I).I
is equal to 0 for direct address and 1 for indirectaddress.
2. Register Reference Instruction
These instructions are recognized by the opcode 111 with a 0 in the left most bit of
instruction. The other 12 bits specify the operation to beexecuted.
3. Input-Output Instruction
These instructions are recognized by the operation code 111 with a 1 in the left
most bit of instruction. The remaining 12 bits are used to specify theinput-output
operation.
Register Mode
In this mode the operand is stored in the register nd this register is present
in CPU. The instruction has the address of the Register where the operand
is stored.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi –110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Semester:THIRDSemester
Name of the Subject:
COMPUTERARCHITECTURE
UNIT-2
FACULTY NAME: MS.ANJALI RANA
BCA
Introduction
As discussed earlier, the instruction set defines a CPU architecture. It serves as the
specification for the CPU designer, and the raw material for computer
programmers.
Hardware designers and programmers must work together in order to design an
effective instruction set. A balance must be struck between programmer-friendly
features, and the cost and complexity of the hardware.
The most clever designs make programming easy while keeping the hardware
simple and inexpensive.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
RISC
β€’ Reduced Instruction Set Computer
β€’ Small instruction set
β€’ Few addressing modes
β€’ Only load and store instructions can access memory
β€’ Simple, fixed-length instruction code format
β€’ Most instructions execute in 1 clock cycle (common exceptions are
load, store, mul, div)
β€’ Hardwired control unit
β€’Many registers
Examples:
β€’ Alpha
β€’ ARM
β€’ MIPS 60 instructions, load-store architecture, 3 addressing modes
(register-direct, immediate, and offset). Most instructions limited to
register direct, while a few use immediate for one operand. Load and
store instructions have one register direct and one offset operand.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
What is Pipelining?
Pipelining is the process of accumulating instruction from the processor through a
pipeline. It allows storing and executing instructions in an orderly process. It is also
known as pipeline processing.
Pipelining is a technique where multiple instructions are overlapped during
execution. Pipeline is divided into stages and these stages are connected with one
another to form a pipe like structure. Instructions enter from one end and exit from
another end.
Types of Pipeline
It is divided into 2 categories:
Arithmetic Pipeline
Instruction Pipeline
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Input/Output Subsystem
The I/O subsystem of a computer provides an efficient mode of communication
between the central system and the outside environment. It handles all the input-
output operations of the computer system.
Peripheral Devices
Input or output devices that are connected to computer are called peripheral
devices. These devices are designed to read information into or out of the memory
unit upon command from the CPU and are considered to be the part of computer
system. These devices are also called peripherals.
For example: Keyboards, display units and printers are common peripheral
devices.
There are three types of peripherals:
β€’ Input peripherals : Allows user input, from the outside world to the computer.
Example: Keyboard, Mouse etc.
β€’ Output peripherals: Allows information output, from the computer to the outside
world. Example: Printer, Monitor etc
β€’ Input-Output peripherals: Allows both input(from outised world to computer) as
well as, output(from computer to the outside world). Example: Touch screen etc.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Input-Output Interface
Peripherals connected to a computer need special communication links for
interfacing with CPU. In computer system, there are special hardware
components between the CPU and peripherals to control or manage the input-
output transfers. These components are called input-output interface units
because they provide communication links between processor bus and
peripherals. They provide a method for transferring information between internal
system and input-output devices.
Modes of I/O Data Transfer
Data transfer between the central unit and I/O devices can be handled in
generally three types of modes which are given below:
Programmed I/O
Interrupt Initiated I/O
Direct MemoryAccess
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Programmed I/O
Programmed I/O instructions are the result of I/O instructions written in
computer program. Each data item transfer is initiated by the instruction in
the program.
Usually the program controls data transfer to and from CPU and peripheral.
Transferring data under programmed I/O requires constant monitoring of the
peripherals by the CPU.
Interrupt Initiated I/O
In the programmed I/O method the CPU stays in the program loop until the
I/O unit indicates that it is ready for data transfer. This is time consuming
process because it keeps the processor busy needlessly.
Direct Memory Access
Removing the CPU from the path and letting the peripheral device manage
the memory buses directly would improve the speed of transfer. This
technique is known as DMA.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Basic Concepts of ALU Design
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
ALUs are implemented using lower-level components such as logic
gates, including and, or, not gates and multiplexers. These building
blocks work with individual bits, but the actual ALU works with32-bit
registers to perform a variety of tasks such as arithmetic and shift
operations.
In principle, an ALU is built from 32 separate 1-bit ALUs. Typically, one
constructs separate hardware blocks for each task (e.g., arithmetic and
logical operations), where each operation is applied to the 32-bit
registers in parallel, and the selection of an operation is controlled by a
multiplexer. The advantage of this approach is that it is easy to add new
operations to the instruction set, simply by associating an operationwith
a multiplexer control code. This can be done provided that the mux has
sufficient capacity. Otherwise, new data lines must be added to the
mux(es), and the CPU must be modified to accomodate thesechanges.
(Array) Processor and its Types
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Array processors are also known as multiprocessors or vector
processors. They perform computations on large arrays of data.Thus,
they are used to improve the performance of the computer.
Types of Array Processors
There are basically two types of array processors:
β€’ Attached Array Processors
β€’ SIMD Array Processors
Attached Array Processors
An attached array processor is a processor which is attached to a
general purpose computer and its purpose is to enhance and improve
the performance of that computer in numerical computational tasks. It
achieves high performance by means of parallel processing with
multiple functional units.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
SIMD Array Processors
SIMD is the organization of a single computer containing multiple processors
operating in parallel. The processing units are made to operate under the control of a
common control unit, thus providing a single instruction stream and multiple data
streams.
A general block diagram of an array processor is shown below. It contains a set of
identical processing elements (PE's), each of which is having a local memory M.
Each processor element includes an ALU and registers. The master control unit
controls all the operations of the processor elements. It also decodes the instructions
and determines how the instruction is to be executed.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi –110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Semester:THIRDSemester
Name of the Subject:
COMPUTERARCHITECTURE
UNIT-3
FACULTY NAME: MS.ANJALI RANA
BCA
Input/Output Subsystem
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
The I/O subsystem of a computer provides an efficient mode of
communication between the central system and the outside
environment. It handles all the input-output operations of the
computer system.
Peripheral Devices
Input or output devices that are connected to computer are called
peripheral devices. These devices are designed to read information
into or out of the memory unit upon command from the CPU and are
considered to be the part of computer system. These devices are
also called peripherals.
There are three types of peripherals:
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Input peripherals : Allows user input, from the outside
world to the computer. Example: Keyboard, Mouse etc.
Output peripherals: Allows information output, from the
computer to the outside world. Example: Printer,
Monitor etc
Input-Output peripherals: Allows both input(from
outised world to computer) as well as, output(from
computer to the outside world). Example: Touch screen
etc.
Interfaces
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Interface is a shared boundary btween two separate
components of the computer system which can be used to
attach two or more components to the system for
communication purposes.
There are two types of interface:
CPU Inteface
I/O Interface
Input-Output Interface
Peripherals connected to a computer need special
communication links for interfacing with CPU. In
computer system, there are special hardware
components between the CPU and peripherals to
control or manage the input-output transfers. These
components are called input-output interface
units because they provide communication links
between processor bus and peripherals. They
provide a method for transferring information
between internal system and input-output devices.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Modes of I/O Data Transfer
Data transfer between the central unit
and I/O devices can be handled in
generally three types of modes which
are given below:
β€’ Programmed I/O
