The document discusses instruction set architecture (ISA), which defines the interface between software and hardware. It describes ISA as specifying storage locations, operations, and how to invoke and access them. The document then compares ISA to human language and discusses program compilation. It outlines the basic instruction execution model of fetching, decoding, executing and writing instructions. The document also describes different types of instruction sets like stack, accumulator and register-set architectures. Finally, it contrasts complex instruction set computers (CISC) with reduced instruction set computers (RISC).
pipelining is the concept of decomposing the sequential process into number of small stages in which each stage execute individual parts of instruction life cycle inside the processor.
pipelining is the concept of decomposing the sequential process into number of small stages in which each stage execute individual parts of instruction life cycle inside the processor.
Pipelining is an speed up technique where multiple instructions are overlapped in execution on a processor. It is an important topic in Computer Architecture.
This slide try to relate the problem with real life scenario for easily understanding the concept and show the major inner mechanism.
In these slides the registration organization and stack organization have discussed in detail. Stack organization is discussed with the aid of animation to let the user understand it in a better and easy way.
Micro operations
Fetch, Indirect, Interrupt, Execute, Instruction Cycle
Control Unit
Hardwired Control Unit
Microprogrammed Control Unit
Wilkie's Microprogrammed Control Unit
CISC & RISC Architecture with contents
History Of CISC & RISC
Need Of CISC
CISC
CISC Characteristics
CISC Architecture
The Search for RISC
RISC Characteristics
Bus Architecture
Pipeline Architecture
Compiler Structure
Commercial Application
Reference
There are situations, called hazards, that prevent the next instruction in the instruction stream from executing during its designated cycle
There are three classes of hazards
Structural hazard
Data hazard
Branch hazard
Computer Architecture – An IntroductionDilum Bandara
Overview on high-level design of internal components of a computer. Cover step-by-step execution of a program through ALU while accessing & updating registers
About Cache Memory
working of cache memory
levels of cache memory
mapping techniques for cache memory
1. direct mapping techniques
2. Fully associative mapping techniques
3. set associative mapping techniques
Cache memroy organization
cache coherency
every thing in detail
Pipelining is an speed up technique where multiple instructions are overlapped in execution on a processor. It is an important topic in Computer Architecture.
This slide try to relate the problem with real life scenario for easily understanding the concept and show the major inner mechanism.
In these slides the registration organization and stack organization have discussed in detail. Stack organization is discussed with the aid of animation to let the user understand it in a better and easy way.
Micro operations
Fetch, Indirect, Interrupt, Execute, Instruction Cycle
Control Unit
Hardwired Control Unit
Microprogrammed Control Unit
Wilkie's Microprogrammed Control Unit
CISC & RISC Architecture with contents
History Of CISC & RISC
Need Of CISC
CISC
CISC Characteristics
CISC Architecture
The Search for RISC
RISC Characteristics
Bus Architecture
Pipeline Architecture
Compiler Structure
Commercial Application
Reference
There are situations, called hazards, that prevent the next instruction in the instruction stream from executing during its designated cycle
There are three classes of hazards
Structural hazard
Data hazard
Branch hazard
Computer Architecture – An IntroductionDilum Bandara
Overview on high-level design of internal components of a computer. Cover step-by-step execution of a program through ALU while accessing & updating registers
About Cache Memory
working of cache memory
levels of cache memory
mapping techniques for cache memory
1. direct mapping techniques
2. Fully associative mapping techniques
3. set associative mapping techniques
Cache memroy organization
cache coherency
every thing in detail
An advanced processor is a type of microprocessor that is designed to handle complex tasks and perform calculations at a high speed. These processors are typically used in high-performance computing applications, such as scientific research, artificial intelligence, and data analysis. They often have multiple cores and advanced instruction sets that allow them to process large amounts of data quickly and efficiently. Some examples of advanced processors include Intel's Core i9 and AMD's Ryzen Threadripper
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2. INSTRUCTION SET ARCHITECTURE (ISA)
ISA (instruction set architecture)
A well-defined hardware/software interface
The “contract” between software and hardware
Functional definition of storage locations &
operations
Storage locations: registers, memory
Operations: add, multiply, branch, load, store, etc
Precise description of how to invoke & access them
• How operations are implemented
• Which operations are fast and which are slow and when
• Which operations take more power and which take less
• Instructions
Bit-patterns hardware interprets as commands
Instruction → Insn (instruction is too long to write in
slides)
3. A LANGUAGE ANALOGY FOR ISAS
Communication
Person-to-person → software-to-hardware
Similar structure
Narrative → program
Sentence → insn
Verb → operation (add, multiply, load, branch)
Noun → data item (immediate, register value, memory
value)
Adjective → addressing mode
Many different languages, many different ISAs
Similar basic structure, details differ (sometimes greatly)
Key differences between languages and ISAs
Languages evolve organically, many ambiguities,
inconsistencies
ISAs are explicitly engineered and extended, unambiguous
4. PROGRAM COMPILATION
Program written in a “high-level” programming language
C, C++, Java, C#
Hierarchical, structured control: loops, functions, conditionals
Hierarchical, structured data: scalars, arrays, pointers, structures
Compiler: translates program to assembly
Parsing and straight-forward translation
Compiler also optimizes
Compiler itself another application … who compiled compiler?