β€’ Interrupt Initiated I/O
β€’ Direct Memory Access
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Programmed I/O
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Programmed I/O instructions are the result of I/O
instructions written in computer program. Each data item
transfer is initiated by the instruction in the program.
Usually the program controls data transfer to and from CPU
and peripheral. Transferring data under programmed I/O
requires constant monitoring of the peripherals by the CPU.
Interrupt Initiated I/O
In the programmed I/O method the CPU stays in the program loop until
the I/O unit indicates that it is ready for data transfer. This is time
consuming process because it keeps the processor busy needlessly.
This problem can be overcome by using interrupt initiated I/O. In this
when the interface determines that the peripheral is ready for data
transfer, it generates an interrupt. After receiving the interrupt signal, the
CPU stops the task which it is processing and service the I/O transferand
then returns back to its previous processing task. bus. A DMA controller
manages to transfer data between peripherals and memory unit.
Many hardware systems use DMA such as disk drive controllers,graphic
cards, network cards and sound cards etc. It is also used for intra chip
data transfer in multicore processors. In DMA, CPU would initiate the
transfer, do other operations while the transfer is in progress and receive
an interrupt from the DMA controller when the transfer has been
completed.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Computer Architecture:
Interrupts
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Data transfer between the CPU and the peripherals is initiated by the
CPU. But the CPU cannot start the transfer unless the peripheral is
ready to communicate with the CPU. When a device is ready to
communicate with the CPU, it generates an interrupt signal. A number
of input-output devices are attached to the computer and each deviceis
able to generate an interrupt request.
The main job of the interrupt system is to identify the source of the
interrupt. There is also a possibility that several devices will request
simultaneously for CPU communication. Then, the interrupt systemhas
to decide which device is to be serviced first.
Priority Interrupt
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
A priority interrupt is a system which decides the priority at whichvarious
devices, which generates the interrupt signal at the same time, will be
serviced by the CPU. The system has authority to decide which
conditions are allowed to interrupt the CPU, while some other interrupt is
being serviced. Generally, devices with high speed transfer such as
magnetic disks are given high priority and slow devices such as
keyboards are given low priority.
When two or more devices interrupt the computer simultaneously,the
computer services the device with the higher priority first.
Daisy Chaining Priority
This way of deciding the interrupt priority consists of serial connection of all the
devices which generates an interrupt signal. The device with the highest priority is
placed at the first position followed by lower priority devices and the device which
has lowest priority among all is placed at the last in the chain.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi –110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Semester:THIRDSemester
Name of the Subject:
COMPUTERARCHITECTURE
UNIT-4
FACULTY NAME: MS.ANJALI RANA
BCA
Memory Organization in Computer
Architecture
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
A memory unit is the collection of storage units or devices
together. The memory unit stores the binary information in
the form of bits. Generally, memory/storage is classified
into 2 categories:
Volatile Memory: This loses its data, when power is
switched off.
Non-Volatile Memory: This is a permanent storage and
does not lose any data when power is switched off.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
The main memory occupies the central position because it is equipped
to communicate directly with the CPU and with auxiliary memory
devices through Input/output processor (I/O).
When the program not residing in main memory is needed by the CPU,
they are brought in from auxiliary memory. Programs not currently
needed in main memory are transferred into auxiliary memory to
provide space in main memory for other programs that are currently in
use.
The cache memory is used to store program data which is currently
being executed in the CPU. Approximate access time ratio between
cache memory and main memory is about 1 to 7~10
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Memory Access Methods
Each memory type, is a collection of numerous memory locations. To
access data from any memory, first it must be located and then the
data is read from the memory location. Following are the methods to
access information from memory locations:
Random Access: Main memories are random access memories, in
which each memory location has a unique address. Using this unique
address any memory location can be reached in the same amount of
time in any order.
β€’ Sequential Access: This methods allows memory access ina
sequence or in order.
β€’ Direct Access: In this mode, information is stored in tracks,with
each track having a separate read/write head.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Main Memory
The memory unit that communicates directly within the CPU, Auxillary memory
and Cache memory, is called main memory. It is the central storage unit of the
computer system. It is a large and fast memory used to store data during
computer operations. Main memory is made up of RAM and ROM, with RAM
integrated circuit chips holing the major share.
RAM: Random Access Memory
DRAM: Dynamic RAM, is made of capacitors and transistors, and must be
refreshed every 10~100 ms. It is slower and cheaper than SRAM.
SRAM: Static RAM, has a six transistor circuit in each cell and retains data,
until powered off.
NVRAM: Non-Volatile RAM, retains its data, even when turned off. Example:
Flash memory.
ROM: Read Only Memory, is non-volatile and is more like a permanent storage
for information. It also stores the bootstrap loader program, to load and start the
operating system when computer is turned on. PROM(Programmable ROM),
EPROM(Erasable PROM) and EEPROM(Electrically Erasable PROM) are some
commonly used ROMs.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Auxiliary Memory
Devices that provide backup storage are called
auxiliary memory. For example: Magnetic disks
and tapes are commonly used auxiliary devices.
Other devices used as auxiliary memory are
magnetic drums, magnetic bubble memory and
optical disks.
It is not directly accessible to the CPU, and is
accessed using the Input/Output channels.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Cache Memory
The data or contents of the main memory that are used again and
again by CPU, are stored in the cache memory so that we can easily
access that data in shorter time.
Whenever the CPU needs to access memory, it first checks the
cache memory. If the data is not found in cache memory then the
CPU moves onto the main memory. It also transfers block of recent
data into the cache and keeps on deleting the old data in cache to
accomodate the new one.
Hit Ratio
The performance of cache memory is measured in terms of a
quantity called hit ratio. When the CPU refers to memory and finds
the word in cache it is said to produce a hit. If the word is not found
in cache, it is in main memory then it counts as a miss.
The ratio of the number of hits to the total CPU references to memory
is called hit ratio.
Hit Ratio = Hit/(Hit + Miss)
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Memory Mapping and
Concept of Virtual Memory
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
The transformation of data from main memory to cache memoryis
called mapping. There are 3 main types of mapping:
β€’ Associative Mapping
β€’ Direct Mapping
β€’ Set Associative Mapping
Associative Mapping
The associative memory stores both address and data. The
address value of 15 bits is 5 digit octal numbers and data is
of 12 bits word in 4 digit octal number. A CPU address of 15
bits is placed in argument register and the associative
memory is searched for matching address.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Direct Mapping
The CPU address of 15 bits is divided into 2 fields. In this
the 9 least significant bits constitute the index field and the
remaining 6 bits constitute the tag field. The number of bits
in index field is equal to the number of address bits
required to access cache memory.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Set Associative Mapping
The disadvantage of direct mapping is that two words with same index
address can't reside in cache memory at the same time. This problemcan
be overcome by set associative mapping.
In this we can store two or more words of memory under the sameindex
address. Each data word is stored together with its tag and this forms a
set.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Replacement Algorithms
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
Data is continuously replaced with new data in the
cache memory using replacement algorithms. Following
are the 2 replacement algorithms used:
β€’ FIFO - First in First out. Oldest item is replaced with
the latest item.
β€’ LRU - Least Recently Used. Item which is least
recently used by CPU is removed.
Virtual Memory
Virtual memory is the separation of logical memory from physical memory. This
separation provides large virtual memory for programmers when only small
physical memory is available.
Virtual memory is used to give programmers the illusion that they have a very
large memory even though the computer has a small main memory.
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
THANK
YOU
Chanderprabhu Jain College of Higher Studies & School of Law
Plot No. OCF, Sector A-8, Narela, New Delhi – 110040
(Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)

More Related Content

What's hot

Normalization
NormalizationNormalization
Normalizationcpjcollege
Β 
E-Commerce BCA 305
E-Commerce BCA 305E-Commerce BCA 305
E-Commerce BCA 305cpjcollege
Β 
Economic Offences
Economic OffencesEconomic Offences
Economic Offencescpjcollege
Β 
Corporate Law ( LLB- 305)
Corporate Law ( LLB- 305)Corporate Law ( LLB- 305)
Corporate Law ( LLB- 305)cpjcollege
Β 
Optical Character Recognition System for Urdu (Naskh Font)Using Pattern Match...
Optical Character Recognition System for Urdu (Naskh Font)Using Pattern Match...Optical Character Recognition System for Urdu (Naskh Font)Using Pattern Match...
Optical Character Recognition System for Urdu (Naskh Font)Using Pattern Match...CSCJournals
Β 
Hindi language as a graphical user interface to relational database for tran...
Hindi language as a graphical user interface to relational  database for tran...Hindi language as a graphical user interface to relational  database for tran...
Hindi language as a graphical user interface to relational database for tran...IRJET Journal
Β 
Production Management & Total Quality Management
Production Management & Total Quality ManagementProduction Management & Total Quality Management
Production Management & Total Quality Managementcpjcollege
Β 
Designing Cross-Language Information Retrieval System using various Technique...
Designing Cross-Language Information Retrieval System using various Technique...Designing Cross-Language Information Retrieval System using various Technique...
Designing Cross-Language Information Retrieval System using various Technique...IRJET Journal
Β 
Principles of accounting BCAbca 207
Principles of accounting BCAbca 207Principles of accounting BCAbca 207
Principles of accounting BCAbca 207cpjcollege
Β 
Angular Symmetric Axis Constellation Model for Off-line Odia Handwritten Char...
Angular Symmetric Axis Constellation Model for Off-line Odia Handwritten Char...Angular Symmetric Axis Constellation Model for Off-line Odia Handwritten Char...
Angular Symmetric Axis Constellation Model for Off-line Odia Handwritten Char...IJAAS Team
Β 
08 8879 10060-1-sm (ijict sj) edit iqbal
08 8879 10060-1-sm (ijict sj) edit iqbal08 8879 10060-1-sm (ijict sj) edit iqbal
08 8879 10060-1-sm (ijict sj) edit iqbalIAESIJEECS
Β 
IRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation SystemIRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation SystemIRJET Journal
Β 
IRJET - Voice based Natural Language Query Processing
IRJET -  	  Voice based Natural Language Query ProcessingIRJET -  	  Voice based Natural Language Query Processing
IRJET - Voice based Natural Language Query ProcessingIRJET Journal
Β 
Face and facial expressions recognition for blind people
Face and facial expressions recognition for blind peopleFace and facial expressions recognition for blind people
Face and facial expressions recognition for blind peopleIRJET Journal
Β 

What's hot (18)

Normalization
NormalizationNormalization
Normalization
Β 
E-Commerce BCA 305
E-Commerce BCA 305E-Commerce BCA 305
E-Commerce BCA 305
Β 
RDBMS
RDBMSRDBMS
RDBMS
Β 
Economic Offences
Economic OffencesEconomic Offences
Economic Offences
Β 
Corporate Law ( LLB- 305)
Corporate Law ( LLB- 305)Corporate Law ( LLB- 305)
Corporate Law ( LLB- 305)
Β 
Optical Character Recognition System for Urdu (Naskh Font)Using Pattern Match...
Optical Character Recognition System for Urdu (Naskh Font)Using Pattern Match...Optical Character Recognition System for Urdu (Naskh Font)Using Pattern Match...
Optical Character Recognition System for Urdu (Naskh Font)Using Pattern Match...
Β 
Hindi language as a graphical user interface to relational database for tran...
Hindi language as a graphical user interface to relational  database for tran...Hindi language as a graphical user interface to relational  database for tran...
Hindi language as a graphical user interface to relational database for tran...
Β 
Production Management & Total Quality Management
Production Management & Total Quality ManagementProduction Management & Total Quality Management
Production Management & Total Quality Management
Β 
Designing Cross-Language Information Retrieval System using various Technique...
Designing Cross-Language Information Retrieval System using various Technique...Designing Cross-Language Information Retrieval System using various Technique...
Designing Cross-Language Information Retrieval System using various Technique...
Β 
Principles of accounting BCAbca 207
Principles of accounting BCAbca 207Principles of accounting BCAbca 207
Principles of accounting BCAbca 207
Β 
Angular Symmetric Axis Constellation Model for Off-line Odia Handwritten Char...
Angular Symmetric Axis Constellation Model for Off-line Odia Handwritten Char...Angular Symmetric Axis Constellation Model for Off-line Odia Handwritten Char...
Angular Symmetric Axis Constellation Model for Off-line Odia Handwritten Char...
Β 
08 8879 10060-1-sm (ijict sj) edit iqbal
08 8879 10060-1-sm (ijict sj) edit iqbal08 8879 10060-1-sm (ijict sj) edit iqbal
08 8879 10060-1-sm (ijict sj) edit iqbal
Β 
IRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation SystemIRJET- Speech Based Answer Sheet Evaluation System
IRJET- Speech Based Answer Sheet Evaluation System
Β 
raghu resum
raghu resumraghu resum
raghu resum
Β 
Chaithra
ChaithraChaithra
Chaithra
Β 
IRJET - Voice based Natural Language Query Processing
IRJET -  	  Voice based Natural Language Query ProcessingIRJET -  	  Voice based Natural Language Query Processing
IRJET - Voice based Natural Language Query Processing
Β 
Mush cv E.E
Mush cv E.EMush cv E.E
Mush cv E.E
Β 
Face and facial expressions recognition for blind people
Face and facial expressions recognition for blind peopleFace and facial expressions recognition for blind people
Face and facial expressions recognition for blind people
Β 