5. INSTRUCTION EXECUTION MODEL
The computer is just finite state machine
Registers (few of them, but fast)
Memory (lots of memory, but slower)
Program counter (next insn to execute)
Called “instruction pointer” in x86
A computer executes instructions
Fetches next instruction from memory
Decodes it (figure out what it does)
Reads its inputs (registers & memory)
Executes it (adds, multiply, etc.)
Write its outputs (registers & memory)
Next insn (adjust the program counter)
Program is just “data in memory”
Makes computers programmable (“universal”)
6. THE SEQUENTIAL MODEL
Basic structure of all modern ISAs
Often called VonNeuman, but in ENIAC before
Program order: total order on dynamic insns
Order and named storage define computation
Convenient feature: Program counter (PC)
Insn itself stored in memory at location pointed to
by PC
Next PC is next insn unless insn says otherwise
Processor logically executes loop at left
Atomic: insn finishes before next insn starts
Implementations can break this constraint physically
But must maintain illusion to preserve correctness
7. WHAT MAKES A GOOD ISA?
Programmability
Easy to express programs efficiently?
Performance/Implementability
Easy to design high-performance implementations?
More recently
Easy to design low-power implementations?
Easy to design low-cost implementations?
Compatibility
Easy to maintain as languages, programs, and technology
evolve?
x86 (IA32) generations: 8086, 286, 386, 486, Pentium,
PentiumII,
PentiumIII, Pentium4, Core2, Core i7, …
8. TYPES OF INSTRUCTION SETS
1. Stack Architecture:
The operands are put into the stack. Operations
take place at the top two locations on the stack,
destroying the operands, and leaving the result
on the top of the stack.
Two operations, push and pop, have one
operand. Push a value at the top of the stack, or
pop the top element of the stack to a destination.
This architecture was used in computers in 1960s.
9. TYPES OF INSTRUCTION SETS
1. Stack Architecture:
Suppose we want to ask a stack architecture machine to
conduct the operation C = A + B, where A, B, and C are
memory addresses. The result of A + B are stored at
location C.
- Then, to implement the operation in a stack
architecture, we
need the following steps:
PUSH A # push value at location A to the top of the stack
PUSH B # push value at location B to the top of the stack
ADD # add the top two elements of the stack and save the result back to the top of the stack
POP C # store the value at the top of the stack (which is the result) to location C
10. TYPES OF INSTRUCTION SETS
2. Accumulator Architecture
It places one operand in the accumulator and one in memory.
The one in the accumulator is implicit, and the one in the
memory is an explicit memory address. The result of ALU is
written back to the accumulator.
The operand in the accumulator is loaded from memory
using the command LOAD, and the result is stored in
memory from accumulator using the command STORE.
This architecture was used by early computers like IBM
7090. Today, it’s used by some microprocessor chips,
such as some digital signal processors.