Similar to Computer architecture BCA 203

Computer Applications
Computer ApplicationsComputer Applications
Computer Applicationscpjcollege
Β 
Introduction to IT
Introduction to ITIntroduction to IT
Introduction to ITcpjcollege
Β 
Digital electronics
Digital electronicsDigital electronics
Digital electronicscpjcollege
Β 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating Systemcpjcollege
Β 
Introduction to IT And Computers
Introduction to IT And ComputersIntroduction to IT And Computers
Introduction to IT And Computerscpjcollege
Β 
Computer Application
Computer Application Computer Application
Computer Application cpjcollege
Β 
Computer Applications
Computer ApplicationsComputer Applications
Computer Applicationscpjcollege
Β 
Introduction to operating system
Introduction to operating systemIntroduction to operating system
Introduction to operating systemcpjcollege
Β 
Register transfer and micro-operation
Register transfer and micro-operationRegister transfer and micro-operation
Register transfer and micro-operationNikhil Pandit
Β 
Computer organization
Computer organizationComputer organization
Computer organizationishapadhy
Β 
Bca examination 2016 csa
Bca examination 2016 csaBca examination 2016 csa
Bca examination 2016 csaAnjaan Gajendra
Β 
Introduction To Database Management System
Introduction To Database Management SystemIntroduction To Database Management System
Introduction To Database Management Systemcpjcollege
Β 
Iaetsd low power high speed vedic multiplier using reversible
Iaetsd low power high speed vedic multiplier using reversibleIaetsd low power high speed vedic multiplier using reversible
Iaetsd low power high speed vedic multiplier using reversibleIaetsd Iaetsd
Β 
VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...
VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...
VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...vtunotesbysree
Β 
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream CipherCompact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipheriosrjce
Β 
Microprocessor and Microcontroller.pptx
Microprocessor and Microcontroller.pptxMicroprocessor and Microcontroller.pptx
Microprocessor and Microcontroller.pptxpvg123456
Β 

Similar to Computer architecture BCA 203 (20)

Computer Applications
Computer ApplicationsComputer Applications
Computer Applications
Β 
Introduction to IT
Introduction to ITIntroduction to IT
Introduction to IT
Β 
Digital electronics
Digital electronicsDigital electronics
Digital electronics
Β 
Introduction to Operating System
Introduction to Operating SystemIntroduction to Operating System
Introduction to Operating System
Β 
Introduction to IT And Computers
Introduction to IT And ComputersIntroduction to IT And Computers
Introduction to IT And Computers
Β 
Computer Application
Computer Application Computer Application
Computer Application
Β 
Computer Applications
Computer ApplicationsComputer Applications
Computer Applications
Β 
Introduction to operating system
Introduction to operating systemIntroduction to operating system
Introduction to operating system
Β 
Register transfer and micro-operation
Register transfer and micro-operationRegister transfer and micro-operation
Register transfer and micro-operation
Β 
Computer organization
Computer organizationComputer organization
Computer organization
Β 
Register Organization of 80386
Register Organization of 80386Register Organization of 80386
Register Organization of 80386
Β 
Bca examination 2016 csa
Bca examination 2016 csaBca examination 2016 csa
Bca examination 2016 csa
Β 
Introduction To Database Management System
Introduction To Database Management SystemIntroduction To Database Management System
Introduction To Database Management System
Β 
Iaetsd low power high speed vedic multiplier using reversible
Iaetsd low power high speed vedic multiplier using reversibleIaetsd low power high speed vedic multiplier using reversible
Iaetsd low power high speed vedic multiplier using reversible
Β 
Unit 1 MPMC
Unit 1 MPMCUnit 1 MPMC
Unit 1 MPMC
Β 
Registers in coa
Registers in coaRegisters in coa
Registers in coa
Β 
VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...
VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...
VTU 4TH SEM CSE COMPUTER ORGANIZATION SOLVED PAPERS OF JUNE-2013 JUNE-2014 & ...
Β 
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream CipherCompact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
Compact High Speed Reconfigurable Hardware Implementation of RC4 Stream Cipher
Β 
Mc05.ppt
Mc05.pptMc05.ppt
Mc05.ppt
Β 
Microprocessor and Microcontroller.pptx
Microprocessor and Microcontroller.pptxMicroprocessor and Microcontroller.pptx
Microprocessor and Microcontroller.pptx
Β 

More from cpjcollege

Tax Law (LLB-403)
Tax Law (LLB-403)Tax Law (LLB-403)
Tax Law (LLB-403)cpjcollege
Β 
Law and Emerging Technology (LLB -405)
 Law and Emerging Technology (LLB -405) Law and Emerging Technology (LLB -405)
Law and Emerging Technology (LLB -405)cpjcollege
Β 
Law of Crimes-I ( LLB -205)
 Law of Crimes-I  ( LLB -205)  Law of Crimes-I  ( LLB -205)
Law of Crimes-I ( LLB -205) cpjcollege
Β 
Socio-Legal Dimensions of Gender (LLB-507 & 509 )
Socio-Legal Dimensions of Gender (LLB-507 & 509 )Socio-Legal Dimensions of Gender (LLB-507 & 509 )
Socio-Legal Dimensions of Gender (LLB-507 & 509 )cpjcollege
Β 
Family Law-I ( LLB -201)
Family Law-I  ( LLB -201) Family Law-I  ( LLB -201)
Family Law-I ( LLB -201) cpjcollege
Β 
Alternative Dispute Resolution (ADR) [LLB -309]
Alternative Dispute Resolution (ADR) [LLB -309] Alternative Dispute Resolution (ADR) [LLB -309]
Alternative Dispute Resolution (ADR) [LLB -309] cpjcollege
Β 
Law of Evidence (LLB-303)
Law of Evidence  (LLB-303) Law of Evidence  (LLB-303)
Law of Evidence (LLB-303) cpjcollege
Β 
Environmental Studies and Environmental Laws (: LLB -301)
Environmental Studies and Environmental Laws (: LLB -301)Environmental Studies and Environmental Laws (: LLB -301)
Environmental Studies and Environmental Laws (: LLB -301)cpjcollege
Β 
Code of Civil Procedure (LLB -307)
 Code of Civil Procedure (LLB -307) Code of Civil Procedure (LLB -307)
Code of Civil Procedure (LLB -307)cpjcollege
Β 
Constitutional Law-I (LLB -203)
 Constitutional Law-I (LLB -203) Constitutional Law-I (LLB -203)
Constitutional Law-I (LLB -203)cpjcollege
Β 
Women and Law [LLB 409 (c)]
Women and Law [LLB 409 (c)]Women and Law [LLB 409 (c)]
Women and Law [LLB 409 (c)]cpjcollege
Β 
Human Rights Law ( LLB -407)
 Human Rights Law ( LLB -407) Human Rights Law ( LLB -407)
Human Rights Law ( LLB -407)cpjcollege
Β 
Labour Law-I (LLB 401)
 Labour Law-I (LLB 401) Labour Law-I (LLB 401)
Labour Law-I (LLB 401)cpjcollege
Β 
Legal Ethics and Court Craft (LLB 501)
 Legal Ethics and Court Craft (LLB 501) Legal Ethics and Court Craft (LLB 501)
Legal Ethics and Court Craft (LLB 501)cpjcollege
Β 
Political Science-II (BALLB- 209)
Political Science-II (BALLB- 209)Political Science-II (BALLB- 209)
Political Science-II (BALLB- 209)cpjcollege
Β 
Health Care Law ( LLB 507 & LLB 509 )
Health Care Law ( LLB 507 & LLB 509 )Health Care Law ( LLB 507 & LLB 509 )
Health Care Law ( LLB 507 & LLB 509 )cpjcollege
Β 
Land and Real Estate Laws (LLB-505)
Land and Real Estate Laws (LLB-505)Land and Real Estate Laws (LLB-505)
Land and Real Estate Laws (LLB-505)cpjcollege
Β 
Business Environment and Ethical Practices (BBA LLB 213 )
Business Environment and Ethical Practices (BBA LLB 213 )Business Environment and Ethical Practices (BBA LLB 213 )
Business Environment and Ethical Practices (BBA LLB 213 )cpjcollege
Β 
PRIVATE INTERNATIONAL LAW ( LLB 507 &LLB 509 )
 PRIVATE  INTERNATIONAL  LAW ( LLB 507 &LLB 509 ) PRIVATE  INTERNATIONAL  LAW ( LLB 507 &LLB 509 )
PRIVATE INTERNATIONAL LAW ( LLB 507 &LLB 509 )cpjcollege
Β 
CRIMINOLOGY {LLB 409 (d) }
CRIMINOLOGY {LLB 409 (d) }CRIMINOLOGY {LLB 409 (d) }
CRIMINOLOGY {LLB 409 (d) }cpjcollege
Β 

More from cpjcollege (20)

Tax Law (LLB-403)
Tax Law (LLB-403)Tax Law (LLB-403)
Tax Law (LLB-403)
Β 
Law and Emerging Technology (LLB -405)
 Law and Emerging Technology (LLB -405) Law and Emerging Technology (LLB -405)
Law and Emerging Technology (LLB -405)
Β 
Law of Crimes-I ( LLB -205)
 Law of Crimes-I  ( LLB -205)  Law of Crimes-I  ( LLB -205)
Law of Crimes-I ( LLB -205)
Β 
Socio-Legal Dimensions of Gender (LLB-507 & 509 )
Socio-Legal Dimensions of Gender (LLB-507 & 509 )Socio-Legal Dimensions of Gender (LLB-507 & 509 )
Socio-Legal Dimensions of Gender (LLB-507 & 509 )
Β 
Family Law-I ( LLB -201)
Family Law-I  ( LLB -201) Family Law-I  ( LLB -201)
Family Law-I ( LLB -201)
Β 
Alternative Dispute Resolution (ADR) [LLB -309]
Alternative Dispute Resolution (ADR) [LLB -309] Alternative Dispute Resolution (ADR) [LLB -309]
Alternative Dispute Resolution (ADR) [LLB -309]
Β 
Law of Evidence (LLB-303)
Law of Evidence  (LLB-303) Law of Evidence  (LLB-303)
Law of Evidence (LLB-303)
Β 
Environmental Studies and Environmental Laws (: LLB -301)
Environmental Studies and Environmental Laws (: LLB -301)Environmental Studies and Environmental Laws (: LLB -301)
Environmental Studies and Environmental Laws (: LLB -301)
Β 
Code of Civil Procedure (LLB -307)
 Code of Civil Procedure (LLB -307) Code of Civil Procedure (LLB -307)
Code of Civil Procedure (LLB -307)
Β 
Constitutional Law-I (LLB -203)
 Constitutional Law-I (LLB -203) Constitutional Law-I (LLB -203)
Constitutional Law-I (LLB -203)
Β 
Women and Law [LLB 409 (c)]
Women and Law [LLB 409 (c)]Women and Law [LLB 409 (c)]
Women and Law [LLB 409 (c)]
Β 
Human Rights Law ( LLB -407)
 Human Rights Law ( LLB -407) Human Rights Law ( LLB -407)
Human Rights Law ( LLB -407)
Β 
Labour Law-I (LLB 401)
 Labour Law-I (LLB 401) Labour Law-I (LLB 401)
Labour Law-I (LLB 401)
Β 
Legal Ethics and Court Craft (LLB 501)
 Legal Ethics and Court Craft (LLB 501) Legal Ethics and Court Craft (LLB 501)
Legal Ethics and Court Craft (LLB 501)
Β 
Political Science-II (BALLB- 209)
Political Science-II (BALLB- 209)Political Science-II (BALLB- 209)
Political Science-II (BALLB- 209)
Β 
Health Care Law ( LLB 507 & LLB 509 )
Health Care Law ( LLB 507 & LLB 509 )Health Care Law ( LLB 507 & LLB 509 )
Health Care Law ( LLB 507 & LLB 509 )
Β 
Land and Real Estate Laws (LLB-505)
Land and Real Estate Laws (LLB-505)Land and Real Estate Laws (LLB-505)
Land and Real Estate Laws (LLB-505)
Β 
Business Environment and Ethical Practices (BBA LLB 213 )
Business Environment and Ethical Practices (BBA LLB 213 )Business Environment and Ethical Practices (BBA LLB 213 )
Business Environment and Ethical Practices (BBA LLB 213 )
Β 
PRIVATE INTERNATIONAL LAW ( LLB 507 &LLB 509 )
 PRIVATE  INTERNATIONAL  LAW ( LLB 507 &LLB 509 ) PRIVATE  INTERNATIONAL  LAW ( LLB 507 &LLB 509 )
PRIVATE INTERNATIONAL LAW ( LLB 507 &LLB 509 )
Β 
CRIMINOLOGY {LLB 409 (d) }
CRIMINOLOGY {LLB 409 (d) }CRIMINOLOGY {LLB 409 (d) }
CRIMINOLOGY {LLB 409 (d) }
Β 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
Β 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
Β 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
Β 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
Β 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
Β 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
Β 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
Β 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
Β 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
Β 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
Β 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
Β 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
Β 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
Β 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
Β 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
Β 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
Β 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Β 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Β 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Β 
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Β 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
Β 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
Β 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Β 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
Β 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
Β 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
Β 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Β 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
Β 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
Β 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Β 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
Β 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
Β 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
Β 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
Β 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
Β 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
Β 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Β 