11. TYPES OF INSTRUCTION SETS
2. Accumulator Architecture
Suppose we want to ask an accumulator architecture
machine to conduct the same operation C = A + B as above.
- Then, to implement the operation in an accumulator
architecture, we need the following steps:
LOAD A # load value at location A from main memory to ACC
ADD B # fetch the value at location B, add it with the value at ACC (which is the value A), and
save the result back to ACC
STORE C # store the value at ACC (which is the result of A + B) to location C
12. TYPES OF INSTRUCTION SETS
3. Register-Set Architecture: Modern CPUs have a number of general-
purpose registers (GPR's) for internal storage: at least 8 and as many as 32.
• GPR machines are the most flexible of all, because they allow the user to
access any of several registers.
• The load/store commands must typically specify a register and memory
location, to indicate both source and destination of the data.
• Any register can be used as an accumulator, an index register, or for
temporary storage, etc., so many variables and addresses can be
manipulated without extra memory accesses.
• The major bad point of having many registers is the large amount of internal
CPU state that must be saved/restore for calls, returns, and interrupts.
• There are 8 general-purpose registers in the 8086 microprocessor.
14. CISC & RISC ARCHITECTURE
Need Of CISC:
In the past, it was believed that hardware design was easier than compiler
design
Most programs were written in assembly language
Hardware concerns of the past:
Limited and slower memory
Few registers
Register:
Registers are a type of computer memory used to quickly accept, store, and
transfer data and instructions that are being used immediately by the CPU.
The registers used by the CPU are often termed as Processor registers.
15. CISC & RISC ARCHITECTURE
CISC, which stands for Complex Instruction Set Computer.
Each instruction executes multiple low level operations.
Ex. A single instruction can load from memory, perform an
arithmetic operation, and store the result in memory.
Smaller program size.
16. CISC & RISC ARCHITECTURE
CISC Characteristics
A large number of instructions.
Some instructions for special tasks used infrequently.
A large variety of addressing modes (5 to 20).
Variable length instruction formats.
Disadvantages :
However, it soon became apparent that a complex instruction set has a
number of disadvantages:
These include a complex instruction decoding scheme, an
increased size of the control unit, and increased logic delays.
17. CISC & RISC ARCHITECTURE
RISC: RISC Stands for Reduced Instruction Set Computer.
It is a microprocessor that is designed to perform a smaller number of types of
computer instruction so that it can operate at a higher speed.
RISC Characteristics :
Relatively few instructions
128 or less
Relatively few addressing modes.
Memory access is limited to LOAD and STORE instructions.
All operations done within the registers of the CPU.
This architectural feature simplifies the instruction set and encourages the optimization of
register manipulation.
An essential RISC philosophy is to keep the most frequently accessed operands in
registers and minimize register-memory operations.
24. QUESTIONS:
Q1: What is Instruction Set Architecture?
An Instruction Set Architecture (ISA) is part of the abstract model of a computer that defines how
the CPU is controlled by the software. The ISA acts as an interface between the hardware and the
software, specifying both what the processor is capable of doing as well as how it gets done.
Q2: What is Instruction Execution Model?
The three cycle instruction. execution model. • To execute a program, the microprocessor “reads”
each instruction from memory, “interprets” it, then “executes” it.
Q3: What is Stack Architecture?
The stack is a list of data words. It uses the Last In First Out (LIFO) access method which is the most
popular access method in most of the CPU. A register is used to store the address of the topmost
element of the stack which is known as Stack pointer (SP).
25. QUESTIONS:
Q4: Difference between CISC and RISC.
The primary difference between RISC and CISC architecture is that RISC-based machines execute
one instruction per clock cycle. RISC does the opposite, reducing the cycles per instruction at the
cost of the number of instructions per program. In a CISC processor, each instruction performs so
many actions that it takes several clock cycles to complete. The CISC approach attempts to minimize
the number of instructions per program, sacrificing the number of cycles per instruction.
Q5: What is Register?
A processor register (CPU register) is one of a small set of data holding places that are part of the
computer processor. A register may hold an instruction, a storage address, or any kind of data (such
as a bit sequence or individual characters). Some instructions specify registers as part of the
instruction.