Computer architecture BCA 203

  • 1. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi –110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Semester:THIRDSemester Name of the Subject: COMPUTERARCHITECTURE UNIT-1 FACULTY NAME: MS. Manu Shree BCA
  • 2. Registers in Computer Architecture Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Register is a very fast computer memory, used to store data/instruction in-execution. A Register is a group of flip-flops with each flip-flop capable of storing one bit of information. An n-bit register has a group of n flip-flops and is capable of storing binary information of n-bits. A register consists of a group of flip-flops and gates. The flip-flops hold the binary information and gates control when and how new information is transferred into a register. Various types of registers are available commercially. The simplest register is one that consists of only flip-flops with no external gates. These days registers are also implemented as a register file.
  • 3. Register Transfer Language Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) The symbolic notation used to describe the micro-operation transfers amongst registers is called Register transfer language. The term register transfer means the availability of hardware logic circuits that can perform a stated micro-operation and transfer the result of the operation to the same or another register. The word language is borrowed from programmers who apply this term to programming languages. This programming language is a procedure for writing symbols to specify a given computational process.
  • 4. Register Transfer Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Information transferred from one register to another is designated in symbolic form by means of replacement operator. R2 ← R1 It denotes the transfer of the data from register R1 into R2. Normally we want the transfer to occur only in predetermined control condition. This can be shown by following if-then statement: if (P=1) then (R2 ← R1) Here P is a control signal generated in the control section.
  • 5. Micro-Operations Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) The operations executed on data stored in registers are called micro- operations.A micro-operation is an elementary operation performed on the information stored in one or more registers. Example: Shift, count, clear and load. Types of Micro-Operations β€’ The micro-operations in digital computers are of 4 types: β€’ Register transfer micro-operations transfer binary information from one register to another. β€’ Arithmetic micro-operations perform arithmetic operations on numeric data stored in registers. β€’ Logic micro-operations perform bit manipulation operation on non- numeric data stored in registers. β€’ Shift micro-operations perform shift micro-operations performed on data.
  • 6. Shift Micro-Operations Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) These are used for serial transfer of data. That means we can shift the contents of the register to the left or right. In the shift left operation the serial input transfers a bit to the right most position and in shift right operation the serial input transfers a bit to theleft most position. There are three types of shifts as follows: a) Logical Shift It transfers 0 through the serial input. The symbol "shl" is usedfor logical shift left and "shr" is used for logical shift right. R1 ← she R1R1 ← she R1 The register symbol must be same on both sides of arrows.
  • 7. b) Circular Shift This circulates or rotates the bits of register around the two ends without any loss of data or contents. In this, the serial output of the shift register is connected to its serial input. "cil" and "cir" is used for circular shift left and right respectively. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) c) Arithmetic Shift This shifts a signed binary number to left or right. An arithmeticshift left multiplies a signed binary number by 2 and shift left divides the number by 2. Arithmetic shift micro-operation leaves the sign bit unchanged because the signed number remains same when it is multiplied or divided by 2.
  • 8. Arithmetic Logical Unit Instead of having individual registers performing the micro-operations, computer system provides a number of registers connected to a common unit called as Arithmetic Logical Unit (ALU). ALU is the main and one of the most important unit inisde CPU of computer. All the logical and mathematical operations of computer are performed here. The contents of specific register is placed in the in the input of ALU. ALU performs the given operation and then transfer it to the destination register. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 9. Computer Instructions Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) The basic computer has three instruction code formats. The Operation code (opcode) part of the instruction contains 3 bits and remaining 13 bits dependsupon the operation code encountered. There are three types of formats: 1. Memory Reference Instruction It uses 12 bits to specify the address and 1 bit to specify the addressing mode (I).I is equal to 0 for direct address and 1 for indirectaddress. 2. Register Reference Instruction These instructions are recognized by the opcode 111 with a 0 in the left most bit of instruction. The other 12 bits specify the operation to beexecuted. 3. Input-Output Instruction These instructions are recognized by the operation code 111 with a 1 in the left most bit of instruction. The remaining 12 bits are used to specify theinput-output operation.
  • 10. Register Mode In this mode the operand is stored in the register nd this register is present in CPU. The instruction has the address of the Register where the operand is stored. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 11. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi –110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Semester:THIRDSemester Name of the Subject: COMPUTERARCHITECTURE UNIT-2 FACULTY NAME: MS.ANJALI RANA BCA
  • 12. Introduction As discussed earlier, the instruction set defines a CPU architecture. It serves as the specification for the CPU designer, and the raw material for computer programmers. Hardware designers and programmers must work together in order to design an effective instruction set. A balance must be struck between programmer-friendly features, and the cost and complexity of the hardware. The most clever designs make programming easy while keeping the hardware simple and inexpensive. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 13. RISC β€’ Reduced Instruction Set Computer β€’ Small instruction set β€’ Few addressing modes β€’ Only load and store instructions can access memory β€’ Simple, fixed-length instruction code format β€’ Most instructions execute in 1 clock cycle (common exceptions are load, store, mul, div) β€’ Hardwired control unit β€’Many registers Examples: β€’ Alpha β€’ ARM β€’ MIPS 60 instructions, load-store architecture, 3 addressing modes (register-direct, immediate, and offset). Most instructions limited to register direct, while a few use immediate for one operand. Load and store instructions have one register direct and one offset operand. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 14. What is Pipelining? Pipelining is the process of accumulating instruction from the processor through a pipeline. It allows storing and executing instructions in an orderly process. It is also known as pipeline processing. Pipelining is a technique where multiple instructions are overlapped during execution. Pipeline is divided into stages and these stages are connected with one another to form a pipe like structure. Instructions enter from one end and exit from another end. Types of Pipeline It is divided into 2 categories: Arithmetic Pipeline Instruction Pipeline Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 15. Input/Output Subsystem The I/O subsystem of a computer provides an efficient mode of communication between the central system and the outside environment. It handles all the input- output operations of the computer system. Peripheral Devices Input or output devices that are connected to computer are called peripheral devices. These devices are designed to read information into or out of the memory unit upon command from the CPU and are considered to be the part of computer system. These devices are also called peripherals. For example: Keyboards, display units and printers are common peripheral devices. There are three types of peripherals: β€’ Input peripherals : Allows user input, from the outside world to the computer. Example: Keyboard, Mouse etc. β€’ Output peripherals: Allows information output, from the computer to the outside world. Example: Printer, Monitor etc β€’ Input-Output peripherals: Allows both input(from outised world to computer) as well as, output(from computer to the outside world). Example: Touch screen etc. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 16. Input-Output Interface Peripherals connected to a computer need special communication links for interfacing with CPU. In computer system, there are special hardware components between the CPU and peripherals to control or manage the input- output transfers. These components are called input-output interface units because they provide communication links between processor bus and peripherals. They provide a method for transferring information between internal system and input-output devices. Modes of I/O Data Transfer Data transfer between the central unit and I/O devices can be handled in generally three types of modes which are given below: Programmed I/O Interrupt Initiated I/O Direct MemoryAccess Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 17. Programmed I/O Programmed I/O instructions are the result of I/O instructions written in computer program. Each data item transfer is initiated by the instruction in the program. Usually the program controls data transfer to and from CPU and peripheral. Transferring data under programmed I/O requires constant monitoring of the peripherals by the CPU. Interrupt Initiated I/O In the programmed I/O method the CPU stays in the program loop until the I/O unit indicates that it is ready for data transfer. This is time consuming process because it keeps the processor busy needlessly. Direct Memory Access Removing the CPU from the path and letting the peripheral device manage the memory buses directly would improve the speed of transfer. This technique is known as DMA. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 18. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 19. Basic Concepts of ALU Design Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) ALUs are implemented using lower-level components such as logic gates, including and, or, not gates and multiplexers. These building blocks work with individual bits, but the actual ALU works with32-bit registers to perform a variety of tasks such as arithmetic and shift operations. In principle, an ALU is built from 32 separate 1-bit ALUs. Typically, one constructs separate hardware blocks for each task (e.g., arithmetic and logical operations), where each operation is applied to the 32-bit registers in parallel, and the selection of an operation is controlled by a multiplexer. The advantage of this approach is that it is easy to add new operations to the instruction set, simply by associating an operationwith a multiplexer control code. This can be done provided that the mux has sufficient capacity. Otherwise, new data lines must be added to the mux(es), and the CPU must be modified to accomodate thesechanges.
  • 20. (Array) Processor and its Types Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Array processors are also known as multiprocessors or vector processors. They perform computations on large arrays of data.Thus, they are used to improve the performance of the computer. Types of Array Processors There are basically two types of array processors: β€’ Attached Array Processors β€’ SIMD Array Processors
  • 21. Attached Array Processors An attached array processor is a processor which is attached to a general purpose computer and its purpose is to enhance and improve the performance of that computer in numerical computational tasks. It achieves high performance by means of parallel processing with multiple functional units. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 22. SIMD Array Processors SIMD is the organization of a single computer containing multiple processors operating in parallel. The processing units are made to operate under the control of a common control unit, thus providing a single instruction stream and multiple data streams. A general block diagram of an array processor is shown below. It contains a set of identical processing elements (PE's), each of which is having a local memory M. Each processor element includes an ALU and registers. The master control unit controls all the operations of the processor elements. It also decodes the instructions and determines how the instruction is to be executed. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 23. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi –110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Semester:THIRDSemester Name of the Subject: COMPUTERARCHITECTURE UNIT-3 FACULTY NAME: MS.ANJALI RANA BCA
  • 24. Input/Output Subsystem Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) The I/O subsystem of a computer provides an efficient mode of communication between the central system and the outside environment. It handles all the input-output operations of the computer system. Peripheral Devices Input or output devices that are connected to computer are called peripheral devices. These devices are designed to read information into or out of the memory unit upon command from the CPU and are considered to be the part of computer system. These devices are also called peripherals.
  • 25. There are three types of peripherals: Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Input peripherals : Allows user input, from the outside world to the computer. Example: Keyboard, Mouse etc. Output peripherals: Allows information output, from the computer to the outside world. Example: Printer, Monitor etc Input-Output peripherals: Allows both input(from outised world to computer) as well as, output(from computer to the outside world). Example: Touch screen etc.
  • 26. Interfaces Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Interface is a shared boundary btween two separate components of the computer system which can be used to attach two or more components to the system for communication purposes. There are two types of interface: CPU Inteface I/O Interface
  • 27. Input-Output Interface Peripherals connected to a computer need special communication links for interfacing with CPU. In computer system, there are special hardware components between the CPU and peripherals to control or manage the input-output transfers. These components are called input-output interface units because they provide communication links between processor bus and peripherals. They provide a method for transferring information between internal system and input-output devices. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 28. Modes of I/O Data Transfer Data transfer between the central unit and I/O devices can be handled in generally three types of modes which are given below: β€’ Programmed I/O β€’ Interrupt Initiated I/O β€’ Direct Memory Access Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 29. Programmed I/O Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Programmed I/O instructions are the result of I/O instructions written in computer program. Each data item transfer is initiated by the instruction in the program. Usually the program controls data transfer to and from CPU and peripheral. Transferring data under programmed I/O requires constant monitoring of the peripherals by the CPU.
  • 30. Interrupt Initiated I/O In the programmed I/O method the CPU stays in the program loop until the I/O unit indicates that it is ready for data transfer. This is time consuming process because it keeps the processor busy needlessly. This problem can be overcome by using interrupt initiated I/O. In this when the interface determines that the peripheral is ready for data transfer, it generates an interrupt. After receiving the interrupt signal, the CPU stops the task which it is processing and service the I/O transferand then returns back to its previous processing task. bus. A DMA controller manages to transfer data between peripherals and memory unit. Many hardware systems use DMA such as disk drive controllers,graphic cards, network cards and sound cards etc. It is also used for intra chip data transfer in multicore processors. In DMA, CPU would initiate the transfer, do other operations while the transfer is in progress and receive an interrupt from the DMA controller when the transfer has been completed. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 31. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 32. Computer Architecture: Interrupts Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Data transfer between the CPU and the peripherals is initiated by the CPU. But the CPU cannot start the transfer unless the peripheral is ready to communicate with the CPU. When a device is ready to communicate with the CPU, it generates an interrupt signal. A number of input-output devices are attached to the computer and each deviceis able to generate an interrupt request. The main job of the interrupt system is to identify the source of the interrupt. There is also a possibility that several devices will request simultaneously for CPU communication. Then, the interrupt systemhas to decide which device is to be serviced first.
  • 33. Priority Interrupt Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) A priority interrupt is a system which decides the priority at whichvarious devices, which generates the interrupt signal at the same time, will be serviced by the CPU. The system has authority to decide which conditions are allowed to interrupt the CPU, while some other interrupt is being serviced. Generally, devices with high speed transfer such as magnetic disks are given high priority and slow devices such as keyboards are given low priority. When two or more devices interrupt the computer simultaneously,the computer services the device with the higher priority first.
  • 34. Daisy Chaining Priority This way of deciding the interrupt priority consists of serial connection of all the devices which generates an interrupt signal. The device with the highest priority is placed at the first position followed by lower priority devices and the device which has lowest priority among all is placed at the last in the chain. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 35. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi –110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Semester:THIRDSemester Name of the Subject: COMPUTERARCHITECTURE UNIT-4 FACULTY NAME: MS.ANJALI RANA BCA
  • 36. Memory Organization in Computer Architecture Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) A memory unit is the collection of storage units or devices together. The memory unit stores the binary information in the form of bits. Generally, memory/storage is classified into 2 categories: Volatile Memory: This loses its data, when power is switched off. Non-Volatile Memory: This is a permanent storage and does not lose any data when power is switched off.
  • 37. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 38. The main memory occupies the central position because it is equipped to communicate directly with the CPU and with auxiliary memory devices through Input/output processor (I/O). When the program not residing in main memory is needed by the CPU, they are brought in from auxiliary memory. Programs not currently needed in main memory are transferred into auxiliary memory to provide space in main memory for other programs that are currently in use. The cache memory is used to store program data which is currently being executed in the CPU. Approximate access time ratio between cache memory and main memory is about 1 to 7~10 Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 39. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 40. Memory Access Methods Each memory type, is a collection of numerous memory locations. To access data from any memory, first it must be located and then the data is read from the memory location. Following are the methods to access information from memory locations: Random Access: Main memories are random access memories, in which each memory location has a unique address. Using this unique address any memory location can be reached in the same amount of time in any order. β€’ Sequential Access: This methods allows memory access ina sequence or in order. β€’ Direct Access: In this mode, information is stored in tracks,with each track having a separate read/write head. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 41. Main Memory The memory unit that communicates directly within the CPU, Auxillary memory and Cache memory, is called main memory. It is the central storage unit of the computer system. It is a large and fast memory used to store data during computer operations. Main memory is made up of RAM and ROM, with RAM integrated circuit chips holing the major share. RAM: Random Access Memory DRAM: Dynamic RAM, is made of capacitors and transistors, and must be refreshed every 10~100 ms. It is slower and cheaper than SRAM. SRAM: Static RAM, has a six transistor circuit in each cell and retains data, until powered off. NVRAM: Non-Volatile RAM, retains its data, even when turned off. Example: Flash memory. ROM: Read Only Memory, is non-volatile and is more like a permanent storage for information. It also stores the bootstrap loader program, to load and start the operating system when computer is turned on. PROM(Programmable ROM), EPROM(Erasable PROM) and EEPROM(Electrically Erasable PROM) are some commonly used ROMs. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 42. Auxiliary Memory Devices that provide backup storage are called auxiliary memory. For example: Magnetic disks and tapes are commonly used auxiliary devices. Other devices used as auxiliary memory are magnetic drums, magnetic bubble memory and optical disks. It is not directly accessible to the CPU, and is accessed using the Input/Output channels. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 43. Cache Memory The data or contents of the main memory that are used again and again by CPU, are stored in the cache memory so that we can easily access that data in shorter time. Whenever the CPU needs to access memory, it first checks the cache memory. If the data is not found in cache memory then the CPU moves onto the main memory. It also transfers block of recent data into the cache and keeps on deleting the old data in cache to accomodate the new one. Hit Ratio The performance of cache memory is measured in terms of a quantity called hit ratio. When the CPU refers to memory and finds the word in cache it is said to produce a hit. If the word is not found in cache, it is in main memory then it counts as a miss. The ratio of the number of hits to the total CPU references to memory is called hit ratio. Hit Ratio = Hit/(Hit + Miss) Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 44. Memory Mapping and Concept of Virtual Memory Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) The transformation of data from main memory to cache memoryis called mapping. There are 3 main types of mapping: β€’ Associative Mapping β€’ Direct Mapping β€’ Set Associative Mapping
  • 45. Associative Mapping The associative memory stores both address and data. The address value of 15 bits is 5 digit octal numbers and data is of 12 bits word in 4 digit octal number. A CPU address of 15 bits is placed in argument register and the associative memory is searched for matching address. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 46. Direct Mapping The CPU address of 15 bits is divided into 2 fields. In this the 9 least significant bits constitute the index field and the remaining 6 bits constitute the tag field. The number of bits in index field is equal to the number of address bits required to access cache memory. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 47. Set Associative Mapping The disadvantage of direct mapping is that two words with same index address can't reside in cache memory at the same time. This problemcan be overcome by set associative mapping. In this we can store two or more words of memory under the sameindex address. Each data word is stored together with its tag and this forms a set. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 48. Replacement Algorithms Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia) Data is continuously replaced with new data in the cache memory using replacement algorithms. Following are the 2 replacement algorithms used: β€’ FIFO - First in First out. Oldest item is replaced with the latest item. β€’ LRU - Least Recently Used. Item which is least recently used by CPU is removed.
  • 49. Virtual Memory Virtual memory is the separation of logical memory from physical memory. This separation provides large virtual memory for programmers when only small physical memory is available. Virtual memory is used to give programmers the illusion that they have a very large memory even though the computer has a small main memory. Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)
  • 50. THANK YOU Chanderprabhu Jain College of Higher Studies & School of Law Plot No. OCF, Sector A-8, Narela, New Delhi – 110040 (Affiliated to Guru Gobind Singh Indraprastha University and Approved by Govt of NCT of Delhi & Bar Council ofIndia)